AxxonSoft has announced the release of version 4.11 of the Intellect PSIM. The new version provides neural network–based analytics, video wall management interface, automatic object tracking with a PTZ camera, support for Intel Quick Sync Video hardware decoding, and servers for ONVIF and SIP protocols.

The new release also includes updated versions of Face Intellect, POS Intellect, Auto Intellect, and Web Reporting subsystem, along with many other enhancements and improvements introduced.

Video Analytics

Neural Tracker

The neural tracker uses DNN (deep neural network) to recognize specific types of objects, e.g., humans or vehicles. The neural tracker tracks objects in motion, which allows the application of any VMD-based detection tool: motion in an area, line crossing, appearance/disappearance of an object, etc.

Detection based on the neural tracker can be applied to complex scenes with a large amount of non-relevant detail, whereas classic motion detection would be drowned out by false alarms.

One neural tracker can work with several individually set-up counters, with various detection zones

Object Counter

A neural tracker can be linked to a counter that will periodically report the number of objects within a specified area in the FOV. One neural tracker can work with several individually set-up counters, with various detection zones, reporting intervals, etc.

Neural Filter

The neural filter works in parallel with the standard tracker, which allows the detection only of moving objects of a specified type or abandoned objects, while ignoring all other movement in the FOV.

The results of their joint operation can be used by VMD-based detection tools in real time and recorded to a database that allows the quick location of objects of a specified type in recorded footage.

Custom training of neural networks

AxxonSoft offers custom training of the neural networks used by the neural tracker and neural filter

To deliver high-quality video analytics, AxxonSoft offers custom training of the neural networks used by the neural tracker and neural filter. For each particular project, these AI tools are trained with the help of videos shot on site.

Behavioral Analytics

The neural network analyzes video and generates data on the postures of people in the FOV. This data is processed by analytical algorithms which are capable of detecting specified postures, such as crouching, lying prone, shooting, with hands up, or the appearance of an individual in any posture.

Behavioral analytics detects potentially dangerous scenarios by specific postures, for example:

  • An individual crouched down next to an ATM could be a burglar;
  • One in a shooting position and other(s) with hands up could be an armed robbery.

Enhanced and Optimized

  • Added an option to save and recall templates for Forensic Search in Video Footage. A saved template can be re-used for further searches by using the same criteria.
  • Updated neural algorithms for fire and smoke detection. Added Alarm Expired events for these detection tools, and an option to select processing hardware: GPU or CPU.
  • Optimized memory consumption by the sweet-hearting neural detection tool that shows items not being swiped at the cash desk.
  • Improved the stopped vehicle detection tool.

Video Surveillance

  • Added Tag&Track Pro feature that automatically tracks an object with a PTZ camera using coordinates obtained from the fixed camera's tracker. To start tracking a moving object, just click on its image. The PTZ camera will track it until the object leaves the fixed camera's FOV.
  • Implemented support for the hardware decoding of H.264 streams using the Intel Quick Sync Video technology. The decoding is performed by an Intel GPU, which significantly reduces the Server's CPU load when applying video analytics, and the Client's CPU load when displaying video feeds.
  • Added an option to hide selected portions of an archive. The availability of the options of hiding records and viewing hidden archives depends on the assigned user rights. One can now also mask faces on exported videos. To make it possible, the neural network automatically locates faces in recorded footage. These functions are required to comply with privacy and data protection requirements, such as the GDPR.
  • Added an option to export videos from external storage, such as IP camera archives or NVRs. Added a comprehensive set of system events to audit operator's actions.

Communication Protocols

  • ONVIF Server - The ONVIF server is used for media streaming to external systems. It allows ONVIF clients to connect to an operating Intellect PSIM system, as they would to an ONVIF compatible device. Supported video streaming with synchronized audio in H.264/H.265/MPEG-4/MJPEG formats, multi-streaming, access to Video Footage, multicasting, authentication, and transmission of I/O events from devices and metadata.
  • SIP Server - The SIP server allows the Intellect PSIM to connect to intercom devices such as IP door stations and push plates, and to create and route calls. The server supports audio and video calls, which can be recorded for further monitoring. Security system operators can now communicate via a new SIP Panel client interface. Each device and SIP Panel is assigned a calling ID number, and address books containing available call numbers are set up on SIP Panels.
  • Other Protocols - Added support for the AMQP open messaging protocol, which allows the Intellect PSIM to receive and send RabbitMQ messages. Implemented the HTTP Server module, which is capable of sending events to an external system via HTTP polling.

The User Interface

Screen Manager

Screen Manager is a new UI for video wall management. It enables convenient monitor layout management on selected PCs. Screen Manager can be used to:

  • Create, edit, or delete layouts, and assign them to selected PCs;
  • Remotely switch layouts on PCs.

Operator Protocol

For objects linked to a camera, they can now display a still image or recorded video of an event

Operator Protocol is now completely revamped. Events list is now displayed as tiles, sortable by time and priority. Events processed by other operators are marked with a gray background, and their cells include the name of the Operator Protocol in which the processing has been completed. Users can now escalate an event to a specified operator.

The parameters displayed along with the event are now selectable. For objects linked to a camera, they can now display a still image or recorded video of an event and zoom in on the alarm snapshot in a separate window. If an object is linked to multiple cameras, users can scroll between their images and can set video display in the Camera Window or ActiveX component.

Set Bookmark checkbox

All buttons and comments are now located on a single upper panel. An operator can now select several events, and work with them simultaneously.

Another new feature added is a Set Bookmark checkbox for automatic creation of a bookmark in Video Footage when an event is processed by the operator. Operator's text comments are used for bookmark names.

Incident management

Additionally, a new feature added is the incident management function. If an operator selects an event, a list of required processing actions is displayed.

The operator selects the required checkboxes, and information about their actions is added to text comments along with date/time stamps. In addition, the operator can now view processing instructions for events from any source object.

Other new interfaces and enhancements

The object context menu on the Map now includes an option to set the number of recent events to be displayed (up to 99).

  • Introduced an option to request single frames or camera archives (also for cameras under a parent object) via the ActiveX component.
  • The Main Control panel now includes the following information about the system - product name and version, installed subsystems' names and versions, available system objects list and the number of used objects, and license expiration date.
  • Also added is a new graphs interface containing analog sensor data representations, and an interface allowing display of statistical data about objects' statuses as a table or a chart.

User Rights

  • Added support for Active Directory service, which enables synchronization between users and groups of the Intellect PSIM and their relevant Active Directory objects.
  • When creating a new user rights group, operators can now import settings from an existing group. If multiple groups are selected, their combination is created.
  • Added a setting to automatically shut down the session if the operator becomes idle.
  • Added an option to limit the list of available actions on objects in video surveillance monitor and Map UIs.
  • Added an option to disable frame/video export and printing a still frame from the video surveillance monitor.

Auto Intellect 5.5

  • Introduced a module that uses the neural network to detect vehicle types. The module is capable of classifying passenger cars, vans, buses, trucks, and motorcycles.
  • Integrated the IntLab container number recognition module.
  • Updated the IntelliVision car number recognition module. Added support for new national license plate formats and running recognition on GPU and increased overall recognition quality. Basic virtual loop is now replaced with the IntelliVision virtual loop.
  • The SDK for the AutoUragan LPR module is updated to version 3.7. Added new national formats and templates and increased operational stability.
  • Updated VIT LPR module to version 2.7.2. Added new national formats and templates, increased recognition quality and stability; the GUI now includes tools for fine-tuning the module.

Face Intellect 7.3

  • Integrated new YITU and SCT facial recognition modules. Updated VisionLabs facial recognition module to version 3.6.3.
  • In the Tevian engine, recognition of emotion, race, and facial attributes (glasses, mustache, beard, hair color, headwear, etc.) was added to the existing age and gender guesstimation capabilities. Facial recognition now warns of faces covered with masks etc. and performs "liveness" checks to preclude identity spoofing.
  • Operators can now use facial attributes for filtering, e.g., to find all males wearing glasses and/or with a beard. Emotion recognition allows you to evaluate the quality of personnel operations and the degree of customer satisfaction in banking, retail, and other industries.

The Face Search tab now includes filters by name, department, and similarity rate, time window presets, and saving search parameters (filters) option. Operators can now launch a filtered search by double clicking a facial image in the captured/recognized faces log.

Other new features:

  • The full names of recognized persons now appear on live video under the facial bounding box;
  • Users can now check an entire folder containing facial images against your DB;
  • Facial recognition now has a configurable capture area;
  • Facial DB replication across servers now allows a face to be added to all DBs by adding it to just one database.

POS Intellect 5.4

Integration of the screening system allows data to be received from connected devices

Integrated 5 models of POS terminals, 2 models of vehicle scales, a printer scales and the Sphinx screening management system that supports up to 5 handheld metal or metal/radiation detectors.

The integration of the screening system allows data to be received from connected devices, recorded to the POS Intellect DB, used for captioning screening videos, and utilized for searching by text comments in Video Footage. The integrated solution allows one to control equipment and personnel operations for more efficient and reliable screening.

In POS Intellect, existing integrations have been enhanced, and the wildcard search in captions has been introduced.

Intellect Web Report System 3.4

The web report subsystem now includes new and updated reports, and new functions have been introduced.

New Types of POS Reports -

  • A "sweet-hearting" report allows one to view event video live.
  • A canceled items report contains data filtered by specified cashiers and item names over a specified period.
  • A canceled amount report is similar to the one previously listed and includes the total value of canceled items.

New Types of Time and Attendance Reports

  • A consolidated employees report contains data on the total number of employees in specified departments, and the number of employees staying in a specified area at the moment of reporting, or on a specified time/date.
  • A detailed employees report contains data on the number of employees staying in a specified area during each day of a specified time period.

Other New Report Types -

  • A customer counter report contains information about the number of visitors who entered/exited a specified area over a specified period and is presented as a graph or as a table.
  • A graphical report on events represents the number of events of a specified type for the selected types of objects over a specified time period. The exported report includes both a graph and a table.
  • A pass card report contains information about the times of issuing pass cards for specified employees, or departments, as well as the types of cards and their expiration dates.
  • A recognized rail car numbers report contains information about error detection with a check digit and a photo from the linked camera.
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

Facial Recognition: Contactless Solutions For A Safe, Post-pandemic World
Facial Recognition: Contactless Solutions For A Safe, Post-pandemic World

Facial recognition technology has come a long way since it first came to market several years ago. Initially plagued with technical challenges and widely viewed as a futuristic solution, facial recognition is now firmly implanted in numerous consumer and business products and applications. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition, further expanding its use for an increasing number of applications. From a purely business perspective, facial recognition’s powerful identification and authentication capabilities make it ideal for two primary applications: first as a security tool, and second as a workforce management solution. The touchless, accurate credential solution Facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. By using an individual’s face as an access control credential, facial recognition eliminates the need and expense of physical cards and proximity devices, or the need to physically enter PIN codes. In addition, facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses by offering a highly accurate touchless access control credentialing solution. As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. With the growing popularity of facial recognition technology, there are many choices already available with more undoubtedly on the way. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers. Wide and near-angle LEDs Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognize faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries. 3D pixel intensity distribution analysis Another facial recognition reader advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimizes the effects of ambient light when acquiring facial images by minimizing lighting contrasts. As a result, it is easier for the algorithm to recognize the shape of the face, enabling it to extract more facial features and create higher quality face templates, which are critical for accurate facial recognition. Functional ergonomics This results in a faster, more comfortable, and convenient user experience The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. High performance processing Like any intelligent edge device, the performance of a facial recognition solution is directly reliant on its processing power. New advanced facial recognition readers deliver exceptional performance by employing enhanced face template extraction technology combined with powerful processor. For example, a facial recognition reader with a 1.4 GHz quad-core processor can perform up to 3,000 facial database matches (1:N) within one second. More advanced solutions also feature Group Matching functionality capable of executing up to 30,000 matches within one second. Live face detection It is most important that the facial recognition readers you evaluate are capable of analyzing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. Dual authentication for added security Although the use of an advanced facial recognition reader provides the convenience, health benefits and cost-savings of touchless identification and authentication, there are many applications where more than one credential may be necessary to ensure the highest levels of security. Advanced facial recognition readers with multimodal, multifactor credentialing capabilities provide this added security benefit. For example, facial recognition readers that support multiple RFID proximity devices supporting 125 kHz and 13.56 MHz provide varying degrees of protection and greater implementation versatility. Videophone or intercom capabilities Facial recognition readers with multifunctionality can solve several challenges with one solution Facial recognition readers with multifunctionality can solve several challenges with one solution. A perfect example includes devices with SIP (session initiation protocol) videophone capabilities which effectively eliminate the need and associated expense of  installing separate intercom devices while adding another layer of security to one’s facility. The COVID-19 pandemic, and hopefully soon to follow post-pandemic world, have surely accelerated the need for highly accurate, cost-efficient, and reliable facial recognition technologies to help get people back to work safely. Selecting the right facial recognition solution for your specific access control and/or workforce management is now more important than ever before, making a little extra due diligence during the evaluation process a smart decision.

Thermal Cameras and Smart Cities: Preventing COVID-19 in Public Places
Thermal Cameras and Smart Cities: Preventing COVID-19 in Public Places

With the pandemic still in full swing and no certainty as to when exactly it will come to an end, the world has been battling anxiety for months now. And with each day, circumstances change quickly and almost make it impossible to predict what will happen next, how events will unfold, and what actions to take in light of a new situation. But one thing is certain: the world has been shut down and paralyzed for way too long, and the eventual reopening is unavoidable – in fact, it’s well under way. In this situation, what is possible to control is how the world will continue reopening – and specifically, how to ensure the safest possible reopening that will ensure the return of some degree of normalcy to people’s lives and business operations, while also managing the risk of COVID’s spread in the most efficient way. Our highly digitised, technologically advanced world This is when the power of technology comes to rescue the day: what truly sets the global crisis we face today apart from other calamities that humanity has encountered over year is the fact that it has developed in a highly digitised, technologically advanced world where each day brings about innovations with a sole purpose to make daily life and operations easier and more streamlined. And among these, the star of the past decade has been artificial intelligence. The world has been shut down and paralyzed for way too long, and the eventual reopening is unavoidable – in fact, it’s well under way While AI has many avenues of introducing efficiency and fast problem-solving, there is one specific application that will further fuel the reopening of the world and successfully keep the spread of the virus abate. This “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. With such a level of sophistication that can ensure uninterrupted monitoring and analysis of large public spaces, these AI technologies can ideally operate best as cloud solutions to ensure a collaborative network with maximum scalability and widespread implementation. As these technologies increase in ubiquity and find their way into daily operations of businesses globally, the cost of the smart solutions will decrease proportionally to the growth of their reach. There are some highly specific ways to create this collaborative network of interconnected safety tools in the current climate. Here are some applications that have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. Maintaining social distancing practices The most important step everyone around the world has taken to contribute to the effort of slowing the spread of the virus has been social distancing. A six-foot-distance has become a new social norm that has quickly been adopted globally and become a habit to people who are naturally used to being close to others and socialising without giving distance a second thought. The star of the past decade has been artificial intelligence So, it is natural that such distancing measures take time to get accustomed to – and it is also natural that individuals may forget about them from time to time. To help maintain the six-foot distance between people at all times and give them slight nudges to keep the rule top of their minds, AI video technology can be trained to estimate the distance between individuals in public and commercial areas and identify the cases in which people get too close to each other. By notifying local merchants or authorities about such cases, the system can help ensure the safety of everyone in the area at all times while positively reinforcing the public to gradually get more accustomed to maintaining the distance and thus helping stop the spread of the virus. Detecting the virus through facial recognition Perhaps the straightforward application of such high-level technology is using video surveillance to identify persons of interest who have tested positive for the virus. Modern AI has the ability to identify facial features and characteristics with a unique level of granularity, making it possible to identify individuals whose records show they have antibodies from those who can be potential carriers of the virus. After the initial differentiation and identification, the system can then notify the employers and employees of the facility about the results of the conducted analysis and the pursuant results, allowing them to be more vigilant and take action where necessary to ensure a safe experience for everyone. PPE reinforcement Wearing a mask or some sort of face coverage in public spaces and especially within facilities (such as stores, for instance) has been - and will continue to be - a requirement for maintaining a safe and healthy environment for people to continue with their day-to-day lives and businesses to resume regular operations. To this extent, the object detection and identification abilities of smart cameras can further reinforce this requirement and ensure that the absence of protective equipment doesn’t go unnoticed.  Essentially, these cameras can easily identify if an individual has coverage at any given point of time or not, notifying the local authorities about any risks immediately and helping them maintain necessary safety measures without having to interrupt their workflow or worry about missing a visitor without a mask. Detecting high temperature One of the key (and the most widespread) symptoms of COVID-19 is a high fever - a certain indicator of whether an individual may have been infected with the virus or not. While identifying fever with a regular human eye is nearly impossible, AI can do so at a fraction of time by quickly scanning body temperatures of any incoming individuals and determine whether it’s above CDC’s recommended temperature of 100.4F in order to determine the risk factor and notify the local authorities to take action. Modern AI has the ability to identify facial features and characteristics with a unique level of granularity This technology is a good tactic to objectively assess potential risks that come with elevated temperatures - and sometimes, the people themselves might not realize they might (unconsciously) be carriers of the virus and thus endanger the safety of others in their vicinity. The technology is yet another step towards ensuring a safer reopening of the global economy and a more streamlined way of getting back on track while minimizing the risk of spreading the virus further. It’s not all about the theory  We have tested the described approaches in our own R&D campus in Europe. The latest release of the IREX cloud enables remote fever detection and monitoring of social isolation and mask policies with AI. We have integrated thermal cameras to detect people with elevated temperature and CCTV cameras for identification and notifying those who potentially ill. In case of any health threat, the venue manager gets an instant message with a picture and exact location. These preventive steps helped our employees return to the office months earlier than it's happening in other countries. Moreover, personnel coming back to the office by their own wish as now they feel a virus-free environment in the campus - even safer than in their own homes. Now we are launching a pilot project for a well-known pharmacy chain in Florida, USA. With the help of a Computer Vision platform, staff will be able to divide customer traffic into those with normal body temperature and those who come in with elevated temperatures, as well as effectively monitor social distance norms. The goal of our potential client is to maximize the safety of customers in the post-pandemic period. Also, IREX is already deployed across hundreds of locations in the UK and will add health monitoring capability soon.

Can CCTV Become A More Effective Tool?
Can CCTV Become A More Effective Tool?

We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line.  How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location.  Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.