CN112634564A - Community safety monitoring system - Google Patents

Community safety monitoring system Download PDF

Info

Publication number
CN112634564A
CN112634564A CN202011611393.1A CN202011611393A CN112634564A CN 112634564 A CN112634564 A CN 112634564A CN 202011611393 A CN202011611393 A CN 202011611393A CN 112634564 A CN112634564 A CN 112634564A
Authority
CN
China
Prior art keywords
attack
processing module
information
module
appliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011611393.1A
Other languages
Chinese (zh)
Other versions
CN112634564B (en
Inventor
彭余勇
彭游川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Chimu Technology Co ltd
Original Assignee
Chongqing Chimu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Chimu Technology Co ltd filed Critical Chongqing Chimu Technology Co ltd
Priority to CN202011611393.1A priority Critical patent/CN112634564B/en
Publication of CN112634564A publication Critical patent/CN112634564A/en
Application granted granted Critical
Publication of CN112634564B publication Critical patent/CN112634564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/48Matching video sequences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E10/00Energy generation through renewable energy sources
    • Y02E10/70Wind energy
    • Y02E10/72Wind turbines with rotation axis in wind direction

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention relates to the technical field of video signal recording, in particular to a community safety monitoring system which comprises an acquisition module, a processing module, an alarm module and an attack prevention module, wherein the acquisition module is used for acquiring audio and video information of a community and sending the audio and video information to the processing module; when the attacking appliance is the same as the preset appliance, the processing module sends a starting signal to the attack preventing module, the attack preventing module continuously generates wind power according to the starting signal, and the action area of the attack preventing module covers the acquisition area of the acquisition module. According to the method, the information related to the attack in the community is identified, and alarming and wind power stopping are performed, so that the occurrence of the attack event in the community is reduced, and the community is safer.

Description

Community safety monitoring system
Technical Field
The invention relates to the technical field of video signal recording, in particular to a community safety monitoring system.
Background
The community is a social cell, the number of people in the community is large, the quality of the people in the community is uneven, and the community safety is related to the personal safety of a plurality of people, so the community safety problem is more and more prominent.
Aiming at the safety problem of a community, the publication number CN107547856A discloses a community safety video monitoring method, which is characterized in that a main camera is installed in the main areas of an import and export of the community and a plurality of imports and exports of floors, the imports and exports of the community are comprehensively covered by the cameras, and each floor respectively covers the floor monitoring camera; setting a community safety monitoring center, wherein the community safety monitoring center comprises a video display module and a camera calling module, and videos collected by a main camera are continuously uploaded to the community safety monitoring center and displayed in real time; and then judging whether to start the camera or the floor monitoring camera according to the video information acquired by the main camera to carry out comprehensive monitoring. The community security video monitoring method has the advantages of scientific design, strong practicability, reliable monitoring effect, high camera utilization rate and low monitoring cost.
When the video monitoring method is used, the monitoring video needs to be checked on duty to find abnormality, when the abnormality is not checked in time, the safety problem occurs, the monitoring video needs to be called afterwards to find the reason of the problem, and the hysteresis of safety monitoring is large.
Disclosure of Invention
The invention aims to provide a community safety monitoring system to solve the problem of high hysteresis of the conventional safety monitoring.
The community safety monitoring system in the scheme comprises an acquisition module, a processing module and an alarm module, the acquisition module is used for acquiring audio and video information of a community and sending the audio and video information to the processing module, and also comprises an attack prevention module, the processing module identifies attack keyword information, attack action information, attack expression information and attack appliance information in the audio and video information, the processing module matches attack keyword information with preset words, attack action information with preset actions, attack expression information with preset expressions, attack appliances with preset appliances, when the attack keyword is the same as the preset word, or the attack apparatus is the same as the preset apparatus, or the attack action information is the same as the preset action and the attack expression information is the same as the preset expression, the processing module sends an alarm signal to the alarm module, and the alarm module gives an alarm according to the alarm signal;
when the attacking appliance is the same as the preset appliance, the processing module sends a starting signal to the attack preventing module, the attack preventing module continuously generates wind power according to the starting signal, and the action area of the attack preventing module covers the acquisition area of the acquisition module.
The beneficial effect of this scheme is:
the method comprises the steps of collecting audio and video information of a community, identifying attack keyword information, attack action information, attack expression information and attack appliance information from the audio and video information, matching various information with preset information, sending an alarm signal to an alarm module by a processing module to give an alarm when the attack key information, the attack action information, the attack expression information and the attack appliance information are the same as the preset information, sending a starting signal to an attack prevention module by the processing module when the attack appliance information is the same as the preset appliance, enabling the attack prevention module to generate wind power, and alarming and processing the abnormity when the audio and video information is detected, so that safety monitoring is more timely.
Furthermore, the attack prevention module comprises a fan and a mark box, the fan is arranged below the collection module, the mark box is positioned on an air inlet of the fan, a plurality of air holes are formed in the mark box and are opposite to the side wall, mark powder is preset in the mark box, and the mark powder comprises food material powder and cosmetic powder.
The beneficial effects are that: the mark powder in the mark box is driven to be scattered when wind power is generated, the person who applies the attack can contact the mark powder and stick the smell, the subsequent smell tracking of the person who initiates the attack is facilitated, and the food material powder in the mark powder can enable the body of the person to generate stress reaction, such as sneezing, the continuity of the person attack is interrupted, the person who is attacked can leave the mark powder conveniently, and the safety of community people is guaranteed.
Further, the processing module identifies face information in the audio and video information and carries out timing, the processing module judges that an appliance hiding behavior exists when identifying an attack appliance after the timing duration is greater than a preset duration, and the processing module sends an alarm signal and a starting signal when judging that the appliance hiding behavior exists.
The beneficial effects are that: after the face information is identified, timing is carried out, and attack appliance information identified after the timing duration is greater than the preset duration is limited, so that the attack appliance is used as hidden appliance behaviors, and the attack appliance judgment is more accurate.
Further, when the appliance hiding behavior is judged, the processing module identifies a length value of an attacking appliance and judges the length value, when the length value is larger than a first threshold value, the processing module stops sending an alarm signal and a starting signal, when the length value is smaller than a second threshold value, the processing module identifies an extra article related to the attacking appliance in the audio and video information, and when the extra article is identified, the processing module stops sending the alarm signal and the starting signal.
The beneficial effects are that: the length of the attacking tool is determined and by identifying additional items associated with the attacking tool, false alarms caused by normal handling of the stick are avoided.
Further, the processing module draws a walking track according to the moving position of the face information, the processing module matches the walking tracks corresponding to any two pieces of face information, the processing module times when the walking tracks corresponding to any two pieces of face information coincide, when the timing duration is longer than the predesigned duration, the processing module matches the two pieces of face information with the preset face of the community, and when the matched face information is different from the preset face, the processing module sends an alarm signal.
The beneficial effects are that: through matching the tracks of the personnel corresponding to the face information, the following personnel can be found conveniently in advance, and whether the community personnel exist is judged when the person follows, so that misjudgment is avoided.
Further, the processing module predicts the walking destination of the person according to the walking track, and the processing module determines the preset time according to the walking track, the timing duration and the walking destination.
The beneficial effects are that: the accuracy of the determination is improved when the settings of the changes are preset.
Drawings
FIG. 1 is a schematic block diagram of a first embodiment of a community security monitoring system of the present invention;
fig. 2 is a location relationship diagram of an attack blocking module in the embodiment of the community security monitoring system of the present invention.
Detailed Description
The following is a more detailed description of the present invention by way of specific embodiments.
Reference numerals in the drawings of the specification include: the device comprises a collection module 1, a fan 2, a marking box 3, an air hole 4 and marking powder 5.
Example one
The community security monitoring system is shown in figures 1 and 2: the system comprises an acquisition module 1, a processing module, an alarm module and an attack prevention module, wherein the acquisition module 1 is used for acquiring audio and video information of a community and sending the audio and video information to the processing module, the acquisition module 1 can use an existing video recorder, and the acquisition module 1 sends the audio and video information to the processing module through a data transmission line; the processing module identifies attack keyword information, attack action information, attack expression information and attack apparatus information in the audio and video information, the identification of the keyword information is carried out through the existing software, such as clipping and mapping software, the attack action information can be identified through the existing deep learning method, the attack expression information can be identified through the existing expression identification algorithm, and the attack apparatus information is identified through the existing deep learning method; the processing module matches attack keyword information with a preset word, attack action information with a preset action, attack expression information with a preset expression, and an attack appliance with a preset appliance, when the attack keyword is the same as the preset word, the attack appliance is the same as the preset appliance, or the attack action information is the same as the preset action and the attack expression information is the same as the preset expression, the processing module sends an alarm signal to the alarm module, and the alarm module gives an alarm according to the alarm signal.
As shown in fig. 2, when it is determined that the attacking device is the same as the preset device, the processing module sends a start signal to the attack preventing module, the attack preventing module continuously generates wind power according to the start signal, and the acting area of the attack preventing module covers the collecting area of the collecting module 1; the attack prevention module comprises a fan 2 and a mark box 3, in order to prevent the action area of the attack prevention module from covering the collection area, a plurality of pairs of fans 2 and mark boxes 3 can be arranged, the fans 2 are installed on the wall below the collection module 1, the mark boxes 3 are located on the air inlet of the fans 2, the mark boxes 3 are cubic, a plurality of air holes 4 are formed in the opposite side walls of the mark boxes 3, mark powder 5 is placed in the mark boxes 3, the mark powder 5 comprises food powder and cosmetic powder, for example, pepper powder is used as the food powder, the face scattered powder with fragrance is used as the cosmetic powder, and the mark powder 5 is guaranteed to have unique smell.
The processing module identifies face information in the audio and video information and performs timing to obtain timing time, the processing module performs timing through an internal timer, the processing module judges that the appliance hiding behavior is achieved when the processing module identifies an attack appliance after the timing time is longer than preset time, and the processing module sends an alarm signal and a starting signal when the processing module judges that the appliance hiding behavior is achieved; when the appliance hiding behavior is judged, the processing module identifies the length value of the attacking appliance and judges the length value, and the length value of the attacking appliance is identified by the frame of image of the attacking appliance identified on the audio and video information; when the length value is larger than a first threshold value, the processing module stops sending the alarm signal and the starting signal, such as a longer rod-shaped object, when the length value is smaller than a second threshold value, the processing module identifies additional objects related to the attacking device in the audio-video information, such as the existence of additional objects of fruits, vegetables and the like when identifying small fruit knives, when the additional objects are identified, the processing module stops sending the alarm signal and the starting signal, and when the additional objects are not identified, the processing module sends the alarm signal and the starting signal.
The specific implementation process is as follows:
taking the security monitoring of the A community as an example, the audio and video information of the A community is collected by the collection module 1 and sent to the processing module, the processing module is enabled to identify face information, attack keyword information, attack action information, attack expression information and attack appliance information from the audio and video information, timing is carried out when the face information of the B person is identified to obtain timing duration, and when the timing duration is longer than preset duration and the attack appliance information is identified, the processing module judges that the B person has appliance hiding behavior; when identifying attack apparatus information, match attack apparatus information and predetermineeing the utensil through processing module, when attack apparatus information and predetermineeing the utensil the same, send alarm signal and to preventing attack module to the alarm module by processing module, let alarm module report to the police, simultaneously, let fan 2 blow to A community within range, and the air convection of fan 2 air intake flows mark box 3, carry mark powder 5 in the mark box 3 into the wind, let B personnel can contact mark powder 5 and the adhesion has the smell, be convenient for follow-up carry out the smell tracking to the B personnel who initiate the attack, and the edible material powder in the mark powder 5 can let B personnel health produce stress response, for example sneeze, break the continuity that B personnel attacked, be convenient for attacked personnel's departure, guarantee personnel's security.
When the appliance hiding behavior is judged, the processing module identifies the length value of the attacking appliance in the audio and video information, if the length value is larger than a first threshold value, the attacking appliance is too long, such as a long rod, a long stick and the like, and does not send an alarm signal and a starting signal; if the length value is smaller than the second threshold value, the processing module identifies additional articles related to the attack tool, such as C personnel using small knife to cut fruits or vegetables, and the like, at the moment, the alarm signal and the starting signal are not sent, otherwise, the alarm signal and the attack prevention accuracy are improved.
Meanwhile, the processing module is used for matching attack keywords with preset words, matching attack action information with the preset actions, and matching attack expression information with the preset expressions, wherein the attack keywords can be killing, death, beating and the like, the attack actions can be fanning, kicking, boxing and the like when an attacker attacks, the attack expression information can be teeth biting, tooth cutting and the like, and when the attack keywords are the same as the preset words, or the attack action information is the same as the preset actions and the attack expression information is the same as the preset expressions, the processing module sends an alarm signal to the alarm module and sends starting to the attack blocking module. By identifying information related to attacks in the community, alarming and wind power stopping are carried out, the occurrence of attack events in the community is reduced, and the community is safer.
Example two
The difference from the first embodiment is that the processing module draws a walking track according to the moving position of the face information, the walking track can be drawn according to the pixel points of the face information on the audio/video information, the processing module matches the walking tracks corresponding to any two pieces of face information, namely, whether the pixel points matching the two pieces of face information are overlapped or not, whether the overlapped parts are identical or not is not each footprint, and the overlapped parts are the same in the approximate direction, the processing module performs timing when the walking tracks corresponding to any two pieces of face information are overlapped to obtain timing duration, the processing module performs timing by using an internal clock, when the timing duration is greater than the predesigned duration, the processing module matches the two pieces of face information with the preset face of the community, whether the person matching the two walking tracks are the same owner of the community or not is determined, and when the matched face information is different from the preset, the processing module sends an alarm signal to enable the alarm module to alarm according to the alarm signal; the processing module predicts the walking destination of the person according to the walking track, for example, the processing module determines the walking destination according to the direction of the walking track and by using landmark destinations such as supermarkets, communities and banks on the audio-video information, the processing module determines the preset time according to the mileage, the timing time and the walking destination of the walking track, for example, the mileage is divided by the timing time to obtain the walking speed, then the distance between the processing module and the walking destination is divided by the walking speed to obtain the target time required to walk, and two thirds of the target time is used as the preset time.
When discerning face information, draw every personnel's walking orbit to match each personnel's walking orbit, timing when two arbitrary personnel's walking orbits coincide, if the timing length is greater than when presetting, then whether match two personnel and be the personnel in this community, let alarm module report to the police when this community personnel of non-, let the community personnel more alert, warn non-community personnel simultaneously and do not need the trailing attack. In the process, the walking destinations of the personnel are judged in advance, and false alarm or no alarm caused by different destinations is avoided when the presettings are determined according to the information of each party.
The foregoing is merely an example of the present invention and common general knowledge of known specific structures and features of the embodiments is not described herein in any greater detail. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (6)

1. The utility model provides a community safety monitoring system, includes collection module, processing module and alarm module, collection module is used for gathering audio frequency and video information transmission of community and sends processing module, its characterized in that: the processing module is used for identifying attack keyword information, attack action information, attack expression information and attack appliance information in the audio and video information, matching the attack keyword information with a preset word, matching the attack action information with a preset action, matching the attack expression information with a preset expression, matching the attack appliance with the preset appliance, and sending an alarm signal to the alarm module when the attack keyword is the same as the preset word, or the attack appliance is the same as the preset appliance, or the attack action information is the same as the preset action and the attack expression information is the same as the preset expression, wherein the alarm module gives an alarm according to the alarm signal;
when the attacking appliance is the same as the preset appliance, the processing module sends a starting signal to the attack preventing module, the attack preventing module continuously generates wind power according to the starting signal, and the action area of the attack preventing module covers the acquisition area of the acquisition module.
2. The community security monitoring system of claim 1, wherein: the attack prevention module comprises a fan and a mark box, the fan is arranged below the collection module, the mark box is positioned on an air inlet of the fan, a plurality of air holes are formed in the mark box, the air holes are formed in the side wall of the mark box, the mark box is internally provided with mark powder in advance, and the mark powder comprises food material powder and cosmetic powder.
3. The community security monitoring system of claim 1, wherein: the processing module identifies face information in the audio and video information and carries out timing, the processing module judges that an appliance hiding behavior exists when identifying an attack appliance after the timing duration is greater than the preset duration, and the processing module sends an alarm signal and a starting signal when judging that the appliance hiding behavior exists.
4. The community security monitoring system of claim 3, wherein: when the appliance hiding behavior is judged, the processing module identifies the length value of the attacking appliance and judges the length value, when the length value is larger than a first threshold value, the processing module stops sending the alarm signal and the starting signal, when the length value is smaller than a second threshold value, the processing module identifies an extra article related to the attacking appliance in the audio and video information, and when the extra article is identified, the processing module stops sending the alarm signal and the starting signal.
5. The community security monitoring system of claim 3, wherein: the processing module draws a walking track according to the moving position of the face information, the processing module matches the walking tracks corresponding to any two face information, the processing module times when the walking tracks corresponding to any two face information coincide, when the timing duration is greater than the pre-design duration, the processing module matches the two face information with the preset face of the community, and when the matched face information is different from the preset face, the processing module sends an alarm signal.
6. The community security monitoring system of claim 5, wherein: the processing module predicts the walking destination of the personnel according to the walking track, and the processing module determines the preset time according to the walking track, the timing duration and the walking destination.
CN202011611393.1A 2020-12-30 2020-12-30 Community safety monitoring system Active CN112634564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011611393.1A CN112634564B (en) 2020-12-30 2020-12-30 Community safety monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011611393.1A CN112634564B (en) 2020-12-30 2020-12-30 Community safety monitoring system

Publications (2)

Publication Number Publication Date
CN112634564A true CN112634564A (en) 2021-04-09
CN112634564B CN112634564B (en) 2022-09-06

Family

ID=75286680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011611393.1A Active CN112634564B (en) 2020-12-30 2020-12-30 Community safety monitoring system

Country Status (1)

Country Link
CN (1) CN112634564B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114445990A (en) * 2021-12-24 2022-05-06 珠海华发新科技投资控股有限公司 Monitoring video access system for cell

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201314005A (en) * 2011-09-21 2013-04-01 jin-he Qiu Improved structure of surveillance system
CN106530633A (en) * 2016-09-28 2017-03-22 中国人民解放军国防科学技术大学 Intelligent in-event disposal-based security protection method and system
CN106683329A (en) * 2017-01-19 2017-05-17 浙江科技学院 Site disposal robot for coping safety risk accidents in plane zone scale
CN109584907A (en) * 2018-11-29 2019-04-05 北京奇虎科技有限公司 A kind of method and apparatus of abnormal alarm
CN110443987A (en) * 2019-07-01 2019-11-12 四川鼎鸿物联网科技有限公司 Police end alert acquisition methods and system based on driver and conductor's words and deeds early warning system
CN110580799A (en) * 2019-06-19 2019-12-17 四川鼎鸿物联网科技有限公司 taxi network taxi appointment driver and passenger speaking automatic pre-judgment alarm system
CN111612675A (en) * 2020-05-18 2020-09-01 浙江宇视科技有限公司 Method, device and equipment for determining peer objects and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201314005A (en) * 2011-09-21 2013-04-01 jin-he Qiu Improved structure of surveillance system
CN106530633A (en) * 2016-09-28 2017-03-22 中国人民解放军国防科学技术大学 Intelligent in-event disposal-based security protection method and system
CN106683329A (en) * 2017-01-19 2017-05-17 浙江科技学院 Site disposal robot for coping safety risk accidents in plane zone scale
CN109584907A (en) * 2018-11-29 2019-04-05 北京奇虎科技有限公司 A kind of method and apparatus of abnormal alarm
CN110580799A (en) * 2019-06-19 2019-12-17 四川鼎鸿物联网科技有限公司 taxi network taxi appointment driver and passenger speaking automatic pre-judgment alarm system
CN110443987A (en) * 2019-07-01 2019-11-12 四川鼎鸿物联网科技有限公司 Police end alert acquisition methods and system based on driver and conductor's words and deeds early warning system
CN111612675A (en) * 2020-05-18 2020-09-01 浙江宇视科技有限公司 Method, device and equipment for determining peer objects and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114445990A (en) * 2021-12-24 2022-05-06 珠海华发新科技投资控股有限公司 Monitoring video access system for cell

Also Published As

Publication number Publication date
CN112634564B (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN112114995B (en) Terminal abnormality analysis method, device, equipment and storage medium based on process
DE60215049D1 (en) MONITORING SYSTEM WITH SUSTAINABLE BEHAVIOR DETECTION
US10635908B2 (en) Image processing system and image processing method
JP2002501711A (en) How to monitor a given monitoring range
CN105427518B (en) A kind of dangerous decision system of digitization and method
Salehi et al. An automatic video-based drowning detection system for swimming pools using active contours
CN112634564B (en) Community safety monitoring system
CN109558785A (en) Safety defense monitoring system and the unmanned convenience store for applying it
CN105303583A (en) Pet behavior detection system based on image change
WO2014101220A1 (en) Intelligent security system based on facial recognition
CN114235050A (en) Marine environment monitoring and early warning method, device and system
CN116994389A (en) Monitoring alarm driving system and method based on artificial intelligence and image recognition
CN103971477A (en) Anti-theft system based on pattern recognition technology
CN205847453U (en) A kind of wisdom gold eyeball people based on intelligent video technology and the Activity recognition system of thing
CN115019463B (en) Water area supervision system based on artificial intelligence technology
CN116778657A (en) Method and system for intelligently identifying intrusion behavior
CN106022306A (en) Video system for identifying abnormal behaviors of object based on multiple angles
Narayanaswami et al. Sensor fusion and feature-based human/animal classification for unattended ground sensors
CN109639669A (en) Ant colony clustering intrusion detection method based on transduction support vector machines
Ntalampiras Audio surveillance
CN109934099A (en) Reminding method and device, storage medium, the electronic device of placement location
CN118053261B (en) Anti-spoofing early warning method, device, equipment and medium for smart campus
CN110378200A (en) A kind of intelligent security guard prompt apparatus and method for of Behavior-based control feature clustering
CN112861572B (en) Pedestrian detection method, computer-readable storage medium, and electronic device
Rakshitha et al. Pepper cutting UGV and disease detection using image processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant