WO2023279786A1 - Perimeter detection method and apparatus, and device and system - Google Patents

Perimeter detection method and apparatus, and device and system Download PDF

Info

Publication number
WO2023279786A1
WO2023279786A1 PCT/CN2022/084382 CN2022084382W WO2023279786A1 WO 2023279786 A1 WO2023279786 A1 WO 2023279786A1 CN 2022084382 W CN2022084382 W CN 2022084382W WO 2023279786 A1 WO2023279786 A1 WO 2023279786A1
Authority
WO
WIPO (PCT)
Prior art keywords
camera
intrusion target
perimeter
radar
detection sensitivity
Prior art date
Application number
PCT/CN2022/084382
Other languages
French (fr)
Chinese (zh)
Inventor
夏建东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202111051346.0A external-priority patent/CN115601902A/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023279786A1 publication Critical patent/WO2023279786A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Definitions

  • the present application relates to the field of information technology, and more specifically, to a perimeter detection method, device, device and system.
  • Perimeter protection is an important component of railway line security.
  • the railway perimeter has not been warned in time after being invaded, many accidents have been caused, for example, the train was forced to stop, roll over, etc., which seriously affected the normal operation of the train. Therefore, there is a need to meet the needs of the railway industry Current solutions to ensure the safety of train operations.
  • radar technology As a railway perimeter protection technology, radar technology has the advantages of wide detection range, high detection sensitivity, relatively low construction and maintenance costs, and has become a mainstream technology choice.
  • radars For railway perimeter protection, it is necessary to give priority to ensuring a very low false alarm rate. Therefore, radars generally work in a higher detection sensitivity mode to reduce the false alarm rate. However, when the radar works in a higher detection sensitivity mode, it is easy to regard some non-invading targets as intrusion targets, thus generating an alarm, which will increase the false alarm rate, and frequent false alarms will make the operation and maintenance personnel tired of checking , affecting the promotion of perimeter protection systems based on radar technology.
  • the embodiment of the present application provides a perimeter detection method, device, equipment and system.
  • the method enables the radar to enter the detection sensitivity mode corresponding to the camera's shooting capability according to the shooting capability of the camera.
  • the radar detects in the current detection sensitivity mode , can reduce the false positive rate and false negative rate.
  • a perimeter detection method is provided, the method is applied to a detection system including a radar and a camera, and there is a communication connection between the camera and the radar.
  • the radar determines the current detection sensitivity according to the shooting capability of the camera, wherein the shooting capability of the camera indicates the quality of the image frame acquired by the camera; then, the radar determines whether there is an intrusion within the perimeter under the current detection sensitivity target; finally, if there is an intrusion target within the perimeter, the camera determines whether the intrusion target is a real intrusion target.
  • the radar can enter the corresponding detection sensitivity mode according to the current shooting ability of the camera. For example, when the shooting ability of the camera is strong, the radar enters the high detection sensitivity mode. Since the shooting ability of the camera is strong and the camera will participate The second confirmation, that is, the accuracy of the second confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate. For another example, in this solution, when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode.
  • the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false alarm rate.
  • the detection sensitivity mode and the detection sensitivity have the same meaning.
  • the detection sensitivity mode and the detection sensitivity can be replaced with each other.
  • the shooting capability of the camera is determined by the camera according to a current environment and a state of the camera itself.
  • the shooting capability is associated with the quality of the image frame acquired by the camera. Since the current detection sensitivity mode of the radar essentially depends on the camera The quality of the captured image frames. Therefore, by associating the shooting capability with the quality of the captured image frames of the camera, the radar can determine the current detection sensitivity mode according to the shooting capability of the camera.
  • the current environment includes at least one of current weather and current illumination
  • the camera's own state includes the camera's functional status and at least one of the device states.
  • the camera determines the shooting capability of the camera according to the current weather, current light, the functional state of the camera, and the device state of the camera
  • the current weather, current light, the functional state of the camera, and the device state of the camera will all affect the camera
  • the radar determining whether there is an intrusion target in the perimeter under the current detection sensitivity includes: the radar determining the perimeter A confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that an intrusion target exists within the perimeter.
  • the "confidence level" among the confidence levels of intrusion targets in the perimeter determined by the radar is used to indicate the possibility of intrusion targets in the current perimeter.
  • the radar will determine that there are intrusion targets in the perimeter, in other words, only when there are When the confidence of the intrusion target is greater than the first confidence threshold under the current detection sensitivity, the camera will determine whether the intrusion target is a real intrusion target.
  • the first confidence threshold it is possible to filter out some Intrusion targets are non-intrusion targets, thereby reducing the workload of the camera.
  • the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the current detection sensitivity The first confidence threshold under the sensitivity increases as the shooting capability of the camera decreases.
  • the method further includes: the radar sends a notification message to the camera , the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  • the radar determines that there is an intrusion target in the perimeter, it sends a notification message to the camera, so that the camera can determine whether the intrusion target is a real intrusion target under the prompt of the notification message.
  • the notification message carries a confidence level of an intrusion target within the perimeter, and the camera determines whether the intrusion target is a real intrusion The target includes: if the confidence is greater than or equal to a preset second confidence threshold, the camera determines that the intrusion target is a real intrusion target.
  • the camera determines that the intrusion target is a real intrusion target, thereby eliminating the step of the camera acquiring image frames and reducing the number of camera workload.
  • the notification message carries the confidence level of the intrusion target in the perimeter and the orientation information of the intrusion target
  • the camera determines that the intrusion target Whether the intrusion target is a real intrusion target includes: if the confidence level is less than a preset second confidence threshold, the camera determines whether the intrusion target is For a real intrusion target, the image frame about the intrusion target is acquired according to the orientation information of the intrusion target.
  • the camera when the confidence of the intrusion target in the perimeter is less than the preset second confidence threshold, by carrying the orientation information of the intrusion target in the notification message, the camera can obtain information about the intrusion based on the orientation information of the intrusion target.
  • the image frame of the target and then according to the image frame about the intrusion target, determine whether the intrusion target is a real intrusion target, so that when the confidence of the intrusion target in the perimeter is less than the second preset confidence threshold, the accuracy of the detection result is improved. accuracy.
  • the detection system further includes an alarm
  • the method further includes: The camera controls the alarm device to output an alarm prompt, and the alarm prompt is used to prompt the intrusion target to leave the perimeter.
  • the camera controls the alarm to output an alarm prompt, thereby driving the intrusion target out of the perimeter through the alarm.
  • a perimeter detection method comprising: the radar determines the current detection sensitivity according to the shooting capability of the camera, and the shooting capability of the camera indicates the quality of the image frame acquired by the camera; the Under the current detection sensitivity, the radar determines whether there is an intrusion target within the perimeter.
  • the radar by making the radar enter the detection sensitivity mode corresponding to the shooting capability of the camera according to the shooting capability of the camera, for example, when the shooting capability of the camera is strong, the radar enters the high detection sensitivity mode.
  • the camera will participate in the secondary confirmation, that is, the accuracy of the secondary confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate.
  • the radar when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode. Because the camera's shooting ability is weak or even cannot be confirmed twice, the accuracy of the camera's second confirmation The rate will be low, at this time, reducing the detection sensitivity of the radar can reduce the overall false alarm rate. Therefore, the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false negative rate.
  • the shooting capability of the camera is determined by the camera according to a current environment and a state of the camera itself.
  • the shooting capability is associated with the quality of the image frame acquired by the camera. Since the current detection sensitivity mode of the radar essentially depends on the camera The quality of the captured image frames. Therefore, by associating the shooting capability with the quality of the captured image frames of the camera, the radar can determine the current detection sensitivity mode according to the shooting capability of the camera.
  • the current environment includes at least one of current weather and current illumination
  • the state of the camera itself includes the functional state and at least one of the device states.
  • the camera determines the shooting capability of the camera according to the current weather, current light, the functional state of the camera, and the device state of the camera
  • the current weather, current light, the functional state of the camera, and the device state of the camera will all affect the camera
  • the radar determining whether there is an intrusion target in the perimeter under the current detection sensitivity includes: the radar determining the perimeter A confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that an intrusion target exists within the perimeter.
  • the radar will determine that there are intrusion targets in the perimeter, in other words, only when there are When the confidence of the intrusion target is greater than the first confidence threshold under the current detection sensitivity, the camera will determine whether the intrusion target is a real intrusion target.
  • the first confidence threshold it is possible to filter out some Intrusion targets are non-intrusion targets, thereby reducing the workload of the camera.
  • the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the current detection sensitivity The first confidence threshold under the sensitivity increases as the shooting capability of the camera decreases.
  • the method further includes: the radar sends a notification message to the camera , the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  • the radar determines that there is an intrusion target in the perimeter, it sends a notification message to the camera, so that the camera can determine whether the intrusion target is a real intrusion target under the prompt of the notification message.
  • the present application provides a detection device configured to implement the perimeter detection method in the second aspect or any possible implementation manner of the second aspect.
  • the apparatus may include a unit for performing the second aspect or the perimeter detection method in any possible implementation manner of the second aspect.
  • a detection device in a fourth aspect, includes a memory and a processor.
  • the memory is used to store instructions; the processor executes the instructions stored in the memory, so that the device executes the second aspect or the perimeter detection method in any possible implementation manner of the second aspect.
  • a detection system includes a radar, a camera, and an alarm
  • the radar method is used to perform the method performed by the radar in any of the above-mentioned aspects or any possible implementation of any of the above-mentioned aspects
  • the camera is used for Execute the method performed by the camera in any of the above aspects or in any possible implementation of any of the above aspects
  • the alarm is used to perform any of the above aspects or in any possible implementation of any of the above aspects. Executed by the alarm Methods.
  • a computer-readable storage medium stores instructions, and when the instructions are run on a computer, the computer is made to perform any of the above-mentioned aspects or any possible operation of any of the above-mentioned aspects.
  • the perimeter detection method in the implementation is provided, and the computer-readable storage medium stores instructions, and when the instructions are run on a computer, the computer is made to perform any of the above-mentioned aspects or any possible operation of any of the above-mentioned aspects.
  • a computer program product containing instructions, which, when run on a computer, cause the computer to execute the perimeter detection method in any of the above aspects or any possible implementation of any of the above aspects.
  • Fig. 1 is a schematic block diagram of a detection system provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a perimeter detection method provided in an embodiment of the present application
  • Fig. 3 is a schematic structural block diagram of a detection device provided by an embodiment of the present application.
  • Fig. 4 is a schematic structural block diagram of a detection device provided by an embodiment of the present application.
  • the detection system provided by the embodiment of the present application is introduced.
  • the detection system is usually deployed near the perimeter along the perimeter, and is used to output an alarm in time after the perimeter is found to be intruded, so as to drive the intrusion target away from the perimeter in time, ensuring Perimeter security.
  • FIG. 1 shows a schematic diagram of a detection system provided by an embodiment of the present application.
  • the detection system includes a management platform 101 , a radar 102 , and a camera 103 .
  • the management platform 101 can control the opening and closing of the radar 102 and the camera 103 .
  • the workflow of the detection system when detecting whether the perimeter is intruded can be as follows:
  • the radar When the radar detects an intrusion target within the perimeter, the radar sends information on the intrusion target’s omnidirectional movement, lens zoom, and zoom (Pan/Tilt/Zoom, PTZ) to the camera.
  • the camera locates the intrusion target according to the received PTZ information, obtains the image frame of the intrusion target after the positioning is completed, and further determines whether the intrusion target is a real intrusion target based on the acquired image frame through a visual algorithm .
  • the detection system may also include an alarm 104, in this case, the above workflow may further include the following steps:
  • the camera controls the alarm to output an alarm prompt to prompt the intrusion target to leave the perimeter.
  • the control alarm will output the alarm prompt.
  • the camera can track the intrusion target in real time until the intrusion target leaves the perimeter.
  • the camera can report an alarm event to the management platform.
  • the alarm event includes information such as the time when the alarm event occurred and the relevant image frame that triggered the alarm event. Manage and view information related to alarm events.
  • the camera cannot participate in the secondary confirmation in all cases.
  • the camera may only obtain image frames with low resolution, which is not enough for the camera to distinguish Whether the real intrusion target is included in the image frame, in other words, the camera cannot participate in the secondary confirmation in this case, or, in the case of a camera failure, the camera cannot obtain the image frame at all, at this time, the camera participates in the secondary confirmation Confirmation is out of the question.
  • the radar detects in a higher detection sensitivity mode, it may lead to an increase in the false alarm rate.
  • the embodiment of the present application proposes a perimeter detection method, by making the radar enter the detection sensitivity mode corresponding to the camera's shooting capability according to the camera's shooting capability, for example, when the camera's shooting capability is strong, the radar enters a high detection Sensitivity mode, because the camera has a strong shooting ability and the camera will participate in the secondary confirmation, that is, the accuracy of the secondary confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate. For another example, in this solution, when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode.
  • the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false alarm rate.
  • FIG. 2 is an exemplary flow chart of the perimeter detection method 200 .
  • the marks of management platform, camera, alarm, and radar are omitted.
  • the management platform below refers to the management platform 101
  • the radar refers to the radar 102
  • the camera refers to the camera 103. .
  • Step 201 the radar determines the current detection sensitivity according to the shooting capability of the camera, which indicates the quality of the image frames acquired by the camera.
  • the camera can periodically determine its own shooting ability, and send the shooting ability to the radar through the communication connection with the radar.
  • the shooting ability represents the quality of the image frame acquired by the camera.
  • the radar determines whether there is a When an intrusion target is detected, it can be determined in which detection sensitivity mode should be used to detect whether there is an intrusion target in the perimeter according to the shooting capability of the camera sent last time from the camera distance, and then the radar can perform step 202, that is, the radar is based on In the detection sensitivity mode determined by the shooting capability of the camera, it is determined whether there is an intrusion target within the perimeter.
  • the detection sensitivity mode determined by the radar according to the shooting capability of the camera is referred to as the current detection sensitivity mode.
  • the camera can determine the shooting capability of the camera according to the current environment and the camera's own state, wherein the current environment can include factors such as current weather and current illumination, and the camera's own state can include factors such as the camera's functional state and device state,
  • the functional status of the camera may include, for example, whether the zoom function of the camera or the flashlight function is normal, and the device status of the camera may include, for example, whether the lens of the camera is worn or not.
  • the camera can determine that the shooting capability is strong. In other words, the quality of the image frames acquired by the camera under the current environment is relatively high.
  • the camera can determine that the shooting ability is weak.
  • the camera can determine that the shooting ability is weak .
  • the camera may determine that the shooting capability is weak.
  • the zoom function of the camera is damaged, resulting in the inability to focus, which will also affect the clarity of the image frame acquired by the camera.
  • the camera can determine that the shooting ability is weak regardless of whether the current environment is good or not.
  • the capability of the camera can be characterized by the following methods:
  • Various capabilities of the camera can be represented by several bits, for example, the capability of the camera can be represented by the information carried by two bits, "00" represents the capability of the camera is strong, “01” represents the capability of the camera is medium, “10” Indicates that the ability of the camera is weak.
  • the radar can determine that the camera's shooting capability is weak according to the bit information from the camera.
  • the camera can quantify various capabilities. After quantification, the various capabilities of the camera can be distinguished in a more detailed manner. For example, the value of 0 to 1 represents the strength of the camera’s capabilities. The smaller the value, the higher the capability of the camera. The weaker and the larger the value, the stronger the capability of the camera, for example, when the shooting capability of the camera is less than or equal to 0.3, it means that the capability of the camera is weak, or, when the shooting capability of the camera is between 0.3 and 0.7 When , it means that the ability of the camera is medium, or when the shooting ability of the camera is greater than or equal to 0.7, it means that the ability of the camera is strong.
  • the quantized capability of the camera may be 0.9.
  • the quantized camera capability may be 0.5.
  • the quantized camera's capability may be 0.3.
  • the quantized camera's capability may be 0.3.
  • the radar can determine that the shooting capability of the camera is weak according to the value from the camera.
  • the radar After obtaining the shooting capability of the camera, the radar can enter the detection sensitivity mode corresponding to the shooting capability of the camera according to the shooting capability of the camera.
  • the shooting capability is medium, and accordingly, the radar enters a medium detection sensitivity mode, or, the camera has relatively strong shooting capability, and correspondingly, the radar enters a high detection sensitivity mode.
  • the camera After entering the detection sensitivity mode corresponding to the shooting capability of the camera, the camera determines whether there is an intrusion target within the perimeter in the current detection sensitivity mode.
  • the radar detects the echo signal after emitting the electromagnetic wave.
  • the echo signal may be generated after the electromagnetic wave is disturbed during propagation.
  • the radar can be in the current detection sensitivity mode, It is further determined whether the echo signal is generated after the electromagnetic wave is reflected by the target in the perimeter.
  • an object that triggers electromagnetic wave reflection is called a target.
  • the radar determines the moving speed of the target according to the received echo signal, and can determine the strength of the received echo signal. Further, the radar determines the number of times the echo signal is received continuously. According to the moving speed of the target, The strength of the echo signal and the number of times the echo signal is received continuously determine the confidence level that the target is an intrusion target.
  • the radar After obtaining the confidence that the target is an intrusion target, the radar compares the confidence that the target is an intrusion target with the first confidence threshold in the current detection sensitivity mode, if the confidence that the target is an intrusion target is greater than or equal to the current detection sensitivity mode
  • the radar can determine that the target is an intrusion target, in other words, the radar determines that there is an intrusion target within the perimeter.
  • different detection sensitivity modes represent different first confidence thresholds, and the first confidence threshold in the high detection sensitivity mode is smaller than the first confidence threshold in the medium detection sensitivity mode with the first confidence threshold in low detection sensitivity mode.
  • the shooting ability of the camera is weak, and the radar enters the low detection sensitivity mode.
  • the first confidence threshold in this detection sensitivity mode can be 85%.
  • the radar determines that the moving speed of the target is 2,000 based on the received echo signal. m/h, the strength of the echo signal is 5 square radar cross section (radar cross section, RCS) and the number of times the echo signal is received continuously is 10 times. Intensity and the number of times the echo signal is received consecutively, the confidence level of determining that the target is an intrusion target is 88%. In this case, since the confidence level of the target is an intrusion target is greater than the first confidence level in the low detection sensitivity mode Threshold, so the radar can determine the presence of intrusion targets within the perimeter.
  • the camera has a strong shooting ability, and the radar enters the high detection sensitivity mode.
  • the confidence threshold in this detection sensitivity mode can be 60%.
  • the radar determines that the moving speed of the target is 0.5 kilometers according to the received echo signal. / hour, the strength of the echo signal is 2 square radar cross section (radar cross section, RCS) and the number of times the echo signal is received continuously is 6 times. And the number of times the echo signal is received continuously, it can be determined that the target is an intrusion target with a confidence level of 65%.
  • the radar can determine the presence of intrusion targets within the perimeter.
  • the radar can execute step 203 .
  • the radar can also determine the confidence that the target is an intrusion target based on the distance between the target and the radar, the strength of the echo signal, and the number of times the echo signal is received continuously. Applications are not limited to this.
  • step 203 the radar sends a notification message to the camera, and the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  • the radar After the radar determines that there is an intrusion target in the perimeter, it can send a notification message to the camera.
  • the notification message instructs the radar to determine whether there is a real intrusion target in the perimeter.
  • the camera determines that there is an intrusion target in the perimeter according to the notification message, and then performs step 204 .
  • Step 204 in the case that there is an intrusion target in the perimeter, the camera determines whether there is a real intrusion target in the perimeter.
  • the camera can determine whether there is a real intrusion target in the perimeter through the following methods:
  • the notification message sent by the radar to the camera can carry the confidence that the target is an intrusion target, and the camera can determine whether the intrusion target is a real intrusion target based on the confidence that the target is an intrusion target and the preset second confidence threshold. For example, if the confidence that the target is an intrusion target is greater than or equal to the preset second confidence threshold, the camera determines that the intrusion target is a real intrusion target. It is worth mentioning that the preset second confidence threshold may be determined by the camera according to the degree of trust in the detection result of the radar.
  • the confidence that the target is an intrusion target is 99%, and the preset second confidence threshold is 95%. In this case, since the confidence that the target is an intrusion target is greater than the preset second confidence threshold, therefore , the camera can determine that there is a real intrusion target within the perimeter.
  • the notification message sent by the radar to the camera can carry the orientation information of the intrusion target.
  • the orientation information of the intrusion target can be the PTZ information of the intrusion target.
  • the camera can obtain the Regarding the image frame of the intrusion target, after acquiring the image frame, the camera can determine whether there is an intrusion target in the image frame through a visual algorithm. If there is an intrusion target in the image frame, the camera can determine that the intrusion target detected by the radar is a real intrusion Target.
  • the notification message sent by the radar to the camera can carry the confidence level of the target as an intrusion target and the orientation information of the intrusion target. If the confidence level of the target is an intrusion target is less than the preset second confidence threshold, the camera will , to obtain the image frame about the intrusion target, after obtaining the image frame, the camera can determine whether there is an intrusion target in the image frame through a visual algorithm, if there is an intrusion target in the image frame, the camera can determine that the intrusion target detected by the radar is real intrusion target.
  • the detection system includes an alarm
  • the camera can control the alarm to output an alarm prompt to drive the intrusion target out of the perimeter.
  • the camera can perform step 205:
  • the alarm device sends a control instruction, and the control instruction instructs the alarm device to output an alarm prompt, and the alarm device executes step 206 after receiving the control instruction from the camera.
  • Step 206 the alarm device outputs an alarm prompt.
  • the radar can consider that the target detected by itself is not an intrusion target, in other words, the echo signal detected by the radar is generated after the electromagnetic wave is disturbed during propagation. At this time, the radar can determine that there is no intrusion target in the perimeter.
  • the camera sends a notification message, that is, the detection is terminated.
  • the radar can also determine the current detection sensitivity mode according to whether the camera is currently faulty. For example, if there is a heartbeat signal between the radar and the camera, the radar can detect the heartbeat signal between it and the camera. To determine whether the camera is currently faulty, for example, when the radar does not detect a heartbeat signal, it can be determined that the camera is currently in a faulty state, and then it can be determined that the camera is currently unable to obtain image frames. In this case, the radar can enter a low detection sensitivity mode , and the camera will not be notified for secondary confirmation.
  • the notification message may not only carry the confidence that the target is an intrusion target, but also carry the orientation information of the intrusion target.
  • the camera can also acquire image frames about the intrusion target, and the acquired image frames about the intrusion target can be uploaded to the alarm platform as evidence.
  • Step 201, step 202, and step 204 are not limited in this embodiment of the present application.
  • perimeter detection method provided in the embodiment of the present application can be applied not only to railway boundary protection, but also to any park-type and perimeter-type perimeter protection.
  • the radar in the embodiment of the present application may be a millimeter-wave radar or other types of radar such as lidar, which is not limited in this application.
  • the perimeter detection method provided in the embodiment of the present application can also be applied to a detection system including a vibrating optical fiber and a camera.
  • the vibrating optical fiber can determine the current detection sensitivity according to the shooting capability of the camera, so as to achieve the same beneficial effect.
  • Fig. 3 is a schematic structural block diagram of a detection device 300 provided by an embodiment of the present application.
  • the detection device 300 includes: a processing module 310 .
  • the processing module 310 is configured to: determine the current detection sensitivity according to the shooting capability of the camera, where the shooting capability of the camera indicates the quality of the image frames acquired by the camera;
  • the processing module 310 is further configured to: under the current detection sensitivity, determine whether there is an intrusion target within the perimeter.
  • the detection device 300 in the embodiment of the present application can be realized by an application-specific integrated circuit (ASIC), or can be realized by a programmable logic device (programmable logic device, PLD), and the above-mentioned PLD can be Complex programmable logical device (CPLD), field-programmable gate array (FPGA), generic array logic (GAL) or any combination thereof.
  • ASIC application-specific integrated circuit
  • PLD programmable logic device
  • CPLD Complex programmable logical device
  • FPGA field-programmable gate array
  • GAL generic array logic
  • the shooting capability of the camera is determined by the camera according to the current environment and the camera's own state.
  • the current environment includes at least one of current weather and current lighting
  • the state of the camera itself includes at least one of a function state and a device state of the camera.
  • the processing module is specifically configured to: determine the confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to the first confidence level under the current detection sensitivity Threshold to determine the presence of intrusion targets within the perimeter.
  • the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the first confidence threshold under the current detection sensitivity increases with The camera's shooting ability is reduced and increased.
  • the detection device 300 if the detection device 300 determines that there is an intrusion target within the perimeter, the detection device 300 further includes: a sending module 320, configured to send a notification message to the camera, the The notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  • a sending module 320 configured to send a notification message to the camera, the The notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  • the detection device 300 may correspond to the implementation of the method described in the embodiment of the present application, and the above-mentioned and other operations and/or functions of each unit in the detection device 300 are to realize the corresponding flow of the method in FIG. 2 , for the sake of brevity, it is not repeated here.
  • Fig. 4 is a schematic structural block diagram of a detection device 400 provided by an embodiment of the present application.
  • the detection device 400 includes: a processor 410 , a memory 420 , a communication interface 430 , and a bus 440 .
  • the processor 410 in the detection device 400 shown in FIG. 4 may correspond to the processing module 310 in the detection device 300 in FIG. 3 .
  • the communication interface 430 in the detection device 400 may correspond to the sending module 320 in the detection device 300 .
  • the processor 410 may be connected to the memory 420 .
  • the memory 420 can be used to store the program codes and data. Therefore, the memory 420 may be a storage unit inside the processor 410, or an external storage unit independent of the processor 410, or may include a storage unit inside the processor 410 and an external storage unit independent of the processor 410. part.
  • the detection device 400 may also include a bus 440 .
  • the memory 420 and the communication interface 430 may be connected to the processor 410 through the bus 440 .
  • the bus 440 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus 440 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one line is used in FIG. 4 , but it does not mean that there is only one bus or one type of bus.
  • the processor 410 may be a central processing unit (central processing unit, CPU).
  • the processor can also be other general-purpose processors, digital signal processors (digital signal processors, DSPs), application specific integrated circuits (application specific integrated circuits, ASICs), off-the-shelf programmable gate arrays (field programmable gate arrays, FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the processor 410 adopts one or more integrated circuits for executing related programs, so as to implement the technical solutions provided by the embodiments of the present application.
  • the memory 420 may include read-only memory and random-access memory, and provides instructions and data to the processor 410 .
  • a portion of processor 410 may also include non-volatile random access memory.
  • processor 410 may also store device type information.
  • the processor 410 executes computer-executed instructions in the memory 420 to utilize hardware resources in the detection device 400 to perform the operation steps of the above method.
  • the detection device 400 may correspond to the detection device 300 in the embodiment of the present application, and may correspond to the corresponding subject performing the method shown in FIG. 2 according to the embodiment of the present application, and the detection device 400
  • the above-mentioned and other operations and/or functions of each module in FIG. 2 are respectively for realizing the corresponding flow of the method in FIG. 2 , and for the sake of brevity, details are not repeated here.
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium stores computer instructions. When the computer instructions are run on the detection device, the detection device executes the perimeter detection method provided by the embodiment of the present application.
  • the present application also provides a computer program product, which causes the computer to execute the perimeter detection method provided in the embodiment of the present application when the computer program product is run on the computer.
  • the above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations.
  • the above-described embodiments may be implemented in whole or in part in the form of computer program products.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage such as a server, a data center, etc. that includes one or more sets of available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media.
  • the semiconductor medium may be a solid state drive (SSD).
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a memory (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
  • the above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations.
  • the above-described embodiments may be implemented in whole or in part in the form of computer program products.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage such as a server, a data center, etc. that includes one or more sets of available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media.
  • the semiconductor medium may be a solid state drive (SSD).
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a memory (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

A perimeter detection method (200) and apparatus, and a device and a system. The perimeter detection method (200) is applicable to a detection system, which comprises a radar (102) and a camera (103). The method comprises: a radar (102) entering a corresponding detection sensitivity mode according to a photographing capability of a camera (103); under the detection sensitivity, the radar (102) determining whether there is an intrusion target within a perimeter; and if there is an intrusion target within the perimeter, the camera (103) determining again whether the intrusion target is a real intrusion target. Specifically, when the camera (103) has a relatively good photographing capability, the radar enters a high detection sensitivity mode, and in this case, the overall false negative rate can be reduced by means of improving the sensitivity of the radar (102); and when the camera (103) has a relatively weak photographing capability or cannot acquire an image frame, the radar (102) enters a relatively low detection sensitivity mode, and in this case, the overall false positive rate can be reduced by means of reducing the detection sensitivity of the radar (102). By means of the perimeter detection method (200), the radar (102) can enter different detection sensitivity modes according to photographing capability of the camera (103), thereby obtaining both a low false positive rate and a low false negative rate.

Description

周界检测方法、装置、设备与系统Perimeter detection method, device, equipment and system
本申请要求于2021年7月8日提交国家知识产权局、申请号为202110773755.5、申请名称为“一种用于雷视融合的雷达灵敏度自适应技术”的中国专利申请的优先权,并且要求于2021年9月8日提交国家知识产权局、申请号为202111051346.0、申请名称为“周界检测方法、装置、设备与系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application submitted to the State Intellectual Property Office on July 8, 2021, with the application number 202110773755.5, and the application title is "A Radar Sensitivity Adaptive Technology for Lesion Vision Fusion", and claims the Priority of a Chinese patent application with application number 202111051346.0 and titled "Perimeter detection method, device, device and system" filed with the State Intellectual Property Office on September 8, 2021, the entire contents of which are incorporated by reference in this application .
技术领域technical field
本申请涉及信息技术领域,并且更具体地,涉及周界检测方法、装置、设备与系统。The present application relates to the field of information technology, and more specifically, to a perimeter detection method, device, device and system.
背景技术Background technique
周界(perimeter)防护是铁路线路安全保障的重要组成。近些年来,由于铁路周界在被入侵后没有得到及时告警,已经导致多次事故,例如,造成列车被逼停、侧翻等等,严重影响列车的正常运营,因此,需要有满足铁路行业现状的解决方案来确保列车的运营安全。Perimeter protection is an important component of railway line security. In recent years, because the railway perimeter has not been warned in time after being invaded, many accidents have been caused, for example, the train was forced to stop, roll over, etc., which seriously affected the normal operation of the train. Therefore, there is a need to meet the needs of the railway industry Current solutions to ensure the safety of train operations.
雷达技术作为铁路周界防护技术,具备探测范围广、探测灵敏度高,建设成本和维护成本相对较低的优点,已经成为一个主流的技术选择。As a railway perimeter protection technology, radar technology has the advantages of wide detection range, high detection sensitivity, relatively low construction and maintenance costs, and has become a mainstream technology choice.
对于铁路周界防护,要优先保证极低的漏报率,因此,雷达一般会工作在较高的检测灵敏度模式下,从而降低漏报率。然而,当雷达工作在较高的检测灵敏度模式下时,容易将一些非入侵的目标当成入侵目标,从而产生告警,而这会增大误报率,频繁误报会使得运维人员疲于检查,影响基于雷达技术的周界防护系统的推广。For railway perimeter protection, it is necessary to give priority to ensuring a very low false alarm rate. Therefore, radars generally work in a higher detection sensitivity mode to reduce the false alarm rate. However, when the radar works in a higher detection sensitivity mode, it is easy to regard some non-invading targets as intrusion targets, thus generating an alarm, which will increase the false alarm rate, and frequent false alarms will make the operation and maintenance personnel tired of checking , affecting the promotion of perimeter protection systems based on radar technology.
发明内容Contents of the invention
本申请实施例提供了一种周界检测方法、装置、设备与系统,该方法通过使雷达根据摄像机的拍摄能力进入摄像机的拍摄能力对应的检测灵敏度模式,当雷达在当前检测灵敏度模式下检测时,可以降低漏报率与误报率。The embodiment of the present application provides a perimeter detection method, device, equipment and system. The method enables the radar to enter the detection sensitivity mode corresponding to the camera's shooting capability according to the shooting capability of the camera. When the radar detects in the current detection sensitivity mode , can reduce the false positive rate and false negative rate.
第一方面,提供了一种周界检测方法,该方法应用于包括雷达、摄像机的检测系统,摄像机与雷达之间存在通信连接。首先,雷达根据摄像机的拍摄能力,确定当前检测灵敏度,其中,摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;接着,所述雷达在当前检测灵敏度下,确定周界内是否存在入侵目标;最后,若所述周界内存在入侵目标,摄像机确定所述入侵目标是否是真实的入侵目标。In a first aspect, a perimeter detection method is provided, the method is applied to a detection system including a radar and a camera, and there is a communication connection between the camera and the radar. First, the radar determines the current detection sensitivity according to the shooting capability of the camera, wherein the shooting capability of the camera indicates the quality of the image frame acquired by the camera; then, the radar determines whether there is an intrusion within the perimeter under the current detection sensitivity target; finally, if there is an intrusion target within the perimeter, the camera determines whether the intrusion target is a real intrusion target.
基于上述技术方案,雷达可以根据摄像机的当前拍摄能力进入到对应的检测灵敏度模式,例如,当摄像机的拍摄能力较强时,雷达进入高检测灵敏度模式,由于摄像机的拍摄能力较强且摄像机会参与二次确认,也就是摄像机的二次确认的准确率会更高,因此,此时提高雷达灵敏度能够降低整体的漏报率。再例如,本方案当摄像机的拍摄能力较弱或者不能获取图像帧时,雷达进入相对较低的检测灵敏度模式,由于摄像机的拍摄能力较弱甚至无法二次确认时,摄像机的二次确认的准确率会较低,此时降低雷达的检测灵敏度能够降低整体的误报率。因此,本方案中的雷达可以根据摄像机的二次确认的拍摄能力进入不同的检测灵敏度模式,取得低误报率和低漏报率的双赢。Based on the above technical solution, the radar can enter the corresponding detection sensitivity mode according to the current shooting ability of the camera. For example, when the shooting ability of the camera is strong, the radar enters the high detection sensitivity mode. Since the shooting ability of the camera is strong and the camera will participate The second confirmation, that is, the accuracy of the second confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate. For another example, in this solution, when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode. Because the camera's shooting ability is weak or even cannot be confirmed twice, the accuracy of the camera's second confirmation The rate will be low, at this time, reducing the detection sensitivity of the radar can reduce the overall false alarm rate. Therefore, the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false alarm rate.
值得一提的是,在本申请实施例中,检测灵敏度模式与检测灵敏度的含义是相同的,换句话说,在本申请实施例中,检测灵敏度模式与检测灵敏度之间可以相互替换。结合第一方面,在第一方面的某些实现方式中,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。It is worth mentioning that in the embodiment of the present application, the detection sensitivity mode and the detection sensitivity have the same meaning. In other words, in the embodiment of the present application, the detection sensitivity mode and the detection sensitivity can be replaced with each other. With reference to the first aspect, in some implementation manners of the first aspect, the shooting capability of the camera is determined by the camera according to a current environment and a state of the camera itself.
基于上述技术方案,通过使摄像机根据当前环境与摄像机的自身状态确定摄像机的拍摄能力,从而将拍摄能力与摄像机获取到的图像帧的质量关联起来,由于雷达的当前检测灵敏度模式本质上取决于摄像机获取到的图像帧的质量,因此,通过将拍摄能力与摄像机获取到的图像帧的质量关联起来,使得雷达可以根据摄像机的拍摄能力确定当前的检测灵敏度模式。Based on the above technical solution, by making the camera determine the shooting capability of the camera according to the current environment and the camera's own state, the shooting capability is associated with the quality of the image frame acquired by the camera. Since the current detection sensitivity mode of the radar essentially depends on the camera The quality of the captured image frames. Therefore, by associating the shooting capability with the quality of the captured image frames of the camera, the radar can determine the current detection sensitivity mode according to the shooting capability of the camera.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中的至少一种。In combination with the first aspect and the above implementation manners, in some implementation manners of the first aspect, the current environment includes at least one of current weather and current illumination, and the camera's own state includes the camera's functional status and at least one of the device states.
基于上述技术方案,通过使摄像机根据当前天气、当前光照、摄像机的功能状态、摄像机的器件状态确定摄像机的拍摄能力,由于当前天气、当前光照、摄像机的功能状态、摄像机的器件状态均会对摄像机获取到的图像帧的质量造成影响,因此,摄像机根据当前天气、当前光照、摄像机的功能状态、摄像机的器件状态确定的摄像机的拍摄能力与摄像机在当前的真实能力更贴近。Based on the above technical solution, by making the camera determine the shooting capability of the camera according to the current weather, current light, the functional state of the camera, and the device state of the camera, the current weather, current light, the functional state of the camera, and the device state of the camera will all affect the camera The quality of the acquired image frames is affected. Therefore, the shooting capability of the camera determined by the camera according to the current weather, current lighting, functional status of the camera, and device status of the camera is closer to the real capability of the camera at the moment.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标,包括:所述雷达确定所述周界内存在入侵目标的置信度;如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,所述雷达确定周界内存在入侵目标。需要说明的是,该实现方式中,所述雷达确定所述周界内存在入侵目标的置信度中的“置信度”,是用于指示在当前周界中存在入侵目标的可能性。With reference to the first aspect and the above-mentioned implementation manners, in some implementation manners of the first aspect, the radar determining whether there is an intrusion target in the perimeter under the current detection sensitivity includes: the radar determining the perimeter A confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that an intrusion target exists within the perimeter. It should be noted that, in this implementation manner, the "confidence level" among the confidence levels of intrusion targets in the perimeter determined by the radar is used to indicate the possibility of intrusion targets in the current perimeter.
基于上述技术方案,只有当周界内存在入侵目标的置信度大于当前检测灵敏度下的第一置信度阈值时,雷达才会确定周界内存在入侵目标,换句话说,只有当周界内存在入侵目标的置信度大于当前检测灵敏度下的第一置信度阈值时,摄像机才会确定入侵目标是否是真实的入侵目标,通过设置第一置信度阈值,使得可以过滤掉一些有可能会被误当做入侵目标的非入侵的目标,从而可以减少摄像机的工作量。Based on the above technical solution, only when the confidence level of intrusion targets in the perimeter is greater than the first confidence threshold under the current detection sensitivity, the radar will determine that there are intrusion targets in the perimeter, in other words, only when there are When the confidence of the intrusion target is greater than the first confidence threshold under the current detection sensitivity, the camera will determine whether the intrusion target is a real intrusion target. By setting the first confidence threshold, it is possible to filter out some Intrusion targets are non-intrusion targets, thereby reducing the workload of the camera.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。With reference to the first aspect and the above implementation manners, in some implementation manners of the first aspect, the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the current detection sensitivity The first confidence threshold under the sensitivity increases as the shooting capability of the camera decreases.
基于上述技术方案,通过使当前检测灵敏度下的第一置信度阈值随着摄像机的拍摄能力的增强而减小,并且使得当前检测灵敏度下的第一置信度阈值随着摄像机的拍摄能力的减弱而增大,从而使得当前检测灵敏度下的置信度阈值能够与当前检测灵敏度相匹配。Based on the above technical solution, by making the first confidence threshold under the current detection sensitivity decrease as the camera’s shooting ability increases, and making the first confidence threshold under the current detection sensitivity decrease with the camera’s shooting ability weakening Increase, so that the confidence threshold under the current detection sensitivity can match the current detection sensitivity.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,如果所述雷达确定所述周界内存在入侵目标,所述方法还包括:所述雷达向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。With reference to the first aspect and the above implementation manners, in some implementation manners of the first aspect, if the radar determines that there is an intrusion target within the perimeter, the method further includes: the radar sends a notification message to the camera , the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
基于上述技术方案,在雷达确定周界内存在入侵目标时,向摄像机发送通知消息,使得摄像机可以在通知消息的提示下,确定入侵目标是否是真实的入侵目标。Based on the above technical solution, when the radar determines that there is an intrusion target in the perimeter, it sends a notification message to the camera, so that the camera can determine whether the intrusion target is a real intrusion target under the prompt of the notification message.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述通知消息携带所述周界内存在入侵目标的置信度,所述摄像机确定所述入侵目标是否是真实的入侵目标,包括:如果所述置信度大于或等于预设的第二置信度阈值,所述摄像机确定所述入侵目标是真实的入侵目标。With reference to the first aspect and the above implementation manners, in some implementation manners of the first aspect, the notification message carries a confidence level of an intrusion target within the perimeter, and the camera determines whether the intrusion target is a real intrusion The target includes: if the confidence is greater than or equal to a preset second confidence threshold, the camera determines that the intrusion target is a real intrusion target.
基于上述技术方案,当周界内存在入侵目标的置信度大于或等于预设的第二置信度阈值时,摄像机确定入侵目标是真实的入侵目标,从而省去摄像机获取图像帧的步骤,减少摄像机的工作量。Based on the above technical solution, when the confidence of the intrusion target in the perimeter is greater than or equal to the preset second confidence threshold, the camera determines that the intrusion target is a real intrusion target, thereby eliminating the step of the camera acquiring image frames and reducing the number of camera workload.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述通知消息携带所述周界内存在入侵目标的置信度与所述入侵目标的方位信息,所述摄像机确定所述入侵目标是否是真实的入侵目标,包括:如果所述置信度小于预设的第二置信度阈值,所述摄像机根据获取到的关于所述入侵目标的图像帧,确定所述入侵目标是否是真实的入侵目标,所述关于所述入侵目标的图像帧是根据所述入侵目标的方位信息获取的。With reference to the first aspect and the above implementation manners, in some implementation manners of the first aspect, the notification message carries the confidence level of the intrusion target in the perimeter and the orientation information of the intrusion target, and the camera determines that the intrusion target Whether the intrusion target is a real intrusion target includes: if the confidence level is less than a preset second confidence threshold, the camera determines whether the intrusion target is For a real intrusion target, the image frame about the intrusion target is acquired according to the orientation information of the intrusion target.
基于上述技术方案,当周界内存在入侵目标的置信度小于预设的第二置信度阈值时,通过在通知消息中携带入侵目标的方位信息,使得摄像机可以根据入侵目标的方位信息获取关于入侵目标的图像帧,进而根据关于入侵目标的图像帧,确定入侵目标是否是真实的入侵目标,从而在周界内存在入侵目标的置信度小于第二预设的置信度阈值时,提高检测结果的准确性。Based on the above technical solution, when the confidence of the intrusion target in the perimeter is less than the preset second confidence threshold, by carrying the orientation information of the intrusion target in the notification message, the camera can obtain information about the intrusion based on the orientation information of the intrusion target. The image frame of the target, and then according to the image frame about the intrusion target, determine whether the intrusion target is a real intrusion target, so that when the confidence of the intrusion target in the perimeter is less than the second preset confidence threshold, the accuracy of the detection result is improved. accuracy.
结合第一方面和上述实现方式,在第一方面的某些实现方式中,所述检测系统还包括报警器,如果所述摄像机确定所述入侵目标是真实的入侵目标,所述方法还包括:所述摄像机控制所述报警器输出告警提示,所述告警提示用于提示所述入侵目标离开所述周界。With reference to the first aspect and the above implementation manners, in some implementation manners of the first aspect, the detection system further includes an alarm, and if the camera determines that the intrusion target is a real intrusion target, the method further includes: The camera controls the alarm device to output an alarm prompt, and the alarm prompt is used to prompt the intrusion target to leave the perimeter.
基于上述技术方案,在摄像机确定入侵目标是真实的入侵目标后,摄像机控制报警器输出告警提示,从而通过报警器将入侵目标驱离出周界。Based on the above technical solution, after the camera determines that the intrusion target is a real intrusion target, the camera controls the alarm to output an alarm prompt, thereby driving the intrusion target out of the perimeter through the alarm.
第二方面,提供了一种周界检测方法,所述方法包括:雷达根据摄像机的拍摄能力,确定当前检测灵敏度,所述摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标。In a second aspect, a perimeter detection method is provided, the method comprising: the radar determines the current detection sensitivity according to the shooting capability of the camera, and the shooting capability of the camera indicates the quality of the image frame acquired by the camera; the Under the current detection sensitivity, the radar determines whether there is an intrusion target within the perimeter.
基于上述技术方案,通过使雷达根据摄像机的拍摄能力进入摄像机的拍摄能力对应的检测灵敏度模式,例如,当摄像机的拍摄能力较强时,雷达进入高检测灵敏度模式,由于摄像机的拍摄能力较强且摄像机会参与二次确认,也就是摄像机的二次确认的准确率会更高,因此,此时提高雷达灵敏度能够降低整体的漏报率。再例如,本方案当摄像机的拍摄能力较弱或者不能获取图像帧时,雷达进入相对较低的检测灵敏度模式,由于摄像机的拍摄能力较弱甚至无法二次确认时,摄像机的二次确认的准确率会较低,此时降低雷达的检测灵敏度能够降低整体的误报率。因此,本方案中的雷达可以根据摄像机的二次确认的拍摄能力进入不同的检测灵敏度模式,取得低误报率和低漏报率的双赢。Based on the above technical solution, by making the radar enter the detection sensitivity mode corresponding to the shooting capability of the camera according to the shooting capability of the camera, for example, when the shooting capability of the camera is strong, the radar enters the high detection sensitivity mode. The camera will participate in the secondary confirmation, that is, the accuracy of the secondary confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate. For another example, in this solution, when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode. Because the camera's shooting ability is weak or even cannot be confirmed twice, the accuracy of the camera's second confirmation The rate will be low, at this time, reducing the detection sensitivity of the radar can reduce the overall false alarm rate. Therefore, the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false negative rate.
结合第二方面,在第二方面的某些实现方式中,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。With reference to the second aspect, in some implementation manners of the second aspect, the shooting capability of the camera is determined by the camera according to a current environment and a state of the camera itself.
基于上述技术方案,通过使摄像机根据当前环境与摄像机的自身状态确定摄像机的拍摄能力,从而将拍摄能力与摄像机获取到的图像帧的质量关联起来,由于雷达的当前检测灵敏度模式本质上取决于摄像机获取到的图像帧的质量,因此,通过将拍摄能力与摄像机 获取到的图像帧的质量关联起来,使得雷达可以根据摄像机的拍摄能力确定当前的检测灵敏度模式。Based on the above technical solution, by making the camera determine the shooting capability of the camera according to the current environment and the camera's own state, the shooting capability is associated with the quality of the image frame acquired by the camera. Since the current detection sensitivity mode of the radar essentially depends on the camera The quality of the captured image frames. Therefore, by associating the shooting capability with the quality of the captured image frames of the camera, the radar can determine the current detection sensitivity mode according to the shooting capability of the camera.
结合第二方面和上述实现方式,在第二方面的某些实现方式中,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中的至少一种。In combination with the second aspect and the above implementation manners, in some implementation manners of the second aspect, the current environment includes at least one of current weather and current illumination, and the state of the camera itself includes the functional state and at least one of the device states.
基于上述技术方案,通过使摄像机根据当前天气、当前光照、摄像机的功能状态、摄像机的器件状态确定摄像机的拍摄能力,由于当前天气、当前光照、摄像机的功能状态、摄像机的器件状态均会对摄像机获取到的图像帧的质量造成影响,因此,摄像机根据当前天气、当前光照、摄像机的功能状态、摄像机的器件状态确定的摄像机的拍摄能力与摄像机在当前的真实能力更贴近。Based on the above technical solution, by making the camera determine the shooting capability of the camera according to the current weather, current light, the functional state of the camera, and the device state of the camera, the current weather, current light, the functional state of the camera, and the device state of the camera will all affect the camera The quality of the acquired image frames is affected. Therefore, the shooting capability of the camera determined by the camera according to the current weather, current lighting, functional status of the camera, and device status of the camera is closer to the real capability of the camera at the moment.
结合第二方面和上述实现方式,在第二方面的某些实现方式中,所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标,包括:所述雷达确定所述周界内存在入侵目标的置信度;如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,所述雷达确定周界内存在入侵目标。With reference to the second aspect and the above-mentioned implementation manners, in some implementation manners of the second aspect, the radar determining whether there is an intrusion target in the perimeter under the current detection sensitivity includes: the radar determining the perimeter A confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that an intrusion target exists within the perimeter.
基于上述技术方案,只有当周界内存在入侵目标的置信度大于当前检测灵敏度下的第一置信度阈值时,雷达才会确定周界内存在入侵目标,换句话说,只有当周界内存在入侵目标的置信度大于当前检测灵敏度下的第一置信度阈值时,摄像机才会确定入侵目标是否是真实的入侵目标,通过设置第一置信度阈值,使得可以过滤掉一些有可能会被误当做入侵目标的非入侵的目标,从而可以减少摄像机的工作量。Based on the above technical solution, only when the confidence level of intrusion targets in the perimeter is greater than the first confidence threshold under the current detection sensitivity, the radar will determine that there are intrusion targets in the perimeter, in other words, only when there are When the confidence of the intrusion target is greater than the first confidence threshold under the current detection sensitivity, the camera will determine whether the intrusion target is a real intrusion target. By setting the first confidence threshold, it is possible to filter out some Intrusion targets are non-intrusion targets, thereby reducing the workload of the camera.
结合第二方面和上述实现方式,在第二方面的某些实现方式中,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。With reference to the second aspect and the above implementation manners, in some implementation manners of the second aspect, the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the current detection sensitivity The first confidence threshold under the sensitivity increases as the shooting capability of the camera decreases.
基于上述技术方案,通过使当前检测灵敏度下的第一置信度阈值随着摄像机的拍摄能力的增强而减小,并且使得当前检测灵敏度下的第一置信度阈值随着摄像机的拍摄能力的减弱而增大,从而使得当前检测灵敏度下的置信度阈值能够与当前检测灵敏度相匹配。Based on the above technical solution, by making the first confidence threshold under the current detection sensitivity decrease as the camera’s shooting ability increases, and making the first confidence threshold under the current detection sensitivity decrease with the camera’s shooting ability weakening Increase, so that the confidence threshold under the current detection sensitivity can match the current detection sensitivity.
结合第二方面和上述实现方式,在第二方面的某些实现方式中,如果所述雷达确定所述周界内存在入侵目标,所述方法还包括:所述雷达向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。With reference to the second aspect and the above implementation manners, in some implementation manners of the second aspect, if the radar determines that there is an intrusion target within the perimeter, the method further includes: the radar sends a notification message to the camera , the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
基于上述技术方案,在雷达确定周界内存在入侵目标时,向摄像机发送通知消息,使得摄像机可以在通知消息的提示下,确定入侵目标是否是真实的入侵目标。Based on the above technical solution, when the radar determines that there is an intrusion target in the perimeter, it sends a notification message to the camera, so that the camera can determine whether the intrusion target is a real intrusion target under the prompt of the notification message.
第三方面,本申请提供了一种检测装置,用于执行上述第二方面或第二方面的任一可能的实现方式中的周界检测方法。具体地,该装置可以包括用于执行第二方面或第二方面的任一可能的实现方式中的周界检测方法的单元。In a third aspect, the present application provides a detection device configured to implement the perimeter detection method in the second aspect or any possible implementation manner of the second aspect. Specifically, the apparatus may include a unit for performing the second aspect or the perimeter detection method in any possible implementation manner of the second aspect.
第四方面,提供一种检测设备,该设备包括存储器与处理器。该存储器用于存储指令;该处理器执行该存储器存储的指令,使得该设备执行第二方面或第二方面的任一可能的实现方式中的周界检测方法。In a fourth aspect, a detection device is provided, and the device includes a memory and a processor. The memory is used to store instructions; the processor executes the instructions stored in the memory, so that the device executes the second aspect or the perimeter detection method in any possible implementation manner of the second aspect.
第五方面,一种检测系统,包括雷达、摄像机与报警器,该雷法用于执行上述任一方面或上述任一方面的任一可能的实现方式中由雷达执行的方法,该摄像机用于执行上述任一方面或上述任一方面的任一可能的实现方式中由摄像机执行的方法,该报警器用于执行 上述任一方面或上述任一方面的任一可能的实现方式中由报警器执行的方法。In the fifth aspect, a detection system includes a radar, a camera, and an alarm, and the radar method is used to perform the method performed by the radar in any of the above-mentioned aspects or any possible implementation of any of the above-mentioned aspects, and the camera is used for Execute the method performed by the camera in any of the above aspects or in any possible implementation of any of the above aspects, and the alarm is used to perform any of the above aspects or in any possible implementation of any of the above aspects. Executed by the alarm Methods.
第六方面,提供一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当该指令在计算机上运行时,使得计算机执行上述任一方面或上述任一方面的任一可能的实现方式中的周界检测方法。In a sixth aspect, a computer-readable storage medium is provided, and the computer-readable storage medium stores instructions, and when the instructions are run on a computer, the computer is made to perform any of the above-mentioned aspects or any possible operation of any of the above-mentioned aspects. The perimeter detection method in the implementation.
第七方面,提供一种包含指令的计算机程序产品,当该指令在计算机上运行时,使得计算机执行上述任一方面或上述任一方面的任一可能的实现方式中的周界检测方法。In a seventh aspect, there is provided a computer program product containing instructions, which, when run on a computer, cause the computer to execute the perimeter detection method in any of the above aspects or any possible implementation of any of the above aspects.
本申请在上述各方面提供的实现方式的基础上,还可以进行进一步组合以提供更多实现方式。On the basis of the implementation manners provided in the foregoing aspects, the present application may further be combined to provide more implementation manners.
附图说明Description of drawings
图1是本申请实施例提供的检测系统的示意性框图;Fig. 1 is a schematic block diagram of a detection system provided by an embodiment of the present application;
图2是本申请实施例提供的周界检测方法的示意性流程图;FIG. 2 is a schematic flowchart of a perimeter detection method provided in an embodiment of the present application;
图3是本申请实施例提供的检测装置的示意性结构框图;Fig. 3 is a schematic structural block diagram of a detection device provided by an embodiment of the present application;
图4是本申请实施例提供的检测设备的示意性结构框图。Fig. 4 is a schematic structural block diagram of a detection device provided by an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
首先对本申请实施例提供的检测系统进行介绍,该检测系统通常沿着周界部署在周界附近,用于在发现周界被入侵后及时输出告警,从而将入侵目标及时驱离周界,保证周界安全。First, the detection system provided by the embodiment of the present application is introduced. The detection system is usually deployed near the perimeter along the perimeter, and is used to output an alarm in time after the perimeter is found to be intruded, so as to drive the intrusion target away from the perimeter in time, ensuring Perimeter security.
图1示出了本申请实施例提供的检测系统的架构示意图。如图1所示,该检测系统包括管理平台101、雷达102、摄像机103,摄像机103与雷达102之间存在通信连接,管理平台101可以控制雷达102、摄像机103的开启与关闭。FIG. 1 shows a schematic diagram of a detection system provided by an embodiment of the present application. As shown in FIG. 1 , the detection system includes a management platform 101 , a radar 102 , and a camera 103 . There is a communication connection between the camera 103 and the radar 102 . The management platform 101 can control the opening and closing of the radar 102 and the camera 103 .
检测系统在检测周界是否被入侵时的工作流程可以如下:The workflow of the detection system when detecting whether the perimeter is intruded can be as follows:
(1)当雷达在周界内检测到入侵目标时,雷达通过与摄像机之间的通信连接将该入侵目标的全方位移动及镜头变倍、变焦(Pan/Tilt/Zoom,PTZ)信息发送至摄像机。(1) When the radar detects an intrusion target within the perimeter, the radar sends information on the intrusion target’s omnidirectional movement, lens zoom, and zoom (Pan/Tilt/Zoom, PTZ) to the camera.
(2)摄像机根据接收的PTZ信息,对入侵目标进行定位,在定位完成后获取关于该入侵目标的图像帧,进一步根据获取到的图像帧,通过视觉算法确定该入侵目标是否是真实的入侵目标。(2) The camera locates the intrusion target according to the received PTZ information, obtains the image frame of the intrusion target after the positioning is completed, and further determines whether the intrusion target is a real intrusion target based on the acquired image frame through a visual algorithm .
示例性的,检测系统还可以包括报警器104,在这种情况下,上述工作流程还可以包括以下步骤:Exemplarily, the detection system may also include an alarm 104, in this case, the above workflow may further include the following steps:
(3)如果摄像机确定是真实的入侵目标,则摄像机控制报警器输出告警提示,提示入侵目标离开周界,此外,为了确保能够将入侵目标驱离出周界,在控制报警器输出告警提示的同时,摄像机可以实时跟踪该入侵目标,直至该入侵目标离开周界。(3) If the camera is determined to be a real intrusion target, the camera controls the alarm to output an alarm prompt to prompt the intrusion target to leave the perimeter. In addition, in order to ensure that the intrusion target can be driven out of the perimeter, the control alarm will output the alarm prompt. At the same time, the camera can track the intrusion target in real time until the intrusion target leaves the perimeter.
此外,当摄像机控制报警器输出告警提示时,摄像机可以向管理平台上报告警事件,告警事件包括告警事件发生的时间以及触发本次告警事件的相关图像帧等信息,以便于后台管理人员对与告警事件相关的信息进行管理以及查看。In addition, when the camera controls the alarm to output an alarm prompt, the camera can report an alarm event to the management platform. The alarm event includes information such as the time when the alarm event occurred and the relevant image frame that triggered the alarm event. Manage and view information related to alarm events.
由于有摄像机对雷达的检测结果进行二次确认,因此,即使雷达是在较高检测灵敏度模式下检测到入侵目标的,也不会导致误报率上升。Since there is a camera for secondary confirmation of the detection results of the radar, even if the radar detects an intrusion target in a higher detection sensitivity mode, the false alarm rate will not increase.
然而,摄像机并不能在所有的情况下都能参与二次确认,例如,在遭遇恶劣天气的情况下,摄像机可能只能获取到清晰度较低的图像帧,该清晰度并不足以使得摄像机分辨出 图像帧中是否包括真实的入侵目标,换句话说,摄像机在这种情况下无法参与二次确认,或者,在摄像机自身故障情况下,摄像机根本无法获取图像帧,此时,摄像机参与二次确认更是无从谈起。However, the camera cannot participate in the secondary confirmation in all cases. For example, in the case of bad weather, the camera may only obtain image frames with low resolution, which is not enough for the camera to distinguish Whether the real intrusion target is included in the image frame, in other words, the camera cannot participate in the secondary confirmation in this case, or, in the case of a camera failure, the camera cannot obtain the image frame at all, at this time, the camera participates in the secondary confirmation Confirmation is out of the question.
综上,在摄像机不能参与二次确认的情况下,如果雷达在较高检测灵敏度模式下进行检测,则有可能会导致误报率的上升。To sum up, in the case where the camera cannot participate in the secondary confirmation, if the radar detects in a higher detection sensitivity mode, it may lead to an increase in the false alarm rate.
有鉴于此,本申请实施例提出一种周界检测方法,通过使雷达根据摄像机的拍摄能力进入摄像机的拍摄能力对应的检测灵敏度模式,例如,当摄像机的拍摄能力较强时,雷达进入高检测灵敏度模式,由于摄像机的拍摄能力较强且摄像机会参与二次确认,也就是摄像机的二次确认的准确率会更高,因此,此时提高雷达灵敏度能够降低整体的漏报率。再例如,本方案当摄像机的拍摄能力较弱或者不能获取图像帧时,雷达进入相对较低的检测灵敏度模式,由于摄像机的拍摄能力较弱甚至无法二次确认时,摄像机的二次确认的准确率会较低,此时降低雷达的检测灵敏度能够降低整体的误报率。因此,本方案中的雷达可以根据摄像机的二次确认的拍摄能力进入不同的检测灵敏度模式,取得低误报率和低漏报率的双赢。In view of this, the embodiment of the present application proposes a perimeter detection method, by making the radar enter the detection sensitivity mode corresponding to the camera's shooting capability according to the camera's shooting capability, for example, when the camera's shooting capability is strong, the radar enters a high detection Sensitivity mode, because the camera has a strong shooting ability and the camera will participate in the secondary confirmation, that is, the accuracy of the secondary confirmation of the camera will be higher. Therefore, increasing the radar sensitivity at this time can reduce the overall false negative rate. For another example, in this solution, when the camera's shooting ability is weak or the image frame cannot be acquired, the radar enters a relatively low detection sensitivity mode. Because the camera's shooting ability is weak or even cannot be confirmed twice, the accuracy of the camera's second confirmation The rate will be low, at this time, reducing the detection sensitivity of the radar can reduce the overall false alarm rate. Therefore, the radar in this solution can enter different detection sensitivity modes according to the secondary confirmation shooting ability of the camera, and achieve a win-win situation of low false alarm rate and low false alarm rate.
下面结合图1示出的检测系统对本申请实施例提供的周界检测方法进行详细介绍,图2为周界检测方法200的示例性流程图。值得一提的是,为了简洁,以下描述中,省去了管理平台、摄像机、报警器、雷达的标记,例如,下文中的管理平台是指管理平台101,雷达指雷达102,摄像机指摄像机103。The perimeter detection method provided by the embodiment of the present application will be described in detail below with reference to the detection system shown in FIG. 1 , and FIG. 2 is an exemplary flow chart of the perimeter detection method 200 . It is worth mentioning that, for the sake of brevity, in the following description, the marks of management platform, camera, alarm, and radar are omitted. For example, the management platform below refers to the management platform 101, the radar refers to the radar 102, and the camera refers to the camera 103. .
步骤201,雷达根据摄像机的拍摄能力,确定当前检测灵敏度,摄像机的拍摄能力指示摄像机获取到的图像帧的质量。Step 201 , the radar determines the current detection sensitivity according to the shooting capability of the camera, which indicates the quality of the image frames acquired by the camera.
摄像机可以周期性的确定自己的拍摄能力,并将该拍摄能力通过与雷达之间的通信连接发送至雷达,该拍摄能力代表了摄像机获取到的图像帧的质量,雷达在确定周界内是否存在入侵目标时,可以根据摄像机距离本次检测最近一次发送的摄像机的拍摄能力,确定应该在哪种检测灵敏度模式下检测周界内是否存在入侵目标,之后雷达可以执行步骤202,即,雷达在根据摄像机的拍摄能力确定的检测灵敏度模式下,确定周界内是否存在入侵目标。The camera can periodically determine its own shooting ability, and send the shooting ability to the radar through the communication connection with the radar. The shooting ability represents the quality of the image frame acquired by the camera. The radar determines whether there is a When an intrusion target is detected, it can be determined in which detection sensitivity mode should be used to detect whether there is an intrusion target in the perimeter according to the shooting capability of the camera sent last time from the camera distance, and then the radar can perform step 202, that is, the radar is based on In the detection sensitivity mode determined by the shooting capability of the camera, it is determined whether there is an intrusion target within the perimeter.
在本申请实施例中,将雷达根据摄像机的拍摄能力确定的检测灵敏度模式称为当前检测灵敏度模式。In this embodiment of the present application, the detection sensitivity mode determined by the radar according to the shooting capability of the camera is referred to as the current detection sensitivity mode.
示例性的,摄像机可以根据当前环境与摄像机的自身状态确定摄像机的拍摄能力,其中,当前环境可以包括当前天气,当前光照等因素,摄像机的自身状态可以包括摄像机的功能状态,器件状态等因素,摄像机的功能状态例如可以包括摄像机的变焦功能或者闪光灯功能等是否正常,摄像机的器件状态例如可以包括摄像机的镜头是否存在磨损等。Exemplarily, the camera can determine the shooting capability of the camera according to the current environment and the camera's own state, wherein the current environment can include factors such as current weather and current illumination, and the camera's own state can include factors such as the camera's functional state and device state, The functional status of the camera may include, for example, whether the zoom function of the camera or the flashlight function is normal, and the device status of the camera may include, for example, whether the lens of the camera is worn or not.
例如,当前为晴朗的白天且摄像机的功能以及器件的状态均良好,则摄像机可以确定拍摄能力较强,换句话说,摄像机在当前环境下获取到的图像帧的质量较优。For example, if it is a sunny day and the function of the camera and the state of the device are good, the camera can determine that the shooting capability is strong. In other words, the quality of the image frames acquired by the camera under the current environment is relatively high.
例如,当前为夜间,夜间往往光线较差,在这种环境下,摄像机的可视距离受限,对于摄像机的可视距离以外的区域,摄像机则获取不到清晰的图像帧,此时,无论摄像机的自身状态是否良好,摄像机可以确定拍摄能力较弱。For example, it is currently nighttime, and the light is often poor at night. In this environment, the viewing distance of the camera is limited. For areas beyond the viewing distance of the camera, the camera cannot obtain clear image frames. At this time, no matter Whether the state of the camera itself is good, the camera can determine that the shooting ability is weak.
例如,当前为雨/雪天气,雨/雪天气会对摄像机造成较大的干扰,导致摄像机无法获取到清晰的图像帧,此时,无论摄像机的自身状态是否良好,摄像机可以确定拍摄能力较弱。For example, it is currently rainy/snowy weather, which will cause great interference to the camera, causing the camera to fail to obtain clear image frames. At this time, regardless of whether the camera's own state is good or not, the camera can determine that the shooting ability is weak .
例如,摄像机的镜头被严重磨损,则摄像机使用该镜头获取到的图像帧的清晰度会受到严重影响,在这种情况下,无论当前环境是否良好,摄像机可以确定拍摄能力较弱。For example, if the lens of the camera is severely worn, the clarity of the image frame acquired by the camera using the lens will be seriously affected. In this case, regardless of whether the current environment is good or not, the camera may determine that the shooting capability is weak.
例如,摄像机的变焦功能损坏,导致无法聚焦,这也会影响摄像机获取到的图像帧的清晰度,在这种情况下,无论当前环境是否良好,摄像机可以确定拍摄能力较弱。For example, the zoom function of the camera is damaged, resulting in the inability to focus, which will also affect the clarity of the image frame acquired by the camera. In this case, the camera can determine that the shooting ability is weak regardless of whether the current environment is good or not.
示例性的,摄像机的能力可以通过以下方式进行表征:Exemplarily, the capability of the camera can be characterized by the following methods:
方式1way 1
可以通过若干比特来表示摄像机的多种能力,例如,可以通过两比特承载的信息来表征摄像机的能力,“00”代表摄像机的能力较强,“01”代表摄像机的能力为中等,“10”代表摄像机的能力较弱。Various capabilities of the camera can be represented by several bits, for example, the capability of the camera can be represented by the information carried by two bits, "00" represents the capability of the camera is strong, "01" represents the capability of the camera is medium, "10" Indicates that the ability of the camera is weak.
假设摄像机确定自己的拍摄能力较弱,则对应的比特为“10”,相应地,雷达可以根据来自摄像机的比特信息,确定摄像机的拍摄能力较弱。Assuming that the camera determines that its shooting capability is weak, the corresponding bit is "10". Correspondingly, the radar can determine that the camera's shooting capability is weak according to the bit information from the camera.
方式2way 2
摄像机可以对多种能力进行量化,量化后可以对摄像机的多种能力进行更细化的区分,例如,用0~1的数值代表摄像机的能力的强弱,数值越小,则代表摄像机的能力越弱,数值越大,则代表摄像机的能力越强,例如,当摄像机的拍摄能力小于或等于0.3时,代表代表摄像机的能力较弱,或者,当摄像机的拍摄能力介于0.3至0.7之间时,代表摄像机的能力为中等,或者,当摄像机的拍摄能力大于或等于0.7时,代表摄像机的能力较强。The camera can quantify various capabilities. After quantification, the various capabilities of the camera can be distinguished in a more detailed manner. For example, the value of 0 to 1 represents the strength of the camera’s capabilities. The smaller the value, the higher the capability of the camera. The weaker and the larger the value, the stronger the capability of the camera, for example, when the shooting capability of the camera is less than or equal to 0.3, it means that the capability of the camera is weak, or, when the shooting capability of the camera is between 0.3 and 0.7 When , it means that the ability of the camera is medium, or when the shooting ability of the camera is greater than or equal to 0.7, it means that the ability of the camera is strong.
例如,对于晴朗的白天,且摄像机的功能以及器件的状态均良好,则经过量化后的摄像机的能力可以为0.9。For example, for a sunny day, and the function of the camera and the state of the device are both good, the quantized capability of the camera may be 0.9.
例如,对于夜间,则经过量化后的摄像机的能力可以为0.5。For example, for nighttime, the quantized camera capability may be 0.5.
例如,对于处于雨/雪天气的白天,则经过量化后的摄像机的能力可以为0.3。For example, for a rainy/snowy daytime, the quantized camera's capability may be 0.3.
例如,对于白天,但摄像机的镜头被严重磨损,则经过量化后的摄像机的能力可以为0.3。For example, for daytime, but the lens of the camera is severely worn, the quantized camera's capability may be 0.3.
假设当前为处于雨/雪天气的白天,则经过量化后的摄像机的拍摄能力为0.3,相应地,雷达可以根据来自摄像机的该数值,确定摄像机的拍摄能力较弱。Assuming that it is currently a rainy/snowy day, the quantized shooting capability of the camera is 0.3. Correspondingly, the radar can determine that the shooting capability of the camera is weak according to the value from the camera.
雷达在得到摄像机的拍摄能力后,可以根据摄像机的拍摄能力,进入摄像机的拍摄能力对应的检测灵敏度模式,例如,摄像机的拍摄能力较弱,相应地,雷达进入低检测灵敏度模式,或者,摄像机的拍摄能力为中等,相应地,雷达进入中等检测灵敏度模式,或者,摄像机的拍摄能力较强,相应地,雷达进入高检测灵敏度模式。After obtaining the shooting capability of the camera, the radar can enter the detection sensitivity mode corresponding to the shooting capability of the camera according to the shooting capability of the camera. The shooting capability is medium, and accordingly, the radar enters a medium detection sensitivity mode, or, the camera has relatively strong shooting capability, and correspondingly, the radar enters a high detection sensitivity mode.
在进入摄像机的拍摄能力对应的检测灵敏度模式后,摄像机在当前检测灵敏度模式下,确定周界内是否存在入侵目标。After entering the detection sensitivity mode corresponding to the shooting capability of the camera, the camera determines whether there is an intrusion target within the perimeter in the current detection sensitivity mode.
例如,假设雷达在发射电磁波后,检测到了回波信号,然而,该回波信号有可能是电磁波在传播过程中受到干扰后产生的,在这种情况下,雷达可以在当前检测灵敏度模式下,进一步确定该回波信号是否是电磁波被周界内的目标反射后产生的。在本申请实施例中,将触发电磁波反射的对象称为目标。For example, suppose the radar detects the echo signal after emitting the electromagnetic wave. However, the echo signal may be generated after the electromagnetic wave is disturbed during propagation. In this case, the radar can be in the current detection sensitivity mode, It is further determined whether the echo signal is generated after the electromagnetic wave is reflected by the target in the perimeter. In this embodiment of the present application, an object that triggers electromagnetic wave reflection is called a target.
例如,雷达根据接收到的回波信号,确定目标的移动速度,并且可以确定接收到的回波信号的强度,进一步地,雷达确定连续接收到该回波信号的次数,根据目标的移动速度,回波信号的强度以及连续接收到该回波信号的次数,确定该目标是入侵目标的置信度。For example, the radar determines the moving speed of the target according to the received echo signal, and can determine the strength of the received echo signal. Further, the radar determines the number of times the echo signal is received continuously. According to the moving speed of the target, The strength of the echo signal and the number of times the echo signal is received continuously determine the confidence level that the target is an intrusion target.
在得到目标是入侵目标的置信度后,雷达将目标是入侵目标的置信度与当前检测灵敏度模式下的第一置信度阈值进行比较,如果目标是入侵目标的置信度大于或等于当前检测灵敏度模式下的第一置信度阈值,则雷达可以确定该目标是入侵目标,换句话说,雷达确定周界内存在入侵目标。值得一提的是,在本申请中,不同的检测灵敏度模式代表了不同大小的第一置信度阈值,高检测灵敏度模式下的第一置信度阈值小于中等检测灵敏度模式下的第一置信度阈值与低检测灵敏度模式下的第一置信度阈值。After obtaining the confidence that the target is an intrusion target, the radar compares the confidence that the target is an intrusion target with the first confidence threshold in the current detection sensitivity mode, if the confidence that the target is an intrusion target is greater than or equal to the current detection sensitivity mode The radar can determine that the target is an intrusion target, in other words, the radar determines that there is an intrusion target within the perimeter. It is worth mentioning that in this application, different detection sensitivity modes represent different first confidence thresholds, and the first confidence threshold in the high detection sensitivity mode is smaller than the first confidence threshold in the medium detection sensitivity mode with the first confidence threshold in low detection sensitivity mode.
例如,摄像机的拍摄能力较弱,雷达进入低检测灵敏度模式,该检测灵敏度模式下的第一置信度阈值可以为85%,假设雷达根据接收到的回波信号,确定目标的移动速度为2千米/小时,回波信号的强度为5平方雷达散射截面(radar cross section,RCS)以及连续接收到该回波信号的次数为10次,此时,雷达根据目标的移动速度、回波信号的强度以及连续接收到该回波信号的次数,可以确定目标是入侵目标的置信度为88%,在这种情况下,由于目标是入侵目标的置信度大于低检测灵敏度模式下的第一置信度阈值,因此,雷达可以确定周界内存在入侵目标。For example, the shooting ability of the camera is weak, and the radar enters the low detection sensitivity mode. The first confidence threshold in this detection sensitivity mode can be 85%. Suppose the radar determines that the moving speed of the target is 2,000 based on the received echo signal. m/h, the strength of the echo signal is 5 square radar cross section (radar cross section, RCS) and the number of times the echo signal is received continuously is 10 times. Intensity and the number of times the echo signal is received consecutively, the confidence level of determining that the target is an intrusion target is 88%. In this case, since the confidence level of the target is an intrusion target is greater than the first confidence level in the low detection sensitivity mode Threshold, so the radar can determine the presence of intrusion targets within the perimeter.
再例如,摄像机的拍摄能力较强,雷达进入高检测灵敏度模式,该检测灵敏度模式下的置信度阈值可以为60%,假设雷达根据接收到的回波信号,确定目标的移动速度为0.5千米/小时,回波信号的强度为2平方雷达散射截面(radar cross section,RCS)以及连续接收到该回波信号的次数为6次,此时,雷达根据目标的移动速度、回波信号的强度以及连续接收到该回波信号的次数,可以确定目标是入侵目标的置信度为65%,在这种情况下,由于目标是入侵目标的置信度大于高检测灵敏度模式下的第一置信度阈值,因此,雷达可以确定周界内存在入侵目标。之后,雷达可以执行步骤203。For another example, the camera has a strong shooting ability, and the radar enters the high detection sensitivity mode. The confidence threshold in this detection sensitivity mode can be 60%. Suppose the radar determines that the moving speed of the target is 0.5 kilometers according to the received echo signal. / hour, the strength of the echo signal is 2 square radar cross section (radar cross section, RCS) and the number of times the echo signal is received continuously is 6 times. And the number of times the echo signal is received continuously, it can be determined that the target is an intrusion target with a confidence level of 65%. In this case, since the target is an intrusion target, the confidence level is greater than the first confidence threshold in the high detection sensitivity mode , therefore, the radar can determine the presence of intrusion targets within the perimeter. Afterwards, the radar can execute step 203 .
需要说明的是,在本申请实施例中,雷达还可以根据目标与雷达之间的距离,回波信号的强度、以及连续接收到该回波信号的次数确定目标是入侵目标的置信度,本申请对此不做限定。It should be noted that, in this embodiment of the application, the radar can also determine the confidence that the target is an intrusion target based on the distance between the target and the radar, the strength of the echo signal, and the number of times the echo signal is received continuously. Applications are not limited to this.
步骤203,雷达向摄像机发送通知消息,通知消息指示摄像机确定入侵目标是否是真实的入侵目标。In step 203, the radar sends a notification message to the camera, and the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
雷达确定周界内存在入侵目标后,可以向摄像机发送通知消息,通知消息指示雷达确定周界内是否存在真实的入侵目标,摄像机根据通知消息,确定周界内存在入侵目标,之后执行步骤204。After the radar determines that there is an intrusion target in the perimeter, it can send a notification message to the camera. The notification message instructs the radar to determine whether there is a real intrusion target in the perimeter. The camera determines that there is an intrusion target in the perimeter according to the notification message, and then performs step 204 .
步骤204,在周界内存在入侵目标的情况下,摄像机确定周界内是否存在真实的入侵目标。Step 204, in the case that there is an intrusion target in the perimeter, the camera determines whether there is a real intrusion target in the perimeter.
示例性的,摄像机可以通过以下几种方式确定周界内是否存在真实的入侵目标:Exemplarily, the camera can determine whether there is a real intrusion target in the perimeter through the following methods:
方式1way 1
雷达向摄像机发送的通知消息中可以携带目标是入侵目标的置信度,摄像机可以根据目标是入侵目标的置信度与预设的第二置信度阈值,确定入侵目标是否是真实的入侵目标。例如,如果目标是入侵目标的置信度大于或等于预设的第二置信度阈值,摄像机确定 入侵目标是真实的入侵目标。值得一提的是,预设的第二置信度阈值可以是摄像机根据对雷达的检测结果的信任程度确定的。The notification message sent by the radar to the camera can carry the confidence that the target is an intrusion target, and the camera can determine whether the intrusion target is a real intrusion target based on the confidence that the target is an intrusion target and the preset second confidence threshold. For example, if the confidence that the target is an intrusion target is greater than or equal to the preset second confidence threshold, the camera determines that the intrusion target is a real intrusion target. It is worth mentioning that the preset second confidence threshold may be determined by the camera according to the degree of trust in the detection result of the radar.
例如,目标是入侵目标的置信度为99%,预设的第二置信度阈值为95%,在这种情况下,由于目标是入侵目标的置信度大于预设的第二置信度阈值,因此,摄像机可以确定周界内存在真实的入侵目标。For example, the confidence that the target is an intrusion target is 99%, and the preset second confidence threshold is 95%. In this case, since the confidence that the target is an intrusion target is greater than the preset second confidence threshold, therefore , the camera can determine that there is a real intrusion target within the perimeter.
方式2way 2
雷达向摄像机发送的通知消息中可以携带入侵目标的方位信息,示例性的,入侵目标的方位信息可以为入侵目标的PTZ信息,摄像机在接收到通知消息后,可以根据入侵目标的方位信息,获取关于入侵目标的图像帧,在获取到图像帧后,摄像机可以通过视觉算法确定图像帧中是否存在入侵目标,如果图像帧中存在入侵目标,则摄像机可以确定雷达检测到的入侵目标是真实的入侵目标。The notification message sent by the radar to the camera can carry the orientation information of the intrusion target. For example, the orientation information of the intrusion target can be the PTZ information of the intrusion target. After receiving the notification message, the camera can obtain the Regarding the image frame of the intrusion target, after acquiring the image frame, the camera can determine whether there is an intrusion target in the image frame through a visual algorithm. If there is an intrusion target in the image frame, the camera can determine that the intrusion target detected by the radar is a real intrusion Target.
方式3way 3
雷达向摄像机发送的通知消息中可以携带目标是入侵目标的置信度与入侵目标的方位信息,如果目标是入侵目标的置信度小于预设的第二置信度阈值,则摄像机根据入侵目标的方位信息,获取关于入侵目标的图像帧,在获取到图像帧后,摄像机可以通过视觉算法确定图像帧中是否存在入侵目标,如果图像帧中存在入侵目标,则摄像机可以确定雷达检测到的入侵目标是真实的入侵目标。The notification message sent by the radar to the camera can carry the confidence level of the target as an intrusion target and the orientation information of the intrusion target. If the confidence level of the target is an intrusion target is less than the preset second confidence threshold, the camera will , to obtain the image frame about the intrusion target, after obtaining the image frame, the camera can determine whether there is an intrusion target in the image frame through a visual algorithm, if there is an intrusion target in the image frame, the camera can determine that the intrusion target detected by the radar is real intrusion target.
在检测系统包括报警器的情况下,摄像机在确定入侵目标是真实的入侵目标后,可以控制报警器输出告警提示,以将入侵目标驱离出周界,例如,摄像机可以执行步骤205:摄像机向报警器发送控制指令,控制指令指示报警器输出告警提示,报警器在接收到来自摄像机的控制指令后,执行步骤206。In the case that the detection system includes an alarm, after the camera determines that the intrusion target is a real intrusion target, it can control the alarm to output an alarm prompt to drive the intrusion target out of the perimeter. For example, the camera can perform step 205: The alarm device sends a control instruction, and the control instruction instructs the alarm device to output an alarm prompt, and the alarm device executes step 206 after receiving the control instruction from the camera.
步骤206,报警器输出告警提示。Step 206, the alarm device outputs an alarm prompt.
需要说明的是,在本申请实施例中,如果雷达确定目标是入侵目标的置信度小于当前灵敏度模式下的第一置信度阈值,在这种情况下,雷达可以认为自己检测到的目标并非入侵目标,换句话说,雷达检测到的回波信号是电磁波在传播过程中受到干扰后产生的,此时,雷达可以确定周界内并不存在入侵目标,在这种情况下,雷达可以不向摄像机发送通知消息,即,终止本次检测。It should be noted that, in this embodiment of the application, if the confidence level of the radar determining that the target is an intrusion target is less than the first confidence threshold in the current sensitivity mode, in this case, the radar can consider that the target detected by itself is not an intrusion target, in other words, the echo signal detected by the radar is generated after the electromagnetic wave is disturbed during propagation. At this time, the radar can determine that there is no intrusion target in the perimeter. The camera sends a notification message, that is, the detection is terminated.
还需要说明的是,在本申请实施例中,雷达还可以根据摄像机当前是否故障确定当前检测灵敏度模式,例如,雷达与摄像机之间存在心跳信号,雷达可以通过检测其与摄像机之间的心跳信号来确定摄像机当前是否故障,例如,当雷达检测不到心跳信号时,则可以确定摄像机当前处于故障状态,进而可以确定摄像机当前无法获取图像帧,在这种情况下,雷达可以进入低检测灵敏度模式,并且不会通知摄像机进行二次确认。It should also be noted that in this embodiment of the application, the radar can also determine the current detection sensitivity mode according to whether the camera is currently faulty. For example, if there is a heartbeat signal between the radar and the camera, the radar can detect the heartbeat signal between it and the camera. To determine whether the camera is currently faulty, for example, when the radar does not detect a heartbeat signal, it can be determined that the camera is currently in a faulty state, and then it can be determined that the camera is currently unable to obtain image frames. In this case, the radar can enter a low detection sensitivity mode , and the camera will not be notified for secondary confirmation.
还需要说明的是,当摄像机通过方式1确定周界内是否存在真实的入侵目标时,通知消息中除了携带目标是入侵目标的置信度,还可以携带入侵目标的方位信息,在这种情况下,摄像机还可以获取关于入侵目标的图像帧,此时获取的关于入侵目标的图像帧可以作为证据上传至告警平台。It should also be noted that when the camera determines whether there is a real intrusion target in the perimeter through method 1, the notification message may not only carry the confidence that the target is an intrusion target, but also carry the orientation information of the intrusion target. In this case , the camera can also acquire image frames about the intrusion target, and the acquired image frames about the intrusion target can be uploaded to the alarm platform as evidence.
还需要说明的是,上述仅以方法200为例对本申请实施例提供的周界检测方法进行介绍,但这并不构成对本申请实施例的限定,例如,在具体实现时,可以仅执行上述步骤201、步骤202以及步骤204,本申请实施例对此不做限定。It should also be noted that the above only uses the method 200 as an example to introduce the perimeter detection method provided by the embodiment of the present application, but this does not constitute a limitation to the embodiment of the present application. For example, in specific implementation, only the above steps may be performed Step 201, step 202, and step 204 are not limited in this embodiment of the present application.
还需要说明的是,本申请实施例提供的周界检测方法除了可以应用在铁路边界防护中,还可以应用在任何园区型和围界型周界防护中。It should also be noted that the perimeter detection method provided in the embodiment of the present application can be applied not only to railway boundary protection, but also to any park-type and perimeter-type perimeter protection.
还需要说明的是,本申请实施例中的雷达可以为毫米波雷达,也可以激光雷达等其他类型的雷达,本申请对此不做限定。It should also be noted that the radar in the embodiment of the present application may be a millimeter-wave radar or other types of radar such as lidar, which is not limited in this application.
还需要说明的是,本申请实施例提供的周界检测方法还可以应用于包括振动光纤与摄像机的检测系统,振动光纤可以根据摄像机的拍摄能力确定当前检测灵敏度,从而达到与本申请实施例相同的有益效果。It should also be noted that the perimeter detection method provided in the embodiment of the present application can also be applied to a detection system including a vibrating optical fiber and a camera. The vibrating optical fiber can determine the current detection sensitivity according to the shooting capability of the camera, so as to achieve the same beneficial effect.
上文结合图1至图2,详细描述了本申请实施例提供的周界检测方法,下面将结合图3至图4,详细描述本申请的装置实施例。应理解,方法实施例的描述与装置实施例的描述相互对应,因此,未详细描述的部分可以参见前面方法实施例。The perimeter detection method provided by the embodiment of the present application is described in detail above with reference to FIG. 1 to FIG. 2 , and the device embodiment of the present application will be described in detail below in conjunction with FIG. 3 to FIG. 4 . It should be understood that the descriptions of the method embodiments correspond to the descriptions of the device embodiments, therefore, for parts not described in detail, reference may be made to the foregoing method embodiments.
图3是本申请实施例提供的一种检测装置300的示意性结构框图。该检测装置300包括:处理模块310。Fig. 3 is a schematic structural block diagram of a detection device 300 provided by an embodiment of the present application. The detection device 300 includes: a processing module 310 .
处理模块310用于:根据摄像机的拍摄能力,确定当前检测灵敏度,所述摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;The processing module 310 is configured to: determine the current detection sensitivity according to the shooting capability of the camera, where the shooting capability of the camera indicates the quality of the image frames acquired by the camera;
处理模块310还用于:在所述当前检测灵敏度下,确定周界内是否存在入侵目标。The processing module 310 is further configured to: under the current detection sensitivity, determine whether there is an intrusion target within the perimeter.
应理解的是,本申请实施例的检测装置300可以通过专用集成电路(application-specific integrated circuit,ASIC)实现,或,可以通过可编程逻辑器件(programmable logic device,PLD)实现,上述PLD可以是复杂程序逻辑器件(complex programmable logical device,CPLD),现场可编程门阵列(field-programmable gate array,FPGA),通用阵列逻辑(generic array logic,GAL)或其任意组合。当可以通过软件实现图2所示的周界检测方法时,检测装置300及其各个模块也可以为软件模块。It should be understood that the detection device 300 in the embodiment of the present application can be realized by an application-specific integrated circuit (ASIC), or can be realized by a programmable logic device (programmable logic device, PLD), and the above-mentioned PLD can be Complex programmable logical device (CPLD), field-programmable gate array (FPGA), generic array logic (GAL) or any combination thereof. When the perimeter detection method shown in FIG. 2 can be realized by software, the detection device 300 and its modules can also be software modules.
可选的,在一些实施例中,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。Optionally, in some embodiments, the shooting capability of the camera is determined by the camera according to the current environment and the camera's own state.
可选的,在一些实施例中,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中至少一种。Optionally, in some embodiments, the current environment includes at least one of current weather and current lighting, and the state of the camera itself includes at least one of a function state and a device state of the camera.
可选的,在一些实施例中,所述处理模块具体用于:确定所述周界内存在入侵目标的置信度;如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,确定周界内存在入侵目标。Optionally, in some embodiments, the processing module is specifically configured to: determine the confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to the first confidence level under the current detection sensitivity Threshold to determine the presence of intrusion targets within the perimeter.
可选的,在一些实施例中,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。Optionally, in some embodiments, the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the first confidence threshold under the current detection sensitivity increases with The camera's shooting ability is reduced and increased.
可选的,在一些实施例中,如果所述检测装置300确定所述周界内存在入侵目标,所述检测装置300还包括:发送模块320,用于向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。Optionally, in some embodiments, if the detection device 300 determines that there is an intrusion target within the perimeter, the detection device 300 further includes: a sending module 320, configured to send a notification message to the camera, the The notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
根据本申请实施例的检测装置300可对应于执行本申请实施例中描述的方法,并且检测装置300中的各个单元的上述和其它操作和/或功能分别为了实现图2中的方法的相应流程,为了简洁,在此不再赘述。The detection device 300 according to the embodiment of the present application may correspond to the implementation of the method described in the embodiment of the present application, and the above-mentioned and other operations and/or functions of each unit in the detection device 300 are to realize the corresponding flow of the method in FIG. 2 , for the sake of brevity, it is not repeated here.
图4是本申请实施例提供的一种检测设备400的示意性结构框图。检测设备400包括:处理器410、存储器420、通信接口430、总线440。Fig. 4 is a schematic structural block diagram of a detection device 400 provided by an embodiment of the present application. The detection device 400 includes: a processor 410 , a memory 420 , a communication interface 430 , and a bus 440 .
应理解,图4所示的检测设备400中的处理器410可以对应于图3中检测装置300中的处理模块310。检测设备400中的通信接口430可以对应于检测装置300中的发送模块320。It should be understood that the processor 410 in the detection device 400 shown in FIG. 4 may correspond to the processing module 310 in the detection device 300 in FIG. 3 . The communication interface 430 in the detection device 400 may correspond to the sending module 320 in the detection device 300 .
其中,该处理器410可以与存储器420连接。该存储器420可以用于存储该程序代码和数据。因此,该存储器420可以是处理器410内部的存储单元,也可以是与处理器410独立的外部存储单元,还可以是包括处理器410内部的存储单元和与处理器410独立的外部存储单元的部件。Wherein, the processor 410 may be connected to the memory 420 . The memory 420 can be used to store the program codes and data. Therefore, the memory 420 may be a storage unit inside the processor 410, or an external storage unit independent of the processor 410, or may include a storage unit inside the processor 410 and an external storage unit independent of the processor 410. part.
可选的,检测设备400还可以包括总线440。其中,存储器420、通信接口430可以通过总线440与处理器410连接。总线440可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。所述总线440可以分为地址总线、数据总线、控制总线等。为便于表示,图4中仅用一条线表示,但并不表示仅有一根总线或一种类型的总线。Optionally, the detection device 400 may also include a bus 440 . Wherein, the memory 420 and the communication interface 430 may be connected to the processor 410 through the bus 440 . The bus 440 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like. The bus 440 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one line is used in FIG. 4 , but it does not mean that there is only one bus or one type of bus.
应理解,在本申请实施例中,该处理器410可以采用中央处理单元(central processing unit,CPU)。该处理器还可以是其它通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate Array,FPGA)或者其它可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。或者该处理器410采用一个或多个集成电路,用于执行相关程序,以实现本申请实施例所提供的技术方案。It should be understood that, in this embodiment of the present application, the processor 410 may be a central processing unit (central processing unit, CPU). The processor can also be other general-purpose processors, digital signal processors (digital signal processors, DSPs), application specific integrated circuits (application specific integrated circuits, ASICs), off-the-shelf programmable gate arrays (field programmable gate arrays, FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. Alternatively, the processor 410 adopts one or more integrated circuits for executing related programs, so as to implement the technical solutions provided by the embodiments of the present application.
该存储器420可以包括只读存储器和随机存取存储器,并向处理器410提供指令和数据。处理器410的一部分还可以包括非易失性随机存取存储器。例如,处理器410还可以存储设备类型的信息。The memory 420 may include read-only memory and random-access memory, and provides instructions and data to the processor 410 . A portion of processor 410 may also include non-volatile random access memory. For example, processor 410 may also store device type information.
在所述检测设备400运行时,所述处理器410执行所述存储器420中的计算机执行指令以利用所述检测设备400中的硬件资源执行上述方法的操作步骤。When the detection device 400 is running, the processor 410 executes computer-executed instructions in the memory 420 to utilize hardware resources in the detection device 400 to perform the operation steps of the above method.
应理解,根据本申请实施例的检测设备400可对应于本申请实施例中的检测装置300,并可以对应于执行根据本申请实施例的图2所示方法中的相应主体,并且检测设备400中的各个模块的上述和其它操作和/或功能分别为了实现图2中的方法的相应流程,为了简洁,在此不再赘述。It should be understood that the detection device 400 according to the embodiment of the present application may correspond to the detection device 300 in the embodiment of the present application, and may correspond to the corresponding subject performing the method shown in FIG. 2 according to the embodiment of the present application, and the detection device 400 The above-mentioned and other operations and/or functions of each module in FIG. 2 are respectively for realizing the corresponding flow of the method in FIG. 2 , and for the sake of brevity, details are not repeated here.
本申请还提供了一种计算机可读存储介质,计算机可读存储介质存储有计算机指令,当计算机指令在检测设备上运行时,使得检测设备执行本申请实施例提供的周界检测方法。The present application also provides a computer-readable storage medium. The computer-readable storage medium stores computer instructions. When the computer instructions are run on the detection device, the detection device executes the perimeter detection method provided by the embodiment of the present application.
本申请还提供了一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得计算机执行本申请实施例提供的周界检测方法。The present application also provides a computer program product, which causes the computer to execute the perimeter detection method provided in the embodiment of the present application when the computer program product is run on the computer.
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所 述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储器。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘(solid state drive,SSD)。The above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations. When implemented using software, the above-described embodiments may be implemented in whole or in part in the form of computer program products. The computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage such as a server, a data center, etc. that includes one or more sets of available media. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media. The semiconductor medium may be a solid state drive (SSD).
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Professionals and technicians may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the embodiments of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请实施例所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the embodiments of the present application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台存储器(可以是个人计算机,服务器,或者网络设备等)执行本申请实施例各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a memory (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
以上所述,仅为本申请实施例的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应以所述权利要求的保护范围为准。The above is only the specific implementation of the embodiment of the present application, but the scope of protection of the embodiment of the present application is not limited thereto. Anyone familiar with the technical field can easily Any changes or substitutions that come to mind should be covered within the protection scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application should be based on the protection scope of the claims.
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载或执行所述计算机程序指令时, 全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储器。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘(solid state drive,SSD)。The above-mentioned embodiments may be implemented in whole or in part by software, hardware, firmware or other arbitrary combinations. When implemented using software, the above-described embodiments may be implemented in whole or in part in the form of computer program products. The computer program product includes one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage such as a server, a data center, etc. that includes one or more sets of available media. The available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media. The semiconductor medium may be a solid state drive (SSD).
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请实施例的范围。Those skilled in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Professionals and technicians may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the embodiments of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请实施例所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the embodiments of the present application, it should be understood that the disclosed systems, devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台存储器(可以是个人计算机,服务器,或者网络设备等)执行本申请实施例各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the embodiment of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions for causing a memory (which may be a personal computer, server, or network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the embodiments of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .
以上所述,仅为本申请实施例的具体实施方式,但本申请实施例的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请实施例揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应以所述权利要求的保护范围为准。The above is only the specific implementation of the embodiment of the present application, but the scope of protection of the embodiment of the present application is not limited thereto. Anyone familiar with the technical field can easily Any changes or substitutions that come to mind should be covered within the protection scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application should be based on the protection scope of the claims.

Claims (25)

  1. 一种周界检测方法,其特征在于,所述方法应用于包括雷达、摄像机的检测系统,所述摄像机与所述雷达存在通信连接,所述方法包括:A perimeter detection method, characterized in that the method is applied to a detection system including a radar and a camera, and the camera and the radar have a communication connection, and the method includes:
    所述雷达根据摄像机的拍摄能力,确定当前检测灵敏度,所述摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;The radar determines the current detection sensitivity according to the shooting capability of the camera, and the shooting capability of the camera indicates the quality of the image frame acquired by the camera;
    所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标;The radar determines whether there is an intrusion target within the perimeter under the current detection sensitivity;
    在所述周界内存在入侵目标的情况下,所述摄像机确定所述入侵目标是否是真实的入侵目标。In the event that an intrusion target is present within the perimeter, the camera determines whether the intrusion target is an actual intrusion target.
  2. 根据权利要求1所述的方法,其特征在于,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。The method according to claim 1, wherein the shooting capability of the camera is determined by the camera according to the current environment and the state of the camera itself.
  3. 根据权利要求2所述的方法,其特征在于,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中的至少一种。The method according to claim 2, wherein the current environment includes at least one of current weather and current lighting, and the state of the camera itself includes at least one of the functional state and device state of the camera .
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标,包括:The method according to any one of claims 1 to 3, wherein the radar determines whether there is an intrusion target within the perimeter under the current detection sensitivity, comprising:
    所述雷达确定所述周界内存在入侵目标的置信度;the radar determines a degree of confidence that an intruder target is present within the perimeter;
    如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,所述雷达确定所述周界内存在入侵目标。If the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that there is an intrusion target within the perimeter.
  5. 根据权利要求4所述的方法,其特征在于,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的获取到的图像帧的质量的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。The method according to claim 4, characterized in that, the first confidence threshold under the current detection sensitivity decreases as the quality of the image frames acquired by the camera increases, and the current detection sensitivity under the The first confidence threshold of is increased as the shooting capability of the camera is weakened.
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,如果所述雷达确定所述周界内存在入侵目标,所述方法还包括:The method according to any one of claims 1 to 5, wherein if the radar determines that there is an intrusion target within the perimeter, the method further comprises:
    所述雷达向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。The radar sends a notification message to the camera, the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  7. 根据权利要求6所述的方法,其特征在于,所述通知消息携带所述周界内存在入侵目标的置信度,所述摄像机确定所述入侵目标是否是真实的入侵目标,包括:The method according to claim 6, wherein the notification message carries a degree of confidence that an intrusion target exists within the perimeter, and the camera determines whether the intrusion target is a real intrusion target, comprising:
    如果所述置信度大于或等于预设的第二置信度阈值,所述摄像机确定所述入侵目标是真实的入侵目标。If the confidence level is greater than or equal to a preset second confidence level threshold, the camera determines that the intrusion target is a real intrusion target.
  8. 根据权利要求6所述的方法,其特征在于,所述通知消息携带所述周界内存在入侵目标的置信度与所述入侵目标的方位信息,所述摄像机确定所述入侵目标是否是真实的入侵目标,包括:The method according to claim 6, wherein the notification message carries the confidence level of an intrusion target in the perimeter and the orientation information of the intrusion target, and the camera determines whether the intrusion target is real Intrusion targets, including:
    如果所述置信度小于预设的第二置信度阈值,所述摄像机根据获取到的关于所述入侵目标的图像帧,确定所述入侵目标是否是真实的入侵目标,所述关于所述入侵目标的图像帧是根据所述入侵目标的方位信息获取的。If the confidence is less than the preset second confidence threshold, the camera determines whether the intrusion target is a real intrusion target according to the acquired image frame about the intrusion target, and the The image frames of are obtained according to the azimuth information of the intrusion target.
  9. 根据权利要求1至8中任一项所述的方法,其特征在于,所述检测系统还包括报警器,如果所述摄像机确定所述入侵目标是真实的入侵目标,所述方法还包括:The method according to any one of claims 1 to 8, wherein the detection system further comprises an alarm, and if the camera determines that the intrusion target is a real intrusion target, the method further comprises:
    所述摄像机控制所述报警器输出告警提示,所述告警提示用于提示所述入侵目标离开所述周界。The camera controls the alarm device to output an alarm prompt, and the alarm prompt is used to prompt the intrusion target to leave the perimeter.
  10. 一种周界检测方法,其特征在于,所述方法包括:A perimeter detection method, characterized in that the method comprises:
    雷达根据摄像机的拍摄能力,确定当前检测灵敏度,所述摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;The radar determines the current detection sensitivity according to the shooting capability of the camera, and the shooting capability of the camera indicates the quality of the image frame acquired by the camera;
    所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标。Under the current detection sensitivity, the radar determines whether there is an intrusion target within the perimeter.
  11. 根据权利要求10所述的方法,其特征在于,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。The method according to claim 10, wherein the shooting capability of the camera is determined by the camera according to the current environment and the state of the camera itself.
  12. 根据权利要求11所述的方法,其特征在于,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中的至少一种。The method according to claim 11, wherein the current environment includes at least one of current weather and current lighting, and the state of the camera itself includes at least one of the functional state and device state of the camera .
  13. 根据权利要求10至12中任一项所述的方法,其特征在于,所述雷达在所述当前检测灵敏度下,确定周界内是否存在入侵目标,包括:The method according to any one of claims 10 to 12, wherein the radar determines whether there is an intrusion target within the perimeter under the current detection sensitivity, comprising:
    所述雷达确定所述周界内存在入侵目标的置信度;the radar determines a degree of confidence that an intruder target is present within the perimeter;
    如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,所述雷达确定周界内存在入侵目标。If the confidence level is greater than or equal to a first confidence level threshold under the current detection sensitivity, the radar determines that there is an intrusion target within the perimeter.
  14. 根据权利要求13所述的方法,其特征在于,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。The method according to claim 13, characterized in that, the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the first confidence threshold under the current detection sensitivity The threshold increases as the camera's shooting capability decreases.
  15. 根据权利要求10至14中任一项所述的方法,其特征在于,如果所述雷达确定所述周界内存在入侵目标,所述方法还包括:The method according to any one of claims 10 to 14, wherein if the radar determines that there is an intrusion target within the perimeter, the method further comprises:
    所述雷达向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。The radar sends a notification message to the camera, the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  16. 一种检测装置,其特征在于,所述装置包括:A detection device, characterized in that the device comprises:
    处理模块,用于根据摄像机的拍摄能力,确定当前检测灵敏度,所述摄像机的拍摄能力指示所述摄像机获取到的图像帧的质量;A processing module, configured to determine the current detection sensitivity according to the shooting capability of the camera, where the shooting capability of the camera indicates the quality of the image frames acquired by the camera;
    所述处理模块,还用于在所述当前检测灵敏度下,确定周界内是否存在入侵目标。The processing module is further configured to determine whether there is an intrusion target within the perimeter under the current detection sensitivity.
  17. 根据权利要求16所述的装置,其特征在于,所述摄像机的拍摄能力是所述摄像机根据当前环境与所述摄像机的自身状态确定的。The device according to claim 16, wherein the shooting capability of the camera is determined by the camera according to the current environment and the state of the camera itself.
  18. 根据权利要求17所述的装置,其特征在于,所述当前环境包括当前天气与当前光照中的至少一种,所述摄像机的自身状态包括所述摄像机的功能状态与器件状态中的至少一种。The device according to claim 17, wherein the current environment includes at least one of current weather and current lighting, and the state of the camera itself includes at least one of the functional state and device state of the camera .
  19. 根据权利要求16至18中任一项所述的装置,其特征在于,所述处理模块具体用于:确定所述周界内存在入侵目标的置信度;如果所述置信度大于或等于所述当前检测灵敏度下的第一置信度阈值,确定周界内存在入侵目标。The device according to any one of claims 16 to 18, wherein the processing module is specifically configured to: determine the confidence level of an intrusion target within the perimeter; if the confidence level is greater than or equal to the The first confidence threshold under the current detection sensitivity to determine that there is an intrusion target within the perimeter.
  20. 根据权利要求19所述的装置,其特征在于,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的增强而减小,所述当前检测灵敏度下的第一置信度阈值随着所述摄像机的拍摄能力的减弱而增大。The device according to claim 19, characterized in that, the first confidence threshold under the current detection sensitivity decreases as the shooting capability of the camera increases, and the first confidence threshold under the current detection sensitivity The threshold increases as the camera's shooting capability decreases.
  21. 根据权利要求16至20中任一项所述的装置,其特征在于,如果所述装置确定所述周界内存在入侵目标,所述装置还包括:The device according to any one of claims 16 to 20, wherein if the device determines that there is an intrusion target within the perimeter, the device further comprises:
    发送模块,用于向所述摄像机发送通知消息,所述通知消息指示所述摄像机确定所述入侵目标是否是真实的入侵目标。A sending module, configured to send a notification message to the camera, where the notification message instructs the camera to determine whether the intrusion target is a real intrusion target.
  22. 一种检测设备,其特征在于,所述检测设备包括处理器与存储器,所述存储器用于存储指令,当所述指令被所述处理器执行时,使得所述检测设备执行如权利要求10至15中任一项所述的周界检测方法。A detection device, characterized in that the detection device includes a processor and a memory, and the memory is used to store instructions, and when the instructions are executed by the processor, the detection device performs the tasks described in claims 10 to 10. The perimeter detection method described in any one of 15.
  23. 一种检测系统,其特征在于,所述检测系统包括雷达、摄像机与报警器,所述雷达用于执行权利要求1至9中任一项所述的由雷达执行的方法,所述摄像机用于执行权利要求1至9中任一项所述的由所述摄像机执行的方法,所述报警器用于执行权利要求1至9中任一项所述的由所述报警器执行的方法。A detection system, characterized in that the detection system includes a radar, a camera and an alarm, the radar is used to perform the method performed by the radar according to any one of claims 1 to 9, and the camera is used for The method performed by the camera according to any one of claims 1 to 9 is performed, and the alarm device is used to perform the method performed by the alarm device according to any one of claims 1 to 9.
  24. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机指令,当所述计算机指令在检测设备上运行时,使得所述检测设备执行如权利要求1至9中任一项所述的方法,或,使得所述检测设备执行如权利要求10至15中任一项所述的周界检测方法。A computer-readable storage medium, characterized in that the computer-readable storage medium stores computer instructions, and when the computer instructions are run on the detection device, the detection device is made to perform any one of claims 1-9. A method according to one, or, causing the detection device to execute the perimeter detection method according to any one of claims 10 to 15.
  25. 一种计算机程序产品,其特征在于,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求1至9中任一项所述的方法,或,使得所述计算机执行如权利要求10至15中任一项所述的周界检测方法。A computer program product, characterized in that, when the computer program product is run on a computer, the computer is made to execute the method according to any one of claims 1 to 9, or the computer is made to execute the method as described in The perimeter detection method according to any one of claims 10 to 15.
PCT/CN2022/084382 2021-07-08 2022-03-31 Perimeter detection method and apparatus, and device and system WO2023279786A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202110773755.5 2021-07-08
CN202110773755 2021-07-08
CN202111051346.0 2021-09-08
CN202111051346.0A CN115601902A (en) 2021-07-08 2021-09-08 Perimeter detection method, device, equipment and system

Publications (1)

Publication Number Publication Date
WO2023279786A1 true WO2023279786A1 (en) 2023-01-12

Family

ID=84801185

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/084382 WO2023279786A1 (en) 2021-07-08 2022-03-31 Perimeter detection method and apparatus, and device and system

Country Status (1)

Country Link
WO (1) WO2023279786A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116401157A (en) * 2023-03-29 2023-07-07 中国铁道科学研究院集团有限公司 Test evaluation method and system for perimeter intrusion detection equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080165046A1 (en) * 1999-06-14 2008-07-10 Time Domain Corporation System and method for intrusion detection using a time domain radar array
US20140361920A1 (en) * 2013-06-10 2014-12-11 Honeywell International Inc. Cooperative intrusion detection
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN109164443A (en) * 2018-08-27 2019-01-08 南京微达电子科技有限公司 Rail track foreign matter detecting method and system based on radar and image analysis
CN109920185A (en) * 2019-04-16 2019-06-21 中科九度(北京)空间信息技术有限责任公司 One kind merging the mobile mesh calibration method of detection with video data based on millimetre-wave radar
CN110989026A (en) * 2019-11-16 2020-04-10 南京派光智慧感知信息技术有限公司 Safety monitoring method for cross-railway bridge
CN111899447A (en) * 2019-05-06 2020-11-06 杭州海康威视数字技术股份有限公司 Monitoring system and method
CN112394349A (en) * 2020-11-06 2021-02-23 珠江水利委员会珠江水利科学研究院 Intelligent security monitoring method, device and system for ocean buoy and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080165046A1 (en) * 1999-06-14 2008-07-10 Time Domain Corporation System and method for intrusion detection using a time domain radar array
US20140361920A1 (en) * 2013-06-10 2014-12-11 Honeywell International Inc. Cooperative intrusion detection
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN109164443A (en) * 2018-08-27 2019-01-08 南京微达电子科技有限公司 Rail track foreign matter detecting method and system based on radar and image analysis
CN109920185A (en) * 2019-04-16 2019-06-21 中科九度(北京)空间信息技术有限责任公司 One kind merging the mobile mesh calibration method of detection with video data based on millimetre-wave radar
CN111899447A (en) * 2019-05-06 2020-11-06 杭州海康威视数字技术股份有限公司 Monitoring system and method
CN110989026A (en) * 2019-11-16 2020-04-10 南京派光智慧感知信息技术有限公司 Safety monitoring method for cross-railway bridge
CN112394349A (en) * 2020-11-06 2021-02-23 珠江水利委员会珠江水利科学研究院 Intelligent security monitoring method, device and system for ocean buoy and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116401157A (en) * 2023-03-29 2023-07-07 中国铁道科学研究院集团有限公司 Test evaluation method and system for perimeter intrusion detection equipment
CN116401157B (en) * 2023-03-29 2024-04-02 中国铁道科学研究院集团有限公司 Test evaluation method and system for perimeter intrusion detection equipment

Similar Documents

Publication Publication Date Title
CN107645652A (en) A kind of illegal geofence system based on video monitoring
CN111582130B (en) Traffic behavior perception fusion system and method based on multi-source heterogeneous information
WO2023279786A1 (en) Perimeter detection method and apparatus, and device and system
CN104394361A (en) Pedestrian crossing intelligent monitoring device and detection method
CN113721621B (en) Vehicle control method, device, electronic equipment and storage medium
CN105283776A (en) Radar false alert reduction
CN103929592A (en) All-dimensional intelligent monitoring equipment and method
CN102592408A (en) Intelligent sentinel safety early-warning system based on visual information analysis
CN112105950B (en) Detection method, detection equipment and millimeter wave radar of detection object
CN112312068B (en) Target detection method, device, equipment and storage medium
US11698459B2 (en) Method and apparatus for determining drivable region information
CN115601902A (en) Perimeter detection method, device, equipment and system
KR20210023273A (en) Apparatus and method for judging tunnel situation
JP4970239B2 (en) Combined intrusion detection device
TWI479432B (en) Abnormal detection method for a video camera
KR102456190B1 (en) Black box system for offshore fishing vessels
CN112102543A (en) Security check system and method
CN112883856B (en) Monitoring method, monitoring device, electronic equipment and storage medium
CN201876967U (en) Electronic monitoring system for detecting objects thrown at low altitude
CN116740874A (en) Intrusion detection method and related device
CN114511978A (en) Intrusion early warning method and device, vehicle and computer readable storage medium
JPH0337356B2 (en)
JP5027645B2 (en) Combined intrusion detection device
JP6978986B2 (en) Warning system, warning control device and warning method
JP5027644B2 (en) Combined intrusion detection device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22836545

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE