Click here to view people counting products network  Hotline: 400-000-9680

Smart Security Analysis Box

Current Location:Home | Products | IVA | Smart Security Analysis Box

澳门葡京

Smart Security Analysis Box

 

VT-B2081A-SE, developed independently by BVT, is the industry’s first high performance embedded intelligent video analysis terminal that supports GPU accelerated computing. By virtue of 300GFLOPS computing power’s processor and leading patented algorithm for multi-scenario intelligent detection, it effectively improves the accuracy of intelligent video analysis and provides various intelligent video analysis capabilities including face and age recognition and gender analysis, border monitoring, detection of violence activities, chasing, masking, ATM monitoring and people counting. With specialized intelligent detection and abundant peripheral extended interface, the system can be widely used in a variety of scenarios including financial security, intelligent transportation, intelligent business, and intelligent video surveillance.


Main Features

  • Embedded Linux OS which is stable and anti-virus;
  • Supporting parallel GPU accelerated computing enables intelligent video analysis for various scenarios and computing power up to 300 GFLOPS;
  • Algorithm based on deep learning increases intelligent video analysis accuracy significantly;
  • 8-channel analog camera connections and gigabit Ethernet port for web-based video access;
  • LCD display showing real-time operating state of the system;
  • Supporting hard disk and EMMC main board data storage;
  • Supporting USB3.0 and gigabit optical interface data transmission;
  • Supporting RS485, RS232 serial data communication;
  • Supporting voice intercom and enabling two-way intercom;
  • Supporting GPS;
  • Supporting 8-channel alarm inputs and 4-channel alarm outputs;
  • Supporting a wide range of intelligent video analysis capabilities including face and age recognition and gender analysis, border monitoring, detection of violence activities, chasing, and masking.

 

Applications

Face recognition             Perimeter monitoring                Violence activities        Chasing
 

 

Technical Parameters