[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115240346B - Side cloud cooperation-based side border monitoring method - Google Patents

Side cloud cooperation-based side border monitoring method Download PDF

Info

Publication number
CN115240346B
CN115240346B CN202210804528.9A CN202210804528A CN115240346B CN 115240346 B CN115240346 B CN 115240346B CN 202210804528 A CN202210804528 A CN 202210804528A CN 115240346 B CN115240346 B CN 115240346B
Authority
CN
China
Prior art keywords
data
border area
border
control terminal
cloud platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210804528.9A
Other languages
Chinese (zh)
Other versions
CN115240346A (en
Inventor
兰雨晴
刘玮
余丹
李易君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Intelligent Security Technology Co Ltd
Original Assignee
China Standard Intelligent Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Intelligent Security Technology Co Ltd filed Critical China Standard Intelligent Security Technology Co Ltd
Priority to CN202210804528.9A priority Critical patent/CN115240346B/en
Publication of CN115240346A publication Critical patent/CN115240346A/en
Application granted granted Critical
Publication of CN115240346B publication Critical patent/CN115240346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19606Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1851Systems using a satellite or space-based relay

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention provides a border monitoring method based on border cloud cooperation, which comprises the steps of installing monitoring equipment at different positions of a border area to shoot video stream data of the border area, analyzing the video stream data of the border area through a control terminal, judging whether an illegal invasion event occurs in the border area, and extracting to obtain a corresponding key picture frame; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.

Description

基于边云协同的边境监控方法Border monitoring method based on edge-cloud collaboration

技术领域Technical Field

本发明涉及边境监控管理的技术领域,特别涉及基于边云协同的边境监控方法。The present invention relates to the technical field of border monitoring management, and in particular to a border monitoring method based on edge-cloud collaboration.

背景技术Background Art

边境区域通常具有较长边界线,为了对边境区域进行监控,通常会在边境区域的边界线间隔设置若干哨站,工作人员通过在哨站上对边境区域进行目视观察,从而对边境区域进行实时监控,确定是否有人非法闯入边境区域。上述方式虽然能够对边境区域进行近距离的检测,但是工作人员的目视观察模式在观察范围和观察实时性上存在一定的局限性,同时还需要安排大量工作人员对边境区域沿线进行长时间的监控,降低边境监控的全面性和可靠性。Border areas usually have long border lines. In order to monitor border areas, several sentry posts are usually set up at intervals along the border lines of border areas. Staff members visually observe the border areas from the sentry posts, thereby monitoring the border areas in real time to determine whether anyone has illegally entered the border areas. Although the above method can detect border areas at close range, the visual observation mode of staff members has certain limitations in terms of observation range and real-time observation. At the same time, a large number of staff members need to be arranged to monitor the border areas for a long time, which reduces the comprehensiveness and reliability of border monitoring.

发明内容Summary of the invention

针对现有技术存在的缺陷,本发明提供基于边云协同的边境监控方法,其在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。In view of the defects of the prior art, the present invention provides a border monitoring method based on edge-cloud collaboration, which installs monitoring equipment at different locations in the border area to shoot video stream data of the border area, and analyzes the video stream data of the border area through a control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to a cloud platform by using a communication satellite, and the cloud platform determines the location information of the border area where the illegal intrusion incident occurs, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data of the border area through a monitoring data transmission link of a monitoring device-control terminal-communication satellite-cloud platform, and sends the picture frames containing the illegal intrusion incident to the cloud platform by extracting key picture frames, thereby avoiding the situation where monitoring delays are caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.

本发明提供基于边云协同的边境监控方法,包括如下步骤:The present invention provides a border monitoring method based on edge-cloud collaboration, comprising the following steps:

步骤S1,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端;通过所述控制终端指示所述监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据;Step S1, installing monitoring devices at different locations in the border area, and connecting all monitoring devices to a control terminal; instructing the monitoring devices to shoot the border area through the control terminal, and collecting the captured border area video stream data;

步骤S2,通过所述控制终端对所述边境区域视频流数据进行分析处理,判断所述边境区域是否发生非法入侵事件;根据上述判断结果,从所述边境区域视频流数据中提取得到相应的关键图片帧;其中,所述关键图片帧至少包括所述非法入侵事件对应的入侵人员画面;Step S2, analyzing and processing the border area video stream data through the control terminal to determine whether an illegal intrusion event occurs in the border area; extracting corresponding key picture frames from the border area video stream data according to the above determination result; wherein the key picture frames at least include the intruder image corresponding to the illegal intrusion event;

步骤S3,构建所述控制终端与通信卫星之间的通信连接,并利用所述通信卫星将提取得到的所有关键图片帧发送到云端平台;Step S3, establishing a communication connection between the control terminal and the communication satellite, and using the communication satellite to send all the extracted key image frames to the cloud platform;

步骤S4,通过所述云端平台对接收到的关键图片帧进行分析处理,确定所述非法入侵事件对应发生的边境区域地点信息;根据所述边境区域地点信息,通过所述云端平台进行相应的报警响应操作。Step S4, analyzing and processing the received key image frames through the cloud platform to determine the location information of the border area where the illegal intrusion event occurred; and performing corresponding alarm response operations through the cloud platform according to the location information of the border area.

进一步,在所述步骤S1中,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端具体包括:Further, in step S1, installing monitoring devices at different locations in the border area and connecting all monitoring devices to the control terminal specifically includes:

将可见光摄像头、夜视摄像头和环境照度传感器共同组成监控设备,并以等间距的形式在边境区域不同位置分别安装所述监控设备;再将每个监控设备包含的可见光摄像头、夜视摄像头和环境照度传感器通过双向通信链路独立连接到控制终端。Visible light cameras, night vision cameras and ambient illumination sensors are combined to form monitoring equipment, and the monitoring equipment is installed at different locations in the border area at equal intervals; the visible light camera, night vision camera and ambient illumination sensor contained in each monitoring equipment are independently connected to the control terminal through a two-way communication link.

进一步,在所述步骤S1中,通过所述控制终端指示所述监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据具体包括:Further, in step S1, instructing the monitoring device to shoot the border area through the control terminal, and collecting the captured border area video stream data specifically includes:

所述控制终端对所述环境照度传感器检测得到的外界环境照度值进行分析处理;若所述外界环境照度值大于或等于预设照度阈值,则所述控制终端向所述可见光摄像头发送工作触发指令,使得所述监控设备切换至可见光拍摄模式;若所述外界环境照度小于预设照度阈值,则所述控制终端向所述夜视摄像头发送工作触发指令,使得所述监控设备切换至夜视拍摄模式;The control terminal analyzes and processes the external environment illumination value detected by the ambient illumination sensor; if the external environment illumination value is greater than or equal to a preset illumination threshold, the control terminal sends a work trigger instruction to the visible light camera, so that the monitoring device switches to a visible light shooting mode; if the external environment illumination is less than a preset illumination threshold, the control terminal sends a work trigger instruction to the night vision camera, so that the monitoring device switches to a night vision shooting mode;

所述控制终端连续收集所述可见光摄像头或所述夜视摄像头拍摄得到的边境区域视频流数据。The control terminal continuously collects the border area video stream data captured by the visible light camera or the night vision camera.

进一步,在所述步骤S2中,通过所述控制终端对所述边境区域视频流数据进行分析处理,判断所述边境区域是否发生非法入侵事件具体包括:Further, in step S2, analyzing and processing the border area video stream data by the control terminal to determine whether an illegal intrusion event occurs in the border area specifically includes:

通过所述控制终端按照预设时间间隔对所述边境区域视频流数据进行图片帧提取处理,从而得到相应的图片帧队列;The control terminal performs picture frame extraction processing on the border area video stream data at a preset time interval, thereby obtaining a corresponding picture frame queue;

对所述图片帧队列的每一个图片帧进行识别处理,得到所述图片帧的画面上存在的人员和边境边界标识物以及上述两者的相对位置关系;Performing recognition processing on each picture frame of the picture frame queue to obtain the personnel and border boundary markers existing on the screen of the picture frame and the relative position relationship between the two;

根据上述两者的相对位置关系,确定所述人员是否存在非法入侵行为,从而判断所述边境区域是否发生非法入侵事件。According to the relative position relationship between the two, it is determined whether the person has committed illegal intrusion, thereby judging whether an illegal intrusion incident has occurred in the border area.

进一步,在所述步骤S2中,根据上述判断结果,从所述边境区域视频流数据中提取得到相应的关键图片帧具体包括:Further, in step S2, according to the above judgment result, extracting corresponding key picture frames from the border area video stream data specifically includes:

若确定所述边境区域发送非法入侵事件,则从所述图片帧队列中筛选画面中同时包含存在非法入侵行为的人员全部身体部分以及所述非法入侵行为发生所在的边境边界标识物的若干图片帧,以此作为所述关键图片帧。If it is determined that the border area has sent an illegal intrusion event, several picture frames containing all body parts of the person who has committed the illegal intrusion and the border boundary markers where the illegal intrusion occurred are selected from the picture frame queue as the key picture frames.

进一步,在所述步骤S3中,构建所述控制终端与通信卫星之间的通信连接,并利用所述通信卫星将提取得到的所有关键图片帧发送到云端平台具体包括:Further, in step S3, establishing a communication connection between the control terminal and a communication satellite, and using the communication satellite to send all the extracted key picture frames to a cloud platform specifically includes:

步骤S301,当构建完成所述控制终端与通信卫星之间的通信连接后,利用下面公式(1),根据当前处于空闲状态的通信卫星的个数,对所述关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,Step S301, after the communication connection between the control terminal and the communication satellite is established, the key picture frames and their corresponding shooting time information are merged and segmented according to the number of communication satellites currently in an idle state using the following formula (1):

在上述公式(1)中,Ha表示对所述关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果,再进行数据分割后得到的第a个子数据,其具有十进制数据形式;S表示所述关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果;D表示所述关键图片帧对应的数据,其具有十进制数据形式;G表示所述关键图片帧对应的拍摄时间信息,其具有十进制数据形式;len()表示求取括号内数据的数据位数;<<表示左移符号;m表示数据分割处理后得到的子数据的最小位数值;n表示数据分割处理后得到的第一个子数据的位数值为n;S(1→m+n)表示数据结果S中第一位至第m+n位的数据;L表示当前处于空闲状态的通信卫星的个数;S*,n+(a-1)×m+1-→(n+a×m)+表示数据结果S中第n+(a-1)×m+1位至第n+a×m位的数据;In the above formula (1), Ha represents the data result obtained by merging the key picture frame and its corresponding shooting time information, and then the ath sub-data obtained by data segmentation, which has a decimal data form; S represents the data result obtained by merging the key picture frame and its corresponding shooting time information; D represents the data corresponding to the key picture frame, which has a decimal data form; G represents the shooting time information corresponding to the key picture frame, which has a decimal data form; len() represents the number of data bits of the data in the brackets; << represents the left shift sign; m represents the minimum bit value of the sub-data obtained after the data segmentation processing; n represents the bit value of the first sub-data obtained after the data segmentation processing is n; S(1→m+n) represents the data from the first bit to the m+nth bit in the data result S; L represents the number of communication satellites currently in an idle state; S*,n+(a-1)×m+1-→(n+a×m)+ represents the data from the n+(a-1)×m+1th bit to the n+a×mth bit in the data result S;

步骤S302,利用下面公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,Step S302, using the following formula (2), add corresponding communication satellite connection identification data to each sub-data obtained by data segmentation,

Ja=Ha<<len(L)+a (2)J a =H a <<len(L)+a (2)

在上述公式(2)中,Ja表示数据分割得到的第a个子数据添加相应的通信卫星连接标识数据后形成的传输数据,其中通信卫星连接标识数据是指通信卫星的卫星编号标识数据;In the above formula (2), J a represents the transmission data formed by adding the corresponding communication satellite connection identification data to the a-th sub-data obtained by data segmentation, wherein the communication satellite connection identification data refers to the satellite number identification data of the communication satellite;

随机选择其中一个处于空闲状态的通信卫星将其中一个传输数据传输到云端平台,并且在同一时间内,一个处于空闲状态的通信卫星只能传输一个传输数据;Randomly select one of the idle communication satellites to transmit one of the transmission data to the cloud platform, and at the same time, an idle communication satellite can only transmit one transmission data;

步骤S303,当所有传输数据被传输到云端平台后,利用下面公式(3),对所有传输数据进行拼接还原处理,Step S303: After all the transmission data is transmitted to the cloud platform, all the transmission data is spliced and restored using the following formula (3):

在上述公式(3)中,j(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据;J′(e)表示云端平台对接收到的第e个传输数据;>>表示右移符号;k(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据的拼接排位顺序值;In the above formula (3), j(e) represents the spliced data obtained after the cloud platform decodes the received e-th transmission data; J′(e) represents the received e-th transmission data by the cloud platform; >> represents the right shift symbol; k(e) represents the spliced ranking order value of the spliced data obtained after the cloud platform decodes the received e-th transmission data;

按照上述拼接排位顺序值k(e)由大到小的顺序,对所有拼接数据j(e)进行拼接还原处理,从而得到所述关键图片帧及其对应的拍摄时间信息。According to the order of the splicing ranking sequence values k(e) from large to small, all the splicing data j(e) are spliced and restored to obtain the key picture frames and their corresponding shooting time information.

进一步,在所述步骤S4中,通过所述云端平台对接收到的关键图片帧进行分析处理,确定所述非法入侵事件对应发生的边境区域地点信息具体包括:Further, in step S4, the received key picture frames are analyzed and processed by the cloud platform to determine the location information of the border area where the illegal intrusion event occurs, which specifically includes:

通过所述云端平台对接收到的关键图片帧进行边境边界标识物识别处理,确定所述关键图片帧画面上的边境边界标识物存在的标识编号;再根据所述标识编号,确定所述非法入侵事件对应发生的边境区域地点信息。The cloud platform performs border marker recognition processing on the received key picture frame to determine the identification number of the border marker on the key picture frame; and then determines the location information of the border area where the illegal intrusion event occurs based on the identification number.

进一步,在所述步骤S4中,根据所述边境区域地点信息,通过所述云端平台进行相应的报警响应操作具体包括:Further, in the step S4, according to the location information of the border area, performing corresponding alarm response operations through the cloud platform specifically includes:

通过所述云端平台生成包括所述边境区域地点信息的报警通知消息,并将所述报警通知消息发送到边境区域处于巡逻状态的工作人员所处的移动终端。An alarm notification message including the location information of the border area is generated through the cloud platform, and the alarm notification message is sent to the mobile terminal where the staff who are in a patrol state in the border area are located.

相比于现有技术,该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。Compared with the existing technology, the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform via communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, so as to avoid monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.

本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在所写的说明书、权利要求书、以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present invention will be described in the following description, and partly become apparent from the description, or understood by practicing the present invention. The purpose and other advantages of the present invention can be realized and obtained by the structures particularly pointed out in the written description, claims, and drawings.

下面通过附图和实施例,对本发明的技术方案做进一步的详细描述。The technical solution of the present invention is further described in detail below through the accompanying drawings and embodiments.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.

图1为本发明提供的基于边云协同的边境监控方法的流程示意图。FIG1 is a flow chart of the border monitoring method based on edge-cloud collaboration provided by the present invention.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

参阅图1,为本发明实施例提供的基于边云协同的边境监控方法的流程示意图。该基于边云协同的边境监控方法包括如下步骤:Refer to Figure 1, which is a flow chart of a border monitoring method based on edge-cloud collaboration provided by an embodiment of the present invention. The border monitoring method based on edge-cloud collaboration includes the following steps:

步骤S1,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端;通过该控制终端指示该监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据;Step S1, installing monitoring devices at different locations in the border area, and connecting all monitoring devices to a control terminal; instructing the monitoring devices to shoot the border area through the control terminal, and collecting the captured border area video stream data;

步骤S2,通过该控制终端对该边境区域视频流数据进行分析处理,判断该边境区域是否发生非法入侵事件;根据上述判断结果,从该边境区域视频流数据中提取得到相应的关键图片帧;其中,该关键图片帧至少包括该非法入侵事件对应的入侵人员画面;Step S2, analyzing and processing the border area video stream data through the control terminal to determine whether an illegal intrusion event occurs in the border area; extracting corresponding key picture frames from the border area video stream data according to the above determination result; wherein the key picture frames at least include the intruder image corresponding to the illegal intrusion event;

步骤S3,构建该控制终端与通信卫星之间的通信连接,并利用该通信卫星将提取得到的所有关键图片帧发送到云端平台;Step S3, establishing a communication connection between the control terminal and the communication satellite, and using the communication satellite to send all the extracted key image frames to the cloud platform;

步骤S4,通过该云端平台对接收到的关键图片帧进行分析处理,确定该非法入侵事件对应发生的边境区域地点信息;根据该边境区域地点信息,通过该云端平台进行相应的报警响应操作。Step S4, analyzing and processing the received key image frames through the cloud platform to determine the location information of the border area where the illegal intrusion event occurred; and performing corresponding alarm response operations through the cloud platform according to the location information of the border area.

上述技术方案的有益效果为:该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。The beneficial effects of the above technical solution are as follows: the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform by using communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, thereby avoiding monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.

优选地,在该步骤S1中,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端具体包括:Preferably, in step S1, installing monitoring devices at different locations in the border area and connecting all monitoring devices to the control terminal specifically includes:

将可见光摄像头、夜视摄像头和环境照度传感器共同组成监控设备,并以等间距的形式在边境区域不同位置分别安装该监控设备;再将每个监控设备包含的可见光摄像头、夜视摄像头和环境照度传感器通过双向通信链路独立连接到控制终端。Visible light cameras, night vision cameras and ambient illumination sensors are combined into a monitoring device, and the monitoring devices are installed at different locations in the border area at equal intervals; the visible light camera, night vision camera and ambient illumination sensor contained in each monitoring device are independently connected to the control terminal through a two-way communication link.

上述技术方案的有益效果为:边境区域需要进行全天候的监控,为了在白天时段和夜晚时段均能够持续对边境区域进行摄像监控,将监控设备设成包括可见光摄像头、夜视摄像头和环境照度传感器,利用环境照度传感器检测外界环境的照度值为基准,对可见光摄像头和夜视摄像头进行切换控制,便于在任何环境光照射条件下,能够对边境区域进行清晰的拍摄。The beneficial effects of the above technical solution are as follows: the border area needs to be monitored around the clock. In order to be able to continuously conduct video surveillance of the border area during both daytime and nighttime, the monitoring equipment is configured to include a visible light camera, a night vision camera and an ambient illumination sensor. The ambient illumination sensor is used to detect the illumination value of the external environment as a reference, and the visible light camera and the night vision camera are switched and controlled, so that clear photography of the border area can be performed under any ambient light conditions.

优选地,在该步骤S1中,通过该控制终端指示该监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据具体包括:Preferably, in step S1, instructing the monitoring device to shoot the border area through the control terminal, and collecting the captured border area video stream data specifically includes:

该控制终端对该环境照度传感器检测得到的外界环境照度值进行分析处理;若该外界环境照度值大于或等于预设照度阈值,则该控制终端向该可见光摄像头发送工作触发指令,使得该监控设备切换至可见光拍摄模式;若该外界环境照度小于预设照度阈值,则该控制终端向该夜视摄像头发送工作触发指令,使得该监控设备切换至夜视拍摄模式;The control terminal analyzes and processes the external environment illumination value detected by the environmental illumination sensor; if the external environment illumination value is greater than or equal to a preset illumination threshold, the control terminal sends a work trigger instruction to the visible light camera, so that the monitoring device switches to a visible light shooting mode; if the external environment illumination is less than the preset illumination threshold, the control terminal sends a work trigger instruction to the night vision camera, so that the monitoring device switches to a night vision shooting mode;

该控制终端连续收集该可见光摄像头或该夜视摄像头拍摄得到的边境区域视频流数据。The control terminal continuously collects the border area video stream data captured by the visible light camera or the night vision camera.

上述技术方案的有益效果为:通过上述方式,利用控制终端指示可见光摄像头和夜视摄像头进行切换控制,无论在何种环境照度条件下,监控设备始终能够清晰地拍摄到边境区域的视频流数据,便于后续从视频流数据中准确识别得到边境区域的边界线上人员的活动情况。The beneficial effect of the above technical solution is: through the above method, the control terminal is used to instruct the visible light camera and the night vision camera to perform switching control. No matter what the environmental illumination conditions are, the monitoring equipment can always clearly capture the video stream data of the border area, which is convenient for the subsequent accurate identification of the activities of people on the border line of the border area from the video stream data.

优选地,在该步骤S2中,通过该控制终端对该边境区域视频流数据进行分析处理,判断该边境区域是否发生非法入侵事件具体包括:Preferably, in step S2, analyzing and processing the border area video stream data by the control terminal to determine whether an illegal intrusion event occurs in the border area specifically includes:

通过该控制终端按照预设时间间隔对该边境区域视频流数据进行图片帧提取处理,从而得到相应的图片帧队列;The control terminal performs picture frame extraction processing on the border area video stream data at a preset time interval, thereby obtaining a corresponding picture frame queue;

对该图片帧队列的每一个图片帧进行识别处理,得到该图片帧的画面上存在的人员和边境边界标识物以及上述两者的相对位置关系;Performing recognition processing on each picture frame of the picture frame queue to obtain the personnel and border boundary markers existing on the screen of the picture frame and the relative position relationship between the two;

根据上述两者的相对位置关系,确定该人员是否存在非法入侵行为,从而判断该边境区域是否发生非法入侵事件。Based on the relative position relationship between the two, it is determined whether the person has committed illegal intrusion, thereby judging whether an illegal intrusion incident has occurred in the border area.

上述技术方案的有益效果为:由于边境区域视频流数据的数据量巨大,其包括较多的图片帧,通过从边境区域视频流数据提取相应的图片帧并组成图片帧队列,这样能够减少对视频流数据的计算工作量。同时边境区域都会设置铁网围墙等作为边境边界标识物,从每一个图片帧上识别得到画面上存在的人员和边境边界标识物以及上述两者的相对位置关系,能够以边境边界标识物作为基准,确定是否发生非法入侵事件;比如当人员翻越边境边界标识物时,即可确定发生非法入侵事件等。The beneficial effects of the above technical solution are as follows: since the amount of video stream data in the border area is huge, it includes a large number of picture frames. By extracting the corresponding picture frames from the video stream data in the border area and forming a picture frame queue, the computational workload of the video stream data can be reduced. At the same time, iron mesh fences and the like are set up in the border area as border boundary markers. From each picture frame, the personnel and border boundary markers on the screen and the relative position relationship between the two can be identified. The border boundary markers can be used as a reference to determine whether an illegal intrusion event has occurred; for example, when a person crosses the border boundary marker, it can be determined that an illegal intrusion event has occurred.

优选地,在该步骤S2中,根据上述判断结果,从该边境区域视频流数据中提取得到相应的关键图片帧具体包括:Preferably, in step S2, according to the above judgment result, extracting corresponding key picture frames from the border area video stream data specifically includes:

若确定该边境区域发送非法入侵事件,则从该图片帧队列中筛选画面中同时包含存在非法入侵行为的人员全部身体部分以及该非法入侵行为发生所在的边境边界标识物的若干图片帧,以此作为该关键图片帧。If it is determined that the border area has sent an illegal intrusion event, several picture frames containing all the body parts of the person who has committed the illegal intrusion and the border boundary markers where the illegal intrusion occurred are selected from the picture frame queue as the key picture frames.

上述技术方案的有益效果为:通过上述方式,将包含存在非法入侵行为的人员全部身体部分以及该非法入侵行为发生所在的边境边界标识物的若干图片帧作为关键图片帧,能够以较少数量的图片帧来表征当前所发生的非法入侵事件,同时还能够保证将关键图片帧快速地进行上传。The beneficial effect of the above technical solution is: through the above method, several picture frames containing all the body parts of the person who has committed illegal intrusion and the border boundary markers where the illegal intrusion occurred are used as key picture frames, so that the current illegal intrusion event can be represented by a smaller number of picture frames, and at the same time, the key picture frames can be quickly uploaded.

优选地,在该步骤S3中,构建该控制终端与通信卫星之间的通信连接,并利用该通信卫星将提取得到的所有关键图片帧发送到云端平台具体包括:Preferably, in step S3, establishing a communication connection between the control terminal and a communication satellite, and using the communication satellite to send all extracted key picture frames to a cloud platform specifically includes:

步骤S301,当构建完成该控制终端与通信卫星之间的通信连接后,利用下面公式(1),根据当前处于空闲状态的通信卫星的个数,对该关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,Step S301, after the communication connection between the control terminal and the communication satellite is established, the key picture frame and its corresponding shooting time information are merged and segmented according to the number of communication satellites currently in an idle state using the following formula (1):

在上述公式(1)中,Ha表示对该关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果,再进行数据分割后得到的第a个子数据,其具有十进制数据形式;S表示该关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果;D表示该关键图片帧对应的数据,其具有十进制数据形式;G表示该关键图片帧对应的拍摄时间信息,其具有十进制数据形式;len()表示求取括号内数据的数据位数;<<表示左移符号;m表示数据分割处理后得到的子数据的最小位数值;n表示数据分割处理后得到的第一个子数据的位数值为n;S(1→m+n)表示数据结果S中第一位至第m+n位的数据;L表示当前处于空闲状态的通信卫星的个数;S*,n+(a-1)×m+1-→(n+a×m)+表示数据结果S中第n+(a-1)×m+1位至第n+a×m位的数据;In the above formula (1), Ha represents the data result obtained after data merging of the key picture frame and its corresponding shooting time information, and then the ath sub-data obtained after data segmentation, which has a decimal data form; S represents the data result obtained after data merging of the key picture frame and its corresponding shooting time information; D represents the data corresponding to the key picture frame, which has a decimal data form; G represents the shooting time information corresponding to the key picture frame, which has a decimal data form; len() represents the number of data bits of the data in the brackets; << represents the left shift sign; m represents the minimum bit value of the sub-data obtained after data segmentation processing; n represents the bit value of the first sub-data obtained after data segmentation processing is n; S(1→m+n) represents the data from the first bit to the m+nth bit in the data result S; L represents the number of communication satellites currently in an idle state; S*,n+(a-1)×m+1-→(n+a×m)+ represents the data from the n+(a-1)×m+1th bit to the n+a×mth bit in the data result S;

步骤S302,利用下面公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,Step S302, using the following formula (2), add corresponding communication satellite connection identification data to each sub-data obtained by data segmentation,

Ja=Ha<<len(L)+a (2)J a =H a <<len(L)+a (2)

在上述公式(2)中,Ja表示数据分割得到的第a个子数据添加相应的通信卫星连接标识数据后形成的传输数据,其中通信卫星连接标识数据是指通信卫星的卫星编号标识数据;In the above formula (2), J a represents the transmission data formed by adding the corresponding communication satellite connection identification data to the a-th sub-data obtained by data segmentation, wherein the communication satellite connection identification data refers to the satellite number identification data of the communication satellite;

随机选择其中一个处于空闲状态的通信卫星将其中一个传输数据传输到云端平台,并且在同一时间内,一个处于空闲状态的通信卫星只能传输一个传输数据;Randomly select one of the idle communication satellites to transmit one of the transmission data to the cloud platform, and at the same time, an idle communication satellite can only transmit one transmission data;

步骤S303,当所有传输数据被传输到云端平台后,利用下面公式(3),对所有传输数据进行拼接还原处理,Step S303: After all the transmission data is transmitted to the cloud platform, all the transmission data is spliced and restored using the following formula (3):

在上述公式(3)中,j(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据;J′(e)表示云端平台对接收到的第e个传输数据;>>表示右移符号;k(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据的拼接排位顺序值;In the above formula (3), j(e) represents the spliced data obtained after the cloud platform decodes the received e-th transmission data; J′(e) represents the received e-th transmission data by the cloud platform; >> represents the right shift symbol; k(e) represents the spliced ranking order value of the spliced data obtained after the cloud platform decodes the received e-th transmission data;

按照上述拼接排位顺序值k(e)由大到小的顺序,对所有拼接数据j(e)进行拼接还原处理,从而得到该关键图片帧及其对应的拍摄时间信息。According to the order of the splicing ranking sequence values k(e) from large to small, all the splicing data j(e) are spliced and restored to obtain the key picture frame and its corresponding shooting time information.

上述技术方案的有益效果为:利用上述公式(1),根据当前处于空闲状态的通信卫星的个数,对该关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,目的是将所有处于空闲状态的通信卫星都利用起来进行数据传输,提高数据传输效率,并且每个通道传输的数据长度基本保持一致,保证了数据传输的时间可以基本一致,同样提高了数据传输的效率;然后利用上述公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,方便云端平台接收到数据后进行数据的自动拼接;最后利用上述公式(3),对所有传输数据进行拼接还原处理,从而根据接收到的数据进行自动智能的数据拼接,体现了系统的智能化和自动化的特点。The beneficial effects of the above technical solution are as follows: using the above formula (1), according to the number of communication satellites currently in an idle state, the key image frame and its corresponding shooting time information are merged and segmented, with the purpose of utilizing all idle communication satellites for data transmission, thereby improving the data transmission efficiency, and the data length transmitted by each channel is basically consistent, thereby ensuring that the data transmission time can be basically consistent, thereby also improving the data transmission efficiency; then using the above formula (2), corresponding communication satellite connection identification data is added to each sub-data obtained by data segmentation, thereby facilitating the cloud platform to automatically splice the data after receiving the data; finally, using the above formula (3), all transmitted data are spliced and restored, thereby automatically and intelligently splicing the data according to the received data, thereby reflecting the intelligent and automated characteristics of the system.

优选地,在该步骤S4中,通过该云端平台对接收到的关键图片帧进行分析处理,确定该非法入侵事件对应发生的边境区域地点信息具体包括:Preferably, in step S4, the cloud platform analyzes and processes the received key picture frame to determine the location information of the border area where the illegal intrusion event occurs, which specifically includes:

通过该云端平台对接收到的关键图片帧进行边境边界标识物识别处理,确定该关键图片帧画面上的边境边界标识物存在的标识编号;再根据该标识编号,确定该非法入侵事件对应发生的边境区域地点信息。The cloud platform performs border marker recognition processing on the received key picture frame to determine the identification number of the border marker on the key picture frame; and then determines the location information of the border area where the illegal intrusion event occurred based on the identification number.

上述技术方案的有益效果为:由于边境区域设置的铁网围墙等边境边界标识物上会设置有相应的标识编号,每个标识编号都是独一无二的,这样每个标识编号可作为相应的边境边界标识物的地理位置标记,通过该云端平台对接收到的关键图片帧进行边境边界标识物上的标识编号进行识别,从而唯一确定非法入侵事件对应发生的边境区域地点信息。The beneficial effects of the above technical solution are as follows: since corresponding identification numbers are set on border markers such as iron mesh fences set up in border areas, each identification number is unique, so that each identification number can be used as a geographical location mark of the corresponding border marker, and the identification number on the border marker is identified on the received key image frame through the cloud platform, thereby uniquely determining the location information of the border area where the illegal intrusion incident occurred.

优选地,在该步骤S4中,根据该边境区域地点信息,通过该云端平台进行相应的报警响应操作具体包括:Preferably, in step S4, according to the location information of the border area, performing corresponding alarm response operations through the cloud platform specifically includes:

通过该云端平台生成包括该边境区域地点信息的报警通知消息,并将该报警通知消息发送到边境区域处于巡逻状态的工作人员所处的移动终端。An alarm notification message including the location information of the border area is generated through the cloud platform, and the alarm notification message is sent to the mobile terminal where the staff who are on patrol in the border area are located.

上述技术方案的有益效果为:通过上述方式,生成包括该边境区域地点信息的报警通知消息,这样工作人员通过查看自身所持的移动终端即可实时了解非法入侵事件发生的位置,并前往相应位置处进行处理。The beneficial effect of the above technical solution is: through the above method, an alarm notification message including the location information of the border area is generated, so that the staff can understand the location of the illegal intrusion incident in real time by checking their mobile terminals and go to the corresponding location for processing.

从上述实施例的内容可知,该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。From the contents of the above embodiments, it can be seen that the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform by using communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, so as to avoid monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.

显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include these modifications and variations.

Claims (7)

1. The border monitoring method based on the border cloud cooperation is characterized by comprising the following steps of:
Step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
Step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area or not; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
S4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; according to the border area location information, corresponding alarm response operation is carried out through the cloud platform;
In the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by using the communication satellite specifically includes:
Step 301, after the communication connection between the control terminal and the communication satellite is established, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in an idle state by using the following formula (1),
(1)
In the above-mentioned formula (1),Representing a data result obtained by carrying out data combination on the key picture frame and the corresponding shooting time information thereof, and carrying out data segmentation on the data result to obtain an a-th sub-data which has a decimal data form; representing a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; Representing data corresponding to the key picture frame, which has a decimal data form; Shooting time information corresponding to the key picture frame is represented, and the shooting time information is in a decimal data form; The number of data bits for obtaining the data in brackets; Representing a left shift symbol; Representing the minimum bit value of the sub-data obtained after the data segmentation processing; The bit value representing the first sub-data obtained after the data segmentation process is n; data representing the first bit through the (m+n) th bit in the data result S; representing the number of communication satellites currently in an idle state; Representing the first of the data results S Bit to the firstBit data;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
(2)
In the above-mentioned formula (2),Representing transmission data formed by adding corresponding communication satellite connection identification data into the a-th sub data obtained by data segmentation, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
(3)
In the above-mentioned formula (3),The cloud platform is used for representing splicing data obtained after the received e-th transmission data are decoded; representing the e-th transmission data received by the cloud platform; Representing a right shift symbol; the method comprises the steps that a splicing ranking sequence value of splicing data obtained after a cloud platform decodes received e-th transmission data is represented;
according to the spliced ranking order value From large to small, for all spliced dataAnd performing splicing reduction processing to obtain the key picture frame and the corresponding shooting time information thereof.
2. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
In the step S1, installing monitoring devices at different positions of the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
3. The edge cloud collaboration-based edge monitoring method as claimed in claim 2, wherein:
In the step S1, the monitoring device is instructed to shoot the border area by the control terminal, and the capturing of the video stream data of the border area specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the detection of the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera, so that the monitoring equipment is switched to a night vision shooting mode;
And the control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
4. The edge cloud collaboration-based edge monitoring method as claimed in claim 3, wherein:
In the step S2, the analyzing and processing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
performing picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
identifying each picture frame of the picture frame queue to obtain personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on pictures of the picture frames;
And determining whether the personnel have illegal invasion behaviors according to the relative position relation of the two, so as to judge whether the border area has illegal invasion events.
5. The edge cloud collaboration-based edge monitoring method as claimed in claim 4, wherein:
In the step S2, extracting the corresponding key picture frame from the border area video stream data according to the determination result specifically includes:
And if the border area is determined to send an illegal invasion event, screening a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion behaviors and border boundary identifiers where the illegal invasion behaviors occur from the picture frame queue, and taking the picture frames as the key picture frames.
6. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
in the step S4, analyzing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
7. The edge cloud collaboration-based edge monitoring method as claimed in claim 6, wherein:
In the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
CN202210804528.9A 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method Active CN115240346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210804528.9A CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210804528.9A CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Publications (2)

Publication Number Publication Date
CN115240346A CN115240346A (en) 2022-10-25
CN115240346B true CN115240346B (en) 2024-11-01

Family

ID=83670910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210804528.9A Active CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Country Status (1)

Country Link
CN (1) CN115240346B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064056A (en) * 2006-04-30 2007-10-31 程雄 Audio/video linkage integrated machine for remote alarm monitoring
CN107170166A (en) * 2017-07-14 2017-09-15 四川中科通服智能安防科技有限公司 Defence area supervising device and intelligent security guard cloud platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106843038B (en) * 2016-12-31 2017-12-29 华中科技大学 A kind of remote sensing satellite image handles load multitask master control system
CN212623110U (en) * 2020-07-01 2021-02-26 国家海洋局南海调查技术中心(国家海洋局南海浮标中心) Ocean buoy station and intrusion detection evidence obtaining system
CN113194297B (en) * 2021-04-30 2023-05-23 重庆市科学技术研究院 Intelligent monitoring system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064056A (en) * 2006-04-30 2007-10-31 程雄 Audio/video linkage integrated machine for remote alarm monitoring
CN107170166A (en) * 2017-07-14 2017-09-15 四川中科通服智能安防科技有限公司 Defence area supervising device and intelligent security guard cloud platform

Also Published As

Publication number Publication date
CN115240346A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN211293956U (en) AI-based identification and alarm system for abnormal agent on construction site
KR101321444B1 (en) A cctv monitoring system
CN110555964B (en) Multi-data fusion key area early warning system and method
CN107645653B (en) Method, device and equipment for tracking shooting by camera and storage medium
KR101036947B1 (en) Automated security system for crime and accident prevention using computer image analysis technology
CN101764998A (en) Alarm interlocking method in network video monitoring system and network video monitoring system
CN112112629A (en) A safety business management system and method during drilling operation
KR102219809B1 (en) Safety Work Management System by Image Analysis
CN114566056B (en) Highway tunnel driving safety risk identification, prevention and control method and system
CN116129490A (en) A monitoring device and monitoring method for behavior recognition in complex environments
CN113538825A (en) Campus wall-turning event alarm method and system
KR101832274B1 (en) System for crime prevention of intelligent type by video photographing and method for acting thereof
KR20220072783A (en) System and method for real-time flood detecting, and monitoring using CCTV image, and a recording medium recording a computer readable program for executing the method
CN109151463B (en) Video quality diagnosis system and video quality analysis method
CN112330930A (en) Urban tunnel traffic monitoring method, system and platform
WO2019099321A1 (en) Collaborative media collection analysis
CN211630273U (en) Intelligent image recognition device for railway environment
CN115641608A (en) Intelligent identification equipment for personal protective equipment in distribution network based on edge intelligence
CN115240346B (en) Side cloud cooperation-based side border monitoring method
KR101046819B1 (en) Intrusion monitoring method and intrusion monitoring system by software fence
KR101250956B1 (en) An automatic system for monitoring
CN114463873A (en) Patrol system for community
CN118348526A (en) Real-time data fusion analysis method based on radar fusion algorithm
CN117994734A (en) Target risk level assessment method based on robot
CN113536847A (en) A deep learning-based industrial scene video analysis system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant