CN113239757B - Leaky cable detection method and system, storage medium and intelligent terminal - Google Patents

Leaky cable detection method and system, storage medium and intelligent terminal Download PDF

Info

Publication number
CN113239757B
CN113239757B CN202110470247.XA CN202110470247A CN113239757B CN 113239757 B CN113239757 B CN 113239757B CN 202110470247 A CN202110470247 A CN 202110470247A CN 113239757 B CN113239757 B CN 113239757B
Authority
CN
China
Prior art keywords
information
identification
current
leaky cable
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110470247.XA
Other languages
Chinese (zh)
Other versions
CN113239757A (en
Inventor
孙晋敏
刘婧
蒋锐
刘旦捷
郭行
刘颖
陈新晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Skysoft Tech Co ltd
Original Assignee
Ningbo Skysoft Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Skysoft Tech Co ltd filed Critical Ningbo Skysoft Tech Co ltd
Priority to CN202110470247.XA priority Critical patent/CN113239757B/en
Publication of CN113239757A publication Critical patent/CN113239757A/en
Application granted granted Critical
Publication of CN113239757B publication Critical patent/CN113239757B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/55Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/5866Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, manually generated location and time information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/25Determination of region of interest [ROI] or a volume of interest [VOI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching

Abstract

The application relates to a leaky cable detection method, a system, a storage medium and an intelligent terminal, which relate to the field of cable detection and comprise the steps of obtaining current detection information in a leaky cable at the current section; judging whether the current detection information is consistent with preset reference information or not; if the current detection information is inconsistent with the reference information, calculating difference information between the current detection information and the reference information; finding out an attenuation coefficient from a preset attenuation database according to the difference information; assigning a preset camera to perform image recognition on the leaky cable according to the attenuation coefficient and outputting image detection information; judging whether the image detection information is consistent with preset damage information or not; and if the image information is consistent with the image information, acquiring the position of the current image information to calculate the damage distance. This application has the detection accuracy that improves the cable, improves detection efficiency's effect.

Description

Leaky cable detection method and system, storage medium and intelligent terminal
Technical Field
The present application relates to the field of cable detection, and in particular, to a leaky cable detection method, system, storage medium, and intelligent terminal.
Background
The leaky cable is a leaky cable coaxial cable for short and is also called a leaky cable. The leakage cable is composed of an inner conductor, an insulating medium and an outer conductor with periodic slotted holes.
In the related art, for example, chinese patent No. CN109541390B, a method for detecting cable breakage belongs to the technical field of ship building. The method comprises the following steps: s1, confirming the reason of the cable damage, S1.1, judging whether the short circuit occurs between the core wire A and the core wire B, S1.2, judging whether the short circuit occurs between the core wire and the shield; s1.3, judging whether a cable has an end circuit; s2, the position of short circuit between the A core wire and the B core wire is checked, S3, the position of short circuit between the A core wire and the shield is checked, and S4, the position of short circuit between the B core wire and the shield is checked. Adopt portable magnetic field direction finder to detect the cable damaged point, need not demolish the cable ligature area and will be whole bundle of cable separately, also can accurate inspection to the damaged department of cable of burying in the cable cross cabin spare.
In view of the above related technologies, the inventor believes that once a leaky cable is damaged due to operations such as dragging during use, a manual method of detecting the leaky cable one by one is adopted, which is time-consuming and labor-consuming, and has a room for improvement.
Disclosure of Invention
In order to improve the detection accuracy of the cable and improve the detection efficiency, the application provides a leaky cable detection method, a system, a storage medium and an intelligent terminal.
In a first aspect, the present application provides a leaky cable detection method, which adopts the following technical scheme:
a leaky cable detection method, comprising:
acquiring current detection information in a leaky cable of a current section;
judging whether the current detection information is consistent with preset reference information or not;
if the current detection information is inconsistent with the reference information, calculating difference information between the current detection information and the reference information;
finding out an attenuation coefficient from a preset attenuation database according to the difference information;
assigning a preset camera to perform image recognition on the leaky cable according to the attenuation coefficient and outputting image detection information;
judging whether the image detection information is consistent with preset damage information or not;
and if the image information is consistent with the image information, acquiring the position of the current image information to calculate the damage distance.
By adopting the technical scheme, the current detection information is judged by acquiring the current detection information, so that whether damage exists or not is detected, the attenuation coefficient is obtained by calculating the difference information, the condition that the camera identifies the cable leakage is assigned, the damaged position is accurately positioned and known, the detection accuracy of the cable is improved, and the detection efficiency is improved.
Optionally, the detection position of the leaky cable is segmented, and the detection method for the single-segment damaged section in the leaky cable includes:
acquiring current detection information of a current leaky cable and a current identification position of each section of leaky cable;
sequentially receiving current detection information at different identification positions from a signal receiving direction to a signal transmitting direction, and sequentially judging whether the signal intensity of the current detection information is consistent with the intensity corresponding to the preset identification position;
if the current detection information is inconsistent with the preset intensity corresponding to the identification position, the current detection information of the next identification position is obtained in the signal emission direction, and if the signal intensity of the current detection information is consistent with the preset intensity corresponding to the identification position, the identification position is recorded as a starting point;
a next recognition position in the signal transmission direction with the starting point as a base point to output recognition information;
if the identification position of the transmitted identification information is consistent with the identification information of the next identification position, taking the position of the transmitted identification information as an end point;
and confirming the damaged section in the leaky cable according to the starting point and the ending point.
By adopting the technical scheme, the identification position is known, so that the judgment is carried out according to the signal receiving direction to the signal transmitting direction, the starting point and the terminal point in the leaky cable are judged, and the damaged section in the leaky cable is defined.
Optionally, if the identification position of the transmission identification information is inconsistent with the identification information of the next identification position, the method for determining the end point includes:
taking the next identification position as a middle point and transmitting identification information along the signal transmitting direction;
judging whether the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position;
if the intermediate points are consistent, the intermediate points are used as end points;
if not, the receiving point is used as an intermediate point to repeatedly send the identification information until the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position, and the intermediate point is used as an end point.
By adopting the technical scheme, in the process of identification, once the identification information is inconsistent, the intermediate point is judged, so that the position of the terminal point is adjusted, and the accuracy of integral leaky cable identification is improved.
Optionally, if there are multiple sections in the damaged section of the leaky cable, the method for detecting multiple sections includes:
transmitting the identification information to a signal receiving direction according to the destination;
if the signal receiving point receives the identification information, the damaged end is only one section;
if the signal receiving point does not receive the identification information, a plurality of sections of damage exist, the identification information is transmitted to the receiving end by taking the terminal point as the transmitting point, and the detection is repeated according to the identification method of the single section of the damaged section until another damaged section is obtained;
and transmitting the identification information to the signal receiving direction according to the end point in the other damaged section until the signal receiving point receives the identification information to obtain the multi-section damaged section.
By adopting the technical scheme, in the detection process, once the multiple sections of damage occurs, the signal is sent to the positions of the end point and the starting point, so that whether the multiple sections of damage exist or not is determined, and the overall detection accuracy is further improved.
Optionally, the method for verifying the identification information includes:
searching out a current number from a preset encryption database according to the current signal transmitting position and loading the current number into the identification information;
decoding a current number from the identification information received by the current receiving position, and substituting the current number into a receiving function preset by the current receiving position to calculate a feedback value;
sending the feedback value to the transmitting position, and substituting the feedback value into the transmitting position to calculate a check value from a preset transmitting function;
if the check value is consistent with the serial number, the check is finished; otherwise, prompt is carried out.
By adopting the technical scheme, in the process of judging the identification information, the identification information is transmitted in an encrypted mode through the number in order to improve the overall accuracy, and is calculated by matching with the function so as to return the check value and compare the check value, so that the overall accuracy is improved.
Optionally, the method for acquiring image detection information includes:
acquiring current image display information of a current camera;
controlling the camera to move at a constant speed according to the length direction of the leaky cable, and storing the current image display information in real time to generate a long image;
and extracting the detection range of the leaky cable from the long image according to the preset leaky cable characteristic information to generate image detection information.
By adopting the technical scheme, the information of the current image is displayed through the camera, and meanwhile, the whole image is collected in the process of uniform motion so as to generate a long image, so that the image detection information is generated for judgment.
Optionally, the method for assigning the attenuation coefficient to the camera includes:
acquiring current position information of a current camera;
finding out distance information from a preset attenuation database according to the current attenuation coefficient and defining an identification point;
calculating the distance between the current position information and the identification point, and arranging the distances in a reverse order;
and screening the camera closest to the identification point and assigning the camera to the identification point.
By adopting the technical scheme, the position of the current camera is acquired, and the recognition point is known, so that the camera closest to the recognition point is calculated, the closest camera is assigned to go to recognition, and the practicability is high.
In a second aspect, the present application provides a leaky cable detection system, which adopts the following technical solutions:
a leaky cable detection system comprising:
the acquisition module is used for acquiring current detection information in the leaky cable at the current section;
the information judgment module is used for judging whether the current detection information is consistent with the preset reference information;
the image judging module is used for judging whether the image detection information is consistent with the preset damage information;
the processing module is connected with the acquisition module, the information judgment module and the image judgment module;
if the current detection information is inconsistent with the reference information, the processing module calculates difference information between the current detection information and the reference information, searches an attenuation coefficient from a preset attenuation database according to the difference information, and assigns a preset camera to perform image identification on the leaky cable according to the attenuation coefficient and outputs image detection information;
if the image detection information is consistent with the preset damage information, the processing module acquires the position of the current image information to calculate the damage distance.
By adopting the technical scheme, the current detection information is judged by acquiring the current detection information, so that whether damage exists or not is detected, the attenuation coefficient is obtained by calculating the difference information, the camera is assigned to identify the condition of the leaking cable, the damaged position is accurately positioned and known, the detection accuracy of the cable is improved, and the detection efficiency is improved.
In a third aspect, the present application provides an intelligent terminal, which adopts the following technical scheme:
an intelligent terminal comprises a memory and a processor, wherein the memory stores a computer program which can be loaded by the processor and executes the method.
By adopting the technical scheme, the current detection information is judged by acquiring the current detection information, so that whether damage exists or not is detected, the attenuation coefficient is obtained by calculating the difference information, the condition that the camera identifies the cable leakage is assigned, the damaged position is accurately positioned and known, the detection accuracy of the cable is improved, and the detection efficiency is improved.
In a fourth aspect, the present application provides a computer storage medium, which can store corresponding programs, and has the characteristics of being convenient for realizing the improvement of the detection accuracy of cables and the improvement of the detection efficiency, and adopts the following technical scheme:
a computer readable storage medium storing a computer program that can be loaded by a processor and that implements any of the above-described missing cable detection methods.
By adopting the technical scheme, the current detection information is judged by acquiring the current detection information, so that whether damage exists or not is detected, the attenuation coefficient is obtained by calculating the difference information, the condition that the camera identifies the cable leakage is assigned, the damaged position is accurately positioned and known, the detection accuracy of the cable is improved, and the detection efficiency is improved.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the detection accuracy of the cable is improved, and the detection efficiency is improved;
2. through camera discernment, improve holistic accuracy.
Drawings
Fig. 1 is a schematic flow chart of leaky cable detection.
Fig. 2 is a flowchart of a camera assignment method.
Fig. 3 is a flowchart of an image detection information acquisition method.
Fig. 4 is a schematic view of the detection process of a single-segment damaged section in a leaky cable.
Fig. 5 is a flowchart of a method of determining an endpoint.
FIG. 6 is a flow chart of a multi-segment detection method.
Fig. 7 is a flowchart of a method of verifying identification information.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to fig. 1-7 and the embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, the embodiment of the application discloses a leaky cable detection method, which includes the following steps:
step 100: and acquiring current detection information in the leaky cable of the current section.
Divide into the multistage with leaking the cable to divide equally in every section and detect respectively, thereby know the leaking the cable condition in the present section, and present detection information is the detection information in leaking the cable, will detect information transmission through the transmitting terminal in leaking the cable, and receive by the receiving terminal, detect information runs through whole leaking the cable.
Step 101: and judging whether the current detection information is consistent with the preset reference information.
The reference information is preset information, and the reference information and the current detection information are judged to judge whether the leaky cable in the current end is damaged or disconnected.
Step 102: and if the current detection information is inconsistent with the reference information, calculating difference information between the current detection information and the reference information.
When the detection information is compared with the reference information, once the current detection information is inconsistent with the reference information, the damage or the fracture exists in the leaky cable, and at the moment, the difference value between the detection information and the reference information is calculated, so that the difference value information is obtained.
When the difference information is calculated, the signal strength of the detection information and the reference information is detected, and the difference is determined.
Step 103: and searching the attenuation coefficient from a preset attenuation database according to the difference information.
And substituting the calculated difference information into an attenuation database to find out the attenuation coefficient for later calculation. And the attenuation database is a preset database for workers.
Step 104: and assigning a preset camera to perform image recognition on the leaky cable according to the attenuation coefficient and outputting image detection information.
Through the variation in size to the decay coefficient to assign the camera to go to, and the camera is installed to the track on, slides through electron slip table and goes to. The magnitude of the attenuation coefficient is related to the distance of the camera head, so that the position of the camera head is determined through the attenuation coefficient.
After the camera reaches the position, image recognition is carried out on the condition of cable leakage, and image detection information is output for later judgment.
Referring to fig. 2, different cameras are assigned due to different attenuation coefficients, and the camera assignment method includes the following steps:
step 200: and acquiring the current position information of the current camera.
The camera is provided with a GPS positioner, so that the position of the camera is positioned, and the GPS positioner is assisted in correcting and positioning according to the position of the camera on the track to output the current position information, so that the overall accuracy is improved.
Step 201: and searching distance information from a preset attenuation database according to the current attenuation coefficient and defining an identification point.
And searching distance information from an attenuation database according to the current attenuation coefficient, wherein the attenuation database is a preset database, and the distance information corresponding to the attenuation database can be matched through inputting the attenuation coefficient.
And the point corresponding to the distance information is defined as an identification point, and the identification point is a range interval. The identification point is used for the camera to move forward, so that further identification is carried out.
Step 202: the distance between the current position information and the identification point is calculated, and the distances are arranged in a reverse order.
And calculating the distance between the current position information and the identification point, and calculating according to end points on two sides in the identification point during calculation, so that the calculated distance is also a range interval. Since the current position information is plural, the range section is also plural, and the distances are arranged in a reverse order so as to select the closest camera.
Step 203: and screening the camera closest to the identification point and assigning the camera to the identification point.
After the camera closest to the camera is screened out, the camera is controlled to be assigned to the identification point, and therefore the image is identified.
Referring to fig. 3, the image of the leaky cable is detected by the camera, and the method for acquiring the image detection information includes the following steps:
step 300: and acquiring current image display information of the current camera.
The camera acquires current image display information, and the detection range of camera is limited, consequently detects the position that can discern to the angle of camera is adjusted well in advance, and the camera is installed to the track on, thereby can slide on the track, and supply the terminal to control the position of camera on the track.
The position control of the camera on the track can be controlled by an electronic sliding table, and can also be controlled by a motor to slide, which belongs to the common knowledge of the technicians in the field and is not described herein.
Step 301: and controlling the camera to move at a constant speed according to the length direction of the leaky cable, and storing the current image display information in real time to generate a long image.
The camera moves at a constant speed on the track and moves along the length direction of the leaky cable, and the moving direction of the track is consistent with the length direction of the leaky cable so as to be convenient for identification.
And storing the images identified by the cameras, splicing the images to generate a long image, and intermittently acquiring the field in a timing mode because the moving speeds of the movement are consistent so as to generate the long image with the leaky cable.
Step 302: and extracting the detection range of the leaky cable from the long image according to the preset leaky cable characteristic information to generate image detection information.
After the long image is obtained, the detection range of the leaky cable is extracted from the long image according to the leaky cable characteristic information so as to generate image detection information for identification.
The leaky cable characteristic information is preset information, the characteristic is obtained by identifying the leaky cable in the actual environment through the camera, and the characteristic is stored so as to be convenient for later calling and using.
Step 105: and judging whether the image detection information is consistent with the preset damage information.
And judging whether the image detection information is consistent with preset damage information or not, wherein the damage information is preset data, and acquiring at multiple angles in an image acquisition mode so as to perfect the damage information.
Step 106: and if the image information is consistent with the image information, acquiring the position of the current image information to calculate the damage distance.
Once, when the image detection information is consistent with the damage information, it indicates that the damage occurs, so that the position of the current image information is obtained, and the position of the camera on the track is adopted for positioning during obtaining, so that the position is known, and the damage distance is conveniently calculated.
Referring to fig. 4, the detection position of the leaky cable is segmented, and when a single-segment breakage exists in the leaky cable, the detection method of the single-segment breakage comprises the following steps:
step 400: and acquiring the current detection information of the current leaky cable and the current identification position of each section of leaky cable.
The current detection information of the current leaky cable is acquired, the current identification position of each section of leaky cable is synchronously known, and the identification positions are the positions of two ends of each section of leaky cable.
Step 401: and sequentially receiving the current detection information at different identification positions from the signal receiving direction to the signal transmitting direction, and sequentially judging whether the signal intensity of the current detection information is consistent with the intensity corresponding to the preset identification position.
The current detection information is received from the signal receiving direction to the signal transmitting direction and is received at different identification positions in sequence.
And sequentially judging whether the signal intensity of the current detection information is consistent with the intensity corresponding to the identification position according to the receiving sequence. Each identified location has a different signal strength, which is a predetermined strength signal.
Step 402: and if the current detection information is inconsistent with the preset intensity corresponding to the identification position, acquiring the current detection information of the next identification position in the signal emission direction, and recording the identification position as a starting point if the signal intensity of the current detection information is consistent with the preset intensity corresponding to the identification position.
And once the signal intensity of the current detection information is not consistent with the intensity corresponding to the identification position, acquiring the current detection information of the next identification position in the signal emission direction, and comparing the signal intensity of the current detection information with the signal intensity corresponding to the identification position.
And once the signal intensity of the current detection information is consistent with the intensity corresponding to the identification position, recording the identification position as a starting point.
Step 403: and outputting the identification information at the next identification position along the signal transmission direction by taking the starting point as a base point.
After confirming the starting point position, the next identification position along the signal transmission direction with the starting point as the base point is used for outputting identification information, each position is provided with a signal transceiver, and the signal transceivers are arranged in a segmented mode, so that the overall detection stability is improved.
Step 404: and if the identification position of the transmitted identification information is consistent with the identification information of the next identification position, taking the position of the transmitted identification information as an end point.
When the identification position of the transmission identification information coincides with the identification information of the next identification position, the position of the transmission identification information is defined as an end point, which indicates that the signal intensity is normal and is not broken.
Step 405: and confirming the damaged section in the leaky cable according to the starting point and the ending point.
And connecting the starting point with the end point according to the positions of the starting point and the end point, so as to confirm the damaged section in the leaky cable.
Referring to fig. 5, once the identification position of the transmission identification information is not consistent with the identification information of the next identification position, indicating that the end point position is not here, the position of the end point needs to be re-judged, the judging method includes the following steps:
step 500: the next identification position is taken as a middle point and identification information is transmitted in the signal transmission direction.
And when the identification position for transmitting the identification information is inconsistent with the identification information of the next identification position, taking the next identification position as an intermediate point and transmitting the identification information along the signal transmission direction for identification.
Step 501: and judging whether the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position.
And judging whether the identification information transmitted by the middle point is consistent with the identification information received by the next identification position or not, thereby judging whether the middle leaky cable is damaged or not.
Step 502: if the two are consistent, the intermediate point is taken as an end point.
Once the identification information transmitted by the intermediate point coincides with the identification information received by the next identification location, the intermediate point is taken as an end point, and there is no case where the leaky cable is broken.
Step 503: if not, the receiving point is used as an intermediate point to repeatedly send the identification information until the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position, and the intermediate point is used as an end point.
When the identification information transmitted by the intermediate point is inconsistent with the identification information received by the next identification position, the condition that the leaky cable is broken occurs at the intermediate point, so that the receiving point is used as the intermediate point to repeatedly send the identification information until the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position, the condition that the leaky cable is not broken in the section is indicated, and the intermediate point is used as an end point.
Referring to fig. 6, once a damaged section in a leaky cable has multiple sections instead of a single section, the method for detecting multiple sections includes the following steps:
step 600: the identification information is transmitted to the signal receiving direction according to the destination.
When the end position is known, the identification information is transmitted from the end position to the signal receiving direction for identification.
Step 601: if the signal receiving point receives the identification information, the damaged end is only one section.
The leaky cable transmits information from the signal transmitting point to the signal receiving point. Once the identification information is received by the signal receiving point, it indicates that no damage has occurred from the end point to the position where the receiving point is located, i.e. only one segment of the damaged end. Since the positions from the transmitting point to the starting point are already identified, only the positions from the signal receiving point to the end point need to be identified.
Step 602: if the signal receiving point does not receive the identification information, the signal receiving point has multi-segment damage, and transmits the identification information to the receiving end by taking the terminal point as the transmitting point, and repeatedly detects according to the identification method of the single-segment damaged segment until another damaged segment is obtained.
Once the signal receiving point does not receive the identification information, or the received identification information has wrong signal strength,
step 603: and transmitting the identification information to the signal receiving direction according to the end point in the other damaged section until the signal receiving point receives the identification information to obtain the multi-section damaged section.
And after the terminal point of the other section is obtained, the terminal point of the section is taken as a transmitting point, the identification information is transmitted to the signal receiving direction by the identification information until the signal receiving point receives the identification information, at the moment, a section of damaged leaky cable is obtained, and the steps are repeated to obtain a plurality of sections of damaged sections.
Referring to fig. 7, the identification information is received after being transmitted, and the identification accuracy of the identification information is judged, so that the condition of the identification information is known, and the verification method of the identification information includes the steps of:
step 700: and searching out the current number from a preset encryption database according to the current signal transmitting position and loading the current number into the identification information.
The encryption database is a preset database, and a unique number is matched through inputting the current transmitting position, so that the current number is searched from the encryption database through the current signal transmitting position, and the number is loaded into the identification information to play a role in synchronous transmission.
Step 701: the current number is decoded from the identification information received from the current receiving position, and the current number is substituted into a receiving function preset in the current receiving position to calculate a feedback value.
The identification information with the number is received by the receiving position after being sent, the current number is decoded from the identification information received by the current receiving position, and the current number is substituted into the receiving function of the current receiving position to calculate the feedback value.
The receiving function is a preset function, and the feedback value is obtained by substituting the serial number, and the receiving function is a function preset by the staff, and different feedback values can be obtained by substituting different functions, and the receiving function is selected by the staff according to the actual situation, which is not described herein.
Step 702: and sending the feedback value to the transmitting position, and substituting the feedback value into the transmitting position to calculate a check value from a preset transmitting function.
And after the feedback value is calculated, the feedback value is sent to the transmitting position, and the received feedback value is substituted into a transmitting function preset in the transmitting position to calculate a check value. The transmission function is a function preset by a worker, and different check values can be obtained by substituting different functions, and the worker selects the function according to actual conditions, which is not described herein.
Step 703: if the check value is consistent with the serial number, the check is finished; otherwise, prompt is carried out.
After receiving the check value, once the check value is consistent with the serial number, the check is completed at this time.
After receiving the check value, once the check value is inconsistent with the serial number, the identification information at the moment is indicated to have a problem, and the verification is not completed, and then prompt is carried out.
Based on the same inventive concept, the embodiment of the invention provides a leaky cable detection system, which comprises:
the acquisition module is used for acquiring current detection information in the leaky cable at the current section;
the information judgment module is used for judging whether the current detection information is consistent with the preset reference information;
the image judging module is used for judging whether the image detection information is consistent with the preset damage information;
the processing module is connected with the acquisition module, the information judgment module and the image judgment module;
if the current detection information is inconsistent with the reference information, the processing module calculates difference information between the current detection information and the reference information, searches an attenuation coefficient from a preset attenuation database according to the difference information, and assigns a preset camera to perform image identification on the leaky cable according to the attenuation coefficient and outputs image detection information;
if the image detection information is consistent with the preset damage information, the processing module acquires the position of the current image information to calculate the damage distance.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
An embodiment of the present invention provides a computer-readable storage medium storing a computer program that can be loaded by a processor and execute a leaky cable detection method.
Computer storage media include, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Based on the same inventive concept, the embodiment of the invention provides an intelligent terminal, which comprises a memory and a processor, wherein the memory is stored with a computer program which can be loaded by the processor and can execute the leaky cable detection method.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
The foregoing is a preferred embodiment of the present application and is not intended to limit the scope of the application in any way, and any features disclosed in this specification (including the abstract and drawings) may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.

Claims (10)

1. A leaky cable detection method is characterized by comprising the following steps:
acquiring current detection information in a leaky cable of a current section;
judging whether the current detection information is consistent with preset reference information or not;
if the current detection information is inconsistent with the reference information, calculating difference information between the current detection information and the reference information;
finding out an attenuation coefficient from a preset attenuation database according to the difference information;
assigning a preset camera to perform image recognition on the leaky cable according to the attenuation coefficient and outputting image detection information;
judging whether the image detection information is consistent with preset damage information or not;
and if the image information is consistent with the image information, acquiring the position of the current image information to calculate the damage distance.
2. A leaky cable detecting method as claimed in claim 1, wherein: the detection position of the leaky cable is segmented, and the detection method of the single-segment damaged section in the leaky cable comprises the following steps:
acquiring current detection information of a current leaky cable and a current identification position of each section of leaky cable;
sequentially receiving current detection information at different identification positions from a signal receiving direction to a signal transmitting direction, and sequentially judging whether the signal intensity of the current detection information is consistent with the intensity corresponding to the preset identification position;
if the current detection information is inconsistent with the preset intensity corresponding to the identification position, the current detection information of the next identification position is obtained in the signal emission direction, and if the signal intensity of the current detection information is consistent with the preset intensity corresponding to the identification position, the identification position is recorded as a starting point;
a next recognition position in the signal transmission direction with the starting point as a base point to output recognition information;
if the identification position of the transmitted identification information is consistent with the identification information of the next identification position, taking the position of the transmitted identification information as an end point;
and confirming the damaged section in the leaky cable according to the starting point and the ending point.
3. A leaky cable detection method as claimed in claim 2, wherein: if the identification position of the transmission identification information is inconsistent with the identification information of the next identification position, the method for judging the end point comprises the following steps:
taking the next identification position as a middle point and transmitting identification information along the signal transmitting direction;
judging whether the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position;
if the intermediate points are consistent, the intermediate points are used as end points;
if not, the receiving point is used as an intermediate point to repeatedly send the identification information until the identification information transmitted by the intermediate point is consistent with the identification information received by the next identification position, and the intermediate point is used as an end point.
4. A leaky cable detection method as claimed in claim 2, wherein: if the damaged section in the leaky cable has multiple sections, the detection method for the multiple sections comprises the following steps:
transmitting the identification information to a signal receiving direction according to the destination;
if the signal receiving point receives the identification information, the damaged end is only one section;
if the signal receiving point does not receive the identification information, a plurality of sections of damage exist, the identification information is transmitted to the receiving end by taking the terminal point as the transmitting point, and the detection is repeated according to the identification method of the single section of the damaged section until another damaged section is obtained;
and transmitting the identification information to the signal receiving direction according to the end point in the other damaged section until the signal receiving point receives the identification information to obtain the multi-section damaged section.
5. A leaky cable detection method as claimed in claim 2, wherein: the identification information verification method comprises the following steps:
searching out a current number from a preset encryption database according to the current signal transmitting position and loading the current number into the identification information;
decoding a current number from the identification information received at the current receiving position, and substituting the current number into a receiving function preset at the current receiving position to calculate a feedback value;
sending the feedback value to the transmitting position, and substituting the feedback value into the transmitting position to calculate a check value from a preset transmitting function;
if the check value is consistent with the serial number, the check is finished; otherwise, prompt is carried out.
6. A leaky cable detecting method as claimed in claim 1, wherein: the method for acquiring the image detection information comprises the following steps:
acquiring current image display information of a current camera;
controlling the camera to move at a constant speed according to the length direction of the leaky cable, and storing the current image display information in real time to generate a long image;
and extracting the detection range of the leaky cable from the long image according to the preset leaky cable characteristic information to generate image detection information.
7. A leaky cable detecting method as claimed in claim 1, wherein: the method for assigning the attenuation coefficient to the camera comprises the following steps:
acquiring current position information of a current camera;
finding out distance information from a preset attenuation database according to the current attenuation coefficient and defining an identification point;
calculating the distance between the current position information and the identification point, and arranging the distances in a reverse order;
and screening the camera closest to the identification point and assigning the camera to the identification point.
8. A leaky cable detection system, comprising:
the acquisition module is used for acquiring current detection information in the leaky cable at the current section;
the information judgment module is used for judging whether the current detection information is consistent with the preset reference information;
the image judging module is used for judging whether the image detection information is consistent with the preset damage information;
the processing module is connected with the acquisition module, the information judgment module and the image judgment module;
if the current detection information is inconsistent with the reference information, the processing module calculates difference information between the current detection information and the reference information, searches an attenuation coefficient from a preset attenuation database according to the difference information, and assigns a preset camera to perform image identification on the leaky cable according to the attenuation coefficient and outputs image detection information;
if the image detection information is consistent with the preset damage information, the processing module acquires the position of the current image information to calculate the damage distance.
9. An intelligent terminal, comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes the method according to any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 7.
CN202110470247.XA 2021-04-28 2021-04-28 Leaky cable detection method and system, storage medium and intelligent terminal Active CN113239757B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110470247.XA CN113239757B (en) 2021-04-28 2021-04-28 Leaky cable detection method and system, storage medium and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110470247.XA CN113239757B (en) 2021-04-28 2021-04-28 Leaky cable detection method and system, storage medium and intelligent terminal

Publications (2)

Publication Number Publication Date
CN113239757A CN113239757A (en) 2021-08-10
CN113239757B true CN113239757B (en) 2022-05-13

Family

ID=77131332

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110470247.XA Active CN113239757B (en) 2021-04-28 2021-04-28 Leaky cable detection method and system, storage medium and intelligent terminal

Country Status (1)

Country Link
CN (1) CN113239757B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116203272A (en) * 2023-03-22 2023-06-02 宁波远亚车辆检测有限公司 Method, system, device and storage medium for detecting rotation speed of vehicle engine

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133155A (en) * 2014-07-09 2014-11-05 华中科技大学 Cable local-defect diagnosis method
CN105866131A (en) * 2016-05-27 2016-08-17 中国铁道科学研究院 Vehicle-mounted appearance detection system and method for communication leaky coaxial cable in tunnel
CN106603119A (en) * 2016-12-20 2017-04-26 南京泰通科技股份有限公司 Railway leaky cable monitoring dual-port equipment having fault locating function and monitoring method
CN108982970A (en) * 2018-04-27 2018-12-11 广州杰赛科技股份有限公司 Multi-system access platform leaks detection method, device and the leakage cable detection system of cable
CN109165708A (en) * 2018-09-13 2019-01-08 佳讯飞鸿(北京)智能科技研究院有限公司 Leakage cable appearance maintaining method, system and Breakdown Maintenance based on RFID assist terminal
CN109270409A (en) * 2018-11-27 2019-01-25 广州开信通讯系统有限公司 Leak cable fault point positioning method, device, computer equipment and storage medium
CN111147764A (en) * 2019-12-31 2020-05-12 北京京天威科技发展有限公司 Leaky coaxial cable image acquisition method and system based on real-time image recognition
CN111141742A (en) * 2019-12-31 2020-05-12 北京京天威科技发展有限公司 Intelligent image detection system for leaky coaxial cable and working method thereof
CN111175623A (en) * 2020-01-09 2020-05-19 东北电力大学 Endoscope type underground cable fault detection system and fault analysis method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NO341197B1 (en) * 2012-10-24 2017-09-11 Wirescan As Method and system for monitoring the condition of electric cables
US9665932B2 (en) * 2013-09-03 2017-05-30 Thales Transport & Security, Inc. Camera based cable inspection system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133155A (en) * 2014-07-09 2014-11-05 华中科技大学 Cable local-defect diagnosis method
CN105866131A (en) * 2016-05-27 2016-08-17 中国铁道科学研究院 Vehicle-mounted appearance detection system and method for communication leaky coaxial cable in tunnel
CN106603119A (en) * 2016-12-20 2017-04-26 南京泰通科技股份有限公司 Railway leaky cable monitoring dual-port equipment having fault locating function and monitoring method
CN108982970A (en) * 2018-04-27 2018-12-11 广州杰赛科技股份有限公司 Multi-system access platform leaks detection method, device and the leakage cable detection system of cable
CN109165708A (en) * 2018-09-13 2019-01-08 佳讯飞鸿(北京)智能科技研究院有限公司 Leakage cable appearance maintaining method, system and Breakdown Maintenance based on RFID assist terminal
CN109270409A (en) * 2018-11-27 2019-01-25 广州开信通讯系统有限公司 Leak cable fault point positioning method, device, computer equipment and storage medium
CN111147764A (en) * 2019-12-31 2020-05-12 北京京天威科技发展有限公司 Leaky coaxial cable image acquisition method and system based on real-time image recognition
CN111141742A (en) * 2019-12-31 2020-05-12 北京京天威科技发展有限公司 Intelligent image detection system for leaky coaxial cable and working method thereof
CN111175623A (en) * 2020-01-09 2020-05-19 东北电力大学 Endoscope type underground cable fault detection system and fault analysis method

Also Published As

Publication number Publication date
CN113239757A (en) 2021-08-10

Similar Documents

Publication Publication Date Title
US20180108146A1 (en) Method and apparatus for annotating point cloud data
CN109753928B (en) Method and device for identifying illegal buildings
CN113239757B (en) Leaky cable detection method and system, storage medium and intelligent terminal
CN111156923A (en) Workpiece detection method, workpiece detection device, computer equipment and storage medium
US11823330B2 (en) Detection device, detection method and detection program for linear structure
JPWO2017149869A1 (en) Information processing apparatus, method, program, and multi-camera system
CN113037369B (en) Optical fiber route detection system and corresponding route detection method
CN107223257A (en) Method of testing, test server and system
CN114113165B (en) Row package interpretation method for security inspection equipment
CN115169602A (en) Maintenance method and device for power equipment, storage medium and computer equipment
CN109145752A (en) For assessing the method, apparatus, equipment and medium of object detection and track algorithm
US11509881B2 (en) Stereo camera and stereophotogrammetric method
CN110988795A (en) Mark-free navigation AGV global initial positioning method integrating WIFI positioning
JP4796535B2 (en) Multi-conductor electric wire tracking method, apparatus and program by image processing, and multi-conductor electric wire abnormality detection method, apparatus and program using the same
KR102347854B1 (en) Apparatus and method of classifying welding state based on image recognition using marker
US20230375709A1 (en) Detection device, determination method, and non-transitory computer-readable medium
CN111027540A (en) Method and equipment for searching target object
CN110706263A (en) Image processing method, device, equipment and computer readable storage medium
CN112950543A (en) Bridge maintenance method and system, storage medium and intelligent terminal
KR20220084703A (en) Facility inspection system and method of facility inspection using it
US20230136554A1 (en) Detection device, label assignment method, and non-transitory computer-readablemedium
KR102006883B1 (en) Position compensation system and method using mobile device
CN114323000A (en) Cable AR guiding assembly system and method
CN113505274B (en) Meter reading method suitable for multiple network states
CN116793503A (en) Method, system, inspection robot and storage medium for accurately measuring temperature of target equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant