[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115240346B - Side cloud cooperation-based side border monitoring method - Google Patents

Side cloud cooperation-based side border monitoring method Download PDF

Info

Publication number
CN115240346B
CN115240346B CN202210804528.9A CN202210804528A CN115240346B CN 115240346 B CN115240346 B CN 115240346B CN 202210804528 A CN202210804528 A CN 202210804528A CN 115240346 B CN115240346 B CN 115240346B
Authority
CN
China
Prior art keywords
data
border area
border
picture frame
control terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210804528.9A
Other languages
Chinese (zh)
Other versions
CN115240346A (en
Inventor
兰雨晴
刘玮
余丹
李易君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Intelligent Security Technology Co Ltd
Original Assignee
China Standard Intelligent Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Intelligent Security Technology Co Ltd filed Critical China Standard Intelligent Security Technology Co Ltd
Priority to CN202210804528.9A priority Critical patent/CN115240346B/en
Publication of CN115240346A publication Critical patent/CN115240346A/en
Application granted granted Critical
Publication of CN115240346B publication Critical patent/CN115240346B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19606Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1851Systems using a satellite or space-based relay

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention provides a border monitoring method based on border cloud cooperation, which comprises the steps of installing monitoring equipment at different positions of a border area to shoot video stream data of the border area, analyzing the video stream data of the border area through a control terminal, judging whether an illegal invasion event occurs in the border area, and extracting to obtain a corresponding key picture frame; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.

Description

Side cloud cooperation-based side border monitoring method
Technical Field
The invention relates to the technical field of border monitoring management, in particular to a border monitoring method based on border cloud cooperation.
Background
The border area usually has a longer border line, and in order to monitor the border area, a plurality of post are usually disposed at intervals between the border lines of the border area, so that a worker can visually observe the border area on post to monitor the border area in real time, and determine whether a person intrudes into the border area illegally. Although the above-mentioned mode can carry out closely to the border area and detect, nevertheless there is certain limitation in observation scope and observation instantaneity in the visual observation mode of staff, still need arrange a large amount of staff simultaneously to carry out long-time monitoring to border area along the line, reduce the comprehensiveness and the reliability of border monitoring.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a border monitoring method based on border cloud cooperation, which comprises the steps of installing monitoring equipment at different positions of a border area to shoot border area video stream data, analyzing the border area video stream data through a control terminal, judging whether an illegal invasion event occurs in the border area, and extracting to obtain corresponding key picture frames; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
The invention provides a border monitoring method based on border cloud cooperation, which comprises the following steps:
Step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
Step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area or not; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
s4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; and carrying out corresponding alarm response operation through the cloud platform according to the border region location information.
Further, in the step S1, installing monitoring devices at different positions in the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
Further, in the step S1, the controlling terminal instructs the monitoring device to shoot the border area, and the collecting video stream data of the border area obtained by shooting specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the detection of the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera, so that the monitoring equipment is switched to a night vision shooting mode;
And the control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
Further, in the step S2, the analyzing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
performing picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
identifying each picture frame of the picture frame queue to obtain personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on pictures of the picture frames;
And determining whether the personnel have illegal invasion behaviors according to the relative position relation of the two, so as to judge whether the border area has illegal invasion events.
Further, in the step S2, extracting the corresponding key picture frame from the border area video stream data according to the determination result specifically includes:
And if the border area is determined to send an illegal invasion event, screening a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion behaviors and border boundary identifiers where the illegal invasion behaviors occur from the picture frame queue, and taking the picture frames as the key picture frames.
Further, in the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all the extracted key picture frames to a cloud platform by using the communication satellite specifically includes:
step 301, after the communication connection between the control terminal and the communication satellite is established, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in an idle state by using the following formula (1),
In the above formula (1), H a represents a data result obtained by data combining the key picture frame and the corresponding shooting time information thereof, and then the a-th sub data obtained by data segmentation is in a decimal data form; s represents a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; d represents data corresponding to the key picture frame, which has a decimal data form; g represents shooting time information corresponding to the key picture frame, and the shooting time information has a decimal data form; len () represents the number of bits of data in brackets; < represent shift left symbol; m represents the minimum bit value of the sub data obtained after the data segmentation processing; n represents that the bit value of the first sub data obtained after the data segmentation processing is n; s (1- > m+n) represents the first bit to the m+n bit of data in the data result S; l represents the number of communication satellites currently in an idle state; s, n+ (a-1) x m+1- & gtn+a x m) + represents the data from the n+ (a-1) x m+1 th bit to the n+a x m th bit in the data result S;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
Ja=Ha<<len(L)+a (2)
In the above formula (2), J a represents transmission data formed by adding corresponding communication satellite connection identification data to the a-th sub-data obtained by data division, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
In the above formula (3), j (e) represents spliced data obtained after the cloud platform decodes the received e-th transmission data; j' (e) represents the e-th transmission data received by the cloud platform; > represents a right shift symbol; k (e) represents a splicing ranking sequence value of splicing data obtained after the cloud platform decodes the received e-th transmission data;
and performing splicing reduction processing on all spliced data j (e) according to the sequence from large to small of the spliced ranking sequence value k (e), so as to obtain the key picture frame and the corresponding shooting time information thereof.
Further, in the step S4, analyzing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
Further, in the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
Compared with the prior art, the border monitoring method based on the border cloud cooperation installs monitoring equipment at different positions of a border area to shoot the video stream data of the border area, analyzes the video stream data of the border area through a control terminal, judges whether an illegal invasion event occurs in the border area, and then extracts a corresponding key picture frame; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a border monitoring method based on border cloud cooperation.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a flow chart of a border monitoring method based on border cloud collaboration according to an embodiment of the present invention is shown. The border monitoring method based on the border cloud cooperation comprises the following steps:
step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
Step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
s4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; and carrying out corresponding alarm response operation through the cloud platform according to the border region location information.
The beneficial effects of the technical scheme are as follows: according to the border monitoring method based on the border cloud cooperation, monitoring equipment is installed at different positions of a border area to shoot border area video stream data, the border area video stream data is analyzed through a control terminal, whether an illegal invasion event occurs in the border area is judged, and then a corresponding key picture frame is extracted; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
Preferably, in the step S1, the monitoring devices are installed at different positions in the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
The beneficial effects of the technical scheme are as follows: the border area needs to be monitored in all weather, in order to continuously monitor the image capturing of the border area in both daytime and night time, the monitoring equipment is arranged to comprise a visible light camera, a night vision camera and an environment illuminance sensor, the illuminance value of the external environment is detected by the environment illuminance sensor as a reference, the visible light camera and the night vision camera are switched and controlled, and the border area can be photographed clearly under any environment light irradiation condition.
Preferably, in the step S1, the controlling terminal instructs the monitoring device to shoot the border area, and the collecting the video stream data of the border area obtained by shooting specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera head, so that the monitoring equipment is switched to a night vision shooting mode;
The control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
The beneficial effects of the technical scheme are as follows: by means of the method, the control terminal is used for indicating the visible light camera and the night vision camera to perform switching control, and no matter under the condition of ambient illuminance, the monitoring equipment can clearly shoot video stream data of the border area all the time, so that the follow-up situation of personnel on the border line of the border area can be accurately identified from the video stream data.
Preferably, in the step S2, the analyzing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
Carrying out picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
Each picture frame of the picture frame queue is identified, and personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on the picture of the picture frame are obtained;
and determining whether the person has illegal invasion behaviors according to the relative position relation of the two, so as to judge whether an illegal invasion event occurs in the border area.
The beneficial effects of the technical scheme are as follows: since the border area video stream data has huge data volume and comprises more picture frames, the calculation workload of the video stream data can be reduced by extracting corresponding picture frames from the border area video stream data and forming a picture frame queue. Meanwhile, the border areas are provided with iron net enclosing walls and the like as border boundary markers, and personnel and border boundary markers existing on the picture and the relative position relation of the personnel and the border boundary markers are identified from each picture frame, so that whether illegal invasion events occur can be determined by taking the border boundary markers as references; such as when a person crosses a border boundary marker, it may be determined that an illegal intrusion event has occurred, etc.
Preferably, in the step S2, according to the above determination result, extracting the corresponding key picture frame from the border area video stream data specifically includes:
if the border area is determined to send an illegal invasion event, a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion actions and border boundary identifiers where the illegal invasion actions occur are screened from the picture frame queue and are taken as the key picture frames.
The beneficial effects of the technical scheme are as follows: by adopting the mode, the plurality of picture frames containing all body parts of people with illegal invasion behaviors and the boundary identifiers where the illegal invasion behaviors occur are used as key picture frames, so that the illegal invasion events which occur at present can be represented by a small number of picture frames, and meanwhile, the key picture frames can be rapidly uploaded.
Preferably, in the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all the extracted key picture frames to the cloud platform by using the communication satellite specifically includes:
Step S301, after completing the communication connection between the control terminal and the communication satellite, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in the idle state by using the following formula (1),
In the above formula (1), H a represents a data result obtained by data combining the key picture frame and the corresponding shooting time information thereof, and then the a-th sub data obtained by data segmentation is in a decimal data form; s represents a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; d represents the data corresponding to the key picture frame, which has a decimal data form; g represents shooting time information corresponding to the key picture frame, and the shooting time information has a decimal data form; len () represents the number of bits of data in brackets; < represent shift left symbol; m represents the minimum bit value of the sub data obtained after the data segmentation processing; n represents that the bit value of the first sub data obtained after the data segmentation processing is n; s (1- > m+n) represents the first bit to the m+n bit of data in the data result S; l represents the number of communication satellites currently in an idle state; s, n+ (a-1) x m+1- & gtn+a x m) + represents the data from the n+ (a-1) x m+1 th bit to the n+a x m th bit in the data result S;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
Ja=Ha<<len(L)+a (2)
In the above formula (2), J a represents transmission data formed by adding corresponding communication satellite connection identification data to the a-th sub-data obtained by data division, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
In the above formula (3), j (e) represents spliced data obtained after the cloud platform decodes the received e-th transmission data; j' (e) represents the e-th transmission data received by the cloud platform; > represents a right shift symbol; k (e) represents a splicing ranking sequence value of splicing data obtained after the cloud platform decodes the received e-th transmission data;
And performing splicing reduction processing on all spliced data j (e) according to the sequence from large to small of the spliced ranking sequence value k (e), so as to obtain the key picture frame and the corresponding shooting time information thereof.
The beneficial effects of the technical scheme are as follows: by utilizing the formula (1), according to the number of the communication satellites in the idle state, carrying out data combination and data segmentation on the key picture frames and the corresponding shooting time information thereof, so as to utilize all the communication satellites in the idle state for data transmission, improve the data transmission efficiency, keep the data length of each channel basically consistent, ensure the basically consistent time of data transmission and also improve the data transmission efficiency; then, by utilizing the formula (2), adding corresponding communication satellite connection identification data to each sub-data obtained by data segmentation, and facilitating automatic splicing of the data after the cloud platform receives the data; and finally, performing splicing and restoring treatment on all the transmission data by utilizing the formula (3), so that automatic and intelligent data splicing is performed according to the received data, and the characteristics of intellectualization and automation of the system are reflected.
Preferably, in the step S4, the analyzing and processing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
The beneficial effects of the technical scheme are as follows: because the boundary markers such as the iron net enclosing wall and the like arranged in the boundary region are provided with corresponding identification numbers, each identification number is unique, and therefore each identification number can be used as a geographic position mark of the corresponding boundary marker, and the identification numbers on the boundary markers are identified through the cloud platform for the received key picture frames, so that the position information of the boundary region corresponding to the illegal invasion event is uniquely determined.
Preferably, in the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
The beneficial effects of the technical scheme are as follows: by the method, the alarm notification message comprising the border area location information is generated, so that a worker can know the occurrence position of the illegal intrusion event in real time by looking at the mobile terminal held by the worker and go to the corresponding position for processing.
According to the content of the embodiment, according to the border monitoring method based on the border cloud cooperation, monitoring equipment is installed at different positions of a border area to shoot border area video stream data, the border area video stream data is analyzed through a control terminal, whether an illegal invasion event occurs in the border area is judged, and then a corresponding key picture frame is extracted; the communication satellite is used for sending the key picture frame to the cloud platform, and the cloud platform is used for determining the border area location information corresponding to the illegal intrusion event, so that corresponding alarm response operation is carried out; according to the monitoring method, the border area video stream data is analyzed and processed through the monitoring data transmission link of the monitoring equipment, the control terminal, the communication satellite and the cloud platform, the picture frames containing illegal invasion events are sent to the cloud platform in a key picture frame extraction mode, the situation that monitoring delay occurs due to massive border area video stream data is avoided, and the border area is automatically and comprehensively monitored by means of the monitoring equipment.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (7)

1. The border monitoring method based on the border cloud cooperation is characterized by comprising the following steps of:
Step S1, monitoring equipment is respectively installed at different positions of a border area, and all the monitoring equipment is connected to a control terminal; the monitoring equipment is instructed to shoot the border area through the control terminal, and video stream data of the border area obtained through shooting are collected;
Step S2, analyzing and processing the video stream data of the border area through the control terminal, and judging whether an illegal invasion event occurs in the border area or not; extracting corresponding key picture frames from the border region video stream data according to the judging result; the key picture frame at least comprises an invader picture corresponding to the illegal invasion event;
step S3, constructing communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by utilizing the communication satellite;
S4, analyzing and processing the received key picture frames through the cloud platform, and determining border area location information corresponding to the illegal intrusion event; according to the border area location information, corresponding alarm response operation is carried out through the cloud platform;
In the step S3, constructing a communication connection between the control terminal and a communication satellite, and sending all extracted key picture frames to a cloud platform by using the communication satellite specifically includes:
Step 301, after the communication connection between the control terminal and the communication satellite is established, performing data merging and data segmentation on the key picture frame and the corresponding shooting time information thereof according to the number of the communication satellites currently in an idle state by using the following formula (1),
(1)
In the above-mentioned formula (1),Representing a data result obtained by carrying out data combination on the key picture frame and the corresponding shooting time information thereof, and carrying out data segmentation on the data result to obtain an a-th sub-data which has a decimal data form; representing a data result obtained after the key picture frame and the corresponding shooting time information are subjected to data combination; Representing data corresponding to the key picture frame, which has a decimal data form; Shooting time information corresponding to the key picture frame is represented, and the shooting time information is in a decimal data form; The number of data bits for obtaining the data in brackets; Representing a left shift symbol; Representing the minimum bit value of the sub-data obtained after the data segmentation processing; The bit value representing the first sub-data obtained after the data segmentation process is n; data representing the first bit through the (m+n) th bit in the data result S; representing the number of communication satellites currently in an idle state; Representing the first of the data results S Bit to the firstBit data;
Step S302, adding corresponding communication satellite connection identification data to each sub-data obtained by dividing the data by using the following formula (2),
(2)
In the above-mentioned formula (2),Representing transmission data formed by adding corresponding communication satellite connection identification data into the a-th sub data obtained by data segmentation, wherein the communication satellite connection identification data refers to satellite number identification data of a communication satellite;
Randomly selecting one of the communication satellites in an idle state to transmit one of the transmission data to the cloud platform, wherein one of the communication satellites in the idle state can only transmit one of the transmission data at the same time;
Step S303, after all the transmission data are transmitted to the cloud platform, performing the splicing and restoring process on all the transmission data by using the following formula (3),
(3)
In the above-mentioned formula (3),The cloud platform is used for representing splicing data obtained after the received e-th transmission data are decoded; representing the e-th transmission data received by the cloud platform; Representing a right shift symbol; the method comprises the steps that a splicing ranking sequence value of splicing data obtained after a cloud platform decodes received e-th transmission data is represented;
according to the spliced ranking order value From large to small, for all spliced dataAnd performing splicing reduction processing to obtain the key picture frame and the corresponding shooting time information thereof.
2. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
In the step S1, installing monitoring devices at different positions of the border area, and accessing all the monitoring devices to the control terminal specifically includes:
The method comprises the steps that a visible light camera, a night vision camera and an ambient illuminance sensor form monitoring equipment together, and the monitoring equipment is respectively installed at different positions of a border area in an equidistant mode; and then the visible light camera, the night vision camera and the ambient illuminance sensor contained in each monitoring device are independently connected to the control terminal through a bidirectional communication link.
3. The edge cloud collaboration-based edge monitoring method as claimed in claim 2, wherein:
In the step S1, the monitoring device is instructed to shoot the border area by the control terminal, and the capturing of the video stream data of the border area specifically includes:
The control terminal analyzes and processes the external environment illuminance value obtained by the detection of the environment illuminance sensor; if the external environment illuminance value is greater than or equal to a preset illuminance threshold value, the control terminal sends a work trigger instruction to the visible light camera so that the monitoring equipment is switched to a visible light shooting mode; if the external environment illuminance is smaller than a preset illuminance threshold, the control terminal sends a work triggering instruction to the night vision camera, so that the monitoring equipment is switched to a night vision shooting mode;
And the control terminal continuously collects the video stream data of the border area shot by the visible light camera or the night vision camera.
4. The edge cloud collaboration-based edge monitoring method as claimed in claim 3, wherein:
In the step S2, the analyzing and processing the video stream data of the border area by the control terminal, and determining whether an illegal intrusion event occurs in the border area specifically includes:
performing picture frame extraction processing on the border region video stream data according to a preset time interval by the control terminal so as to obtain a corresponding picture frame queue;
identifying each picture frame of the picture frame queue to obtain personnel, border boundary identifiers and relative position relations of the personnel and the border boundary identifiers on pictures of the picture frames;
And determining whether the personnel have illegal invasion behaviors according to the relative position relation of the two, so as to judge whether the border area has illegal invasion events.
5. The edge cloud collaboration-based edge monitoring method as claimed in claim 4, wherein:
In the step S2, extracting the corresponding key picture frame from the border area video stream data according to the determination result specifically includes:
And if the border area is determined to send an illegal invasion event, screening a plurality of picture frames which simultaneously contain all body parts of people with illegal invasion behaviors and border boundary identifiers where the illegal invasion behaviors occur from the picture frame queue, and taking the picture frames as the key picture frames.
6. The edge cloud collaboration-based edge monitoring method as claimed in claim 1, wherein:
in the step S4, analyzing the received key picture frame by the cloud platform, and determining the border area location information corresponding to the illegal intrusion event specifically includes:
performing border boundary identifier identification processing on the received key picture frame through the cloud platform, and determining an identification number of the border boundary identifier on the key picture frame picture; and determining the border area location information corresponding to the illegal invasion event according to the identification number.
7. The edge cloud collaboration-based edge monitoring method as claimed in claim 6, wherein:
In the step S4, according to the border area location information, performing, by the cloud platform, a corresponding alarm response operation specifically includes:
And generating an alarm notification message comprising the border area location information through the cloud platform, and sending the alarm notification message to a mobile terminal where a worker in a patrol state of the border area is located.
CN202210804528.9A 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method Active CN115240346B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210804528.9A CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210804528.9A CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Publications (2)

Publication Number Publication Date
CN115240346A CN115240346A (en) 2022-10-25
CN115240346B true CN115240346B (en) 2024-11-01

Family

ID=83670910

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210804528.9A Active CN115240346B (en) 2022-07-08 2022-07-08 Side cloud cooperation-based side border monitoring method

Country Status (1)

Country Link
CN (1) CN115240346B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064056A (en) * 2006-04-30 2007-10-31 程雄 Audio/video linkage integrated machine for remote alarm monitoring
CN107170166A (en) * 2017-07-14 2017-09-15 四川中科通服智能安防科技有限公司 Defence area supervising device and intelligent security guard cloud platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106843038B (en) * 2016-12-31 2017-12-29 华中科技大学 A kind of remote sensing satellite image handles load multitask master control system
CN212623110U (en) * 2020-07-01 2021-02-26 国家海洋局南海调查技术中心(国家海洋局南海浮标中心) Ocean buoy station and intrusion detection evidence obtaining system
CN113194297B (en) * 2021-04-30 2023-05-23 重庆市科学技术研究院 Intelligent monitoring system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064056A (en) * 2006-04-30 2007-10-31 程雄 Audio/video linkage integrated machine for remote alarm monitoring
CN107170166A (en) * 2017-07-14 2017-09-15 四川中科通服智能安防科技有限公司 Defence area supervising device and intelligent security guard cloud platform

Also Published As

Publication number Publication date
CN115240346A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN211293956U (en) AI-based identification and alarm system for abnormal agent on construction site
CN110555964B (en) Multi-data fusion key area early warning system and method
CN110956606B (en) Display screen play picture abnormity detection method, device and system
CN103726879B (en) Utilize camera automatic capturing mine ore deposit to shake and cave in and the method for record warning in time
CN109996182B (en) Positioning method, device and system based on combination of UWB positioning and monitoring
CN112112629A (en) Safety business management system and method in drilling operation process
KR101949676B1 (en) syntax-based method of providing intrusion detection in compressed video
CN112382032A (en) Monitoring method and device, electronic equipment and storage medium
KR20110040699A (en) Forest fire monitiring system and control method thereof
CN113870550A (en) Regional anomaly detection method and system based on edge calculation
CN110557603B (en) Method and device for monitoring moving target and readable storage medium
CN210222962U (en) Intelligent electronic fence system
KR101747213B1 (en) A control system for in and out based on scenario and method thereof
KR20220072783A (en) System and method for real-time flood detecting, and monitoring using CCTV image, and a recording medium recording a computer readable program for executing the method
CN114566056A (en) Highway tunnel driving safety risk identification, prevention and control method and system
CN112330930A (en) Urban tunnel traffic monitoring method, system and platform
CN114677640A (en) Intelligent construction site safety monitoring system and method based on machine vision
CN201142737Y (en) Front end monitoring apparatus for IP network video monitoring system
CN111860187A (en) High-precision worn mask identification method and system
CN101461239B (en) Video verification system and method for central station alarm monitoring
CN115240346B (en) Side cloud cooperation-based side border monitoring method
CN114463873A (en) Patrol system for community
CN113658394A (en) River channel monitoring method and device
CN117768610A (en) High-speed railway perimeter intrusion risk monitoring method and system based on multi-target recognition
CN116052356A (en) Intelligent building site monitor platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant