CN109920182B - Protection processing method and device, storage medium and electronic device - Google Patents
Protection processing method and device, storage medium and electronic device Download PDFInfo
- Publication number
- CN109920182B CN109920182B CN201811643601.9A CN201811643601A CN109920182B CN 109920182 B CN109920182 B CN 109920182B CN 201811643601 A CN201811643601 A CN 201811643601A CN 109920182 B CN109920182 B CN 109920182B
- Authority
- CN
- China
- Prior art keywords
- target object
- optical fiber
- predetermined
- illegal invader
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 10
- 239000013307 optical fiber Substances 0.000 claims abstract description 72
- 238000012545 processing Methods 0.000 claims abstract description 40
- 230000008859 change Effects 0.000 claims abstract description 35
- 238000000034 method Methods 0.000 claims abstract description 21
- 230000003287 optical effect Effects 0.000 claims abstract description 14
- 238000001514 detection method Methods 0.000 claims abstract description 7
- 230000033001 locomotion Effects 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 18
- 239000000463 material Substances 0.000 claims 2
- 230000001681 protective effect Effects 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 description 9
- 230000006399 behavior Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 230000010287 polarization Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000007123 defense Effects 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000003062 neural network model Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Landscapes
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Length Measuring Devices By Optical Means (AREA)
Abstract
The invention provides a protection processing method, a device, a storage medium and an electronic device, wherein the method comprises the following steps: detecting that a predetermined parameter in an optical interference phenomenon corresponding to a predetermined optical fiber changes; determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter; and executing protection processing on the illegal invader. According to the invention, the target object in the area where the preset optical fiber is arranged is determined as the illegal invader based on the detection of the change of the preset parameter in the optical interference phenomenon corresponding to the preset optical fiber, and the protection treatment is carried out on the illegal invader. Therefore, the problem of low accuracy of illegal invader protection processing can be solved, and the effect of improving the accuracy of illegal invader protection processing is achieved.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a protection processing method and apparatus, a storage medium, and an electronic apparatus.
Background
At present, the protection treatment for the illegal invader is generally through GPRS positioning or video monitoring. And determining whether the illegal invader exists in the protected area through positioning, or judging whether the illegal invader exists in the protected area through video monitoring. However, due to the change of the environmental parameters, the accuracy of the judgment of the GPRS positioning system is affected. Video monitoring generally requires manual monitoring, which not only requires a large amount of labor, but also may cause erroneous judgment manually.
Aiming at the problem that the accuracy of illegal invader protection processing in the related technology is not high, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the invention provides a protection processing method, a device, a storage medium and an electronic device, which are used for at least solving the problem of low accuracy of protection processing of an illegal invader in the related technology.
According to an embodiment of the present invention, there is provided a guard processing method including: detecting that a predetermined parameter in an optical interference phenomenon corresponding to a predetermined optical fiber changes; determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter; and executing protection processing on the illegal invader.
Optionally, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter, including: determining target data of the target object based on the predetermined parameter change value, wherein the target data comprises: the position of the target object, the movement track of the target object, the movement speed of the target object, the volume and the weight of the target object; and determining the target object as an illegal invader according to the target data.
Optionally, determining the target data of the target object based on the predetermined parameter change value comprises: and determining the target data of the target object according to the arrangement rule of the predetermined optical fibers and the change value of the predetermined parameter.
Optionally, after determining that the target object in the region where the predetermined optical fiber is disposed is an illegal invader based on the change value of the predetermined parameter, the method further includes: obtaining a prediction result according to the position, the moving track and the moving speed of the target object, wherein the prediction result comprises: a moving speed and a moving direction of the target object at a next time;
the protection processing of the illegal invader comprises the following steps: and executing the protection treatment on the illegal invader according to the prediction result.
Optionally, the performing the protection processing on the illegal invader according to the prediction result includes: and performing protection treatment on the illegal invader according to the prediction result and the volume and the weight of the target object.
Optionally, the performing protection processing on the illegal invader comprises: and sending alarm information to the remote control equipment.
According to another embodiment of the present invention, there is provided a guard processing apparatus including: the detection module is used for detecting that a preset parameter in the optical interference phenomenon corresponding to a preset optical fiber changes; the determining module is used for determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter; and the execution module is used for executing protection processing on the illegal invader.
Optionally, the determining module is further configured to determine target data of the target object based on the predetermined parameter change value, where the target data includes: the position of the target object, the movement track of the target object, the movement speed of the target object, the volume and the weight of the target object; and determining the target object as an illegal invader according to the target data.
According to a further embodiment of the present invention, there is also provided a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, the target object in the area where the preset optical fiber is arranged is determined as the illegal invader based on the detection of the change of the preset parameter in the optical interference phenomenon corresponding to the preset optical fiber, and the protection treatment is carried out on the illegal invader. Therefore, the problem of low accuracy of illegal invader protection processing can be solved, and the effect of improving the accuracy of illegal invader protection processing is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a graph of different waveform variations resulting from different vibration variations applied to an optical fiber according to an embodiment of the present invention;
fig. 2 is a block diagram of a hardware structure of a terminal of a protection processing method according to an embodiment of the present invention;
FIG. 3 is a flow diagram of a guard process according to an embodiment of the invention;
FIG. 4 is a diagram of sensing fibers arranged in a predetermined pattern according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating overall operation of the system according to an embodiment of the present invention;
fig. 6 is a block diagram of a guard processing device according to an embodiment of the present invention.
Detailed Description
The optical fiber is very sensitive to external environment changes, such as temperature changes, vibration changes, changes of positions of optical fiber attachments and the like, and the polarization state of the optical fiber can be obviously changed. For the optical fiber sensing technology based on the interference principle, the most serious consequence of polarization change is that the system is in an extremely insensitive working state, or the system cannot realize effective interference. Therefore, it is the basis of obtaining a stable and reliable system to effectively solve the problems of temperature and polarization sensitivity of the optical fiber. The system technology solves the problem of interference signal stability caused by ambient temperature and polarization change in principle, and has good system reliability and stability. Fig. 1 is a diagram showing different waveform variations generated by different external vibration variations of an optical fiber according to an embodiment of the present invention, wherein the abscissa represents time and the ordinate represents amplitude.
The application is based on the optical fiber sensing and buries the protection field in the circumference, and identifies the optical fiber structure of the invasion trend of personnel. The optical fiber is arranged on the ground or below and is coiled with high density. On the premise of equal arrangement distance, the movement trend of the falling object or the personnel is logically judged through the distributed high-precision positioning response capability of the optical fiber sensing. And laying a defense area on the ground or below the ground surface by using the optical fibers.
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method provided by the first embodiment of the present application may be executed in a terminal or a similar computing device that performs protection processing on an illegal invader. Taking a terminal operating in a protection process for an illegal invader as an example, fig. 2 is a block diagram of a hardware structure of a terminal of a protection process method according to an embodiment of the present invention. As shown in fig. 2, the terminal 10 may include one or more (only one shown in fig. 2) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 2 is only an illustration and is not intended to limit the structure of the terminal. For example, the terminal 10 may also include more or fewer components than shown in FIG. 2, or have a different configuration than shown in FIG. 2.
The memory 104 may be used to store a computer program, for example, a software program and a module of application software, such as a computer program corresponding to the guard processing method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. The above-described concrete examples of the network may include a wireless network provided by a communication provider of the terminal 10 that performs the protection process by an illegal invader. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, a protection processing method operating in the terminal is provided, and fig. 3 is a flowchart of protection processing according to an embodiment of the present invention, as shown in fig. 3, the flowchart includes the following steps:
step S302, detecting that a predetermined parameter in the optical interference phenomenon corresponding to a predetermined optical fiber changes;
the predetermined optical fiber is an optical fiber sensing device, and the predetermined parameter may be a parameter related to a fiber polarization state of the optical fiber sensing device, and may include but is not limited to: phase change information of laser pulse signals in the optical fiber sensing device and spatial positioning information of the optical fiber device.
Step S304, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter;
the predetermined area can be the underground of the underground protection field, and the illegal invader is an object which is forbidden to enter the field.
And step S306, performing protection processing on the illegal invader.
The protection process may be to issue an alarm or perform a corresponding interception operation.
Through the steps, the target object in the area where the preset optical fiber is arranged is determined to be the illegal invader based on the fact that the preset parameter in the optical interference phenomenon corresponding to the preset optical fiber is detected to change, and the protection processing is carried out on the illegal invader. Therefore, the problem of low accuracy of illegal invader protection processing can be solved, and the effect of improving the accuracy of illegal invader protection processing is achieved.
Alternatively, the execution subject of the above steps may be a terminal or the like, but is not limited thereto.
In an alternative embodiment, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter includes: determining target data of the target object based on the predetermined parameter change value, wherein the target data comprises: the position of the target object, the movement track of the target object, the movement speed of the target object, the volume and the weight of the target object; and determining the target object as an illegal invader according to the target data. In the embodiment, the optical fibers are arranged in a defense area on the ground or below the ground surface, and the moving track of the ground object can be monitored from outside to inside or from inside to outside through the fact that the data responded in the defense area correspond to the calibration positions arranged at equal intervals. And features of intrusion behavior such as approximate volume contrast or speed of movement can be analyzed. The abundant data comparison can improve the behavior recognition capability after intrusion alarm. The judgment of the features after the intrusion becomes possible.
In an alternative embodiment, determining the target data of the target object based on the predetermined parameter change value comprises: and determining the target data of the target object according to the arrangement rule of the predetermined optical fibers and the change value of the predetermined parameter. In this embodiment, the fibers in the predetermined area have different arrangement rules, such as the equal pitch arrangement shown in fig. 4, or the arrangement rule according to the predetermined pitch, or the arrangement according to other rules, such as a divergent arrangement, a circular arrangement, etc., without limitation. In the present embodiment, the movement trajectory, the movement speed, and the volume and the weight of the target object (corresponding to the moving object in fig. 4) can be determined by the arrangement rule of the optical fibers and the change of the optical fiber parameters.
In an optional embodiment, after determining that the target object in the region where the predetermined optical fiber is disposed is an illegal invader based on the change value of the predetermined parameter, the method further includes: obtaining a prediction result according to the position, the moving track and the moving speed of the target object, wherein the prediction result comprises: a moving speed and a moving direction of the target object at a next time; the protection processing of the illegal invader comprises the following steps: and executing the protection treatment on the illegal invader according to the prediction result. In this embodiment, the moving speed and direction of the illegal invader at the next moment can be predicted by an artificial intelligence algorithm, and protection processing such as interception can be performed according to the prediction result. The artificial intelligence algorithm can be an artificial neural network algorithm, and a neural network model is trained according to the moving direction and speed of the current illegal invader and the moving direction and speed of the next moment of the current illegal invader.
In an optional embodiment, the performing the protection process on the illegal invader according to the prediction result includes: and performing protection treatment on the illegal invader according to the prediction result and the volume and the weight of the target object. In this embodiment, after the direction and speed of the movement of the illegal invader at the next moment are predicted by the artificial neural network model, corresponding protection processing is performed on the illegal invader. Taking interception as an example, the interception devices can be set to different levels, and the interception device with the highest level is used for intercepting illegal invaders with high speed, large volume and heavy weight. And otherwise, intercepting the illegal invader with low speed, small volume and light weight by using the intercepting device at the lowest level. The highest grade of interception, namely the maximum force borne by the interception device, and the corresponding lowest grade, namely the minimum force borne by the interception device, are set in the predicted movement direction of the invader at the next moment.
In an alternative embodiment, the protection processing performed on the illegal invader comprises: and sending alarm information to the remote control equipment. In this embodiment, the control device at the remote end can control the predetermined area. When finding that an illegal invader exists in the predetermined area, the remote control device can execute corresponding control functions, such as sending an alarm and performing interception and other operations, after sending alarm information to the remote control equipment.
The present application is illustrated by the following specific examples.
Fig. 5 is a flowchart of the overall operation of the system according to the embodiment of the present invention, when the system detects a vibration signal, the system identifies whether the disturbance signal is an interference of environmental factors such as wind and rain or a malicious intrusion behavior by linear reduction and behavior analysis of a light wave waveform, and when the disturbance signal is determined as the intrusion behavior, the system immediately alarms and analyzes and determines a behavior path of an object or a person according to the optical fiber wound at a high density.
The optical fiber vibration monitoring system utilizes the interference phenomenon of light. When the optical fiber at a certain position is disturbed by the outside, parameters in the optical interference phenomenon change, and the disturbed position is accurately positioned and real-time vibration alarm information is given out through a high-speed signal acquisition and data processing technology. The common communication optical cable is used as sensing equipment, the vibration condition and the strain of an optical fiber with the length of several kilometers to dozens of kilometers can be detected, the space sampling interval is only 1m, and the detection period can reach the second level. When vibration information is detected in the detection range of the sensing optical fiber, whether the circuit has intrusion alarm is judged through processing the information, problems are found in time, and prevention and corresponding processing countermeasures are taken, so that the aim of avoiding accidents is fulfilled. And (3) according to the vibration strength conditions at different positions at different time, carrying out system simulation calculation and algorithm analysis to guess the moving path of the object/person.
The optical fiber as a transmission medium itself has the following advantages: the light transmitted in the optical fiber is transmitted at extremely high speed, and the signal response time is ensured. The transmission distance is long, and transmission can still be carried out from dozens of meters to dozens of kilometers. Is uncharged, safe in use, and can be used in inflammable and explosive places.
The following scenarios can be realized in conjunction with the distributed optical fiber sensing device: the optical fiber vibration signal is detected in real time, and the disturbance signal can be identified as the interference of environmental factors such as wind and rain or malicious intrusion behaviors through linear reduction, analysis and the like of the light wave waveform. According to the arrangement rule of the optical fibers and the algorithm of the system, the state, whether the object is static or moving and the moving speed direction of the object under the condition that the object exists on the optical fibers are calculated. The moving track of an object is accurately judged according to the underground high-density coiled optical fiber, and the missing report rate and the wrong report rate are almost zero.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a protection processing apparatus is further provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and details are not repeated after the description is given. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 6 is a block diagram of a guard processing apparatus according to an embodiment of the present invention, and as shown in fig. 6, the apparatus includes: the detection module 62 is configured to detect that a predetermined parameter in the optical interference phenomenon corresponding to a predetermined optical fiber changes; a determining module 64, configured to determine, based on the variation value of the predetermined parameter, that a target object in the area where the predetermined optical fiber is arranged is an illegal invader; and the execution module 66 is used for executing protection processing on the illegal invader.
In an optional embodiment, the determining module 64 is further configured to determine target data of the target object based on the predetermined parameter variation value, wherein the target data includes: the position of the target object, the movement track of the target object, the movement speed of the target object, the volume and the weight of the target object; and determining the target object as an illegal invader according to the target data.
In an alternative embodiment, the determining module 64 determines the target data of the target object based on the predetermined parameter variation value by: and determining the target data of the target object according to the arrangement rule of the predetermined optical fibers and the change value of the predetermined parameter.
In an alternative embodiment, the apparatus is further configured to obtain a prediction result according to the position, the moving track, and the moving speed of the target object, where the prediction result includes: a moving speed and a moving direction of the target object at a next time; the protection processing of the illegal invader comprises the following steps: and executing the protection treatment on the illegal invader according to the prediction result.
In an optional embodiment, the apparatus is further configured to perform protection processing on the illegal invader according to the prediction result, the volume and the weight of the target object.
In an alternative embodiment, the execution module 66 is further configured to send an alarm message to a remote control device.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, detecting the change of the preset parameter in the light interference phenomenon corresponding to the preset optical fiber;
s2, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter;
and S3, performing protection processing on the illegal invader.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, detecting the change of the preset parameter in the light interference phenomenon corresponding to the preset optical fiber;
s2, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter;
and S3, performing protection processing on the illegal invader.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.
Claims (5)
1. A guard processing method, comprising:
detecting that a predetermined parameter in an optical interference phenomenon corresponding to a predetermined optical fiber changes;
determining that a target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter, wherein the predetermined parameter comprises: phase change information of laser pulse signals in the optical fiber sensing device and space positioning information of the optical fiber device;
obtaining a prediction result according to the position, the movement track and the movement speed of the target object, wherein the prediction result comprises: a moving speed and a moving direction of the target object at a next time; according to the prediction result and the volume and the weight of the target object, performing protection processing on the illegal invader;
wherein, determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter, comprises: determining target data of the target object according to the arrangement rule of the predetermined optical fibers and the change value of the predetermined parameter, wherein the target data comprises: the position of the target object, the movement track of the target object, the movement speed of the target object and the weight of the target object; determining the target object as an illegal invader according to the target data;
wherein the predetermined arrangement rule of the optical fibers includes: the materials are arranged in a circular shape according to the arrangement rule of the preset intervals and the divergent arrangement.
2. The method of claim 1, wherein performing protection processing on the illegal invader comprises:
and sending alarm information to the remote control equipment.
3. A protective treatment device, comprising:
the detection module is used for detecting that a preset parameter in the optical interference phenomenon corresponding to a preset optical fiber changes;
the determining module is used for determining that the target object in the area where the predetermined optical fiber is arranged is an illegal invader based on the change value of the predetermined parameter;
the execution module is used for executing protection processing on the illegal invader;
wherein the predetermined parameters include: phase change information of laser pulse signals in the optical fiber sensing device and space positioning information of the optical fiber device;
the device is further configured to obtain a prediction result according to the position, the movement track, and the movement speed of the target object, where the prediction result includes: a moving speed and a moving direction of the target object at a next time; according to the prediction result and the volume and the weight of the target object, performing protection processing on the illegal invader;
the determining module is further configured to determine target data of the target object according to an arrangement rule of the predetermined optical fibers and a variation value of the predetermined parameter, where the target data includes: the position of the target object, the movement track of the target object, the movement speed of the target object and the weight of the target object; determining the target object as an illegal invader according to the target data; wherein the predetermined arrangement rule of the optical fibers includes: the materials are arranged in a circular shape according to the arrangement rule of the preset intervals and the divergent arrangement.
4. A storage medium, in which a computer program is stored, wherein the computer program is arranged to perform the method of any of claims 1 to 2 when executed.
5. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811643601.9A CN109920182B (en) | 2018-12-29 | 2018-12-29 | Protection processing method and device, storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811643601.9A CN109920182B (en) | 2018-12-29 | 2018-12-29 | Protection processing method and device, storage medium and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109920182A CN109920182A (en) | 2019-06-21 |
CN109920182B true CN109920182B (en) | 2022-03-04 |
Family
ID=66960092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811643601.9A Expired - Fee Related CN109920182B (en) | 2018-12-29 | 2018-12-29 | Protection processing method and device, storage medium and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109920182B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708706A (en) * | 2011-12-07 | 2012-10-03 | 上海市城市建设设计研究院 | Pre-warning method for preventing object from impacting bridge |
CN103198595A (en) * | 2013-03-11 | 2013-07-10 | 成都百威讯科技有限责任公司 | Intelligent door and window anti-invasion system |
CN103839373A (en) * | 2013-03-11 | 2014-06-04 | 成都百威讯科技有限责任公司 | Sudden abnormal event intelligent identification alarm device and system |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5134386A (en) * | 1991-01-31 | 1992-07-28 | Arbus Inc. | Intruder detection system and method |
JP2005184772A (en) * | 2003-09-12 | 2005-07-07 | Oki Electric Ind Co Ltd | Optical fiber sensor system and external force detecting sensor |
CN101488267A (en) * | 2009-02-13 | 2009-07-22 | 上海大学 | Signal characteristic recognition method for pedestrian intrusion into optical fiber fence |
EP2846316A1 (en) * | 2013-09-05 | 2015-03-11 | ETH Zurich | Fibre optic based intrusion sensing system |
CN103729959B (en) * | 2013-12-18 | 2016-06-08 | 公安部第三研究所 | A kind of polarization intrusion alarm device |
CN105389917B (en) * | 2015-09-18 | 2018-01-19 | 南京派光信息技术有限公司 | A kind of quick method for early warning based on phase sensitive optical time domain reflectometer |
CN106597423B (en) * | 2016-12-07 | 2019-01-04 | 南京富岛信息工程有限公司 | A kind of train driving track-detecting method based on phase sensitive optical time domain reflectometer |
CN106918716A (en) * | 2017-03-13 | 2017-07-04 | 无锡亚天光电科技有限公司 | A kind of optical fiber structure and its determination methods for judging landing object movement trend |
CN108389343B (en) * | 2018-02-05 | 2020-01-07 | 长飞光纤光缆股份有限公司 | Defense area type optical fiber intrusion monitoring system capable of prompting intrusion track |
-
2018
- 2018-12-29 CN CN201811643601.9A patent/CN109920182B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708706A (en) * | 2011-12-07 | 2012-10-03 | 上海市城市建设设计研究院 | Pre-warning method for preventing object from impacting bridge |
CN103198595A (en) * | 2013-03-11 | 2013-07-10 | 成都百威讯科技有限责任公司 | Intelligent door and window anti-invasion system |
CN103839373A (en) * | 2013-03-11 | 2014-06-04 | 成都百威讯科技有限责任公司 | Sudden abnormal event intelligent identification alarm device and system |
Also Published As
Publication number | Publication date |
---|---|
CN109920182A (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10728265B2 (en) | Cyber warning receiver | |
CN107862821A (en) | A kind of perimeter security system | |
US11199829B2 (en) | Remote monitoring of industrial control systems | |
CN110070155B (en) | Comprehensive behavior recognition method and system for prisoner based on wearable equipment | |
CN108931968B (en) | Network security protection system applied to industrial control system and protection method thereof | |
CN103824406A (en) | Optical fiber sensing-based tunnel cable invasive detection method and system | |
CN102521939A (en) | Intrusion prevention system of fiber grating perimeter and alarm method thereof | |
CN106297114A (en) | A kind of invader detection method and device | |
US20070096896A1 (en) | System and method for securing an infrastructure | |
CN110456321A (en) | Filter out method, terminal device and the storage medium of radar wrong report | |
CN102663032A (en) | Fiber grating fence invasion event mode recognition method | |
CN203799460U (en) | Tunnel cable intrusion detection system based on optical fiber sensing | |
CN109883273A (en) | A kind of unattended unmanned plane automatic protective system and its operating scheme | |
CN108389343A (en) | A kind of defence area type fiber optic intrusion monitoring system prompting invasion track | |
CN109920182B (en) | Protection processing method and device, storage medium and electronic device | |
CN111489514A (en) | Long-distance perimeter security positioning and monitoring device and method thereof | |
CN117834301A (en) | Internet of things-based network security communication control method and system | |
CN114448718A (en) | Network security guarantee method for parallel detection and repair | |
Basan et al. | Analysis of the Impact of a GPS Spoofing Attack on a UAV | |
CN110011729A (en) | A kind of detection method of interference, device, storage medium and electronic device | |
US20190385090A1 (en) | Systems and methods for using artificial intelligence models to identify a current threat scenario | |
JP7315011B2 (en) | Optical fiber sensing system, monitoring method, and program | |
CN110648481B (en) | Calibration method and perimeter alarm device | |
CN104833378B (en) | Method for identifying interference signal of optical fiber perimeter system | |
CN215264997U (en) | Positioning type vibration optical cable perimeter intrusion alarm system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220304 |
|
CF01 | Termination of patent right due to non-payment of annual fee |