Page 2
2013 MATE Intelligent Video Ltd All rights reserved. The copyright and proprietary rights in the guide belong to MATE Intelligent Video Ltd. It is strictly forbidden to copy, duplicate, sell, lend or otherwise use this guide in any way, shape or form without the prior consent of MATE Intelligent Video Ltd.
Introduction NTRODUCTION IN THIS SECTION About this Guide ..........1-1 Trigger NG™ is a compact, low power, embedded video content analysis and transmission server for perimeter and site protection. Trigger NG uses DSP processors to analyze up to 2 video channels concurrently, with video encoding and transmission over a network.
Introduction 1.1. About this Guide This guide is divided into the following sections: Overview: A general overview of Trigger NG. System Setup: Procedure for setting up the hardware and software. Getting Started: Running the application and a description of the StartUpApplication.
Overview VERVIEW IN THIS SECTION The Technology ......... 2-22-1 Architecture ............2-2 Software Architecture ........2-3 Trigger NG is based on a proprietary and robust video analytics technology for object detection, tracking and event identification. Trigger NG is capable of processing video smartly and independently near the camera, thereby increasing detection accuracy and fault tolerance while reducing network bandwidth and overall operation costs.
Overview 2.1. The Technology Behavior Tracking is a domain of Video Content Analysis (VCA) that applies specific rules to detect and alert numerous violations and irregular conduct: abandoned objects, stopped cars, perimeter breach, etc. The field of VCA is also known as Computer Vision.
Overview Input Counter Relays Relays 2: T NG B IGURE RIGGER ANEL 2.3. Software Architecture The system consists of the following modules: 2.3.1. Video Analytics Engine The Trigger capturing and analyzing unit captures the analog video from the camera. Its embedded video analytic engine loads rule-sets known as MSFs that define the video-based alarm criteria per camera.
Overview security mechanism to limit the user’s scope in accessing and operating the system. 2.3.4. Cortex Viewer Cortex Viewer serves as the main user interface for viewing the status of the device and each of its connected cameras, and for displaying live video images with video tracking overlay.
System Setup YSTEM ETUP IN THIS SECTION In the Package ............... 3-1 Hardware and Operating System Requirements ... 3-1 Installing the Hardware ..........3-2 LED Display ..............3-3 Installing the Cortex Software ........3-3 Un-Installing the Software ..........3-4 The Trigger NG device comes pre-installed with its own embedded software. The Installation CD with the Cortex software is provided for controlling and managing the Trigger NG.
System Setup NFORMATION To add the IIS Windows component: Start Settings Control Panel Add or Remove Programs Add/Remove Windows Components (may require the Microsoft Windows XP setup disk if not already installed). Regional and Language option should be set to English (United States). 3.3.
System Setup 3.4. LED Display Once the power is connected, the LED Panel displays the following information: Trigger NG LED Display Description Video Input 1 Active Video Input 2 Active Connection to Cortex 3.5. Installing the Cortex Software Use the Cortex software to control and manage the Trigger NG. 3.5.1.
System Setup 6. Wait until all the files and device drivers are installed (follow on screen instructions). Click Yes At the pop up window question if you are going to use analog video, or No in order to ignore and continue. 3: A IGURE NALOG...
Getting Started ETTING TARTED IN THIS SECTION Initial Use of the Application ......4-1 StartUp Application .......... 4-2 Verify that the Windows Firewall software is NOT operational: Cortex does not support the operation of any firewall software. 4.1. Initial Use of the Application When running the application for the first time after installation, an Application Settings window is opened.
Getting Started Device ID: Every device in the Cortex network needs a unique identifier. Enter a number that will be unique to the installed computer and click OK (make up a number): any integer between 1 and 9999 can be entered in this field, as long as each device and Cortex in the same network has a different number.
Getting Started Access the StartUp Application by clicking the system tray icon: 5: S IGURE TART PPLICATION The following is a description of the StartUp Application dialog screen: Product – The product's name. Number of Video detection Units (VDU) – the maximum number of Video Detection Units the application is licensed to control.
Getting Started 4.2.1. Interface Language StartUp Application can be optionally configured to display the user interface in another language: 1. To change the interface language: Click Tool Interface Language and select one of the languages available. 2. The language change affects the following applications: StartUp Application, Cortex Viewer, Cortex Searcher, Cortex Player, Reporter Manager, Rules Manager and Policy Manager (where applicable).
Rules Manager/Device Explorer ULES ANAGER EVICE XPLORER IN THIS SECTION Launching Rules Manager/Device Explorer ..5-1 Device Explorer View ........5-4 Rules Manager View ........5-17 Working with MSFs ........5-21 Working with Alarm Geometries.....5-23 Setting Alarms ..........5-29 Alarm Types ........... 5-325-33 The Rules Manager program selects, configures and manages video detection rule-sets.
Rules Manager/Device Explorer 5.1.1. Menu Bar Consists of shortcuts to various functions: File: Exit the application View: Switch between video setting and mapping setting Video – Displays live video Mapping – Display map with camera icon location ...
Rules Manager/Device Explorer 5.2.1.1. Device Information Displays the IP Settings obtained and the current MAC Address of a device selected in the List View. All fields are read-only and cannot be edited. 5.2.1.2. Device Settings Displays the current configuration settings of a device selected in the List View. Edit the fields as follows: ...
Page 28
Rules Manager/Device Explorer Click the ellipse button to fill the field with the Local Machines IP Address: Disable Alarms to Server: Select this checkbox to disable alarms sent to server. 5.2.1.4. S/W Upgrade/Reset The Device Explorer can be used to update the device’s software or upgrade the license, via the Select File button.
Rules Manager/Device Explorer 4. Plug in the video cables. 5.2.2. Video Settings Tab 11: V IGURE IDEO ETTINGS 5.2.2.1. Image Properties The Image Properties are effective in controlling bandwidth by allowing for the customization of the resolution of the transmitted images as follows: ...
Rules Manager/Device Explorer 4CIF QCIF 704 x 480 352 x 240 176 x 120 NTSC: PAL: 704 x 576 352 x 288 176 x 144 Jpeg Quality: Choose between: High: default value and recommended for all LANs. Medium: recommended for WANs with more than 1Mb bandwidth. ...
Rules Manager/Device Explorer Inter Frames determines when a full frame is sent and not just a delta (e.g., 15 would mean every 15th frame is a full frame). Average BR designates the desired bit rate (between 50000 and 1500000 for CIF, and between 50000 and 3000000 for 4CIF).
Rules Manager/Device Explorer 5.2.2.4. Camera Naming Displays the current camera names on the selected device. Change the names as desired and click the Save button to apply the new settings. In T1 and iSense there will be only one camera available. 5.2.2.5.
Rules Manager/Device Explorer 5.2.3. I/O Settings Tab The I/O settings tab for Trigger and ISense are shown below: 14: I/O S IGURE ETTINGS RIGGER 15: I/O S IGURE ETTINGS ENSE 5.2.3.1. Relay / Input The Relay / Input settings relate to how the device handles the activation of relays and inputs.
Rules Manager/Device Explorer Alarms H/W Switch (Trigger) – Determines whether a hardware switch (closing the input contacts) assigned to a video feed has any effect on alarms generated, as follows: Checked - Closing an input contact assigned to a video feed effectively means that no alarms are generated on that feed (no video analytics).
Rules Manager/Device Explorer 5.2.4. External Interfaces Tab The External Interfaces tab for Trigger and ISense are shown below: 16: E IGURE XTERNAL NTERFACES TAB RIGGER 17: E IGURE XTERNAL NTERFACES TAB ENSE 5.2.4.1. AVC Server – Trigger Only The Video Detection Unit (e.g. Trigger NG) can be configured (optionally) to send a video clip of an event to a specific IP Address where an AVC Server resides.
Page 36
Rules Manager/Device Explorer To configure the embedded parameters on a VDU, edit the fields as follows: IP Address: The IP Address of the AVC Server. Port Number: The port number of the AVC Server (preset to 1976). Frame Rate: Offers a means to reduce the quality of a video clip, in order to ensure that the video clip can still be transmitted without error over a limited bandwidth network.
Rules Manager/Device Explorer Receiving Port Number: The port number to receive the Metadata from. Click the Save button to apply any new settings (for dependency use). 5.2.4.2.2. DVR If using a DVR in conjunction with the VDU, configure the DVR settings as follows: ...
Rules Manager/Device Explorer 5.2.6. Date Time Settings Tab 19: D IGURE IME SETTINGS TAB The Date and Time Settings tab is used for an external NTP server to synchronize all devices to an external time generator. Select the checkbox to use the NTP Server ...
Rules Manager/Device Explorer 5.2.7.1. Video Server When the maximum streams are utilized, the server should provide a stream with matching Encoding, Resolution, or Bit Rate. Otherwise request will be rejected. Select the checkbox Encoding, Resolution, or Bit Rate. Select the checkbox to enable RTCP. Click Save. 5.3.
Rules Manager/Device Explorer 5.3.1. Tree View The Tree View pane on the left side displays a list of connected devices, and for each device, a hierarchy of video feeds per device, MSF per video feed, and detection zones (ROI) set for each MSF. The Tree View shows all the units connected to the same Cortex server.
Rules Manager/Device Explorer 5.3.3. Alarm Tab The Alarm tab may include a means to set the sensitivity for specific alarm notifications. With some alarm types, the tab also displays additional setting options (discussed under the relevant alarm type sections). 23: A IGURE LARM 5.3.3.1.
Rules Manager/Device Explorer To enable relay output for events: 1. From the Tree View, right click on connected device. The following window appears: 2. Select Enable Relay Outputs for Events. 5.3.4. MSF Schedule Tab Displays and sets the parameters related to the entire rule set: a surveillance scheduler and an indoor / outdoor scene selection.
Rules Manager/Device Explorer 5.3.4.2. Indoor/Outdoor Selection By default, an Outdoor scene is assumed and advanced interference rejection algorithms are deployed. The Indoor option uses an alternate set of algorithms, optimized for indoor use. Note: This setting is defined per MSF and affects all alarms within that MSF. Note: This feature is very useful in Area Coverage and Motion Activity.
Rules Manager/Device Explorer An unsaved MSF appears with an asterisk (*) next to its name. 5.4.3. Activating/Deactivating a Single MSF Right click the relevant MSF name field and select Set as Active MSF from the popup menu. A check appears next to the left of the MSF name field to indicate it is active.
Rules Manager/Device Explorer 5.4.8. Exporting an MSF You can save an MSF as an accessible file on your computer. Right click the MSF name field and select Export MSF. Follow the browse dialog to save it in the desired location on your PC. 5.4.9.
Rules Manager/Device Explorer 5.5.1. ROI Tab for Detection Zone Geometry Select the ROI tab to designate the area of support for the selected alarm type, using the ROI drawing tools located in the right column. ROI Drawing tools comprise a rectangle and a polygon To draw a rectangle: select the rectangle button and press while dragging...
Rules Manager/Device Explorer Allows the Human size rectangle to be adjusted. This button resets the size to its default value. Used for undoing the last performed operation (only the last action). Allows the rectangle to be shifted to an image location where it is easier to set the size.
Rules Manager/Device Explorer You can press the Pause/Play button under the camera display and pause streaming. This way you can drag the indicators to the desired location where a subject is captured, and set the indicators more accurately. 26: M IGURE INIMUM AND AXIMUM INDICATORS...
Rules Manager/Device Explorer As different ROIs in the image may have different object sizes and perspective distortions, the process below iterates for every ROI that depicts a perspective distortion. To set Perspective: 1. In the Rules Manager window, left click to highlight an alarm. 2.
Rules Manager/Device Explorer 6. Use the Shift button to move the Far point indicator to the furthest location in the ROI. 7. Select the Maximum button. Drag the edges of the Far Point Maximum rectangle. The pair of rectangles will scale in accordance with the change in any dimension of the Maximum rectangle.
Rules Manager/Device Explorer Use the Eraser button to delete all ignore zones (ignore zones can only be edited once all three have been created). 29: I IGURE GNORE The Ignore zone does not display in the Cortex Viewer. 5.6. Setting Alarms 5.6.1.
Rules Manager/Device Explorer 5.6.3. Scene Switch Feature The Behavior Watch VDUs support the operation of multiple preset cameras (e.g. PTZ Cameras). To activate this feature for a feed, right-click on the feed and select Set as Scene Switch Feed from the popup menu. The Rules Manager application will automatically detect each of the preset scenes (up to a maximum of 4) and each scene will be treated as a separate "feed"...
Page 53
Rules Manager/Device Explorer Up to 4 scenes per feed Minimal visit time: 10 seconds Consistent visit order, visit duration may vary Duration of tour/switching cycle < 2 minutes Fast recovery Reset recovery Configuration: Click Set as Scene Switch Feed or Reset Scenes V4.5 Page 5-31...
Page 54
Rules Manager/Device Explorer To add MSF click Add New MSF and click on Scene This feature works identically with Virtual Switching products. This feature is license dependent and runs both on BW and Trigger T1S. Requires license of Max Allowed Scenes. V4.5 Page 5-32...
Rules Manager/Device Explorer Alarm Types The following table displays which alarm types are currently supported by the various VDUs: ALARM TYPE BEHAVIOR TRIGGER ISENSE WATCH Static Object Presence Path Detection Object Started ...
Rules Manager/Device Explorer Peripheral protection: Monitor the area around an asset or resource for detection of objects that approach said asset or resource. Wide area surveillance: Monitor a large area for early warning and detection of intrusions. To Set the VMD Alarm: 1.
Rules Manager/Device Explorer Abandoned object: detecting packages / objects left by moving pedestrians in a public venue. To Set the Static Object Alarm: 1. Right click the MSF name field, select Add New and then Static Object. 2. Select the ROI tab, and use one of the drawing tools (rectangle / polygon) to draw the desired shape of the ROI.
Rules Manager/Device Explorer Detect intrusion into high-occlusion areas: Detect objects in highly-occluded areas due to background objects in multiple depth arrangement such as an open space with furniture and cubicle walls. 32: P IGURE RESENCE LARM To Set the Presence Alarm: 1.
Rules Manager/Device Explorer 2-way path detection: Triggers alarm in the use cases above, irrespective of the path direction: source zone to detection zone or vice versa. 33: P IGURE ETECTION LARM To Set the Path Detection Alarm: 1. Right click the MSF name field, select Add New and then Path Detection. 2.
Rules Manager/Device Explorer notification will be sent once it fully stops and then starts moving inside or outside the ROI. 34: O IGURE BJECT TARTED LARM To Set the Object Started Alarm: 1. Right click the MSF name field, select Add New and then Object Started. 2.
Rules Manager/Device Explorer 35: D IGURE IRECTIONAL OTION LARM To Set the Directional Motion Alarm: 1. Right click the MSF name field, select Add New and then Directional Motion. 2. Select the ROI tab, and use one of the drawing tools (rectangle / polygon) to draw the desired shape of the ROI.
Rules Manager/Device Explorer Peripheral protection: Monitor the area around an asset or resource for detection of suspicious objects that approach said asset or resource. To Set the Loitering Alarm: 1. Right click the MSF name field, select Add New and then Loitering. 2.
Rules Manager/Device Explorer To Set the Speed Alarm: 1. Right click the MSF name field, select Add New and then Speed. 2. Select the ROI A tab and use the drawing tools to draw a first detection zone. The letter "A" appears at the top of the drawn ROI. 3.
Rules Manager/Device Explorer To Set the Object Removal Alarm: 1. Right click the MSF name field, select Add New and then Object Removal. 2. In the ROI tab select one of the drawing tools from the toolbar to draw the desired shape of the ROI around the object.
Rules Manager/Device Explorer 3. Select the Typical Size tab and adjust the size of the rectangle to match the typical size of a person or vehicle in the video image. 4. On the Alarm tab: Set the Area Coverage Type Sensitivity to Low, Medium, or High. ...
Rules Manager/Device Explorer Possible Uses: Ideal for use at airports, seaports, stadiums, highways, or any other areas where people or vehicles gather. To Set the Motion Activity Alarm: 1. Right click the MSF name field, select Add New and then Motion Activity. 2.
Page 67
Rules Manager/Device Explorer Greater: (Access Watch Only) - Creates a dependency between 2 alarm rules such that an alarm is only generated when one rule is triggered more times than another rule within a specified period of time. Note: Up to 3 dependency rules can be created to operate simultaneously. Note: Not relevant for iSense Counting.
Page 68
Rules Manager/Device Explorer Formatted: Font: Bold, Complex Script Font: Bold 2. Add the Alarm TypesAlarm Types to be made dependent. Select the Dependency tab and click Add Rule. The Advanced Dependency window opens. Enter the Sequence Name. The Sequence Name is the name of the dependency rule (the default may be changed).
Page 69
Rules Manager/Device Explorer Enter the Event Validity (Dwell Time) in seconds (except for Single). The Dwell Time is the time period to apply to the dependency rule. It is the time between the start the first alarm to the start of the last alarm in the dependency group.
Page 70
Rules Manager/Device Explorer 13. Click Show Advanced Settings to input cross device arguments/alarms. The advanced settings appear on the Argument of Dependency window. The advanced settings allow you to add alarms from other devices. 14. Enter Feed Number and Device ID. The dependency can be cross feed and cross device.
Page 71
Rules Manager/Device Explorer 17. Enable the Reverse Logic (NOT) to enable a reverse logic condition. This will automatically enable Multiple events during dependency. 18. Click OK. The rule is added in the Dependency tab. 19. Repeat for each dependency required (up to 3 can operate simultaneously). Use the Edit Rule button to make changes to a selected dependency rule, and the Remove Rule button to delete the selected dependency rule from the list.
Rules Manager/Device Explorer 5.6.16. People Counting Description: People Counting is used for the real-time detection and counting of people in video images, converting video data into real-time counting information and storing it in a central database. Possible uses: Assisting retailers in reducing costs with hourly/daily/monthly data. ...
Rules Manager/Device Explorer Formatted: Font: Bold 6. Click the Start Learning button. The Rules Manager application will then go through a two-stage process of first learning the background (static) scene, and then learning the average size from people passing. Keep the scene clear of people for the first phase (the Next button will become enabled once enough of the background has been learned), and then have people moving in the scene for the second stage.
Page 74
Rules Manager/Device Explorer Select the Car Direction as appropriate. Select whether the camera views the scene from the Top or from the Side. 5. Click the Start Learning button. The Rules Manager application will then go through a process of learning the background (static) scene. Keep the scene clear of cars (the Finish button will become enabled once enough of the background has been learned).
Rules Manager/Device Explorer 6. A CCESS ATCH AILGATING 6.1. Application Description Access Watch is a combined video content analysis and access control solution for real-time tailgating detection, by simultaneously analyzing video data from two different cameras focused on the same access point and comparing it to the data received from the access control device.
Rules Manager/Device Explorer 6.4. Architecture Our solution uses top and side view cameras located above and nearby the entrance counting the number of people passing by, a TTL used to notify the edge device about each approved entering and a TTL used to move the edge device between ready and standby states. A violation event appears whenever counted number of people is greater than the number of approval events on a given timeslot, as long as the system is in a ready state.
Rules Manager/Device Explorer 1. For accurate detection, minimum camera height of the Primary Camera (the distance from the bottom of the lens to the floor) should be 2.5m or 8ft, and the camera should point vertically downwards (see diagram below). 2.
Page 78
Rules Manager/Device Explorer Upon receiving such MSF do the following: 1) Import appropriate msf to feed1 (top view camera) and to feed2 (side view camera). 2) Update the ROI on both feeds. 3) For top view learning counting alarm, do learning. 4) Activate the MSF's.
Rules Manager/Device Explorer 6.6.1. Feed 1 MSF A Dependency MSF, contains a single analytic rule and a three dependency rules. o Analytic rule: Counting top view o Dependency Rule 1: Operand 1: TTL2 Operand 2: Feed 1 analytic result ...
Page 80
Rules Manager/Device Explorer o Dependency Rule 2: Operand 1: AccessWatchFeed Function: Single Events name: AccessWatch Send results to manager: false Minimal time between two successive alarms: 2 seconds V4.5 Page 6-58...
Page 81
Rules Manager/Device Explorer o Dependency rule 3: Operand 1: TTL1 Operand 2: AccessWatch Function: And Events name: Tailgating Parameters When alarms are active Send results to manager: true V4.5 Page 6-59...
Rules Manager/Device Explorer 6.6.2. Feed 2 MSF A Dependency MSF, contain a single analytic rule and a single dependency rule. o Analytic rule: Counting side view o Dependency rule: Operand 1: Feed 2 analytic result Operand 2: TTL2 ...
Page 83
Rules Manager/Device Explorer Dwell time: 5 seconds Send results to manager: false V4.5 Page 6-61...
AVCS AVCS IN THIS SECTION Launching AVCS ........7-16-1 AVCS Interface .......... 7-26-2 Cortex Player ..........7-36-3 The Alarm Video Clip Server (AVCS) is an optional application for extending the Video Detection Unit's capabilities, and enabling the saving of a video clip that displays the pre-alarm and post-alarm event video images with an object overlay.
AVCS 7.2. AVCS Interface 44: AVCS I IGURE NTERFACE 7.2.1. Menu Bar Consists of shortcuts to various functions: Close: Exit the program. Tools: Clear List: Clears the Display. Cortex Player Application: Launches the Cortex Player. Configuration: ...
AVCS Product Help: Launches the online help. About: Product information. 7.3. Cortex Player The Cortex Player application is used for viewing saved alarms. Cortex Player displays a video sequence of the prerecorded alarm with pre and post alarm images.
RTP/RTSP RTP/RTSP V IDEO You can open an RTP/RTSP video node in QuickTime. If you do not add parameters to the URI, the default parameters will be used (configurable via the video settings tab in device explorer). To open a RTP/RTSP video node in QuickTime: 1.
RTP/RTSP 8.1. RTSP URI Format A Uniform Resource Identifiers (URI) is a compact string of characters used to identify or name a resource on the Internet. The main purpose of this identification is to enable interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols.
RTP/RTSP Param, val: A list of parameters separated by ‘&’. Some parameters appear on their own, others have a value. In that case they will appear as param=value. Except as noted, any parameter not specified in the URI will take its default value from the Web page settings. The default values given in the following tables are the initial factory settings.
RTP/RTSP 8.3. General Video Parameters 1: G ABLE ENERAL IDEO ARAMETERS Parameter Value Default Description 0, 1 Camera Number Imgsize 4CIF, CIF, QCIF Image Size 1 = mpeg4 format 1, 2 2 = mjpeg mpeg4, mjpeg mpeg4 Spdecify encoder method This is the frame rate divisor.
RTP/RTSP 8.4. Video Server OSD The Video Server OSD is initiated by specifying OSD=1 in the URL command. rtsp://192.168.21.144/cam=0&osd=1 8.4.1. Opening a Stream with OSD For the first 10 seconds after a stream is opened, three white lines appear overlaid on the bottom of the video image.
RTP/RTSP 8.4.2. Permanent OSD After 10 seconds and during ongoing streaming one white line appears overlaid on the bottom of the video image contain the following information: [IP] [Camera Name] The content should be minimal in order not to affect processing. V4.5 Page 8-6...
Factory Defaults ACTORY EFAULTS The Factory default mode is a software only mechanism to reset the system to the original factory defaults. The Trigger has three factory default modes: State 1: Factory default is not active State 2: Factory default is active for all none networking parameters ...
Appendix PPENDIX IN THIS SECTION Trigger NG Hardware Specifications ..10-19-1 10.1. Trigger NG Hardware Specifications CHARACTERISTICS SPECIFICATIONS Video In Two (BNC) composite video inputs Video Out One (BNC) composite video out Video Encoding M-JPEG, MPEG4 Audio In Dual channel audio (3.5mm Jack) Audio Out Dual channel audio (3.5mm Jack) UART...
Appendix 10.1.1. Audio Specifications CHARACTERISTICS SPECIFICATIONS Analog Output voltage 1.0Vrms, 50 ohm Output Load Resistance > 10 Kohm Analog Input voltage Maximum 1.0Vrms Signal to Noise Ration 85 dB Total Harmonic - 86 dB Distortions 10.2. List of WAN Port Numbers and Applications PORT NUMBER APPLICATION 1976...
Index NDEX Ignore Zone Tab ............5-28 Image Properties ............5-7 Importing an MSF ............. 5-23 In the Package .............. 3-1 Indoor/Outdoor Selection .......... 5-21 Initial Use of the Application ........4-1 About this Guide ............1-2 Installing .NET Framework ......... 3-3 Activate Relay ............
Page 100
Index The Technology ............2-2 Tree View ..............5-18 Trigger NG Hardware Specifications ......10-1 Un-Installing the Software ........... 3-4 Video Analytics Engine ..........2-3 Video Source ............... 5-5 Video Transmission Settings ........5-8 VMD (Video Motion Detection) Alarm .....5-33 Working with Alarm Geometries .......5-23 Working with MSFs ...........5-21 Working with Perspective ..........5-26 Working without Perspective ........5-25...
Need help?
Do you have a question about the TriggerNG and is the answer not in the manual?
Questions and answers