CN115695736A - Intelligent security command system and security command method based on three-dimensional model analysis - Google Patents

Intelligent security command system and security command method based on three-dimensional model analysis Download PDF

Info

Publication number
CN115695736A
CN115695736A CN202211600278.3A CN202211600278A CN115695736A CN 115695736 A CN115695736 A CN 115695736A CN 202211600278 A CN202211600278 A CN 202211600278A CN 115695736 A CN115695736 A CN 115695736A
Authority
CN
China
Prior art keywords
monitoring
dimensional model
district
image
control center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211600278.3A
Other languages
Chinese (zh)
Inventor
黄山
马玉宽
王宇翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Airace Technology Development Co ltd
Original Assignee
Guangdong Airace Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Airace Technology Development Co ltd filed Critical Guangdong Airace Technology Development Co ltd
Priority to CN202211600278.3A priority Critical patent/CN115695736A/en
Publication of CN115695736A publication Critical patent/CN115695736A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides an intelligent security command system and a security command method based on three-dimensional model analysis, belonging to the technical field of intelligent security, wherein the command system comprises: the data acquisition unit is used for acquiring and outputting images of jurisdictions in multiple angles; the three-dimensional engine is used for receiving the image information fed back by the data acquisition unit and establishing a three-dimensional model of the district in the jurisdiction by utilizing the image information; the monitoring protection system is used for monitoring the district and sending monitoring abnormal information when the security protection abnormality occurs in the district; and the control center is used for receiving the image of the abnormal area, comparing and analyzing the image of the abnormal area with the established three-dimensional model of the jurisdiction, positioning the actual position of the abnormal area in the three-dimensional model of the jurisdiction and flashing and alarming the positioned position. The security command system can accurately position the position where the monitoring is abnormal by constructing the three-dimensional model of the district, so that the management and control personnel can know and process the emergency in time.

Description

Intelligent security command system and security command method based on three-dimensional model analysis
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security command system and a security command method based on three-dimensional model analysis.
Background
The science and technology are developed more and more, and people feel great convenience brought by the high science and technology and bring many unsafe factors to some specific fields and specific areas. Safety is always a goal constantly pursued by people, and particularly in some specific occasions such as guard posts, military forces, important government units and the like, the safety is more important due to the existing particularity and privacy. It is therefore necessary to strictly arm these special situations and to implement effective supervision.
At present, a security command system in the market is basically based on a two-dimensional platform to supervise the area in the jurisdiction so as to protect the security of the jurisdiction. When an emergency occurs, the real scene information of the event point cannot be known at the first time through the two-dimensional platform, which is not beneficial for management and control personnel to process the emergency in time. The existing video monitoring system simply monitors the district, and when an emergency occurs in the district, the video monitoring system cannot timely notify the management and control personnel, which is not beneficial to the management and control personnel to process the emergency at the first time. Moreover, the existing video monitoring system cannot locate the position of the emergency, so that when the emergency occurs, the management and control personnel cannot know the real scene information of the incident point at the first time, which is not beneficial to the field control and response of the emergency.
Therefore, a new security command system is needed to solve the defects of the prior art.
Disclosure of Invention
In order to solve the problems in the related art, one of the purposes of the present invention is to provide an intelligent security command system based on three-dimensional model analysis, which can accurately locate the occurrence position of monitoring abnormality by constructing a three-dimensional model of a jurisdiction, so that a manager can timely know and process an emergency.
The utility model provides an intelligent security protection command system based on three-dimensional model analysis which characterized in that includes:
the data acquisition unit is used for acquiring and outputting image information of a district from multiple angles;
the three-dimensional engine is used for receiving the image information fed back by the data acquisition unit and establishing a three-dimensional model of the jurisdiction by utilizing the image information;
the monitoring protection system is used for monitoring the district and sending monitoring abnormal information when security and protection abnormality occurs in the district, wherein the monitoring abnormal information comprises an image of an abnormal area;
and the control center receives the image of the abnormal area, compares and analyzes the image of the abnormal area with the established three-dimensional model of the jurisdiction, positions the actual position of the abnormal area in the three-dimensional model of the jurisdiction, and enables the positioned position to flash and alarm.
In a preferred technical scheme of the invention, the data acquisition unit acquires image information of a district under jurisdiction at a set time interval;
and in the image acquisition process, the data acquisition unit acquires images of the same area of the district for a plurality of times according to the set movement distance.
In a preferred technical scheme of the invention, the data acquisition unit selects different angle viewpoints to acquire images for multiple times according to the cross coordinates of longitude and latitude; and when the images are collected at the same angle viewpoint, the data collection unit moves according to the set distance to collect the images for a plurality of times.
In a preferred technical solution of the present invention, the establishing a three-dimensional model of a jurisdiction using image information includes:
dividing regions of the jurisdictions, and sequentially carrying out three-dimensional model building operation on the divided regions according to a set sequence;
the three-dimensional model building operation is sequentially performed on the divided regions according to the set sequence, and the three-dimensional model building operation comprises the following steps:
selecting a region of a three-dimensional model to be established, and acquiring image information of the selected region; wherein the acquired image information comprises at least 1 group of aerial view images and 4-8 groups of inclined images;
converting the acquired image information into three-dimensional point cloud information, and interpolating the converted three-dimensional point cloud information to obtain interpolated corrected point cloud information;
performing surface vector extraction on the corrected point cloud information to obtain a vector model of the region;
and mapping the vector model of the area by using the aerial view image and the oblique image to obtain a three-dimensional model of the area.
In a preferred technical scheme of the invention, the monitoring protection system comprises a video monitoring system, and the video monitoring system is electrically connected with the control center;
the video monitoring system is used for monitoring whether a forbidden area intrusion phenomenon occurs in a district, whether a person retention phenomenon occurs in a key area, and whether a suspicious article leaving phenomenon occurs;
when the video monitoring system finds that a forbidden zone intrusion phenomenon occurs in a district, a first warning signal is sent to the control center, and an image of the generated forbidden zone intrusion is fed back to the control center;
when the video monitoring system finds that the retention phenomenon of the personnel in the key area occurs in the jurisdiction, a second warning signal is sent to the control center, and the image of the key area where the retention of the personnel occurs is fed back to the control center;
and when the video monitoring system finds that the phenomenon of suspicious article leaving behind occurs in the jurisdiction, a third warning signal is sent to the control center, and the image of the area where the suspicious article leaving behind occurs is fed back to the control center.
In a preferred technical scheme of the invention, the monitoring and protection system comprises a perimeter intrusion alarm system, and the perimeter intrusion alarm system is used for judging whether the jurisdiction has an illegal intrusion phenomenon or not, sending a fourth warning signal to the control center when the jurisdiction has the illegal intrusion phenomenon, and feeding back an image of an area in which the illegal intrusion occurs to the control center.
In a preferred technical scheme of the invention, the monitoring and protecting system comprises an access control monitoring and alarming system, wherein the access control monitoring and alarming system is used for monitoring whether the access control system in the jurisdiction is abnormal or not, sending a fifth warning signal to the control center when the access control system in the jurisdiction is abnormal, and feeding back an image of an abnormal area of the access control system to the control center;
wherein, access control system includes unusually: the protection door is closed abnormally, the access control system is damaged and invalid door card swiping is caused.
In a preferred technical scheme of the invention, the monitoring and protection system comprises a fire-fighting monitoring system, wherein the fire-fighting monitoring system comprises a temperature sensor, a smoke sensor and a combustible gas sensor which are arranged in a district; the fire-fighting monitoring system is used for monitoring whether fire-fighting abnormality occurs in the district; sending a sixth warning signal to the control center when fire fighting abnormality occurs, and feeding back an image of an abnormal area when the fire fighting abnormality occurs to the control center;
the fire fighting abnormity comprises temperature sensing abnormity, smoke sensing abnormity and combustible gas sensing abnormity.
In a preferred technical scheme of the invention, the monitoring and protecting system comprises an operation linkage monitoring system, wherein the operation linkage monitoring system divides a district into a plurality of operation areas and endows different operation areas with different safety factors; the method specifically comprises the following steps:
inputting position coordinates of a three-dimensional model of a district;
establishing a boundary of a working area by using the position coordinates of the three-dimensional model of the district, and establishing different working areas;
different safety factors are given to different operation areas according to different safety levels of the operation areas;
the operation linkage monitoring system endows different personnel with different grade coefficients, and comprises:
acquiring different operator information;
giving different grade coefficients according to different operator information; the safety coefficient of the operation area and the grade coefficient of the operator form a mapping relation;
when the operating region has the operating personnel with the grade coefficient which does not correspond to the safety coefficient of the operating region, the operating linkage monitoring system sends a seventh warning signal to the control center and feeds back the image of the operating region to the control center.
One of the objectives of the present invention is to provide a security command method, which is implemented by using the intelligent security command system based on three-dimensional model analysis as described above;
the security protection command method comprises the following steps:
constructing a three-dimensional model of a district; wherein the three-dimensional model of the district comprises a terrain and a building of the district;
associating the monitoring protection system of the jurisdiction and receiving monitoring abnormal information fed back by the monitoring protection system;
monitoring abnormal positioning is carried out on the three-dimensional model according to the received monitoring abnormal information fed back by the monitoring protection system;
and (5) monitoring abnormal alarm is carried out at the position where the abnormal positioning is monitored, and management and control personnel are reminded to process.
The beneficial effects of the invention are as follows:
the invention provides an intelligent security command system based on three-dimensional model analysis. The control center of the command system is electrically connected with the monitoring protection system, receives monitoring abnormal information sent by the monitoring protection system when security and protection abnormity occurs in the district, positions the actual position of the abnormal area in the three-dimensional model of the district according to the monitoring abnormal information, and carries out flashing warning. The management and control personnel can timely know that security abnormity occurs in the district through the warning signal, can know the detailed condition of the occurrence area through the three-dimensional model when knowing that the security abnormity occurs, and can timely take corresponding measures to process, so that the security condition of the district can be timely controlled, and the safety of the district is improved.
The invention also provides a security command method comprising the intelligent security command, which can quickly locate the emergency in the district, and enables the management and control personnel to know and know the specific situation of the site in time, so that the management and control personnel can take corresponding measures to process the emergency in time.
Drawings
FIG. 1 is a schematic structural diagram of an intelligent security command system based on three-dimensional model analysis according to the present invention;
fig. 2 is a flowchart of the three-dimensional model building operation sequentially performed on the divided regions in accordance with the set order provided by the present invention;
fig. 3 is a flowchart of a security command method provided in the present invention.
Reference numerals are as follows:
1. a data acquisition unit; 2. a three-dimensional engine; 3. monitoring the protection system; 4. a control center; 41. a video monitoring system; 42. a perimeter intrusion alert system; 43. an entrance guard monitoring and alarming system; 44. a fire monitoring system; 45. an operation linkage monitoring system.
Detailed Description
Preferred embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that, although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Example 1
As shown in fig. 1, an intelligent security command system based on three-dimensional model analysis includes:
the data acquisition unit 1 is used for acquiring and outputting image information of a district from multiple angles; in practical applications, the data acquisition unit 1 may be a high definition camera and/or an aerial device. The data acquisition unit 1 is mainly used for acquiring image information of a district from multiple angles, so that the system can update a three-dimensional model of the district in time according to the acquired image information.
The three-dimensional engine 2 is used for receiving the image information fed back by the data acquisition unit 1 and establishing a three-dimensional model of the jurisdiction by utilizing the image information; the three-dimensional engine 2 is an important part in the whole intelligent security command system, is used for generating a three-dimensional model of the system, and also provides various parameter interfaces and internal support for complex applications, including but not limited to scene rendering, sound playing, behavior control and the like.
The monitoring protection system 3 is used for monitoring the district and sending monitoring abnormal information when security and protection abnormality occurs in the district, wherein the monitoring abnormal information comprises an image of an abnormal area; the monitoring protection system 3 is used as a system monitoring terminal for acquiring various security information of the district, and the monitoring protection system 3 can comprise various cameras for video monitoring.
And the control center 4 receives the image of the abnormal area, compares the image of the abnormal area with the established three-dimensional model of the jurisdiction, positions the actual position of the abnormal area in the three-dimensional model of the jurisdiction, and enables the positioned position to flash and alarm. The control center 4 is used as a core part of the whole system, is electrically connected with the data acquisition unit 1, the three-dimensional engine 2 and the monitoring protection system 3, and can be connected to the three-dimensional engine 2 or the monitoring protection system 3 for operation.
According to the intelligent security command system based on three-dimensional model analysis, the command system acquires image information of the jurisdiction through the data acquisition unit 1, and the three-dimensional engine 2 receives the information sent by the data acquisition unit 1 and establishes the three-dimensional model of the jurisdiction by using the image information. The control center 4 of the command system is electrically connected with the monitoring protection system 3, receives monitoring abnormal information sent by the monitoring protection system 3 when security protection abnormity occurs in the district, positions the actual position of the abnormal area in the three-dimensional model of the district according to the monitoring abnormal information, and carries out flashing warning. The management and control personnel can know that security protection abnormity occurs in the district in time through the warning signal, can know the detailed condition of the occurrence area through the three-dimensional model when knowing that the security protection is abnormal, and can take corresponding measures to process in time, so that the security protection condition of the district can be controlled in time, and the safety of the district is improved.
More specifically, the system operates as follows: firstly, the control center 4 controls the data acquisition unit 1 to operate, so that the data acquisition unit 1 acquires image information of a district. It should be noted that, in the process of acquiring image information, the data acquisition unit 1 acquires image information of a jurisdiction at a set time interval; and in the image acquisition process, the data acquisition unit 1 acquires images of the same area in the jurisdiction for a plurality of times according to the set moving distance. For example, if the set time interval is 15 minutes, the data acquisition unit 1 runs once every 15 minutes, performs image acquisition in the jurisdiction, and feeds back the acquired image information to the three-dimensional engine 2. The three-dimensional engine 2 also updates the three-dimensional model of the system once in 1 minute. Therefore, when security and protection abnormity positioning is carried out, the three-dimensional model positioned by the control center 4 is updated, and the actual situation of the district can be reflected.
In practical applications, because the area of the district is large and the involved terrain or buildings are various, the data acquisition unit 1 is not only a single shooting device, but also a matrix type image acquisition device composed of multiple shooting devices. When the intelligent security command system claimed by the application is applied for the first time, the aerial equipment is firstly adopted to carry out multi-shot in all directions and at multiple angles on the whole face of the district, so that a whole-face three-dimensional model of the district is preliminarily established according to aerial images. And then, the high-definition camera can be used for collecting information of buildings, rivers and the like, and the full-face three-dimensional model is updated and supplemented, so that the obtained three-dimensional model of the jurisdiction is more in line with the actual situation of the jurisdiction, and the control center 4 is also favorable for carrying out security abnormal positioning.
Further, the data acquisition unit 1 selects different angle viewpoints to perform image acquisition for multiple times according to the cross coordinates of longitude and latitude; and when the images are collected at the same angle viewpoint, the data collection unit 1 moves according to the set distance to collect the images for a plurality of times. In order to realize that the data acquisition unit 1 can select different angle times to acquire images for multiple times, the image acquisition unit can be arranged on the guide rail, a sliding block is arranged on the guide rail, and the sliding block drives the data acquisition unit 1 to move along a single direction or multiple directions so as to acquire the images. When the images are collected from the same angle viewpoint, it means that when the image is collected from a certain area at a certain angle, the data collecting unit 1 is not always moving but moves at a certain speed so that the image information of the certain area at the same angle can be collected many times. For example, when the data acquisition unit 1 acquires an image at an angle parallel to the north of a certain building, the data acquisition unit 1 acquires a plurality of pieces of image information of the north of the building in a moving manner, which enables the three-dimensional engine 2 to improve the accuracy of the created three-dimensional model using the plurality of pieces of image information when performing image processing.
More specifically, the establishing of the prefecture three-dimensional model by using the image information includes:
performing region division on the jurisdictions, and sequentially performing three-dimensional model building operation on the divided regions according to a set sequence; because the district has certain area, control three-dimensional engine 2 and carry out the modeling operation according to the order of setting, help to keep the stability of three-dimensional engine 2 operation.
In practical applications, as shown in fig. 2, the sequentially performing three-dimensional modeling operations on the divided regions in the set order includes:
s1, selecting a region of a three-dimensional model to be established, and acquiring image information of the selected region; wherein the acquired image information comprises at least 1 group of aerial view images and 4-8 groups of inclined images; both the aerial view image and the oblique image can be acquired by using an aerial photographing device. The oblique images can be shot from four directions of the south, the east and the north of the building, and for large buildings or terrains with complex structures, 8 groups of oblique images should be collected. If the oblique images of the buildings in the four directions of the south, the east and the north are acquired at oblique angles, the images are acquired from the four directions of the north, the west, the south, the east and the south at oblique angles.
S2, converting the acquired image information into three-dimensional point cloud information, and interpolating the converted three-dimensional point cloud information to obtain interpolated corrected point cloud information; the interpolation of the converted three-dimensional point cloud information is realized by using a plurality of pieces of image information under the same angle. The definition of the three-dimensional point cloud information after interpolation needs to be higher than that before interpolation. The interpolation principle is as follows: the method has the advantages that a certain distance is reserved between two adjacent three-dimensional point clouds in the original image, the three-dimensional point cloud information of the image information under the same angle is interpolated between the two adjacent three-dimensional point clouds in the original image, and the blank between the two adjacent three-dimensional point clouds is filled, so that the definition and the accuracy of the established three-dimensional model in the jurisdiction are improved.
S3, performing surface vector extraction on the corrected point cloud information to obtain a vector model of the region;
and S4, mapping the vector model of the area by using the aerial view image and the oblique image to obtain a three-dimensional model of the area.
Specifically, a least square method is adopted to fit a plane, points belonging to the same plane are fitted to obtain mathematical equation expression parameters of the plane, a plane equation is listed, and finally a building vector model is obtained. In the method, a building or a certain terrain is initially smoothed by a triangulation network method, and a triangulation network of the surface can be quickly and efficiently constructed by taking key points generated in the execution process of the previous step voxel division method as vertexes of the triangulation network; and then vector fitting is performed on the building or a certain terrain. The building surface is a plane, the intersecting line between the surfaces is a straight line, the created three-dimensional model is smooth, the effect and the quality are good, and the post-pasting is convenient. The intersection lines and surfaces between model surfaces obtained by traditional point cloud creation triangulation are not smooth and are not in accordance with the conditions of actual buildings.
In the application, after a vector model of a certain area of a three-dimensional model is required to be established, angular point coordinates in the vector model are extracted; meanwhile, oblique photography data are processed, including aerial triangulation processing is carried out on oblique photography images, and aerial triangulation results are obtained. Then, finding corresponding points of angular points of the regional vector model on the processed oblique photography, and carrying out absolute orientation; and finally, performing texture mapping on the absolute orientation result of the oblique image on the region vector model to obtain a three-dimensional model of the region. The three-dimensional models of the regions constitute an overall three-dimensional model of the entire jurisdiction.
In this embodiment, the monitoring and protection system 3 includes a video monitoring system 41, and the video monitoring system 41 is electrically connected to the control center 4;
the video monitoring system 41 is used for monitoring whether a forbidden zone intrusion phenomenon occurs in a district, whether a person retention phenomenon occurs in a key area, and whether a suspicious article leaving phenomenon occurs;
when the video monitoring system 41 finds that a forbidden zone intrusion phenomenon occurs in the district, a first warning signal is sent to the control center 4, and the generated forbidden zone image is fed back to the control center 4;
when the video monitoring system 41 finds that a retention phenomenon of a person in a key area occurs in a district, a second warning signal is sent to the control center 4, and an image of the key area where the person is retained is fed back to the control center 4;
when the video monitoring system 41 finds that the suspicious article leaving phenomenon occurs in the jurisdiction, it sends a third warning signal to the control center 4, and feeds back the image of the area where the suspicious article leaving occurs to the control center 4. The suspicious article leaving monitoring may be performed by presetting a characteristic image of the suspicious article in the control system, and when the video monitoring system 41 determines that a picture similar to the preset image exists in the monitoring process, a third warning signal is sent to the control center 4.
The video monitoring system 41 includes a plurality of cameras in the jurisdiction and is used for performing all-around monitoring on the jurisdiction. The principle of the video monitoring system 41 for judging whether a person intrudes into the forbidden zone is to firstly acquire an unmanned image of the forbidden zone, acquire the image of the forbidden zone in real time, compare and analyze the image acquired in real time and the image acquired in advance, judge whether the images are different and judge whether the phenomenon of intrusion occurs in the forbidden zone. When monitoring different abnormalities, the video monitoring system 41 sends different warning signal signals to the control center 4, so that the control center 4 can realize warning in different modes after receiving the different warning signals. Therefore, the management and control personnel can timely know the abnormal type according to different warnings, and the management and control personnel can timely make a response plan so as to better control the emergency.
The invention also provides a security command method which is implemented by using the intelligent security command system based on three-dimensional model analysis;
as shown in fig. 3, the security commanding method includes the following steps:
s100, constructing a three-dimensional model of a district; the three-dimensional model of the district comprises a terrain and a building of the district;
s200, associating a monitoring protection system 3 in a district, and receiving monitoring abnormal information fed back by the monitoring protection system 3;
s300, carrying out monitoring abnormity positioning on the three-dimensional model according to the received monitoring abnormity information fed back by the monitoring protection system 3;
s400, monitoring abnormity alarming is carried out at the position where abnormal positioning is monitored, and management and control personnel are reminded to handle. In the application, the monitoring abnormity alarming comprises highlighting and alarming the position of monitoring abnormity positioning in the three-dimensional model. In another implementation mode, the alarm system further comprises an alarm wrist strap, the alarm wrist strap is worn on the hands of the management and control personnel and connected with the intelligent security command system through network connection or Bluetooth, and when monitoring abnormity occurs, the wrist strap vibrates or flickers to remind the management and control personnel to process the monitoring abnormity in time. It should be noted that the reminding of the wrist band may be different according to different warning signals. For example, when the control center 4 receives the first warning signal, the wrist strap vibrates for 3 seconds at a lower frequency; when the control center 4 receives the second warning signal, the wrist strap vibrates for 3 seconds at a lower frequency and flickers for \8230
The security command method can quickly position the emergency in the district, and enables the management and control personnel to know and know the specific situation of the site in time, so that the management and control personnel can take corresponding measures to process the emergency in time.
Example 2
This embodiment will be described only for differences from embodiment 1, and the remaining technical features are the same as those of the above-described embodiment.
In an embodiment, the monitoring and protection system 3 includes a perimeter intrusion alarm system 42, where the perimeter intrusion alarm system 42 is configured to determine whether an illegal intrusion phenomenon occurs in a jurisdiction, and send a fourth warning signal to the control center 4 when the illegal intrusion phenomenon occurs in the jurisdiction, and feed back an image of an area where the illegal intrusion occurs to the control center 4.
The principle of the perimeter intrusion is to construct a protection boundary of a district, and preset a protection boundary graph in the control center 4. Whether illegal invasion occurs in the perimeter is judged by comparing the protection boundary graph acquired by the monitoring system in real time with the preset protection boundary graph. It should be noted that, in addition to determining the difference between the real-time collected graph and the preset protection boundary graph, the perimeter intrusion alarm system 42 should also preset feature information of the person with authority to enter, so that the relevant person can enter the jurisdiction.
Example 3
This embodiment will be described only for differences from embodiment 2, and the remaining technical features are the same as those of the above-described embodiment.
In this embodiment, the monitoring and protection system 3 includes an access control monitoring and warning system 43, where the access control monitoring and warning system 43 is configured to monitor whether an access control system in the jurisdiction is abnormal, and send a fifth warning signal to the control center 4 when the access control system in the jurisdiction is abnormal, and feed back an image of an abnormal area of the access control system to the control center 4;
wherein, access control system includes unusually: the protection door is closed abnormally, the access control system is damaged, and invalid door card swiping is occurred.
In practical applications, the abnormality of the access control system is usually determined by using a current signal of the access control system. For example, the current signal when the protective door is abnormally closed is different from the current signal when the protective door is normally closed; the invalid door card swiping door can cause the entrance guard system to generate a plurality of current fluctuation signals.
Example 4
This embodiment will be described only for differences from embodiment 3, and the remaining technical features are the same as those of the above-described embodiment.
In this embodiment, the monitoring and protection system 3 includes a fire monitoring system 44, and the fire monitoring system 44 includes a temperature sensor, a smoke sensor and a combustible gas sensor which are arranged in a jurisdiction; the fire-fighting monitoring system 44 is used for monitoring whether fire-fighting abnormality occurs in the district; a sixth warning signal is sent to the control center 4 when fire fighting abnormity occurs, and the image of an abnormal area when the fire fighting abnormity occurs is fed back to the control center 4;
the fire fighting abnormity comprises temperature sensing abnormity, smoke sensing abnormity and combustible gas sensing abnormity.
The temperature sensor, the smoke sensor and the combustible gas sensor are usually arranged at specific positions of the district so as to monitor fire fighting in important areas of the district through related sensors. In practical application, the specific position coordinates of the related sensors can be preset in the control center 4, so that when each sensor gives an alarm, the control center 4 can position the alarm position in time according to the preset position, and the management and control personnel can take corresponding measures in the first time.
Example 5
This embodiment will be described only for differences from embodiment 4, and the remaining technical features are the same as those of the above-described embodiment.
The monitoring protection system 3 comprises an operation linkage monitoring system 45, wherein the operation linkage monitoring system 45 divides the district into a plurality of operation areas and endows different operation areas with different safety factors; the method specifically comprises the following steps:
inputting position coordinates of a three-dimensional model of a district; the input position coordinate process is that an operator inputs position coordinates of different points to the control center 4 of the system through an input device;
constructing a boundary of a working area by using position coordinates of a three-dimensional model of the district, and establishing different working areas; the control center 4 constructs a work area boundary according to the input coordinates; the central positions of different areas can be selected firstly in the process of constructing the boundary, and the boundary is constructed step by step according to the outward diffusion of the central positions. In practical applications, it is necessary to construct a fuzzy boundary of the work area. For example, after the work area boundary is constructed, a threshold distance from the work boundary is set, which may be 5m or 10m. And taking the area within the threshold distance as a fuzzy boundary of the operation area, and when an operator matched with the safety coefficient of the fuzzy boundary appears in the fuzzy boundary, the monitoring protection system 3 cannot give an alarm. The design is to reduce false alarm of the monitoring protection system 3 and reduce resource waste.
Different safety factors are given to different operation areas according to different safety levels of the operation areas;
the operation linkage monitoring system 45 gives different grade coefficients to different personnel, including:
acquiring different operator information;
giving different grade coefficients according to different operator information; the safety coefficient of the operation area and the grade coefficient of the operator form a mapping relation;
when the operating region has the operator with the grade coefficient which does not correspond to the safety coefficient of the operating region, the operating linkage monitoring system 45 sends a seventh warning signal to the control center 4, and feeds back the image of the operating region to the control center 4. In a better embodiment, the fuzzy boundary dwell time of the working area is preset in the control center 4, and when an operator with a grade coefficient not corresponding to the safety coefficient of the fuzzy boundary of the working area occurs and the dwell time of the operator exceeds the preset time, the monitoring and protection system 3 sends a seventh warning signal to the control center 4.
The operation linkage monitoring system 45 monitors each operation area, and once an unauthorized person enters an area where the unauthorized person is not allowed to enter, the corresponding alarm response level is immediately triggered, or a distress signal of a field person is received, and the unauthorized person is immediately positioned and highlighted in a three-dimensional scene. Through setting up operation linkage monitoring system 45 can prevent that personnel from unordered flow, helps guaranteeing the security in key area.
The intelligent security command system based on three-dimensional model analysis can send different alarm signals according to the alarm signals of different monitoring systems, so that management and control personnel can timely make response processing according to the different alarm signals, and safety of jurisdictions is guaranteed.
The relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise. Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description. Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as exemplary only and not as limiting. Thus, other examples of the exemplary embodiments may have different values. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures. In the description of the present application, it is to be understood that the orientation or positional relationship indicated by the directional terms such as "front, rear, upper, lower, left, right", "lateral, vertical, horizontal" and "top, bottom", etc., are generally based on the orientation or positional relationship shown in the drawings, and are used for convenience of description and simplicity of description only, and in the case of not making a reverse description, these directional terms do not indicate and imply that the device or element being referred to must have a particular orientation or be constructed and operated in a particular orientation, and therefore, should not be considered as limiting the scope of the present application; the terms "inner and outer" refer to the inner and outer relative to the profile of the respective component itself.
For ease of description, spatially relative terms such as "over 8230," "upper surface," "above," and the like may be used herein to describe the spatial positional relationship of one device or feature to other devices or features as illustrated in the figures. It will be understood that the spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. For example, if a device in the figures is turned over, devices described as "above" or "on" other devices or configurations would then be oriented "below" or "under" the other devices or configurations. Thus, the exemplary terms "at 8230; \8230; above" may include both orientations "at 8230; \8230; above" and "at 8230; \8230; below". The device may be otherwise variously oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly.
It should be noted that the terms "first", "second", and the like are used to define the components, and are only used for convenience of distinguishing the corresponding components, and the terms have no special meanings unless otherwise stated, and therefore, the scope of protection of the present application is not to be construed as being limited. The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The utility model provides an intelligent security command system based on three-dimensional model analysis which characterized in that includes:
the data acquisition unit is used for acquiring and outputting image information of a district from multiple angles;
the three-dimensional engine is used for receiving the image information fed back by the data acquisition unit and establishing a three-dimensional model of the jurisdiction by utilizing the image information;
the monitoring protection system is used for monitoring the district and sending monitoring abnormal information when security protection abnormality occurs in the district, wherein the monitoring abnormal information comprises an image of an abnormal area;
and the control center receives the image of the abnormal area, compares and analyzes the image of the abnormal area with the established three-dimensional model of the jurisdiction, positions the actual position of the abnormal area in the three-dimensional model of the jurisdiction, and enables the positioned position to flash and alarm.
2. The intelligent security command system based on three-dimensional model analysis of claim 1, wherein:
the data acquisition unit acquires image information of a district at a set time interval;
and in the image acquisition process, the data acquisition unit acquires images of the same area of the district for a plurality of times according to the set movement distance.
3. The intelligent security command system based on three-dimensional model analysis of claim 1, wherein:
the data acquisition unit selects different angle viewpoints to acquire images for multiple times according to the cross coordinates of longitude and latitude; and when the images are collected at the same angle viewpoint, the data collection unit moves according to the set distance to collect the images for a plurality of times.
4. The intelligent security command system based on three-dimensional model analysis of claim 3, wherein:
the establishing of the three-dimensional model of the district under jurisdiction by utilizing the image information comprises the following steps:
dividing regions of the jurisdictions, and sequentially carrying out three-dimensional model building operation on the divided regions according to a set sequence;
the three-dimensional model building operation is sequentially performed on the divided regions according to a set sequence, and comprises the following steps:
selecting a region of a three-dimensional model to be established, and acquiring image information of the selected region; wherein the acquired image information comprises at least 1 bird's-eye view image and 4-8 inclined images;
converting the acquired image information into three-dimensional point cloud information, and interpolating the converted three-dimensional point cloud information to obtain interpolated corrected point cloud information;
performing surface vector extraction on the corrected point cloud information to obtain a vector model of the region;
and mapping the vector model of the area by using the aerial view image and the oblique image to obtain a three-dimensional model of the area.
5. The intelligent security command system based on three-dimensional model analysis according to any one of claims 1-4, wherein:
the monitoring protection system comprises a video monitoring system which is electrically connected with the control center;
the video monitoring system is used for monitoring whether a forbidden area intrusion phenomenon occurs in a district, whether a person retention phenomenon occurs in a key area, and whether a suspicious article leaving phenomenon occurs;
when the video monitoring system finds that a forbidden zone intrusion phenomenon occurs in a jurisdiction, a first warning signal is sent to the control center, and an image of the generated forbidden zone intrusion is fed back to the control center;
when the video monitoring system finds that a retention phenomenon of personnel in a key area occurs in a district, a second warning signal is sent to the control center, and an image of the key area where the personnel are retained is fed back to the control center;
and when the video monitoring system finds that the suspicious article leaving phenomenon occurs in the district, a third warning signal is sent to the control center, and the image of the area where the suspicious article leaving occurs is fed back to the control center.
6. The intelligent security command system based on three-dimensional model analysis according to any one of claims 1-4, wherein:
the monitoring and protection system comprises a perimeter intrusion alarm system, wherein the perimeter intrusion alarm system is used for judging whether the illegal intrusion phenomenon exists in the jurisdiction, sending a fourth warning signal to the control center when the illegal intrusion phenomenon exists in the jurisdiction, and feeding back an image of an area where the illegal intrusion occurs to the control center.
7. The intelligent security command system based on three-dimensional model analysis according to any one of claims 1-4, wherein:
the monitoring protection system comprises an entrance guard monitoring alarm system, the entrance guard monitoring alarm system is used for monitoring whether the entrance guard system in the jurisdiction is abnormal or not, and sending a fifth alarm signal to the control center when the entrance guard system in the jurisdiction is abnormal, and feeding back an image of an abnormal area of the entrance guard system to the control center;
wherein, access control system includes unusually: the protection door is closed abnormally, the access control system is damaged and invalid door card swiping is caused.
8. The intelligent security and protection command system based on three-dimensional model analysis according to any one of claims 1-4, wherein:
the monitoring protection system comprises a fire-fighting monitoring system, and the fire-fighting monitoring system comprises a temperature sensor, a smoke sensor and a combustible gas sensor which are arranged in a district; the fire-fighting monitoring system is used for monitoring whether fire-fighting abnormality occurs in the district; a sixth warning signal is sent to the control center when fire fighting abnormity occurs, and the image of an abnormal area when the fire fighting abnormity occurs is fed back to the control center;
the fire fighting abnormity comprises temperature sensing abnormity, smoke sensing abnormity and combustible gas sensing abnormity.
9. The intelligent security and protection command system based on three-dimensional model analysis according to any one of claims 1-4, wherein:
the monitoring protection system comprises an operation linkage monitoring system, wherein the operation linkage monitoring system divides the district into a plurality of operation areas and endows different operation areas with different safety factors; the method specifically comprises the following steps:
inputting position coordinates of a three-dimensional model of a district;
constructing a boundary of a working area by using position coordinates of a three-dimensional model of the district, and establishing different working areas;
different safety factors are given to different operation areas according to different safety levels of the operation areas;
the operation linkage monitoring system endows different personnel with different grade coefficients, and comprises:
acquiring different operator information;
giving different grade coefficients according to different operator information; the safety coefficient of the operation area and the grade coefficient of the operator form a mapping relation;
when the operating region has the operating personnel with the grade coefficient which does not correspond to the safety coefficient of the operating region, the operating linkage monitoring system sends a seventh warning signal to the control center and feeds back the image of the operating region to the control center.
10. A security protection command method is characterized in that: the security command method is implemented by using the intelligent security command system based on three-dimensional model analysis according to any one of claims 1-9;
the security protection command method comprises the following steps:
constructing a three-dimensional model of a district; wherein the three-dimensional model of the district comprises a terrain and a building of the district;
associating the monitoring protection system of the jurisdiction and receiving monitoring abnormal information fed back by the monitoring protection system;
monitoring abnormity positioning is carried out on the three-dimensional model according to the received monitoring abnormity information fed back by the monitoring protection system;
and monitoring abnormal alarm is carried out at the position where the abnormal positioning is monitored, and management and control personnel are reminded to handle.
CN202211600278.3A 2022-12-14 2022-12-14 Intelligent security command system and security command method based on three-dimensional model analysis Pending CN115695736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211600278.3A CN115695736A (en) 2022-12-14 2022-12-14 Intelligent security command system and security command method based on three-dimensional model analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211600278.3A CN115695736A (en) 2022-12-14 2022-12-14 Intelligent security command system and security command method based on three-dimensional model analysis

Publications (1)

Publication Number Publication Date
CN115695736A true CN115695736A (en) 2023-02-03

Family

ID=85055758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211600278.3A Pending CN115695736A (en) 2022-12-14 2022-12-14 Intelligent security command system and security command method based on three-dimensional model analysis

Country Status (1)

Country Link
CN (1) CN115695736A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116051341A (en) * 2023-03-16 2023-05-02 广东泰一高新技术发展有限公司 Two-dimensional and three-dimensional geographic information integrated analysis system, method, equipment and terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796667A (en) * 2015-04-14 2015-07-22 浙江工商职业技术学院 Campus night-vision three-dimensional virtual monitoring system and method
CN106781169A (en) * 2017-03-08 2017-05-31 天津梅迪亚科技有限公司 Three-dimensional digital garden safety defense monitoring system based on virtual reality Yu internet
CN110874866A (en) * 2019-11-19 2020-03-10 国网智能科技股份有限公司 Transformer substation three-dimensional monitoring method and system based on videos
CN112288984A (en) * 2020-04-01 2021-01-29 刘禹岐 Three-dimensional visual unattended substation intelligent linkage system based on video fusion
CN112489212A (en) * 2020-12-07 2021-03-12 武汉大学 Intelligent three-dimensional mapping method for building based on multi-source remote sensing data
CN113706355A (en) * 2021-09-05 2021-11-26 上海远韵实业有限公司 Method for building intelligent emergency system of chemical industry park
CN114443793A (en) * 2022-01-25 2022-05-06 陈进雄 Method for designing detailed planning three-dimensional scene of space-time data visualization homeland space

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104796667A (en) * 2015-04-14 2015-07-22 浙江工商职业技术学院 Campus night-vision three-dimensional virtual monitoring system and method
CN106781169A (en) * 2017-03-08 2017-05-31 天津梅迪亚科技有限公司 Three-dimensional digital garden safety defense monitoring system based on virtual reality Yu internet
CN110874866A (en) * 2019-11-19 2020-03-10 国网智能科技股份有限公司 Transformer substation three-dimensional monitoring method and system based on videos
CN112288984A (en) * 2020-04-01 2021-01-29 刘禹岐 Three-dimensional visual unattended substation intelligent linkage system based on video fusion
CN112489212A (en) * 2020-12-07 2021-03-12 武汉大学 Intelligent three-dimensional mapping method for building based on multi-source remote sensing data
CN113706355A (en) * 2021-09-05 2021-11-26 上海远韵实业有限公司 Method for building intelligent emergency system of chemical industry park
CN114443793A (en) * 2022-01-25 2022-05-06 陈进雄 Method for designing detailed planning three-dimensional scene of space-time data visualization homeland space

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116051341A (en) * 2023-03-16 2023-05-02 广东泰一高新技术发展有限公司 Two-dimensional and three-dimensional geographic information integrated analysis system, method, equipment and terminal

Similar Documents

Publication Publication Date Title
CN108615321B (en) Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN105787469B (en) The method and system of pedestrian monitoring and Activity recognition
CN109240311B (en) Outdoor electric power field construction operation supervision method based on intelligent robot
CN101574567B (en) Computer vision technique based method and system for detecting and extinguishing fire disaster intelligently
CN101574566B (en) Monocular vision technique based fire monitor control method for adjusting relative positions of fire point and water-drop point
JP4140159B2 (en) Surveillance camera monitoring area setting apparatus and method
CN111739252B (en) Fire monitoring and automatic fire extinguishing system and working method thereof
CN107909615A (en) A kind of fire monitor localization method based on binocular vision
CN114155601A (en) Vision-based method and system for detecting dangerous behaviors of operating personnel
KR101988356B1 (en) Smart field management system through 3d digitization of construction site and analysis of virtual construction image
CN115597659B (en) Intelligent safety management and control method for transformer substation
CN111753780B (en) Transformer substation violation detection system and violation detection method
CN108259827B (en) Method, device, AR equipment and system for realizing security
CN115695736A (en) Intelligent security command system and security command method based on three-dimensional model analysis
CN110012268A (en) Pipe network AI intelligent control method, system, readable storage medium storing program for executing and equipment
CN111686392A (en) Artificial intelligence fire extinguishing system is surveyed to full scene of vision condition
CN111079722B (en) Hoisting process personnel safety monitoring method and system
CN112235537A (en) Transformer substation field operation safety early warning method
CN112184773A (en) Helmet wearing detection method and system based on deep learning
CN111563680A (en) BIM-based assembly type building construction safety protection method and device and electronic equipment
CN113713292A (en) Method and device for carrying out accurate flame discrimination, fire extinguishing point positioning and rapid fire extinguishing based on YOLOv5 model
CN112906674A (en) Mine fire identification and fire source positioning method based on binocular vision
CN213424017U (en) Intelligent construction site system
CN107045805B (en) Method and system for monitoring small aircraft and airborne objects
JP2019179527A (en) Control device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination