Future of Video Surveillance Software

The peer-to-peer protocol differs from the familiar client-server architecture by the absence of a dedicated server, as each node simultaneously performs functions as both a client and a server.
The main part of the costs of cloud solution maintenance consists of expenses for traffic payment and the maintenance of encoding and decoding servers for video signal streams. P2P technologies eliminate such costs for the service provider. Signal servers are used for connection, which only connect cameras and remote devices to each other. As a result, P2P is characterized by more efficient use of the channel bandwidth. In this case, additional cloud retransmission and video processing is not required, which helps to save on the cost of maintaining the system.

VSaaS Solutions

The main part of the costs of cloud solution maintenance consists of expenses for traffic payment and the maintenance of encoding and decoding servers for video signal streams. P2P technologies eliminate such costs for the service provider. Signal servers are used for connection, which only connect cameras and remote devices to each other. As a result, P2P is characterized by more efficient use of the channel bandwidth. In this case, additional cloud retransmission and video processing is not required, which helps to save on the cost of maintaining the system.
Additional analytics in future versions:
  • Counting of visitors for specific time intervals, with analytical reports
  • Counting of number of cars for specific time intervals, with analytical reports
  • Counting of unidentified cars for specific time intervals, with analytical reports
  • Counting of regular visitors for specific time intervals, client identification, client database creation, and analytical reports on new and established clients.
  • Analysis of vehicle license plates for specific time intervals, visitor identification, car database creation and analytical reports
  • Analysis of restricted-area access
  • Analysis of foreign objects and security
  • Analysis of unidentified visitors
  • Analysis of visitor gender, appearance and behavior
  • Weather analysis and statistical reports
  • Analysis of employee/visitor emotional state
  • Analysis of employee workday, workplace manning analysis, access control system analysis
  • Personnel activities analysis and statistical reports
  • Lighting-use analysis, statistical reports and calculations of potential savings against the number of visitors and lights on, including the use of motion detectors for energy savings
  • Development of customized detection sensors and special reports.
The application can perform the following tasks: detection of moving people or vehicles; recognition of car license plates or QR codes imprinted in ID cards; detection of people in crowded environments, unattended objects within restricted areas; opposing-traffic-flow movement; detection of objects by shapes; and objects that disappear from the field of view (theft control).

Any of various inexpensive multi-channel recorders can be used instead of an expensive recorder, thus minimizing costs. Images from different recorders and web cameras can be processed via the Web Camera Pro network video server.
Today in Focus: