CN114170752A - Monitoring method for perimeter security - Google Patents

Monitoring method for perimeter security Download PDF

Info

Publication number
CN114170752A
CN114170752A CN202111492623.1A CN202111492623A CN114170752A CN 114170752 A CN114170752 A CN 114170752A CN 202111492623 A CN202111492623 A CN 202111492623A CN 114170752 A CN114170752 A CN 114170752A
Authority
CN
China
Prior art keywords
alarm
real
video image
signal
monitoring method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111492623.1A
Other languages
Chinese (zh)
Inventor
丁兆涛
刘兴德
袁华
胡宝民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weifang Xinlong Biomaterials Co Ltd
Original Assignee
Weifang Xinlong Biomaterials Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weifang Xinlong Biomaterials Co Ltd filed Critical Weifang Xinlong Biomaterials Co Ltd
Priority to CN202111492623.1A priority Critical patent/CN114170752A/en
Publication of CN114170752A publication Critical patent/CN114170752A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a perimeter security monitoring method, which is based on a perimeter security monitoring system, wherein the perimeter security monitoring system comprises a plurality of cameras arranged along a security perimeter and alarm devices respectively communicated with the cameras, and two adjacent cameras are mutually opposite; the monitoring method comprises the following steps: acquiring output signals of all cameras; matching the output signal with a preset alarm signal; if the position data of the corresponding camera is matched with the position data of the corresponding camera, acquiring the position data of the corresponding camera; generating a corresponding alarm signal according to the output signal and the position data; and triggering the alarm device to act to send out an alarm according to the alarm signal. When judging that an intruder needs to give an alarm, the camera transmits a corresponding output signal to the alarm device, and the alarm device starts to give an alarm. The monitoring method can effectively, accurately and real-timely monitor the perimeter, thereby playing an effective monitoring role, and the method has simple operation and low cost, and the clear image reduces the false alarm rate.

Description

Monitoring method for perimeter security
Technical Field
The invention relates to the technical field of intelligent security, in particular to a perimeter security monitoring method.
Background
Along with the construction of a new biological material park, the scale of the construction of the park is continuously enlarged, the production materials and materials of the park are gradually increased, and in order to prevent the loss and the theft of the materials and materials, a video monitoring system is installed according to the traditional mode; the traditional monitoring system mainly monitors key positions, and generally focuses on key monitoring of a plurality of high-value articles entering and exiting the large door in a park.
The perpetrator definitely knows that the monitoring of the entrance and the exit is relatively comprehensive, and the guard attendant examines the entrance and the exit and generally avoids the entrance and the exit. The area that the garden contacted with the external world is great is exactly the perimeter scope of garden, has the characteristics that the area is big to be good to be taken precautions against, selects to be higher at the success rate of making a case at garden perimeter, is the area that we focus on taking precautions against.
The principle of an independent park perimeter alarm system on the market is that most detectors are provided with front-end induction alarms, if people invade trigger signals, the alarm detectors transmit detected signals to an alarm host, and the alarm host gives an alarm through a linkage device to give an audible and visual alarm to prompt the front end to give an alarm. The market is mainly as follows: the pulse electronic fence (deterrence is carried out by high-voltage pulse current on a front-end cable), infrared correlation and the like have the defects of high false alarm rate, incapability of finding and tracking on site in time, incapability of keeping evidence on site and the like.
Disclosure of Invention
Aiming at the defects, the technical problems to be solved by the invention are as follows: the method can effectively, accurately and real-timely monitor the perimeter, thereby playing an effective supervision role, and has the advantages of simple operation, low cost and clear image reduction of false alarm rate.
In order to solve the technical problems, the technical scheme of the invention is as follows:
a monitoring method of perimeter security protection is based on a perimeter security protection monitoring system, wherein the perimeter security protection monitoring system comprises a plurality of cameras arranged along a security protection perimeter and alarm devices respectively communicated with the cameras, and two adjacent cameras are mutually opposite;
the monitoring method comprises the following steps:
acquiring output signals of all cameras;
matching the output signal with a preset alarm signal;
if the position data of the corresponding camera is matched with the position data of the corresponding camera, acquiring the position data of the corresponding camera;
generating a corresponding alarm signal according to the output signal and the position data;
and triggering the alarm device to act to send out an alarm according to the alarm signal.
Preferably, each of the cameras outputs a signal, and the method includes the following steps:
presetting an out-of-range detection mode and/or a regional intrusion detection mode;
acquiring a real-time image;
processing the real-time image by using an out-of-range detection mode or an area intrusion detection mode to generate a corresponding processing result;
and generating a corresponding output signal according to the processing result.
Preferably, the border crossing detection method specifically includes: pre-drawing an out-of-boundary line in the monitored video image to form a first video image;
the processing the real-time image includes:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the first video image;
if an object in the real-time video image crosses the boundary line, generating an output signal corresponding to the alarm;
and if no object crosses the boundary line in the real-time video image, generating an output signal corresponding to no alarm.
Preferably, the area intrusion detection method specifically includes: a region is drawn in advance in the monitored video image to form a second video image;
the processing the real-time image includes:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the second video image;
if an object in the real-time video image enters the area, generating an output signal corresponding to the alarm;
and if no object enters the area in the real-time video image, generating an output signal corresponding to no alarm.
Preferably, the sensitivity of each camera is adjusted to 80% to 100%.
Preferably, a surveillance video image is preset in each camera, and the area of the surveillance video image is not larger than the area of the video image shot by each camera; and the real-time image is a surveillance video image.
Preferably, the triggering of the alarm device to send out an alarm includes:
generating a corresponding optical alarm signal according to the alarm signal;
transmitting acousto-optic alarm signals to a field alarm lamp device;
the alarm lamp device executes the action and triggers the alarm lamp device to emit light.
Preferably, the triggering of the alarm device to send out an alarm includes:
generating a corresponding display signal according to the alarm signal;
and controlling the display screen to display according to the display signal.
In a preferred manner, the first and second substrates are,
generating a corresponding sound alarm signal according to the alarm signal;
and controlling the sound production device to produce sound according to the sound alarm signal.
Preferably, the triggering of the alarm device to send out an alarm includes:
generating a corresponding capture signal according to the alarm signal;
transmitting a capture signal to the on-site net gun;
the net gun acts to launch the catching net.
After the technical scheme is adopted, the invention has the beneficial effects that:
the perimeter security monitoring method is based on a perimeter security monitoring system, the perimeter security monitoring system comprises a plurality of cameras arranged along the security perimeter and alarm devices respectively communicated with the cameras, and two adjacent cameras are mutually opposite; the monitoring method of the present invention comprises the steps of: acquiring output signals of all cameras; matching the output signal with a preset alarm signal; if the position data of the corresponding camera is matched with the position data of the corresponding camera, acquiring the position data of the corresponding camera; generating a corresponding alarm signal according to the output signal and the position data; and triggering the alarm device to act to send out an alarm according to the alarm signal. Therefore, the monitoring method of the invention obtains the video image of the periphery by utilizing the cameras arranged on the periphery, and the two adjacent cameras are mutually opposite, so that the light of the shot video image is uniform and clear, and the monitoring and the judgment of whether an invader exists are facilitated; when the video camera obtains that an intruder needs to give an alarm through the shot video image, the video camera transmits a corresponding output signal to the alarm device, and the alarm device starts to give an alarm. Therefore, the monitoring method can effectively, accurately and real-timely monitor the perimeter, thereby playing an effective monitoring role, and the method has simple operation and low cost, and the false alarm rate is reduced by clear images.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following examples further illustrate the present invention in detail. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A perimeter security monitoring method is based on a perimeter security monitoring system, wherein the perimeter security monitoring system comprises a plurality of cameras arranged along a security perimeter and alarm devices respectively communicated with the cameras, and two adjacent cameras are mutually opposite to each other so as to make up a blind area under a lamp below the other camera; in addition, the height of each camera is mainly the full perimeter of the overlooking, namely, all video images of the perimeter can be obtained.
The monitoring method of the invention comprises the following steps:
step one, acquiring output signals of all cameras;
step two, matching the output signal with a preset alarm signal;
step three, if the position data of the corresponding camera is matched with the position data of the corresponding camera, the position data of the corresponding camera is acquired;
generating a corresponding alarm signal according to the output signal and the position data;
and step five, triggering an alarm device to act and send out an alarm according to the alarm signal.
Therefore, the monitoring method can effectively, accurately and real-timely monitor the perimeter, thereby playing an effective monitoring role, and the method has simple operation and low cost, and the false alarm rate is reduced by clear images. A three-dimensional rapid-reflection safety precaution system is constructed through a large amount of instant effective information, and coordination and unification of physical defense, civil defense and technical defense are achieved.
A method of outputting signals from cameras comprising the steps of:
presetting an out-of-range detection mode and/or a regional intrusion detection mode;
acquiring a real-time image;
processing the real-time image by using an out-of-range detection mode or an area intrusion detection mode to generate a corresponding processing result;
and generating a corresponding output signal according to the processing result.
The border crossing detection method specifically comprises the following steps: pre-drawing an out-of-boundary line in the monitored video image to form a first video image;
processing the real-time image, including:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the first video image;
if an object in the real-time video image crosses the boundary line, generating an output signal corresponding to the alarm;
and if no object crosses the boundary line in the real-time video image, generating an output signal corresponding to no alarm.
The area intrusion detection method specifically includes: a region is drawn in advance in the monitored video image to form a second video image;
processing the real-time image, including:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the second video image;
if an object in the real-time video image enters the area, generating an output signal corresponding to the alarm;
and if no object enters the area in the real-time video image, generating an output signal corresponding to no alarm.
The border crossing detection means crossing a line drawn in the video image, and detecting whether an object crosses the line in the video image or not to judge whether an alarm signal is sent out or not. The method is conventionally applied to areas such as enclosing walls, riversides, doorways and the like, and after a boundary is set in a video image, an alarm can be triggered after an object passes through the boundary.
The regional intrusion detection is to judge whether the video image enters a certain set region, and if so, alarm is performed in a linkage manner according to the judgment result. The area monitoring area is larger, and after the area is divided, the function can detect in real time that an object enters the area and trigger an alarm function.
The difference between the two is that, in terms of the geometric point-line-surface range, if the boundary-crossing detection is to detect one line, the area intrusion detection is to detect one surface, and the area intrusion range is larger. In addition, the area intrusion detection range is set to be larger, the alarm is generated after the alarm area stays for 1 second, the sensitivity of target objects (including people and vehicles) is adjusted to 80%, and people and objects passing through the inside and outside of the area are alarmed in real time except fallen leaves and small animals.
The regional invasion is surveyed regional division and is a little big, triggers the warning when the target object just gets into the regional core position yet, and the scene alarm lamp passes through the relay and lasts the flash of light warning, reaches the surveillance center that has someone on duty 24 hours simultaneously, and surveillance center facility has two kinds of ways to report to the police simultaneously and shows:
and adjusting the sensitivity of each camera to 80-100%, wherein the sensitivity refers to dividing the real-time image into 25 frames, wherein at least 80% of the frames have objects crossing the boundary line, or at least 80% of the frames have object invasion areas, and the cameras have alarm output signals, so that the false alarm rate is reduced.
Presetting a monitoring video image in each camera, wherein the area of the monitoring video image is not more than that of the video image shot by each camera; and the real-time image is a surveillance video image.
The alarm device comprises a display screen, an alarm lamp device and a sound production device which are arranged on the site; then
Trigger the alarm device action and send out the warning, include:
generating a corresponding optical alarm signal according to the alarm signal;
transmitting acousto-optic alarm signals to a field alarm lamp device;
the alarm lamp device executes the action and triggers the alarm lamp device to emit light.
Trigger the alarm device action and send out the warning, include:
generating a corresponding display signal according to the alarm signal;
and controlling the display screen to display according to the display signal.
The display screen can display the alarm position, video images at the moment and the like so as to inform security personnel.
Generating a corresponding sound alarm signal according to the alarm signal;
and controlling the sound production device to produce sound according to the sound alarm signal.
The sounding device can be a sound box arranged in a monitoring center, and the sound box can prompt that the regional invasion event happens in a certain region for multiple times while the display screen displays the alarm information.
Trigger the alarm device action and send out the warning, include:
generating a corresponding capture signal according to the alarm signal;
transmitting a capture signal to the on-site net gun;
the net gun acts to launch the catching net.
The intelligent security perimeter alarm system for the new biomaterial park has obvious effect after being used for one month, and can frequently avoid the phenomenon that the non-industrial personnel who have several victory matters near the new plant escape from the fence facility after damaging the fence facility in a small range, so that the damage can be avoided, and the alarm condition cannot be formed due to low value. The key area is provided with an explosion-proof arresting device net gun, after the real-time alarm is given through the periphery, a monitoring operator opens the on-site net gun through a remote relay, a fifteen-meter net is popped out to surround the destructive personnel, so that the deterrence is formed, and the problem that no operator destroys the enclosure wall is partially solved.
Recently, according to the condition that the position of a fence is not fixed when perimeter careless personnel destroy, the unmanned aerial vehicle is started to carry out timed patrol, the multifunctional pneumatic unmanned aerial vehicle catching net is additionally arranged on the unmanned aerial vehicle, and the situation that the perimeter alarm system of intelligent security and protection thoroughly solves the problem that the perimeter is destroyed by the careless personnel is matched.
When the invention is applied to a new biological material garden, the east-west span of the new biological material garden is 500 meters, the south-north span is 680 meters, the southwest corner and the road surface form an arc, and the length around the garden is 2170 meter. According to the height of the on-site fence, the height of the monitoring rod is 4.0 meters, and the height position of the camera is 3.8 meters, so that the perimeter fence can be overlooked. The camera adopts a 1/1.8' CMOS chip, and 4mm and 6mm cameras are selected according to the situation of the field. 4mm camera, horizontal field angle: 87 °, vertical field angle: 46 °, diagonal angle of view: 104 degrees. 6mm camera, horizontal field angle: 55 °, vertical field angle: 31 °, diagonal angle of view: and 63 degrees. Generally, a 6mm camera is arranged on a horizontal perimeter fence, and when the situation that peripheral facilities and equipment need to be focused on at the corners of the perimeter and at the entrance and exit is met, the 4mm camera is used, and the coverage range can meet the monitoring requirement.
The above-mentioned preferred embodiments of the present invention are not intended to limit the present invention, and any modifications, equivalent improvements of the monitoring method of perimeter security, etc. within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The monitoring method of perimeter security protection is characterized in that based on a perimeter security protection monitoring system, the perimeter security protection monitoring system comprises a plurality of cameras arranged along a security protection perimeter and alarm devices respectively communicated with the cameras, and two adjacent cameras are mutually opposite;
the monitoring method comprises the following steps:
acquiring output signals of all cameras;
matching the output signal with a preset alarm signal;
if the position data of the corresponding camera is matched with the position data of the corresponding camera, acquiring the position data of the corresponding camera;
generating a corresponding alarm signal according to the output signal and the position data;
and triggering the alarm device to act to send out an alarm according to the alarm signal.
2. The perimeter security monitoring method according to claim 1, wherein each camera outputs a signal, comprising the steps of:
presetting an out-of-range detection mode and/or a regional intrusion detection mode;
acquiring a real-time image;
processing the real-time image by using an out-of-range detection mode or an area intrusion detection mode to generate a corresponding processing result;
and generating a corresponding output signal according to the processing result.
3. The perimeter security monitoring method according to claim 2, wherein the border crossing detection mode specifically comprises: pre-drawing an out-of-boundary line in the monitored video image to form a first video image;
the processing the real-time image includes:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the first video image;
if an object in the real-time video image crosses the boundary line, generating an output signal corresponding to the alarm;
and if no object crosses the boundary line in the real-time video image, generating an output signal corresponding to no alarm.
4. The perimeter security monitoring method according to claim 2, wherein the area intrusion detection method specifically comprises: a region is drawn in advance in the monitored video image to form a second video image;
the processing the real-time image includes:
dividing the real-time image into a plurality of frames of real-time video images;
comparing each real-time video image with the second video image;
if an object in the real-time video image enters the area, generating an output signal corresponding to the alarm;
and if no object enters the area in the real-time video image, generating an output signal corresponding to no alarm.
5. The perimeter security monitoring method according to claim 3 or 4, wherein the sensitivity of each camera is adjusted to 80% to 100%.
6. The perimeter security monitoring method according to claim 3 or 4, wherein a monitoring video image is preset in each camera, and the area of the monitoring video image is not larger than the area of the video image shot by each camera; and the real-time image is a surveillance video image.
7. The perimeter security monitoring method according to claim 1, wherein the triggering alarm device acts to send out an alarm, comprising:
generating a corresponding optical alarm signal according to the alarm signal;
transmitting acousto-optic alarm signals to a field alarm lamp device;
the alarm lamp device executes the action and triggers the alarm lamp device to emit light.
8. The perimeter security monitoring method according to claim 1, wherein the triggering alarm device acts to send out an alarm, comprising:
generating a corresponding display signal according to the alarm signal;
and controlling the display screen to display according to the display signal.
9. The perimeter security monitoring method according to claim 1,
generating a corresponding sound alarm signal according to the alarm signal;
and controlling the sound production device to produce sound according to the sound alarm signal.
10. The perimeter security monitoring method according to claim 1, wherein the triggering alarm device acts to send out an alarm, comprising:
generating a corresponding capture signal according to the alarm signal;
transmitting a capture signal to the on-site net gun;
the net gun acts to launch the catching net.
CN202111492623.1A 2021-12-08 2021-12-08 Monitoring method for perimeter security Pending CN114170752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111492623.1A CN114170752A (en) 2021-12-08 2021-12-08 Monitoring method for perimeter security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111492623.1A CN114170752A (en) 2021-12-08 2021-12-08 Monitoring method for perimeter security

Publications (1)

Publication Number Publication Date
CN114170752A true CN114170752A (en) 2022-03-11

Family

ID=80484281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111492623.1A Pending CN114170752A (en) 2021-12-08 2021-12-08 Monitoring method for perimeter security

Country Status (1)

Country Link
CN (1) CN114170752A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708695A (en) * 2022-04-01 2022-07-05 潍坊欣龙生物材料有限公司 Perimeter security monitoring system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192328A (en) * 2007-06-11 2008-06-04 诺必施科技(厦门)有限公司 A mapping recognition alarming system device and alarming method
CN102045544A (en) * 2010-11-10 2011-05-04 无锡中星微电子有限公司 Video monitoring system and video data transmission method thereof
CN103443008A (en) * 2011-03-28 2013-12-11 因温特奥股份公司 Access-monitoring device with at least one video unit
CN104704816A (en) * 2012-09-25 2015-06-10 Sk电信有限公司 Apparatus and method for detecting event from plurality of photographed images
CN105763844A (en) * 2016-01-28 2016-07-13 北海益众和辉电子科技有限公司 Intelligent visualized remote catching net gun system and control method thereof
CN205545706U (en) * 2016-04-13 2016-08-31 云南电网有限责任公司电力科学研究院 Virtual fence is used to electric power
CN106448009A (en) * 2016-11-07 2017-02-22 上海锂居信息科技有限公司 Perimeter intrusion detection system and method
CN207558177U (en) * 2017-11-15 2018-06-29 中设厚科安防科技(天津)有限公司 A kind of perimeter security intelligent monitoring device based on communication network
CN109993936A (en) * 2019-03-19 2019-07-09 上海电力高压实业有限公司 Transfomer Substation Reconstruction geofence system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192328A (en) * 2007-06-11 2008-06-04 诺必施科技(厦门)有限公司 A mapping recognition alarming system device and alarming method
CN102045544A (en) * 2010-11-10 2011-05-04 无锡中星微电子有限公司 Video monitoring system and video data transmission method thereof
CN103443008A (en) * 2011-03-28 2013-12-11 因温特奥股份公司 Access-monitoring device with at least one video unit
CN104704816A (en) * 2012-09-25 2015-06-10 Sk电信有限公司 Apparatus and method for detecting event from plurality of photographed images
CN105763844A (en) * 2016-01-28 2016-07-13 北海益众和辉电子科技有限公司 Intelligent visualized remote catching net gun system and control method thereof
CN205545706U (en) * 2016-04-13 2016-08-31 云南电网有限责任公司电力科学研究院 Virtual fence is used to electric power
CN106448009A (en) * 2016-11-07 2017-02-22 上海锂居信息科技有限公司 Perimeter intrusion detection system and method
CN207558177U (en) * 2017-11-15 2018-06-29 中设厚科安防科技(天津)有限公司 A kind of perimeter security intelligent monitoring device based on communication network
CN109993936A (en) * 2019-03-19 2019-07-09 上海电力高压实业有限公司 Transfomer Substation Reconstruction geofence system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708695A (en) * 2022-04-01 2022-07-05 潍坊欣龙生物材料有限公司 Perimeter security monitoring system

Similar Documents

Publication Publication Date Title
US11328566B2 (en) Video analytics system
US20200364999A1 (en) Monitoring systems
CN106327759B (en) A kind of intelligent safety protection system for being deployed in the pre- anti-intrusion of unattended operation transformer station
US10392829B2 (en) Smart fence
US6816073B2 (en) Automatic detection and monitoring of perimeter physical movement
CN103745579B (en) A kind of safety defense monitoring system
CN209993060U (en) Electronic fence linkage system based on internet of things technology
CN103778741A (en) Electronic fence integrated control system and monitoring method
CN206136125U (en) Radar video fuses alarm device , system and equipment
CN112820054A (en) Transformer substation enclosure monitoring system
CN114170752A (en) Monitoring method for perimeter security
CN114446004A (en) Security protection system
CN114708695A (en) Perimeter security monitoring system
CN206460573U (en) Enclosure wall anti-theft alarm system
CN105763835A (en) Community intelligent monitoring system
CN115841727A (en) Airport enclosure intrusion alarm system and method
CN113205654A (en) Airport enclosure security monitoring alarm system and method based on AI information technology
CN208819329U (en) A kind of safety supervision system being able to carry out positioning early warning in real time
JP4061338B2 (en) Intrusion detection device
CN207558145U (en) A kind of border guard system multimode on-line monitoring device
CN106558183A (en) A kind of automobile production manufactory safety monitoring system
CN215006865U (en) Intelligent security system
KR200266128Y1 (en) Motion tracking surveillance and repulsive system
CN220400031U (en) Intelligent out-of-range detection system
KR101993632B1 (en) Detecting intrusion device and security system including the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination