top of page
A.i Tech Lost Icon

Lost

The application identifies abandoned or removed objects in areas of interest. The app places no limits on the number of virtual sensors that can be defined within the framed scene and can be used for indoor and outdoor environments and in combination with both traditional and thermal cameras.

Functions

Lost - Abandoned-zone icon
Abandoned/ Removed

Define the area or areas of interest that you wish to receive alarm events based on an object being removed or abandoned.

Lost bags detection
Object Detection

The application has been trained to recognise rubbish (bin bags and boxes) and travel luggage (suitcase and backpack). If desired the prefered object detection can be applied for either garbage or baggage but not both at the same time.

Lost baggage - Alert-icon
Use Case

Detect when objects have been left in fire escape routes or in areas that should be left clear. Detect theft of important items such as painting, statues or valuable goods. Detect suspicious abandoned objects or when rubbish is left in certain areas. Protect objects that should not be removed from their environment.

Integrations

EMAIL

The events generated by the video analysis applications can be notified by e-mail, with the possibility of attaching a sequence of images with the metadata related to the event of interest.

FTP

Notifications can be sent to FTP servers (e.g. FileZilla, IIS), storing for each one a CSV file and a sequence of images with the metadata relating to the event of interest.

Neologic HTTP icon

HTTP

A.I. Tech offers maximum integration with standard HTTP and HTTPS services. Notifications can be received by customizing requests to REST or CGI services to control remote devices (e.g. for PTZ handover mechanisms) or in JSON format, attaching one or more images to the event of interest on any third-party server.

Neologic UDP/TCP icon

UDP /TCP

The metadata associated with the events generated by the A.I. Tech can be received via text strings over configurable UDP / TCP protocols, such as those sent by POS systems.

MODBUS

A.I. Tech plugins can forward alarm notifications using the Modbus TCP protocol, according to the specifications outlined by the IEC 61158 Standard.

MQTT

A.I. Tech plugins can forward notifications using the publish-subscribe MQTT protocol, according to the specifications outlined by the ISO/IEC PRF 20922 standard.

ONBOARD

A.I. Tech also offers mechanisms to notify events of interest directly on board the device that processes the images. It is in fact possible to activate, through applications, the digital outputs on the AI-Appliance, the digital output of the Hanwha cameras and the notification mechanisms of the Axis cameras.

System Architecture

Neologic System Architecture for computer vision icon

Eco System

Products from A.I. Tech are technologically compatible with the following products

Mobotix logo
Axis Communications logo
Hanwha_Group-Logo
i-pro logo
Computer Vision camera icon
Hardware Icon

Common Functions
of A.I. Tech Apps

Tampering

If your camera does not have this functionality, don't worry. All apps can generate when tampering events occur.

PTZ Handover

Do you need to control a PTZ camera when an event occurs? With the ability to trigger a sequence of HTTP calls, you can bring the camera to the desired pre-set, start the PTZ tracking (if available on the camera) and bring the PTZ camera back to the home position after a configurable amount of time.

Activation on a time basis

Apps can be activated on a time basis, only in specific time intervals, e.g. from 9 p.m to

8 a.m. In addition, for server or embedded apps, it is also possible to specify the day (e.g. Monday from 10am to 12pm., Tuesday from 6pm to 10pm.).

Masking

In all apps masking of moving objects can be activated, in order to be compliant with all kinds of privacy requirements.

AI-Dash-Embedded

This is the app's built-in dashboard, which allows you to have the data for the specific camera at your fingertips at all times ( even on camera, if you have an SD card).

​

​

​

Dynamic activation via software

In addition to time-scheduling, you can activate your apps dynamically, through software calls, via HTTP GET requests that allow you to operate in two modes: impulsive and level-based. In the first case you have a single START request and the app will remain active for a certain predefined amount of time. In the second case, you have one START request and one STOP request to control the app.

Use Cases

Abandoned rubbish on pavement

CITIES

Detects and monitors abandoned rubbish.

Faster cleanup prevents environmental hazards and pollution.

AI Lost - Airport Bag

AIRPORTS

 Enhance security by leveraging automation. Security teams can respond to potential threats and misplaced items more effectively

AI Lost - Object removed from art gallery

PUBLIC SPACES

Objects in surveillance footage and detects sudden disappearances.

Distinguishes between authorized and unauthorized removals.

Ai. Tech - Lost

CLEARANCE ZONE

Sends notifications to security personnel or facility managers when items are placed in restricted areas (e.g., fire lanes, emergency exits)

Ready to get in touch ?

Contact Us

Explore how we can tailor our services to meet your specific needs.  

bottom of page