CN115273395B - Monitoring method, device, equipment, system and storage medium - Google Patents

Monitoring method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN115273395B
CN115273395B CN202210611797.3A CN202210611797A CN115273395B CN 115273395 B CN115273395 B CN 115273395B CN 202210611797 A CN202210611797 A CN 202210611797A CN 115273395 B CN115273395 B CN 115273395B
Authority
CN
China
Prior art keywords
monitoring
area
monitored
image
monitoring area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210611797.3A
Other languages
Chinese (zh)
Other versions
CN115273395A (en
Inventor
彭博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Inc
Original Assignee
Goertek Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Inc filed Critical Goertek Inc
Priority to CN202210611797.3A priority Critical patent/CN115273395B/en
Publication of CN115273395A publication Critical patent/CN115273395A/en
Application granted granted Critical
Publication of CN115273395B publication Critical patent/CN115273395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0476Cameras to detect unsafe condition, e.g. video cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses a monitoring method, a monitoring device, monitoring equipment, monitoring system and a storage medium, and relates to the technical field of image processing. The method is applied to the monitoring equipment and comprises the following steps: acquiring a monitoring image; identifying whether a monitoring object exists in the monitoring image; determining whether the monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists; under the condition that the monitored object exceeds the first monitoring area, determining whether a first target behavior exists in the monitored object according to the monitoring image; and outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors. The method can avoid the problem that the user cannot find out in time when the dangerous risk exists in the monitored object.

Description

Monitoring method, device, equipment, system and storage medium
Technical Field
The present application relates to the field of image processing technology, and more particularly, to a monitoring method, a monitoring apparatus, a monitoring device, a monitoring system, and a computer-readable storage medium.
Background
With the rapid development of economy and technology, monitoring devices have been increasingly used.
Currently, most families install intelligent monitoring in areas needing to be monitored, such as living rooms. Meanwhile, a guardian installs an intelligent monitoring APP on his own mobile phone. When monitoring personnel check the dynamic state of a monitored object in a monitoring area, the APP needs to be opened to check the monitored image.
However, if the monitoring object in the monitoring area is at risk of danger under the condition that the monitoring person does not open the APP, the monitoring person cannot find out in time.
Disclosure of Invention
It is an object of the present application to provide a new solution for monitoring.
According to a first aspect of the present application, there is provided a monitoring method applied to a monitoring device, the method comprising:
acquiring a monitoring image;
identifying whether a monitoring object exists in the monitoring image;
determining whether a monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists;
determining whether a first target behavior exists in the monitored object according to the monitored image under the condition that the monitored object exceeds the first monitored area;
and outputting first prompt information to the user terminal under the condition that the monitoring object has first target behaviors.
Optionally, the method outputs a first prompt message to the user terminal when the monitored object has the first target behavior, and further includes:
Receiving first negative acknowledgement information aiming at the first prompt information;
and updating the first monitoring area according to the first denial information and the area occupied by the monitoring object in the monitoring image.
Optionally, before determining whether the monitored object exceeds the first monitored area in the case that the monitored object exists, the method further includes:
acquiring a second monitoring area, wherein the second monitoring area comprises the first monitoring area;
and determining the first monitoring area according to the second monitoring area.
Optionally, after the identifying whether the monitored object exists in the monitored image, the method further includes:
determining whether a monitoring object exceeds a second monitoring area in the case that the monitoring object exists;
outputting second prompt information under the condition that the monitoring object exceeds the second monitoring area;
the determining whether the monitored object exceeds the first monitored area in the condition that the monitored object exists comprises the following steps:
determining whether the monitoring object exceeds a first monitoring area and does not exceed the second monitoring area in the case that the monitoring object exists;
and under the condition that the monitored object exceeds the first monitoring area, determining whether the monitored object has a first target behavior according to the monitoring image comprises the following steps:
And under the condition that the monitoring object exceeds the first monitoring area and does not exceed the second monitoring area, determining whether the monitoring object has a first target behavior according to the monitoring image.
Optionally, the determining whether the monitored object has the first target behavior according to the monitored image includes:
determining whether a first target behavior exists in the monitored object or not according to the monitored image and a preset first target behavior identification model;
the method further comprises the steps of, after outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors:
receiving first negative acknowledgement information aiming at the first prompt information;
and updating the preset first target behavior recognition model according to the first negative information and the monitoring image.
Optionally, after determining whether the monitored object exceeds the first monitored area in the case that the monitored object exists, the method further includes:
determining whether a second target behavior exists in the monitored object according to the monitored image under the condition that the monitored object does not exceed the first monitored area;
And outputting second prompt information to the user terminal under the condition that the monitoring object has second target behaviors.
According to a second aspect of the present application, there is provided a monitoring device, the device comprising:
the acquisition module is used for acquiring the monitoring image;
the identification module is used for identifying whether a monitoring object exists in the monitoring image or not;
the first determining module is used for determining whether the monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists;
the second determining module is used for determining whether the monitored object has a first target behavior according to the monitored image under the condition that the monitored object exceeds the first monitored area;
and the output module is used for outputting first prompt information to the mobile terminal under the condition that the monitoring object has first target behaviors.
According to a third aspect of the present application, there is provided a monitoring device comprising a monitoring apparatus as described in the second aspect; or,
the monitoring device comprises a memory for storing computer instructions and a processor for invoking the computer instructions from the memory to perform the monitoring method according to any of the first aspects.
According to a fourth aspect of the present application, there is provided a monitoring system comprising a monitoring device according to the third aspect and a user terminal, wherein:
the user terminal is used for receiving the first prompt information.
According to a fourth aspect of the present application, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the monitoring method according to any of the first aspects.
In an embodiment of the present application, a monitoring method is provided, where the monitoring method is applied to a monitoring device, and includes: acquiring a monitoring image; identifying whether a monitoring object exists in the monitoring image; determining whether the monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists; under the condition that the monitored object exceeds the first monitoring area, determining whether a first target behavior exists in the monitored object according to the monitoring image; and outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors. Therefore, through an active prompt mode, although the user does not open the APP of the monitoring equipment on the user terminal, the situation that the monitoring object is damaged by other objects can be timely found. The problem that a user cannot find in time when the risk of danger exists in the monitored object can be avoided.
Other features of the present application and its advantages will become apparent from the following detailed description of exemplary embodiments of the present application, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
Fig. 1 is a schematic flow chart of a monitoring method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a monitoring device according to an embodiment of the present application;
FIG. 3 is a structural view of a monitoring device provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a monitoring system according to an embodiment of the present application.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present application unless it is specifically stated otherwise.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, the techniques, methods, and apparatus should be considered part of the specification.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
< method example >
The embodiment of the application provides a monitoring method which is applied to monitoring equipment. The monitoring device may be an intelligent camera, for example.
As shown in fig. 1, the monitoring method provided in the embodiment of the present application includes the following S1100-S1500:
s1100, acquiring a monitoring image.
In this embodiment of the application, the monitoring device includes a camera module, and the camera module captures an image toward a direction in which the monitoring object is usually located. Based on this, the monitoring device acquires an image from its own camera module and records it as a monitoring image.
In one embodiment of the present application, the monitoring device may acquire the monitoring image autonomously, or may acquire the monitoring image under the triggering of the user.
S1200, identifying whether a monitoring object exists in the monitoring image.
In the embodiment of the application, the monitored object is a person or an animal that needs remote monitoring. For example, it may be a weaknesses group such as infants or elderly people.
In the embodiment of the present application, a monitoring image including a monitoring object may be acquired in advance, and the monitoring object may be designated by a user. Based on this, an image or a feature of the monitoring object is recorded. Further, whether the monitoring object exists in the monitoring image is judged according to the recorded image or the characteristics of the monitoring object.
S1300, determining whether the monitored object exceeds the first monitored area or not under the condition that the monitored object exists.
In the embodiment of the application, the monitoring image may be obtained in advance, and the user marks a monitoring area in the monitoring image where the monitored object is not at risk of being injured by other objects (such as furniture) or objects without potential safety hazards (such as stairs and windows). Based on this, the area outside the first monitoring area is an area where there is a risk of being injured by other objects, or an area of an object having a safety hazard.
Based on the foregoing, in one embodiment, the monitoring device identifies the user-marked monitoring area as the first monitoring area.
In another embodiment, the monitoring device marks the monitoring area marked by the user in the monitoring image as a second monitoring area, and scales the second monitoring area to obtain the first monitoring area. Based on this, the monitoring method provided in the embodiment of the present application further includes, before S1300, the following S1310 and S1320:
S1310, acquiring a second monitoring area.
Wherein the second monitoring area comprises the first monitoring area.
S1320, determining a first monitoring area according to the second monitoring area.
In the embodiment of the present application, the specific implementation of S1320 is: the second monitored area is scaled according to the scaling Fan Guize to obtain the first monitored area.
In one embodiment of the present application, the scaling rules may be: the second monitoring area is contracted Fan Weixiao to a maximum monitoring area of the second monitoring area having a regular shape (e.g., polygonal, elliptical, circular, etc.). In this way, the marking requirements for the user in marking the second monitoring area can be reduced, i.e. the user can mark a relatively large and irregular second monitoring area.
In another embodiment of the present application, the scaling rule may be: identifying the image in the second monitoring area to determine whether an image of an object (such as a baby fence or other furniture, etc.) at a preset height above the ground exists within a preset range from the boundary in the second monitoring area; and under the condition of existence, removing the area occupied by the image of the object higher than the ground in the second monitoring area to obtain the first monitoring area. Based on the method, the area where the object possibly causing the danger of the monitored object exists in the second monitored area can be removed. In this way, the first monitoring area where there is no risk of being injured by other objects, or objects without safety hazards, can be more accurately determined.
In another embodiment of the present application, the scaling rule may be: and shrinking the boundary of the second monitoring area inwards by a preset length. Wherein the preset length can be set empirically. For example, the preset length may be exemplified by the maximum distance that the monitoring object can move within a time frame that the guardian or other monitoring-assisted person reaches the monitoring object. Based on this, the guardian or other monitoring-assisting person can prevent the monitored object from exceeding the second preset area as soon as possible.
In the embodiment of the present application, the specific implementation of S1300 may be: and identifying the area information of the monitored object under the condition that the monitored object exists. And determining whether the area information of the monitored object exceeds the first monitored area. And determining that the monitored object exceeds the first monitoring area under the condition of exceeding. Otherwise, it is determined that the monitored object does not exceed the first monitoring area.
S1400, determining whether the monitored object has a first target behavior according to the monitored image under the condition that the monitored object exceeds the first monitored area.
In this embodiment of the present application, the monitored object exceeding the first monitored area includes the following two cases:
firstly, the monitored object completely exceeds the first monitoring area, namely is positioned outside the first monitoring area;
Second, the monitored object does not completely exceed the first monitored area, i.e., a portion of the monitored object is located outside the first monitored area and a portion of the monitored object is located inside the first monitored area.
In this embodiment, the first target behavior is a behavior that is about to completely exceed, or that continues to exceed the first monitoring area after completely exceeding. For example, taking the target object as an infant as an example, the first target behavior may be exemplified by a crossing behavior (such as a crawling behavior of the head toward a direction outside the first monitoring area), a behavior of tilting toward a direction outside the first monitoring area, or the like.
It will be appreciated that in the case where the monitored object exceeds the first monitoring area, there is also a possibility that the monitored object does not exist the first target behavior. Taking the target object as an infant as an example, if the infant acts such that the head faces in the first monitoring area, the hip extends beyond the first monitoring area, such as squatting or crawling, for example, the infant moves toward the first monitoring area. This is the case when the monitored object exceeds the first monitored area but there is no first target behavior.
In the embodiment of the application, under the condition that the monitored object exceeds the first monitoring area, the possibility that the monitored object is damaged by other objects or encounters an object with potential safety hazard is described. At this time, it is determined whether the monitoring object has the first target behavior according to the monitoring image.
Further, the specific implementation manner of determining whether the monitored object has the first target behavior according to the monitored image in S1400 may be as follows S1410:
s1410, determining whether the monitored object has the first target behavior according to the monitored image and a preset first target behavior recognition model.
In this embodiment of the present application, the input of the preset first target behavior recognition model is the monitoring image, and the output is the identification information of whether the behavior of the monitored object in the monitoring image is the first target behavior.
In one embodiment of the present application, the preset first target behavior recognition model may be obtained through various fitting means. For example, the preset first target behavior recognition model may be obtained using any multiple linear regression model, which is not limited herein.
It should be noted that the multiple linear regression model may be a simple polynomial function reflecting the preset first target behavior recognition model, where each order coefficient of the polynomial function is a default value in an initial state, and specific values of each order coefficient of the polynomial function may be determined by using the polynomial function of multiple sets of training samples, so as to obtain the preset first target behavior recognition target. Of course, the multiple linear regression model may also be a neural network model.
The training sample is a behavior image, and whether the behavior image corresponds to a label of a first target behavior or not.
S1500, outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors.
In the embodiment of the application, the user terminal is a terminal owned by a user (i.e. a guardian) that communicates with the monitoring device, and the APP of the monitoring device is typically installed in the user terminal. And outputting first prompt information to the user terminal based on communication between the first target behavior of the monitored object and the second target behavior of the monitored object so as to inform the user of the presence of the first target behavior of the monitored object. Therefore, through an active prompt mode, although the user does not open the APP of the monitoring equipment on the user terminal, the user can still find that the monitoring object is damaged by other objects or the risk of encountering objects with potential safety hazards occurs in time. The problem that a user cannot find in time when the risk of danger exists in the monitored object can be avoided.
In an embodiment of the present application, a monitoring method is provided, where the monitoring method is applied to a monitoring device, and includes: acquiring a monitoring image; identifying whether a monitoring object exists in the monitoring image; determining whether the monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists; under the condition that the monitored object exceeds the first monitoring area, determining whether a first target behavior exists in the monitored object according to the monitoring image; and outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors. Therefore, through an active prompt mode, although the user does not open the APP of the monitoring equipment on the user terminal, the user can still find that the monitoring object is damaged by other objects or encounters the risk of the object with potential safety hazard in time. The problem that a user cannot find in time when the risk of danger exists in the monitored object can be avoided.
In an embodiment of the present application, the monitoring method provided in the embodiment of the present application further includes the following S1610 and S1620 after the above S1500:
s1610, receiving first negative acknowledgement information for the first prompt information.
In this embodiment of the present application, the first negative acknowledgement information is: and denying the information of the first target behavior of the monitoring object.
In the embodiment of the application, considering the error of the first target behavior determined by the monitoring device and the personalized requirement of the user, the user terminal can deny the first prompt information to confirm that the monitored object does not substantially exist the first target behavior under the condition that the monitored object does not substantially exist the first target behavior after the monitored image is checked after receiving the first prompt information.
S1620, updating the first monitoring area according to the first denial information and the area occupied by the monitoring object in the monitoring image.
In the embodiment of the present application, after receiving the first denial information, it is determined that the monitored object does not actually have the first target behavior. At this time, the area formed by combining the area occupied by the monitoring object and the first monitoring area in the monitoring image is updated to a new first monitoring area. In this way, the next time it is determined that the monitored object has a first target behavior that is substantially non-first target behavior, as determined before updating the first monitored area, it can be determined as non-first target behavior. In this way, the first monitoring area can be personalized.
In an embodiment of the present application, on the basis of the embodiments shown in S1310 and S1320, the monitoring method provided in the embodiment of the present application further includes, after S1200, the following S1210 and S1220:
s1210, in the case where there is a monitoring object, it is determined whether the monitoring object exceeds the second monitoring area.
Note that, the specific implementation of S1210 is similar to the specific implementation of S1300, and will not be repeated here.
S1220, outputting second prompt information under the condition that the monitored object exceeds the second monitoring area.
In this embodiment of the present application, the second prompt information has a higher prompt level than the first prompt information.
In one embodiment, the first prompt is a message prompting the user, and the second prompt is a message alerting the user.
In the embodiment of the application, under the condition that the monitored object exceeds the second monitoring area, the second prompt information is output. In this way, the second monitoring area identified by the user himself can be monitored. Thus, the self requirements of the user are further met, and the user experience is further improved.
Based on the above S1210 and S1220, the implementation of S1300 is as follows: in the presence of a monitored object, it is determined whether the monitored object is beyond the first monitored area and not beyond the second monitored area.
And, the implementation of S1400 is as follows: and under the condition that the monitored object exceeds the first monitoring area and does not exceed the second monitoring area, determining whether the monitored object has the first target behavior according to the monitoring image.
In an embodiment of the present application, based on the step S1410, the monitoring method provided in the embodiment of the present application further includes the following steps S1710 and S1720 after the step S1500 is described above:
s1710, receiving first negative acknowledgement information aiming at the first prompt information.
In the embodiment of the present application, the specific implementation of S1710 and S1610 is the same, and will not be described herein.
S1720, updating a preset first target behavior recognition model according to the first negative information and the monitoring image.
In the embodiment of the present application, after receiving the first negative acknowledgement information, it is determined that the first target behavior determined based on the above S1400 is substantially a non-first target behavior. At this time, a behavior image of the monitoring object is extracted from the monitoring image, and the behavior image is marked as a non-first target behavior. Further, the behavior image and the mark of the non-first target behavior are used as a training sample to train the first target behavior recognition model so as to obtain an updated first target behavior recognition model. Thus, the first target behavior recognition model recognizes the first target behavior, which was substantially the non-first target behavior based on the above S1400, as the non-first target behavior when it is recognized next time. Therefore, the first target behavior recognition model can meet the personalized requirements of the user, and the user experience is further improved.
In an embodiment of the present application, after S1300, the monitoring method provided in the embodiment of the present application further includes the following S1340 and S1350:
s1340, determining whether the monitored object has a second target behavior according to the monitored image when the monitored object does not exceed the first monitored area.
In the embodiment of the application, the second target behavior is different from the first target behavior in dimension. Specifically, the second target behavior is a dangerous or impending behavior of the monitoring object itself. Such as a tumbling action or a one-handed propping action, etc.
In an embodiment of the present application, the specific implementation of determining whether the monitored object has the second target behavior according to the monitored image in S1340 may be:
and determining whether the second target behavior exists in the monitored object according to the monitored image and a preset second target behavior identification model.
The input of the preset second target behavior recognition model is the monitoring image, and the model is output as the model of whether the behavior of the monitored object in the monitoring image is the identification information of the second target behavior. Or outputting the identification information of whether the behavior of the monitoring object in the monitoring image is the second target behavior, and outputting the risk level corresponding to the second target behavior when the identification information of the second target behavior of the monitoring object is output.
It should be noted that, the acquiring manner of the preset second target behavior recognition model is the same as that of the first target behavior recognition model, and will not be described herein.
And S1350, outputting third prompt information to the user terminal under the condition that the monitored object has the second target behavior.
In the embodiment of the application, under the condition that the monitored object has the second target behavior, the third prompt information is output to the user terminal, so that the situation that the monitored object is dangerous or is about to be dangerous can be timely found though the monitoring personnel does not open the APP of the monitoring equipment on the user terminal in an active prompt mode and the user does not open the APP of the monitoring equipment on the user terminal.
In an embodiment of the present application, the monitoring method provided in the embodiment of the present application further includes, based on the S1340 and S1350, the following S1810 and S1820:
s1810, receiving second negative acknowledgement information of the user aiming at the third prompt information.
In an embodiment of the present application, the second negative acknowledgement information includes: and denying the information of the second target behavior of the monitoring object.
In the embodiment of the application, considering the error of the second target behavior determined by the monitoring device and the personalized requirement of the user, the user terminal determines that the second target behavior does not exist in the monitored object substantially after the user terminal checks the monitored image after receiving the third prompt information. At this time, the user may deny the third prompt information to confirm that the monitored object does not substantially have the first target behavior.
S1820, updating the second target behavior recognition model according to the second negative information and the monitoring image.
In the embodiment of the present application, after receiving the second negative acknowledgement information, it is determined that the second target behavior determined based on the above S1810 is substantially a non-second target behavior. At this time, a behavior image of the monitoring object is extracted from the monitoring image, and the behavior image is marked as a non-second target behavior. Further, taking the behavior image and the mark of the non-second target behavior as a training sample, and training the second target behavior recognition model to obtain an updated second target behavior recognition model. In this way, the second target behavior recognition model recognizes the second target behavior, which was actually a non-second target behavior obtained based on the above S1810, as a non-second target behavior when it is recognized next time. Therefore, the second target behavior recognition model can meet the personalized requirements of the user, and the user experience is further improved.
< example >
Based on the above method embodiment, the monitoring method provided in the embodiment of the present application includes the following steps S1001 to S1011:
s1001, acquiring a monitoring image.
S1002, identifying whether a monitoring object exists in the monitoring image.
S1003, in the case where there is a monitoring object, determining whether the monitoring object exceeds the second monitoring area.
S1004, outputting second prompt information when the monitored object exceeds the second monitoring area.
S1005, determining whether the monitoring object exceeds the first monitoring area and does not exceed the second monitoring area in the case where the monitoring object exists.
S1006, under the condition that the monitored object exceeds the first monitoring area and does not exceed the second monitoring area, determining whether the monitored object has a first target behavior according to the monitoring image.
S1007, outputting first prompt information to the user terminal when the monitored object has first target behaviors.
S1008, receiving first negative acknowledgement information aiming at the first prompt information.
S1009, updating the first monitoring area according to the first denial information and the area occupied by the monitoring object in the monitoring image.
S1010, determining whether the monitored object has a second target behavior according to the monitored image under the condition that the monitored object does not exceed the first monitored area.
S1011, outputting a third prompt message to the user terminal under the condition that the monitored object has the second target behavior.
< device example >
The embodiment of the present application provides a monitoring device 200, as shown in fig. 2, including: an acquisition module 210, an identification module 220, a first determination module 230, a second determination module 240, and an output module 250, wherein:
An acquisition module 210, configured to acquire a monitoring image;
an identifying module 220, configured to identify whether a monitored object exists in the monitored image;
a first determining module 230, configured to determine, in the presence of a monitored object, whether the monitored object exceeds a first monitored area;
a second determining module 240, configured to determine, according to the monitoring image, whether a first target behavior exists in the monitored object if the monitored object exceeds the first monitored area;
and the output module 250 is configured to output a first prompt message to the mobile terminal when the monitored object has a first target behavior.
In an embodiment of the present application, the monitoring device 200 provided in the embodiment of the present application further includes a first receiving module and a first updating module, where:
the first receiving module is used for receiving first negative acknowledgement information aiming at the first prompt information;
and the first updating module is used for updating the first monitoring area according to the first denial information and the area occupied by the monitoring object in the monitoring image.
In an embodiment of the present application, the monitoring apparatus 200 provided in the embodiment of the present application further includes a third determining module, where:
The obtaining module 210 is further configured to obtain a second monitoring area, where the second monitoring area includes the first monitoring area;
and the third determining module is used for determining the first monitoring area according to the second monitoring area.
In an embodiment of the present application, the monitoring apparatus 200 provided in the embodiment of the present application further includes a fourth determining module, where:
a fourth determining module, configured to determine, in the presence of a monitored object, whether the monitored object exceeds a second monitoring area;
the output module is also used for outputting second prompt information under the condition that the monitoring object exceeds the second monitoring area;
in this embodiment of the present application, the first determining module 230 is specifically configured to determine, in a case where a monitored object exists, whether the monitored object exceeds a first monitored area and does not exceed the second monitored area;
the second determining module 240 is specifically configured to determine whether the monitored object has a first target behavior according to the monitored image when the monitored object exceeds the first monitored area and does not exceed the second monitored area.
In one embodiment of the present application, the second determining module 240 is specifically configured to determine whether the first target behavior exists in the monitored object according to the monitored image and a preset first target behavior recognition model.
In this embodiment, the monitoring device 200 provided in this embodiment of the present application further includes a second receiving module and a second updating module, where:
the second receiving module is used for receiving first negative acknowledgement information aiming at the first prompt information;
and the second updating module is used for updating the preset first target behavior recognition model according to the first negative information and the monitoring image.
In an embodiment of the present application, the monitoring apparatus 200 provided in the embodiment of the present application further includes a fifth determining module, where:
a fifth determining module, configured to determine, according to a monitoring image, whether a second target behavior exists in the monitored object if the monitored object does not exceed the first monitoring area;
the output module 250 is further configured to output a third prompt message to the user terminal when the monitored object has the second target behavior.
< device example >
The present embodiment provides a monitoring device 300, where the monitoring device 300 includes any of the monitoring apparatuses 200 provided in the apparatus embodiments described above.
Alternatively, as shown in fig. 3, the monitoring device 300 comprises a memory 310 and a processor 320, the memory 310 being configured to store computer instructions, the processor 320 being configured to invoke the computer instructions from the memory 310 to perform the monitoring method according to any of the above method embodiments.
< System example >
The embodiment of the present application provides a monitoring system 400, as shown in fig. 4, where the monitoring system 400 includes the monitoring device 300 and the user terminal 410 provided in the above device embodiment. Wherein:
the user terminal 410 is configured to receive the first prompt message.
In one embodiment of the present application, the user terminal 410 may be a smart phone, a tablet computer, or a smart wearable device.
In one embodiment of the present application, the user terminal 410 is further configured to receive a first negative acknowledgement message, and send the first negative acknowledgement message to the monitoring device 300.
In one embodiment of the present application, the user terminal 410 is further configured to receive second negative acknowledgement information, and send the second negative acknowledgement information to the monitoring device 300.
< storage Medium embodiment >
Embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a monitoring method according to any of the above-described method embodiments.
The present application may be a system, method, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for causing a processor to implement aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for performing the operations of the present application may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present application are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer readable program instructions, which may execute the computer readable program instructions.
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, implementation by software, and implementation by a combination of software and hardware are all equivalent.
The embodiments of the present application have been described above, the foregoing description is exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvement of the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the application is defined by the appended claims.

Claims (9)

1. A monitoring method, applied to a monitoring device, the method comprising:
acquiring a monitoring image;
identifying whether a monitoring object exists in the monitoring image;
determining whether a monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists;
determining whether a first target behavior exists in the monitored object according to the monitored image under the condition that the monitored object exceeds the first monitored area;
outputting first prompt information to a user terminal under the condition that the monitoring object has first target behaviors;
In the case of a monitored object, determining whether the monitored object exceeds a first monitored area includes:
acquiring a second monitoring area, wherein the second monitoring area comprises the first monitoring area;
scaling the second monitoring area according to the scaling Fan Guize to obtain the first monitoring area;
wherein the scaling rule is a maximum monitoring area with a regular shape, which scales Fan Weixiao the second monitoring area to the second monitoring area;
or the scaling rule is to identify the image in the second monitoring area so as to determine whether an image of an object higher than the ground by a preset height exists in a preset range from the boundary in the second monitoring area; under the condition of existence, removing the area occupied by the image of the object higher than the ground in the second monitoring area to obtain a first monitoring area;
alternatively, the scaling rule is to shrink the boundary of the second monitoring area inward by a preset length.
2. The method according to claim 1, wherein after the outputting of the first prompt information to the user terminal in the case where the monitored object has the first target behavior, the method further comprises:
Receiving first negative acknowledgement information aiming at the first prompt information;
and updating the first monitoring area according to the first denial information and the area occupied by the monitoring object in the monitoring image.
3. The method according to claim 1, further comprising, after the identifying whether the monitoring object exists in the monitoring image:
determining whether a monitoring object exceeds a second monitoring area in the case that the monitoring object exists;
outputting second prompt information under the condition that the monitoring object exceeds the second monitoring area;
the determining whether the monitored object exceeds the first monitored area in the condition that the monitored object exists comprises the following steps:
determining whether the monitoring object exceeds a first monitoring area and does not exceed the second monitoring area in the case that the monitoring object exists;
and under the condition that the monitored object exceeds the first monitoring area, determining whether the monitored object has a first target behavior according to the monitoring image comprises the following steps:
and under the condition that the monitoring object exceeds the first monitoring area and does not exceed the second monitoring area, determining whether the monitoring object has a first target behavior according to the monitoring image.
4. The method of claim 1, wherein said determining whether the monitored object has a first target behavior based on the monitored image comprises:
determining whether a first target behavior exists in the monitored object or not according to the monitored image and a preset first target behavior identification model;
the method further comprises the steps of, after outputting first prompt information to the user terminal under the condition that the monitored object has first target behaviors:
receiving first negative acknowledgement information aiming at the first prompt information;
and updating the preset first target behavior recognition model according to the first negative information and the monitoring image.
5. The method of claim 1, wherein after the determining whether the monitored object exceeds a first monitored area in the presence of the monitored object, the method further comprises:
determining whether a second target behavior exists in the monitored object according to the monitored image under the condition that the monitored object does not exceed the first monitored area;
and outputting third prompt information to the user terminal under the condition that the monitoring object has the second target behavior.
6. A monitoring device, the device comprising:
the acquisition module is used for acquiring the monitoring image;
the identification module is used for identifying whether a monitoring object exists in the monitoring image or not;
the first determining module is used for determining whether the monitoring object exceeds a first monitoring area or not under the condition that the monitoring object exists;
the second determining module is used for determining whether the monitored object has a first target behavior according to the monitored image under the condition that the monitored object exceeds the first monitored area;
the output module is used for outputting first prompt information to the mobile terminal under the condition that the monitoring object has first target behaviors;
the acquisition module is further used for acquiring a second monitoring area, wherein the second monitoring area comprises the first monitoring area;
the third determining module is configured to scale the second monitoring area according to the scaling Fan Guize to obtain the first monitoring area;
wherein the scaling rule is a maximum monitoring area with a regular shape, which scales Fan Weixiao the second monitoring area to the second monitoring area;
or the scaling rule is to identify the image in the second monitoring area so as to determine whether an image of an object higher than the ground by a preset height exists in a preset range from the boundary in the second monitoring area; under the condition of existence, removing the area occupied by the image of the object higher than the ground in the second monitoring area to obtain a first monitoring area;
Alternatively, the scaling rule is to shrink the boundary of the second monitoring area inward by a preset length.
7. A monitoring device, characterized in that it comprises a monitoring apparatus according to claim 6; or,
the monitoring device comprising a memory for storing computer instructions and a processor for invoking the computer instructions from the memory to perform the monitoring method of any of claims 1-5.
8. A monitoring system comprising the monitoring device of claim 7 and a user terminal, wherein:
the user terminal is used for receiving the first prompt information.
9. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, implements the monitoring method according to any of claims 1-5.
CN202210611797.3A 2022-05-31 2022-05-31 Monitoring method, device, equipment, system and storage medium Active CN115273395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210611797.3A CN115273395B (en) 2022-05-31 2022-05-31 Monitoring method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210611797.3A CN115273395B (en) 2022-05-31 2022-05-31 Monitoring method, device, equipment, system and storage medium

Publications (2)

Publication Number Publication Date
CN115273395A CN115273395A (en) 2022-11-01
CN115273395B true CN115273395B (en) 2024-03-12

Family

ID=83758716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210611797.3A Active CN115273395B (en) 2022-05-31 2022-05-31 Monitoring method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN115273395B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116311780A (en) * 2023-03-16 2023-06-23 宁波星巡智能科技有限公司 Intelligent monitoring method, device and equipment for preventing infants from falling from high place

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02263193A (en) * 1988-12-28 1990-10-25 Shigumatsukusu Kk Object recognizing device
KR101615243B1 (en) * 2015-11-23 2016-05-11 (주)태영정보 Video surveillance apparatus for intelligent security and video surveillance method thereof
CN105611248A (en) * 2015-12-25 2016-05-25 北京奇虎科技有限公司 Monitoring method, device and system based on camera
CN106534796A (en) * 2016-11-29 2017-03-22 北京小米移动软件有限公司 Method and device for monitoring safety of infant and child
CN107945458A (en) * 2017-12-11 2018-04-20 北京奇虎科技有限公司 Fall detection method, device and computing device under camera scene
JP2018097788A (en) * 2016-12-16 2018-06-21 清水建設株式会社 Monitoring system and method
CN108566534A (en) * 2018-04-23 2018-09-21 Oppo广东移动通信有限公司 Alarm method, device, terminal based on video monitoring and storage medium
CN111083435A (en) * 2019-10-27 2020-04-28 恒大智慧科技有限公司 Security monitoring method and device and computer readable storage medium
CN111275911A (en) * 2020-01-16 2020-06-12 珠海格力电器股份有限公司 Danger prompting method, equipment and computer readable storage medium
CN111586356A (en) * 2020-05-08 2020-08-25 国家邮政局邮政业安全中心 Violation monitoring method, device and system, electronic equipment and storage medium
CN111915842A (en) * 2020-07-02 2020-11-10 广东技术师范大学 Abnormity monitoring method and device, computer equipment and storage medium
CN112382032A (en) * 2020-11-13 2021-02-19 珠海大横琴科技发展有限公司 Monitoring method and device, electronic equipment and storage medium
CN112689120A (en) * 2019-09-30 2021-04-20 广州慧睿思通科技股份有限公司 Monitoring method and device
CN113971868A (en) * 2020-07-23 2022-01-25 易程融创信息科技有限公司 Alarm method and system based on infant behavior statistics

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7381114B2 (en) * 2019-04-01 2023-11-15 ビーサイズ株式会社 monitoring system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH02263193A (en) * 1988-12-28 1990-10-25 Shigumatsukusu Kk Object recognizing device
KR101615243B1 (en) * 2015-11-23 2016-05-11 (주)태영정보 Video surveillance apparatus for intelligent security and video surveillance method thereof
CN105611248A (en) * 2015-12-25 2016-05-25 北京奇虎科技有限公司 Monitoring method, device and system based on camera
CN106534796A (en) * 2016-11-29 2017-03-22 北京小米移动软件有限公司 Method and device for monitoring safety of infant and child
JP2018097788A (en) * 2016-12-16 2018-06-21 清水建設株式会社 Monitoring system and method
CN107945458A (en) * 2017-12-11 2018-04-20 北京奇虎科技有限公司 Fall detection method, device and computing device under camera scene
CN108566534A (en) * 2018-04-23 2018-09-21 Oppo广东移动通信有限公司 Alarm method, device, terminal based on video monitoring and storage medium
CN112689120A (en) * 2019-09-30 2021-04-20 广州慧睿思通科技股份有限公司 Monitoring method and device
CN111083435A (en) * 2019-10-27 2020-04-28 恒大智慧科技有限公司 Security monitoring method and device and computer readable storage medium
CN111275911A (en) * 2020-01-16 2020-06-12 珠海格力电器股份有限公司 Danger prompting method, equipment and computer readable storage medium
CN111586356A (en) * 2020-05-08 2020-08-25 国家邮政局邮政业安全中心 Violation monitoring method, device and system, electronic equipment and storage medium
CN111915842A (en) * 2020-07-02 2020-11-10 广东技术师范大学 Abnormity monitoring method and device, computer equipment and storage medium
CN113971868A (en) * 2020-07-23 2022-01-25 易程融创信息科技有限公司 Alarm method and system based on infant behavior statistics
CN112382032A (en) * 2020-11-13 2021-02-19 珠海大横琴科技发展有限公司 Monitoring method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115273395A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN107944380B (en) Identity recognition method and device and storage equipment
TWI696090B (en) Model training method, method and device for detecting URL
US11328171B2 (en) Image retrieval method and apparatus
US10621349B2 (en) Detection of malware using feature hashing
CN115273395B (en) Monitoring method, device, equipment, system and storage medium
US11373065B2 (en) Dictionary based deduplication of training set samples for machine learning based computer threat analysis
CN107239694B (en) Android application permission reasoning method and device based on user comments
CN103916513A (en) Method and device for recording communication message at communication terminal
US20200320202A1 (en) Privacy vulnerability scanning of software applications
CN104468993A (en) Method for checking messages
IL281410B1 (en) Bit-level data generation and artificial intelligence techniques and architectures for data protection
CN104361021A (en) Webpage encoding identifying method and device
CN105975302A (en) Application installation method and terminal
CN109145589B (en) Application program acquisition method and device
CN104021074A (en) Vulnerability detection method and device for application program of PhoneGap framework
US9646157B1 (en) Systems and methods for identifying repackaged files
CN103870378A (en) Monitoring method for terminal device and terminal device
CN107045497A (en) A kind of quick newsletter archive content sentiment analysis system and method
CN111008267A (en) Intelligent dialogue method and related equipment
CN114912432A (en) Data analysis method and device, electronic equipment and storage medium
KR20160131678A (en) Portable device for protecting having camera and method for taking picture
CN114595482A (en) Software source code privacy detection method and system based on static detection
CN115495737A (en) Malicious program invalidation method, device, equipment and storage medium
CN110222526B (en) Method and device for safely preventing outward sending
CN113515744A (en) Malicious document detection method, device and system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant