CN112257494A - Behavior recognition method based on intelligent video analysis technology and application - Google Patents

Behavior recognition method based on intelligent video analysis technology and application Download PDF

Info

Publication number
CN112257494A
CN112257494A CN202010943051.3A CN202010943051A CN112257494A CN 112257494 A CN112257494 A CN 112257494A CN 202010943051 A CN202010943051 A CN 202010943051A CN 112257494 A CN112257494 A CN 112257494A
Authority
CN
China
Prior art keywords
alarm
rules
intelligent video
behavior
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010943051.3A
Other languages
Chinese (zh)
Inventor
王新瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Fuxing Intelligent Technology Co ltd
Original Assignee
Guizhou Fuxing Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Fuxing Intelligent Technology Co ltd filed Critical Guizhou Fuxing Intelligent Technology Co ltd
Priority to CN202010943051.3A priority Critical patent/CN112257494A/en
Publication of CN112257494A publication Critical patent/CN112257494A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a behavior recognition method based on an intelligent video analysis technology, which comprises the following steps: step one, setting target behavior rules according to the needs of danger sources, and monitoring various danger sources through videos; secondly, analyzing the video image frame by frame to obtain target point hazard source information; and step three, analyzing the extracted information according to the alarm rules set by the user, capturing the emergencies or dangerous events violating the rules in real time, and immediately carrying out alarm prompt in various effective modes if the events meeting the preset rules occur. The frequency analysis system detects suspicious activities, events or behaviors by analyzing the real-time video stream of a site to generate an alarm to remind the watchers to pay attention. The whole system firstly makes the management simpler and more efficient, not only saves labor cost for customers, but also provides a scheme for optimal data storage and information management.

Description

Behavior recognition method based on intelligent video analysis technology and application
Technical Field
The invention relates to the technical field of video analysis, in particular to a behavior identification method based on an intelligent video analysis technology and application thereof.
Background
The security is a foundation for the survival and development of society and enterprises, especially in the modern technology advanced development, crimes are more intelligent, means are more hidden, and the enhancement of the modern security technology is more important. The security technology is developed in this sense, and is a product of the combination of high-tech technologies such as electronic technology, sensor technology, computer technology, and modern communication technology. The novel anti-disaster device plays a role in preventing and fighting crime, maintaining social security, preventing disaster accidents, reducing the lives of countries, collective property and people and the like, and is difficult or impossible to play by common prevention means. The safety precaution technical system and the products are sharp weapons for preventing and fighting crimes and preventing disaster accidents, are important contents for social security comprehensive treatment, and can gradually give way to the era of security of locks.
In the prior art, a video monitoring system is generally built, the security capability is greatly improved by effective application of the video monitoring system to a certain extent, but the video monitoring system basically stays at the stage of the traditional video monitoring mode in the aspects of monitoring capability and monitoring effectiveness, can only be used for basic scheduling and evidence obtaining afterwards in most of the time, and cannot play the roles of prevention and early warning. Moreover, a specially-assigned person is required to observe, control and analyze images in the camera, and security personnel need to monitor too many video pictures which are far beyond the acceptance capability of the person, so that the actual monitoring effect is low.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a behavior identification method based on an intelligent video analysis technology, so that the problems in the prior art are solved.
In order to achieve the purpose, the invention adopts the following technical scheme:
a behavior identification method based on an intelligent video analysis technology comprises the following steps:
step one, setting target behavior rules according to the needs of danger sources, and monitoring various danger sources through videos;
secondly, analyzing the video image frame by frame to obtain target point hazard source information;
and step three, analyzing the extracted information according to the alarm rules set by the user, capturing the emergencies or dangerous events violating the rules in real time, and immediately carrying out alarm prompt in various effective modes if the events meeting the preset rules occur.
Preferably, in the step one, the monitoring of various dangerous sources through videos comprises the following steps:
s1, extraction of moving targets: the method comprises simple extraction, noise filtration and region integration;
s2, tracking of the moving target: carrying out tracing on border crossing, invasion, leaving, theft, loitering and flow statistics;
s3, identification of moving targets: the method comprises a machine learning process and a recognition process for a new target based on a learning result;
s4, behavior analysis: and performing targeted behavior judgment on different targets by using the recognition result.
Preferably, in S1, the region integration is to process the obtained foreground map by using some basic binary image processing algorithms, fill up the gaps, and distinguish the connected regions, and finally return the regions to the system as a whole.
Preferably, the behavior analysis in S4 is to implement different functions by different rules according to the appearance time, direction, position, speed, size, inter-target distance and relative direction, etc. of one or more targets.
The invention also discloses an application of the intelligent video analysis technology, wherein an intelligent video analysis system is arranged on the camera to collect real-time videos, the centralized networking of intelligent behavior analysis images is realized through network networking, and the intelligent video analysis system compares the collected real-time videos in real time according to a preset image analysis rule and triggers an alarm according to the rule.
Preferably, cameras at the entrance, the passage, the station hall, the station platform and the tunnel are provided with an intelligent video analysis system to acquire real-time videos.
Preferably, after the alarm occurs, the entire process of the alarm event can be played back completely.
Preferably, the detection and tracking are carried out for the target entering the set virtual forbidden zone or crossing the set broken line, and the alarm is triggered according to the rule set by the user.
Preferably, a detection area and a movement direction are set in the monitoring picture, so that people moving reversely in a specified direction in the area are detected in real time and early warned in time. In the one-way flow area, the object violating the specified movement direction is monitored and an alarm is triggered.
The invention has the advantages that: the frequency analysis system detects suspicious activities, events or behaviors by analyzing the real-time video stream of a site to generate an alarm to remind the watchers to pay attention. The whole system firstly makes the management simpler and more efficient, not only saves labor cost for customers, but also provides a scheme for optimal data storage and information management.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example 1
The invention provides a behavior recognition method based on an intelligent video analysis technology, which comprises the following steps:
step one, setting a target behavior rule according to the needs of the hazard sources, and monitoring various hazard sources through videos. The method for monitoring various dangerous sources through videos comprises the following steps:
s1, extraction of moving targets: including simple extraction, filtering noise, and region integration. Simple video analysis of the original video stream (compressed or uncompressed) results in regions that change relatively over time. The purpose of filtering noise is to eliminate light variations and perturbations of natural and unnatural environmental variations. The reasons for the occurrence of the noise can be divided into self-noise of a camera, signal interference and camera shake; the light change comprises the change of indoor and outdoor light; interference of natural environment. The main purpose of region extraction is to process the obtained foreground image by using some basic binary image processing algorithms, fill up gaps, distinguish connected regions, and finally return the connected regions to the system as a whole. The content returned to the system may include region size, location, shape, color, pattern key feature description information for further targeted analysis.
S2, tracking of the moving target: the system is characterized in that border crossing, invasion, leaving, theft, loitering and flow statistics are tracked, and the object, the time, the place, the time and the direction of movement are known.
S3, identification of moving targets: the method comprises a machine learning process and a recognition process for a new emerging target based on a learning result.
S4, behavior analysis: and performing targeted behavior judgment on different targets by using the recognition result. Different functions are realized through different rules according to the appearance time, direction, position, speed, size, distance between objects, relative direction and the like of one or more objects. Basic functions which can be realized include border crossing, wandering, overspeed, fireworks, detention, disappearance, people flow statistics, illegal vehicles and the like, and individual behaviors of people include falling, bending and hand lifting skeleton analysis; and some human interaction with others or objects including handing over items, traffic accidents, getting on and off, etc.
Secondly, analyzing the video image frame by frame to obtain target point hazard source information;
and step three, analyzing the extracted information according to the alarm rules set by the user, capturing the emergencies or dangerous events violating the rules in real time, and immediately carrying out alarm prompt in various effective modes if the events meeting the preset rules occur.
Example 2
The invention also discloses an application of the intelligent video analysis technology, wherein an intelligent video analysis system is arranged on the camera to collect real-time videos, the centralized networking of intelligent behavior analysis images is realized through network networking, and the intelligent video analysis system compares the collected real-time videos in real time according to a preset image analysis rule and triggers an alarm according to the rule.
Cameras at the entrance, the passage, the station hall, the station platform and the tunnel are provided with an intelligent video analysis system to acquire real-time videos. The entrance and exit are the only way to the platform direction, and are also the main areas for easing the people flow, swiping the card, and performing security check and confirmation operations, the height concentration of the people flow is the biggest characteristic of the entrance and exit, and the complexity and uncertainty of the people flow are also the source of potential safety hazards. The channel is a high-mobility region of people, and absolute smoothness of the channel must be guaranteed in the daily operation process. The normal order of entering and exiting the station of the crowd can be strictly controlled, and the phenomena of long-time congestion and crowd chaos are avoided. The station hall is the largest crowd retention area, and the crowd saturation degree of the station hall is far higher than that of any other area before the train leaves the station or after the train arrives at the station. The platform is a terminal point for people collection, and the warning line of the platform is an absolute high-security-level control area, and particularly under the premise of lacking of a security protection door, in order to avoid excessive crowding caused by passenger flow or falling of a tunnel unintentionally, the insurmountable warning line must be ensured all the time.
The system monitors and gives an alarm in real time for the events such as people going backwards, abnormal escalator operation, passenger chasing and violent movement, passenger flow congestion, personnel invasion, personnel wandering retention, suspicious article leaving and the like. And counting people flow characteristics to obtain statistical data, and serving for formulating and adjusting management measures. And detecting the video state in real time, and immediately and automatically giving an alarm when the video state is abnormal. After the alarm occurs, the whole process of the alarm event can be completely played back. And the system seamless integration of the monitoring point and the monitoring center is realized by networking through a TCP/IP network. And carrying out local or remote configurable and remote maintenance management on intelligent behavior recognition of all monitoring points. The intelligent analysis function needs to realize localization, avoid interference on original video, network signals and analysis result return in the network remote transmission process, and the intelligent analysis result needs to realize woodland storage, local processing, local uploading, woodland response, remote storage, remote calling, remote processing and remote response. Identity authentication, computer IP authentication and authority management are carried out on the network online users, and information safety and data safety are guaranteed. And monitoring the working state of the security equipment of the whole system in an automatic inspection mode and intelligent analysis and comparison, and automatically reporting once a fault is found. Control function requirements for intelligent analytics services: the remote arming, disarming, control and parameter change of the cameras of all points are required to be realized through a network TCP/IP protocol. Regarding intelligent alarm requirements: the alarm video can be displayed and processed locally and displayed on a large screen at a remote first time, and the glance video can be played back on the alarm management server: the intelligent alarm signal can be automatically uploaded to the alarm management server, and the alarm management server can be deployed locally or remotely to realize the management of the alarm information. Before the alarm response, the response of the alarm video and the alarm information needs to be confirmed by manual reputation confirmation, and after the alarm is confirmed, different treatments are carried out according to different grades. The important events can be directly imported into a private network, and direct private network alarming is realized. The remote intelligent behavior recognition control system can enable the behavior analysis image to reach a computer on a desktop through a computer network, so that the behavior analysis image is integrated with an information management system and an office automation system, management service is better served, and management level and efficiency are improved. After the intelligent analysis monitoring system is realized, all control can be completed by authorized personnel at local and remote monitoring centers. The monitoring videos are stored in each monitoring point in a scattered mode, and real-time videos can be called at any time and videos of any alarm events in the network monitoring points can be played back. The intelligent video analysis technology can also carry out intelligent detection on the safe area, including intrusion alarm, retrograde motion alarm, carry-over alarm, gathering alarm, detection of entering a forbidden area and line-crossing alarm.
The intrusion alarm of intelligent video analysis is triggered after the size, the form and the motion rule of a target which possibly appears are identified. The intelligent video analysis system can accurately judge and distinguish the difference of people, vehicles and other targets, only prompts are given for the occurrence of the targets needing attention, the interference of tree shadows and water waves is eliminated, the video intrusion detection can cope with complex environments, real alarms violating safety rules are given, and the forbidden zones, the number, the shapes, the sizes and the position of broken lines can be freely set, so that the intelligent video analysis system is not a single rectangular square. Therefore, the setting of the precautionary target area is more detailed and accurate. The unauthorized entry into a designated area is monitored and an alarm can be generated upon the detection of a human intrusion into a sensitive or hazardous area.
The retrograde motion alarm carries out real-time detection and timely early warning on people moving reversely in a specified direction in the region by setting a detection region and a motion direction in a monitoring picture. In the one-way flow area, the object violating the specified movement direction is monitored and an alarm is triggered. When a person enters at the exit or exits at the entrance or the transfer station channel runs reversely, an alarm is generated. So as to effectively prevent the normal riding order from being damaged and influenced by the reverse behavior of a few people.
And carrying out real-time detection and timely early warning on the left-over target exceeding the set time in the specified area range by the left-over alarm. On one hand, the forgetting phenomenon of articles such as luggage packages of passengers and the like in a station hall can be timely noticed, and an alarm is generated when the articles which are not watched by people are still not taken away after the specified time in the station hall and the tunnel; on the other hand, the method also can be used for timely preventing other dangerous articles left by criminals from being destroyed in the tunnel.
The gathering alarm monitors the crowd density degree in the designated area, when the crowd number exceeds a set value, the alarm is triggered, and when too many passengers gather in a certain channel or an entrance, the alarm is generated in time.
The intelligent video analysis system for detecting the entrance of the forbidden zone can detect aiming at a preset zone, can set a warning zone and a plurality of defense zones, can set a detection rule for each defense zone, and can simultaneously detect and track a plurality of defense zones. One detection item of 'detection of entering an forbidden zone, detection of leaving the forbidden zone, detection of entering the forbidden zone at a boundary, detection of leaving the forbidden zone at the boundary, detection of appearing in an area and disappearing from the area' can be selected for real-time monitoring, an illegal target enters and leaves the area, and the system can immediately detect and identify and give an alarm in real time.
The line-crossing alarm is an intelligent video analysis system which can effectively utilize a video analysis technology to replace a conventional detection and alarm means. One or more virtual broken lines are arranged in the detection area, and after the line crossing direction is set, any line crossing target meeting the rule can be detected and trigger real-time alarm. A plurality of fold lines can be arranged, each fold line can be respectively provided with rules such as detection directions, and the detection and the tracking can be simultaneously carried out by the multi-fold lines.
The invention can also identify the intelligent behavior of the video quality. The video behavior recognition system can solve the problem of video failure through real-time analysis, and can be used for detecting the following conditions: video signal missing detection, visual field abnormality detection, video definition abnormality detection, video brightness abnormality detection, video interference detection and PTZ motion detection. Video signal loss detection is the detection of sporadic or persistent video loss phenomena. The abnormal visual field detection is to detect the abnormal visual field of the preset monitoring caused by the manual rotation and the blocking of the camera. Illegal behaviors damaging monitoring equipment can be detected through video image abnormity detection, behaviors of adopting electronic interference, damaging a camera and shielding a camera lens are automatically identified, and real-time alarming is carried out, so that criminals are prevented from being intentionally damaged, and normal operation of a video monitoring system is prevented. Video sharpness anomaly detection is the detection of image blur in the main portion of the field of view of a video due to improper focus, lens damage, or foreign object occlusion. The video brightness abnormity detection is used for detecting whether the picture is too dark, too bright or black due to camera faults, abnormal lighting conditions and the like in the video. The video interference detection is to detect the noise phenomena of image blurring, snowflake, shaking or scrolling caused by disordered ' cross tracks ' or ripples ' or interference in a video image. PTZ motion detection is that a video quality intelligent behavior recognition system detects video images of all cameras in the area under the control of the video quality intelligent behavior recognition system through polling in a control center, and when a video fault is found, alarm information is sent out immediately to remind a manager to find the fault of camera equipment in time and maintain the camera equipment.
The invention can also count passenger flow density and flow, including density detection in the region, people counting in the region and statistical result query. The density detection in the area automatically detects the density of the human flow in the monitoring area set by a user, updates the density at regular time in the form of a density statistic value, and gives an alarm according to a preset grade. The people counting in the area is that the video analysis system counts the people flow in and out amount of a certain area and sets an upper limit, and once the people flow density reaches the upper limit, the system can automatically alarm and link other equipment to evacuate people. Meanwhile, the area is provided with an intrusion alarm and can be linked with sound, light and electricity to warn. The statistical history records can be comprehensively queried according to various conditions.
The invention can also detect and analyze the behavior of the person, add the person with long-term disturbed operation into the blacklist library, recognize the dynamic face in the monitoring area, and automatically compare and alarm the blacklist face. When the platform arrives at the entrance, the platform reminds and informs security personnel to pay key attention to the platform. Through the face recognition technology, the identity of the entering personnel is monitored, the monitoring and alarm linkage is carried out on the personnel who come into the blacklist in real time, the blacklist personnel can be automatically identified as long as the blacklist personnel are shot by the camera through the background system, corresponding security personnel are informed to intercept and drive away, and the entering of dangerous personnel is blocked from the source. The steps of face recognition are as follows: establishing a face file: the method can be used for collecting face files by using a camera or a photo scanning method or the like or directly taking the photo files, generating a facial feature vector database and importing the facial feature vector database into the existing database; acquiring the face of a current comparison object, capturing the face by using a camera and the like to acquire photo input, and generating face feature vector data of the comparison object; retrieving and comparing the face feature vector data of the current face with the existing data in the database; confirming the face identity or proposing a similarity list of similar persons.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (9)

1. A behavior recognition method based on an intelligent video analysis technology is characterized by comprising the following steps:
step one, setting target behavior rules according to the needs of danger sources, and monitoring various danger sources through videos;
secondly, analyzing the video image frame by frame to obtain target point hazard source information;
and step three, analyzing the extracted information according to the alarm rules set by the user, capturing the emergencies or dangerous events violating the rules in real time, and immediately carrying out alarm prompt in various effective modes if the events meeting the preset rules occur.
2. The method of claim 1, wherein: in the first step, the monitoring of various dangerous sources through videos comprises the following steps:
s1, extraction of moving targets: the method comprises simple extraction, noise filtration and region integration;
s2, tracking of the moving target: carrying out tracing on border crossing, invasion, leaving, theft, loitering and flow statistics;
s3, identification of moving targets: the method comprises a machine learning process and a recognition process for a new target based on a learning result;
s4, behavior analysis: and performing targeted behavior judgment on different targets by using the recognition result.
3. The method of claim 2, wherein: in S1, the region integration is to process the obtained foreground image by using some basic binary image processing algorithms, fill up gaps, distinguish connected regions, and finally return the regions to the system as a whole.
4. The method of claim 2, wherein: the behavior analysis in S4 is to implement different functions by different rules according to the appearance time, direction, position, speed, size, inter-target distance and relative direction, etc. of one or more targets.
5. The application of the intelligent video analysis technology is characterized in that an intelligent video analysis system is arranged on a camera to collect real-time videos, the intelligent behavior analysis images are connected in a network in a centralized mode through the network, the collected real-time videos are compared in real time according to preset image analysis rules by the intelligent video analysis system, and alarm is triggered according to the rules.
6. The use of intelligent video analytics technology as claimed in claim 5, wherein: cameras at the entrance, the passage, the station hall, the station platform and the tunnel are provided with an intelligent video analysis system to acquire real-time videos.
7. The use of intelligent video analytics technology as claimed in claim 5, wherein: after the alarm occurs, the whole process of the alarm event can be completely played back.
8. The application of intelligent video analysis technology according to claim 5, wherein the detection and tracking are performed on the target entering the set virtual forbidden zone or crossing the set broken line, and the alarm is triggered according to the rule set by the user.
9. The method of claim 5, wherein: the method comprises the steps of setting a detection area and a movement direction in a monitoring picture, carrying out real-time detection and timely early warning on people moving reversely in a specified direction in the area, and monitoring and triggering warning on a target violating the specified movement direction in a one-way flow area.
CN202010943051.3A 2020-09-09 2020-09-09 Behavior recognition method based on intelligent video analysis technology and application Pending CN112257494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010943051.3A CN112257494A (en) 2020-09-09 2020-09-09 Behavior recognition method based on intelligent video analysis technology and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010943051.3A CN112257494A (en) 2020-09-09 2020-09-09 Behavior recognition method based on intelligent video analysis technology and application

Publications (1)

Publication Number Publication Date
CN112257494A true CN112257494A (en) 2021-01-22

Family

ID=74231692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010943051.3A Pending CN112257494A (en) 2020-09-09 2020-09-09 Behavior recognition method based on intelligent video analysis technology and application

Country Status (1)

Country Link
CN (1) CN112257494A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113284274A (en) * 2021-05-12 2021-08-20 亚萨合莱(广州)智能科技有限公司 Trailing identification method and computer readable storage medium
CN113823060A (en) * 2021-06-22 2021-12-21 复旦大学附属肿瘤医院 Intelligent early warning method and device for personnel behaviors
CN114611925A (en) * 2022-03-11 2022-06-10 杭州园钉科技有限公司 Wisdom garden management platform based on thing networking
CN116434346A (en) * 2023-06-12 2023-07-14 四川汉唐云分布式存储技术有限公司 Method and device for detecting customer behaviors in unattended store and storage medium
CN117041502A (en) * 2023-10-10 2023-11-10 湖南睿图智能科技有限公司 Dangerous scene analysis and monitoring system and method based on machine vision
CN117557949A (en) * 2023-04-12 2024-02-13 无锡八英里电子科技有限公司 Escalator safety device based on image recognition edge calculation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123721A (en) * 2007-09-30 2008-02-13 湖北东润科技有限公司 An intelligent video monitoring system and its monitoring method
CN101609588A (en) * 2008-06-16 2009-12-23 云南正卓信息技术有限公司 Full-automatic anti-intrusion intelligent video monitoring alarm system for unattended villa
CN101635835A (en) * 2008-07-25 2010-01-27 深圳市信义科技有限公司 Intelligent video monitoring method and system thereof
CN106454250A (en) * 2016-11-02 2017-02-22 北京弘恒科技有限公司 Intelligent recognition and early warning processing information platform
CN111540152A (en) * 2020-04-20 2020-08-14 张杜平 Intelligent security early warning system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123721A (en) * 2007-09-30 2008-02-13 湖北东润科技有限公司 An intelligent video monitoring system and its monitoring method
CN101609588A (en) * 2008-06-16 2009-12-23 云南正卓信息技术有限公司 Full-automatic anti-intrusion intelligent video monitoring alarm system for unattended villa
CN101635835A (en) * 2008-07-25 2010-01-27 深圳市信义科技有限公司 Intelligent video monitoring method and system thereof
CN106454250A (en) * 2016-11-02 2017-02-22 北京弘恒科技有限公司 Intelligent recognition and early warning processing information platform
CN111540152A (en) * 2020-04-20 2020-08-14 张杜平 Intelligent security early warning system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
侯文: ""地铁智能视频分析综合解决方案"", 《智能建筑与城市信息》, no. 10, 31 October 2013 (2013-10-31), pages 83 - 88 *
徐农: ""智能视频监控系统的分析与设计"", 《中国优秀硕士学位论文全文数据库信息科技辑》, no. 03, 15 March 2013 (2013-03-15), pages 12 *
纪文莉 等: ""智能视频分析技术在城市轨道交通中的应用研究"", 《城市轨道交通研究》, 31 December 2011 (2011-12-31), pages 39 - 43 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113284274A (en) * 2021-05-12 2021-08-20 亚萨合莱(广州)智能科技有限公司 Trailing identification method and computer readable storage medium
CN113823060A (en) * 2021-06-22 2021-12-21 复旦大学附属肿瘤医院 Intelligent early warning method and device for personnel behaviors
CN114611925A (en) * 2022-03-11 2022-06-10 杭州园钉科技有限公司 Wisdom garden management platform based on thing networking
CN117557949A (en) * 2023-04-12 2024-02-13 无锡八英里电子科技有限公司 Escalator safety device based on image recognition edge calculation
CN116434346A (en) * 2023-06-12 2023-07-14 四川汉唐云分布式存储技术有限公司 Method and device for detecting customer behaviors in unattended store and storage medium
CN116434346B (en) * 2023-06-12 2023-08-18 四川汉唐云分布式存储技术有限公司 Method and device for detecting customer behaviors in unattended store and storage medium
CN117041502A (en) * 2023-10-10 2023-11-10 湖南睿图智能科技有限公司 Dangerous scene analysis and monitoring system and method based on machine vision
CN117041502B (en) * 2023-10-10 2023-12-08 湖南睿图智能科技有限公司 Dangerous scene analysis and monitoring system and method based on machine vision

Similar Documents

Publication Publication Date Title
CN112257494A (en) Behavior recognition method based on intelligent video analysis technology and application
CN103108159B (en) Electric power intelligent video analyzing and monitoring system and method
US7428314B2 (en) Monitoring an environment
CN106454250A (en) Intelligent recognition and early warning processing information platform
US7876351B2 (en) Methods and systems for alerting by weighing data based on the source, time received, and frequency received
CN103384321B (en) The system and method for rear event/alert analysis in CCTV and Integrative security system
US8107680B2 (en) Monitoring an environment
JP2022527661A (en) Monitoring system
KR101215948B1 (en) Image information masking method of monitoring system based on face recognition and body information
CN102622818B (en) All-directional intelligent monitoring method for bank ATMs
KR101036947B1 (en) The automatic guard system to prevent the crime and accident using computer video image analysis technology
KR20060031832A (en) A smart visual security system based on real-time behavior analysis and situation cognizance
EP3401844A1 (en) Interference engine for video analytics metadata-based event detection and forensic search
Alshammari et al. Intelligent multi-camera video surveillance system for smart city applications
CN101610396A (en) Intellective video monitoring device module and system and method for supervising thereof with secret protection
WO2009152766A1 (en) Embedded computer vision warning device for monitoring the flow of passengers on escalator
CN112488483A (en) AI technology-based EHS transparent management system and management method
CN109389794A (en) A kind of Intellectualized Video Monitoring method and system
CN201974677U (en) Port restricted area safety monitoring system
CN102479419A (en) Automatic early warning development system and method thereof
CN112532920A (en) Construction site system intelligent monitoring implementation method and system
CN114446004A (en) Security protection system
CN203327163U (en) Monitoring system
CN115660297A (en) Automatic AI early warning system and method for construction site safety
CN104469299A (en) Network camera shooting device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination