A versatile digital video engine for safeguards and security applications Page: 4 of 8
This article is part of the collection entitled: Office of Scientific & Technical Information Technical Reports and was provided to UNT Digital Library by the UNT Libraries Government Documents Department.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
shows that the card stack can be installed in
a PC with a card adapter.
ICAM Applications
Figure 4 shows the Recon 11 in an ICAM
configuration. Parameters for initialization
and control signals for the ICAM are sent
over the LON. The images from the ICAM
can also be transferred over the LON. A
high speed data transfer option also exists
with the NCC configuration. The ICAM is
capable of working as a stand alone unit, or
it can be integrated into a network of other
cameras. As a stand alone unit it sends its
video images directly to a central computer
for storage. A number of ICAMs can be
multiplexed on a single cable. In this case,
images are captured by each ICAM and held
until commands are received for an
individual image to be transmitted for
review or storage.
The ICAM can capture images on a time
interval basis or upon receipt of a trigger
signal from another sensor on the network.
An ICAM which collects images based on
other sensor signals forms the basis of an
intelligent "front end" image collection
system. The burden of image review
associated with present video systems is
reduced by only recording the images with
significant action. The Recon 11 cards,
used in the ICAM, can also be used to
decompress and display the compressed
images on a NTSC/PAL monitor.
Figure 5 shows the ICAM installed into a
camera housing like the camera housings
used by the International Atomic Energy
Agency. Figure 6 shows the camera
housings with the cover installed.
When a network of cameras are required, a
large number of cameras with ICAMs can
be attached to a single coaxial cable or a
LON cable. Images are captured by each
ICAM and stored until the images are
transmitted to one or more computers whichcan be connected to the same cable. The
ICAMs can capture images on a time
interval basis or upon receiving a trigger
from another type of sensor on the
integrated network. A network of ICAMs
that collects selective images based on other
sensor signals can form the basis ofFigure 4. Image Compression and
Authentication Module.3
Upcoming Pages
Here’s what’s next.
Search Inside
This article can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Article.
Hale, W. R.; Johnson, C. S. & DeKeyser, P. A versatile digital video engine for safeguards and security applications, article, August 1, 1996; Albuquerque, New Mexico. (https://digital.library.unt.edu/ark:/67531/metadc668060/m1/4/: accessed April 19, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; crediting UNT Libraries Government Documents Department.