CN112613453A - Method and system for checking violation of regulations on construction site of electric power infrastructure - Google Patents

Method and system for checking violation of regulations on construction site of electric power infrastructure Download PDF

Info

Publication number
CN112613453A
CN112613453A CN202011601489.XA CN202011601489A CN112613453A CN 112613453 A CN112613453 A CN 112613453A CN 202011601489 A CN202011601489 A CN 202011601489A CN 112613453 A CN112613453 A CN 112613453A
Authority
CN
China
Prior art keywords
sample
violation
training
hidden danger
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011601489.XA
Other languages
Chinese (zh)
Inventor
佟眀
韩鹏凯
张�廷
张利民
尹东
明志舒
史纪进
朱子剑
何勇军
娄凤强
张�成
于青涛
许志健
付振虎
王昊
苏仁恒
刘欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Shandong Electric Power Co Construction Co
State Grid Corp of China SGCC
Original Assignee
State Grid Shandong Electric Power Co Construction Co
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Shandong Electric Power Co Construction Co, State Grid Corp of China SGCC filed Critical State Grid Shandong Electric Power Co Construction Co
Priority to CN202011601489.XA priority Critical patent/CN112613453A/en
Publication of CN112613453A publication Critical patent/CN112613453A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/25Determination of region of interest [ROI] or a volume of interest [VOI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V2201/00Indexing scheme relating to image or video recognition or understanding
    • G06V2201/07Target detection

Abstract

The invention relates to a method and a system for checking violation of regulations on a construction site of electric power infrastructure, which comprises the following steps: acquiring a historical sample image and establishing a sample library; carrying out data annotation on a sample image with hidden danger in a sample library; carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification; the collected field images are input into the training model to obtain the violation type and the violation position.

Description

Method and system for checking violation of regulations on construction site of electric power infrastructure
Technical Field
The invention relates to the technical field of inspection of an electric power infrastructure construction site, in particular to a method and a system for checking violation of regulations in an electric power infrastructure construction site.
Background
The statements herein merely provide background information related to the present disclosure and may not necessarily constitute prior art.
In the operation site of the power equipment, besides the invasion of various weather conditions, the power equipment is also damaged by other external forces, such as the impact of engineering machinery on a tower, the suspension of kites and other objects on a lead to cause interphase short circuit and the like, and the safety operation of the power equipment can be threatened at any time. In order to ensure the safe operation of the power equipment, the patrol and inspection of violation of capital construction sites must be enhanced, people or objects which may threaten the power construction are foreseen, violation defects influencing the power construction and factors endangering the safe operation of the power equipment are discovered in time, and the violation operation can be stopped quickly or the remote violation early warning can be realized.
At present, a power infrastructure site mainly adopts various means such as site inspection, remote monitoring and the like to obtain a large amount of monitoring data, the related equipment is large in quantity and various in types, and each type of equipment has a lot of faults and defect types. The inventor finds that the identification and judgment of violation defects and hidden dangers mostly depend on the experience of inspection personnel, and in the process of inspecting image processing, the algorithms of intelligent image identification and automatic defect judgment are lacked, so that the automation degree of image data processing is low, the working efficiency of personnel is low, the labor intensity is high, and the requirements of modern power grid construction and development cannot be met.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides the method for checking the violation of regulations on the electric power infrastructure construction site, improves the intelligent identification efficiency and accuracy of the violation of regulations, and reduces the labor intensity of infrastructure safety management workers.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the invention provides a violation checking method for a construction site of power infrastructure, which comprises the following steps:
acquiring a historical sample image and establishing a sample library;
carrying out data annotation on a sample image with hidden danger in a sample library;
carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification;
and inputting the acquired field image into a training model to obtain the violation type and the violation position.
Further, whether the collected sample image is a sample image with hidden danger or not is judged according to the pre-obtained typical characteristics of the construction hidden danger, and data annotation is carried out on the sample image with hidden danger.
Furthermore, the record format of the annotation file is required by adopting xml in the PASCAL VOC data set format as a standard, and all objects with defects and hidden dangers in the sample image are annotated with data.
Further, after data annotation is carried out on the sample images with the hidden danger in the sample library, data annotation is carried out on the typical characteristics of the sample images with the hidden danger in the sample library according to the image characteristics of the hidden danger.
Further, in the model training and tuning process and the model training and tuning process, the sample image data is identified based on the fast-RCNN network structure, training samples and test samples are randomly selected, and the training model is constructed and tuned by utilizing a deep learning algorithm.
Further, 90% of sample images of each type of hidden danger are randomly selected to construct training samples, and the rest 10% of sample images are used as test samples to construct training models.
Furthermore, after the collected field images are input into the training model to obtain the violation type and the violation position, the images are added into the sample library to update the sample library.
In a second aspect, the invention discloses a violation investigation system for a power infrastructure construction site, which comprises
A sample library establishing module: the system is used for acquiring historical sample images and establishing a sample library;
a data labeling module: the system is used for carrying out data annotation on the sample images with hidden danger in the sample library;
a training model establishing module: the training model is used for carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification;
an identification module: and the system is used for inputting the acquired field images into the training model to obtain the violation type and the violation position.
In a third aspect, the present invention provides an electronic device comprising a memory and a processor, and computer instructions stored on the memory and executed on the processor, wherein the computer instructions, when executed by the processor, perform the steps of the method of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium for storing computer instructions which, when executed by a processor, perform the steps of the method of the first aspect.
The invention has the beneficial effects that:
according to the method, the artificial intelligent deep learning algorithm is adopted to establish the training model, various violations of the electric power infrastructure construction site can be quickly identified by the training model, the intelligent identification efficiency and accuracy of violation operation can be improved, the construction team is guided to quickly carry out safety protection, the labor intensity of infrastructure safety management workers can be reduced, the violation identification management period is shortened, and the conversion of the electric power infrastructure safety management mode to the intelligent operation inspection mode is promoted.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application.
FIG. 1 is a schematic flow chart of a method according to example 1 of the present invention;
FIG. 2 is a sample image without hidden trouble in embodiment 1 of the present invention;
FIG. 3 is a sample image with hidden danger in embodiment 1 of the present invention;
FIG. 4 is a diagram illustrating annotation of hidden danger sample image data according to embodiment 1 of the present invention;
FIG. 5 is a typical feature data annotation diagram of a hidden danger sample image according to embodiment 1 of the present invention;
FIG. 6 is a diagram illustrating a fast-RCNN network according to an embodiment 1 of the present invention;
FIG. 7 is a schematic diagram of a convolutional neural network according to embodiment 1 of the present invention;
FIG. 8 is a sample view of example 1 of the present invention;
FIG. 9 is a schematic view of the Loss curve in example 1 of the present invention;
Detailed Description
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As introduced by the background technology, most of the prior methods rely on the experience of inspection personnel in the aspects of identifying and judging violation defects and hidden dangers in the infrastructure construction site, the working efficiency of the personnel is low, the labor intensity is high, and the violation checking method for the electric power infrastructure construction site is provided by the application aiming at the problems.
In an exemplary embodiment of the present application, as shown in fig. 1, a method for troubleshooting violations at a construction site of power infrastructure includes the following steps:
step 1: and (3) analyzing hidden danger typical characteristics of the electric power infrastructure construction site in advance.
Taking construction machinery as an example, typical characteristics of construction hidden dangers are established, the covered construction machinery mainly comprises 12 marked target types such as a crane, a crane suspender, a pump truck arm, an excavator, a bulldozer, a tower crane, a pile driver rod, a rolling mill, a forklift, an excavator, a grader and the like, and the construction machinery hidden danger target has the following characteristics:
(1) the target size ratios differ: the crane boom, the pump truck arm, etc. are of the type that is elongated with an aspect ratio of less than 0.2 times when the target is placed vertically, with the aspect ratio of the crane, the pump truck, etc. vehicles being approximately 2 times closer, and with the aspect ratio of most targets being between 0.5 and 2 times.
(2) When the target is tilted, the target effective pixels in the marking box occupy 1/5 of the marking box, and most of the area is the background part.
(3) Rigidity target: all objects have sharp contours and edges and are essentially rigid objects.
Step 2: the method comprises the steps of obtaining historical sample images, establishing a sample library with high diversity, balance and quality, wherein image data is an important component for researching an artificial intelligent recognition algorithm, and in order to guarantee a good algorithm effect, the sample library with high diversity, balance and quality needs to be established. A complete and standard high-quality sample library is a premise of algorithm training, a large amount of standard and complete image data is a foundation of subsequent working data, and the following implementation steps are mainly adopted:
and screening sample data and screening out historical sample images.
Taking the transmission line as an example, the body image acquisition mainly depends on the helicopter and the unmanned aerial vehicle inspection task. The data mainly comprises picture files acquired by a visible light holder, and the resolution of the relatively visualized image is high, and is generally more than 2000 ten thousand pixels. The originally acquired picture contains a large number of non-defective images and partial defective images, and the defective images usually account for less than 1%.
The transmission channel image acquisition mainly depends on a visual monitoring shooting device deployed on a transmission line tower. The image monitoring shooting device is used as a field core device and is responsible for functions of image data acquisition, data transmission and the like, the images have the advantages of small flow occupation, high resolution and the like, the hidden danger typical characteristics of the electric power infrastructure construction field are analyzed in advance according to the step 1, the sample images are distinguished to be hidden danger sample images and hidden danger-free sample images, the hidden danger sample images are shown in a figure 2, and the hidden danger-free sample images are shown in a figure 3.
And step 3: standardizing a sample data annotation method, and carrying out data annotation on a sample image with hidden danger in a sample library;
currently, most of the algorithms based on deep learning object recognition are supervised learning, and the supervised learning is a machine learning task for deducing an object function from a labeled training data set. The larger the scale of the labeled training data set is, the stronger the diversity is, and the more accurate the labeling is, the stronger the generalization of the final training model is.
As shown in fig. 4, in order to meet the standardization of target identification, the xml in the PASCAL VOC data set format is adopted as the standard to request the recording format of the identification file, and all objects with defects and hidden dangers in the sample image are subjected to data annotation to be accurate to the target part.
In order to improve the generalization capability of the model and avoid overfitting, a large amount of training data needs to be labeled, and the diversity of sample images needs to be increased. The established sample library is to contain sample images of various scenes, weather, illumination and the like.
In the embodiment, a semi-automatic mode is adopted for data marking, namely, in the initial stage, data with set quantity of manual instruction marking are received, then the data are used for training a recognition model, and then the trained recognition model is used for recognizing the unmarked pictures to obtain marking information; and finally, receiving a manual instruction to assist in deleting a part of the error marked image. By the semi-automatic data labeling method, a large amount of manpower and material resources can be saved. And along with the gradual increase of the scale of the database, the identification precision of the trained model can be gradually improved, the identification result of the model can be directly used as the marking information at the later stage, the full-automatic data marking is realized, and the sample library of the power transmission hidden trouble sample image can be effectively expanded.
And 4, step 4: and carrying out data annotation on the image typical characteristics of the sample image with the hidden danger in the sample library.
Due to the similar appearance and shape of the objects, the objects are more, such as crane booms, pump truck arms and pile driver poles, bulldozers and excavators, and the like. When designing a network structure, the characteristics of different construction machines need to be fully considered, and data annotation of typical characteristics of the image is carried out. The typical features refer to unique features of the hidden danger target, and as shown in fig. 5, data annotation of typical features of an image is performed by taking an excavator as an example.
In the step 3 and the step 4, target labeling is carried out by using a uniform image labeling tool to form a standard xml labeling result. And the archiving storage is executed according to the specified naming and storage modes, so that the requirements of deep learning image analysis training and testing based on the convolutional neural network are met.
And 5: carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification; and constructing a training model by adopting image sample analysis based on deep learning.
The target identification method based on deep learning generally comprises two parts, wherein one part is a feature extraction network, which is generally also called a backbone network and is responsible for feature extraction of images, the network extraction is generally basic feature information, such as edge features, texture features and the like, the part is generally realized by a network structure in front of a classification layer of an image classification task, the image classification is also one of classic problems in the field of computer vision, and the most common image classification task data is an ImageNet data set and comprises 1000 images of different classes; the other part is a frame regression network, also called as an identification frame or a frame regression method, which is responsible for target positioning on the basis of image feature extraction, and the higher the identification result and the IOU of the labeled boundary frame are, the higher the positioning accuracy of the frame regression network is.
In this embodiment, the construction of the training model includes the following specific steps:
step 5.1 identifies the sample image data based on the fast-RCNN network structure.
The fast-RCNN is one of the most common models applied in the field of target recognition at present, has good effects on the aspects of target recognition accuracy, recognition speed and the like, and is an improved model from an RCNN framework step by step and belongs to the most representative model in an RCNN target recognition algorithm series. As a representative of the two-stage target detection model, the fast-RCNN achieves balance in target identification effect and calculation complexity relative to other models, and can be used as a backbone network for identifying violation and potential safety hazard in a power infrastructure construction monitoring image.
The Faster-RCNN further optimizes the network on the basis of the RCNN and the Fast-RCNN, so that the comprehensive performance is greatly improved, particularly the recognition speed is obvious, and the real-time requirement of the system can be basically met when a proper feature extraction network and parameter setting are selected. The fast-RCNN model can be largely generalized to 4 major components, including a Convolutional Neural Network (CNN) layer, a region suggestion network (RPN) layer, a region interest pooling (ropooling) layer, and a fully connected layer (Softmax).
As shown in fig. 6, the input image size of the fast-RCNN may be any size, the input image first passes through the convolutional neural network to extract a feature map of the image, and the extracted feature maps are respectively used for a subsequent RPN layer and a full link layer; the extracted feature map is used as input in an RPN layer, the RPN network is used for generating a candidate region (regionproposals) and a region score of an image, then the output of the proposals of the RPN layer and the feature map extracted by a convolutional neural network are input in Roi Pooling, regions with different sizes are normalized to a feature map with a fixed size, and finally the feature map is sent to a subsequent full-connection layer, the category of the proposals is calculated, and the final position information of an identification frame is obtained through frame regression.
The convolutional neural network structure is shown in fig. 7, and the convolutional neural network mainly comprises a convolutional layer, a pooling layer and a full-connection layer, wherein an original image enters the network from the leftmost input layer, then is continuously processed through the convolutional layer and the pooling layer, and finally is output through the full-connection layer to obtain the output of the network, and the output is generally called a feature map.
Step 5.2: and (4) carrying out model training and tuning by using a deep learning algorithm to obtain a training model for violation identification.
In this embodiment, the samples in the sample library are as shown in FIG. 8,
the method can be obtained by analyzing the characteristics of the defects and hidden danger targets such as color, shape, texture and the like in the sample library, and has the characteristics of various colors and irregular shapes, and the characteristics increase the identification difficulty. And finally completing the construction of a training and identification verification test set, wherein the sample scale is as follows: about 20 million images containing defect potential and 3 million images without defect potential.
And randomly selecting part of the images marked with defects and hidden dangers as a training set according to different scene requirements, and using the rest images as a test set. The training set and the test set, the scene without the defect hidden danger image and the scene with the defect hidden danger image are not included.
In this example, 90% of samples in each class were randomly selected to construct training samples, and the remaining 10 were used as test samples. And (3) using the classification performance of different backbone network test models, setting the initial learning rate to be 0.01, and reducing the learning rate by 0.1 every 30 epochs by adopting step-down variation. The network size is 224 × 224, the number of training iterations is 100epoch, the weights are initialized randomly, and the loss function is the classification loss and regression loss function in section 4.5.
After 100epoch training, the convergence of the model is shown in fig. 9.
As can be seen from the loss function loss variation curve in FIG. 9, the model has basically converged, the loss of the training sample and the testing sample is reduced to about 0.4, the precision is over 0.95, and a basic network structure is provided for the subsequent inspection image defect and hidden danger target identification algorithm.
In this embodiment, the method of classifying the size of the target sample image in the data set of the sample library is used to analyze the size of the target size: the small size targets are considered with the area of the labeled box smaller than 32 × 32, the large size targets are considered with the area of the labeled box larger than 96 × 96, and the medium size targets with the area between [32 × 32,96 × 96], as shown in the following table.
Target size analysis
Figure BDA0002869503290000091
Figure BDA0002869503290000101
The size and the form of each target type are different, the aspect ratio of each target type is approximately distributed in a certain range, and parameters of anchor points in network design are set according to the analyzed aspect ratio, so that a better training model is obtained.
Step 6: inputting the collected images of the construction site into a training model, obtaining the violation type and the violation position by using the training model, outputting the violation defect and hidden danger identification result, sending an alarm signal, adding the obtained images into a sample library, and updating the sample library.
The method of the embodiment can be used for rapidly identifying various violations on the electric power infrastructure construction site by utilizing the training model, can improve the intelligent identification efficiency and accuracy of violation operation, further guides a construction team to rapidly carry out safety protection, can reduce the labor intensity of infrastructure safety management workers, shortens the violation identification management period, and promotes the conversion of the electric power infrastructure safety management mode to the intelligent operation inspection mode.
Example 2:
the embodiment discloses a system for checking violations of regulations on construction site of electric power infrastructure, including:
a sample library establishing module: the system is used for acquiring historical sample images and establishing a sample library;
a data labeling module: the system is used for carrying out data annotation on the sample images with hidden danger in the sample library;
a training model establishing module: the training model is used for carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification;
an identification module: and the system is used for inputting the acquired field images into the training model to obtain the violation type and the violation position.
Example 3:
the embodiment provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the violation checking method for the electric power infrastructure construction site, which is described in the embodiment 1.
Example 4:
the embodiment provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer-readable storage medium implements the violation checking method for the electric power infrastructure construction site, which is described in the first embodiment.
The steps involved in the second to fourth embodiments correspond to the first embodiment of the method, and the detailed description thereof can be found in the relevant description of the first embodiment. The term "computer-readable storage medium" should be taken to include a single medium or multiple media containing one or more sets of instructions; it should also be understood to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by a processor and that cause the processor to perform any of the methods of the present invention.
Those skilled in the art will appreciate that the modules or steps of the present invention described above can be implemented using general purpose computer means, or alternatively, they can be implemented using program code that is executable by computing means, such that they are stored in memory means for execution by the computing means, or they are separately fabricated into individual integrated circuit modules, or multiple modules or steps of them are fabricated into a single integrated circuit module. The present invention is not limited to any specific combination of hardware and software.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, it is not intended to limit the scope of the present invention, and it should be understood by those skilled in the art that various modifications and variations can be made without inventive efforts by those skilled in the art based on the technical solution of the present invention.

Claims (10)

1. The violation troubleshooting method for the electric power infrastructure construction site is characterized by comprising the following steps of:
acquiring a historical sample image and establishing a sample library;
carrying out data annotation on a sample image with hidden danger in a sample library;
carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification;
and inputting the acquired field image into a training model to obtain the violation type and the violation position.
2. The method for troubleshooting on the violating regulations of the power infrastructure construction site as claimed in claim 1, wherein whether the collected sample image is a sample image with hidden danger or not is judged according to the pre-obtained typical characteristics of the construction hidden danger, and the sample image with hidden danger is subjected to data annotation.
3. The method for troubleshooting on-site regulations for electric power capital construction according to claim 1, characterized in that an annotation file recording format is required by using xml in a PASCAL VOC data set format as a standard, and data annotation is performed on all objects with defects and hidden dangers in the sample image.
4. The method for troubleshooting regulations on the power infrastructure construction site as claimed in claim 1, wherein after the data annotation is performed on the sample image with the hidden danger in the sample library, the data annotation is performed on the typical characteristics of the sample image with the hidden danger in the sample library according to the image characteristics of the hidden danger.
5. The method for troubleshooting on-site regulations for electric power infrastructure construction as claimed in claim 1, wherein in the model training and tuning process, the sample image data is identified based on a fast-RCNN network structure, the training samples and the test samples are randomly selected, and the training model is constructed and tuned by utilizing a deep learning algorithm.
6. The method for troubleshooting on the violations of regulations in the power infrastructure construction site as claimed in claim 5, wherein 90% of sample images of each type of hidden danger are randomly selected to construct training samples, and the remaining 10% of the sample images are used as test samples to construct training models.
7. The method for troubleshooting violations at the power infrastructure construction site as recited in claim 1, wherein the collected site images are input into the training model to obtain the violation type and the violation position, and then the images are added into the sample library to update the sample library.
8. The utility model provides a be used for electric power capital construction job site investigation system violating regulations, its characterized in that includes:
a sample library establishing module: the system is used for acquiring historical sample images and establishing a sample library;
the first data labeling module: the system is used for carrying out data annotation on the sample images with hidden danger in the sample library;
the second data annotation module: the method comprises the steps of performing data annotation on typical characteristics of sample images with hidden dangers in a sample library;
a training model establishing module: the training model is used for carrying out model training and tuning on the sample image subjected to data annotation to obtain a training model for violation identification;
an identification module: and the system is used for inputting the acquired field images into the training model to obtain the violation type and the violation position.
9. An electronic device comprising a memory and a processor and computer instructions stored on the memory and executed on the processor, wherein the computer instructions, when executed by the processor, perform the steps of any of the methods of claims 1-7.
10. A computer readable storage medium storing computer instructions which, when executed by a processor, perform the steps of the method of any one of claims 1 to 7.
CN202011601489.XA 2020-12-29 2020-12-29 Method and system for checking violation of regulations on construction site of electric power infrastructure Pending CN112613453A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011601489.XA CN112613453A (en) 2020-12-29 2020-12-29 Method and system for checking violation of regulations on construction site of electric power infrastructure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011601489.XA CN112613453A (en) 2020-12-29 2020-12-29 Method and system for checking violation of regulations on construction site of electric power infrastructure

Publications (1)

Publication Number Publication Date
CN112613453A true CN112613453A (en) 2021-04-06

Family

ID=75249078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011601489.XA Pending CN112613453A (en) 2020-12-29 2020-12-29 Method and system for checking violation of regulations on construction site of electric power infrastructure

Country Status (1)

Country Link
CN (1) CN112613453A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824859A (en) * 2021-08-17 2021-12-21 衢州光明电力投资集团有限公司赋腾科技分公司 Construction hidden danger automatic identification and alarm device violating regulations
CN115454138A (en) * 2022-10-11 2022-12-09 众芯汉创(北京)科技有限公司 Construction violation determination method and system based on unmanned aerial vehicle image recognition technology
CN116108397A (en) * 2022-12-22 2023-05-12 福建亿榕信息技术有限公司 Electric power field operation violation identification method integrating multi-mode data analysis

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180504A (en) * 2017-06-29 2017-09-19 广东电网有限责任公司佛山供电局 A kind of the image recognition early warning system and method for the anti-big machinery destruction of transmission line of electricity
CN107679495A (en) * 2017-10-09 2018-02-09 济南大学 A kind of detection method of transmission line of electricity periphery activity engineering truck
CN110598757A (en) * 2019-08-23 2019-12-20 国网山东省电力公司电力科学研究院 Detection method for hidden danger of construction machinery of power transmission line
CN110705414A (en) * 2019-09-24 2020-01-17 智洋创新科技股份有限公司 Power transmission line construction machinery hidden danger detection method based on deep learning
CN110826514A (en) * 2019-11-13 2020-02-21 国网青海省电力公司海东供电公司 Construction site violation intelligent identification method based on deep learning
CN111695493A (en) * 2020-06-10 2020-09-22 国网山东省电力公司电力科学研究院 Method and system for detecting hidden danger of power transmission line

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180504A (en) * 2017-06-29 2017-09-19 广东电网有限责任公司佛山供电局 A kind of the image recognition early warning system and method for the anti-big machinery destruction of transmission line of electricity
CN107679495A (en) * 2017-10-09 2018-02-09 济南大学 A kind of detection method of transmission line of electricity periphery activity engineering truck
CN110598757A (en) * 2019-08-23 2019-12-20 国网山东省电力公司电力科学研究院 Detection method for hidden danger of construction machinery of power transmission line
CN110705414A (en) * 2019-09-24 2020-01-17 智洋创新科技股份有限公司 Power transmission line construction machinery hidden danger detection method based on deep learning
CN110826514A (en) * 2019-11-13 2020-02-21 国网青海省电力公司海东供电公司 Construction site violation intelligent identification method based on deep learning
CN111695493A (en) * 2020-06-10 2020-09-22 国网山东省电力公司电力科学研究院 Method and system for detecting hidden danger of power transmission line

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张骥 等: "基于深度学习的输电线路外破图像识别技术", 《计算机系统应用》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824859A (en) * 2021-08-17 2021-12-21 衢州光明电力投资集团有限公司赋腾科技分公司 Construction hidden danger automatic identification and alarm device violating regulations
CN115454138A (en) * 2022-10-11 2022-12-09 众芯汉创(北京)科技有限公司 Construction violation determination method and system based on unmanned aerial vehicle image recognition technology
CN115454138B (en) * 2022-10-11 2023-04-18 众芯汉创(北京)科技有限公司 Construction violation determination method and system based on unmanned aerial vehicle image recognition technology
CN116108397A (en) * 2022-12-22 2023-05-12 福建亿榕信息技术有限公司 Electric power field operation violation identification method integrating multi-mode data analysis
CN116108397B (en) * 2022-12-22 2024-01-09 福建亿榕信息技术有限公司 Electric power field operation violation identification method integrating multi-mode data analysis

Similar Documents

Publication Publication Date Title
CN112613453A (en) Method and system for checking violation of regulations on construction site of electric power infrastructure
CN110059694B (en) Intelligent identification method for character data in complex scene of power industry
CN111784685A (en) Power transmission line defect image identification method based on cloud edge cooperative detection
CN112115927B (en) Intelligent machine room equipment identification method and system based on deep learning
CN110070008A (en) Bridge disease identification method adopting unmanned aerial vehicle image
CN112613454A (en) Electric power infrastructure construction site violation identification method and system
CN112528979B (en) Transformer substation inspection robot obstacle distinguishing method and system
CN115272204A (en) Bearing surface scratch detection method based on machine vision
CN111899219A (en) Image identification method and system for power transmission line machine patrol
CN113723626A (en) Subway line protection inspection method and device, computer equipment and storage medium
CN115578326A (en) Road disease identification method, system, equipment and storage medium
CN115223043A (en) Strawberry defect detection method and device, computer equipment and storage medium
CN114863118A (en) Self-learning identification system and method based on external hidden danger of power transmission line
CN114724140A (en) Strawberry maturity detection method and device based on YOLO V3
CN117114420B (en) Image recognition-based industrial and trade safety accident risk management and control system and method
CN110618129A (en) Automatic power grid wire clamp detection and defect identification method and device
CN111915565B (en) Method for analyzing cracks of porcelain insulator of power transmission and transformation line in real time based on YOLACT algorithm
CN113205511A (en) Electronic component batch information detection method and system based on deep neural network
CN112613560A (en) Method for identifying front opening and closing damage fault of railway bullet train head cover based on Faster R-CNN
CN111709991B (en) Railway tool detection method, system, device and storage medium
CN109325441B (en) Method for identifying insulator object of power transmission line
CN113554610A (en) Photovoltaic module operation state detection method and application device thereof
CN113361520A (en) Transmission line equipment defect detection method based on sample offset network
CN110781758A (en) Dynamic video monitoring method and device for abnormal pantograph structure
CN117274843B (en) Unmanned aerial vehicle front end defect identification method and system based on lightweight edge calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210406

RJ01 Rejection of invention patent application after publication