CN107180521A - Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics - Google Patents

Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics Download PDF

Info

Publication number
CN107180521A
CN107180521A CN201710258029.3A CN201710258029A CN107180521A CN 107180521 A CN107180521 A CN 107180521A CN 201710258029 A CN201710258029 A CN 201710258029A CN 107180521 A CN107180521 A CN 107180521A
Authority
CN
China
Prior art keywords
characteristic vector
signal
optical fiber
recognition methods
intrusion event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710258029.3A
Other languages
Chinese (zh)
Inventor
黄翔东
张皓杰
刘铁根
刘琨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201710258029.3A priority Critical patent/CN107180521A/en
Publication of CN107180521A publication Critical patent/CN107180521A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/185Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/08Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers from or to individual record carriers, e.g. punched card, memory card, integrated circuit [IC] card or smart card
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/02Preprocessing
    • G06F2218/04Denoising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/08Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching

Abstract

The invention discloses a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics and device, the recognition methods includes:It will determine that each passage of the signal feed-in all phase DFT filter group of disturbance starting point carries out frequency domain separating treatment, and calculate the normalized power value of each multi-channel output signal, multiple normalized power values are parallel output;The time domain zero-crossing rate generation characteristic vector of combined normalized performance number and whole section of disturbing signal, i.e., when described characteristic vector contains, the aspect information of frequency domain two;It is that invasion action quick high accuracy identification can be achieved by characteristic vector feed-in radial basis function neural network.Described device includes:Analog-to-digital conversion device and DSP devices.The present invention can distinguish four class intrusion events exactly;Compared to existing high-precision intrusion event recognition classifier, DMZI proposed by the invention invades action recognition device and had a clear superiority in terms of operating efficiency.

Description

Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics
Technical field
The present invention relates to digital signal processing technique field, more particularly to a kind of optical fiber perimeter security protection based on comprehensive characteristics Intrusion event recognition methods and device.
Background technology
With optical fiber and the continuous maturation of Fibre Optical Communication Technology, fibre optical sensor is developed rapidly.Based on light The perimeter security system of fine sensing technology[1][2][3]Also gradually it is taken seriously in safety-security area.With traditional infrared ray[4], electricity Sub- fence[5]Compared Deng safety-protection system, optical fiber sensing system can to directly touch or be indirectly transferred to optical fiber it is various disturb into Row monitoring in real time, sensitivity is higher thus more with practical value.It is used as a kind of fibre optical sensor of phase-modulation, double Mach- Zehnder interferometers (dual Mach-Zehnder interferometer, DMZI) distributed optical fiber sensing system[6][7] There is high sensitivity and fast response time in terms of detection disturbance event, but also can position in real time.At present, DMZI points Cloth fibre optical sensor has been widely used for all kinds of safety-security areas[8][9][10][11]
In all kinds of security protections application, the problem of being badly in need of solving accurately and accurately to recognize intrusion event, because still not having at present There is a kind of intrusion event recognition methods to take into account the Accuracy and high efficiency of classification, and the solution key of the problem is signal The design of Processing Algorithm.Particularly, seek to complete end-point detection[12][13]Afterwards, further design a kind of terse, appropriate Invasion signal characteristic method described, and combine corresponding pattern classification measure, effectively identify that all kinds of invasions are moved Make[14][15][16]
Wherein, document [14] is although the different frequencies that its characteristic vector of the wavelet recognition method of proposition can be obtained by multi-level decomposition The energy of band is characterized[17], but its amount of calculation can become big with the increase of the wavelet decomposition number of plies, in addition, this feature vector is only Frequency domain character is considered, lacks time-domain information abundant enough, therefore recognition accuracy is relatively low, is only capable of recognizing 3 class intrusion events;
And empirical mode decomposition (Empirical Mode Decomposition, EMD) method that document [16] is proposed is needed The kurtosis value of the intrinsic mode function (Intrinsic Mode Function, IMF) in decomposable process is asked for one by one, to these The obtained characteristic vector of kurtosis value combination is classified, you can accurately recognize 4 class common actions, however these IMF need through Going through the iteration of multiple complexity could obtain, therefore recognition efficiency is not high and influences practicality.
The content of the invention
The invention provides a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics and device, this hair It is bright to distinguish four class intrusion events exactly;Compared to existing high-precision intrusion event recognition classifier, the present invention is carried The DMZI gone out invades action recognition device and had a clear superiority in terms of operating efficiency, described below:
A kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics, the recognition methods includes following step Suddenly:
It will determine that each passage of the signal feed-in all phase DFT filter group of disturbance starting point carries out frequency domain separating treatment, and The normalized power value of each multi-channel output signal is calculated, each multi-channel output signal is parallel output;
The time domain zero-crossing rate generation characteristic vector of combined normalized performance number and whole section of disturbing signal, i.e., described feature to Amount is when containing, the aspect information of frequency domain two;
It is that invasion action quick high accuracy identification can be achieved by characteristic vector feed-in radial basis function neural network.
Wherein, each passage of the signal feed-in all phase DFT filter group that will determine to disturb starting point carries out frequency domain point From processing, and calculate the normalized power value of each multi-channel output signal and be specially:
The signal parallel for determining disturbance starting point is fed into all phase DFT filter group, all phase DFT filter group includes Q Individual sub- FIR filter g0,...,gQ-1, calculate filtering output yq(n) Q normalized power value Eq
Wherein, the time domain zero-crossing rate of the combined normalized performance number and whole section of disturbing signal generates characteristic vector Step is specially:
Signal x (n) overall zero-crossing rate is calculated, by the value and Q normalized power value EqThe comprehensive length that obtains is done for Q+1 Multi-feature vector F=[E0,E1,...,EQ-1,ZCR]。
Wherein, all phase DFT filter group is specially:
gq(n)=ωc(n)hq(n), q=0 ..., Q-1.
Wherein, gq(n) it is sub- FIR filter coefficient;ωc(n) it is double window convolution window;hq(n) it is filter coefficient;Q is change Amount, represents q-th of subfilter;Q is subfilter number contained by wave filter group.
Wherein, described is that invasion action quick high accuracy can be achieved to know by characteristic vector feed-in radial basis function neural network It is not specially:
By the radial basis function neural network for training the characteristic vector feed-in of unmarked classification, after having optimized Network parameter, calculate output valve Z1,...,ZP, the maximum of output valve is taken to determine affiliated point of current input feature vectors Class.
Wherein, methods described also includes:
Pass through 4 output valve Z1,...,ZPRealize the accurate identification to climbing, tapping, rock and stealing the event cut.
A kind of identifying device of the optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics, described device bag Include:Analog-to-digital conversion device and DSP devices,
Signal feeding analog-to-digital conversion device sampling is obtained into sample sequence x (n), enters DSP in the form of parallel data is inputted Device, concurrently set in filter order N, frequency vector H 0 and 1 number e and m;
Characteristic vector is obtained by the processing of DSP devices, is finally acted by the different invasion of neural network recognization.
The beneficial effect for the technical scheme that the present invention is provided is:
1st, the implementation pattern identification classification in DMZI optical fiber sensing systems, and with the very high degree of accuracy;
By verification experimental verification, the present invention has high accuracy and efficient feature, compared to the pattern-recognition side based on EMD Method has higher superiority.
2nd, the multi-feature vector simplified is constructed, realization is comprehensively described to all kinds of intrusion events;
Spy of the present invention in combination with the frequency domain and temporal signatures, the comprehensively every class intrusion event of accurate description of intrusion event Point;Meanwhile, characteristic vector proposed by the invention is extremely simplified, and only just 4 class events accurately can be retouched with 4 elements State, this lays the foundation for the pattern classification of follow-up high-accuracy high-efficiency rate.
3rd, it can avoid disturbing because of surrounding enviroment false-alarm caused by (rain, blow, the non-property invaded vibration) naturally.
Because, the power that surrounding enviroment are disturbed naturally is mainly distributed on low frequency region, and the present invention is configuring full phase When the channelized frequencies of position wave filter group are vectorial, low frequency vector element is set to zero, therefore surrounding enviroment are disturbed pair naturally Final composite character vector is not contributed, so as to avoid the generation of false-alarm phenomenon.
Brief description of the drawings
Fig. 1 is the schematic diagram of DMZI distributed optical fiber sensing systems;
Fig. 2 is DMZI distributed optical fiber sensing system intrusion event identification process figures;
Fig. 3 is intrusion event identifier design flow diagram;
Fig. 4 is wave filter group attenuation curve schematic diagram;
Wherein, (a) is the attenuation curve of wave filter group of the present invention;(b) it is the wave filter group based on classical Frequency Sampling Method Attenuation curve.
Fig. 5 is RBF neural network structure figure;
Fig. 6 is wave filter group result schematic diagram;
Wherein, (a) is climbing;(b) it is percussion;(c) it is to rock;(d) it is shearing.
Fig. 7 is the averaged feature vector schematic diagram of four kinds of intrusion events;
Wherein, (a) is climbing fence;(b) it is percussion optical cable;(c) it is to rock optical cable;(d) cut for robber.
Fig. 8 implements figure for the hardware of the present invention;
Fig. 9 is DSP internal processes flow graphs.
Table 1 is the experimental precision comparison diagram of two methods;Table 2 is the processing time comparison diagram of two methods.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, further is made to embodiment of the present invention below It is described in detail on ground.
Embodiment 1
The embodiment of the present invention is proposed a kind of based on synthesis using double Mach-Zehnder distributed optical fiber sensing systems as background The intrusion event recognition methods of feature, referring to Fig. 1, this method comprises the following steps:
101:Disturbing signal to input carries out end-point detection, judges disturbance starting point;
102:The signal feed-in all phase DFT filter group of disturbance starting point will be determined[18][19][20]Each passage enter line frequency Domain separating treatment, and calculate the normalized power value of each multi-channel output signal;
103:Combined normalized performance number and whole section of disturbing signal time domain zero-crossing rate (Zero-Crossing Rate, ZCR characteristic vector) is generated;
104:By characteristic vector feed-in RBF (Radial basis function, RBF) neutral net[21][22] Invasion action quick high accuracy identification can be achieved.
In summary, the embodiment of the present invention due to using multi-feature vector simultaneously consider intrusion event frequency domain, when Domain information, four class intrusion events can be distinguished exactly, compared to existing high-precision intrusion event recognition classifier, Had a clear superiority in terms of operating efficiency;Using all phase DFT filter group use parallel pipeline by the way of be operated, make The interchannel interference very little between each subfilter is obtained, possibility is provided for accurate characteristic vector of extracting.
Embodiment 2
The scheme in embodiment 1 is further introduced with reference to specific calculation formula, example, it is as detailed below Description:
The structural principle of distributed optical fiber sensing system based on DMZI principles is as shown in figure 1, P points are disturbance point, sensing Cable length is L.The light that laser is sent by after isolator through being equally divided into two-beam line after coupler C1, this two beam Light is injected in the double Mach-Zehnder interferometers being made up of C2, C3, and two-beam is respectively with clockwise and counterclockwise afterwards Propagated in sensing loop, and interfered on the coupler (C3 or C2) of opposite end and be output to detector PD1 and PD2 On.Optical signal is changed into electric signal by detector, by corresponding high-speed collection card (Data after stopping direct current Acquisition, DAQ) collect.Difference according to the actual requirements, capture card DAQ is set to different sample rates.
Particularly, the DAQ1 in Fig. 1 is used for end-point detection and intrusion event is classified, and DAQ2 is positioned for intrusion event. Finally, needed for by the way that (Industrial Personal Computer, IPC) execution related algorithm is realized in industrial computer Function (such as end-point detection, furnace-incoming coal and pattern classification).
Generally, the intrusion event identification of DMZI distributed optical fiber sensing systems need to generally undergo as shown in Figure 2 Flow:First, strengthen the quality of fiber-optic vibration signal by the measure of the data prediction such as noise reduction, high-pass filtering and extract event The time endpoint location of generation;Secondly, huge pretreated sample is rightly described as letter by operation characteristic extraction algorithm The characteristic vector of short refining;Finally, suitable grader is selected to train and test characteristic vector, the knowledge of output invasion action Other result.In above step, feature extraction algorithm is the main factor of influence invasion action recognition performance.
201:Initialization and pretreatment;
Fast Fourier analysis (Fast Fourier Transform, FFT) is carried out to multigroup non-intrusive sample action to obtain To the lower-cut-off frequency f of idle environmente, further use feFor cut-off frequency high-pass filter (High Pass Filter, HPF endpoint location corresponding with intrusion event in fiber-optic vibration signal) is detected.
In addition, using feWith action upper cut-off frequency fu(statistical spectral analysis can be done to common invasion vibration signal in advance to obtain To) to Q subfilter g0,...,gQ-1Coefficient configured.
Wherein, above-mentioned initialization and pretreatment the step of it is known to those skilled in the art, the embodiment of the present invention is to this Do not repeat.
202:Feature extraction;
Pretreated signal x (n) is fed into all phase DFT filter group (comprising Q sub- FIR filters parallel g0,...,gQ-1), calculate its filtering output yq(n) the Q normalized power value E of (q=0 ..., Q-1)q
In addition, signal x (n) overall zero-crossing rate (ZCR) is directly calculated, by the value and EqThe comprehensive length that obtains is done for Q+1 Multi-feature vector F=[E0,E1,...,EQ-1,ZCR]。
Wherein, the normalized power value of q-th of output signal can be calculated by following formula and obtained:
Zero-crossing rate can be calculated by following formula and obtained:
Wherein, " sign " represents to take symbol manipulation, is calculated by following formula:
203:RBF neural pattern-recognition.
The multi-feature vector F and corresponding label that feature extraction is obtained (are used to recognize all kinds of actions) feed-in RBF god It is trained through network, then the network is tested by the characteristic vector feed-in of unknown species invasion signal, and export invasion action Pattern recognition result.
As shown in figure 3, by all phase DFT filter group, input signal x (n) can be divided into and occupy different frequency passage Q subsignal y0(n),...,yQ-1(n), and then be convenient to therefrom extract specific features, as subsequent action pattern-recognition according to According to.Document [18] points out that all phase FIR filter coefficient can be obtained by following 3 easy steps.
1st, it is GENERALIZED DISCRETE LINEAR RANDOM SYSTEM inverse Fourier transform (Inverse for some frequency vector H for meeting H (k)=H (N-k) Discrete Fourier Transform, IDFT) and obtain vectorial h=[h (n-N+k) ..., h (- 1), h (0), h (1) ..., h (N-1)], i.e.,
Wherein, h (n) is filter coefficient;H (k) is filter frequencies vector;N is frequency vector length;N is variable;k For variable.
2nd, by the window f (n) that some length is N, convolution is carried out with the tilt window of itself, generation length is rolled up for 2N-1 double window Product window, i.e.,
wc(n)=f (n) * f (- n) ,-N+1≤n≤N-1, (2)
Wherein, wc(n) it is double window convolution window;F (- n) is window function.
3rd, by h (n) and wc(n) corresponding element is multiplied, and produces the filter coefficient g (n) that final length is 2N-1.
In above step, the free transmission range of wave filter is realized by changing frequency vector H in step 1.To obtain The subfilter that Q passband is located at different range is obtained, might as well be by its frequency vector HqThe expectation passband of (q=0 ..., Q-1) Element value is set to 1, and other elements are set to 0.Specifically, frequency vector HqForm it is as follows:
Wherein, e is resistance band;M is expectation passband width;Q represents q-th of subfilter.
The surrounding enviroment of DMZI systems disturb (the cut-off frequency f of the interference based on low-frequency component during without invasioneIt can pass through FFT statistical analyses are done to multigroup invasion sample to obtain).Obviously, frequency f ∈ (0, fe) in environmental disturbances to should not be used as action special Levy, therefore the H of formula (3)qIn low-frequency range there is provided e 0 suppresses to it.
The sampling rate for making DAQ1 is fs, then frequency vector HqThe analog bandwidth that occupies of each element be Δ f=fs/ N, Therefore numeric parameter e should configure as follows:
E=[fe/ Δ f]=[Nfe/fs] (4)
Wherein, symbol " [] " represents the operation that rounds up, and Δ f is the analog bandwidth that each element is occupied.
So as to the subfilter g corresponding to formula (3)qIdeal passband scope be:
F ∈ [(qm+e) Δ f, (qm+e+m) Δ f], q=0 ..., Q-1. (5)
From formula (3), (5) can be seen that, the passband width of each subfilter is m Δs f, it is assumed that the upper limit of common intrusion event Frequency is fu(can carry out FFT statistical analyses to multigroup action in advance to obtain), then the pass band width of whole wave filter group is B=fu- fe, each subfilter passband width is then B/Q, therefore parameter m configurations are as follows:
Further, the H (k) in wushu (1) replaces with the H of formula (3)q(k) it, can obtain its broad sense IDFT result of calculation hq(n)
Finally, according to step 3, the coefficient that can obtain all sub- FIR filters of Q all phase is:
gq(n)=ωc(n)hq(n), q=0 ..., Q-1. (8)
Derive and can be seen that more than, only need to use formula (4) respectively, (6) determine environmental disturbances parameter e and passband parameter m, by it Substitution formula (7), (8) can directly obtain all coefficient g of all phase FIR filter group0(n),...,gQ-1(n), i.e., by three steps Rapid all phase DFT filter design method is reduced to substitute into the realization of the step of analytic formula one, therefore proposed by the present invention for the complete of DMZI systems The method for parameter configuration of phase filter has taken into account high flexibility and high efficiency.
It is well known that FIR filtering is the continuous convolution process of feedforward, Fig. 3 Q subfilter is actually with parallel stream Pipeline mode is worked, therefore the feature extraction based on all phase DFT filter group that this method is proposed is compared without any iterative processing In EMD decomposition methods, operating efficiency is substantially increased.
As it was previously stated, the degree of accuracy of event recognition is determined by the transmission performance of all phase DFT filter.Particularly, to some For subfilter, it should be tried one's best greatly in adjacent subfilter frequency band attenuation, the coupling between characteristic vector each element could be reduced Close;In turn, in the case where event recognition precision is certain, the attenuation outside a channel of wave filter is bigger, required subfilter number Mesh is fewer, and corresponding characteristic vector length is shorter.Document [17] points out, the interpolating function of all phase DFT filter frequency response Traditional rectangular window Fourier spectrum is instead of with convolution window Fourier spectrum, therefore very big attenuation outside a channel can be ensured, below with one Instantiation illustrates the problem.
Make frequency vector length N=256, data collecting card DAQ1 sample rate fs=10KHz, the son filtering of wave filter group Device number Q=5.Analyzed by field statistics, the cut-off frequency for extrapolating environmental disturbances is fe=250Hz, general intrusion event Upper limiting frequency is fu=3500Hz, according to formula (4), (6) can determine that filter parameter e=6, m=17, window function f (n) selection Hamming windows.According to formula (7), (8) obtain 5 subfilter g0(n),...,g4(n), corresponding attenuation curve is 20lg | Gq (j2 π f) |, shown in (a) in q=0 ..., 4, such as Fig. 4;To be compared, provide using declining that classical Frequency Sampling Method is obtained Subtract curve 20lg | Hq(j2 π f) |, shown in (b) in q=0 ..., 4, such as Fig. 4.
As can be seen from Figure 4, the wave filter group transmission curve figure obtained using classical Frequency Sampling Method is had substantially in passband Ripple, the 1st side lobe attenuation of each subfilter only has -20dB;By contrast, all phase DFT filter group that this method is used is several Passband ripple is not present, the 1st side lobe attenuation of each subfilter approaches -70dB, it means that compared to Frequency Sampling Method, Degree of coupling between each subfilter of all phase DFT filter group is greatly lowered;In addition, being less than f ∈ (0,250) in frequency Hz region, the attenuation curve of all phase DFT filter group is still close to -70dB, it means that environmental disturbances can more thoroughly be disappeared Remove.These superperformances of all phase DFT filter group ensure that the high accuracy of subsequent action identification.
It can be appreciated that all phase DFT filter group parallel output subsignal y0(n),...,yQ-1(n) Q performance number reflection Energy distributions of the input signal x (n) in each frequency range, if the zero-crossing rate ZCR of these performance numbers and former whole section of input x (n) is combined, Can construct when containing, the multi-feature vector of the aspect information of frequency domain two.
1) power:It is assumed that output sample length is L, then all phase DFT filter group q-th of output signal yq(n) be averaged Power EqIt can be calculated by following formula:
Wherein, EqFor mean power.
However, due to zero-crossing rate ZCR be always at (0,1) it is interval in, and mean power may far beyond the interval, because And be ensure characteristic vector inside each element span harmony, normalized need to be done to mean power, that is, calculate as Lower performance number EqPerformance number after can finally being normalized:
2) zero-crossing rate:Zero-crossing rate ZCR is the performance indications integrally counted in time domain, and reflection is signal intensity speed journey Degree.ZCR can be calculated by following formula:
Here operator " sign " represents to take symbol manipulation, is calculated by following formula:
Both the above feature is combined, you can construct multi-feature vector F=[E0,E1,...,EQ-1, ZCR], it is used for Feed-in RBF neural carries out movement recognition.
In recent years, artificial neural network is realized by wide because having the advantages that powerful self-learning capability and being easy to hardware General concern.RBF neural has the advantages that learning algorithm fast convergence rate as a kind of feedforward neural network.This method is adopted Invasion movement recognition is carried out with RBF neural.
Most basic RBF neural is main to be made up of input layer, single hidden layer and the part of output layer three.Input layer is used as spy The input of vector is levied, its neuron number should be identical with the dimension of training sample;Single hidden layer is used as god using RBF It is connected entirely with certain weights implementation through first activation primitive, and between output layer;Output layer is then that hidden neuron is exported Linear combination, output neuron number determines by the model number of required differentiation.For the action recognition feelings of DMZI systems For condition, as shown in figure 5, needing feed-in (Q+1) dimensional vector F=[E0,E1,...,EQ-1, ZCR], it is output as the decision value of M action Z1,...,ZP, these decision values calculate by following formula:
Wherein, h is hidden neuron number, ciAnd ωi,pIt is the center corresponding to i-th of hidden neuron and power respectively Weight, ρ (F, ci) it is RBF, sample data F is normally defined to data center ciBetween Euclidean distance monotone decreasing letter Number, P is identification species number.This method is used as RBF from Gaussian function.Z is calculated according to formula (13)1,...,ZPAfterwards, Its maximum is taken to judge the classification (can recognize that P kinds invasion action altogether) of invasion action.
The training process of Fig. 5 RBF networks is as follows:For known intrusion event classification (be assumed to be pth kind, p=1 ..., P characteristic vector), Z is exported by correspondencepLabeled as 1, remaining is labeled as 0, with actual Z in training processpValue is equal with mark value Square error (means quare error, MSE) is guide, and multiple characteristic vectors for being used to train are processed, constantly optimized Each parameter (including average value c of the RBF of hidden layer1,...,ch, variances sigma1,...,σh) and hidden layer and output layer it Between weights ωi,p(i∈[1,h],p∈[1,P])。
The test process of Fig. 5 RBF networks is as follows:The network that the characteristic vector feed-in of unmarked classification is trained, is borrowed The network parameter helped after having optimized, calculates output valve Z1,...,ZP, its maximum is taken to determine the institute of current input feature vectors Category classification.
In summary, the embodiment of the present invention due to using multi-feature vector simultaneously consider intrusion event frequency domain, when Domain information, four class intrusion events can be distinguished exactly, compared to existing high-precision intrusion event recognition classifier, Had a clear superiority in terms of operating efficiency;Using all phase DFT filter group use parallel pipeline by the way of be operated, make The interchannel interference very little between each subfilter is obtained, possibility is provided for accurate characteristic vector of extracting.
Embodiment 3
Feasibility checking is carried out to the scheme in Examples 1 and 2 with reference to specific experiment, accompanying drawing and form, in detail See below description:
Test in the distributed feedback laser that lasing light emitter is 1550nm, light intensity is 3.5mV DMZI distributing optical fiber sensings Carried out in system.Sensing optic cable total length is 2.25km, DAQ1 sample rate fss=10kHz, the record time is 3s.It is common to 4 classes Intrusion event:Climbing fence, tap optical cable, rock and robber cuts 480 data acquisitions of progress, being per class intrusion event number of repetition 120 times.
The selection of characteristic vector length is primarily for from the aspect of two:On the one hand, it is contemplated that to recognize that P=4 classes invade thing Part, is the degree of accuracy of Assured Mode identification classification, and characteristic vector length Q+1 should be greater than or equal to the event number 4 to be recognized; On the other hand, because the computation complexity that can cause feature extraction using long characteristic vector increases, Q values again should not mistake Greatly.Based on considerations above, all phase subfilter number is set to Q=3 by this experiment, so that characteristic vector F length is 4 (texts The characteristic vector length of [15] is offered for 6).
Filter frequencies vector length N=256 is set, then frequency resolution Δ f=fs/N=39.0625Hz.It is right respectively Non-intrusive sample and invasion sample do FFT statistical analyses, obtain the cut-off frequency f of wave filtere=220Hz, fu=4000Hz. Therefore, the passband width of all phase DFT filter group is B=fu-fe=3780Hz, by formula (4), (6) can determine that parameter e=6, m= 32, the free transmission range that can estimate subfilter by formula (5) is respectively f ∈ [234.375,1484.375] Hz, f ∈ [1484.375,2734.375] Hz, f ∈ [2734.375,3984.375] Hz.4 classes invade signal and pass through full phase filtering Each way signal waveform after the processing of device group is as shown in Figure 6.
As can be seen from Figure 6, primary signal x (n) shape differences of 4 classes action are not obvious;At all phase DFT filter group After reason, its output signal y0(n),y1(n),y2(n) apparent difference is but showed, it ensure that the standard of follow-up mode identification Exactness.
According to formula (9)~formula (12), multi-feature vector F=[E can be calculated0,E1,...,EQ-1,ZCR].For more prominent table Up to the feature of all kinds of intrusion event characteristic vectors, the multi-feature vector of all samples contained to every class event package is averaged, and is obtained To average aggregate characteristic vector as shown in Figure 7.
As can be seen from Figure 7, the multi-feature vector of all kinds of events has significant difference:Climb signal intensity most fast, have Maximum zero-crossing rate;Rock the performance number E of signal0Maximum, E1, E2It is then far less, i.e. E0~E2Change is the most violent;Shearing letter Number E0E of the value higher than knocking0Value, E0~E2Change more acutely, and zero-crossing rate minimum.
This experiment carries out pattern-recognition using Fig. 5 RBF neural, and design parameter sets as follows:Minimum MSE values are preset For 0.0442289;Maximum neuron number h is 30.Neuron number will gradually increase, until MSE meets preset requirement.Will 4 output Z=[Z of neutral net1,Z2,Z3,Z4] represent climb, tap, rocking, shearing intrusion event respectively.Although with More training sample can improve the precision of identification, but this can increase processing time, and for more than balance 2 points, this experiment is gathered altogether 480 groups of data, wherein, the number of training of every kind of invasion signal is set to 50, and test sample number is set to 70.Table 1 gives finally Recognition success rate, and be compared with EMD methods.
From table 1 it follows that this method has greatly improved compared to EMD methods in precision aspect tool, this aspect It is due to accurate division of the wave filter group to frequency so that the degree of coupling reduction between each characteristic element so that feature is described It is more accurate;On the other hand it is due to the introducing of zero-crossing rate so that characteristic vector is while have time domain, frequency domain and statistical nature concurrently, more Plus the feature of all kinds of events is comprehensively described.
In addition, table 2 also list the processing time of EMD methods and this method.This also presents this method in terms of efficiency Great advantage.
The experimental precision contrast of the two methods of table 1
As can be seen from Table 1, this method average recognition rate is that the average recognition rate of 88.5725%, EMD methods is 85.75%, Therefore this method overall recognition accuracy is higher than EMD methods.Specifically, the accuracy of identification of this method reaches as high as 100% and (rocks thing Part), the discrimination of climbing event and shear event is above EMD methods, taps the discrimination of event close to EMD methods.Its Main reason is that:
1) this method employs multi-feature vector (EMD methods have only used single kurtosis characteristic vector) to intrusion event It is described more fully;
2) method introduces the degree of coupling of each subchannel very small all phase DFT filter group, (each time of EMD methods are repeatedly Coupled between the IMF that generation obtains still larger).
The processing time contrast of the two methods of table 2
Embodiment 4
The embodiment of the present invention 1 is corresponding with the optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics that 2 provide Identifying device, referring to Fig. 8.
Signal x (t) to be filtered is first passed around into end-point detection, the starting point that outgoing event occurs is judged, from the off, will Signal feeding A/D (analog-to-digital conversion device) samplings of a period of time obtain sample sequence x (n) below, the shape inputted with parallel data Formula enters DSP devices, in filter order N, frequency vector H 0 and 1 number e and m is concurrently set, by the inside of DSP devices Algorithm process (including input data x (n) all phase pretreatment and convolution window, Q filter coefficient vector g0,..., gQ-1, obtain the filtering output y of signal0,...,yQ-1, and then characteristic vector F is obtained, finally recognize 4 kinds not by RBF neural Same invasion action).
Wherein, Fig. 8 DSP (Digital Signal Processor, digital signal processor) is core devices, in letter In number parameter estimation procedure, following major function is completed:
(1) core algorithm is called, the filtering of input signal is completed;
(2) filter order N, filter bandwidht λ, filter passband original position p are adjusted according to actual needs, are come with this Build subfilter g.
(3) each subchannel filter result is exported respectively.
(4) calculate and obtain characteristic vector F.
(5) intrusion species is differentiated according to RBF neural.
It may be noted that as a result of digitized method of estimation, thus determine the complexity of system, real-time levels and steady Surely the principal element spent not is the periphery connection of DSP devices in Fig. 8, but the core that DSP internal program memories are stored Algorithm for estimating.
The internal processes flow of DSP devices is as shown in Figure 9.
Fig. 9 flows are divided into following several steps:
(1) need to be required (signal passband bandwidth such as to be filtered) according to concrete application first, all phase DFT filter parameter is set N, e and m.The step is the proposition real needs in terms of engineering, to cause follow-up process targetedly to be handled.
(2) according to formula (18), filter filtering coefficient g is generated.
(3) then, CPU main controllers read sampled data from I/O ports, into internal RAM.
(4) input signal is filtered using constructed all phase DFT filter group, obtains exporting yq(n), q= 0,...,Q-1。
(5) by exporting yq(n) and energy calculation formula, obtain characteristic vector F.
(6) characteristic vector F is sent into RBF neural, obtains final output Zp
It may be noted that being realized as a result of DSP so that whole parameter estimation operation becomes more flexible, can be according to signal Comprising various components concrete condition, pass through flexible in programming change algorithm inner parameter set.
The embodiment of the present invention is to the model of each device in addition to specified otherwise is done, and the model of other devices is not limited, As long as the device of above-mentioned functions can be completed.
Bibliography
[1]Rangaswamy S,van Doorn E.Perimeter security system:U.S.Patent 8, 232,878[P].2012-7-31.
[2]P.M.B.S.Girao,O.A.Postolache,J.A.B.Faria,and J.M.C.D.Pereira,“An overview and a contribution to the optical measurement of linear displacement,”IEEE Sens.J.,vol.1,no.4,pp.322–331,Dec.2001.
[3]H.Gong,H.Song,S.Zhang,Y.Jin,and X.Dong,“Curvature sensor based on hollow-core photonic crystal fiber sagnac interferometer,”IEEE Sens.J., vol.14,no.3,pp.777–780,Mar.2014.
[4] Yu Shengyun, Sun Shengli multiple wireless infrared acquisition design of Intelligent Security Guard System [J] laser with it is infrared, 2008, 38(4):345-347.
[5] the quick tension type electronic fence peripheries of Fan Zhi take precautions against Guoan in Design of Alarm System principle and application present situation [J] It is anti-, 2008 (3):42-45.
[6]Q.Sun,D.Liu,and H.Liu,“Distributed disturbance sensor based on a novel Mach–Zehnder interferometer with a fiber-loop,”Proc.SPIE,vol.6344, pp.63440K(1)–63440K(7),2006.
[7]Q.Sun,D.Liu,and H.Liu,“Distributed fiber-optic sensor with a ring Mach–Zehnder interferometer,”Proc.SPIE,vol.6781,pp.67814D(1)–67814D(8),2007.
[8]S.Xie,M.Zhang,S.Lai,and Y.Liao,“Positioning method for dual Mach- Zehnder interferometric submarine cable security system,”Proc.SPIE,vol.7677, pp.76770A–1–76770A–4,Apr.2010.
[9]L.Jiang and R.Yang,“Identification technique for the intrusion of airport enclosure based on double mach-zehnder interferometer,”Journal of Computers,vol.7,no.6,pp.1453–1459,2012.
[10]J.Juarez,E.Maier,K.Choi,and H.Taylor,“Distributed fiber-optic intrusion sensor system,”IEEE J.Lightw.Technol.,vol.23,no.6,pp.2081–2087, Jun.2005.
[11]S.Xie,Q.Zou,L.Wang,M.Zhang,Y.Li,and Y.Liao,“Positioning error prediction theory for dual Mach-Zehnder interferometric vibration sensor,” IEEE J.Lightw.Technol.,vol.29,no.3,pp.362–368,Feb.2011
[12]X.Huang,J.Yu,K.Liu,T.Liu,and Q.Chen,“Configurable filter-based endpoint detection in DMZI vibration system,”IEEE Photon.Technol.Lett., vol.26,no.19,pp.1956–1959,Oct.2014.
[13]Huang X,Wang Y,Liu K,et al.High-Efficiency Endpoint Detection in Optical Fiber Perimeter Security[J].2016,PP(99):1-1.
[14]L.Liu,W.Sun,Y.Zhou,Y.Li,J.Zheng,and B.Ren,“Security event classification method for fiber-optic perimeter security system based on optimized incremental support vector machine,”in Pattern Recognition.Springer,2014,pp.595–603.
[15]S.S.Mahmoud,Y.Visagathilagar,and J.Katsifolis,“Real-time distributed fiber optic sensor for security systems:Performance,event classification and nuisance mitigation,”Photonic sensors,vol.2,no.3,pp.225– 236,2012
[16]K.Liu,M.Tian,T.Liu,J.Jiang,Z.Ding,Q.Chen,C.Ma,C.He,H.Hu,and X.Zhang,“A high-efficiency multiple events discrimination method in optical fiber perimeter security system,”IEEE J.Lightw.Technol.,vol.33,no.23,pp.4885– 4890,2015.
[17] Li Kaiyan, Zhao Xingqun, Sun little Han, wait a kind of Regularizations for optical fiber link vibration signal pattern-recognition of Compound characteristics extracting method [J] Acta Physica Sinicas, 2015,64 (5):243-249.
[18]Huang X,Jing S,Wang Z,et al.Closed-Form FIR Filter Design Based on Convolution Window Spectrum Interpolation[J].IEEE Transactions on Signal Processing,2015,64(5):1-1.
[19] data signal all phase FFT spectrum analysis and filtering technique [M] Electronic Industry Presses, 2009.
[20]X.Huang,Y.Wang,K.Liu,T.Liu,C.Ma,and Q.Chen,“Event discrimination offiber disturbance based on filter bank in dmzi sensing system,”IEEE Photonics Journal,vol.8,no.3,pp.1–14,2016.
[21]H.Huan,D.Hien,and H.Tue,“Efficient algorithm for training interpolation RBF networks with equally spaced nodes,”IEEE Trans.Neural Netw.,vol.22,no.6,pp.982–988,Jun.2011.
[22]W.Lyons,H.Ewald,and E.Lewis,“An optical fibre distributed sensor based on pattern recognition,”J.Mater.Process.Technol,vol.127,no.1,pp.23–30, 2002.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Sequence number is for illustration only, and the quality of embodiment is not represented.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.

Claims (7)

1. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics, it is characterised in that the recognition methods Comprise the following steps:
It will determine that each passage of the signal feed-in all phase DFT filter group of disturbance starting point carries out frequency domain separating treatment, and calculate The normalized power value of each multi-channel output signal, each multi-channel output signal is parallel output;
The time domain zero-crossing rate generation characteristic vector of combined normalized performance number and whole section of disturbing signal, i.e., described characteristic vector is accumulate Containing when, the aspect information of frequency domain two;
It is that invasion action quick high accuracy identification can be achieved by characteristic vector feed-in radial basis function neural network.
2. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics according to claim 1, it is special Levy and be, each passage of the signal feed-in all phase DFT filter group that will determine to disturb starting point is carried out at frequency domain separation Manage, and calculate the normalized power value of each multi-channel output signal and be specially:
The signal parallel for determining disturbance starting point is fed into all phase DFT filter group, all phase DFT filter group includes Q son FIR filter g0,...,gQ-1, calculate filtering output yq(n) Q normalized power value Eq
3. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics according to claim 1, it is special Levy and be, the step of time domain zero-crossing rate of the combined normalized performance number and whole section of disturbing signal generates characteristic vector has Body is:
Signal x (n) overall zero-crossing rate is calculated, by the value and Q normalized power value EqIt is the comprehensive of Q+1 to do the comprehensive length that obtains Close characteristic vector F=[E0,E1,...,EQ-1,ZCR]。
4. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics according to claim 1 or 2, its It is characterised by, subfilter is specially in all phase DFT filter group:
gq(n)=ωc(n)hq(n), q=0 ..., Q-1.
Wherein, gq(n) it is sub- FIR filter coefficient;ωc(n) it is double window convolution window;hq(n) it is filter coefficient;Q is variable, Represent q-th of subfilter;Q is subfilter number contained by wave filter group.
5. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics according to claim 1, it is special Levy and be, described is that the identification of invasion action quick high accuracy can be achieved specifically by characteristic vector feed-in radial basis function neural network For:
By the radial basis function neural network for training the characteristic vector feed-in of unmarked classification, by the net after having optimized Network parameter, calculates output valve Z1,...,ZP, the maximum of output valve is taken to determine the affiliated classification of current input feature vectors.
6. a kind of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics according to claim 5, it is special Levy and be, methods described also includes:
Pass through 4 output valve Z1,...,ZPRealize the accurate identification to climbing, tapping, rock and stealing the event cut.
7. a kind of identification of optical fiber perimeter security protection intrusion event recognition methods based on comprehensive characteristics for described in claim 1 Device, it is characterised in that described device includes:Analog-to-digital conversion device and DSP devices,
Signal feeding analog-to-digital conversion device sampling is obtained into sample sequence x (n), DSP devices are entered in the form of parallel data is inputted, Concurrently set in filter order N, frequency vector H 0 and 1 number e and m;
Characteristic vector is obtained by the processing of DSP devices, is finally acted by the different invasion of neural network recognization.
CN201710258029.3A 2017-04-19 2017-04-19 Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics Pending CN107180521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710258029.3A CN107180521A (en) 2017-04-19 2017-04-19 Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710258029.3A CN107180521A (en) 2017-04-19 2017-04-19 Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics

Publications (1)

Publication Number Publication Date
CN107180521A true CN107180521A (en) 2017-09-19

Family

ID=59831983

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710258029.3A Pending CN107180521A (en) 2017-04-19 2017-04-19 Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics

Country Status (1)

Country Link
CN (1) CN107180521A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730800A (en) * 2017-11-13 2018-02-23 浙江众盟通信技术有限公司 Anti-Interference Analysis method based on fiber-optic vibration safety pre-warning system
CN108399696A (en) * 2018-03-22 2018-08-14 中科润程(北京)物联科技有限责任公司 Intrusion behavior recognition methods and device
CN108986363A (en) * 2018-08-24 2018-12-11 天津大学 Optical fiber security protection intrusion event recognition methods and device based on ARMA modeling
CN109003407A (en) * 2018-07-16 2018-12-14 胡志雄 A kind of intelligent-induction device and method invaded for detecting door and window
CN109064696A (en) * 2018-08-17 2018-12-21 成都九洲电子信息系统股份有限公司 The optical fiber perimeter security system realized based on deep learning
CN109523729A (en) * 2018-10-31 2019-03-26 天津大学 Based on the optical fiber perimeter security protection intrusion event recognition methods modeled entirely and identifier
CN110275896A (en) * 2019-05-28 2019-09-24 深圳供电局有限公司 Optical cable invasion construction event recognition method, device, equipment and readable storage medium storing program for executing
CN111160106A (en) * 2019-12-03 2020-05-15 上海微波技术研究所(中国电子科技集团公司第五十研究所) Method and system for extracting and classifying optical fiber vibration signal features based on GPU
CN111597994A (en) * 2020-05-15 2020-08-28 华侨大学 Optical fiber perimeter security intrusion event identification model construction method and security system
CN112309063A (en) * 2020-10-30 2021-02-02 魏运 Method and device for extracting hybrid fiber intrusion signal feature spectrum
WO2021207102A1 (en) * 2020-04-07 2021-10-14 Nec Laboratories America, Inc. Object localization and threat classification for optical cable protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1134712B1 (en) * 2000-03-15 2008-05-07 Siemens Aktiengesellschaft Method for the processing of the signal in a danger detector, and detector with means for the implementation of such method
CN104966076A (en) * 2015-07-21 2015-10-07 北方工业大学 Optical fiber intrusion signal classification and identification method based on support vector machine
CN105488935A (en) * 2015-12-25 2016-04-13 天津大学 Distributed optical fiber disturbance positioning system based on asymmetric double March-Zehnder interference and positioning method
CN106023499A (en) * 2016-04-28 2016-10-12 北京北邮国安技术股份有限公司 Fiber security signal dual identification method and system
CN106384463A (en) * 2016-11-24 2017-02-08 天津大学 Method for identifying opening fiber surrounding security invasion events based on mixed characteristic extraction

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1134712B1 (en) * 2000-03-15 2008-05-07 Siemens Aktiengesellschaft Method for the processing of the signal in a danger detector, and detector with means for the implementation of such method
CN104966076A (en) * 2015-07-21 2015-10-07 北方工业大学 Optical fiber intrusion signal classification and identification method based on support vector machine
CN105488935A (en) * 2015-12-25 2016-04-13 天津大学 Distributed optical fiber disturbance positioning system based on asymmetric double March-Zehnder interference and positioning method
CN106023499A (en) * 2016-04-28 2016-10-12 北京北邮国安技术股份有限公司 Fiber security signal dual identification method and system
CN106384463A (en) * 2016-11-24 2017-02-08 天津大学 Method for identifying opening fiber surrounding security invasion events based on mixed characteristic extraction

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王博: "分布式光纤周界安防系统定位和模式识别研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107730800A (en) * 2017-11-13 2018-02-23 浙江众盟通信技术有限公司 Anti-Interference Analysis method based on fiber-optic vibration safety pre-warning system
CN108399696A (en) * 2018-03-22 2018-08-14 中科润程(北京)物联科技有限责任公司 Intrusion behavior recognition methods and device
CN109003407A (en) * 2018-07-16 2018-12-14 胡志雄 A kind of intelligent-induction device and method invaded for detecting door and window
CN109064696A (en) * 2018-08-17 2018-12-21 成都九洲电子信息系统股份有限公司 The optical fiber perimeter security system realized based on deep learning
CN108986363A (en) * 2018-08-24 2018-12-11 天津大学 Optical fiber security protection intrusion event recognition methods and device based on ARMA modeling
CN109523729A (en) * 2018-10-31 2019-03-26 天津大学 Based on the optical fiber perimeter security protection intrusion event recognition methods modeled entirely and identifier
CN110275896A (en) * 2019-05-28 2019-09-24 深圳供电局有限公司 Optical cable invasion construction event recognition method, device, equipment and readable storage medium storing program for executing
CN110275896B (en) * 2019-05-28 2021-07-20 深圳供电局有限公司 Optical cable intrusion construction event identification method, device, equipment and readable storage medium
CN111160106A (en) * 2019-12-03 2020-05-15 上海微波技术研究所(中国电子科技集团公司第五十研究所) Method and system for extracting and classifying optical fiber vibration signal features based on GPU
CN111160106B (en) * 2019-12-03 2023-12-12 上海微波技术研究所(中国电子科技集团公司第五十研究所) GPU-based optical fiber vibration signal feature extraction and classification method and system
WO2021207102A1 (en) * 2020-04-07 2021-10-14 Nec Laboratories America, Inc. Object localization and threat classification for optical cable protection
US20220316921A1 (en) * 2020-04-07 2022-10-06 Nec Laboratories America, Inc Object localization and threat classification for optical cable protection
CN111597994A (en) * 2020-05-15 2020-08-28 华侨大学 Optical fiber perimeter security intrusion event identification model construction method and security system
CN111597994B (en) * 2020-05-15 2023-03-07 华侨大学 Optical fiber perimeter security intrusion event identification model construction method and security system
CN112309063A (en) * 2020-10-30 2021-02-02 魏运 Method and device for extracting hybrid fiber intrusion signal feature spectrum

Similar Documents

Publication Publication Date Title
CN107180521A (en) Optical fiber perimeter security protection intrusion event recognition methods and device based on comprehensive characteristics
CN106384463B (en) Optical fiber perimeter security protection intrusion event recognition methods based on hybrid feature extraction
CN104729667B (en) A kind of disturbance kind identification method in distributed optical fiber vibration sensing system
CN104240455B (en) A kind of disturbance event recognition methods in distribution type fiber-optic pipeline safety early warning system
Liu et al. A novel three-step classification approach based on time-dependent spectral features for complex power quality disturbances
CN103995969B (en) Configurable optical fiber invasion event occurring end point detecting method and detector
CN109165670B (en) TS-RBF fuzzy neural network robust fusion algorithm applied to infrared flame identification
CN109489800A (en) A kind of disturbance event recognition methods in distribution optic cable vibration safety pre-warning system
Huang et al. An event recognition scheme aiming to improve both accuracy and efficiency in optical fiber perimeter security system
CN104376306A (en) Optical fiber sensing system invasion identification and classification method and classifier based on filter bank
CN108986363A (en) Optical fiber security protection intrusion event recognition methods and device based on ARMA modeling
Yan et al. Bearing fault diagnosis via a parameter-optimized feature mode decomposition
CN105023379A (en) Signal identification method of fiber perimeter early-warning system of airport
CN103116957A (en) Method for optical fiber perimeter security and protection system shielding climate impact
CN103956756A (en) Electric system low-frequency oscillating mode identification method
Huang et al. Hybrid feature extraction-based intrusion discrimination in optical fiber perimeter security system
CN111160106A (en) Method and system for extracting and classifying optical fiber vibration signal features based on GPU
Zhao et al. Probabilistic principal component analysis assisted new optimal scale morphological top-hat filter for the fault diagnosis of rolling bearing
Sun et al. Variational mode decomposition-based event recognition in perimeter security monitoring with fiber optic vibration sensor
CN111639583A (en) Method and system for identifying power quality disturbance of power grid
CN105549107B (en) The optical fiber disturbance event end-point detecting method and detector of flexibly configurable
CN109523729A (en) Based on the optical fiber perimeter security protection intrusion event recognition methods modeled entirely and identifier
CN109617051B (en) New energy power system low-frequency oscillation parameter identification method
CN114415056A (en) Distributed power supply island fault detection method
Karimian et al. Novel method based on Teager Energy Operator for online tracking of power quality disturbances

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170919