CN112967302B - Monitoring method for underwater security intrusion target of nuclear power plant - Google Patents
Monitoring method for underwater security intrusion target of nuclear power plant Download PDFInfo
- Publication number
- CN112967302B CN112967302B CN202110217061.3A CN202110217061A CN112967302B CN 112967302 B CN112967302 B CN 112967302B CN 202110217061 A CN202110217061 A CN 202110217061A CN 112967302 B CN112967302 B CN 112967302B
- Authority
- CN
- China
- Prior art keywords
- monitoring
- image
- underwater security
- power plant
- nuclear power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 149
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000003287 optical effect Effects 0.000 claims abstract description 19
- 238000004364 calculation method Methods 0.000 claims abstract description 10
- 230000004927 fusion Effects 0.000 claims abstract description 9
- 238000012634 optical imaging Methods 0.000 claims abstract description 5
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 28
- 239000013535 sea water Substances 0.000 claims description 11
- 238000012545 processing Methods 0.000 claims description 10
- 239000002131 composite material Substances 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 6
- 238000003708 edge detection Methods 0.000 claims description 6
- 230000000877 morphologic effect Effects 0.000 claims description 6
- 230000003313 weakening effect Effects 0.000 claims description 5
- 239000002028 Biomass Substances 0.000 claims description 3
- 230000010339 dilation Effects 0.000 claims description 3
- 238000009499 grossing Methods 0.000 claims description 3
- 230000002787 reinforcement Effects 0.000 claims description 2
- 230000009545 invasion Effects 0.000 description 5
- 238000007781 pre-processing Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000011218 segmentation Effects 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000004907 flux Effects 0.000 description 2
- 238000012806 monitoring device Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- FFBHFFJDDLITSX-UHFFFAOYSA-N benzyl N-[2-hydroxy-4-(3-oxomorpholin-4-yl)phenyl]carbamate Chemical compound OC1=C(NC(=O)OCC2=CC=CC=C2)C=CC(=C1)N1CCOCC1=O FFBHFFJDDLITSX-UHFFFAOYSA-N 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 239000000498 cooling water Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000013210 evaluation model Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000003707 image sharpening Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/13—Edge detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/213—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods
- G06F18/2132—Feature extraction, e.g. by transforming the feature space; Summarisation; Mappings, e.g. subspace methods based on discrimination criteria, e.g. discriminant analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/06—Electricity, gas or water supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformation in the plane of the image
- G06T3/40—Scaling the whole image or part thereof
- G06T3/4007—Interpolation-based scaling, e.g. bilinear interpolation
-
- G06T5/70—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/12—Edge-based segmentation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/136—Segmentation; Edge detection involving thresholding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20212—Image combination
- G06T2207/20221—Image fusion; Image merging
Abstract
The invention relates to a monitoring method of an underwater security intrusion target of a nuclear power plant, which comprises the following steps: 1) Monitoring an underwater security intrusion target of the nuclear power plant through sonar monitoring equipment, and obtaining the acoustic monitoring density of the underwater security intrusion target; 2) Monitoring an underwater security intrusion target of the nuclear power plant through optical imaging equipment, and obtaining the optical monitoring density of the underwater security intrusion target; 3) Carrying out data fusion on the acoustic monitoring density in the step 1) and the optical monitoring density in the step 2) to obtain an acousto-optic reconstruction model rho of the underwater security intrusion target of the nuclear power plant; 4) And (3) calculating the intrusion intensity of the underwater security intrusion target reaching the sensitive part by combining the acousto-optic reconstruction model and the space information in the step (3). According to the monitoring method for the underwater security intrusion target of the nuclear power plant, provided by the invention, the intrusion intensity of the underwater security intrusion target of the nuclear power plant can be quantitatively monitored through a series of scientific calculations such as acoustics, optics, acousto-optic combination, time-space domain models and the like, so that guidance is provided for an automatic monitoring system of the underwater security intrusion target of the nuclear power plant.
Description
Technical Field
The invention relates to a monitoring method of an underwater security intrusion target of a nuclear power plant.
Background
Most nuclear power plants in China are in coastal (water) areas, wherein important structures such as a cooling water taking system and a drainage system are directly or indirectly connected with a water area, and underwater security is a concern in the field of nuclear security in recent years. The current nuclear power plant underwater security field is assisted by equipment such as a blocking net, fishery sonar and the like which are arranged for guaranteeing invasion of cold source underwater security invasion targets, and risk assessment and technical measures aiming at underwater artificial invasion are relatively lacking, so that the requirements of nuclear security three-dimensional and deep defense are difficult to meet.
Disclosure of Invention
In view of the above, the present invention aims to overcome the defects of the prior art and achieve the above-mentioned objects, and an object of the present invention is to provide a method for monitoring an intrusion target of underwater security in a nuclear power plant.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a monitoring method of an underwater security intrusion target of a nuclear power plant comprises the following steps:
1) Monitoring an underwater security intrusion target of a nuclear power plant through sonar monitoring equipment, and obtaining acoustic monitoring density sigma of the underwater security intrusion target 1 ;
2) Monitoring an underwater security intrusion target of a nuclear power plant through optical imaging equipment, and obtaining optical monitoring density sigma of the underwater security intrusion target 2 ;
3) Acoustic monitoring density σ for step 1) 1 And optically monitoring the density sigma of step 2) 2 Performing data fusion to obtain an acousto-optic reconstruction model rho of an underwater security intrusion target of the nuclear power plant;
4) And (3) calculating the intrusion intensity of the underwater security intrusion target reaching the sensitive part by combining the acousto-optic reconstruction model and the space information in the step (3). The spatial information comprises the distance between the monitoring point and the sensitive part, the water flow speed and the like. : the sensitive part refers to a weak position of the underwater security of the nuclear power plant, such as a water intake pump station and the like.
According to some preferred embodiments of the invention, the acoustic monitoring density σ in step 1) is 1 The calculation is performed according to the following formula:
in which the density sigma is monitored acoustically 1 For monitoring statistics of targets within a range, the unit is ind/m 3 ;
V is the sea water volume in the sonar monitoring range;
n is the number of spherical slices obtained by dividing the sonar monitoring range;
m is the number of the partitioned water bodies surrounded by N spherical slices;
m, N is determined according to Max (diameter, height) of the monitored object;
C i and projecting the number of the intrusion targets to the gray image values of the spherical slices for underwater security of the spherical slices.
According to some preferred embodiments of the invention, in formula (1)The formula (1) is simplified as follows:
according to some preferred embodiments of the invention, wherein C i Calculated according to the following formula:
wherein A is a corresponding spherical slice.
According to some preferred embodiments of the invention, the optical monitoring density σ in step 2) 2 The calculation of (1) comprises the following steps:
(1) let the gray image of the optical monitoring of the underwater security intrusion target be F (x, y), the horizontal gradient be F x Vertical gradient of F y The scale of the gray level image, the horizontal gradient and the vertical gradient is m multiplied by n;
(2) calculating the horizontal gradient F of the gray image F (x, y) x And a vertical gradient F y ;
(3) Let the gradient operator of the original image F (x, y) v f=f x i+F y The modulus of j isIntroducing a threshold delta to listMarking the point on the module V F & gtdelta of the gradient in the original underwater security intrusion target monitoring gray level image F (x, y) as 1 and regarding the point as the boundary point of the biomass of the monitoring area, thereby obtaining a binary image F with the point of the gradient module larger than the threshold delta in the original image as 1 1 (x,y);
(4) For sharpened image f 1 (x, y) edge detection is carried out by adopting Canny operator to obtain an image f 2 (x,y);
(5) Performing closed operation on the binary image by using morphological theory closed operation to form an image f 3 (x, y), and then to f 3 (x, y) filling holes by morphological dilation operation to obtain an image denoted as f 4 (x,y);
(6) By f 4 The number of pixels of the underwater security intrusion target is divided by the number of total pixels of the image, the duty ratio of the underwater security intrusion target in the image is calculated, and the optical monitoring density of the underwater security intrusion target of the nuclear power plant in the monitoring range is obtained, namely: sigma (sigma) 2 =f 4 (x,y)/f(x,y)。
According to some preferred embodiments of the invention, the step (2) calculates the horizontal gradient F of the gray image F (x, y) x The method comprises the following steps: let x denote any row, F x The first column element of (a) is obtained from the original image f (x, 2) -f (x, 1), the last column (nth column) is obtained from the original image f (x, n) -f (x, n-1), and the 2 nd to n-1 th columns are obtained from the formulaCalculated, where i=2, 3, …, n-1.
According to some preferred embodiments of the present invention, the edge detection in step (4) comprises the steps of: smoothing the image by using a Gaussian filter to calculate the module length and direction of the filtered image, finding out local maximum points of image gradients, setting other non-local maximum points to zero to obtain a thinned edge of the monitored image, detecting the image by using a double-threshold method and processing discontinuous edges to ensure that the edges are continuous.
According to the inventionIn some preferred embodiments, step 3) is performed by acoustically monitoring the density σ during data fusion 1 As basic data, introducing an acousto-optic composite weight variable p to obtain a reconstruction model rho=p×σ 1 The method comprises the steps of carrying out a first treatment on the surface of the Wherein the variable p is represented by sigma 2 Sum sigma 1 Ratio determination, namely: p=σ 2 /σ 1 。
According to some preferred embodiments of the invention, the variable p is defined as follows:
when p is more than or equal to 2, defining absolute enhancement, and taking the value of p as 2;
when p is less than or equal to 1.5 and less than 2, the reinforcement is defined, and the value of p is 1.5;
when p is more than or equal to 0.6 and less than 1.5, defining the values as consistent, and taking the value of p as 1;
when p is more than or equal to 0.4 and less than 0.6, the weakening is defined, and the value of p is 0.5;
when p is more than or equal to 0.2 and less than 0.4, the absolute weakening is defined, and the value of p is 0.2;
when p is less than 0.2, the detection distortion is defined as that the value of p is 0.
According to some preferred implementation aspects of the invention, a water intake pump station with highest underwater sensitivity of a nuclear power plant is taken as a protection part, and an intrusion intensity model comprising a time-space domain is constructed
The time-space domain model is an intrusion intensity monitoring model of an underwater security intrusion target of the nuclear power plant, wherein the intrusion intensity monitoring model comprises time and space elements and is related to an acousto-optic reconstruction model;
delta is the magnitude of seawater entering the water intake in the monitoring point area;
q: throughput per second;
l: the distance from the monitoring point to the nearest pump station;
v: the water flow rate;
θ: the direction angle of the water flow at the water intake at the monitoring point;
due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages: according to the monitoring method for the underwater security intrusion target of the nuclear power plant, provided by the invention, the intrusion intensity of the underwater security intrusion target of the nuclear power plant can be quantitatively monitored through a series of scientific calculations such as acoustics, optics, acousto-optic combination, time-space domain models and the like, so that guidance is provided for an automatic monitoring system of the underwater security intrusion target of the nuclear power plant.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a diagram of a general architecture of an intrusion target monitoring model for nuclear power plant underwater security in a preferred embodiment of the present invention;
FIG. 2 is a schematic slice view of sonar ranging for monitoring in a preferred embodiment of the present invention;
FIG. 3 is a flow chart of sonar data analysis and processing in a preferred embodiment of the present invention;
FIG. 4 is a graph showing the result of underwater video image processing in a preferred embodiment of the present invention;
fig. 5 is a logic diagram of the reconstruction of acousto-optic composite data in a preferred embodiment of the present invention.
Detailed Description
In order to make the technical solution of the present invention better understood by those skilled in the art, the technical solution of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Solution of the inventionThe technical problems in two aspects are solved, firstly, an evaluation model of the underwater security intrusion target is determined through a scientific method, and secondly, the underwater security intrusion target of the nuclear power plant is monitored and early-warned through systematic design, so that the security level of the nuclear power plant is improved. In order to solve the technical problems, the monitoring method for the underwater security intrusion target of the nuclear power plant mainly comprises the following steps: (1) And establishing a scientific online monitoring system, and collecting monitoring data. Through setting an online system and collecting data, a certain sample is formed in a data pool, and acoustic monitoring data body sigma is respectively constructed after data preprocessing 1 Optical monitoring data body sigma 2 Both are included as threat sample elements into the early warning model; (2) Establishing an acousto-optic monitoring reconstruction model for the acoustic monitoring data body and the optical monitoring data body by adopting a certain method, and calculating to obtain a static intrusion intensity value; (3) Through data acquisition and modeling of specific association factors such as distance, water flow speed, throughput and the like, an underwater invasion time-space domain model is built to realize dynamic monitoring, and further dynamic threat intensities (time-space domain models) of different threat samples in (2) are determined, so that a nuclear power plant is guided to develop corresponding defending work.
Further, the underwater security intrusion target monitoring system in the step (1) mainly comprises the following steps: a. the sonar monitoring equipment and the optical imaging equipment with the highest underwater monitoring accuracy are adopted for on-line monitoring and data integration, the measuring accuracy of a single sensor is improved, two kinds of fused data are associated in a fusion center, and finally decision judgment is carried out, so that a fused judgment result is used as the calculation of intrusion intensity; b. an online monitoring and early warning framework (figure 1) is established through calculation of the intrusion intensity of the monitored target.
Further, the step (2) of monitoring data acquisition and data processing mainly comprises the following steps: a. slicing distribution density meeting the RES characteristic of an intrusion target in underwater acoustic information (figure 2), and calculating acoustic monitoring density of an intruder through a model (figure 3)Through underwater optical monitoringOptical automatic monitoring data of monitoring invader by device under test, and calculating optical monitoring density sigma by model 2 =f 4 (x, y)/f (x, y) (fig. 4).
Further, the acousto-optic monitoring model reconstruction and time space domain model design in the step (3) mainly comprises the following steps: a. the acousto-optic composite data reconstruction (figure 5) is carried out, and the intrusion intensity rho=p×sigma of fusion reconstruction is obtained by judging the acousto-optic monitoring density 1 (wherein p is a eigenvalue, taking p=σ 2 /σ 1 ) The method comprises the steps of carrying out a first treatment on the surface of the b. Preferably, a time-space domain model is built by taking a water intake pump station with highest underwater sensitivity of a nuclear power plant as a protection part (wherein, delta is the magnitude of seawater entering the water intake at the monitoring point area, Q is the flux per second, L is the distance from the monitoring point to the nearest pump station, v is the water flow speed, theta is the direction angle of the water flow at the water intake at the monitoring point, and Qis the flux per second>) And (3) integrating the sound and light on-line monitoring reconstruction data and the spatial information such as the positions of the monitoring points, the water flow speed and the like, and calculating the intrusion intensity N' of the underwater security intrusion target reaching the sensitive part.
Examples
The general architecture diagram of the nuclear power plant underwater intrusion monitoring model in this embodiment is further described with reference to fig. 1. The accuracy of the nuclear power plant underwater security intrusion target is closely related to the characteristics of the intrusion target and the characteristics of the underwater environment in monitoring and early warning, so that an underwater intrusion early warning and monitoring model is built by calculating the underwater intrusion intensity, and the model framework generally comprises three layers: (1) firstly, data acquisition and fusion of different monitoring elements; (2) secondly, determining invasion conditions of superposition external factors; (3) finally, an intrusion intensity model containing a time-space domain is established, and automatic calculation of the underwater intrusion intensity of the nuclear power plant is realized in an artificial intelligence mode.
Referring to fig. 1-5, the method for monitoring an intrusion target of underwater security in a nuclear power plant in this embodiment includes the following steps:
1) Monitoring an underwater security intrusion target of a nuclear power plant through sonar monitoring equipment, and obtaining acoustic monitoring density sigma of the underwater security intrusion target 1 。
The extraction, data analysis and processing modes of the sonar monitoring result are further described with reference to fig. 2 and 3.
As shown in fig. 2, the monitoring range of the sonar monitoring device is divided into N spherical slices from a minimum radius to a maximum radius by a horizontal open angle and a longitudinal open angle, denoted as A1, A2. Diameter (De), height (He).
When the number of underwater security intrusion targets in seawater is counted, firstly counting the number of the underwater security intrusion targets on each spherical slice, and then obtaining the statistic value of the underwater security intrusion targets in a monitoring range, wherein the statistic value is shown in the following formula:
wherein:
v: sonar monitoring range sea water volume;
C i : projecting the number of underwater security intrusion targets on each spherical surface to the gray image value of each spherical surface slice, and
the model for quantitatively evaluating the underwater security intrusion target by using the sonar monitoring equipment is obtained by the method, wherein the unit is ind/m 3 The method comprises the steps of carrying out a first treatment on the surface of the The following formula is shown:
by adopting the flow of FIG. 3, the sonar data is subjected to linear interpolation and preliminary display, further subjected to pretreatment through the processes of pattern enhancement and pattern denoising, further subjected to pattern segmentation through a threshold segmentation and moving target segmentation method, further subjected to target extraction and matching through a template matching algorithm, and finally obtained the acoustic data local body sigma of the nuclear power plant underwater security intrusion target 1 Thereby realizing automatic identification of the target.
2) Monitoring an underwater security intrusion target of a nuclear power plant through optical imaging equipment, and obtaining optical monitoring density sigma of the underwater security intrusion target 2 。
The way in which the optical monitoring results are extracted, data analyzed and processed is further described in connection with fig. 4.
The method comprises the steps of carrying out underwater security intrusion target monitoring of a nuclear power plant by utilizing an underwater low-light imaging technology, carrying out binarization processing on a monitoring original gray level image by comprehensively adopting an image sharpening method, an edge detection method, a boundary closing method and a hole filling method, obtaining a target image, and finally forming a binarization image of a monitoring target object separated from a background image. The specific process is as follows:
(1) firstly, setting a gray image of optical monitoring of an underwater security intrusion target as F (x, y) and a horizontal gradient as F x Vertical gradient of F y Wherein the scale of gray image, horizontal gradient and vertical gradient is m×n.
(2) Next, a horizontal gradient F of the gray image F (x, y) is calculated x And a vertical gradient F y . Let x denote any row, F x The first column element of (a) is obtained from the original image f (x, 2) -f (x, 1), the last column (nth column) is obtained from the original image f (x, n) -f (x, n-1), and the 2 nd to n-1 th columns are obtained from the formulaCalculated, where i=2, 3, …, n-1. Similarly, the vertical gradient F of the original image F (x, y) y Calculated in a similar manner, except that the rank rules are interchanged.
(3) Again, let the gradient operator f=f of the original image F (x, y) x i+F y The modulus of j isBecause sea water visibility is different in different sea areas and the same sea area, a threshold delta is introduced to represent a sea water background environment for noise filtering, delta is larger than 0, a point on a gradient model I, F I > delta in an original underwater security intrusion target monitoring gray level image F (x, y) is marked as 1 and is regarded as a boundary point of biomass of a monitoring area, and therefore a binary image F with the point of the gradient model larger than the threshold delta in the original image marked as 1 is obtained 1 (x,y)。
(4) Then, for the sharpened image f 1 (x, y) edge detection is carried out by adopting Canny operator to obtain an image f 2 The method comprises the steps of (x, y), firstly, smoothing an image by using a Gaussian filter to calculate the module length and direction of the filtered image, then, finding out local maximum points of image gradients, setting other non-local maximum points to zero to obtain a thinned edge of a monitored image, and finally, detecting the image by using a double-threshold method and processing discontinuous edges to ensure that the edges are continuous.
(5) Finally, closing operation is carried out on the binary image by utilizing morphological theory closing operation to form an image f 3 (x, y), and then to f 3 (x, y) filling holes by morphological dilation operation to obtain an image denoted as f 4 (x,y)。
(6) The binary image f of the optical monitoring of the underwater security intrusion target is obtained through the transformation 4 (x, y) the optical monitoring characteristics of the underwater security intrusion target are marked in the image, and f is utilized 4 The ratio of the underwater security intrusion target in the image can be calculated by dividing the number of pixels of the underwater security intrusion target by the number of total pixels of the image, namely the density of the underwater security intrusion target in the nuclear power plant in the monitoring range is calculated, namely: sigma (sigma) 2 =f 4 (x,y)/f(x,y)。
3) For the acoustics of step 1)Monitoring density sigma 1 And optically monitoring the density sigma of step 2) 2 And carrying out data fusion to obtain a reconstruction model rho of the threat target.
The acousto-optic composite monitoring model monitoring method is further described with reference to fig. 5.
Although sonar is used as a reliable underwater monitoring device in more fields, due to factors such as low sonar resolution, larger influence of other clutter reflections and the like, the accuracy is lower in the process of monitoring the underwater security intrusion target of the nuclear power plant based on sonar; although the underwater camera has high precision, the high requirement on environment and the close monitoring distance determine the only means which cannot be completely relied on for monitoring. Therefore, sonar is adopted as the most main monitoring means, and the underwater camera performs secondary verification and information comparison, so that the detection result is further verified, and the detection precision is improved.
Meanwhile, as the collected images of the cameras are flattened and the field of view is smaller, two modes are adopted in the design of the underwater camera monitoring system: (1) mobile rechecking adopts an intelligent linkage type underwater robot vision detection system; (2) the fixed installation is arranged on a fixed rack or a floating platform with the same direction and the same view field angle as the sonar. The consistency of underwater intrusion targets of the water body monitored by the sonar system and the underwater camera system at the same moment is ensured, information is convenient to be identical in attribute, the weight of the visual monitoring body is introduced, and further the judgment ratio of the sonar data local body is realized, and the monitoring resource quantity is reconstructed. The method comprises the following steps:
biological density sigma monitored by sonar in acousto-optic composite process 1 As basic data, an acousto-optic composite weight variable p is introduced, wherein the variable p is formed by sigma 2 Sum sigma 1 Ratio determination, namely:
p=σ 2 /σ 1
the obtained acousto-optic composite data reconstruction model is as follows: ρ=p×σ 1 。
And to facilitate statistical calculations, the following rules are defined:
-when p is not less than 2, defined as absolute emphasis, taking p to 2;
-taking p to 1.5 when p < 2 is defined as strengthening;
-taking p to 1 when p is 0.6 < 1.5;
-taking p to be 0.5 when 0.4.ltoreq.p < 0.6 is defined as weakening;
-taking p to be 0.2 when 0.2 is less than or equal to p < 0.4, defined as absolute attenuation;
-taking p to 0 when p < 0.2 is defined as detecting distortion.
4) And (3) calculating the intrusion intensity of the underwater security intrusion target reaching the sensitive part by combining the reconstruction model in the step (3) and the space information of the monitoring point.
Taking a water intake pump station with highest underwater sensitivity of a nuclear power plant as a protection part, and constructing an intrusion intensity model comprising a time-space domain:
wherein delta is the magnitude of seawater entering the water intake in the monitoring point area;
q: throughput per second;
l: the distance from the monitoring point to the nearest pump station;
v: the water flow rate;
θ: the direction angle of the water flow at the water intake at the monitoring point;
when each nuclear power plant monitors by adopting the method, the N' value suitable for the nuclear power plant is selected according to the actual condition of the nuclear power plant structure, the early warning threshold value is determined, and further treatment work is guided to be carried out.
The invention relates to a monitoring method for an underwater security intrusion target of a nuclear power plant. The method comprises an on-line monitoring system of an underwater security intrusion target, a data reconstruction method aiming at monitoring data acquisition, a monitoring data preprocessing method, an underwater detection early warning sonar, a rechecking evidence photoelectric device, a front end sensing and processing device taking flow monitoring and the like as basic elements, a display control unit and other comprehensive defense systems, wherein the monitoring data preprocessing method comprises an acousto-optic data and space-time multidimensional monitoring early warning model.
The invention relates to a method for monitoring an intrusion target of underwater security in a nuclear power plant, which comprises the following steps: and (1) establishing an underwater security intrusion target monitoring system. The method mainly realizes the theoretical architecture of an underwater security intrusion target monitoring system of the nuclear power plant, and further scientifically guides the selection of monitoring equipment, the analysis and the processing of data and the establishment of a model; and (2) monitoring data acquisition and preprocessing. On the basis of the step (1), a certain sample is formed in a data pool through the setting of an online system, the acquisition and the pretreatment of data; the threat sample elements can be taken as threat sample elements to be incorporated into an early warning model after data pretreatment; and (3) reconstructing an acousto-optic monitoring model and designing a timely airspace model. And (3) establishing an early warning model combining acousto-optic dimension and space-time dimension, further determining threat intensities of different threat samples in the step (2), and guiding the nuclear power plant to develop corresponding defending work. The monitoring method and the built prevention system can fill the blank in the field of underwater security of the nuclear power plant and can be extended to other fields with the same or similar characteristics.
The above embodiments are only for illustrating the technical concept and features of the present invention, and are intended to enable those skilled in the art to understand the present invention and to implement the same, but are not intended to limit the scope of the present invention, and all equivalent changes or modifications made according to the spirit of the present invention should be included in the scope of the present invention.
Claims (9)
1. The monitoring method for the underwater security intrusion target of the nuclear power plant is characterized by comprising the following steps of:
1) Monitoring an underwater security intrusion target of a nuclear power plant through sonar monitoring equipment, and obtaining acoustic monitoring density sigma of the threat target 1 ;
2) Monitoring of nuclear power plant underwater security intrusion targets through optical imaging equipment and obtaining optical monitoring density sigma of threat targets 2 ;
3) Acoustic monitoring density σ for step 1) 1 And optically monitoring the density sigma of step 2) 2 Data fusion is carried out to obtain threatA target reconstruction model ρ;
4) Combining the reconstruction model and the space information in the step 3), calculating the intrusion strength of the underwater security intrusion target through the following formula;
wherein delta is the magnitude of seawater entering the water intake in the monitoring point area;
q: throughput per second;
l: the distance from the monitoring point to the nearest pump station;
v: the water flow rate;
θ: the direction angle of the water flow at the water intake at the monitoring point;
ρ is a reconstruction model;
n' is an intrusion intensity model comprising a time-space domain.
2. The monitoring method according to claim 1, wherein the acoustic monitoring density σ in step 1) is 1 The calculation is performed according to the following formula:
in which the density sigma is monitored acoustically 1 For monitoring statistics of targets within a range, the unit is ind/m 3 ;
V is the sea water volume in the sonar monitoring range;
n is the number of spherical slices dividing the monitoring range of the sonar;
m is the number of the partitioned water bodies surrounded by N spherical slices;
m, N is determined according to Max (diameter, height) of the monitored object;
C i and projecting the number of the intrusion targets to the gray image values of the spherical slices for underwater security of the spherical slices.
3. The method of monitoring according to claim 2, wherein in formula (1)The formula (1) is simplified as follows:
4. the method of monitoring according to claim 2, wherein C in formula (1) i Calculated according to the following formula:
wherein A is a corresponding spherical slice.
5. The method of monitoring according to claim 1, wherein the optical monitoring density σ in step 2) is 2 The calculation of (1) comprises the following steps:
(1) let the gray image of the optical monitoring of the underwater security intrusion target be F (x, y), the horizontal gradient be F x Vertical gradient of F y The scale of the gray level image, the horizontal gradient and the vertical gradient is m multiplied by n;
(2) calculating the horizontal gradient F of the gray image F (x, y) x And a vertical gradient F y ;
(3) Let the gradient operator of the original image f (x, y)Is +.>Introducing a threshold delta to represent the seawater background environment, wherein delta is more than 0, and modeling the gradient in the original underwater security intrusion target monitoring gray level image f (x, y)The point on the original image is marked as 1 and is regarded as the boundary point of the biomass of the monitored area, so that a binary image f with the point with the gradient modulus larger than the threshold delta marked as 1 is obtained 1 (x,y);
(4) For sharpened image f 1 (x, y) edge detection is carried out by adopting Canny operator to obtain an image f 2 (x,y);
(5) Performing closed operation on the binary image by using morphological theory closed operation to form an image f 3 (x, y), and then to f 3 (x, y) filling holes by morphological dilation operation to obtain an image denoted as f 4 (x,y);
(6) By f 4 The number of pixels of the underwater security intrusion target is divided by the number of total pixels of the image, the duty ratio of the underwater security intrusion target in the image is calculated, and the optical monitoring density of the underwater security intrusion target of the nuclear power plant in the monitoring range is obtained, namely: sigma (sigma) 2 =f 4 (x,y)/f(x,y)。
6. The method according to claim 5, wherein the step (2) calculates a horizontal gradient F of the gray image F (x, y) x The method comprises the following steps: let x denote any row, F x The first column element of (a) is obtained from the original image f (x, 2) -f (x, 1), the last column (nth column) is obtained from the original image f (x, n) -f (x, n-1), and the 2 nd to n-1 th columns are obtained from the formulaCalculated, where i=2, 3, …, n-1.
7. The method of monitoring according to claim 5, wherein the edge detection in step (4) comprises the steps of: smoothing the image by using a Gaussian filter to calculate the module length and direction of the filtered image, finding out local maximum points of image gradients, setting other non-local maximum points to zero to obtain a thinned edge of the monitored image, detecting the image by using a double-threshold method and processing discontinuous edges to ensure that the edges are continuous.
8. The method of claim 5, wherein the step 3) is performed with data fusion, and the density σ is monitored acoustically 1 Introducing an acousto-optic composite weight variable p on the basis of (1) to obtain a reconstruction model rho=p×sigma 1 The method comprises the steps of carrying out a first treatment on the surface of the Wherein the variable p is represented by sigma 2 Sum sigma 1 Ratio determination, namely: p=σ 2 /σ 1 。
9. The method of monitoring according to claim 8, wherein the variable p is defined as follows:
when p is more than or equal to 2, defining absolute enhancement, and taking the value of p as 2;
when p is less than or equal to 1.5 and less than 2, the reinforcement is defined, and the value of p is 1.5;
when p is more than or equal to 0.6 and less than 1.5, defining the values as consistent, and taking the value of p as 1;
when p is more than or equal to 0.4 and less than 0.6, the weakening is defined, and the value of p is 0.5;
when p is more than or equal to 0.2 and less than 0.4, the absolute weakening is defined, and the value of p is 0.2;
when p is less than 0.2, the detection distortion is defined as that the value of p is 0.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110217061.3A CN112967302B (en) | 2021-02-26 | 2021-02-26 | Monitoring method for underwater security intrusion target of nuclear power plant |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110217061.3A CN112967302B (en) | 2021-02-26 | 2021-02-26 | Monitoring method for underwater security intrusion target of nuclear power plant |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112967302A CN112967302A (en) | 2021-06-15 |
CN112967302B true CN112967302B (en) | 2024-04-05 |
Family
ID=76275983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110217061.3A Active CN112967302B (en) | 2021-02-26 | 2021-02-26 | Monitoring method for underwater security intrusion target of nuclear power plant |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112967302B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001320699A (en) * | 2000-02-28 | 2001-11-16 | Hitachi Kokusai Electric Inc | Intruded object monitoring method and intruded object monitoring system |
CN102930682A (en) * | 2012-10-09 | 2013-02-13 | 清华大学 | Intrusion detection method based on displacement of light spot patterns |
CN104272184A (en) * | 2012-03-08 | 2015-01-07 | 科磊股份有限公司 | Detection of thin lines for selective sensitivity during reticle inspection using processed images |
CN105223937A (en) * | 2015-10-26 | 2016-01-06 | 河海大学 | Hydropower Stations ecological regulation and control intelligent control system and method |
CN106226770A (en) * | 2016-08-30 | 2016-12-14 | 阳江核电有限公司 | Environmental monitoring system under nuclear plant water intaking saliva |
CN106441434A (en) * | 2016-10-09 | 2017-02-22 | 苏州热工研究院有限公司 | Detection and early warning system of cold-source marine site of nuclear power plant |
CN108099959A (en) * | 2018-01-26 | 2018-06-01 | 山西省自动化研究所 | Foreign body intrusion intellectual monitoring alarm system |
CN108230302A (en) * | 2017-12-21 | 2018-06-29 | 岭东核电有限公司 | A kind of nuclear power plant's low-temperature receiver marine site invasion marine organisms detection and method of disposal |
CN108492323A (en) * | 2018-01-18 | 2018-09-04 | 天津大学 | Merge the Submerged moving body detection and recognition methods of machine vision and the sense of hearing |
CN109087470A (en) * | 2018-07-19 | 2018-12-25 | 广州市捍御者信息科技有限公司 | Monitoring instruction system and method for monitoring instruction |
CN112288977A (en) * | 2019-11-11 | 2021-01-29 | 中国人民解放军海军工程大学 | Early warning method and system for precisely-positioned underwater security and protection blocking net |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101794733B1 (en) * | 2011-12-26 | 2017-11-09 | 한국전자통신연구원 | Security and intrusion monitoring system based on the detection of sound variation pattern and the method |
-
2021
- 2021-02-26 CN CN202110217061.3A patent/CN112967302B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001320699A (en) * | 2000-02-28 | 2001-11-16 | Hitachi Kokusai Electric Inc | Intruded object monitoring method and intruded object monitoring system |
CN104272184A (en) * | 2012-03-08 | 2015-01-07 | 科磊股份有限公司 | Detection of thin lines for selective sensitivity during reticle inspection using processed images |
CN102930682A (en) * | 2012-10-09 | 2013-02-13 | 清华大学 | Intrusion detection method based on displacement of light spot patterns |
CN105223937A (en) * | 2015-10-26 | 2016-01-06 | 河海大学 | Hydropower Stations ecological regulation and control intelligent control system and method |
CN106226770A (en) * | 2016-08-30 | 2016-12-14 | 阳江核电有限公司 | Environmental monitoring system under nuclear plant water intaking saliva |
CN106441434A (en) * | 2016-10-09 | 2017-02-22 | 苏州热工研究院有限公司 | Detection and early warning system of cold-source marine site of nuclear power plant |
CN108230302A (en) * | 2017-12-21 | 2018-06-29 | 岭东核电有限公司 | A kind of nuclear power plant's low-temperature receiver marine site invasion marine organisms detection and method of disposal |
CN108492323A (en) * | 2018-01-18 | 2018-09-04 | 天津大学 | Merge the Submerged moving body detection and recognition methods of machine vision and the sense of hearing |
CN108099959A (en) * | 2018-01-26 | 2018-06-01 | 山西省自动化研究所 | Foreign body intrusion intellectual monitoring alarm system |
CN109087470A (en) * | 2018-07-19 | 2018-12-25 | 广州市捍御者信息科技有限公司 | Monitoring instruction system and method for monitoring instruction |
CN112288977A (en) * | 2019-11-11 | 2021-01-29 | 中国人民解放军海军工程大学 | Early warning method and system for precisely-positioned underwater security and protection blocking net |
Non-Patent Citations (1)
Title |
---|
提升核电厂冷源安全性的海生物探测技术研究;李建文;刘笑麟;张锦飞;孟亚辉;;电力安全技术;20171015(第10期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112967302A (en) | 2021-06-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110223302B (en) | Ship multi-target detection method based on rotation region extraction | |
CN108230302B (en) | Detection and disposal method for marine organism invading from cold source sea area of nuclear power plant | |
Li et al. | Towards automatic power line detection for a UAV surveillance system using pulse coupled neural filter and an improved Hough transform | |
CN103984961B (en) | A kind of image detecting method for being used to detect underbody foreign matter | |
Zhang et al. | Target detection of forward-looking sonar image based on improved YOLOv5 | |
CN107818326A (en) | A kind of ship detection method and system based on scene multidimensional characteristic | |
CN107808383B (en) | Rapid detection method for SAR image target under strong sea clutter | |
CN106845364B (en) | Rapid automatic target detection method | |
CN105354541A (en) | SAR (Synthetic Aperture Radar) image target detection method based on visual attention model and constant false alarm rate | |
CN106170819A (en) | A kind of diameter radar image Ship Target method for quick | |
CN111046880A (en) | Infrared target image segmentation method and system, electronic device and storage medium | |
CN109711322A (en) | A kind of people's vehicle separation method based on RFCN | |
CN106530281A (en) | Edge feature-based unmanned aerial vehicle image blur judgment method and system | |
Tang et al. | Research on infrared ship detection method in sea-sky background | |
CN106778540A (en) | Parking detection is accurately based on the parking event detecting method of background double layer | |
CN110298410A (en) | Weak target detection method and device in soft image based on deep learning | |
CN111915649A (en) | Strip steel moving target tracking method under shielding condition | |
CN108596151A (en) | Ship Target is sliced rapid extracting method in a kind of large scene SAR image | |
CN112967302B (en) | Monitoring method for underwater security intrusion target of nuclear power plant | |
CN107369163B (en) | Rapid SAR image target detection method based on optimal entropy dual-threshold segmentation | |
CN116740125A (en) | Detection method for realizing visualization of transparent fluid based on light refraction and deep learning | |
CN107886049B (en) | Visibility recognition early warning method based on camera probe | |
CN115761563A (en) | River surface flow velocity calculation method and system based on optical flow measurement and calculation | |
Abdulmunim et al. | Propose a mixture edge detection method for infrared image segmentation | |
Li et al. | A Deep Learning based Method for Microscopic Object Localization and Classification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |