New technology to boost security at hospitals

May 2006 Surveillance

Network video recorders, or NVRs, is a relatively new technology that will enhance hospital security personnel's ability to protect patients and staff, as well as minimise shrinkage and prevent theft.

NVRs record and replay simultaneously, and recordings on any one machine can be remotely viewed by a number of authorised operators spread across the network simultaneously, all totally independently and without affecting each other.

The beauty of this, explains Reditron managing director, John Loftus, is that the operator - using tools that already exist - can identify and replay events of interest from a recording.

"IndigoVision's 'Control Center' Video and Alarm Management software, for example, analyses movement in a scene and on command from an operator displays thumbnails on the screen that represent frames from recordings containing the specified movement. Clicking on one of the thumbnails then replays that section of video," he says.

"The system can search 24 hours of recorded video and display these thumbnails in just a few seconds. Changing the search variables allows the operator to sift through vast quantities of recorded material quickly and efficiently. Analytics software then searches for the events requested, allowing the operator to concentrate on more specialised and immediate tasks. These are not just features that benefit the user but they also help to reduce the overall demand on the network.

"This is just the tip of the iceberg - new developments that will enhance security at hospitals include software capable of motion detection (person or vehicle moving, say, from left to right across a scene), virtual tripwire (detection and alarm upon breach of a defined line), shape-based detection (vehicle), object tracking and theft detection (object removed from a busy scene).

"These analytics can be run in two modes: realtime within the IP transmitter/receiver at the camera, and post-processing on any operator's PC. The realtime mode allows the system to automatically identify events as they occur. Post processing allows operators to run many different scenarios on recorded video, for example looking for cars parked for more than two minutes. These two modes offer the best of both worlds, using analytics to identify events as they occur, and also providing advanced search tools for operators to analyse previous situations.

"It can be expected that huge productivity improvements will result from using analytics software during the searching of recorded material in post-event analysis, and for which the NVR is the key," Loftus concludes.

For more information contact John Loftus, Reditron, 011 887 1546.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
ONVIF releases first add-on for secure communications
Surveillance Training & Education
ONVIF has released the final version of the TLS Configuration add-on to increase the security of communications between devices and software clients within a physical security system.

Read more...