background image

 

- 49 - 

false detections, consider increasing the minimum dimensions.  
 

People or Vehicle Maximum Size: maximum expected width 
and  height  of  a  person  in  the  scene.  Width  and  height 
maximum 

dimensions 

should 

be 

larger 

than 

their 

corresponding  minimum  dimensions,  and  should  not  exceed 
more than half the frame size.  
 

 

- Select

 

Zones

 

Settings

 to 

specify the multiple activation zones.

 

Up  to  four  independent  zones,  where  each  zone  is  a  user-
defined  polygon  with  a  maximum  of  16  nodes.  Each  node 
defined  by  fixed-point  coordinate  pair  lying  within  image 
boundaries.  The  first  and  last  nodes  should  be  identical.  An 
object’s size must satisfy the minimum area defined by the size 
criterion (above) to be detected. The zone ID is reported along 
with the event.  

 

 

Trip Zone  
Detects objects moving from one user-defined zone to 
another; can also be used for “wrong way” detection. A Trip 
Zone event occurs when an object(s) is detected moving 
across the common edge shared by exactly two adjacent 
zones. The zones are defined as two polygonal regions that 

Summary of Contents for SmartCube 300W

Page 1: ......

Page 2: ...rs can also receive only the portions of the images they are interested in via the cropping function Furthermore multiple video streams can be delivered simultaneously in different resolutions frame rates and image qualities for viewing on different platforms so as to meet different needs or bandwidth constraints The camera also offers activity adaptive streaming support that dynamically allocates...

Page 3: ... helps you install the camera according to your application environment You can use this camera at home at work at any where you want Chapter 3 Accessing the Camera lets you start using your camera without problem The camera can be set up easily and work within your network environment instantly Chapter 4 Configuring the Camera guides you through the configuration of the camera using the Web brows...

Page 4: ...1 USING WPS BUTTON 9 2 2 APPLICATIONS OF THE CAMERA 10 CHAPTER 3 11 ACCESSING THE CAMERA 11 3 1 USING IPFINDER 11 3 2 ACCESSING TO THE CAMERA 12 3 3 CONFIGURING THE IP ADDRESS OF THE PC 17 CHAPTER 4 18 CONFIGURING THE CAMERA 18 4 1 USING THE WEB CONFIGURATION 18 4 2 SYSTEM 19 4 3 NETWORK 23 4 4 AUDIO VIDEO EXPOSURE IMAGE WDR 28 4 5 EVENT 36 4 6 STATUS 45 4 7 INTELLIGENT VIDEO ANALYSIS 44 Appendix ...

Page 5: ... contained in the package carefully You should have the following One Network Camera One AC Power Adapter Accessory Package Screws Plastic Anchors One Installation CD ROM optional One Quick Installation Guide optional NOTE Once any item contained is damaged or missing contact the authorized dealer of your locale ...

Page 6: ...tting to Know Your Camera Front Panel Rear Panel Power Input Ethernet Port WPS and Reset Microphone Lens PIR Sensor Temperature and Humidity Sensors IR LED and ICR Speaker 802 11n Wi Fi Micro SD Slot Status LED ...

Page 7: ...amera via Intranet or Internet In addition the camera can be upgraded remotely when a new firmware is available The users are also allowed to monitor the image and take snapshots via the network Multiple Profiles Supported The camera supports multiple profiles simultaneously so that you can separately set up different image settings such as image quality and frame rate for the three video types of...

Page 8: ...network protocols including TCP IP SMTP e mail HTTP and other Internet related protocols Therefore you can use the camera in a mixed operating system environment such as Windows XP Vista and Windows 7 Multiple Applications Supported Through the remote access technology you can use the cameras to monitor various objects and places for your own purposes For example babies at home patients in the hos...

Page 9: ...B or more Resolution 1024x768 or higher User Interface Microsoft Internet Explorer 7 0 or above Apple Safari 2 or above Mozilla Firefox 2 00 or above Google Chrome Accessing the Camera using GVMS Platform Microsoft Windows XP Vista Win7 Resolution 1024 x 768 or higher Hardware Requirement 1 8 cameras Intel Core 2 Duo 2GB RAM 9 32 cameras Intel Core 2 Quad 4GB RAM NOTE If you connect multiple camer...

Page 10: ...d down the WPS button on your AP some router AP will have a virtual button on their management software instead Refer to your AP s documentation for details using its WPS functions When WPS configuration is done wireless connectivity will be established and the security encryption such as WEP or WPA PSK will be synchronized with the AP As for IP setting the camera s use of DHCP or static IP is det...

Page 11: ... Capture still images and video clips remotely Upload images or send email messages with the still images attached The following diagram explains one of the typical applications for your camera and provides a basic example for installing the camera Home Applications of the Internet Cameras Please have the camera enclosed by waterproof housing when using in outdoor ...

Page 12: ...ra comes with a conveniently utility CamWizard which is allowing you to search the camera on your network easily 1 Click the CamWizard item to launch the utility The control panel will appear as below Display the connected camera s Double click to link the Camera Click Search to get the camera information ...

Page 13: ...t configuration of the camera is DHCP mode enabled you are recommended to launch IPFinder to search the IP address that is assigned to the camera by the DHCP server and then click Link to access the camera via the Web browser Click DHCP Static IP to modify the IP address of the selected camera Enter the default User name root and password root and press OK the IP address will be change ...

Page 14: ...ss OK to access to the main screen of the camera s Web Configuration NOTE If you are initially access to the camera you will be ask to install a new plug in for the camera Permission request depends on the Internet security settings of your computer Click Yes to proceed After you login into the Web Configuration of the camera the Main screen will appear as below Enter the User name and Password ...

Page 15: ...and JPEG simultaneously A user can choose the proper and or preferred profile which is listed here Protocol Select the protocol type RTS TCP HTTP or RTSP over HTTP Language The device can provide multiple languages to meet customer s requirement Digital Output Switch digital output interface on or off 2 Way Audio The device supports 2 way audio function A user can choose to enable or disable this ...

Page 16: ...ibute Original size Preview Size Switches live image view between original size full size 3MegaPixels and preview size smaller size Digital Zoom From 1X to 10X so you can see objects in video in detail Please note that digital zoom uses computer algorithm to enlarge the video and some details may lost If you need to focus on detail of specific objects in video view please use optical zoom ring on ...

Page 17: ...d you ll be prompted to indicate the folder on your computer to save image file If you changed your mind and don t want to save image file click Cancel Record Click Record to activate this function Press Record button to start recording The video file is saved as ASF format into your local PC While you want to stop it press Stop to recording ...

Page 18: ...ion to open the Network Connection window 3 Right click Local Area Connection and then click Properties from the shortcut menu 4 When the Local Area Connection Properties window appears select the General tab 5 Select Internet Protocol TCP IP and then click Properties to bring up the Internet Protocol TCP IP Properties window 6 To configure a fixed IP address that is within the segment of the came...

Page 19: ...ribes the Web Configuration and guides you through the configuration of the camera by using the Web browser To configure the camera click configuration on the Main screen of Web Configuration The Web Configuration will start from the Basic page The Web Configuration contains the settings that are required for the camera in the left menu bar including Network Video Audio Event Storage System Status...

Page 20: ...tion This item allows you to assign the camera name and location information Camera Name Enter a descriptive name for the camera which is helpful to identify the camera easily while multiple cameras are connected within the network Location Enter a descriptive name for the location where is monitored by the camera Indication LED This item allows you to set the LED illumination as desired The avail...

Page 21: ...Server Select this option and the time will be synchronized with the NTP Server You need to enter the NTP Server Address of the server and set the Update Interval Manual Select this option to set the date and time manually Synchronize with PC Select this option and the date time settings of the camera will be synchronized with the connected computer 4 2 2 System Firmware Update Firmware You can up...

Page 22: ... card 4 2 4 System Account Admin To prevent unauthorized access to the camera s Web Configuration you are strongly recommend to change the default administrator password Type the administrator password twice and then click Modify to set and confirm the password Users User Name Password Confirm Password Enter the user s name you want to add to use the camera Then enter the password twice for the ne...

Page 23: ...rovide authenticated and encrypted communication within your network HTTPS Port Assign a HTTPS port in the text box The default HTTPS port is 443 Warning The download firmware procedure cannot be interrupted If the power and or network connection are broken during the download procedure it might possibly cause serious damage to the device Strongly suggest that DO NOT upgrade firmware via Wireless ...

Page 24: ... the settings 4 3 1 Network General DHCP Static IP This field allows you to select the IP address mode and set up the related configuration The avail options include DHCP IPv4 DHCP IPv4 IPv6 and Static IPv4 IPv6 DHCP IPv4 Select this option when your network uses the DHCP server When the camera starts up it will be assigned an IP address from the DHCP server automatically ...

Page 25: ...e Subnet Mask of the camera The default setting is 255 255 255 0 Default Gateway Enter the Default Gateway of the camera The default setting is 192 168 1 254 Primary Secondary DNS DNS Domain Name System translates domain names into IP addresses Enter the Primary DNS and Secondary DNS that are provided by ISP HTTP Port The default HTTP port is 80 RTSP Port The default RTSP Port Real Time Streaming ...

Page 26: ...been in the network too long and should be discarded Enable PPPoE Select this option when you use a direct connection via the ADSL modem You should have a PPPoE account from your Internet service provider Enter the User Name and Password The camera will get an IP address from the ISP as starting up NOTE Once the camera get an IP address from the ISP as starting up it automatically sends a notifica...

Page 27: ...e Apple Safari is already with Bonjour You can download the complete Bonjour for Internet Explorer browser from Apple s web site by visiting http www apple com bonjour QoS QoS quality of service is the ability to provide different priority to different applications or data flows Video DSCP Assign the DSCP DiffServ Code Point of the stream video from the camera by setting the value from 0 to 63 Aud...

Page 28: ... then click Delete 4 3 4 Network IP Notification In case the IP address is changed system is able to send out an email to alert someone if the function is enabled SMTP Notification e mail If enable this function then the Send to and Subject fields need to be filled Send To Type the receiver s e mail address This address is used for reply mail Subject Type the subject title of the E mail TCP Notifi...

Page 29: ...Login name Type the user name for the HTTP server HTTP Login Password Type the password for the HTTP server 4 4 Video The Audio Video Image menu contains three sub menus to provide the video and audio settings for the camera When completed click Apply to save the settings ...

Page 30: ...it uses more resource within your network NOTE When High Resolution is disabled you can only set the Video Resolution as 1280x720 720P 720x480 D1 640x480 VGA 320x240 QVGA or 176x144 QCIF Rate Control Set the proper image quality by selecting Video Quality or Bitrate and then select the desired settings from the pull down menu Video Quality Select Very Low Low Normal High or Very High from the pull...

Page 31: ...move the IR cut filter to let IR light into the sensor during low light conditions Auto mode The camera automatically removes the filter Manual User can use this function to determine the threshold and the camera switches between day mode and night mode based on this specified threshold Always ON The camera switches on the IR cut filter at all times to block infrared light Always OFF The camera sw...

Page 32: ...contrast level from 0 255 Saturation Adjust the colors level from 0 255 Sharpness Adjust the sharpness level from 0 100 TIP Click Default to restore the default settings of the three options above Mirror Select Vertical to mirror the image vertically or select Horizontal to mirror the image horizontally Power Line Frequency Select the proper frequency according to the camera s location to reduce t...

Page 33: ...g the Transparent option and select the background color as white or black When you select User Define Image you can click Browse to select the image file from your computer and then click Update to apply the setting NOTE The width and height of the input overlay graphic should be multiple of 4 at a maximum size of 160x128 and in JPG or BMP 24 bit RGB format 4 4 5 Video ROI ROI means Region of Int...

Page 34: ... Digital noise reduction A digital filter designed to reduce visible noise for Improving visibility of images Fog compensation Improved visibility of images in fog or smoke using Fog compensation function ...

Page 35: ...abilization Video Stabilization is a video enhancement technique which reduces the jitter in video caused due to camera shake It is achieved by moving a sub frame in the video frame in opposite direction to the camera movement ...

Page 36: ... user can block out sensitive zones to address privacy concerns User can use the mouse cursor to size and drag drop the window which is recommended to be at least twice the size of the object height and width you want to cover Up to 4 privacy mask windows can be set up on the same screen ...

Page 37: ... Advance menu contains five sub menus that allow you to set up the advanced feature of the camera including the event event schedule motion detection recording RS 485 etc When completed click Apply to save the settings ...

Page 38: ...amera You can set the attachment that is captured in Pre Event or Post Event time when the event has been triggered FTP Event Server Select Enable to enable the FTP server for the camera FTP Server Enter the IP address of the target FTP server Port Enter the port number used for the FTP server User Name Enter the user name to login into the FTP server Password Enter the password to login into the ...

Page 39: ...the event Authentication Select the option according to the mail server configuration User Name Enter the user name to login the mail server Password Enter the password to login the mail server Test SMTP When done click the button to test the SMTP server SSL Encryption If the mail server requires an encrypted connection you should select the SSL option NOTE Due to the network environment the camer...

Page 40: ...ction when triggered Enable FTP The camera will upload the attachment to FTP when triggered Enable EMAIL The camera will send the attachment to the assigned receiver when triggered Enable Samba The camera will transfer the attachment to the network storage when triggered NOTE To enable the FTP Email Samba services the required settings of must be completed in the Advance Event section GO Preset Th...

Page 41: ...on the camera s output for 1 60 seconds according to the setting of the pull down menu 4 When done click Add The event profile will be added to the Event list TIP To change remove the event profile select the desired profile from the Event list and then click Modify Delete ...

Page 42: ...e basic information audio video settings networking configuration and system logs This information is very useful when you need to repair or fix the problem of this IP camera 4 6 1 Status Basic 4 6 2 Status audio video The examples of basic audio video and network pages look like below ...

Page 43: ... 42 4 6 3 Status Network ...

Page 44: ...ttp www kiwisyslog com kiwi syslog daemon overview Follow the steps below to set up the remote log 1 In the IP address text box enter the IP address of the remote server 2 In the port text box enter the port number of the remote server 3 When completed select Enable remote log and click Save to enable the setting 4 6 4 2 Log List You can check the usage log of IP camera here In this page you can c...

Page 45: ...suite of five video analytics applications Camera Tamper Detection CTD Intelligent Motion Detection IMD Trip Zone TZ Object Counting OC and Face Detection Recognition FD Both processors can deliver continuous CTD concurrently with one of the four remaining video analytic functions e g CTD plus IMD running simultaneously ...

Page 46: ...rts to detect faces with face inclination 45 face direction 30 in vertical direction and 60 in horizontal direction Set whether to use Detection result overlay When faces are detected their positions and sizes are marked with rectangles on the screen Set whether or not to Enable the calibration mask with minimum face size of 20x20 pixels TIP The Face Enhancement function improves the visibility of...

Page 47: ... database Set whether to use Face Register It supports run time addition and deletion of registered faces in the database Camera Tamper Detection Camera Tamper Detection CTD detects tampering events in surveillance cameras that may compromise the integrity of the video content Examples of camera tampering include obstructing the lens with paint or a foreign object adjusting the lens focus or apert...

Page 48: ...gher the sensitivity detects the minutest tampering attempts Select Reset Time Once a tampering is detected the camera will resume a normal operating after a certain stability time Reset Time during which no detection will be performed Select Alarm Type to specify the activation condition Intelligent Motion Detection Detect the moving objects within user defined zones in the camera s field of view...

Page 49: ...o Enable Intelligent Motion Detection Select Sensitivity to set the sensitivity level A high sensitivity setting makes it less likely that an event is missed but can make the algorithm susceptible to false alarms Select Calibration People or Vehicle Object Sizes The minimum and maximum bounding box size of objects can be specified to improve detection accuracy People or Vehicle Minimum Size minimu...

Page 50: ...one is a user defined polygon with a maximum of 16 nodes Each node defined by fixed point coordinate pair lying within image boundaries The first and last nodes should be identical An object s size must satisfy the minimum area defined by the size criterion above to be detected The zone ID is reported along with the event Trip Zone Detects objects moving from one user defined zone to another can a...

Page 51: ... defined polygon with a maximum of 16 nodes Each node defined by fixed point coordinate pair lying within image boundaries Must be defined before Zone 2 The first and last nodes should be identical Zone 2 User defined polygon with a maximum of 16 nodes Each node defined by fixed point coordinate pair lying within image boundaries Must be defined after Zone 1 The first and last nodes should be iden...

Page 52: ...se alarms Object Sizes People Minimum Size minimum expected width and height of a person in the scene Width and height values must be greater than 16 pixels People Maximum Size maximum expected width and height of a person in the scene Object width must be less than 80 pixels and height must be less than 48 pixels Vehicle Minimum Size minimum expected width and height of a vehicle in the scene Wid...

Page 53: ...an object is detected moving from one half of the image to the other half This application provides an estimate of the number of objects that trigger the event Each half of the image is designated as either zone 1 or zone 2 The objects must appear in each image zone for at least 0 5 seconds Counter Orientation Top Bottom Event detected when objects move across top and bottom halves of the image Le...

Page 54: ... directional Event detected if object moves either from zone 1 to 2 or from zone 2 to 1 Sensitivity A high sensitivity setting makes it less likely that an event is missed but can make the algorithm susceptible to false alarms Object Sizes Expected width and height of an object in the scene Width and height values must be greater than 16 pixels and smaller than 64 pixels ...

Page 55: ... 54 ...

Page 56: ...egree Auto Iris Fixed Iris Night Vision Built in removable IR cut filter System Hardware Network Processor DSP base RAM 128MB DDR SDRAM ROM 128MB NAND Flash Power DC 5V 1A Power Consumption 4W max Video Compression H 264 MPEG4 MJPEG Video resolution QXGA 2048x1536 25fps 1080P 1920x1080 30fps SXGA 1280x1024 30fps 720p 1280x720 30fps VGA 640x480 30 fps QVGA 320x240 30 fps QCIF 176x144 30 fps Communi...

Page 57: ...G 711 AMR AMR is for 3GPP only User Interface LAN One RJ 45 port SD Card One SD SDHC card slot Reset WPS One reset wps button LEDs Power LED amber Link LED green SD Card Status Blue Software OS Support Windows XP Vista and Windows 7 Browser Internet Explorer 7 0 or above Apple Safari 2 or above Mozilla Firefox 2 00 or above Google Chrome Software GVMS for playback recording configuration features ...

Page 58: ... data compression scheme optimized for speech coding which is adopted as the standard speech codec by 3GPP Applet Applets are small Java programs that can be embedded in an HTML page The rule at the moment is that an applet can only make an Internet connection to the computer form that the applet was sent ASCII American Standard Code For Information Interchange it is the standard method for encodi...

Page 59: ... by Microsoft DHCP Dynamic Host Configuration Protocol is a protocol for assigning dynamic IP addresses to devices on a network With dynamic addressing a device can have a different IP address every time it connects to the network In some systems the device s IP address can even change while it is still connected It also supports a mix of static and dynamic IP addresses This simplifies the task fo...

Page 60: ...100Mbps Fast Ethernet and 1 000Mbps Gigabit Ethernet Most Ethernet networks use Category 5 cabling to carry information in the form of electrical signals between devices Ethernet is an implementation of CSMA CD that operates in a bus or star topology F Fast Ethernet Fast Ethernet also called 100BASE T operates at 10 or 100Mbps per second over UTP STP or fiber optic media Firewall Firewall is consi...

Page 61: ... you will find on the public Internet The only difference is that an Intranet is used for internal usage only Internet The Internet is a globally linked system of computers that are logically connected based on the Internet Protocol IP The Internet provides different ways to access private and public information worldwide Internet address To participate in Internet communications and on Internet P...

Page 62: ...ion lines to companies or individuals who can t afford the high monthly cost for a direct connection J JAVA Java is a programming language that is specially designed for writing programs that can be safely downloaded to your computer through the Internet without the fear of viruses It is an object oriented multi thread programming best for creating applets and applications for the Internet Intrane...

Page 63: ... Network A network consists of a collection of two or more devices people or components that communicate with each other over physical or virtual media The most common types of network are LAN local area network Computers are in close distance to one another They are usually in the same office space room or building WAN wide area network The computers are in different geographic locations and are ...

Page 64: ...the medium and how servers respond to workstation requests and vice versa Common network protocols responsible for the presentation and formatting of data for a network operating system are the Internetwork Packet Exchange IPX protocol or the Internet Protocol IP Protocols that dictate the format of data for transferors the medium include token passing and Carrier Sense Multiple Access with Collis...

Page 65: ...mmon foundation for managing network devices Station In LANs a station consists of a device that can communicate data on the network In FDDI a station includes both physical nodes and addressable logical devices Workstations single attach stations dual attach stations and concentrators are FDDI stations Subnet mask In TCP IP the bits used to create the subnet are called the subnet mask T TCP IP Tr...

Page 66: ...mputers that are separated by a wide distance and communicate with each other via common carrier telecommunication techniques WEP WEP is widely used as the basic security protocol in Wi Fi networks which secures data transmissions using 64 bit or 128 bit encryption Windows Windows is a graphical user interface for workstations that use DOS WPA WPA Wi Fi Protected Access is used to improve the secu...

Page 67: ...s and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the...

Page 68: ......

Reviews: