Saturday, June 15, 2024

Monitor Resolution of your Security Camera Recorder

Set the Monitor Resolution of your Security Camera Recorder

It’s very crucial to review the entire CCTV footage via monitor. If you are having issues with using a monitor or TV to view your security camera system it usually relates to the resolution that the system is trying to display. It's important to take the necessary troubleshooting steps to gather information on why the display is not working. Often times it's easy to assume that the port is no longer working though it can be remedied by double checking settings. If you know the recorder is receiving power and you can see lights in front of it, but you don't see the menu screen or camera grid on your monitor connected to it, then you most likely have an incorrect display resolution set that is not compatible with your monitor or TV. Remember, you need to “see” what camera “saw”. 

If you have an older or inexpensive computer monitor or TV, chances are that it may not support all the different resolution outputs available on our security DVRs and NVR. Selecting a resolution unsupported by your monitor may leave you locked out of your video recorder unless you either connect it to a 21.5" or larger computer monitor from a reputable manufacturer like Acer or Asus. Depending on the model of your NVR, you can also adjust the resolution of the Display using your web browser. The latter allows setting the Display output resolution over your local network or over the internet. This requires that you have connected our DVR to your router and properly configured it to work with your network by setting its IP address, if necessary. In a world where technology is advancing at breakneck speed, terms like AI, ML, and automation dominate the conversation, especially in video surveillance. But amidst this tech frenzy, one fundamental process remains underappreciated: ‘PLAYBACK’!

Types of monitor outputs on DVRs

To ensure you understand the correct monitor connector terminology please take a look at the image below. Surveillance camera recorders by CCTV Camera World have HDMI and VGA video outputs. VGA supports a maximum output of 1080P resolution, while HDMI can support up to 4K depending on the model of the recorder that you purchased.

How to troubleshoot

Here is a list of troubleshooting steps on how to resolve monitor issues you may be having with your DVR.

1.   Find the make and model of your monitor(s)

2.   Google the make and model and determine what is the max resolution support by each monitor

3.   You cannot set your DVR or NVR display resolution to be higher than the highest resolution your monitor will support. We recommend selecting 1920x1080 as the display resolution to be sure. The following section explains in detail the different way to set the monitor resolution on a security camera recorder.

 

How to set the monitor resolution on a security camera recorder

Method 1

How you change the resolution on your recorder will depend on whether you can still see a display output and menu screens on any of your current displays. If you have no video then you will need to connect your recorder to your local network and access the recorder using a web browser on a Windows PC to set the correct display output. Note that older recorders require Internet Explorer for web access, while newer recorders are compatible with Chrome, Safari, and Firefox.

First place the recorder on the network if you already have not. If you are unfamiliar with how to connect the recorder to the network, below are quick and easy to follow videos on how wire the recorder to your network, and enable DHCP to get a dynamic IP address from your router.

The first step is to connect the NVR to the main router in your network. This would be the router your PC is connected to so you can access the recorder over the LAN (Local Area Network). It is imperative that you are on the local network to follow this method.

Next enable DHCP inside the recorder's menu interface using the menu interface shown on your monitor. We usually enable DHCP already on recorders we ship. You may find it already enabled. Note the IP address of the recorder as shown in the last step in the video below. You will need that IP address to access the recorder over the network.

Once you have the recorder on the network, use the IP address assigned to the recorder over the local network by your router to access the recorder using a web browser such as Firefox, Chrome, or Edge.

If you purchased from CCTV Camera World, the video below provides comprehensive instructions on how to change your DVR recorder's resolution using Firefox. You can Chrome or Edge as well. If you have any questions, please email our support team on ssaintegrate@gmail.com

Method 2

If you still have video output being displayed by one of the monitors on the digital video recorder or network video recorder, then it's simple to change the display resolution using the menu interface on the recorder. Depending on whether you have a DVR or NVR, the steps to change the display resolution are slightly different.

Changing the monitor resolution on a DVR or XVR

Keep in mind that 4K DVR recorders are capable of 4K display output over HDMI, but the VGA port cannot display 4K video. VGA technology maxes out at 1080P. Once you set the main HDMI output to 4K, the VGA port will automatically become disabled. The process to have either or both the HDMI or VGA port working is explained in the video below.

Changing the monitor resolution on a NVR

Similar to the DVR and XVR recorders we carry, the NVR recorders offer both HDMI and VGA output. Some NVR models even have second HDMI port that is a spot monitor, and that is limited to 1080P just like the VGA port.

Saturday, June 1, 2024

Video Analytics Help Your Business

How Video Analytics in CCTV Help Your Business

CCTV cameras are used for security monitoring and surveillance in any facility. CCTV stands for Closed-Circuit Television because security camera systems transmit video footage over a single channel, creating a closed circuit. This means CCTV footage is displayed on limited personal monitors and screens, not publicly broadcasted.

CCTV cameras are a staple in crime prevention because they help ward off criminals, monitor building premises, and record valuable footage of events.

Whether you’re looking to reduce theft and loitering in your business or provide a haven for your residents, you must know the basics of video surveillance CCTV systems.

Security cameras have come a long way from the large, square bricks feeding you a grainy black-and-white image. Today’s cameras are smaller, sleeker, and far more advanced internally, too. The cutting-edge surveillance network of the day has motion-activated Infra-Red night-vision cameras, 4k quality, Pan-Tilt-Zoom functions, and remote viewing capabilities. The most advanced surveillance systems are also equipped with video analytics in CCTV software, turning your security cameras into a powerful business tool.

Auto-Tracking Security Cameras

The fundamental principle behind video analytics is people counting. This can be done a variety of ways, most commonly from an overhead camera. Some use thermal imaging to identify individual heat signatures – people – and track them as they cross a virtual line. Others distinguish people visually by using advanced recognition algorithms or by tracking motion.

However they do it, the accuracy of people counting cameras is dependent on their placement, field of view, and quality. Ceiling-mounted cameras with multiple sensors are generally most accurate for positional data because they compare two images to triangulate position. A single-lens camera has no true depth perception, but can still detect objects crossing a line or entering an area. For wider fields of view – and therefore more data to analyze – multiple cameras facing many directions might be used.

Line-crossing and object detection are common on-board software for cameras today. Full analysis was initially only available on a centralized server, requiring all footage to be transmitted before analysis. While still a viable solution, this limits bandwidth availability and storage space. Running the analysis on the camera side – “on the edge” – lessens the load on the server, freeing up processing power and storage by only sending the analysis and a small clip of an incident. The full recording is stored temporarily on the camera, ready to be transmitted and stored at request.

Video Analysis Applications

Video Analytics in CCTV is a valuable asset for your security staff, highlighting important events and flagging potential problems while ignoring irrelevant data. Your security cameras become a preventative measure in addition to an investigative one. Getting a series of alerts on suspicious behaviour lets you intervene before an issue arises. Remember that while video analytics is a helpful security tool, it doesn’t replace your security guards or monitoring centre – you still need people to respond to and analyse gathered data.

Security for Retail

In retail applications, video analytics can tell you a lot about your business. Store-wide people counting can give you a heat map of your building, showing you high- and low-traffic areas. You’ll also be able to see how long people stay in one area – useful for determining problems with checkout lines or finding out which products aren’t grabbing your shoppers’ attention.

It won’t just show you where people went and stayed, though – the report can give you the directional paths as well, so you’ll know what areas your customers visit in which order. Lastly, facial and shape recognition gives you demographic data like gender and age group with ever-increasing accuracy. With this data, you’ll be able to tell what marketing, advertising, or layout strategies are working and which ones you need to rethink.

Industrial Security Solutions

Video analytics in industrial, manufacturing, and warehouse applications tend to work more in real-time to secure your business operations. Object detection allows a camera to alert you when problem occurs, like equipment failure or merchandise winding up somewhere it shouldn’t. Cameras can detect when a person or vehicle crosses a virtual line and sound an alarm. They can also let you know when you have a shipment coming in or out by watching for trucks on the loading dock.

Installation & Integration

As with all security systems, professional installation is the best choice for a CCTV system with video analytics. A professional consultation lets you customize a unique, flexible security solution for your business, and hiring a company to install and set up your cameras gives you a guaranteed warranty and maintenance. Whether you want to explore video analytics in CCTV for your business or are curious about commercial security in general, contact SPRINKLER FIRE SAFTEY AWARENESS AND WELFARE FOUNDATION for more information.


Ref:
James Eldred - VMS for CCTV

Wednesday, May 15, 2024

6 Communication Protocols Used by IoT

6 Communication Protocols Used by IoT 

The Internet of Things (IoT), is based on the networking of things. In a nutshell, Internet of Things is defined as a “proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data.”

The most important thing here is connectivity among objects.

Research companies like Gartner have predicted that Internet of Things will grow to 26 billion units in 2020. How will the devices be connected and what would communication be like? How will wireless communication protocols evolve?

We can boil down the wireless communication protocols into the following 6 standards:

1.   Satellite

2.   Wi-Fi

3.   Radio Frequency (RF)

4.   RFID

5.   Bluetooth

6.   NFC

In the following paragraphs, we will provide a brief overview and illustration of each of the Internet of Things communication techniques, their pros and cons, and their smartphone compatibilities.

1. Satellite

Satellite communications enable cell phone communication from a phone to the next antenna of about 10 to 15 miles. They are called GSM, GPRS, CDMA, GPRS, 2G / GSM, 3G, 4G / LTE, EDGE, and others based on connectivity speed.

In the Internet of Things language, this form of communication is mostly referred to as “M2M” (Machine-to-Machine) because it allows devices such as a phone to send and receive data through the cell network.

Pros and Cons of Satellite Communication

Pros:

·        Stable connection

·        Universal compatibility

Cons:

·        No direct communication from smartphone to the device (It has to go through satellite)

·        High monthly cost

·        High power consumption

Examples of satellite connectivity would include utility meters that send data to a remote server, commercials updated on digital billboards, or cars via Internet connectivity.

Satellite is useful for communication that utilizes low data volumes, mainly for industrial purposes but in the changing near future where the cost of satellite communication is gradually falling, the use of satellite technology might become much more viable and interesting for consumers.

2. WiFi

WiFi is a wireless local area network (WLAN) that utilizes the IEEE 802.11 standard through 2.4GhZ UHF and 5GhZ ISM frequencies. WiFi provides Internet access to devices that are within the range (about 66 feet from the access point).

Pros and Cons of WiFi

Pros:

·        Universal smartphone compatibility

·        Affordable

·        Well protected and controlled

Cons:

·        Relatively high power usage

·        Instability and inconsistency of WiFi

An example of WiFi connectivity would be Dropcam streaming live video via the local WiFi instead of streaming through a connected Ethernet LAN cable. WiFi is useful for many Internet of Things connections but such connections typically connect to an external cloud-server and are not directly connected to the smartphone. It is also not recommended for battery-powered devices due to its relatively high power consumption.

3. Radio Frequency (RF)

Radio frequency communications are probably the easiest form of communication between devices. Protocols like ZigBee or ZWave use a low-power RF radio embedded or retrofitted into electronic devices and systems.

Z-Wave’s range is approximately 100 ft (30 m). The radio frequency band used is specific to its country. For example, Europe has an 868.42 MHz SRD Band, a 900 MHz ISM or 908.42 MHz band (United States), a 916 MHz in Israel, 919.82 MHz in Hong Kong, 921.42 MHz in the regions of Australia/New Zealand) and 865.2 Mhz in India.

ZigBee is based on the IEEE 802.15.4 standard. However, its low power consumption limits transmission distances to a range of 10 to 100 meters.

Pros and Cons of Radio Frequency

Pros:

Low energy and simplicity for its technology is not dependent on the new functionality of phones

Cons:

Radio frequency technology is not used by smartphones and without a central hub to connect the RF devices to the internet, the devices cannot be connected

An example of radio frequency connectivity would be your typical television remote for it uses radio frequency, which enables you to switch channels remotely. Other examples include wireless light switches, electrical meters with in-home displays, traffic management systems, and other consumer and industrial equipment that requires short-range low-rate wireless data transfer.

Radio frequency communication protocol is useful for large deployments such as hotels where a high quantity of devices are required to be centrally and locally managed. However, in the near future, the technology might become increasingly outdated and be replaced by Bluetooth mesh networks.

4. RFID

Radio frequency identification (RFID) is the wireless use of electromagnetic fields to identify objects. Usually, you would install an active reader, or reading tags that contain a stored information mostly authentication replies. Experts call that an Active Reader Passive Tag (ARPT) system. Short-range RFID is about 10cm, but long-range can go up to 200m. What many do not know is that Léon Theremin invented the RFID as an espionage tool for the Soviet Union in 1945.

An Active Reader Active Tag (ARAT) system uses active tags awoken with an interrogator signal from the active reader. Bands RFID runs on: 120–150 kHz (10cm), 3.56 MHz (10cm-1m), 433 MHz (1-100m), 865-868 MHz (Europe), 902-928 MHz (North America) (1-12m).

Pros and Cons of RFID

Pros:

Does not require power

Established and widely used technology

Cons:

Highly insecure

Ongoing cost per card

Tags need to be present as identifier and be handed over before

Not compatible with smartphones

Examples include animal identification, factory data collection, road tolls, and building access. An RFID tag is also attached to an inventory such that its production and manufacturing progress can be tracked through the assembly line. As an illustration, pharmaceuticals can be tracked through warehouses. We believe RFID technology will very soon be replaced by near-field communication (NFC) technology in smartphones.

5. Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz). If you look at the frequencies it is actually the same as WiFi such that these two technologies seem very similar. However, they have different uses. The 3 different styles of Bluetooth technology that are commonly talked about are:

Bluetooth: Remember the days where you associate Bluetooth as a battery drainer and black hole? Such Bluetooth is a heyday relic of a mobile past marked by a bulky cell phone. Such Bluetooth technology is battery draining, insecure, and are often complicated to pair.

BLE (Bluetooth 4.0, Bluetooth Low Energy): Originally introduced by Nokia and presently used by all major operating systems such as iOS, Android, Windows Phone, Blackberry, OS X, Linux, and Windows 8, BLE uses fast, low energy usage while maintaining the communication range.

iBeacon: It is the trademark for a simplified communication technique based on Bluetooth technology that Apple uses. What it actually is: a Bluetooth 4.0 sender that transmits an ID called UUID, which is recognized by your iPhone. This simplifies the implementation effort many vendors would previously face. Moreover, even non-technically trained consumers can easily use iBeacons like Estimote.com or other alternatives. Although different on a technical level, iBeacon technology can be compared to NFC on an abstract level.

Bluetooth exists in many products, such as telephones, tablets, media players, robotics systems. The technology is extremely useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones (i.e., with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth protocols simplify the discovery and setup of services between devices. Bluetooth devices can advertise all of the services they provide. This makes using services easier because relative to other communication protocols, it enables greater automation such as security, the network address, and permission configuration.

Comparison of Wifi & Bluetooth

Wi-Fi and Bluetooth are to some extent complementary in their applications and usage.

Wi-Fi

·        Access point centered, with an asymmetrical client-server connection where it provides all traffic routed through the access point.

·        ‍Serves well in applications where some degree of client configuration is possible and high speeds are required e.g. network access through an access node

·        ‍Ad-hoc connections are possible with WiFi but not as easily with Bluetooth for Wi-Fi Direct was recently developed to add a more Bluetooth-like ad-hoc functionality

Bluetooth

·        ‍Symmetrical between two Bluetooth devices

·        ‍Serves well in simple applications where two devices are needed to connect with minimal configuratione.g. headsets and remote controls

·        ‍Bluetooth access points do exist although they are not common

Any Bluetooth device in discoverable mode transmits the following information on-demand:

·        Device name

·        Device class

·        List of services

·        Technical information (for example device features, manufacturer, Bluetooth specification used, clock offset)

Pros & Cons of Bluetooth

Pros:

·        Every smartphone has Bluetooth where the technology is continuously being upgraded and improved through new hardware

·        Established and widely used technology

Cons:

·        Hardware capabilities change very fast and will need to be replaced

·        Running on battery the lifetime of an iBeacon is between 1month to 2 years

·        If people switch off Bluetooth, there are issues in usage.

Bluetooth technology mainly finds applications in the healthcare, fitness, beacons, security, and home entertainment industries.

Bluetooth technology is definitely the hottest technology right now but it is many times overrated or misunderstood in functionality. If the application goes beyond fun you will have to dig deep in configuration and different settings as different phones react differently to Bluetooth.

6. Near Field Communication (NFC)

Near-field communication uses electromagnetic induction between two loop antennas located within each other’s near field, effectively forming an air-core transformer. It operates within the globally available and unlicensed radio frequency ISM band of 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s. NFC involves an initiator and a target; the initiator actively generates an RF field that can power a passive target (an unpowered chip called a “tag”). This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or battery-less cards. NFC peer-to-peer communication is possible provided both devices are powered.

There are two modes:

Passive communication mode: The initiator device provides a carrier field and the target device answers by modulating the existing field. In this mode, the target device may draw its operating power from the initiator-provided electromagnetic field, thus making the target device a transponder.

Active communication mode: Both initiator and target device communicate by alternately generating their own fields. A device deactivates its RF field while it is waiting for data. In this mode, both devices typically have power supplies.

Pros & Cons of NFC

Pros:

·        Offers a low-speed connection with an extremely simple setup

·        Can be used to bootstrap more capable wireless connections

·        NFC has a short-range and supports encryption where it may be more suitable than earlier, less private RFID systems

Cons:

·        Short-range might not be feasible in many situations for it is currently only available on new Android Phones and at Apple Pay on new iPhones

Comparison of BLE to NFC

BLE and NFC are both short-range communication technologies that are integrated into mobile phones.

Speed: BLE is faster

Transfer: BLE has a higher transfer rate

Power: NFC consumes less power

Pairing: NFC does not require pairing

Time: NFC takes less time to set up

Connection: Automatically established for NFC

Data transfer rate: Max rate for BLE is 2.1 Mbits/s, max rate for NFC is 424 kbits/s.

(NFC has a shortage range, a distance of 20cm, which reduces the likelihood of unwanted interception hence it is particularly suitable for crowded areas where correlating a signal with its transmitting physical device becomes difficult.)

Compatibility: NFC is compatible with existing passive RFID (13.56 MHz ISO/IEC 18000-3) infrastructures

Energy protocol: NFC requires comparatively low power

Powered device: NFC works with an unpowered device.

NFC devices can be used in contactless payment systems, similar to those currently used in credit cards and electronic ticket smartcards, and it allows mobile payment to replace or supplement these systems.

We believe that NFC will definitely replace the more insecure and outdated RFID cars where its use on smartphones will be limited to contact-only applications like payment, access, or identification.

Conclusion: And the IoT Winner Is?

It is very likely that the winner of these standards will be one that is available in many of the new devices and phones – otherwise, people would not use it. Today every smartphone has Bluetooth and WiFi. However, NFC is increasingly being implemented in new phones.

From our experience, a clear Internet of Things winner emerges when you have a very defined use-case. For example, if you’d like to transfer large amounts of files, WiFi is ideal. If you’d like to react on transient passengers, nothing tops Bluetooth. If you want quick, short-range interaction, NFC might be for you. Henceforth, the winning communication protocol really depends on your goals and your clearly defined use-case.

There will be many more providers of different standards – especially mesh-networked technologies such as GoTenna or mesh networked iBeacons.

Wednesday, May 1, 2024

Varifocal Lens Security Camera

Varifocal Lens Security Camera: What it is and How to Choose One 

A varifocal lens is a motorized camera lens with the ability to adjust its focal length and its focus–to zoom in and out. This is a fixed lens camera, which has no ability to zoom. This has obvious applications in CCTV security cameras, since it allows the camera to achieve high-resolution, zoomed-in, auto focused images of faces, license plates, and other relevant data caught on security footage.

Varifocal Lens vs. Fixed Lens

Varifocal lenses work so well in surveillance CCTV cameras because they can survey both a fairly large and a fairly small field of view–and thanks to their ability to autofocus, the distortion and blur that can occur in CCTV footage is minimized or eliminated.

A fixed lens is more limited since it’s essentially frozen in one lens position covering one field of view. Some fixed-lens cameras capture video with a high enough resolution that magnifying the footage after the fact still provides pretty good visual definition, but not all of them. Still, fixed-lens cameras are appropriate in certain CCTV applications where the field of view doesn’t need to be especially large or especially small–for example, mounted over a door or in an elevator.

Varifocal Security Camera Advantages

Varifocal lens cameras are appropriate for a wider range of locations than a fixed-lens.

They effectively monitor open outdoor areas like parking lots, parking garages, and courtyards, plus open indoor areas like warehouses and lobbies, but are also useful in hallways and public areas.

They are especially good in situations where shrinkage and theft are problems, since they can provide close-up HD video of the hands, pockets, bags, and faces of suspects.

A varifocal lens can be configured to automatically zoom in on things in response to movement, or it can be remotely done by a security system operator or monitor. This makes it an especially useful feature for cloud-based CCTV systems that prioritize remote monitoring.

There are also advanced varifocal lens cameras that can not only zoom in and out, but also swivel horizontally and vertically. This is ideal for a remote monitoring situation where multiple angles need to be covered, but there is only enough power, room, or budget for one camera.

How to Choose a Varifocal Lens Camera

Which camera you choose will be based on the field of view that you need to cover, and how detailed you want your zoomed-in images to be. Varifocal lens cameras are more expensive than fixed lens, and there is price variation within the different types of varifocal lens.

Varifocal lens cameras come in different aperture ranges:

  • 2.8-12mm lens 
  • 3.5-8mm lens 
  • 6-60mm lens
  • 5-100mm lens

“Aperture” is a word that describes the size of the opening in the lens that light comes through. Higher numbers represent smaller openings, and lower numbers represent larger openings. It’s important to choose a varifocal lens with an aperture range that is suited for the setting you need it for, with the right balance between depth of field and detail.

With varifocal lenses, a higher number and smaller aperture is generally preferred for large-scale and outdoor settings, since this allows the greatest depth of field–meaning that very little in the shot is blurry and out of focus. This is the type of varifocal lens that has the most utility in parking lots, above entrances and exits, and in large indoor spaces such as warehouses or large office spaces where a wide scope is necessary.

However, lower numbers and larger apertures are capable of capturing more detail, even though they have a more limited depth of field and greater blurriness outside the area of focus. This is very useful in indoor settings such as offices, lobbies, and retail stores where it is important to catch close-up details of faces, registers, and computer screens, but not as important to have a wide field of view.

Varifocal Optical Zoom vs. Digital Zoom

Even fixed lens cameras these days are usually equipped with a digital zoom. Is it still worth investing in a varifocal lens?

Yes it is! Digital zoom works by enlarging individual pixels, which basically creates blur. You’ve experienced this if you’ve ever tried to use your phone or computer to zoom in on a low-resolution picture. This is especially problematic in situations where you might be trying to read a license plate or get a good look at a person’s face.

Varifocal optical zoom, on the other hand, with its physically extending and retracting lens, actually records more pixels as it zooms in. This maintains the detail and definition of the image even when at maximum zoom.

When to Use a Varifocal Lens Camera

These cameras are a great security solution in a number of settings but especially these:

·        When there is no good place to mount a camera close to the area you need to survey. A varifocal lens can make up the difference in proximity by using a calibrated aperture and field of vision. This could be a long driveway, a large parking lot, or a distant entrance.

·        When you need to clearly make out fine details. This could include cashier stations, ATMs, main doors, and parking lot ingress and egress.

 We are ready to support on your project, if any clarification please write us.