User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- 5.1 Configuring Local Parameters
- 5.2 Configuring Time Settings
- 5.3 Configuring Network Settings
- 5.3.1 Configuring TCP/IP Settings
- 5.3.2 Configuring Port Settings
- 5.3.3 Configuring PPPoE Settings
- 5.3.4 Configuring DDNS Settings
- 5.3.5 Configuring SNMP Settings
- 5.3.6 Configuring 802.1X Settings
- 5.3.7 Configuring QoS Settings
- 5.3.8 Configuring UPnP™ Settings
- 5.3.9 Email Sending Triggered by Alarm
- 5.3.10 Configuring NAT (Network Address Translation) Settings
- 5.3.11 Configuring FTP Settings
- 5.3.12 HTTPS Settings
- 5.4 Configuring Video and Audio Settings
- 5.5 Configuring Image Parameters
- 5.6 Configuring and Handling Alarm Events
- 5.7 Temperature Measurement
- 5.8 VCA Configuration
- Chapter 6 Storage Settings
- Chapter 7 Playback
- Chapter 8 Log Searching
- Chapter 9 Others
- Appendix
Thermometric Network Bullet Camera User Manual
83
The behavior analysis supports a series of behaviors, including line crossing,
intrusion, region entrance, and region exiting, etc.
Note: The rule type for setting varies according to different camera models.
Steps:
1) Click Rule Tab to enter the rule configuration interface.
2) Click to add a new rule. (Optional) Click to delete it.
3) Check the checkbox of the desired rule to enable the rule for behavior
analysis.
4) Select the rule type, set the filter type, and then draw the line/area on the live
video for the single rule.
• Line Crossing detects people, vehicle or other objects which cross a
pre-defined virtual line, and some certain actions can be taken when the
alarm is triggered.
When you select this rule type, you have to select the crossing direction
before drawing a line. Bidirectional, A-to-B, and B-to-A are selectable.
• Intrusion detects people, vehicle or other objects which enter and loiter
in a pre-defined virtual region, and some certain actions can be taken
when the alarm is triggered.
When you select this rule type, you have to set the duration time for
intrusion. Available duration range is from 1s to 100s.