CN114973571A - Natural gas unattended station target object invasion and residence monitoring system - Google Patents

Natural gas unattended station target object invasion and residence monitoring system Download PDF

Info

Publication number
CN114973571A
CN114973571A CN202210562032.5A CN202210562032A CN114973571A CN 114973571 A CN114973571 A CN 114973571A CN 202210562032 A CN202210562032 A CN 202210562032A CN 114973571 A CN114973571 A CN 114973571A
Authority
CN
China
Prior art keywords
monitoring
target object
natural gas
residence
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210562032.5A
Other languages
Chinese (zh)
Inventor
宋绍飞
秦恒浩
张良
罗忠元
李剑
王茜
姜海申
陈梅
付林
王贤博
张巧琳
魏天浩
赵秋静
刘婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Energy Industry Research Institute Co ltd
Guizhou Natural Gas Pipeline Network Co ltd
Original Assignee
Guizhou Energy Industry Research Institute Co ltd
Guizhou Natural Gas Pipeline Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Energy Industry Research Institute Co ltd, Guizhou Natural Gas Pipeline Network Co ltd filed Critical Guizhou Energy Industry Research Institute Co ltd
Priority to CN202210562032.5A priority Critical patent/CN114973571A/en
Publication of CN114973571A publication Critical patent/CN114973571A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19652Systems using zones in a single scene defined for different treatment, e.g. outer zone gives pre-alarm, inner zone gives alarm

Abstract

The invention discloses a natural gas unattended station target object intrusion and residence monitoring system, which comprises a plurality of high-definition cameras, wherein the high-definition cameras are respectively arranged at a plurality of monitoring points contained in a selected natural gas pipeline unattended area one by one; the high-definition cameras are respectively in communication connection with the monitoring platform; and the alarm platform is in communication connection with the monitoring platform. The system for monitoring the invasion and residence of the target object in the natural gas unattended station can promote the supervision of potential safety hazards of pipelines and perfect emergency plans, constructs a whole set of system for basic application, automatically identifies various objects through system intelligent means, helps companies to prevent or discover the invasion and residence of high consequence areas of the pipelines and pipeline damage events caused by third parties, monitors in real time and gives an alarm, and achieves the aim of improving the safety protection capability of the pipelines.

Description

Natural gas unattended station target object invasion and residence monitoring system
Technical Field
The invention relates to the technical field of monitoring equipment, in particular to an unmanned region target object intrusion and residence monitoring system for a natural gas pipeline station.
Background
The natural gas pipeline refers to a pipeline for conveying natural gas (including associated gas produced by an oil field) from a mining place or a processing plant to a city gas distribution center or an industrial enterprise user, and is also called a gas transmission pipeline. The natural gas pipeline is used for conveying natural gas, and is a way for conveying a large amount of natural gas on land.
At present, dangerous hidden dangers such as invasion and residence of a high-consequence area, damage caused by a third party, damage caused by geological disasters and the like exist in a partial area of a long-distance natural gas pipeline, and the safety of the pipeline and lives and properties of people is threatened. Preliminary investigation in earlier stage discovers that pipe network companies set patrolling personnel for each area, but because of factors such as long lines, poor road conditions, time difference existing in patrolling and the like, the behaviors of damaging the pipelines are difficult to discover and stop in time, and evidence obtaining work after the accident becomes extremely difficult due to the lack of effective technical means.
Pipeline damage caused by a third party refers to pipeline damage caused by a third party such as personnel, construction damage, vehicle pressure occupation and the like. The consequences of a natural gas pipeline accident caused by a third party causing pipeline damage are also very serious. How to prevent or reduce the serious consequences caused by pipeline damage caused by a third party by means of a modern monitoring technology is very important.
Disclosure of Invention
The invention provides a natural gas unattended station target object intrusion and residence monitoring system.
The invention provides the following scheme:
a natural gas unattended station target object intrusion and residence monitoring system comprises:
the system comprises a plurality of high-definition cameras, a plurality of monitoring units and a plurality of monitoring units, wherein the high-definition cameras are respectively arranged in a plurality of monitoring points contained in a selected natural gas pipeline unattended area one by one;
the high-definition cameras are respectively in communication connection with the monitoring platform;
the alarm platform is in communication connection with the monitoring platform;
the monitoring platform is used for judging whether the received image data of the target object collected by each high-definition camera is invaded and resident or possible to damage a third party, and generating alarm information when judging that the target object is invaded and resident or possible to damage the third party; sending the alarm information to the alarm platform; so that the alarm platform can give out an alarm task according to the alarm information.
Preferably: the monitoring point comprises a high consequence area and a station, the high consequence area and the station are provided with a base station iron tower, and the high-definition camera is installed on the base station iron tower.
Preferably: the high-definition camera is connected with the base station iron tower through a motion driving mechanism, so that the high-definition camera can realize the cyclic monitoring of the target range according to a preset scanning path.
Preferably: the target range is a polygonal area formed by a plurality of points arbitrarily drawn in the field range of the high-definition camera.
Preferably: the monitoring point further comprises a valve chamber and a valve well.
Preferably: the target object includes at least a person and/or a vehicle.
Preferably: the vehicles include SUVs, pickup trucks, passenger cars, tank cars, forklifts, excavators, cars, vans, lorries, minivans, tricycles, non-motorized vehicles.
Preferably: the monitoring platform is used for identifying the type of the vehicle so as to judge whether damage is possible according to the type of the vehicle.
Preferably: and the monitoring platform is used for carrying out abnormal data optimization processing on the received image data of the target object acquired by each high-definition camera and then judging whether intrusion, residence and third-party damage possibly exist or not through the optimized image data.
Preferably: the abnormal data optimization processing comprises abnormal data processing, noise data processing and temperature influence processing.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
according to the invention, a natural gas unattended station target object intrusion and residence monitoring system can be realized, and in an implementation mode, the system can comprise a plurality of high-definition cameras which are respectively arranged at a plurality of monitoring points contained in a selected natural gas pipeline unattended area one by one; the high-definition cameras are respectively in communication connection with the monitoring platform; the alarm platform is in communication connection with the monitoring platform; the monitoring platform is used for judging whether the received image data of the target object collected by each high-definition camera is invaded and resident or possible to damage a third party, and generating alarm information when judging that the target object is invaded and resident or possible to damage the third party; sending the alarm information to the alarm platform; so that the alarm platform can give out an alarm task according to the alarm information. The system for monitoring the invasion and residence of the target object in the natural gas unattended station can promote the supervision of potential safety hazards of pipelines and perfect emergency plans, constructs a whole set of system for basic application, automatically identifies various objects through system intelligent means, helps companies to prevent or discover the invasion and residence of high consequence areas of the pipelines and pipeline damage events caused by third parties, monitors in real time and gives an alarm, and achieves the aim of improving the safety protection capability of the pipelines.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a system for monitoring intrusion and residence of a target object in a natural gas unattended station according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
Examples
Referring to fig. 1, a system for monitoring intrusion and residence of a target object in an unattended natural gas station according to an embodiment of the present invention is shown in fig. 1, and the system may include:
the system comprises a plurality of high-definition cameras 1, a plurality of monitoring points and a plurality of monitoring units, wherein the high-definition cameras 1 are respectively distributed in a selected unattended region of the natural gas pipeline one by one;
the monitoring platform 2 is connected with the high-definition cameras 1 respectively and can be communicated with the monitoring platform 2;
the alarm platform 3 is in communication connection with the monitoring platform 2;
each high-definition camera 1 is used for acquiring image data of a target object in a defined target range corresponding to a monitoring point, the monitoring platform 2 is used for judging whether the received image data of the target object acquired by each high-definition camera is possible to damage, and alarm information is generated when the target object is judged to be possible to damage; sending the alarm information to the alarm platform 3; so that the alarm platform 3 can issue an alarm task according to the alarm information.
The system for monitoring the invasion and residence of the target object in the natural gas unattended station can promote the supervision of potential safety hazards of pipelines and perfect emergency plans, constructs a whole set of system for basic application, automatically identifies various objects through system intelligent means, helps companies to prevent or discover the invasion and residence of high consequence areas of the pipelines and pipeline damage events caused by third parties, monitors in real time and gives an alarm, and achieves the aim of improving the safety protection capability of the pipelines.
The monitoring points preset in the monitoring system usually represent points concerned by users. The system can support a maximum of 300 preset bits. In practical application, a monitoring point may be selected according to a user's focus, for example, in an implementation manner, the monitoring point includes a high consequence area and a station, the high consequence area and the station are both provided with a base station iron tower, and the high definition camera is installed on the base station iron tower. Specifically, the high-definition camera is connected with the base station iron tower through a motion driving mechanism, so that the high-definition camera can realize cyclic monitoring on the target range according to a preset scanning path. The target range is a polygonal area formed by a plurality of points arbitrarily drawn in the field range of the high-definition camera. In the monitoring system, a polygonal area consisting of multiple points is arbitrarily drawn in a monitoring visual field (effective preset positions set by a user), and can be adjusted at any time. After the electronic fence is arranged on the preset position, the system identifies the monitoring target in the fence area. The monitoring point further comprises a valve chamber and a valve well.
The system that this application embodiment provided, can utilize the iron tower at the peripheral existing station resource of pipeline, establish the control point through the high-order long-range high definition camera of installation at basic station iron tower, combine the system setting rule to preset the scanning route, thereby realize the circulation control to the pipeline, the camera passes back high definition image data at the scanning in-process simultaneously, carry out intelligent analysis to each control point, accomplish to carry out real time monitoring to the unusual target around the pipeline and report an emergency and ask for help or increased vigilance, alarm information pushes away the very first time to system platform administrator, through the platform police task of distributing out after checking.
Further, the target object includes at least a person and/or a vehicle. The vehicles include SUVs, pickup trucks, passenger cars, tank cars, forklifts, excavators, cars, vans, lorries, minivans, tricycles, non-motorized vehicles. The monitoring platform is used for identifying the model of the vehicle so as to judge whether damage is possible according to the model of the vehicle. The monitoring target object provided by the embodiment of the application refers to the following 13 types: personnel, SUVs, pick-ups, passenger cars, tank cars, forklifts, excavators, cars, vans, trucks, minivans, tricycles, non-motorized vehicles (bicycles and motorcycles), the system being monitorable and identifiable for different models of each type of vehicle.
In order to improve whether intrusion, residence and third party damage possibility exist, the monitoring platform is more accurate, and the embodiment of the application can provide that after the monitoring platform is used for carrying out abnormal data optimization processing on the received image data of the target object collected by each high-definition camera, whether intrusion, residence and third party damage exist is possibly judged through the optimized image data. The abnormal data optimization processing comprises abnormal data processing, noise data processing and temperature influence processing.
The platform is developed by adopting Java + mysql + python + C language, and is based on SOA architecture, the strong coupling relation between the basic service platform and the service system is decoupled, and better system compatibility and expansibility are provided. Each service platform provides services to the outside in a WebAPI mode, all the services need to be authorized and authenticated, and authentication data are transmitted through an encryption channel and digitally signed, so that the safety of the platform is guaranteed.
The middleware technology is adopted in the application system construction, and the main advantages are as follows: the development period of the application is shortened; the development cost of the application is saved; the construction cost of the system at the initial stage is reduced; the failure rate of application development is reduced; the existing investment is protected; application integration is simplified; the maintenance cost is reduced; the development quality of the application is improved; the continuity of the technical progress is ensured; enhancing the vitality of the application.
Middleware is an application server for developing, integrating, deploying, and managing large distributed Web applications, network applications, and database applications. Middleware possesses the performance, extensibility, and high availability needed to handle critical Web application system problems.
The selection of the middleware should ensure the following characteristics:
the multi-standard is compatible, and the method and the device comprehensively support various standards in the industry, including EJB, JSB, JMS, JDBC, XML and WML, so that the implementation of a Web application system is simpler, the investment is protected, and meanwhile, the development of a solution based on the standards is simpler and more convenient.
Unlimited scalability, with a highly extensible architecture including client-connected sharing, resource posing, and dynamic web page and EJB component clustering.
The method has the advantages of rapid development, open standard-based, simplified development, capability of exerting the existing skills and rapid deployment of the application system. The software is based on a JFinal rapid WEB + ORM development framework, and is rapid in development, small in code amount, easy to expand and Restful.
The deployment is more flexible and is tightly integrated with a leading database, an operating system and a Web server.
Mission critical reliability, its fault tolerance, system management and security performance are verified in thousands of mission critical environments worldwide.
Architecture, Web application systems need to be developed quickly, requiring server-side components with good flexibility and security, while also supporting the necessary expansion, performance, and high availability for critical tasks. Middleware simplifies the development of portable and extensible application systems and provides rich interoperability for other application systems.
With clustering technology, middleware has the highest level of extensibility and availability, which is crucial to the extensibility and availability required by web application systems.
A Service Oriented Architecture (SOA) is a component model that ties different functional units of an application, called services, through well-defined interfaces and contracts between these services. The interface is defined in a neutral mode and is independent of a hardware platform, an operating system and a programming language for realizing the service, so that the service built in the SOA system interacts in a uniform and universal mode.
Features of the SOA architecture:
and the service can be reused, and one service can be used for a plurality of applications and business processes after being created.
Loose coupling, the binding of a service requester to a service provider should be loosely coupled to the service. Thus, the service requester does not need to know the technical details of the service provider implementation, such as the programming language, the underlying platform, etc.
A well-defined interface, service interaction must be well-defined. The Web Services Description Language (WSDL) is a Language for describing the details of binding to a service provider required by a service requester. WSDL does not include any technical details of the service implementation. The service requester does not know nor care which programming language the service is written in.
Stateless service design, a service should be an independent, self-contained request that does not require the acquisition of information or state from one request to another when implemented. The service should not depend on the context and state of other services. When dependencies are generated, they can be defined as generic business processes, functions, and data models.
Based on open standards, the current form of SOA implementation is a Web service, based on published W3C and other accepted standards. The SOA is implemented using SOAP, WSDL and UDDI defined by a first generation Web services and WS-I defined by a second generation Web services.
The lifecycle of an AI intelligence model is defined as six phases: business understanding, data preparation, modeling, model evaluation, and model publishing.
Service understanding: project requirements and goals are understood from a business perspective, and then such requirements are translated into a problem definition for data mining, and a preliminary plan to achieve the goals is designed.
Data understanding: initial data is collected, quality issues are identified for the data, basic observations are found for the data, or underlying information is assumed to monitor a subset of the data of interest.
Preparing data: the available raw data is subjected to a series of organizations and cleaning to meet the modeling requirements.
Establishing a model: various modeling techniques are selected and their parameters are corrected to optimal values, often going back to the data preparation phase.
And (3) model evaluation: and evaluating the established model, and mainly considering whether the obtained result meets the service requirement or not.
Model release: the results found are summarized and applied.
Anomaly data optimization
Data omission, data abnormity and noise interference often exist in monitoring data in actual engineering, and data preprocessing comprises abnormal data removal, noise elimination and interference of temperature data.
Abnormal data processing, wherein a large amount of monitoring data can be received in high-frequency automatic monitoring, a certain proportion of abnormal data can be generated inevitably, and the proportion of abnormal data in the monitoring process is about 0.5-5%. The abnormal data refers to the monitoring values which do not conform to the trend of the whole time series and can not reflect the real working state of the structure, outliers are often generated, namely, the outliers are far away from most monitoring values, how to judge whether the data is the abnormal value is judged, and the key is to establish a stable time series model for the data.
At present, the elimination of abnormal data mainly has the ralda criterion (3 σ criterion), that is, the average value of statistical single-day monitoring data is mu, the standard deviation is sigma, when the deviation of single measurement data exceeds 3 σ, the measurement data can be determined as abnormal data, after the data is eliminated, the deviation of data value and standard deviation are continuously calculated for the rest data until each deviation is less than 3 σ.
Noise data processing, in which high-frequency automatic monitoring data are often composed of true values and random noise, and the distribution of the random noise in a time domain has globality, that is, data in each time interval contains noise, and in order to eliminate noise interference and obtain true values, a data smoothing processing method needs to be adopted for a large amount of monitoring data. The existing data smoothing method mainly comprises a moving average method, namely, the data are pushed item by item, the average value containing N items of data is respectively calculated, and the original numerical value is replaced by the moving average value, so that random fluctuation is eliminated, and the variation trend of the data is obtained.
Temperature influence processing and instrument measurement are influenced by temperature, so that data drift caused by temperature needs to be eliminated or reduced by using technologies such as temperature compensation and the like.
13 identifiable target object models are developed based on an artificial intelligence AI technology, through a mode of freely defining an electronic fence in a sphere type monitoring device cruising preset position, 13 kinds of target objects are identified, alarm information is generated in two types of invasion and residence, and the alarm information is sent to line patrol personnel through an APP or mobile phone short message mode. The platform functions comprise a monitoring center, equipment management, statistical analysis, user management, linkage alarm, mobile phone APP and the like.
The monitoring center comprises modules of live video broadcast, electronic fence, artificial intelligent identification, details (to-be-treated alarm, historical alarm, strategy configuration and monitoring point details), equipment state distribution, monitoring point and pipeline distribution, multi-screen live broadcast, alarm ranking TOP5 statistics, alarm distribution statistics, alarm change trend statistics, current alarm reminding and the like.
Video live broadcast: the real-time monitoring of the monitoring pipeline area is realized.
Electronic fence: according to actual needs, electronic fences can be freely defined in the defense distribution area, each high-risk area is accurately monitored, and invasion and residence alarm of target objects are achieved.
Artificial intelligence identification: the target objects comprise 13 types of people and vehicles, wherein the vehicles comprise non-motor vehicles (tricycles and bicycles), small motor vehicles (SUV, cars, vans and pickup trucks), large motor vehicles (small trucks, large trucks and buses) and engineering vehicles (tank cars, forklifts and excavators), the platform carries out classified modeling on the target objects, the invasion and residence alarm identification of the 13 types of target objects is realized, and the subsequent modeling development can be carried out on other objects according to the actual requirements of customers.
And (4) warning to be treated: and displaying the latest alarm information of the monitoring points in a paging mode, processing the alarm information, checking alarm pictures, videos and the like.
And (4) historical alarming: the alarm information that has been "false positive", "confirmed" or "disposed of" is recorded.
Policy configuration: and configuring a preset point monitoring strategy and a cruising path. The preset point strategy configuration comprises the configuration of preset point alarm types, alarm targets, defense period, electronic fences, defense region types, residence time, automatic alarm handling, fog penetration and the like; the cruise path configuration comprises the configuration of a cruise preset point, a cruise speed, a staying time, a camera rotating speed, a cruise recovery time and the like.
Details of monitoring points: and displaying detailed alarm information, which mainly comprises monitoring point information, preset point information, alarm pictures, alarm videos and the like.
Device state distribution: and counting the total number of the equipment, the number of the online equipment, the number of the disconnected equipment and the number of the disabled equipment in real time.
Distribution of monitoring points: the map is adopted to display the distribution condition of all monitoring points in the jurisdiction area of the user, the functions of quick searching and positioning, weather data display, map object filtering, map display view control and the like are provided, and the three-dimensional map and the two-dimensional map are supported.
Multi-screen live broadcast: and simultaneously checking real-time video pictures of a plurality of cameras, supporting main screen control and preset point calling, and selecting four-screen and six-screen live broadcast at present.
Alert platoon TOP5 statistics: and counting the data of the top five of the alarm quantity ranks in the area governed by the user according to the monitoring points and the alarm target types.
Alarm distribution statistics: and counting the alarm times and the occupation ratio in the area under the jurisdiction of the user according to the alarm type and the alarm target type.
And (4) alarm change trend statistics: counting the change trend of the total alarm number (intrusion and residence) in the last month by taking days as a unit, and displaying the change trend by using a broken line area diagram.
Warning today: and counting the current alarm quantity according to categories of to-be-treated, in-treatment, treated, neglected, misinformation and the like, providing a historical alarm record viewing function, and realizing the rapid processing of the current alarm information.
Windshield wiper function: the camera is configured with a windshield wiper function, so that raindrops attached to the camera shell can be cleared away in rainy days conveniently, and a rainy day monitoring effect is provided.
The fog penetration function is as follows: the camera is configured with a fog penetration function, the fog day monitoring effect is improved, and the fog penetration grade can be defined by user according to the surrounding environment condition.
And (4) broadcasting function: the camera supports the broadcast function, can report an emergency and deal with through the broadcast mode, and usable broadcast function realizes emergency command simultaneously.
After the monitoring platform can be in system butt joint with an external system, when the external system generates alarm information, monitoring equipment corresponding to the monitoring platform can be immediately called to carry out directional monitoring on a live video picture. The linkage alarm priority is higher than the conventional strategy of the monitoring system, namely, as long as the monitoring system receives the calling instruction information of an external system, the front-end monitoring equipment immediately stops cruising and locks the lens on a monitoring point generating an alarm to perform directional monitoring.
Early warning strategy configuration:
configuring a preset point monitoring strategy according to actual needs, wherein the preset point monitoring strategy comprises a preset point alarm type, an alarm target, a defense deployment time period, an electronic fence, a defense deployment area type, residence time, automatic alarm handling, fog penetration and the like;
alarm disposal:
alarm triggering modes are classified into intrusion alarm triggering and resident alarm triggering.
And (3) intrusion alarm:
(1) and when the target object enters the electronic fence area, intrusion alarm information is generated immediately, and meanwhile, the front-end monitoring equipment takes a snapshot of the target object and uploads the picture to the platform for analysis and identification.
(2) When setting up to automatic the dealing with, the system will report an emergency and ask for help or increased vigilance information through APP mode automatic propelling movement to appointed personnel of patrolling and examining, handle warning information after the personnel of patrolling and examining received the information.
(3) When automatic disposal is not set, platform management personnel are required to carry out processing selection of misinformation, neglect and disposal on alarm information, the platform management personnel carry out task disposal and assignment on the alarm information, and the alarm information is assigned to appointed inspection personnel in a short message or APP mode.
(4) And after the inspection personnel finishes the treatment, replying the alarm treatment condition of the management personnel and uploading a treatment photo.
(5) And the platform management personnel performs flow closed-loop operation after receiving the treatment feedback of the polling personnel.
And (4) resident alarm:
(1) when the target object enters the electronic fence area and reaches the residence warning threshold value, the residence warning information is generated immediately, and meanwhile the front-end monitoring equipment takes a snapshot of the target object and uploads a picture to the platform for analysis and recognition.
(2) When setting up to automatic the dealing with, the system will report an emergency and ask for help or increased vigilance information through APP mode automatic propelling movement to appointed personnel of patrolling and examining, handle warning information after the personnel of patrolling and examining received the information.
(3) When automatic disposal is not set, platform management personnel are required to carry out processing selection of misinformation, neglect and disposal on alarm information, the platform management personnel carry out task disposal and assignment on the alarm information, and the alarm information is assigned to appointed inspection personnel in a short message or APP mode.
(4) And after the inspection personnel finishes the treatment, replying the alarm treatment condition of the management personnel and uploading a treatment photo.
(5) And the platform management personnel performs flow closed-loop operation after receiving the treatment feedback of the inspection personnel.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (10)

1. The utility model provides a natural gas unattended station target object invasion and resident monitored control system which characterized in that includes:
the system comprises a plurality of high-definition cameras, a plurality of monitoring units and a plurality of monitoring units, wherein the high-definition cameras are respectively arranged in a plurality of monitoring points contained in a selected natural gas pipeline unattended area one by one;
the high-definition cameras are respectively in communication connection with the monitoring platform;
the alarm platform is in communication connection with the monitoring platform;
the monitoring platform is used for judging whether the received image data of the target object collected by each high-definition camera is invaded and resident or possible to damage a third party, and generating alarm information when judging that the target object is invaded and resident or possible to damage the third party; sending the alarm information to the alarm platform; so that the alarm platform can give out an alarm task according to the alarm information.
2. The natural gas unattended station target object intrusion and residence monitoring system according to claim 1, wherein the monitoring points comprise a high consequence area and a station, the high consequence area and the station are both provided with a base station iron tower, and the high definition camera is installed on the base station iron tower.
3. The natural gas unattended station target object intrusion and residence monitoring system according to claim 2, wherein the high-definition camera is connected with the base station iron tower through a motion driving mechanism, so that the high-definition camera realizes cyclic monitoring of the target range according to a preset scanning path.
4. The natural gas unattended station target object intrusion and residence monitoring system according to claim 3, wherein the target area is a polygonal area consisting of a plurality of points arbitrarily drawn within a high definition camera field of view.
5. The natural gas unattended station target object intrusion and residence monitoring system according to claim 2, wherein the monitoring point further comprises a valve chamber and a valve well.
6. The natural gas unattended station target object intrusion and residence monitoring system according to claim 1, wherein the target object comprises at least a person and/or a vehicle.
7. The natural gas unattended station target object intrusion and residence monitoring system according to claim 6, wherein the vehicle comprises an SUV, pick-up truck, passenger car, tanker truck, forklift, excavator, car, minivan, truck, minivan, tricycle, non-motor vehicle.
8. The natural gas unattended station target object intrusion and residence monitoring system according to claim 7, wherein the monitoring platform is configured to identify a model of the vehicle so as to determine whether a damage possibility exists according to the model of the vehicle.
9. The natural gas unattended station target object intrusion and residence monitoring system according to claim 1, wherein the monitoring platform is configured to perform abnormal data optimization processing on received image data of a target object acquired by each high definition camera, and determine whether intrusion, residence and possible damage of a third party exist or not through the optimized image data.
10. The natural gas unattended station target object intrusion and residence monitoring system according to claim 9, wherein the anomaly data optimization process includes anomaly data processing, noise data processing, and temperature impact processing.
CN202210562032.5A 2022-05-23 2022-05-23 Natural gas unattended station target object invasion and residence monitoring system Pending CN114973571A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210562032.5A CN114973571A (en) 2022-05-23 2022-05-23 Natural gas unattended station target object invasion and residence monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210562032.5A CN114973571A (en) 2022-05-23 2022-05-23 Natural gas unattended station target object invasion and residence monitoring system

Publications (1)

Publication Number Publication Date
CN114973571A true CN114973571A (en) 2022-08-30

Family

ID=82985948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210562032.5A Pending CN114973571A (en) 2022-05-23 2022-05-23 Natural gas unattended station target object invasion and residence monitoring system

Country Status (1)

Country Link
CN (1) CN114973571A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008039130A1 (en) * 2008-08-21 2010-02-25 Billy Hou Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated
CN105069576A (en) * 2015-08-21 2015-11-18 成都格理特电子技术有限公司 Linked industrial safety emergency command integration system
CN105744232A (en) * 2016-03-25 2016-07-06 南京第五十五所技术开发有限公司 Method for preventing power transmission line from being externally broken through video based on behaviour analysis technology
CN107917342A (en) * 2017-11-15 2018-04-17 北京科创三思科技发展有限公司 The unattended Sound image localization monitoring system and method for natural gas station
CN112669553A (en) * 2019-10-15 2021-04-16 四川省数字商企智能科技有限公司 Unattended system and method for oil and gas station
CN213179966U (en) * 2020-11-19 2021-05-11 中铁建大桥工程局集团第五工程有限公司 Side slope safety monitoring system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102008039130A1 (en) * 2008-08-21 2010-02-25 Billy Hou Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated
CN105069576A (en) * 2015-08-21 2015-11-18 成都格理特电子技术有限公司 Linked industrial safety emergency command integration system
CN105744232A (en) * 2016-03-25 2016-07-06 南京第五十五所技术开发有限公司 Method for preventing power transmission line from being externally broken through video based on behaviour analysis technology
CN107917342A (en) * 2017-11-15 2018-04-17 北京科创三思科技发展有限公司 The unattended Sound image localization monitoring system and method for natural gas station
CN112669553A (en) * 2019-10-15 2021-04-16 四川省数字商企智能科技有限公司 Unattended system and method for oil and gas station
CN213179966U (en) * 2020-11-19 2021-05-11 中铁建大桥工程局集团第五工程有限公司 Side slope safety monitoring system

Similar Documents

Publication Publication Date Title
US10706648B2 (en) System and method to detect execution of driving maneuvers
US6651001B2 (en) Method of and system and apparatus for integrating maintenance vehicle and service personnel tracking information with the remote monitoring of the location, status, utilization and condition of widely geographically dispersed fleets of vehicular construction equipment and the like to be maintained, and providing and displaying together both construction and maintenance vehicle information
US6408304B1 (en) Method and apparatus for implementing an object oriented police patrol multifunction system
CN107393293A (en) A kind of heavy mechanical equipment and heavy vehicle security management and control system
CN109800958B (en) Intelligent connection assisting system of unmanned vehicle
CN106781436A (en) Traffic accident treatment method and device
US8909415B1 (en) Vehicle and personal service monitoring and alerting systems
CN105788280A (en) Automatic vehicle tracking system of smart city based on Internet of vehicles
CN105187790B (en) Method, device and system for monitoring working state of vehicle-mounted terminal
CN105407159A (en) Logistics transportation position service system
CN106056697B (en) A kind of event-monitoring methods, devices and systems
CN109120890A (en) A kind of vehicle monitoring and early warning system
Lee et al. Utilization analysis methodology for fleet telematics of heavy earthwork equipment
US20240038059A1 (en) Adaptive data collection based on fleet-wide intelligence
CN109671270B (en) Driving accident processing method and device and storage medium
CN110738849A (en) traffic emergency communication command and dispatch system
CN113888869B (en) Fake plate slag car networking positioning method and system and cloud platform
CN110717436A (en) Data analysis method and device, electronic equipment and computer storage medium
CN112399346B (en) Vehicle in-out factory control system and method
CN114973571A (en) Natural gas unattended station target object invasion and residence monitoring system
CN112348386A (en) Early warning event processing method and device
CN111586630A (en) Taxi monitoring method and system
CN116704644A (en) Automobile management and control platform based on cloud data processing and multi-source data analysis
KR101686851B1 (en) Integrated control system using cctv camera
CN114275010B (en) Train monitoring and linkage method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220830