Analytics White paper
What is Video Analytics?
At a time when scientists had yet to fully understand how the human brain processes visual images in order to recognize physical shape, size, movement and action, research engineers and other visionaries were already at work trying to harness new technologies and the exponential growth of micro-processing power to create artificial video intelligence.
Early efforts focused on developing computationally intensive algorithms capable of processing the massive amounts of digitized data captured by video cameras. Concept systems proved that -- with virtually unlimited processing power, transmission bandwidth, and funding -- computers could be programmed "to see."
When CCTV Dominated
At this point CCTV technology had dominated the security industry for almost four decades, with an estimated 80-100 million surveillance cameras deployed in security systems around the globe. However, CCTV systems have two critical weaknesses: 1) studies prove that people cannot watch multiple TV monitors with any comprehension for more than 20 minutes per hour; and 2) all that videotape is only useful for forensic purposes. Bottom line, CCTV is useless in preventing security breaches. This fact was of little concern when the security mission for both public and private sector organizations was to protect facilities, equipment, and people against occasional theft and other criminal activity.
Then, the events of 9/11 brought an unprecedented sense of urgency to the need for better security systems.
Perilous Times Require Intelligent Video Surveillance Systems
R&D efforts in the U.S. and around the globe were immediately fast-tracked to develop commercial surveillance systems that integrated video intelligence with security cameras.
First-generation video analytics solutions analyzed surveillance video in real-time, identifying potential security threats as they developed, enabling private businesses and government organizations to respond immediately, preventing serious security breaches. Since video analytics is based on digital technology, video surveillance was migrated from the analog world of CCTV to the digital IP-based network environment.
Video Analytics Runs on Bandwidth
Even as technology was improving, the video analytics industry encountered an unanticipated problem: limited availability of network bandwidth. Traditional security systems had always used separate dedicated CCTV networks. IT professionals had not planned for the bandwidth requirements of this new surveillance technology, and thus had limited resources to allocate to it.
IRS system solutions are easily integrated with analog and IP cameras/CCTV systems and easily customized for specific industry infrastructures. As a result, they provide automatic event detection, scene analysis and detection alerts that enable both public and private organizations to meet the security and business intelligence challenges of the 21st century.
The Future of Video Analytics
Now, video analytics is moving beyond security into the world of business intelligence, producing unprecedented amounts of actionable data. Forward-looking users of video analytics security systems quickly discovered those systems can also deliver video intelligence related to business processes just as accurately and efficiently. In doing so, they have designed and developed systems that effectively double as today's business process monitors, with huge dividends for both the adopting operations and the people they serve.
Intrusion Detector provides automated perimeter monitoring and secure area protection. The product continuously monitors user-selected zones or areas for people or vehicle intrusion. Intrusion Detector filters out "noise" such as lighting variations and tree movements, and issues real-time alarms upon detecting true people or vehicle intrusions into a secure area.
Designed to be deployed either outdoors or indoors in a wide range of secure facilities, Intrusion Detector is effective for use in government, corporate, industrial, retail, and banking facilities. Intrusion Detector can also be deployed in infrastructure facilities such as power plants, airports, ports, and bridges.
For more information see "Analytics" in the download section.