top of page
Tailgating

Tailgating

Custom Solution
The computer vision application from A.I. Tech enables the ability to monitor, count and track the number of people entering a secure area.

About 

Tailgating

Tailgating occurs when access through a gate is granted to a single person but more than one person follows through the gate into the secured area

Deep Learning

The application counts and tracks the number of people crossing a gate. Objects such as backpacks and trolleys are not counted by the software.

Integration

Through an input/output module, the application is intergrated with the access control system, ensuring that each authorised entry is accessed by only one person.

REVIEW

Review the tailgating event either through the Ai Devices web interface or via the gym survelliance system.

BOOKMARK

Automatically bookmark the tailgating event on the recorded video survelliance for fast and efficient retrieval.

If required the bookmarked video can easily be exported to assist with corroboration from an offending member.

EXPORT

Functions

Unauthorised entry

An unauthorised event occurs when either: 1. A person walks through the gate without badging. 2. A person tailgates in behind another.

Bypass mode

An unauthorised person uses a specific bypass card to allow the entry of people without a card. Bypass mode can also be initiated by a software trigger or by a simple switch located at a reception desk.

Notifications

The application automatically generates an alarm event upon unauthrorised entry. This alarm event can be integrated into other systems using either the I/O module or 20 additional notification protocols.

Transport Tailgating

TRANSPORT

Detect fare evasion

Use Cases

AdobeStock_140707042.jpeg

WORKPLACE

Unauthorised entry into office buildings

Education tailgating

EDUCATION

Unauthorised entry into education buildings

Tailgating Image_edited.jpg

GYMS

Detect non member entries

System Architecture

Integrations

EMAIL

The events generated by the video analysis applications can be notified by e-mail, with the possibility of attaching a sequence of images with the metadata related to the event of interest.

FTP

Notifications can be sent to FTP servers (e.g. FileZilla, IIS), storing for each one a CSV file and a sequence of images with the metadata relating to the event of interest.

HTTP

A.I. Tech offers maximum integration with standard HTTP and HTTPS services. Notifications can be received by customizing requests to REST or CGI services to control remote devices (e.g. for PTZ handover mechanisms) or in JSON format, attaching one or more images to the event of interest on any third-party server.

UDP /TCP

The metadata associated with the events generated by the A.I. Tech can be received via text strings over configurable UDP / TCP protocols, such as those sent by POS systems.

MODBUS

A.I. Tech plugins can forward alarm notifications using the Modbus TCP protocol, according to the specifications outlined by the IEC 61158 Standard.

MQTT

A.I. Tech plugins can forward notifications using the publish-subscribe MQTT protocol, according to the specifications outlined by the ISO/IEC PRF 20922 standard.

ONBOARD

A.I. Tech also offers mechanisms to notify events of interest directly on board the device that processes the images. It is in fact possible to activate, through applications, the digital outputs on the AI-Appliance, the digital output of the Hanwha cameras and the notification mechanisms of the Axis cameras.

Eco System

Products from A.I. Tech are technologically compatible with the cameras of the largest international manufacturers, with the VMS of the most prestigious brands and they support protocols which are used in the field of IOT

Computer Vision camera

Cameras

Hanwha_Group-Logo.wine.png
mobotix
i-pro
Hardware

Hardware

openvino.png
Nvidia

VMS

arteco
axis-communication
milestone
NetworkOptics
qonity
avigilon
genetec
mobotix
panasonic
wave
wavestore

Common Functions
of A.I. Tech Apps

Tampering

If your camera does not have this functionality, don't worry. All apps can generate when tampering events occur.

PTZ Handover

Do you need to control a PTZ camera when an event occurs? With the ability to trigger a sequence of HTTP calls, you can bring the camera to the desired pre-set, start the PTZ tracking (if available on the camera) and bring the PTZ camera back to the home position after a configurable amount of time.

Activation on a time basis

Apps can be activated on a time basis, only in specific time intervals, e.g. from 9 p.m to

8 a.m. In addition, for server or embedded apps, it is also possible to specify the day (e.g. Monday from 10am to 12pm., Tuesday from 6pm to 10pm.).

Masking

In all apps masking of moving objects can be activated, in order to be compliant with all kinds of privacy requirements.

AI-Dash-Embedded

This is the app's built-in dashboard, which allows you to have the data for the specific camera at your fingertips at all times ( even on camera, if you have an SD card).

​

​

​

Dynamic activation via software

In addition to time-scheduling, you can activate your apps dynamically, through software calls, via HTTP GET requests that allow you to operate in two modes: impulsive and level-based. In the first case you have a single START request and the app will remain active for a certain predefined amount of time. In the second case, you have one START request and one STOP request to control the app.

A.i Camera icon
Dashboard icon

Neologic is a Technology partner providing cutting edge Ai computer vision solutions for Tailgating. In collaboration with our channel partners, we can provide a complete solution that comprises of optical sensors, algorithms, Ai hardware and communication equipment.​​

Ready to get in touch ?

Contact Us

Explore how we can tailor our services to meet your specific needs.  

bottom of page