CCTV cameras - Expert commentary

How intelligent video surveillance supports smart mobility
How intelligent video surveillance supports smart mobility

The ease of getting from point A to point B, the effective movement of goods and services, and the flexibility and integration of various modes of transportation are key aspects of mobility today. Smart Mobility has been a key theme in the transportation industry for a while. The idea is to keep traffic flowing and help people to get where they need to be, in a smarter way. To this end, industry players are now innovating and introducing advanced technologies and solutions. Examples include intelligent traffic management systems, free-flow tolls, autonomous driving, smart location solutions, and more. At the same time, traffic congestion, aging infrastructure, rapid urbanisation, and increasing sustainability demands are also intensifying the need for smart mobility solutions. One way to overcome these obstacles is to use intelligent video surveillance technology for improved traffic management, making the roads safer and more efficient for every user, while also reducing emissions. Perceptive intersections Relying on intelligent video analytics, traffic video cameras identify traffic build ups at intersections by counting numbers of vehicles crossing an intersection and detecting their speed, while also counting the number of vehicles queueing in real-time. Aggregated data informs the system when to switch traffic lights to red or green. Intelligent optimisation for traffic signals ensures more effective traffic flow.Aggregated data informs the system when to switch traffic lights to red or green The benefits? Improved safety on the roadways; intersection reconstruction can be avoided; drivers can be advised about the speed of their route, forecasted by traffic signals; reduced wait times and stress for commuters; reduction of harmful emissions; and positive impact on public satisfaction. Road safety Traffic incidents can be disastrous, not merely for causing congestion on the roads but sometimes far worse – resulting in injuries and even fatalities. These incidents have many causes, not the least of which is drivers willfully violating traffic laws. Video technology can aid in detecting all kinds of events – for example, illegal parking, running a red light, wrong-way driving, speeding, and making illegal U-turns can all be detected by smart camera technology. By using deep learning technology, cameras can recognise these events and traffic authorities can be immediately notified and take necessary actions even before traffic incidents occur. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally. Furthermore, ticketing systems can be incorporated to further regulate driving behaviors. Benefits here include incident prevention, better driver performance, and increased safety on the roads and streets, to name just a few. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally Public information Sharing information is key to keeping city drivers and travelers informed. Intelligent communication about warnings and updates helps everyone save time, avoid frustration, and simplify everyday mobility. This can be done via traffic guidance screens displayed at highly visible locationsThis can be done via traffic guidance screens displayed at highly visible locations, such as congested areas, transportation hubs, shopping malls, and city plazas – or even at your fingertips on your favorite mobile apps! Traffic video cameras generate real-time data of traffic flow and incidents, sending it to a central platform to further fuse with data from third-party systems such as radar and GPS systems. They also disseminate traffic information, including traffic status, warning and advisory notices, as well as parking status.  The benefits are improved public awareness of traffic information, improved travel convenience, overall enhancement of mobility in the city, and more. The Hikvision practice Hikvision has accumulated sophisticated experience in traffic management both at home and abroad. Product lines offer versatile solutions to resolve multitudes of problems in urban traffic management, traffic incident management, highway management, and more. Going deeper, it’s essential to note that efficient signal control management is dependent on the quality of traffic data, system algorithms, and the hardware devices in use; it is also closely related to the mobile environment, such as road conditions, historical traffic conditions, and urban infrastructure. Because of this, no single solution solves traffic congestion everywhere. Hikvision believes that only by working closely with city authorities, public safety organisations, consultants, even academia and other relevant stakeholders, can applications and operational processes be developed to achieve the best possible outcomes. The possibilities for traffic video data are endless, especially now that it can employ artificial intelligence for advanced functionality. Harnessing its power will make all the difference, but the ultimate goal remains the same: safe and smooth traffic, smart mobility, and improved quality of human life.

The intersection of education and fire and security
The intersection of education and fire and security

Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education.  Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.

The benefits of an integrated security system
The benefits of an integrated security system

Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.

Latest Avigilon Corporation news

Avigilon brings new facial recognition features to video management software with Avigilon Control Center (ACC) 7.6
Avigilon brings new facial recognition features to video management software with Avigilon Control Center (ACC) 7.6

Motorola Solutions, a global pioneer in responsible video analytics, announced the newest addition to its video security and analytics portfolio, Avigilon Control Center (ACC) 7.6. ACC™ 7.6 is the company’s most recent video management software release, enabling enterprise customers to better monitor their facilities through new AI-powered facial recognition features and analytics. The introduction of this technology is a part of Motorola Solutions’ ongoing commitment to creating state-of-the-art solutions that address enterprise safety needs while safeguarding individual privacy rights and enforcing the responsible use of analytics and data management. Facial recognition capabilities In keeping with this commitment, the new video management capabilities in ACC 7.6 include robust controls to govern the retention and accessibility of watch list data, the ability to create and manage multiple watch lists from within ACC and the option to upload reference images to a watch list. These features are built into the solution natively, meaning that the technology is developed and owned by Motorola Solutions as opposed to a third-party vendor. In addition, the new facial recognition capabilities do not make consequential decisions or initiate actions on their own. The data that are entered and saved in the watch lists are managed and maintained by the enterprise customers employing the technology. Vigilance across school campuses “When leveraged responsibly, facial recognition is an incredibly powerful tool that can assist in numerous ways, including helping enterprise organisations make better informed decisions that empower them to respond to events proactively,” said John Kedzierski, senior vice president, Video Security Solutions, Motorola Solutions. “For our enterprise customers, we believe potential facial recognition matches should always be assessed and verified by a trained specialist who can then determine whether further investigation or action is necessary.” ACC 7.6 features Unusual Activity Detection analytics that provide site-wide intelligence For example, with the heightened vigilance across school campuses, district officials are able to employ the technology to ensure that anyone deemed a threat to the students and staff on campus has their photo added to the system. When there is a face match made against the watch list, the school’s security operators receive a notification so that they can take proactive measures to assess the situation and ensure the safety of students and staff. Unusual Activity Detection analytics In addition to new watch list and facial recognition capabilities, ACC 7.6 features Unusual Activity Detection analytics that provide site-wide intelligence with the ability to recognise out-of-ordinary activity such as unusual speed of movement or location of people or vehicles. This edge-based intelligence distinguishes between typical and abnormal events by continuously learning what usual activity might be for a scene over time. For example, if there is an individual running through a crowded mall, a security guard could be alerted in Focus of Attention to locate where the individual is and take measures to understand the situation. ACC 7.6 is ONVIF Profile G compliant and will be available for preview at Motorola Solutions’ first-ever virtual showcase taking place March 18-20, 2020.

Motorola Solutions’ Avigilon integrates enterprise body-worn cameras and video management software
Motorola Solutions’ Avigilon integrates enterprise body-worn cameras and video management software

Motorola Solutions announced the latest addition to its video security and analytics portfolio, the integration of its VideoTag enterprise body-worn cameras and Avigilon Control Center (ACC) video management software. The integration enhances enterprise security efforts by making live body-worn video and audio easily accessible through the ACC™ AI-powered platform. Access control systems “The introduction of this integration is a part of our ongoing efforts to introduce intelligent end-to-end solutions that serve the specific security and business needs of our customers”, said John Kedzierski, senior vice president, Video Security Solutions. "By adding a mobile video capability to their access control systems, our customers are now able to better protect their employees and customers while improving on their business outcomes". The VideoTag series of body-worn cameras are lightweight, unobtrusive cameras and easily assigned to staff and attached to uniforms like ID badges. When integrated with ACC, the activation of a body-worn camera recording immediately triggers an event in the software, displaying the camera’s live video feed to the system operator alongside video feeds from fixed cameras, allowing security personnel to gain better situational awareness and respond accordingly. Increase staff protection Enterprises such as healthcare, hospitality and retail rely on body-worn cameras to increase staff protection, improve customer relations and help to prevent incidents. For example, caregivers helping patients who may behave erratically or violently are risking their own safety and security. By wearing the mobile camera, staff is able to capture events in real-time and alert security operators so that they are made aware of any incident that might compromise a staff member’s safety, and are able to respond proactively. This product will be available for preview at Motorola Solutions’ first-ever virtual showcase taking place March 18-20, 2020.

Eagle Eye Networks introduces fisheye camera cloud-client dewarping in Eagle Eye Cloud VMS
Eagle Eye Networks introduces fisheye camera cloud-client dewarping in Eagle Eye Cloud VMS

Eagle Eye Networks, an international provider of cloud video surveillance, announced the release of its cloud-client fisheye camera dewarping solution. Eagle Eye Cloud VMS customers can now securely access their fisheye cameras and dewarp the video in real-time from their desktop browser or mobile device. Eagle Eye Cloud VMS supports a broad array of fisheye cameras from multiple manufacturers, models include: Axis M3058 Hanwha 9010R Avigilon 12.0-H4F-DO1-IR Hikvision DS-2CD63C5G0-I(V)(S) Dahua NK8BR4 12MP Eagle Eye Networks CDUF-003a Standard fisheye cameras Eagle Eye Networks expects to quickly expand the support for additional fisheye cameras from additional manufacturers. Eagle Eye Cloud VMS currently supports over 3,500 IP, analogue and HD Over Coax cameras. “Fisheye cameras have numerous efficiencies and cost savings associated with them,” said Dean Drako, CEO of Eagle Eye Networks. “Eagle Eye’s fisheye dewarping solution transforms standard fisheye cameras into powerful intuitive tools while decreasing the cost and maintenance needed to cover a wide area.” Included with the new fisheye dewarping is a virtual PTZ function that provides benefits over traditional PTZ cameras. Traditional PTZ cameras can only capture the area they are aimed at when they are aimed at it. The virtual PTZ function in Eagle Eye Networks’ fisheye dewarping captures footage of an entire area regardless of any pan, tilt or zoom. Camera-based dewarping The user can, therefore, pan, tilt and zoom after the fact and see the image when viewing historic video. Previously, the Eagle Eye Cloud VMS supported fisheye cameras through camera-based dewarping. The new cloud-client dewarping no longer requires the camera to do the dewarping function. Dewarping is done in real-time or when viewing historic video. Customers can apply preset dewarps to their video in Single, Dual 180, Quad and 360 views. These views can be converted to layouts as if they were separate cameras. The Eagle Eye Cloud VMS cloud-client fisheye camera dewarping is available immediately and globally to all partners and customers.  There is no additional charge for these features.

Related white papers

How to overcome the storage challenges of adopting surveillance AI

Five things to consider for AI with video technology

Making your surveillance cyber secure