CN109068099A - Virtual electronic fence monitoring method and system based on video monitoring - Google Patents
Virtual electronic fence monitoring method and system based on video monitoring Download PDFInfo
- Publication number
- CN109068099A CN109068099A CN201811033412.XA CN201811033412A CN109068099A CN 109068099 A CN109068099 A CN 109068099A CN 201811033412 A CN201811033412 A CN 201811033412A CN 109068099 A CN109068099 A CN 109068099A
- Authority
- CN
- China
- Prior art keywords
- image
- monitoring
- electronic fence
- virtual electronic
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19604—Image analysis to detect motion of the intruder, e.g. by frame subtraction involving reference image or background adaptation with time to compensate for changing conditions, e.g. reference image update on detection of light level change
Abstract
The invention discloses a kind of virtual electronic fence monitoring method and system based on video monitoring, the image data that monitoring method includes the following steps: step 1, acquires monitoring area;Whether step 2, the image for judging acquisition are first frame images, if so, drawing polygon in the first frame image of acquisition as the key area to be monitored, are performed the next step;Otherwise it directly performs the next step;Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, exports warning message, and execute step 1, otherwise, directly executes step 1.The present invention draws arbitrary polygon as key monitoring region by mouse, target is judged whether there is by shadow Detection algorithm to enter, eliminate the shade in image, it avoids generating false alarm because key monitoring region has shade entrance, the accuracy for improving monitoring realizes the key monitoring of key area.
Description
Technical field
The present invention relates to monitoring technology fields, in particular to a kind of virtual electronic fence based on video monitoring
Monitoring method and system.
Background technique
Fence is currently used anti-theft alarm system, and system is mainly by electronic fence host, front end accessory, rear end
Control system three parts composition.The common fence of tradition generally constitutes infrared light curtain by photoelectric sensor, passes through
Infrared light blocks reflection to have detected whether that object invades fence, to trigger alarm or take pictures.But it is this traditional
Fence needs to provide power supply at the scene and is laid with electron boundary, and the expenditure of financial resources, material resources and manpower is larger.Fence
There are shortcomings for system, such as installation is troublesome, electronic equipment is easy to damage, maintenance cost is high.
Safety defense monitoring system based on video can real-time, vivid, really reflect the case where monitoring area, improved tool
Alarm signal can be provided in real time when there is target invasion by having the video security monitoring system of warning function.But current video prison
Controlling real-time alarm system is performed intrusion detection to the whole region of video monitoring, can not realize the emphasis prison of key area
Control, data processing amount is big, low efficiency.
Therefore, how to design a kind of virtual electronic fence system based on video monitoring, meet to some importance region into
Row monitoring alarm, and the problem of accuracy rate with higher is those skilled in the art's urgent need to resolve.
Summary of the invention
The present invention to solve the above-mentioned problems, propose a kind of virtual electronic fence monitoring method based on video monitoring and
System draws arbitrary polygon as key monitoring region by mouse, by shadow Detection algorithm judge whether there is target into
Enter, eliminate the shade in image, avoids generating false alarm because key monitoring region has shade entrance, improve the standard of monitoring
True property, realizes the key monitoring of key area.
To achieve the goals above, the present invention adopts the following technical scheme:
A kind of virtual electronic fence monitoring method based on video monitoring, includes the following steps:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, drawing in the first frame image of acquisition
Polygon is performed the next step as the key area to be monitored;Otherwise it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded,
Warning message is exported, otherwise, executes the first step.
Further, the method for judging whether the key area has target to invade by shadow Detection algorithm is specific
Are as follows:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses
Median filter process;
Step 32: pretreated present image is converted to grayscale image;
Step 33, the grayscale image that present frame pretreatment image is converted and the grayscale image phase after previous frame image preprocessing
Subtract, obtain the difference of the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful
Foreground point performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converts with previous frame source images
HSV image subtraction, the pixel of threshold value that the difference of H, S are less than setting is judged as shade, the difference of H, S are greater than setting
Threshold value point as foreground point, then extract all foreground point regions profile obtain foreground point region, when foreground point region
Area be greater than setting foreground point region area threshold when, then judge that current frame image has target invasion;Otherwise without target
Invasion.
Further, the method for the non-key area in the shielding present frame source images are as follows: by the institute of non-key area
There is pixel value to be set as 0.
Further, the step 2 draws arbitrary polygon as emphasis to be monitored in the first frame image of acquisition
The method in region specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise,
Execute step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as polygon
Initial vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and holds
Row step 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step
21;
End vertex in the picture, and is separately connected Shang Yiding by step 25, the end vertex for being recorded as polygon, label
Point and initial vertex terminate;
Further, the step 3 further include: in the case where not alarming when setting monitoring area illuminance abrupt variation, judgement
When continuous multiple frames image has target invasion, warning message is just exported.
Further, the mode of the output warning message includes local alarm, SMS alarm, wechat push alarm.
A kind of virtual electronic fence system based on video monitoring, comprising: camera, ups power, memory, acousto-optic report
Alert device, monitor terminal, the monitor terminal use a kind of above-mentioned virtual electronic fence monitoring method based on video monitoring, institute
It states camera and monitoring area is set for acquiring the image data of monitoring area, and the data of acquisition are transferred to and are monitored eventually
End, the monitor terminal respectively with camera, ups power, memory, combined aural and visual alarm connection.
Further, a kind of virtual electronic fence system based on video monitoring, further includes wireless communication module, the nothing
Line communication module is connect with monitor terminal.
Further, the wireless communication module includes SIM card and wireless network card, and the SIM card and wireless network card are distinguished
It is connect with monitor terminal.
Further, a kind of virtual electronic fence system based on video monitoring, further includes remote terminal, and the monitoring is eventually
Module and remote terminal wirelessly communicate by wireless communication at end, and the remote terminal includes remote computer or/and mobile phone terminal.
Compared with prior art, the invention has the benefit that
(1) present invention judges whether there is target by shadow Detection algorithm and enters key area, eliminates the yin in image
Shadow avoids generating false alarm because key monitoring region has shade entrance, improves the accuracy of monitoring, realize key area
Key monitoring.
(2) The present invention gives the specific method for delimiting key monitoring region by mouse, what can be monitored as needed is set
Multiple key areas are drawn in standby or region in same monitoring image, are monitored to key area, and the treating capacity of data is big
It is big to reduce, improve the working efficiency of monitoring system.
(3) monitoring system of the invention increases illuminance abrupt variation false alarm prevention setting function, by lamping on and off caused light
May be configured as whether alarming according to mutation, user as needed can be with self-setting.
(4) present invention constructs the monitoring that virtual fence carries out key area, overcomes the laying of conditional electronic fence
Electron boundary causes defect at high cost, and the boundary of key area is drawn out on the image of acquisition, realizes the weight of key area
Point monitoring.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows
Meaning property embodiment and its explanation do not constitute the restriction to the application for explaining the application.
Fig. 1 is the virtual electronic fence system structure chart of the invention based on video monitoring;
Fig. 2 is the virtual electronic fence monitoring method flow chart of the invention based on video monitoring;
Fig. 3 is the method flow diagram that the present invention judges target invasion;
Fig. 4 is that the present invention draws polygon key monitoring region method flow chart;
Fig. 5 is alarm flow figure of the present invention.
Specific embodiment:
The invention will be further described with embodiment with reference to the accompanying drawing.
It is noted that described further below be all exemplary, it is intended to provide further instruction to the application.Unless another
It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field
The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular
Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet
Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
Following embodiments are a kind of typical embodiment of the application, as shown in Figure 1, a kind of void based on video monitoring
Quasi- electronic enclosure system, comprising: camera, ups power, combined aural and visual alarm, monitor terminal, the camera are arranged in monitored space
Domain is used to acquire the image data of monitoring area, and the data of acquisition are transferred to monitor terminal, and the monitor terminal includes place
Manage device, memory, display and keyboard and mouse, the processor of the monitor terminal respectively with camera, ups power, sound
Light crossing-signal connection, the processor are connect with memory, display, keyboard and mouse respectively.
Preferably, monitor terminal can be embedded system.Embedded system is application-centered, is with computer technology
Basis, software and hardware can be cut, and adapt to application system to the dedicated meter of the strict demands such as function, reliability, cost, volume, power consumption
Calculation machine system.What embedded system usually executed is the task predetermined with particular requirement.Only due to embedded system
For a special task, designer can optimize it, reduce size reduction cost.System has key monitoring
Region automatically saves and load function, when being re-powered after power-off, system self-starting, and the automatic key monitoring region and corresponding of loading
Parameter setting.
When the monitoring system installation of the present embodiment, camera is fixed on to the optimum bit that can take key monitoring region
It sets, and is connect with monitoring system, the camera collects monitoring area image, and acquired image is transferred to monitoring eventually
End, monitor terminal judge acquire image in key area whether have target intrusion, if so, then by alarm signal export into
Row alarm, otherwise, continues with the next frame image of acquisition.It is used to power to whole system by ups power, system is furnished with
UPS uninterruption power source, system has power failure indicator light in the event of a loss of power, and sends current failure alarm to finger
Fixed cell-phone number and WeChat ID.
Preferably, a kind of virtual electronic fence system based on video monitoring, further includes wireless communication module, described wireless
Communication module is connect with monitor terminal.Preferably, the wireless communication module includes SIM card and wireless network card, the SIM card and
Wireless network card is connect with monitor terminal respectively.
Preferably, a kind of virtual electronic fence system based on video monitoring, further includes remote terminal, the monitor terminal
Module and remote terminal wirelessly communicate by wireless communication, and the remote terminal includes remote computer or/and mobile phone terminal.
As shown in Fig. 2, a kind of virtual electronic fence system based on video monitoring of the present embodiment is using a kind of following base
In the virtual electronic fence monitoring method of video monitoring, include the following steps:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, passing through in the first frame image of acquisition
Mouse draws polygon as the key area to be monitored, and performs the next step;Otherwise, it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded,
Warning message is exported, and executes step 1, otherwise, directly executes step 1.
When system is installed, camera is fixed on to the optimum position that can take key monitoring region, and and monitor terminal
Connection, camera collects monitoring area image, acquired image is transferred to monitor terminal, if it is the first frame of monitoring
Image, monitor terminal issue the information that key area delimited in prompt, are drawn in the first frame image of acquisition by mouse polygon
For shape as the key area to be monitored, whether monitor terminal judges the key area in the image of acquisition by shadow Detection algorithm
There is target intrusion, if so, then alarm signal output is alarmed, otherwise, continues with the next frame image of acquisition.
After system is installed, need to draw arbitrary polygon as the weight to be monitored by mouse in first frame image
Point region.When first time clicking left mouse button, indicates the starting point of polygon, then successively click left mouse button, as more
The vertex of side shape;Right mouse button is clicked each time, and representing a polygon rendering terminates, and it is polygon that mouse draws key monitoring region
Shape program flow diagram is as shown in Figure 4.Multiple arbitrary polygons can be drawn in the same image, in key monitoring image
Multiple key areas, and the area polygonal vertex of key monitoring is saved in the memory of monitor terminal.
Preferably, the step 2 draws arbitrary polygon as emphasis area to be monitored in the first frame image of acquisition
The method in domain is drawn by operation mouse, method specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise,
Execute step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as polygon
Initial vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and holds
Row step 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step
21;
End vertex in the picture, and is separately connected Shang Yiding by step 25, the end vertex for being recorded as polygon, label
Point and initial vertex terminate;
The mouse action action signal includes clicking left button, right-click, mobile mouse.
As shown in figure 3, described judge that the method whether key area has target to invade has by shadow Detection algorithm
Body are as follows:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses
Median filter process;
Step 32: pretreated present image is converted to grayscale image;
Step 33, the grayscale image that present frame pretreatment image is converted and the grayscale image phase after previous frame image preprocessing
Subtract, obtain the difference of the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful
Foreground point performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converts with previous frame source images
HSV image subtraction, the pixel of threshold value that the difference of H, S are less than setting is judged as shade, the difference of H, S are greater than setting
Threshold value point as foreground point, then extract all foreground point regions profile obtain foreground point region, when foreground point region
Area be greater than setting foreground point region area threshold when, then judge that current frame image has target invasion;Otherwise without target
Invasion.
The method for whether having target to invade in detection image is to compare the previous frame image picture of present image and present image
Element value realizes only monitoring key area by the non-key area in shielding present frame source images.Preferably, shielding is current
The method of non-key area in frame source images is that all pixels value of key area non-in image is set as 0.Pass through ash first
The comparison of the pixel value of degree figure primarily determines whether there is target invasion, then further determined that target intrusion by HSV image, really
Set the goal intrusion accuracy improve, by shadow Detection algorithm, eliminate the shade in image, avoid because of key monitoring region
There is shade to enter and generate false alarm.Whether the key area in the detection image of the present embodiment has target intrusion, to image
The non-key area in present frame source images is shielded when pretreatment first, noise jamming is then overcome using median filter process,
The pretreated image only includes the image of key area.
It is settable to work as continuous multiple frames image to avoid the false alarm due to caused by illuminance abrupt variation (as interior turns on light, turns off the light)
It just alarms when having target invasion, in the case where not alarming when setting monitoring area illuminance abrupt variation, judges that continuous multiple frames image has
When target is invaded, warning message is just exported.
Preferably, the mode of the output warning message includes local alarm or/and SMS alarm or/and wechat push report
The modes such as alert.As shown in figure 5, can will be reported by wireless network card when monitor terminal monitors that there is target invasion in key area
Alert information or/and monitoring image or/and monitor video are sent to remote terminal, and the remote terminal is mobile phone or remote computation
Machine, so that related personnel receives monitoring information at the first time.When the wireless communication failure established by wireless network card,
This system is also provided with SIM card, passes through network interface card under normal operation and carries out remote transmission to image and video data, works as network interface card
When obstructed, SIM card is automatically switched to, carries out remote data transmission, and the obstructed alarm signal of simultaneous transmission network interface card using flow.
The warning message includes device name, device location, the information such as time of target intrusion.Preferably, local report
Alert is that monitor terminal directly alarms alarm signal local combined aural and visual alarm.SMS alarm is to send to cell-phone number comprising report
The short message of alert information, wechat push alarm by target enter the photo at key monitoring region moment or video be sent to it is specified micro-
On signal, or send warning message.Positioning device can also be set on the camera of key area, and the warning message is also
Map is shown including alarm region position.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention
The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not
Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.
Claims (10)
1. a kind of virtual electronic fence monitoring method based on video monitoring, which comprises the steps of:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, drawing in the first frame image of acquisition polygon
Shape is performed the next step as the key area to be monitored;Otherwise it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, output
Warning message, and step 1 is executed, otherwise, directly execute step 1.
2. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: described
The method whether key area has target to invade is judged by shadow Detection algorithm specifically:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses intermediate value
Filtering processing;
Step 32: pretreated present image is converted to grayscale image;
Step 33 subtracts each other grayscale image and the grayscale image after previous frame image preprocessing that present frame pretreatment image converts, obtains
The difference for obtaining the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful prospect
Point, performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converted with previous frame source images
HSV image subtraction, is judged as shade for the pixel that the difference of H, S are less than the threshold value of setting, and the difference of H, S are greater than setting
The point of threshold value is as foreground point, and the profile for then extracting all foreground point regions obtains foreground point region, when foreground point region
When area is greater than the area threshold in the foreground point region of setting, then judge that current frame image has target invasion;Otherwise enter without target
It invades.
3. a kind of virtual electronic fence monitoring method based on video monitoring as claimed in claim 2, it is characterised in that: described
The method for shielding the non-key area in present frame source images are as follows: all pixels value of non-key area is set as 0.
4. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: described
Step 2 draws method of the arbitrary polygon as key area to be monitored in the first frame image of acquisition specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise, it executes
Step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as the starting of polygon
Vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and execute step
Rapid 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step 21;
Step 25, the end vertex for being recorded as polygon, label in the picture, and by end vertex be separately connected a upper vertex with
Initial vertex terminates.
5. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: when setting
Determine in the case where not alarming when monitoring area illuminance abrupt variation, when judging that continuous multiple frames image has target invasion, just exports alarm signal
Breath.
6. a kind of virtual electronic fence monitoring method based on video monitoring as claimed in claim 1 or 5, it is characterised in that:
The mode for exporting warning message includes local alarm, SMS alarm, wechat push alarm.
7. a kind of virtual electronic fence system based on video monitoring characterized by comprising camera, ups power, storage
Device, combined aural and visual alarm, monitor terminal, the monitor terminal is using described in any one of claims 1-6 a kind of based on video prison
The image data that monitoring area is used to acquire monitoring area is arranged in the virtual electronic fence monitoring method of control, the camera,
And the data of acquisition are transferred to monitor terminal, the monitor terminal respectively with camera, ups power, memory, sound-light alarm
Device connection.
8. such as a kind of virtual electronic fence system based on video monitoring of claim 7, it is characterised in that: further include wireless communication
Module, the wireless communication module are connect with monitor terminal.
9. such as a kind of virtual electronic fence system based on video monitoring of claim 8, it is characterised in that: the radio communication mold
Block includes SIM card and wireless network card, and the SIM card and wireless network card are connect with monitor terminal respectively.
10. such as a kind of virtual electronic fence system based on video monitoring of claim 8, it is characterised in that: further include long-range end
End, module and remote terminal wirelessly communicate the monitor terminal by wireless communication, and the remote terminal includes remote computer
Or/and mobile phone terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811033412.XA CN109068099B (en) | 2018-09-05 | 2018-09-05 | Virtual electronic fence monitoring method and system based on video monitoring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811033412.XA CN109068099B (en) | 2018-09-05 | 2018-09-05 | Virtual electronic fence monitoring method and system based on video monitoring |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109068099A true CN109068099A (en) | 2018-12-21 |
CN109068099B CN109068099B (en) | 2020-12-01 |
Family
ID=64759640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811033412.XA Active CN109068099B (en) | 2018-09-05 | 2018-09-05 | Virtual electronic fence monitoring method and system based on video monitoring |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109068099B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110276577A (en) * | 2019-06-06 | 2019-09-24 | 深圳前海微众银行股份有限公司 | A kind of management method and device of virtual warehouse |
CN110446166A (en) * | 2019-08-12 | 2019-11-12 | 广州小鹏汽车科技有限公司 | The monitoring method and device of a kind of positioning device close to geography fence |
CN110766899A (en) * | 2019-11-11 | 2020-02-07 | 四川航天神坤科技有限公司 | Method and system for enhancing electronic fence monitoring early warning in virtual environment |
CN111310556A (en) * | 2019-12-20 | 2020-06-19 | 山东汇佳软件科技股份有限公司 | Drowning prevention safety supervision system based on primary and middle school student area and monitoring method thereof |
CN111369797A (en) * | 2018-12-25 | 2020-07-03 | 航天信息股份有限公司 | Vehicle monitoring method, electronic fence construction method, electronic fence and device |
CN111832357A (en) * | 2019-04-19 | 2020-10-27 | 苏州涟漪信息科技有限公司 | Mobile event detection method and device |
CN112261366A (en) * | 2020-10-20 | 2021-01-22 | 贵州电网有限责任公司 | Operation monitoring device |
CN112417946A (en) * | 2020-09-17 | 2021-02-26 | 国网天津静海供电有限公司 | Boundary crossing detection method and system for designated area of power construction site |
CN112802302A (en) * | 2020-12-31 | 2021-05-14 | 国网浙江省电力有限公司双创中心 | Electronic fence method and system based on multi-source algorithm |
CN112800947A (en) * | 2021-01-27 | 2021-05-14 | 上海电气集团股份有限公司 | Video monitoring method, system, electronic equipment and storage medium |
CN112837471A (en) * | 2019-11-22 | 2021-05-25 | 上海弘视通信技术有限公司 | Security monitoring method and device for internet contract room |
CN112883866A (en) * | 2021-02-08 | 2021-06-01 | 上海新纪元机器人有限公司 | Method, system and storage medium for detecting regional invasion in real time |
CN112948627A (en) * | 2019-12-11 | 2021-06-11 | 杭州海康威视数字技术股份有限公司 | Alarm video generation method, display method and device |
CN113269940A (en) * | 2021-03-17 | 2021-08-17 | 瑞驰博方(北京)科技有限公司 | Electronic fence alarm method and device, computer equipment and storage medium |
CN113379985A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Nursing electronic fence alarm device |
CN113379987A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Design method of nursing electronic fence module |
CN113379984A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Electronic nursing fence system |
CN114663841A (en) * | 2022-05-23 | 2022-06-24 | 安徽送变电工程有限公司 | Moving target identification method and system based on deep learning |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017573A (en) * | 2007-02-09 | 2007-08-15 | 南京大学 | Method for detecting and identifying moving target based on video monitoring |
CN102024146A (en) * | 2010-12-08 | 2011-04-20 | 江苏大学 | Method for extracting foreground in piggery monitoring video |
US9196150B2 (en) * | 2013-03-15 | 2015-11-24 | Honeywell International Inc. | System and method for video monitoring of restricted areas below bucket trucks, lineworkers on power distribution poles or other elevated loads |
CN105225515A (en) * | 2015-10-26 | 2016-01-06 | 深圳市麦谷科技有限公司 | A kind of method for supervising based on fence and system |
CN107154133A (en) * | 2017-06-22 | 2017-09-12 | 南京邮电大学 | A kind of regional early warning method based on defined position |
CN107230188A (en) * | 2017-04-19 | 2017-10-03 | 湖北工业大学 | A kind of method of video motion shadow removing |
CN107507383A (en) * | 2017-09-13 | 2017-12-22 | 江苏跃鑫科技有限公司 | A kind of intrusion detection monitoring method |
CN107767390A (en) * | 2017-10-20 | 2018-03-06 | 苏州科达科技股份有限公司 | The shadow detection method and its system of monitor video image, shadow removal method |
-
2018
- 2018-09-05 CN CN201811033412.XA patent/CN109068099B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017573A (en) * | 2007-02-09 | 2007-08-15 | 南京大学 | Method for detecting and identifying moving target based on video monitoring |
CN102024146A (en) * | 2010-12-08 | 2011-04-20 | 江苏大学 | Method for extracting foreground in piggery monitoring video |
US9196150B2 (en) * | 2013-03-15 | 2015-11-24 | Honeywell International Inc. | System and method for video monitoring of restricted areas below bucket trucks, lineworkers on power distribution poles or other elevated loads |
CN105225515A (en) * | 2015-10-26 | 2016-01-06 | 深圳市麦谷科技有限公司 | A kind of method for supervising based on fence and system |
CN107230188A (en) * | 2017-04-19 | 2017-10-03 | 湖北工业大学 | A kind of method of video motion shadow removing |
CN107154133A (en) * | 2017-06-22 | 2017-09-12 | 南京邮电大学 | A kind of regional early warning method based on defined position |
CN107507383A (en) * | 2017-09-13 | 2017-12-22 | 江苏跃鑫科技有限公司 | A kind of intrusion detection monitoring method |
CN107767390A (en) * | 2017-10-20 | 2018-03-06 | 苏州科达科技股份有限公司 | The shadow detection method and its system of monitor video image, shadow removal method |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111369797A (en) * | 2018-12-25 | 2020-07-03 | 航天信息股份有限公司 | Vehicle monitoring method, electronic fence construction method, electronic fence and device |
CN111832357A (en) * | 2019-04-19 | 2020-10-27 | 苏州涟漪信息科技有限公司 | Mobile event detection method and device |
CN110276577A (en) * | 2019-06-06 | 2019-09-24 | 深圳前海微众银行股份有限公司 | A kind of management method and device of virtual warehouse |
CN110446166A (en) * | 2019-08-12 | 2019-11-12 | 广州小鹏汽车科技有限公司 | The monitoring method and device of a kind of positioning device close to geography fence |
CN110766899A (en) * | 2019-11-11 | 2020-02-07 | 四川航天神坤科技有限公司 | Method and system for enhancing electronic fence monitoring early warning in virtual environment |
CN112837471A (en) * | 2019-11-22 | 2021-05-25 | 上海弘视通信技术有限公司 | Security monitoring method and device for internet contract room |
CN112948627B (en) * | 2019-12-11 | 2023-02-03 | 杭州海康威视数字技术股份有限公司 | Alarm video generation method, display method and device |
CN112948627A (en) * | 2019-12-11 | 2021-06-11 | 杭州海康威视数字技术股份有限公司 | Alarm video generation method, display method and device |
CN111310556A (en) * | 2019-12-20 | 2020-06-19 | 山东汇佳软件科技股份有限公司 | Drowning prevention safety supervision system based on primary and middle school student area and monitoring method thereof |
CN113379985A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Nursing electronic fence alarm device |
CN113379985B (en) * | 2020-02-25 | 2022-09-27 | 北京君正集成电路股份有限公司 | Nursing electronic fence alarm device |
CN113379987B (en) * | 2020-02-25 | 2022-10-21 | 北京君正集成电路股份有限公司 | Design method of nursing electronic fence module |
CN113379984B (en) * | 2020-02-25 | 2022-09-23 | 北京君正集成电路股份有限公司 | Electronic nursing fence system |
CN113379984A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Electronic nursing fence system |
CN113379987A (en) * | 2020-02-25 | 2021-09-10 | 北京君正集成电路股份有限公司 | Design method of nursing electronic fence module |
CN112417946A (en) * | 2020-09-17 | 2021-02-26 | 国网天津静海供电有限公司 | Boundary crossing detection method and system for designated area of power construction site |
CN112261366A (en) * | 2020-10-20 | 2021-01-22 | 贵州电网有限责任公司 | Operation monitoring device |
CN112802302A (en) * | 2020-12-31 | 2021-05-14 | 国网浙江省电力有限公司双创中心 | Electronic fence method and system based on multi-source algorithm |
CN112802302B (en) * | 2020-12-31 | 2022-11-18 | 国网浙江省电力有限公司双创中心 | Electronic fence method and system based on multi-source algorithm |
CN112800947A (en) * | 2021-01-27 | 2021-05-14 | 上海电气集团股份有限公司 | Video monitoring method, system, electronic equipment and storage medium |
CN112883866A (en) * | 2021-02-08 | 2021-06-01 | 上海新纪元机器人有限公司 | Method, system and storage medium for detecting regional invasion in real time |
CN113269940A (en) * | 2021-03-17 | 2021-08-17 | 瑞驰博方(北京)科技有限公司 | Electronic fence alarm method and device, computer equipment and storage medium |
CN114663841A (en) * | 2022-05-23 | 2022-06-24 | 安徽送变电工程有限公司 | Moving target identification method and system based on deep learning |
Also Published As
Publication number | Publication date |
---|---|
CN109068099B (en) | 2020-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109068099A (en) | Virtual electronic fence monitoring method and system based on video monitoring | |
CN107948465B (en) | A kind of method and apparatus that detection camera is disturbed | |
US9965835B2 (en) | Defogging images and video | |
EP2357615B1 (en) | Video processing | |
CA3104723C (en) | Object detection | |
CN104333714A (en) | Signal switching method and signal switching system of spliced wall | |
CN211509189U (en) | Electric power operation field supervision equipment and system | |
CN104533526B (en) | Coal-face coal and gas prominent alarm method based on image | |
KR101454644B1 (en) | Loitering Detection Using a Pedestrian Tracker | |
CN110379106A (en) | A kind of toy intrusion detecting prior-warning device and method | |
CN106650594A (en) | Video fire detection method, device and system | |
CN204759452U (en) | Traffic conflagration detecting system based on many characteristics of video smog fuse | |
CN105450992A (en) | Smart home monitoring method and system based on motion detection | |
CN206620225U (en) | Haze penetrates camera circuit and system | |
CN103454228B (en) | Adopt the flue gas blackness supervisory system of motion detecting technology | |
CN102801964A (en) | Intelligent home monitoring method based on motion detection and system thereof | |
CN108925019A (en) | outdoor lighting intelligent control method and system | |
CN210222962U (en) | Intelligent electronic fence system | |
CN101461239A (en) | Video verification system and method for central station alarm monitoring | |
CN116246402A (en) | Monitoring method and device | |
CN113078729B (en) | Operation detection method and device applied to transformer substation, electronic equipment and medium | |
Li et al. | Application of foreground detection technology in intelligent video monitoring system of substation | |
CN202773005U (en) | Intelligent home monitoring system | |
CN111882454A (en) | Nuclear power station weight monitoring system and method | |
CN207097145U (en) | ATM in bank intelligent monitoring device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |