VCA o Video Content Analysis is the sum of video analysis features embedded in Tiandy products. Those feature are very useful to detect specific actions, and not only a movement in a determinate area, that makes this products one step ahead from commons cameras.
La Video Analisi allows to detect a specific type of movements and assign those movements to preset actions reducing false alarms and detecting more complex events.
This Video Recorder support up to 8 cameras con video analisi:
Useful to detect the crossing of a “virtual” line. Some practical examples of Tripwire is, for example, in subway station platform, near gates or restricted areas. Tripwire allows to set a series of parameters as size, direction and further more to avoid false alarm.
- Double Tripwire
The double tripwire manage the crossing of 2 “virtual” lines, a very useful feature for all those case, for example, where to surveil a path with double entry is required. Also in this case a lot of parameters can be managed as time, size etc..
The Perimeter is another typology of complex analysis managed from Tiandy, the principals are similar to the tripwire features but the perimeter is an area where, after a trans passing event, will be send an alert. Very useful to monitor restricted areas, private areas and gates.
- Abandoned Objects
The management of an abandoned object today has become very important, especially in public areas, where is necessary to have an immediate alert of variation in framed area. When a certain area is framed and defined you will be able to be alerted when a sudden change appears with the presence of new objects. A lot of parameters can be managed, complexity, dimension and furthermore, also in areas with high complexity and small size as store, warehouse etc.
At the opposite of the abandoned objects, detect the changing scene with the subtraction of an object and it will send an alarm useful to detect the subjects which have make change the scene, the objects may change place inside the area, but if it leaves the area an alarm will start. Very useful when an object needs to be exposed an object.
Particularly useful in crowded public place (supermarket, parking, restaurants) where to run is not a common action, this feature will detect someone which is running fast and is trying to quickly get away from the place. The detection of Running allows to identify the subjects which is performing the action, and if PTZ cameras are installed also to zoom on the subject.
Loitering feature has been strongly required in the last years due to the always higher risk of vandalism. The loitering feature detect people wandering with no specific path in a determinate area for a longer time of the preset time, a lot of parameters can be set to avoid false alarm.
The parking analysis detect an object with preset dimension which is immobile from a certain time inside a selected area, useful for zones with reserved parking or to be notified when areas are being occupied. In case of PTZ camera or other systems a lot of events notification can be activated as counting or chasing and further more.
- Early Warning
One of the most required feature is crowd assemble, both for statistical and security purpose, the Crowd mode by Tiandy allows to analyze the event of the crowd assemble (density and more and can start many kind of alarms. The same system is used also for Marketing purpose in places where is useful to monitor the general flow, this way it will be easier to take not of the hours where a place is more frequented for example.
- Face Recognition
- Conteggio Persone
- Audio Anomaly Detection
The audio has a feature for detection which pay attention to noises, in this case the application of this kind of alarm is useful in areas which are usually quiet, for example inside stores. Audio is a feature which is not particularly considered, but it’s very useful to send alarms and further more.
- Video Anomaly Detection
Video Anomaly Detection is used to avoid TAMPERING, very useful in areas where cameras are not surveilled, send an alarm if action as the tampering, obfuscation, damage or focus change. This kind of events are extremely important to reveal.