CN109326073A - A kind of wireless sensor network safety defense monitoring system based on multipoint positioning - Google Patents

A kind of wireless sensor network safety defense monitoring system based on multipoint positioning Download PDF

Info

Publication number
CN109326073A
CN109326073A CN201811022256.7A CN201811022256A CN109326073A CN 109326073 A CN109326073 A CN 109326073A CN 201811022256 A CN201811022256 A CN 201811022256A CN 109326073 A CN109326073 A CN 109326073A
Authority
CN
China
Prior art keywords
information
face
module
criminal
transferred
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811022256.7A
Other languages
Chinese (zh)
Inventor
张晓琴
潘玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Industry Polytechnic College
Original Assignee
Chongqing Industry Polytechnic College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Industry Polytechnic College filed Critical Chongqing Industry Polytechnic College
Priority to CN201811022256.7A priority Critical patent/CN109326073A/en
Publication of CN109326073A publication Critical patent/CN109326073A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/1966Wireless systems, other than telephone systems, used to communicate with a camera
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of wireless sensor network safety defense monitoring system based on multipoint positioning, including camera group, video identification module, face obtain module, analysis module, face recognition module, Zui Fanku, database, controller, display module, alarm modules, 110 alarm modules, 120 seek help module and data recording module;The present invention monitors cell in real time by the camera group of coverage cell, monitor video is transferred to video identification module later, module is obtained by face later, face recognition module and criminal library, the face information of criminal can be recognized, and it can inquire which platform camera shooting this section of monitor video is automatically when comparing and face information occur into monitor video, the appearance position of criminal's face information in conjunction with before and after, it can obtain several cameras for taking criminal's face information, the routing information of criminal is capable of forming in conjunction with the station location marker of camera.

Description

A kind of wireless sensor network safety defense monitoring system based on multipoint positioning
Technical field
The invention belongs to place monitoring field, it is related to a kind of multipoint positioning technology, it is specifically a kind of based on multipoint positioning Wireless sensor network safety defense monitoring system.
Background technique
Safety defense monitoring system be using optical fiber, coaxial cable or microwave its closure loop in transmission video signal, and The system for constituting independent completion is shown and recorded from camera shooting to image.It can in real time, image, be truly reflected monitored object, The viewing distance of human eye is not only greatly extended, and expands the function of human eye, it can be replaced under rugged environment It is artificial to carry out long-time monitoring, allow people it can be seen that being monitored all situations actually occurred at scene, and remember by video recorder Record is got off.Alarm system equipment alarms to illegal invasion simultaneously, and the alarm signal of generation inputs alarm host machine, alarm host machine Triggering monitoring system is recorded a video and is recorded.
Installation safety monitoring equipment first choice will select monitoring host computer, be selected at computer and install monitor card or embedded additional Hard disk video recorder does your monitoring host computer.Computer monitor card is relatively suitble to be familiar with computer to install, and has that professional is on duty, function More place can be required, its entirety investment is relatively low.Due to being to install monitor card additional inside computer, so computer wants 24 Hour booting;As for the latter, it does not need professional knowledge, does not need on duty yet, operates fairly simple.
And it is current, be both provided with monitoring system in most of cell, but seldom have one kind can intelligent recognition it is logical The criminal of seizing, and the control system of movement routine function of the wanted criminal in cell is obtained automatically;And it can not be in cell some years Record slightly larger some in the device for sometimes meeting with some emergency cases and being reacted in time on earth;To solve drawbacks described above, A solution is now provided.
Summary of the invention
The purpose of the present invention is to provide a kind of wireless sensor network safety defense monitoring system based on multipoint positioning.
The technical problems to be solved by the invention are as follows:
(1): how the fugitive wanted criminal of intelligent recognition there are cell and automatic alarms, while criminal can be automatically tracked small The mobile routing information in area;
(2): how to identify trace a suspect, and staff can be automatically reminded to and inquired;
(3): how intelligent recognition cell some ages excessively high personnel, which meet with emergency case, lies on the floor, and is recognizing it It sounds an alarm in time afterwards and notifies 120 first aids;
The purpose of the present invention can be achieved through the following technical solutions:
A kind of wireless sensor network safety defense monitoring system based on multipoint positioning, including camera group, video identification mould Block, face obtain module, analysis module, face recognition module, Zui Fanku, database, controller, display module, alarm Module, 110 alarm modules, 120 are sought help module and data recording module;
Wherein, the camera group is constituted by several cameras of cell everywhere are arranged in, and it is entire small to can be realized covering The video monitoring in area;Camera has station location marker in the camera group;The criminal library is connected in real time with internet, is used In the criminal's photographic intelligence for obtaining current all fugitive wanted criminals;The database is for storing the basic of all residents of this cell Information, the essential information of resident include human face photo, resident address, age and family members' telephone number;
The camera group is used to for monitor video being transferred to video identification module, and monitor video has identification marking, knows Biao Shi not be for determining to be specially the video of which camera shooting and the specific location of corresponding camera;The video identification Module is used to for monitor video being transferred to face and obtains module, and the face obtains module and is used to regard monitoring every preset time Frequency carries out following processing and acquires face information group:
Step 1: technology is grabbed using face, acquires all faces appeared in inside monitor video;
Step 2: the identification marking of monitor video can be obtained automatically when getting the face inside monitor video;By people Face merges to form face information with identification marking;
Step 3: all people's face information inside monitor video is acquired to step 2 by repeating step 1, by institute Somebody's face information forms face information group;
The face obtains module and is used to face information group being transferred to face recognition module, in the face recognition module Portion is stored with small chorography;The face recognition module is used to that criminal library to be combined to carry out following processing to face information group:
Step 1: the face information of face information group is got;
Step 2: criminal's photographic intelligence that all people's face information is stored with criminal Ku Nei is compared one by one;
Step 3: face information can be labeled as automatically comparing to when having face information consistent with criminal's photographic intelligence Alarm face information;And following processing are carried out to alarm face information:
S1 gets the identification marking in alarm face information, judges the camera for shooting the face information, obtains this and takes the photograph As the station location marker of head;
S2: all people's face information in face information group is compared one by one, will be with the consistent people of alarm face information Face information identifies, and gets all cameras for taking the alarm face information, gets corresponding camera later Station location marker;
S3: all station location markers label is formed into criminal's routing information on small chorography;
The face recognition module is used to alarm face information and criminal's routing information being transferred to controller, the control Device is used to for alarm face information and criminal's routing information being transferred to display, and the display is used for real-time display alarm face Information is simultaneously labeled as offender, and the display is also used to real-time display criminal's routing information;The controller will be for that will warn Report face information and criminal's routing information are transferred to alarm modules, and the alarm modules receive the alarm face of controller transmission It can alarm automatically by 110 alarm modules when information and criminal's routing information, 110 alarm modules can be certainly in alarm procedure It is dynamic that cell specific location, alarm face information and criminal's routing information are transferred to 110 monitoring centers, convenient for reaction in time;
The video identification module is also used to for monitor video being transferred to analysis module, and the analysis module is used Relevant treatment is carried out to monitor video in combining face to obtain module, face recognition module and database, specific processing step is such as Under:
Step 1: getting monitor video, and monitor video has station location marker, carries out to the figure action in monitor video Analysis, when the personage can be stamped U mark when the unconventional position residence time being more than preset value by the personage occurred in monitor video; Unconventional position is that property management personnel marks off the seldom movable place of neighbours living come in advance;
Step 2: being transferred to face acquisition module for monitor video later and be used to obtain the face information with U mark personage, Later if detect face information can not obtain or face on mask when can return to personage by face recognition module Suspicious-looking information;
Step 3: the photographic intelligence of trace suspicious figure is obtained, and obtains all bats automatically by the source video sequence of photo Take the photograph the camera of trace suspicious figure;Get the station location marker of corresponding camera;
Step 4: station location marker is formed into a suspect's routing information;
The analysis module is used to a suspect's routing information and photographic intelligence being transferred to controller, the control Device is used to a suspect's routing information and photographic intelligence being transferred to service for infrastructure center, and the service for infrastructure center is receiving The a suspect's routing information and photographic intelligence of controller transmission can remind the identity information of staff verification a suspect;
The analysis module be used to combining face obtain module, face recognition module and database to monitor video into Row designated treatment determines that neighbours living wants help, and detailed process is as follows:
Step 1: analyzing personage's state using video analysis, when having detected that personage lies on the floor, tool Physical examination survey technology is analysis are as follows:
First by getting the background of personage's appearance, background and pre-stored cell ground picture are compared later It is right, when background with cell ground consistent and personage be in transverse state then determine personage be in lie ground state;
Step 2: after the personage, which is in, lies ground state preset time, the people for lying on the floor personage can be got automatically Face information is simultaneously marked as doubtful face information, if the personage's face lain on the floor is blocked, can be monitored by backtracking State before video gets face information;
Step 3: resident's essential information of doubtful face information and databases storage is carried out by face recognition module It compares, doubtful face can be obtained if when comparing to doubtful face information consistent with face information in resident's essential information The corresponding resident's essential information of information;Resident's essential information is labeled as resident to be analyzed;
Step 4: detecting the age information of resident to be analyzed, is then sentenced when the age information of resident is more than preset value It is set to the ground old man that lies;
Step 5: to lying, ground old man region is compared, and detailed process can be in advance to store cell scenario In database, is there is into background in old man and is compared to obtain the location information for the ground old man that lies with cell scenario, as the ground old man that lies Location information can then determine that old man situation is dangerous automatically when being unconventional position, want help;Unconventional position is cell pipe The preset stream of people's passage area of reason personnel, is not suitable for the position for lying on the floor rest;
Step 6: face information, location information and the cell specific location of the ground old man that lies are formed into help information;
The analysis module is used to for help information being transferred to controller, and the controller is used for the controller For help information to be transferred to alarm modules, the alarm modules are used for the meeting when receiving the help information of controller transmission Help information is transferred to 120 to seek help module, described 120 seek help module the help information for receiving alarm modules transmission can be from It is dynamic that help information is transferred to 120 monitoring centers, to succour in time people.
Further, the controller receives the help information of analysis module transmission, and the controller is used for basis The face information of the ground old man that lies in help information gets family members' telephone number out of database automatically;The controller is used for Help information and corresponding family members' telephone number are transferred to display module and carry out real-time display.
Further, the data inputting module increases household information newly for cell management personnel and uses, the data inputting Module is used to for newly-increased household information being transferred to controller, the newly-increased resident letter of the controller receiving data recording module transmission Breath when newly-increased household information can be transferred to database, the database is used to for newly-increased household information being added to the base of resident The interior simultaneously real-time storage of this information.
Further, the newly-increased household information includes the essential information of resident, and the essential information of the resident includes people Face photo, resident address, age and family members' telephone number.
Beneficial effects of the present invention:
(1) present invention monitors cell in real time by the camera group of coverage cell, later transmits monitor video To video identification module, module, face recognition module and criminal library are obtained by face later, the people of criminal can be recognized Face information, and can inquire which platform camera this section of monitor video is automatically when comparing and face information occur into monitor video Shooting, the appearance position of criminal's face information in conjunction with before and after can obtain several taking criminal's face information Camera, the routing information of criminal is capable of forming in conjunction with the station location marker of camera;
(2) figure action in monitor video is analyzed by analysis module, when what is occurred in monitor video The personage can be stamped U mark when the unconventional position residence time being more than preset value by personage;Unconventional position is administrator of an estate Member marks off the seldom movable place of neighbours living come in advance;Monitor video face acquisition module is transferred to later to be used to obtain Take the face information with U mark personage, later if detect face information can not obtain or face on mask when meeting The suspicious-looking information of personage is returned by face recognition module, is later questionable person's face information by the face message identification, leads to The specifying information of confirmation a suspect can be removed by crossing property personnel, prevent security risk;
(3) present invention is to personage first by analysis module, face acquisition module and face recognition module simultaneously No lie on the floor is analyzed, if it is decided that lies on the floor to personage and is more than preset time, is just known by face recognition module The not face information of the personage can be into one if the face information corresponds in resident's essential information the age when being more than preset value Step determines that the personage wants help, and is directly contacted with 120 monitoring centers;Show the personage's by display module simultaneously Essential information and family members' telephone number, notify family members convenient for property management personnel in time.
Detailed description of the invention
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is system block diagram of the invention.
Specific embodiment
As shown in Figure 1, a kind of wireless sensor network safety defense monitoring system based on multipoint positioning, including camera group, Video identification module, face obtain module, analysis module, face recognition module, Zui Fanku, database, controller, display Module, alarm modules, 110 alarm modules, 120 are sought help module and data recording module;
Wherein, the camera group is constituted by several cameras of cell everywhere are arranged in, and it is entire small to can be realized covering The video monitoring in area;Camera has station location marker in the camera group;The criminal library is connected in real time with internet, is used In the criminal's photographic intelligence for obtaining current all fugitive wanted criminals;The database is for storing the basic of all residents of this cell Information, the essential information of resident include human face photo, resident address, age and family members' telephone number;
The camera group is used to for monitor video being transferred to video identification module, and monitor video has identification marking, knows Biao Shi not be for determining to be specially the video of which camera shooting and the specific location of corresponding camera;The video identification Module is used to for monitor video being transferred to face and obtains module, and the face obtains module and is used to regard monitoring every preset time Frequency carries out following processing and acquires face information group:
Step 1: technology is grabbed using face, acquires all faces appeared in inside monitor video;
Step 2: the identification marking of monitor video can be obtained automatically when getting the face inside monitor video;By people Face merges to form face information with identification marking;
Step 3: all people's face information inside monitor video is acquired to step 2 by repeating step 1, by institute Somebody's face information forms face information group;
The face obtains module and is used to face information group being transferred to face recognition module, in the face recognition module Portion is stored with small chorography;The face recognition module is used to that criminal library to be combined to carry out following processing to face information group:
Step 1: the face information of face information group is got;
Step 2: criminal's photographic intelligence that all people's face information is stored with criminal Ku Nei is compared one by one;
Step 3: face information can be labeled as automatically comparing to when having face information consistent with criminal's photographic intelligence Alarm face information;And following processing are carried out to alarm face information:
S1 gets the identification marking in alarm face information, judges the camera for shooting the face information, obtains this and takes the photograph As the station location marker of head;
S2: all people's face information in face information group is compared one by one, will be with the consistent people of alarm face information Face information identifies, and gets all cameras for taking the alarm face information, gets corresponding camera later Station location marker;
S3: all station location markers label is formed into criminal's routing information on small chorography;
The face recognition module is used to alarm face information and criminal's routing information being transferred to controller, the control Device is used to for alarm face information and criminal's routing information being transferred to display, and the display is used for real-time display alarm face Information is simultaneously labeled as offender, and the display is also used to real-time display criminal's routing information;The controller will be for that will warn Report face information and criminal's routing information are transferred to alarm modules, and the alarm modules receive the alarm face of controller transmission It can alarm automatically by 110 alarm modules when information and criminal's routing information, 110 alarm modules can be certainly in alarm procedure It is dynamic that cell specific location, alarm face information and criminal's routing information are transferred to 110 monitoring centers, convenient for reaction in time;
The video identification module is also used to for monitor video being transferred to analysis module, and the analysis module is used Relevant treatment is carried out to monitor video in combining face to obtain module, face recognition module and database, specific processing step is such as Under:
Step 1: getting monitor video, and monitor video has station location marker, carries out to the figure action in monitor video Analysis, when the personage can be stamped U mark when the unconventional position residence time being more than preset value by the personage occurred in monitor video; Unconventional position is that property management personnel marks off the seldom movable place of neighbours living come in advance;
Step 2: being transferred to face acquisition module for monitor video later and be used to obtain the face information with U mark personage, Later if detect face information can not obtain or face on mask when can return to personage by face recognition module Suspicious-looking information;
Step 3: the photographic intelligence of trace suspicious figure is obtained, and obtains all bats automatically by the source video sequence of photo Take the photograph the camera of trace suspicious figure;Get the station location marker of corresponding camera;
Step 4: station location marker is formed into a suspect's routing information;
The analysis module is used to a suspect's routing information and photographic intelligence being transferred to controller, the control Device is used to a suspect's routing information and photographic intelligence being transferred to service for infrastructure center, and the service for infrastructure center is receiving The a suspect's routing information and photographic intelligence of controller transmission can remind the identity information of staff verification a suspect;
The analysis module be used to combining face obtain module, face recognition module and database to monitor video into Row designated treatment determines that neighbours living wants help, and detailed process is as follows:
Step 1: analyzing personage's state using video analysis, when having detected that personage lies on the floor, tool Physical examination survey technology is analysis are as follows:
First by getting the background of personage's appearance, background and pre-stored cell ground picture are compared later It is right, when background with cell ground consistent and personage be in transverse state then determine personage be in lie ground state;
Step 2: after the personage, which is in, lies ground state preset time, the people for lying on the floor personage can be got automatically Face information is simultaneously marked as doubtful face information, if the personage's face lain on the floor is blocked, can be monitored by backtracking State before video gets face information;
Step 3: resident's essential information of doubtful face information and databases storage is carried out by face recognition module It compares, doubtful face can be obtained if when comparing to doubtful face information consistent with face information in resident's essential information The corresponding resident's essential information of information;Resident's essential information is labeled as resident to be analyzed;
Step 4: detecting the age information of resident to be analyzed, is then sentenced when the age information of resident is more than preset value It is set to the ground old man that lies;
Step 5: to lying, ground old man region is compared, and detailed process can be in advance to store cell scenario In database, is there is into background in old man and is compared to obtain the location information for the ground old man that lies with cell scenario, as the ground old man that lies Location information can then determine that old man situation is dangerous automatically when being unconventional position, want help;Unconventional position is cell pipe The preset stream of people's passage area of reason personnel, is not suitable for the position for lying on the floor rest;
Step 6: face information, location information and the cell specific location of the ground old man that lies are formed into help information;
The analysis module is used to for help information being transferred to controller, and the controller is used for the controller For help information to be transferred to alarm modules, the alarm modules are used for the meeting when receiving the help information of controller transmission Help information is transferred to 120 to seek help module, described 120 seek help module the help information for receiving alarm modules transmission can be from It is dynamic that help information is transferred to 120 monitoring centers, to succour in time people;
The controller receives the help information of analysis module transmission, and the controller is used for according in help information Lie ground old man face information family members' telephone number is got out of database automatically;The controller is used for help information Display module, which is transferred to, with corresponding family members' telephone number carries out real-time display.
The data inputting module increases household information newly for cell management personnel and uses, and the data inputting module is used for will Newly-increased household information is transferred to controller, the newly-increased household information of the controller receiving data recording module transmission when can will Newly-increased household information is transferred to database, and the database is for newly-increased household information to be added in the essential information of resident simultaneously Real-time storage.
The newly-increased household information includes the essential information of resident, and the essential information of the resident includes human face photo, lives Family address, age and family members' telephone number.
A kind of wireless sensor network safety defense monitoring system based on multipoint positioning is at work, small by covering first The camera group in area monitors cell in real time, and monitor video is transferred to video identification module later, passes through face later Module, face recognition module and criminal library are obtained, the face information of criminal can be recognized, and comparing into monitor video This section of monitor video can be inquired automatically by occurring when face information be which platform camera shooting, the criminal people in conjunction with before and after The appearance position of face information can obtain several cameras for taking criminal's face information, mark in conjunction with the position of camera Know the routing information for being capable of forming criminal;Module, people can be obtained in conjunction with dependency rule, face by analysis module simultaneously Face identification module and database analyze a suspect in cell, and staff is reminded to confirm the identity of a suspect in the past Information;Analysis module combines face to obtain module, face recognition module and database and analyzes monitor video simultaneously, It can be determined that obtain cell old man the case where experience burst thing wants help, and automatic alarm, while can also pass through display Module shows old man's situation and family members' contact method.
Beneficial effects of the present invention are as follows:
(2) present invention monitors cell in real time by the camera group of coverage cell, later transmits monitor video To video identification module, module, face recognition module and criminal library are obtained by face later, the people of criminal can be recognized Face information, and can inquire which platform camera this section of monitor video is automatically when comparing and face information occur into monitor video Shooting, the appearance position of criminal's face information in conjunction with before and after can obtain several taking criminal's face information Camera, the routing information of criminal is capable of forming in conjunction with the station location marker of camera;
(2) figure action in monitor video is analyzed by analysis module, when what is occurred in monitor video The personage can be stamped U mark when the unconventional position residence time being more than preset value by personage;Unconventional position is administrator of an estate Member marks off the seldom movable place of neighbours living come in advance;Monitor video face acquisition module is transferred to later to be used to obtain Take the face information with U mark personage, later if detect face information can not obtain or face on mask when meeting The suspicious-looking information of personage is returned by face recognition module, is later questionable person's face information by the face message identification, leads to The specifying information of confirmation a suspect can be removed by crossing property personnel, prevent security risk;
(3) present invention is to personage first by analysis module, face acquisition module and face recognition module simultaneously No lie on the floor is analyzed, if it is decided that lies on the floor to personage and is more than preset time, is just known by face recognition module The not face information of the personage can be into one if the face information corresponds in resident's essential information the age when being more than preset value Step determines that the personage wants help, and is directly contacted with 120 monitoring centers;Show the personage's by display module simultaneously Essential information and family members' telephone number, notify family members convenient for property management personnel in time.
How intelligent recognition cell some ages excessively high personnel, which meet with emergency case, lies on the floor, and after recognizing and When sound an alarm and notify 120 first aids;
Above content is only to structure of the invention example and explanation, affiliated those skilled in the art couple Described specific embodiment does various modifications or additions or is substituted in a similar manner, without departing from invention Structure or beyond the scope defined by this claim, is within the scope of protection of the invention.

Claims (4)

1. a kind of wireless sensor network safety defense monitoring system based on multipoint positioning, which is characterized in that including camera group, view Frequency identification module, face obtain module, analysis module, face recognition module, Zui Fanku, database, controller, display mould Block, alarm modules, 110 alarm modules, 120 are sought help module and data recording module;
Wherein, the camera group is constituted by several cameras of cell everywhere are arranged in, and can be realized the entire cell of covering Video monitoring;Camera has station location marker in the camera group;The criminal library is connected in real time with internet, for obtaining Take criminal's photographic intelligence of current all fugitive wanted criminals;The database is used to store the basic letter of all residents of this cell Breath, the essential information of resident includes human face photo, resident address, age and family members' telephone number;
The camera group is used to for monitor video being transferred to video identification module, and monitor video has identification marking, identification mark Which know for determining to be specially the video of camera shooting and the specific location of corresponding camera;The video identification module For by monitor video be transferred to face obtain module, it is described face obtain module be used for every preset time to monitor video into The following processing of row acquire face information group:
Step 1: technology is grabbed using face, acquires all faces appeared in inside monitor video;
Step 2: the identification marking of monitor video can be obtained automatically when getting the face inside monitor video;By face with Identification marking merges to form face information;
Step 3: acquiring all people's face information inside monitor video to step 2 by repeating step 1, will be all Face information forms face information group;
The face obtains module and is used to face information group being transferred to face recognition module, deposits inside the face recognition module Contain small chorography;The face recognition module is used to that criminal library to be combined to carry out following processing to face information group:
Step 1: the face information of face information group is got;
Step 2: criminal's photographic intelligence that all people's face information is stored with criminal Ku Nei is compared one by one;
Step 3: face information can be labeled as alarm automatically comparing to when having face information consistent with criminal's photographic intelligence Face information;And following processing are carried out to alarm face information:
S1 gets the identification marking in alarm face information, judges the camera for shooting the face information, obtains the camera Station location marker;
S2: all people's face information in face information group is compared one by one, will be believed with the consistent face of alarm face information Breath identifies, and gets all cameras for taking the alarm face information, gets the position of corresponding camera later Set mark;
S3: all station location markers label is formed into criminal's routing information on small chorography;
The face recognition module is used to for alarm face information and criminal's routing information being transferred to controller, and the controller is used In alarm face information and criminal's routing information are transferred to display, the display is used for real-time display alarm face information And it is labeled as offender, the display is also used to real-time display criminal's routing information;The controller is used for alarm people Face information and criminal's routing information are transferred to alarm modules, and the alarm modules receive the alarm face information of controller transmission Can alarm automatically by 110 alarm modules with when criminal's routing information, 110 alarm modules in alarm procedure can automatically by Cell specific location, alarm face information and criminal's routing information are transferred to 110 monitoring centers, convenient for reaction in time;
The video identification module is also used to for monitor video being transferred to analysis module, and the analysis module is for tying It closes face and obtains module, face recognition module and database to monitor video progress relevant treatment, specific processing step is as follows:
Step 1: getting monitor video, and monitor video has station location marker, divides the figure action in monitor video Analysis, when the personage can be stamped U mark when the unconventional position residence time being more than preset value by the personage occurred in monitor video;It is non- Rotine position is that property management personnel marks off the seldom movable place of neighbours living come in advance;
Step 2: monitor video is transferred to face acquisition module later and is used to obtain the face information with U mark personage, later If detect face information can not obtain or face on mask when can return to personage's person's movements and expression by face recognition module Suspicious information;
Step 3: the photographic intelligence of trace suspicious figure is obtained, and obtains all take automatically by the source video sequence of photo The camera of trace suspicious figure;Get the station location marker of corresponding camera;
Step 4: station location marker is formed into a suspect's routing information;
The analysis module is used to for a suspect's routing information and photographic intelligence being transferred to controller, and the controller is used In a suspect's routing information and photographic intelligence are transferred to service for infrastructure center, the service for infrastructure center is receiving control The a suspect's routing information and photographic intelligence of device transmission can remind the identity information of staff verification a suspect;
The analysis module, which is used to that face to be combined to obtain module, face recognition module and database, refers to monitor video Fixed processing is to determine that neighbours living wants help, and detailed process is as follows:
Step 1: analyzing personage's state using video analysis, specific to examine when having detected that personage lies on the floor Survey technology is analysis are as follows:
The background occurred first by getting personage, background is compared with pre-stored cell ground picture later, When background with cell ground consistent and personage be in transverse state then determine personage be in lie ground state;
Step 2: after the personage, which is in, lies ground state preset time, the face letter for lying on the floor personage can be got automatically It ceases and is marked as doubtful face information, it, can be by recalling monitor video if the personage's face lain on the floor is blocked State before gets face information;
Step 3: resident's essential information that doubtful face information is stored up with databases is compared by face recognition module It is right, doubtful face letter can be obtained if when comparing to doubtful face information consistent with face information in resident's essential information Cease corresponding resident's essential information;Resident's essential information is labeled as resident to be analyzed;
Step 4: detecting the age information of resident to be analyzed, is then determined as when the age information of resident is more than preset value Lie ground old man;
Step 5: to lying, ground old man region is compared, and detailed process can be that cell scenario is stored in number in advance According in library, is there is into background in old man and is compared to obtain the location information for the ground old man that lies with cell scenario, when the position for the ground old man that lies Confidence breath can then determine that old man's situation is dangerous when being unconventional position automatically, want help;Unconventional position is cell management people The preset stream of people's passage area of member, is not suitable for the position for lying on the floor rest;
Step 6: face information, location information and the cell specific location of the ground old man that lies are formed into help information;
The analysis module is used to for help information being transferred to controller, and the controller is for the controller to be used for Help information is transferred to alarm modules, the alarm modules are used to ask when receiving the help information of controller transmission Supplementary information is transferred to 120 and seeks help module, described 120 seek help module the help information for receiving alarm modules transmission can automatically by Help information is transferred to 120 monitoring centers, to succour in time people.
2. a kind of wireless sensor network safety defense monitoring system based on multipoint positioning according to claim 1, feature It is, the controller receives the help information of analysis module transmission, and the controller is used for according in help information Lie ground old man face information family members' telephone number is got out of database automatically;The controller be used for help information and Corresponding family members' telephone number is transferred to display module and carries out real-time display.
3. a kind of wireless sensor network safety defense monitoring system based on multipoint positioning according to claim 1, feature It is, the data inputting module increases household information newly for cell management personnel and uses, and the data inputting module is used for will be new Increase household information and be transferred to controller, the newly-increased household information of the controller receiving data recording module transmission when can will be new Increase household information and be transferred to database, the database is used to for newly-increased household information being added in the essential information of resident and real When store.
4. a kind of wireless sensor network safety defense monitoring system based on multipoint positioning according to claim 1, feature It is, the newly-increased household information includes the essential information of resident, and the essential information of the resident includes human face photo, resident Location, age and family members' telephone number.
CN201811022256.7A 2018-09-04 2018-09-04 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning Pending CN109326073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811022256.7A CN109326073A (en) 2018-09-04 2018-09-04 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811022256.7A CN109326073A (en) 2018-09-04 2018-09-04 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning

Publications (1)

Publication Number Publication Date
CN109326073A true CN109326073A (en) 2019-02-12

Family

ID=65263487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811022256.7A Pending CN109326073A (en) 2018-09-04 2018-09-04 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning

Country Status (1)

Country Link
CN (1) CN109326073A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109903501A (en) * 2019-04-03 2019-06-18 湖南科技学院 A kind of security protection probe analysis process system based on big data
CN110084196A (en) * 2019-04-26 2019-08-02 湖南科技学院 A kind of monitor video identifying system for cloud computing
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110298254A (en) * 2019-05-30 2019-10-01 罗普特科技集团股份有限公司 A kind of analysis method and system for personnel's abnormal behaviour
CN111127824A (en) * 2019-09-17 2020-05-08 中国联合网络通信集团有限公司 Early warning method, device and system
CN111259789A (en) * 2020-01-15 2020-06-09 祥誉智能科技(威海)有限公司 Face recognition intelligent security monitoring management method and system
CN111311862A (en) * 2020-03-03 2020-06-19 江苏中数智慧信息科技有限公司 Monitoring method for suspicious personnel or suspicious behaviors
CN111510675A (en) * 2020-04-13 2020-08-07 智粤云(广州)数字信息科技有限公司 Intelligent security system based on face recognition and big data analysis
CN111601080A (en) * 2020-05-12 2020-08-28 杭州武盛广告制作有限公司 Video management system for community security monitoring video storage
CN111612381A (en) * 2020-06-05 2020-09-01 李建华 Factory three-dimensional positioning monitoring method based on big data and grouping task presetting
CN111818308A (en) * 2019-03-19 2020-10-23 温州洪启信息科技有限公司 Security monitoring probe analysis processing method based on big data
CN111932425A (en) * 2020-07-28 2020-11-13 南昌龙行港口集团有限公司 Port equipment and personnel association method based on big data processing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
KR101303680B1 (en) * 2013-05-03 2013-09-04 김범준 Safe zone system
US20140036056A1 (en) * 2012-08-03 2014-02-06 Hon Hai Precision Industry Co., Ltd. Monitoring system and monitoring method thereof
CN107948597A (en) * 2017-11-29 2018-04-20 合肥寰景信息技术有限公司 Behavioural analysis and alarm embedded device based on specific region

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140036056A1 (en) * 2012-08-03 2014-02-06 Hon Hai Precision Industry Co., Ltd. Monitoring system and monitoring method thereof
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
KR101303680B1 (en) * 2013-05-03 2013-09-04 김범준 Safe zone system
CN107948597A (en) * 2017-11-29 2018-04-20 合肥寰景信息技术有限公司 Behavioural analysis and alarm embedded device based on specific region

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818308B (en) * 2019-03-19 2022-02-08 江苏海内软件科技有限公司 Security monitoring probe analysis processing method based on big data
CN111818308A (en) * 2019-03-19 2020-10-23 温州洪启信息科技有限公司 Security monitoring probe analysis processing method based on big data
CN109903501A (en) * 2019-04-03 2019-06-18 湖南科技学院 A kind of security protection probe analysis process system based on big data
CN110084196A (en) * 2019-04-26 2019-08-02 湖南科技学院 A kind of monitor video identifying system for cloud computing
CN110084196B (en) * 2019-04-26 2023-04-07 湖南科技学院 Monitoring video identification system for cloud computing
CN110298254A (en) * 2019-05-30 2019-10-01 罗普特科技集团股份有限公司 A kind of analysis method and system for personnel's abnormal behaviour
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110176117B (en) * 2019-06-17 2023-05-19 广东翔翼科技信息有限公司 Monitoring device and monitoring method based on behavior recognition technology
CN111127824A (en) * 2019-09-17 2020-05-08 中国联合网络通信集团有限公司 Early warning method, device and system
CN111259789A (en) * 2020-01-15 2020-06-09 祥誉智能科技(威海)有限公司 Face recognition intelligent security monitoring management method and system
CN111311862A (en) * 2020-03-03 2020-06-19 江苏中数智慧信息科技有限公司 Monitoring method for suspicious personnel or suspicious behaviors
CN111510675A (en) * 2020-04-13 2020-08-07 智粤云(广州)数字信息科技有限公司 Intelligent security system based on face recognition and big data analysis
CN111601080A (en) * 2020-05-12 2020-08-28 杭州武盛广告制作有限公司 Video management system for community security monitoring video storage
CN111601080B (en) * 2020-05-12 2021-08-10 湖北君赞智能科技有限公司 Video management system for community security monitoring video storage
CN111612381A (en) * 2020-06-05 2020-09-01 李建华 Factory three-dimensional positioning monitoring method based on big data and grouping task presetting
CN111932425A (en) * 2020-07-28 2020-11-13 南昌龙行港口集团有限公司 Port equipment and personnel association method based on big data processing

Similar Documents

Publication Publication Date Title
CN109326073A (en) A kind of wireless sensor network safety defense monitoring system based on multipoint positioning
US11037300B2 (en) Monitoring system
KR101215948B1 (en) Image information masking method of monitoring system based on face recognition and body information
KR101990803B1 (en) PROTECTION SYSTEM FOR VULNERABLE CLASSES USING Internet Of Things AND METHOD THEREFOR
KR101610657B1 (en) Three-dimensional virtual entrance control and communicable disease control system and method based on entrance control data
CN102306304B (en) Face occluder identification method and device
CN109493555A (en) A kind of campus dormitory building safety defense monitoring system based on intelligent monitoring technology
CN111263114B (en) Abnormal event alarm method and device
CN108540751A (en) Monitoring method, apparatus and system based on video and electronic device identification
US10887553B2 (en) Monitoring system and monitoring method
CN106204815A (en) A kind of gate control system based on human face detection and recognition
JP2007257122A (en) Monitoring system
CN111866353B (en) Patrol intelligent monitoring terminal and use method thereof
CN110111515A (en) A kind of border intrusion detection method, apparatus, server and system
CN109426798A (en) A kind of border intrusion detection method, apparatus and system
CN109448194A (en) Intrusion detecting tracking system and method
CN108540756A (en) Recognition methods, apparatus and system based on video and electronic device identification
KR20160074208A (en) System and method for providing safety service using beacon signals
CN112102574B (en) Intelligent alarm system for security room
CN106572324A (en) Energy-efficient smart monitoring device
CN108540748A (en) Monitor video and the associated method, apparatus of electronic device identification and system
CN109460714B (en) Method, system and device for identifying object
KR101936390B1 (en) Method And Apparatus for Providing Tracking Service based on Closed Circuit Tele-Vision
CN110166940A (en) The method that a kind of pair of portable intelligent device is positioned
CN111126100A (en) Alarm method, alarm device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212