1. Dynamic face capture device
Dynamic face occlusion detection uses intelligent video analysis technology, namely the face occlusion detection algorithm, to analyze and detect people's faces and automatically determine their facial features. It can also automatically identify and alarm suspicious behaviors such as wearing sunglasses, lowering the brim of a hat, wearing a mask, or any other form of intentional obstruction of facial features.
It can intelligently separate and capture faces from the back-end centralized video source. By introducing the video source at the back-end of the centralized video surveillance platform, face capture is achieved on the back-end intelligent video analysis platform. Its main performance is as follows:
Automatically detect and capture faces in video scenes. Based on the DSP platform, it supports 1-way or 2-way video input, and can capture faces in video scenes and archive photos. It can provide standard SDK interface protocols, and can perform two-way communication through RJ45, RS232485 and other interfaces, making it easy to integrate with other devices.
Features:
Embedded processing, automatically detecting faces in video scenes, capturing partial photos of faces, and transmitting them to the backend;
· It can directly connect to ordinary analog cameras or digital video streams, and can automatically capture all faces entering and leaving the monitored area 24 hours a day;
The product can be upgraded directly through the network port/U5B interface, which is convenient and fast to maintain; it provides various hardware interfaces such as RS232/RS485, Gang45, U58, SD, etc.
Supports facial photo comparison with the backend and can be used with the software;
Intelligent analysis results: saved to the server through middleware or provided to third parties for use;
Intelligent video recording: The video file can display the results of intelligent analysis through the FIRS player (face size requirement - not less than 100×80 pixels).
Applications:
At the entrances and exits of various places where people gather, such as subways, railway stations, long-distance bus stations, docks, airports, government departments, and halls, automatic face detection and photo capture and archiving are performed on people passing through for later face retrieval and blacklist/whitelist comparison.
It should be said that the functions and main parameters of the current intelligent video analysis module applied to face capture devices are similar. The above explanation is only based on a certain type of face capture device as an example. Original address: http://security.zol.com.cn/318/3182130.html
2. Intrusion detection warning device
A device that applies video behavior analysis technology, which can perform large-scale pre-alarm detection, has a high detection rate and a low false alarm rate. The so-called video behavior analysis technology is to detect, classify and track the trajectory of relevant moving targets (people or objects) in the video scene, and according to the established analysis (trigger) rules, the system automatically analyzes and judges the behavior information of the moving targets, and outputs the information to the relevant system platform. The terminal is based on the DSP platform and can have 1 or 2 video inputs. Through intelligent video analysis, it can realize early warning of perimeter intrusion behaviors in the video scene, provide local IO output, and realize local and remote alarm. The terminal provides a standard SDK interface protocol, which can perform two-way communication through RJ45, RS232/485 and other interfaces, and is used for integrated applications with other devices.
Features:
Embedded processing terminal, automatically detects suspicious perimeter intrusion in the video scene, automatically issues local and remote alarms, and preserves evidence; can be directly connected to analog cameras or IPCAMs, automatically performs 24-hour uninterrupted detection. The product can also be upgraded directly through the network port/USB interface; can provide various hardware interfaces such as RS232/485, RJ45, USB, SD, etc.
Supports intelligent intrusion detection such as crossing the line, entering or leaving the restricted area, going in the opposite direction, wandering, etc.; the results of intelligent analysis can be seen in real time, and the detection targets can be marked and tracked.
Applications:
It is installed in various places where perimeter intrusion needs to be prevented, such as residential areas, villas, factories, mines, warehouses, cargo yards, campuses, enterprises, and military bases. It can provide 24-hour uninterrupted detection and early warning for various perimeter intrusion behaviors, such as crossing the line, restricted areas, and reverse driving.
3. Crowd concentration detector
Crowd density detection is also one of the intelligent video analysis technologies. It collects video information through cameras and uses intelligent video analysis technology to analyze the living moving targets in the picture, and then calculates the number and density of targets in the set area. When the number value exceeds the preset threshold, an alarm message is automatically generated to prompt the monitoring personnel to take targeted measures. It can be applied to scenes such as illegal crowd gatherings and airport verification halls.
Features:
Embedded processing, automatically detect suspicious crowd gathering behavior in video scenes, automatically issue local and remote alarms, and preserve evidence; can directly connect to ordinary analog cameras or digital video streams, and automatically perform 24-hour non-stop detection and warning. The product can also be upgraded directly through the network port/USB interface; it can also provide various rich hardware interfaces such as RS232/485, RJ45, USB, SD, etc. The system is based on the DSP platform, automatically analyzes the crowd gathering behavior in the video scene, and issues graded warnings, provides local IO output, and can realize local and remote alarms. It can provide standard SDK interface protocols, and can be integrated with other devices through interfaces such as RJ45, RS232/485, etc.
Applications:
It is suitable for municipal squares, airport and wharf passages, gates of enterprises and institutions, and the perimeter of military restricted areas, etc., to conduct 24-hour uninterrupted detection and early warning of suspicious crowd gatherings. Original address: http://security.zol.com.cn/318/3182138.html
Previous article:Contactless CPU smart card technology
Next article:Review of innovative technologies and applications of foreign smart cards in 2013
- Popular Resources
- Popular amplifiers
- These exhibits at the Zhuhai Air Show are eye-catching
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Intel promotes AI with multi-dimensional efforts in technology, application, and ecology
- ChinaJoy Qualcomm Snapdragon Theme Pavilion takes you to experience the new changes in digital entertainment in the 5G era
- Infineon's latest generation IGBT technology platform enables precise control of speed and position
- Two test methods for LED lighting life
- Don't Let Lightning Induced Surges Scare You
- Application of brushless motor controller ML4425/4426
- Easy identification of LED power supply quality
- World's first integrated photovoltaic solar system completed in Israel
- Sliding window mean filter for avr microcontroller AD conversion
- What does call mean in the detailed explanation of ABB robot programming instructions?
- USB Type-C® and USB Power Delivery: Designed for extended power range and battery-powered systems
- RAQ #223: How to measure and determine soft-start timing without a soft-start equation?
- RAQ #223: How to measure and determine soft-start timing without a soft-start equation?
- GigaDevice's full range of automotive-grade SPI NOR Flash GD25/55 wins ISO 26262 ASIL D functional safety certification
- GigaDevice's full range of automotive-grade SPI NOR Flash GD25/55 wins ISO 26262 ASIL D functional safety certification
- New IsoVu™ Isolated Current Probes: Bringing a New Dimension to Current Measurements
- New IsoVu™ Isolated Current Probes: Bringing a New Dimension to Current Measurements
- Infineon Technologies Launches ModusToolbox™ Motor Kit to Simplify Motor Control Development
- Infineon Technologies Launches ModusToolbox™ Motor Kit to Simplify Motor Control Development
- STMicroelectronics IO-Link Actuator Board Brings Turnkey Reference Design to Industrial Monitoring and Equipment Manufacturers
- Overcome last-minute requirement changes with small, leaded SOT-23 thin multiplexers
- Where can I find older ICs?
- 【NXP IoT Module Review】Light up a cloud lamp
- VICOR DCM2322 isolated regulated DC-DC converter is now available for free!
- Encryption chip (anti-copying chip)
- Zigbee learning notes---protocol stack NV operation
- Required selection: 1.5V lithium rechargeable button battery Rated voltage (V) 1.5V
- GD32E231 analog IIC driver LSM6DSO
- Single Voltage Reference vs. Dual Voltage Reference - I
- Basic C language programming specifications for microcontroller development