Intelligent Video Surveillance Setup Guide

Intelligent Video Surveillance Setup Guide, Intelligent Video Surveillance (IVS), also known as intelligent video monitoring or intelligent CCTV, represents a significant advancement over traditional surveillance systems.1 It leverages cutting-edge technologies like Artificial Intelligence (AI), machine learning, deep learning, and computer vision to automatically analyze video footage in real-time or from recordings.2

Here’s a breakdown of what makes IVS “intelligent” and how it works:

Key Differences from Traditional Surveillance:

• Proactive vs. Reactive: Traditional systems primarily record footage for later review, acting as a reactive tool for forensics. IVS, however, actively analyzes video in real-time, enabling proactive threat detection and immediate responses.3

• Automation vs. Manual Monitoring: Traditional surveillance heavily relies on human operators to constantly monitor feeds, which can be prone to human error and fatigue.4 IVS automates many of these tasks, reducing the need for constant human supervision.5

• Analysis vs. Recording: IVS goes beyond mere recording.6 It interprets and understands the visual data, identifying patterns, behaviors, and anomalies that might indicate security threats or other events of interest.7

How Intelligent Video Surveillance Works:

1.Data Collection: High-definition cameras, often equipped with advanced features like night vision and wide dynamic range, are strategically placed to capture clear and detailed footage.8 These cameras may also integrate with other sensors (e.g., motion, thermal, audio) for richer data.9

2.Powerful Analytics Engine: At the core of IVS is a powerful analytics engine that uses AI and machine learning algorithms.10 This engine processes the vast amounts of video data collected by cameras and sensors.11

3.Real-time Analysis: The algorithms analyze video feeds in real-time to:12

◦ Detect and Classify Objects: Identify and categorize objects like people, vehicles, animals, or specific items.13

◦ Motion Detection: Differentiate between significant movements (e.g., a human intruder) and irrelevant ones (e.g., swaying trees, animals), reducing false alarms.14

◦ Behavior Analysis: Recognize unusual or suspicious behaviors, such as loitering, running, unauthorized access, or the presence of abandoned/missing objects.15

◦ Facial Recognition: Identify individuals by their facial features, often by comparing them against a database.16

◦ License Plate Recognition: Read and record vehicle license plates.17

◦ People Counting: Count the number of people in a specific area.18

◦ Crowd Management: Monitor crowd density and dynamics to spot potential dangers or congestion.19

4.Anomaly Detection: IVS systems “learn” what constitutes normal behavior and patterns. When an anomaly or something breaks the established pattern, it triggers an alert.20

5.Alerts and Actions: Upon detecting a predefined event or anomaly, the system can automatically:

◦ Send alerts and notifications to security personnel (via email, SMS, etc.).21

◦ Trigger alarms.22

◦ Initiate recording.

◦ Activate other security systems (e.g., access control, lighting).23

◦ Provide real-time situational awareness for a swift response.24

6.Data Management and Insights: IVS systems can store and manage large volumes of video data, extracting valuable metadata for enhanced search capabilities, streamlined video management, and generating insights for better decision-making (e.g., optimizing store layouts in retail, traffic management).25

Key Features and Applications:

• Enhanced Security: Proactive threat detection, intrusion detection, auto-tracking of suspects, and reduced false alarms.26

• Public Safety: Monitoring public spaces, crowd control, traffic management, and incident detection.27

• Retail: Customer behavior analysis, optimizing store layouts, inventory management, and shoplifting detection.28

• Industrial and Critical Infrastructure: Perimeter security, predictive maintenance by monitoring equipment, and compliance monitoring.

• Smart Homes/Businesses: Remote monitoring, alerts for unusual activity, and integration with other smart devices.29

By transforming raw video data into actionable insights, Intelligent Video Surveillance significantly enhances security, safety, and operational efficiency across various sectors.30

.

.

How to Set Intelligent Video Surveillance Function (WEB 5.0)

1.Product Model and Firmware Version

Any model and firmware with IVS supported. (This tutorial is based on WEB 5.0 firmware)

Interface may vary on some models and firmware.

1.Operation Description

2.Login Device.

3.Enable IVS in AI – Smart Plan.

8USg7I7QSLpX

1.Click Add Rule button to add a new rule and select the IVS rule type.

9ccG5Lib lMh6p0OQ1jGdHYEfGqKi5YJMw

1.Click Draw Rule Icon to set the rule region / line.

Click rule name can modify it. Click the   icon can delete this rule.

Use left click on the image to draw the rule, right click to end the drawing.

Regional rules will auto close into a region when finished drawing.

1.Set parameters of current rule.

Rule Params: You can set the rule effect period, detection direction, sensitivity  and enable special target filter. Different rule type may have different rule params.

Effective Period: You can select Effective object, Human or Motor Vehicle. For example, when you select Human as the alarm target, an alarm will be triggered when the system detects that persons trigger the rule.

Event Linkage: You can select what operation will be done when event triggered.

8c7PKhoBgMByPZuZXw1M pQp2DcCUk3WDg

1.Click Save to apply the rule. Or use Default to clear IVS settings.

jPM zOu4uYYmowSzG 6S b7RIQCIHROwoA

.

How to set Intelligent Video Surveillance (Web 3.0)

1.Product Model and Firmware Version

Any model and firmware with Intelligent Video Surveillance supported. (This tutorial is based on WEB 3.0 firmware)

Interface may vary on some models and firmware.

1.Operation Description

2.Login Device.

3.Select Setting > Event > Smart Plan > IVS > Save.

.

1.Select Setting > Event > Smart Plan > IVS > Save.

Pk9bt1uF4cS4tw8FZUN9dOk4EmAVcMGBCQ

.

1.Click   to add a new rule.

HfC0WLYtlyYPYPRWaIZiVteqG0kZnHJMkA

Double-click the Name to modify rule name, and select the Rule Type you want, also you can click   to delete it.

1.Click Draw Rule to draw a detection line or area in the image, Right-click to finish drawing. And set the Direction of rule detection.

Function 1: Tripwire

GptRbF3biuJJB2E bGatGLDE0BHuEqzYyQ

And you can click Clear to delete all drawn lines.

Function 2: Tripwire

 MvcZfYkVTMi46prIklXLGAYbBlCzKwtcKQ

.

And you can click Clear to delete all drawn lines.

1.Enable the Target Filter.

BQ2bWVrflAHd8rGgY RLyRCsFvY7LrXqBQ

You can select Effective object, Human or Motor Vehicle. For example, when you select Human as the alarm target, an alarm will be triggered when the system detects that persons trigger the rule.

Click Draw Target to draw the minimum gathering area in the scene. The alarm will be triggered when the number of people in the detection area exceeds the minimum area. When the rule of crowd gathering is configured, you do not need to set target filter, but draw the minimum gathering area.

Click Clear to delete all drawn detection lines.

.

Click Draw Target at the right side of Pixel Counter, and then press and hold the left mouse button to draw a rectangle, the Pixel Counter then displays its pixel.

1.Enable the event linkage.

uWAff2D08z SYuTjD1tm53uwfDefBobBA

1.Click Save. Or use Default to restore all settings.

Dct68g6sQtWdaUfWLkHxdZa504jZx1q lQ

Construction Instruction Maanual_DH Network Camera_Installation Manual(AI Fisheye)

.

Scenario Requirements

Specific requirements:

12.Scenario requirements: This device is suitable for various indoor and outdoor scenarios with demands on waterproof, IR and high resolution, such as hall, warehouse, canteen, exhibition hall, supermarket, subway platform, square, school gate, and high-altitude panorama.

13.Recommended scenarios: The economical fisheye network camera is mainly used in retail scenarios such as small shops and small supermarkets, and the number of people in the arming region shall be less than 35.

Installation Requirements

For ceiling mount mode, see the following installation requirements:

1. There is sufficient light in the scenario to ensure illumination effect.

2. Avoid a complex scenario with frequently changing light, backlight, and direct light exposure.

3.mountMake the camera face the monitoring center region, so that the intelligent detection will be more accurate. See Figure 2-1.

4. The recommended installation height (H) is 3–4 m. Exceeding this range will affect the accuracy

uHRkppMosw dwEvmGVPgYJnTcYwlTfQnmw

Installation

• Ceiling Mount

The surveillance image of fisheye products is an original circle and is wider. You need to use multiple devices to monitor a scenario, but one fisheye camera can do this. Use this advantage during installation. In view of the advantages, the ceiling mount is preferred for indoor installation. See Figure 2-2, the small shop is equipped with a ceiling mounted fisheye camera

.

QfEb2osq0AiQVlrLjQ V v n0QwFMCgXUQ

Generally, the indoor floor is 3-4 m away from the ceiling and this height is proper for the economical fisheye cameras. Install the cameras in the middle of the monitored places, thus making the monitored places in the middle of the fisheye cameras, and obtaining most effective images. The project indoor products can be installed higher (6-8 m).

• Wall Mount

Wall mount is needed based on different customer requirements or scenarios. The height selection is vital to wall mount. The mount height might vary according to main surveillance scenarios. If too high, the ceiling is included in the image. See Figure 3-3, the indoor fisheye camera is mounted too high, leading to less effective images.

e IKlWeQ3QmQZyBlbjg1v40OHK QwleSHw

Therefore, for indoor wall mount, the camera should not be installed too high. Generally, 2-3 m is preferred.

.

Indoor Environment

It is necessary to select proper indoor fisheye products and well install them. The indoor products are not subject to waterproof or explosion proof requirements. Therefore, refer to this for model selection.

• IR Notes

IR devices are less dependent on the environment, so they can perform surveillance efficiently in the dark. In addition, install IR devices against interference from other objects. The fisheye lens enjoys a wide field, so IR reflection will largely affect the image effect. See Figure 2-4, IR reflection occurs when a hand touches the front cover surface during the image shooting test, resulting in abnormal images.

wtvafhgK3a6ytGXSHM8KSjjK5dVLdNgH9A

Outdoor Environment

In the outdoor environment, ceiling and wall mount are preferred, not ground mount.

The ceiling mount is generally 6-8 m. For example, the camera installed at the height of 8 m has a wider view than that installed at the height of 6 m. For road panoramic surveillance, see Figure 2-5.

.

Unlike indoor, the outdoor wall mount depends more on the mount bracket than the height. The figure below shows the outdoor wall mount scenarios – monitored gateway and roads.

Arming Data

For fisheye products, the closer to the edge, the greater the distortion of the image, thus the intelligent detection rate of the region close to the image edges reduces. To ensure the effect of intelligent detection, pay attention to the following points when enabling the function:

1. There is sufficient light in the detection image without obstacles.

2. The detected person must be fully exposed (such as the shoulder width).

3. It is recommended that the detection region is within 80% of the image center.

4. The lens surface is free of obstruction, dirt, and other factors that affect the image.

.

Table2-1 Reference data for EW5541/EB5541 fisheye arming

Product Model Focal Length (mm) Recommended Installation Height Range (m) Person Height (m) Installation Height (m) Surveillance Radius (m)
DH-IPC-EW5541 Series DH-IPC-EB5541 Series 1.4 3<H<4 1.7 2.5 4.3
1.7 3 4.2
1.7 3.5 4
1.7 4 3.7
1.7 4.5 3.4

.

Table2-12Reference data for EBW81242 arming

Note: Surveillance radius is the effective detection width corresponding to the central axle of the camera. Do not mistake it for the detection width of the farthest end or nearest end of the camera.

Table 2-2 Arming reference data for EBW81242, EBW81242-AS-S2, and EBW8842-AS

Installation Height (m) Intelligent Function Inspection Region Radius (m)
3 People counting 5
Queuing time 4
3.5 People counting 5
Queuing time 4
4 People counting 5
Queuing time 3.5

Table 2-3 Arming reference data for EBW81242-AS-IVC and EBW8842-AS-IVC

Installation Height (m) Intelligent Function Inspection Region Radius (m)
3 People counting 4.5
Queuing time 3.5
3.5 People counting 4.5
Queuing time 3.5
People counting 4
Queuing time 3

.

.

Related Posts

Leave a Comment