CN105512994A - Fault-tolerant perimeter intruder detection method - Google Patents
Fault-tolerant perimeter intruder detection method Download PDFInfo
- Publication number
- CN105512994A CN105512994A CN201610005679.2A CN201610005679A CN105512994A CN 105512994 A CN105512994 A CN 105512994A CN 201610005679 A CN201610005679 A CN 201610005679A CN 105512994 A CN105512994 A CN 105512994A
- Authority
- CN
- China
- Prior art keywords
- detector
- belief
- degree
- detection
- fault
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
Abstract
The invention discloses a fault-tolerant perimeter intruder detection method, including three links: detector inner fault tolerance, fault tolerance between detectors, and trust management and fault detector determination. In a first link, the detection output of a detector is obtained; in a second link, the alarm output of the detector is obtained; and in a third link, the credibility of the detector is dynamically adjusted according to results of the first and second links. The method can reduce false alarm and false dismissal in a perimeter intruder detection system caused by ambient noises and detector faults, and find faulted detectors, thereby allowing the system to work normally when a plurality of detectors break down, and substantially improving the fault-tolerant capability and reliability of the perimeter intruder detection system. The method can directly update hardware based on an original perimeter intruder detection system, and possess low enforcement costs. The method can be applied to borderlines, the surrounding of an airport, the surrounding of an electric power facility, coastlines, etc., and reduce dependence on artificial maintenance.
Description
Technical field
The invention belongs to technical field of security and protection, particularly relate to a kind of fault tolerant perimeter intrusion detecting method.
Background technology
Perimeter intrusion detecting system, as the important component part of safety-protection system, is the important defence line together assured the safety for life and property of the people.The invasion result detected when personnel enter investigative range, can be transferred to the control center of system, notify staff, and can cause alarm in this locality by perimeter intrusion detecting system in time.Well deterrence and interception are served to intrusion behavior.
While perimeter intrusion detecting system obtains more and more widespread use, its performance also more and more receives publicity.The performance of perimeter intrusion detecting system is primarily of alert rate (false positive mistake) and false dismissed rate (False negative error) are weighed by mistake.Alert rate characterizes detection system when not invading generation and sends the probability of warning by mistake; False dismissed rate characterizes the probability that when invasion occurs, detection system is not reported to the police.This two indices directly affects the fastness in this security of the lives and property defence line, road, and reducing false dismissal, by mistake police is the important goal that perimeter intrusion detecting system is improved.
Summary of the invention
The object of the invention is to for the deficiencies in the prior art, a kind of fault tolerant perimeter intrusion detecting method is provided.
The object of the invention is to be achieved through the following technical solutions: a kind of fault tolerant perimeter intrusion detecting method, the method comprises the following steps:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported;
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector.
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.
Further, described step (1) is specific as follows:
Note detector i is c at the result of detection of moment t
it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results
that is:
Wherein
t
0for the work period of detector.
Detection is used to export threshold value Th
dby summarized results
binaryzation, obtains a boolean results, and the detection as detector exports O
i(t), that is:
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
Further, described step (2) is specific as follows:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N
i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR
1, SR
2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as
remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V
i.For meeting
subregion, neighbours' detector set of calculating detector i
voting results O
i, spa(SR):
Wherein r
j(t-T
0) for detector j is at (t-T
0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O
i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is
suppose that the maximal rate of invader is v
max, then
calculate by following formula:
Wherein
For meeting
subregion, neighbours' detector set of calculating detector i
the voting results O in a upper moment
i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment
i, tem(SR) obtain the subregion of maximal value, be designated as
Final summarized results
as follows:
Adopt threshold determination pair
carry out binaryzation, note decision threshold is AlarmTh, and the warning of note detector exports as A
i(t), then whether detector is reported to the police and can be determined by following formula:
Wherein, A
it ()=1 represents that detector i reports to the police, refer to detect invader; A
it ()=0 represents that detector i mourns in silence, refer to not find invader.
When detector i sends alerting signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be
report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be
represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.
Further, described step (3) is specific as follows:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when
during generation, α/P (A should be deducted in the degree of belief of this detector
i(t)=1), this value is designated as α
s.In like manner, when
during generation, the degree of belief of this detector deducts α/P (A
i(t)=0), be denoted as α
a.That is:
α
s=α/P(A
i(t)=1)
α
a=α/P(A
i(t)=0)
Correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When
during generation, the degree of belief of detector increases β/P (A
i(t)=1), be denoted as β
a; When
during generation, the degree of belief of this detector increases β/P (A
i(t)=0), be denoted as β
s.That is:
β
a=β/P(A
i(t)=1)
β
s=β/P(A
i(t)=0)
The average general P (R of invasion is there is by detector search coverage in detector working environment
i(t)=1) estimate P (A
i(t)=1).
Detector i is defined as tr in the degree of belief of moment t
i(t).At each work period T
0, according to the degree of belief of the output result of determination adjustment detector of detector.
The detector degree of belief value upper limit is made to be TR
0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
If detector i is at the degree of belief tr of moment t
it () is lower than failure determination threshold TR
th, then think that detector i is judged as fault detector at moment t, be designated as m
i(t)=1; If detector i is normal in t, be then designated as m
i(t)=0.That is:
By detector degree of belief tr
ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r
i(t).Trust weight is provided by following formula:
The invention has the beneficial effects as follows: the inventive method can reduce the mistake police and false dismissal that are caused by neighbourhood noise, breakdown detector in perimeter intrusion detecting system, and can fault detector be found out, system still normally can be run when numerous detector breaks down, greatly improve perimeter intrusion detecting system survivability and reliability.The inventive method can directly based on original perimeter intrusion detecting system hardware upgrading, and implementation cost is low.The inventive method can be applicable to the places such as boundary line, airport periphery, electric power facility periphery, shore line, reduces the dependence to manual maintenance.
Accompanying drawing explanation
Fig. 1 is fault tolerant perimeter intrusion detecting method flow diagram of the present invention;
Fig. 2 is (3, δ) heavy overlay area subregion schematic diagram;
Fig. 3 is invader's two adjacent moment position views.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
As shown in Figure 1, a kind of fault tolerant perimeter intrusion detecting method provided by the invention, the method comprising the steps of:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported; Be specially:
Note detector i is c at the result of detection of moment t
it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results
that is:
Wherein
t
0for the work period of detector.
Through converging the long and
be a serial number, the final detection of detector exports the Boolean that should be and characterize with or without invasion, uses detection to export threshold value Th
dby summarized results
binaryzation, obtains a boolean results, and the detection as detector exports O
i(t), that is:
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector.Be specially:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N
i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR
1, SR
2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as
it is a sub regions of (3, δ) heavy overlay area in each dashed polygon frame in Fig. 2.
Remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V
i.For meeting
subregion, neighbours' detector set of calculating detector i
voting results O
i, spa(SR):
Wherein r
j(t-T
0) for detector j is at (t-T
0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O
i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is
suppose that the maximal rate of invader is v
max, then
calculate by following formula:
Wherein
as shown in Figure 3, if invader is in little dotted line frame region in the moment, then go up the position of invader at quarter in a period of time in large dotted line frame region.
Next, calculate the result after the temporal correlation considering detector i, for meeting
subregion, neighbours' detector set of calculating detector i
the voting results O in a upper moment
i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment
i, tem(SR) obtain the subregion of maximal value, be designated as
The result of temporal correlation and spatial coherence is gathered with the result of detection of self, obtains final summarized results
It is the Boolean whether a sign reports to the police equally that the warning of detector exports, and the same mode of threshold determination that adopts carries out binaryzation.Namely decision threshold is AlarmTh, and the warning of note detector exports as A
i(t), then whether detector is reported to the police and can be determined by following formula:
Wherein, A
it ()=1 represents that detector i reports to the police, refer to detect invader; A
it ()=0 represents that detector i mourns in silence, refer to not find invader.
A
it () is using correcting errors of exporting as each detector detection of criterion.
When detector i sends alerting signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be
report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be
represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.Therefore this system may be used for the many places invasion in detection perimeter and can not omit, instead of can only detect place invasion.
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.Be specially:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
SilentFault behavior and AlarmFault behavior should catch hell.Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when
during generation, α/P (A should be deducted in the degree of belief of this detector
i(t)=1), this value is designated as α
s.In like manner, when
during generation, the degree of belief of this detector deducts α/P (A
i(t)=0), be denoted as α
a.That is:
α
s=α/P(A
i(t)=1)
α
a=α/P(A
i(t)=0)
Same, correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When
during generation, the degree of belief of detector increases β/P (A
i(t)=1), be denoted as β
a; When
during generation, the degree of belief of this detector increases β/P (A
i(t)=0), be denoted as β
s.That is:
β
a=β/P(A
i(t)=1)
β
s=β/P(A
i(t)=0)
More than process relates to P (A
i(t)=1), but it is not known, and the average general P (R of invasion can be occurred by detector search coverage in detector working environment
i(t)=1) estimate it, namely think P (A
i(t)=1)=P (R
i(t)=1).
Detector i is defined as tr in the degree of belief of moment t
i(t).At each work period T
0, according to the degree of belief of the output result of determination adjustment detector of detector.
If do not limited the scope of the degree of belief of detector, then after a period of operation, degree of belief value may become very high to normal detector.Thus, when this detector breaks down, need just to make the degree of belief of this detector reduce for a long time, be unfavorable for this fault detector of Timeliness coverage.Therefore, need detector degree of belief value capping.In like manner, we are also its setting lower limit.The detector degree of belief value upper limit is made to be TR
0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
No matter there is the fault of which kind of type in detector, and all can cause the decline of its degree of belief because of its SilentFault behavior or AlarmFault behavior, therefore, all faults all can be embodied by degree of belief.If detector i is at the degree of belief tr of moment t
it () is lower than failure determination threshold TR
th, then think that detector i is judged as fault detector at moment t, be designated as m
i(t)=1; If detector i is normal in t, be then designated as m
i(t)=0.That is:
The detector with higher degree of belief is more reliable, and therefore the ballot weight of each detector fault-tolerant link between detector can be embodied by the degree of belief of this detector.
By detector degree of belief tr
ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r
i(t).Between detector in fault-tolerant link, fault detector does not participate in voting (trust weight is 0).Only have when detector is normal, this detector just can participate in ballot.Trust weight is provided by following formula:
Claims (4)
1. a fault tolerant perimeter intrusion detecting method, is characterized in that, the method comprises the following steps:
(1) fault-tolerant in detector: by the result of detection weighted sum in this detector a period of time, to obtain converging the long and, and the detection as detector after this result binaryzation is exported;
(2) fault-tolerant between detector: to infer by the result of detection Nearest Neighbor with Weighted Voting of adjacent detector current time the position that invader is current, and inferred the position in invader's upper moment on this basis.The position in invader by inference upper moment, is weighted ballot to moment result of detection on adjacent detector again.After the result summation of twice Nearest Neighbor with Weighted Voting, through binaryzation, the warning as detector exports.Described weights are relevant with the degree of belief of detector;
(3) trust management and fault detector judge: the warning of the detector that the detection output of the detector obtained according to step 1 and step 2 obtain exports, the degree of belief of dynamic conditioning detector, when the detection output of detector and the warning Output rusults of detector consistent time, increase the degree of belief of detector; When the detection output of detector and the warning Output rusults of detector inconsistent time, reduce the degree of belief of detector; When the degree of belief of detector is lower than degree of belief threshold value, judge this breakdown detector.
2. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (1) is specific as follows:
Note detector i is c at the result of detection of moment t
it (), detector weighting on the basis of present detection results gathers the result of detection in L moment in the past, obtains summarized results
that is:
Wherein
t
0for the work period of detector.
Detection is used to export threshold value Th
dby summarized results
binaryzation, obtains a boolean results, and the detection as detector exports O
i(t), that is:
Wherein 1 represents that detector detection exports as reporting to the police, and 0 represents that detector detection exports as mourning in silence.
3. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (2) is specific as follows:
If have 1 P can be detected by k detector, and the probability that each detector detects this point is all more than or equal to δ, then this P is detected device network (k, δ) and re-covers lid.In like manner, also claim detector network to meet (k, δ) at P point and re-cover lid.If any point in the Ω of region all meets (k, δ) re-cover lid, then claim region Ω to meet (k, δ) and re-cover lid.
If there is identical (k, δ) heavy overlay area, then these two detectors neighbours' detector each other in two detectors.The set of neighbours' detector of detector i is defined as N
i.
(k, δ) being re-covered lid Region dividing is subregion S set R={SR
1, SR
2..., every sub regions is all covered by identical detector set.The detector set covering identical subregion SR with the detection probability being more than or equal to δ is designated as
remember that having (k, the δ) overlapped to weigh overlay area with the search coverage of detector i is V
i.For meeting
subregion, neighbours' detector set of calculating detector i
voting results O
i, spa(SR):
Wherein r
j(t-T
0) for detector j is at (t-T
0) trust weight in moment;
If invader appears in certain sub regions in t, then multiple detectors that invader may be capped this subregion detect simultaneously, and the Nearest Neighbor with Weighted Voting result of this subregion is the maximal value in neighbouring subregion.Namely invader should at maximum O
i, spa(SR) subregion corresponding to, is designated as subregion
If the set of the subregion that invader may be in the upper moment is
suppose that the maximal rate of invader is v
max, then
calculate by following formula:
Wherein
For meeting
subregion, neighbours' detector set of calculating detector i
the voting results O in a upper moment
i, tem(SR):
Then in a upper moment, the position that invader may locate should be O of upper moment
i, tem(SR) obtain the subregion of maximal value, be designated as
Final summarized results
as follows:
Adopt threshold determination pair
carry out binaryzation, note decision threshold is AlarmTh, and the warning of note detector exports as A
i(t), then whether detector is reported to the police and can be determined by following formula:
Wherein, A
it ()=1 represents that detector i reports to the police, refer to detect invader; A
it ()=0 represents that detector i mourns in silence, refer to not find invader.
When detector i sends alerting signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
represent that this detector is correctly reported to the police; Otherwise the output of this detector is judged to be
report to the police with representing this detector error.
When detector i sends silent signal to control center, if there is A
jt ()=1 meets
then the output of this detector is judged to be
mourn in silence with representing this detector error; Otherwise the output of this detector is judged to be
represent that this detector is correctly mourned in silence.
Control center accepts the detection information that on circumference, numerous detector returns simultaneously, if fault-tolerant between fault-tolerant and detector in detector, has detector A (t)=1, then system provides a place and reports to the police; If there is multiple detector to meet A (t)=1, then system provides many places warning.
4. a kind of fault tolerant perimeter intrusion detecting method according to claim 1, it is characterized in that, described step (3) is specific as follows:
Keep the misdeed of mourning in silence to be called SilentFault behavior when detector should be sent warning, the behavior sending warning when this being mourned in silence is called AlarmFault behavior.
Note is α (α >0) to the penalty value of SilentFault behavior, when namely each SilentFault behavior occurs, the degree of belief of this detector deducts α.So, when
during generation, α/P (A should be deducted in the degree of belief of this detector
i(t)=1), this value is designated as α
s.In like manner, when
during generation, the degree of belief of this detector deducts α/P (A
i(t)=0), be denoted as α
a.That is:
α
s=α/P(A
i(t)=1)
α
a=α/P(A
i(t)=0)
Correctly export behavior for detector, each degree of belief of this detector of giving increases β (β >0).When
during generation, the degree of belief of detector increases β/P (A
i(t)=1), be denoted as β
a; When
during generation, the degree of belief of this detector increases β/P (A
i(t)=0), be denoted as β
s.That is:
β
a=β/P(A
i(t)=1)
β
s=β/P(A
i(t)=0)
The average general P (R of invasion is there is by detector search coverage in detector working environment
i(t)=1) estimate P (A
i(t)=1).
Detector i is defined as tr in the degree of belief of moment t
i(t).At each work period T
0, according to the degree of belief of the output result of determination adjustment detector of detector.
The detector degree of belief value upper limit is made to be TR
0, represent that this detector is reliable; Lower limit is 0, represents this breakdown detector.That is:
If detector i is at the degree of belief tr of moment t
it () is lower than failure determination threshold TR
th, then think that detector i is judged as fault detector at moment t, be designated as m
i(t)=1; If detector i is normal in t, be then designated as m
i(t)=0.That is:
By detector degree of belief tr
ithe ballot weight of t this detector that () determines fault-tolerant link between detector, is called trust weight r
i(t).Trust weight is provided by following formula:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610005679.2A CN105512994B (en) | 2016-01-04 | 2016-01-04 | A kind of fault tolerant perimeter intrusion detecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610005679.2A CN105512994B (en) | 2016-01-04 | 2016-01-04 | A kind of fault tolerant perimeter intrusion detecting method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105512994A true CN105512994A (en) | 2016-04-20 |
CN105512994B CN105512994B (en) | 2019-10-25 |
Family
ID=55720952
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610005679.2A Active CN105512994B (en) | 2016-01-04 | 2016-01-04 | A kind of fault tolerant perimeter intrusion detecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105512994B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109858632A (en) * | 2019-02-15 | 2019-06-07 | 网宿科技股份有限公司 | A kind of method and device of threshold value |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860866A (en) * | 2010-05-25 | 2010-10-13 | 电子科技大学 | Intrusion detection and positioning method of non-uniform sensitivity nodes of anti-intrusion system sensing network |
CN103605951A (en) * | 2013-09-11 | 2014-02-26 | 中科润程(北京)物联科技有限责任公司 | Novel behavior characteristic identification algorithm for vibration intrusion detection |
US20140266683A1 (en) * | 2013-03-13 | 2014-09-18 | Honeywell International Inc. | System and method of anomaly detection |
-
2016
- 2016-01-04 CN CN201610005679.2A patent/CN105512994B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101860866A (en) * | 2010-05-25 | 2010-10-13 | 电子科技大学 | Intrusion detection and positioning method of non-uniform sensitivity nodes of anti-intrusion system sensing network |
US20140266683A1 (en) * | 2013-03-13 | 2014-09-18 | Honeywell International Inc. | System and method of anomaly detection |
CN103605951A (en) * | 2013-09-11 | 2014-02-26 | 中科润程(北京)物联科技有限责任公司 | Novel behavior characteristic identification algorithm for vibration intrusion detection |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109858632A (en) * | 2019-02-15 | 2019-06-07 | 网宿科技股份有限公司 | A kind of method and device of threshold value |
CN109858632B (en) * | 2019-02-15 | 2021-06-04 | 网宿科技股份有限公司 | Method and device for determining threshold |
Also Published As
Publication number | Publication date |
---|---|
CN105512994B (en) | 2019-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10535251B1 (en) | Alarm signaling technology | |
CN101562537B (en) | Distributed self-optimized intrusion detection alarm associated system | |
US20180278894A1 (en) | Surveillance system | |
CN102612065B (en) | Quick fault-tolerance detection method for monitoring abnormal event by wireless sensor network | |
US20160088502A1 (en) | Method and network device for cell anomaly detection | |
CN105868629B (en) | Security threat situation assessment method suitable for electric power information physical system | |
CN104464158B (en) | Fire alarm linkage control method and system | |
CN105915388A (en) | Sensor fault detection method and system based on distributed network | |
CN204066307U (en) | A kind of safety-protection system based on technology of Internet of things | |
US20160148500A1 (en) | Automatic intrusion detector threshold controlling systems and methods | |
CN101076174B (en) | Method for processing warn windstorm | |
CN103533571A (en) | FEDAV (fault-tolerant event detection algorithm based on voting) | |
CN206097378U (en) | Novel smart home security system | |
CN105512994A (en) | Fault-tolerant perimeter intruder detection method | |
CN109361728A (en) | A kind of classification Incident Reporting System and method based on the multi-source sensing data degree of association | |
CN104200589A (en) | Invasion detecting method, device and security and protection monitoring system thereof | |
CN112645173A (en) | Elevator monitoring method, device, medium and electronic equipment | |
CN113612229B (en) | Power self-healing method for multi-node fault test | |
CN106297120A (en) | A kind of intelligent human body infrared sensing interlink alarm system | |
CN113225532A (en) | Intelligent linkage video monitoring system and method | |
CN106408220A (en) | Method and device for generating super warning in unattended manner | |
CN215180009U (en) | Gas monitoring device with humiture is corrected function | |
CN106231644A (en) | The wireless sensor network data transmission method of distribution line area video monitoring | |
CN102984730B (en) | Distributive detection decision coalescing method of wireless sensor network based on trust model | |
KR102534920B1 (en) | Disaster detection and response support system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |