Dahua Video Surveillance System Installed in Pet Corner | Safety News

2021-11-25 09:57:41 By : Mr. Liang Wen

Illustra Edge camera with onboard exacqVision recording software provides a complete IP solution

HID Signo Access Control Card Reader

Avolon chooses HID mobile access® to upgrade headquarters security

Leonardo brought the ELSAG Fixed Plate Hunter LPR system to ensure the safety of the building and its surroundings

Dahua Technology enhances Aerocharter's logistics and cargo handling system with artificial intelligence-based security solutions

Delta provides anti-collision doors to enhance the safety of Los Angeles International Airport

Webcast: Access control integration improves security while reducing costs

Nedap Identification System Webinar: Safe and frictionless access to vehicles on industrial sites

Provide frictionless cloud video storage as a service (VSaaS)

Webcast: Save time and money with wireless access control

The rise of ethical facial recognition

Internet Video Technology for Safe City

Top 10 insights on access, cloud and more

A large warehouse and distribution center is benefiting from Dahua Technology's 64-camera video surveillance system. This website is the main warehouse of Pets Corner in the UK. Pets Corner is a national chain store with more than 150 stores dealing in pets, pet food and pet accessories.

Last year, a purpose-built 43,000-square-foot warehouse in West Sussex opened to supply all UK stores and companies’ online operations. The site is equipped with solar panels for lighting, heating and charging points, and a zero-waste landfill policy is implemented.

The goal of the monitoring system is to monitor the health and safety of workers, reduce inventory damage and shrinkage, and protect trucks parked in the yard overnight. The cameras installed by Urban Security Systems & Fire consist of Dahua Starlight Dome and AI Bullet Camera. All products have a resolution of at least 5MP and AI analysis functions, and support functions such as face recognition, ANPR, content analysis, event detection, people counting, and heat maps.

The camera has high image quality, bandwidth efficiency using H.265 compression and edge analysis, and excellent low-light performance. The distributor of the equipment, Oprema, matched the camera's colors to integrate with the interior of the building.

The other Dahua equipment installed is a 64TB NVR, three managed ePoE Ethernet switches

Cameras are installed inside and outside, at the top and bottom of each channel, and all delivery entry and exit points. The system is monitored during non-working hours by Southern Monitoring. Power is transmitted through Ethernet cables, thus reducing and simplifying wiring requirements. The use of ePoE cameras enables integrators to lay cables within a distance of 95m, in one case up to 160m.

The other Dahua equipment installed is a 64TB NVR, three managed ePoE Ethernet switches, and a 24-port Gigabit L2 managed Ethernet switch. “During the entire project, Dahua has provided us with an excellent level of support, and we are also impressed by the quality of equipment manufacturing,” said Andy Lloyd, director of urban safety systems.

"PoE cameras have greatly helped the design and installation of cable infrastructure, and have reduced costs. There is no need for additional PoE switches due to the length of the cable lines." said Graham Denny, Director of Logistics at Pets Corner: "In the construction of our new country When it comes to distribution centers, we want a system that not only provides us with maximum safety, but also helps maintain operations and health and safety standards."

"The result of the urban security system is very good. It provides us with excellent video images. It is easy to use on my laptop, desktop and mobile phone. Therefore, I strongly recommend Dahua CCTV system for anyone with similar requirements. Human use, and of course, the excellent installation of Urban, most of which are carried out safely and professionally when we operate."

Aiphone's secure communication solution-configurable IP video intercom

Dahua provides surveillance cameras, NVR and Ethernet switches to enhance the safety of pet corners

Access control: 5 minutes with Mike Maxsenti of Genea

It can be said that the diversity of the company's workforce is now more important than ever. The society's awareness of the importance of diversity continues to increase, and many people regard diversity as an important factor that positively (or negatively) reflects the company's culture and market image. We asked at this week’s expert panel roundtable: What should the security industry do to promote diversity in the workplace?

In the field of access control, face recognition has made considerable progress. Face recognition technology used to be considered too slow to verify personnel identities and credentials under high-traffic conditions, but it has now developed into one of the fastest and most effective access control authentication solutions in all industries. Industry leaders such as Intel's advancements in artificial intelligence and advanced neural network (ANN) technologies have improved the accuracy and efficiency of face recognition. However, another reason for the attractiveness of this technology is the rapid growth in demand for contactless access control solutions that can help reduce the spread of diseases in public places. High-volume effective face recognition eliminates security risks, and it is almost impossible to be forged. Modern face recognition technology meets all the standards that have become the preferred solution for barrier-free access control. It provides an accurate and non-intrusive way to verify the identity of high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. A typical electronic access control system relies on the person providing physical credentials, such as proximity cards, key chains, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks, and it is almost impossible to forge. Affordable biometric options Although there are other biometric tools available, face recognition has significant advantages. For example, some techniques use hand geometry or iris scanning, but these options are generally slower and more expensive. This makes facial recognition a natural application for daily access control activities, including recording the time and attendance of large numbers of laborers in construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual wears a face covering in accordance with the government or company's health and safety agreement. In addition to protecting the physical location, face recognition can also be used to manage access to computers and special equipment and devices. Overcoming challenges with artificial intelligence So, when this technology has faced many challenges, including camera angles, certain types of facial expressions, and different lighting conditions, how has face recognition become so reliable? Thanks to the advent of so-called "convolutional" neural network algorithms, engineers have been able to overcome these obstacles. The SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning, which enables it to authenticate various faces. New Jersey Intelligent Security System (ISS) and technology giant Intel worked together to create SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning, which enables it to verify a variety of faces and facial expressions, including those captured under changing light, different resolution levels, and different distances from the camera. Security video management systems Common facial recognition system deployments start with IP video cameras, which connect the camera input to the security video management system of the video archive. When the software initially registers a person's face, it creates a "digital descriptor" that is stored as a digital code that is always associated with an identity. The system encrypts these digital codes and stores them in the SQL database. For convenience and cost saving, the video server CPU can perform all neural network processing without any special GPU card. Unique Digital Identifier The next step involves associating the face captured in the video recording with the unique digital descriptor in its file. The system can compare newly captured images with a large database of known persons or faces captured from a video stream. Face recognition technology can provide multi-factor authentication and search for a watch list of specific types of characteristics, such as age, hair color, gender, race, beard, glasses, headwear, and other identifying characteristics, including bald spots. The strong encryption SED compatible drive relies on a dedicated chip that uses AES-128 or AES-256 to encrypt data. To support privacy issues, the entire system has an encrypted and secure login process to prevent unauthorized access to databases and files. By using a self-encrypting drive (SED) that saves video recordings and metadata, an additional layer of encryption can be obtained. SED compatible drives rely on a dedicated chip that uses AES-128 or AES-256 (short for Advanced Encryption Standard) to encrypt data. Anti-spoofing protection measures How does the face recognition system deal with those who try to deceive the system by wearing a costume mask or holding up a photo to hide their face? For example, FaceX from ISS includes an anti-spoofing feature that mainly checks the "vitality" of a given face. The algorithm can easily mark the flat two-dimensional characteristics of the outlet hood, printed photos or mobile phone images, and send out a "spoofing" alarm. Increasing entry speed. Integrating facial recognition into existing access control systems is simple and cost-effective. Integrating facial recognition into existing access control systems is simple and cost-effective. The system can be operated using off-the-shelf security cameras and computers. Users can also use existing infrastructure to maintain architectural aesthetics. The face recognition system can complete the detection and recognition process in an instant, opening a door or revolving door in less than 500ms. This efficiency can eliminate the time associated with security personnel manually checking and managing credentials. Important tools. Modern face recognition solutions can be infinitely expanded to adapt to global enterprises. Therefore, face recognition as a credential is increasingly used in various applications, which go beyond traditional access control and physical security, including health and safety and labor management. All these features make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

The idea of ​​using smartphones or wearable devices as credentials for physical access control systems is widely welcomed. Smartphones can already perform a series of tasks beyond making calls. Shouldn't it be in the workplace to open the door? This is a simple idea, but there are obstacles for the industry to achieve its goals from here. We asked at this week’s expert panel roundtable: What are the challenges and advantages of mobile access control solutions? 

The rise of ethical facial recognition

Internet Video Technology for Safe City

Webcast: Access control integration improves security while reducing costs

Dahua Technology enhances Aerocharter's logistics and cargo handling system with artificial intelligence-based security solutions

Leonardo brought the ELSAG Fixed Plate Hunter LPR system to ensure the safety of the building and its surroundings

With Morphean's new cloud-based BI solution, Fotosylum's profit protection is improved

Dahua FSU6808U Environmental Monitoring Server

Secu365-cloud-based secure SaaS platform

"Pet corner installation Dahua video surveillance system" is one of the 8086 deep security application installation cases that this section focuses on. Regularly visit the latest updates of security product use cases, installation and deployment from Dahua Technology Co., Ltd., Southern Monitoring Service Co., Ltd., and City Security System.

SourceSecurity.com-Make the world safer Copyright © Notting Hill Media Limited 2000-2021, all rights reserved. Our other website: SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | Maritime Information Network

Understand how your organization has become safer and more efficient