WO2018232846A1 - Large-scale peripheral security monitoring method and system - Google Patents

Large-scale peripheral security monitoring method and system Download PDF

Info

Publication number
WO2018232846A1
WO2018232846A1 PCT/CN2017/096024 CN2017096024W WO2018232846A1 WO 2018232846 A1 WO2018232846 A1 WO 2018232846A1 CN 2017096024 W CN2017096024 W CN 2017096024W WO 2018232846 A1 WO2018232846 A1 WO 2018232846A1
Authority
WO
WIPO (PCT)
Prior art keywords
intrusion
data
monitoring
monitored area
perturbation
Prior art date
Application number
PCT/CN2017/096024
Other languages
French (fr)
Chinese (zh)
Inventor
杜光东
Original Assignee
深圳市盛路物联通讯技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市盛路物联通讯技术有限公司 filed Critical 深圳市盛路物联通讯技术有限公司
Publication of WO2018232846A1 publication Critical patent/WO2018232846A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • G08B13/19615Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • the present invention relates to the field of Internet of Things, and in particular to a wide-range peripheral security monitoring method and system.
  • the security issue is a big issue of common concern to the whole society and involves people's lives and property.
  • the development and progress of the security industry depends not only on the development and progress of science and technology, but also on providing and creating a good social environment for the advancement and development of science and technology.
  • the security monitoring system can be divided into small-scale systems and large-scale systems.
  • Small-scale security monitoring systems such as security systems in residential areas, private areas, and public places, are based on video capture and infrared intrusion alarms and other front-end devices to collect data and send out alarm information. Monitoring and control are easier to implement.
  • a wide range of safety monitoring systems such as safety monitoring systems applied to the boundary line, if still monitored and controlled by the above systems and methods, a large number of active devices will greatly increase the system construction cost and operation and maintenance costs, especially considering China's land area is vast, and it is not realistic to place traditional security monitoring systems on such long borders.
  • the present invention provides a wide range of perimeter security monitoring methods and systems.
  • the present invention provides a wide range of perimeter security monitoring methods, the method specifically comprising the steps of:
  • S5. Determine a processing scheme according to the type of the intrusion event and the intrusion information.
  • the invention provides a large-scale perimeter security monitoring method, pre-creates an intrusion feature database, collects the perturbation data and obtains the quantized amplitude, and compares with the intrusion data features in the intrusion feature database to determine whether the monitored area is invaded and determined. Corresponding types of intrusion events; further, through the perturbation data, the intrusion information such as the number of intruders, the movement trajectory and the moving speed are analyzed, and the intrusion is combined. The piece type and intrusion information determine the processing scheme.
  • the intruder generates a vibration signal during the traveling process, and monitors the boundary of the monitored area in real time, so that the perturbation data brought by the vibration signal can be collected when the invading.
  • the perturbation data By acquiring and analyzing the perturbation data by the above method, only the perturbation data needs to be collected and processed to determine whether the monitored area is intruded, the type of intrusion event, and the intrusion information, thereby ensuring the security of the monitored area, and having high accuracy.
  • the advantages of good monitoring effect and low operation and maintenance cost are especially applicable to a wide range of safety monitoring such as border lines.
  • creating an intrusion feature library specifically includes:
  • a preset intrusion event type table where the intrusion event type table includes one or more intrusion event types
  • the intrusion event type table and the intrusion data feature table are preset and the mapping relationship between the intrusion event type table and the intrusion data feature table is established, after the subsequent acquisition of the perturbation data and determining whether the monitored area is invaded
  • the type of intrusion event can be determined by the mapping relationship between the intrusion event type table and the intrusion data feature table.
  • the present invention provides a wide range of perimeter security monitoring systems, the apparatus comprising:
  • Monitoring a sensing strip for collecting perturbation data at a boundary of the monitored area the monitoring sensing strip being parallel to a boundary of the monitored area, the monitoring sensing strip comprising a plurality of vibration sensing nodes;
  • Monitoring center for data processing and control includes:
  • An intrusion feature library creation module configured to create an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
  • a quantization analysis module for quantizing the perturbation data to obtain a quantized amplitude, comparing the quantized amplitude and the intrusion data characteristics, determining whether the monitored area is invaded, and further determining a corresponding intrusion event type when the monitored area is invaded;
  • An intrusion information analysis module configured to analyze intruder intrusion information according to the perturbative data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
  • the solution determining module is configured to determine a processing plan according to the type of the intrusion event and the intrusion information.
  • the invention provides a wide-range perimeter security monitoring system, and the monitoring induction belt is used as the front end of the system for data collection; the monitoring center is used as the back end of the system for data processing and control.
  • the monitoring sensing strip is disposed at a boundary of the monitored area, and the monitoring sensing strip includes a plurality of vibration sensing nodes.
  • the process of data processing is: monitoring the inductive band to collect the perturbative data, sending it to the monitoring center for data analysis and processing, determining the type of intrusion event and intrusion information, and determining the processing plan according to the type of intrusion event and the intrusion information.
  • the security of the monitoring area has the advantages of high accuracy, good monitoring effect and low operation and maintenance cost, and realizes a wide range of perimeter security monitoring functions.
  • the monitoring sensing strip includes a plurality of vibration sensing nodes, and the perturbation data of the boundary of the monitored area is collected by the vibration sensing node, and the perturbation data is accessed by the fusion gateway to the monitoring center;
  • the converged gateway is configured to collect the received perturbation data, and forward the perturbed data to the monitoring center after performing protocol conversion;
  • the vibration sensing node includes an FFD device and a RFD device, the FFD device has a data collection function, a data transmission function, and a routing function, the RFD device has a data collection function and a data transmission function, and the RFD device is composed of an FFD device.
  • a sensing network, the FFD device and the RFD device are connected through a ZigBee protocol;
  • the RFD device After collecting the perturbation data, the RFD device sends the perturbation data to the FFD device, and the FFD device accesses the perturbation data to the monitoring center through the converged gateway, where the FFD device is connected to the converged gateway through a wired or wireless manner;
  • the FFD device After collecting the perturbation data, the FFD device directly accesses the perturbation data to the monitoring center through the converged gateway;
  • the working state of the vibration sensing node includes a sleep state and an awake state.
  • a sleep state When the vibration sensing node is in a sleep state, only data acquisition is performed, and when the vibration sensing node is in an awake state, data acquisition and data transmission are simultaneously performed.
  • the sleep sensor node in the sleep state switches to the awake state after collecting the perturbation data.
  • the networking form of the vibration sensing node is essential for comprehensive data acquisition, and the networking of the vibration sensing node should be both effective and practical.
  • the vibration sensing node includes an FFD device and an RFD device.
  • the RFD device forms a sensing network around the FFD device, and can provide multiple data delivery routes, and select other suitable routes when the optimal delivery route fails, which is beneficial to shorten the transmission. Delay, improve communication reliability.
  • the plurality of vibration sensing nodes form a sensing network of a mesh structure, and the perturbation data of the boundary of the monitored area is collected, and the FFD devices are connected to each other, and the RFD device is also connected to a plurality of FFD devices around it. When an FFD device cannot send data, the RFD device can continue to send data through other FFD devices.
  • protocol conversion is performed through the converged gateway, and the monitoring sensor band 3 and the monitoring center 1 are connected to bridge the Internet of Things and the traditional Internet.
  • FIG. 1 is a structural diagram of a wide-area perimeter security monitoring system according to the present invention.
  • FIG. 2 is a schematic diagram of interaction of a wide-area perimeter security monitoring system according to the present invention.
  • FIG. 3 is a schematic diagram of interaction of a response calibration of a monitoring sensing belt according to the present invention.
  • FIG. 4 is a schematic flow chart of a wide-range perimeter security monitoring method according to the present invention.
  • FIG. 5 is a schematic flowchart of response calibration of a monitoring induction belt according to the present invention.
  • FIG. 6 is a diagram of the present invention for determining whether a monitored area is intruded and determining a corresponding type of intrusion event Schematic diagram of the process
  • FIG. 7 is a schematic flowchart of analyzing intruder intrusion information according to the present invention.
  • FIG. 8 is a schematic flow chart of determining a processing scheme according to the present invention.
  • FIG. 1 is a structural diagram of a wide-area perimeter security monitoring system according to the present invention.
  • a wide range of perimeter security monitoring systems including:
  • Monitoring Center 1 for data processing and control
  • the monitoring sensor strip 3 is connected to the monitoring center 1 through the converged gateway 2.
  • the sensing strip 3 is used as the front end of the system for data acquisition. In the process of extensive perimeter security monitoring, the monitoring sensing strip 3 is disposed at the boundary of the monitored area, and the monitoring sensing strip 3 includes a plurality of vibration sensing nodes.
  • the function of the converged gateway 2 is to collect the received perturbation data and forward the perturbed data to the monitoring center 1. As the back end of the system, Monitoring Center 1 is the core of the entire system for data processing and control.
  • the monitoring sensing strip 3 includes a plurality of vibration sensing nodes, and the perturbation data of the boundary of the monitored area is collected by the vibration sensing node, and the perturbation data is accessed to the monitoring center 1 through the converged gateway 2;
  • the monitoring sensor strip 3, the converged gateway 2 and the monitoring center 1 together constitute a three-tier architecture of the Internet of Things.
  • the monitoring sensing strip 3 is set as the data collecting device at the forefront of the Internet of Things.
  • the data collecting function of the monitoring sensing strip 3 is mainly realized by the vibration sensing node, and the plurality of vibration sensing nodes cover the monitored area as completely as possible.
  • the boundary ensures that no areas are missed, which requires the number of vibration sensing nodes to be as high as possible.
  • the amount of data collected by a large number of vibration sensing nodes is also very large. If the data structure sent by the vibration sensing node is complicated, it will bring great pressure to the data processing of the monitoring center 1.
  • the data structure of the vibration sensing node is as simple as possible.
  • Traditional Internet protocols require data to be accurate and secure. These features are negligible in the Internet of Things.
  • the Internet of Things is more concerned with the number of samples sampled. In this embodiment, it is represented by the number of vibration sensing nodes and whether it covers the entire area. .
  • the monitoring sensing band 3 only needs to continuously collect and transmit the perturbative data, and the implementation of such a function by the traditional Internet protocol is too inefficient. Therefore, the monitoring sensing band 3 as the front end of the system can adopt other networking protocols. Simplify the data structure of the vibration sensing node.
  • the data of the vibration sensing node only needs to include the address code and the sensing data, wherein the address code records the position of the vibration sensing node; the sensing data is the perturbation data.
  • the number of front-end devices of the Internet of Things is huge. Considering the overhead and efficiency of data, the vibration sensing node only carries the most useful information for the system, which is convenient for large-scale implementation.
  • the vibration sensing nodes in the monitoring sensor strip 3 are not suitable for the conventional Internet protocol, today's Internet of Things is still based on the traditional Internet to varying degrees.
  • the traditional Internet protocol is still followed between the converged gateway 2 and the monitoring center 1.
  • the converged gateway 2 provides the data transmission and gateway functions of the traditional Internet, that is, performs protocol conversion, and connects the networking protocol of the monitoring sensing band 3 with the networking protocol of the traditional Internet.
  • the leftmost dotted line is the monitored area boundary
  • the right side of the dotted line is the monitored area
  • the front end for collecting data includes three side-by-side monitoring sensing strips 3 disposed in the monitored area.
  • the monitoring sensing strips 3 may be provided in plurality, and a plurality of vibration sensing nodes in the plurality of monitoring sensing strips 3 constitute a sensing network.
  • the sensor network collects the perturbation data.
  • the monitoring center 1 sequentially analyzes and processes the perturbation data through the intrusion signature database creation module 11, the quantization analysis module 12, the intrusion information analysis module 13, and the scheme determination module 14, and implements a large-scale peripheral security monitoring function. The specific process is shown in FIG. 2 .
  • the monitoring center 1 includes:
  • the intrusion feature library creation module 11 is configured to create an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
  • the quantization analysis module 12 is configured to quantize the perturbation data to obtain a quantized amplitude, compare the quantized amplitude and the intrusion data feature, determine whether the monitored area is invaded, and further determine a corresponding intrusion event type when the monitored area is invaded;
  • the intrusion information analysis module 13 is configured to analyze intruder intrusion information according to the perturbation data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
  • the solution determining module 14 is configured to determine a processing scheme according to the type of the intrusion event and the intrusion information. Specifically, the processing scheme includes material scheduling, personnel scheduling, configuration of combat equipment, and release of warnings, and the like.
  • the intrusion signature database is first created by the intrusion signature database creation module 11 as a criterion for determining whether the monitored region is intruded and the corresponding intrusion event type.
  • the quantization data is quantized by the quantization analysis module 12 to obtain the quantized amplitude, and the quantized amplitude and the intrusion data feature are further compared to determine whether the monitored area is invaded and the corresponding is determined.
  • the type of intrusion event The intrusion information analysis module 13 analyzes the intruder information such as the number of intruders, the moving track, and the moving speed through the perturbative data.
  • the solution determining module 14 determines the processing plan according to the type of the intrusion event and the intrusion information, completes the basic security monitoring process, and is applicable to a wide range of security monitoring such as border lines.
  • FIG. 4 is a schematic flowchart of a wide-range peripheral security monitoring method according to the present invention.
  • a large-scale perimeter security monitoring method corresponding to a large-scale perimeter security monitoring system specifically comprising:
  • the monitoring center 1 quantizes the perturbative data after receiving the perturbation data sent by the monitoring sensing strip 3, quantizes the perturbative data to obtain the quantized amplitude, compares the quantized amplitude and the intrusion data characteristics, and determines whether the monitored area is invaded. Returning to S2 when the monitored area is not invaded, and further determining the corresponding type of intrusion event when the monitored area is invaded;
  • the monitoring center 1 analyzes the intruder's intrusion information according to the perturbative data, where the intrusion information includes the number of intruders, the moving track, and the moving speed;
  • the monitoring center 1 determines a processing scheme according to the type of the intrusion event and the intrusion information.
  • the traditional security monitoring method and system mainly collect real-time video/image data of the monitored area by monitoring the camera at all times, and the attendant needs to pay attention to the video/image data on multiple displays at all times to pay attention to abnormal situations; or, by being monitored
  • the area is equipped with an infrared sensing device that triggers an infrared sensing device when the monitored area is invaded, and then issues an alarm.
  • the front-end equipment of the present invention Unlike traditional monitoring methods that rely on front-end equipment such as video capture and infrared-sensing alarms, the front-end equipment of the present invention only needs to have simple data acquisition and transmission functions; the implementation of the monitoring function mainly depends on the back-end equipment, and the back-end equipment accepts The data collected by the front-end equipment is analyzed and discovered in time. It does not require traditional manual guards and manual judgments. It has the advantages of high accuracy, good monitoring effect and low operation and maintenance cost, and is especially suitable for a wide range of security such as border lines. monitor.
  • creating an intrusion feature library specifically includes:
  • a preset intrusion event type table where the intrusion event type table includes one or more intrusion event types
  • the intrusion event type table and the intrusion data feature table are preset and the mapping relationship between the intrusion event type table and the intrusion data feature table is established, after the subsequent acquisition of the perturbation data and determining whether the monitored area is invaded
  • the type of intrusion event can be determined by the mapping relationship between the intrusion event type table and the intrusion data feature table.
  • the perturbation data collected by a single vibration sensing node is too one-sided and has no reference value. Therefore, the effect achieved by a single vibration sensing node in the monitoring process is quite limited.
  • Multiple monitoring sensors The vibration sensing node in 3 collects the perturbation data in the form of a sensing network to ensure the validity of the front-end data.
  • the S2 specifically includes:
  • the monitoring center 1 determines that the perturbation data is an abnormal signal
  • Control the adjacent vibration sensing node to work collect the perturbation data of the boundary of the monitored area, and the adjacent vibration sensing nodes send the respective perturbation data to the monitoring center 1;
  • the monitoring center 1 performs abnormality verification, and the abnormality verification process is to compare the perturbation data of the adjacent vibration sensing node with the abnormal signal;
  • the perturbation data collected by the adjacent vibration sensing node matches the abnormal signal, it is determined that the perturbation data collected by the single vibration sensing node is effective, and the perturbation data collected by the adjacent vibration sensing node does not match the abnormal signal. At the same time, it is judged that the perturbation data collected by the single vibration sensing node is invalid.
  • the monitoring sensing belt 3 collects the perturbation data of the boundary of the monitored area in the form of a sensing network and sends it to the monitoring center 1, and the monitoring center 1 determines that the perturbative data is The abnormal signal, and control the adjacent vibration sensing node to work, collect the perturbation data of the boundary of the monitored area, and the monitoring center 1 performs abnormality verification by comparing the perturbation data and the abnormal signal of the adjacent vibration sensing nodes.
  • the above matching specifically means that the perturbation data and the abnormal signal of the adjacent vibration sensing nodes are the same.
  • the perturbation data and the abnormal signal of the adjacent vibration sensing nodes are the same, and the single vibration sensing node that collects the perturbative data is excluded from failure.
  • the perturbation data of the boundary of the monitored area is collected in the form of a sensing network, which improves the effectiveness of the data collected by the front end.
  • the present invention enables the monitoring inductive strip 3 to output a stable response output data to the shock signal by means of soft calibration.
  • the soft calibration process is to perform calibration conversion on the perturbation data by the calibration adjustment parameter.
  • FIG. 3 is an interaction diagram of response monitoring of the monitoring sensor strip 3 according to the present invention.
  • a wide range of perimeter security monitoring systems including:
  • the monitoring sensing strips 3 are provided in plurality, the monitoring sensing strips 3 are arranged along the boundary of the monitored area, and the monitoring sensing strips 3 are parallel to each other;
  • the monitoring center 1 includes:
  • a response output module 15 for converting the perturbative data into response output data
  • the calibration parameter module 16 is configured to compare corresponding response output data when the artificial disturbance point is in different positions, and obtain calibration adjustment parameters;
  • the calibration module 17 is configured to perform soft calibration on the monitoring sensing strip 3 according to the calibration adjustment parameter, so that the monitoring sensing strip 3 outputs a stable response output data to the vibration signal.
  • the soft calibration process is to perform the perturbation data through the calibration adjustment parameter. Calibration conversion.
  • FIG. 5 is a schematic flowchart of response calibration of the monitoring sensor strip 3 according to the present invention.
  • S2 a plurality of mutually parallel monitoring sensing strips 3 are arranged along the boundary of the monitored area, and the perturbation data is collected by the monitoring sensing strip 3, the monitoring sensing strip 3 is parallel to the boundary of the monitored area, and the monitoring sensing
  • the belt 3 includes a plurality of vibration sensing nodes;
  • the monitoring sensing strip 3 needs to be responsively calibrated, and the response calibration specifically includes:
  • the ratio of the response output data corresponding to the three vibration sensing nodes to the standard response output data is 1.2. 1.5 and 0.8
  • the ratio of the response output data corresponding to the three response sensor nodes to the standard response output data should be 1 in the ideal state. Therefore, the calibration adjustment parameters of the three vibration sensing nodes are 1.2, 1.5, and 0.8, respectively.
  • the process of soft calibration of the monitoring sensor strip 3 according to the calibration adjustment parameter by the calibration module 17 is corresponding to dividing the respective response output data by 1.2, 1.5, and 0.8, respectively, thereby causing three vibration sensing nodes.
  • the boundary of the monitored area is mostly a curve.
  • the monitoring sensing strip 3 is parallel to the boundary of the monitored area, the monitoring sensing strips 3 are parallel to each other, and the calibration test strip is parallel to the monitoring sensing strip 3.
  • the above parallel means that each tangent is parallel.
  • the front end is arranged to monitor the sensing strip 3 and the purpose of monitoring the sensing strip 3 parallel to the boundary of the monitored area is to arrange a sensing network capable of uniformly collecting signals; and the purpose of calibrating the test strip parallel to the monitoring sensing strip 3 In the process of moving the artificial disturbance point, it is ensured that the artificial disturbance point can be the same distance from each vibration sensing node at different time points.
  • the type of intrusion event includes personnel intrusion and vehicle intrusion
  • the quantitative analysis module 12 includes:
  • a threshold obtaining unit configured to acquire an intrusion determination threshold and an intrusion type determination threshold, where the intrusion determination threshold is used to determine whether the monitored area is intruded, and the intrusion type determination threshold is used to determine an intrusion event type;
  • a pre-processing unit configured to pre-process the perturbation data to remove noise in the perturbation data
  • a quantization unit configured to quantize the pre-processed perturbation data to obtain a quantized amplitude of the perturbed data
  • the intrusion determination unit is configured to compare the quantized amplitude of the perturbation data with the intrusion determination threshold, determine that the monitored area is safe when the quantized amplitude is smaller than the intrusion determination threshold, and determine that the monitored area is invaded when the quantized amplitude is greater than or equal to the intrusion determination threshold;
  • the type determining unit is configured to compare the quantized amplitude of the perturbation data and the intrusion type decision threshold after determining that the monitored area is invaded, and determine that the intrusion is when the quantized amplitude is smaller than the intrusion type determining threshold, and the quantized amplitude is greater than or equal to the intrusion type.
  • the threshold is determined, it is determined that the vehicle has entered the vehicle.
  • the intrusion data feature includes an intrusion determination threshold and an intrusion type determination threshold, and the intrusion determination threshold and the intrusion type determination threshold are acquired in advance by the threshold acquisition unit to prepare for data processing.
  • the intrusion determination threshold and the intrusion type determination threshold are acquired in advance by the threshold acquisition unit to prepare for data processing.
  • the noise introduced in the process of collecting the perturbative data needs to be removed by the pre-processing unit to provide more accurate perturbative data for subsequent data processing.
  • the quantized unit quantizes the perturbed data to obtain a quantized amplitude
  • the intrusion determining unit determines whether the monitored area is invaded by comparing the quantized amplitude and the intrusion determination threshold, and the type determining unit judges by comparing the quantized amplitude and the intrusion type determining threshold. Is it a human invasion or a vehicle invasion?
  • the intrusion determination threshold is A
  • the intrusion type decision threshold is B
  • the quantization amplitude is C, where A must be smaller than B.
  • the quantized amplitude of the perturbation data When the quantized amplitude of the perturbation data is smaller than the intrusion determination threshold, it indicates that the perturbation data may be introduced by a non-invasive disturbance source, such as animals living in the monitored area, and the characteristics of the perturbative data introduced by these animals are different from those of human beings.
  • the quantized amplitude is smaller than the quantized amplitude of the intruder, indicating that the monitored area is not invaded; when the quantized amplitude of the perturbed data is larger than the intrusion determination threshold or equal to the intrusion determination threshold, the monitored area is invaded.
  • the intrusion type determination threshold can be used as the criterion for the intrusion type determination, and the determination process is the same as above.
  • FIG. 6 is a schematic flowchart of determining whether the monitored area is intruded and determining the corresponding intrusion event type according to the present invention.
  • the intrusion data feature includes an intrusion determination threshold and an intrusion type determination threshold, and the S3 specifically includes:
  • the security monitoring of the monitored area is realized.
  • the traditional monitoring system and method mainly rely on front-end equipment such as video capture and infrared-sensing alarm.
  • the present invention passes the monitoring center 1 comparison ratio intrusion determination threshold after the front-end data acquisition is completed.
  • the intrusion type decision threshold and the quantization amplitude are used to determine whether the monitored area is intruded and the type of intrusion. Therefore, the process of implementing security monitoring according to the present invention is mainly a process of big data processing.
  • the massive perturbation data collected by the front end is used as the basis of big data processing, and combined with the big data processing method, the human being can be liberated to the greatest extent in the security field, and Compared with traditional monitoring systems and methods, the effect is better and the accuracy is higher.
  • the intrusion information analysis module 13 includes:
  • a marking unit configured to mark the vibration sensing node and the corresponding time stamp collected to the perturbative data
  • the quantity analysis unit is configured to count the number of the vibration sensing nodes that collect the perturbative data at the same time stamp, and estimate the number of the intruders according to the number of the vibration sensing nodes that collect the perturbative data in the same time stamp;
  • the dynamic tracking unit is configured to integrate the time stamp of the perturbation data and the relative position of the vibration sensing node on the electronic map, and analyze the movement track and the moving speed of the intruder according to the time stamp and the relative position.
  • Intrusion information includes the number of intruders, moving trajectories, and moving speed. Determining intrusion information is a critical step in the security monitoring process, and the results determine what countermeasures to take to address the intrusion to ensure the security of the monitored area.
  • the vibration sensing node that collects the perturbation data and the time stamp of the acquired perturbation data are first marked by the marking unit; then the vibration of the collected perturbative data is collected by the graphical unit using dynamic topology discovery technology.
  • the relative position of the sensing nodes is marked on the electronic map for visual intelligent management. The operator can visually see where the abnormal signals are collected through the electronic map, that is, where the objects are being invaded.
  • the timestamps are sorted by the sorting unit, and the number of the seismic sensor nodes that collect the perturbative data at the same timestamp is counted by the quantity analysis unit to determine the number of intruders; finally, the most important process in analyzing the intrusion information is
  • the dynamic tracking unit integrates the time stamp of the perturbation data and the relative position of the vibration sensing node on the electronic map, and analyzes the intruder's moving trajectory and moving speed according to the time stamp and the relative position.
  • FIG. 7 is a schematic flowchart of analyzing intruder intrusion information according to the present invention.
  • analyzing the intruder's intrusion information according to the perturbation data specifically includes:
  • the vibration sensing node in the plurality of monitoring sensing strips 3 collects the perturbation data, and marks the vibration sensing node and the corresponding time stamp collected to the perturbative data;
  • the vibration sensing nodes in the plurality of monitoring sensing strips 3 collect the perturbative data in the form of a sensing network.
  • the corresponding vibration sensing nodes and time stamps are marked; further, the electronic map display is used to collect The relative position of the vibration sensing node to the perturbation data.
  • the electronic map displays the point at which the abnormal signal is collected in real time, that is, where is being invaded; further, the time stamp is sorted and counted in the same time stamp.
  • the number of vibration sensing nodes that collect the perturbation data determines the number of intruders based on the number of vibration sensing nodes that collect the perturbative data in the same time stamp; finally, by integrating the perturbation data, displaying on the electronic map Out of the intruder’s trajectory and Moving speed.
  • the monitoring sensing strip 3 is parallel to the boundary of the monitored area, and the sensing network uniformly collects the perturbation signal of the monitored area. Therefore, the number of the vibration sensing nodes that collect the perturbative data in the same time stamp is The number of intruders. For example, within the same timestamp, five seismic sensing nodes in the sensing network collect perturbation data, indicating that there are five intruders in the monitored area.
  • the massive perturbation data is integrated into information that can be intuitively recognized by the operator, which is an important step in the field of Internet of Things and big data processing.
  • the operator does not need to participate in the process of data processing, and only needs to receive the intruder's intrusion information through the human-computer interaction interface, further liberating manpower.
  • the solution determination module 14 includes:
  • a parameter preset unit configured to preset a threat radius, a warning level, and a processing scheme corresponding to the warning level
  • a threat area defining unit is configured to take the invaded monitored area as an origin, divide the threatened area according to the threat radius, and determine a key protection target;
  • a tracking lock unit for locking the intruder's whereabouts by continuously collecting and storing the intruder's image and/or video data
  • the early warning and grading unit is configured to determine an early warning level according to the type of the intrusion event and the intrusion information, and start a corresponding processing scheme according to the early warning level.
  • the system determines the processing scheme by the cooperation of the parameter preset unit, the threat area defining unit, the track locking unit and the early warning grading unit. Firstly, the parameter of the threat radius, the warning level and the processing scheme corresponding to the warning level are preset by the parameter preset unit; then the threat area is divided by the threat area defining unit and the key protection target is determined; then, the tracking unit is continuously collected. And storing the intruder's image and/or video data to lock the intruder's whereabouts; finally, the early warning unit determines the alert level according to the intrusion event type and the intrusion information, and starts the corresponding processing scheme according to the alert level.
  • FIG. 8 is a schematic flowchart of determining a processing scheme according to the present invention.
  • determining the processing scheme according to the type of the intrusion event and the intrusion information specifically includes:
  • S504. Determine an early warning level according to the type of the intrusion event and the intrusion information, and start a corresponding processing plan according to the early warning level;
  • the threat radius is set in advance in the parameter preset unit, and the judgment standard of the preset warning level and the processing scheme corresponding to the warning level are used, and the threat radius is used to determine whether an area is in the threatened area by combining the invaded points, and the warning is
  • the level corresponds to the processing scheme;
  • the key protection target is determined by the threat area defining unit, and the key protection target is preferentially protected in the process of security monitoring;
  • the intruder's whereabouts are locked by the tracking unit, and the specific location of the intruder is grasped in real time, and more Conducive to security protection; through the early warning and rating unit to determine the early warning level according to the type of intrusion event and intrusion information, and start the corresponding treatment plan according to the early warning level;
  • the operator implements the defense against the key protection target according to the treatment plan, and according to the intruder's whereabouts Alert the intruder.
  • the storage of images and / or video data facilitates investigation and forensics after the completion of security
  • the process of determining the processing scheme is still implemented by the monitoring center 1.
  • the operator only needs to pass the indication of the monitoring center 1 and attack the specific location through a specific processing scheme, so that a wide range of security monitoring can be realized efficiently.
  • the method for locking the intruder's whereabouts includes:
  • the acquisition of the perturbation data location fixed monitoring device is sequentially enabled, and the fixed monitoring device collects images and/or video data of the intruder.
  • the cruising route of the drone can be set, and the intruder's image and/or video data can be collected by the drone to lock the intruder's whereabouts.
  • the monitoring center 1 records the location where the perturbation data is collected and analyzes the intruder's moving trajectory and moving speed, and then sequentially enables the acquisition of the perturbative data location fixed monitoring device, and the fixed monitoring device collects the intrusion.
  • Image and/or video data; or, the monitoring center 1 sets the cruise route of the drone according to the intruder's movement trajectory and moving speed, and collects the intruder's image and/or video data through the drone to lock the intruder. Whereabouts.
  • the neural network algorithm is used to coordinate and direct all fixed monitoring devices.
  • a fixed monitoring device records the image and/or video data of the intruder
  • the monitoring center 1 transmits signals to other fixed monitoring devices in the vicinity, and adjusts to enter the working state. .
  • By enabling specific fixed monitoring equipment or setting the cruise route of the drone for image and/or video data collection it is possible to lock the intruder's whereabouts, grasp the intruder's movements in real time, and improve the efficiency of the police.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of cells is only a logical function division.
  • multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
  • the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • An integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, can be stored in a computer readable storage medium.
  • the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention relates to a large-scale peripheral security monitoring method and system. The method comprises: creating an intrusion feature library; collecting perturbation data of the boundaries of a monitored area; quantifying the perturbation data so as to obtain a quantized amplitude, and comparing the quantized amplitude and intrusion data features, so as to determine whether the monitored area has been intruded into and determine a corresponding type of the intrusion event; analyzing intrusion information about the intruder according to the perturbation data; and determining a processing scheme according to the intrusion event type and the intrusion information. The system comprises: a monitoring sensing belt and a monitoring centre, the monitoring centre comprising an intrusion feature library creation module, a quantization analysis module, an intrusion information analysis module, and a scheme determination module. By acquiring perturbation data and processing same by means of the method and system above, whether a monitored area has been intruded into, the intrusion event type and intrusion information can be determined, thereby ensuring the security of the monitored area, having advantages such as high accuracy, good monitoring effect and low maintenance cost, being particularly suitable for large-scale security monitoring such as border.

Description

一种大范围周边安全监控方法和系统Wide-range peripheral security monitoring method and system 技术领域Technical field
本发明涉及物联网领域,具体涉及一种大范围周边安全监控方法和系统。The present invention relates to the field of Internet of Things, and in particular to a wide-range peripheral security monitoring method and system.
背景技术Background technique
安全问题是全社会共同关注的大问题,牵涉到人们的生命财产安全。安防行业的发展和进步,既依赖于科学技术的发展和进步,同时又为科学技术的进步与发展提供和创造良好的社会环境。The security issue is a big issue of common concern to the whole society and involves people's lives and property. The development and progress of the security industry depends not only on the development and progress of science and technology, but also on providing and creating a good social environment for the advancement and development of science and technology.
从应用场景来看,安全监控系统可分为小范围系统和大范围系统。小范围的安全监控系统如小区、私人区域和公共场所的安防系统,主要基于视频采集和红外入侵报警等前端设备采集数据后发出报警信息,监视和控制都较容易实施。大范围的安全监控系统,例如应用在边界线上的安全监控系统,如果仍通过上述系统和方法进行监视和控制,众多的有源设备会大大提高系统的建设成本和运维成本,尤其考虑到中国的国土面积辽阔,在那么长的边界线上布置传统的安全监控系统不大现实。另外,通过人工值守的方式同样存在浪费人力和效率低下的问题。From the application scenario, the security monitoring system can be divided into small-scale systems and large-scale systems. Small-scale security monitoring systems, such as security systems in residential areas, private areas, and public places, are based on video capture and infrared intrusion alarms and other front-end devices to collect data and send out alarm information. Monitoring and control are easier to implement. A wide range of safety monitoring systems, such as safety monitoring systems applied to the boundary line, if still monitored and controlled by the above systems and methods, a large number of active devices will greatly increase the system construction cost and operation and maintenance costs, especially considering China's land area is vast, and it is not realistic to place traditional security monitoring systems on such long borders. In addition, there are also problems of wasted manpower and inefficiency through manual duty.
发明内容Summary of the invention
为解决上述技术问题,本发明提供了一种大范围周边安全监控方法和系统。To solve the above technical problems, the present invention provides a wide range of perimeter security monitoring methods and systems.
第一方面,本发明提供了一种大范围周边安全监控方法,该方法具体包括步骤:In a first aspect, the present invention provides a wide range of perimeter security monitoring methods, the method specifically comprising the steps of:
S1.创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;S1. Creating an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
S2.采集受监控区域边界的微扰数据;S2. collecting perturbation data of the boundary of the monitored area;
S3.量化微扰数据得到量化振幅,对比量化振幅和入侵数据特征,确定受监控区域是否被入侵,当受监控区域没被入侵时返回S2,当受监控区域被入侵时进一步确定对应的入侵事件类型;S3. Quantify the perturbation data to obtain the quantized amplitude, compare the quantized amplitude and the intrusion data characteristics, determine whether the monitored area is invaded, return to S2 when the monitored area is not invaded, and further determine the corresponding intrusion event when the monitored area is invaded. Types of;
S4.根据微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度;S4. analyzing the intruder's intrusion information according to the perturbative data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
S5.根据入侵事件类型和入侵信息确定处理方案。S5. Determine a processing scheme according to the type of the intrusion event and the intrusion information.
本发明提供一种大范围周边安全监控方法,预先创建入侵特征库,采集微扰数据并得到量化振幅后,与入侵特征库内的入侵数据特征对比,便可确定受监控区域是否被入侵以及确定对应的入侵事件类型;进一步,再通过微扰数据分析出入侵者数量、移动轨迹和移动速度等入侵信息,并结合入侵事 件类型和入侵信息确定处理方案。入侵者在行进的过程中会产生震动信号,实时监测受监控区域边界,就能在被入侵时采集到震动信号所带来的微扰数据。通过上述方法获取并分析微扰数据,仅需要采集微扰数据并进行处理便可确定受监控区域是否遭到入侵、入侵事件类型和入侵信息,从而保证受监控区域的安全,具有准确率高、监控效果好和运维成本低等优点,特别适用于边境线等大范围的安全监控。The invention provides a large-scale perimeter security monitoring method, pre-creates an intrusion feature database, collects the perturbation data and obtains the quantized amplitude, and compares with the intrusion data features in the intrusion feature database to determine whether the monitored area is invaded and determined. Corresponding types of intrusion events; further, through the perturbation data, the intrusion information such as the number of intruders, the movement trajectory and the moving speed are analyzed, and the intrusion is combined. The piece type and intrusion information determine the processing scheme. The intruder generates a vibration signal during the traveling process, and monitors the boundary of the monitored area in real time, so that the perturbation data brought by the vibration signal can be collected when the invading. By acquiring and analyzing the perturbation data by the above method, only the perturbation data needs to be collected and processed to determine whether the monitored area is intruded, the type of intrusion event, and the intrusion information, thereby ensuring the security of the monitored area, and having high accuracy. The advantages of good monitoring effect and low operation and maintenance cost are especially applicable to a wide range of safety monitoring such as border lines.
进一步的,创建入侵特征库具体包括:Further, creating an intrusion feature library specifically includes:
S101.预设入侵事件类型表,所述入侵事件类型表包括一个以上入侵事件类型;S101. A preset intrusion event type table, where the intrusion event type table includes one or more intrusion event types;
S102.根据入侵事件类型表预设对应的入侵数据特征表,所述入侵数据特征表包括与各个入侵事件类型对应的入侵数据特征;S102. Presetting a corresponding intrusion data feature table according to the intrusion event type table, where the intrusion data feature table includes intrusion data features corresponding to each intrusion event type;
S103.搭建入侵事件类型表和入侵数据特征表之间的映射关系,各个入侵事件类型匹配相应的入侵数据特征。S103. Establish a mapping relationship between the intrusion event type table and the intrusion data feature table, and each intrusion event type matches the corresponding intrusion data feature.
上述实施例中,通过预设入侵事件类型表和入侵数据特征表并搭建入侵事件类型表和入侵数据特征表之间的映射关系,在后续采集到微扰数据并判定受监控区域是否被入侵之后,通过入侵事件类型表和入侵数据特征表之间的映射关系便可判定入侵事件类型。In the foregoing embodiment, after the intrusion event type table and the intrusion data feature table are preset and the mapping relationship between the intrusion event type table and the intrusion data feature table is established, after the subsequent acquisition of the perturbation data and determining whether the monitored area is invaded The type of intrusion event can be determined by the mapping relationship between the intrusion event type table and the intrusion data feature table.
第二方面,本发明提供了一种大范围周边安全监控系统,该装置包括:In a second aspect, the present invention provides a wide range of perimeter security monitoring systems, the apparatus comprising:
监控感应带,用于采集受监控区域边界的微扰数据,所述监控感应带与受监控区域的边界平行,所述监控感应带包括多个震动传感节点;Monitoring a sensing strip for collecting perturbation data at a boundary of the monitored area, the monitoring sensing strip being parallel to a boundary of the monitored area, the monitoring sensing strip comprising a plurality of vibration sensing nodes;
监控中心,用于数据处理和控制,所述监控中心包括:Monitoring center for data processing and control, the monitoring center includes:
入侵特征库创建模块,用于创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;An intrusion feature library creation module, configured to create an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
量化分析模块,用于量化微扰数据得到量化振幅,对比量化振幅和入侵数据特征,确定受监控区域是否被入侵以及当受监控区域被入侵时进一步确定对应的入侵事件类型;a quantization analysis module for quantizing the perturbation data to obtain a quantized amplitude, comparing the quantized amplitude and the intrusion data characteristics, determining whether the monitored area is invaded, and further determining a corresponding intrusion event type when the monitored area is invaded;
入侵信息分析模块,用于根据微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度;An intrusion information analysis module, configured to analyze intruder intrusion information according to the perturbative data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
方案确定模块,用于根据入侵事件类型和入侵信息确定处理方案。The solution determining module is configured to determine a processing plan according to the type of the intrusion event and the intrusion information.
本发明提供一种大范围周边安全监控系统,监控感应带作为系统的前端进行数据采集;监控中心作为系统的后端进行数据处理和控制。在大范围周边安全监控的过程中,所述监控感应带设置在受监控区域边界,所述监控感应带包括多个震动传感节点。数据处理的过程为:监控感应带采集微扰数据,上送到监控中心进行数据分析处理,确定入侵事件类型和入侵信息,并根据入侵事件类型和入侵信息确定处理方案。通过上述系统获取并分析微扰数据,便可确定受监控区域是否遭到入侵、入侵事件类型和入侵信息,从而保证受 监控区域的安全,具有准确率高、监控效果好和运维成本低等优点,实现大范围周边安全监控功能。The invention provides a wide-range perimeter security monitoring system, and the monitoring induction belt is used as the front end of the system for data collection; the monitoring center is used as the back end of the system for data processing and control. During a wide range of perimeter security monitoring, the monitoring sensing strip is disposed at a boundary of the monitored area, and the monitoring sensing strip includes a plurality of vibration sensing nodes. The process of data processing is: monitoring the inductive band to collect the perturbative data, sending it to the monitoring center for data analysis and processing, determining the type of intrusion event and intrusion information, and determining the processing plan according to the type of intrusion event and the intrusion information. By acquiring and analyzing the perturbation data through the above system, it is possible to determine whether the monitored area is intruded, the type of intrusion event, and the intrusion information, thereby ensuring The security of the monitoring area has the advantages of high accuracy, good monitoring effect and low operation and maintenance cost, and realizes a wide range of perimeter security monitoring functions.
进一步的,监控感应带包括多个震动传感节点,通过震动传感节点采集受监控区域边界的微扰数据,微扰数据通过融合网关接入监控中心;Further, the monitoring sensing strip includes a plurality of vibration sensing nodes, and the perturbation data of the boundary of the monitored area is collected by the vibration sensing node, and the perturbation data is accessed by the fusion gateway to the monitoring center;
所述融合网关用于汇集接收到的微扰数据,并在进行协议转换后把微扰数据转发给监控中心;The converged gateway is configured to collect the received perturbation data, and forward the perturbed data to the monitoring center after performing protocol conversion;
所述震动传感节点包括FFD设备和RFD设备,所述FFD设备具有数据采集功能、数据发送功能和路由功能,所述RFD设备具有数据采集功能和数据发送功能,所述RFD设备围绕FFD设备组成传感网络,所述FFD设备和RFD设备之间通过ZigBee协议组网;The vibration sensing node includes an FFD device and a RFD device, the FFD device has a data collection function, a data transmission function, and a routing function, the RFD device has a data collection function and a data transmission function, and the RFD device is composed of an FFD device. a sensing network, the FFD device and the RFD device are connected through a ZigBee protocol;
所述RFD设备采集微扰数据后,把微扰数据发送到FFD设备,FFD设备再把微扰数据通过融合网关接入监控中心,其中,FFD设备通过有线或者无线的方式与融合网关相连;After collecting the perturbation data, the RFD device sends the perturbation data to the FFD device, and the FFD device accesses the perturbation data to the monitoring center through the converged gateway, where the FFD device is connected to the converged gateway through a wired or wireless manner;
所述FFD设备采集微扰数据后,直接把微扰数据通过融合网关接入监控中心;After collecting the perturbation data, the FFD device directly accesses the perturbation data to the monitoring center through the converged gateway;
所述震动传感节点的工作状态包括休眠状态和唤醒状态,所述震动传感节点处于休眠状态时只进行数据采集,所述震动传感节点处于唤醒状态时同时进行数据采集和数据发送,处于休眠状态的震动传感节点采集到微扰数据后切换到唤醒状态。The working state of the vibration sensing node includes a sleep state and an awake state. When the vibration sensing node is in a sleep state, only data acquisition is performed, and when the vibration sensing node is in an awake state, data acquisition and data transmission are simultaneously performed. The sleep sensor node in the sleep state switches to the awake state after collecting the perturbation data.
上述实施例中,震动传感节点的组网形式对于能否进行全方位的数据采集至关重要,震动传感节点的组网要兼顾有效性和实用性。震动传感节点包括FFD设备和RFD设备,RFD设备围绕FFD设备组成传感网络,就可以提供多个数据上送路线,在最优上送路线发生故障时选择其它合适的路线,有利于缩短传输延时,提高通信可靠性。具体地,多个震动传感节点组成网状结构的传感网络,采集受监控区域边界的微扰数据,FFD设备之间相互连接,RFD设备也与其周围的多个FFD设备连接。当一个FFD设备无法上送数据时,RFD设备可通过其他FFD设备继续上送数据。另外,通过融合网关进行协议转换,连接监控感应带3和监控中心1,在物联网和传统互联网之间架设桥梁。In the above embodiments, the networking form of the vibration sensing node is essential for comprehensive data acquisition, and the networking of the vibration sensing node should be both effective and practical. The vibration sensing node includes an FFD device and an RFD device. The RFD device forms a sensing network around the FFD device, and can provide multiple data delivery routes, and select other suitable routes when the optimal delivery route fails, which is beneficial to shorten the transmission. Delay, improve communication reliability. Specifically, the plurality of vibration sensing nodes form a sensing network of a mesh structure, and the perturbation data of the boundary of the monitored area is collected, and the FFD devices are connected to each other, and the RFD device is also connected to a plurality of FFD devices around it. When an FFD device cannot send data, the RFD device can continue to send data through other FFD devices. In addition, protocol conversion is performed through the converged gateway, and the monitoring sensor band 3 and the monitoring center 1 are connected to bridge the Internet of Things and the traditional Internet.
附图说明DRAWINGS
图1为本发明一种大范围周边安全监控系统的架构图;1 is a structural diagram of a wide-area perimeter security monitoring system according to the present invention;
图2为本发明一种大范围周边安全监控系统的交互示意图;2 is a schematic diagram of interaction of a wide-area perimeter security monitoring system according to the present invention;
图3为本发明对监控感应带进行响应校准的交互示意图;3 is a schematic diagram of interaction of a response calibration of a monitoring sensing belt according to the present invention;
图4为本发明一种大范围周边安全监控方法的流程示意图;4 is a schematic flow chart of a wide-range perimeter security monitoring method according to the present invention;
图5为本发明对监控感应带进行响应校准的流程示意图;FIG. 5 is a schematic flowchart of response calibration of a monitoring induction belt according to the present invention; FIG.
图6为本发明确定受监控区域是否被入侵以及确定对应的入侵事件类型 的流程示意图;FIG. 6 is a diagram of the present invention for determining whether a monitored area is intruded and determining a corresponding type of intrusion event Schematic diagram of the process;
图7为本发明分析入侵者的入侵信息的流程示意图;7 is a schematic flowchart of analyzing intruder intrusion information according to the present invention;
图8为本发明确定处理方案的流程示意图。FIG. 8 is a schematic flow chart of determining a processing scheme according to the present invention.
具体实施方式Detailed ways
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、接口、技术之类的具体细节,以便透切理解本发明。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本发明。在其它情况中,省略对众所周知的系统、电路以及方法的详细说明,以免不必要的细节妨碍本发明的描述。In the following description, for purposes of illustration and description However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the invention.
如图1所示,图1为本发明一种大范围周边安全监控系统的架构图。一种大范围周边安全监控系统,包括:As shown in FIG. 1, FIG. 1 is a structural diagram of a wide-area perimeter security monitoring system according to the present invention. A wide range of perimeter security monitoring systems, including:
监控感应带3,用于采集受监控区域边界的微扰数据;Monitoring the sensing strip 3 for collecting perturbative data at the boundary of the monitored area;
监控中心1,用于数据处理和控制; Monitoring Center 1, for data processing and control;
监控感应带3通过融合网关2和监控中心1连接。The monitoring sensor strip 3 is connected to the monitoring center 1 through the converged gateway 2.
监控感应带3作为系统的前端,用于进行数据采集。在大范围周边安全监控的过程中,所述监控感应带3设置在受监控区域边界,所述监控感应带3包括多个震动传感节点。融合网关2的作用在于汇集接收到的微扰数据,并把微扰数据转发给监控中心1。监控中心1作为系统的后端,则是整个系统的核心,用于进行数据处理和控制。The sensing strip 3 is used as the front end of the system for data acquisition. In the process of extensive perimeter security monitoring, the monitoring sensing strip 3 is disposed at the boundary of the monitored area, and the monitoring sensing strip 3 includes a plurality of vibration sensing nodes. The function of the converged gateway 2 is to collect the received perturbation data and forward the perturbed data to the monitoring center 1. As the back end of the system, Monitoring Center 1 is the core of the entire system for data processing and control.
监控感应带3包括多个震动传感节点,通过震动传感节点采集受监控区域边界的微扰数据,微扰数据通过融合网关2接入监控中心1;The monitoring sensing strip 3 includes a plurality of vibration sensing nodes, and the perturbation data of the boundary of the monitored area is collected by the vibration sensing node, and the perturbation data is accessed to the monitoring center 1 through the converged gateway 2;
从物联网的角度分析,监控感应带3、融合网关2和监控中心1一起构成物联网的三层架构。其中,监控感应带3作为数据采集设备被设置在物联网最前端,监控感应带3的数据采集功能主要通过震动传感节点来实现,多个震动传感节点尽可能全面地覆盖于受监控区域边界,确保没有遗漏任何区域,这就要求震动传感节点的数量越多越好。但是,另一方面,数量庞大的震动传感节点所采集的数据量同样也很大,如果震动传感节点上送的数据结构复杂,将会给监控中心1的数据处理带来很大压力,这就要求震动传感节点的数据结构越简单越好。传统互联网协议要求数据具有精确性和安全性,这些特点在物联网领域可以忽略,物联网更关注采样的样本数,在本实施例中即表现为震动传感节点的数量以及是否覆盖了全区域。在本发明中,监控感应带3只需要不断地采集和发送微扰数据,通过传统互联网协议来实现这样的功能太过低效,因此,作为系统前端的监控感应带3可采用其他组网协议,简化震动传感节点的数据结构。震动传感节点的数据仅需要包含地址码和感应数据,其中,地址码记载了震动传感节点的位置;感应数据则是微扰 数据。物联网的前端设备数量庞大,考虑到数据的开销和效率,震动传感节点仅携带对本系统最有用的信息,便于大规模实现。From the perspective of the Internet of Things, the monitoring sensor strip 3, the converged gateway 2 and the monitoring center 1 together constitute a three-tier architecture of the Internet of Things. The monitoring sensing strip 3 is set as the data collecting device at the forefront of the Internet of Things. The data collecting function of the monitoring sensing strip 3 is mainly realized by the vibration sensing node, and the plurality of vibration sensing nodes cover the monitored area as completely as possible. The boundary ensures that no areas are missed, which requires the number of vibration sensing nodes to be as high as possible. However, on the other hand, the amount of data collected by a large number of vibration sensing nodes is also very large. If the data structure sent by the vibration sensing node is complicated, it will bring great pressure to the data processing of the monitoring center 1. This requires the data structure of the vibration sensing node to be as simple as possible. Traditional Internet protocols require data to be accurate and secure. These features are negligible in the Internet of Things. The Internet of Things is more concerned with the number of samples sampled. In this embodiment, it is represented by the number of vibration sensing nodes and whether it covers the entire area. . In the present invention, the monitoring sensing band 3 only needs to continuously collect and transmit the perturbative data, and the implementation of such a function by the traditional Internet protocol is too inefficient. Therefore, the monitoring sensing band 3 as the front end of the system can adopt other networking protocols. Simplify the data structure of the vibration sensing node. The data of the vibration sensing node only needs to include the address code and the sensing data, wherein the address code records the position of the vibration sensing node; the sensing data is the perturbation data. The number of front-end devices of the Internet of Things is huge. Considering the overhead and efficiency of data, the vibration sensing node only carries the most useful information for the system, which is convenient for large-scale implementation.
虽然监控感应带3中的震动传感节点不适用于传统的互联网协议,但是现今的物联网在不同程度上还是要基于传统互联网。在本发明中,融合网关2和监控中心1之间仍然遵循传统的互联网协议。融合网关2提供传统互联网的数据传输和网关功能,即进行协议转换,对接监控感应带3的组网协议与传统互联网的组网协议。Although the vibration sensing nodes in the monitoring sensor strip 3 are not suitable for the conventional Internet protocol, today's Internet of Things is still based on the traditional Internet to varying degrees. In the present invention, the traditional Internet protocol is still followed between the converged gateway 2 and the monitoring center 1. The converged gateway 2 provides the data transmission and gateway functions of the traditional Internet, that is, performs protocol conversion, and connects the networking protocol of the monitoring sensing band 3 with the networking protocol of the traditional Internet.
如图1所示,最左端的虚线为受监控区域边界,虚线的右边为受监控区域,用于采集数据的前端包括设置在受监控区域内的三个并排的监控感应带3。实际上,在应用的过程中,监控感应带3可以设置有多个,多个监控感应带3内的多个震动传感节点组成传感网络。一旦有入侵者,传感网络就会采集到微扰数据。监控中心1依次通过入侵特征库创建模块11、量化分析模块12、入侵信息分析模块13和方案确定模块14分析处理微扰数据,实现大范围周边安全监控的功能,具体过程如图2所示。As shown in FIG. 1, the leftmost dotted line is the monitored area boundary, the right side of the dotted line is the monitored area, and the front end for collecting data includes three side-by-side monitoring sensing strips 3 disposed in the monitored area. In fact, in the process of application, the monitoring sensing strips 3 may be provided in plurality, and a plurality of vibration sensing nodes in the plurality of monitoring sensing strips 3 constitute a sensing network. Once there is an intruder, the sensor network collects the perturbation data. The monitoring center 1 sequentially analyzes and processes the perturbation data through the intrusion signature database creation module 11, the quantization analysis module 12, the intrusion information analysis module 13, and the scheme determination module 14, and implements a large-scale peripheral security monitoring function. The specific process is shown in FIG. 2 .
图2为本发明一种大范围周边安全监控系统的交互示意图。所述监控中心1包括:2 is a schematic diagram of interaction of a wide-area perimeter security monitoring system according to the present invention. The monitoring center 1 includes:
入侵特征库创建模块11,用于创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;The intrusion feature library creation module 11 is configured to create an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
量化分析模块12,用于量化微扰数据得到量化振幅,对比量化振幅和入侵数据特征,确定受监控区域是否被入侵以及当受监控区域被入侵时进一步确定对应的入侵事件类型;The quantization analysis module 12 is configured to quantize the perturbation data to obtain a quantized amplitude, compare the quantized amplitude and the intrusion data feature, determine whether the monitored area is invaded, and further determine a corresponding intrusion event type when the monitored area is invaded;
入侵信息分析模块13,用于根据微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度;The intrusion information analysis module 13 is configured to analyze intruder intrusion information according to the perturbation data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
方案确定模块14,用于根据入侵事件类型和入侵信息确定处理方案。具体地,处理方案包括物资调度、人员调度、配置作战装备和发布警告等等。The solution determining module 14 is configured to determine a processing scheme according to the type of the intrusion event and the intrusion information. Specifically, the processing scheme includes material scheduling, personnel scheduling, configuration of combat equipment, and release of warnings, and the like.
先通过入侵特征库创建模块11创建入侵特征库作为判断受监控区域是否被入侵以及对应的入侵事件类型的标准。监控感应带3采集微扰数据后,再通过量化分析模块12对微扰数据进行量化处理,得到量化振幅,进一步对比量化振幅和入侵数据特征,就可以确定受监控区域是否被入侵以及确定对应的入侵事件类型。入侵信息分析模块13则通过微扰数据分析入侵者的入侵者数量、移动轨迹和移动速度等入侵信息。最后,方案确定模块14根据入侵事件类型和入侵信息一并确定处理方案,完成基本的安全监控过程,适用于边境线等大范围的安全监控。The intrusion signature database is first created by the intrusion signature database creation module 11 as a criterion for determining whether the monitored region is intruded and the corresponding intrusion event type. After the monitoring sensor strip 3 collects the perturbation data, the quantization data is quantized by the quantization analysis module 12 to obtain the quantized amplitude, and the quantized amplitude and the intrusion data feature are further compared to determine whether the monitored area is invaded and the corresponding is determined. The type of intrusion event. The intrusion information analysis module 13 analyzes the intruder information such as the number of intruders, the moving track, and the moving speed through the perturbative data. Finally, the solution determining module 14 determines the processing plan according to the type of the intrusion event and the intrusion information, completes the basic security monitoring process, and is applicable to a wide range of security monitoring such as border lines.
如图4所示,图4为本发明一种大范围周边安全监控方法的流程示意图。与一种大范围周边安全监控系统对应的一种大范围周边安全监控方法,具体包括: As shown in FIG. 4, FIG. 4 is a schematic flowchart of a wide-range peripheral security monitoring method according to the present invention. A large-scale perimeter security monitoring method corresponding to a large-scale perimeter security monitoring system, specifically comprising:
S1.预先在监控中心1内创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;S1. Creating an intrusion feature database in the monitoring center 1 in advance, where the intrusion feature database includes an intrusion event type and an intrusion data feature;
S2.通过监控感应带3实时采集受监控区域边界的微扰数据;S2. collecting the perturbation data of the boundary of the monitored area in real time by monitoring the sensing strip 3;
S3.监控中心1在收到监控感应带3上送的微扰数据后对微扰数据进行量化处理,量化微扰数据得到量化振幅,对比量化振幅和入侵数据特征,确定受监控区域是否被入侵,当受监控区域没被入侵时返回S2,当受监控区域被入侵时进一步确定对应的入侵事件类型;S3. The monitoring center 1 quantizes the perturbative data after receiving the perturbation data sent by the monitoring sensing strip 3, quantizes the perturbative data to obtain the quantized amplitude, compares the quantized amplitude and the intrusion data characteristics, and determines whether the monitored area is invaded. Returning to S2 when the monitored area is not invaded, and further determining the corresponding type of intrusion event when the monitored area is invaded;
S4.监控中心1根据微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度;S4. The monitoring center 1 analyzes the intruder's intrusion information according to the perturbative data, where the intrusion information includes the number of intruders, the moving track, and the moving speed;
S5.监控中心1根据入侵事件类型和入侵信息确定处理方案。S5. The monitoring center 1 determines a processing scheme according to the type of the intrusion event and the intrusion information.
传统的安全监控方法和系统主要通过监控摄像头时刻采集受监控区域的实时视频/图像数据,值守人员需要时刻注意多个显示屏上的视频/图像数据,留意异常情况;又或者,通过在受监控区域安装红外感应设备,当受监控区域被入侵时触发红外感应设备,进而发出警报。不管是上述那种方式,都存在成本高、浪费人力和效率低下等缺点:监控摄像头和红外感应设备需要的布置和运维需要大量成本;监控摄像头的作用仅仅在于采集受监控区域的实时视频/图像数据和把各处的实时情况汇集到监控室,仍需要值守人员需要时刻注意实时动向。The traditional security monitoring method and system mainly collect real-time video/image data of the monitored area by monitoring the camera at all times, and the attendant needs to pay attention to the video/image data on multiple displays at all times to pay attention to abnormal situations; or, by being monitored The area is equipped with an infrared sensing device that triggers an infrared sensing device when the monitored area is invaded, and then issues an alarm. Regardless of the above methods, there are disadvantages such as high cost, waste of manpower and inefficiency: the layout and operation and maintenance required for surveillance cameras and infrared sensing devices require a lot of cost; the role of the surveillance camera is only to collect real-time video of the monitored area/ Image data and real-time situations are gathered into the monitoring room, and still need to be on duty to keep an eye on real-time trends.
与传统的依赖于视频采集和红外感应报警等前端设备的监控方法不同,本发明的前端设备仅需要具备简单的数据采集和发送功能;监控功能的实现主要依赖于后端设备,后端设备接受前端设备所采集的数据并进行分析,及时发现入侵,不需要传统的人工值守和人工判断,具有准确率高、监控效果好和运维成本低等优点,特别适用于边境线等大范围的安全监控。Unlike traditional monitoring methods that rely on front-end equipment such as video capture and infrared-sensing alarms, the front-end equipment of the present invention only needs to have simple data acquisition and transmission functions; the implementation of the monitoring function mainly depends on the back-end equipment, and the back-end equipment accepts The data collected by the front-end equipment is analyzed and discovered in time. It does not require traditional manual guards and manual judgments. It has the advantages of high accuracy, good monitoring effect and low operation and maintenance cost, and is especially suitable for a wide range of security such as border lines. monitor.
在S1中,创建入侵特征库具体包括:In S1, creating an intrusion feature library specifically includes:
S101.预设入侵事件类型表,所述入侵事件类型表包括一个以上入侵事件类型;S101. A preset intrusion event type table, where the intrusion event type table includes one or more intrusion event types;
S102.根据入侵事件类型表预设对应的入侵数据特征表,所述入侵数据特征表包括与各个入侵事件类型对应的入侵数据特征;S102. Presetting a corresponding intrusion data feature table according to the intrusion event type table, where the intrusion data feature table includes intrusion data features corresponding to each intrusion event type;
S103.搭建入侵事件类型表和入侵数据特征表之间的映射关系,各个入侵事件类型匹配相应的入侵数据特征。S103. Establish a mapping relationship between the intrusion event type table and the intrusion data feature table, and each intrusion event type matches the corresponding intrusion data feature.
上述实施例中,通过预设入侵事件类型表和入侵数据特征表并搭建入侵事件类型表和入侵数据特征表之间的映射关系,在后续采集到微扰数据并判定受监控区域是否被入侵之后,通过入侵事件类型表和入侵数据特征表之间的映射关系便可判定入侵事件类型。In the foregoing embodiment, after the intrusion event type table and the intrusion data feature table are preset and the mapping relationship between the intrusion event type table and the intrusion data feature table is established, after the subsequent acquisition of the perturbation data and determining whether the monitored area is invaded The type of intrusion event can be determined by the mapping relationship between the intrusion event type table and the intrusion data feature table.
单个震动传感节点所采集微扰数据过于片面,不具备参考价值,因此,单个震动传感节点在监控的过程中所实现的作用相当有限。多个监控感应带 3内的震动传感节点以传感网络的形式采集微扰数据,才能保证前端数据的有效性。The perturbation data collected by a single vibration sensing node is too one-sided and has no reference value. Therefore, the effect achieved by a single vibration sensing node in the monitoring process is quite limited. Multiple monitoring sensors The vibration sensing node in 3 collects the perturbation data in the form of a sensing network to ensure the validity of the front-end data.
所述S2中,具体包括:The S2 specifically includes:
以传感网络的形式采集受监控区域边界的微扰数据;Collecting perturbation data at the boundary of the monitored area in the form of a sensor network;
当单个震动传感节点采集到微扰数据时,监控中心1判定此微扰数据为异常信号;When a single vibration sensing node collects the perturbative data, the monitoring center 1 determines that the perturbation data is an abnormal signal;
控制邻近的震动传感节点工作,采集受监控区域边界的微扰数据,邻近的震动传感节点把各自的微扰数据发送到监控中心1;Control the adjacent vibration sensing node to work, collect the perturbation data of the boundary of the monitored area, and the adjacent vibration sensing nodes send the respective perturbation data to the monitoring center 1;
监控中心1进行异常验证,所述异常验证过程为对比邻近震动传感节点的微扰数据和上述异常信号;The monitoring center 1 performs abnormality verification, and the abnormality verification process is to compare the perturbation data of the adjacent vibration sensing node with the abnormal signal;
当邻近的震动传感节点所采集的微扰数据与异常信号匹配时,判断单个震动传感节点采集到微扰数据有效,当邻近的震动传感节点所采集的微扰数据与异常信号不匹配时,判断单个震动传感节点采集到微扰数据无效。When the perturbation data collected by the adjacent vibration sensing node matches the abnormal signal, it is determined that the perturbation data collected by the single vibration sensing node is effective, and the perturbation data collected by the adjacent vibration sensing node does not match the abnormal signal. At the same time, it is judged that the perturbation data collected by the single vibration sensing node is invalid.
对应地,在一种大范围周边安全监控系统中,监控感应带3以传感网络的形式采集受监控区域边界的微扰数据并上送到监控中心1,监控中心1判定此微扰数据为异常信号,并控制邻近的震动传感节点工作,采集受监控区域边界的微扰数据,监控中心1通过对比邻近震动传感节点各自的微扰数据和异常信号进行异常验证。Correspondingly, in a large-scale peripheral security monitoring system, the monitoring sensing belt 3 collects the perturbation data of the boundary of the monitored area in the form of a sensing network and sends it to the monitoring center 1, and the monitoring center 1 determines that the perturbative data is The abnormal signal, and control the adjacent vibration sensing node to work, collect the perturbation data of the boundary of the monitored area, and the monitoring center 1 performs abnormality verification by comparing the perturbation data and the abnormal signal of the adjacent vibration sensing nodes.
当受监控区域被入侵时,传感网络中应有多个震动传感节点采集到相匹配的微扰数据。上述匹配具体是指邻近震动传感节点各自的微扰数据和异常信号相同。邻近震动传感节点各自的微扰数据和异常信号相同,排除了采集到微扰数据的单个震动传感节点出现故障。以传感网络的形式采集受监控区域边界的微扰数据,提高了前端采集数据的有效性。When the monitored area is invaded, there should be multiple seismic sensing nodes in the sensing network to collect matching perturbation data. The above matching specifically means that the perturbation data and the abnormal signal of the adjacent vibration sensing nodes are the same. The perturbation data and the abnormal signal of the adjacent vibration sensing nodes are the same, and the single vibration sensing node that collects the perturbative data is excluded from failure. The perturbation data of the boundary of the monitored area is collected in the form of a sensing network, which improves the effectiveness of the data collected by the front end.
单纯地通过监控感应带3内的震动传感节点组成传感网络进行数据采集,实时监控受监控区域的边界,会存在响应不一致的问题,从而影响到微扰数据的采集精度,后端的监控中心1无法对微扰数据进行准确的分析处理,导致在判断受监控区域是否遭到入侵、入侵事件类型和入侵信息的过程中出现偏差,严重影响监控效果。为了解决上述问题,本发明通过软校准的方式使得监控感应带3对震动信号输出稳定的响应输出数据,所述软校准的过程为通过标定调整参数对微扰数据进行校准转换。Simply by monitoring the vibration sensing nodes in the sensing strip 3 to form a sensing network for data acquisition, real-time monitoring of the boundary of the monitored area, there will be problems of inconsistent response, thereby affecting the accuracy of the acquisition of the perturbative data, the monitoring center of the back end 1 The accurate analysis and processing of the perturbation data cannot be performed, which causes deviations in the process of judging whether the monitored area is invaded, the type of intrusion event and the intrusion information, which seriously affects the monitoring effect. In order to solve the above problem, the present invention enables the monitoring inductive strip 3 to output a stable response output data to the shock signal by means of soft calibration. The soft calibration process is to perform calibration conversion on the perturbation data by the calibration adjustment parameter.
如图3所示,图3为本发明对监控感应带3进行响应校准的交互示意图。一种大范围周边安全监控系统,包括:As shown in FIG. 3, FIG. 3 is an interaction diagram of response monitoring of the monitoring sensor strip 3 according to the present invention. A wide range of perimeter security monitoring systems, including:
监控感应带3,所述监控感应带3设置有多个,所述监控感应带3沿受监控区域的边界设置,所述监控感应带3之间相互平行;Monitoring the sensing strip 3, the monitoring sensing strips 3 are provided in plurality, the monitoring sensing strips 3 are arranged along the boundary of the monitored area, and the monitoring sensing strips 3 are parallel to each other;
校准测试带,所述校准测试带设置在监控感应带3旁边,所述校准测试带与监控感应带3平行; Calibrating a test strip disposed adjacent to the monitor strip 3, the calibration strip being parallel to the monitor strip 3;
人工扰动点,用于沿着校准测试带移动并产生震动信号,各个监控感应带3采集微扰数据;a manual disturbance point for moving along the calibration test strip and generating a vibration signal, and each monitoring sensing strip 3 collecting the perturbation data;
所述监控中心1包括:The monitoring center 1 includes:
响应输出模块15,用于把微扰数据转化为响应输出数据;a response output module 15 for converting the perturbative data into response output data;
标定参数模块16,用于比较人工扰动点处于不同位置时对应的响应输出数据,得到标定调整参数;The calibration parameter module 16 is configured to compare corresponding response output data when the artificial disturbance point is in different positions, and obtain calibration adjustment parameters;
校准模块17,用于根据标定调整参数对监控感应带3进行软校准,使得监控感应带3对震动信号输出稳定的响应输出数据,所述软校准的过程为通过标定调整参数对微扰数据进行校准转换。The calibration module 17 is configured to perform soft calibration on the monitoring sensing strip 3 according to the calibration adjustment parameter, so that the monitoring sensing strip 3 outputs a stable response output data to the vibration signal. The soft calibration process is to perform the perturbation data through the calibration adjustment parameter. Calibration conversion.
对应的,如图5所示,图5为本发明对监控感应带3进行响应校准的流程示意图。所述S2中,沿受监控区域的边界布置多个相互平行的监控感应带3,通过监控感应带3采集微扰数据,所述监控感应带3与受监控区域的边界平行,所述监控感应带3包括多个震动传感节点;Correspondingly, as shown in FIG. 5, FIG. 5 is a schematic flowchart of response calibration of the monitoring sensor strip 3 according to the present invention. In the S2, a plurality of mutually parallel monitoring sensing strips 3 are arranged along the boundary of the monitored area, and the perturbation data is collected by the monitoring sensing strip 3, the monitoring sensing strip 3 is parallel to the boundary of the monitored area, and the monitoring sensing The belt 3 includes a plurality of vibration sensing nodes;
沿受监控区域的边界布置监控感应带3的过程中,需要对监控感应带3进行响应校准,所述响应校准具体包括:In the process of arranging the monitoring sensor strip 3 along the boundary of the monitored area, the monitoring sensing strip 3 needs to be responsively calibrated, and the response calibration specifically includes:
S201.在监控感应带3旁边布置校准测试带,所述校准测试带与监控感应带3平行;S201. Arranging a calibration test strip next to the monitoring sensing strip 3, the calibration test strip being parallel to the monitoring sensing strip 3;
S202.设置人工扰动点,控制人工扰动点沿着校准测试带移动并产生震动信号,各个监控感应带3采集震动信号所产生的微扰数据;S202. setting a manual disturbance point, controlling the artificial disturbance point to move along the calibration test belt and generating a vibration signal, and each monitoring induction belt 3 collects the perturbation data generated by the vibration signal;
S203.通过标定参数模块16响应输出模块15把微扰数据转化为响应输出数据具体地,所述响应输出数据包括震动信号的时域特征和频域特征;S203. Converting the perturbation data into response output data by the calibration parameter module 16 in response to the output module 15, specifically, the response output data includes a time domain characteristic and a frequency domain characteristic of the vibration signal;
S204.通过比较人工扰动点处于不同位置时对应的响应输出数据,得到标定调整参数;S204. obtaining a calibration adjustment parameter by comparing corresponding response output data when the artificial disturbance point is at different positions;
S205.通过校准模块17根据标定调整参数对监控感应带3进行软校准。S205. Perform soft calibration of the monitoring sensor strip 3 by the calibration module 17 according to the calibration adjustment parameter.
举例说明软校准的具体原理:控制人工扰动点沿着校准测试带移动并产生震动信号,在这个过程中,监控感应带3中的三个震动传感节点先后采集震动信号所产生的微扰数据。在人工扰动点距离三个震动传感节点相同距离时,三个震动传感节点先后采集到微扰数据,响应输出模块15再把微扰数据转化为响应输出数据。理想状态下,三个震动传感节点对应的响应输出数据应为标准响应输出数据。由于不同的震动传感节点在传感网络中会受到各种因素影响,产生的响应输出区别较大,如三个震动传感节点对应的响应输出数据与标准响应输出数据的比值分别为1.2、1.5和0.8,而理想状态下三个震动传感节点对应的响应输出数据与标准响应输出数据的比值应为1,因此,三个震动传感节点对应标定调整参数分别为1.2、1.5和0.8。通过校准模块17根据标定调整参数对监控感应带3进行软校准的过程为对应的为把各自的响应输出数据分别除以1.2、1.5和0.8,从而使得三个震动传感节点 在监测到相同入侵时监控中心1所接收到的响应输出数据相同,去除传感网络节点不能实现一致性的问题。An example is given to the specific principle of soft calibration: controlling the artificial disturbance point to move along the calibration test belt and generating a vibration signal. In this process, the three vibration sensing nodes in the monitoring induction belt 3 successively collect the perturbative data generated by the vibration signal. . When the artificial disturbance point is the same distance from the three vibration sensing nodes, the three vibration sensing nodes sequentially collect the perturbation data, and the response output module 15 converts the perturbation data into the response output data. Ideally, the response output data corresponding to the three vibration sensing nodes should be the standard response output data. Since different vibration sensing nodes are affected by various factors in the sensing network, the response output generated is quite different. For example, the ratio of the response output data corresponding to the three vibration sensing nodes to the standard response output data is 1.2. 1.5 and 0.8, and the ratio of the response output data corresponding to the three response sensor nodes to the standard response output data should be 1 in the ideal state. Therefore, the calibration adjustment parameters of the three vibration sensing nodes are 1.2, 1.5, and 0.8, respectively. The process of soft calibration of the monitoring sensor strip 3 according to the calibration adjustment parameter by the calibration module 17 is corresponding to dividing the respective response output data by 1.2, 1.5, and 0.8, respectively, thereby causing three vibration sensing nodes. When the same intrusion is detected, the response output data received by the monitoring center 1 is the same, and the problem that the sensor network node cannot achieve consistency is removed.
需要说明的是,在大范围周边如国境边界线上,受监控区域的边界多为曲线。所述监控感应带3与受监控区域的边界平行、所述监控感应带3之间相互平行、所述校准测试带与监控感应带3平行。上述平行,指的是每处切线平行。在本发明中,前端设置为监控感应带3且监控感应带3与受监控区域的边界平行的目的是布置一个能够均匀采集信号的传感网络;而校准测试带与监控感应带3平行的目的在于使得在人工扰动点移动的过程中,保证人工扰动点在不同时间点上能够与各个震动传感节点的距离相同。It should be noted that on a large-scale periphery such as a borderline of a country, the boundary of the monitored area is mostly a curve. The monitoring sensing strip 3 is parallel to the boundary of the monitored area, the monitoring sensing strips 3 are parallel to each other, and the calibration test strip is parallel to the monitoring sensing strip 3. The above parallel means that each tangent is parallel. In the present invention, the front end is arranged to monitor the sensing strip 3 and the purpose of monitoring the sensing strip 3 parallel to the boundary of the monitored area is to arrange a sensing network capable of uniformly collecting signals; and the purpose of calibrating the test strip parallel to the monitoring sensing strip 3 In the process of moving the artificial disturbance point, it is ensured that the artificial disturbance point can be the same distance from each vibration sensing node at different time points.
为了确定受监控区域是否被入侵以及确定对应的入侵事件类型,所述入侵事件类型包括人员入侵和车辆入侵,量化分析模块12包括:In order to determine whether the monitored area is intruded and determine the corresponding type of intrusion event, the type of intrusion event includes personnel intrusion and vehicle intrusion, and the quantitative analysis module 12 includes:
阈值获取单元,用于获取入侵判定阈值和入侵类型判定阈值,所述入侵判定阈值用于判定受监控区域是否被入侵,所述入侵类型判定阈值用于判定入侵事件类型;a threshold obtaining unit, configured to acquire an intrusion determination threshold and an intrusion type determination threshold, where the intrusion determination threshold is used to determine whether the monitored area is intruded, and the intrusion type determination threshold is used to determine an intrusion event type;
预处理单元,用于对所述微扰数据进行预处理,去除所述微扰数据中的噪声;a pre-processing unit, configured to pre-process the perturbation data to remove noise in the perturbation data;
量化单元,用于量化经过预处理后的微扰数据,得到微扰数据的量化振幅;a quantization unit, configured to quantize the pre-processed perturbation data to obtain a quantized amplitude of the perturbed data;
入侵判定单元,用于对比微扰数据的量化振幅与入侵判定阈值,当量化振幅小于入侵判定阈值时判定受监控区域安全,当量化振幅大于或等于入侵判定阈值时判定受监控区域被入侵;The intrusion determination unit is configured to compare the quantized amplitude of the perturbation data with the intrusion determination threshold, determine that the monitored area is safe when the quantized amplitude is smaller than the intrusion determination threshold, and determine that the monitored area is invaded when the quantized amplitude is greater than or equal to the intrusion determination threshold;
类型判定单元,用于当判定受监控区域被入侵后,对比微扰数据的量化振幅和入侵类型判定阈值,当量化振幅小于入侵类型判定阈值时判定为人员入侵,当量化振幅大于或等于入侵类型判定阈值时判定为车辆入侵。The type determining unit is configured to compare the quantized amplitude of the perturbation data and the intrusion type decision threshold after determining that the monitored area is invaded, and determine that the intrusion is when the quantized amplitude is smaller than the intrusion type determining threshold, and the quantized amplitude is greater than or equal to the intrusion type. When the threshold is determined, it is determined that the vehicle has entered the vehicle.
所述入侵数据特征包括入侵判定阈值和入侵类型判定阈值,预先通过阈值获取单元获取入侵判定阈值和入侵类型判定阈值,为数据处理做准备。受监控区域处于野外的大自然环境中,除了潜在入侵者外,受监控区域还有很多小动物或者其它噪声源,会刺激到监控感应带3产生微扰数据。因此,在采集的微扰数据后,需要通过预处理单元去除采集微扰数据过程中所引入的噪声,为后续的数据处理提供更准确的微扰数据。进一步,通过量化单元对微扰数据进行量化,得到的量化振幅,最后入侵判定单元通过对比量化振幅和入侵判定阈值判断受监控区域是否被入侵,类型判定单元通过对比量化振幅和入侵类型判定阈值判断是人员入侵还是车辆入侵。The intrusion data feature includes an intrusion determination threshold and an intrusion type determination threshold, and the intrusion determination threshold and the intrusion type determination threshold are acquired in advance by the threshold acquisition unit to prepare for data processing. In the natural environment in which the monitored area is in the wild, in addition to the potential intruders, there are many small animals or other noise sources in the monitored area, which will stimulate the monitoring sensor belt 3 to generate perturbative data. Therefore, after the acquired perturbation data, the noise introduced in the process of collecting the perturbative data needs to be removed by the pre-processing unit to provide more accurate perturbative data for subsequent data processing. Further, the quantized unit quantizes the perturbed data to obtain a quantized amplitude, and finally the intrusion determining unit determines whether the monitored area is invaded by comparing the quantized amplitude and the intrusion determination threshold, and the type determining unit judges by comparing the quantized amplitude and the intrusion type determining threshold. Is it a human invasion or a vehicle invasion?
具体地,比如入侵判定阈值为A、入侵类型判定阈值为B、量化振幅为C,其中A必须小于B。当C小于A时判定受监控区域没有被入侵,反之则判定受监控区域被入侵;在确定C不小于A时,进一步把C与B比较;当 C小于B时判断为人员入侵,反之则判断为车辆入侵。简单来说,就是通过A和B划分为三种情况,一是没有入侵,二是受到人员入侵,三是受到车辆入侵。当微扰数据的量化振幅比入侵判定阈值小时,则说明微扰数据可能为非入侵扰动源引入的,如生活在受监控区域的动物等,这些动物引入的微扰数据的特征与人的不同,表现在量化振幅比入侵者的量化振幅小,此时说明受监控区域未被入侵;当微扰数据的量化振幅比入侵判定阈值大或者等于入侵判定阈值大时,说明受监控区域被入侵。由于人员入侵所对应的量化振幅比车辆入侵所对应的量化振幅要小,所以,通过分析确定出入侵类型判定阈值可作为入侵类型判定的标准,判断过程同上。Specifically, for example, the intrusion determination threshold is A, the intrusion type decision threshold is B, and the quantization amplitude is C, where A must be smaller than B. When C is less than A, it is determined that the monitored area is not invaded, otherwise the monitored area is determined to be invaded; when it is determined that C is not less than A, C is further compared with B; When C is less than B, it is judged as a person intrusion, and vice versa, it is judged as a vehicle invasion To put it simply, it is divided into three cases by A and B. One is that there is no invasion, the other is the invasion of personnel, and the third is the invasion of vehicles. When the quantized amplitude of the perturbation data is smaller than the intrusion determination threshold, it indicates that the perturbation data may be introduced by a non-invasive disturbance source, such as animals living in the monitored area, and the characteristics of the perturbative data introduced by these animals are different from those of human beings. The quantized amplitude is smaller than the quantized amplitude of the intruder, indicating that the monitored area is not invaded; when the quantized amplitude of the perturbed data is larger than the intrusion determination threshold or equal to the intrusion determination threshold, the monitored area is invaded. Since the quantization amplitude corresponding to the personnel invasion is smaller than the quantization amplitude corresponding to the vehicle intrusion, it is determined by analysis that the intrusion type determination threshold can be used as the criterion for the intrusion type determination, and the determination process is the same as above.
对应地,确定受监控区域是否被入侵以及确定对应的入侵事件类型的过程如图6所示,图6为本发明确定受监控区域是否被入侵以及确定对应的入侵事件类型的流程示意图。所述入侵数据特征包括入侵判定阈值和入侵类型判定阈值,所述S3具体包括:Correspondingly, the process of determining whether the monitored area is invaded and determining the corresponding intrusion event type is as shown in FIG. 6. FIG. 6 is a schematic flowchart of determining whether the monitored area is intruded and determining the corresponding intrusion event type according to the present invention. The intrusion data feature includes an intrusion determination threshold and an intrusion type determination threshold, and the S3 specifically includes:
S301.获取入侵判定阈值和入侵类型判定阈值,所述入侵判定阈值用于判定受监控区域是否被入侵,所述入侵类型判定阈值用于判定入侵事件类型,所述入侵事件类型包括人员入侵和车辆入侵;S301. Acquire an intrusion determination threshold and an intrusion type determination threshold, where the intrusion determination threshold is used to determine whether the monitored area is intruded, and the intrusion type determination threshold is used to determine an intrusion event type, where the intrusion event type includes a personnel intrusion and a vehicle. Intrusion
S302.对所述微扰数据进行预处理,去除所述微扰数据中的噪声;S302. Perform pre-processing on the perturbation data to remove noise in the perturbation data;
S303.量化经过预处理后的微扰数据,得到微扰数据的量化振幅;S303. Quantizing the pre-processed perturbation data to obtain a quantized amplitude of the perturbed data;
S304.对比微扰数据的量化振幅与入侵判定阈值,当量化振幅小于入侵判定阈值时判定受监控区域安全,当量化振幅大于或等于入侵判定阈值时判定受监控区域被入侵;S304. Comparing the quantized amplitude of the perturbation data with the intrusion determination threshold, determining that the monitored area is safe when the quantized amplitude is smaller than the intrusion determination threshold, and determining that the monitored area is invaded when the quantized amplitude is greater than or equal to the intrusion determination threshold;
S305.当判定受监控区域被入侵后,对比微扰数据的量化振幅和入侵类型判定阈值,当量化振幅小于入侵类型判定阈值时判定为人员入侵,当量化振幅大于或等于入侵类型判定阈值时判定为车辆入侵。S305. When it is determined that the monitored area is invaded, comparing the quantized amplitude of the perturbation data with the intrusion type determination threshold, when the quantization amplitude is smaller than the intrusion type determination threshold, it is determined as a human invasion, and when the quantization amplitude is greater than or equal to the intrusion type determination threshold, determining Invade for vehicles.
通过分析对比入侵判定阈值为、入侵类型判定阈值为和量化振幅,实现对受监控区域的安全监控。传统的监控系统和方法主要依赖于视频采集和红外感应报警等前端设备,与传统的监控系统和方法的监控方法不同,本发明在前端完成数据采集后,通过监控中心1对比比入侵判定阈值为、入侵类型判定阈值为和量化振幅来判断受监控区域是否被入侵以及入侵类型。因此,本发明实现安全监控的过程主要是大数据处理的过程,通过前端采集的海量微扰数据作为大数据处理的基础,结合大数据处理方法便可最大程度上在安防领域内解放人力,而且与传统的监控系统和方法相比,效果更好、准确率更高。Through the analysis and comparison of the intrusion decision threshold, the intrusion type decision threshold and the quantization amplitude, the security monitoring of the monitored area is realized. The traditional monitoring system and method mainly rely on front-end equipment such as video capture and infrared-sensing alarm. Unlike the traditional monitoring system and method monitoring method, the present invention passes the monitoring center 1 comparison ratio intrusion determination threshold after the front-end data acquisition is completed. The intrusion type decision threshold and the quantization amplitude are used to determine whether the monitored area is intruded and the type of intrusion. Therefore, the process of implementing security monitoring according to the present invention is mainly a process of big data processing. The massive perturbation data collected by the front end is used as the basis of big data processing, and combined with the big data processing method, the human being can be liberated to the greatest extent in the security field, and Compared with traditional monitoring systems and methods, the effect is better and the accuracy is higher.
为了分析入侵者的入侵信息,入侵信息分析模块13包括:In order to analyze the intruder's intrusion information, the intrusion information analysis module 13 includes:
标记单元,用于标记采集到微扰数据的震动传感节点和对应的时间戳;a marking unit, configured to mark the vibration sensing node and the corresponding time stamp collected to the perturbative data;
图型化单元,用于在电子地图上标记出采集到微扰数据的震动传感节点 的相对位置;A patterning unit for marking a seismic sensing node that acquires perturbative data on an electronic map Relative position
排序单元,用于对时间戳进行排序;a sorting unit for sorting timestamps;
数量分析单元,用于统计在同一时间戳采集到微扰数据的震动传感节点的数量,根据在同一时间戳内采集到微扰数据的震动传感节点的数量推算入侵者的数量;The quantity analysis unit is configured to count the number of the vibration sensing nodes that collect the perturbative data at the same time stamp, and estimate the number of the intruders according to the number of the vibration sensing nodes that collect the perturbative data in the same time stamp;
动态追踪单元,用于整合微扰数据的时间戳和震动传感节点在电子地图上的相对位置,根据时间戳和相对位置分析入侵者的移动轨迹和移动速度。The dynamic tracking unit is configured to integrate the time stamp of the perturbation data and the relative position of the vibration sensing node on the electronic map, and analyze the movement track and the moving speed of the intruder according to the time stamp and the relative position.
入侵信息包括入侵者数量、移动轨迹和移动速度。确定入侵信息是安全监控过程中非常关键的一步,其结果决定了采取怎样的应对措施对付入侵,以确保受监控区域安全。在本发明中,先通过标记单元标记出采集到微扰数据的震动传感节点和采集到微扰数据的时间戳;然后通过图型化单元采用动态拓扑发现技术把采集到微扰数据的震动传感节点的相对位置在电子地图上标记出来,进行可视化智能管理,操作人员可以通过电子地图直观地看到是哪里点采集到异常信号,即哪些地方正在被入侵。同时,通过排序单元对时间戳进行排序,并通过数量分析单元统计在同一时间戳采集到微扰数据的震动传感节点的数量,确定入侵者的数量;最后,也是分析入侵信息过程中最重要的一步,通过动态追踪单元整合微扰数据的时间戳和震动传感节点在电子地图上的相对位置,根据时间戳和相对位置分析入侵者的移动轨迹和移动速度。Intrusion information includes the number of intruders, moving trajectories, and moving speed. Determining intrusion information is a critical step in the security monitoring process, and the results determine what countermeasures to take to address the intrusion to ensure the security of the monitored area. In the present invention, the vibration sensing node that collects the perturbation data and the time stamp of the acquired perturbation data are first marked by the marking unit; then the vibration of the collected perturbative data is collected by the graphical unit using dynamic topology discovery technology. The relative position of the sensing nodes is marked on the electronic map for visual intelligent management. The operator can visually see where the abnormal signals are collected through the electronic map, that is, where the objects are being invaded. At the same time, the timestamps are sorted by the sorting unit, and the number of the seismic sensor nodes that collect the perturbative data at the same timestamp is counted by the quantity analysis unit to determine the number of intruders; finally, the most important process in analyzing the intrusion information is In one step, the dynamic tracking unit integrates the time stamp of the perturbation data and the relative position of the vibration sensing node on the electronic map, and analyzes the intruder's moving trajectory and moving speed according to the time stamp and the relative position.
对应地,如图7所示,图7为本发明分析入侵者的入侵信息的流程示意图。所述S4中,根据微扰数据分析入侵者的入侵信息具体包括:Correspondingly, as shown in FIG. 7, FIG. 7 is a schematic flowchart of analyzing intruder intrusion information according to the present invention. In the S4, analyzing the intruder's intrusion information according to the perturbation data specifically includes:
S401.多个监控感应带3内的震动传感节点采集微扰数据,标记采集到微扰数据的震动传感节点和对应的时间戳;S401. The vibration sensing node in the plurality of monitoring sensing strips 3 collects the perturbation data, and marks the vibration sensing node and the corresponding time stamp collected to the perturbative data;
S402.在电子地图上标记出采集到微扰数据的震动传感节点的相对位置;S402. Mark the relative position of the vibration sensing node that collects the perturbation data on the electronic map;
S403.对时间戳进行排序;S403. Sort the timestamps;
S404.统计在同一时间戳采集到微扰数据的震动传感节点的数量,根据在同一时间戳内采集到微扰数据的震动传感节点的数量确定入侵者的数量;S404. Counting the number of the vibration sensing nodes that collect the perturbation data at the same time stamp, and determining the number of the intruders according to the number of the vibration sensing nodes that collect the perturbative data in the same time stamp;
S405.整合微扰数据的时间戳和震动传感节点在电子地图上的相对位置,根据时间戳和相对位置分析入侵者的移动轨迹和移动速度。S405. Integrating the timestamp of the perturbation data with the relative position of the vibration sensing node on the electronic map, and analyzing the moving trajectory and moving speed of the intruder according to the timestamp and the relative position.
多个监控感应带3内的震动传感节点以传感网络的形式采集微扰数据,当采集到微扰数据时,标记出对应的震动传感节点和时间戳;进一步,通过电子地图显示采集到微扰数据的震动传感节点的相对位置,此时电子地图显示的是实时采集到异常信号的点,即哪些地方正在被入侵;进一步,对时间戳进行排序,并统计在同一时间戳内采集到微扰数据的震动传感节点的数量,根据在同一时间戳内采集到微扰数据的震动传感节点的数量确定入侵者的数量;最后,通过整合微扰数据,在电子地图上显示出入侵者的移动轨迹和 移动速度。The vibration sensing nodes in the plurality of monitoring sensing strips 3 collect the perturbative data in the form of a sensing network. When the perturbative data is collected, the corresponding vibration sensing nodes and time stamps are marked; further, the electronic map display is used to collect The relative position of the vibration sensing node to the perturbation data. At this time, the electronic map displays the point at which the abnormal signal is collected in real time, that is, where is being invaded; further, the time stamp is sorted and counted in the same time stamp. The number of vibration sensing nodes that collect the perturbation data determines the number of intruders based on the number of vibration sensing nodes that collect the perturbative data in the same time stamp; finally, by integrating the perturbation data, displaying on the electronic map Out of the intruder’s trajectory and Moving speed.
上述S404中,监控感应带3与受监控区域的边界平行,传感网络均匀地采集受监控区域的微扰信号,因此,同一时间戳内采集到微扰数据的震动传感节点的数量即为入侵者的数量。例如,在同一时间戳内,传感网络中的5个震动传感节点采集到微扰数据,说明受监控区域有5个入侵者。In the above S404, the monitoring sensing strip 3 is parallel to the boundary of the monitored area, and the sensing network uniformly collects the perturbation signal of the monitored area. Therefore, the number of the vibration sensing nodes that collect the perturbative data in the same time stamp is The number of intruders. For example, within the same timestamp, five seismic sensing nodes in the sensing network collect perturbation data, indicating that there are five intruders in the monitored area.
通过上述入侵信息分析模块13和分析入侵信息的具体步骤,把海量的微扰数据整合为能够为操作人员所直观认识的信息,这是物联网和大数据处理领域的重要一步。操作人员不用参与到数据处理的过程中,仅需要通过人机交互接口接收入侵者的入侵信息,进一步解放了人力。Through the above-mentioned intrusion information analysis module 13 and the specific steps of analyzing the intrusion information, the massive perturbation data is integrated into information that can be intuitively recognized by the operator, which is an important step in the field of Internet of Things and big data processing. The operator does not need to participate in the process of data processing, and only needs to receive the intruder's intrusion information through the human-computer interaction interface, further liberating manpower.
为了确定处理方案,所述方案确定模块14包括:To determine a processing scheme, the solution determination module 14 includes:
参数预设单元,用于预设受威胁半径、预警级别的判定标准和与预警级别对应的处理方案;a parameter preset unit, configured to preset a threat radius, a warning level, and a processing scheme corresponding to the warning level;
威胁区域界定单元,用于以被入侵的受监控区域为原点,根据受威胁半径划分受威胁区域,并确定重点防护目标;A threat area defining unit is configured to take the invaded monitored area as an origin, divide the threatened area according to the threat radius, and determine a key protection target;
行踪锁定单元,用于通过连续采集并储存入侵者的图像和/或视频数据,锁定入侵者的行踪;a tracking lock unit for locking the intruder's whereabouts by continuously collecting and storing the intruder's image and/or video data;
预警定级单元,用于根据入侵事件类型和入侵信息判定预警级别,并根据预警级别启动相应的处理方案。The early warning and grading unit is configured to determine an early warning level according to the type of the intrusion event and the intrusion information, and start a corresponding processing scheme according to the early warning level.
本系统通过参数预设单元、威胁区域界定单元、行踪锁定单元和预警定级单元的配合确定处理方案。先通过参数预设单元预设受威胁半径、预警级别的判定标准和与预警级别对应的处理方案;再通过威胁区域界定单元划分受威胁区域并确定重点防护目标;接着,行踪锁定单元通过连续采集并储存入侵者的图像和/或视频数据,锁定入侵者的行踪;最后,预警定级单元,根据入侵事件类型和入侵信息判定预警级别,并根据预警级别启动相应的处理方案。The system determines the processing scheme by the cooperation of the parameter preset unit, the threat area defining unit, the track locking unit and the early warning grading unit. Firstly, the parameter of the threat radius, the warning level and the processing scheme corresponding to the warning level are preset by the parameter preset unit; then the threat area is divided by the threat area defining unit and the key protection target is determined; then, the tracking unit is continuously collected. And storing the intruder's image and/or video data to lock the intruder's whereabouts; finally, the early warning unit determines the alert level according to the intrusion event type and the intrusion information, and starts the corresponding processing scheme according to the alert level.
对应的,如图8所示,图8为本发明确定处理方案的流程示意图。所述S5中,根据入侵事件类型和入侵信息确定处理方案具体包括:Correspondingly, as shown in FIG. 8, FIG. 8 is a schematic flowchart of determining a processing scheme according to the present invention. In the S5, determining the processing scheme according to the type of the intrusion event and the intrusion information specifically includes:
S501.预设受威胁半径、预警级别的判定标准和与预警级别对应的处理方案;S501. Predetermined criteria for threat radius, early warning level, and processing scheme corresponding to the warning level;
S502.以被入侵的受监控区域为原点,根据受威胁半径划分受威胁区域,并确定重点防护目标;S502. Taking the invaded monitored area as the origin, dividing the threatened area according to the threat radius, and determining the key protection target;
S503.连续采集并储存入侵者的图像和/或视频数据,锁定入侵者的行踪;S503. Continuously collecting and storing the image and/or video data of the intruder, and locking the whereabouts of the intruder;
S504.根据入侵事件类型和入侵信息判定预警级别,并根据预警级别启动相应的处理方案;S504. Determine an early warning level according to the type of the intrusion event and the intrusion information, and start a corresponding processing plan according to the early warning level;
S505.根据处理方案发出指令对重点防护目标实施布防,并输出入侵者的行踪。 S505. Issue instructions according to the treatment plan to arm the key protection targets and output the invaders' whereabouts.
预先在参数预设单元设置受威胁半径,同时预设预警级别的判定标准和与预警级别对应的处理方案,受威胁半径用于结合被入侵的点划分某区域是否处于受威胁区域内,而预警级别与处理方案相对应;通过威胁区域界定单元确定重点防护目标,在安全监控的过程中,优先保护重点防护目标;通过行踪锁定单元锁定入侵者的行踪,实时掌握入侵者的具体位置,更有利于安全防护;通过预警定级单元根据入侵事件类型和入侵信息判定预警级别,并根据预警级别启动相应的处理方案;最后,操作人员根据处理方案对重点防护目标实施布防,并根据入侵者的行踪向入侵者出警。另外,储存图像和/或视频数据,方便在安全监控完成后的调查和取证。The threat radius is set in advance in the parameter preset unit, and the judgment standard of the preset warning level and the processing scheme corresponding to the warning level are used, and the threat radius is used to determine whether an area is in the threatened area by combining the invaded points, and the warning is The level corresponds to the processing scheme; the key protection target is determined by the threat area defining unit, and the key protection target is preferentially protected in the process of security monitoring; the intruder's whereabouts are locked by the tracking unit, and the specific location of the intruder is grasped in real time, and more Conducive to security protection; through the early warning and rating unit to determine the early warning level according to the type of intrusion event and intrusion information, and start the corresponding treatment plan according to the early warning level; finally, the operator implements the defense against the key protection target according to the treatment plan, and according to the intruder's whereabouts Alert the intruder. In addition, the storage of images and / or video data facilitates investigation and forensics after the completion of security monitoring.
确定处理方案的过程仍通过监控中心1实现,操作人员仅需要通过监控中心1的指示,通过特定的处理方案向特定的地点出击,便可高效率地实现大范围安全监控。The process of determining the processing scheme is still implemented by the monitoring center 1. The operator only needs to pass the indication of the monitoring center 1 and attack the specific location through a specific processing scheme, so that a wide range of security monitoring can be realized efficiently.
S503中,锁定入侵者的行踪的方法具体包括:In S503, the method for locking the intruder's whereabouts includes:
在受监控区域设置多个固定监控设备;Set up multiple fixed monitoring devices in the monitored area;
当受监控区域被入侵时,记录下采集到微扰数据的位置,分析入侵者的移动轨迹和移动速度;When the monitored area is invaded, record the location where the perturbation data is collected, and analyze the intruder's movement trajectory and moving speed;
依次使能采集到微扰数据位置固定监控设备,所述固定监控设备采集入侵者的图像和/或视频数据。The acquisition of the perturbation data location fixed monitoring device is sequentially enabled, and the fixed monitoring device collects images and/or video data of the intruder.
另外,也可根据入侵者的移动轨迹和移动速度,设定无人机的巡航路线,通过无人机采集入侵者的图像和/或视频数据锁定入侵者的行踪。In addition, according to the intruder's movement trajectory and moving speed, the cruising route of the drone can be set, and the intruder's image and/or video data can be collected by the drone to lock the intruder's whereabouts.
对应的,在一种大范围周边安全监控系统中,还包括固定监控设备和/或无人机。当受监控区域被入侵时,监控中心1记录下采集到微扰数据的位置并分析入侵者的移动轨迹和移动速度,然后依次使能采集到微扰数据位置固定监控设备,固定监控设备采集入侵者的图像和/或视频数据;或者,监控中心1根据入侵者的移动轨迹和移动速度,设定无人机的巡航路线,通过无人机采集入侵者的图像和/或视频数据锁定入侵者的行踪。Correspondingly, in a wide range of perimeter security monitoring systems, fixed monitoring devices and/or drones are also included. When the monitored area is invaded, the monitoring center 1 records the location where the perturbation data is collected and analyzes the intruder's moving trajectory and moving speed, and then sequentially enables the acquisition of the perturbative data location fixed monitoring device, and the fixed monitoring device collects the intrusion. Image and/or video data; or, the monitoring center 1 sets the cruise route of the drone according to the intruder's movement trajectory and moving speed, and collects the intruder's image and/or video data through the drone to lock the intruder. Whereabouts.
采用神经网络算法对所有的固定监控设备进行协调指挥操作,当一个固定监控设备记录下入侵者的图像和/或视频数据时,监控中心1向临近的其他固定监控设备传达信号,调整进入工作状态。通过使能特定的固定监控设备或设定无人机的巡航路线来进行图像和/或视频数据采集,能够锁定入侵者的行踪,实时掌握入侵者的动向,提高出警效率。The neural network algorithm is used to coordinate and direct all fixed monitoring devices. When a fixed monitoring device records the image and/or video data of the intruder, the monitoring center 1 transmits signals to other fixed monitoring devices in the vicinity, and adjusts to enter the working state. . By enabling specific fixed monitoring equipment or setting the cruise route of the drone for image and/or video data collection, it is possible to lock the intruder's whereabouts, grasp the intruder's movements in real time, and improve the efficiency of the police.
读者应理解,在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在 任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。The reader should understand that in the description of the present specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" and the like means that the embodiment or example is incorporated. The specific features, structures, materials, or characteristics described are included in at least one embodiment or example of the invention. In the present specification, the schematic representation of the above terms is not necessarily directed to the same embodiment or example. Moreover, the specific features, structures, materials, or characteristics described may be Any one or more of the embodiments or examples are combined in a suitable manner. In addition, various embodiments or examples described in the specification and features of various embodiments or examples may be combined and combined without departing from the scope of the invention.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。A person skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working process of the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of cells is only a logical function division. In actual implementation, there may be another division manner. For example, multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本发明实施例方案的目的。The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分,或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。An integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, can be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium. A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the various embodiments of the present invention. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
以上,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求的保护范围为准。 The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any equivalent modification or can be easily conceived by those skilled in the art within the technical scope of the present disclosure. Such modifications or substitutions are intended to be included within the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims (10)

  1. 一种大范围周边安全监控方法,其特征在于,具体包括:A large-scale perimeter security monitoring method, which is characterized in that:
    S1.创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;S1. Creating an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
    S2.采集受监控区域边界的微扰数据;S2. collecting perturbation data of the boundary of the monitored area;
    S3.量化所述微扰数据得到量化振幅,对比所述量化振幅和所述入侵数据特征,确定所述受监控区域是否被入侵,当所述受监控区域没被入侵时返回S2,当所述受监控区域被入侵时进一步确定对应的所述入侵事件类型;S3. Quantizing the perturbation data to obtain a quantized amplitude, comparing the quantized amplitude and the intrusion data feature, determining whether the monitored area is intruded, and returning to S2 when the monitored area is not invaded, when Further determining the corresponding type of the intrusion event when the monitored area is invaded;
    S4.根据所述微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度;S4. analyzing the intruder's intrusion information according to the perturbative data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
    S5.根据所述入侵事件类型和所述入侵信息确定处理方案。S5. Determine a processing scheme according to the type of the intrusion event and the intrusion information.
  2. 根据权利要求1所述的一种大范围周边安全监控方法,其特征在于,所述S2中,沿所述受监控区域的边界布置多个相互平行的监控感应带,通过所述监控感应带采集所述微扰数据,每个所述监控感应带与所述受监控区域的边界平行,所述监控感应带包括多个震动传感节点;A large-scale perimeter security monitoring method according to claim 1, wherein in the S2, a plurality of mutually parallel monitoring sensing strips are arranged along the boundary of the monitored area, and the monitoring sensing strip is collected by the monitoring area. The perturbation data, each of the monitoring sensing strips is parallel to a boundary of the monitored area, and the monitoring sensing strip includes a plurality of vibration sensing nodes;
    沿所述受监控区域的边界布置所述监控感应带的过程中,对所述监控感应带进行响应校准,所述响应校准具体包括:During the process of arranging the monitoring sensing strip along the boundary of the monitored area, the monitoring sensing strip is responsively calibrated, and the response calibration specifically includes:
    S201.在所述监控感应带旁边布置所述校准测试带,所述校准测试带与所述监控感应带平行;S201. arranging the calibration test strip next to the monitoring sensing strip, the calibration test strip being parallel to the monitoring sensing strip;
    S202.设置人工扰动点,控制所述人工扰动点沿着所述校准测试带移动并产生震动信号,各个所述监控感应带采集所述震动信号所产生的微扰数据;S202. Setting a manual disturbance point, controlling the manual disturbance point to move along the calibration test zone and generating a vibration signal, and each of the monitoring induction bands collects the perturbation data generated by the vibration signal;
    S203.把所述微扰数据转化为响应输出数据;S203. Convert the perturbation data into response output data.
    S204.比较所述人工扰动点处于不同位置时对应的所述响应输出数据,得到标定调整参数;S204. Comparing the response output data corresponding to the manual disturbance point in different positions, and obtaining a calibration adjustment parameter;
    S205.根据所述标定调整参数对所述监控感应带进行软校准。S205. Perform soft calibration on the monitoring sensing strip according to the calibration adjustment parameter.
  3. 根据权利要求1所述的一种大范围周边安全监控方法,其特征在于,所述入侵数据特征包括入侵判定阈值和入侵类型判定阈值,所述入侵事件类型包括人员入侵和车辆入侵,所述S3中确定所述受监控区域是否被入侵以及确定对应的所述入侵事件类型的过程具体包括:The method for monitoring a large-scale perimeter security according to claim 1, wherein the intrusion data feature comprises an intrusion determination threshold and an intrusion type determination threshold, and the intrusion event type includes a personnel intrusion and a vehicle intrusion, and the S3 The process of determining whether the monitored area is invaded and determining the corresponding type of the intrusion event specifically includes:
    S301.获取所述入侵判定阈值和所述入侵类型判定阈值;S301. Acquire the intrusion determination threshold and the intrusion type determination threshold.
    S302.对所述微扰数据进行预处理,去除所述微扰数据中的噪声;S302. Perform pre-processing on the perturbation data to remove noise in the perturbation data;
    S303.量化经过预处理后的所述微扰数据,得到所述微扰数据的量化振幅;S303. Quantizing the pre-processed the perturbation data to obtain a quantized amplitude of the perturbed data;
    S304.对比所述微扰数据的所述量化振幅与所述入侵判定阈值,当所述量化振幅小于所述入侵判定阈值时判定所述受监控区域安全,当所述量化振幅大于或等于所述入侵判定阈值时判定所述受监控区域被入侵;S304. Comparing the quantized amplitude of the perturbation data with the intrusion determination threshold, determining that the monitored area is safe when the quantized amplitude is less than the intrusion determination threshold, when the quantized amplitude is greater than or equal to the Determining that the monitored area is invaded when the threshold is determined by the intrusion;
    S305.当判定所述受监控区域被入侵后,对比所述微扰数据的所述量化振幅和所述入侵类型判定阈值,当所述量化振幅小于所述入侵类型判定阈值时 判定为人员入侵,当所述量化振幅大于或等于所述入侵类型判定阈值时判定为车辆入侵。S305. When it is determined that the monitored area is invaded, comparing the quantized amplitude of the perturbation data with the intrusion type determination threshold, when the quantized amplitude is less than the intrusion type determination threshold It is determined that the person intrusion is determined to be a vehicle intrusion when the quantization amplitude is greater than or equal to the intrusion type determination threshold.
  4. 根据权利要求2所述的一种大范围周边安全监控方法,其特征在于,所述S4中,根据所述微扰数据分析入侵者的所述入侵信息具体包括:The method for monitoring a large-scale perimeter security according to claim 2, wherein the analyzing the intrusion information of the intruder according to the perturbation data in the S4 includes:
    S401.多个所述监控感应带内的所述震动传感节点采集所述微扰数据,标记采集到所述微扰数据的所述震动传感节点和对应的时间戳;S401. The vibration sensing node in the plurality of monitoring sensing bands collects the perturbation data, and marks the vibration sensing node and the corresponding time stamp collected to the perturbation data;
    S402.在电子地图上标记出采集到所述微扰数据的所述震动传感节点的相对位置;S402. Mark, on an electronic map, a relative position of the vibration sensing node that collects the perturbation data;
    S403.对所述时间戳进行排序;S403. Sort the timestamps;
    S404.统计在同一所述时间戳采集到所述微扰数据的所述震动传感节点的数量,根据所述震动传感节点的数量确定入侵者的数量;S404. Count the number of the vibration sensing nodes that collect the perturbation data in the same timestamp, and determine the number of intruders according to the number of the vibration sensing nodes;
    S405.整合所述微扰数据的时间戳和所述震动传感节点在所述电子地图上的相对位置,根据所述时间戳和所述相对位置分析入侵者的移动轨迹和移动速度。S405. Integrate a timestamp of the perturbation data and a relative position of the vibration sensing node on the electronic map, and analyze an intruder's moving trajectory and moving speed according to the timestamp and the relative position.
  5. 根据权利要求1-4中任一项所述的一种大范围周边安全监控方法,其特征在于,所述S5具体包括:The method for monitoring a large-scale perimeter security according to any one of claims 1 to 4, wherein the S5 specifically includes:
    S501.预设受威胁半径、预警级别的判定标准和与预警级别对应的处理方案;S501. Predetermined criteria for threat radius, early warning level, and processing scheme corresponding to the warning level;
    S502.以被入侵的受监控区域为原点,根据所述受威胁半径划分受威胁区域,并确定重点防护目标;S502. Taking the invaded monitored area as an origin, dividing the threatened area according to the threatened radius, and determining a key protection target;
    S503.连续采集并储存入侵者的图像和/或视频数据,锁定入侵者的行踪;S503. Continuously collecting and storing the image and/or video data of the intruder, and locking the whereabouts of the intruder;
    S504.根据所述入侵事件类型和所述入侵信息判定所述预警级别,并根据所述预警级别启动相应的处理方案;S504. Determine the alert level according to the type of the intrusion event and the intrusion information, and start a corresponding processing solution according to the alert level;
    S505.根据所述处理方案发出指令对重点防护目标实施布防,并输出入侵者的行踪。S505. Issue an instruction according to the processing scheme to arm the key protection target, and output the intruder's whereabouts.
  6. 一种大范围周边安全监控系统,其特征在于,包括:A wide range of perimeter security monitoring system, characterized in that it comprises:
    监控感应带,用于采集受监控区域边界的微扰数据,每个所述监控感应带与所述受监控区域的边界平行,所述监控感应带包括多个震动传感节点;Monitoring the sensing strip for collecting perturbation data of the boundary of the monitored area, each of the monitoring sensing strips being parallel to a boundary of the monitored area, the monitoring sensing strip comprising a plurality of vibration sensing nodes;
    监控中心,用于数据处理和控制,所述监控中心包括:Monitoring center for data processing and control, the monitoring center includes:
    入侵特征库创建模块,用于创建入侵特征库,所述入侵特征库包括入侵事件类型和入侵数据特征;An intrusion feature library creation module, configured to create an intrusion feature library, where the intrusion feature library includes an intrusion event type and an intrusion data feature;
    量化分析模块,用于量化所述微扰数据得到量化振幅,对比所述量化振幅和所述入侵数据特征,确定所述受监控区域是否被入侵以及当所述受监控区域被入侵时进一步确定对应的所述入侵事件类型;a quantization analysis module, configured to quantize the perturbation data to obtain a quantized amplitude, compare the quantized amplitude and the intrusion data feature, determine whether the monitored area is invaded, and further determine a corresponding when the monitored area is invaded Type of the intrusion event;
    入侵信息分析模块,用于根据所述微扰数据分析入侵者的入侵信息,所述入侵信息包括入侵者数量、移动轨迹和移动速度; An intrusion information analysis module, configured to analyze intruder intrusion information according to the perturbative data, where the intrusion information includes an intruder number, a moving track, and a moving speed;
    方案确定模块,用于根据所述入侵事件类型和所述入侵信息确定处理方案。And a solution determining module, configured to determine a processing solution according to the type of the intrusion event and the intrusion information.
  7. 根据权利要求6所述的一种大范围周边安全监控系统,其特征在于,包括:A large-scale perimeter security monitoring system according to claim 6, comprising:
    监控感应带,所述监控感应带设置有多个,所述监控感应带沿所述受监控区域的边界设置,所述监控感应带之间相互平行;Monitoring the sensing strip, the monitoring sensing strip is disposed in plurality, the monitoring sensing strip is disposed along a boundary of the monitored area, and the monitoring sensing strips are parallel to each other;
    校准测试带,所述校准测试带设置在所述监控感应带旁边,所述校准测试带与所述监控感应带平行;Calibrating a test strip disposed adjacent to the monitor strip, the calibration strip being parallel to the monitor strip;
    人工扰动点,用于沿着所述校准测试带移动并产生震动信号,各个所述监控感应带采集所述微扰数据;a manual disturbance point for moving along the calibration test strip and generating a vibration signal, each of the monitoring sensing strips collecting the perturbation data;
    所述监控中心包括:The monitoring center includes:
    响应输出模块,用于把所述微扰数据转化为响应输出数据;a response output module, configured to convert the perturbation data into response output data;
    标定参数模块,用于比较所述人工扰动点处于不同位置时对应的所述响应输出数据,得到标定调整参数;a calibration parameter module, configured to compare the response output data corresponding to the manual disturbance point in different positions, and obtain a calibration adjustment parameter;
    校准模块,用于根据所述标定调整参数对所述监控感应带进行软校准,使得所述监控感应带对所述震动信号输出稳定的所述响应输出数据,所述软校准的过程为通过所述标定调整参数对所述微扰数据进行校准转换。a calibration module, configured to perform soft calibration on the monitoring sensing band according to the calibration adjustment parameter, so that the monitoring sensing band outputs a stable response output data to the vibration signal, and the soft calibration process is The calibration adjustment parameter performs calibration conversion on the perturbation data.
  8. 根据权利要求6所述的一种大范围周边安全监控系统,其特征在于,所述入侵数据特征包括入侵判定阈值和入侵类型判定阈值,所述入侵事件类型包括人员入侵和车辆入侵,所述量化分析模块包括:A large-scale perimeter security monitoring system according to claim 6, wherein the intrusion data feature comprises an intrusion decision threshold and an intrusion type decision threshold, the intrusion event type including a person intrusion and a vehicle intrusion, the quantification The analysis module includes:
    阈值获取单元,用于获取所述入侵判定阈值和所述入侵类型判定阈值;a threshold obtaining unit, configured to acquire the intrusion determination threshold and the intrusion type determination threshold;
    预处理单元,用于对所述微扰数据进行预处理,去除所述微扰数据中的噪声;a pre-processing unit, configured to pre-process the perturbation data to remove noise in the perturbation data;
    量化单元,用于量化经过预处理后的所述微扰数据,得到所述微扰数据的量化振幅;a quantization unit, configured to quantize the pre-processed perturbation data, to obtain a quantized amplitude of the perturbed data;
    入侵判定单元,用于对比所述微扰数据的所述量化振幅与所述入侵判定阈值,当所述量化振幅小于所述入侵判定阈值时判定所述受监控区域安全,当所述量化振幅大于或等于所述入侵判定阈值时判定所述受监控区域被入侵;An intrusion determination unit, configured to compare the quantized amplitude of the perturbation data with the intrusion determination threshold, and determine that the monitored area is safe when the quantized amplitude is smaller than the intrusion determination threshold, when the quantized amplitude is greater than Or determining that the monitored area is invaded when the intrusion determination threshold is equal to;
    类型判定单元,用于当判定所述受监控区域被入侵后,对比所述微扰数据的所述量化振幅和所述入侵类型判定阈值,当所述量化振幅小于所述入侵类型判定阈值时判定为人员入侵,当所述量化振幅大于或等于所述入侵类型判定阈值时判定为车辆入侵。a type determining unit, configured to compare the quantized amplitude of the perturbation data with the intrusion type determination threshold after determining that the monitored area is invaded, and determine when the quantized amplitude is smaller than the intrusion type determination threshold For personnel intrusion, it is determined that the vehicle invades when the quantized amplitude is greater than or equal to the intrusion type determination threshold.
  9. 根据权利要求7所述的一种大范围周边安全监控系统,其特征在于,所述入侵信息分析模块包括:A large-scale perimeter security monitoring system according to claim 7, wherein the intrusion information analysis module comprises:
    标记单元,用于标记采集到所述微扰数据的所述震动传感节点和对应的 时间戳;a marking unit, configured to mark the vibration sensing node and corresponding corresponding to the perturbation data Timestamp
    图型化单元,用于在电子地图上标记出采集到所述微扰数据的所述震动传感节点的相对位置;a patterning unit, configured to mark, on an electronic map, a relative position of the vibration sensing node that collects the perturbation data;
    排序单元,用于对所述时间戳进行排序;a sorting unit, configured to sort the timestamps;
    数量分析单元,用于统计在同一时间戳采集到所述微扰数据的所述震动传感节点的数量,根据所述震动传感节点的数量确定入侵者的数量;a quantity analysis unit, configured to count the number of the vibration sensing nodes that collect the perturbation data at the same time stamp, and determine the number of intruders according to the number of the vibration sensing nodes;
    动态追踪单元,用于整合所述微扰数据的时间戳和所述震动传感节点在所述电子地图上的相对位置,根据所述时间戳和所述相对位置分析所述入侵者的移动轨迹和移动速度。a dynamic tracking unit, configured to integrate a timestamp of the perturbation data and a relative position of the vibration sensing node on the electronic map, and analyze the movement track of the intruder according to the timestamp and the relative position And moving speed.
  10. 根据权利要求6-9中任一项所述的一种大范围周边安全监控系统,其特征在于,所述方案确定模块包括:A large-scale perimeter security monitoring system according to any one of claims 6-9, wherein the solution determining module comprises:
    参数预设单元,用于预设受威胁半径、预警级别的判定标准和与预警级别对应的处理方案;a parameter preset unit, configured to preset a threat radius, a warning level, and a processing scheme corresponding to the warning level;
    威胁区域界定单元,用于以被入侵的受监控区域为原点,根据所述受威胁半径划分受威胁区域,并确定重点防护目标;a threat area defining unit, configured to use the invaded monitored area as an origin, divide the threatened area according to the threatened radius, and determine a key protection target;
    行踪锁定单元,用于通过连续采集并储存入侵者的图像和/或视频数据,锁定入侵者的行踪;a tracking lock unit for locking the intruder's whereabouts by continuously collecting and storing the intruder's image and/or video data;
    预警定级单元,用于根据所述入侵事件类型和所述入侵信息判定预警级别,并根据所述预警级别启动相应的处理方案。 The alarm grading unit is configured to determine an early warning level according to the type of the intrusion event and the intrusion information, and start a corresponding processing scheme according to the early warning level.
PCT/CN2017/096024 2017-06-23 2017-08-04 Large-scale peripheral security monitoring method and system WO2018232846A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710486984.2A CN107277443B (en) 2017-06-23 2017-06-23 Large-range peripheral safety monitoring method and system
CN201710486984.2 2017-06-23

Publications (1)

Publication Number Publication Date
WO2018232846A1 true WO2018232846A1 (en) 2018-12-27

Family

ID=60068123

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/096024 WO2018232846A1 (en) 2017-06-23 2017-08-04 Large-scale peripheral security monitoring method and system

Country Status (2)

Country Link
CN (1) CN107277443B (en)
WO (1) WO2018232846A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438323A (en) * 2021-08-25 2021-09-24 广州汇图计算机信息技术有限公司 Safety monitoring device based on area of interest of Internet of things

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063429B (en) * 2018-06-11 2021-07-02 武汉兴火源科技有限责任公司 Intelligent home security control system based on gestures and control method thereof
CN109672862B (en) * 2018-12-21 2020-10-27 北京天宇威视科技股份有限公司 Image processing method, image processing apparatus, image processing medium, and electronic device
CN111598449A (en) * 2020-05-15 2020-08-28 安阳工学院 Urban and rural planning monitoring management system
CN112258088A (en) * 2020-11-13 2021-01-22 珠海大横琴科技发展有限公司 Commanding and scheduling method and device for monitoring
CN113345189A (en) * 2021-08-06 2021-09-03 成都雨航创科科技有限公司 Unmanned on duty listens sensor device and system based on MEMS
CN113627374A (en) * 2021-08-17 2021-11-09 中广核工程有限公司 Perimeter intrusion judgment method, monitoring server and storage medium
CN114170748A (en) * 2021-12-06 2022-03-11 吉林省荣发科技有限公司 Intelligent early warning method, device and system for invisible boundary
CN116951683A (en) * 2022-04-13 2023-10-27 青岛海尔空调器有限总公司 Security monitoring method and device, intelligent household device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100245087A1 (en) * 2009-03-25 2010-09-30 Honeywell International Inc. System and Method for Adjusting a Security Level and Signaling Alarms in Controlled Areas
CN102346948A (en) * 2011-09-07 2012-02-08 无锡国科微纳传感网科技有限公司 Circumference invasion detection method and system
CN105608822A (en) * 2015-12-25 2016-05-25 中国铁道科学研究院电子计算技术研究所 Railway perimeter intrusion vibration fiber alarm method and device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101650201B (en) * 2008-08-13 2011-06-08 中国科学院自动化研究所 System and method for ground information acquisition
US8062249B2 (en) * 2009-03-31 2011-11-22 Abbott Diabetes Care Inc. Overnight closed-loop insulin delivery with model predictive control and glucose measurement error model
CN101872536A (en) * 2010-06-24 2010-10-27 北京航空航天大学 System for monitoring intrusion on basis of wireless sensor network
CN102280011B (en) * 2011-06-09 2013-06-19 无锡国科微纳传感网科技有限公司 Boundary safeguard alarm disposing method and system therefor
CN204066307U (en) * 2014-06-12 2014-12-31 黄河科技学院 A kind of safety-protection system based on technology of Internet of things
CN104821070B (en) * 2015-03-24 2018-07-27 北京科技大学 A kind of security protection monitoring and managing method and system based on multi-protocols heterogeneous network
CN105933416A (en) * 2016-04-23 2016-09-07 刘涛 Network system based on ground embedded wireless sensors and monitoring method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100245087A1 (en) * 2009-03-25 2010-09-30 Honeywell International Inc. System and Method for Adjusting a Security Level and Signaling Alarms in Controlled Areas
CN102346948A (en) * 2011-09-07 2012-02-08 无锡国科微纳传感网科技有限公司 Circumference invasion detection method and system
CN105608822A (en) * 2015-12-25 2016-05-25 中国铁道科学研究院电子计算技术研究所 Railway perimeter intrusion vibration fiber alarm method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438323A (en) * 2021-08-25 2021-09-24 广州汇图计算机信息技术有限公司 Safety monitoring device based on area of interest of Internet of things

Also Published As

Publication number Publication date
CN107277443B (en) 2019-12-10
CN107277443A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
WO2018232846A1 (en) Large-scale peripheral security monitoring method and system
CN106781165A (en) A kind of indoor multi-cam intelligent linkage supervising device based on depth sensing
CN111653368A (en) Artificial intelligence epidemic situation big data prevention and control early warning system
CN114040003B (en) Emergency disposal system and method for emergency events in personnel dense area
CN100527178C (en) Automatic tracking display system for warn
CN108540310B (en) Behavior prediction method based on wireless network cooperative sensing
CN110866642A (en) Security monitoring method and device, electronic equipment and computer readable storage medium
CN105791022A (en) Congestion degree detection and early-warning system
CN109740411A (en) Intelligent monitor system, monitoring method based on recognition of face and quickly go out alarm method
CN111723633B (en) Personnel behavior pattern analysis method and system based on depth data
CN108802758A (en) A kind of Intelligent security monitoring device, method and system based on laser radar
US11935378B2 (en) Intrusion detection methods and devices
CN107860425A (en) A kind of bridge structural health monitoring and early warning system and method
CN106548626A (en) A kind of comprehensive management platform based on geographical information technology
CN106327791A (en) Exceptional event real-time alarm method and system
CN108921330A (en) A kind of forest management system
CN106652291A (en) Indoor simple monitoring and alarming system and method based on Kinect
CN107404635A (en) The monitoring method and system of a kind of warning message
CN106710120A (en) Front-end distributed forest smoke and fire identifying, locating and intelligent sensing system
CN202120402U (en) Mass video analysis based on cloud computing and rapid retrieval system
CN209433517U (en) It is a kind of based on more flame images and the fire identification warning device for combining criterion
CN115496640A (en) Intelligent safety system of thermal power plant
CN110188617A (en) A kind of machine room intelligent monitoring method and system
CN205847453U (en) A kind of wisdom gold eyeball people based on intelligent video technology and the Activity recognition system of thing
Yu et al. Network security monitoring method based on deep learning

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914412

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15.05.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17914412

Country of ref document: EP

Kind code of ref document: A1