Академический Документы
Профессиональный Документы
Культура Документы
70
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
Supplemental instructions
Copyright information
2013 HELLA AGLAIA Mobile Vision GmbH. All rights reserved. This manual is protected by copyright. It
may not be reproduced, either in whole or in part, or stored in a database or a data backup system without
the prior written consent of HELLA AGLAIA Mobile Vision GmbH, nor transmitted in any form, either electronically or mechanically, including photocopying and recording. Violations are subject to the criminal provisions of the Copyright Act.
HELLA AGLAIA Mobile Vision GmbH reserves the right to revise or replace this manual at any time and
without prior notice. Make sure that you have the most current version of this manual. Please dont hesitate
to contact HELLA AGLAIA Mobile Vision GmbH with any questions.
HELLA AGLAIA Mobile Vision GmbH does not guarantee the completeness, accuracy, or timeliness of the
laws, guidelines, or regulations referred to or quoted, whether directly or indirectly, in this manual. It is the
responsibility of the user to become familiar with the current laws, guidelines, and regulations that apply to
their work.
HELLA AGLAIA Mobile Vision GmbH reserves the right to modify the described devices (including the
respective software) without prior notice, irrespective of the content of this manual. Unless expressly
agreed upon in writing, HELLA AGLAIA Mobile Vision GmbH is not obligated to notify the owner or user of
the devices described in this manual (including the respective software) of any revisions, updates, or modifications without further request.
With regard to the people counter, HELLA AGLAIA Mobile Vision GmbHs liability is limited to the terms of
the warranty described in this manual. The information provided in this manual is not a warranty or guarantee of any kind. Stipulations concerning the devices described in this manual are only deemed warranties if they are expressly referred to as such in writing and contain a description of the warrantys scope
and the product covered by the warranty.
The product and company names mentioned in this manual may be protected trademarks of other manufacturers. HELLA AGLAIA Mobile Vision GmbH will be happy to provide you with circuit diagrams, parts
lists of the components used in the respective devices, descriptions, or other information to enable authorized personnel of the user to repair those device components that are deemed repairable by HELLA
AGLAIA Mobile Vision GmbH.
The information contained in this manual has been prepared by HELLA AGLAIA Mobile Vision GmbH with
great care using sources available to HELLA AGLAIA Mobile Vision GmbH. However, HELLA AGLAIA
Mobile Vision GmbH shall not be responsible for any errors, incorrect or incorrectly compiled data, and any
consequences resulting therefrom, irrespective of the legal basis, provided that HELLA AGLAIA Mobile
Vision GmbHs conduct amounts to no more than ordinary negligence.
The aforementioned exclusion of liability does not apply to damages resulting from injury to life, body, or
health or to damages that are caused intentionally, by gross negligence on the part of HELLA AGLAIA
Mobile Vision GmbH, or by the violation of due diligence requirements in connection with the development,
manufacture, and distribution of the products described in this manual.
This does not affect the liability regardless of negligence or fault pursuant to legal regulations such as the
Product Liability Act.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
Table of contents
Table of contents
1
Overview............................................................................................................................................... 7
General information............................................................................................................................. 8
2.1
2.2
2.3
2.4
2.5
2.4.1
Ordering information.................................................................................................... 9
2.4.2
2.4.3
Notes......................................................................................................................................... 11
2.5.1
General notes............................................................................................................. 11
2.5.2
Personnel................................................................................................................... 12
2.5.3
Data protection........................................................................................................... 12
Functional description............................................................................................................... 13
3.2
Fields of application................................................................................................................... 20
3.3
Data interfaces.......................................................................................................................... 20
3.4
3.5
Services..................................................................................................................................... 23
Technical data.................................................................................................................................... 25
4.1
Electrical data............................................................................................................................ 25
4.2
Ethernet interface....................................................................................................... 26
4.2.2
Multi-I/O interface....................................................................................................... 27
4.3
4.4
Environmental conditions.......................................................................................................... 29
4.5
Mechanical data........................................................................................................................ 29
4.6
Optical data............................................................................................................................... 30
4.7
4.8
Product label............................................................................................................................. 31
Installation.......................................................................................................................................... 32
5.1
5.2
5.3
Wiring examples........................................................................................................................ 35
Configuration..................................................................................................................................... 36
6.1
6.2
24.06.2014
6.2.1
6.2.2
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
Table of contents
6.2.3
6.3
6.4
6.5
6.6
6.7
6.8
6.9
24.06.2014
Basic configuration.................................................................................................................... 44
6.3.1
6.3.2
6.3.3
Counting gates........................................................................................................... 49
6.3.4
Acceptance test.......................................................................................................... 51
Advanced configuration............................................................................................................. 53
6.4.1
6.4.2
Disparity area............................................................................................................. 54
6.4.3
Exposure control........................................................................................................ 56
6.4.4
Stairs handling........................................................................................................... 57
6.4.5
Minimal height............................................................................................................ 58
6.4.6
6.4.7
IP configuration.......................................................................................................... 62
6.5.2
Network Services....................................................................................................... 64
6.5.3
6.5.4
6.5.5
6.5.6
Push service............................................................................................................... 71
6.5.7
File Upload................................................................................................................. 72
Add-on features......................................................................................................................... 74
6.6.1
6.6.2
Object List.................................................................................................................. 77
6.6.3
Other settings............................................................................................................................ 90
6.7.1
6.7.2
6.7.3
6.7.4
HMI Settings............................................................................................................... 95
Service Tools............................................................................................................................. 96
6.8.1
6.8.2
6.8.3
6.8.4
6.8.5
6.8.6
6.8.7
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
Table of contents
Cleaning.................................................................................................................................. 107
7.2
Disposal............................................................................................................................................ 109
Appendix.......................................................................................................................................... 110
9.1
9.2
9.3
9.4
10
9.3.1
Definition.................................................................................................................. 112
9.3.2
Evaluation................................................................................................................ 114
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
Overview
Overview
The Automatic People Counter counts the persons within the configured visual range based on stereoscopic imaging and image
processing. The counting data are transferred via different interfaces for external processing.
The results can be verified using video streaming (optional). This
enables a precise proof of the counting accuracy.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
General information
About the manufacturer
General information
The figures in this manual serve the basic understanding. The actual design can differ from the illustrations.
Target group
Notes
Safety instructions are marked by symbols in this manual. The relevant symbol words indicate the severity of the danger.
NOTICE!
This combination of symbol and signal word identifies
possible misconfiguration, data loss or misuse of the
device.
This symbol highlights useful tips and recommendations as well as information for an efficient and troublefree operation.
Warranty information
24.06.2014
The warranty information included in the General terms and conditions of the manufacturer.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
General information
Ordering information, scope of delivery, accesso... > Ordering information
Liability limitation
All the data and notes in this manual were compiled considering
the applicable standards and regulations as well as the state of the
art.
In the following cases Hella assumes no liability for damages:
n
n
n
n
n
For special models, use of additional order options, or current technical changes, the actual scope of delivery can deviate from the
explanations and illustrations in this manual.
The obligations agreed upon in the delivery contract, General
terms and conditions and delivery conditions of the manufacturer
as well as any legal regulations applicable at the time of the contract conclusion apply.
Product
Description
APC-R RS485
24.06.2014
Comment
Order no.
510045
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
General information
Ordering information, scope of delivery, accesso... > Accessories required for initial operation
Software options
Option
Description
Order no.
510130
Object list
Accessories
Description
Version
Comment
Ethernet connection
cable M12 - RJ45
Length of 2 m
510047
Ethernet connection
cable M12 - RJ45
Length of 5 m
510048
Order no.
510063
Installation kit
Surface mount
510058
Installation kit
Angle: 18 and 42
Recessed mount
510056
Installation kit
Angle: 68 and 90
Recessed mount
510057
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
10
General information
Notes > General notes
Mating plug
Special mating plugs are required for connecting the
People Counter to the power supply as well as for providing the connections through the multi IO interface.
2.5 Notes
2.5.1 General notes
Intended use
NOTICE!
Damages caused by misuse
Depending on the actual application, misuse can lead
to device damage and safety risks. Hella assumes no
liability for damages resulting from misuse.
The following list contains, but is not limited to, the following examples of misuse:
24.06.2014
Use as (sole) people detector for switching safetyrelevant equipment e.g. the door closers.
Use of the APC with unauthorized modified firmware.
Use of the APC in unsuitable environments (e.g.
use outside).
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
11
General information
Notes > Data protection
2.5.2 Personnel
NOTICE!
Device malfunctions after configuration by inadequately trained personnel
In order to ensure high counting accuracy and to avoid
malfunctions, the installation and configuration of the
device must be performed by adequately trained personnel only.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
12
X2
X4
24.06.2014
Ethernet interface
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
13
Functionality
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
14
Operating mode
Counting gates
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
15
Stairs handling
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
16
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
17
Fig. 10: Three modes for counting those who turn around
There are three modes (Fig. 10) for counting people who turn
around in the monitored area:
n one count for persons who turn around ( one count per
person )
n no count for persons who turn around ( no count on U-turns )
n counting every time counting lines are crossed ( one count per
crossing ).
Only the counting mode 'one count per crossing' counts immediately by crossing conting lines. Other modes provide the conting
data at the time of leaving of the detection area.
See Chapter 6.3.3 Counting gates on page 49 for
configuration information.
Optimum configuration of the visual range is a prerequisite for the Repassing function.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
18
Door masking
See Chapter 6.5.4 Digital input and door contact on page 67 for configuration information.
See Chapter 6.3.3 Counting gates
on page 49 for configuration information.
After completing the installation, an integrated installation acceptance test must be performed. If this test is successful, a reference
image of the installation is saved automatically.
For service work, this reference image can be used to detect
mechanical changes that require an adjustment of the APC settings (e.g. displacement of mounting angles), by comparing the reference image with the current installation.
See Chapter 6.3.4 Acceptance test on page 51
for configuration information.
Fill level
For the detection of the number of people, e.g. how many people
are currently in a lock gate, elevator or in front of a cash point.
Door coding
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
19
The implemented IBIS protocol daemon implements VDV 300compliant requests as well as additional APC-specific requests.
The protocol daemon can communicate with IBIS masters through
two physical levels (RS-485 or Ethernet). In this case, the APC
acts as an IBIS slave.
Beside the listed protocols, customer specific interfaces can be implemented. Contact the manufacturer
for detailed information.
RS-485
The RS-485 interface is a 2 wire serial bus bus. It can be used with
the IBIS protocoll.
For detailed information see Chapter 4.1 Electrical
data on page 25
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
20
Push Services
pushed data
by previous
requested
task
SOAP
acknowledge
for
pushed data
invocation of
new tasks
APCs
Server
communication establishing
Intranet
Internet
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
21
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
22
Operation
user counter
password counter
3.5 Services
Logging
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
23
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
24
Technical data
Electrical data
Technical data
This chapter lists the technical data of the Automatic People
Counter and the environmental conditions required for its operation.
X2
X4
Ethernet interface
Notes regarding the use of the individual interfaces as
well as their pin allocation are mentioned in the following chapters.
Supply voltage
Digital input
24.06.2014
12 .. 24 V DC
9 .. 32 V DC
10 ms
available
4 W (330 mA at 12
V DC)
Input
Type
Optical coupler
Isolating voltage
707 V DC
50 V
6V
9V
10 mA
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
25
Technical data
Hardware interface specifications > Ethernet interface
RS-485
not isolated
galvanically isolated
Baud rate, up to
115,200 Baud
Terminating resistor
120 Ohm
64
300 m
Ethernet
Transfer rate
10 / 100 MBit/s
100 m
M12/IEC 631076-2-101
Pairing
1/2, 3/4
This interface serves for the communication of the APC with other
devices within an Ethernet network. The interface is also used for
connecting a PC in order to configure the device.
24.06.2014
Pin
no.
Nam
e
Description
I/O characteristic
TX+
Output
RX+
Input
TX-
Output
RX-
Input
Shiel
d
Shielding
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
26
Technical data
Hardware interface specifications > Multi-I/O interface
Pins
Coding
Wiring
1:1
180
90
1/2
3/4
1/2
3/6
Yamaichi Electronics
Y-ConC-R402S-ME4D-2000A
Weidmller
IE-C5DD4UG0030MCSA20-E
with Y-ConCable-2
Drag chain cable, PROFINET, M12, RJ45,
Cat.5 (IEC 11801) / Cat.5e (TIA 568-B),
PUR, 3 m
24.06.2014
The Multi-I/O interface is used to provide the power supply, a digital input (often used for a door contact), a digital output as well as
the interface to the RS-485 communication interface. Via jumpers
the interface offers furthermore the possibility for the selection of
several parameter sets for different doors respectively mounting
locations.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
27
Technical data
Hardware interface specifications > Multi-I/O interface
Orientation optics
Name
Description
I/O characteristic
CODE(2)_COMMON
Coding PIN 2
Output
CODE-ID (2)
Coding PIN 2
Input
CODE(1)_COMMON
Coding PIN 1
Output
CODE-ID (1)
Coding PIN 1
Input
CODE(0)_COMMON
Coding PIN 0
Output
CODE-ID (0)
Coding PIN 0
Input
RS-485 A
Input/Output
RS-485 A
Input/Output
RS-485 B
Input/Output
10
RS-485 B
Input/Output
11
GND RS-485
Output
12
GND RS-485
Output
13
OUT -
Output
14
OUT +
Output
15
DOOR-
Input
16
DOOR+
Input
17
Power supply
Input
18
Power supply
Input
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
28
Technical data
Mechanical data
Type
Connector
Company/supplier
Binder
Item description
Ethernet connector
Series 825 (M12x1)
Shielding
Connection
Degree of protection
IP 67
Pole number
Coding
Transmission characteristics
DIN EN 50173/CAT 5
Outgoing line
90, 180
-25 .. +70 C
-40 .. +85 C
0 .. 95%
95%
Weight
400 g
vandalism-safe
Material
Fastening points
Bottom side
4 x M4 (6 mm)
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
29
Technical data
Optical data
Tests
Vibration, broadband noise
Cold
Dry heat
Damp heat
Radiated immunity
Fast transients, Burst- Battery powered systems and AC powered auxiliary systems
Dimensions
Software
Aperture
2.0
Focal length
2.2 mm
Angle of view(hor.)
110
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
30
Technical data
Product label
Manufacturer
Data matrix code
Production date
Firmware version at delivery time
MAC address
IP address (delivery status)
Hella part number
I/O sub-module
CE marking
Disposal sign
The product label is located on the back side of the device and
contains the information shown in (Fig. 19).
The data matrix code serves as serial number and
contains the following information in encoded form:
24.06.2014
MAC address,
Production date,
Production place,
Version/revision.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
31
Installation
Mounting the APC
Installation
The following chapter describes the mounting and initial operation
of the APC. It provides instructions for establishing the connections
as well as wiring examples for different applications.
Prerequisites
Personnel:
n System integrator
Special tool:
1.
2.
Ensure that the mounting position and the holder or the protective housing provide sufficient stability and do not limit the
visual range.
3.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
32
Installation
Mounting the APC
Mounting parameters
24.06.2014
Installation height
2.10 .. 4.00 m
Mounting angle
0 .. 30
Mounting angle
0 ( 5)
max. 60 cm
20 cm
Lateral alignment
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
33
Installation
Mounting the APC
6.
2.10
1.90
1.70
2.30
2.30
2.00
2.50
2.80
2.40
2.70
3.20
2.70
3.00
3.80
3.20
3.50
4.90
4.10
4.00
5.90
4.90
Pay attention to the dimensions of the monitored area, depending on the installation
height and the optic.
For installation heights which deviate from
the values mentioned in the table
( Mounting parameters Table on page 33),
please contact Hella.
7.
Note down the actual heights, distances and angles for use
during device configuration ( Chapter 6.3.1 Position and
alignment on page 44).
8.
NOTICE!
Reduced counting accuracy
If the mechanical fixation of the APC changes
during operation (e.g. due to vibrations), this will
affect the positioning of the APC. The configured
angles and do not match any more and the
counting accuracy is reduced.
9.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
34
Installation
Wiring examples
Personnel:
1.
2.
3.
NOTICE!
Damage to electronic components due to
electrostatic discharge
The internal components of the APC can be
damaged by electrostatic discharge transmitted
via the interface contacts.
Touch an appropriate ground or earth potential or apply a ground strap before connecting
any components, in order to avoid electrostatic discharge.
4.
5.
Notes on the Ethernet connection
usage off
IP
192.168.100.10
Gateway
192.168.100.1
Subnet Mask
255.255.0.0
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
35
Configuration
Preparation for HMI access
Configuration
This chapter describes the basic configuration of the APC parameters as well as a selection of additional software functions.
Preparation
1.
Configure the following network settings (TCP/IP) for the network adapter on the PC to which the APC is connected:
How the dialog for modifying these settings is accessed
depends on the operating system used:
n In Windows 7:
Control panel Network and Internet
Network and Sharing Center
Change adapter settings
Properties of LAN connection
Properties of Internet protocol V4
n In Windows Vista:
Control panel Network and Internet
Network and Sharing Center
Manage network connections
Properties of LAN connection
Properties of Internet protocol V4
n In Windows XP:
Properties of network environment
Properties of LAN connection
Properties of Internet protocol
Write down the old settings so that they can be restored later.
n Set fixed IP address: 192.168.100.2
n Set subnet mask: 255.255.0.0
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
36
Configuration
Preparation for HMI access
To ensure that the APC loads only current data, Java must
not use any cache.
To verify this, open Java Control Panel in Windows using
an administrator account (Fig. 21).
n In Windows Vista/7:
Control panel Programs Java
n In Windows XP:
Control panel Java
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
37
Configuration
Preparation for HMI access
4.
5.
6.
username counter
and
24.06.2014
password counter
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
38
Configuration
Preparation for HMI access
The start page (Fig. 23) of the web interface appears. Settings can be made here or counting data can be retrieved.
The default state of the Parameter Set
Information (Fig. 23) is Not Modified . It is set
for preinstalled parameter sets as used in transportation applications for fixed door scenarios.
By Changing the parameters the state turns into
Modified .
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
39
Configuration
Basic operation of the configuration HMI
Do not refresh the browser window while the configuration HMI is being loaded.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
40
Configuration
Basic operation of the configuration HMI > Display and change values
Change the menu pages with the tabs (Fig. 26/top) or the
Back (Fig. 26/bottom left) and Next buttons (Fig. 26/
bottom right).
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
41
Configuration
Basic operation of the configuration HMI > Display and change values
3.
[Up/down arrow]: 1
[Alt] + [up/down arrow]: 10
[Shift] + [up/down arrow]: 100
4.
Clicking the Save button applies the parameters of the current menu page.
If a value, which is outside the permissible value
range, was entered into one of the input fields, a
corresponding error message appears as a popup dialog.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
42
Configuration
Basic operation of the configuration HMI > HMI menu structure
Menu
Menu entry
Tab
Comment
Status
Overview
Device Information
License Information
valid licenses
Live Views
Live Demo
Logging
Event Log
Basic Settings
2. Counting Area
area of interest
3. Counting Gates
4. Acceptance Test
Configuration
Advanced Settings
Communication Settings
Add-On Features
24.06.2014
Exposure Control
Stairs Handling
Minimal Height
Reference Image
Counting Polygons
IP Configuration
Network Services
Communication
Digital Input
input usage
Push Service
File Upload
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
43
Configuration
Basic configuration > Position and alignment
Menu
Menu entry
Tab
Comment
Service Tools
HMI Settings
password protection
Firmware Update
Reboot Device
reboot APC
Factory Reset
Download syslog
download parameters
upload parameters
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
44
Configuration
Basic configuration > Counting area and enabling suppression of stat...
3.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
45
Configuration
Basic configuration > Counting area and enabling suppression of stat...
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
46
Configuration
Basic configuration > Counting area and enabling suppression of stat...
2.
3.
4.
5.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
47
Configuration
Basic configuration > Counting area and enabling suppression of stat...
6.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
48
Configuration
Basic configuration > Counting gates
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
49
Configuration
Basic configuration > Counting gates
2.
Application in vehicles
For doors with two wings which open at the
center and slide over the counting lines,
enable the Use Door Masking function in
order to eliminate the possible influence of
the doorway on the counting function.
Disable the door masking when there is no
double center opening door.
If the door masking Door Masking is enabled, the center point between the doors
( Door Center Point at Ground ) is represented as intersection in the Image area.
If Door Masking has not been enabled,
position the counting lines using the mouse
or by changing the offset V Position CL .
In transport vehicles, position the counting
gates within and near the door. In case of the
access doors (front door in buses), the
counting gates can be shifted a little bit further inwards.
3.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
50
Configuration
Basic configuration > Acceptance test
4.
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
51
Configuration
Basic configuration > Acceptance test
2.
3.
Enter and exit three times in the center as well as on the left
and right side of the door area and test the counting during
this process.
4.
5.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
52
Configuration
Advanced configuration > Optical self diagnosis
2.
3.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
53
Configuration
Advanced configuration > Disparity area
4.
5.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
54
Configuration
Advanced configuration > Disparity area
Fig. 36: 'Disparity Image' menu page - With activated check box
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
55
Configuration
Advanced configuration > Exposure control
2.
24.06.2014
1.
2.
Update the view in the Image area with the Refresh Image
button.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
56
Configuration
Advanced configuration > Stairs handling
3.
4.
24.06.2014
1.
2.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
57
Configuration
Advanced configuration > Minimal height
3.
Select the appropriate application case with the Case dropdown list.
4.
5.
6.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
58
Configuration
Advanced configuration > Reference image comparison
2.
3.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
59
Configuration
Advanced configuration > Reference image comparison
3.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
60
Configuration
Advanced configuration > Polygonal counting gates
24.06.2014
1.
2.
Click the Use Polygon Counting checkbox to enable polygonal counting gates.
3.
4.
5.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
61
Configuration
Configuring the communication settings > IP configuration
6.
7.
8.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
62
Configuration
Configuring the communication settings > IP configuration
2.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
63
Configuration
Configuring the communication settings > Network Services
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
64
Configuration
Configuring the communication settings > Protocol and serial communication
Ask for the MIB file of the APC at Hella support at following e-mail address:
people.counter.support@hella.com
2.
3.
4.
The APC has no battery-bufferd clock for power outages and the internal clock can have an inaccuracy of
6 seconds per day.
A VPN (Virtual Private Network) client is included in the APC
system. The VPN client is not switched on and can not be configured in the HMI. Use the embedded linux to setup the VPN.
For more VPN setup information use the "how to" documentation of the OpenVPN website (http://
openvpn.net/index.php/open-source/documentation/
howto.html) or contact the manufacturer.
people.counter.support@hella.com
For file transfer from and to the APC the SFTP (Secure File
Transfer Protocol) is acccessable by user "customer" and password "counter". It uses as SSH the TCP/IP port 22.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
65
Configuration
Configuring the communication settings > Protocol and serial communication
2.
3.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
66
Configuration
Configuring the communication settings > Digital input and door contact
2.
3.
4.
5.
24.06.2014
With the Start delay input field define the delay between the
occurrence of the Start trigger event and the start of the
count in milliseconds.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
67
Configuration
Configuring the communication settings > Digital input and door contact
6.
With the Stop delay input field define the delay between the
occurrence of the Stop trigger event and the stop of the count
in milliseconds.
7.
With the Hold Time input field define the minimum retention
time from the start of the count in milliseconds. It is 2000 ms
and is not adjustable.
A suitable value should be entered here if, after
the start of the count, the level of the trigger
signal again changes for a time longer than the
debouncing time of approx. 30 ms.
2.
3.
4.
With the Start delay (ms) and Stop delay (ms) input fields
define the trigger delay time in ms for the start or stop of the
counting.
Stop delay corresponds to the follow-up time
after Door contact closed and serves the further counting if the connected door contact is not
a final position switch.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
68
Configuration
Configuring the communication settings > Configuring the digital output
5.
With the Hold time input field adjust, if necessary, the minimum hold time after start. It is 2000 ms and is not adjustable.
The minimum hold time serves to bypass shortterm level changes after opening the door (e.g. in
case of pneumatically triggered vehicle doors).
6.
24.06.2014
1.
2.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
69
Configuration
Configuring the communication settings > Configuring the digital output
3.
4.
5.
With the tPulse and tPause input fields the signal lengths
and delay time can be adjusted for the digital output, in milliseconds.
24.06.2014
6.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
70
Configuration
Configuring the communication settings > Push service
7.
The Compare Value and Operator input fields are available for fill events to define a triggering event. Select the
value 1 and the operator > to signal whether more than
one person is present in the recording area.
8.
9.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
71
Configuration
Configuring the communication settings > File Upload
2.
3.
4.
5.
In the SOAP Server Port field enter the port address, which
the recipient uses for exchanging the data.
6.
7.
8.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
72
Configuration
Configuring the communication settings > File Upload
2.
3.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
73
Configuration
Add-on features > Clear zone monitoring
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
74
Configuration
Add-on features > Clear zone monitoring
24.06.2014
2.
3.
Press 'Refresh Image' and 'Straighten out' to discard current settings and arrange all areas into a valid start position.
4.
5.
6.
7.
8.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
75
Configuration
Add-on features > Clear zone monitoring
Door detection
Door trigger
24.06.2014
Apply the 'Use Door Detection' function to check the clear zone
during doors open or close. If the function is active and closing
doors move through the adjusted zone the state information of the
clear zone is 'free' .
1.
2.
3.
4.
In this time frame the clear zone will be set to 'free' for the if
a door profile has been detected. Whatever if there is any
object within the clear zone.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
76
Configuration
Add-on features > Object List
A second list contains: all objects which left the AOI. This historic
object list contains for all detected objects:
Position and height entering the AOI,
position and height leaving the AOI,
entering and dwell time,
average height
and
n the ID of the object.
n
n
n
n
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
77
Configuration
Add-on features > Configuring the video transmission and recordi...
The object list feature is deactivated by default. The object list data
are available via push services.
The object list feature requires a valid licence file - otherwise it is invisible in the HMI setup.
NOTICE!
Limited privacy policy
The privacy policy is limited during the use of the video
transmission and recording.
Data volume
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
78
Configuration
Add-on features > Configuring the video transmission and recordi...
The following table gives the space requirements for the original
camera picture. The values for JPEG images depend on the content of the picture and so may vary slightly.
Space requirements for video recording in gigabytes per hour
Store
Codec
JPEG
Quality
Framerate
(frames per
second)
GB/h
JPEG
55%
5 fps
0.18
JPEG
90%
5 fps
0.36
RAW
5 fps
1.29
RAW
6.67 fps
1.72
RAW
10 fps
2.57
RAW
20 fps
5.15
24.06.2014
1.
2.
3.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
79
Configuration
Add-on features > Configuring the video transmission and recordi...
4.
5.
6.
7.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
80
Configuration
Add-on features > Configuring the video transmission and recordi...
9.
10.
2.
3.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
81
Configuration
Add-on features > Configuring the video transmission and recordi...
5.
With the Store Codec dropdown list define if the video files
should be saved in JPEG or RAW format.
6.
7.
8.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
82
Configuration
Add-on features > Configuring the video transmission and recordi...
9.
Set the maximum file size in the Maximal File Size input
field.
When reaching this file size, a new file is created. The file name contains a time stamp as
variable part.
10.
12.
In the Remote Path input field enter the network path in the
format [Server-IP]:/[Path].
The path corresponds to the shared path for a network drive.
Pay attention to the complete path specification as it is not
always restricted to the name of the shared directory.
Example:
n 192.168.100.9:/DataVolume/video
Prerequisite for the recording is a server path
with NFS file system. The APC can only access
public writeable NFS file paths. A login with user
rights is not possible at the moment.
The IP address of the server should be in the
same subnet as the one of the APC, because the
duration of the boot process of the APC can otherwise be extended also in case of disabled
recording function for up to 6 minutes.
13.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
83
Configuration
Add-on features > Configuring the video transmission and recordi...
24.06.2014
1.
2.
3.
4.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
84
Configuration
Add-on features > Configuring the video transmission and recordi...
6.
8.
9.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
85
Configuration
Add-on features > Configuring the video transmission and recordi...
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
86
Configuration
Add-on features > Configuring the video transmission and recordi...
Set up a shared folder (e.g. videos) on the NAS for the NFS
service (Fig. 63).
The QNAP NAS provides this NFS shared folder
under 192.168.100.251:/videos.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
87
Configuration
Add-on features > Configuring the video transmission and recordi...
24.06.2014
5.
6.
7.
8.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
88
Configuration
Add-on features > Configuring the video transmission and recordi...
10.
11.
12.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
89
Configuration
Other settings > Configuring the data file recording
2.
To set local time and date select date and time and click Set
Date&Time onto Device button.
3.
To set time zone select region and location and click Set
Time Zone onto Device button.
The APC has no battery-bufferd clock for power outages and the internal clock can have an inaccuracy of
6 seconds per day. If possible use the optional NTP
(Network Time Protocol) in the communication settings
( Chapter 6.5.2 Network Services on page 64).
24.06.2014
The recording of the result data in the CSV files are managed
either at constant time intervals or by events such as "door open/
door closed" triggered by digital input connected to a door contact.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
90
Configuration
Other settings > Configuring the data file recording
2.
3.
4.
5.
6.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
91
Configuration
Other settings > Configuring the data file recording
For example:
n File completion intervall: 3 hours
n Sample rate: every 15 minutes
record_id
timestamp
period
status
SUM_IN_0
SUM_OUT_0 ACT_FILL_0
13089
2014-06-12 18:15:00
900
42
13090
2014-06-12 18:30:00
900
13091
2014-06-12 18:45:00
900
13092
2014-06-12 19:00:00
900
13093
2014-06-12 19:15:00
900
13
21
13094
2014-06-12 19:30:00
900
34
13095
2014-06-12 19:45:00
900
55
13096
2014-06-12 20:00:00
900
13097
2014-06-12 20:15:00
900
89
13098
2014-06-12 20:30:00
900
13099
2014-06-12 20:45:00
900
144
13100
2014-06-12 21:00:00
900
233
24.06.2014
OSD status
Description
OK
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
92
Configuration
Other settings > Configuring the logging and displaying the eve...
2.
Set the logging mode with the Logging Mode dropdown list.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
93
Configuration
Other settings > Configuring the logging and displaying the eve...
3.
Set the type of the recorded events with the Event Option
dropdown list.
4.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
94
Configuration
Other settings > HMI Settings
1.
2.
3.
ID for logging
mode
On
Fail
Stop Counting
16
Start Counting
32
Count Event
48
128
64
Counter shutdown
12
192
Internal error
15
255
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
95
Configuration
Service Tools > Updating the firmware
2.
3.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
96
Configuration
Service Tools > Updating the firmware
NOTICE!
Unauthorized firmware may cause damage to the
device
Uploading firmware that was modified manually or has
not been approved by the manufacturer may damage
the functionality of the APC or may even cause device
failure.
Firmware updates do not modify parameters, communication settings and customer settings. New parameters may be set to their default values.
n System integrator
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
97
Configuration
Service Tools > Updating the firmware
24.06.2014
3.
4.
Close this browser and start with a new one to check if the
expected versions of the software components are displayed
(menu pageOverview Device Information).
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
98
Configuration
Service Tools > Updating license file
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
99
Configuration
Service Tools > Resetting the parameter settings
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
100
Configuration
Service Tools > Resetting the parameter settings
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
101
Configuration
Service Tools > Download syslog
24.06.2014
1.
2.
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
102
Configuration
Service Tools > Parameter Import
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
103
Configuration
Door coding
2.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
104
Configuration
Door coding
Signal Description
Fig. 80: Multi I/O connector (red: voltage, blue: output, green: input,
yellow: RS-485, and turquois: pins for door coding)
Comply with Chapter 4.2 Hardware interface specifications on page 26
Configuration
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
105
Configuration
Door coding
If the relevant changes have been made, the entire folder structure
has to be put into a *.tar archive again. This changed file can then
be loaded into the counter using the parameter update function
( Chapter 6.8.7 Parameter Import on page 103).
The files can be opened and edited with any text editor. Use the
freeware 7zip to create or open *.tar files.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
106
7.1 Cleaning
Optimal counting accuracy can be achieved only if the view of the
cameras is not obstructed.
1.
Check the cover plate or the housing from the outside for dirt,
scratches and stickers at regular intervals.
2.
NOTICE!
When used without a cover plate (e.g. in buildings), a recalibration by the manufacturer might
be necessary if the stereo optics are displaced
by improper cleaning.
3.
Cause
Remedy
Personnel
Power supply
interrupted
System integrator
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
107
Fault description
Inaccurate counting
results
24.06.2014
Cause
Remedy
Personnel
Faulty APC
cabling
System integrator
System integrator
Unknown (after
reboot)
Replace APC.
Manufacturer
Dirty optics
Clean optics.
System integrator
Modified
mounting position.
System integrator
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
108
Disposal
Disposal
After the end of usage, the device needs to be disposed in an environmentally suitable way.
NOTICE!
Danger to the environment due to wrong disposal!
Due to wrong disposal danger for the environment can
arise.
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
109
Appendix
Detection area
Appendix
HellaAPCSensors
InstallationHeight/ResultingCoverage
18.06.2014
Inch
Feet
HeinzSchefold
APCType
MetricSystem
Instal.
Height
200
210
220
230
240
250
260
270
280
290
300
310
320
330
340
350
360
370
380
390
400
410
420
430
440
450
460
470
480
490
500
510
520
530
540
550
560
570
580
590
600
Width
Depth
180
190
210
230
250
280
300
320
340
360
380
400
420
450
470
490
510
530
550
570
590
610
630
650
670
690
710
730
750
770
790
800
800
800
800
800
800
800
800
800
800
160
170
180
200
220
240
250
270
290
310
320
340
360
370
390
410
420
440
460
480
490
510
530
540
560
580
600
610
630
650
660
680
700
710
730
750
770
780
800
800
800
Instal.
Height
79
83
87
91
94
98
102
106
110
114
118
122
126
130
134
138
142
146
150
154
157
161
165
169
173
177
181
185
189
193
197
201
205
209
213
217
220
224
228
232
236
Width
Depth
71
75
83
91
98
110
118
126
134
142
150
157
165
177
185
193
201
209
217
224
232
240
248
256
264
272
280
287
295
303
311
315
315
315
315
315
315
315
315
315
315
63
67
71
79
87
94
98
106
114
122
126
134
142
146
154
161
165
173
181
189
193
201
209
213
220
228
236
240
248
256
260
268
276
280
287
295
303
307
315
315
315
Instal.
Height
6,58
6,89
7,22
7,55
7,87
8,20
8,53
8,86
9,19
9,51
9,84
10,17
10,50
10,83
11,15
11,48
11,81
12,14
12,47
12,80
13,12
13,45
13,78
14,11
14,44
14,76
15,09
15,42
15,75
16,08
16,40
16,73
17,06
17,39
17,72
18,04
18,37
18,70
19,03
19,36
19,69
Width
Depth
5,91
6,23
6,89
7,55
8,20
9,19
9,84
10,50
11,15
11,81
12,47
13,12
13,78
14,76
15,42
16,08
16,73
17,39
18,04
18,70
19,36
20,01
20,67
21,33
21,98
22,64
23,29
23,95
24,61
25,26
25,92
26,25
26,25
26,25
26,25
26,25
26,25
26,25
26,25
26,25
26,25
5,25
5,58
5,91
6,56
7,22
7,87
8,20
8,86
9,51
10,17
10,50
11,15
11,81
12,14
12,80
13,45
13,78
14,44
15,09
15,75
16,08
16,73
17,39
17,72
18,37
19,03
19,69
20,01
20,67
21,33
21,65
22,31
22,97
23,29
23,95
24,61
25,26
25,59
26,25
26,25
26,25
APC
APCR
APCRRS485
APCRJ1708
mobile
(orstationary)
applications
APC180
APC180IO
stationary
applications
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
110
Appendix
List of used IP ports
Direction
Port
TCP / UDP
Usage
Description
APC
80
TCP
HMI
APC
10072
TCP
APC internal
request of values
APC
10073
TCP
HMI; external
request of values
and parameters
APC
10074
TCP
APC
69
TCP
HMI; firmware
update file, logfile
and parameter file
up- and download
APC
22
TCP
logfile download
APC
23
TCP
terminal access
APC
22
TCP
secure terminal
access
APC
161
UDP
external request of
values
APC
123
UDP
clock synchronization
APC
2049
UDP
video recording
APC
111
UDP
video recording
portmapper rbcbind;
requesting mount
daemon for NFS
APC
635
UDP
video recording
mount daemon;
mounting NFS directory
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
111
Appendix
Counting accuracy > Definition
Direction
Port
TCP / UDP
Usage
Description
APC
554 (adjustable)
TCP
video streaming
RTSP (RealTime
Streaming Protocol)
APC
80 (adjustable)
TCP
push data to
server
APC
443 (adjustable)
TCP
APC
1194 (adjustable)
UDP
establish virtual
point-to-point connection to a server
9.3.1 Definition
For a defined acquisition period, according to the given formulas,
the sum pA of the people counted by the Automatic People Counter
as well as the sum pM of the people counted by the manual comparison counting are calculated.
In order to guarantee a statistical certainty which
makes the counting results comparable, the collected
database must include a minimum volume of 1000
events of entering/ exiting the vehicle.
24.06.2014
pA
pM
Sum of all the people counted by the manual comparative counting (all boarding and deboarding passengers)
iA
oA
iM
oM
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
112
Appendix
Counting accuracy > Definition
er
Relative error
The relative error er for the sum of all people is calculated from
these values, i.e. of all boarding/deboarding passengers.
The counting accuracy in % reached by the Automatic People
Counter is then 100% minus the relative error er.
When considering the relative error, the over-counting
or under-counting are compared. The following examples should clarify this.
Example 1
Example 2
24.06.2014
iA
1120
oA
1110
pA
2230
iM
1145
oM
1131
pM
2276
er
Relative error
2.02%
Counting accuracy
97.98%
iA
1120
oA
1156
pA
2276
iM
1145
oM
1131
pM
2276
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
113
Appendix
Counting accuracy > Evaluation
er
Relative error
0.0 %
Counting accuracy
100 %
The relative error er for this example is at 0.0% (corresponding to a counting accuracy of 100%), because
the under-counting of the boarding passengers is compensated with the over-counting of the deboarding
passengers.
9.3.2 Evaluation
In order to prove the counting accuracy, Hella prefers evaluation of
the recorded videos so that very elaborate and cost-intensive
manual counting processes are avoided.
Furthermore, the expected counting data acquisition regarding the
qualitative evaluation by means of video recordings represents a
decisive advantage for the customer through its complete transparency. The criteria for generating the comparative data base can be
tested on both sides (as it was evaluated) and corrected afterwards
(selective correction of the evaluation).
The error rate of a video-based comparative data base (typically
500 ppm) can be reduced considerably with respect to the usual
manually determined comparative data base (typically 50,000
ppm). This quality increase is actually necessary in order to prove
statistically that the counting accuracy is in a range above 95%.
Thus, it is required an Automatic People Counter with Stream and
Store License as well as a suitable storage device are installed are
installed during the acquisition period.
The recorded videos are analyzed by two independent evaluators,
i.e. the manual comparative counting results are determined from
the videos.
If during the analysis of the video, there are discrepancies between
the two independent evaluators, the corresponding videos of the
two evaluators are analyzed together in order to establish the
manual counting result.
The manual counting results determined like this are then processed according to the above-mentioned formulas using the
counting results acquired by the Automatic People Counter for
determining the relative error and thus the achieved counting accuracy.
In addition to the overall evaluation of all boarding and deboarding
passengers during the acquisition period, the relative error respectively the counting accuracy are shown separately for boarding and
deboarding passengers (see Example for determining the
counting accuracy Table on page 115).
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
114
Appendix
Counting accuracy > Evaluation
Number
356
Stations
With errors
29
Stations
Correct
327
Sum
Auto
In
520
Sum
Auto
Out
510
Sum
Auto
Sum
Manual
In
510
Sum
Manual
Out
526
Sum
Manual
Error
Calculated
In
10
Error
Calculated
Out
-16
Error
Calculated
1030
1036
-6
Accuracy
In
98.04
Accuracy
Out
96.96
Accuracy
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
97.49
115
Appendix
Software licenses
Components
License
Linux kernel
Busy Box
FFMPEG
NTP client
TFTP
INI4J
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
116
10
AOI
Area Of Interest
The area to be evaluated using image processing
APC
API
ASCII
BGS
Background Segmentation
Automatic interference points masking
CounterApp
Counter Application
Software component of the APC which executes the image
processing for the people counting
Counting area
see AOI
Counting gates
CSV
CZM
DNS
Fill Level
FPGA
FPS
FQDN
FTP
GPIO
HAGL
Hella Aglaia
Identification for the message API interface
HMI
HTTP
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
117
I/O
Input/Output
Input and output
IBIS
IP address
JRE
LVDS
M12
MAC address
NAS
NFS
NTP
OSD
PoE
Push service
RAW
RJ-45
RS-485
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
118
RTSP
SOAP
TCP
UDP
UTC
VDV 300
VPN
24.06.2014
This document has to be treated confidentially. Its contents are not to be passed on, duplicated, exploited or
disclosed without our express permission. All rights reserved, especially the right to apply for protective rights.
119