User's Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings- 7.1 Configuring Basic Settings
- 7.2 Configure Advanced Settings- 7.2.1 Configuring SNMP Settings
- 7.2.2 Configuring FTP Settings
- 7.2.3 Configuring Email Settings
- 7.2.4 Platform Access
- 7.2.5 Wireless Dial
- 7.2.6 HTTPS Settings
- 7.2.7 Configuring QoS Settings
- 7.2.8 Configuring 802.1X Settings
- 7.2.9 Integration Protocol
- 7.2.10 Bandwidth Adaptation
- 7.2.11 Network Service
- 7.2.12 Smooth Streaming
 
 
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
146 
disappears from the region for 10s. 
9.  Drag the slider to set the sensitivity value. 
Sensitivity:  Range [1-100]. It stands  for the percentage of the body part of an 
acceptable target that leaves the pre-defined region. 
Sensitivity = 100 – S
1
/S
T
*100 
S
1
 stands for the target body part that leaves the pre-defined region. S
T
 stands for 
the complete target body.   
Example:  if  you  set  the  value  as  60,  a  target  is  possible  to  be  counted  as  a 
removed object only when 40 percent body part of the target leaves the region. 
Note: The Sensitivity of the detection is supported by certain models. Refer to 
actual display for details. 
10.  Repeat the above steps to configure other regions. Up to 4 regions can be set. You 
can click the Clear button to clear all pre-defined regions. 
11.  Click Arming Schedule to set the arming schedule. 
12.  Click Linkage Method to select the linkage methods. 
13.  Click Save to save the settings. 
 VCA Configuration 
 Behavior Analysis 
The  behavior  analysis  detects  a  series  of  suspicious  behavior,  and  certain  linkage 
methods will be enabled if the alarm is triggered.   










