Automation: no-fault control
The Power of a Computer to Control your Data
In more classic video surveillance systems, security personnel are restricted to constant viewing from their control station. After several studies were carried out, it was proven that this constant watch is unnecessary, and that only a small percentage of data is of interest. Security personnel can now perform a whole other type of vigilance with the pre-selection of pertinent data—the ease of automated operations means less user errors and less tired, more efficient personnel.
RELEVANCE: TARGET PROGRAMMING
Like all systems, video surveillance was revamped to maximize its information output. Its new functions—movement tracking, network signal activation, silent or deterring alarms—simplify the continual analysis of data. It will now only send an alert in case of variations in relevant data.
DCI offers automated surveillance solutions for both analog and network systems, featuring intelligent algorithms, which vary by product. Classic or centralized structures most commonly use network video surveillance (“IP”). Efficient and economical video analysis tools, which are used with GeoVision or Milestone software, work with different additional units. You can now secure huge surveillance zones with the simultaneous analysis and management of feed coming from hundreds of video sources on a small number of screens, as well as the programming of specific actions in relation to predefined events.
Today’s analysis measures, which only record intelligently selected data, are directly installed on the IP cameras. With these analysis features directly built-into the cameras, the treatment of video data is done in an independent manner, eliminating the need for a central control station.
Similar Performance for Analog Systems
Intelligent analysis features integrated into IP video surveillance cameras are also found in our range of analog cameras. As such, the identification of acts of sabotage, movement detection and tracking with digital PTZ, predefined alarm signals, and even facial recognition can be programmed into more classic models. The potential of these systems is not limited to security. They contribute to the optimization of services with new features like the breaking down of objects or people who frequently visit a defined zone—a significant tool for human resource management in large stores for example.