top of page
A.i Tech Intrusion Icon

Intrusion

Intrusion is an advanced video analytics application designed to enhance security by detecting unauthorized access, intrusions, or loitering of people, animals, or vehicles in restricted or high-risk areas. Using AI-powered computer vision and real-time monitoring, the system analyzes video feeds to identify suspicious activity, trigger instant alerts, and support proactive security measures.

Functions

Loitering

Create detection zones and monitor for persistence of intrusion or loitering. Configure the minimum time an object must be inside the area before triggering an event.

Intruder - Multiple Crossing icon
Multiple Line Crossing

Construct custom events linked to the counting data and use them to start altering a space's lighting, temperature, and other features based on how occupied the area is. Cut down on energy expenses and a building's carbon impact.

Intruder - Object-icon
Object classification

The application uses a deep neural network to filter objects according to their class; human, animal or vehicle. Configure events that are only triggered by a specific object.

Intruder - Map view icon
Map View

Monitor events and metrics through an intuitive, easy to use dashboard. Collect, aggregate, analyse and display the events generated. Create custom maps and insert plans of a site to view the real-time occupancy of an area.

Intruder Line Crossing-icon
Line Crossing

Single Line Sensors or trip wire sensors are ideal for perimeter detection or in cases where it is necessary to know if a person has crossed a virtual border on the image.

Integrations

EMAIL

The events generated by the video analysis applications can be notified by e-mail, with the possibility of attaching a sequence of images with the metadata related to the event of interest.

FTP

Notifications can be sent to FTP servers (e.g. FileZilla, IIS), storing for each one a CSV file and a sequence of images with the metadata relating to the event of interest.

Neologic HTTP icon

HTTP

A.I. Tech offers maximum integration with standard HTTP and HTTPS services. Notifications can be received by customizing requests to REST or CGI services to control remote devices (e.g. for PTZ handover mechanisms) or in JSON format, attaching one or more images to the event of interest on any third-party server.

Neologic UDP/TCP icon

UDP /TCP

The metadata associated with the events generated by the A.I. Tech can be received via text strings over configurable UDP / TCP protocols, such as those sent by POS systems.

MODBUS

A.I. Tech plugins can forward alarm notifications using the Modbus TCP protocol, according to the specifications outlined by the IEC 61158 Standard.

MQTT

A.I. Tech plugins can forward notifications using the publish-subscribe MQTT protocol, according to the specifications outlined by the ISO/IEC PRF 20922 standard.

ONBOARD

A.I. Tech also offers mechanisms to notify events of interest directly on board the device that processes the images. It is in fact possible to activate, through applications, the digital outputs on the AI-Appliance, the digital output of the Hanwha cameras and the notification mechanisms of the Axis cameras.

System Architecture

Neologic System Architecture for computer vision icon

Eco System

Products from A.I. Tech are technologically compatible with the following products

Mobotix logo
Axis Communications logo
Hanwha_Group-Logo
i-pro logo
Computer Vision camera icon
Hardware Icon

Common Functions
of A.I. Tech Apps

Tampering

If your camera does not have this functionality, don't worry. All apps can generate when tampering events occur.

PTZ Handover

Do you need to control a PTZ camera when an event occurs? With the ability to trigger a sequence of HTTP calls, you can bring the camera to the desired pre-set, start the PTZ tracking (if available on the camera) and bring the PTZ camera back to the home position after a configurable amount of time.

Activation on a time basis

Apps can be activated on a time basis, only in specific time intervals, e.g. from 9 p.m to

8 a.m. In addition, for server or embedded apps, it is also possible to specify the day (e.g. Monday from 10am to 12pm., Tuesday from 6pm to 10pm.).

Masking

In all apps masking of moving objects can be activated, in order to be compliant with all kinds of privacy requirements.

AI-Dash-Embedded

This is the app's built-in dashboard, which allows you to have the data for the specific camera at your fingertips at all times ( even on camera, if you have an SD card).

​

​

​

Dynamic activation via software

In addition to time-scheduling, you can activate your apps dynamically, through software calls, via HTTP GET requests that allow you to operate in two modes: impulsive and level-based. In the first case you have a single START request and the app will remain active for a certain predefined amount of time. In the second case, you have one START request and one STOP request to control the app.

Use Cases

AdobeStock_1048783710.jpeg

WAREHOUSES

 Can track worker movements to prevent internal theft. Monitors employees near hazardous zones, sends alerts if a worker is detected in a danger zone.

Carpark loitering

PUBLIC SPACES

Monitor specific zones and detect individuals waiting or loitering for extended periods. This is useful for security, public safety.

Image of high security perimeters

PERIMETERS

Reduces human error, detects unauthorized intrusions in real-time  improving response times perfect for airports, military bases and corrections facilities

Passengers waiting for train at Station

TRANSPORT

Detects loitering behavior and sends real-time alerts to security personnel. AI-powered surveillance can analyze human behavior, detect early warning signs, and intervene before incidents occur.

Ready to get in touch ?

Contact Us

Explore how we can tailor our services to meet your specific needs.  

bottom of page