Tailgating
About
Tailgating
Tailgating occurs when access through a gate is granted to a single person but more than one person follows through the gate into the secured area
Deep Learning
The application counts and tracks the number of people crossing a gate. Objects such as backpacks and trolleys are not counted by the software.
Integration
Through an input/output module, the application is intergrated with the access control system, ensuring that each authorised entry is accessed by only one person.
Functions
Unauthorised entry
An unauthorised event occurs when either: 1. A person walks through the gate without badging. 2. A person tailgates in behind another.
Bypass mode
An unauthorised person uses a specific bypass card to allow the entry of people without a card. Bypass mode can also be initiated by a software trigger or by a simple switch located at a reception desk.
Notifications
The application automatically generates an alarm event upon unauthrorised entry. This alarm event can be integrated into other systems using either the I/O module or 20 additional notification protocols.
TRANSPORT
Detect fare evasion
Use Cases
WORKPLACE
Unauthorised entry into office buildings
EDUCATION
Unauthorised entry into education buildings
GYMS
Detect non member entries
System Architecture
Integrations
The events generated by the video analysis applications can be notified by e-mail, with the possibility of attaching a sequence of images with the metadata related to the event of interest.
FTP
Notifications can be sent to FTP servers (e.g. FileZilla, IIS), storing for each one a CSV file and a sequence of images with the metadata relating to the event of interest.
HTTP
A.I. Tech offers maximum integration with standard HTTP and HTTPS services. Notifications can be received by customizing requests to REST or CGI services to control remote devices (e.g. for PTZ handover mechanisms) or in JSON format, attaching one or more images to the event of interest on any third-party server.
UDP /TCP
The metadata associated with the events generated by the A.I. Tech can be received via text strings over configurable UDP / TCP protocols, such as those sent by POS systems.
MODBUS
A.I. Tech plugins can forward alarm notifications using the Modbus TCP protocol, according to the specifications outlined by the IEC 61158 Standard.
MQTT
A.I. Tech plugins can forward notifications using the publish-subscribe MQTT protocol, according to the specifications outlined by the ISO/IEC PRF 20922 standard.
ONBOARD
A.I. Tech also offers mechanisms to notify events of interest directly on board the device that processes the images. It is in fact possible to activate, through applications, the digital outputs on the AI-Appliance, the digital output of the Hanwha cameras and the notification mechanisms of the Axis cameras.
Eco System
Products from A.I. Tech are technologically compatible with the cameras of the largest international manufacturers, with the VMS of the most prestigious brands and they support protocols which are used in the field of IOT
Cameras
Hardware
VMS
Common Functions
of A.I. Tech Apps
Tampering
If your camera does not have this functionality, don't worry. All apps can generate when tampering events occur.
PTZ Handover
Do you need to control a PTZ camera when an event occurs? With the ability to trigger a sequence of HTTP calls, you can bring the camera to the desired pre-set, start the PTZ tracking (if available on the camera) and bring the PTZ camera back to the home position after a configurable amount of time.
Activation on a time basis
Apps can be activated on a time basis, only in specific time intervals, e.g. from 9 p.m to
8 a.m. In addition, for server or embedded apps, it is also possible to specify the day (e.g. Monday from 10am to 12pm., Tuesday from 6pm to 10pm.).
Masking
In all apps masking of moving objects can be activated, in order to be compliant with all kinds of privacy requirements.
AI-Dash-Embedded
This is the app's built-in dashboard, which allows you to have the data for the specific camera at your fingertips at all times ( even on camera, if you have an SD card).
​
​
​
Dynamic activation via software
In addition to time-scheduling, you can activate your apps dynamically, through software calls, via HTTP GET requests that allow you to operate in two modes: impulsive and level-based. In the first case you have a single START request and the app will remain active for a certain predefined amount of time. In the second case, you have one START request and one STOP request to control the app.
Neologic is a Technology partner providing cutting edge Ai computer vision solutions for Tailgating. In collaboration with our channel partners, we can provide a complete solution that comprises of optical sensors, algorithms, Ai hardware and communication equipment.​​