CN111343426B - Control method of anti-theft monitoring equipment for basement - Google Patents

Control method of anti-theft monitoring equipment for basement Download PDF

Info

Publication number
CN111343426B
CN111343426B CN202010131336.7A CN202010131336A CN111343426B CN 111343426 B CN111343426 B CN 111343426B CN 202010131336 A CN202010131336 A CN 202010131336A CN 111343426 B CN111343426 B CN 111343426B
Authority
CN
China
Prior art keywords
theft
image
monitoring
bat
support vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010131336.7A
Other languages
Chinese (zh)
Other versions
CN111343426A (en
Inventor
陈非儿
徐波
彭东亚
梁红
樊慧珍
荣彩
叶权锋
郭瑞超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN202010131336.7A priority Critical patent/CN111343426B/en
Publication of CN111343426A publication Critical patent/CN111343426A/en
Application granted granted Critical
Publication of CN111343426B publication Critical patent/CN111343426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2411Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field

Abstract

The invention relates to the technical field of measurement turnover cabinet identification, and particularly discloses a control method of anti-theft monitoring equipment for a basement, which comprises the following steps: the monitoring equipment acquires the theft images of the electric vehicles, marks the theft characteristics of the theft images to form a theft image sample library, and establishes a support vector machine and optimizes the support vector machine. And training the support vector machine by using the stolen image sample. The method comprises the steps that a plurality of monitoring devices are arranged in a basement, continuous frame monitoring images of the basement are obtained in real time, a support vector machine capable of predicting theft is adopted to predict theft of the continuous frame monitoring images, if one or more monitoring devices obtain the theft images within a continuous period of time, the monitoring devices are controlled to send the theft images to a monitoring center, and meanwhile an alarm unit of the monitoring center is controlled to give an alarm. And identifying the theft behavior in real time by using a robot learning algorithm and a monitoring device, and rapidly stopping the theft behavior according to the theft behavior of the found theft image.

Description

Control method of anti-theft monitoring equipment for basement
Technical Field
The invention belongs to the technical field of monitoring equipment control, and particularly relates to a control method for basement anti-theft monitoring equipment.
Background
The existing basement is generally a place for placing vehicles, and comprises a trolley or an electric car, the basement is placed in a house where the basement does not occupy a house, and the basement is placed and obtained very conveniently, however, basement personnel are generally few, and no supervision personnel exist, so that theft is easy to occur, the electric car is small in size and has no anti-theft measures, and therefore, the probability that the electric car placed in the basement is stolen is very high.
At present, the basement is basically provided with anti-theft measures, namely, a monitoring camera is arranged on the basement, the camera collects videos at fixed positions in real time, meanwhile, the videos are stored in a local image, when a theft action occurs, the stored local videos are replayed and inquired to inquire the stolen videos, and therefore the stolen electric car is searched according to the stolen videos.
Disclosure of Invention
The invention aims to provide a control method of anti-theft monitoring equipment for a basement, so as to overcome the defect that the efficiency of the conventional video-recording rechecking stolen electric vehicle is low.
In order to achieve the above object, the present invention provides a control method for a basement anti-theft monitoring device, comprising:
and S1, the monitoring equipment acquires the theft images of the electric vehicles, marks the theft characteristics of the theft images and forms a theft image sample library.
S2, establishing a support vector machine, and optimizing the network parameters of the support vector machine by using a bat algorithm to form the support vector machine with the optimal network parameters.
S3, dividing the marked theft image sample into a training set and a testing set.
S4, arranging a plurality of monitoring devices in the basement, acquiring continuous frame monitoring images of the basement in real time, predicting the theft of the continuous frame monitoring images by using a support vector machine capable of predicting the theft, judging the car theft if one or more monitoring devices acquire the theft images (for example, images for opening a cushion of the electric car are continuously acquired in 15) within a continuous period of time, namely controlling the monitoring devices to send the theft images to a monitoring center, and simultaneously controlling an alarm unit of the monitoring center to give an alarm.
Preferably, in the above technical solution, step S2 specifically includes:
s201, setting parameters of a support vector machine: the ranges of the parameters of the penalty parameter C, the RBF nuclear parameter delta and the loss function epsilon are as follows; initializing bat group related parameters: setting initial population number n and pulse loudness A0Pulse emissivity r0A bat pulse emission rate increasing coefficient gamma, a pulse loudness attenuation coefficient alpha, and bat search pulse frequency upper and lower limits fmin,fmaxMaximum number of iterations tmaxAnd the search precision;
s202, initializing the bat position xiAnd velocity vi
S203, determining a fitness evaluation function f (x), x ═ x1,…xd)TEvaluating the fitness value of each bat according to the fitness evaluation function to find the current optimal solution x*
S204, adjusting the bat search pulse frequency, and updating the speed and the position of the bat according to the formulas (1), (2) and (3):
fi=fmin+(fmax-fmin)β (1)
Figure GDA0002981649070000021
Figure GDA0002981649070000022
in the formula: beta is [0,1 ]]A randomly generated uniform random number; f. ofiRepresents a frequency of the acoustic wave; x is the number of*Representing a current global optimal solution;
Figure GDA0002981649070000023
indicating the position of the ith bat at time t,
Figure GDA0002981649070000024
representing the speed at that moment;
s205, generating uniformly distributed random number rand, if rand > riS206 is entered, otherwise S207 is entered, wherein riThe pulse emissivity of the ith bat;
s206, randomly disturbing the current optimal solution to generate a new solution, and carrying out border-crossing processing on the new solution, namely searching a local solution near the currently selected optimal solution and recording the current optimal solution;
s207, generating a new solution through random flight if rand is less than AiAnd f (x)i) F (x), then go to S208, otherwise go to S209, where aiThe pulse loudness of the ith bat;
s208, recording the new solution, and updating r by using the formulas (4) and (5)iAnd Ai
Figure GDA0002981649070000031
Figure GDA0002981649070000032
In the formula, ri t+1Represents the pulse emissivity of the ith bat in the t +1 generation, ri 0Represents the maximum pulse emissivity of the ith bat, gamma is a pulse emissivity increasing coefficient, wherein gamma is more than 0,
Figure GDA0002981649070000033
respectively indicates the ith bat at t +1 and tThe loudness of the generation pulses, a ∈ [0,1 ]]Is the pulse loudness attenuation coefficient;
s209, sorting the fitness values of all bats in the bat group, and finding out the current optimal solution and the optimal fitness value;
s210, if the preset search precision is met or the maximum search times are reached, turning to the step S211, otherwise, returning to the step S204;
and S211, outputting the current global optimal solution, and based on the currently selected optimal support vector machine model and the parameters thereof.
Preferably, in the above technical solution, after the monitoring device acquires the image in step S1 and step S4, performing enhanced noise reduction on the image specifically includes:
s301, converting the image from the rgb channel to the hsv channel for contrast enhancement, and then converting the image back to the rgb channel;
s302, performing gray value conversion on the image;
and S303, denoising the image after the gray value conversion by using a Gaussian filter.
Preferably, in the above technical solution, each monitoring device is connected to an intelligent gateway, a plurality of intelligent gateways are respectively deployed as a block chain node to form a block chain network, and each block chain node is used for transmitting and storing a theft behavior image.
Preferably, in the above technical solution, the monitoring device includes: a shell, a camera, a reflector, a light source, a controller, a cleaning cotton brush, a first motor, a second motor, a timer and a cover body, the casing is in a hexahedral cylinder shape, each cylindrical surface of the hexahedral cylinder shaped casing is provided with a camera, the camera of the camera extends out of each cylindrical surface, a reflecting plate is arranged above each camera, a light source is arranged between the reflector and the camera, one end of the cleaning cotton brush is hinged on one side of the camera, one end of the cover body is hinged with one side of the cleaning cotton brush, the first motor is used for driving the cover body to cover the cleaning cotton brush, the second motor is used for driving the cleaning cotton brush to swing back and forth towards the surface of the camera, the camera, the light source, the first motor, the second motor and the timer are respectively connected with the controller, and the controller is connected with the monitoring center.
Preferably, in the above technical solution, the initial state of the light source of the monitoring device is not bright, when the monitoring device acquires a theft image, the light source is turned on, the monitoring device predicts an image acquired after the image is predicted again by using a support vector machine capable of predicting a theft, and determines that the theft is a theft if the image is predicted again, and determines that the theft is not a theft if the image is not predicted again.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention utilizes the robot learning algorithm to combine with the monitoring equipment to identify the theft in real time, when the theft of the electric vehicle is identified, the theft image is stored and the alarm is given, thereby improving the monitoring efficiency, directly obtaining the theft image without reviewing the recording image, and further rapidly preventing the theft according to the found theft of the theft image.
2. Because the basement is darker, the invention introduces related equipment and monitoring method, namely when identifying the theft, the equipment and method can obtain the theft image with increased brightness again, thus improve the recognition rate of the theft.
Drawings
Fig. 1 is a flow chart of a control method of the anti-theft monitoring device for the basement.
Fig. 2 is a flow chart of the BA optimization support vector machine parameters of the present invention.
Fig. 3 is a top view of the monitoring device of the present invention.
Fig. 4 is a front view of the monitoring device of the present invention.
FIG. 5 is a structural diagram of the MerkleTree of the present invention.
The device comprises a shell 1, a camera 2, a light source 3, a reflector 4, a cover 5, a first motor 6, a cleaning cotton brush 7, a second motor 8 and a controller 9.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
As shown in fig. 1, the control method of the anti-theft monitoring device for the basement in this embodiment includes:
and S1, the monitoring equipment acquires the theft images of the electric vehicles, marks the theft characteristics of the theft images, namely, extracts the characteristics, and forms a theft image sample library. The theft image includes: opening images of various tram cushions, images of a car parking lock, images of a tram battery, images of a tram pushing and the like. And marking key features of various images.
S2, establishing a support vector machine, and optimizing the network parameters of the support vector machine by using a bat algorithm to form the support vector machine with the optimal network parameters; the input of the stolen image is x, the output is y, and y is f (x) which is a nonlinear relation, and an inverse function of y is f (x) can be obtained by using a BA-SVM support vector machine. In the embodiment, for simplifying the operation, the theft image is used as input by utilizing an SVM (support vector machine), and the marked theft behavior is used as output.
And S3, dividing the marked theft image sample into a training set and a testing set, randomly extracting the first 90% of the sample data as the training set and the last 10% as the testing set, inputting the training set into a support vector machine with the optimal network parameters to train the theft characteristic data, and testing the trained support vector machine by using the testing set to obtain the support vector machine capable of predicting the theft behavior.
S4, arranging a plurality of monitoring devices in the basement, acquiring continuous frame monitoring images of the basement in real time, predicting the theft of the continuous frame monitoring images by using a support vector machine capable of predicting the theft, and controlling the monitoring devices to send the theft images to a monitoring center and simultaneously control an alarm unit of the monitoring center to give an alarm if one or more monitoring devices acquire the theft images (such as images for opening a cushion of an electric car in 15) within a continuous period of time.
As shown in fig. 2, step S2 specifically includes:
s201, setting parameters of the support vector machine: punishmentThe parameter C has a parameter range of [1, 1000%]RBF nuclear parameter delta in the range of 0.1, 100]The parameter range of the loss function epsilon is [0.001, 1 ]](ii) a Initializing bat group related parameters: setting initial population number n and pulse loudness A0Pulse emissivity r0A bat pulse emission rate increasing coefficient gamma, a pulse loudness attenuation coefficient alpha, and bat search pulse frequency upper and lower limits fmin,fmaxMaximum number of iterations tmaxAnd the search precision;
s202, initializing the bat position xiAnd velocity vi
S203, determining a fitness evaluation function f (x), x ═ x1,…xd)TEvaluating the fitness value of each bat according to the fitness evaluation function to find the current optimal solution x*
S204, adjusting the bat search pulse frequency, and updating the speed and the position of the bat according to the formulas (1), (2) and (3):
fi=fmin+(fmax-fmin)β (1)
Figure GDA0002981649070000061
Figure GDA0002981649070000062
in the formula: beta is [0,1 ]]A randomly generated uniform random number; f. ofiRepresents a frequency of the acoustic wave; x is the number of*Representing a current global optimal solution;
Figure GDA0002981649070000063
indicating the position of the ith bat at time t,
Figure GDA0002981649070000064
representing the speed at that moment;
s205, generating uniformly distributed random number rand, if rand > riS206 is entered, otherwise S207 is entered, wherein riThe pulse emissivity of the ith bat;
s206, randomly disturbing the current optimal solution to generate a new solution, and carrying out border-crossing processing on the new solution, namely searching a local solution near the currently selected optimal solution and recording the current optimal solution; s207, generating a new solution through random flight if rand is less than AiAnd f (x)i) F (x), then go to S208, otherwise go to S209, where aiThe pulse loudness of the ith bat;
s208, recording the new solution, and updating r by using the formulas (4) and (5)iAnd Ai
Figure GDA0002981649070000065
Figure GDA0002981649070000066
In the formula, ri t+1Represents the pulse emissivity of the ith bat in the t +1 generation, ri 0Represents the maximum pulse emissivity of the ith bat, gamma is a pulse emissivity increasing coefficient, wherein gamma is more than 0,
Figure GDA0002981649070000067
respectively represents the pulse loudness of the ith bat in t +1 and t generations, and a is equal to 0,1]Is the pulse loudness attenuation coefficient;
s209, sorting the fitness values of all bats in the bat group, and finding out the current optimal solution and the optimal fitness value;
s210, if the preset search precision is met or the maximum search times are reached, turning to the step S211, otherwise, returning to the step S204;
s211, outputting the current global optimal solution, and based on the currently selected optimal support vector machine model and the parameters thereof, including: training parameters (including penalty factor C, radial basis kernel function parameters, etc.), type of model, kernel function type, loss function and its parameters.
Further, the enhancing and denoising of the image after the monitoring device acquires the image in step S1 and step S4 specifically includes:
and S11, positioning the theft image to be identified, and cutting and zooming the corresponding area.
S12, an image contrast enhancement algorithm is adopted to convert the image from the rgb channel to the hsv channel for contrast enhancement, and then the image is converted back to the rgb channel.
And S13, converting the gray value of the image. Specifically, the algorithms B3 and F3 extract rgb values, and calculate the grayscale values according to the formula r 0.299+ g 0.587+ B0.144 (r, g, B are red, green, and blue luminance values).
And S14, denoising the image after the gray value conversion by using a Gaussian filter. The filtering principle is to calculate the weighted average value of the values of the pixel points and the surrounding pixel points, see formula (6), and the method has the advantages of less variables and strong control capability on the smoothness of the noise-reduced image. Considering that the actual detection situation is complex, the size of the Gaussian filter can be reduced when the noise reduction algorithm is optimized in the actual part, and therefore the operation efficiency is improved.
Figure GDA0002981649070000071
Wherein i and j are matrix row and column numbers, k is any positive integer, and sigma is variable.
Further, as shown in fig. 3 to 4, the monitoring apparatus includes: the camera comprises a shell 1, a camera 2, a reflector 4, a light source 3, a controller 9, a cleaning cotton brush 7, a first motor 6, a timer, a second motor 8 and a cover body 5, wherein the shell 1 is in a hexahedral cylinder shape, each cylindrical surface of the hexahedral cylinder shaped shell 1 is provided with one camera 2, a camera of the camera 2 extends out of each cylindrical surface, the reflector 4 is arranged above each camera 2, the light source 3 is arranged between the reflector 4 and the camera 2, one end of the cleaning cotton brush 7 is hinged to one side of the camera 2, one end of the cover body 5 is hinged to one side of the cleaning cotton brush 7, the first motor 6 is used for driving the cover body 5 to cover the cleaning cotton brush 7, the second motor 8 is used for driving the cleaning cotton brush 7 to swing back and forth towards the surface of the camera 2, and the camera 2, the light source 3, the first motor 6, the second motor 8 and the timer are respectively connected with, the controller 9 is connected with the monitoring center.
When the monitoring equipment works, the camera acquires the video in real time, transmits the video to the controller, and transmits the video to the monitoring center after being processed by the controller. Further, in the normality, the cover body covers on cleaning the cotton brush, timing through the timer, start once every 5 hours if regularly, when scheduled time, then start first motor and rotate and drive the cover body and upwards turn up, then the second motor drives and cleans the cotton brush toward the camera surface swing back and forth of camera, thereby clean the camera, be located the height all the year round with solving the camera, can't be by the mesh of cleaning, after the swing back and forth is several times, the second motor drives and cleans the cotton brush and resets, first motor drives the cover body and resets, thereby accomplish the camera and clean work.
Further, the basement is in a dark state all the year round, in order to prevent misjudgment, the initial state of a light source of the monitoring equipment is not bright, when the monitoring equipment acquires a theft behavior image, the controller of the monitoring equipment controls the turning on of the light source, the monitoring equipment predicts the image collected after the image is predicted again by using the support vector machine capable of predicting the theft behavior, at the moment, if the image is predicted again as the theft behavior image, the theft behavior is judged, and if the image is not predicted, the theft behavior is judged. When the theft is identified, the device and the method can acquire the theft image with increased brightness again, thereby improving the identification rate of the theft.
In the embodiment, a block chain storage technology is introduced, a controller of each monitoring device is connected with an intelligent gateway, the intelligent gateways are connected with one another, the intelligent gateways are respectively deployed as a block chain node, one controller is deployed as a tentacle node of a block chain network to form the block chain network, and each block chain node is used for transmitting, storing and updating the acquired theft behavior image; the controller is deployed as a block chain child node, so that each theft behavior image and log data are redundantly stored in each controller in a block chain mode; when any one controller node is damaged, all data of the damaged controller can be recovered from the adjacent controllers.
The specific construction method comprises the following steps:
the intelligent gateway has the advantages that the network is complete, the boundary calculation and the dirty data screening are realized, the data collected by the controller are sent to the intelligent gateway through the MQTT internet of things protocol, and the intelligent gateway has certain calculation capacity. The intelligent gateway may be deployed as a peer node of a blockchain. And the theft behavior image acquired each time is written into the block chain as block data and informs the adjacent nodes and the monitoring center.
And deploying the block link point module in the intelligent gateway. The gateway is automatically registered to a monitoring center after being started, and the unique identifier Hash (the original ID of each component of the intelligent gateway, which is generated by the SHA256 algorithm after being summarized) of the hardware of the industrial intelligent gateway is used as the attribute of the intelligent gateway and submitted to the monitoring center together. After receiving the registration of the intelligent gateway, the monitoring center adopts a block chain block sending algorithm to carry out block sending, and the block structure of the block chain is as shown in table 1:
TABLE 1 Block chain Structure Table diagram
Figure GDA0002981649070000081
Figure GDA0002981649070000091
After the intelligent gateway receives the acquired data, the acquired data are stored by adopting a block chain technology:
and inserting the Data parameters into the Collections field to generate a new Data List Data set. And then calculating the Merkle Tree root node Hash of all data nodes in the whole Collection field for checking the correctness of the collected data.
The MerkleTree structure is shown in fig. 5, and it should be noted that since the MerkleTree must be an even number of nodes, when the number of datalists is odd, the last node uses its own Hash to generate the Hash of the previous layer by two calculations. And after the data are inserted and the MerkLeTreeRootHash is updated successfully, the data added in the nodes are announced to all the online block nodes. All nodes (intelligent gateway nodes/upper monitoring equipment nodes of the network) receiving the message use PBFT (physical Byzantine factory Tolerance Practical Byzantine Fault-tolerant algorithm) to verify the validity of the message, and then update the acquisition information of the corresponding nodes on the chain.
The benefit of using blockchains to store industrial data is apparent. Data collected by the monitoring equipment are written into the block chain to become an electronic evidence which cannot be tampered, the data are completely decoupled from hardware, and the collected data chain can be recovered through the online node regardless of the state of the hardware.
In conclusion, the invention utilizes the robot learning algorithm and the monitoring equipment to identify the theft behavior in real time, when the theft behavior of the electric vehicle is identified, the theft image is stored and the alarm is given, thereby improving the monitoring efficiency, directly obtaining the theft image without reviewing and recording the image, and further rapidly stopping the theft behavior according to the found theft behavior of the theft image.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (4)

1. A control method of anti-theft monitoring equipment for a basement is characterized by comprising the following steps:
s1, the monitoring equipment acquires a plurality of theft images of the electric vehicle, and marks the theft characteristics of the theft images to form a theft image sample library;
s2, establishing a support vector machine, and optimizing the network parameters of the support vector machine by using a bat algorithm to form the support vector machine with the optimal network parameters;
s3, dividing the marked theft image sample into a training set and a testing set, inputting the training set into a support vector machine with optimal network parameters to train theft characteristic data, and testing the trained support vector machine by using the testing set to obtain the support vector machine capable of predicting theft;
s4, arranging a plurality of monitoring devices in a basement, acquiring continuous frame monitoring images of the basement in real time, predicting the theft of the continuous frame monitoring images by adopting a support vector machine capable of predicting the theft, controlling the monitoring devices to send the theft images to a monitoring center if one or more monitoring devices acquire the theft images within a continuous period of time, and controlling an alarm unit of the monitoring center to give an alarm;
the monitoring device includes: a shell, a camera, a reflector, a light source, a controller, a cleaning cotton brush, a first motor, a second motor, a timer and a cover body, the casing is in a hexahedral cylinder shape, each cylindrical surface of the hexahedral cylinder shaped casing is provided with a camera, the camera of the camera extends out of each cylindrical surface, a reflecting plate is arranged above each camera, a light source is arranged between the reflector and the camera, one end of the cleaning cotton brush is hinged on one side of the camera, one end of the cover body is hinged with one side of the cleaning cotton brush, the first motor is used for driving the cover body to cover the cleaning cotton brush, the second motor is used for driving the cleaning cotton brush to swing back and forth towards the surface of the camera, the camera, the light source, the first motor, the second motor and the timer are respectively connected with the controller, and the controller is connected with the monitoring center; the monitoring device is characterized in that the initial state of a light source of the monitoring device is not bright, when the monitoring device acquires a theft behavior image, the light source is turned on, the monitoring device predicts the acquired image again by using a support vector machine capable of predicting the theft behavior, if the image is predicted as the theft behavior image again, the theft behavior is judged, and if the image is not predicted as the theft behavior image, the theft behavior is judged.
2. The control method of the anti-theft monitoring device for the basement according to claim 1, wherein the step S2 specifically includes:
s201, setting parameters of the support vector machine: penalty parameter C, RBF kernel parameter δ, parameter range of loss function ε; initializing bat group related parameters: setting initial population number n and pulse loudness A0Pulse emissivity r0A bat pulse emission rate increasing coefficient gamma, a pulse loudness attenuation coefficient alpha, and bat search pulse frequency upper and lower limits fmin,fmaxMaximum number of iterations tmaxAnd the search precision;
s202, initializing the bat position xiAnd velocity vi
S203, determining a fitness evaluation function f (x), x ═ x1,…xd)TEvaluating the fitness value of each bat according to the fitness evaluation function to find the current optimal solution x*
S204, adjusting the bat search pulse frequency, and updating the speed and the position of the bat according to the formulas (1), (2) and (3):
fi=fmin+(fmax-fmin)β (1)
Figure FDA0002981649060000021
Figure FDA0002981649060000022
in the formula: beta is [0,1 ]]A randomly generated uniform random number; f. ofiRepresents a frequency of the acoustic wave; x is the number of*Representing a current global optimal solution;
Figure FDA0002981649060000023
indicating the position of the ith bat at time t,
Figure FDA0002981649060000024
representing the speed at that moment;
s205, generating uniformly distributed random number rand, if rand > riS206 is entered, otherwise S207 is entered, wherein riThe pulse emissivity of the ith bat;
s206, randomly disturbing the current optimal solution to generate a new solution, and carrying out border-crossing processing on the new solution, namely searching a local solution near the currently selected optimal solution and recording the current optimal solution;
s207, generating a new solution through random flight if rand is less than AiAnd f (x)i) F (x), then go to S208, otherwise go to S209, where aiThe pulse loudness of the ith bat;
s208, recording the new solution, and updating r by using the formulas (4) and (5)iAnd Ai
ri t+1=ri 0[1-exp(-γ*t)] (4)
Figure FDA0002981649060000025
In the formula, ri t+1Represents the pulse emissivity of the ith bat in the t +1 generation, ri 0Represents the maximum pulse emissivity of the ith bat, gamma is a pulse emissivity increasing coefficient, wherein gamma is more than 0,
Figure FDA0002981649060000026
respectively represents the pulse loudness of the ith bat in t +1 and t generations, and a is equal to 0,1]Is the pulse loudness attenuation coefficient;
s209, sorting the fitness values of all bats in the bat group, and finding out the current optimal solution and the optimal fitness value;
s210, if the preset search precision is met or the maximum search times are reached, turning to the step S211, otherwise, returning to the step S204;
and S211, outputting the current global optimal solution, and based on the currently selected optimal support vector machine model and the parameters thereof.
3. The method for controlling the anti-theft monitoring device for the basement according to claim 1, wherein the monitoring device performs enhanced noise reduction on the image after acquiring the image in the steps S1 and S4, and specifically comprises:
s301, converting the image from the rgb channel to the hsv channel for contrast enhancement, and then converting the image back to the rgb channel;
s302, performing gray value conversion on the image;
and S303, denoising the image after the gray value conversion by using a Gaussian filter.
4. The control method of the anti-theft monitoring device for the basement according to claim 1, wherein each monitoring device is connected with an intelligent gateway, a plurality of intelligent gateways are respectively deployed as a block chain node to form a block chain network, and each block chain node is used for transmitting and storing a theft behavior image.
CN202010131336.7A 2020-02-28 2020-02-28 Control method of anti-theft monitoring equipment for basement Active CN111343426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010131336.7A CN111343426B (en) 2020-02-28 2020-02-28 Control method of anti-theft monitoring equipment for basement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010131336.7A CN111343426B (en) 2020-02-28 2020-02-28 Control method of anti-theft monitoring equipment for basement

Publications (2)

Publication Number Publication Date
CN111343426A CN111343426A (en) 2020-06-26
CN111343426B true CN111343426B (en) 2021-05-28

Family

ID=71185747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010131336.7A Active CN111343426B (en) 2020-02-28 2020-02-28 Control method of anti-theft monitoring equipment for basement

Country Status (1)

Country Link
CN (1) CN111343426B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635835A (en) * 2008-07-25 2010-01-27 深圳市信义科技有限公司 Intelligent video monitoring method and system thereof
CN105391768A (en) * 2015-10-15 2016-03-09 桂林电子科技大学 Monitoring system for logistics vehicles and monitoring method thereof
CN205179248U (en) * 2015-11-23 2016-04-20 中核(天津)机械有限公司 Production line spare part leak protection dress device
US9402061B2 (en) * 2013-05-08 2016-07-26 Smart-I, S.R.L. Smart optical sensor for adaptive, predictive, and on-demand control of public lighting
CN108121999A (en) * 2017-12-10 2018-06-05 北京工业大学 Support vector machines parameter selection method based on mixing bat algorithm
CN110110690A (en) * 2019-05-16 2019-08-09 廊坊鑫良基科技有限公司 A kind of target pedestrian method for tracing, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102433931B1 (en) * 2015-07-30 2022-08-19 삼성전자주식회사 Method and device for recognizing motion
CN109377616B (en) * 2018-10-30 2021-02-12 南京邮电大学 Access control system based on two-dimensional face recognition

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635835A (en) * 2008-07-25 2010-01-27 深圳市信义科技有限公司 Intelligent video monitoring method and system thereof
US9402061B2 (en) * 2013-05-08 2016-07-26 Smart-I, S.R.L. Smart optical sensor for adaptive, predictive, and on-demand control of public lighting
CN105391768A (en) * 2015-10-15 2016-03-09 桂林电子科技大学 Monitoring system for logistics vehicles and monitoring method thereof
CN205179248U (en) * 2015-11-23 2016-04-20 中核(天津)机械有限公司 Production line spare part leak protection dress device
CN108121999A (en) * 2017-12-10 2018-06-05 北京工业大学 Support vector machines parameter selection method based on mixing bat algorithm
CN110110690A (en) * 2019-05-16 2019-08-09 廊坊鑫良基科技有限公司 A kind of target pedestrian method for tracing, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于多参量联合特征的水下小目标分类识别;赵国贵 等;《水下无人系统学报》;20191215(第6期);第644-650页 *

Also Published As

Publication number Publication date
CN111343426A (en) 2020-06-26

Similar Documents

Publication Publication Date Title
KR101607224B1 (en) Dynamic object classification
CN102891960B (en) Method and camera for determining an image adjustment parameter
CN102445640B (en) GIS device intelligent recognition method based on vector machine and artificial fish swarm optimization
CN111126152A (en) Video-based multi-target pedestrian detection and tracking method
CN111680535B (en) Method and system for real-time prediction of one or more potential threats in video surveillance
CN110084130B (en) Face screening method, device, equipment and storage medium based on multi-target tracking
CN108805008A (en) A kind of community's vehicle security system based on deep learning
WO2020174459A1 (en) A distributed-acoustic-sensing (das) analysis system using a generative-adversarial-network (gan)
CN111931713B (en) Abnormal behavior detection method and device, electronic equipment and storage medium
KR102391853B1 (en) System and Method for Processing Image Informaion
CN112883782B (en) Method, device, equipment and storage medium for identifying putting behaviors
CN110826577A (en) High-voltage isolating switch state tracking identification method based on target tracking
CN106846304A (en) Electrical equipment detection method and device based on infrared detection
CN113112521A (en) Motion detection method based on pulse array
CN114445461A (en) Visible light infrared target tracking training method and device based on non-paired data
CN111343426B (en) Control method of anti-theft monitoring equipment for basement
CN116386081A (en) Pedestrian detection method and system based on multi-mode images
CN109101884B (en) Pulse array prediction method
CN112487877A (en) Monitoring method, system, device and medium for standard operation of kitchen waste
CN116935108A (en) Method, device, equipment and medium for monitoring abnormal garbage throwing behavior
CN112085096A (en) Method for detecting local abnormal heating of object based on transfer learning
CN111222370A (en) Case studying and judging method, system and device
CN113469013A (en) Motor fault prediction method and system based on transfer learning and time sequence
CN111199306A (en) Prediction device, prediction method, and storage medium
CN116579337B (en) False news detection method integrating evidence credibility

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200626

Assignee: Guangxi Jiulong Electronic Technology Co.,Ltd.

Assignor: GUILIN University OF ELECTRONIC TECHNOLOGY

Contract record no.: X2023980045660

Denomination of invention: A control method for basement anti-theft monitoring equipment

Granted publication date: 20210528

License type: Common License

Record date: 20231105

EE01 Entry into force of recordation of patent licensing contract