CN115240346B - Side cloud cooperation-based side border monitoring method - Google Patents
Side cloud cooperation-based side border monitoring method Download PDFInfo
- Publication number
- CN115240346B CN115240346B CN202210804528.9A CN202210804528A CN115240346B CN 115240346 B CN115240346 B CN 115240346B CN 202210804528 A CN202210804528 A CN 202210804528A CN 115240346 B CN115240346 B CN 115240346B
- Authority
- CN
- China
- Prior art keywords
- data
- border area
- border
- control terminal
- cloud platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 63
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000004891 communication Methods 0.000 claims abstract description 63
- 230000006854 communication Effects 0.000 claims abstract description 59
- 230000005540 biological transmission Effects 0.000 claims abstract description 33
- 230000004044 response Effects 0.000 claims abstract description 11
- 238000000605 extraction Methods 0.000 claims abstract description 4
- 230000009545 invasion Effects 0.000 claims abstract 10
- 238000012545 processing Methods 0.000 claims description 24
- 238000012806 monitoring device Methods 0.000 claims description 23
- 230000004297 night vision Effects 0.000 claims description 18
- 230000011218 segmentation Effects 0.000 claims description 16
- 230000006399 behavior Effects 0.000 claims 3
- 230000007175 bidirectional communication Effects 0.000 claims 1
- 238000001514 detection method Methods 0.000 claims 1
- 238000012216 screening Methods 0.000 claims 1
- 238000005286 illumination Methods 0.000 description 20
- 230000009286 beneficial effect Effects 0.000 description 8
- 239000003550 marker Substances 0.000 description 7
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 description 4
- 230000001934 delay Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 2
- 229910052742 iron Inorganic materials 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19606—Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/40—Scenes; Scene-specific elements in video content
- G06V20/46—Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及边境监控管理的技术领域,特别涉及基于边云协同的边境监控方法。The present invention relates to the technical field of border monitoring management, and in particular to a border monitoring method based on edge-cloud collaboration.
背景技术Background Art
边境区域通常具有较长边界线,为了对边境区域进行监控,通常会在边境区域的边界线间隔设置若干哨站,工作人员通过在哨站上对边境区域进行目视观察,从而对边境区域进行实时监控,确定是否有人非法闯入边境区域。上述方式虽然能够对边境区域进行近距离的检测,但是工作人员的目视观察模式在观察范围和观察实时性上存在一定的局限性,同时还需要安排大量工作人员对边境区域沿线进行长时间的监控,降低边境监控的全面性和可靠性。Border areas usually have long border lines. In order to monitor border areas, several sentry posts are usually set up at intervals along the border lines of border areas. Staff members visually observe the border areas from the sentry posts, thereby monitoring the border areas in real time to determine whether anyone has illegally entered the border areas. Although the above method can detect border areas at close range, the visual observation mode of staff members has certain limitations in terms of observation range and real-time observation. At the same time, a large number of staff members need to be arranged to monitor the border areas for a long time, which reduces the comprehensiveness and reliability of border monitoring.
发明内容Summary of the invention
针对现有技术存在的缺陷,本发明提供基于边云协同的边境监控方法,其在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。In view of the defects of the prior art, the present invention provides a border monitoring method based on edge-cloud collaboration, which installs monitoring equipment at different locations in the border area to shoot video stream data of the border area, and analyzes the video stream data of the border area through a control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to a cloud platform by using a communication satellite, and the cloud platform determines the location information of the border area where the illegal intrusion incident occurs, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data of the border area through a monitoring data transmission link of a monitoring device-control terminal-communication satellite-cloud platform, and sends the picture frames containing the illegal intrusion incident to the cloud platform by extracting key picture frames, thereby avoiding the situation where monitoring delays are caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.
本发明提供基于边云协同的边境监控方法,包括如下步骤:The present invention provides a border monitoring method based on edge-cloud collaboration, comprising the following steps:
步骤S1,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端;通过所述控制终端指示所述监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据;Step S1, installing monitoring devices at different locations in the border area, and connecting all monitoring devices to a control terminal; instructing the monitoring devices to shoot the border area through the control terminal, and collecting the captured border area video stream data;
步骤S2,通过所述控制终端对所述边境区域视频流数据进行分析处理,判断所述边境区域是否发生非法入侵事件;根据上述判断结果,从所述边境区域视频流数据中提取得到相应的关键图片帧;其中,所述关键图片帧至少包括所述非法入侵事件对应的入侵人员画面;Step S2, analyzing and processing the border area video stream data through the control terminal to determine whether an illegal intrusion event occurs in the border area; extracting corresponding key picture frames from the border area video stream data according to the above determination result; wherein the key picture frames at least include the intruder image corresponding to the illegal intrusion event;
步骤S3,构建所述控制终端与通信卫星之间的通信连接,并利用所述通信卫星将提取得到的所有关键图片帧发送到云端平台;Step S3, establishing a communication connection between the control terminal and the communication satellite, and using the communication satellite to send all the extracted key image frames to the cloud platform;
步骤S4,通过所述云端平台对接收到的关键图片帧进行分析处理,确定所述非法入侵事件对应发生的边境区域地点信息;根据所述边境区域地点信息,通过所述云端平台进行相应的报警响应操作。Step S4, analyzing and processing the received key image frames through the cloud platform to determine the location information of the border area where the illegal intrusion event occurred; and performing corresponding alarm response operations through the cloud platform according to the location information of the border area.
进一步,在所述步骤S1中,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端具体包括:Further, in step S1, installing monitoring devices at different locations in the border area and connecting all monitoring devices to the control terminal specifically includes:
将可见光摄像头、夜视摄像头和环境照度传感器共同组成监控设备,并以等间距的形式在边境区域不同位置分别安装所述监控设备;再将每个监控设备包含的可见光摄像头、夜视摄像头和环境照度传感器通过双向通信链路独立连接到控制终端。Visible light cameras, night vision cameras and ambient illumination sensors are combined to form monitoring equipment, and the monitoring equipment is installed at different locations in the border area at equal intervals; the visible light camera, night vision camera and ambient illumination sensor contained in each monitoring equipment are independently connected to the control terminal through a two-way communication link.
进一步,在所述步骤S1中,通过所述控制终端指示所述监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据具体包括:Further, in step S1, instructing the monitoring device to shoot the border area through the control terminal, and collecting the captured border area video stream data specifically includes:
所述控制终端对所述环境照度传感器检测得到的外界环境照度值进行分析处理;若所述外界环境照度值大于或等于预设照度阈值,则所述控制终端向所述可见光摄像头发送工作触发指令,使得所述监控设备切换至可见光拍摄模式;若所述外界环境照度小于预设照度阈值,则所述控制终端向所述夜视摄像头发送工作触发指令,使得所述监控设备切换至夜视拍摄模式;The control terminal analyzes and processes the external environment illumination value detected by the ambient illumination sensor; if the external environment illumination value is greater than or equal to a preset illumination threshold, the control terminal sends a work trigger instruction to the visible light camera, so that the monitoring device switches to a visible light shooting mode; if the external environment illumination is less than a preset illumination threshold, the control terminal sends a work trigger instruction to the night vision camera, so that the monitoring device switches to a night vision shooting mode;
所述控制终端连续收集所述可见光摄像头或所述夜视摄像头拍摄得到的边境区域视频流数据。The control terminal continuously collects the border area video stream data captured by the visible light camera or the night vision camera.
进一步,在所述步骤S2中,通过所述控制终端对所述边境区域视频流数据进行分析处理,判断所述边境区域是否发生非法入侵事件具体包括:Further, in step S2, analyzing and processing the border area video stream data by the control terminal to determine whether an illegal intrusion event occurs in the border area specifically includes:
通过所述控制终端按照预设时间间隔对所述边境区域视频流数据进行图片帧提取处理,从而得到相应的图片帧队列;The control terminal performs picture frame extraction processing on the border area video stream data at a preset time interval, thereby obtaining a corresponding picture frame queue;
对所述图片帧队列的每一个图片帧进行识别处理,得到所述图片帧的画面上存在的人员和边境边界标识物以及上述两者的相对位置关系;Performing recognition processing on each picture frame of the picture frame queue to obtain the personnel and border boundary markers existing on the screen of the picture frame and the relative position relationship between the two;
根据上述两者的相对位置关系,确定所述人员是否存在非法入侵行为,从而判断所述边境区域是否发生非法入侵事件。According to the relative position relationship between the two, it is determined whether the person has committed illegal intrusion, thereby judging whether an illegal intrusion incident has occurred in the border area.
进一步,在所述步骤S2中,根据上述判断结果,从所述边境区域视频流数据中提取得到相应的关键图片帧具体包括:Further, in step S2, according to the above judgment result, extracting corresponding key picture frames from the border area video stream data specifically includes:
若确定所述边境区域发送非法入侵事件,则从所述图片帧队列中筛选画面中同时包含存在非法入侵行为的人员全部身体部分以及所述非法入侵行为发生所在的边境边界标识物的若干图片帧,以此作为所述关键图片帧。If it is determined that the border area has sent an illegal intrusion event, several picture frames containing all body parts of the person who has committed the illegal intrusion and the border boundary markers where the illegal intrusion occurred are selected from the picture frame queue as the key picture frames.
进一步,在所述步骤S3中,构建所述控制终端与通信卫星之间的通信连接,并利用所述通信卫星将提取得到的所有关键图片帧发送到云端平台具体包括:Further, in step S3, establishing a communication connection between the control terminal and a communication satellite, and using the communication satellite to send all the extracted key picture frames to a cloud platform specifically includes:
步骤S301,当构建完成所述控制终端与通信卫星之间的通信连接后,利用下面公式(1),根据当前处于空闲状态的通信卫星的个数,对所述关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,Step S301, after the communication connection between the control terminal and the communication satellite is established, the key picture frames and their corresponding shooting time information are merged and segmented according to the number of communication satellites currently in an idle state using the following formula (1):
在上述公式(1)中,Ha表示对所述关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果,再进行数据分割后得到的第a个子数据,其具有十进制数据形式;S表示所述关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果;D表示所述关键图片帧对应的数据,其具有十进制数据形式;G表示所述关键图片帧对应的拍摄时间信息,其具有十进制数据形式;len()表示求取括号内数据的数据位数;<<表示左移符号;m表示数据分割处理后得到的子数据的最小位数值;n表示数据分割处理后得到的第一个子数据的位数值为n;S(1→m+n)表示数据结果S中第一位至第m+n位的数据;L表示当前处于空闲状态的通信卫星的个数;S*,n+(a-1)×m+1-→(n+a×m)+表示数据结果S中第n+(a-1)×m+1位至第n+a×m位的数据;In the above formula (1), Ha represents the data result obtained by merging the key picture frame and its corresponding shooting time information, and then the ath sub-data obtained by data segmentation, which has a decimal data form; S represents the data result obtained by merging the key picture frame and its corresponding shooting time information; D represents the data corresponding to the key picture frame, which has a decimal data form; G represents the shooting time information corresponding to the key picture frame, which has a decimal data form; len() represents the number of data bits of the data in the brackets; << represents the left shift sign; m represents the minimum bit value of the sub-data obtained after the data segmentation processing; n represents the bit value of the first sub-data obtained after the data segmentation processing is n; S(1→m+n) represents the data from the first bit to the m+nth bit in the data result S; L represents the number of communication satellites currently in an idle state; S*,n+(a-1)×m+1-→(n+a×m)+ represents the data from the n+(a-1)×m+1th bit to the n+a×mth bit in the data result S;
步骤S302,利用下面公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,Step S302, using the following formula (2), add corresponding communication satellite connection identification data to each sub-data obtained by data segmentation,
Ja=Ha<<len(L)+a (2)J a =H a <<len(L)+a (2)
在上述公式(2)中,Ja表示数据分割得到的第a个子数据添加相应的通信卫星连接标识数据后形成的传输数据,其中通信卫星连接标识数据是指通信卫星的卫星编号标识数据;In the above formula (2), J a represents the transmission data formed by adding the corresponding communication satellite connection identification data to the a-th sub-data obtained by data segmentation, wherein the communication satellite connection identification data refers to the satellite number identification data of the communication satellite;
随机选择其中一个处于空闲状态的通信卫星将其中一个传输数据传输到云端平台,并且在同一时间内,一个处于空闲状态的通信卫星只能传输一个传输数据;Randomly select one of the idle communication satellites to transmit one of the transmission data to the cloud platform, and at the same time, an idle communication satellite can only transmit one transmission data;
步骤S303,当所有传输数据被传输到云端平台后,利用下面公式(3),对所有传输数据进行拼接还原处理,Step S303: After all the transmission data is transmitted to the cloud platform, all the transmission data is spliced and restored using the following formula (3):
在上述公式(3)中,j(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据;J′(e)表示云端平台对接收到的第e个传输数据;>>表示右移符号;k(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据的拼接排位顺序值;In the above formula (3), j(e) represents the spliced data obtained after the cloud platform decodes the received e-th transmission data; J′(e) represents the received e-th transmission data by the cloud platform; >> represents the right shift symbol; k(e) represents the spliced ranking order value of the spliced data obtained after the cloud platform decodes the received e-th transmission data;
按照上述拼接排位顺序值k(e)由大到小的顺序,对所有拼接数据j(e)进行拼接还原处理,从而得到所述关键图片帧及其对应的拍摄时间信息。According to the order of the splicing ranking sequence values k(e) from large to small, all the splicing data j(e) are spliced and restored to obtain the key picture frames and their corresponding shooting time information.
进一步,在所述步骤S4中,通过所述云端平台对接收到的关键图片帧进行分析处理,确定所述非法入侵事件对应发生的边境区域地点信息具体包括:Further, in step S4, the received key picture frames are analyzed and processed by the cloud platform to determine the location information of the border area where the illegal intrusion event occurs, which specifically includes:
通过所述云端平台对接收到的关键图片帧进行边境边界标识物识别处理,确定所述关键图片帧画面上的边境边界标识物存在的标识编号;再根据所述标识编号,确定所述非法入侵事件对应发生的边境区域地点信息。The cloud platform performs border marker recognition processing on the received key picture frame to determine the identification number of the border marker on the key picture frame; and then determines the location information of the border area where the illegal intrusion event occurs based on the identification number.
进一步,在所述步骤S4中,根据所述边境区域地点信息,通过所述云端平台进行相应的报警响应操作具体包括:Further, in the step S4, according to the location information of the border area, performing corresponding alarm response operations through the cloud platform specifically includes:
通过所述云端平台生成包括所述边境区域地点信息的报警通知消息,并将所述报警通知消息发送到边境区域处于巡逻状态的工作人员所处的移动终端。An alarm notification message including the location information of the border area is generated through the cloud platform, and the alarm notification message is sent to the mobile terminal where the staff who are in a patrol state in the border area are located.
相比于现有技术,该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。Compared with the existing technology, the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform via communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, so as to avoid monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.
本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在所写的说明书、权利要求书、以及附图中所特别指出的结构来实现和获得。Other features and advantages of the present invention will be described in the following description, and partly become apparent from the description, or understood by practicing the present invention. The purpose and other advantages of the present invention can be realized and obtained by the structures particularly pointed out in the written description, claims, and drawings.
下面通过附图和实施例,对本发明的技术方案做进一步的详细描述。The technical solution of the present invention is further described in detail below through the accompanying drawings and embodiments.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.
图1为本发明提供的基于边云协同的边境监控方法的流程示意图。FIG1 is a flow chart of the border monitoring method based on edge-cloud collaboration provided by the present invention.
具体实施方式DETAILED DESCRIPTION
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.
参阅图1,为本发明实施例提供的基于边云协同的边境监控方法的流程示意图。该基于边云协同的边境监控方法包括如下步骤:Refer to Figure 1, which is a flow chart of a border monitoring method based on edge-cloud collaboration provided by an embodiment of the present invention. The border monitoring method based on edge-cloud collaboration includes the following steps:
步骤S1,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端;通过该控制终端指示该监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据;Step S1, installing monitoring devices at different locations in the border area, and connecting all monitoring devices to a control terminal; instructing the monitoring devices to shoot the border area through the control terminal, and collecting the captured border area video stream data;
步骤S2,通过该控制终端对该边境区域视频流数据进行分析处理,判断该边境区域是否发生非法入侵事件;根据上述判断结果,从该边境区域视频流数据中提取得到相应的关键图片帧;其中,该关键图片帧至少包括该非法入侵事件对应的入侵人员画面;Step S2, analyzing and processing the border area video stream data through the control terminal to determine whether an illegal intrusion event occurs in the border area; extracting corresponding key picture frames from the border area video stream data according to the above determination result; wherein the key picture frames at least include the intruder image corresponding to the illegal intrusion event;
步骤S3,构建该控制终端与通信卫星之间的通信连接,并利用该通信卫星将提取得到的所有关键图片帧发送到云端平台;Step S3, establishing a communication connection between the control terminal and the communication satellite, and using the communication satellite to send all the extracted key image frames to the cloud platform;
步骤S4,通过该云端平台对接收到的关键图片帧进行分析处理,确定该非法入侵事件对应发生的边境区域地点信息;根据该边境区域地点信息,通过该云端平台进行相应的报警响应操作。Step S4, analyzing and processing the received key image frames through the cloud platform to determine the location information of the border area where the illegal intrusion event occurred; and performing corresponding alarm response operations through the cloud platform according to the location information of the border area.
上述技术方案的有益效果为:该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。The beneficial effects of the above technical solution are as follows: the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform by using communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, thereby avoiding monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.
优选地,在该步骤S1中,在边境区域不同位置分别安装监控设备,并将所有监控设备接入到控制终端具体包括:Preferably, in step S1, installing monitoring devices at different locations in the border area and connecting all monitoring devices to the control terminal specifically includes:
将可见光摄像头、夜视摄像头和环境照度传感器共同组成监控设备,并以等间距的形式在边境区域不同位置分别安装该监控设备;再将每个监控设备包含的可见光摄像头、夜视摄像头和环境照度传感器通过双向通信链路独立连接到控制终端。Visible light cameras, night vision cameras and ambient illumination sensors are combined into a monitoring device, and the monitoring devices are installed at different locations in the border area at equal intervals; the visible light camera, night vision camera and ambient illumination sensor contained in each monitoring device are independently connected to the control terminal through a two-way communication link.
上述技术方案的有益效果为:边境区域需要进行全天候的监控,为了在白天时段和夜晚时段均能够持续对边境区域进行摄像监控,将监控设备设成包括可见光摄像头、夜视摄像头和环境照度传感器,利用环境照度传感器检测外界环境的照度值为基准,对可见光摄像头和夜视摄像头进行切换控制,便于在任何环境光照射条件下,能够对边境区域进行清晰的拍摄。The beneficial effects of the above technical solution are as follows: the border area needs to be monitored around the clock. In order to be able to continuously conduct video surveillance of the border area during both daytime and nighttime, the monitoring equipment is configured to include a visible light camera, a night vision camera and an ambient illumination sensor. The ambient illumination sensor is used to detect the illumination value of the external environment as a reference, and the visible light camera and the night vision camera are switched and controlled, so that clear photography of the border area can be performed under any ambient light conditions.
优选地,在该步骤S1中,通过该控制终端指示该监控设备对边境区域进行拍摄,并收集拍摄得到的边境区域视频流数据具体包括:Preferably, in step S1, instructing the monitoring device to shoot the border area through the control terminal, and collecting the captured border area video stream data specifically includes:
该控制终端对该环境照度传感器检测得到的外界环境照度值进行分析处理;若该外界环境照度值大于或等于预设照度阈值,则该控制终端向该可见光摄像头发送工作触发指令,使得该监控设备切换至可见光拍摄模式;若该外界环境照度小于预设照度阈值,则该控制终端向该夜视摄像头发送工作触发指令,使得该监控设备切换至夜视拍摄模式;The control terminal analyzes and processes the external environment illumination value detected by the environmental illumination sensor; if the external environment illumination value is greater than or equal to a preset illumination threshold, the control terminal sends a work trigger instruction to the visible light camera, so that the monitoring device switches to a visible light shooting mode; if the external environment illumination is less than the preset illumination threshold, the control terminal sends a work trigger instruction to the night vision camera, so that the monitoring device switches to a night vision shooting mode;
该控制终端连续收集该可见光摄像头或该夜视摄像头拍摄得到的边境区域视频流数据。The control terminal continuously collects the border area video stream data captured by the visible light camera or the night vision camera.
上述技术方案的有益效果为:通过上述方式,利用控制终端指示可见光摄像头和夜视摄像头进行切换控制,无论在何种环境照度条件下,监控设备始终能够清晰地拍摄到边境区域的视频流数据,便于后续从视频流数据中准确识别得到边境区域的边界线上人员的活动情况。The beneficial effect of the above technical solution is: through the above method, the control terminal is used to instruct the visible light camera and the night vision camera to perform switching control. No matter what the environmental illumination conditions are, the monitoring equipment can always clearly capture the video stream data of the border area, which is convenient for the subsequent accurate identification of the activities of people on the border line of the border area from the video stream data.
优选地,在该步骤S2中,通过该控制终端对该边境区域视频流数据进行分析处理,判断该边境区域是否发生非法入侵事件具体包括:Preferably, in step S2, analyzing and processing the border area video stream data by the control terminal to determine whether an illegal intrusion event occurs in the border area specifically includes:
通过该控制终端按照预设时间间隔对该边境区域视频流数据进行图片帧提取处理,从而得到相应的图片帧队列;The control terminal performs picture frame extraction processing on the border area video stream data at a preset time interval, thereby obtaining a corresponding picture frame queue;
对该图片帧队列的每一个图片帧进行识别处理,得到该图片帧的画面上存在的人员和边境边界标识物以及上述两者的相对位置关系;Performing recognition processing on each picture frame of the picture frame queue to obtain the personnel and border boundary markers existing on the screen of the picture frame and the relative position relationship between the two;
根据上述两者的相对位置关系,确定该人员是否存在非法入侵行为,从而判断该边境区域是否发生非法入侵事件。Based on the relative position relationship between the two, it is determined whether the person has committed illegal intrusion, thereby judging whether an illegal intrusion incident has occurred in the border area.
上述技术方案的有益效果为:由于边境区域视频流数据的数据量巨大,其包括较多的图片帧,通过从边境区域视频流数据提取相应的图片帧并组成图片帧队列,这样能够减少对视频流数据的计算工作量。同时边境区域都会设置铁网围墙等作为边境边界标识物,从每一个图片帧上识别得到画面上存在的人员和边境边界标识物以及上述两者的相对位置关系,能够以边境边界标识物作为基准,确定是否发生非法入侵事件;比如当人员翻越边境边界标识物时,即可确定发生非法入侵事件等。The beneficial effects of the above technical solution are as follows: since the amount of video stream data in the border area is huge, it includes a large number of picture frames. By extracting the corresponding picture frames from the video stream data in the border area and forming a picture frame queue, the computational workload of the video stream data can be reduced. At the same time, iron mesh fences and the like are set up in the border area as border boundary markers. From each picture frame, the personnel and border boundary markers on the screen and the relative position relationship between the two can be identified. The border boundary markers can be used as a reference to determine whether an illegal intrusion event has occurred; for example, when a person crosses the border boundary marker, it can be determined that an illegal intrusion event has occurred.
优选地,在该步骤S2中,根据上述判断结果,从该边境区域视频流数据中提取得到相应的关键图片帧具体包括:Preferably, in step S2, according to the above judgment result, extracting corresponding key picture frames from the border area video stream data specifically includes:
若确定该边境区域发送非法入侵事件,则从该图片帧队列中筛选画面中同时包含存在非法入侵行为的人员全部身体部分以及该非法入侵行为发生所在的边境边界标识物的若干图片帧,以此作为该关键图片帧。If it is determined that the border area has sent an illegal intrusion event, several picture frames containing all the body parts of the person who has committed the illegal intrusion and the border boundary markers where the illegal intrusion occurred are selected from the picture frame queue as the key picture frames.
上述技术方案的有益效果为:通过上述方式,将包含存在非法入侵行为的人员全部身体部分以及该非法入侵行为发生所在的边境边界标识物的若干图片帧作为关键图片帧,能够以较少数量的图片帧来表征当前所发生的非法入侵事件,同时还能够保证将关键图片帧快速地进行上传。The beneficial effect of the above technical solution is: through the above method, several picture frames containing all the body parts of the person who has committed illegal intrusion and the border boundary markers where the illegal intrusion occurred are used as key picture frames, so that the current illegal intrusion event can be represented by a smaller number of picture frames, and at the same time, the key picture frames can be quickly uploaded.
优选地,在该步骤S3中,构建该控制终端与通信卫星之间的通信连接,并利用该通信卫星将提取得到的所有关键图片帧发送到云端平台具体包括:Preferably, in step S3, establishing a communication connection between the control terminal and a communication satellite, and using the communication satellite to send all extracted key picture frames to a cloud platform specifically includes:
步骤S301,当构建完成该控制终端与通信卫星之间的通信连接后,利用下面公式(1),根据当前处于空闲状态的通信卫星的个数,对该关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,Step S301, after the communication connection between the control terminal and the communication satellite is established, the key picture frame and its corresponding shooting time information are merged and segmented according to the number of communication satellites currently in an idle state using the following formula (1):
在上述公式(1)中,Ha表示对该关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果,再进行数据分割后得到的第a个子数据,其具有十进制数据形式;S表示该关键图片帧及其对应的拍摄时间信息进行数据合并后得到的数据结果;D表示该关键图片帧对应的数据,其具有十进制数据形式;G表示该关键图片帧对应的拍摄时间信息,其具有十进制数据形式;len()表示求取括号内数据的数据位数;<<表示左移符号;m表示数据分割处理后得到的子数据的最小位数值;n表示数据分割处理后得到的第一个子数据的位数值为n;S(1→m+n)表示数据结果S中第一位至第m+n位的数据;L表示当前处于空闲状态的通信卫星的个数;S*,n+(a-1)×m+1-→(n+a×m)+表示数据结果S中第n+(a-1)×m+1位至第n+a×m位的数据;In the above formula (1), Ha represents the data result obtained after data merging of the key picture frame and its corresponding shooting time information, and then the ath sub-data obtained after data segmentation, which has a decimal data form; S represents the data result obtained after data merging of the key picture frame and its corresponding shooting time information; D represents the data corresponding to the key picture frame, which has a decimal data form; G represents the shooting time information corresponding to the key picture frame, which has a decimal data form; len() represents the number of data bits of the data in the brackets; << represents the left shift sign; m represents the minimum bit value of the sub-data obtained after data segmentation processing; n represents the bit value of the first sub-data obtained after data segmentation processing is n; S(1→m+n) represents the data from the first bit to the m+nth bit in the data result S; L represents the number of communication satellites currently in an idle state; S*,n+(a-1)×m+1-→(n+a×m)+ represents the data from the n+(a-1)×m+1th bit to the n+a×mth bit in the data result S;
步骤S302,利用下面公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,Step S302, using the following formula (2), add corresponding communication satellite connection identification data to each sub-data obtained by data segmentation,
Ja=Ha<<len(L)+a (2)J a =H a <<len(L)+a (2)
在上述公式(2)中,Ja表示数据分割得到的第a个子数据添加相应的通信卫星连接标识数据后形成的传输数据,其中通信卫星连接标识数据是指通信卫星的卫星编号标识数据;In the above formula (2), J a represents the transmission data formed by adding the corresponding communication satellite connection identification data to the a-th sub-data obtained by data segmentation, wherein the communication satellite connection identification data refers to the satellite number identification data of the communication satellite;
随机选择其中一个处于空闲状态的通信卫星将其中一个传输数据传输到云端平台,并且在同一时间内,一个处于空闲状态的通信卫星只能传输一个传输数据;Randomly select one of the idle communication satellites to transmit one of the transmission data to the cloud platform, and at the same time, an idle communication satellite can only transmit one transmission data;
步骤S303,当所有传输数据被传输到云端平台后,利用下面公式(3),对所有传输数据进行拼接还原处理,Step S303: After all the transmission data is transmitted to the cloud platform, all the transmission data is spliced and restored using the following formula (3):
在上述公式(3)中,j(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据;J′(e)表示云端平台对接收到的第e个传输数据;>>表示右移符号;k(e)表示云端平台对接收到的第e个传输数据进行解码后得到的拼接数据的拼接排位顺序值;In the above formula (3), j(e) represents the spliced data obtained after the cloud platform decodes the received e-th transmission data; J′(e) represents the received e-th transmission data by the cloud platform; >> represents the right shift symbol; k(e) represents the spliced ranking order value of the spliced data obtained after the cloud platform decodes the received e-th transmission data;
按照上述拼接排位顺序值k(e)由大到小的顺序,对所有拼接数据j(e)进行拼接还原处理,从而得到该关键图片帧及其对应的拍摄时间信息。According to the order of the splicing ranking sequence values k(e) from large to small, all the splicing data j(e) are spliced and restored to obtain the key picture frame and its corresponding shooting time information.
上述技术方案的有益效果为:利用上述公式(1),根据当前处于空闲状态的通信卫星的个数,对该关键图片帧及其对应的拍摄时间信息进行数据合并与数据分割,目的是将所有处于空闲状态的通信卫星都利用起来进行数据传输,提高数据传输效率,并且每个通道传输的数据长度基本保持一致,保证了数据传输的时间可以基本一致,同样提高了数据传输的效率;然后利用上述公式(2),对数据分割得到的每个子数据添加相应的通信卫星连接标识数据,方便云端平台接收到数据后进行数据的自动拼接;最后利用上述公式(3),对所有传输数据进行拼接还原处理,从而根据接收到的数据进行自动智能的数据拼接,体现了系统的智能化和自动化的特点。The beneficial effects of the above technical solution are as follows: using the above formula (1), according to the number of communication satellites currently in an idle state, the key image frame and its corresponding shooting time information are merged and segmented, with the purpose of utilizing all idle communication satellites for data transmission, thereby improving the data transmission efficiency, and the data length transmitted by each channel is basically consistent, thereby ensuring that the data transmission time can be basically consistent, thereby also improving the data transmission efficiency; then using the above formula (2), corresponding communication satellite connection identification data is added to each sub-data obtained by data segmentation, thereby facilitating the cloud platform to automatically splice the data after receiving the data; finally, using the above formula (3), all transmitted data are spliced and restored, thereby automatically and intelligently splicing the data according to the received data, thereby reflecting the intelligent and automated characteristics of the system.
优选地,在该步骤S4中,通过该云端平台对接收到的关键图片帧进行分析处理,确定该非法入侵事件对应发生的边境区域地点信息具体包括:Preferably, in step S4, the cloud platform analyzes and processes the received key picture frame to determine the location information of the border area where the illegal intrusion event occurs, which specifically includes:
通过该云端平台对接收到的关键图片帧进行边境边界标识物识别处理,确定该关键图片帧画面上的边境边界标识物存在的标识编号;再根据该标识编号,确定该非法入侵事件对应发生的边境区域地点信息。The cloud platform performs border marker recognition processing on the received key picture frame to determine the identification number of the border marker on the key picture frame; and then determines the location information of the border area where the illegal intrusion event occurred based on the identification number.
上述技术方案的有益效果为:由于边境区域设置的铁网围墙等边境边界标识物上会设置有相应的标识编号,每个标识编号都是独一无二的,这样每个标识编号可作为相应的边境边界标识物的地理位置标记,通过该云端平台对接收到的关键图片帧进行边境边界标识物上的标识编号进行识别,从而唯一确定非法入侵事件对应发生的边境区域地点信息。The beneficial effects of the above technical solution are as follows: since corresponding identification numbers are set on border markers such as iron mesh fences set up in border areas, each identification number is unique, so that each identification number can be used as a geographical location mark of the corresponding border marker, and the identification number on the border marker is identified on the received key image frame through the cloud platform, thereby uniquely determining the location information of the border area where the illegal intrusion incident occurred.
优选地,在该步骤S4中,根据该边境区域地点信息,通过该云端平台进行相应的报警响应操作具体包括:Preferably, in step S4, according to the location information of the border area, performing corresponding alarm response operations through the cloud platform specifically includes:
通过该云端平台生成包括该边境区域地点信息的报警通知消息,并将该报警通知消息发送到边境区域处于巡逻状态的工作人员所处的移动终端。An alarm notification message including the location information of the border area is generated through the cloud platform, and the alarm notification message is sent to the mobile terminal where the staff who are on patrol in the border area are located.
上述技术方案的有益效果为:通过上述方式,生成包括该边境区域地点信息的报警通知消息,这样工作人员通过查看自身所持的移动终端即可实时了解非法入侵事件发生的位置,并前往相应位置处进行处理。The beneficial effect of the above technical solution is: through the above method, an alarm notification message including the location information of the border area is generated, so that the staff can understand the location of the illegal intrusion incident in real time by checking their mobile terminals and go to the corresponding location for processing.
从上述实施例的内容可知,该基于边云协同的边境监控方法在边境区域不同位置安装监控设备进行边境区域视频流数据的拍摄,并通过控制终端分析边境区域视频流数据,判断边境区域是否发生非法入侵事件,继而提取得到相应的关键图片帧;再利用通信卫星将关键图片帧发送到云端平台,通过云端平台确定非法入侵事件对应发生的边境区域地点信息,从而进行相应的报警响应操作;上述监控方法通过监控设备-控制终端-通信卫星-云端平台的监控数据传输链路对边境区域视频流数据进行分析处理,其通过提取关键图片帧方式将包含非法入侵事件的图片帧发送到云端平台,避免海量的边境区域视频流数据导致发生监控延迟的情况,并且还借助监控设备对边境区域进行自动全面的监控。From the contents of the above embodiments, it can be seen that the border monitoring method based on edge-cloud collaboration installs monitoring equipment at different locations in the border area to shoot video stream data in the border area, and analyzes the video stream data in the border area through the control terminal to determine whether an illegal intrusion incident occurs in the border area, and then extracts the corresponding key picture frames; the key picture frames are then sent to the cloud platform by using communication satellites, and the location information of the border area where the illegal intrusion incident occurs is determined through the cloud platform, so as to perform corresponding alarm response operations; the above-mentioned monitoring method analyzes and processes the video stream data in the border area through the monitoring data transmission link of monitoring equipment-control terminal-communication satellite-cloud platform, and sends the picture frames containing illegal intrusion incidents to the cloud platform by extracting key picture frames, so as to avoid monitoring delays caused by massive video stream data in the border area, and also uses monitoring equipment to automatically and comprehensively monitor the border area.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include these modifications and variations.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210804528.9A CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210804528.9A CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115240346A CN115240346A (en) | 2022-10-25 |
CN115240346B true CN115240346B (en) | 2024-11-01 |
Family
ID=83670910
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210804528.9A Active CN115240346B (en) | 2022-07-08 | 2022-07-08 | Side cloud cooperation-based side border monitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115240346B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064056A (en) * | 2006-04-30 | 2007-10-31 | 程雄 | Audio/video linkage integrated machine for remote alarm monitoring |
CN107170166A (en) * | 2017-07-14 | 2017-09-15 | 四川中科通服智能安防科技有限公司 | Defence area supervising device and intelligent security guard cloud platform |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106843038B (en) * | 2016-12-31 | 2017-12-29 | 华中科技大学 | A kind of remote sensing satellite image handles load multitask master control system |
CN212623110U (en) * | 2020-07-01 | 2021-02-26 | 国家海洋局南海调查技术中心(国家海洋局南海浮标中心) | Ocean buoy station and intrusion detection evidence obtaining system |
CN113194297B (en) * | 2021-04-30 | 2023-05-23 | 重庆市科学技术研究院 | Intelligent monitoring system and method |
-
2022
- 2022-07-08 CN CN202210804528.9A patent/CN115240346B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064056A (en) * | 2006-04-30 | 2007-10-31 | 程雄 | Audio/video linkage integrated machine for remote alarm monitoring |
CN107170166A (en) * | 2017-07-14 | 2017-09-15 | 四川中科通服智能安防科技有限公司 | Defence area supervising device and intelligent security guard cloud platform |
Also Published As
Publication number | Publication date |
---|---|
CN115240346A (en) | 2022-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN211293956U (en) | AI-based identification and alarm system for abnormal agent on construction site | |
KR101321444B1 (en) | A cctv monitoring system | |
CN110555964B (en) | Multi-data fusion key area early warning system and method | |
CN107645653B (en) | Method, device and equipment for tracking shooting by camera and storage medium | |
KR101036947B1 (en) | Automated security system for crime and accident prevention using computer image analysis technology | |
CN101764998A (en) | Alarm interlocking method in network video monitoring system and network video monitoring system | |
CN112112629A (en) | A safety business management system and method during drilling operation | |
KR102219809B1 (en) | Safety Work Management System by Image Analysis | |
CN114566056B (en) | Highway tunnel driving safety risk identification, prevention and control method and system | |
CN116129490A (en) | A monitoring device and monitoring method for behavior recognition in complex environments | |
CN113538825A (en) | Campus wall-turning event alarm method and system | |
KR101832274B1 (en) | System for crime prevention of intelligent type by video photographing and method for acting thereof | |
KR20220072783A (en) | System and method for real-time flood detecting, and monitoring using CCTV image, and a recording medium recording a computer readable program for executing the method | |
CN109151463B (en) | Video quality diagnosis system and video quality analysis method | |
CN112330930A (en) | Urban tunnel traffic monitoring method, system and platform | |
WO2019099321A1 (en) | Collaborative media collection analysis | |
CN211630273U (en) | Intelligent image recognition device for railway environment | |
CN115641608A (en) | Intelligent identification equipment for personal protective equipment in distribution network based on edge intelligence | |
CN115240346B (en) | Side cloud cooperation-based side border monitoring method | |
KR101046819B1 (en) | Intrusion monitoring method and intrusion monitoring system by software fence | |
KR101250956B1 (en) | An automatic system for monitoring | |
CN114463873A (en) | Patrol system for community | |
CN118348526A (en) | Real-time data fusion analysis method based on radar fusion algorithm | |
CN117994734A (en) | Target risk level assessment method based on robot | |
CN113536847A (en) | A deep learning-based industrial scene video analysis system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |