Skip to main content
Version: 1.2.0

Intrusion

Intrusion

An Intrusion alarm is triggered whenever a person or ground vehicle is detected in a restricted area. It has high accuracy and low false alarm rate even at long range and with different light conditions.

Uses 100 analysis slots by default - see the table below for resource usage percentages on specific hardware.

HardwareResource usage (percent)Solution number limit on device
Nvidia Jetson NX10%10
x86-641,4%71
  • Core technology: full body and ground vehicle detection.

  • Available classes: person, car, bus, truck, motorcycle, bicycle

  • Compatible with fixed, PTZ, and thermal cameras.

  • Areas of interest can be defined.

  • Send alarm notifications to third-party software.

New Intrusion

  1. Choose Intrusion by clicking on its box. Fill in the form, as follows:
  2. Name: A readable name of this alarm. This name will appear in the Events view and in all notifications.
  3. Armed: The alarm can be deactivated here. Armed by default.
  4. Schedule (optional): You can associate one of your previously defined Schedules with this alarm.
  5. Filter motionless objects (optional): Tick this button to exclude unmoving objects from being detected. Useful if you don't wish parking cars, for example, to trigger alarms.

Note: Using PTZ cameras in conjunction with motionless object filtering is not advised as this feature is designed with a still background (and therefore, fixed cameras) in mind.

  1. Cooldown: After an alarm is triggered, it won't be triggered again for the specified duration.

  2. Add Camera: Select a camera from the list.

Add Camera to Alarm
  • Draw Areas (ROI) (optional): Sometimes the alarm should be limited to a specific area of the video. If you would like to observe only a specific area, it can be determined here. Clicking this button makes the Camera Editor appear. Without ROI, the entire area will be observed.
Detection Size Settings
  • Set object size (optional): If you have a good idea of what pixel range the detected objects would fall into, you can customise the minimum and maximum height size of detections, in pixels, here. This would ensure that only objects that fit into that range would get detected, resulting in a further decrease in the number of false alarms.

    Move the the arrows by clicking and dragging them to help you determine the optimal values. Adjust the slider's endpoints on the bottom part of the screen to set the minimum / maximum values. Click Set sizes to save your changes, or Discard to cancel them.

    NOTE: Take care that any object below or above the set range will NOT be detected, possibly resulting in missing incidents. It is good practice to set the minimum size slightly below, and the maximum size slightly above the desired amount.

    For example: If using Ultinous AI Suite with a combination of radar and PTZ cameras, setting custom object sizes would result in detections only if the radar have detected movement - since setting the proper minimum size would rule out random noise causing false detections.

  • Sensitivity: The sensitivity of the detector can be fine tuned here. Lowering the sensitivity causes less false detections but decreases accuracy. Increasing it results in more alarms but may cause more false detections as well. The default sensitivity is Medium.

  • Object types: Choose any number of object types from this list (Person by default). Click Clear all to reset your selections.

  1. Click the Submit button to save your settings or proceed to Integration.

Integration (optional)

Ultinous AI Suite offers a wide range of possibilities when it comes to integration with third-party services. Follow the links below to read their respective entries in the guide.

  • HTTP webhook (Milestone XProtect or custom solution via alarm API) Enables / disables event sending: Use this feature to send triggered events to a third-party software with an optional snapshot image of the incident attached. Sends a HTTP POST request to the URL set below, with a content type of application/json. Read on to learn about the schema formatting. It is also possible to include an End of Event timestamp, which triggers if 5 seconds have passed without incidents after the initial event that triggered the HTTP message. End of Event occurs once the incident is over.

    The following information should be provided by the third-party software's administrator:

    • Target URL: The location of the API.

    • Header keys and values: Key and value of custom HTTP header. Click the Add button to add more Keys. To delete a Key, press the Trash icon next to it.

    • Trust all certificates: If enabled, HTTPS certification errors will be ignored.

      NOTE: Custom CA certificates can be uploaded in the Control Panel, under Trusted Certificates.

    • Enable snapshot attach (not applicable to Milestone XProtect): Off by default. If enabled, it fills in the snapshot field of the HTTP message schema in base64 encoded format.

    • Send end of event: Enables / disables End of Event sending. Note that the Cooldown setting of the Alarm has no effect on this.

      End of Event records are sent as part of HTTP messages. They are not available in Milestone XProtect or in e-mail format.

    • Send Test Event: To test your integration, click the Send Test Event button once the HTTP webhook settings are set.

  • Genetec Security Center

  • NX Witness / DW Spectrum / Wisenet WAVE

  • Google BigQuery

  • SMTP or Central Station Monitoring software