Object monitoring technology

Issue 8 2021 Government and Parastatal (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Products

Forgotten backpacks, misplaced boxes, missing shopping bags. We’ve all experienced at least one of these unfortunate events. With a large crowd of people, intensified by the stress and exhaustion of travelling, forgotten things are not uncommon in many transport hubs. Dahua Technology has the right tool to address this common issue, Dahua WizMind Object Monitoring.

Powered by deep learning algorithms, Dahua products like the WizMind 5 Series can accurately detect six types of objects: luggage bag, backpack, box, shopping bag, bicycle and motorbike. It allows up to four area rules per scene and can detect up to 100 objects per second with up to 95% accuracy rate. In addition, Object Monitoring also supports customisation based on the customer’s requirements (e.g. wallet, mobile phone, safety hat, etc.).

Abandoned/missing objects

Object Monitoring also allows alarm linkage to send alerts to the staff and security personnel. Say a traveller during rush hour accidentally forgot one of his luggage bags at the waiting area of a railway station. The WizMind 5 Series camera monitoring the scene can detect it in time and send an alert to the staff. After retrieving the item, the staff will then make an audio announcement to inform the traveller to claim it.

Likewise, if an object in the rule area has been removed, an alarm will be triggered and notifications will be sent to the control centre, allowing the security personnel to act in time accordingly to prevent any possible theft. Additionally, if an object has been detected in the rule area and exceeded the preset time threshold, an alarm will be sent to the control centre.

Fire exits, for example, should be accessible at all times. Using Object Monitoring, users can draw the detection area on the monitored scene of a fire exit. When objects like bicycles or boxes are detected in the area for a long period of time, an alarm will be triggered to alert the security personnel to remove it and clear the scene. This intelligent feature can significantly help prevent accidents and ensure a clear evacuation path in case of fire emergency.

Filter out false alarms

False alarms caused by irrelevant objects like leaves, pets and bright lights can adversely affect any monitoring operation. When using Object Monitoring, these objects are effectively filtered out, thus reducing the number of false alarms and allowing users to focus on real targets in the monitored scene.

Detection of particular objects in the monitored scene not only can help people retrieve their lost or forgotten belongings, but can also help ensure safety in the area. Readily available tools like the Dahua WizMind products equipped with Object Monitoring technology can effectively solve the common problems related to abandoned or missing items in various application scenarios such as railway stations and fire exits.

To see Object Monitoring in action, go to www.securitysa.com/*dahua2


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

XVR-I3 series to broaden AI applications
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring
Dahua recently unveiled an addition to its AI-enabled XVR series by releasing the XVR-I3 models, supporting an array of AI features including full-channel SMD Plus and AI Coding, Perimeter Protection and more.

Self-learning AI for existing CCTV systems
Iris AI Editor's Choice CCTV, Surveillance & Remote Monitoring News
Snap Guard is a cloud application that integrates into a property owner’s live CCTV feed, working with existing hardware and software, adding an additional layer of security.

Mark Kane and Wayne Schneeberger join Stallion Security
Stallion Security Editor's Choice CCTV, Surveillance & Remote Monitoring Integrated Solutions
Stallion Security has announced that Mark Kane and Wayne Schneeberger have joined its ranks at the same time as the company confirms its acquisition of Myertal Tactical Security’s offsite monitoring business.

The Complete Manual on CCTV Management
Technews Publishing Editor's Choice CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
Sonja de Klerk, retired Brigadier from the SAPS Forensic Science Laboratory has written a book on managing your CCTV systems to optimise the value of it as evidence.

Revitalise schools with AI
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring
AI is empowering a new generation of advanced, efficient security systems and in the field of education, it is also facilitating the digital and intelligent upgrading of schools and institutions.

Touchless school access control
neaMetrics Suprema Editor's Choice Access Control & Identity Management Integrated Solutions Education (Industry) Products
Wolverhampton Grammar School deployed a Suprema access control solution, integrated with Paxton to resolve its legacy access control challenges.

Why companies do CCTV control room surveillance training
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring Training & Education
When it comes to getting resources for untapping the potential of people to realise their competencies and unlock the capacities of the systems they use, security personnel are often poor neighbours to other organisational departments.

Qognify launches Qognify VMS
CCTV, Surveillance & Remote Monitoring Products
Qognify VMS combines enterprise-class video management with advanced cloud capabilities as well as flexible deployment options to meet the specific physical security needs of organisations around the globe.

Wearable devices set to boost mineworker safety
News Integrated Solutions
The Connected Worker solution centres on a connected, track-and-trace wearable device for mineworkers, with a linked data-insights dashboard that gives real-time feedback to health and safety officers.

The battle of AI and ML in the cybersecurity world
Cyber Security Products
The security industry is using ML/AI in various applications such as tackling huge volumes of malware, detecting spam and business email compromises, analysing network traffic, using facial recognition and more.