CN114779241A - Package security check method and device, storage medium and electronic equipment - Google Patents

Package security check method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN114779241A
CN114779241A CN202210732351.6A CN202210732351A CN114779241A CN 114779241 A CN114779241 A CN 114779241A CN 202210732351 A CN202210732351 A CN 202210732351A CN 114779241 A CN114779241 A CN 114779241A
Authority
CN
China
Prior art keywords
package
target
radar
detected
millimeter wave
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210732351.6A
Other languages
Chinese (zh)
Other versions
CN114779241B (en
Inventor
罗斐翔
徐魁文
罗喜伶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Innovation Research Institute of Beihang University
Original Assignee
Hangzhou Innovation Research Institute of Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Innovation Research Institute of Beihang University filed Critical Hangzhou Innovation Research Institute of Beihang University
Priority to CN202210732351.6A priority Critical patent/CN114779241B/en
Publication of CN114779241A publication Critical patent/CN114779241A/en
Application granted granted Critical
Publication of CN114779241B publication Critical patent/CN114779241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/887Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V8/00Prospecting or detecting by optical means
    • G01V8/005Prospecting or detecting by optical means operating with millimetre waves, e.g. measuring the black losey radiation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V8/00Prospecting or detecting by optical means
    • G01V8/10Detecting, e.g. by using light barriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Geophysics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The application provides a parcel security check method, a parcel security check device, a storage medium and an electronic device, wherein the parcel security check method comprises the following steps: controlling the millimeter wave radar array to operate according to target execution parameters, and scanning the package to be detected to obtain radar echo signals, wherein the penetration rate of the radar signals corresponding to the target execution parameters relative to the packaging layer of the package to be detected is greater than a preset penetration threshold value; acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected; determining whether the target item is a suspected risk item based on the target image. Under the condition that a packaging layer of a package is not disassembled, a target image is obtained through a millimeter wave radar which is lower in cost and safer, whether the target object is a suspected risk object or not is further determined, and safety inspection is finished.

Description

Package security inspection method and device, storage medium and electronic equipment
Technical Field
The application relates to the field of security inspection, in particular to a package security inspection method and device, a storage medium and electronic equipment.
Background
Along with the improvement of living standard of people, the development trend of network purchasing is stronger and stronger. With the increase of the number of online purchases, the number of packages needing to be transported by logistics is also increasing explosively. As packages are often centrally stored, centrally transported, or shipped away from the customer's home. When a package has a potential safety hazard, such as an explosive or flammable article, huge property loss or personal injury may be caused.
Therefore, how to perform security inspection on the packages becomes a problem which is concerned by those skilled in the art.
Disclosure of Invention
It is an object of the present application to provide a package security inspection method, apparatus, storage medium and electronic device to at least partially improve the above problems.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a package security check method, which is applied to a control system, and the method includes:
controlling a millimeter wave radar array to operate according to target execution parameters, and scanning a package to be detected to obtain a radar echo signal, wherein the penetration rate of a radar signal corresponding to the target execution parameters relative to a packaging layer of the package to be detected is greater than a preset penetration threshold value;
acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected;
determining whether the target item is a suspected risk item based on the target image.
In a second aspect, an embodiment of the present application provides a package security inspection device, which is applied to a control system, and the device includes:
the information acquisition unit is used for controlling the millimeter wave radar array to operate according to target execution parameters and scanning the package to be detected to acquire radar echo signals, wherein the penetration rate of the radar signals corresponding to the target execution parameters relative to the package layer of the package to be detected is greater than a preset penetration threshold value;
the processing unit is used for acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected;
the processing unit is further configured to determine whether the target item is a suspected risk item based on the target image.
In a third aspect, the present application provides a storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method described above.
In a fourth aspect, an embodiment of the present application provides an electronic device, where the electronic device includes: a processor and memory for storing one or more programs; the one or more programs, when executed by the processor, implement the methods described above.
Compared with the prior art, the package security inspection method, the package security inspection device, the storage medium and the electronic device provided by the embodiment of the application comprise the following steps: controlling the millimeter wave radar array to operate according to target execution parameters, and scanning the package to be detected to obtain radar echo signals, wherein the penetration rate of the radar signals corresponding to the target execution parameters relative to the package layer of the package to be detected is greater than a preset penetration threshold value; acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected; determining whether the target item is a suspected risk item based on the target image. Under the condition that a packaging layer of a package is not disassembled, a target image is obtained through a millimeter wave radar which is lower in cost and safer, whether the target object is a suspected risk object or not is further determined, and safety inspection is finished.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic partial structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a schematic partial structural diagram of a security inspection system provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of a package security inspection method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a package security inspection method according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating sub-steps of S102 according to an embodiment of the present application;
FIG. 6 is a schematic diagram illustrating sub-steps of S102-2 provided in an embodiment of the present application;
fig. 7 is a schematic flowchart of a package security check method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of a package security check method according to an embodiment of the present application;
fig. 9 is a schematic flowchart of a package security inspection method according to an embodiment of the present application;
fig. 10 is a schematic unit diagram of a package security inspection device according to an embodiment of the present application.
In the figure: 10-a processor; 11-a memory; 12-a bus; 13-a communication interface; 14-GPU; 100-a control system; 200-millimeter wave radar array; 300-a lifting module; 400-target detection unit; 500-a human-computer interaction unit; 600-a display unit; 700-a power supply unit; 1001-information acquisition unit; 1002-a processing unit.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it should be noted that the terms "upper", "lower", "inner", "outer", and the like indicate orientations or positional relationships based on orientations or positional relationships shown in the drawings or orientations or positional relationships conventionally found in use of products of the application, and are used only for convenience in describing the present application and for simplification of description, but do not indicate or imply that the referred devices or elements must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
The embodiment of the application provides an electronic device, which can be applied to a security inspection system and can be a control system in the security inspection system. Please refer to fig. 1, a schematic structural diagram of an electronic device. The electronic device comprises a processor 10, a memory 11, a bus 12. The processor 10, the memory 11 are connected by a bus 12, and the processor 10 is configured to execute executable modules, such as computer programs, stored in the memory 11.
The processor 10 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the package security inspection method may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 10. The Processor 10 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
The Memory 11 may comprise a high-speed Random Access Memory (RAM) and may further comprise a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The bus 12 may be an ISA (Industry Standard architecture) bus, a PCI (peripheral Component interconnect) bus, or an EISA (extended Industry Standard architecture) bus. Only one bi-directional arrow is shown in fig. 1, but this does not indicate only one bus 12 or one type of bus 12.
The memory 11 is used for storing programs, such as programs corresponding to package security check devices. The package security device includes at least one software function module which may be stored in the memory 11 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the electronic device. The processor 10 executes the program to implement the package security check method after receiving the execution instruction.
Possibly, the electronic device provided in the embodiment of the present application may further include a communication interface 13 and a GPU14, which may also be referred to as a graphics processing unit and may serve as an edge computing unit of the assistance processor 10. The communication interface 13 and the GPU14 are connected to the processor 10 via a bus.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a part of a security inspection system according to an embodiment of the present disclosure. As shown in fig. 2, the security inspection system includes a control system 100, a millimeter wave radar array 200, a lifting module 300, a target detection unit 400, a human-computer interaction unit 500, a display unit 600, and a power supply unit 700. The millimeter wave radar array 200, the lifting module 300, the target detection unit 400, the human-computer interaction unit 500, the display unit 600 and the power supply unit 700 are all connected with the control system 100. It should be understood that the power supply unit 700 may also be connected with other modules in the security inspection system to supply power to the other modules.
Optionally, the millimeter wave radar array 200 is installed on one side of the lifting module 300 facing the detection table, the detection table is used for placing the package to be detected, one side of the lifting module 300 facing the detection table is further provided with a target detection unit 400, and the target detection unit 400 is used for detecting whether the package to be detected exists on the plane where the target detection unit 400 is located.
It should be understood that millimeter wave radar array 200 may scan a package to be detected placed on the detection platform to obtain a corresponding radar echo signal, and may also transmit the radar echo signal to control system 100.
The millimeter wave radar is generally a radar with a wavelength in the millimeter wave band (1 to 10 mm in wavelength), and the operating frequency thereof is 30 to 300 GHz. The millimeter wave radar has higher working frequency and can obtain resolution precision meeting the requirement of security inspection; meanwhile, the millimeter waves have good penetrating power for cartons, plastic bags, wood and the like, and hidden articles such as logistics packages can be conveniently detected. And for objects made of different materials, the millimeter waves irradiate the surfaces of the objects to obtain scattering characteristics with obvious differences, and the received scattering echoes are subjected to parameter inversion by means of an electromagnetic backscattering algorithm, so that imaging not only stays in the shape information of the measured object, but also the material information of the measured object can be obtained, and the false alarm probability in the security inspection process is greatly reduced.
Compared with traditional X-ray machine security inspection equipment, although it possesses very strong penetrating imaging ability, its radiation characteristic and high price for X-ray machine can't use widely in civilian fields such as commodity circulation parcel detection on a large scale, especially along with small unmanned aerial vehicle logistics distribution service is in some city overhead test applications, future security inspection detection demand with family as unit will increase greatly, a set of safe and reliable, the millimeter wave radar image device of low price is favorable to reducing the safe risk of article in the unknown parcel.
Lifting module 300 may be adjusted in height under the control of control system 100 to facilitate full scanning of the millimeter wave radar array 200 for the packages to be inspected placed on the inspection station.
The object detection unit 400 may feed back the detection result to the control system 100 so that the control system 100 knows whether a package to be detected is currently placed on the detection station. If so, millimeter wave radar array 200 may be controlled to scan.
The human-computer interaction unit 500 is used for receiving an instruction input by a user, and may be a keyboard, a mouse or a joystick.
The display unit 600 is used for displaying a security inspection result, and is convenient for a worker to observe.
It should be understood that the structure shown in fig. 1 is merely a structural schematic diagram of a portion of an electronic device, which may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The package security inspection method provided in the embodiment of the present application may be applied to, but is not limited to, the electronic device shown in fig. 1, and please refer to fig. 3, where the package security inspection method includes: s102, S104, S105, and S109 are specifically described below.
And S102, controlling the millimeter wave radar array to operate according to the target execution parameters, and scanning the package to be detected to acquire a radar echo signal.
And the penetration rate of the radar signal corresponding to the target execution parameter relative to the packaging layer of the to-be-detected package is greater than a preset penetration threshold value.
Optionally, the target execution parameters include any one or more of radar signal waveform, radar output power, phase, and wavelength. The packaging layer may be, but is not limited to, a carton, a plastic bag, or wood. The radar signals emitted by the millimeter wave radar array have better penetrability relative to a packaging layer by limiting target execution parameters, and the effect of internal imaging of a report is improved.
And S104, acquiring a target image based on the radar echo signal.
The target image is an image corresponding to a target object in the package to be detected.
The processor 10 may obtain corresponding imaging results, i.e., target images, from the MIMO radar three-dimensional imaging. The processor 10 may sequentially perform the following processing, specifically, matched filter orthogonal sorting, frequency domain sampling, fourier transform, interpolation, inverse fourier transform, and the like on the radar echo signal, and finally obtain a target image.
And S105, determining whether the target object is a suspected risk object or not based on the target image. If yes, executing S109; if not, ending.
Alternatively, the target item type may be estimated based on the target image. For example, when the predicted target object is an explosive object, the target object may be determined to be a suspected risk object. At this time, an alarm prompt may be performed, that is, S109 is executed; conversely, when it is determined that it is not a suspected risk item, no further processing is required.
And S109, alarming.
Optionally, the display unit 600 may display the alarm content, may also alarm through an independent sound-light alarm, or may alarm through a short message, and the like, which is not limited herein.
To sum up, the embodiment of the present application provides a package security inspection method, including: controlling the millimeter wave radar array to operate according to target execution parameters, and scanning the package to be detected to obtain radar echo signals, wherein the penetration rate of the radar signals corresponding to the target execution parameters relative to the package layer of the package to be detected is greater than a preset penetration threshold value; acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected; determining whether the target item is a suspected risk item based on the target image. Under the condition that a packaging layer of a package is not disassembled, a target image is obtained through a millimeter wave radar which is lower in cost and safer, whether the target object is a suspected risk object or not is further determined, and safety inspection is finished.
On the basis of fig. 3, regarding how to further improve the accuracy of the security inspection result and reduce the possibility of misjudgment, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 4, when S105 determines that the target item is a suspected risk item, the package security inspection method further includes: s107 and S108 are specifically described as follows.
And S107, performing electromagnetic backscattering material parameter inversion based on the radar echo signal to obtain constitutive parameters of the target object.
Optionally, electromagnetic backscattering material parameter inversion may be performed through a pre-trained first deep learning network to obtain constitutive parameters of the target item.
It should be appreciated that the first deep learning network may consume a significant amount of computing resources when running. In the solution of the present application, the first deep learning network may be disposed in the GPU14, so as to implement function decoupling and reduce the operation load of the processor 10. GPU14 may provide sufficient computational support to ensure that real-time imaging requirements are achieved within an acceptable time frame.
Specifically, after the radar echo signals are acquired, the processor 10 transmits the radar echo signals to the GPU14, and the GPU14 runs the first deep learning network to perform electromagnetic backscattering material parameter inversion on the radar echo signals to acquire constitutive parameters of the target object.
After obtaining the constitutive parameters of the target item, the GPU14 may transmit the obtained constitutive parameters to the processor 10.
In a possible implementation, the first deep learning network may also be directly disposed in the processor 10.
It should be noted that when the radar signal contacts the target object, a secondary radiation signal may be generated, and the secondary radiation signal may be received by the receiving end of the radar module as a part of the radar echo signal. The signal amplitude and phase of the secondary radiation signal may be used to obtain constitutive parameters of the target item. Constitutive parameters may include permittivity, conductivity, permeability, and the like.
And S108, determining whether to eliminate the suspected risk of the target object or not based on the target image and the constitutive parameters. If yes, ending; if not, S109 is executed.
It is to be understood that in S105 it has been determined whether the target item is a suspected risk item based on the target image. For example, according to the shape of the target object in the target image, if the target object is estimated to be a bomb, the target object is a suspected risk object. There are two possible scenarios at this time: in a first scene, a target object is a real bomb; and in a second scene, the target object is a toy bomb. In case of scenario two, the suspected risk of the target object needs to be eliminated.
Specifically, the processor 10 may combine the radar imaging result (target image) and the electromagnetic backscattering material parameter inversion result (constitutive parameter), and input the results into the second depth learning network trained in advance, so as to obtain the target identification result of the target object. Such as toy bombs or real bombs. And then determining whether to eliminate the suspected risk of the target item based on the target identification result. If the suspected risk is eliminated, no further processing is required, and the method is finished. If the suspected risk is not eliminated, further warning is required.
Whether suspected risks of the target object are eliminated is determined by combining the constitutive parameters and the target image, so that the accuracy of a security inspection result is further improved, and the possibility of misjudgment is reduced.
In a possible implementation manner, the worker can directly perform the security check process corresponding to fig. 4 by inputting the control instruction.
In a possible implementation manner, the millimeter wave radar array 200 is installed on one side of the lifting module 300 facing the detection table, the detection table is used for placing the package to be detected, the one side of the lifting module 300 facing the detection table is further provided with a target detection unit 400, and the target detection unit 400 is used for detecting whether the package to be detected exists on the plane where the detection unit is located.
As described above, the height of the lifting module 300 can be adjusted under the control of the control system 100, so that the millimeter wave radar array 200 can scan the parcel to be detected on the detection platform comprehensively. It is understood that when lift module 300 is at a certain height, the feedback signal acquired by millimeter wave radar array 200 is a group of sub-echo signals in the radar echo signal. Along with the height change of the lifting module 300, the millimeter wave radar array 200 may acquire multiple sets of sub-echo signals.
Alternatively, the control system 100 may be connected to a servo motor in the lifting module 300, and operate by driving the servo motor to adjust the height of the lifting module 300. Or, the control system 100 may be connected to a controller in the lifting module 300, the control system 100 sends an upward or downward trigger instruction to the controller in the lifting module 300, and the controller in the lifting module 300 generates a corresponding number of pulses according to a preset step height according to the trigger instruction, and controls the servo motor to lift the millimeter wave radar array 200.
Through setting up lifting module 300 can carry out more comprehensive scanning to the target article that the volume is great, highly higher to the accuracy of suggestion final safety inspection result.
The target detection unit can be a horizontal distance sensor, and whether the parcel to be detected exists on the plane is determined according to the monitored horizontal distance value.
The millimeter-wave radar array 200 may be, but is not limited to, a millimeter-wave radar ring array, and includes a predetermined number of millimeter-wave transceiver modules, for example, 12 millimeter-wave transceiver modules. Any two millimeter wave transceiver modules keep the same spacing angle or spacing distance. Taking 12 millimeter wave transceiver modules as an example, any two millimeter wave transceiver modules are uniformly and annularly arranged with the same interval angle (30 °). Each millimeter wave transceiver module comprises a group of transceiver antennas and a millimeter wave chip. The millimeter wave chip highly integrates a phase-locked loop, a transmitter, a receiver, a baseband, an ADC and the like, can realize the functions of up-conversion of a transmitting signal and down-conversion of an echo signal in the millimeter wave chip, and simultaneously supports a 4-transmission and 4-reception MIMO working mode to the maximum extent.
The millimeter wave transceiver modules can sequentially transmit millimeter wave signals clockwise or anticlockwise through the time sequence control working mode until all the millimeter wave transceiver modules traverse to transmit the millimeter wave signals once. It should be noted that the receiving antennas of all the millimeter wave transceiver modules can continuously receive the millimeter wave signals sent by each millimeter wave transceiver module, and the accuracy of the final security check result is improved by increasing the number of the obtained signals.
On this basis, as to the content in S102 in fig. 4 or fig. 3, how to quickly acquire a radar echo signal, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 5, where S102 includes: s102-1, S102-2 and S102-3 are specifically described as follows.
S102-1, determining whether the detection signal transmitted by the target detection unit is a first type detection signal. If yes, executing S102-2; if not, S104 is executed.
The first type of detection signal indicates that the plane is provided with the parcel to be detected, and the second type of detection signal indicates that the plane is provided with the parcel to be detected.
Optionally, after the worker places the package to be detected on the detection table, a prompt that the package has been placed may be sent to the control system, for example, by a key. After receiving the prompt that the parcel is placed, the control system controls the target detection unit 400 to start working, and avoids energy waste caused by long-time working of the target detection unit 400 when no parcel is placed on the detection table.
When the target detection unit 400 acquires the first type of detection signal, it indicates that radar scanning is required for the parcel to be detected on the plane, and at this time, S102-2 may be performed.
On the contrary, if the object detection unit 400 acquires the second type of detection signal after the height of the lifting module 300 is raised, it indicates that there is no package to be detected on the plane, and the object item has been completely scanned, at this time, S104 may be executed.
It should be noted that, at the initial time, the lifting module 300 is aligned with the bottom of the inspection table.
And S102-2, controlling the millimeter wave radar array to operate according to the target execution parameters, and scanning the package to be detected to obtain the corresponding sub-echo signal.
Specifically, the millimeter wave transceiver modules may sequentially transmit the millimeter wave signals clockwise or counterclockwise through the time sequence control operation mode until all the millimeter wave transceiver modules traverse to transmit the millimeter wave signals once. Note that the timing is not limited to clockwise or counterclockwise.
And S102-3, after the scanning is finished, controlling the lifting module to ascend by a preset height.
It is repeatedly determined whether the detection signal transmitted by the object detection unit 400 is the first type detection signal until the detection signal transmitted by the object detection unit 400 is the second type detection signal.
Alternatively, when the object detection unit 400 transmits the detection signal as the second type detection signal, the lifting module 300 may be controlled to return to the initial position, that is, to the bottom, and the millimeter wave radar array 200 may be assigned to the initial position to wait for the next measurement.
On the basis of fig. 5, for the content in S102-2, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 6, where S102-2 includes: S102-2A, S102-2B and S102-2C, as described below.
And S102-2A, controlling the millimeter wave radar to sequentially send radar signals corresponding to the target execution parameters according to a preset sequence.
It should be understood that the preset sequence may be, but is not limited to, counterclockwise or clockwise. As described above, when one of the millimeter wave radars transmits a radar signal, all of the millimeter wave radars in the entire column receive the corresponding feedback signal as the sub-echo signal.
And S102-2B, receiving the sub echo signal fed back by the millimeter wave radar.
It should be appreciated that after acquiring the sub-echo signals, the millimeter wave radar may transmit the sub-echo signals to the control system 100.
And S102-2C, after a group of complete sub-echo signals are acquired, determining that the scanning is finished.
It should be noted that a complete set of sub-echo signals represents the echo signals that have received the radar signals transmitted by each radar module.
It should be understood that each sub-echo signal may be sent to the GPU14 for operation, so as to reduce the amount of computation, or may be sent in a packed manner, which is not limited herein.
In order to improve the accuracy of the security check result, on the basis of fig. 5, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 7, and after the corresponding sub-echo signal is obtained, the package security check method further includes: s103, the concrete description is as follows.
And S103, filtering the sub echo signal.
It should be understood that the filtering process is used to eliminate the interference part in the sub-echo signal as much as possible, such as the interference signal fed back by the packaging layer. Only the radar signals related to the target objects in the package are reserved as far as possible, so that the accuracy of the final security inspection result is improved.
On the basis of fig. 4, in order to further improve the efficiency of the security check, a possible implementation manner is further provided in the embodiment of the present application, as shown in fig. 8, if the target item is a suspected risk item, before S107, the package security check method further includes: s106, the details are as follows.
And S106, determining whether to eliminate the suspected risk of the target object or not based on the commodity types in the purchase list of the packages to be detected. If yes, ending; if not, S107 is executed.
For example, when the estimated target object is a bomb, the target object is a suspected risk object. At this time, if the commodity type in the purchase list of the package to be detected is a toy bomb, namely the estimation result of the target object is correspondingly matched with the commodity type in the purchase list, the suspected risk of the target object can be eliminated, and further processing is not needed. Otherwise, the accuracy of the security inspection result is further improved by executing the step S107.
It should be understood that the commodity type and the target identification result in the purchase list of the package to be detected can verify whether the items in the package are correct, and the possibility of sending wrong commodities to the user is reduced.
On the basis of fig. 3, regarding how to determine the target execution parameter, the embodiment of the present application further provides a possible implementation manner, please refer to fig. 9, before S102, the package security inspection method further includes: s101 is specifically described as follows.
S101, determining target execution parameters of the radar signals based on the material of the packaging layer of the package to be detected.
Alternatively, the material of the packaging layer of the package to be detected may be input by the worker based on the human-computer interaction unit 500. If the time for placing the to-be-detected package on the detection table exceeds a preset time threshold value, and the staff input the material of the packaging layer, the default parameters can be determined as target execution parameters.
In a possible implementation manner, millimeter wave radar array 200 may be further controlled to perform preliminary scanning, and a radar signal with a penetration rate greater than a preset penetration threshold value is determined based on a result of the preliminary scanning, and a corresponding parameter is used as a target execution parameter.
In one possible implementation, the security check result of each package may be stored, for example, in the memory 11, or uploaded to the cloud storage.
In the scheme of the application, the area of the detection table for placing the package can be in the middle or on one side, and is not limited here, and only the detection table needs to be ensured to be in the radar scanning range.
In one possible implementation, the host system within the processor 10 may be developed based on the Linux kernel and the processor 10 may be an ARM processor.
The security inspection system provided by the application adopts a millimeter wave radar as a hardware basis, combines the synthetic aperture radar imaging and the electromagnetic backscattering material parameter inversion principle, obtains three-dimensional imaging information and material type information (namely constitutive parameters) of a measured object, and has good image resolution and reliable target identification capability. When the object to be tested in the logistics package is known, verification can be completed without opening the package; when the object to be detected is unknown, whether dangerous contraband exists inside can be judged in advance, and the security inspection efficiency is greatly improved. Compared with an X-ray machine, the security inspection system is lower in price, smaller in size and higher in safety; compared with equipment such as a metal detector, an infrared detector and the like, the security inspection system can obtain more comprehensive information of the detected object, and the security inspection recognition rate is greatly increased.
Referring to fig. 10, fig. 10 is a diagram illustrating a package security inspection apparatus according to an embodiment of the present application, where the package security inspection apparatus is optionally applied to the electronic device described above.
Parcel safety inspection device includes: an information acquisition unit 1001 and a processing unit 1002.
The information acquisition unit 1001 is configured to control the millimeter wave radar array to operate according to a target execution parameter and scan a package to be detected to acquire a radar echo signal, where a penetration rate of a radar signal corresponding to the target execution parameter with respect to a package layer of the package to be detected is greater than a preset penetration threshold.
The processing unit 1002 is configured to acquire a target image based on the radar echo signal, where the target image is an image corresponding to a target object inside the package to be detected.
The processing unit 1002 is further configured to determine whether the target item is a suspected risk item based on the target image.
Alternatively, the information acquisition unit 1001 may execute S102 described above, and the processing unit 1002 may execute S101, S103 to S109 described above.
It should be noted that, the package security inspection apparatus provided in this embodiment may execute the method flows shown in the above method flow embodiments, so as to achieve corresponding technical effects. For the sake of brief description, the embodiment is not mentioned in part, and reference may be made to the corresponding contents in the above embodiments.
The embodiment of the application also provides a storage medium, wherein the storage medium stores computer instructions and programs, and the computer instructions and the programs execute the package security check method of the embodiment when being read and run. The storage medium may include memory, flash memory, registers, or a combination thereof, etc.
The following provides an electronic device, which may be a package security inspection device or a control system in a package security inspection device, and as shown in fig. 1, the electronic device may implement the package security inspection method; specifically, the electronic device includes: processor 10, memory 11, bus 12. The processor 10 may be a CPU. The memory 11 is used for storing one or more programs, which when executed by the processor 10, perform the package security check method of the above embodiment.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist alone, or two or more modules may be integrated to form an independent part.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A package security inspection method is applied to a control system, and comprises the following steps:
controlling a millimeter wave radar array to operate according to target execution parameters, and scanning a package to be detected to obtain a radar echo signal, wherein the penetration rate of a radar signal corresponding to the target execution parameters relative to a packaging layer of the package to be detected is greater than a preset penetration threshold value;
acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected;
determining whether the target item is a suspected risk item based on the target image.
2. The package security inspection method of claim 1, wherein if the target item is determined to be a suspected risk item, the method further comprises:
performing electromagnetic backscattering material parameter inversion based on the radar echo signal to obtain constitutive parameters of the target object;
determining whether to eliminate the suspected risk of the target item based on the target image and the constitutive parameters.
3. The package security inspection method according to claim 2, wherein the millimeter wave radar array is installed on one side of the lifting module facing the inspection table, the inspection table is used for placing the package to be inspected, a target detection unit is further arranged on one side of the lifting module facing the inspection table and used for detecting whether the package to be inspected exists on the plane where the lifting module is located, and the radar echo signals include at least one group of sub echo signals;
the step of controlling the millimeter wave radar array to operate according to the target execution parameters and scanning the package to be detected so as to obtain the radar echo signal comprises the following steps:
determining whether the detection signal transmitted by the target detection unit is a first type detection signal or not, wherein the first type detection signal indicates that the plane in which the target detection unit is located has a parcel to be detected;
if so, controlling the millimeter wave radar array to operate according to target execution parameters, and scanning the package to be detected to obtain corresponding sub-echo signals;
after scanning is finished, the lifting module is controlled to ascend by a preset height, whether the detection signals transmitted by the target detection unit are the first type detection signals or not is determined repeatedly until the detection signals transmitted by the target detection unit are the second type detection signals, and the second type detection signals indicate that the plane where the lifting module is located does not have the package to be detected.
4. The package security inspection method according to claim 3, wherein the millimeter wave radar array includes a preset number of millimeter wave radars, and the step of controlling the millimeter wave radar array to operate according to target execution parameters and scanning the package to be inspected to obtain corresponding sub-echo signals includes:
controlling the millimeter wave radar to sequentially send radar signals corresponding to the target execution parameters according to a preset sequence;
receiving a sub-echo signal fed back by the millimeter wave radar;
and after a group of complete sub-echo signals are acquired, determining that the scanning is finished.
5. The package security inspection method of claim 3, wherein after acquiring the corresponding sub-echo signals, the method further comprises:
and filtering the sub echo signals.
6. The package security inspection method of claim 2, wherein prior to performing electromagnetic backscatter material parametric inversion based on the radar return signals to obtain constitutive parameters of the target item, the method further comprises:
and determining whether to eliminate the suspected risk of the target item based on the commodity types in the purchase list of the package to be detected.
7. The package security inspection method according to claim 1, wherein before controlling the millimeter wave radar array to operate according to target execution parameters and scanning the package to be inspected to obtain radar echo signals, the method further comprises:
and determining target execution parameters of the radar signal based on the material of the packaging layer of the package to be detected.
8. A package security inspection device, applied to a control system, the device comprising:
the information acquisition unit is used for controlling the millimeter wave radar array to operate according to target execution parameters and scanning the package to be detected so as to acquire a radar echo signal, wherein the penetration rate of the radar signal corresponding to the target execution parameters relative to the package layer of the package to be detected is greater than a preset penetration threshold value;
the processing unit is used for acquiring a target image based on the radar echo signal, wherein the target image is an image corresponding to a target object in the package to be detected;
the processing unit is further configured to determine whether the target item is a suspected risk item based on the target image.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
10. An electronic device, comprising: a processor and memory for storing one or more programs; the one or more programs, when executed by the processor, implement the method of any of claims 1-7.
CN202210732351.6A 2022-06-27 2022-06-27 Package security check method and device, storage medium and electronic equipment Active CN114779241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210732351.6A CN114779241B (en) 2022-06-27 2022-06-27 Package security check method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210732351.6A CN114779241B (en) 2022-06-27 2022-06-27 Package security check method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN114779241A true CN114779241A (en) 2022-07-22
CN114779241B CN114779241B (en) 2022-09-30

Family

ID=82422473

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210732351.6A Active CN114779241B (en) 2022-06-27 2022-06-27 Package security check method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN114779241B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116577768A (en) * 2023-07-10 2023-08-11 厦门中为科学仪器有限公司 Security scene living body detection device based on millimeter wave radar

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105572667A (en) * 2015-12-28 2016-05-11 深圳市无牙太赫兹科技有限公司 Package safety detection system and package safety detection method
CN205263308U (en) * 2015-11-23 2016-05-25 无锡市雷华科技有限公司 Violated quality control of green channel surveys system
CN107543831A (en) * 2016-06-24 2018-01-05 南京理工大学 The contraband detecting method of express delivery postal materials Microwave Scanning imaging device and microwave imagery
WO2021004299A1 (en) * 2019-07-05 2021-01-14 珠海格力电器股份有限公司 Human detection method and device, electronic apparatus, and storage medium
CN112327268A (en) * 2020-11-12 2021-02-05 奥谱毫芯(深圳)科技有限公司 Dangerous target identification method, device, system and medium based on millimeter wave signals
CN112508792A (en) * 2020-12-22 2021-03-16 北京航空航天大学杭州创新研究院 Single-image super-resolution method and system of deep neural network integration model based on online knowledge migration
CN114460661A (en) * 2022-02-10 2022-05-10 四川正泰未来科技有限公司 Method and device for reducing false alarm rate of detection of middle-long distance millimeter wave dangerous articles
WO2022120839A1 (en) * 2020-12-11 2022-06-16 华为技术有限公司 Anti-interference method, apparatus and system based on vehicle-mounted millimeter wave radars, and vehicle

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205263308U (en) * 2015-11-23 2016-05-25 无锡市雷华科技有限公司 Violated quality control of green channel surveys system
CN105572667A (en) * 2015-12-28 2016-05-11 深圳市无牙太赫兹科技有限公司 Package safety detection system and package safety detection method
CN107543831A (en) * 2016-06-24 2018-01-05 南京理工大学 The contraband detecting method of express delivery postal materials Microwave Scanning imaging device and microwave imagery
WO2021004299A1 (en) * 2019-07-05 2021-01-14 珠海格力电器股份有限公司 Human detection method and device, electronic apparatus, and storage medium
CN112327268A (en) * 2020-11-12 2021-02-05 奥谱毫芯(深圳)科技有限公司 Dangerous target identification method, device, system and medium based on millimeter wave signals
WO2022120839A1 (en) * 2020-12-11 2022-06-16 华为技术有限公司 Anti-interference method, apparatus and system based on vehicle-mounted millimeter wave radars, and vehicle
CN112508792A (en) * 2020-12-22 2021-03-16 北京航空航天大学杭州创新研究院 Single-image super-resolution method and system of deep neural network integration model based on online knowledge migration
CN114460661A (en) * 2022-02-10 2022-05-10 四川正泰未来科技有限公司 Method and device for reducing false alarm rate of detection of middle-long distance millimeter wave dangerous articles

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116577768A (en) * 2023-07-10 2023-08-11 厦门中为科学仪器有限公司 Security scene living body detection device based on millimeter wave radar
CN116577768B (en) * 2023-07-10 2023-09-22 厦门中为科学仪器有限公司 Security scene living body detection device based on millimeter wave radar

Also Published As

Publication number Publication date
CN114779241B (en) 2022-09-30

Similar Documents

Publication Publication Date Title
Lee et al. Human–vehicle classification using feature‐based SVM in 77‐GHz automotive FMCW radar
US10656124B2 (en) Container screening system and method
CN114779241B (en) Package security check method and device, storage medium and electronic equipment
EP3545331A1 (en) Polarimetric radar system and method for detecting and classifying vehicle occupants and other objects in a vehicle interior
CN102105816A (en) Identification of potential threat materials using active electromagnetic waves
JP2018081090A (en) Article detection method, device and system
CN105067644A (en) Method for identifying liquid hazardous article through X-ray inspection system
JP2010540930A (en) System and method for reducing false alarms in a detection system
US20090278726A1 (en) Method and Apparatus for Representing and Classifying Microwave Back-Projection Radar Signals
CN110751103B (en) Microwave signal classification method and system for detecting inside of object
JP2023517930A (en) Systems and methods for spatially detecting any foreign matter in a product based on dielectric properties of the product
CN105334513A (en) Green channel contraband detection system and detection method thereof
JP2018200296A (en) Article detection method and device
US11474228B2 (en) Radar-based detection of objects while in motion
CN110045349B (en) Identification method, device, equipment and storage medium
JP2021004874A (en) Article detection method and apparatus
CN110554439B (en) Article detection method and apparatus
US10371813B2 (en) Systems and methods for using time of flight measurements for imaging target objects
EP4095556A1 (en) Method and system for detection of a desired object occluded by packaging
Yonemoto et al. Two dimensional radar imaging algorithm of bistatic millimeter wave radar for FOD detection on runways
WO2012119040A1 (en) Signature identification and distribution
CN205263308U (en) Violated quality control of green channel surveys system
CN110967763B (en) Article detection method and apparatus
RU2522853C1 (en) Method and apparatus for detecting and identifying objects hidden under clothes on human body
Chakravarty et al. A novel change detection technique for occluded objects using ultra-wideband radar

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant