CN112752216A - Monitoring method and device based on electronic fence - Google Patents

Monitoring method and device based on electronic fence Download PDF

Info

Publication number
CN112752216A
CN112752216A CN202011541726.8A CN202011541726A CN112752216A CN 112752216 A CN112752216 A CN 112752216A CN 202011541726 A CN202011541726 A CN 202011541726A CN 112752216 A CN112752216 A CN 112752216A
Authority
CN
China
Prior art keywords
electronic fence
information
warning
monitoring
monitored object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011541726.8A
Other languages
Chinese (zh)
Other versions
CN112752216B (en
Inventor
王志宾
马双双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dongtu Tuoming Technology Co ltd
Original Assignee
Beijing Dongtu Tuoming Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dongtu Tuoming Technology Co ltd filed Critical Beijing Dongtu Tuoming Technology Co ltd
Priority to CN202011541726.8A priority Critical patent/CN112752216B/en
Publication of CN112752216A publication Critical patent/CN112752216A/en
Application granted granted Critical
Publication of CN112752216B publication Critical patent/CN112752216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Abstract

The invention relates to a monitoring method and device based on an electronic fence. The monitoring method comprises the following steps: acquiring the current security level of the electronic fence, wherein the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules; if the monitored object enters the electronic fence, acquiring object information of the monitored object; and judging whether to send out a warning to the monitored object or not based on a preset admission rule corresponding to the current safety level and the object information. By adopting the method and the device, the electronic fence can limit the entrance of the monitored object and allow the entrance of the monitored object according to different preset access rules corresponding to different security levels of the electronic fence, and the monitoring method has more application scenes and wide market prospect.

Description

Monitoring method and device based on electronic fence
Technical Field
The invention belongs to the technical field of electronic fence control, and particularly relates to a monitoring method and device based on an electronic fence.
Background
The electronic fence with unique performance is widely applied to places needing enclosure monitoring, such as mines, transformer substations, power plants, water plants, factories, industrial areas, material warehouses, residential districts, villas, schools, airports, aquaculture and livestock places, government institutions, key cultural places, military facilities, prisons and the like.
There exists in the prior art an electronic fence based vehicle monitoring method, which includes: marking a starting point of a monitoring vehicle on an electronic map; setting a corresponding electronic fence on the electronic map according to the starting point; acquiring the position information of the monitored vehicle, and judging whether the monitored vehicle exceeds a set electronic fence or not according to the position information; and if the monitored vehicle exceeds the range of the preset electronic fence, reminding a monitor of the monitored vehicle.
The monitoring method is used for simply and absolutely prohibiting the monitored object from exceeding the area defined by the electronic fence, and the application scene is limited. In many scenarios, the monitoring rules of certain electronic fence defined areas are flexible, and it is highly desirable to provide a more flexible monitoring method.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a monitoring method and device based on an electronic fence. According to the monitoring method, the preset access rules corresponding to different security levels of the electronic fence are different, the electronic fence can limit the entrance of the monitored object and allow the monitored object to enter in a plurality of application scenes, and the monitoring method has a wide market prospect.
In order to achieve the above purposes, the invention adopts the technical scheme that:
an electronic fence-based monitoring method comprises the following steps: acquiring the current security level of the electronic fence, wherein the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules; if the monitored object enters the electronic fence, acquiring object information of the monitored object; and judging whether to send out a warning to the monitored object or not based on a preset admission rule corresponding to the current safety level and the object information.
Further, different current security levels correspond to different preset admission rules, and at least one of the following conditions is met: if the current security level is adjusted, adjusting the capacity threshold of the corresponding electronic fence; if the current security level is adjusted, adjusting the retention time threshold value in the corresponding electronic fence; and if the current security level is adjusted, adjusting the work type of the corresponding access object of the electronic fence.
Further, the object information of the monitored object includes the work type of the monitored object, and the monitoring method further includes: and judging whether to send out authority warning or not according to the work type.
Further, the object information of the monitoring object further includes life information, and the monitoring method further includes: and judging whether to send out survival warning or not based on the life information of the monitoring object staying in the electronic fence.
Further, the object information of the monitored object further includes track information of the monitored object, and the monitoring method further includes: and judging whether to send out overspeed warning, off-duty warning or absent duty warning or not according to the track information.
An electronic fence-based monitoring device, the monitoring device comprising: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring the current security level of the electronic fence, the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules; the second acquisition module is used for acquiring the object information of the monitored object under the condition that the monitored object enters the electronic fence; and the warning module is used for judging whether to send a warning to the monitored object or not based on the preset access rule corresponding to the current safety level and the object information.
Further, the different current security levels obtained by the first obtaining module correspond to different preset admission rules, and at least one of the following conditions is met: if the current security level is adjusted, adjusting the capacity threshold of the corresponding electronic fence; if the current security level is adjusted, adjusting the retention time threshold value in the corresponding electronic fence; and if the current security level is adjusted, adjusting the work type of the corresponding access object of the electronic fence.
Further, the object information of the monitored object obtained by the second obtaining module includes a work type of the monitored object, and the warning module is further configured to determine whether to issue a permission warning according to the work type.
Further, the object information of the monitoring object obtained by the second obtaining module further comprises life information, and the warning module is further used for judging whether to send out survival warning or not based on the life information of the monitoring object staying in the electronic fence.
Further, the object information of the monitoring object obtained by the second obtaining module further comprises the track information of the monitoring object, and the warning module is further used for judging whether to send overspeed warning, off-duty warning or absent duty warning or not according to the track information.
The invention has the following effects: by acquiring the security level of the electronic fence, if the electronic fence is judged to have a monitored object entering, acquiring object information of the monitored object; judging whether to send out a warning to the monitored object or not according to the object information based on a preset access rule corresponding to the current security level of the electronic fence; the monitoring object can be a mobile object including people and vehicles, meanwhile, the electronic fence can limit the entrance of the monitoring object and allow the entrance of the monitoring object according to different preset access rules corresponding to different safety levels, and the monitoring method has a large number of application scenes and has a wide market prospect.
Drawings
Fig. 1 is a flowchart of an electronic fence-based monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a construction of an electronic fence according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a layered stand-alone construction of an electronic fence according to an embodiment of the present invention;
fig. 4 and fig. 5 are schematic diagrams illustrating determining whether a monitored object enters an electronic fence according to an embodiment of the present invention;
fig. 6 is a block diagram of a monitoring apparatus based on an electronic fence according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic fence-based monitoring system according to an embodiment of the present invention.
Detailed Description
First, an application scenario of the technical scheme provided by the invention is introduced.
The monitoring method provided by the related art is only suitable for monitoring the vehicle and absolutely forbidding the monitored vehicle to leave the area defined by the electronic fence, so that the limitation is too rigid and is not suitable for the actual situation of the monitored target person. In practical situations, such as mine scenes, some areas can allow people to enter, stay and leave, further some areas can allow people to enter only a limited number of people or only special workers, and the maximum number of people accommodated in the electronic fence or the maximum length of time spent in the electronic fence can also be flexibly changed along with the change of the area environment.
The monitoring method provided by the invention is suitable for application scenes including but not limited to monitoring workers in mine scenes. The mine scene environment is special, the mining geological conditions are complex and changeable, and the mine is threatened by disasters such as gas, dust, fire, water and the like. In order to ensure the safety of underground operators and ensure the normal production of mines, safety warning work must be put at the head of each work.
The technical solution of the present invention is further described with reference to the accompanying drawings and the detailed description.
Fig. 1 is a flowchart of a monitoring method based on an electronic fence according to an embodiment of the present invention, as shown in fig. 1, the monitoring method includes the following steps:
and S11, acquiring the current security level of the electronic fence.
The current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules. The dynamic adjustment can be initiated grading by a person with grading authority, and then can be directly adjusted in the background without surveying the site (for example, directly and uniformly stipulate strict in and out in an epidemic situation), or adjusted in the back after surveying the site (for example, the site finds new water leakage hidden danger). The adjustment method is not limited here.
And S12, if the monitored object enters the electronic fence, acquiring the object information of the monitored object.
Specifically, one of the methods for determining whether a monitoring object enters the electronic fence may be to provide an infrared sensor in the electronic fence to detect. When the infrared sensor detects the object, a signal of 'monitoring the object entering the electronic fence' is sent out. Or the background can continuously track the track of each monitored object, and when the position of a certain monitored object at a certain moment is located in the coordinate range of the electronic fence, the track monitoring background sends a signal that the monitored object enters the electronic fence.
And acquiring object information of the monitored object. Wherein the object information may include at least an object ID and operating duration information. Based on the object ID and the working time length information, the current number of the entering objects of a certain electronic fence can be counted, and whether to send out an overtime warning or overtime is judged. The object information may further include work category labels, life information, and trajectory information, which may support a richer judgment and alarm function, and will be described in detail later.
And S13, judging whether to send out warning to the monitored object or not based on the preset admission rule and the object information corresponding to the current security level of the electronic fence.
The current security level of the electronic fence in S13 refers to the current security level of the electronic fence into which the monitoring object enters in step S12. Alerts may be used to notify monitored objects of departure from the electronic fence, such as an employee alert and an overtime alert.
In this embodiment, by acquiring the security level of the electronic fence, if it is determined that a monitored object enters the electronic fence, object information of the monitored object is acquired; judging whether to send out a warning to the monitored object or not according to the object information based on a preset access rule corresponding to the current security level of the electronic fence; the monitoring object can be a mobile object including people and vehicles, meanwhile, the electronic fence can limit the entrance of the monitoring object and allow the entrance of the monitoring object according to different preset access rules corresponding to different safety levels, and the monitoring method has a large number of application scenes and has a wide market prospect.
In this embodiment, the number of the electronic fences is more than one, and the security levels of different electronic fences can be different. The construction method of the electronic fence is briefly introduced below by taking a mine scene as an example.
Under the mine scene, due to different requirements of different areas, such as different working properties, different number of people, different continuous working time limit and the like, an independent electronic fence needs to be independently constructed for each area so as to realize the respective management of each area. Due to the complexity of production scenes and working environments, the number of safe regions to be managed is large, if a traditional physical fence is arranged, time and labor are consumed, resources are consumed, later maintenance is troublesome, and certain potential safety hazards exist.
In application, a production scene is displayed in a three-dimensional mode through a CAD drawing and visualized on a front end webpage, and the production scene is used for dynamically drawing an electronic fence area. Of course, can be derived directly from the predefined real geofenced area boundaries. The electronic fence area can be manually drawn based on the three-dimensional model, the area boundary can be determined, and various types of attribute information of the area can be set, wherein the screen touch points are automatically converted into real coordinates relative to the production scene.
In the embodiment, two ways of constructing the electronic fence are given, namely a given point way of the predefined geographic area and a drawing point way of the three-dimensional production environment model. Both of these architectures require a coordinate system that maps to the real production environment.
Fig. 2 is a schematic diagram of a construction of the electronic fence according to the embodiment. As shown in fig. 2, for a given point mode a of the first predefined geographical area, since the given point is already the geographical coordinates of the real production environment, only a closed curve, i.e. the electronic fence area, needs to be formed by positioning and connecting the given point 1, the given point 2, the given point 3, the given point 4, the given point 5 and the given point 6. Illustratively, the coordinates of a given point are consistent with the coordinates of the real production environment.
For the second point drawing mode B of the three-dimensional production environment model, the model of the real production environment is irregular, but in order to be correctly mapped to the corresponding geographic position, a geographic origin (0,0,0) needs to be set at a proper point and the positive direction of the coordinate system needs to be set. The method comprises the steps that a drawing point 1, a drawing point 2, a drawing point 3, a drawing point 4, a drawing point 5 and a drawing point 6 are sequentially selected from a three-dimensional model and connected to form a closed curve, the scaling ratio and the displacement value of the model need to be considered, the point set of the closed curve after the drawing points are moved is calculated through an origin displacement formula [ { px ═ x/scale, py ═ y/scale } … … ] and is an electronic fence area, scale is the moving distance, the actual depth of the electronic fence area is determined by the Z-axis height of the drawing point clicked for the first time, and the multiple electronic fences can be horizontally overlapped and are independent of each other at different depths.
Fig. 3 is a schematic diagram of the electronic fence constructed according to the present embodiment. Since the actual production environment is not a planar geographic location, the production environments of different depths may overlap in a horizontal position, and for the purpose of differentiation, the fence area defined herein also includes a definition of depth Z, which is different for different fences, and specifically, as shown in the right diagram of fig. 3, which shows planes of two different depth Z's. When the method is realized, the height of the three-dimensional coordinate of the space point is used as the depth, the mapping height value of a given value or a first time production environment model clicking drawing point is used as the reference height of the electronic fence, the electronic fence floats upwards for 2 meters, and floats downwards for 1 meter, namely the effective height range of the current electronic fence. Correspondingly, the position information of the monitored object also comprises the information of the height, namely the underground depth, so that the height parameter is also added in the calculation of the position relation between the corresponding electronic fence and the personnel.
After the electronic fence is constructed, the boundary of the electronic fence is defined. Other attribute flags for the electronic fence can be set simultaneously with the aggregated information. In some embodiments, the attribute of the electronic fence may include a security level, the security level corresponding to a stay-allowed condition, the stay-allowed condition including at least one of a permission identifier of a monitoring object allowed to stay, a number of the monitoring objects staying, and a stay time period of the monitoring objects staying. In some embodiments, the attributes of the electronic fence can include one of a rest area and a work area. The rest area allows all the monitoring objects to enter, and the working area limits the entering monitoring objects according to the security level. In some embodiments, the aggregated information for the electronic fence can include all people information currently within the electronic fence area. In some embodiments, the aggregated information for the electronic fence can include information for all people entering the area of the electronic fence within a certain period of time. And the aggregation information is used for front-end display to the management user.
Optionally, the security level of the electronic fence is dynamically changed. Based on this, the monitoring method may further include step S10 before step S11.
And S10, setting the security level of the electronic fence.
S10 may include the steps of:
s101, receiving a security level setting command sent by a rating object.
The security level setting command includes an identification of the electronic fence and an identification of the security level.
The rating object is a monitoring object having a right to transmit the security level setting command. When the security level setting command is transmitted, the security level setting command may further include an authority identifier of the sender. Whether the authority identification of the sender is in the stored authority identification of the rating object can be detected, so that whether the sender is a legal rating object is identified.
S102, setting the security level of the electronic fence corresponding to the identification of the electronic fence as the security level corresponding to the identification of the security level.
Illustratively, the patrol personnel with the grading authority can dynamically grade the security levels of the electronic fence area into four levels of A, B, C and D according to the actual production situation, and upload the security level information to the background in a preset wired or wireless communication mode. If no inspection personnel rate the electronic area within the specified time, the electronic area is defaulted to be B level. Security level a is the highest level and D is the lowest level. The lower the security level, the greater the environmental risk and the more restrictive the corresponding electronic fence is for the entering personnel.
In S11, different current security levels correspond to different preset admission rules, and at least one of the following conditions is satisfied: if the current security level is adjusted, adjusting the capacity threshold of the corresponding electronic fence; if the current security level is adjusted, adjusting the retention time threshold value in the corresponding electronic fence; and if the current security level is adjusted, adjusting the work type of the corresponding access object of the electronic fence.
In step S12, it can be determined whether or not the monitored object enters the electronic fence through the following steps S121 to S125.
S121, obtaining position information of the monitored object, wherein the position information comprises the depth and the horizontal position of the monitored object.
S122, determining whether the monitoring object is located at the depth of the electronic fence or not based on the depth of the monitoring object, wherein different electronic fences have different depths.
When the monitoring object is located at the depth of the electronic fence, S123 is performed. When the monitoring object is not located at the depth of the electronic fence, S125 is executed.
And S123, determining whether the monitored object is positioned in the boundary of the electronic fence or not based on the horizontal position of the monitored object.
When the monitoring object is located within the boundary of the electronic fence, S124 is performed. When the monitoring object is not located within the boundary of the electronic fence, S125 is performed.
And S124, determining that a monitoring object enters the electronic fence.
And S125, determining that no monitoring object enters the electronic fence.
The position information of the monitoring object may be position coordinates of a three-dimensional space, and generally indicates depth in Z-axis data and horizontal position in X-axis and Y-axis data.
In some embodiments, if the person access limit of the designated electronic fence area is set, z in the current person position coordinate P1(x, y, z) is taken to be compared with the established height z1 of the electronic fence, if z1-1 ≦ P1.z ≦ z1+2, it means that P1 is within the effective height range of the electronic fence, otherwise, the next point taking judgment is directly entered. After the height condition is met, judging whether the point p1 is in the polygonal range of the electronic fence according to an algorithm, and if not, directly entering next point taking judgment; if the event is in the electronic fence, the system triggers violation entrance warning, the event is stored in a warehouse for historical inquiry, and meanwhile, the message reminds corresponding personnel to leave as soon as possible. The present embodiment does not limit the algorithm for determining whether the p1 point is within the polygon range of the electronic fence, and for example, a ray method may be adopted to determine whether the p1 point is within the polygon range of the electronic fence. The principle of the ray method is that a ray is horizontally made to the right from a point, the number of intersection points of the ray and the edge of a polygon is calculated, when the point is not on the edge of the polygon, if the point is odd, the point is always inside the polygon, otherwise, the point is outside the polygon. The following briefly describes the correlation algorithm in conjunction with fig. 4 and 5.
Fig. 4 and fig. 5 are schematic diagrams of determining whether a monitored object enters an electronic fence according to this embodiment. Firstly, judging whether the point to be measured is in the effective height range according to the graph 3, and if not, directly exiting the judging process; if so, the determination is made as shown in fig. 4 and 5.
In some embodiments, as shown in point P1(x, y) of fig. 4, it is first determined whether the point is within the maximum outer frame that forms the boundary of the fence area, and if x < minx or x > maxx or y < miny or y > maxy, it indicates that the point is beyond the maximum outer frame and is not within the fence area.
In some embodiments, as shown in point P2(x, y) of fig. 4, if it is determined that point P2 is within the maximum outer frame range, then point P2 is determined to be coincident with each vertex of the polygon area of the fence, and if it is coincident, it is directly determined that the current point is within the fence area.
In some embodiments, as shown in point P3(x, y) of FIG. 4, if it is determined that point P3 is within the maximum bounding box range and P3 does not coincide with any vertex, the sum of the intersection points of the horizontal ray from P3 and the sides of the polygon is calculated. Wherein, if two vertexes of a certain edge
The ordinate of A1(x1, y1) and the ordinate of A2(x2, y2) are all larger or all smaller than the ordinate of the P3 point, which indicates that the edge and the horizontal ray of the P3 do not have direct intersection points, and the total number of the intersection points is added with 0 and skipped; if the ordinate range of a side includes the P3 point ordinate, i.e. y > y1 and y < y2, the abscissa of the intersection point starts to be calculated, px (y-y1) × (x2-x1)/(y2-y1) + x. Finally, if px is determined to be x, the point is determined to be on the current edge, and the point can be directly determined to be in the electronic fence area; if px < x, the total number is added to one and then the next edge is calculated continuously, and finally if the total number is an odd number, the point is in the electronic fence area.
In some embodiments, as shown in point P4(x, y) of FIG. 4, if it is determined that point P4 is within the maximum bounding box range and P4 does not coincide with any vertex, the sum of the intersection points of the horizontal ray from P4 and the sides of the polygon is calculated. The judgment method is specifically as the judgment method of the point P3, but the difference is that the point A2 where the horizontal ray of the point P4 intersects with the polygon is the vertex of the polygon, if the judgment condition of the point P3 is that the total number of the intersection points is 2, and the point P4 is outside the electronic region, but the method is obviously incorrect, so the application provides that if the intersection point is the vertex, such as A2 in the example, the vertical coordinates of A2 and the other two vertexes A1 and A3 of the two sides where the intersection point is located are compared, if the vertical coordinate of the point is in the range of the vertical coordinates of the other two vertexes, namely, A1.y < A2.y < A3.y, the calculation is carried out once intersection, otherwise, the calculation is carried out for 0 times.
In some embodiments, as shown in point P5(x, y) in fig. 4, the determination manner is determined as point P4.
In some embodiments, as shown in points P6 and P7 in fig. 5, a point is determined to be inside the polygon, and then a ray can be drawn from the point in any direction by ray method, and the point is inside the polygon when the intersection point of the line segment and each side of the polygon is observed to be an odd number 2n +1, whereas the point is outside the polygon when the total number is an even number. For the sake of calculation and also for the sake of judging some special cases, horizontal rays in the positive direction (X-axis direction) drawn from the point are used in the present application.
Step S13 may include the following detailed process: when the monitored object meets a preset access rule corresponding to the security level of the electronic fence, no warning is sent to the monitored object; and when the monitored object does not meet the preset access rule corresponding to the security level of the electronic fence, sending a warning to the monitored object. These alerts may be override alerts or timeout alerts or other types of alerts, as described in detail below.
Illustratively, it may be determined whether to issue an override alert.
When the maximum number of people allowed to be accommodated simultaneously is set to the upper limit c1 in the electronic fence area, recording the current number of people in the electronic fence c2, and if people enter the electronic fence area, then c2+ 1; if the person leaves the electric fence area, c 2-1. If c2 is more than or equal to c1 level, namely the total number of people in the range of the current electronic fence exceeds the maximum threshold value, the system triggers an 'excess person' alarm, and the event is stored in a warehouse and informs related people of leaving. The level is the rating of the patrol personnel on the safety condition of the electronic fence stage, and when the level is A level, the value of c1 is 100% of the original number; c1 takes 80% of original number when level is B level; c1 takes 50% of original number when level is C level; when the level is D level, c1 takes a value of 0, the electronic fence is in an unavailable state, and any ordinary person is prohibited to enter the electronic fence.
Illustratively, it may be determined whether to issue a timeout alert.
In some embodiments, if the periodic reporting time of the personnel position information is set as m1 (minutes) and the maximum working time h1 (hours) allowed by personnel is set, the cumulative working time m2 after the personnel enter the production environment is recorded as m1 n, n is the number of periodic reporting times, and if m2 is equal to or more than m
h1 × 60, that is, the accumulated working time of the personnel exceeds the maximum threshold, the system triggers the alarm of 'working overtime', and the event is stored in the database for historical inquiry. If the data reporting time interval is more than 1 hour, m2 is calculated from 0. The reporting mode of the personnel position information is that the base station periodically reads the tag equipment (installed on the monitoring personnel) in the coverage area of the base station and reports the tag equipment to the server. Or, the personnel operates the tag device to periodically send signals to nearby base stations, and the signals are received by the base stations and reported to the server.
In some embodiments, after the maximum number of persons allowed to enter the electronic fence area at the same time is set, if an authorized person enters the electronic fence area and the number of persons currently accommodated in the electronic fence after entering reaches a maximum threshold value, the system triggers an alarm for overtaking to remind corresponding persons of temporarily not entering; and meanwhile, the information is fed back to the manager, and the person needing to leave is dispatched to leave as soon as possible.
In the method according to the embodiment of the present invention, the object information of the monitored object may include a work type of the monitored object, and the monitoring method further includes: and judging whether to send out authority warning or not according to the work type. Specifically, when the electronic fence area limits the personnel access right, the position coordinate p1(x, y, z) of the personnel is recorded, the preset height z1 of the electronic fence is compared with the z in p1, and if (z 1-z)Float downwards) Z is less than or equal to (z1+ z) in p1Float upward) That is, the current point is within the effective height range of the electronic fence, otherwise, the next point-taking judgment is directly entered. After the height condition is met, judging whether the point p1 is in the polygonal range of the electronic fence according to an algorithm, and if not, directly entering next point taking judgment; if the electronic fence is internally provided with the corresponding authority, whether the personnel have the corresponding authority is judged based on the work type label of the monitored object, if the personnel do not have the corresponding alarm authority, the system triggers an illegal entry alarm (authority alarm), the event is put in storage and the related personnel are informed to be away, and the informing mode can be that an alarm message is sent to the related personnel.
In the method according to the embodiment of the present invention, the object information of the monitored object may further include life information, and the monitoring method further includes: and judging whether to send out survival warning or not based on the life information of the monitoring object staying in the electronic fence. Specifically, if the periodic reporting time of the personnel life information is set to be m1 (minutes) (which can be reported periodically with the position information), the position coordinates p1(x, y, z) of the personnel at every m1 minutes after the personnel enter the production environment are recorded and updated, and the personnel are taken out for the next previous timeThe reported position coordinates of the person p2(x, y, z) and the distance to p1 are calculated. The distance is calculated by the formula as,
Figure BDA0002854861610000131
if d is>1, updating P1 to P2 and continuing polling judgment, if d<1, the position of the person is basically unchanged for a long time, and health problems (shock sudden death and the like) can occur, so that the system triggers 'life information monitoring and early warning' (survival warning); in addition, if no report information is received in 3 × m1 minutes, the system also triggers the 'life information monitoring and early warning'. It should be noted that, during the monitoring of the life information, the tag device is actively operated by a person to periodically send a signal to a nearby base station, and the signal is received by the base station and then reported to the server.
In the method according to the embodiment of the present invention, the object information of the monitored object may further include track information of the monitored object, and the monitoring method further includes: and judging whether to send out overspeed warning, off-duty warning or absent duty warning or not according to the track information.
Illustratively, the monitoring method further includes step S14.
And S14, determining the track information of the monitored object based on the position information of the monitored object.
The track information records data of different positions at different historical times, and according to the track information, whether the monitored object is currently in a certain electronic fence or not can be calculated, the stay time in the electronic fence can be calculated, the moving speed of the monitored object can be calculated, and the like.
S14 may further include: and judging whether to send out overspeed warning or not according to the track information. I.e. the speed of movement of the monitored object staying within the electronic fence. The method can comprise the following steps:
and S141, determining the moving speed of the monitoring object staying in the electronic fence based on the position information of the monitoring object staying in the electronic fence.
And S142, determining whether to send out overspeed warning or not based on the moving speed of the monitored object staying in the electronic fence.
In some embodiments, when the upper limit of the moving speed s1(km/h) of a specified work type in the downhole production environment is set, the reporting time t1 and the position coordinates p1(x, y, z) after the work type personnel enters the production environment are recorded, the reporting time t2 and the position coordinates p2(x, y, z) are taken next time, and the speed d/(t2-t1) is calculated according to the data of two times, wherein d is the distance between two points calculated by the above formula. If speed is less than s1, the personnel does not overspeed, the t1 is t2, the p1 is p2, and the next reporting time and the coordinates are taken for recalculation; if speed is larger than or equal to s1, the moving speed of the personnel exceeds the maximum limit value, the system triggers an overspeed alarm, the event is stored in a warehouse for historical inquiry, and meanwhile, the message reminds the corresponding personnel to pay attention to deceleration.
Illustratively, the monitoring method further includes step S15.
And S15, judging whether to send out absent duty warning or off duty warning according to the track information.
Step S15 may include the steps of:
s151, determining whether the post object enters the electronic fence in the target time period or not based on the position information of the post object of the electronic fence, wherein the post object of the electronic fence is a monitoring object bound with the electronic fence.
When the position object of the electronic fence does not enter the electronic fence within the target time period, S152 is performed. And when the position object of the electronic fence enters the electronic fence in the target time period, determining that the position object of the electronic fence is on position, and executing S153.
And S152, sending out absent duty warning.
S153, detecting whether the position object of the electronic fence stays in the electronic fence continuously in the target time period.
When the position object of the electronic fence does not stay within the electronic fence continuously within the target time period, S154 is performed. Determining that the position object of the electronic fence has not left the position within the target time period when the position object of the electronic fence stays within the electronic fence for the target time period.
And S154, sending off-duty warning.
When a person sets the on-duty time range in a designated area, if the corresponding person cannot be monitored in the designated area within the set time, the system triggers an off-duty alarm (absenteeism warning); if the corresponding personnel cannot be continuously monitored in the specified area within the specified time after the post is normally arrived, the system triggers an off-post alarm (off-post warning), and the event is put in storage and is notified to the corresponding personnel.
In some embodiments, if routing inspection information of a designated person, time and area is set, the position coordinates p1(x, y, x) of the routing inspection person are recorded and updated within a specified time period, then whether a point p1 is in the designated electronic fence area is judged through an algorithm, and if not, a system triggers a 'routing inspection off duty' alarm; after the person normally arrives at the post, position judgment is carried out once in each report within a specified time period, if the person is not in a specified area, the system triggers a patrol and leave post alarm, an event is put in a warehouse for historical inquiry, and meanwhile, a message reminds a manager and a corresponding person, and the corresponding person can arrive at the post as soon as possible after receiving the message.
Optionally, the monitoring method further includes step S16.
And S16, monitoring the electric quantity of the label equipment of the monitored object.
Step S16 may include the steps of:
s161, determining the electric quantity of the tag equipment of the monitored object, wherein the tag equipment is used for positioning the position of the monitored object.
For example, the electric quantity of the tag device of the monitoring object may be periodically sent to the base station by the tag device, and then reported to the server by the base station.
And S162, when the electric quantity of the tag device of the monitored object is lower than the target electric quantity, informing the monitored object to charge the tag device.
When the electric quantity of the label equipment is too low to exceed a preset value, the system triggers a track electric quantity too low alarm (low-electricity alarm), and the event is stored in a warehouse and related personnel are informed to leave and charge as soon as possible.
In the embodiment, the monitoring background continuously and periodically performs wireless communication with the monitoring target, acquires information such as position information of the monitoring target and the like, and then performs logic judgment to determine whether to send an alarm or not so as to achieve the purpose of tracking management; after a monitoring target (such as a designated inspection person) with authority enters the electronic fence for inspection, sending the current security rating information of the electronic fence to a monitoring background, and adjusting the relevant allowable stay conditions of the electronic fence by the monitoring background according to the received current security rating information of the electronic fence so as to guide the subsequent monitoring work. The monitoring background adjusts the allowable stay condition related to the electronic fence according to the received current security rating information of the electronic fence "includes but is not limited to: if the safety level is adjusted, the maximum number of people allowed to be accommodated in the electronic fence is adjusted. And if the safety level is adjusted, adjusting the maximum allowable waiting time in the electronic fence. And thirdly, if the safety level is adjusted, adjusting the work type set of the allowed stay personnel of the electronic fence. The method can dynamically adjust the relevant rules of the electronic fence, and can also perform low-power warning, survival warning, off-duty warning, mobile overspeed warning and the like, thereby realizing more refined monitoring warning management.
Fig. 6 is a block diagram of a monitoring device based on an electronic fence according to an embodiment of the present invention, and as shown in fig. 6, the monitoring device includes: a first obtaining module 601, a second obtaining module 602, and an alert module 603. The first obtaining module 601 is configured to obtain a current security level of the electronic fence, where the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules. The second obtaining module 602 is configured to obtain object information of the monitored object when it is determined that the monitored object enters the electronic fence. The warning module 603 is configured to determine whether to send a warning to the monitored object based on a preset admission rule and object information corresponding to the current security level.
In this embodiment, by acquiring the security level of the electronic fence, if it is determined that a monitored object enters the electronic fence, object information of the monitored object is acquired; judging whether to send out a warning to the monitored object or not according to the object information based on a preset access rule corresponding to the current security level of the electronic fence; the monitoring object can be a mobile object including people and vehicles, meanwhile, the electronic fence can limit the entrance of the monitoring object and allow the entrance of the monitoring object according to different preset access rules corresponding to different safety levels, and the monitoring method has a large number of application scenes and has a wide market prospect.
In this embodiment, a monitoring device based on an electronic fence may be a server, and the hardware includes: a processor; and a memory for storing executable instructions for the processor; wherein the processor is configured to perform the aforementioned fence-based monitoring method via execution of executable instructions. The memory and the processor may be connected by a bus. The memory unit may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM) and/or a cache memory unit, and may further include a read only memory unit (ROM). The server also includes a display unit connected to the bus. The display unit can display the potentially important information of the patient and the like.
A computer-readable storage medium, on which a computer program is stored, which, when being executed by the processor, implements the aforesaid monitoring method based on electronic fences.
Fig. 7 is a schematic structural diagram of a monitoring system based on an electronic fence according to an embodiment of the present invention, and as shown in fig. 7, the monitoring system includes: a number of label devices 701; a number of base stations 702; and a control device 703. The tag device 701 is used for being mounted on a corresponding monitored object. The base station 702 is configured to obtain location information of the tag device and send the location information of the tag device to the monitoring apparatus. The monitoring device 703 is configured to obtain a current security level of the electronic fence, where the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules; if the monitored object enters the electronic fence, acquiring object information of the monitored object; and judging whether to send out a warning to the monitored object or not based on the preset admission rule and the object information corresponding to the current safety level.
The tag device 701 is a positioning element bound on the safety helmet, the number and the information of the tag device correspond to those of underground production personnel one by one, and the tag device is convenient for being responsible for people and managing and scheduling in time when an alarm occurs.
The base stations 702 should be deployed at key locations and corners of the production scenario, with proper placement and sufficient number to ensure positioning accuracy.
In some embodiments, the monitoring device 703 consists of 1 or more servers. Illustratively, the monitoring apparatus 703 may be composed of a first server 7031, a second server 7032, a third server 7033, a fourth server 7034, and a monitoring terminal 7035.
The first server 7031 is configured to obtain the matched location information calculated by the tag device 130 and the base station 702 in real time. In the implementation process, a first server 7031 is built by using an Ultra-wideband (UWB) technology to receive and forward positioning information, an enough positioning base station 702 is installed at a reasonable position in the underground to ensure positioning accuracy, and finally, the underground position information containing x, y and z dimensions is generated by matching with a tag device 701 carried by a person. The first server 7031 can be used to obtain one or more electronic fence information. The electronic fence information corresponds to a geographic region of an actual production scenario. In some embodiments, the predefined real geographic area may be stored as a designated electronic fence in the data storage server according to its coordinate information. In some embodiments, the coordinates may be transformed into the real geographic region according to the information of the electronic fence region dynamically drawn on the three-dimensional model, and then stored as the designated electronic fence in the data storage server. In some embodiments, it is also used to obtain real-time location and vital information of the person.
The second server 7032 is used for scheduling and managing monitoring based on the matched location information. A second server 7032 can be used to determine the location and coverage area of the electronic fence in the actual production environment. In some embodiments, the location of the electronic fence in the production environment may include a predetermined mapping of the geographic area boundary to a corresponding location in the production environment coordinate system. In some embodiments, the location of the electronic fence in the production environment may comprise a mapping of a closed polygon boundary of at least 3 points dynamically drawn on the three-dimensional model to a corresponding location in the production environment coordinate system.
The third server 7033 is for data storage.
The fourth server 7034 is used for front-end presentation and interoperability.
The monitoring terminal 7035 is used for interacting and displaying with the fourth server 7034. Illustratively, at least one electronic fence and alarm information triggered based on various types of predefined safety production rules can be visually presented. The electronic fence includes electronic fence boundaries and other attribute markers as well as aggregate information. In some embodiments, the attributes of the electronic fence can include one of a rest area and a work area. In some embodiments, the attributes of the electronic fence may include a maximum upper time limit that allows personnel to work continuously within. In some embodiments, the attributes of the electronic fence may include an upper limit on the number of persons allowed to enter at the same time. In some embodiments, the information for the electronic fence can include information for all people currently within the area of the electronic fence. In some embodiments, the information for the electronic fence can include information for all people entering the area of the electronic fence within a certain period of time.
In some embodiments, the second server 7032 may load the set electronic fence area information, and after obtaining the user location information, determine the location relationship between the person and the at least one electronic fence according to the electronic fence boundary range.
In some embodiments, the second server 7032 can display the loading of one or more electronic fences based on the location information and the number of people in the area.
In some embodiments, the second server 7032 may display the work attendance status of one or more people based on the set people tour inspection and location information.
In some embodiments, the second server 7032 may display the regional and overall work length status of one or more people based on the set personnel and regional work length limits and location information.
In some embodiments, the third server 7033 includes, but is not limited to, a relational database and other file storage arrangements for data persistence and post-data analysis.
In some embodiments, the fourth server 7034 may load and render a three-dimensional model of the downhole production environment, so that the manager can dynamically draw the electronic fence and store the electronic fence into the third server 7033 as needed, and can accurately render the electronic fence to a corresponding position of the model after loading the data of the electronic fence region from the third server 7033 again.
In implementation, the fourth server 7034 performs three-dimensional modeling rendering on a two-dimensional CAD mine structure drawing which is not highly visible, inconvenient to observe and incomplete by using a 3DMAX technology in combination with actual conditions and environments of an underground roadway. And further loading the three-dimensional model to a front-end webpage by using a WEBGL technology, and further performing visual display with strong reality on the terrain, industrial squares and roadways of the mine. At the display end (monitoring terminal 7035) of the fourth server 7034, according to the division of the mine into safety management areas within the working range, a corresponding electronic fence is dynamically drawn and constructed, a corresponding electronic fence boundary coordinate set is generated, and the corresponding electronic fence boundary coordinate set is stored in a database of the third server 7033 for later use. The electronic fence boundary is a point set which is longer than 2 and can form a closed curve, the point coordinates are projection values of space coordinates corresponding to model coordinates when the point is pointed, and the coordinate origin and the display origin of the mine three-dimensional model are kept unified. The display end of the fourth server 7034 may filter and dynamically load the saved electronic fence according to the conditions, and display or hide the electronic fence at a corresponding position of the three-dimensional model of the mine. Wherein the display or the hiding indicates the availability of the current electronic area. The display end of the fourth server 7034 may dynamically load a trace point set of designated personnel and designated time, which has been stored in the database, according to conditions, render the trace point set to the mine three-dimensional model, and support playback, fast-forward, and other play operations. After the socket io receiving and monitoring parameters are set at the display end of the fourth server 7034, the real-time position of the observed tag device (personnel) in the three-dimensional model can be dynamically loaded and refreshed in combination with condition screening.
In some embodiments, the fourth server 7034 may dynamically display the location and vital sign information of the downhole personnel in real time based on the three-dimensional model and the personnel location information.
In some embodiments, the fourth server 7034 may implement a phase playback operation of the trajectory of the person based on the three-dimensional model and historical data within the third server 7033.
The first server 7031, the second server 7032, the third server 7033, and the fourth server 7034 can all be individual servers or a cluster of servers, which can be centralized or distributed. The first server 7031, the second server 7032, the third server 7033 and the fourth server 7034 may be local or remote, for example, the second server 7032 may perform data interaction with the third server 7033 through local process communication, local area network communication or internet communication.
During implementation, the Websocket and the socket Io technology are utilized to establish the real-time, persistence and visualization of data of the label equipment, the base station, the servers and the display front end in the system.
It should be noted that the monitoring device, the monitoring system and the monitoring method based on the electronic fence in the embodiment are the same inventive concept, and the functions of the monitoring device and the monitoring system based on the electronic fence can be seen in the embodiment of the monitoring method based on the electronic fence in detail.
It will be appreciated by those skilled in the art that the method and system of the present invention are not limited to the embodiments described in the detailed description, which is for the purpose of explanation and not limitation. Other embodiments will be apparent to those skilled in the art from the following detailed description, which is intended to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A monitoring method based on an electronic fence is characterized by comprising the following steps:
acquiring the current security level of the electronic fence, wherein the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules;
if the monitored object enters the electronic fence, acquiring object information of the monitored object;
and judging whether to send out a warning to the monitored object or not based on a preset admission rule corresponding to the current safety level and the object information.
2. The monitoring method according to claim 1, wherein different current security levels correspond to different preset admission rules, and at least one of the following conditions is satisfied:
if the current security level is adjusted, adjusting the capacity threshold of the corresponding electronic fence;
if the current security level is adjusted, adjusting the retention time threshold value in the corresponding electronic fence;
and if the current security level is adjusted, adjusting the work type of the corresponding access object of the electronic fence.
3. The monitoring method according to claim 1, wherein the object information of the monitored object includes a work type of the monitored object, the monitoring method further comprising: and judging whether to send out authority warning or not according to the work type.
4. The monitoring method according to claim 3, wherein the object information of the monitored object further includes life information, the monitoring method further comprising: and judging whether to send out survival warning or not based on the life information of the monitoring object staying in the electronic fence.
5. The monitoring method according to claim 3, wherein the object information of the monitored object further includes trajectory information of the monitored object, the monitoring method further comprising: and judging whether to send out overspeed warning, off-duty warning or absent duty warning or not according to the track information.
6. An electronic fence-based monitoring device, the monitoring device comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring the current security level of the electronic fence, the current security level is dynamically adjusted, and different current security levels correspond to different preset admission rules;
the second acquisition module is used for acquiring the object information of the monitored object under the condition that the monitored object enters the electronic fence;
and the warning module is used for judging whether to send a warning to the monitored object or not based on the preset access rule corresponding to the current safety level and the object information.
7. The monitoring apparatus according to claim 6, wherein the different current security levels obtained by the first obtaining module correspond to different preset admission rules, and at least one of the following conditions is satisfied:
if the current security level is adjusted, adjusting the capacity threshold of the corresponding electronic fence;
if the current security level is adjusted, adjusting the retention time threshold value in the corresponding electronic fence;
and if the current security level is adjusted, adjusting the work type of the corresponding access object of the electronic fence.
8. The monitoring device according to claim 6, wherein the object information of the monitored object obtained by the second obtaining module includes a work type of the monitored object, and the warning module is further configured to determine whether to issue a permission warning according to the work type.
9. The monitoring device of claim 8, wherein the object information of the monitoring object obtained by the second obtaining module further includes life information, and the warning module is further configured to determine whether to issue a survival warning based on the life information of the monitoring object staying in the electronic fence.
10. The monitoring device according to claim 8, wherein the object information of the monitored object obtained by the second obtaining module further includes track information of the monitored object, and the warning module is further configured to determine whether to issue an overspeed warning, an off-duty warning, or an out-of-duty warning according to the track information.
CN202011541726.8A 2020-12-23 2020-12-23 Monitoring method and device based on electronic fence Active CN112752216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011541726.8A CN112752216B (en) 2020-12-23 2020-12-23 Monitoring method and device based on electronic fence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011541726.8A CN112752216B (en) 2020-12-23 2020-12-23 Monitoring method and device based on electronic fence

Publications (2)

Publication Number Publication Date
CN112752216A true CN112752216A (en) 2021-05-04
CN112752216B CN112752216B (en) 2023-03-03

Family

ID=75647327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011541726.8A Active CN112752216B (en) 2020-12-23 2020-12-23 Monitoring method and device based on electronic fence

Country Status (1)

Country Link
CN (1) CN112752216B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113470307A (en) * 2021-06-29 2021-10-01 北京市商汤科技开发有限公司 Management and configuration method and device of electronic fence, electronic equipment and storage medium
CN113808347A (en) * 2021-08-13 2021-12-17 新疆雪峰科技(集团)股份有限公司 Method and device for forming dynamic electronic fence and vehicle operation control method
CN113869245A (en) * 2021-09-30 2021-12-31 南方电网电力科技股份有限公司 Method and device for identifying safety region
CN116052223A (en) * 2023-04-03 2023-05-02 浪潮通用软件有限公司 Method, system, equipment and medium for identifying people in operation area based on machine vision
EP4250264A3 (en) * 2022-09-30 2024-02-14 FJ Dynamics Co., Ltd. Monitoring method, monitoring device, and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186963A (en) * 2011-12-28 2013-07-03 泰瑞数创科技(北京)有限公司 Electronic fence based on real-time geographic position
CN109493550A (en) * 2018-11-08 2019-03-19 北京中盈安信技术服务股份有限公司 Site safety management method, system and electronic equipment based on fence
CN110517429A (en) * 2019-09-10 2019-11-29 浙江蓝迪电力科技有限公司 A kind of Intelligent electronic fence system and processing method
CN110599740A (en) * 2019-10-16 2019-12-20 深圳震有科技股份有限公司 Multidimensional electronic fence early warning monitoring method and device, computer equipment and medium
WO2020057512A1 (en) * 2018-09-19 2020-03-26 西安中兴新软件有限责任公司 Monitoring method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186963A (en) * 2011-12-28 2013-07-03 泰瑞数创科技(北京)有限公司 Electronic fence based on real-time geographic position
WO2020057512A1 (en) * 2018-09-19 2020-03-26 西安中兴新软件有限责任公司 Monitoring method and device
CN109493550A (en) * 2018-11-08 2019-03-19 北京中盈安信技术服务股份有限公司 Site safety management method, system and electronic equipment based on fence
CN110517429A (en) * 2019-09-10 2019-11-29 浙江蓝迪电力科技有限公司 A kind of Intelligent electronic fence system and processing method
CN110599740A (en) * 2019-10-16 2019-12-20 深圳震有科技股份有限公司 Multidimensional electronic fence early warning monitoring method and device, computer equipment and medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113470307A (en) * 2021-06-29 2021-10-01 北京市商汤科技开发有限公司 Management and configuration method and device of electronic fence, electronic equipment and storage medium
WO2023273149A1 (en) * 2021-06-29 2023-01-05 北京市商汤科技开发有限公司 Method and apparatus for managing electronic fence, method and apparatus for configuring electronic fence, and device, medium and product
CN113808347A (en) * 2021-08-13 2021-12-17 新疆雪峰科技(集团)股份有限公司 Method and device for forming dynamic electronic fence and vehicle operation control method
CN113808347B (en) * 2021-08-13 2022-12-30 新疆雪峰科技(集团)股份有限公司 Method and device for forming dynamic electronic fence and vehicle operation control method
CN113869245A (en) * 2021-09-30 2021-12-31 南方电网电力科技股份有限公司 Method and device for identifying safety region
EP4250264A3 (en) * 2022-09-30 2024-02-14 FJ Dynamics Co., Ltd. Monitoring method, monitoring device, and electronic device
CN116052223A (en) * 2023-04-03 2023-05-02 浪潮通用软件有限公司 Method, system, equipment and medium for identifying people in operation area based on machine vision

Also Published As

Publication number Publication date
CN112752216B (en) 2023-03-03

Similar Documents

Publication Publication Date Title
CN112752216B (en) Monitoring method and device based on electronic fence
KR101937096B1 (en) 3D monitoring server using 3D BIM object model and 3D monitoring system comprising it
CN109212520B (en) Road condition sensing abnormal event detection alarm system and method for omnibearing detection radar
CN107450426B (en) Foundation pit construction deformable statistical analysis method and system
KR102024695B1 (en) System and method for modeling surveillance camera layout
US8190466B2 (en) Methods and systems for identifying safe havens for hazardous transports
Cova et al. Warning triggers in environmental hazards: Who should be warned to do what and when?
WO2020015242A1 (en) Video application and early warning scheduling system platform based on three-dimensional map
CN102163060B (en) Early warning method for collision avoidance of helicopter in training flight
CN112955900B (en) Intelligent video monitoring system and method
US20130218471A1 (en) Method, apparatus and system for rapid assesment
CN112581318A (en) Construction safety early warning system based on BIM and positioning technology integration
WO2010034060A1 (en) Alert generation system and method
CN108496348A (en) Slip mass dynamic monitoring and controlling method and system
KR102026821B1 (en) Remote measurement and management system for slope
KR101876114B1 (en) Terminal, server, system for 3d modeling and 3d modeling method using the same
CN106412526A (en) Police oblique-photography real 3D platform system and interface system thereof
CN111651491A (en) Data acquisition method based on mine holographic graph
CN107133687A (en) A kind of monitoring in real time of uneven blast of transmission line of electricity and typhoon early warning system
CN110097759A (en) A kind of motor vehicle violation behavioral value method based on video geography fence
WO2008060308A2 (en) Data model for risk assessments
CN102629270A (en) Three-dimensional presentation method and device for geographic information of smarter cities
CN110674543A (en) Three-dimensional visual gas-related operation safety control system and implementation method
WO2011110366A1 (en) Method and apparatus for the visual display of physically distributed information in an early warning system
Fan et al. Safety management system prototype/framework of deep foundation pit based on BIM and IoT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant