Menu
0
Total price
0 €
PRICES include / exclude VAT
>BS EN IEC 62676-6:2026 Video surveillance systems for use in security applications Performance testing and grading of real-time intelligent video content analysis devices and systems for use in video surveillance applications
sklademVydáno: 2026-04-08
BS EN IEC 62676-6:2026 Video surveillance systems for use in security applications Performance testing and grading of real-time intelligent video content analysis devices and systems for use in video surveillance applications

BS EN IEC 62676-6:2026

Video surveillance systems for use in security applications Performance testing and grading of real-time intelligent video content analysis devices and systems for use in video surveillance applications

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
Non-printable
415.22 €
Anglicky Hardcopy
In stock
415.22 €
Označení normy:BS EN IEC 62676-6:2026
Počet stran:230
Vydáno:2026-04-08
ISBN:978 0 580 99120 2
Status:Standard
DESCRIPTION

BS EN IEC 62676-6:2026


This standard BS EN IEC 62676-6:2026 Video surveillance systems for use in security applications is classified in these ICS categories:
  • 13.320 Alarm and warning systems
  • 27.120.20 Nuclear power plants. Safety
This Standard specifies the functions, performance, interfaces, environmental adaptability, test methods, performance evaluation and grading rules of real-time intelligent video analysis in surveillance systems. This Standard applies to live and forensic, real-time intelligent video analysis devices and systems in video surveillance. The standard is centered on testing performance and grading device functionality which enables; - Core Capability: Classification of Objects, Detection of specific "object activity" such as "stopping", "starting", "direction of movement", etc. Examples and current expanded list in Annex H - Complex Capability: Detection of "scenarios" which are based on combinations of object activity such as "loitering", "perimeter intrusion detection", "person down", "tailgating", "intrusion", “abandoned object detection”, Explosion, Fire, Flood, Potential Terrorist attack using a vehicle, Owner of an abandoned bag, etc. Examples of current scenarios are listed and described in Annex I