CN112288975A - Event early warning method and device - Google Patents

Event early warning method and device Download PDF

Info

Publication number
CN112288975A
CN112288975A CN202011271311.3A CN202011271311A CN112288975A CN 112288975 A CN112288975 A CN 112288975A CN 202011271311 A CN202011271311 A CN 202011271311A CN 112288975 A CN112288975 A CN 112288975A
Authority
CN
China
Prior art keywords
intrusion
determining
early warning
monitoring
monitoring data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011271311.3A
Other languages
Chinese (zh)
Inventor
邓练兵
李大铭
余大勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Dahengqin Technology Development Co Ltd
Original Assignee
Zhuhai Dahengqin Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Dahengqin Technology Development Co Ltd filed Critical Zhuhai Dahengqin Technology Development Co Ltd
Priority to CN202011271311.3A priority Critical patent/CN112288975A/en
Publication of CN112288975A publication Critical patent/CN112288975A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources

Abstract

The embodiment of the invention provides an event early warning method and device, wherein the method comprises the following steps: acquiring a collected monitoring data set aiming at an electronic purse net area; judging whether an intrusion event aiming at a target area in the electronic purse net area is triggered or not according to the monitoring data set; when the intrusion event is judged to be triggered, determining an intrusion object; determining the object type of the invading object; acquiring real-time position information of the intrusion object, and determining safety level information corresponding to the real-time position information; and according to the object type and the safety level information, early warning aiming at the invading object is carried out. By the embodiment of the invention, whether the target area has the invasion event or not is automatically monitored, the early warning is automatically sent out when the invasion is detected, security personnel are timely informed, and the safety of the target area is improved.

Description

Event early warning method and device
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to an event early warning method and device.
Background
The monitoring technology is widely applied to monitoring key areas, and plays an important role in guaranteeing the safety of the key areas.
In order to timely find illegal intrusion in key areas, in the prior art, generally, when monitoring key areas, monitoring data collected by monitoring equipment is displayed in monitoring display equipment on a background, and then security personnel monitor monitoring pictures to find illegal intrusion of an intrusion object, but the monitoring mode needs to invest a large amount of security personnel to monitor the monitoring pictures for a long time, and because the energy of people is limited, the security personnel monitor the monitoring pictures, and the situation that the safety of the areas is affected because the illegal intrusion is not timely found may occur.
Disclosure of Invention
In view of the above problems, it is proposed to provide a monitoring and early warning method and apparatus, a server, and a storage medium, which overcome the above problems or at least partially solve the above problems, and include:
a method of event early warning, the method comprising:
acquiring a collected monitoring data set aiming at an electronic purse net area;
judging whether an intrusion event aiming at a target area in the electronic purse net area is triggered or not according to the monitoring data set;
when the intrusion event is judged to be triggered, determining an intrusion object;
determining the object type of the invading object;
acquiring real-time position information of the intrusion object, and determining safety level information corresponding to the real-time position information;
and according to the object type and the safety level information, early warning aiming at the invading object is carried out.
Optionally, the performing, according to the object type and the security level information, an early warning for the intrusion object includes:
determining an early warning mode according to the object type and the safety level information;
and according to the early warning mode, early warning aiming at the intrusion object is carried out.
Optionally, the determining an object type of the intrusion object includes:
extracting characteristic information of the intrusion object;
and determining the object type of the intrusion object according to the characteristic information.
Optionally, the monitoring data set includes monitoring data collected by a plurality of monitoring devices, and the determining, according to the monitoring data set, whether to trigger an intrusion event for a target area in the electronic purse net area includes:
respectively determining an analysis result corresponding to the monitoring data acquired by each monitoring device;
and when detecting that the analysis results corresponding to the monitoring data acquired by at least two monitoring devices are abnormal, judging to trigger an intrusion event aiming at a target area in the electronic purse net area.
Optionally, the plurality of monitoring devices comprises:
radar monitoring equipment, camera monitoring equipment and photoelectric monitoring equipment.
Optionally, after determining the real-time location information of the intrusion object, the method further includes:
determining an object icon corresponding to the object type;
and acquiring the map data of the target area, displaying the map data in display equipment, and displaying the object icon in the area corresponding to the real-time position information.
Optionally, the method further comprises:
and when the intrusion event is judged to be triggered, generating an intrusion prompt message and displaying the intrusion prompt message.
An apparatus for event early warning, the apparatus comprising:
the acquisition module is used for acquiring the acquired monitoring data set aiming at the electronic purse net area;
the judging module is used for judging whether to trigger an intrusion event aiming at a target area in the electronic purse net area or not according to the monitoring data set;
the intrusion object determining module is used for determining an intrusion object when the intrusion event is judged to be triggered;
the object type determining module is used for determining the object type of the invading object;
the safety level information determining module is used for acquiring the real-time position information of the invading object and determining the safety level information corresponding to the real-time position information;
and the early warning module is used for carrying out early warning aiming at the invading object according to the object type and the safety level information.
A server comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, the computer program when executed by the processor implementing the method of event early warning as claimed in any one of the preceding claims.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of event early warning as set forth in any one of the preceding claims.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, whether an intrusion event aiming at a target area in an electronic purse net area is triggered is judged by acquiring a collected monitoring data set aiming at the electronic purse net area and according to the monitoring data set; when judging that an intrusion event is triggered, determining an intrusion object and determining the object type of the intrusion object; then, acquiring real-time position information of the invading object and determining safety level information corresponding to the real-time position information; and then, early warning for the invading object is carried out according to the object type and the safety level information, so that whether the invading event happens in the target area is automatically monitored, early warning is automatically sent out when the invasion is detected, security personnel are informed in time, and the safety of the target area is improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart illustrating steps of a method for event early warning according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating steps of another method for event early warning according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an event early warning apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart illustrating steps of a method for event early warning according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 101, acquiring a collected monitoring data set aiming at an electronic purse net area;
the electronic purse net area can refer to an area provided with an electronic purse net, and the electronic purse net can be a real purse net or a virtual purse net.
As an example, a monitoring data set may refer to a set of monitoring data collected by a variety of monitoring devices that may be used to monitor an electronic purse net area.
In practical applications, in order to monitor the electronic purse net area, a plurality of monitoring devices may be arranged in the electronic purse net area in advance.
Specifically, the monitoring device can be arranged in the electronic purse net area based on the monitoring range of the monitoring device, and the monitoring range of the monitoring device can cover the electronic purse net area so as to monitor the electronic purse net area.
In practical application, the monitoring device may send the collected monitoring data set to a display device of a background of the monitoring system for display, so that security personnel may monitor the electronic fence area according to the displayed monitoring data set, and since the energy of the person is limited and the vision of the person is limited in a dark environment, the display device is monitored only by the security personnel, and it may not be possible to find the intrusion of the suspicious object into the electronic fence area in time, in the embodiment of the present invention, the monitoring system may first obtain the monitoring data set collected by the monitoring device and directed to the electronic fence area, and then perform steps 102 to 106, so as to automatically monitor the electronic fence area, determine whether the electronic fence area has an intrusion event, and perform early warning for the intrusion object when the intrusion event occurs.
Specifically, the monitoring system may obtain, in real time, a monitoring data set for the electronic purse net area, which is collected by the monitoring device, or may obtain only a monitoring data set formed by a part of the monitoring data collected by the monitoring device.
As an example, in order to trace back the historical monitoring situation of the electronic purse net area, after receiving the monitoring data set collected by the monitoring device, the monitoring system may store the monitoring data set in a preset monitoring data set library.
Step 102, judging whether an intrusion event aiming at a target area in the electronic purse net area is triggered or not according to the monitoring data set;
the target area may refer to an area to be monitored in the electronic fence area, where an intrusion event occurs, such as a defense area and a data storage area.
In practical applications, the electronic fence area may include a plurality of different areas, such as: therefore, areas prohibited from entering or prohibited from entering randomly, that is, areas needing to monitor whether an intrusion event occurs, in the electronic purse network area, may be used as target areas, for example: areas for holding important documents, areas for holding property, etc.
As an example, the monitoring data set may include the following monitoring data: image monitoring data, radar monitoring data, photoelectric monitoring data, and the like.
As an example, an intrusion event may refer to an event in which a suspicious object traverses an electronic purse of a target area and intrudes into the target area.
In practical application, a plurality of suspicious objects may exist in the electronic purse net area, and therefore, when monitoring is performed on the electronic purse net area, the monitoring device may also generate a monitoring data set based on the suspicious objects, and the monitoring data set generated based on the suspicious objects that trigger the intrusion event is different from the monitoring data set generated based on the suspicious objects that do not trigger the intrusion event, so that the monitoring data set may be identified to determine whether the monitoring data set is generated based on the suspicious objects that trigger the intrusion event or based on the suspicious objects that do not trigger the intrusion event, thereby determining whether the intrusion event occurs in the target area.
Specifically, a triggered monitoring data set generated based on a suspicious object that triggers an intrusion event and a non-triggered monitoring data set generated based on a suspicious object that does not trigger the intrusion event may be preset, so that when it is determined whether an intrusion event for a target area in an electronic purse net area is triggered, the determination may be performed according to the preset triggered monitoring data set and the non-triggered monitoring data set.
As an example, when the monitoring data set includes image monitoring data, the monitoring system may identify the image monitoring data, such as: the image monitoring data can be converted into image information, and then the image information is identified to identify whether suspicious objects in the image invade a target area in the electronic purse net area, so that whether the target area is invaded or not is judged.
As another example, when the monitoring data set includes radar monitoring data, a target track may be obtained by correlating measurement sets obtained through multiple scanning cycles, and then whether a suspicious object invades a target area in the electronic fence area is determined according to the target track, so as to determine whether an invasion event occurs in the target area.
As another example, when the monitoring data set includes photoelectric monitoring data, the position of the suspicious object may be determined directly according to data collected by a light sensor for tracking the target object and positioning coordinates, and then it is determined whether the position of the suspicious object invades a target area in the electronic fence area according to the position of the suspicious object, so as to determine whether an invasion event occurs in the target area.
In an embodiment of the present invention, a tripwire rule may be set in advance in the target area, where the tripwire rule may refer to setting one or more virtual wires in the target area, and when it is detected that a suspicious object passes through the tripwire, the monitoring system may determine to trigger an intrusion event.
103, determining an intrusion object when the intrusion event is judged to be triggered;
wherein an intrusion object may refer to a suspicious object that triggers an intrusion event within a target area.
In practical applications, a plurality of suspicious objects may appear in the target area, but not all suspicious objects trigger the intrusion event, at this time, the suspicious object that triggered the intrusion event may be determined from the plurality of suspicious objects, and the suspicious object is taken as an intrusion object, for example: there are 5 persons A, B, C, D and E in the target area, where A, B, C and E did not trigger an intrusion event, only D triggered an intrusion event, at which time D can be determined to be an intrusion object.
Specifically, when the monitoring system identifies the monitoring data set, it may respectively determine each suspicious object acquired by the monitoring data set, and use the suspicious object that triggers the intrusion event as the intrusion object, for example: a determination may be made separately for each suspect object's monitored data set to determine whether it is a monitored data set generated based on a suspect object that triggered an intrusion event or a monitored data set generated based on a suspect object that did not trigger an intrusion event.
As an example, when multiple intrusion objects are present, the monitoring system may number each intrusion object separately to distinguish.
Step 104, determining the object type of the intrusion object;
the object types may include, among others, people, animals, vehicles, boats, drones, and the like.
In practical application, the early warning with different degrees and forms can be performed for different object types, so that the object type of the invading object can be determined first, so as to perform corresponding early warning, for example: when the object type is a person, the warning light can flash in the background monitoring equipment, and when the object type is a vehicle, a voice prompt and the like can be played in the background monitoring equipment, and of course, a specific person or a license plate number and the like can also be determined.
After the intrusion object is determined, the monitoring system can determine the object type of the intrusion object according to the monitoring data set so as to perform early warning on the intrusion object of different object types.
As an example, when the monitoring device generates monitoring data sets for different intrusion objects, the generated monitoring data sets are different, and therefore, when the object type of the intrusion object needs to be determined, the monitoring system may preset a corresponding relationship between an object type and the monitoring data set, and then may query and determine the object type of the intrusion object from the corresponding relationship between the object type and the monitoring data set according to the monitoring data set collected by the monitoring device, where the corresponding relationship may be a linear corresponding relationship or other corresponding relationships.
In an embodiment of the present invention, step 104 may include the following steps:
extracting characteristic information of the intrusion object; and determining the object type of the intrusion object according to the characteristic information.
After the intrusion object is determined, the feature information of the intrusion object can be extracted, and then the object type of the intrusion object is determined according to the feature information.
Specifically, target characteristic information corresponding to different object types may be preset, and each object type may correspond to one or more target characteristic information.
After the intrusion object is determined, the monitoring system may extract the feature information of the intrusion object, match the feature information with the target feature information, and further determine the object type corresponding to the matched target feature information, thereby determining the object type of the intrusion object.
In an embodiment of the present invention, the target feature information may be generated according to historical data or a summary expert knowledge base, and the target feature information may be a face feature, a gait feature, a motion feature, a rate feature, or the like.
105, acquiring real-time position information of the intrusion object, and determining safety level information corresponding to the real-time position information;
in practical applications, in an electronic fence area, security levels of different areas are also different, and the pre-warning required for the different security levels may also be different, for example: the safety level of the common area is low, the early warning needed can be common early warning such as text prompt, flashing warning lamps and the like, the safety level of the key area is high, and the early warning needed can be early warning with emphasis on reminding such as playing voice prompt, triggering monitoring equipment to track and the like.
After the object type of the invading object is determined, the monitoring system can acquire the real-time position information of the invading object according to the monitoring data set, then determine the current target area of the invading object according to the real-time position information of the invading object, then acquire the security level information corresponding to the target area, and further determine the security level information corresponding to the real-time position information.
Specifically, the monitoring system may determine real-time location information of the intrusion object according to the monitoring data set.
As an example, when the monitoring data set includes image monitoring data, the monitoring system may determine real-time location information of the intruding object by performing image recognition on the image monitoring data.
As another example, when the monitoring data set includes radar monitoring data, a target track may be obtained by correlating the measurement sets obtained by the multi-turn scanning, and then determining real-time location information of the intruding object according to the target track.
As yet another example, when the monitoring data set includes photoelectric monitoring data, real-time location information of the intruding object may be determined directly from data collected by optical sensors for target tracking and coordinate positioning.
After the real-time position information is determined, the monitoring system can determine the safety level information corresponding to the current position of the intrusion object according to the real-time position information of the intrusion object.
Specifically, a corresponding relationship between the target area and the security level information may be preset, and the corresponding relationship may be a linear corresponding relationship or other corresponding relationships.
As another example, the target area associated with the security level information may also be preset by the security personnel, for example, the security personnel first performs a selection operation in the display device to determine the security level information to be set, and then checks one or more target areas associated with the security level information.
In an embodiment of the present invention, different security level information may be further classified for different positions in the target area, for example, the electronic purse net position of the target area may be set to a primary security level, the core position of the target area may be set to a secondary security level, and the level of the secondary security level is higher than the primary security level.
In an embodiment of the present invention, after determining the real-time location information of the intrusion object, the method may further include the following steps:
determining an object icon corresponding to the object type; and acquiring the map data of the target area, displaying the map data in display equipment, and displaying the object icon in the area corresponding to the real-time position information.
The display device may refer to a background monitoring display device of the monitoring system, or may refer to a mobile display device.
In practical application, in order to show the current position of the intrusion object to security personnel so that the security personnel can track and further process the intrusion object, the map data of the target area can be firstly shown in the display device, and then the intrusion object can be displayed at the corresponding position of the shown map data.
Specifically, the corresponding relationship between the object type and the object icon may be preset, for example: the object icon may be in a shape of a person when the object type is a person, in a shape of a car when the object type is a car, and in a shape of a ship when the object type is a ship. Then when the object icon of the object type needs to be determined, the monitoring system can firstly query the corresponding relation between the object type and the object icon according to the object type of the intrusion object so as to determine the object icon corresponding to the object type of the intrusion object,
after determining the object icon, the monitoring system may obtain map data of the target area, and specifically, each target area in the electronic purse net area may have corresponding map data to represent geographic information of the target area.
After obtaining the map data of the target area, the monitoring System may display the map data in the display device, where the map data may be displayed in the display device in a form of a Geographic Information plan of a GIS (Geographic Information System), then determine a corresponding position of the real-time position Information of the intrusion object in the map data, and display an object icon of the intrusion object at the corresponding position. For example: and displaying an object icon corresponding to the determined intrusion object on a GIS geographic information plane graph in a flashing manner at a position corresponding to the real-time position information.
As an example, a real-time monitoring screen including an intrusion object may also be automatically popped up in the display device.
As an example, the whole monitoring screen may be displayed in the display device, then after the intrusion object is determined, the monitoring system automatically adjusts the identification frame to be consistent with the size of the intrusion object, so as to ensure that the size of the identification frame can exactly and completely display the intrusion object, then displays the identification frame with the image data of the intrusion object in the display device, and stores the image data in the identification frame.
As another example, an adjustment operation may also be performed in the display device by a security person according to the monitoring screen to adjust the size of the identification frame.
In an embodiment of the present invention, a color of the target area may be set in advance, and when it is necessary to display the map data of the target area in the display device, the map data may be displayed in the display device in the color so as to be distinguishable from other areas other than the target area.
And 106, performing early warning aiming at the intrusion object according to the object type and the safety level information.
After the object type and the safety level information are determined, in order to prompt that an intrusion event occurs in the target area of the security personnel, the monitoring system can perform early warning according to the object type and the safety level information so as to prompt that the intrusion event occurs in the target area of the security personnel.
In an embodiment of the present invention, step 106 may include the following steps:
determining an early warning mode according to the object type and the safety level information; and according to the early warning mode, early warning aiming at the intrusion object is carried out.
The early warning mode can comprise one or more of the following modes: flashing a warning lamp, playing a voice prompt, displaying a text prompt, popping up a prompt window, playing a warning video, triggering monitoring equipment to track and monitor and the like.
After the object type and the safety level information are determined, a corresponding early warning mode can be determined according to the object type and the safety level information.
Specifically, the corresponding relationship between the object type and the security level information and the early warning mode may be preset, after the object type of the intrusion object and the security level information corresponding to the real-time location information are determined, the monitoring system may determine the early warning mode to be performed by querying the preset corresponding relationship between the object type and the security level information and the early warning mode, and then perform early warning for the intrusion object according to the early warning mode, for example: when the object type of the invading object is determined to be a person, and the safety level information is a first-level safety level, the corresponding relation between the preset object type and the safety level information and the early warning mode is inquired, the current early warning mode is determined to be display text prompt, then a text prompt can be displayed in the display equipment, namely that the current target area is invaded by people, please process the object type as soon as possible! ".
In practical application, in order to trace the historical monitoring condition of the target area, the monitoring system can record and store the judgment process and the early warning process.
As an example, when the intrusion event is judged to be triggered, an intrusion prompting message is generated and displayed.
The intrusion prompting message can be used for prompting that an intrusion event occurs in a target area of security personnel in advance, and can be in the forms of characters, images, flashing warning lamps and the like.
In practical application, in order to prompt the security personnel that the target area has an intrusion event as early as possible, the monitoring system may generate an intrusion prompt message when determining that the target area has the intrusion event, and display the intrusion prompt message on the display device to prompt the security personnel that the target area has been intruded as early as possible, which requires attention.
In an embodiment of the present invention, after performing the early warning, security personnel may call and display the monitoring data collected by the monitoring device in the display device, and specifically, may call and view the monitoring data collected by each monitoring device in the display device, so as to verify the intrusion event, and track and process the intrusion object.
In the embodiment of the invention, whether an intrusion event aiming at a target area in an electronic purse net area is triggered is judged by acquiring a collected monitoring data set aiming at the electronic purse net area and according to the monitoring data set; when judging that an intrusion event is triggered, determining an intrusion object and determining the object type of the intrusion object; then, acquiring real-time position information of the invading object and determining safety level information corresponding to the real-time position information; and then, early warning for the invading object is carried out according to the object type and the safety level information, so that whether the invading event happens in the target area is automatically monitored, early warning is automatically sent out when the invasion is detected, security personnel are informed in time, and the safety of the target area is improved.
Referring to fig. 2, a flowchart illustrating steps of another event early warning method according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 201, acquiring a collected monitoring data set aiming at an electronic purse net area;
in practical application, the monitoring device may send the collected monitoring data set to a display device of a background of the monitoring system for display, so that security personnel may monitor the electronic fence area according to the displayed monitoring data set, and since the energy of the person is limited and the vision of the person is limited in a dark environment, the display device is monitored only by the security personnel, and it may not be possible to find the intrusion of the suspicious object into the electronic fence area in time, in the embodiment of the present invention, the monitoring system may first obtain the monitoring data set collected by the monitoring device for the electronic fence area, and then perform steps 202 to 207, so as to automatically monitor the electronic fence area, determine whether the electronic fence area has an intrusion event, and perform early warning for the intrusion object when the intrusion event occurs.
Specifically, the monitoring system may obtain, in real time, a monitoring data set for the electronic purse net area, which is collected by the monitoring device, or may obtain only a monitoring data set formed by a part of the monitoring data collected by the monitoring device.
Step 202, the monitoring data set comprises monitoring data collected by a plurality of monitoring devices, and analysis results corresponding to the monitoring data collected by each monitoring device are respectively determined;
the monitoring data set may include monitoring data collected by a plurality of monitoring devices.
In an embodiment of the present invention, the plurality of monitoring devices include: radar supervisory equipment, the supervisory equipment that makes a video recording, photoelectric monitoring equipment, every kind of supervisory equipment can gather a monitoring data, for example: the radar monitoring equipment can collect radar monitoring data, the camera monitoring equipment can collect image monitoring data, and the photoelectric monitoring equipment can collect photoelectric monitoring data.
In practical application, when whether an intrusion event occurs in a target area is judged by only monitoring data of one monitoring device, certain misjudgment may exist, and therefore, in the embodiment of the invention, the error rate can be reduced by mutually verifying the monitoring data acquired by a plurality of monitoring devices.
After the monitoring data set is obtained, the monitoring data collected by each monitoring device may be analyzed to obtain an analysis result corresponding to the monitoring data collected by each monitoring device.
As an example, target monitoring data corresponding to each monitoring device may be preset as a determination criterion for determining whether an abnormality occurs in the monitoring data, for example: when the monitoring data collected by the radar monitoring equipment is matched with the preset target monitoring data, the monitoring data collected by the radar monitoring equipment can be considered to be abnormal, at the moment, the monitoring system can generate an abnormal analysis result, and the abnormal analysis result can indicate that the radar monitoring equipment monitors that the target area has an intrusion event.
As an example, when the monitoring data collected by the monitoring device does not match the preset target monitoring data, a normal analysis result may be generated, where the normal analysis result may indicate that the monitoring device monitors that no intrusion event occurs in the target area.
Step 203, when detecting that the analysis results corresponding to the monitoring data acquired by at least two monitoring devices are abnormal, judging to trigger an intrusion event aiming at a target area in the electronic purse net area;
after the analysis result is determined, the analysis result of the monitoring data acquired by each monitoring device can be mutually verified to improve the accuracy when judging whether the target area has the intrusion event, for example, when the analysis result corresponding to the monitoring data acquired by the radar monitoring device and the analysis result corresponding to the monitoring data acquired by the camera monitoring device are abnormal, the monitoring system can judge the intrusion event triggering the target area in the electronic purse net area.
As an example, the monitoring system may first determine whether an analysis result corresponding to the monitoring data collected by each monitoring device is normal or abnormal, and when the monitoring system detects that at least two analysis results are abnormal, it may determine that an intrusion event has occurred in the target area.
As another example, it may be determined that an intrusion event occurs in the target area when all the analysis results are detected to be abnormal.
In an embodiment of the present invention, a determination threshold may also be set, and when the ratio of the number of analysis results with abnormal results to all analysis results exceeds the determination threshold, it is determined to trigger an intrusion event for a target area in an electronic purse net area, for example: the judgment threshold is 60%, the determined analysis results are 8, and if 3 analysis results are abnormal, the monitoring system can judge that the intrusion event aiming at the target area in the electronic purse net area is not triggered; when 7 analysis results are abnormal, the monitoring system can judge that an intrusion event aiming at a target area in the electronic purse net area is triggered.
Step 204, when the intrusion event is judged to be triggered, determining an intrusion object;
after determining that the intrusion event is triggered, the monitoring system may determine an intrusion object that triggers the intrusion event from a plurality of suspicious objects that appear in the target area.
Specifically, when the monitoring system identifies the monitoring data set, it may respectively determine each suspicious object acquired by the monitoring data set, and use the suspicious object that triggers the intrusion event as the intrusion object, for example: a determination may be made separately for each suspect object's monitored data set to determine whether it is a monitored data set generated based on a suspect object that triggered an intrusion event or a monitored data set generated based on a suspect object that did not trigger an intrusion event.
Step 205, determining the object type of the intrusion object;
in practical application, early warning with different degrees and forms can be performed according to different object types, so that the object type of the invading object can be determined in advance, and corresponding early warning can be performed.
After the intrusion object is determined, the monitoring system can determine the object type of the intrusion object according to the monitoring data set so as to perform early warning on the intrusion object of different object types.
As an example, feature information of the intrusion object may be extracted, and then the object type of the intrusion object may be determined according to the feature information.
Step 206, acquiring real-time position information of the intrusion object, and determining security level information corresponding to the real-time position information;
after the object type of the invading object is determined, the monitoring system can acquire the real-time position information of the invading object according to the monitoring data set, then determine the current target area of the invading object according to the real-time position information of the invading object, then acquire the security level information corresponding to the target area, and further determine the security level information corresponding to the real-time position information.
Specifically, the monitoring system may determine real-time location information of the intrusion object according to the monitoring data set.
After the real-time position information is determined, the monitoring system can determine the safety level information corresponding to the current position of the intrusion object according to the real-time position information of the intrusion object.
Specifically, a corresponding relationship between the target area and the security level information may be preset, and the corresponding relationship may be a linear corresponding relationship or other corresponding relationships.
And step 207, performing early warning aiming at the intrusion object according to the object type and the safety level information.
After the object type and the safety level information are determined, in order to prompt that an intrusion event occurs in the target area of the security personnel, the monitoring system can perform early warning according to the object type and the safety level information so as to prompt that the intrusion event occurs in the target area of the security personnel.
Specifically, the corresponding relationship between the object type and the security level information and the early warning mode may be preset, and after the object type of the intrusion object and the security level information corresponding to the real-time location information are determined, the monitoring system may determine the early warning mode to be performed by querying the preset corresponding relationship between the object type and the security level information and the early warning mode, and perform early warning for the intrusion object according to the early warning mode.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a schematic structural diagram of an event early warning apparatus provided in an embodiment of the present invention is shown, which may specifically include the following modules:
an obtaining module 301, configured to obtain a collected monitoring data set for an electronic purse net area;
a determining module 302, configured to determine whether to trigger an intrusion event for a target area in the electronic purse net area according to the monitoring data set;
an intrusion object determining module 303, configured to determine an intrusion object when it is determined that the intrusion event is triggered;
an object type determination module 304, configured to determine an object type of the intrusion object;
a security level information determining module 305, configured to obtain real-time location information of the intrusion object, and determine security level information corresponding to the real-time location information;
and the early warning module 306 is configured to perform early warning on the intrusion object according to the object type and the security level information.
In an embodiment of the present invention, the early warning module 306 includes:
the early warning mode determining submodule is used for determining an early warning mode according to the object type and the safety level information;
and the early warning mode implementation submodule is used for carrying out early warning aiming at the intrusion object according to the early warning mode.
In an embodiment of the present invention, the object type determining module 304 includes:
the characteristic information extraction submodule is used for extracting the characteristic information of the intrusion object;
and the intrusion object type determining submodule is used for determining the object type of the intrusion object according to the characteristic information.
In an embodiment of the present invention, the monitoring data set includes monitoring data collected by a plurality of monitoring devices, and the determining module 302 includes:
the analysis result determining submodule is used for respectively determining an analysis result corresponding to the monitoring data acquired by each monitoring device;
and the analysis result detection submodule is used for judging and triggering an intrusion event aiming at a target area in the electronic purse net area when detecting that the analysis results corresponding to the monitoring data acquired by at least two monitoring devices are abnormal.
In an embodiment of the present invention, the plurality of monitoring devices include:
radar monitoring equipment, camera monitoring equipment and photoelectric monitoring equipment.
In an embodiment of the present invention, the apparatus further includes:
the object icon display module is used for determining an object icon corresponding to the object type after determining the real-time position information of the invading object; and acquiring the map data of the target area, displaying the map data in display equipment, and displaying the object icon in the area corresponding to the real-time position information.
In an embodiment of the present invention, the apparatus further includes:
and the intrusion prompt message generation module is used for generating an intrusion prompt message and displaying the intrusion prompt message when the intrusion event is judged to be triggered.
In the embodiment of the invention, whether an intrusion event aiming at a target area in an electronic purse net area is triggered is judged by acquiring a collected monitoring data set aiming at the electronic purse net area and according to the monitoring data set; when judging that an intrusion event is triggered, determining an intrusion object and determining the object type of the intrusion object; then, acquiring real-time position information of the invading object and determining safety level information corresponding to the real-time position information; and then, early warning for the invading object is carried out according to the object type and the safety level information, so that whether the invading event happens in the target area is automatically monitored, early warning is automatically sent out when the invasion is detected, security personnel are informed in time, and the safety of the target area is improved.
An embodiment of the present invention further provides a server, which may include a processor, a memory, and a computer program stored in the memory and capable of running on the processor, and when the computer program is executed by the processor, the method for event early warning as above is implemented.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for event early warning as above is implemented.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method and the device for event early warning are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method of event early warning, the method comprising:
acquiring a collected monitoring data set aiming at an electronic purse net area;
judging whether an intrusion event aiming at a target area in the electronic purse net area is triggered or not according to the monitoring data set;
when the intrusion event is judged to be triggered, determining an intrusion object;
determining the object type of the invading object;
acquiring real-time position information of the intrusion object, and determining safety level information corresponding to the real-time position information;
and according to the object type and the safety level information, early warning aiming at the invading object is carried out.
2. The method of claim 1, wherein the performing the early warning for the intruding object according to the object type and the security level information comprises:
determining an early warning mode according to the object type and the safety level information;
and according to the early warning mode, early warning aiming at the intrusion object is carried out.
3. The method of claim 1, wherein determining the object type of the intrusive object comprises:
extracting characteristic information of the intrusion object;
and determining the object type of the intrusion object according to the characteristic information.
4. The method according to claim 1, 2 or 3, wherein the monitoring data set includes monitoring data collected by a plurality of monitoring devices, and the determining whether to trigger an intrusion event for a target area in the electronic purse net area according to the monitoring data set includes:
respectively determining an analysis result corresponding to the monitoring data acquired by each monitoring device;
and when detecting that the analysis results corresponding to the monitoring data acquired by at least two monitoring devices are abnormal, judging to trigger an intrusion event aiming at a target area in the electronic purse net area.
5. The method of claim 4, wherein the plurality of monitoring devices comprises:
radar monitoring equipment, camera monitoring equipment and photoelectric monitoring equipment.
6. The method of claim 1, after determining the real-time location information of the intruding object, further comprising:
determining an object icon corresponding to the object type;
and acquiring the map data of the target area, displaying the map data in display equipment, and displaying the object icon in the area corresponding to the real-time position information.
7. The method of claim 1, further comprising:
and when the intrusion event is judged to be triggered, generating an intrusion prompt message and displaying the intrusion prompt message.
8. An event early warning apparatus, comprising:
the acquisition module is used for acquiring the acquired monitoring data set aiming at the electronic purse net area;
the judging module is used for judging whether to trigger an intrusion event aiming at a target area in the electronic purse net area or not according to the monitoring data set;
the intrusion object determining module is used for determining an intrusion object when the intrusion event is judged to be triggered;
the object type determining module is used for determining the object type of the invading object;
the safety level information determining module is used for acquiring the real-time position information of the invading object and determining the safety level information corresponding to the real-time position information;
and the early warning module is used for carrying out early warning aiming at the invading object according to the object type and the safety level information.
9. A server comprising a processor, a memory, and a computer program stored on the memory and capable of running on the processor, the computer program, when executed by the processor, implementing the method of event early warning as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of event early warning according to any one of claims 1 to 7.
CN202011271311.3A 2020-11-13 2020-11-13 Event early warning method and device Pending CN112288975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011271311.3A CN112288975A (en) 2020-11-13 2020-11-13 Event early warning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011271311.3A CN112288975A (en) 2020-11-13 2020-11-13 Event early warning method and device

Publications (1)

Publication Number Publication Date
CN112288975A true CN112288975A (en) 2021-01-29

Family

ID=74398924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011271311.3A Pending CN112288975A (en) 2020-11-13 2020-11-13 Event early warning method and device

Country Status (1)

Country Link
CN (1) CN112288975A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113223087A (en) * 2021-07-08 2021-08-06 武大吉奥信息技术有限公司 Target object geographic coordinate positioning method and device based on video monitoring
CN113240871A (en) * 2021-05-21 2021-08-10 浙江大华技术股份有限公司 Alarm method, alarm device, storage medium and electronic device
CN115019463A (en) * 2022-06-28 2022-09-06 慧之安信息技术股份有限公司 Water area supervision system based on artificial intelligence technology

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202373091U (en) * 2011-12-16 2012-08-08 四川久远新方向智能科技有限公司 Perimeter anti-invasion system
CN103324913A (en) * 2013-05-29 2013-09-25 长安大学 Pedestrian event detection method based on shape features and trajectory analysis
CN106157507A (en) * 2016-07-08 2016-11-23 武汉三江中电科技有限责任公司 A kind of transmission line of electricity solid preventer based on radar and video fusion
CN205854087U (en) * 2015-06-19 2017-01-04 株式会社三国 The burglary-resisting system of vehicle
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN108428315A (en) * 2018-03-05 2018-08-21 中国人民解放军军事科学院国防工程研究院 Electronic sentry system
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN109286780A (en) * 2017-07-19 2019-01-29 和硕联合科技股份有限公司 Video monitoring system and video monitoring method
CN109410496A (en) * 2018-10-25 2019-03-01 北京交通大学 Attack early warning method, apparatus and electronic equipment
EP3515065A1 (en) * 2018-01-23 2019-07-24 Canon Kabushiki Kaisha Method and system for improving construction of regions of interest
CN110490146A (en) * 2019-08-22 2019-11-22 北博(厦门)智能科技有限公司 Artificial intelligence circumference safety protection method and server-side based on deep learning

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202373091U (en) * 2011-12-16 2012-08-08 四川久远新方向智能科技有限公司 Perimeter anti-invasion system
CN103324913A (en) * 2013-05-29 2013-09-25 长安大学 Pedestrian event detection method based on shape features and trajectory analysis
CN205854087U (en) * 2015-06-19 2017-01-04 株式会社三国 The burglary-resisting system of vehicle
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN106157507A (en) * 2016-07-08 2016-11-23 武汉三江中电科技有限责任公司 A kind of transmission line of electricity solid preventer based on radar and video fusion
CN109286780A (en) * 2017-07-19 2019-01-29 和硕联合科技股份有限公司 Video monitoring system and video monitoring method
EP3515065A1 (en) * 2018-01-23 2019-07-24 Canon Kabushiki Kaisha Method and system for improving construction of regions of interest
CN108428315A (en) * 2018-03-05 2018-08-21 中国人民解放军军事科学院国防工程研究院 Electronic sentry system
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN109410496A (en) * 2018-10-25 2019-03-01 北京交通大学 Attack early warning method, apparatus and electronic equipment
CN110490146A (en) * 2019-08-22 2019-11-22 北博(厦门)智能科技有限公司 Artificial intelligence circumference safety protection method and server-side based on deep learning

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113240871A (en) * 2021-05-21 2021-08-10 浙江大华技术股份有限公司 Alarm method, alarm device, storage medium and electronic device
CN113223087A (en) * 2021-07-08 2021-08-06 武大吉奥信息技术有限公司 Target object geographic coordinate positioning method and device based on video monitoring
CN115019463A (en) * 2022-06-28 2022-09-06 慧之安信息技术股份有限公司 Water area supervision system based on artificial intelligence technology
CN115019463B (en) * 2022-06-28 2023-01-10 慧之安信息技术股份有限公司 Water area supervision system based on artificial intelligence technology

Similar Documents

Publication Publication Date Title
CN112288975A (en) Event early warning method and device
US9286778B2 (en) Method and system for security system tampering detection
CN109920191B (en) Fire alarm method, fire alarm device, computer equipment and storage medium
CN107437318B (en) Visible light intelligent recognition algorithm
KR102195706B1 (en) Method and Apparatus for Detecting Intruder
CN112382032A (en) Monitoring method and device, electronic equipment and storage medium
CN104050771B (en) The system and method for abnormality detection
Vel'as et al. Influence of changing the parameters of the camera system on video-based motion detection
KR20190035187A (en) Sound alarm broadcasting system in monitoring area
CN101163234A (en) Method of implementing pattern recognition and image monitoring using data processing device
US20150288928A1 (en) Security camera system use of object location tracking data
CN112329691A (en) Monitoring video analysis method and device, electronic equipment and storage medium
CN112329719A (en) Behavior recognition method, behavior recognition device and computer-readable storage medium
CN113484858A (en) Intrusion detection method and system
CN111797726A (en) Flame detection method and device, electronic equipment and storage medium
CN116913099A (en) Intelligent traffic real-time monitoring system
CN108010287B (en) Case and event site witness search and target association analysis method and system
CN110691222A (en) Intrusion monitoring method and system
KR101407394B1 (en) System for abandoned and stolen object detection
CN115841730A (en) Video monitoring system and abnormal event detection method
EP1405279A1 (en) Vision based method and apparatus for detecting an event requiring assistance or documentation
JP5309069B2 (en) Smoke detector
CN111126100A (en) Alarm method, alarm device, electronic equipment and storage medium
JP6954416B2 (en) Information processing equipment, information processing methods, and programs
CN115601898A (en) Cable anti-theft alarm device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210129

RJ01 Rejection of invention patent application after publication