SKU: D-IPC-EW5541P-AS
Shop Dahua
Explore the Dahua H.265+ 5MP Fisheye Camera with built-in mic, IR, and advanced features. Learn more at www.ic.plus
MPN:
DHI-IPC-EW5541P-AS
Warranty:
RTB - 36 Months
Register/Login to View Price
With fisheye lens, Dahua Fisheye series camera can realize 360°
surveillance, and it is widely applied in various scenes such as airports,
shopping centers, banks and hotels.
Features:
- 5MP, 1/2.7" CMOS image sensor, low illuminance, high image definition
- Outputs max. 5MP (2592 × 1944) @25/30 fps
- H.265 codec, high compression rate, ultra-low bit rate
- Built-in efficient IR illuminator, and the max. illumination distance: 10 m
- ROI, SMART H.264+/H.265+, flexible coding, applicable to various bandwidth and storage environments
- 120dB WDR, 3D DNR, HLC, BLC, digital watermarking, applicable to various monitoring scenes
- Intelligent detection: Intrusion, tripwire, people counting in area
- Abnormality detection: Motion detection, video tampering, scene changing, audio detection, no SD card, SD card full, SD card error, network disconnection, IP conflict, illegal access, and voltage detection
- Alarm: 1 in, 1 out; audio: 1 in, 1 out; supports max. 256 G Micro SD card, built-in Mic
- 12V DC/PoE power supply, easy for installation
- Heat map for people counting. You can adjust the number of people, time threshold to generate a heat map, which can be exported
Heat Map
Duhua heat map technology is used to display the crowd density and
people appearance probability. Display the crowd status by different
colors. Generally, the crowd status is the statistics of people quantity in
space and time dimensions.
In Area No.
With advanced stereo image technology and deep leaning algorithm,
Dahua In Area No. technology recognizes human targets accurately to
count people in area in real-time. You can set people quantity threshold,
when the number larger or smaller than the threshold, it triggers
linkage. It is applicable in the scene that has limit on people quantity.
Cyber Security
Dahua network camera is equipped with a series of key security
technologies, such as security authentication and authorization, access
control, trusted protection, encrypted transmission, and encrypted
storage, which improve its security defense and data protection, and
prevent malicious programs from invading the device.