A kind of fiber fence system for monitoring intrusion and mode identification method thereof
Technical field
The present invention relates to circumference technical field of security and protection, particularly relate to a kind of fiber fence system for monitoring intrusion and mode identification method thereof。
Background technology
The basis that safety is a society and enterprise depends on for existence and development。In recent years, along with China's expanding economy, becoming stronger day by day of overall national strength, people's lives are day by day rich, and thus people are after solving living problem, day by day it is of concern that the whether safety of living。Owing to some scales are big, the appearance of the building structure that involves great expense, its circumference and property safety also exist certain potential safety hazard, and the early warning such as the complex environment perimeter security such as military area, power plant, airport, oilfield and important area particularly merits attention。Moreover, school's periphery, financial center, residential building community safety precaution also become the problem that residents become more concerned with。Therefore, one safely and effectively circumference security protection monitoring system to prevention with fight crime, maintaining public order, disaster prevention accident, reduce the aspect such as country, collective property and people's life and be just particularly important。And traditional security pre-warning system is based primarily upon electric sensor, owing to being limited by objective technique condition, conventional electrical sensor cannot be applied in the adverse circumstances such as inflammable, explosive, high temperature, strong electromagnetic, but Fibre Optical Sensor has electromagnetism interference, electrical insulation capability is good, corrosion-resistant, volume is little, the advantage such as lightweight so that it is be particularly well-suited to such as safety-protection systems such as military area, nuclear power station, airport, combustible and explosive area。
But the problem being only capable of solving intrusion alarm is inadequate, invasion signal can be divided into unwanted signals and harmless signal。Wherein, unwanted signals includes the invasion to optical fiber of people or apparatus, harmless signal includes the interference of the natural environment such as wind and rain, thunder and lightning and toy, therefore how accurately to differentiate the unwanted signals in intrusion event, by harmless signal shielding, reduce unnecessary false-alarm and false alarm, improve the intelligent level that sensory perceptual system is reported to the police, be the major issue of practical application urgent need solution。
Summary of the invention
It is an object of the invention to, by a kind of fiber fence system for monitoring intrusion and mode identification method thereof, solve the problem that background section above is mentioned。
For reaching this purpose, the present invention by the following technical solutions:
A kind of fiber fence system for monitoring intrusion, comprising: sensing optic cable, wavelength demodulation device, signal processing termination;
Described sensing optic cable is laid on fence, is in series with N number of Fiber Bragg Grating FBG (FBG) vibrating sensor, the vibration signal on perception fence in this sensing optic cable, output is to wavelength demodulation device, wherein, N is positive integer, can be actually needed setting according to user;
Described wavelength demodulation device is connected with fiber bragg grating vibration sensor, for described vibration signal is converted to sensor wavelength variable signal, and the signal of intrusion event is sampled;
Described signal processing termination is connected with wavelength demodulation device, for the sampled signal of wavelength demodulation device output is processed, intrusion event type is identified, and decides whether to report to the police。
The invention also discloses a kind of fiber fence system for monitoring intrusion mode identification method based on above-mentioned fiber fence system for monitoring intrusion, it comprises the steps:
Vibration signal on step S101, fiber bragg grating vibration sensor senses fence, output is to wavelength demodulation device;
Described vibration signal is converted to sensor wavelength variable signal by step S102, wavelength demodulation device, and with set time length system design is identified various typical case intrusion events be acquired, acquiring sampled signal a, output is to signal processing termination;
The sampled signal a process that wavelength demodulation device is exported by step S103, signal processing termination, the event schema exporting result representative according to grader decides whether to report to the police。
Especially, described step S103 specifically includes:
Step S1031, sampled signal a is carried out pretreatment;
Step S1032, temporal signatures to sampled signal a are analyzed, and build the characteristic vector of sampled signal a, and it can be used as one group of input of grader;
Step S1033, build based on the grader of neutral net and initialize, the various typical case's intrusion events being identified by system design carry out presorting and determining the grader target output of each typical case's intrusion event, the characteristic vector utilizing each typical case's intrusion event builds the training sample set of grader, and grader is trained;
The characteristic vector of the sampled signal a that step S1034, extraction wavelength demodulation device export, it is entered in the grader trained in step S1033 and carries out output judgement, the grader target output of the grader obtained output with each typical case's intrusion event is compared, if the error of the target output of grader output and some typical case's intrusion event is in a preset range, then this sampled signal a is classified as this kind of event schema, and report to the police accordingly。
Especially, described step S1031 specifically includes:
First sampled signal a is removed averaging operation, deducts the average of sampled signal a by each sample point of sampled signal, it is determined that a dynamic threshold parameter thresh,
Thresh=sum (abs (a))/length (a) * (1-sum (abs (a))/length (a))6
Wherein, a represents sampled signal, abs (a) represents that each sample point to sampled signal a takes absolute value, sum (abs (a)) represents that each sample point to sampled signal a takes absolute value and carries out sum operation, and length (a) represents the number of the sample point of sampled signal a;Then sampled signal a is carried out segmentation, every length (a)/one region Q of N number of division, thus can obtain Q1, Q2 ..., QN is N number of region altogether, and adds up the number of cross point LC respectively in regional according to below equation,
Wherein, M=length (a), Γ u} is function, when u is true time, Γ u}=1, and when u is fictitious time, Γ { u}=0。
LC is specifically defined as: total a (0) in one section of interval Q, a (1), ..., a (n-1) is n sampling point altogether, if for 2 adjacent a (i) and a (i+1), there is the value of a (i) less than dynamic threshold parameter thresh set in advance, and the value of a (i+1) is more than or equal to dynamic threshold parameter thresh set in advance, then think between these 2, there is a LC, the LC numerical value that in the interval Q of statistics, the total number of the LC that all two adjacent points obtain is in this siding-to-siding block length。
Especially, described step S1032 specifically includes:
Determine the distribution character of LC according to the number of LC in sampled signal a regional Q, and determine therefrom that a stack features value p1 of sampled signal a, p2, p3, p4, p5, and it can be used as one group of input of grader;
Wherein, p1 is the LC numerical value sum of sampled signal a first half section, p2 is the LC numerical value sum of sampled signal a second half section, p3=p1-p2, p4=p1+p2, p5=sum (abs (a)), abs (a) represent that each sample point to sampled signal a takes absolute value, and sum (abs (a)) represents that each sample point to sampled signal a takes absolute value and carries out sum operation。
Especially, the various typical case's intrusion events being identified by system design in described step S1033 carry out presorting and determine that the grader target of each typical case's intrusion event exports, and specifically include:
By N kind typical case intrusion event Si (i=1,2,3 ..., N) represent with vector (e1, e2), and thereby determine that two outputs of grader, represent with t1, t2 respectively;It is the three-layer neural network being made up of input layer, hidden layer, output layer by the classifier design based on BP neutral net, wherein, input layer has five neurons, corresponding five eigenvalue p1, p2, p3, p4, p5 that will input, hidden layer has five neurons, output layer has two neurons, respectively corresponding two outputs t1, t2;Input layer, hidden layer, output layer each neuron of each layer be responsible for receiving from the input information of last layer, and output is passed to each neuron of next layer;
Each neuronic output Y=F (W*X+b), wherein, X is neuronic input vector, and W is weight matrix, and b is offset parameter, and F is neuronic activation primitive;
Wherein, for hidden layer, all five neuronic activation primitives are tansig (), and its expression formula is tansig (n)=2/ (1+exp (-2*n))-1;For output layer, all two neuronic activation primitives are purelin (), and its expression formula is purelin (n)=n。
Especially, described step S1033 utilizes the characteristic vector of each typical case's intrusion event build the training sample set of grader, and grader is trained, specifically include:
Compose initial value to neuronic weight W all in neutral net and biasing b, the instruction sample that the characteristic vector of each typical case's intrusion event builds grader is practiced this collection P={Pi=[pi1,pi2,...,pi5] (i=1,2 ..., N) }, N is the number of samples gathered;Successively the characteristic vector Pi extracting from the signal of certain typical case intrusion event Si in training sample set P is input in network, and calculate output layer by layer according to each neuronic mathematic(al) representation, until obtaining the output layer output (e1 of neutral net, e2) value, then the value of t1, t2 is exported (e1 with the target corresponding to typical case intrusion event Si respectively, e2) compare, obtain mean square error;Adjusted every layer of neuronic weight W and biasing b layer by layer by back propagation, the error sum of squares making neutral net is minimum。
Especially, described step S1034 specifically includes:
Extract the characteristic vector of the sampled signal a of wavelength demodulation device output, be entered in the grader trained, obtain the output t of graderi1、ti2, by ti1、ti2Grader target output (e1 with each typical case's intrusion event, e2) compare, if the error of the target output of grader output and some typical case's intrusion event is in a preset range, then this sampled signal a is classified as this kind of event schema, and report to the police accordingly。
The present invention size according to sampled signal energy, set a dynamic threshold parameter thresh, sampled signal is carried out segmentation by certain number, and statistical signal amplitude exceedes the LC number of threshold parameter thresh in every section, thus obtaining LC distribution character, the distribution character calculating and adding up LC obtains a stack features value for characterizing signal, this stack features value being input to a grader based on neutral net and makes decisions output, the event schema representated by the output result of grader decides whether to report to the police。Compared with tradition fence system for monitoring intrusion, the present invention is while intrusion detection and location, realize the identification to invasion signal type, by arranging a dynamic threshold parameter higher than noise level, the interference of noise can be removed well, automatically adjust threshold value according to the size of signal energy, it is ensured that the accuracy of the characteristic vector extracted, it is effectively increased the accuracy rate of identification, solves the wrong report problem under strong interference environments such as being applied to wind and rain well。
Accompanying drawing explanation
The fiber fence system for monitoring intrusion structural representation that Fig. 1 provides for the embodiment of the present invention;
The system for monitoring intrusion mode identification method main flow chart that Fig. 2 provides for the embodiment of the present invention;
The system for monitoring intrusion mode identification method detail flowchart that Fig. 3 provides for the embodiment of the present invention;
The grader structural representation based on neutral net that Fig. 4 provides for the embodiment of the present invention。
Detailed description of the invention
Below in conjunction with drawings and Examples, the invention will be further described。It is understood that specific embodiment described herein is used only for explaining the present invention, but not limitation of the invention。It also should be noted that, for the ease of describing, accompanying drawing illustrate only part related to the present invention but not full content。
Refer to shown in Fig. 1, the fiber fence system for monitoring intrusion structural representation that Fig. 1 provides for the embodiment of the present invention。
In the present embodiment, fiber fence system for monitoring intrusion specifically includes: sensing optic cable 101, wavelength demodulation device 102, signal processing termination 103。
Described sensing optic cable 101 is laid on fence, is in series with N number of Fiber Bragg Grating FBG (FBG) vibrating sensor 104, the vibration signal on perception fence in this sensing optic cable 101, output is to wavelength demodulation device 102, wherein, N is positive integer, can be actually needed setting according to user。
Described wavelength demodulation device 102 is connected with fiber bragg grating vibration sensor 104, for described vibration signal is converted to sensor wavelength variable signal, and the signal of intrusion event is sampled。
Described signal processing termination 103 is connected with wavelength demodulation device 102, for the sampled signal of wavelength demodulation device 102 output is processed, intrusion event type is identified, and decides whether to report to the police。Signal processing termination described in the present embodiment 103 selects computer。
As in figure 2 it is shown, fiber fence system for monitoring intrusion mode identification method specifically includes following steps in the present embodiment:
Vibration signal on step S201, fiber bragg grating vibration sensor 104 perception fence, output is to wavelength demodulation device 102。
Described vibration signal is converted to sensor wavelength variable signal by step S202, wavelength demodulation device 102, and with set time length system design is identified various typical case intrusion events be acquired, acquiring sampled signal a, output is to signal processing termination 103。
The sampled signal a process that wavelength demodulation device 102 is exported by step S203, signal processing termination 103, the event schema exporting result representative according to grader decides whether to report to the police。
As it is shown on figure 3, signal processing termination 103 is as follows to the processing procedure of sampled signal:
Step S2031, sampled signal a is carried out pretreatment。
First sampled signal a being gone averaging operation, deduct the average of sampled signal a by each sample point of sampled signal, the sampled signal a to ensure various typical case's intrusion event all can be distributed in a more unified scope, is so easy to be uniformly processed。Determine a dynamic threshold parameter thresh that can do adjustment automatically according to sampled signal energy size,
Thresh=sum (abs (a))/length (a) * (1-sum (abs (a))/length (a))6
Wherein, a represents sampled signal, abs (a) represents that each sample point to sampled signal a takes absolute value, sum (abs (a)) represents that each sample point to sampled signal a takes absolute value and carries out sum operation, and length (a) represents the number of the sample point of sampled signal a。
Then sampled signal a is carried out segmentation, every length (a)/one region Q of N number of division, thus can obtain Q1, Q2 ..., QN is N number of region altogether, and adds up the number of cross point LC respectively in regional according to below equation,
Wherein, M=length (a), Γ u} is function, when u is true time, Γ u}=1, and when u is fictitious time, Γ { u}=0。
It should be noted that, LC is defined as the mathematical statistics of a kind of cross point number, it is specifically defined as: total a (0) in one section of interval Q, a (1), ..., a (n-1) is n sampling point altogether, if for 2 adjacent a (i) and a (i+1), there is the value of a (i) less than dynamic threshold parameter thresh set in advance, and the value of a (i+1) is more than or equal to dynamic threshold parameter thresh set in advance, then think between these 2, there is a LC, the LC numerical value that in the interval Q of statistics, the total number of the LC that all two adjacent points obtain is in this siding-to-siding block length。
Step S2032, temporal signatures to sampled signal a are analyzed, and build the characteristic vector of sampled signal a, and it can be used as one group of input of grader。
Determine the distribution character of LC according to the number of LC in sampled signal a regional Q, and determine therefrom that a stack features value p1 of sampled signal a, p2, p3, p4, p5, and it can be used as one group of input of grader;
Wherein, p1 is the LC numerical value sum of sampled signal a first half section, p2 is the LC numerical value sum of sampled signal a second half section, p3=p1-p2, p4=p1+p2, p5=sum (abs (a)), abs (a) represent that each sample point to sampled signal a takes absolute value, and sum (abs (a)) represents that each sample point to sampled signal a takes absolute value and carries out sum operation。
Step S2033, build based on the grader of neutral net and initialize, the various typical case's intrusion events being identified by system design carry out presorting and determining the grader target output of each typical case's intrusion event, the characteristic vector utilizing each typical case's intrusion event builds the training sample set of grader, and grader is trained。
The various typical case's intrusion events being identified by system design carry out presorting and determine that the grader target of each typical case's intrusion event exports, and specifically include:
By N kind typical case intrusion event Si (i=1,2,3 ..., N) with vector (e1, e2) represent, for instance typical case intrusion event S1 can use (0,1) to characterize, typical event S2 can use (1,0) characterizing, typical case intrusion event S3 characterizes with (1,1)。And thereby determine that and two outputs of grader represent respectively with t1, t2;As shown in Figure 4, it is the three-layer neural network being made up of input layer, hidden layer, output layer by the classifier design based on BP neutral net, wherein, input layer has five neurons, corresponding five eigenvalue p1, p2, p3, p4, p5 that will input, hidden layer has five neurons, and output layer has two neurons, respectively corresponding two outputs t1, t2;Input layer, hidden layer, output layer each neuron of each layer be responsible for receiving from the input information of last layer, and output is passed to each neuron of next layer。
Each neuronic output Y=F (W*X+b), wherein, X is neuronic input vector, and W is weight matrix, and b is offset parameter, and F is neuronic activation primitive。
Wherein, for hidden layer, all five neuronic activation primitives are tansig (), and its expression formula is tansig (n)=2/ (1+exp (-2*n))-1;For output layer, all two neuronic activation primitives are purelin (), and its expression formula is purelin (n)=n。
The characteristic vector utilizing each typical case's intrusion event builds the training sample set of grader, and grader is trained, and specifically includes:
Compose initial value to neuronic weight W all in neutral net and biasing b, the instruction sample that the characteristic vector of each typical case's intrusion event builds grader is practiced this collection P={Pi=[pi1,pi2,...,pi5] (i=1,2 ..., N) }, N is the number of samples gathered;Successively the characteristic vector Pi extracting from the signal of certain typical case intrusion event Si in training sample set P is input in network, and calculate output layer by layer according to each neuronic mathematic(al) representation, until obtaining the output layer output (e1 of neutral net, e2) value, then the value of t1, t2 is exported (e1 with the target corresponding to typical case intrusion event Si respectively, e2) compare, obtain mean square error;Adjusted every layer of neuronic weight W and biasing b layer by layer by back propagation, the error sum of squares making neutral net is minimum。
Often one Pi of input carries out once above-mentioned renewal process, and the error being performed until neutral net output reduces to acceptable degree。
So far, the training process of neutral net completes, and just the intrusion event signal of monitoring can be identified and be classified by the trained grader completed below。
The characteristic vector of the sampled signal a that step S2034, extraction wavelength demodulation device 102 export, it is entered in the grader trained in step S2033 and carries out output judgement, the grader target output of the grader obtained output with each typical case's intrusion event is compared, if the error of the target output of grader output and some typical case's intrusion event is in a preset range, then this sampled signal a is classified as this kind of event schema, and report to the police accordingly。
Extract the characteristic vector of the sampled signal a of wavelength demodulation device 102 output, be entered in the grader trained, obtain the output t of graderi1、ti2, by ti1、ti2Grader target output (e1 with each typical case's intrusion event, e2) compare, if the error of the target output of grader output and some typical case's intrusion event is in a preset range, then this sampled signal a is classified as this kind of event schema, and report to the police accordingly。Wherein, described preset range is a user-defined minimum scope, can flexible。
If occurring without intrusion event, then turn again to signals collecting step, carry out feature extraction and the classification of sampled signal next time。Thus, constantly circulation repeats the above link, can realize the real-time monitoring of intrusion event。
Technical scheme is while intrusion detection and location, realize the identification to invasion signal type, by arranging a dynamic threshold parameter higher than noise level, the interference of noise can be removed well, size according to signal energy adjusts threshold value automatically, ensure the accuracy of the characteristic vector extracted, be effectively increased the accuracy rate of identification, solve the wrong report problem under strong interference environments such as being applied to wind and rain well。
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle。It will be appreciated by those skilled in the art that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute without departing from protection scope of the present invention。Therefore, although the present invention being described in further detail by above example, but the present invention is not limited only to above example, when without departing from present inventive concept, other Equivalent embodiments more can also be included, and the scope of the present invention is determined by appended right。