classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Selecting the right method for ­application
November 2016, CCTV, Surveillance & Remote Monitoring, Integrated Solutions

The remarkable rise of the video analytics market and its impact on surveillance technology is evident the world over, and some researchers are suggesting that the IP video solutions industry is now one of the fastest growing areas of security.

Gus Brecher, managing director of Cathexis Africa and business development director of Cathexis Technologies, believes that the growing availability of more sophisticated offerings has been made possible by significant advances in IT technology (servers) and IP camera technology.

Brecher says that video analytics has become a hot topic of discussion with several user benefits being associated with this technology, including increased quality of surveillance and accuracy. However, at its core, video analytics enables a dramatic reduction in storage requirements and facilitates a significant improvement in control room effectiveness by creating an intelligent monitoring environment.

“There are currently two main methodologies for applying video analytics to a particular site,” says Brecher. “The first is on the camera, and the second is on the server. CathexisVision software has the capability to cater to all scenarios, and while Cathexis has its own suite of video analytics, we also believe in a horses-for-courses approach here, because both the on-camera and on-server approaches offer their own unique sets of pros and cons.”

Video analytics ‘on the edge’

With IP camera hardware becoming more powerful, manufacturers are easily able to facilitate the operation of third-party algorithms on the cameras themselves. These algorithms may be supplied by the actual manufacturers or third-party video analytics companies.

The advantages of this scenario include:

• Reduced processing requirements on the recording servers.

• Reduced need for additional hardware for video analytics processing.

• Ability to trigger an event and record ‘on the edge’ without the need for a recording server.

• There are also some claims that you can reduce bandwidth by limiting the streaming of video to periods dictated by the video analytics, but at the end of the day, one needs to cater for the full bandwidth requirement anyway, so this is a debatable claim.

The disadvantages of this scenario include:

• Video analytics on cameras limit the cameras that you may use for your application, as many of the cameras available do not have the ability to cater for third-party analytics engines.

• If you are using camera specific analytics, then you are limited to that specific camera brand.

• The video analytics may often have a negative impact on camera performance in other areas. (For example, bitrate, frame rate, number of video streams, video resolution.)

• Adding video analytics later down the line may require a camera swap-out.

Video analytics on a server

Video analytics that runs on a server may be provided by video management software manufacturers, in which case the video analytics algorithms may run on a recording server, or they may be provided by third-party analytics providers, in which case a dedicated server is normally required.

Advantages of this scenario include:

• The process can be performed on video from any camera.

• There is no degradation on the performance of the cameras.

• It is easy to add video analytics in the future as it normally just requires an additional video analytics licence.

Disadvantages of this scenario:

• This method uses processing power on recording servers, and therefore may require additional hardware.

• Video analytics may require cameras to provide a second low resolution/bitrate stream for the video analytics processing.

Brecher says that the CathexisVision software enables the customer to choose what is right for their unique application. “If a client wants to use on-camera analytics, then the CathexisVision software has been integrated with several cameras that can provide triggers associated with video analytics events. We have also integrated with server-based video analytics companies to achieve the same result,” he says.

The Cathexis Video Analytics suite can run on the recording servers themselves and include the following: smart video motion detection, line crossing, advanced line crossing (double line and articulated line), time-in area, stop-in area, enter-exit area, directional analysis, speed detection, loitering, queue length analysis, no-motion detection.

Acting upon information received from any event, from either a third-party system or from the Cathexis Video Analytics, the CathexisVision event-driven software enables the system to:

• Record selected video (including pre-events) to a selected database.

• Switch a selected camera to a selected monitor.

• Play an audio clip (on server or on the camera audio output).

• Send an e-mail or SMS to selected recipients (with or without video clips).

• Send an alarm to a command centre.

• Switch an I/O device.

• Indicate an ‘alert’ on a map.


Credit(s)
Supplied By: Cathexis Technologies
Tel: +27 31 240 0800
Fax: +27 31 208 5288
Email: sales@cat.co.za
www: www.cathexisvideo.com
  Share via Twitter   Share via LinkedIn      

Further reading:

  • People on the move
    November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
  • Access and identity: looking ahead
    November 2017, neaMetrics, ZKTeco, Powell Tronics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.
  • A question of trust and ­accountability
    November 2017, Technews Publishing, Access Control & Identity Management, Integrated Solutions
    Access and identity management is about trust, how you assign it, how much you allow and how you manage it.
  • Trusting your privilege
    November 2017, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.
  • Integrating surveillance and access
    November 2017, Cathexis Technologies, Gallagher, Milestone Systems, Paxton Access, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Integrating access control and surveillance is a good idea, but those who take on this task have their work cut out for them.
  • The access edge
    November 2017, Johnson Controls, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
    With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.
  • Home run for integrated security
    November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
    Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
  • Access on the edge
    November 2017, Suprema, Access Control & Identity Management, Integrated Solutions
    CoreStation handles half a million users with a fingerprint matching speed of up to 400 000 match/second and simultaneous matching speeds of up to 8 devices in 1 second.
  • Automated facial recognition
    November 2017, Access Control & Identity Management, Integrated Solutions
    NEC provides facial recognition system to South Wales Police in the UK, contributes to safe management of Champions League final.
  • Using biometrics to prevent financial crime
    November 2017, Access Control & Identity Management, Integrated Solutions
    Biometrics is about more than the fingerprint or retina terminal itself, it’s about storing data in forensically-signed databases, that is admissible in a court of law.
  • IP intercom for mining
    November 2017, CAME BPT South Africa, Access Control & Identity Management, Integrated Solutions
    Came BPT’s IP360 IP intercom system was installed for a new mining head office in Middelburg.
  • QR code access integration
    November 2017, Axis Communications SA, Access Control & Identity Management, Integrated Solutions
    Have you ever thought of sending QR codes to manage the visitors and suppliers permitted to access your facility?

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.