Regional Architecture Logo
 

Send Your Comments

E-Mail

Field Secure Area Sensor Monitoring Equipment Package

Architecture Geographic Scope

Description:

Security sensors monitoring facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, and transit railways or guideways) for environmental threats, intrusion and motion, object detection, and infrastructure integrity.

 

Included in:

TxDOT Yoakum District Security Equipment

Functional Requirements:

1The field element shall include security sensors that monitor conditions of secure areas including facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, roadway infrastructure, and transit railways or guideways).
2The field element shall be remotely controlled by a center.
3The field element shall provide equipment status and fault indication of security sensor equipment to a center.
4The field element shall include environmental threat sensors (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological).
5The field element shall include infrastructure condition and integrity monitoring sensors.
6The field element shall include motion and intrusion detection sensors.
7The field element shall include object detection sensors (such as metal detectors).
8The field element shall provide raw security sensor data.
9The field element shall remotely process security sensor data and provide an indication of potential incidents or threats to a center.
  

User Service Requirements (fully or partially addressed):

2.0PUBLIC TRANSPORTATION MANAGEMENT
2.4PUBLIC TRAVEL SECURITY
2.4.1PTS shall include specific Secure Areas.
2.4.1.1(g)Transit facilities (e.g. transit yards and shops).
2.4.1.1(h)Transit infrastructure (rail tracks, tunnels, bridges, bus guideways, etc.).
2.4.2PTS shall include a Security Sensors (SS) function.
2.4.2.5SS shall include sensors for metal (and other object) detection on board the public transit vehicle (bus, rail car), and at key locations, including rest areas, transit stops and stations, and transit facilities (i.e., transit yards and shops), to detect contraband, such as knives, guns, and other potential weapons.
2.4.2.6SS shall include a method of intrusion detection (or motion detection) at transit facilities (i.e., transit yards and shops).
2.4.2.7SS shall include video, audio, intrusion (or motion) detection, and infrastructure integrity monitoring of transit infrastructure (rail track, bridges, tunnels, bus guideways, etc.).
5.0EMERGENCY MANAGEMENT
5.1EMERGENCY NOTIFICATION AND PERSONAL SECURITY
5.1.3ENPS shall include a Remote Security and Emergency Monitoring (RSEM) function to create an environment of safety in secure areas.
5.1.3.1RSEM shall include specific Secure Areas.
5.1.3.1.1The Secure Areas shall encompass physical areas related to travel including but not limited to the following: critical infrastructure (such as bridges, tunnels, interchanges, management centers, etc.), rest stops and picnic areas, park-and-ride areas, tourism and travel information areas and emergency pull off areas.
5.1.3.2RSEM shall include a Surveillance and Sensors (SS) function.
5.1.3.2.1SS shall provide surveillance and sensor technology and the data processing required to alert operators and appropriate agencies of potential incidents and threats at the Secure Areas.
5.1.3.2.1.2SS shall provide sensors that may include, but are not limited to acoustic, environmental threat (such as nuclear, biological, chemical, and explosives), infrastructure condition and integrity, motion and object sensors.
5.1.3.2.1.3SS shall provide data processing based on surveillance and sensor inputs to determine when an anomaly or suspicious activity (vehicle or human) has been detected in the Secure Area and alert the operators, travelers, appropriate agencies and organizations of a security threat.
5.1.3.3RSEM shall include a Security Alarm (SA) function.
5.1.3.3.2Secure areas shall include automatically activated alarms for natural disasters, terrorist threats, fire, theft, vandalism, etc.
  
The detailed process and user service requirement traceability information on this page was extracted from the National ITS Architecture. Consult the National ITS Architecture web site for more information.

Last updated on 05-27-2005 using Ronald C. Ice and Associates Web Spinner Technology.