GeoVision GV-3D People Counter V3 Käyttöohje

GeoVision Turvakamera GV-3D People Counter V3

Lue alta 📖 käyttöohje suomeksi merkille GeoVision GV-3D People Counter V3 (64 sivua) kategoriassa Turvakamera. Tämä opas oli hyödyllinen 9 henkilölle ja sai 4.5 tähden keskimäärin 2 käyttäjältä

Sivu 1/64
Before attempting to connect or operate this product,
please read these instructions carefully and save this manual for future use.
User’s Manual
GV-3D People Counter V3
3DPCV2-A
© 2024 GeoVision, Inc. All rights reserved.
Under the copyright laws, this manual may not be copied, in whole or in part, without
the written consent of GeoVision.
Every effort has been made to ensure that the information in this manual is accurate.
GeoVision, Inc. makes no expressed or implied warranty of any kind and assumes no
responsibility for errors or omissions. No liability is assumed for incidental or
consequential damages arising from the use of the information or products contained
herein. Features and specifications are subject to change without notice.
GeoVision, Inc.
9F, No. 246, Sec. 1, Neihu Rd.,
Neihu District, Taipei, Taiwan
Tel: +886-2-8797-8377
Fax: +886-2-8797-8335
http://www.geovision.com.tw
Trademarks used in this manual: , the GeoVision GeoVision logo and GV series
products are trademarks of GeoVision, Inc. is the registered trademark of Windows
October 4 202
Scan the following QR codes for product warranty and technical support
policy:
[Warranty] [Technical Support Policy]
The following symbols or words may be found in this manual.
Symbols/Words
Description
Warning
Indicates a medium or low potential hazardous situation
which , if not avoided, will or could result in slight or
moderate injury
Caution
Indicates a potential risk which, if not avoided, will or
could result in device damage, data loss, lower
performance or unexpected results
Note
Provides additional information to emphasize or
supplement important points of the text.
About the Manual
This manual is suitable for many models. All examples, screenshots, figures,
charts, and illustrations used in the manual are for reference purpose, and
actual products may be different with this Manual.
Please read this user manual carefully to ensure that you can use the device
correctly and safely.
Within the maximum scope permitted by the law, the products described in this
Manual (including hardware, software, firmware, etc.) are provided “AS IS”. The
information in this document (including URL and other Internet site reference
data) is subject to change without notice. This Manual may contain technical
incorrect places or printing errors. This information will be periodically updated,
and these changes will be added into the latest version of this Manual without
prior notice.
Use of the Product
This product should not be used for illegal purposes.
The company does not allow anyone to use the Company's products to infringe
the privacy, personal information, and portrait rights of others. The user shall not
use this product for any illegal use or any prohibited use under these terms,
conditions, and declarations. When using this product, the user shall not
damage, disable, overload or obstruct any of the hardware of this product in any
way, or interfere with the use of this product by any other users. Also, the user
should not attempt to use the product or the software, by hacking, stealing the
password, or any other means.
Dome cover is an optical device, please don't touch or wipe the cover surface
directly during installation and use. For dust, use oil-free soft brush or hair dryer
to remove it gently; for grease or finger print, use oil-free cotton cloth or paper
soaked with detergent to wipe from the lens center outward. Change the cloth
and wipe several times if it is not clean enough.
Privacy Protection
When installing cameras in public areas, a warning notice shall be given in a
reasonable and effective manner and clarify the monitoring range.
As the device user or data controller, you might collect the personal data of
others, such as face, car plate number, etc. As a result, you shall implement
reasonable and necessary measures to protect the legitimate rights and interests of
other people, avoiding data leakage, improper use, including but not limited to,
setting up access control, providing clear and visible notice to inform people of the
existence of the surveillance area, providing required contact information and so on.
Disclaimer
With regard to the product with internet access, the use of product shall be wholly
at your own risks. Our company shall be irresponsible for abnormal operation, privacy
leakage or other damages resulting from cyber attack, hacker attack, virus
inspection, or other internet security risks; however, Our company will provide timely
technical support if necessary.
Surveillance laws vary from country to country. Check all laws in your local region
before using this product for surveillance purposes. We shall not take the
responsibility for any consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters,
numbers, and upper and lower case letters should be used in your password.
Regularly change the passwords of your devices to ensure that only authorized
users can access the system (recommended time is 90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-
443, etc.) to reduce the risk of outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important
ports cannot be closed (like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is
necessary to be exposed to the public network, please set the external hardware
firewall and the corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS
certificate to enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except
those specified IP addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or
modem. It is really very convenient for users, but this will increase the risk of data
leakage when the system automatically forwards ports. Disabling UPnP is
recommended when the function is not used in real applications.
Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you
which IP addresses were used to log in your system and what was accessed.
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the
party responsible for compliance could void the users authority to operate the
equipment.
1. FCC compliance
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate radio frequency energy,
and if not installed and used in accordance with the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
2. FCC conditions:
This device complies with part 15 of the FCC Rules. Operation of this product is
subject the following two conditions:
This device may not cause harmful interface.
This device must accept any interference received, including interference that
may cause undesired operation.
RoHS
The products have been designed and manufactured in accordance with Directive
EU RoHS Directive 2011/65/EU and its amendment Directive EU 2015/863 on the
restriction of the use of certain hazardous substances in electrical and electronic
equipment.
2012/19/EU (WEEE directive): The Directive on waste electrical and
electronic equipment (WEEE Directive). To improve the environmental
management of WEEE, the improvement of collection, treatment and
recycling of electronics at the end of their life is essential. Therefore, the
product marked with this symbol must be disposed of in a responsible
manner.
Directive 94/62/EC: The Directive aims at the management of packaging and
packaging waste and environmental protection. The packaging and packaging waste
of the product in this manual refers to must be disposed of at designated collection
points for proper recycling and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization
and Restriction of Chemicals, which aims to ensure a high level of protection of
human health and the environment through better and earlier identification of the
intrinsic properties of chemical substances. The product in this manual refers to
conforms to the rules and regulations of REACH. For more information of REACH,
please refer to DG GROWTH or ECHA websites.
Contents
Chapter 1 Network Camera ................................................................................................ 1
1.1 Wired Network Connection ......................................................................... 1
1.1.1 Access through GV-IP Device Utility ............................................... 1
1.1.2 Directly Access through Edge Mode IE .......................................... 3
1.1.3 WAN .................................................................................................... 4
Chapter 2 Live View ............................................................................................................. 7
Chapter 3 Network Camera Configuration ..................................................................... 9
3.1 System Configuration .................................................................................. 9
3.1.1 Basic Information ............................................................................... 9
3.1.2 Date and Time ................................................................................... 9
3.1.3 Local Cong ..................................................................................... 10
3.1.4 Storage ............................................................................................. 11
3.2 Image Configuration .................................................................................. 13
3.2.1 Display Conguration ...................................................................... 13
3.2.2 Video / Audio Conguration ........................................................... 16
3.2.3 OSD Conguration .......................................................................... 18
3.2.4 ROI Conguration ............................................................................ 19
3.3 Alarm Configuration ................................................................................... 20
3.3.1 Motion Detection .............................................................................. 20
3.3.2 Exception Alarm ............................................................................... 21
3.3.3 Alarm In ............................................................................................. 23
3.3.4 Alarm Out ......................................................................................... 24
3.3.5 Alarm Server .................................................................................... 25
3.3.6 Audio Alarm ...................................................................................... 25
3.4 Event Configuration ................................................................................... 27
3.4.1 Video Exception ............................................................................... 27
3.4.2 People Counting .............................................................................. 29
3.5 Network Configuration ............................................................................... 35
3.5.1 TCP/IP ............................................................................................... 35
3.5.2 Port .................................................................................................... 36
3.5.3 DDNS ................................................................................................ 37
3.5.4 SNMP ................................................................................................ 39
3.5.5 802.1x ............................................................................................... 40
3.5.6 RTSP ................................................................................................. 40
3.5.7 UPNP ................................................................................................ 41
3.5.8 Email . ................................................................................................ 42
3.5.9 FTP .................................................................................................... 43
3.5.10 HTTP POST ................................................................................ 44
3.5.11 HTTPS ......................................................................................... 45
3.5.12 QoS .............................................................................................. 46
3.5.13 TS Multicast ................................................................................ 46
3.6 Security Configuration ............................................................................... 47
3.6.1 User Configuration .......................................................................... 47
3.6.2 Online User ...................................................................................... 49
3.6.3 Block and Allow Lists ...................................................................... 49
3.6.4 Security Management ..................................................................... 49
3.7 Maintenance Configuration ....................................................................... 50
3.7.1 Backup and Restore ....................................................................... 50
3.7.2 Reboot ............................................................................................... 51
3.7.3 Upgrade ............................................................................................ 52
3.7.4 Operation Log .................................................................................. 52
Chapter 4 Search ................................................................................................................ 53
4.1 Image Search .............................................................................................. 53
4.2 Video Search .............................................................................................. 55
4.2.1 Local Video Search ......................................................................... 55
4.2.2 SD Card Video Search ................................................................... 56
Appendix .............................................................................................................................. 58
1
Chapter 1 Network Camera
System Requirement
For proper operating the product, the following requirements should be met for your
computer.
Operating System: Windows 7 Home basic or higher
CPU: 2.0GHz or higher
RAM: 1G or higher
Display: 1920*1080 resolution or higher (recommended)
Web browser: / Microsoft Edge / Firefox /
Microsoft Edge IE Mode (plug-in req red)ui
Safari / Google Chrome
It is recommended to use the latest version of these web browsers.
The menu display and operation of the camera may be slightly different by using the
browser with plug-in or without plug-in. Installing the plug-in will display more
functions of the camera.
1.1 Wired Network Connection
1.1.1 Access through GV-IP Device Utility
Network connection:
When the camera is connected to LAN with t DHCP server, it is automatically a he
allocated a dynamic IP address. Follow the steps below to look up its IP address, and
then use th address to access its Web interface.at
1. Make sure the PC and the camera are connected to the same LAN, and GV-IP
Device Utility is installed on the PC from our .
website
2. On the GV-IP Device Utility window, click the button to search for IP devices
connected to the same LAN. To sort, click the Name Mac Address or column.
2
3. Find the camera with its Mac Address, and click on its IP address.
4. For first-time users, you are requested to create a password.
5. Type a new password and click OK.
6. Click its IP address on the Utility window again and select to access Web Page
its Web interface.
7. Type the set password on the login page and click . Login
Note:
1. The Administrators default username is and cannot be modified.admin
2. To change the password using the GV-IP Device Utility, click on the camera’s
IP address, and select . Alternatively, you can Configure > Change Password
change the password on the camera’s Web interface by clicking
Config Security>User> ; see “Modify User” in .3.6 Security Configuration.1
3
1.1.2 Directly Access through Edge ModeIE
The default network s tings are as shown below:et
IP address: 192.168.0.10
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port: 9008
Use the above default settings when logging in the camera for the first time. Directly
connect the camera to the computer through network cable.
Manually set the IP address of the PC and the network segment should be as the
same as the default settings of the IP camera. Open the network and share center.
Click “Local Area Connection” to pop up the following window.
4
Select “Propert and then select internet protocol according to the actual situation ies
(for example: IPv4). Next, click the “Properties” button to set the network of the PC.
Open the Edge browser IE mode and enter the default address of IP camera in
and confirm.
Follow directions to download and install the Active X control.
Enter the default username and password in the login window and then enter to
view.
1.1.3 WAN
Access through the router or virtual server
Make sure the camera is connected to the local network and then log in the camera
via LAN and go to menu to set the port number.Config Network Port
Port Setup
5
Go to menu to modify the IP address.Config Network TCP/IP
IP Setup
Go to the routers management interface through the Edge browser in IE mode to
forward the IP address and port of the camera in the “Virtual Server”.
Router Setup
Open the Edge browser in IE mode and enter its WAN IP and http port to access.
(for example, if the http port is changed to 81, please enter “192.198.1.201:81” in the
address bar of web browser to access).
7
Chapter 2 Live View
After logging in, the following window will be shown.
The following table is the instructions of the icons on the live view interface.
Icon
Description
Icon
Original size
Fit correct scale
Auto (ll the window)
Full screen
Start/stop live view
Enable/disable alarm
output
Enable/disable audio
alarm
Start/stop two-way
audio (only available for
the model with audio
input connector)
Enable/disable audio
Snapshot
8
Icon
Description
Icon
Start/stop local
recording
Zoom in
*Those smart alarm indicators will flash only when the camera supports those
functions and the corresponding events are enabled.
*After clicking the audio alarm icon, the sound warning will be triggered according to
the set warning times (you can set the warning times by clicking
Config Alarm Audio Alarm
). Click this icon again. After the current warning voice
completely sounds, it will stop.
* TPlug-in free live view: wo-way audio and local recording are not supported and
the preview mode switch (real-time/balanced/fluent mode) not available too.is
In full screen mode, double click on the mouse to exit or press the ESC key on the
keyboard.
9
Chapter 3 Network Camera
Configuration
In the the conguration interface. Webcam client, choose “Config” to go to
Note: Wherever applicable, click the “Save” button to save the settings.
3.1 System Configuration
3.1.1 Basic Information
In the “ Basic Information interface, the system information of the device is listed.
3.1.2 Date and Time
Go to Cong System Date and Time
.
10
Select the time zone and DST as required.
Note: The time zone of the camera and the computer must be the same. It is
recommended to modify the time zone of the camera according to the time zone of
the computer. If the time zone of the computer is modied, the current web client
needs to be closed. Then re-open it and log in again.
Click the “Date and Time” tab to set the time mode and time format.
3.1.3 Local Cong
Go to to set up the storage path of captured Cong System Local Cong
pictures and recorded videos on the local PC There is also an option to enable or .
disable the bitrate display in the recorded les.
Additionally, “Local smart snapshot storage” can be enabled or disabled here. If
enabled, the captured pictures triggered by smart events will be saved to the local
PC.
Note: when you access your camera by the web browser without the plug-in, only
Show Bitrate can be set in the above interface.
11
3.1.4 Storage
Go to to go to the interface as shown below. Cong System Storage
SD Card Management
C . All data will be cleared by clicking lick the “Format” button to format the SD card
this button.
Click the “ Eject button to stop writing data to SD card. Then the SD card can be
ejected safely.
Snapshot Quota: Set the capacity proportion of captured pictures on the SD card.
Video Quota: Set the capacity proportion of record les the SD card. on
Schedule Recording Settings
1. Go to to go to the interface as shown Cong System Storage Record
below.
2. Set record stream, pre-record time, cycle writing.
Pre Record Time: Set the time to record before the actual recording begins.
12
3. Set schedule recording. C edule. heck “Enable Schedule Record” and set the sch
Week schedule ly
Set the alarm time from Monday to Sunday for a single week Each day is divided in .
one-hour increments. Green means scheduled. Blank means unscheduled.
“Add”: Add the schedule for a special day. Drag the mouse to set the time on the
timeline.
“Erase”: Delete the schedule. Drag the mouse to erase the time on the timeline.
Manual Input: Click it for a specic day to enter specic start and end times. This
adds more granularities (minutes).
Day schedule
Set the alarm time for alarm a special day, such as holiday. a
Note: Holiday schedule takes priority over week schedule. ly
13
Snapshot Settings
Go to to go to the interface as shown below Cong System Storage Snapshot
.
Set the format, resolution and quality of the image saved the SD card and the on
snapshot interval and quantity the timing snapshot here. and
Snapshot Quantity: The number you set here is the maximum quantity of
snapshots. The actual quantity of snapshots may be less than this number.
Supposing the occurrence time of an alarm event is less than the time capturing of
pictures the actual quantity of snapshots is less than the set quantity of snapshots. ,
Timing Snapshot: Enable timing snapshot rst and then set the snapshot interval
and schedule. The setup steps of schedule are the same as the schedule recording
(See
Schedule Recording).
3.2 Image Configuration
3.2.1 Display Conguration
Go to interface as shown below. rightness, contrast, Image Display
The image’s b
hue and saturation and so on for common, day and night mode can be set up
separately. The image eect can be quickly seen by switching the conguration le.
14
Brightness: Set the brightness level of the camera’s image.
Contrast: Set the color dierence between the brightest and darkest parts.
Hue: Set the total color degree of the image.
Saturation: Set the degree of color purity. The purer the color, the brighter the image
is.
Sharpness: Set the resolution level of the image plane and the sharpness level of
the image edge.
Noise Reduction: Decrease the noise and make the image more thorough.
Increasing the value will make the noise reduction eect better but it will reduce the
image resolution.
Defog: Activating this function and setting an appropriate value as needed in foggy,
dusty, smoggy or rainy environment to get clear images.
Backlight Compensation (BLC):
O: disables the backlight compensation function. It is the default mode.
HWDR: WDR can adjust the camera to provide a better image when there are
both very bright and very dark areas simultaneously in the eld of the view by
lowering the brightness of the bright area and increasing the brightness of the dark
area.
Recording will be stopped for a few seconds while the mode is changing from non-
WDR to WDR mode.
HLC lowers the brightness of the entire image by suppressing the brightness of :
the image’s bright area and reducing the size of the halo area.
15
BLC: If enabled, the auto exposure will activate according to the scene so that the
object of the image in the darkest area will be seen clearly.
Antiicker:
O: disables the anti-icker function. This is used mostly in outdoor installations.
50Hz: reduces icker in 50Hz lighting conditions.
60Hz: reduces icker in 60Hz lighting conditions.
Smart IR: Choose “ON” or “OFF”. This function can effectively avoid image
overexposure so as to make the image more realistic. The higher the level is, the
more overexposure compensation will be given.
White Balance: Adjust the color temperature according to the environment
automatically.
Day/Night Mode: Choose “Auto”, “Day”, “Night” or “Timing”.
Shutter Mode: Choose “Auto” or “Manual”. If manual is chosen, the digital shutter
speed can be adjusted.
Gain Mode: Choose “Auto” or “Manual”. If “Auto” is selected, the gain value will be
automatically adjusted (within the set gain limit value) according to the actual
situation. If “Manual” is selected, the gain value shall be set manually. The higher the
value is, the brighter the image is.
Frequency: 50Hz and 60Hz can be optional.
Infra-red Mode: Choose “Auto”, “ON” or “OFF”.
Note: For some items (like HWDR), if selected/enabled, the camera will reboot
automatically. After that, clicking “Default” button will not take effect.
Schedule Settings of Image Parameters:
Click the “ ” tab as shown below.Prole Management
Set full time schedule for common, auto mode and specied time schedule for day and
night. Choose “ ” in the dropTiming -down box of schedule as shown below.
16
Drag “ ” icons to set the time of day and night. Blue means day time and blank means
night time. If the current mode of camera parameters is set to schedule, the image
conguration mode will automatically switch between day and night according to the
schedule.
3.2.2 Video / Audio Conguration
Go to interface as shown below. In this interface, set the Image Video/Audio
resolution, frame rate, bitrate type, video quality and so on subject to the actual network
condition.
Three video streams can be adjustable.
Resolution: The size of image.
Frame rate: The higher the frame rate, the video is smoother.
Bitrate type: CBR and VBR are optional Bitrate is related to image quality. CBR .
means that no matter how much change is seen in the video scene, the compression
bitrate will be kept constant. VBR means that the compression bitrate will be adjusted
according to scene changes For example, for scenes that do not have much .
movement, the bitrate will be kept at a lower value. This can help optimize the network
bandwidth usage.
Bitrate: it can be adjusted when the mode is set to CBR. The higher the bitrate, the
better the image quality will be.
Video Quality: It can be adjusted when the mode is set to VBR. The higher the image
quality, the more bitrate will be required.
I Frame interval: It determines how many frames are allowed between a “group of
pictures”. When a new scene begins in a video, until that scene ends, the entire
group of frames (or pictures) can be considered as a group of pictures. If there is not
much movement in the scene, setting the value higher than the frame rate is fine,
potentially resulting in less bandwidth usage. However, if the value is set too high,
and there is a high frequency of movement in the video, there is a risk of frame
skipping.
17
Video Compression: MJPEG,H264+, H264, H265 H265+ can be optional. or
MJPEG is not available for main stream. If H.265/H.265+ is chosen, make sure the
client system is able to decode H.265/H.265+ Compared to H.265, H.265+ saves .
more storage space with the same maximum bitrate in most scenes. Compared to
H.264, H.265 reduces the transmission bitrate under the same resolution, frame rate
and image quality.
Profile: For H.264. Baseline, main and high profiles are selectable.
Send Snapshot: Set the snapshot stream.
Video encode slice split: f I this function is enabled, smooth image can be gotten
even though using the low-performance PC.
Watermark: When playing back the local recorded video in the search interface, the
watermark can be displayed. To enable it, check the watermark box and enter the
watermark text.
Click the “Audio” tab to go to the interface as shown below.
Audio Encoding: G711A and G711U are selectable.
Audio Type: MIC or LIN.
Audio Output: Talkback, warning or auto can be optional. If “Talkback” is selected, the
built-in speaker will be used to output sound for two-way talk. If “Warning” is selected,
the built-in speaker will be used to output the pre-defined audio alarm. If “Auto” is
selected, the system will output sound for two-way talk or warning voice as needed.
But when it is warning and two-way audio is being enabled simultaneously, two-way
audio will be output first.
Speaker: Talkback, warning or auto can be optional. If “Talkback” is selected, the built-
in speaker will be used to output sound for two-way talk. If “Warning” is selected, the
built-in speaker will be used to output the pre-defined audio alarm. If “Auto” is selected,
the system will output sound for two-way talk or warning voice as needed. But when it
is warning and two-way audio is being enabled simultaneously, two-way audio will be
output first.
Audio Out Volume: Set the volume of the speaker as needed.
LIN/MIC IN/Audio Out Volume: Set it as needed.
18
3.2.3 OSD Conguration
Go to interface as shown below. Image OSD
Set time stamp, device name OSD content and picture overlap here. After enabling ,
the corresponding display and entering the content, drag them to change their
position. Then c lick the “Save” button to save the settings.
Picture Overlap Settings:
Check “OSD Content1”, choose “Picture Overlay” and click “Browse” to select the
overlap picture. Then click “Upload” to upload the overlap picture. The pixel of the
image shall not exceed 200*200, or it cannot be uploaded.
19
3.2.4 ROI Conguration
Go to Image ROI Config
interface as shown below. An area in the image can be set
as a region of interest. This area will have a higher bitrate than the rest of the image,
resulting in better image quality for the identied area.
1. Check “Enable” and then click “Draw Area” button.the
2. Drag the mouse to set the ROI area.
3. Set the level.
4. Click the “Save” button to save the settings.
20
3.3 Alarm Configuration
3.3.1 Motion Detection
Go to to set motion detection alarm. Alarm Motion Detection
1. motion-based alarms. If unchecked, the Check “Enable” check box to activate
camera will not send out any signals to trigger motion-based recording to the NVR or
CMS, even if there is motion in the video.
Alarm Holding Time: it refers to the time that the alarm extends for after an alarm
ends. For instance, if the alarm holding time is set to 20 seconds, once the camera
detects a motion, it will go to alarm and would not detect any other motion in 20
seconds. If there is another motion detected during this period, it will be considered
as continuous movement; otherwise, it will be considered as a single motion.
Alarm Out: If selected, this will trigger an external relay output that is connected to
the camera on detecting a motion-based alarm.
Trigger Audio Alarm: If selected, the warning voice will sound on detecting a
motion-based alarm. (Please set the warning voice rst. See for details).
Audio Alarm
Trigger SD Card Snapshot: If selected, the system will capture images on motion
detection and save the images on an SD card.
Trigger SD Card Recording: If selected, video will be recorded on an SD card on
motion detection.
21
Trigger Email: If “Trigger E mail and “Attach Picture are checked (email address
must be set rst in the ail conguration interface), the captured pictures and Em
triggered event will be sent into those addresses.
Trigger FTP: If ttach Picture are checked, the captured pictures “Trigger FTP” and “A
will be sent into FTP server address. Please refer to FTP conguration section for
more details.
2. Set motion detection area and sensitivity. Click the “Area and Sensitivity” tab to go
to the interface as shown below .
Move the “Sensitivity” scroll bar to set the sensitivity. Higher sensitivity value means
that motion will be triggered more easily.
Select rag the mouse to draw the motion detection area; “Add” and click “Draw”. D
Select “Erase” and drag the mouse to clear motion detection area.
After that, c lick the “Save” to save the settings.
3. Set the schedule for motion detection. The schedule setup steps of the motion
detection are the same as the schedule recording setup (See
Schedule Recording).
3.3.2 Exception Alarm
SD Card Full
1. Go to . Cong Alarm Exception Alarm SD Card Full
22
2. Enable . Click “
3. Set the alarm holding time and alarm trigger options. The setup steps are the same
as motion detection. Please refer to motion detection section for details.
SD Card Error
When there are some errors in writing SD card, the corresponding alarms will be
triggered.
1. Go to as shown below. Cong Alarm Exception Alarm SD Card Error
2. Click “Enable”.
3. Set the alarm holding time and alarm trigger options. Trigger alarm out, Email and
FTP. The setup steps are the same motion detection. Please refer to as motion
detection section for details.
IP Address Conict
1. Go to Cong Alarm Exception Alarm IP Address Collision
as shown below.
2. Click “Enable” and set the alarm holding time.
3. Trigger alarm out. When the IP address of the camera is in conict with the IP
address of other devices, the system will trigger the alarm out.
23
Cable Disconnection
1. Go to Cong Alarm Exception Alarm Cable Disconnected
as shown below.
2. Click “Enable” and set the alarm holding time.
3. Trigger alarm out. When the camera is disconnected, the system will trigger the
alarm out.
3.3.3 Alarm In
To set sensor alarm (alarm in), go to erface as shown Cong Alarm Alarm In
int
below.
1. nable and set the alarm type, alarm holding time and sensor name. Click “E
24
2. Set alarm trigger options. The set steps are the same as motion detection. up
Please refer to section for details.
motion detection
3. button to save the settings. Click “Save”
4. Set the schedule of the sensor alarm. The set steps of the schedule are the up
same the schedule recording setup. (See as Schedule Recording).
3.3.4 Alarm Out
This function is only available for some models. Go to . Cong Alarm Alarm Out
Alarm Out Mode: Alarm linkage, manual operation, day/night switch linkage and
timing are optional.
Alarm Linkage: Having selected this mode, select alarm out name, alarm holding
time at the “Alarm Holding Time” pull down list box and alarm type .
Manual Operation: Having selected this mode, select the alarm type and click
“Open” to trigger the alarm out immediat click “Close” to stop alarm.ely;
Day/Night Switch Linkage: Having selected this mode, select the alarm type and then
choose to open or close alarm out when the camera switches to day mode or night
mode.
25
Timing: Select the alarm type. Then click “Add” and drag the mouse on the timeline to
set the schedule of alarm out; click “Erase” and drag the mouse on the timeline to erase
the set time schedule. After this schedule is saved, the alarm out will be triggered in
the specied time.
3.3.5 Alarm Server
Go to interface as shown below. Alarm Alarm Server
Set the server address, port, heartbeat and heartbeat interval When an alarm .
occurs, the camera will transfer the alarm event to the alarm server. If an alarm
server is not needed, there is no need to congure this section.
3.3.6 Audio Alarm
Go to interface as shown below. Alarm Audio Alarm
Enable audio alarm. If disabled, the warning voice will not sound when an event
triggers audio alarm. Additionally, you need to enable audio in the audio conguration
interface and the audio output/speaker type should be “Warning” or “Auto”, or the
warning voice cannot sound to o.
26
Select the warning voice. If you want to customize the voice, you can choose
“Customize”. Click “Browse” to choose the audio file you want to upload and then
enter the audio name. Finally, click “Upload” to upload the audio file. Note that the
format of the audio le must meet the requirement (see Tips), or it will not be
uploaded. After you upload the audio le, you can select the audio name and click
“Listen” to listen to it. Click “Delete” to delete the audio.
27
You can also record your own voice in the above interface and then upload.
Insert the microphone into your PC.
Click “Browse” to choose the save path of the audio you want to record.
Set the record audio volume and then click “Start” to start recording your voice.
Click “Upload” to upload your customized voice.
Note: The voice can be recorded only when you log in via the Edge browser in IE
mode.
Set the warning times and volume as needed.
Warning times: it ranges from 1 to 50.
Set the schedule of audio alarm. The setup steps of the schedule are the same as
the schedule recording setup (See Schedule Recording).
Click “OK” to save the settings.
3.4 Event Configuration
For more accuracy, here are some recommendations for installation.
Cameras should be installed on stable surfaces as vibrations can aect the ,
accuracy of detection.
Avoid pointing the camera at the reective surfaces (like shiny oors, mirrors,
glass, lake surfaces and so on).
Avoid places that are narrow or have too much shadowing.
Avoid scenario where the object color is similar to the background color. ’s
At any time of day or night, make sure the camera image is clear and with
adequate and even light, avoiding overexposure or too much darkness on both sides.
3.4.1 Video Exception
This function can detect changes in the surveillance environment aected by the
external factors.
To set exception detection:
Go to interface as shown below. Cong Event Video Exception
28
1. Enable the . applicable detection that’s desired
Scene Change Detection: Alarms will be triggered if the scene of the monitor video
has changed.
Video Blur Detection: Alarms will be triggered if the video becomes blurry.
Abnormal Color Detection: Alarms will be triggered if the image is abnormal caused
by color deviation.
2. Set the alarm holding time and alarm trigger options. The setup steps are the
same motion detection. Please refer to motion detection section for details. as
3. Click “Save” button to save the settings.
4. Set the sensitivity of the exception detection. Click “Sensitivity” tab to go to the
interface as shown below.
Drag the slider to set the sensitivity value or directly enter the sensitivity value in the
textbox. Click “Save” button to save the settings.
29
The sensitivity value of Scene Change Detection: The higher the value is, the
more sensitive the system responds to the amplitude of the scene change.
The sensitivity value of Video Blur Detection: The higher the value is, the more
sensitive the system responds to the blurriness of the image.
The sensitivity value of Abnormal Color Detection: The higher the value is, the
more sensitive the system responds to the color shift of the image.
The requirements of camera and surrounding area
1. Try not to enable exception detection when light changes greatly in the scene.
2. Please contact us for more detailed application scenarios.
3.4.2 People Counting
This function is to calculate the number of the people entering or exiting from the
detected area through detecting, tracking and counting the head shapes of the
people.
Go to interface. Cong Event People Counting
The setup steps are as follows.
1. Enable people counting and set alarm trigger options.
Enable people counting and select “Save Original Picture to SD Card” as needed.
Save Original Picture to SD Card: If it is enabled, the detected original pictures will
be captured and saved to the SD card when the staying threshold exceeds the set
value.
30
Staying Threshold: When the targets staying in the specied area exceed the
threshold, alarms will be triggered.
Counting Reset: The current number of the people counting can be reset. You can
choose to reset the counting daily, weekly or monthly. Click “Reset” to manually reset
the current number of people counting.
2. Set the alarm holding time.
3. Set alarm trigger options. The setup steps are the same motion detection. as
Please refer to section for details.
motion detection
4 . Click “Save” button to save the settings.
5. Set area of people counting Click the . “Area” tab to go to the interface as shown
below.
Set the camera calibration. Auto calibration and manual calibration are selectable.
Auto Calibration
Select “Auto” lick “Draw Area” and c to draw a green box in the middle of the image.
After that, click “Calibrate”. The camera will return the lens height automatically.
Compare the returned lens height with the actual measurement height. If the height
from the lens to the ground is within 4m, the margin of error within ±15cm is allowed.
If the height from the lens to the ground is 4m ~6m, the margin of error within ±25cm
is allowed. If exceeding the above-mentioned value, repeat the above steps or use
manual calibration.
Caution:
Select the at ground as the calibration area.
The calibration area with adequate and even light is recommended, avoiding
overexposure area or . reflective surface
Select the middle of the image as the calibration area.
31
Manual Calibration
Manually measure the height from the lens to the ground.
In the above interface, select “Manual”, enter the lens height value.
C lick “Calibrate”.
Statistics: If enabled, you can see the statistical information in the live view interface.
If disabled, the statistical information will not be displayed in the live view interface.
Check “Statistics” and move the red box to change the position of the statistical
information displayed on the screen. The statistical OSD information can be
customized as needed.
Children counting: Please set its name as needed. Before using this function,
please enable children counting and set the height of children counting rst (see
Advanced settings for details).
6. Set detection rule. Two detection rules can be selected. Please select one of them
as needed.
To set alarm line
Set the alarm line number and direction. Only one line can be added.
DirectionA->B and A<-B can be optional. The direction of the arrow is entrance.
Click the “Draw Area” button and then drag the mouse to draw a line in the image.
Click the “Stop Draw” button to stop drawing. Click the “Clear” button to delete the
lines.
Click the “Save” button to save the settings.
If the target crosses the line along the direction of the arrow, it is counted as one
entering target. If the target crosses the line along the reverse direction of the arrow,
it is counted as one exiting target.
To set detection area
Select the area number and direction.
Direction: A->B and A<-B can be optional. For example: “A->B” is selected. If the
target enters from area A to area B, it is counted as one entering target. If the target
enters from area B to area A, it is counted as one exiting target.
Click the “Draw A Area” or “Draw B Area” button and then click around the area
where you want to set as the detection area in the image on the left side (the area
should be a closed area). Click the “Stop Draw” button to stop drawing. Click the
“Clear” button to delete the alarm area. After both area A and B are set and make
sure these two areas don’t overlap, click the “Save” button to save the settings.
32
7. Advanced settings.
Sensitivity: The higher the value is, the easier the false detection will occur. The
lower the value is, the camera is easier to miss the target.
Height Filtering: Enable the function and set a height value. The target whose height
is lower than the set value will not be counted.
Children Counting: Enable the function and set a height value. The target whose
height is higher than the set value will not be counted. Note that the height of children
counting should be 20cm (or above) higher than the height of height ltering. For
example, the height of children counting is 120cm, so the height of height ltering
should be set to 100cm or lower.
Note: In order to get more accurate statistics, it is suggested to disable height
ltering and children counting if the installation height of the camera ranges from 210
to 250cm. When the installation height of the camera ranges from 251~600cm, it is
recommended to check height ltering and children counting.
8. Set reverse entering detection as needed. If this function is enabled, set the alarm
holding time and alarm linkage options. The setup steps are the same as motion
detection. Please refer to section for details.
motion detection
When someone leaves the detection area in the direction opposite to the detection
direction, alarms will be triggered. For example, the detection direction set from A is
to B. If a person leaves from B to A, alarms will be triggered.
9. Set the schedule of people counting The setup steps of the schedule are the .
same the schedule recording setup (See as Schedule Recording).
10. RS485 settings. You can use RS485 to transmit the data between the camera
and the computer or terminal. Before using this function, please connect the camera
and computer or terminal with RS485 cable. Please set the parameters of RS485 as
needed. Note that you should keep the parameters of the camera and the computer
or terminal all the same.
33
11. View the statistical information in the live view interface.
12. View the statistical information of people counting. Click “Statistics” to enter the
following interface.
Select the report type. Daily report, weekly report, monthly report and annual report
are selectable.
Select the count type. Enter or leave can be optional.
Select the start time and then click “Count”. Then the counting result will display in
the statistic result area. Click Table or Statistics to display the result in dierent way.
34
Conguration requirements of camera and surrounding area
1. The camera installation shooting area must meet the conditions of stable light and
sufficient illumination.
2. The installation background (ground color) is light color, and the dark background
will reduce the accuracy.
3. This function is a vertical look down type, requiring the camera lens must be vertical
down, a slight deviation is acceptable, but must be able to cover the complete head of
the personnel.
4. The camera must be installed to meet the main channel of the people flow (ground)
accounting for more than half of the frame width, the head size is about 1/5 of the
height of the picture, and a certain space is reserved on both sides, and the flow of
people channel is located in the middle of the picture. The recommended installation
height is 2 to 6 meters.
5. Not applicable to scenarios with more than two flow directions.
6. The movement speed of the characters in the scene: too fast movement speed (the
characters pass through the detection area within 2 seconds) may cause failure of
detection, too slow (the characters stay in the area for more than 15 seconds) will
cause the camera to abandon the tracking detection.
7. Color of clothes of characters in the scene: Characters wear clothes similar to the
background color through the area, which may be undetected.
8. Head decoration of characters in the scene: too much head decoration of characters
may cover up the head characteristics and lead to detection failure.
35
3.5 Network Configuration
3.5.1 TCP/IP
Go to interface as shown below. There are two ways for Cong Network TCP/IP
network connection.
Use IP address (take IPv4 for example)-There are two options for IP setup btain : o
an IP address automatically by DHCP and use the following IP address. Please
choose one of the options as needed.
Test: Test the eectiveness of the IP address by clicking this button.
Use PPPoE-Click the “PPPoE Config” tab to go to the interface as shown below.
Enable PPPoE and then enter the name and password from your ISP. user’s
Either method of network connection can be used. If PPPoE is used to connect
internet, the camera will get a dynamic WAN IP address. This IP address will change
frequently. To be notied, the IP change notication function can be used.
Click “IP Change Notification Config” to go to the interface as shown below.
36
Trigger Email: when the IP address of the device is changed, the new IP address
will be sent to the email address that has been set up.
Trigger FTP: when the IP address of the device is changed, the new IP address will
be sent to FTP server that has been set up.
3.5.2 Port
Go to interface as shown below. HTTP port, Data port and Cong Network Port
RTSP port can be set.
HTTP Port: The default HTTP port is 80. It can be changed to any port which is not
occupied.
HTTPS Port: The default HTTPs port is 443. It can be changed to any port which is
not occupied.
Data Port: The default data port is 9008. Please change it as necessary.
RTSP Port: The default port is 554. Please change it as necessary.
Persistent Connection Port: The port is used for a persistent connection of the
third-party platform to push smart data, like face pictures.
WebSocket Port: Communication protocol port for plug-in free preview.
37
3.5.3 DDNS
If the camera is set up with a DHCP connection, DDNS should be set for the internet.
1. Go to . Cong Network
DDNS
2. Apply for a domain name. Take www.dvrdyndns.com for example.
Enter www.dvrdydns.com in the browser s address bar to visit its website. Then Click
the “Registration” button.
Create domain name.

Tuotetiedot

Merkki: GeoVision
Kategoria: Turvakamera
Malli: GV-3D People Counter V3

Tarvitsetko apua?

Jos tarvitset apua merkille GeoVision GV-3D People Counter V3 esitä kysymys alla ja muut käyttäjät vastaavat sinulle




Turvakamera GeoVision Käyttöohjeet

Turvakamera Käyttöohjeet

Viimeisimmät Turvakamera Käyttöohjeet

Lorex

Lorex E893AB-E Käyttöohje

2 Huhtikuuta 2025
Yale

Yale YRD430 Käyttöohje

30 Maaliskuuta 2025
BirdDog

BirdDog X1 Käyttöohje

30 Maaliskuuta 2025
BirdDog

BirdDog X1 Ultra Käyttöohje

30 Maaliskuuta 2025
Hanwha

Hanwha QNE-C9013RL Käyttöohje

30 Maaliskuuta 2025
HiLook

HiLook THC-T150-M Käyttöohje

27 Maaliskuuta 2025
Reolink

Reolink W320 Käyttöohje

27 Maaliskuuta 2025