CN113409485B - Inspection data acquisition method and device, computer equipment and storage medium - Google Patents

Inspection data acquisition method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113409485B
CN113409485B CN202110883645.4A CN202110883645A CN113409485B CN 113409485 B CN113409485 B CN 113409485B CN 202110883645 A CN202110883645 A CN 202110883645A CN 113409485 B CN113409485 B CN 113409485B
Authority
CN
China
Prior art keywords
unmanned aerial
aerial vehicle
inspection
data
environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110883645.4A
Other languages
Chinese (zh)
Other versions
CN113409485A (en
Inventor
任欣元
曾懿辉
舒应军
麦俊佳
徐振磊
郭晓斌
何超林
王昊
吴新桥
李彬
蔡思航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Southern Power Grid Digital Grid Research Institute Co Ltd
Original Assignee
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Southern Power Grid Digital Grid Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Power Supply Bureau of Guangdong Power Grid Corp, Southern Power Grid Digital Grid Research Institute Co Ltd filed Critical Foshan Power Supply Bureau of Guangdong Power Grid Corp
Priority to CN202110883645.4A priority Critical patent/CN113409485B/en
Publication of CN113409485A publication Critical patent/CN113409485A/en
Application granted granted Critical
Publication of CN113409485B publication Critical patent/CN113409485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)
  • Traffic Control Systems (AREA)

Abstract

The application relates to a method, a device, computer equipment and a storage medium for acquiring inspection data. The method comprises the following steps: after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle; sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object; and acquiring inspection data obtained by the unmanned aerial vehicle inspecting the target inspection object, and sending the inspection data to a server. By adopting the method, the unmanned aerial vehicle can carry out inspection on special conditions, thereby ensuring the safety of the power transmission network.

Description

Inspection data acquisition method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of power grid inspection technologies, and in particular, to a method and apparatus for acquiring inspection data, a computer device, and a storage medium.
Background
With the development of unmanned aerial vehicle technology, more and more tasks can be performed by unmanned aerial vehicles. For example, the transmission network line and the tower are directly exposed in the field environment, and the conditions of long line, high tower, more tower parts, complex field environment and the like cause great difficulty for daily power grid inspection, and the problems can be solved by adopting the unmanned aerial vehicle.
At present, an unmanned aerial vehicle is adopted for power grid inspection, and there are several modes generally, one is to control the unmanned aerial vehicle to carry out inspection by inspection personnel, and the other is to control the unmanned aerial vehicle to automatically inspect according to a pre-planned inspection path.
However, the conventional project is inspected, and if the inspection is not performed in a special situation, the abnormal situation is not removed in time, so that the safety of the power transmission network is compromised.
Disclosure of Invention
Based on this, it is necessary to provide a method, a device, a computer device and a storage medium for acquiring inspection data, which can enable the unmanned aerial vehicle to inspect special situations, thereby ensuring the safety of the power transmission network.
A patrol data acquisition method is applied to a monitoring terminal, and the method comprises the following steps:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server.
In one embodiment, before the sending of the inspection instruction information to the unmanned aerial vehicle, the method further includes:
acquiring a plurality of environment images; the plurality of environmental images comprise environmental images acquired by at least one image acquisition device at different moments;
and determining a target patrol object according to the differences among the plurality of environment images.
In one embodiment, the determining the target patrol object according to the difference between the plurality of environment images includes:
inputting a plurality of environment images into a pre-trained difference detection model to obtain differences among the plurality of environment images output by the difference detection model;
an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
In one embodiment, the method further comprises:
generating inspection environment information according to the plurality of environment images;
after communication connection is established with the unmanned aerial vehicle, sending inspection environment information to the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
In one embodiment, the establishing a communication connection with the unmanned aerial vehicle includes:
sending a communication connection request to the unmanned aerial vehicle;
receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request;
Carrying out identity authentication on the unmanned aerial vehicle according to the authentication information;
if the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle.
In one embodiment, the acquiring the inspection data obtained by the unmanned aerial vehicle inspecting the target inspection object and sending the inspection data to the server includes:
receiving a first encrypted data packet sent by the unmanned aerial vehicle, and decrypting the first encrypted data packet to obtain inspection data;
and carrying out encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to the server.
In one embodiment, the encrypting the inspection data to obtain the second encrypted data packet includes:
and carrying out encryption processing on the patrol data and the position information of the monitoring terminal to obtain a second encrypted data packet.
A patrol data acquisition device applied to a monitoring terminal, the device comprising:
the connection establishment module is used for establishing communication connection with the unmanned aerial vehicle after detecting that the unmanned aerial vehicle enters a preset area;
the first information sending module is used for sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
The data acquisition module is used for acquiring inspection data obtained by the unmanned aerial vehicle inspecting the target inspection object and sending the inspection data to the server.
In one embodiment, the apparatus further comprises:
the image acquisition module is used for acquiring a plurality of environment images; the plurality of environmental images comprise environmental images acquired by at least one image acquisition device at different moments;
and the object determining module is used for determining a target patrol object according to the differences among the plurality of environment images.
In one embodiment, the object determining module is specifically configured to input a plurality of environmental images into a pre-trained difference detection model, so as to obtain differences between the plurality of environmental images output by the difference detection model; an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
In one embodiment, the apparatus further comprises:
the information generation module is used for generating inspection environment information according to the plurality of environment images;
the second information sending module is used for sending inspection environment information to the unmanned aerial vehicle after communication connection is established with the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
In one embodiment, the connection establishment module is specifically configured to send a communication connection request to the unmanned aerial vehicle; receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request; carrying out identity authentication on the unmanned aerial vehicle according to the authentication information; if the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle.
In one embodiment, the data acquisition module includes:
the data acquisition sub-module is used for receiving a first encrypted data packet sent by the unmanned aerial vehicle and decrypting the first encrypted data packet to obtain inspection data;
and the data transmission sub-module is used for carrying out encryption processing on the inspection data to obtain a second encrypted data packet and transmitting the second encrypted data packet to the server.
In one embodiment, the data sending sub-module is specifically configured to encrypt the inspection data and the position information of the monitoring terminal to obtain a second encrypted data packet.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server.
According to the inspection data acquisition method, the inspection data acquisition device, the computer equipment and the storage medium, after the monitoring terminal detects that the unmanned aerial vehicle enters the preset area, communication connection is established with the unmanned aerial vehicle; sending inspection indication information to the unmanned aerial vehicle; and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server. In the embodiment of the disclosure, the inspection indication information sent by the monitoring terminal to the unmanned aerial vehicle is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network and comprises the target inspection object, and the unmanned aerial vehicle can inspect the target inspection object to obtain inspection data after receiving the inspection indication information. Therefore, the unmanned aerial vehicle can carry out inspection on special conditions around the power transmission network, and the safety of the power transmission network is ensured.
Drawings
FIG. 1 is an application environment diagram of a method for acquiring inspection data in one embodiment;
FIG. 2 is a flow chart of a method for acquiring inspection data according to an embodiment;
FIG. 3 is a flowchart illustrating a step of determining a target patrol object according to an embodiment;
FIG. 4 is a flowchart illustrating a step of sending inspection environment information to the unmanned aerial vehicle in one embodiment;
FIG. 5 is a flow chart of the steps for establishing a communication connection with a drone in one embodiment;
FIG. 6 is a flow chart illustrating a step of sending inspection data to a server in one embodiment;
fig. 7 is a block diagram of a patrol data-acquisition device according to an embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The inspection data acquisition method provided by the application can be applied to an application environment shown in figure 1. The application environment comprises a monitoring device 101, a monitoring terminal 102 and a unmanned aerial vehicle 103. Wherein, monitoring device 101 and monitoring terminal 102 are installed around the power transmission network, and monitoring device 101 monitors the surrounding environment of the power transmission network, and monitoring terminal 102 communicates with monitoring device 101 through the network, acquires monitoring data from monitoring device 101. For example, the monitoring device 101 includes a camera, and the monitoring terminal 102 acquires an environmental image of the power transmission network from the camera. After establishing communication connection with the unmanned aerial vehicle 103, the monitoring terminal 102 may acquire inspection data from the unmanned aerial vehicle 103. The application environment may further include a server 104, and after the monitoring terminal 102 obtains the monitoring data and the inspection data, the monitoring data and the inspection data may be sent to the server 104.
The above-described monitoring device 101 includes, but is not limited to, various cameras, radars, temperature sensors, infrared sensors, and humidity sensors.
The monitor terminal 102 may include a processor, memory, and a communication interface coupled via a system bus. Wherein the processor of the monitoring terminal is configured to provide computing and control capabilities. For example, the processor performs data screening on the monitoring data and eliminates abnormal monitoring data; determining a target inspection object of the unmanned aerial vehicle according to the monitoring data; and (3) carrying out encryption processing and decryption processing on the monitoring data, and carrying out identity authentication and the like on the unmanned aerial vehicle. The memory of the monitoring terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program; the internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium, and may also store monitoring data, patrol data, and the like. The communication interface of the monitoring terminal is used for carrying out wired or wireless communication with external monitoring equipment, unmanned aerial vehicle, a server and the like, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The monitor terminal 102 may further include a display screen and an input device, where the display screen of the monitor terminal may be a liquid crystal display screen or an electronic ink display screen, and the input device of the monitor terminal may be a touch layer covered on the display screen, or may also be a key, a track ball, or a touch pad disposed on a housing of the monitor terminal, or may also be an external keyboard, a touch pad, or a mouse. The monitoring terminal 102 may further include a positioning device, where the positioning device may perform positioning processing on the monitoring data and the inspection data, and the positioning device of the monitoring terminal may be a beidou positioning module, a GPS positioning module, or the like.
The drones 103 may include, but are not limited to, rotary-wing drones, multi-rotor drones, fixed-wing, unmanned helicopters, umbrella-wing drones, and ornithopters.
The server 104 may be implemented as a stand-alone server or as a server cluster comprising a plurality of servers.
In one embodiment, as shown in fig. 2, a method for acquiring inspection data is provided, and the method is applied to the monitoring terminal in fig. 1 for illustration, and includes the following steps:
step 201, after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle.
The monitoring terminal can acquire monitoring data from the monitoring equipment, and whether the unmanned aerial vehicle enters a preset area is detected according to the monitoring data. For example, the monitoring terminal obtains an environmental image from the camera, and detects whether an unmanned aerial vehicle enters a preset area according to the environmental image. Or the monitoring terminal acquires point cloud data from the radar, and detects whether the unmanned aerial vehicle enters a preset area according to the point cloud data. Or, the monitoring terminal detects whether the unmanned aerial vehicle enters a preset area through the wireless network. The detection mode and the preset area are not limited in the embodiment of the disclosure.
After detecting that unmanned aerial vehicle gets into the region of predetermineeing, monitor terminal can establish communication connection through wireless network and unmanned aerial vehicle, also can establish communication connection through other modes such as bluetooth, NFC with unmanned aerial vehicle. The embodiments of the present disclosure do not limit the manner in which the communication is connected.
Step 202, sending inspection instruction information to the unmanned aerial vehicle.
The inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object; the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object.
When the unmanned aerial vehicle is used for carrying out inspection on the power transmission network, the inspection path of the unmanned aerial vehicle is planned mostly. Therefore, the unmanned aerial vehicle can carry out inspection according to the inspection path, and conventional inspection items can be covered. However, the surrounding environment of the power transmission network may change, for example, the tree length near the tower, cracks occur in the mountain where the tower is erected, bird nests occur on the power transmission line, and so on. If the unmanned aerial vehicle only performs inspection according to the inspection path, special conditions may not be inspected.
Embodiments of the present disclosure address this situation in the following manner: the monitoring terminal acquires monitoring data from the monitoring equipment in real time or at regular time, judges whether special conditions exist according to the monitoring data, and if the special conditions exist, determines a target inspection object and generates inspection indication information. Thus, after communication connection is established with the unmanned aerial vehicle, the monitoring terminal sends the pre-generated inspection instruction information to the unmanned aerial vehicle. And the unmanned aerial vehicle receives the inspection indication information sent by the monitoring terminal, determines a target inspection object according to the inspection indication information, and inspects the target inspection object.
For example, if the target inspection object is a mountain on which a tower is installed, the unmanned aerial vehicle inspects the mountain on which the tower is installed. And the target inspection object is a bird nest appearing on the transmission line, and then the unmanned aerial vehicle inspects the transmission line.
In one embodiment, if the unmanned aerial vehicle completes one-time inspection of the target inspection object in the process of inspecting according to the inspection path, after receiving the inspection indication information, the unmanned aerial vehicle can not inspect the target inspection object according to the inspection indication information any more, and can inspect the target inspection object again. It can be appreciated that the unmanned aerial vehicle can ensure the accuracy of the inspection data after inspection again.
Step 203, obtaining inspection data obtained by the unmanned aerial vehicle inspecting the target inspection object, and sending the inspection data to the server.
After sending the inspection indication information to the unmanned aerial vehicle, the monitoring terminal can send a data acquisition request to the unmanned aerial vehicle; after receiving the data acquisition request, the unmanned aerial vehicle sends inspection data obtained by inspecting the target inspection object to the monitoring terminal. Or after the monitoring terminal sends the inspection indication information to the unmanned aerial vehicle, the inspection data sent by the unmanned aerial vehicle can be received in real time or at regular time. The embodiment of the disclosure does not limit the acquisition mode of the inspection data.
After the monitoring terminal acquires the inspection data from the unmanned aerial vehicle, the inspection data are sent to a server; the server can generate alarm information according to the inspection data, so as to inform maintenance personnel to maintain the power transmission network.
In the inspection data acquisition method, after detecting that the unmanned aerial vehicle enters a preset area, the monitoring terminal establishes communication connection with the unmanned aerial vehicle; sending inspection indication information to the unmanned aerial vehicle; and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server. In the embodiment of the disclosure, the inspection indication information sent by the monitoring terminal to the unmanned aerial vehicle is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network and comprises the target inspection object, and the unmanned aerial vehicle can inspect the target inspection object to obtain inspection data after receiving the inspection indication information. Therefore, the unmanned aerial vehicle can patrol the special conditions around the power transmission network, so that maintenance personnel can acquire the special conditions from the server in time, the power transmission network is maintained in time, and the safety of the power transmission network is ensured.
In one embodiment, as shown in fig. 3, on the basis of the above embodiment, the method may further include:
In step 301, a plurality of environmental images are acquired.
Wherein the plurality of environmental images includes environmental images acquired by at least one image acquisition device at different times.
In the surroundings of the power transmission network, the image acquisition devices may be set up in different positions. The monitoring terminal communicates with the image acquisition devices through a network, and acquires an environment image of the power transmission network from the image acquisition devices.
For example, two adjacent towers are respectively provided with a camera capable of rotating by 360 degrees, the two cameras can acquire the environmental images of the power transmission network in real time or at fixed time, and the monitoring terminal acquires the environmental images of the power transmission network from the cameras.
Step 302, determining a target patrol object according to differences among a plurality of environment images.
The monitoring terminal can compare the plurality of environment images to obtain differences among the plurality of environment images, and then determine the target patrol object according to the differences among the plurality of environment images.
In one embodiment, a plurality of environment images are input into a pre-trained difference detection model, so that differences among the plurality of environment images output by the difference detection model are obtained; an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
For example, a plurality of environmental images are input into a difference detection model, the difference detection model identifies differences of bird nests, continuous wire breaks, bending towers, vegetation touch networks and the like from the plurality of environmental images, and then the monitoring terminal determines the bird nests, the wires, the towers and the vegetation as target inspection objects.
In practical application, the monitoring device may further include an infrared sensor, the monitoring terminal may acquire infrared data from the infrared sensor, and determine the target inspection object according to the change of the infrared data. For example, the monitoring terminal determines mountain fires, electric shocks, fire lights, etc. based on the changes in the infrared data. The method for determining the target patrol objects and the target patrol objects are not limited in the embodiment of the disclosure.
In the above embodiment, the monitoring terminal acquires a plurality of environmental images; and determining a target patrol object according to the differences among the plurality of environment images. According to the embodiment of the disclosure, after the monitoring terminal determines the target inspection object according to the environment image, the unmanned aerial vehicle can conduct special inspection on the target inspection object, so that special conditions are confirmed, anomalies are found in time, and the power transmission network is maintained in time.
In one embodiment, as shown in fig. 4, on the basis of the above embodiment, the method may further include:
Step 401, generating inspection environment information according to a plurality of environment images.
The inspection environment information is used for representing the surrounding environment of the power transmission network, and comprises wire positions and tower positions of the power transmission network, vegetation states, animal states, mountain states and the like around the power transmission network. The embodiment of the disclosure does not limit the patrol environment information.
After the monitoring terminal acquires a plurality of environment images, the monitoring terminal can determine a target patrol object according to the environment images, model the surrounding environment of the power transmission network and generate patrol environment information.
For example, the monitoring terminal acquires environment images acquired by two cameras at different positions, obtains an environment model of the power transmission network by using a cross vision technology, and generates inspection environment information according to the environment model.
Step 402, after establishing communication connection with the unmanned aerial vehicle, sending inspection environment information to the unmanned aerial vehicle.
The inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle according to the inspection environment.
Unmanned aerial vehicles are usually used for avoiding barriers according to images acquired by cameras carried by the unmanned aerial vehicle and/or point cloud data acquired by radars. The obstacle avoidance mode has higher requirements on cameras and radars and also has higher requirements on data processing speed.
In the embodiment of the disclosure, the monitoring terminal generates the inspection environment information in advance and sends the inspection environment information to the unmanned aerial vehicle. After the unmanned aerial vehicle receives the inspection environment information, the surrounding environment of the power transmission network can be determined according to the inspection environment information, so that the surrounding environment of the power transmission network is combined with the image acquired by the camera and the point cloud data acquired by the radar to avoid the obstacle.
In the above embodiment, the monitoring terminal generates the inspection environment information according to the plurality of environment images; after communication connection is established with the unmanned aerial vehicle, the inspection environment information is sent to the unmanned aerial vehicle. According to the embodiment of the disclosure, the unmanned aerial vehicle is assisted in obstacle avoidance by using the inspection environment information generated in advance by the monitoring terminal, so that the obstacle avoidance efficiency of the unmanned aerial vehicle can be improved, and the requirements of the unmanned aerial vehicle on cameras, radars and data processing speeds can be properly reduced.
In one embodiment, as shown in fig. 5, the step of establishing a communication connection with the unmanned aerial vehicle may include:
in step 2011, a communication connection request is sent to the unmanned aerial vehicle.
In step 2012, authentication information sent by the unmanned aerial vehicle according to the communication connection request is received.
After receiving the communication connection request, the unmanned aerial vehicle sends authentication information to the monitoring terminal, and correspondingly, the monitoring terminal receives the authentication information sent by the unmanned aerial vehicle.
The authentication information may include an identity of the unmanned aerial vehicle, a communication connection key, and the like. The embodiment of the disclosure does not limit the authentication information.
And step 2013, performing identity authentication on the unmanned aerial vehicle according to the authentication information.
And after receiving the authentication information, the monitoring terminal performs identity authentication on the unmanned aerial vehicle according to the authentication information. For example, the monitoring terminal prestores an identity list allowing communication connection to be established, and if the identity of the unmanned aerial vehicle is found in the identity list, the identity authentication of the unmanned aerial vehicle is determined to pass; if the identity of the unmanned aerial vehicle is not found in the identity list, determining that the identity authentication of the unmanned aerial vehicle fails. Or the monitoring terminal pre-stores a key list allowing communication connection to be established, and if a communication connection key of the unmanned aerial vehicle is found in the key list, the identity authentication of the unmanned aerial vehicle is determined to pass; if the communication connection key of the unmanned aerial vehicle is not found in the key list, the identity authentication failure of the unmanned aerial vehicle is determined. In practical application, other identity authentication modes such as biological characteristics can be adopted, and the embodiment of the disclosure is not limited to the method.
And step 2014, if the identity authentication of the unmanned aerial vehicle passes, establishing communication connection with the unmanned aerial vehicle.
After the identity authentication of the unmanned aerial vehicle is confirmed to pass, the unmanned aerial vehicle is indicated to be allowed to be connected to the network where the monitoring terminal is located, and the monitoring terminal and the unmanned aerial vehicle are in communication connection.
In practical application, a hybrid networking technology of private network and public network can be adopted, the private network can be a private network formed by the monitoring terminal, the monitoring equipment and the unmanned aerial vehicle, and the public network can be a public network formed by the monitoring terminal and the external internet. The networking mode is not limited by the embodiment of the disclosure.
In the process of establishing communication connection with the unmanned aerial vehicle, the monitoring terminal sends a communication connection request to the unmanned aerial vehicle; receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request; carrying out identity authentication on the unmanned aerial vehicle according to the authentication information; if the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle. In the embodiment of the disclosure, the monitoring terminal authenticates the identity of the unmanned aerial vehicle, and illegal communication equipment or a network where the illegal unmanned aerial vehicle is accessed to the monitoring terminal can be avoided, so that data security is protected.
In one embodiment, as shown in fig. 6, the step of obtaining inspection data obtained by inspecting the target inspection object by the unmanned aerial vehicle and sending the inspection data to the server may include:
Step 501, a first encrypted data packet sent by the unmanned aerial vehicle is received, and decryption processing is performed on the first encrypted data packet to obtain inspection data.
The unmanned aerial vehicle acquires inspection data after inspecting the target inspection object, then the unmanned aerial vehicle encrypts the inspection data to acquire a first encrypted data packet, and then the first encrypted data packet is sent to the monitoring terminal. Correspondingly, the monitoring terminal receives a first encrypted data packet sent by the unmanned aerial vehicle. And then, the monitoring terminal decrypts the first encrypted data packet to obtain the patrol data.
The unmanned aerial vehicle encrypts the inspection data, the monitoring terminal decrypts the first encrypted data packet, a shared key can be adopted, other encryption algorithms can also be adopted, and the embodiment of the disclosure does not limit the method.
Step 502, performing encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to a server.
After decrypting the first encrypted data packet to obtain the inspection data, the monitoring terminal can encrypt the inspection data in an encryption mode different from that of the unmanned aerial vehicle to obtain a second encrypted data packet, and then sends the second encrypted data packet to the server. The embodiment of the disclosure does not limit the encryption mode of the monitoring terminal.
In one embodiment, encrypting the inspection data to obtain a second encrypted data packet includes: and carrying out encryption processing on the patrol data and the position information of the monitoring terminal to obtain a second encrypted data packet.
In practical application, the monitoring terminal can encrypt the inspection data and the position information of the monitoring terminal together to obtain a second encrypted data packet. Thus, after receiving the second encrypted data packet, the server can determine the geographic position corresponding to the inspection data according to the position information.
The location information of the monitoring terminal may include a terminal identifier of the monitoring terminal, GPS positioning information, and the like. If the position information of the monitoring terminal is the terminal identification of the monitoring terminal, the server needs to establish a corresponding relation between the terminal identification and the geographic position in advance, so that after receiving the second encrypted data packet, the server analyzes the terminal identification of the monitoring terminal from the second encrypted data packet, and then determines the geographic position corresponding to the inspection data according to the pre-established corresponding relation and the terminal identification of the monitoring terminal. The embodiment of the disclosure does not limit the position information of the monitoring terminal.
It can be understood that the server determines the geographic position corresponding to the inspection data, so that maintenance personnel can maintain the corresponding position, and the abnormality is rapidly removed.
The method comprises the steps of obtaining the inspection data obtained by the unmanned aerial vehicle in the inspection of the target inspection object, sending the inspection data to the server, receiving a first encrypted data packet sent by the unmanned aerial vehicle, and decrypting the first encrypted data packet to obtain the inspection data. And carrying out encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to the server. In the embodiment of the disclosure, when the monitoring terminal performs data transmission with the unmanned aerial vehicle and the server, the monitoring terminal encrypts the inspection data, so that the security of the inspection data can be ensured, and the risk of data leakage is reduced.
It should be understood that, although the steps in the flowcharts of fig. 2 to 6 are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least a portion of the steps of fig. 2-6 may include steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with other steps or at least a portion of the steps or stages in other steps.
In one embodiment, as shown in fig. 7, there is provided a patrol data-obtaining device, applied to a monitoring terminal, including:
the connection establishing module 601 is configured to establish communication connection with the unmanned aerial vehicle after detecting that the unmanned aerial vehicle enters a preset area;
a first information sending module 602, configured to send inspection instruction information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
the data acquisition module 603 is configured to acquire inspection data obtained by inspecting the target inspection object by the unmanned aerial vehicle, and send the inspection data to the server.
In one embodiment, the apparatus further comprises:
the image acquisition module is used for acquiring a plurality of environment images; the plurality of environmental images comprise environmental images acquired by at least one image acquisition device at different moments;
and the object determining module is used for determining a target patrol object according to the differences among the plurality of environment images.
In one embodiment, the object determining module is specifically configured to input a plurality of environmental images into a pre-trained difference detection model, so as to obtain differences between the plurality of environmental images output by the difference detection model; an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
In one embodiment, the apparatus further comprises:
the information generation module is used for generating inspection environment information according to the plurality of environment images;
the second information sending module is used for sending inspection environment information to the unmanned aerial vehicle after communication connection is established with the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
In one embodiment, the connection establishment module 601 is specifically configured to send a communication connection request to the unmanned aerial vehicle; receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request; carrying out identity authentication on the unmanned aerial vehicle according to the authentication information; if the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle.
In one embodiment, the data obtaining module 603 includes:
the data acquisition sub-module is used for receiving a first encrypted data packet sent by the unmanned aerial vehicle and decrypting the first encrypted data packet to obtain inspection data;
and the data transmission sub-module is used for carrying out encryption processing on the inspection data to obtain a second encrypted data packet and transmitting the second encrypted data packet to the server.
In one embodiment, the data sending sub-module is specifically configured to encrypt the inspection data and the position information of the monitoring terminal to obtain a second encrypted data packet.
The detailed limitation of the inspection data acquisition device can be referred to above as limitation of the inspection data acquisition method, and will not be described herein. The above-mentioned various modules in the inspection data acquisition device may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
and acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server.
In one embodiment, the processor when executing the computer program further performs the steps of:
acquiring a plurality of environment images; the plurality of environmental images comprise environmental images acquired by at least one image acquisition device at different moments;
and determining a target patrol object according to the differences among the plurality of environment images.
In one embodiment, the processor when executing the computer program further performs the steps of:
inputting a plurality of environment images into a pre-trained difference detection model to obtain differences among the plurality of environment images output by the difference detection model;
an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
In one embodiment, the processor when executing the computer program further performs the steps of:
generating inspection environment information according to the plurality of environment images;
after communication connection is established with the unmanned aerial vehicle, sending inspection environment information to the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
In one embodiment, the processor when executing the computer program further performs the steps of:
sending a communication connection request to the unmanned aerial vehicle;
receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request;
carrying out identity authentication on the unmanned aerial vehicle according to the authentication information;
If the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle.
In one embodiment, the processor when executing the computer program further performs the steps of:
receiving a first encrypted data packet sent by the unmanned aerial vehicle, and decrypting the first encrypted data packet to obtain inspection data;
and carrying out encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to the server.
In one embodiment, the processor when executing the computer program further performs the steps of:
and carrying out encryption processing on the patrol data and the position information of the monitoring terminal to obtain a second encrypted data packet.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object;
And acquiring inspection data obtained by the unmanned aerial vehicle for inspecting the target inspection object, and sending the inspection data to a server.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring a plurality of environment images; the plurality of environmental images comprise environmental images acquired by at least one image acquisition device at different moments;
and determining a target patrol object according to the differences among the plurality of environment images.
In one embodiment, the computer program when executed by the processor further performs the steps of:
inputting a plurality of environment images into a pre-trained difference detection model to obtain differences among the plurality of environment images output by the difference detection model;
an object indicated by a difference between the plurality of environmental images is determined as a target patrol object.
In one embodiment, the computer program when executed by the processor further performs the steps of:
generating inspection environment information according to the plurality of environment images;
after communication connection is established with the unmanned aerial vehicle, sending inspection environment information to the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
In one embodiment, the computer program when executed by the processor further performs the steps of:
Sending a communication connection request to the unmanned aerial vehicle;
receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request;
carrying out identity authentication on the unmanned aerial vehicle according to the authentication information;
if the identity authentication of the unmanned aerial vehicle passes, communication connection is established with the unmanned aerial vehicle.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a first encrypted data packet sent by the unmanned aerial vehicle, and decrypting the first encrypted data packet to obtain inspection data;
and carrying out encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to the server.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and carrying out encryption processing on the patrol data and the position information of the monitoring terminal to obtain a second encrypted data packet.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (10)

1. The method for acquiring the inspection data is characterized by being applied to a monitoring terminal, and comprises the following steps:
after detecting that the unmanned aerial vehicle enters a preset area, establishing communication connection with the unmanned aerial vehicle;
sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network monitored by the monitoring equipment, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object; the monitoring terminal and the monitoring equipment are arranged around the power transmission network;
The method comprises the steps of obtaining patrol data obtained by the unmanned aerial vehicle for carrying out patrol on the target patrol object, and sending the patrol data to a server;
wherein, it is detected that the unmanned aerial vehicle enters a preset area, including:
acquiring an environment image, and detecting whether an unmanned aerial vehicle enters the preset area according to the environment image; or, acquiring point cloud data, and detecting whether an unmanned aerial vehicle enters the preset area according to the point cloud data; or detecting whether the unmanned aerial vehicle enters the preset area through a wireless network;
the monitoring equipment comprises at least one of a camera and an infrared sensor, and before sending inspection indication information to the unmanned aerial vehicle, the monitoring equipment further comprises:
acquiring a plurality of environment images acquired by the camera; the plurality of environment images comprise environment images acquired by at least one image acquisition device at different moments;
determining the target patrol object according to the differences among the plurality of environment images; the difference comprises at least one of bird nest occurrence, wire continuous breakage, tower bending and vegetation touch net occurrence;
and/or acquiring infrared data acquired by the infrared sensor;
and determining the target inspection object according to the change of the infrared data.
2. The method of claim 1, wherein the determining the target patrol object based on differences between the plurality of environmental images comprises:
inputting the plurality of environment images into a pre-trained difference detection model to obtain differences among the plurality of environment images output by the difference detection model;
an object indicated by a difference between the plurality of environmental images is determined as the target patrol object.
3. The method according to claim 1, wherein the method further comprises:
generating inspection environment information according to the plurality of environment images;
after communication connection is established with the unmanned aerial vehicle, sending the patrol environment information to the unmanned aerial vehicle; the inspection environment information is used for the unmanned aerial vehicle to avoid the obstacle.
4. The method of claim 3, wherein the inspection environment information includes at least one of a wire location, a tower location, and a vegetation status, an animal status, and a mountain status around the power transmission network.
5. The method of claim 1, wherein the establishing a communication connection with the drone comprises:
Sending a communication connection request to the unmanned aerial vehicle;
receiving authentication information sent by the unmanned aerial vehicle according to the communication connection request;
carrying out identity authentication on the unmanned aerial vehicle according to the authentication information;
and if the identity authentication of the unmanned aerial vehicle passes, establishing communication connection with the unmanned aerial vehicle.
6. The method of claim 1, wherein the obtaining the inspection data obtained by the drone inspecting the target inspection object and sending the inspection data to a server comprises:
receiving a first encrypted data packet sent by the unmanned aerial vehicle, and decrypting the first encrypted data packet to obtain the inspection data;
and carrying out encryption processing on the inspection data to obtain a second encrypted data packet, and sending the second encrypted data packet to the server.
7. The method of claim 6, wherein the encrypting the inspection data to obtain a second encrypted data packet comprises:
and carrying out encryption processing on the patrol data and the position information of the monitoring terminal to obtain the second encrypted data packet.
8. A patrol data acquisition device, characterized in that it is applied to a monitoring terminal, said device comprising:
The connection establishment module is used for establishing communication connection with the unmanned aerial vehicle after detecting that the unmanned aerial vehicle enters a preset area;
the first information sending module is used for sending inspection indication information to the unmanned aerial vehicle; the inspection indication information is generated by the monitoring terminal in advance according to the surrounding environment of the power transmission network monitored by the monitoring equipment, and comprises a target inspection object, wherein the inspection indication information is used for indicating the unmanned aerial vehicle to inspect the target inspection object; the monitoring terminal and the monitoring equipment are arranged around the power transmission network;
the data acquisition module is used for acquiring patrol data obtained by the unmanned aerial vehicle for carrying out patrol on the target patrol object and sending the patrol data to a server;
the connection establishment module is specifically configured to obtain an environmental image, and detect whether an unmanned aerial vehicle enters the preset area according to the environmental image; or, acquiring point cloud data, and detecting whether an unmanned aerial vehicle enters the preset area according to the point cloud data; or detecting whether the unmanned aerial vehicle enters the preset area through a wireless network;
the monitoring device comprises at least one of a camera and an infrared sensor, the apparatus further comprising:
The image acquisition module is used for acquiring a plurality of environment images acquired by the camera; the plurality of environment images comprise environment images acquired by at least one image acquisition device at different moments;
the object determining module is used for determining the target patrol object according to the differences among the plurality of environment images; the difference comprises at least one of bird nest occurrence, wire continuous breakage, tower bending and vegetation touch net occurrence;
the infrared acquisition module is used for acquiring infrared data acquired by the infrared sensor;
the object determining module is used for determining the target patrol object according to the change of the infrared data.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202110883645.4A 2021-08-03 2021-08-03 Inspection data acquisition method and device, computer equipment and storage medium Active CN113409485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110883645.4A CN113409485B (en) 2021-08-03 2021-08-03 Inspection data acquisition method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110883645.4A CN113409485B (en) 2021-08-03 2021-08-03 Inspection data acquisition method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113409485A CN113409485A (en) 2021-09-17
CN113409485B true CN113409485B (en) 2023-12-12

Family

ID=77688254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110883645.4A Active CN113409485B (en) 2021-08-03 2021-08-03 Inspection data acquisition method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113409485B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114184894A (en) * 2021-12-10 2022-03-15 重庆大学 Cooperative inspection method for power transmission line online monitoring device and mobile inspection equipment
CN114627569B (en) * 2022-03-10 2023-09-12 中国南方电网有限责任公司超高压输电公司检修试验中心 Abnormality processing method and device for power line inspection unmanned aerial vehicle and computer equipment
CN115022364A (en) * 2022-05-31 2022-09-06 中国工商银行股份有限公司 Monitoring method, monitoring device, computer equipment and storage medium
CN116029537A (en) * 2023-03-29 2023-04-28 中国南方电网有限责任公司超高压输电公司广州局 Power transmission line inspection method, device, computer equipment and storage medium

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886189A (en) * 2014-03-07 2014-06-25 国家电网公司 Patrolling result data processing system and method used for unmanned aerial vehicle patrolling
CN104807460A (en) * 2015-05-04 2015-07-29 深圳大学 Indoor positioning method and system for unmanned aerial vehicle
CN105159297A (en) * 2015-09-11 2015-12-16 南方电网科学研究院有限责任公司 Power transmission line unmanned plane inspection obstacle avoidance system and method
CN105526932A (en) * 2015-12-29 2016-04-27 中国矿业大学 A pseudolite-technique-based positioning method and a positioning system for a fleet of unmanned aerial vehicles
CN105974932A (en) * 2016-04-27 2016-09-28 中国人民解放军装甲兵工程学院 Unmanned aerial vehicle control method
CN106950984A (en) * 2017-03-16 2017-07-14 中国科学院自动化研究所 Unmanned plane remote collaborative examines printing method
CN107271951A (en) * 2017-06-06 2017-10-20 上海工程技术大学 UAV Navigation System and its air navigation aid based on WiFi fingerprint locations
CN107357313A (en) * 2017-08-15 2017-11-17 成都优艾维智能科技有限责任公司 A kind of transmission line malfunction maintenance system and method based on unmanned plane inspection image
CN107688350A (en) * 2017-08-03 2018-02-13 北京小米移动软件有限公司 Unmanned aerial vehicle (UAV) control method and apparatus
CN108648400A (en) * 2018-06-11 2018-10-12 贵州电网有限责任公司 One kind is based on multispectral transmission line forest fire exploration prior-warning device and method for early warning
CN108922098A (en) * 2018-05-04 2018-11-30 国网山西省电力公司电力科学研究院 A kind of forest fire monitoring system and method based on infrared guidance and radar detection
CN110011223A (en) * 2019-05-07 2019-07-12 江苏方天电力技术有限公司 Multiple no-manned plane cooperation method for inspecting and system suitable for region transmission line of electricity
CN110007687A (en) * 2019-02-25 2019-07-12 中国电子科技集团公司电子科学研究院 A kind of unmanned plane hunting system
CN110262545A (en) * 2019-05-30 2019-09-20 中国南方电网有限责任公司超高压输电公司天生桥局 A kind of unmanned plane during flying Three-Dimensional Path Planning Method
CN110855427A (en) * 2019-11-18 2020-02-28 国网四川省电力公司电力科学研究院 Unmanned aerial vehicle identity authentication method and system
CN111077907A (en) * 2019-12-30 2020-04-28 哈尔滨理工大学 Autonomous positioning method of outdoor unmanned aerial vehicle
CN111324143A (en) * 2020-02-28 2020-06-23 广东电网有限责任公司 Unmanned aerial vehicle autonomous patrol obstacle avoidance system, method and computer equipment
CN111422081A (en) * 2020-04-02 2020-07-17 北京京东乾石科技有限公司 Unmanned aerial vehicle cruise system
CN111510686A (en) * 2020-04-27 2020-08-07 中国南方电网有限责任公司超高压输电公司天生桥局 Vehicle-mounted unmanned aerial vehicle power inspection flight management and control method and system
CN111739252A (en) * 2020-07-03 2020-10-02 徐州鑫科机器人有限公司 Fire monitoring and automatic fire extinguishing system and working method thereof
CN111766900A (en) * 2020-06-30 2020-10-13 深圳高度创新技术有限公司 System and method for high-precision autonomous landing of unmanned aerial vehicle and storage medium
CN112034479A (en) * 2020-06-15 2020-12-04 煤炭科学技术研究院有限公司 Positioning method and system applied to intelligent inspection unmanned aerial vehicle under coal mine
CN112327930A (en) * 2020-11-27 2021-02-05 广东电网有限责任公司肇庆供电局 Routing inspection path determining method and device
CN112465886A (en) * 2020-12-09 2021-03-09 苍穹数码技术股份有限公司 Model generation method, device, equipment and readable storage medium
CN112464813A (en) * 2020-11-26 2021-03-09 国网北京市电力公司 Method and device for monitoring mountain fire
CN112578334A (en) * 2019-09-27 2021-03-30 中光电智能机器人股份有限公司 Unmanned aerial vehicle and positioning method thereof, unmanned aerial vehicle communication system and operation method thereof
CN112702566A (en) * 2020-12-14 2021-04-23 广东电网有限责任公司佛山供电局 Power line patrol unmanned aerial vehicle communication system and method
CN113075938A (en) * 2021-03-26 2021-07-06 广东电网有限责任公司珠海供电局 Remote intelligent inspection system and method for power transmission line
CN213661802U (en) * 2020-12-22 2021-07-09 生态环境部华南环境科学研究所 Rural pollution supervisory systems based on video monitoring and unmanned aerial vehicle patrol

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886189A (en) * 2014-03-07 2014-06-25 国家电网公司 Patrolling result data processing system and method used for unmanned aerial vehicle patrolling
CN104807460A (en) * 2015-05-04 2015-07-29 深圳大学 Indoor positioning method and system for unmanned aerial vehicle
CN105159297A (en) * 2015-09-11 2015-12-16 南方电网科学研究院有限责任公司 Power transmission line unmanned plane inspection obstacle avoidance system and method
CN105526932A (en) * 2015-12-29 2016-04-27 中国矿业大学 A pseudolite-technique-based positioning method and a positioning system for a fleet of unmanned aerial vehicles
CN105974932A (en) * 2016-04-27 2016-09-28 中国人民解放军装甲兵工程学院 Unmanned aerial vehicle control method
CN106950984A (en) * 2017-03-16 2017-07-14 中国科学院自动化研究所 Unmanned plane remote collaborative examines printing method
CN107271951A (en) * 2017-06-06 2017-10-20 上海工程技术大学 UAV Navigation System and its air navigation aid based on WiFi fingerprint locations
CN107688350A (en) * 2017-08-03 2018-02-13 北京小米移动软件有限公司 Unmanned aerial vehicle (UAV) control method and apparatus
CN107357313A (en) * 2017-08-15 2017-11-17 成都优艾维智能科技有限责任公司 A kind of transmission line malfunction maintenance system and method based on unmanned plane inspection image
CN108922098A (en) * 2018-05-04 2018-11-30 国网山西省电力公司电力科学研究院 A kind of forest fire monitoring system and method based on infrared guidance and radar detection
CN108648400A (en) * 2018-06-11 2018-10-12 贵州电网有限责任公司 One kind is based on multispectral transmission line forest fire exploration prior-warning device and method for early warning
CN110007687A (en) * 2019-02-25 2019-07-12 中国电子科技集团公司电子科学研究院 A kind of unmanned plane hunting system
CN110011223A (en) * 2019-05-07 2019-07-12 江苏方天电力技术有限公司 Multiple no-manned plane cooperation method for inspecting and system suitable for region transmission line of electricity
CN110262545A (en) * 2019-05-30 2019-09-20 中国南方电网有限责任公司超高压输电公司天生桥局 A kind of unmanned plane during flying Three-Dimensional Path Planning Method
CN112578334A (en) * 2019-09-27 2021-03-30 中光电智能机器人股份有限公司 Unmanned aerial vehicle and positioning method thereof, unmanned aerial vehicle communication system and operation method thereof
CN110855427A (en) * 2019-11-18 2020-02-28 国网四川省电力公司电力科学研究院 Unmanned aerial vehicle identity authentication method and system
CN111077907A (en) * 2019-12-30 2020-04-28 哈尔滨理工大学 Autonomous positioning method of outdoor unmanned aerial vehicle
CN111324143A (en) * 2020-02-28 2020-06-23 广东电网有限责任公司 Unmanned aerial vehicle autonomous patrol obstacle avoidance system, method and computer equipment
CN111422081A (en) * 2020-04-02 2020-07-17 北京京东乾石科技有限公司 Unmanned aerial vehicle cruise system
CN111510686A (en) * 2020-04-27 2020-08-07 中国南方电网有限责任公司超高压输电公司天生桥局 Vehicle-mounted unmanned aerial vehicle power inspection flight management and control method and system
CN112034479A (en) * 2020-06-15 2020-12-04 煤炭科学技术研究院有限公司 Positioning method and system applied to intelligent inspection unmanned aerial vehicle under coal mine
CN111766900A (en) * 2020-06-30 2020-10-13 深圳高度创新技术有限公司 System and method for high-precision autonomous landing of unmanned aerial vehicle and storage medium
CN111739252A (en) * 2020-07-03 2020-10-02 徐州鑫科机器人有限公司 Fire monitoring and automatic fire extinguishing system and working method thereof
CN112464813A (en) * 2020-11-26 2021-03-09 国网北京市电力公司 Method and device for monitoring mountain fire
CN112327930A (en) * 2020-11-27 2021-02-05 广东电网有限责任公司肇庆供电局 Routing inspection path determining method and device
CN112465886A (en) * 2020-12-09 2021-03-09 苍穹数码技术股份有限公司 Model generation method, device, equipment and readable storage medium
CN112702566A (en) * 2020-12-14 2021-04-23 广东电网有限责任公司佛山供电局 Power line patrol unmanned aerial vehicle communication system and method
CN213661802U (en) * 2020-12-22 2021-07-09 生态环境部华南环境科学研究所 Rural pollution supervisory systems based on video monitoring and unmanned aerial vehicle patrol
CN113075938A (en) * 2021-03-26 2021-07-06 广东电网有限责任公司珠海供电局 Remote intelligent inspection system and method for power transmission line

Also Published As

Publication number Publication date
CN113409485A (en) 2021-09-17

Similar Documents

Publication Publication Date Title
CN113409485B (en) Inspection data acquisition method and device, computer equipment and storage medium
Almeaibed et al. Digital twin analysis to promote safety and security in autonomous vehicles
Zhi et al. Security and privacy issues of UAV: A survey
US9697355B1 (en) Cyber security for physical systems
US11488488B2 (en) Blockchain-based solution for internet of drones security and privacy
US10250619B1 (en) Overlay cyber security networked system and method
CN107438989B (en) Authentication messages between unmanned vehicles
US10601836B2 (en) Observation system
Krichen et al. Security challenges for drone communications: Possible threats, attacks and countermeasures
JP2023016844A (en) Fraud detection server and control methods
US10637951B2 (en) Systems and methods for managing data proxies
CN105493060A (en) Honeyport active network security
CN112114533A (en) Internet of things data processing method and device, computer equipment and storage medium
US20190317465A1 (en) Plc virtual patching and automated distribution of security context
CN102647550A (en) Network camera system
US20180011751A1 (en) Unmanned Ground and Aerial Vehicle Attachment System
US11463250B2 (en) Sharing data among different service providers at edge level through collaboration channels
Xu et al. Analysis and mitigation of function interaction risks in robot apps
WO2022061772A1 (en) Gimbal control method and apparatus, movable platform, and storage medium
Ferrão et al. STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack
US11138085B2 (en) Execution sequence integrity monitoring system
CN114627569B (en) Abnormality processing method and device for power line inspection unmanned aerial vehicle and computer equipment
CN112702566A (en) Power line patrol unmanned aerial vehicle communication system and method
JP2018149670A (en) Learning object device and operation method
JP7041108B2 (en) Management device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant