Jan 9, 2026

[AI Blog Series Article 3] Connecting Detection → Notification → Improvement. A Summary of Edge × Cloud Video AI Use Cases

In the second article, we organized the differences between general-purpose PCs (PCs with RTX) and edge AI terminals optimized for the field (Jetson-equipped terminals). In this article (the third installment), we will summarize "how to differentiate their use in practice, how to operate them, and how to achieve results" as a continuation. To put it simply, by appropriately combining edge/on-premises/cloud according to field requirements, it becomes easier to link detection to "recording" and from recording to "improvement".

Table of Contents

  1. Scenes Where Video AI is Used in the Field (Typical Use Cases)

  2. What Zenmov Can Provide (Requirement Definition → Introduction → Operation → Improvement)

  3. Summary: Executing 'Detection → Recording → Improvement'


1. Scenes Where Video AI is Used in the Field

Video AI is used to reduce the tasks of "continuously monitoring with human eyes" and to quickly identify abnormalities or signs. Specifically, its application is progressing in the following locations and fields.

(1) Factory / Plant / Warehouse (Safety and Operational Optimization)

  • Detects intrusions into dangerous areas, falls, crouching, and non-wearing of PPE, thereby assisting in safety measures.

  • Monitors congestion and signs of abnormalities around equipment, helping to minimize production stoppages and increased response workloads.

  • Visualizes operational status and is utilized for non-stop operation (improving operating rates).


(2) Parking Lots / Multi-Story Parking Garages / Bicycle Parking Areas (Visualizing Availability and Congestion)

  • Automatically grasps availability, congestion, and duration of stay, reflecting it in operational decisions.

  • Visualizes stay trends and congestion factors, contributing to improved guidance and layout.

  • Reflects it in signage and web guidance, contributing to the dispersion of users.


(3) Security / Monitoring / Facility Management (Offices, Commercial Facilities, Schools, Hospitals, Factory Grounds, etc.)

  • Detects intrusions, suspicious behavior, abandoned items, and stays, notifying the responsible parties.

  • Visualizes congestion and queues, utilizing it for improvements in security deployment and routing design.


(4) Logistics Warehouses / Distribution Centers / Yards (Visualizing Safety and Operations)

  • Detects proximity between forklifts and workers, as well as intrusions into dangerous areas, assisting in safety measures.

  • Monitors stasis at docks and yards, entry/exit, and waiting lines, visualizing bottlenecks.

  • Uses records to improve layout, procedures, and rules.


(5) Tourist Attractions / Event Venues / Train Stations / Airports (Analyzing Human Flow and Congestion)

  • Visualizes congestion, routes, and stay times, optimizing guidance, notification, and staff deployment.

  • Considers privacy in aggregating data that does not identify individuals (anonymized/statistical information).


(6) Disaster Prevention / Infrastructure (Factories, Warehouses, Parking Lots, Roads, Tunnels, etc.)

  • Early detection of signs such as smoke and flames, supporting initial actions (notification, evacuation, firefighting).

  • It is a domain where detection, notification, and recording can be easily automated, even at night or in unmanned environments.


(7) Medical / Care (Hospitals, Clinics, Care Facilities, Waiting Areas, Reception, etc.)

  • Supports the reduction of monitoring burdens by understanding signs of falls, leaving beds, wandering, etc.

  • Visualizes congestion and stasis, utilizing it for improvements in guidance and personnel deployment.

  • Privacy considerations and operational rule establishment, such as masking and access rights, are prerequisites.

2. What Zenmov Can Provide (Requirement Definition → Introduction → Operation → Improvement)

Zenmov flexibly responds to any configuration of edge/on-premises/cloud according to field constraints (network lines, installation environment, security requirements, etc.) and objectives (immediate notification, recorded storage, cross-domain operations), proposing the optimal combinations. We can also propose configurations that allow centralized grasp and management of devices, cameras, detection results, alert histories, etc. on a dashboard.

Additionally, we are capable of providing support for installations and operations anticipating overseas (in countries like Taiwan, Philippines, Malaysia, United Arab Emirates, United States, etc.).


The video AI handled by Zenmov changes the optimal configuration not only based on what is detected but also according to requirements such as real-time capabilities, handling of recorded data, and cross-domain operations. It can be categorized into three parts.


① Edge (Detect on-site and notify immediately)

This configuration analyzes camera footage on-site and notifies and records only the necessary results once abnormalities or signs are detected. Because it can be designed not to consistently send footage externally, it is easier to reduce delays and communication volume, leading to immediate responses on-site. This approach is suitable not only for fixed locations but also for “moving sites” such as mobile or portable devices, continuing detection and recording in environments where communication is unstable.

  • Suitable Requirements: Real-time responsiveness is important / Thin or unstable connections / No external footage transmission desired (due to privacy considerations)

  • Examples of Use: Safety detection in factories (intrusions, falls, non-wearing of PPE, etc.), detecting availability and congestion in parking lots, detecting intrusions and stays around gates, detection and recording in public transport and logistics vehicles (event detection during operation or boarding and alighting).


② On-Premises (Managing recording, searching, and permission within the internal environment)

Effective when you want to consolidate recorded footage and events in the internal environment, including elements like management of storage duration, viewing permissions, and audit compliance.

  • Suitable Requirements: Want to keep it entirely within the internal network / Have strict security and audit requirements / Want to emphasize evidence management.

  • Examples of Use: Monitoring operations of facilities or factory grounds, organizing viewing ranges by relation, reviewing footage post-incident to prevent recurrence.


③ Cloud (Integrating multiple locations for unified operation and visibility)

Effective when you want to aggregate footage and events from multiple sites, promoting understanding of the status across locations and unifying operational rules.

  • Suitable Requirements: Multiple locations exist / Want to operate remotely / Want to manage everything with a single system.

  • Examples of Use: Integrated monitoring of multiple facilities, checking conditions remotely, unifying alert response flows.


(Supplement: Positioning of VMS)

Features such as recording, searching, permission management, and multi-location operation, commonly referred to as VMS (Video Management System) functions, make it possible to quickly investigate "when, where, and what happened" after accidents or troubles, facilitating sharing among stakeholders and enhancing standardization of operational rules.

3. Summary: Executing 'Detection → Recording → Improvement'

The value of video AI lies not only in identifying dangers and abnormalities but also in leaving a record and enabling improvements. By combining mechanisms that allow for real-time awareness (edge inference) with foundational operations such as recording, searching, and permission management, it becomes easier to execute the 'detection → recording → improvement' cycle.

Zenmov designs configurations and operations tailored to field requirements, supporting from PoC to production, operation, and improvement. We hope to collaborate on identifying forms that yield results in various fields such as factories, logistics, facility management, tourism, disaster prevention, and medical/care settings.


Verified Model (Example)

■ AI Detection Model / Detected Targets (Corrections Draft)

Boarding and Alighting Detection

People boarding and alighting from vehicles

Posture Recognition of People

Postures such as standing, sitting, or lying down

Face Recognition

Detection of the presence of faces and whether it is the person

Electronic Fence Detection

Intrusions or exits into specified areas

Crowd Detection (with definable number)

Congestion and how many people are gathered there

Stay Detection (duration definable)

People remaining in the same place for an extended time

Fall Detection

A person in a fallen state

Following Detection (following someone at the entrance)

The act of entering while closely following another person without authentication

Location Detection and Recording

Coming to or passing a specific location

Clothing Detection (Detecting work uniforms or protective gear)

Whether workers or users are wearing designated clothing (uniforms, safety gear)

Vehicle Breakdown

Vehicles in a state of breakdown, such as not moving

Sudden Acceleration

A vehicle abruptly accelerating

Reversed Driving

A vehicle moving in the opposite direction of its forward path

Ignoring Red Lights

Vehicles entering or passing while the signal is red

Fence Climbing (Overcoming a wall)

The act of climbing over walls or fences

Speeding / Speed Measurement (including section measurement)

If a vehicle's speed exceeds the prescribed limits

Vehicle License Plate Recognition

Reading the license plate of a vehicle

Traffic Accident

Incident of collision or contact

Crossing the Central Line (Overstepping double lines)

A vehicle crossing the regulatory line in the center of the lane

Illegal U-Turn

Making a U-turn in a prohibited area

Motorcycle Lane Violation

Motorcycles entering or traveling in designated no-entry lanes

Parallel Parking

Vehicles parked side by side

U-Turn Detection

A vehicle making a U-turn

Unauthorized Area Intrusion

People or vehicles entering designated restricted areas

Foreign Object Intrusion on the Roadway

An object (obstacle) entering the roadway

Tracking Vehicle Movement

Tracking and recording the movement route of vehicles

Illegal Parking (Red and Yellow Lines)

Vehicles parked in no-parking zones

Parking in Intersections

Vehicles parked within intersections

Illegal Left and Right Turns

Prohibited turning actions

Heat Sensing Sensor Detection

Detecting heat (infrared) from people or objects to identify their presence

■ AI Functions & Retail Analysis Pack / Function Descriptions

Incident Search

High-speed searching of recorded footage based on conditions (objects, actions, time, etc.).

Multi-Camera Face Search

Cross-searching the same individual from footage of multiple cameras.

Mask Detection

Determining the presence or absence of a mask from facial images.

Multi-Camera License Plate Recognition Search

Recognizing and searching for license plates with multiple cameras.

Tag & Track (PTZ Tracking)

Tagging a target and automatically tracking it with a PTZ camera.

AI Person & Vehicle Detection

AI identifies people and vehicles for alerts and statistics.

AI Fire & Smoke Detection

AI performs early detection of fires and smoke.

Count of Individuals

Automatically measuring the number of visitors and congestion status.

Heatmap

Color-coding to visualize stasis and flow of people.

Queue Detection

Detecting waiting lines and stasis conditions.

■ PPE Detection Functions

Helmets

Detects the presence or absence of safety helmets.

High-Visibility Vests

Detects high-visibility clothing such as fluorescent vests.

Protective Clothing

Detects designated work clothes or protective gear.

■ Behavior Analysis of People

Collapse Detection

Detects a person in a fallen state.

Hand Raising Detection

Detects a pose of raising both hands.

Crouching Motion Detection

Detects a crouched posture.

Social Distance Violation Detection

Measures the distance between people, detecting when it is less than a certain distance.

■ Others

Access Control System Integration

Integrates video with door unlocking and access control management.

Fire and Alarm System Integration

Triggers events by integrating with fire alarms and warning devices.

Exterior Intrusion Detection System Integration

Integrates with perimeter sensors to detect intrusions.

External Event Integration

Integrates information from external devices like POS with video.

Face Recognition (Watch List)

Identifies registered individuals/people of concern.

License Plate Recognition (Watch List)

Recognizes registered vehicles/vehicles of concern.

Custom AI Analysis

Allows use of user-defined AI models.

Water Level Detection

Detects changes in water levels.

Offline Analysis

Executes analysis and search of imported videos.

Multi-Camera Object Tracking

Tracks targets across multiple cameras. Detects waiting lines and stasis conditions.

Similar Search

Searches for people in images and videos that resemble the given photo.

Data Center Domain Integration

Integrates multiple domains for management in large-scale environments.