Why using this solution makes it a unique experience?
Perimeter protection of goods and persons
Protect your sites from malicious intrusions (theft, attacks or acts of vandalism…) or crossing forbidden zones (unloading docks, production machines…).
The current technology of people detection does not allow a great reliability of recognition and generates many false positives (vegetation, animals, night vision…).
It often needs to be coupled with other types of expensive systems to be effective.
Moreover, the automatic association of particular events (fire, smoke, presence of objects) with the presence of people is often not possible.
Using advanced analysis based on embedded AI, Yumain's image analysis aims to improve the productivity of security personnel while making surveillance less expensive.
The detection of mobile or immobile events, other than conventional objects (vehicle, people, animals) allows the implementation of alert scenarios specific to each customer need. Yumain works on its own proprietary and annotated databases.
The combination of ECS with this application allows easy, fast and inexpensive deployment of the solution on site. A design that does not evoke a camera was deliberately selected by our teams.
The intrusion detection device also allows to
to meet other objectives that are interrelated:
Allows functions for counting particular objects
Allows for the removal of doubts by sending reduced image sizes
Interface with an existing or non-existing hypervision solution
Loading of custom alarm triggering scenario

OUR DEVICES ADAPT TO YOUR ENVIRONMENT
Because they are versatile, compact and discreet,
these warning and non-intrusive devices can be
installed near various locations.
Nevertheless, they are very often located close to :
Dock areas, warehouses and storage areas
Entrances/exits of the premises
Traffic lanes in the company
Loading and unloading areas
Overhead crane evolution area
OUR ALERTS ARE RELIABLE
The intrusion detection device is based on
on the combination of our robust and mature algorithms
as well as filters applied by image processing.
Yumain’s solution is already robust and industrial already
tested by our customers and validated in the field since
months.

OUR DISTRIBUTORS
T2S is one of the largest French manufacturers of High Visibility Personal Protective Equipment.
To contact EC2E:
EC2E Electro Cablage
4, Boulevard Napoléeon 1er
ZAC du Pont des Rayons
95290 L’ISLE-ADAM
Email : contact@ec2e.com
Phone : +33(0)1.83.02.02.02
To contact T2S:
Arnaud Simon
Director of Key Account Services, Fabric and Connected Solutions
Email : a.simon@t2s.fr
Phone : +33(0)6.71.00.37.51
DOWNLOAD
Our certificates and operating instructions are available on request.
To do so, please go to the contact area by clicking here.
LEARN MORE
THE OPERATION OF THE ANTI-INTRUSION DEVICE
To detect an intrusion in a defined area, the system is based on the combination of image analysis and embedded algorithms based on artificial intelligence.
The image captured by the video sensor is processed in real time directly in the device housing and triggers an alert via one or more dry contact outputs. Alert devices are multiple, luminous, sound, voice, wireless, or any other solutions. These dry contacts can also be interfaced with the locking of access doors.
This information can also be stored and time-stamped for statistical purposes, but also to feed indicators useful to the security manager.
A memorisation of events (images) can be kept locally on request, or transmitted to a concentrator via an IP link. Precautions should then be taken with regard to RGPD aspects. This solution, due to its fanless design, does not require any maintenance.
A FLEXIBLE INSTALLATION
Thanks to technical developments, and the choice of a universal support type Ram-Mount™ (https://www.ram-mount.fr), the sensor can be installed on various supports.
Installation on a mast or on a wall are the most commonly adapted solutions. Installation on a gantry or scaffolding is also possible.
THE NECESSARY CONNECTIONS
This device includes all the elements necessary for its operation and installation: “Edge Computing” solution. In its basic version, it only requires an external power supply + connection to the light and sound device (“plug & play” concept). The connection to the cloud, or to the company network is unnecessary.
THE DIFFERENT POSSIBLE POWER MODES
Due to the different possible layout configurations, the devices can be powered in several ways:
- By permanent electrical network (240 VAC)
- In 12 to 48 VDC
A SOLUTION THAT MEETS GDPR REQUIREMENTS
This device, in its basic version, does not store or transmit any image, and is therefore not concerned by the GDPR Regulation.
SECURITY IS EVERYONE'S BUSINESS.
Conventional video-surveillance allows the security of goods and people, but is also subject to the generation of many false alarms. The robustness of the algorithms, combined with customizable filters, allows a drastic reduction of useless alerts, generating a loss of vigilance.
Ask for a free demo !
We will contact you immediately.