CN115240346B - Side cloud cooperation-based side border monitoring method - Google Patents
Side cloud cooperation-based side border monitoring method Download PDFInfo
- Publication number
- CN115240346B CN115240346B CN202210804528.9A CN202210804528A CN115240346B CN 115240346 B CN115240346 B CN 115240346B CN 202210804528 A CN202210804528 A CN 202210804528A CN 115240346 B CN115240346 B CN 115240346B
- Authority
- CN
- China
- Prior art keywords
- data
- border area
- border
- picture frame
- control terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 75
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000006854 communication Effects 0.000 claims abstract description 61
- 238000004891 communication Methods 0.000 claims abstract description 61
- 230000009545 invasion Effects 0.000 claims abstract description 39
- 230000005540 biological transmission Effects 0.000 claims abstract description 34
- 230000004044 response Effects 0.000 claims abstract description 11
- 238000000605 extraction Methods 0.000 claims abstract description 8
- 238000012545 processing Methods 0.000 claims description 23
- 230000004297 night vision Effects 0.000 claims description 18
- 230000011218 segmentation Effects 0.000 claims description 15
- 238000012806 monitoring device Methods 0.000 claims description 12
- 230000006399 behavior Effects 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 7
- 230000007175 bidirectional communication Effects 0.000 claims description 3
- 230000009467 reduction Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 2
- 238000012216 screening Methods 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 description 8
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 description 4
- 229910052742 iron Inorganic materials 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19606—Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/40—Scenes; Scene-specific elements in video content
- G06V20/46—Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The invention provides a border monitoring method based on border cloud cooperation, which comprises the steps of installing monitoring equipment at different positions of a border area to shoot video stream data of the border area, analyzing the video stream data of the border area through a control terminal, judging whether an illegal invasion event occurs in the border area, and extracting to obtain a corresponding key picture frame; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
Description
Technical Field
The invention relates to the technical field of border monitoring management, in particular to a border monitoring method based on border cloud cooperation.
Background
The border area usually has a longer border line, and in order to monitor the border area, a plurality of post are usually disposed at intervals between the border lines of the border area, so that a worker can visually observe the border area on post to monitor the border area in real time, and determine whether a person intrudes into the border area illegally. Although the above-mentioned mode can carry out closely to the border area and detect, nevertheless there is certain limitation in observation scope and observation instantaneity in the visual observation mode of staff, still need arrange a large amount of staff simultaneously to carry out long-time monitoring to border area along the line, reduce the comprehensiveness and the reliability of border monitoring.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a border monitoring method based on border cloud cooperation, which comprises the steps of installing monitoring equipment at different positions of a border area to shoot border area video stream data, analyzing the border area video stream data through a control terminal, judging whether an illegal invasion event occurs in the border area, and extracting to obtain corresponding key picture frames; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
The invention provides a border monitoring method based on border cloud cooperation, which comprises the following steps:
Step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
Step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area or not; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
s4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; and carrying out corresponding alarm response operation through the cloud platform according to the border region location information.
Further, in the step S1, installing monitoring devices at different positions in the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
Further, in the step S1, the controlling terminal instructs the monitoring device to shoot the border area, and the collecting video stream data of the border area obtained by shooting specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the detection of the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera, so that the monitoring equipment is switched to a night vision shooting mode;
And the control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
Further, in the step S2, the analyzing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
performing picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
identifying each picture frame of the picture frame queue to obtain personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on pictures of the picture frames;
And determining whether the personnel have illegal invasion behaviors according to the relative position relation of the two, so as to judge whether the border area has illegal invasion events.
Further, in the step S2, extracting the corresponding key picture frame from the border area video stream data according to the determination result specifically includes:
And if the border area is determined to send an illegal invasion event, screening a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion behaviors and border boundary identifiers where the illegal invasion behaviors occur from the picture frame queue, and taking the picture frames as the key picture frames.
Further, in the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all the extracted key picture frames to a cloud platform by using the communication satellite specifically includes:
step 301, after the communication connection between the control terminal and the communication satellite is established, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in an idle state by using the following formula (1),
In the above formula (1), H a represents a data result obtained by data combining the key picture frame and the corresponding shooting time information thereof, and then the a-th sub data obtained by data segmentation is in a decimal data form; s represents a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; d represents data corresponding to the key picture frame, which has a decimal data form; g represents shooting time information corresponding to the key picture frame, and the shooting time information has a decimal data form; len () represents the number of bits of data in brackets; < represent shift left symbol; m represents the minimum bit value of the sub data obtained after the data segmentation processing; n represents that the bit value of the first sub data obtained after the data segmentation processing is n; s (1- > m+n) represents the first bit to the m+n bit of data in the data result S; l represents the number of communication satellites currently in an idle state; s, n+ (a-1) x m+1- & gtn+a x m) + represents the data from the n+ (a-1) x m+1 th bit to the n+a x m th bit in the data result S;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
Ja=Ha<<len(L)+a (2)
In the above formula (2), J a represents transmission data formed by adding corresponding communication satellite connection identification data to the a-th sub-data obtained by data division, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
In the above formula (3), j (e) represents spliced data obtained after the cloud platform decodes the received e-th transmission data; j' (e) represents the e-th transmission data received by the cloud platform; > represents a right shift symbol; k (e) represents a splicing ranking sequence value of splicing data obtained after the cloud platform decodes the received e-th transmission data;
and performing splicing reduction processing on all spliced data j (e) according to the sequence from large to small of the spliced ranking sequence value k (e), so as to obtain the key picture frame and the corresponding shooting time information thereof.
Further, in the step S4, analyzing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
Further, in the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
Compared with the prior art, the border monitoring method based on the border cloud cooperation installs monitoring equipment at different positions of a border area to shoot the video stream data of the border area, analyzes the video stream data of the border area through a control terminal, judges whether an illegal invasion event occurs in the border area, and then extracts a corresponding key picture frame; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a border monitoring method based on border cloud cooperation.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flow chart of a border monitoring method based on border cloud collaboration according to an embodiment of the present invention is shown. The border monitoring method based on the border cloud cooperation comprises the following steps:
step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
Step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
s4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; and carrying out corresponding alarm response operation through the cloud platform according to the border region location information.
The beneficial effects of the technical scheme are as follows: according to the border monitoring method based on the border cloud cooperation, monitoring equipment is installed at different positions of a border area to shoot border area video stream data, the border area video stream data is analyzed through a control terminal, whether an illegal invasion event occurs in the border area is judged, and then a corresponding key picture frame is extracted; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
Preferably, in the step S1, the monitoring devices are installed at different positions in the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
The beneficial effects of the technical scheme are as follows: the border area needs to be monitored in all weather, in order to continuously monitor the image capturing of the border area in both daytime and night time, the monitoring equipment is arranged to comprise a visible light camera, a night vision camera and an environment illuminance sensor, the illuminance value of the external environment is detected by the environment illuminance sensor as a reference, the visible light camera and the night vision camera are switched and controlled, and the border area can be photographed clearly under any environment light irradiation condition.
Preferably, in the step S1, the controlling terminal instructs the monitoring device to shoot the border area, and the collecting the video stream data of the border area obtained by shooting specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera head, so that the monitoring equipment is switched to a night vision shooting mode;
The control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
The beneficial effects of the technical scheme are as follows: by means of the method, the control terminal is used for indicating the visible light camera and the night vision camera to perform switching control, and no matter under the condition of ambient illuminance, the monitoring equipment can clearly shoot video stream data of the border area all the time, so that the follow-up situation of personnel on the border line of the border area can be accurately identified from the video stream data.
Preferably, in the step S2, the analyzing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
Carrying out picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
Each picture frame of the picture frame queue is identified, and personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on the picture of the picture frame are obtained;
and determining whether the person has illegal invasion behaviors according to the relative position relation of the two, so as to judge whether an illegal invasion event occurs in the border area.
The beneficial effects of the technical scheme are as follows: since the border area video stream data has huge data volume and comprises more picture frames, the calculation workload of the video stream data can be reduced by extracting corresponding picture frames from the border area video stream data and forming a picture frame queue. Meanwhile, the border areas are provided with iron net enclosing walls and the like as border boundary markers, and personnel and border boundary markers existing on the picture and the relative position relation of the personnel and the border boundary markers are identified from each picture frame, so that whether illegal invasion events occur can be determined by taking the border boundary markers as references; such as when a person crosses a border boundary marker, it may be determined that an illegal intrusion event has occurred, etc.
Preferably, in the step S2, according to the above determination result, extracting the corresponding key picture frame from the border area video stream data specifically includes:
if the border area is determined to send an illegal invasion event, a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion actions and border boundary identifiers where the illegal invasion actions occur are screened from the picture frame queue and are taken as the key picture frames.
The beneficial effects of the technical scheme are as follows: by adopting the mode, the plurality of picture frames containing all body parts of people with illegal invasion behaviors and the boundary identifiers where the illegal invasion behaviors occur are used as key picture frames, so that the illegal invasion events which occur at present can be represented by a small number of picture frames, and meanwhile, the key picture frames can be rapidly uploaded.
Preferably, in the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all the extracted key picture frames to the cloud platform by using the communication satellite specifically includes:
Step S301, after completing the communication connection between the control terminal and the communication satellite, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in the idle state by using the following formula (1),
In the above formula (1), H a represents a data result obtained by data combining the key picture frame and the corresponding shooting time information thereof, and then the a-th sub data obtained by data segmentation is in a decimal data form; s represents a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; d represents the data corresponding to the key picture frame, which has a decimal data form; g represents shooting time information corresponding to the key picture frame, and the shooting time information has a decimal data form; len () represents the number of bits of data in brackets; < represent shift left symbol; m represents the minimum bit value of the sub data obtained after the data segmentation processing; n represents that the bit value of the first sub data obtained after the data segmentation processing is n; s (1- > m+n) represents the first bit to the m+n bit of data in the data result S; l represents the number of communication satellites currently in an idle state; s, n+ (a-1) x m+1- & gtn+a x m) + represents the data from the n+ (a-1) x m+1 th bit to the n+a x m th bit in the data result S;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
Ja=Ha<<len(L)+a (2)
In the above formula (2), J a represents transmission data formed by adding corresponding communication satellite connection identification data to the a-th sub-data obtained by data division, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
In the above formula (3), j (e) represents spliced data obtained after the cloud platform decodes the received e-th transmission data; j' (e) represents the e-th transmission data received by the cloud platform; > represents a right shift symbol; k (e) represents a splicing ranking sequence value of splicing data obtained after the cloud platform decodes the received e-th transmission data;
And performing splicing reduction processing on all spliced data j (e) according to the sequence from large to small of the spliced ranking sequence value k (e), so as to obtain the key picture frame and the corresponding shooting time information thereof.
The beneficial effects of the technical scheme are as follows: by utilizing the formula (1), according to the number of the communication satellites in the idle state, carrying out data combination and data segmentation on the key picture frames and the corresponding shooting time information thereof, so as to utilize all the communication satellites in the idle state for data transmission, improve the data transmission efficiency, keep the data length of each channel basically consistent, ensure the basically consistent time of data transmission and also improve the data transmission efficiency; then, by utilizing the formula (2), adding corresponding communication satellite connection identification data to each sub-data obtained by data segmentation, and facilitating automatic splicing of the data after the cloud platform receives the data; and finally, performing splicing and restoring treatment on all the transmission data by utilizing the formula (3), so that automatic and intelligent data splicing is performed according to the received data, and the characteristics of intellectualization and automation of the system are reflected.
Preferably, in the step S4, the analyzing and processing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
The beneficial effects of the technical scheme are as follows: because the boundary markers such as the iron net enclosing wall and the like arranged in the boundary region are provided with corresponding identification numbers, each identification number is unique, and therefore each identification number can be used as a geographic position mark of the corresponding boundary marker, and the identification numbers on the boundary markers are identified through the cloud platform for the received key picture frames, so that the position information of the boundary region corresponding to the illegal invasion event is uniquely determined.
Preferably, in the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
The beneficial effects of the technical scheme are as follows: by the method, the alarm notification message comprising the border area location information is generated, so that a worker can know the occurrence position of the illegal intrusion event in real time by looking at the mobile terminal held by the worker and go to the corresponding position for processing.
According to the content of the embodiment, according to the border monitoring method based on the border cloud cooperation, monitoring equipment is installed at different positions of a border area to shoot border area video stream data, the border area video stream data is analyzed through a control terminal, whether an illegal invasion event occurs in the border area is judged, and then a corresponding key picture frame is extracted; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (7)
1. The border monitoring method based on the border cloud cooperation is characterized by comprising the following steps of:
Step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
Step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area or not; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
S4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; according to the border area location information, corresponding alarm response operation is carried out through the cloud platform;
In the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by using the communication satellite specifically includes:
Step 301, after the communication connection between the control terminal and the communication satellite is established, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in an idle state by using the following formula (1),
(1)
In the above-mentioned formula (1),Representing a data result obtained by carrying out data combination on the key picture frame and the corresponding shooting time information thereof, and carrying out data segmentation on the data result to obtain an a-th sub-data which has a decimal data form; representing a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; Representing data corresponding to the key picture frame, which has a decimal data form; Shooting time information corresponding to the key picture frame is represented, and the shooting time information is in a decimal data form; The number of data bits for obtaining the data in brackets; Representing a left shift symbol; Representing the minimum bit value of the sub-data obtained after the data segmentation processing; The bit value representing the first sub-data obtained after the data segmentation process is n; data representing the first bit through the (m+n) th bit in the data result S; representing the number of communication satellites currently in an idle state; Representing the first of the data results S Bit to the firstBit data;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
(2)
In the above-mentioned formula (2),Representing transmission data formed by adding corresponding communication satellite connection identification data into the a-th sub data obtained by data segmentation, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
(3)
In the above-mentioned formula (3),The cloud platform is used for representing splicing data obtained after the received e-th transmission data are decoded; representing the e-th transmission data received by the cloud platform; Representing a right shift symbol; the method comprises the steps that a splicing ranking sequence value of splicing data obtained after a cloud platform decodes received e-th transmission data is represented;
according to the spliced ranking order value From large to small, for all spliced dataAnd performing splicing reduction processing to obtain the key picture frame and the corresponding shooting time information thereof.
2. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
In the step S1, installing monitoring devices at different positions of the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
3. The edge cloud collaboration-based edge monitoring method as claimed in claim 2, wherein:
In the step S1, the monitoring device is instructed to shoot the border area by the control terminal, and the capturing of the video stream data of the border area specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the detection of the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera, so that the monitoring equipment is switched to a night vision shooting mode;
And the control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
4. The edge cloud collaboration-based edge monitoring method as claimed in claim 3, wherein:
In the step S2, the analyzing and processing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
performing picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
identifying each picture frame of the picture frame queue to obtain personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on pictures of the picture frames;
And determining whether the personnel have illegal invasion behaviors according to the relative position relation of the two, so as to judge whether the border area has illegal invasion events.
5. The edge cloud collaboration-based edge monitoring method as claimed in claim 4, wherein:
In the step S2, extracting the corresponding key picture frame from the border area video stream data according to the determination result specifically includes:
And if the border area is determined to send an illegal invasion event, screening a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion behaviors and border boundary identifiers where the illegal invasion behaviors occur from the picture frame queue, and taking the picture frames as the key picture frames.
6. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
in the step S4, analyzing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
7. The edge cloud collaboration-based edge monitoring method as claimed in claim 6, wherein:
In the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210804528.9A CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210804528.9A CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115240346A CN115240346A (en) | 2022-10-25 |
CN115240346B true CN115240346B (en) | 2024-11-01 |
Family
ID=83670910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210804528.9A Active CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115240346B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064056A (en) * | 2006-04-30 | 2007-10-31 | 程雄 | Audio/video linkage integrated machine for remote alarm monitoring |
CN107170166A (en) * | 2017-07-14 | 2017-09-15 | 四川中科通服智能安防科技有限公司 | Defence area supervising device and intelligent security guard cloud platform |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106843038B (en) * | 2016-12-31 | 2017-12-29 | 华中科技大学 | A kind of remote sensing satellite image handles load multitask master control system |
CN212623110U (en) * | 2020-07-01 | 2021-02-26 | 国家海洋局南海调查技术中心(国家海洋局南海浮标中心) | Ocean buoy station and intrusion detection evidence obtaining system |
CN113194297B (en) * | 2021-04-30 | 2023-05-23 | 重庆市科学技术研究院 | Intelligent monitoring system and method |
-
2022
- 2022-07-08 CN CN202210804528.9A patent/CN115240346B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064056A (en) * | 2006-04-30 | 2007-10-31 | 程雄 | Audio/video linkage integrated machine for remote alarm monitoring |
CN107170166A (en) * | 2017-07-14 | 2017-09-15 | 四川中科通服智能安防科技有限公司 | Defence area supervising device and intelligent security guard cloud platform |
Also Published As
Publication number | Publication date |
---|---|
CN115240346A (en) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN211293956U (en) | AI-based identification and alarm system for abnormal agent on construction site | |
CN110555964B (en) | Multi-data fusion key area early warning system and method | |
CN110956606B (en) | Display screen play picture abnormity detection method, device and system | |
CN103726879B (en) | Utilize camera automatic capturing mine ore deposit to shake and cave in and the method for record warning in time | |
CN109996182B (en) | Positioning method, device and system based on combination of UWB positioning and monitoring | |
CN112112629A (en) | Safety business management system and method in drilling operation process | |
KR101949676B1 (en) | syntax-based method of providing intrusion detection in compressed video | |
CN112382032A (en) | Monitoring method and device, electronic equipment and storage medium | |
KR20110040699A (en) | Forest fire monitiring system and control method thereof | |
CN113870550A (en) | Regional anomaly detection method and system based on edge calculation | |
CN110557603B (en) | Method and device for monitoring moving target and readable storage medium | |
CN210222962U (en) | Intelligent electronic fence system | |
KR101747213B1 (en) | A control system for in and out based on scenario and method thereof | |
KR20220072783A (en) | System and method for real-time flood detecting, and monitoring using CCTV image, and a recording medium recording a computer readable program for executing the method | |
CN114566056A (en) | Highway tunnel driving safety risk identification, prevention and control method and system | |
CN112330930A (en) | Urban tunnel traffic monitoring method, system and platform | |
CN114677640A (en) | Intelligent construction site safety monitoring system and method based on machine vision | |
CN201142737Y (en) | Front end monitoring apparatus for IP network video monitoring system | |
CN111860187A (en) | High-precision worn mask identification method and system | |
CN101461239B (en) | Video verification system and method for central station alarm monitoring | |
CN115240346B (en) | Side cloud cooperation-based side border monitoring method | |
CN114463873A (en) | Patrol system for community | |
CN113658394A (en) | River channel monitoring method and device | |
CN117768610A (en) | High-speed railway perimeter intrusion risk monitoring method and system based on multi-target recognition | |
CN116052356A (en) | Intelligent building site monitor platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |