Perimeter protection of goods and persons

Protect your sites from malicious intrusions (theft, attacks or acts of vandalism…) or crossing forbidden zones (unloading docks, production machines…).

The current technology of people detection does not allow a great reliability of recognition and generates many false positives (vegetation, animals, night vision…).

It often needs to be coupled with other types of expensive systems to be effective.
Moreover, the automatic association of particular events (fire, smoke, presence of objects) with the presence of people is often not possible.

Why using this solution makes it a unique experience?

Drawing attention to the essentials
Using advanced analysis based on embedded AI, Yumain's image analysis aims to improve the productivity of security personnel while making surveillance less expensive.
Detection of unusual activity of any object
The detection of mobile or immobile events, other than conventional objects (vehicle, people, animals) allows the implementation of alert scenarios specific to each customer need. Yumain works on its own proprietary and annotated databases.
Simplified and discreet installation
The combination of ECS with this application allows easy, fast and inexpensive deployment of the solution on site. A design that does not evoke a camera was deliberately selected by our teams.
We are also proud to have developed and industrialized our own product, keeping an independence on the integration, or not, of communication protocols and media, as well as the different integrated sensors.

The intrusion detection device also allows to
to meet other objectives that are interrelated:

  • Allows functions for counting particular objects

  • Allows for the removal of doubts by sending reduced image sizes

  • Interface with an existing or non-existing hypervision solution

  • Loading of custom alarm triggering scenario

OUR DEVICES ADAPT TO YOUR ENVIRONMENT

Because they are versatile, compact and discreet,
these warning and non-intrusive devices can be
installed near various locations.

Nevertheless, they are very often located close to :

  • Dock areas, warehouses and storage areas

  • Entrances/exits of the premises

  • Traffic lanes in the company

  • Loading and unloading areas

  • Overhead crane evolution area

OUR ALERTS ARE RELIABLE

The intrusion detection device is based on
on the combination of our robust and mature algorithms
as well as filters applied by image processing.

Yumain’s solution is already robust and industrial already
tested by our customers and validated in the field since
months.

OUR COLLISION RISK DETECTION SYSTEM IS ECONOMICAL

If your technical teams within your company
can do it, our solutions are designed to be
directly installed by them. This reduces
considerably the cost of installation.

LEARN MORE

THE OPERATION OF THE ANTI-INTRUSION DEVICE

To detect an intrusion in a defined area, the system is based on the combination of image analysis and embedded algorithms based on artificial intelligence.

The image captured by the video sensor is processed in real time directly in the device housing and triggers an alert via one or more dry contact outputs. Alert devices are multiple, luminous, sound, voice, wireless, or any other solutions. These dry contacts can also be interfaced with the locking of access doors.

This information can also be stored and time-stamped for statistical purposes, but also to feed indicators useful to the security manager.

A memorisation of events (images) can be kept locally on request, or transmitted to a concentrator via an IP link. Precautions should then be taken with regard to RGPD aspects. This solution, due to its fanless design, does not require any maintenance.

A FLEXIBLE INSTALLATION

Thanks to technical developments, and the choice of a universal support type Ram-Mount™ (https://www.ram-mount.fr), the sensor can be installed on various supports.

Installation on a mast or on a wall are the most commonly adapted solutions. Installation on a gantry or scaffolding is also possible.

THE NECESSARY CONNECTIONS

This device includes all the elements necessary for its operation and installation: “Edge Computing” solution. In its basic version, it only requires an external power supply + connection to the light and sound device (“plug & play” concept). The connection to the cloud, or to the company network is unnecessary.

THE DIFFERENT POSSIBLE POWER MODES

Due to the different possible layout configurations, the devices can be powered in several ways:

  • By permanent electrical network (240 VAC)
  • In 12 to 48 VDC

A SOLUTION THAT MEETS GDPR REQUIREMENTS

This device, in its basic version, does not store or transmit any image, and is therefore not concerned by the GDPR Regulation.

SECURITY IS EVERYONE'S BUSINESS.

Conventional video-surveillance allows the security of goods and people, but is also subject to the generation of many false alarms. The robustness of the algorithms, combined with customizable filters, allows a drastic reduction of useless alerts, generating a loss of vigilance.

Hello, how can we help you?

A project, a question, our AI specialists are there to bring you the solutions



We will contact you immediately.