CN113936445A - Alarm linkage system and method based on application strategy - Google Patents
Alarm linkage system and method based on application strategy Download PDFInfo
- Publication number
- CN113936445A CN113936445A CN202111210028.4A CN202111210028A CN113936445A CN 113936445 A CN113936445 A CN 113936445A CN 202111210028 A CN202111210028 A CN 202111210028A CN 113936445 A CN113936445 A CN 113936445A
- Authority
- CN
- China
- Prior art keywords
- alarm
- module
- linkage
- information
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000012544 monitoring process Methods 0.000 claims abstract description 22
- 238000001514 detection method Methods 0.000 claims description 25
- 230000010365 information processing Effects 0.000 claims description 10
- 238000012549 training Methods 0.000 claims description 6
- 238000013145 classification model Methods 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000003672 processing method Methods 0.000 claims description 3
- 238000013135 deep learning Methods 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000011897 real-time detection Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/185—Signal analysis techniques for reducing or preventing false alarms or for enhancing the reliability of the system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Molecular Biology (AREA)
- Computing Systems (AREA)
- Biomedical Technology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses an alarm linkage method based on an application strategy, which comprises the following steps: 1) alarm linkage setting; 2) alarm information feedback; 3) video suspicious information acquisition; 4) confirming an application strategy; 5) and performing alarm linkage. The method solves the problems that the existing large machine room pure dynamic loop monitoring blind alarm cannot be intelligently monitored and the conventional deep learning algorithm identification for the machine room scene is inaccurate, is convenient for a manager to reasonably judge the alarm task, and effectively improves the intelligent management level of large machine room facilities. The invention also discloses an alarm linkage system based on the application strategy.
Description
Technical Field
The invention relates to the technical field of intelligent equipment of a communication machine room, in particular to an alarm linkage system based on an application strategy and a linkage method thereof.
Background
The warning system in current large-scale computer lab is mainly based on pure power environmental monitoring sensing equipment, for example the computer lab outer wall adopts infrared intrusion alert detector monitoring whether have suspicious personnel's invasion, and its shortcoming is: any object touching the sensor can cause alarm, and the alarm needs to be checked and confirmed by a manager every time, so that the efficiency of remote intelligent management of the manager is not facilitated; most of the existing video monitoring systems of large-scale machine rooms are based on deep learning and are influenced by problems of small targets, shelters, perspective transformation and the like, and a simple deep learning detection algorithm easily causes missing detection and false detection phenomena on the targets in specific machine room scenes, so that the problem of false alarm is caused; the above situations all cause that the efficiency of processing the alarm task by the machine room administrator is not high, and the alarm task cannot be reasonably judged.
Disclosure of Invention
The invention aims to provide an alarm linkage system based on an application strategy and a linkage method thereof aiming at the defects of the prior art. The method can solve the problems that the current large machine room pure dynamic loop monitoring blind alarm cannot be intelligently monitored and the conventional deep learning algorithm identification of the machine room scene is inaccurate, is convenient for a manager to reasonably judge the alarm task, and effectively improves the intelligent management level of large machine room facilities.
The technical scheme for realizing the purpose of the invention is as follows:
the alarm linkage system comprises an alarm system control panel, wherein the alarm system control panel is provided with a video acquisition module, a linkage alarm task setting module, an information processing module, an information storage module, a suspicious information prediction module, an application strategy selection module, an alarm risk early warning module, an alarm strategy recommendation module, an alarm playback module and an instruction output module which are connected with one another through signals, and the alarm system control panel is connected with a computer room through a wire.
An alarm linkage method based on an application strategy comprises the alarm linkage system based on the application strategy, and the method comprises the following steps:
1) and (3) alarm linkage setting: manually starting a linkage warning task setting module and a video acquisition module in advance, setting a linkage warning task starting requirement and a candidate solution warning task strategy through a computer room by the linkage warning task setting module, and acquiring real-time video information of a monitoring area by the video acquisition module through a camera;
2) and (3) alarm information feedback: the information acquired by the video acquisition module and the information set by the linkage alarm task setting module are subjected to linkage matching on the acquired alarm setting information and the monitored area through the information processing module and are stored in a computer of the computer room through the information storage module;
3) video suspicious information acquisition:
(1) after the machine room equipment triggers the alarm condition, intercepting a time interval according to the video of the monitoring alarm equipment area in the information storage module;
(2) detecting and identifying the alarm video segment through an AI algorithm in a suspicious information prediction module, preliminarily judging suspicious information, and selecting a processing method in a strategy selection module;
(3) the AI method for the machine room comprises the following steps: classification model for machine room: firstly, sending acquired image information into a yolov3 target detection network for preliminary detection, selecting a sample which is easy to be subjected to false detection in an actual machine room scene as a negative sample, and adding the negative sample into a yolov3 network training model for training so as to reduce the false judgment on a target;
(4) and (3) accurate positioning: because the number of network layers of the yolov3 model is less, the accurate positioning of a detection target is not facilitated, and the features obtained after the primary detection of the yolov3 are cascaded to a light-weight small network, the number of network layers is deepened, the detection target boundary box can be better regressed, and the target in a machine room environment can be accurately positioned;
4) and (3) application policy confirmation:
(1) after the strategy is selected, the alarm risk early warning module divides the alarm risk level according to the alarm condition, and the alarm tasks of different levels are recommended to a proper solution alarm method by the alarm strategy recommendation module;
(2) the alarm playback module acquires video information of the alarm task and stores the video information in the information storage module;
5) and (3) alarm linkage execution: and feeding back the monitoring video of the alarm task place to a system administrator through the instruction output module and the alarm playback module, and outputting an instruction to execute alarm linkage.
The linkage warning task setting module in the step 1) stores the linkage warning task starting requirement set by the computer in the computer room, candidate solution warning task strategy data and real-time video information of a monitoring area collected by the video collecting module through the camera in the computer room.
The information processing module in the step 2) comprises monitoring records of the state information of the computer in the machine room.
The alarm playback module in the step 4) comprises the risk level of the alarm, the data of the equipment and the video information of the time interval before and after the alarm task, and is stored in the computer of the computer room.
The instruction output module in the step 5) can also eliminate the alarm task with low risk degree.
Compared with the prior art, the technical scheme has the following beneficial effects: the technical scheme is convenient to operate, the required linkage conditions are set by self-definition in advance, the video, temperature, sound and other environment monitoring data of the machine room equipment are highly integrated, when the alarm is triggered, suspicious information is collected at the alarm position through the deep learning AI algorithm, the video image is identified, and a strategy for processing the alarm task for an administrator is recommended.
The method can solve the problems that the current large machine room pure dynamic loop monitoring blind alarm cannot be intelligently monitored and the conventional deep learning algorithm identification of the machine room scene is inaccurate, is convenient for a manager to reasonably judge the alarm task, and effectively improves the intelligent management level of large machine room facilities.
Drawings
FIG. 1 is a schematic diagram of an overall architecture of an embodiment;
FIG. 2 is a schematic structural diagram of an alarm linkage control panel in the embodiment;
FIG. 3 is a flow chart of the system in the embodiment;
FIG. 4 is a flow chart of the method in the example.
In the figure, 1, an alarm system control board 2, an alarm system control board 3, a linkage alarm task setting module 4, an information processing module 5, an information storage module 6, a suspicious information prediction module 7, an application strategy selection module 8, an alarm risk early warning module 9, an alarm strategy recommendation module 10, an alarm playback module 11 and an instruction output module are arranged.
Detailed Description
The invention is described in further detail below with reference to the following figures and specific examples, but the invention is not limited thereto.
Example (b):
referring to fig. 1-3, an alarm linkage system based on application strategies comprises an alarm system control panel 1, wherein the alarm system control panel 1 is provided with a video acquisition module 2, a linkage alarm task setting module 3, an information processing module 4, an information storage module 5, a suspicious information prediction module 6, an application strategy selection module 7, an alarm risk early warning module 8, an alarm strategy recommendation module 9, an alarm playback module 10 and an instruction output module 11 which are connected with each other through signals, and the alarm system control panel 1 is connected with a computer in a computer room through a lead.
As shown in fig. 4, an alarm linkage method based on an application policy includes the above alarm linkage system based on an application policy, and the method includes the following steps:
1) and (3) alarm linkage setting: manually starting a linkage warning task setting module 3 and a video acquisition module 2 in advance, setting a linkage warning task starting requirement and a candidate solution warning task strategy by the linkage warning task setting module 3 through a computer in a machine room, and acquiring real-time video information of a monitoring area by the video acquisition module 2 through a camera;
2) and (3) alarm information feedback: the information acquired by the video acquisition module 2 and the information set by the linkage alarm task setting module 3 are subjected to linkage matching on the acquired alarm setting information and the monitored area through the information processing module 4 and are stored in a computer of a machine room through the information storage module 5;
3) video suspicious information acquisition:
(1) after the machine room equipment triggers the alarm condition, intercepting a time interval according to the video of the monitoring alarm equipment area in the information storage module 5;
(2) the alarm video segment is detected and identified through an AI algorithm in a suspicious information prediction module 6, suspicious information is preliminarily judged, and a processing method is selected according to a strategy selection module 7;
(3) the AI method for the machine room comprises the following steps: classification model for machine room: firstly, sending acquired image information into a yolov3 target detection network for preliminary detection, selecting a sample which is easy to carry out false detection in an actual machine room scene as a negative sample, adding the negative sample into a yolov3 network training model for training, and thus reducing the false judgment of the target, outputting the coordinate, confidence coefficient and category information of the target after predicting the yolov3 model improved for the machine room, and being capable of acquiring more special target information in the machine room environment and effectively reducing the false detection rate;
(4) and (3) accurate positioning: because the number of network layers of the yolov3 model is less, the accurate positioning of a detection target is not facilitated, a lightweight small network is cascaded to the features obtained after the primary detection of the yolov3, the number of network layers is deepened, the quality of the detection target is improved by the small network, particularly certain small targets of a machine room, although some detection speed can be reduced, the real-time detection effect is not influenced, the better regression of a boundary frame of the detection target is facilitated, and the target in the machine room environment is accurately positioned;
4) and (3) application policy confirmation:
(1) after the strategy is selected, the alarm risk early warning module 8 divides the alarm risk level according to the alarm condition, and the alarm tasks of different levels are recommended by the alarm strategy recommending module 9 to a proper solution alarm method;
(2) the alarm playback module 10 acquires the video information of the alarm task and stores the video information in the information storage module (5);
5) and (3) alarm linkage execution: the strategy recommended by the alarm strategy recommendation module 9 is output through the instruction output module 11, the monitoring video of the alarm task place is fed back to a system administrator through the alarm playback module 10, the output instruction executes alarm linkage, the content of the video monitoring feedback comprises the existence condition of personnel inside and outside the machine room, and the arrangement condition of equipment lines in the machine room, for example, when an infrared intrusion detection sensor triggers an alarm or the equipment lines in the machine room are in fault, the administrator can identify the invading objects such as people, cats, birds and the like through the alarm playback, and the external physical line fault is found through the video feedback, so that reasonable judgment can be conveniently made.
The linkage warning task setting module 3 in the step 1) stores the linkage warning task starting requirement set by the computer in the computer room, candidate solution warning task strategy data and real-time video information of the monitored area collected by the video collecting module 2 through the camera in the computer room.
The information processing module 4 in the step 2) comprises monitoring records of the state information of the computer in the machine room.
The alarm playback module 10 in the step 4) includes the risk level of the alarm, the data of the device itself and the video information of the time interval before and after the alarm task, and stores the video information in the computer room.
The instruction output module 11 in step 5) can also eliminate the alarm task with low risk degree.
Claims (6)
1. The alarm linkage system based on the application strategy comprises an alarm system control panel and is characterized in that a video acquisition module, a linkage alarm task setting module, an information processing module, an information storage module, a suspicious information prediction module, an application strategy selection module, an alarm risk early warning module, an alarm strategy recommendation module, an alarm playback module and an instruction output module which are connected with one another through signals are arranged on the alarm system control panel, and the alarm system control panel is connected with a computer room through a wire.
2. An alarm linkage method based on application strategies, which is characterized by comprising the alarm linkage system based on the application strategies of claim 1, and the method comprises the following steps:
1) and (3) alarm linkage setting: manually starting a linkage warning task setting module and a video acquisition module in advance, setting a linkage warning task starting requirement and a candidate solution warning task strategy by a computer in a machine room through the linkage warning task setting module, and acquiring real-time video information of a monitoring area through a camera by the video acquisition module;
2) and (3) alarm information feedback: the information acquired by the video acquisition module and the information set by the linkage alarm task setting module are subjected to linkage matching on the acquired alarm setting information and the monitoring area through the information processing module and are stored in a computer of the computer room through the information storage module;
3) video suspicious information acquisition:
(1) after the machine room equipment triggers the alarm condition, intercepting a time interval according to the video of the monitoring alarm equipment area in the information storage module;
(2) detecting and identifying the alarm video segment through an AI algorithm in a suspicious information prediction module, preliminarily judging suspicious information, and selecting a selection processing method in a strategy selection module;
(3) the AI method for the machine room comprises the following steps: classification model for machine room: firstly, sending acquired image information into a yolov3 target detection network for preliminary detection, selecting a sample which is easy to be subjected to false detection in an actual machine room scene as a negative sample, and adding the negative sample into a yolov3 network training model for training so as to reduce the false judgment on a target;
(4) and (3) accurate positioning: because the number of network layers of the yolov3 model is less, the accurate positioning of a detection target is not facilitated, and the features obtained after the primary detection of the yolov3 are cascaded to a light-weight small network, the number of network layers is deepened, the detection target boundary box can be better regressed, and the target in a machine room environment can be accurately positioned;
4) and (3) application policy confirmation:
(1) after the strategy is selected, the alarm risk early warning module divides the alarm risk level according to the alarm condition, and the alarm tasks of different levels are recommended to a proper solution alarm method by the alarm strategy recommendation module;
(2) the alarm playback module acquires video information of the alarm task and stores the video information in the information storage module;
5) and (3) alarm linkage execution: and feeding back the monitoring video of the alarm task place to a system administrator through the instruction output module and the alarm playback module, and outputting an instruction to execute alarm linkage.
3. The alarm linkage method based on the application strategy of claim 2, wherein the linkage alarm task setting module in step 1) stores the linkage alarm task start requirement set by the computer in the computer room, the candidate solution alarm task strategy data and the video acquisition module which acquires the real-time video information of the monitored area through the camera in the computer room.
4. The alarm linkage method based on the application strategy of claim 2, wherein the information processing module in the step 2) comprises monitoring and recording the self state information of the computer in the computer room.
5. The alarm linkage method based on the application strategy of claim 2, wherein the alarm playback module in the step 4) comprises the risk level of the alarm, the data of the device and the video information of the time interval before and after the alarm task, and is stored in the computer of the computer room.
6. The alarm linkage method based on the application strategy of claim 2, wherein the instruction output module in the step 5) can also eliminate the alarm task with low risk degree.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111210028.4A CN113936445A (en) | 2021-10-18 | 2021-10-18 | Alarm linkage system and method based on application strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111210028.4A CN113936445A (en) | 2021-10-18 | 2021-10-18 | Alarm linkage system and method based on application strategy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113936445A true CN113936445A (en) | 2022-01-14 |
Family
ID=79279860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111210028.4A Pending CN113936445A (en) | 2021-10-18 | 2021-10-18 | Alarm linkage system and method based on application strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113936445A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101478441A (en) * | 2009-02-03 | 2009-07-08 | 江西省电力信息通讯有限公司 | Electric communication operation support and emergency command system |
CN101511002A (en) * | 2009-03-04 | 2009-08-19 | 中兴通讯股份有限公司 | Ganged monitoring system and implementing method |
CN105426254A (en) * | 2015-12-24 | 2016-03-23 | 北京轻元科技有限公司 | Graded cloud computing resource customizing method and system |
CN110825047A (en) * | 2019-11-08 | 2020-02-21 | 成都交大许继电气有限责任公司 | Intelligent linkage customization method of railway comprehensive auxiliary monitoring system |
CN111488766A (en) * | 2019-01-28 | 2020-08-04 | 北京京东尚科信息技术有限公司 | Target detection method and device |
CN112688796A (en) * | 2020-12-11 | 2021-04-20 | 贵州电网有限责任公司 | Monitoring method for automatic early warning and alarming functions of IT assets |
CN113269034A (en) * | 2021-04-12 | 2021-08-17 | 南京瀚元科技有限公司 | Power distribution station scene linkage system and method based on content identification |
-
2021
- 2021-10-18 CN CN202111210028.4A patent/CN113936445A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101478441A (en) * | 2009-02-03 | 2009-07-08 | 江西省电力信息通讯有限公司 | Electric communication operation support and emergency command system |
CN101511002A (en) * | 2009-03-04 | 2009-08-19 | 中兴通讯股份有限公司 | Ganged monitoring system and implementing method |
CN105426254A (en) * | 2015-12-24 | 2016-03-23 | 北京轻元科技有限公司 | Graded cloud computing resource customizing method and system |
CN111488766A (en) * | 2019-01-28 | 2020-08-04 | 北京京东尚科信息技术有限公司 | Target detection method and device |
CN110825047A (en) * | 2019-11-08 | 2020-02-21 | 成都交大许继电气有限责任公司 | Intelligent linkage customization method of railway comprehensive auxiliary monitoring system |
CN112688796A (en) * | 2020-12-11 | 2021-04-20 | 贵州电网有限责任公司 | Monitoring method for automatic early warning and alarming functions of IT assets |
CN113269034A (en) * | 2021-04-12 | 2021-08-17 | 南京瀚元科技有限公司 | Power distribution station scene linkage system and method based on content identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109068099B (en) | Virtual electronic fence monitoring method and system based on video monitoring | |
KR101716365B1 (en) | Module-based intelligent video surveillance system and antitheft method for real-time detection of livestock theft | |
KR102195706B1 (en) | Method and Apparatus for Detecting Intruder | |
US20130011014A1 (en) | Surveillance system and method | |
KR102478335B1 (en) | Image Analysis Method and Server Apparatus for Per-channel Optimization of Object Detection | |
CN110516529A (en) | It is a kind of that detection method and system are fed based on deep learning image procossing | |
CN103325209A (en) | Intelligent security alarm system based on wireless | |
CN109377697A (en) | Rapid Alarm method of disposal under a kind of intensive camera head environment | |
CN110012268A (en) | Pipe network AI intelligent control method, system, readable storage medium storing program for executing and equipment | |
CN115116004A (en) | Office area abnormal behavior detection system and method based on deep learning | |
CN107123242A (en) | A kind of intelligent building Video Surveillance Alarm System | |
US11409989B2 (en) | Video object detection with co-occurrence | |
KR102107957B1 (en) | Cctv monitoring system for detecting the invasion in the exterior wall of building and method thereof | |
CN110674753A (en) | Theft early warning method, terminal device and storage medium | |
CN116994389A (en) | Monitoring alarm driving system and method based on artificial intelligence and image recognition | |
CN114979580A (en) | Image recognition device and method for machine room monitoring | |
CN112633157A (en) | AGV working area safety real-time detection method and system | |
CN113936445A (en) | Alarm linkage system and method based on application strategy | |
EP3839908A1 (en) | Close object detection for surveillance cameras | |
CN112669553A (en) | Unattended system and method for oil and gas station | |
CN116597501A (en) | Video analysis algorithm and edge device | |
CN115629567A (en) | Multi-mode information management system, early warning method and storage medium for livestock and poultry farm | |
CN110610589A (en) | Campus security system | |
US11900706B1 (en) | Object of interest detector distance-based multi-thresholding | |
TWI706381B (en) | Method and system for detecting image object |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220114 |
|
RJ01 | Rejection of invention patent application after publication |