- Products
Hazardous Areas Mining Industries
- Products
Hazardous Areas Mining Industries
Whether underground or on the surface, priority number one in mining is workforce safety. Slips, trips, and falls in high-risk environments can lead to serious consequences. Physical loss or damage to assets causes costly downtime, posing tremendous concerns for mining companies. Furthermore, the industry requires digital technologies ā automation, improved manufacturing processes, and production optimizations ā to promote operational efficiency and standardize the work process.
Products
AUTOMATIC MONITORING SYSTEM
Underground Comprehensive Mining Face Video Monitoring System
Remote Video Access System
Surface Video Processing System
Comprehensive Mining Face AI Monitoring System
- Cross-Border Management
- Cross-Boundary Management
- Voice Call Functionality
- Protect and Support
- Conveyor Detection System
Cross-Border Management
Leveraging advanced AI technology, Bergen Securityās system automates the monitoring process by capturing real-time images and analyzing information about personnel, vehicles, and objects. Monitored areas are divided into multiple levels for continuous, real-time analysis, ensuring fully intelligent operations. The system identifies potential hazards promptly to uphold safety production standards, reduce accidents, and support decision-making processes. It outputs specified control signals when individuals illegally pass through monitored zones, facilitating correct equipment shutdown and startup decisions
Cross-Boundary Management
Detects boundary violations and provides immediate feedback on abnormalities.
Monitors unauthorized entry into restricted areas, such as stope ends and blind drifts.
Outputs control signals to halt equipment when personnel enter dangerous zones during operations.
Issues audible alerts both above and below ground.
Voice Call Functionality
Using IP/TCP digital communication protocols, this feature transmits audio signals over local and wide area networks, creating a robust two-way intercom system. Key features include:
Audio echo cancellation technology for clear, high-definition bidirectional communication.
Transmission capabilities over LAN and WAN for remote communication.
Embedded architecture to prevent system crashes and virus intrusions.
Intelligent operation modes, including single-button activation and gesture triggering.
Protect and Support
This feature employs advanced image processing and machine vision to monitor the retraction angle of hydraulic support shields. By analyzing fog and dust images, it ensures the timely support of the shielding plate during the movement of the hydraulic support frame. The system uses position signals to verify that the support frame operates correctly and alerts operators to any anomalies.
Conveyor Detection System
Bergen Securityās conveyor belt detection system employs deep recognition technology to monitor coal volume and detect foreign objects on the belt. Key features include:
Energy-saving speed regulation based on coal volume to optimize belt operation.
Detection of large objects and belt deviations to prevent damage.
Real-time recognition of chain slippage and breakage in scraper conveyors.
Utilizing Industrial Thermography for Risk Management

Code of Conduct Monitoring System
This system is designed to address non-compliance and cheating behaviors in underground mining operations. It improves management by providing traceable records and supervision, generating daily, weekly, and monthly reports to help understand underground work conditions.

Thermography for Conveyor Belts and Critical Assets
Our thermal cameras detect temperature changes in the environment or equipment, identifying potential risks such as burning material or overheating conveyor belts. Alarms are triggered immediately, equipping managers with critical information for effective responses. Continuous monitoring of mining equipment helps catch potential failures early, protecting workers and saving time and money.

Drilling Video Management System
This system is designed to address non-compliance and cheating behaviors in underground mining operations. It improves management by providing traceable records and supervision, generating daily, weekly, and monthly reports to help understand underground work conditions.
HARNESSING AI FOR MINING SURVEILLANCE
Bergen Security end-to-end mining security and surveillance solutions protects employees, operations, and assets with high efficiency. Our intrinsically safe turnkey solution harnesses the power of AI technology and top-tier products to help ensure workforce and facility safety, fluid operations, and improved productivity overall.
The coal conveyor and associated electrical equipment operate in an environment marked by extreme conditions, presenting challenges that can adversely affect their performance and reliability. This operational setting is characterized by high humidity, corrosive gases, and substantial dust levels, collectively posing a significant threat to the safe and stable operation of electrical equipment, potentially leading to malfunctions.
Fully comprehensive systems
MITIGATING HUMANS RISKS AND ASSESTS PROTECTION
Whether underground or on the surface, priority number one in mining is workforce safety. Slips, trips, and falls in high-risk environments can lead to serious consequences. Physical loss or damage to assets causes costly downtime, posing tremendous concerns for mining companies. Furthermore, the industry requires digital technologies, automation, improved manufacturing processes, and production optimizations to promote operational efficiency and standardize the work process.
AUTONOMOUS FUNCTIONALITY WITH INTERCONNECTED CAPABILITIES
Bergen Security’s automatic monitoring system is meticulously structured into three primary branches: the underground comprehensive mining face video monitoring system, the surface video processing system, and the remote video access system.
Each branch functions autonomously but can be interconnected for enhanced functionality. The system employs internationally recognized interfaces and bus protocols, ensuring seamless compatibility with any third-party video systems adhering to global standards.