CN113156425A - Millimeter wave radar boundary intrusion data processing method based on big data - Google Patents

Millimeter wave radar boundary intrusion data processing method based on big data Download PDF

Info

Publication number
CN113156425A
CN113156425A CN202110448833.4A CN202110448833A CN113156425A CN 113156425 A CN113156425 A CN 113156425A CN 202110448833 A CN202110448833 A CN 202110448833A CN 113156425 A CN113156425 A CN 113156425A
Authority
CN
China
Prior art keywords
data
alarm
original
millimeter wave
wave radar
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110448833.4A
Other languages
Chinese (zh)
Inventor
廖必凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avic Smart Technology Chengdu Co ltd
Original Assignee
Avic Smart Technology Chengdu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avic Smart Technology Chengdu Co ltd filed Critical Avic Smart Technology Chengdu Co ltd
Priority to CN202110448833.4A priority Critical patent/CN113156425A/en
Publication of CN113156425A publication Critical patent/CN113156425A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/886Radar or analogous systems specially adapted for specific applications for alarm systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a millimeter wave radar periphery intrusion data processing method based on big data, which is realized in a specific mode that an original database is established, collected data is compared and judged with the original data, preliminary data classification is carried out, data which is confirmed to be safe is supplemented into the original database, uncertain data is divided into suspicious data, unsafe data is divided into alarm data, repeated supplementary learning is carried out on data which is detected by a millimeter wave radar in real time, and the original database and an alarm database are perfected. The invention continuously expands and stores the original data, provides more and more comparison data for the subsequent data discrimination processing, and also provides more and more alarm data, so that the data acquisition and comparison of the intrusion system are more and more perfect, the probability of false data alarm is reduced, and the accuracy of the discrimination of the intrusion data system is improved.

Description

Millimeter wave radar boundary intrusion data processing method based on big data
Technical Field
The invention relates to the technical field of radar scanning early warning of a surrounding defense area, in particular to a millimeter wave radar surrounding intrusion data processing method based on big data.
Background
For the enclosure defense area with the safety detection requirement, a corresponding detection monitoring system needs to be established. At present, a surrounding intrusion system based on a millimeter wave radar, a vibration optical cable, a vibration sensor or a capacitance disturbance type cable is applied to detection of a surrounding defense area, and in order to guarantee timeliness of intrusion alarm, data processing equipment of the system is completely placed on the site so as to realize real-time processing of surrounding intrusion sensing data, but the processing mode has the following problems: 1. the sensing data of the surrounding area is not deeply analyzed and judged, so that the misinformation and the reportation data are high; 2. the data processing equipment cannot be automatically configured according to the change of the environment and the service cycle, so that the service life of the system is not long.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the millimeter wave radar boundary intrusion data processing method based on the big data is provided, and the data acquisition and processing database is completed by continuously supplementing and checking the data of the surrounding boundary of the defense area, so that false alarms are reduced, and the accuracy of intrusion data discrimination and alarm is improved.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a millimeter wave radar periphery intrusion data processing method based on big data comprises the following steps:
s1: acquiring original data of the boundary edge nodes through a millimeter wave radar, and uploading the original data to a data layer for storage;
s2: detecting and collecting real-time data of the boundary edge nodes, and uploading the real-time data to a data layer to perform comparative analysis with original stored data; if the data is the same as the original data, judging the data to be normal; if the difference exists between the data and the original data, the data is marked as data needing alarming, and alarming is carried out;
s3: manually checking the data needing to be alarmed in the step S2 to determine whether the data is normal, and if the data is normal, removing the alarm and storing and supplementing the data to form original data; if the data is abnormal, the detection data is marked as abnormal data, the characteristics of the abnormal data are stored, and the characteristic alarm of the abnormal data is set;
s4: and repeating the steps S2-S3, and continuously supplementing the original database and marking abnormal data.
Further, the abnormal data in step S3 is divided into suspicious data and alarm data, and different types of feature alarm settings are performed for different data types.
Further, checking and confirming the suspicious data, if the suspicious data is confirmed to be safe data, storing the suspicious data into original data, and removing characteristic alarm; if the data is confirmed to be unsafe data, the data is stored as alarm data and is set as a characteristic alarm of the alarm data.
Furthermore, a database is established for the service life of the millimeter radar wave equipment, the corresponding service life is set, and after the equipment reaches the service life, the data collected by the equipment is checked and judged regularly, so that the accuracy of data collection is ensured.
Further, data parameters of the data collected by the millimeter wave radar equipment under different weather conditions are subjected to characteristic marking and storage.
Compared with the prior art, the invention has the following beneficial effects:
(1) according to the invention, firstly, data acquired for the first time at the edge of a surrounding defense area is stored as original data through a millimeter wave radar, the data acquired later is discriminated and stored, the data is distinguished and classified, normal and safe data is supplemented into an original database, the original data is continuously expanded and stored, more and more comparison data are provided for subsequent data distinguishing processing, the data acquisition and comparison of an intrusion system are more and more perfect, the probability of false alarm of the data is reduced, and the accuracy of distinguishing the intrusion data system is improved.
(2) According to the invention, collected data are screened and reasonably classified, and corresponding characteristic alarm is set for the data of the same class, so that the accuracy and intelligence of intrusion system discrimination are further improved.
Drawings
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The present invention will be further described with reference to the following description and examples, which include but are not limited to the following examples.
As shown in fig. 1:
when the data processing and analyzing method is realized, a distributed layout mode is adopted, a plurality of millimeter wave radar devices are arranged at edge nodes of a surrounding defense area, after detection devices are arranged, data acquired for the first time are used as original data for judging whether foreign objects invade, the original data comprise reflected wave band data and the like acquired by millimeter wave radar detection, and original storage data are obtained by storing data of the difference due to the fact that wave bands transmitted and received by the millimeter wave radars of different objects or living bodies are different.
After the collection and storage of the original data are completed, real-time detection and monitoring are carried out on the boundary edge through millimeter wave radar equipment, the detected data are matched and compared with the data of the original storage, when the monitored data are found to be not matched with the original data or have differences, alarm prompt is carried out, monitoring personnel carry out preliminary judgment on the invaded data according to the alarm prompt, if the data can distinguish that the data belong to safe invasion data through simple judgment, the data are confirmed to be safe invasion data, the data are supplemented and stored into the original database, the data serve as the original database at the present stage, the invasion data are continuously detected and supplemented in the same way, and the original database is continuously perfected.
When the data cannot be determined to be safe through preliminary judgment, the data is divided into suspicious data to wait for further confirmation; if the data intrusion is determined to be unsafe through preliminary judgment, the data is divided into alarm data, the characteristic value of the intrusion data is recorded, characteristic alarm is set for the characteristic value, if the data is detected again next time, alarm prompt is directly carried out to remind personnel of the intrusion of dangerous data information, and the personnel prepare for emergency protection.
And finally confirming the specific condition of the data in a background or field real-time confirmation mode for the data classified as suspicious through preliminary judgment, supplementing the data into the original database if the data is finally confirmed to be the safety data, removing the alarm, automatically defaulting the data to be the safety data if the data is detected again next time, and not prompting the alarm. If the data are finally determined to be unsafe data, the data are directly divided into the data needing to be alarmed, corresponding characteristic alarming is set similarly, if the data are detected again next time, alarming prompt is directly carried out, personnel are reminded of dangerous data information intrusion, and the personnel are ready for emergency protection. By continuously judging the intrusion data, the intrusion data are increased, and the original data are supplemented and perfected, so that the alarm accuracy of the intrusion system is gradually improved.
Because the millimeter radar wave reflection characteristics are different under different weather conditions, a database under corresponding weather conditions can be established according to different weather conditions, and the consistency of radar data under different weather conditions is found out through continuous data accumulation to form a weather theme; and judging the intruding data according to different weather themes, thereby improving the accuracy of interpretation. Meanwhile, data loss and functional equipment decline can occur to the equipment according to the service life, and data analysis and judgment need to be made to the whole period of the equipment and uploaded to the cloud. Due to different investment time of the radars and the terminals in each defense area, early warning marks are made for the equipment and the terminals which reach the service life.
The invention is illustrated below by way of example of an early warning enclosure for an airport:
the airport early warning enclosure system is 100M of one monitoring point, 1 point of four scanning devices and one matched early warning processing device. Assuming that the diameter of an airport is 10 kilometers and the airport is divided into four areas AB, C and D, under the existing early warning system, a section of unknown biological wave band appears in the area A and breaks into the range of the boundary, and early warning appears; the early warning is cancelled after the cat is checked to be a cat; after 10 minutes, the cat enters zone B from another entrance, the zone B alarm will simultaneously sound again and the personnel will need to recheck for the intruder. Repeated alarms, false data reports, missed reports, and the like often occur.
The specific technical scheme of the technology is as follows: through data distributed processing, initial data acquired by various regions are stored to the cloud, and the data are divided into three data layers, namely original data, suspicious data and alarm data. If the band of a cat entering the area a is S1, the original data S1 is a cat, and the data is simultaneously transferred to the processing terminal devices of the areas, and then when all areas of the area AB C D enter a cat again, the early warning system refers to the original data for reference and comparison, and then determines as safety data, so that no false alarm or false report occurs. The first level is mutual defense area learning, and an original database is established. Then, after screening, the special, unreferenced and unreterminable data are listed in a suspicious database; the wave bands which can be directly judged as the invasion can be uploaded and learned, an alarm database is established, and the alarm accuracy of the early warning system is improved.
The above-mentioned embodiment is only one of the preferred embodiments of the present invention, and should not be used to limit the scope of the present invention, but all the insubstantial modifications or changes made within the spirit and scope of the main design of the present invention, which still solve the technical problems consistent with the present invention, should be included in the scope of the present invention.

Claims (5)

1. A millimeter wave radar periphery intrusion data processing method based on big data is characterized in that: the method comprises the following steps:
s1: acquiring original data of the boundary edge nodes through a millimeter wave radar, and uploading the original data to a data layer for storage;
s2: detecting and collecting real-time data of the boundary edge nodes, and uploading the real-time data to a data layer to perform comparative analysis with original stored data; if the data is the same as the original data, judging the data to be normal; if the difference exists between the data and the original data, the data is marked as the data needing alarming, and alarming is carried out;
s3: manually checking the data needing to be alarmed in the step S2 to determine whether the data is normal, and if the data is normal, removing the alarm and storing and supplementing the data to form original data; if the data is abnormal, the detection data is marked as abnormal data, the characteristics of the abnormal data are stored, and the characteristic alarm of the abnormal data is set;
s4: and repeating the steps S2-S3, and continuously supplementing the original database and marking abnormal data.
2. The millimeter wave radar periphery intrusion data processing method based on the big data as claimed in claim 1, wherein: the abnormal data in step S3 is divided into suspicious data and alarm data, and different types of feature alarm settings are performed for different data types.
3. The millimeter wave radar periphery intrusion data processing method based on the big data as claimed in claim 2, wherein: checking and confirming the suspicious data, if the suspicious data is confirmed to be safe data, storing the suspicious data into original data, and removing characteristic alarm; if the data is confirmed to be unsafe data, the data is stored as alarm data and is set as a characteristic alarm of the alarm data.
4. The millimeter wave radar periphery intrusion data processing method based on the big data as claimed in claim 3, wherein: and establishing a database for the service life of the millimeter radar wave equipment, setting corresponding service life, and periodically checking and judging the data acquired by the equipment after the equipment reaches the service life, so as to ensure the accuracy of data acquisition.
5. The millimeter wave radar periphery intrusion data processing method based on the big data as claimed in claim 4, wherein: and carrying out characteristic marking and storage on data parameters of the data acquired by the millimeter wave radar equipment under different weather conditions.
CN202110448833.4A 2021-04-25 2021-04-25 Millimeter wave radar boundary intrusion data processing method based on big data Pending CN113156425A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110448833.4A CN113156425A (en) 2021-04-25 2021-04-25 Millimeter wave radar boundary intrusion data processing method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110448833.4A CN113156425A (en) 2021-04-25 2021-04-25 Millimeter wave radar boundary intrusion data processing method based on big data

Publications (1)

Publication Number Publication Date
CN113156425A true CN113156425A (en) 2021-07-23

Family

ID=76870336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110448833.4A Pending CN113156425A (en) 2021-04-25 2021-04-25 Millimeter wave radar boundary intrusion data processing method based on big data

Country Status (1)

Country Link
CN (1) CN113156425A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000338231A (en) * 1999-05-31 2000-12-08 Mitsubishi Electric Corp Intruder detecting device
CN103235303A (en) * 2013-04-22 2013-08-07 常州工学院 Millimeter wave radar sensor for circumference intrusion prevention system
CN103258400A (en) * 2013-04-22 2013-08-21 常州工学院 Millimeter wave wireless sensing perimeter anti-invasion system and method thereof
CN104376665A (en) * 2014-11-28 2015-02-25 中国电子科技集团公司第二十八研究所 Monitoring node of perimeter protection system of wireless sensor network
US20160307418A1 (en) * 2013-12-13 2016-10-20 Utc Fire & Security Americas Corporation, Inc. Selective intrusion detection systems
US20170243472A1 (en) * 2014-08-05 2017-08-24 Overview Technologies, Inc. Community Security System Using Intelligent Information Sharing
CN108765832A (en) * 2018-07-06 2018-11-06 厦门信通慧安科技有限公司 A kind of intrusion detection method and device
KR101927364B1 (en) * 2017-12-13 2018-12-10 주식회사 에스원 Outside Intruding and Monitering Radar Syatem Based on Deep -Learning and Method thereof
CN208855646U (en) * 2018-09-21 2019-05-14 中铁电气化局集团有限公司 A kind of high-speed railway circumference intrusion alarm system
CN110706436A (en) * 2019-08-23 2020-01-17 珠海格力电器股份有限公司 Radar-based monitoring method, terminal and computer-readable medium
CN111028452A (en) * 2019-12-20 2020-04-17 云南电网有限责任公司保山供电局 Transformer substation foreign matter intrusion monitoring system and method
CN111127800A (en) * 2019-11-12 2020-05-08 西安电子科技大学青岛计算技术研究院 Real-time alarm method for regional intrusion based on combination of millimeter wave radar and alarm
CN111540154A (en) * 2020-04-01 2020-08-14 海信(山东)空调有限公司 Air conditioner and security control method of air conditioner
CN112150748A (en) * 2020-09-08 2020-12-29 成都红云鼎科技有限公司 Perimeter precaution alarm system based on millimeter wave radar

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000338231A (en) * 1999-05-31 2000-12-08 Mitsubishi Electric Corp Intruder detecting device
CN103235303A (en) * 2013-04-22 2013-08-07 常州工学院 Millimeter wave radar sensor for circumference intrusion prevention system
CN103258400A (en) * 2013-04-22 2013-08-21 常州工学院 Millimeter wave wireless sensing perimeter anti-invasion system and method thereof
US20160307418A1 (en) * 2013-12-13 2016-10-20 Utc Fire & Security Americas Corporation, Inc. Selective intrusion detection systems
US20170243472A1 (en) * 2014-08-05 2017-08-24 Overview Technologies, Inc. Community Security System Using Intelligent Information Sharing
CN104376665A (en) * 2014-11-28 2015-02-25 中国电子科技集团公司第二十八研究所 Monitoring node of perimeter protection system of wireless sensor network
KR101927364B1 (en) * 2017-12-13 2018-12-10 주식회사 에스원 Outside Intruding and Monitering Radar Syatem Based on Deep -Learning and Method thereof
CN108765832A (en) * 2018-07-06 2018-11-06 厦门信通慧安科技有限公司 A kind of intrusion detection method and device
CN208855646U (en) * 2018-09-21 2019-05-14 中铁电气化局集团有限公司 A kind of high-speed railway circumference intrusion alarm system
CN110706436A (en) * 2019-08-23 2020-01-17 珠海格力电器股份有限公司 Radar-based monitoring method, terminal and computer-readable medium
CN111127800A (en) * 2019-11-12 2020-05-08 西安电子科技大学青岛计算技术研究院 Real-time alarm method for regional intrusion based on combination of millimeter wave radar and alarm
CN111028452A (en) * 2019-12-20 2020-04-17 云南电网有限责任公司保山供电局 Transformer substation foreign matter intrusion monitoring system and method
CN111540154A (en) * 2020-04-01 2020-08-14 海信(山东)空调有限公司 Air conditioner and security control method of air conditioner
CN112150748A (en) * 2020-09-08 2020-12-29 成都红云鼎科技有限公司 Perimeter precaution alarm system based on millimeter wave radar

Similar Documents

Publication Publication Date Title
CN109765539B (en) Indoor user behavior monitoring method and device, electrical equipment and home monitoring system
US6525658B2 (en) Method and device for event detection utilizing data from a multiplicity of sensor sources
US20080024321A1 (en) Methods, apparatus, and systems for monitoring transmission systems
US20090201146A1 (en) Remote activity detection or intrusion monitoring system
CN111520192B (en) Non-contact tunnel engineering construction rock burst real-time forecasting optimization method
CN110070155B (en) Comprehensive behavior recognition method and system for prisoner based on wearable equipment
US20070096896A1 (en) System and method for securing an infrastructure
CN106355580B (en) Method and device for detecting toppling of tower
CN110801593B (en) Extremely early fire early warning system and method fusing multi-mode data
CN111507310B (en) Method for identifying artificial cable touching operation signals in optical cable channel based on phi-OTDR
CN111047815A (en) Method and system for identifying false alarm of fire-fighting detector based on self-learning model
CN112757300A (en) Robot protection system and method
CN112258362B (en) Dangerous source identification method, system and readable storage medium
CN113206978A (en) Security intelligent monitoring early warning system and method for oil and gas pipeline station
CN113156425A (en) Millimeter wave radar boundary intrusion data processing method based on big data
CN116721508A (en) External intrusion monitoring and early warning method based on fiber seismometer array technology
CN110131590B (en) Pipeline monitoring method and device based on mobile terminal position data
CN115294709A (en) Optical fiber vibration monitoring model, precaution system, electronic equipment and storage medium
CN214376017U (en) Power equipment fault inspection system
CN114314243A (en) Elevator overload alarm system and method based on video identification technology
CN113971861A (en) Intelligent fire monitoring system based on Internet of things
CN110956770A (en) Library network anti-theft system and use method thereof
CN116455944B (en) Assembly type building monitoring and early warning method and system based on Internet of things acquisition
CN107204106B (en) Alarm method and system for filtering false alarm condition in security system
CN111563270A (en) Nuclear power plant digital security threat studying and judging system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination