Hik - 海康威视安全监控技术

合集下载

海康威视博物馆安防系统方案

海康威视博物馆安防系统方案

海康威视博物馆安防系统方案
介绍
海康威视是中国领先的安防解决方案提供商,拥有多年的安防平台技术实践经验,具有丰富的海康威视安防系统、视频监控、智能分析、系统集成、网络布线等综合服务能力,并为客户提供安全、可靠、稳定的安防系统解决方案。

本文旨在介绍如何利用海康威视安防系统方案,在博物馆实施安全管理。

一、博物馆安防系统的设计
1.视频监控:针对博物馆实施视频监控,安装摄像机设备,搭建海康威视网络监控平台。

采用海康威视的智能视频监控系统,能够进行视频采集、联动报警输出以及为管理人员提供实时的可视化的报警提示,从而实现对博物馆过程中发生的异常情况的实时监测和及时的远程报警。

2.智能分析:海康威视的智能分析系统可以为管理人员提供实时的应用智能分析,包括人脸比对、行为分析、车牌识别等,可以对博物馆内的人群进行实时的监测,以减少可能发生的危险事件。

3.消防系统:采用海康威视的消防安全系统,安装火焰探测、气体探测、消防电缆等探测器,可实时监控博物馆的火灾、烟雾等危险情况。

海康威视 Hikvision 数字控制器操作指南说明书

海康威视 Hikvision 数字控制器操作指南说明书

INSTRUCTIONS FOR OPTIONS 9175 AND 9176Option 9176: AUTO/MAN Key 4-Stage Set Point CyclingThis option allows the operator to easily cycle through four set points by pressing the AUTO/MAN key while in the HOME display. They are displayed as 1SP1, 2SP1, 3SP1,and 4SP1. Only one of these set points may be active at a time. After selecting which set point is to be active, the operator will press INDEX to access the primary menu which will allow the user to edit the set point’s value. Each of these set points contain a target process value, and all of the values associated with the tunE menu items.Option 9175: Temporary User Adjustable Set PointThis option allows the operator to use a temporary set point, which they can make changes to without affecting the original stored set point, and then revert back to original set point after the test is completed. When the temporary set point is cancelled, the unit discards the temporary set point value and resumes normal operation.This temporary set point operates like the originally stored set point, SP1, normally does. The set point is displayed as tSP1. In order to access the temporary set point,press the UP or DOWN key while in the home display to bring up a menu where tSP1can be adjusted. Pressing the ENTER key will confirm the displayed value. Pressing the INDEX key will exit the menu. After tSP1is confirmed once, it will become active.tSP1can be cancelled by changing and confirming the value of SP1, #SP1, or SP2.When used in conjunction with option 9176, cycling to the next #SP1will also cancel tSP1. When used with option 948, selecting another #SP1via the secondary menu will also cancel tSP1. #SP1represents the 1SP1through 4SP1series of set points.This option replaces the normal manual override functionality of theAUTO/MAN key.FR# 949-9516 Rev. 1。

海康威视监控方案

海康威视监控方案

海康威视监控方案海康威视是一家全球领先的视频监控设备和解决方案供应商,提供各种监控产品和系统,包括传感器、摄像机、视频管理系统和智能分析软件。

它的监控方案广泛应用于各个行业和场所,如公共安全、交通、教育、金融、医疗和商业。

以下是海康威视监控方案的一些特点和应用案例。

首先,海康威视的监控方案具有高清晰度和高性能的特点。

其产品包括高清摄像机、红外摄像机和无线摄像机,能够提供清晰和真实的图像和视频。

这些摄像机具有各种功能和特性,如夜视功能、自动对焦、自动曝光和防抖功能,以满足不同环境和需求。

其次,海康威视的监控方案具有强大的数据存储和管理能力。

海康威视的视频管理系统(VMS)可以集中管理和存储大量的视频数据,并提供快速和灵活的和回放功能。

此外,海康威视还提供云存储和远程存储解决方案,可以在网络上存储和访问视频数据,方便用户随时随地查看和管理。

第三,海康威视的监控方案具有智能分析和识别能力。

海康威视的智能分析软件能够自动检测和识别视频中的目标对象,如人、车辆和物体。

它可以根据用户的需求进行人脸识别、车牌识别、行为分析和物品丢失等功能,提供更准确和高效的监控和安全保护。

海康威视的监控方案已经成功应用于许多行业和场所。

例如,在交通领域,海康威视的监控系统可以监测和管理道路交通流量,提供实时的交通状态和流量统计。

在金融领域,海康威视的监控方案可以帮助银行和金融机构监控和保护现金自动取款机(ATM)和交易大厅的安全。

在教育领域,海康威视的监控方案可以监控学校和大学的安全,防止和解决各种安全问题。

总而言之,海康威视的监控方案具有高清晰度、高性能、强大的数据存储和管理能力以及智能分析和识别能力的特点。

它已经在各个行业和场所得到广泛应用,并取得了显著的成效。

海康威视将继续致力于创新和发展,提供更先进和可靠的监控解决方案,以满足用户的需求和要求。

海康监控方案(海康)

海康监控方案(海康)
自动 ICR 彩转黑 16 倍
最多 8 块区域;支持多种颜色可选 自动 / 半自动 / 手动 4.3-129mm, 30 倍光学
大约 3 秒(光学, 广角-望远) 65.5-2.11 度(广角-望远) 10-1500mm(广角-望远) F1.6-F5.0
手动跟踪、全景跟踪、事件跟踪;支持多场景巡航跟踪 人脸侦测、区域入侵侦测、越界侦测、进入区域侦测、离开区域侦测、徘徊侦测、人员聚集侦测、快速移动侦测、停车侦测、物品遗留侦测、物品拿取
最多 20 路 最多 32 个用户,分 3 级:管理员、操作员和普通用户 授权的用户名和密码,以及 MAC 地址绑定;HTTPS 加密;IEEE 802.1x 网络访问控制、IP 地址过滤
7 路开关量输入(0-5vDC) 2 路,支持报警联动
预置点/巡航扫描/花样扫描/SD 卡录像/触发开关量输出/客户端电子地图/智能抓图/上传 FTP/邮件联动 音频输入(LINE 输入、MIC 输入),音频峰值:2-2.4V[p-p],输入阻抗:1KΩ±10% 线性电平,阻抗:600Ω 内置 RJ45 网口,支持 10M/100M 网络数据
无监视盲区 水 平 预置 点速 度最 高可 达 240°/s,垂 直预 置点 速度 最高 可达
200°/s 水平键控速度为 0.1° -160°/s,垂直键控速度为 0.1° -120°/s 支持 300 个预置位,并具有预置点视频冻结功能 支持 8 条巡航扫描,每条可添加 32 个预置点 支持 4 条花样扫描,每条路径记录时间大于 10 分钟 支持比例变倍、守望功能 支持报警功能,内置 7 路报警输入和 2 路报警输出,支持报警联
XX 监控解决方案
一、 系统架构
二、 系统功能
1. 已有的 9 个园区的模拟硬盘录像机、新建的每个园区的 10 个重点部位的摄像机、鹰眼等 前端设备都可以通过海康协议无缝接入新建的集控中心管理平台,通过管理平台可以远 程查看实时视频,调取前端录像,同时可以解码上墙到显示大屏。

海康威视-领先的安防产品解决方案提供商

海康威视-领先的安防产品解决方案提供商

海康威视-领先的安防产品解决方案提供商Smart功能:· Smart跟踪:支持手动跟踪、全景跟踪、区域入侵跟踪、越界跟踪四种跟踪方式并支持多场景巡航跟踪功能。

· Smart侦测:支持人脸侦测、区域入侵侦测、越界侦测、音频异常侦测、移动侦测、视频遮挡侦测功能· Smart录像:支持断网续传功能保证录像不丢失,配合Smart NVR实现事件录像的二次智能检索、分析和浓缩播放· Smart图像增强:支持透雾、强光抑制、电子防抖、Smart IR防红外过曝技术· Smart编码:支持低码率、ROI感兴趣区域增强编码、SVC自适应编码技术· Smart报警:支持网线断、IP地址冲突、存储器满、存储器错、非法访问异常检测并联动报警的功能红外功能:· 最低照度0Lux· 采用高效红外阵列,低功耗,照射距离达150m· 红外灯与倍率距离匹配算法,根据倍率及距离调节红外灯亮度和角度,使图像达到理想的状态· 内置热处理装置,降低球机内腔温度,防止球机内罩起雾· 恒流电路设计,红外灯寿命达3万小时系统功能:· 采用高性能传感器,图像清晰,最大分辨率可达1920x1080· 支持智能运动跟踪功能· 支持标准的API开发接口,支持海康SDK、ONVIF、CGI、PSIA、GB/T28181和E家协议接入· 支持PAL/NTSC制式切换,具有良好的地区适用性· 支持RS-485控制下对HIKVISION、Pelco-P/D协议的自动识别· 支持三维智能定位功能,配合DVR/客户端软件/IE可实现点击跟踪和放大· 支持3D数字降噪· 支持多语言菜单及操作提示功能,用户界面友好· 支持系统双备份功能,确保数据断电不丢失· 支持断电状态记忆功能,上电后自动回到断电前的云台和镜头状态· 防雷、防浪涌、防突波· 室外球达到IP66防护等级· 支持定时任务预置点/花样扫描/巡航扫描/自动扫描/垂直扫描/随机扫描/帧扫描/全景扫描/球机重启/球机校验/辅助输出等功能· 视频输出接口为SDI接口,实现无损耗数字信号传输机芯功能:· 30倍光学变倍,16倍数字变倍· 支持自动光圈、自动聚焦、自动白平衡、背光补偿· 支持超低照度,0.02Lux/F1.6(彩色),0.002Lux/F1.6(黑白) ,0 Lux with IR· 支持宽动态功能· 支持强光抑制功能· 支持多边形隐私遮蔽,多区域可设,多颜色、马赛克可选网络功能:· 采用高性能平台,性能可靠稳定· 支持以太网控制,同时支持模拟输出· 可通过IE浏览器和客户端软件观看图像并实现控制· 支持NAS存储录像,录像可断网续传,最高可支持8个NAS盘· 支持三级用户权限管理,支持授权的用户和密码,支持HTTPS 加密和IEEE 802.1x网络访问控制、IP地址过滤· 支持ROI感兴趣区域增强编码· 支持H.264/MJPEG/MPEG4视频压缩算法,支持多级别视频质量配置、H.264编码复杂度Baseline/Main/High Profile,支持实时视频输出分辨率为HDTV1080p(符合SMPTE274M标准)、960p和HDTV720p(符合SMPTE296M标准)· 支持多种网络协议,IPv4/IPv6,HTTP,HTTPS,802.1x,Qos,FTP,SMTP,UPnP,SNMP,DNS,DD NS,NTP,RTSP,RTCP,RTP,TCP,UDP,IGMP,ICMP,DHCP,PPPoE,Bonjour · 支持1路音频输入和1路音频输出云台功能:· 水平方向360°连续旋转,垂直方向-2°-90°,无监视盲区· 水平预置点速度最高可达240°/s,垂直预置点速度最高可达200°/s· 水平键控速度为0.1° -160°/s,垂直键控速度为0.1° -120°/s· 支持256个预置位,并具有预置点视频冻结功能· 支持8条巡航扫描,每条可添加32个预置点· 支持4条花样扫描,每条路径记录时间大于10分钟· 支持比例变倍功能,旋转速度可以根据镜头变倍倍数自动调整· 支持守望功能,预置点/花样扫描/巡航扫描/自动扫描/垂直扫描/随机扫描/帧扫描/全景扫描可在空闲状态停留指定时间后自动调用(包括上电后进入的空闲状态)· 支持报警功能,内置2路报警输入和2路报警输出,支持报警联动,可在报警后触发调用预置点/巡航扫描/花样扫描/触发开关量输出/上传中心应用场景红外网络高清智能球的种种特性使之可广泛应用于需要大范围高清画质监控的无光和光线较弱的场所,如:河流、森林、公路、铁路、机场、港口、岗哨、广场、公园、景区、街道、车站、大型场馆、小区外围等场所。

海康威视酒店安全系统说明书

海康威视酒店安全系统说明书

CONTENTSRequirement AnalysisSolution IntroductionProduct ShowcaseApplication SummaryRequirement AnalysisHotel SecurityHotel ManagementVIP and staff management, Vehicle and Density control management:•Vehicle number analysis•Facial recognition•Central management Increase safety and ensure that your hotel can welcome guests in comfort, with confidence and peace of mind: •Temperature screening•Mask detection•Density ControlREQUIREMENT ANALYSISSolution IntroductionSOLUTION OVERVIEWSYSTEM ARCHITECTUREHOTEL ENTRANCE•Touchless Skin-surface temperature and Mask detection with highaccuracy, without the need for close physical contact.•Fast temperature screening with elevated temperature alarm (pop-up image/audio warning).Touchless Skin-surface Temperature & Mask Detection Hikvision’s touchless temperature screening thermographic cameras are designed to detectelevated skin-surface temperatures and mask wearingstatus at entrances prompting further actions andsuitable guidance.Worried about customer’s experience and safety?OR Thermographic Handheld Camera Thermographic Turret/Bullet CameraTouchless Temperature Screening and Mask Detection Minmoe Access control TerminalHOTEL RECEPTION•High facial recognition accuracy with deep learning technology.•Faces of all types from around the world are supported.Fast human face capture and VIP recognitionHikvision’s temperature DeepinView cameras aredesigned to detect human faces and carry out facial comparisons. This specific service treatment enables a VIP to enjoy the exclusive and considerate experience as soon as they arrive.Hikvision’s monitoring tablet help reception to monitor the abnormal temperature in real time.Need to recognize a VIP from your hotel?And monitoring abnormal temperature in reception?Monitoring TabletDeepinView New 7 lines camera Facial recognition and monitoring abnormal temperatureHikCentral Professional BI ModuleHOTEL RESTAURANT & GYMTo observe social distancing guidance, every shop needs to control the customer flow inside of the hotel. Hikvision customer density control solution provides real-time guidance for the customers in queue with visible and audible notice.Need to keep social distancing?•Customer density control based on real-time customer number inside and keep social distance•Daily, weekly, and monthly customer flow reports contribute to improved personnel scheduling and effectively enhance marketing strategiesDocumenting Customer TrafficDigital display: Broadcast a variety of advertising programs instantly or as scheduled.Need to promote your menu ?DS-2CD6825G0Most customers come on Wednesday. I will have more staff on duty next time.DS-D60B-CDensity Control & Digital DisplayHOTEL CORRIDORDual Direction MonitoringDual-Directional PanoVu CameraHikvision provides a dual-direction PanoVu camera with twoadjustable lenses, which can monitor different directions at thesame time, with less cabling and providing easy installation.HOTEL CAR PARKThe ability to identify vehicles at parking entrances can provide major benefits for businesses, local authorities, and a range of other organizations. Now, managers in any area can improveentrance security to schools, offices, and factories, for instance, or to implement road tolling, and much more.ANPR cameras, engineered with deep learning algorithms and GPUANPRHikCentral ProfessionalBI ModuleANPR cameraHOTEL CONTROL ROOM•Supports card, fingerprint, face authentication modes, all in one terminal.•Built-in card reader, easy installation .•Cross-system linkage between CCTV and access control provides situational awareness.Access Control DevicesWith Hikvision access control system, you can only assign the permission to the relevant person to enter the control roomHow to only allow the authorized to enter the control room?Face Access Terminal HikCentral ProfessionalACS licenseDoor AccessAbnormal access records in alarm centerVideo linkage & door operations by Control Client & Mobile ClientACCESS CONTROLCentral Video MonitoringBI dashboard provides a flexible , customized tabular view interface to inform decision makers with business analysis reports.Business IntelligenceWhen someone has abnormal temperature or notwearing mask, event & alarm management can guide you to the related video, picture and its location(map), which helps you check what and where it’s happening.Event & Alarm ManagementHikCentral ProfessionalBI ModuleHikCentralHikCentral is completely centralized to achieve vast integration capabilities and deliver more powerful solutions.People Counting Temperature Analysis Vehicle AnalysisProduct Showcase▪Thermal: 384 ×288, lens: 15 mm/13 mm/10 mm ▪Optical: 2688 ×1520, lens: 6mm/6mm/4mm ▪Accuracy: ±0.5℃(±0.3℃with blackbody)▪Measurement range: 30-45℃▪Working temperature: 10-35℃▪AI human detection, false alarm reduction ▪Simultaneous temperature screening for multiple people (Up to 30 people)DS-2TD2636B-15/P DS-2TD2636B-13/P DS-2TD2637B-10/P Thermographic Bullet Camera ▪Thermal: 160 ×120▪Lens: 3 mm / 6 mm ▪Optical: 2688 ×1520▪Optical lens: 4 mm / 8 mm ▪Video mode: Bi-spectrum image fusion ▪Accuracy: ±0.5℃(±0.3℃with blackbody)▪Measurement range: 30-45℃▪Supports audio alarms DS-2TD2617B-3/6PA Thermographic Bullet Camera▪Thermal: 160 ×120▪Lens: 3 mm / 6 mm ▪Optical: 2688 ×1520▪Optical lens: 4 mm / 8 mm ▪Video mode: Bi-spectrum image fusion ▪Accuracy: ±0.5℃(±0.3℃with blackbody)▪Measurement range: 30-45℃▪Supports audio alarms DS-2TD1217B-3/6PAThermographic Turret Camera ▪Thermal resolution: 160 ×120 ▪Optical resolution: 640 ×480 ▪Accuracy: ±0.5℃▪Range: 30-45℃▪Touch screen ▪Bi-spectrum image fusion DS-2TP21B-6AVFWThermographic Handheld Camera▪1920 ×1200 @ 30fps ▪ 2 mm fixed lens ▪1/2.8" Progressive Scan CMOS ▪IP66, IK08DS-2CD6825G0/C-I(V)(S)Dual-Lens People Counting Network Camera Full HD video(Up to 4K)DS-D60C-B Digital Signage BoxPortrait and landscape Built-in Wi-Fi Longer service life24/7 operation Built-in 32 GBSD Card▪High quality imaging with 4MP resolution ▪Excellent low-light performance via DarkFightertechnology▪Facial recognitioniDS-2CD7146G0-IZS Facial Recognition Camera▪Storage and Playback, Smart & POS FunctionsDS-7600NI-I I Series NVR ▪Dual lens, dual CPU ▪2560 x 1920 @ 30fps ▪Built-in micro SD/SDHC/SDXC card slot, up to 256 GB DS-2CD6D52G0-IH(S)Dual-Directional PanoVu Camera ▪High quality imaging with 2 MP resolution▪Excellent low-light performance via DarkFightertechnology DS-2CD7A26G0/P-IZ(H)S 2 MP ANPR CameraDS-7700NI-I DS-9600NI-IMask DetectionSupports face mask wearing alerts and compulsorymask wearing alerts.Temperature screening with mask.Visualised Temperature Screening7-inch touch screen.Temperature screening with visual resultsand audio prompt. High accuracy of temperature screening Temperature range: 30°C to 45°C*Thermographic Technology Measures the temperature of a forehead thermographically after face detection.Touch-free Temperature Screening Authentication distance: 0.5-1.5 m .Authentication height: 1.4-1.9m .Flexible DeploymentSupports wall mountingand floor standing with mounting pole.*In order to obtain accurate temperatures, after the device is powered on, wait for 90 minutes to allow device to warm up.DS-K1T671TM-3XF MinMoe Access Control TerminalAlarm and CountingSupporting abnormal temperature alarm.people counting, abnormaltemperature counting.Visualised Temperature Screening7-inch touch screen.Real-time temperature display, abnormaltemperature filter.Data Storage Built-in 32G TF card,Temperature recording storage,Max to 100,000 records.Live View Live view of door station camera .Convenience One-click unlock One-click calling the center.OpennessOperating System: Android .DS-KC001Monitoring TabletHikCentral ▪TEMPERATURE SCREENING▪MASK DETECTION▪LIVE VIEW PLAYBACK ▪DENSITY CONTROL ▪BI REPORT CENTRAL MANAGEMENTHikCentral WorkstationsHikCentral ServerApplication SummaryOffer better service Precise Marketing Better Customer ExperienceVIP person and vehicle will be recognized in advance. Real time advertisement displayed in signage allows customer to get the promotion information. Business Intelligence module, includingpeople counting analysis, vehicle analysis,facial recognition etc. provides data forprecise marketing and improve salesrevenue.•Density control gives customers inqueue an intuitive guidance andreduces customer waiting time.•Thermographic camera detectsperson’s skin temperature withoutphysical contact, improving customerexperience and operation efficiency.SYSTEM VALUES。

海康威视DS-2DY3320IW-DE DE4 3MP网络红外PTZ摄像头的技术参数说明书

海康威视DS-2DY3320IW-DE DE4 3MP网络红外PTZ摄像头的技术参数说明书

Hikvision DS-2DY3320IW-DE/DE4 3MP Network IR PTZ Cameras adopt 1/2.8" progressive scan CMOS chip. With the 20× optical zoom lens, the camera offers more details over expansive areas.This series of cameras can be widely used for wide ranges of high-definition, such as the rivers, forests, roads, railways, airports, ports, squares, parks, scenic spots, stations and large venues, etc.Key Features•1/2.8" Progressive Scan CMOS •Up to 2048 × 1536 resolution •20× Optical Zoom, 16× Digital Zoom •Digital WDR, 3D DNR, HLC, Smart IR •Up to 100 m IR distance•12 VDC & PoE (802.3at, class4) •Support H.265 video compressionCamera Module DS-2DY3320IW-DE/DE43MP Network IR PTZ Camera Image Sensor 1/2.8" progressive scan CMOSMin. Illumination Color: 0.05 Lux @(F1.6, AGC ON) B/W: 0.01 Lux @(F1.6, AGC ON) 0 Lux with IRWhite Balance Auto/Manual/ATW (Auto Tracking White Balance)/Indoor/Outdoor/Fluorescent Lamp/Sodium LampAGC Auto/ManualShutter Time 1/1 s to 1/30,000 sDay & Night IR Cut FilterDigital Zoom 16×Privacy Mask 8 programmable privacy masksFocus Mode Auto/Semi-automatic/Manual3D DNR YesBLC YesDigital WDR YesRegional Exposure YesRegional Focus YesLensFocal Length 4.7 mm to 94 mm, 20× OpticalZoom Speed Approx. 2.7 s (Optical Lens, Wide-Tele)Field of View 58.3° to 3.2° (Wide-Tele)Working Distance 10 mm to 1500mm (Wide-Tele)Aperture Range F1.6 to F3.5IRIR Distance Up to 100 mIR Intensity Automatically adjusted, depending on the zoom ratioPTZMovement Range(Pan) 360° endlessPan Speed Configurable, from 0.5°/s to 50°/s. Preset speed 50°/sMovement Range(Tilt) From -40° to 30°Tilt Speed Configurable, from 0.5°/s to 25°/s. Preset speed 25°/sProportional Zoom YesPresets 300Patrol Scan 8 patrols, up to 32 presets for each patrolPattern Scan 4 pattern scans, record time over 10 minutes for each scanPower-off Memory: YesPark Action Preset/Pattern Scan/Patrol Scan/Auto Scan/Tilt Scan/Random Scan/Frame Scan/Panorama ScanPTZ Position Display ON/OFFPreset Freezing YesScheduled Task Preset/Pattern Scan/Patrol Scan/Auto Scan/Tilt Scan/Random Scan/Frame Scan/Panorama Scan/Dome Reboot/Dome AdjustFeaturesSmart Detection Intrusion Detection, Line Crossing Detection, Region Exiting Detection, Region EntranceDetectionROI encoding Main stream, sub-stream and third stream respectively support two fixed areas.Max. Resolution 2048 × 1536Main Stream 50Hz: 25fps (2048 × 1536, 1920 × 1080, 1280 × 960, 1280 × 720) 50fps (1280 × 960, 1280 × 720)60Hz: 30fps (2048 × 1536, 1920 × 1080, 1280 × 960, 1280 × 720) 60fps (1280 × 960, 1280 × 720)Sub-Stream 50Hz: 25fps (704 × 576, 640 × 480, 352 × 288)60Hz: 30fps (704 × 480, 640 × 480, 352 × 240)Third Stream 50Hz: 25fps (1920 × 1080, 1280 × 960, 1280 × 720, 704 × 576, 640 × 480, 352 × 288) 60Hz: 30fps (1920 × 1080, 1280 × 960, 1280 × 720, 704 × 480, 640 × 480, 352 × 240)Video Compression Main Stream: H.265+/H.265/H.264+/H.264 Sub-Stream: H.265/H.264/MJPEGThird Stream: H.265/H.264/MJPEGH.264 with Baseline/Main/High ProfileAudio compression G.711alaw/G.711ulaw/G.722.1/G.726/MP2L2/PCMProtocols IPv4/IPv6, HTTP, HTTPS, 802.1x, Qos, FTP, SMTP, UPnP, SNMP, DNS, DDNS, NTP, RTSP, RTCP, RTP, TCP/IP, DHCP, PPPoE, BonjourSimultaneous LiveView Up to 20 channelsUser/Host Up to 32 users3 levels: Administrator, Operator and UserSecurity Measures User authentication (ID and PW), Host authentication (MAC address); HTTPS encryption; IEEE 802.1x port-based network access control; IP address filteringSystem IntegrationAlarm Input 1-ch alarm inputAlarm Output 1-ch alarm outputAlarm Linkage Alarm actions, such as Preset, Patrol Scan, Pattern Scan, Memory Card Video Record, Trigger Recording, Notify Surveillance Center, Upload to FTP/Memory Card/NAS, Send Email, etc.Audio Input 1-ch audio inputAudio Output 1-ch audio outputNetwork Interface 1 RJ45 10 M/100 M Ethernet Interface;PoE (802.3at, class4)Storage Built-in memory card slot, support Micro SD/SDHC/SDXC, up to 128 GB; NAS (NFS, SMB/ CIFS), ANRAPI ONVIF (Profile S, Profile G, Profile T), ISAPI, SDKClient iVMS-4200, iVMS-4500, iVMS-5200Web Browser IE 8 to 11, Chrome 31.0+, Firefox 30.0+, Edge 16.16299+GeneralLanguage (Web Browser Access ) 32 languages.English, Russian, Estonian, Bulgarian, Hungarian, Greek, German, Italian, Czech, Slovak, French, Polish, Dutch, Portuguese, Spanish, Romanian, Danish, Swedish, Norwegian, Finnish, Croatian, Slovenian, Serbian, Turkish, Korean, Traditional Chinese, Thai, Vietnamese, Japanese, Latvian, Lithuanian, Portuguese (Brazil)Power 12 VDC, 1.6 A and PoE (802.3at), 42.5 to 57 VDC, 0.6 A, Class4Max. 19 W, including max. 9.2W for IRWorking Environment Working Temperature: Outdoor: -30°C to 65°C (-22°F to 149°F) Working Humidity: ≤ 95%Protection Level IP66 Standard; 6000V Lightning Protection, Surge Protection and Voltage Transient ProtectionDimensions(mm) -DE: 367 mm × 122 mm × 242 mm (14.45" × 4.80" × 9.53")-DE4: 255 mm × 129 mm × 195 mm (10.03" × 5.08" × 7.68")Weight Approx. 3 kg (6.61 lb)The DORI (detect, observe, recognize, identify) distance gives the general idea of the camera ability to distinguish persons or objects within its field of view.DORI Detect Observe Recognize Identify Definition 25 px/m 63 px/m 125 px/m 250 px/m Distance (Tele) 1568.0 m (5144.4 ft) 622.2 m (2041.4 ft) 313.6 m (1028.9 ft) 156.8 m (514.4 ft)Order ModelDS-2DY3320IW-DE (B)DS-2DY3320IW-DE4 (B)Typical ApplicationHikvision products are classified into three levels according to their anti-corrosion performance. Refer to the following description to choose for your using environment.This model has NO SPECIFIC PROTECTION.Level DescriptionTop-level protection Hikvision products at this level are equipped for use in areas where professionalanti-corrosion protection is a must. Typical application scenarios include coastlines, docks,chemical plants, and more.Moderate protection Hikvision products at this level are equipped for use in areas with moderate anti-corrosion demands. Typical application scenarios include coastal areas about 2 kilometers (1.24miles) away from coastlines, as well as areas affected by acid rain.No specific protection Hikvision products at this level are equipped for use in areas where no specificanti-corrosion protection is needed.DimensionsUnit: mm36712215774.24-7Φ10524274.2-DE-DE4255129157129100100195Φ7Accessory Included:ASW0081-1220002W Power adapter Optional:DS-1280ZJ-M (SPTZ) Junction BoxDS-1281ZJ-M (SPTZ)Inclined Base MountingBracketDS-1275ZJ (SPTZ)Vertical Pole Mounting BracketLAS60-57CN-RJ45Hi-PoE midspan05060020220318。

海康威视高清监控系统解决方案

海康威视高清监控系统解决方案
的应用和较好的质量表现的设备 。
>
先进性和成熟性
系统设计 中在保证可行性 、 经济性和实用性的前提下 , 采用目前较先进的设
备和器件,更重要的是设计从系统的架构 、 软抖的功能 , 以及系统的集成 上体现
系统的先进性。系统设计 中 采用了大量工业监控领域的技术 , 如组态 、 联动、设
备驱动等技术 , 使系统具有一定的先进性 , 并具有较强的发展潜力。
定的设备接口余量 :
另一方面,由于各系统都采用模块化结构,使系统具有较高的可扩展性。另外 , 在设计中也充分考虑其易维护性, 不仅提供完整的技术资料和 工程设计文件,还
引入模块化、可插拔器件,使维护工作较为方便。
3
HIKVISION
2.2
./ ./ ./ ./ ./ ./ ./ ./ ./ ./ ./ ./ ./
探测 ,
旦监视区域内发生非法入侵 , 前端探测器立即发出报警信号到中心 , 中
HIKVISION
心通过声光报警的方式提示安保人员。
海康威视厂 区安全防范系统解决方案
门禁管理系统主要设计在办公区、生产区、库房等重要场所的出入口处设置 门禁读卡器,工作人员通过中心统 发放的门禁卡进出权限范围内的区域 , 同时
5. 1. 2 厂 区视频监控系统功能分析 5. 1. 3 前端监控点设计
5. 1. 4
5. 1. 5 5. 2
传输设计
监控中心设计
入侵报警系统
5. 2. 1 系统概述
5. 2. 2 报警系统组成
5. 2. 3
传输设计
5. 2 .4 系统控制设计
5. 2. 5 入侵报警系统功能
机将现场画而转换成电子信号传输至中心 , 然后通过显示单元实 时显 示 、 存储设 备录像存储等 , 实现工作人 员 对 各区域的远程监控及事后事件 检索功能。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Making Security EasierHikCentral V1.2 010203What’s NewImprovementsSpec & Road MapAccess Control/Facial Recognition/UVSSInteractive Design/Functionalities/Maintainability/Openness2018 Road MapSystem Architecture⏹Software Structure•Server + Clients⏹Device /System Layer•Supports Cameras , NVR/DVR Access•Provides Central Storage with Hybrid SAN/Cloud StorageServer•Supports Decoder /Video Wall Controller Management•Supports Keyboard Access•Supports Door Controller and Door Management•Supports Under-Vehicle Surveillance System management⏹Server Layer•VMS Server for Video Surveillance•Streaming Server for Streaming forwarding and balance•Functional Layer•Centralized Management of all the elements•User-friendly design operation ideally suit for all users•User Interface•Flexible ClientsDoor01 What’s New1.1 Access Control1.1 Access Control System OverviewSupports multiple clientsFlexible Access Control permissionsSeamlessly Iintegration with videosurveillance systemSeries DS-K2600 Series DS-K2800 Series Standalone Access Control Terminal Fingerprint EnrollmentScannerCard Issue ReaderFingerprintReaderMode l DS-K2601DS-K2801DS-K1T105E DS-K1T201MF DS-K1F820-F DS-K1F100-D8E DS-K1100Series DS-K1201EF DS-K2602DS-K2802DS-K1T105M DS-K1T201EF-C/DS-K1F180-D8E DS-K1800 Series DS-K1201MF DS-K2604DS-K2804DS-K1T105E-C DS-K1T201MF-C/////DS-K1T105M-C DS-K1T802E/////DS-K1T201EF DS-K1T802M///1.1 Device compatibility⏹Access GroupThe person's access group. All the persons in the access group have the same permissions⏹Access LevelThe person‘s access level .That is, thepermissions consisted for a designated time and designated doors.Access LevelOtherAccess LevelsAccess LevelAccess GroupJay Simon AssignRemoveJaySimonRemoveAssign Note:Rules have been created to avoid permission conflicts when multiple administrators configure permissions.Issue⏹Process InstructionThe permitted doors and access time are combined into access levels. Persons are assigned to or removed from an access group with the same access levels. This simplifies person permission configuration.CombineCard Reader Access Modes⏹Card⏹Fingerprint⏹Card and Fingerprint⏹Card or Fingerprint⏹Card and PIN⏹PIN and Fingerprint⏹Card and PIN and FingerprintAdvanced Person PermissionsExtend Access:⏹Extend the door’s open time, suitable for people withlimited mobility.Super Permission:⏹Exempt from remaining locked restriction.⏹Exempt from anti-passback rule restriction.⏹Exempt from person’s first card authorizationrestriction.Note: PIN entry only is not supported in the HikCentral platform.3.Apply to device.•The person information in the system can be applied to Access groups, Face ComparisonGroups, and Attendance Groups.Batch OperationCustomized FieldsBatch Support for the following:•Importing person photos •Issuing cards•Exporting person information•Importing person information via a template•In addition to the basic, pre-defined information, there are five additional fieldswhich can be customized for yourorganization's needs.Data Issue•Apply all (manual) is commonly used to issue data increments (e.g., adding a new person).•Apply all (scheduled) is commonly used to issue data on the basis of schedule, avoiding bandwidth occupation when busy.Person Reuse1.1.2 Access Control Applications -Anti-PassbackIncreases the area over which persons can apply anti-passback. Configure areas that span across each controller.Note :1.Set the area without the reader sequence⏹Manually forgive the Anti-Passback on live view:2. Resetting the anti-passback by schedule is not supportedServer⏹Robust Solution:AreaCableServerAreaNetwork ErrorStill AliveXOffice Area1Border Door Office Area2Border DoorBorder Door1.1.2 Access Control Applications –First Card Remains UnlockedFirst Card Remains UnlockedDesignated person opens the door after swiping thefirst cardDuration expiresOutsiders access areaDoor opens and remains unlocked for a designatedperiodRestore to door’s initial stateDesignated person swipes first card again to cancelthe authority1.1.2 Access Control Applications –First Card AuthorizationFirst Person AuthorizationDesignated person opens the door after swiping thefirst cardDoor is considered authorizedOthers swipe authorized cards to access areaDesignated person swipes first card again to cancelthe authorityAuthority automatically withdrawn after00:00Restore to door’s initial status1.1.2 Access Control Applications –Lock All DoorsLock All DoorsOperators can lock/recover all doors with just one click remotely on the (CS \Mobile) clientEmergency occurAlarm detected Security staff monitoredManually lock all doorsManually recover⏹After manually lock all doors is executed,manually recover is necessary ifthe door is expected to return to its initial status.⏹Lock all doors is unrestricted when the doors remain unlocked byschedule.⏹Super permission can exempt from lock all doors period.AlarmsLive View1.1.3 Video/Access Control Linkages•Live view of person’s access .•Live display of person’s access records and information.•Dual window real-time switch preview.•Real-time control of doors according to person’s access state.Reports•Search person’s records in Access Control module by criteria: person name, certificate result, certificate type.•P layback of person’s access, dual window playback .•Display of person’s detailed information.•Cameras can be linked to record when door alarms are triggered.•Door actions can be linked to emergency requirements or other situations when video alarms are triggered.⏹Live View⏹Alarms Linkages⏹Records Search1.1.4 Time & AttendanceT&A follows the principle of first-in and last-out.T&A time schedules support weekly cycles or several fixed days, creating easy attendance management.T&A shift supports fixed and flexible schedule to meet common attendance requirements.T&A supports holiday attendancemanagement , fitting actualattendance needs.T&A supports selecting on-demandattendance points for flexibleattendance point management.T&A supports attendance recordscorrection and reports download.T & AGroupJaySimonAssignRemoveJaySimonShiftScheduleT & AScheduleAssignRemoveMonitoringDoor control Doors can be remotely controlled -unlock / close / keep open / keep close in Live View. So real-time and effective door control will meet some occurrences.1.1.5 Mobile Client (available May, 2018)Record ⏹Live View•Record•Capture•Voice intercom⏹Playback•Speed control : 1x, 2x, 4x, 1/2x, 1/4x•Capture•ClipAlarm Door alarms can be received by Mobile Client. Related videos, images and detailed alarm information are shown to accurately assess situations.1.2 Facial RecognitionIntelligentDevicesHikCentralHigh Recognition RateUser-friendly Interface Intelligent RetrievalHikCentral incorporates powerful facial recognition functions from Hikvision's intelligent devices.•Multi-level deep-learning algorithmscreate strong environmentaladaptability•Good User Interface design makes it easyto manage thousands of facial images•Video clips can be retrieved by specific human faces•Advanced Face Detection event and alarm functions help toincrease business security and recognize your customers01020304Import all the people you want to monitor into a face groupHikCentral sends the face list to an intelligent device such as an DeepinMind NVRExample for VIP ListFacial RecognitionModuleDevicesThe camera captures a face and the system runs comparison analytics.HikCentral clients receive thecomparison result , record it as a face event, and display it in the view window05HikCentral generates an alarm and informssecurityComparisonThe Face Detection event can send an alarm and inform security personnel to take further action1.2.2 Intelligent Monitoring⏹Automatically display all the captured Faces ⏹Displays match results with similarities⏹Click the corresponding picture to get detailed information ⏹Support “Search by picture” with intelligent devices .⏹Add the suspicious picture into a person group.⏹Display multiple cameras' s result simultaneously.1.2.3 Intelligent Retrieval⏹Search related video clips with Time, Picture, Name and S imilarity .⏹Multiple searches allows you to find the “one” you want⏹Search results across multiple devices to achieve centralized facemanagement⏹Alarm information provides face picture, face ID, telephone number,similarity, video ,captured picture, and additional information1.3Under Vehicle Surveillance System (UVSS)Hand-held Model•Time-consuming, low-efficiency •Areas easy to miss inspection•Standalone device, unable to post reviewRail-mounted Model•Vehicle needs to be stopped for inspection, low-efficiency•Results shown in multiple images •Moving components reduce product lifespan•Complicated installationMobile Model•Light material, easily damaged•Image is easily damaged by vehicle Shaking.•Poor protection performance1.3.1 Issues with Current Models on the Market1.3.2 UVSS in HikCentralUVSS Benefit⏹Auto-detection of the vehicle undercarriage⏹Synchronize LPR camera data with Under Vehicle image⏹Suitable for various vehicle models, entire undercarriage of vehicle in oneimage .⏹High-strength structure⏹High-quality picture, low distortionEfficientMultiple OperationsWhite List and Black ListMultiple Maintenance MethodsEfficient MonitoringFlexible System DeploymentEasy Investigation•Tag the suspicious plate number for later retrieval•Tag multiple suspicious areas with specific picture for later investigation•Manually trigger user-defined events with any pre-defined actions.•List management with the ability to upload reference picture for each plate number•White list and black list alarm•Add a suspicious plate number to the database during live view•Health monitor dashboard for UVSS system (.e.g. Net status, Line Scan camera status, Capture Camera status, Storage status)•Supports device offline/online event monitoring /searching/report•Video search/ VCA search for related cameras •LPR search for corresponding events•Provides the original image with live picture for better comparison •Provides history search records of the car with the same plate number during live view for better investigation•Provides User-defined events search for emergency scenarios•Auto-detection/record vehicle undercarriage without manpower•Manage multiple exits & entrances simultaneously•Ability to provide any type of camera for live view reference•Supports Fixed UVSS and Portable UVSS •Supports 4 UVSS per HikCentral server •IP connectivity1.3.3 HikCentral with UVSS BenefitFlexibleInvestigationOperabilityMaintainableLPR listDoor02 ImprovementsOverall ImprovementsEvent & Alarm Smart WallControl Client& BS ExperienceMap ManagementMobile Client Devices Management HikCentral Open-SDK2.1 Event & AlarmManual Trigger AlarmEvent ReportComposite AlarmRicher Events Types Richer Event Types•More Event types to enrich the function of the system•More Device/Storage server events to increase system stability •Addition system settings to provide better maintenanceComposite Alarm•Combined multiple events to defined a certain alarm to reduce false alarm•Allow alarm escalation when the alarm is not acknowledged.Manual Trigger Alarms•Allow manually triggered alarms with user-defined events in the Control Client for different scenarios •Test Alarm on Web Client list for better alarm configuration and maintenanceEvent/Alarm Report•Create event/alarm reports for monitored events on the Web Client and inform users through daily /weekly email •Export the Alarm/Event lists on the Control Client with any filter settings•Report may include the item quantity statistics and basic information2.1 Event/Alarm ImprovementsNew Module EventsNew Type EventsRS/Encoding Device/CameraCurrent Events ImprovedHikCentral SystemMonitor2.1.1 Richer Events Types•48 door Events•8 Access Control Device Events •UVSS Events•User Login /Log out •User-defined Event•Expand Hybrid SAN events to 26 in total •Camera Commination Exception/Recovered •Device Recovered•CPU Eexception/ Recovered/Warning •RAM Exception/Recovered/Warning•System Service Abnormally Stopped /Recovered to Run•Clear and unified Event names•Generic Events able to have all the linkages.Unified Event Name for Search <V1.1V1.2 Control Client Loitering ,Loitering Detection Loitering (Detection)Line Crossing, Line Crossing Detection Line Crossing(Detection)Fast Moving, Fast Moving DetectionFast Moving(Detection)Parking, Parking DetectionParking(Detection)Object Removal, Object Removal DetectionObject Removal(Detection)Unattended Baggage, Unattended Baggage DetectionUnattended Baggage (Detection)Intrusion ,Intrusion DetectionIntrusion(Detection )Region Entrance ,Region Entrance Detection Region Entrance(Detection)Region Exiting ,Region Exiting Detection Region Exiting Detection )People Gathering , People Gathering DetectionPeople Gathering (Detection)User-defined EventsManual Trigger•Manual trigger in the Control Client to enhance systemsurveillance (e.g. UVSS, door, camera)•Ability to predefine events and link alarms to notifyspecific users3rd -party System Trigger•External events triggered from HikCentralOpenSDK to improve system integrationMaintenance Trigger•Alarms not handled after a configurable time period cantrigger events, allowing the customer to be informed ofsignificant alarms•Alarms not handled after a configurable time period cantrigger alarm escalationAlarm Trigger•Automatically triggered after specific alarm occurs tooptimize Event Arming•Multiple alarms triggered simultaneously can result in alarm escalationSystem Events Trigger•Can be triggered by cameras ,alarm inputs, encoding devices, servers, ANPR, generic events, remote site events•Define different events to trigger for different time periods toprovide flexible scenarios2.1.1 User-defined Events•Triggered by Generic events to allow 3rd-party integration without OpenSDK•Support for new device types and systemsFuture-proofUser-defined eventUser-defined event2System event, user-defined eventsAlarmManual events,3rd party events, alarminputDuring arming scheduleNotacknowledged after X timesUser-defined events-otherALL events, alarminputsAutomatic armingstartedComposedAutomatic armingstoppedUser-defined event User-defined event22.1.1 How Do User-defined Events Work?Event detected (Camera A )Trigger alarm AOperator 1 receives Alarm Ain alarm center1User-defined event BAlarm Escalation :Operator 1Detect IntrusionAlarm A: receiver Operator1Priority 50Operator needs to acknowledgealarm within X minutesTrigger alarm BOperator 2 receives Alarm B in alarm center2Operator 2Alarm B :receiver Operator2Priority 100Alarm acknowledgedWhen an important alarm is not acknowledged within a configured time period, it will trigger an Alarm Escalation so a higher-priority operator can help to investigate the alarm.Arming PeriodArming PeriodAlarm dwell X minutes?Yes2.1.1 User Case1-Alarm EscalationEvent detected (Camera A )Trigger alarm AOperator 1 receives Alarm Ain alarm center1User-defined event BKeep sending until acknowledgement received :Operator 1Detect IntrusionAlarm A receiver Operator1Operator needs to acknowledge alarm within XminutesTrigger alarm BOperator 2 receives Alarm BOperator 2Alarm B receiver Operator2Alarm acknowledgedAn important alarm can be resent by a cycle trigger.When the alarm has been acknowledged it will stop triggering the same user-defined events.Arming PeriodArming PeriodAlarm dwell X minutes?Yes2.1.1 Use Case2-Keep sending until acknowledgement receivedAlarm dwell X minutes?NoYesOne alarm’s triggering can trigger a user -defined event which can be another alarms’ starting or ending event . This setting is available for more than 2 events happening together to compose an alarm.Composed alarmsAll the system events can use events-based arming to control the alarm. The arming condition can alsocontain a time template, making it possible to combine event arming and time arming.Composed eventsA single event can trigger alarm, but having only one condition may cause false alarms in some complex scenarios.Single eventEvent arming2.1.2 Composite Events/AlarmsUsing events to arm the alarm, the arming events for starting and ending can be alarm input or user-defined events, allowing you to combine 2 events together when triggering an alarm.Alarm TriggerEvent detected (Camera A )Trigger UD eventsArming PeriodArming start User-defined event A (Arming Started Condition )Trigger alarm Aoperator 2Operator 1 receives Alarm A inalarm center1Alarm acknowledgedComposite Events/AlarmsWhen 2 events happen at night or in a restricted area, it can trigger a composite alarm.Event detect?(Camera B )Arming PeriodTrigger UD eventsUser-defined event B(Arming Stopped Condition )Arming StoppedYesNo 2.1.2 Use Case2-Composite Events/Alarms2.1.2 Composite Alarm ExampleAlarm1:Trigger Events: If Perimeter Intrusion detected + Person entering area “A”Time period : Weekend Priority :50ABAlarm2:Trigger Events: If Perimeter Intrusion detected + Person entering area “B”Time period : Sunday Priority :60Alarm3:Trigger Events: Person entering area “A”+ Person entering area “B”Time period : Sunday Priority :80Alarm4:Trigger Events: Person entering area “A”+ Person entering area “B”+1 hour guardless Time period : Sunday Priority :802.1.2 Composite Events/Alarm ExamplePerson DetectionAlarm1Person DetectionAlarm2Intrusion IntrusionPerson DetectionAlarm3Alarm42.1.2 Configuration ExampleAlarm1 :•UD-Perimeter Intrusion detected trigger: Intrusion event triggered on Weekend•UD-Alarm 1 trigger: Automatically triggered by Alarm1•Event arming:Start event: UD-Perimeter Intrusion detectedStop event: UD-Alarm 1•Trigger event: Person detected in area “A”UD = User-defined eventsAlarm2 :•UD-Perimeter Intrusion detected 2 trigger: Intrusion event triggered on Sunday•UD-Alarm 2 trigger: Automatically triggered by Alarm2•Event arming:Start event: UD-Perimeter Intrusiondetected 2Stop event: UD-Alarm 2•Trigger event: Person detected in area “B”Alarm3 :•UD-Manual Stop arming :Manual trigger by operator •Event arming:Start event: UD-Alarm 1Stop event: UD-Manual Stop arming •Trigger event: UD-Alarm2Alarm4 :•UD-Alarm 3 trigger: one hour after Alarm3 triggeredand this alarm not acknowledged.•Event arming:Start event: UD-Alarm 1Stop event: UD-Manual Stop arming•Trigger event: UD-Alarm 3Add UD EventsDefine the UD trigger with system eventsEvent ArmingconfigurationAlarms not acknowledged after a configured period oftime trigger UD events2.1.3 Manual Trigger Events/Alarms Manual Alarm Testing on the Web Client:•Check if the alarm linkage responds as configured•Check if the composite alarm configuration is working•Easy to create alarm demo in Control Client•Adjust the alarm settings according to the test resultsManual alarm triggering on the Control Client•Different users can trigger different UD events•Manually trigger UD events to arm/disarm an alarm•Manually trigger UD events to create system alarms and triggers with pre-configured actionsUD = User-defined eventsUser-defined event A(Arming Started Condition )User-defined event B(Arming Stopped Condition )operator 1Operator 1 monitors the buildingentranceArming periodManual trigger UD Aoperator 2Operator 2 receives Alarm B in alarmcenter2Trigger alarm BEvent detect?(Alarm Source )Manual triggerAlarm acknowledgedArming stoppedManual arming :Operator can manually arm or disarm events Manually trigger alarms for suspicious behavior2.1.3 Manual Arming/Manual Triggering AlarmsOperator1 detects some suspicious behaviorSuspicious behaviorconfirmedTrigger alarm AArming periodOperator 1 receives Alarm Ain alarm center12.1.4 Event/Alarm ReportCreate Event /Alarm reports on the Web Client•Export to PDF, Excel format •Daily/Weekly email reports •Batch adding of Events/Alarms •Up to 32 events or alarms can be configured in one report.•Up to 10,000 events or alarms can be calculated in total.Create Event /Alarm reports on the Control Client•Generate reports by multiple condition in Event & Alarm Search •Export in PDF, Excel, CSV format •Generate key information summary•Alarm list displays Area information•Each alarm in alarm list could jump to Alarm Search and automatically fill in the alarm source ,event type and more (e.g. LPR events come with plate number, vehicle list )2.2 Smart Wall2.2 Smart Wall⏹Window Expand and Restore⏹Roaming window operation ⏹Window Expand and Restore⏹Display Stream details in the Control Client⏹1200K/1600K Keyboard⏹64/69 Series Decoding devices ⏹C10S video wall Controller⏹32Smart Walls⏹32Decoding devices123Note :64 series Decoding devices:1.Not support enlarging sub window after window division. C10S not support :1.creating roaming windows on the Split Window2.Split windows under the Roaming Window;Supports the following:2.3Control Client/BS ImprovementsLive view +Playback +Map=View•The logical resource tree, View pane, and map show their corresponding relationship. •If you select a pane, the map automatically translates to the location of the monitoring point, and the resource point is highlighted.•Map pane defaults to display the location of the current selecteddevice resource.•Click an area to see all related E-maps.•Seamless change between live view and playback.•Enable/Disable Map as needed.+View2.3.1 View Improvements2.3.2 Fisheye Camera DewarpingHikCentral V1.2⏹Smooth and Intuitive operation design.⏹Support zoom to expand the video using the mouse wheel &Flexible PTZoperation.⏹Multiple Fisheye Dewarping support without software limitation but with onlyhardware performance limitation.HikCentral V1.1.1⏹Using the cursor for control is less intuitive.⏹Only support one channel dewarping.HikCentral V1.2⏹Smooth and Intuitive operation design.⏹Support for PTZ operation on Chrome ,IE10/11, etc.⏹Enhanced cursor operation, combines the 3D positioning function andzooming In /Out.⏹Support achieving different speed according to how far the cursor position isfrom the center.HikCentral V1.1.1⏹Using the cursor for control is less intuitive and difficult to control.⏹Support for PTZ control on Control client.⏹Support for PTZ operation on IE only.Enter and Exit:•Display reports with All cameras or specific camerasKey Improvements:•Increase the camera for reports from 4 to 8•Display the totals of multiple camerasEnter or Exit Only:•Display both the total amounts and statistic data of specificcameras。

相关文档
最新文档