Eagle Eye Application Note - AN003
Real-time Video Monitoring and Insight Using Eagle Eye VMS Analytics
Click the banner to view the full Application Note.
See the App Note for information regarding the analytic options we provide. This information is intended for administrator users of the VMS. Anyone who might set up or configure Analytics will benefit from this knowledge. No prior background knowledge is needed.
The Eagle Eye VMS analytics can be used for both real-time monitoring and to mine insights from historic video. Real-time monitoring detects objects, people and movements as they occur in the environment. Eagle Eye Networks offers five different analytics; People Counting, Line Crossing, Intrusion Detection, Loitering, and Camera Tampering.
Analytics are available for any camera connected to a Bridge/CMVR (except analog cameras on hybrid Bridges/CMVR). All five analytics can be activated at the same time (costs associated with each). It’s important to note that the stream used for analytics is MJPEG (secondary stream) and 12fps is recommended for best results.
Analytics are available to all Editions of the VMS (Standard, Professional, Enterprise).
Each analytic serves its own purpose and is described below:
- Counting: Used to count objects crossing a line in either direction. For the highest accuracy counting people, use a dedicated camera mounted with a top-down view in which people remain the same size as they travel through the image. For the object to be counted, at least 50% of it must cross the line and you can only configure one line per camera.
- Line Crossing: When an object crosses a specified line in the selected direction, an alert can be generated. Just like with ‘Counting’, 50% of the object must cross the line and only one line can be configured per camera.
- Intrusion Detection: if an object enters a forbidden area, an alert can be generated. There’s no limitation to how many areas can be defined in the camera view.
- Loitering: If an object remains in a defined region longer than a specified time (between 1 second and 2 minutes), an alert can be generated. Just like with ‘Intrusion Detection’, there are no limits on the number of areas that can be defined per camera.
5. Tampering: Tampering detection is used to generate an alert when someone is trying to block the camera's view or the image is greatly altered.
Eagle Eye Knowledge Base
US: +1-512-473-0500
EU: 31 (0) 20 26 10 461
ASIA PACIFIC: +81-(3)-6869-5477
#1 In Cloud Media Video Surveillance Worldwide
Copyright Eagle Eye Networks. All rights reserved