CN116453284B - Security alarm device and method based on dispelling equipment - Google Patents

Security alarm device and method based on dispelling equipment Download PDF

Info

Publication number
CN116453284B
CN116453284B CN202310711609.9A CN202310711609A CN116453284B CN 116453284 B CN116453284 B CN 116453284B CN 202310711609 A CN202310711609 A CN 202310711609A CN 116453284 B CN116453284 B CN 116453284B
Authority
CN
China
Prior art keywords
target
abnormal
dispelling
dispersing
security area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310711609.9A
Other languages
Chinese (zh)
Other versions
CN116453284A (en
Inventor
王理想
王明用
王文星
黄瑞华
谢建省
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shengxun Electronic Technology Co ltd
Original Assignee
Guangzhou Shengxun Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shengxun Electronic Technology Co ltd filed Critical Guangzhou Shengxun Electronic Technology Co ltd
Priority to CN202310711609.9A priority Critical patent/CN116453284B/en
Publication of CN116453284A publication Critical patent/CN116453284A/en
Application granted granted Critical
Publication of CN116453284B publication Critical patent/CN116453284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The invention discloses a security alarm device and a security alarm method based on dispelling equipment, wherein the security alarm device comprises the following steps: the acquisition module is used for acquiring real-time monitoring data acquired by monitoring equipment corresponding to the security area; the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data; and the control module is used for controlling target dispelling equipment of the security area to perform alarm processing and/or dispelling processing when the judging module judges that the security area has an abnormal target. Therefore, when the monitoring equipment monitors an abnormal target with abnormal invasion, the corresponding dispelling equipment is controlled to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the reliability of security and protection is improved, and the life safety and property safety of people are guaranteed.

Description

Security alarm device and method based on dispelling equipment
Technical Field
The invention relates to the technical field of intelligent security, in particular to a security alarm device and method based on dispelling equipment.
Background
In real life, people usually need to arrange corresponding monitoring devices in key places of life, study and work, and special monitoring personnel view monitoring videos collected by monitoring equipment in real time so as to timely inform security personnel for processing after illegal invading personnel are found, so that life safety and property safety of people are guaranteed. However, it is found in practice that the above security mode too depends on subjective activity of the monitoring personnel, if the physical or mental state of the monitoring personnel is poor, the working attitude is relatively negative, or the monitoring personnel leaves the seat, peripheral abnormal conditions may not be found in time, and the security reliability is reduced. It is important to see how to improve the security reliability so as to ensure the life safety and property safety of people.
Disclosure of Invention
The invention aims to solve the technical problem of providing a security alarm device and a security alarm method based on dispelling equipment, which can improve the security reliability so as to ensure the life safety and property safety of people.
In order to solve the technical problems, the first aspect of the invention discloses a security alarm method based on dispelling equipment, which comprises the following steps:
Acquiring real-time monitoring data of a security area, which are acquired by monitoring equipment corresponding to the security area;
judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
and when the judgment result is yes, controlling the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, wherein the alarm processing is used for reminding the existence of the abnormal target in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
As an optional implementation manner, in the first aspect of the present invention, before controlling the dispelling device corresponding to the security area to perform dispelling processing on the abnormal target, the method further includes:
based on the real-time monitoring data, analyzing the real-time invasion condition of the abnormal target to obtain a first analysis result;
determining emergency attributes matched with the abnormal targets according to the first analysis result;
generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute;
the target dispelling device for controlling the security area carries out alarm processing and/or dispelling processing, and the method comprises the following steps:
Based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
As an optional implementation manner, in the first aspect of the present invention, the first analysis result includes one or more of first location information of the abnormal target, first number information of the abnormal target, and first attribute information of the abnormal target;
determining an emergency attribute matched with the abnormal target according to the first analysis result, wherein the emergency attribute comprises;
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining emergency attributes matched with the abnormal targets according to the hazard degree parameters, wherein the emergency attributes comprise alarm attributes and/or dispersing attributes, the dispersing attributes comprise one or more of dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets.
In a first aspect of the present invention, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the generating, according to the emergency attribute, a dissipating control parameter that matches the target dissipating device of the security area includes:
determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device as a dispersing control parameter of the target dispersing device; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
As an alternative embodiment, in the first aspect of the present invention, the method further includes:
judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
when the existence of the target to be protected in the peripheral range is judged, analyzing the real-time situation of the target to be protected based on the real-time monitoring data to obtain a second analysis result;
and updating the emergency attribute according to the second analysis result, and triggering and executing the operation of generating the alarm control parameter and/or the dispersion control parameter matched with the target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, in the first aspect of the present invention, the second analysis result includes one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and updating the emergency attribute according to the second analysis result, including:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected caused by the abnormal target and/or the severity degree of threat to the target to be protected caused by target dispelling equipment in the security area when dispelling the abnormal target;
And updating the emergency attribute according to the risk degree parameter.
As an optional implementation manner, in the first aspect of the present invention, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method further includes:
judging whether the abnormal target meets preset processing conditions according to the intrusion time information of the abnormal target, wherein the preset processing conditions comprise preset alarm conditions and/or preset dispelling conditions;
when judging that the abnormal target meets the preset processing condition, triggering and executing the target dispelling equipment for controlling the security area to perform alarm processing and/or dispelling processing;
wherein, according to the intrusion time information of the abnormal target, judging whether the abnormal target meets a preset processing condition, including:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
The second aspect of the invention discloses a security alarm device based on dispelling equipment, which comprises:
the acquisition module is used for acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area;
the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
the control module is used for controlling target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing when the judging module judges that the abnormal target exists in the security area, wherein the alarm processing is used for reminding that the abnormal target exists in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area.
As an alternative embodiment, in the second aspect of the present invention, the apparatus further includes:
the analysis module is used for analyzing the real-time invasion condition of the abnormal target based on the real-time monitoring data before the control module controls the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing, so as to obtain a first analysis result;
The determining module is used for determining emergency attributes matched with the abnormal targets according to the first analysis result;
the generation module is used for generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute;
the specific mode of the control module for controlling the target dispelling equipment in the security area to carry out alarm processing and/or dispelling processing comprises the following steps:
based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
As an optional implementation manner, in the second aspect of the present invention, the first analysis result includes one or more of first location information of the abnormal target, first number information of the abnormal target, and first attribute information of the abnormal target;
the determining module determines a specific mode of the emergency attribute matched with the abnormal target according to the first analysis result, and the specific mode comprises the following steps:
Determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining emergency attributes matched with the abnormal targets according to the hazard degree parameters, wherein the emergency attributes comprise alarm attributes and/or dispersing attributes, the dispersing attributes comprise one or more of dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets.
In a second aspect of the present invention, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the generating module generates, according to the emergency attribute, a specific manner of the dissipating control parameter matched with the target dissipating device of the security area, where the specific manner includes:
Determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device as a dispersing control parameter of the target dispersing device; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
As an optional implementation manner, in the second aspect of the present invention, the judging module is further configured to judge whether a target to be protected exists in a peripheral range of the abnormal target based on the real-time monitoring data;
the analysis module is further configured to, when the judgment module judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result;
The apparatus further comprises:
and the updating module is used for updating the emergency attribute according to the second analysis result and triggering and executing the operation of generating the alarm control parameter and/or the dispersion control parameter matched with the target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, in the second aspect of the present invention, the second analysis result includes one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and the specific mode of updating the emergency attribute by the updating module according to the second analysis result comprises the following steps:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected caused by the abnormal target and/or the severity degree of threat to the target to be protected caused by target dispelling equipment in the security area when dispelling the abnormal target;
and updating the emergency attribute according to the risk degree parameter.
As an optional implementation manner, in the second aspect of the present invention, the judging module is further configured to judge, according to intrusion time information of the abnormal target, whether the abnormal target meets a preset processing condition before the control module controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing; when the abnormal target meets the preset processing condition, triggering the control module to execute the operation of controlling the target dispelling equipment of the security area to perform alarm processing and/or dispelling processing, wherein the preset processing condition comprises a preset alarm condition and/or a preset dispelling condition;
the judging module judges whether the abnormal target meets a specific mode of a preset processing condition according to the invasion time information of the abnormal target, and comprises the following steps:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
The third aspect of the invention discloses another security alarm device based on dispelling equipment, which comprises:
a memory storing executable program code;
a processor coupled to the memory;
the processor calls the executable program codes stored in the memory to execute the security alarm method based on the dispelling equipment disclosed in the first aspect of the invention.
A fourth aspect of the present invention discloses a computer storage medium storing computer instructions for executing the security alarm method based on the dispelling device disclosed in the first aspect of the present invention when the computer instructions are called.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the real-time monitoring data of the security area, which is acquired by the monitoring equipment corresponding to the security area, is acquired; judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area; and when the judgment result is yes, controlling the target dispelling equipment of the security area to carry out alarm processing and/or dispelling processing. Therefore, when the monitoring equipment monitors an abnormal target with abnormal invasion, the corresponding dispelling equipment is controlled to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the reliability of security and protection is improved, and the life safety and property safety of people are guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a security alarm method based on dispelling equipment, disclosed in an embodiment of the invention;
FIG. 2 is a schematic flow chart of another security alarm method based on dispelling equipment disclosed in the embodiment of the invention;
FIG. 3 is a schematic view of a security alarm method based on dispelling equipment according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security alarm device based on dispelling equipment according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of another security alarm device based on dispelling equipment according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a security alarm device based on a dispelling device according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or article that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or article.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The invention discloses a security alarm device and a security alarm method based on dispelling equipment, which can control corresponding dispelling equipment to alarm and dispelling when monitoring equipment monitors an abnormal target with abnormal invasion, so that the occurrence of situations that peripheral abnormal situations cannot be found in time and security personnel cannot arrive at a site to process due to the fact that security is too dependent on subjective motility of monitoring personnel is reduced, the security reliability is improved, and the life safety and property safety of people are guaranteed. The following will describe in detail.
Example 1
Referring to fig. 1, fig. 1 is a schematic flow chart of a security alarm method based on dispelling equipment according to an embodiment of the present invention. The security alarm method based on the dispelling device described in fig. 1 may be used to implement security control on a security area, and in particular, the security alarm method based on the dispelling device may be applied to the dispelling device, or may be applied to a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 1, the security alarm method based on the dispelling device may include the following operations:
101. and acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area.
In the embodiment of the invention, optionally, the security area may include one or more of a land security area, a water area security area, and an airspace security area, the land security area may include any indoor area and/or outdoor area with security requirements, such as a square, an inside and an outside of a key building, and the like, the water area security area may include a water surface security area and/or an underwater security area, such as a bridge perimeter security area, a wind farm perimeter security area, a submarine farm security area, and the like, and the embodiment of the invention is not limited.
In the embodiment of the present invention, optionally, the monitoring device may include any one or more of a video monitoring device, an image monitoring device, an infrared monitoring device, a radar monitoring device, a thermal sensing monitoring device, a sound sensor, and the like, and the embodiment of the present invention is not limited. Optionally, when multiple monitoring devices are included, the multiple monitoring devices may be integrated in the same apparatus, or may be integrated in different apparatuses, and embodiments of the present invention are not limited.
In the embodiment of the present invention, optionally, the real-time monitoring data of the security area may include one or more of video monitoring data, image monitoring data, infrared monitoring data, radar monitoring data, thermal sensing monitoring data, sound monitoring data, and the like, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, the placement area can comprise at least one security sub-area, each security sub-area has a corresponding security level, and the security level corresponding to the security sub-area has an association relationship with the monitoring equipment of the security sub-area and/or the acquisition frequency of real-time monitoring data. Optionally, the higher the corresponding security level is, the higher the collection frequency of the real-time monitoring data of the security sub-area is, and/or the higher the corresponding security level is, the more the number and/or variety of the monitoring devices of the security sub-area is, and/or the higher the corresponding security level is, the better the monitoring effect of the monitoring devices of the security sub-area is.
102. And judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area, and triggering and executing step 103 when the judgment result of step 102 is yes.
As an optional implementation manner, according to real-time monitoring data of a security area, judging whether an abnormal target of abnormal intrusion exists in the security area includes:
according to the data type of the real-time monitoring data of the security area, determining a target recognition model matched with the real-time monitoring data from a preset abnormal recognition model set, wherein the abnormal recognition model set can comprise one or more of a video abnormal recognition model, an image abnormal recognition model, an infrared abnormal recognition model, a radar abnormal recognition model, a thermal perception abnormal recognition model, a sound abnormal recognition model and a three-dimensional information abnormal recognition model, and further comprises one or more of an abnormal biological recognition algorithm, an abnormal equipment recognition algorithm, an abnormal environment recognition algorithm and the like, and the abnormal biological recognition algorithm can comprise an abnormal personnel recognition algorithm and/or an abnormal animal recognition algorithm;
inputting the real-time monitoring data into the target recognition model so that the target recognition model analyzes the real-time monitoring data to obtain an abnormal target recognition result of the real-time monitoring data, wherein the abnormal target recognition result is used for representing whether an abnormal target of abnormal invasion exists in the security area.
In this optional embodiment, if the target recognition model includes a three-dimensional information anomaly recognition model, before inputting the real-time monitoring data into the three-dimensional information anomaly recognition model to enable the three-dimensional information anomaly recognition model to analyze the real-time monitoring data to obtain an anomaly target recognition result of the real-time monitoring data, the method may further include: according to the real-time monitoring data, constructing three-dimensional model information of the security area as new real-time monitoring data, and triggering and executing the operation of inputting the real-time monitoring data into the three-dimensional information anomaly identification model so as to enable the three-dimensional information anomaly identification model to analyze the real-time monitoring data and obtain an anomaly target identification result of the real-time monitoring data.
It can be seen that implementing this alternative embodiment can improve the accuracy, variety and flexibility of outlier target recognition.
In the embodiment of the invention, optionally, the abnormal target may include an abnormal organism (such as an abnormal person or an abnormal animal) of the abnormal invasion and/or an abnormal device of the abnormal invasion (such as an abnormal invading vehicle, an unmanned aerial vehicle, etc.).
103. And controlling target dispelling equipment of the security area to perform alarm processing and/or dispelling processing.
The alarm processing can be used for reminding the security area of the existence of the abnormal target, and the dispelling processing can be used for driving the abnormal target to leave the security area.
In the embodiment of the invention, the target dispelling equipment is optionally provided with an alarm structure for alarm processing, and the alarm structure can comprise one or more of an audio alarm structure, a display alarm structure, a light alarm structure and a communication alarm structure.
In the embodiment of the invention, optionally, the target dispelling device may include a contact dispelling device and/or a non-contact dispelling device, where the contact dispelling device is used to indicate that physical contact is required with the abnormal target when the abnormal target is dispelling, and the non-contact dispelling device is used to indicate that physical contact is not required with the abnormal target when the abnormal target is dispelling. Preferably, a non-contact type dispersing device is adopted as the target dispersing device, alternatively, the non-contact type dispersing device may comprise a non-contact type dispersing device based on fluctuation, and the non-contact type dispersing device based on fluctuation may comprise one or more of a sound wave dispersing device, a light wave dispersing device and an electromagnetic wave dispersing device. Alternatively, the target dissipating device may comprise a mobile dissipating device and/or a non-mobile dissipating device.
In the embodiment of the present invention, optionally, when multiple target dispersing apparatuses are included, the multiple target dispersing apparatuses may be integrated in the same device, for example, the sound wave dispersing apparatus and the light wave dispersing apparatus may be integrated in the same device to form the sound-light drive dispersing apparatus, or may be integrated in different devices.
In the embodiment of the present invention, optionally, the target dispelling device and the monitoring device may be integrated in the same apparatus, for example, the sound wave dispelling device and the monitoring device may be integrated in the same apparatus to form a sound protection monitoring integrated device, or may be integrated in different apparatuses, and the embodiment of the present invention is not limited.
In the embodiment of the invention, the association relation between the security level corresponding to the security sub-area and the dispelling equipment of the security sub-area is optional. Optionally, the higher the corresponding security level, the more the number and/or variety of the dispelling devices of the security sub-area, and/or the higher the corresponding security level, the better the dispelling effect of the dispelling devices of the security sub-area.
Therefore, when the monitoring equipment monitors the abnormal targets with abnormal invasion, the embodiment of the invention can control the corresponding dispelling equipment to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security is too dependent on subjective activity of monitoring personnel are reduced, the reliability of security is improved, and the life safety and property safety of people are ensured.
In an alternative embodiment, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method may further include:
judging whether the abnormal target meets preset processing conditions according to the intrusion time information of the abnormal target, wherein the preset processing conditions can comprise preset alarm conditions and/or preset dispelling conditions;
when the abnormal target is judged to meet the preset processing condition, the target dispelling equipment for controlling the security area is triggered to perform alarm processing and/or dispelling processing.
In this optional embodiment, as an optional implementation manner, determining whether the abnormal target meets the preset processing condition according to the intrusion time information of the abnormal target may include:
judging whether the intrusion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
In this alternative embodiment, when the abnormal target satisfies the preset alarm condition, the target dispelling device is controlled to perform alarm processing, and when the abnormal target satisfies the preset dispelling condition, the target dispelling device is controlled to perform dispelling processing.
In this optional embodiment, optionally, the respective dispersing trigger periods corresponding to the preset alarm condition and the preset dispersing condition may be the same or different, and the respective intrusion duration thresholds corresponding to the preset alarm condition and the preset dispersing condition may be the same or different.
Therefore, by implementing the optional embodiment, whether the abnormal target needs to be alarmed or not can be judged according to the invasion time or invasion duration of the abnormal target, so that unnecessary alarm processing and dispersing processing are reduced, and the waste of security resources is reduced.
In another alternative embodiment, before the target dispelling device controlling the security area performs the alarm processing and/or the dispelling processing, the method may further include:
according to the target type of the abnormal target and/or the abnormal target identification result, determining target dispelling equipment matched with the abnormal target from one or more dispelling equipment of the security area, and triggering the target dispelling equipment for controlling the security area to perform alarm processing and/or dispelling processing;
Optionally, the target type to which the abnormal target belongs is any one of personnel, animals and equipment, optionally, if the target type to which the abnormal target belongs is personnel or animals, the target dispelling equipment matched with the abnormal target may include an acoustic wave dispelling equipment and/or an optical wave dispelling equipment, and if the target type to which the abnormal target belongs is equipment, the target dispelling equipment matched with the abnormal target may include an electromagnetic wave dispelling equipment, optionally, the electromagnetic wave dispelling equipment may include equipment for electromagnetic interference on the abnormal target.
It can be seen that implementing this alternative embodiment can select a dispelling device matching with the abnormal target according to the target type of the abnormal target, so as to facilitate effective dispelling of the abnormal target and reduce waste of dispelling device resources.
Example two
Referring to fig. 2, fig. 2 is a flow chart of another security alarm method based on dispelling equipment according to an embodiment of the present invention. The security alarm method based on the dispelling device described in fig. 2 may be used to implement security control on a security area, and in particular, the security alarm method based on the dispelling device may be applied to the dispelling device, or may be applied to a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 2, the security alarm method based on the dispelling device may include the following operations:
201. And acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area.
202. And judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area, and triggering and executing step 203 when the judgment result of step 202 is yes.
203. Based on the real-time monitoring data, analyzing the real-time invasion condition of the abnormal target to obtain a first analysis result.
In the embodiment of the present invention, optionally, the first analysis result may include one or more of first location information of the abnormal target, first quantity information of the abnormal target, and first attribute information of the abnormal target. Further optionally, the first location information of the abnormal target may include one or more of a first real-time location of the abnormal target, historical movement track information of the abnormal target, and predicted movement track information of the abnormal target, and the first real-time location may include current location coordinates of the abnormal target and/or a security sub-area where the abnormal target is located. Further optionally, if the abnormal target is an abnormal person, the first attribute information of the abnormal target may include one or more of a predicted age, a predicted gender, dangerous object carrying information, predicted status information, equipment configuration information, and the like of the abnormal target; if the abnormal target is an abnormal animal, the first attribute information of the abnormal target may include an animal type, a predicted age, a predicted gender, and predicted status information to which the abnormal target belongs; if the abnormal object is an abnormal device, the first attribute information of the abnormal object may include a device type, a device size, and predicted status information, where the predicted status information is used to represent a predicted mobility status of the abnormal object, such as a moving speed, a moving flexibility, and the like of the abnormal object.
As an optional implementation manner, based on the real-time monitoring data, the analyzing the real-time intrusion condition of the abnormal target to obtain the first analysis result may include:
determining a target intrusion analysis model matched with an abnormal target from a preset intrusion analysis model set according to the data type of the real-time monitoring data, wherein the intrusion analysis model set can comprise one or more of a video intrusion analysis model, an image intrusion analysis model, an infrared intrusion analysis model, a radar intrusion analysis model, a thermal perception intrusion analysis model, a sound intrusion analysis model and a three-dimensional information intrusion analysis model, and further comprises a biological intrusion condition analysis algorithm and/or a device intrusion condition analysis algorithm, and the biological intrusion condition analysis algorithm can comprise a personnel intrusion condition analysis algorithm and/or an animal intrusion condition analysis algorithm;
inputting the data to be analyzed into the target intrusion analysis model so as to enable the target intrusion analysis model to analyze the data to be analyzed to obtain a first analysis result, wherein the data to be analyzed comprises real-time monitoring data, and further comprises the target type of the abnormal target and/or the abnormal target identification result in the embodiment.
Therefore, the implementation of the alternative implementation mode can analyze the real-time invasion condition of the abnormal target based on the model, and the accuracy and the reliability of the real-time invasion condition analysis are improved.
204. And determining the emergency attribute matched with the abnormal target according to the first analysis result.
As an alternative embodiment, determining, according to the first analysis result, an emergency attribute that matches the abnormal target may include;
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
and determining the emergency attribute matched with the abnormal target according to the hazard degree parameter.
Optionally, the emergency attribute may include an alarm attribute and/or a dispersion attribute, where the dispersion attribute may include one or more of a dispersion manner matched with the abnormal target, a dispersion intensity matched with the abnormal target, and dispersion space information matched with the abnormal target, the dispersion space information may include one or more of a dispersion direction matched with the abnormal target, a dispersion track matched with the abnormal target, and a dispersion range matched with the abnormal target, and the alarm attribute may include one or more of an alarm manner matched with the abnormal target, an alarm content matched with the abnormal target, an alarm object matched with the abnormal target, and the like.
Alternatively, the dispelling mode may include one or more of a warning mode and a powerful dispelling mode, and the alarm mode may include one or more of an audible alarm mode, a display alarm mode, a light wave alarm mode and a communication alarm mode.
Therefore, the implementation of the alternative implementation mode determines the corresponding emergency attribute by analyzing the hazard degree parameter of the abnormal target, further determines the corresponding alarm control parameter and the corresponding dispersion control parameter, can improve the matching degree of the alarm control parameter and the dispersion control parameter and the hazard degree of the abnormal target, is beneficial to improving the success rate and the accuracy of alarm and dispersion, can reduce the excessive dispersion of the abnormal target, further reduces unnecessary damage to the abnormal target and excessive waste of dispersion resources, and reduces damage to life safety and property safety of people due to overlarge dispersion intensity.
In this optional embodiment, optionally, determining, according to the first analysis result, a hazard degree parameter of the abnormal target may include:
determining a hazard degree sub-parameter corresponding to each sub-analysis result in the first analysis result according to a hazard degree calculation sub-algorithm corresponding to each sub-analysis result in the first analysis result and/or a hazard degree association relation corresponding to each sub-analysis result;
And calculating the hazard degree parameters of the abnormal target according to the hazard degree weight corresponding to each sub-analysis result in the first analysis result and the hazard degree sub-parameter corresponding to each sub-analysis result in the first analysis result.
It can be seen that implementing this alternative embodiment can improve the accuracy and reliability of hazard level parameter analysis of anomalous targets.
205. And generating alarm control parameters and/or dispersion control parameters matched with target dispersion equipment of the security area according to the emergency attribute.
As an optional implementation manner, when the target dispelling device of the security area includes a non-contact dispelling device based on fluctuation, generating, according to the emergency attribute, a dispelling control parameter matched with the target dispelling device of the security area may include:
determining a target working mode matched with a dispersing mode from at least one fluctuation working mode of the target dispersing equipment as a dispersing control parameter of the target dispersing equipment; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
And determining the wave propagation direction matched with the target dispersing device according to the dispersing space information as a dispersing control parameter of the target driving device.
In this alternative embodiment, alternatively, the wave operation mode may include one or more of a warning mode for prompting the abnormal target to actively leave the security area by outputting warning information, and a wave dispersion mode for outputting strong waves so that the abnormal target is uncomfortable and forced to leave the security area, for example, the wave operation mode of the acoustic wave dispersion device may include one or more of a voice warning mode and a strong sound dispersion mode, the wave operation mode of the optical wave dispersion device may include one or more of a light warning mode and a strong light dispersion mode, and the wave operation mode of the electromagnetic wave dispersion device may include one or more of a communication warning mode and an electromagnetic wave interference mode.
In this alternative embodiment, the fluctuation bundling level may be used to control the fluctuation output range and output intensity of the target dispersing apparatus.
Therefore, by implementing the optional implementation mode, the working mode, the fluctuation attribute parameters and the dispersing space information of the fluctuation-based non-contact dispersing equipment can be determined according to the emergency attribute, the accuracy and the reliability of determining the dispersing control parameters are further improved, and the accuracy and the reliability of dispersing abnormal targets are further improved.
206. Based on the alarm control parameters, the control target dispelling equipment carries out alarm processing on related personnel in the security area so as to remind the security area of abnormal targets; and/or based on the dispelling control parameter, controlling the target dispelling device to perform dispelling processing on the abnormal target so as to drive the abnormal target to leave the security area.
In the embodiment of the present invention, for other descriptions of step 201, step 202 and step 206, please refer to the detailed descriptions of step 101-step 103 in the first embodiment, and the description of the embodiment of the present invention is omitted.
Therefore, when the monitoring equipment monitors that the abnormal target with abnormal invasion exists, the embodiment of the invention can control the corresponding dispelling equipment to carry out alarming and dispelling treatment, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to carry out treatment due to the fact that security and protection are too dependent on subjective activity of monitoring personnel are reduced, the security and protection reliability is improved, the life safety and property safety of people are guaranteed, in addition, the real-time invasion condition of the abnormal target is analyzed in real time, and then matched dispelling control parameters and alarming control parameters are determined, so that the dispelling equipment is adaptively controlled according to the real-time invasion condition of the abnormal target, the flexibility and accuracy of alarming and dispelling are improved, and the success rate of dispelling the abnormal target is improved.
In an alternative embodiment, the method may further comprise:
judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
when the object to be protected exists in the peripheral range, analyzing the real-time situation of the object to be protected based on the real-time monitoring data to obtain a second analysis result;
and updating the emergency attribute according to the second analysis result, and triggering and executing the operation of generating the alarm control parameters and/or the dispersion control parameters matched with the target dispersion equipment of the security area according to the emergency attribute.
Optionally, the method of determining whether the target to be protected exists in the peripheral range by using the real-time monitoring data may refer to the method of determining whether the abnormal target exists in the security area by using the real-time monitoring data in the first embodiment, and/or the method of obtaining the second analysis result based on the real-time monitoring data may refer to the method of obtaining the first analysis result based on the real-time monitoring data in the first embodiment.
Alternatively, the object to be protected may comprise an organism to be protected and/or a device to be protected, and the organism to be protected may comprise a person to be protected and/or an animal to be protected.
Optionally, the peripheral range of the abnormal target may be one or more of a circular area with the abnormal target as a circle center and a preset length as a radius, a security sub-area where the abnormal target is currently located, and a security sub-area matched with the predicted movement track information of the abnormal target, and a security sub-area matched with the dispersed space information.
Therefore, when the target to be protected exists in the peripheral range of the abnormal target, the emergency attribute can be adjusted according to the real-time situation of the target to be protected, so that damage to the target to be protected in the process of dispelling the abnormal target can be reduced.
In this optional embodiment, as an optional implementation manner, the second analysis result may include one or more of second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
and updating the attribute of the emergency according to the second analysis result, which can comprise:
according to the second analysis result, determining a risk degree parameter of the target to be protected, wherein the risk degree parameter is used for representing the severity degree of threat generated by the abnormal target to be protected and/or the severity degree of threat generated by the target to be protected when the target dispelling equipment of the security area dissipates the abnormal target;
And updating the attribute of the emergency according to the risk degree parameter.
Alternatively, the method for determining the risk level parameter of the object to be protected according to the second analysis result may refer to a method for determining the risk level parameter of the abnormal object according to the first analysis result.
It can be seen that the implementation of the alternative implementation can adjust the emergency attribute according to the risk degree parameter to be protected, so as to be beneficial to reducing the security threat generated by the abnormal target to be protected and the security threat generated by the abnormal target to be protected due to dispelling the abnormal target.
In order to better understand the first embodiment and the second embodiment of the present invention, the security control flow of the first embodiment and the second embodiment of the present invention is illustrated below based on fig. 3:
as shown in fig. 3, the security area is configured with a dispelling device, a monitoring device and a control host, the monitoring device can collect real-time monitoring data of the security area (such as the sound protection control area shown in fig. 3), the monitoring device can judge whether an abnormal target exists in the security area according to the real-time monitoring data, can send the real-time monitoring data to the control host so as to judge whether the abnormal target exists in the security area by the control host, and can send the real-time monitoring data to a monitoring data checking terminal of a monitoring person so as to judge whether the abnormal target exists in the security area by the monitoring person. When the monitoring equipment or the control host judges that an abnormal target exists in the security area, an alarm control instruction and a dispersion control instruction are sent to the dispersion equipment, and in addition, a monitoring person can send the dispersion control instruction to the dispersion equipment through the monitoring data checking terminal or send the dispersion control instruction to the control host so that the control host can send the dispersion control instruction to the dispersion equipment. When the dispelling control instruction is received, the dispelling equipment can execute corresponding dispelling processing on the abnormal target, so that security control of the security area is realized, and when the alarm control instruction is received, the dispelling equipment can carry out alarm processing on related personnel in the security area. In addition, the security protection area may include a plurality of security protection subareas, security protection grades corresponding to different security protection subareas are different, and as shown in fig. 3, the security protection grade corresponding to the second security protection subarea is higher than the security protection grade corresponding to the first security protection subarea, when an abnormal target invades different security protection subareas, different dispelling devices or dispelling modes are adopted, for example, when the abnormal target invades the first security protection subarea, only the sound wave dispelling device is required to be started, when the abnormal target invades the second security protection subarea, only the light wave dispelling device is required to be started, or when the abnormal target invades the first security protection subarea, only voice warning is required to be carried out, and when the abnormal target invades the second security protection subarea, strong sound dispelling is required to be carried out on the abnormal target.
Example III
Referring to fig. 4, fig. 4 is a schematic structural diagram of another security alarm device based on dispelling equipment according to an embodiment of the present invention. The security alarm device based on the dispelling device described in fig. 4 may be used to implement security control on a security area, and in particular, the security alarm device based on the dispelling device may be integrated in the dispelling device, or may be integrated in a local server or a cloud server that processes security control transactions of the security area, such as a control host or a monitoring device shown in fig. 3, where embodiments of the present invention are not limited. As shown in fig. 4, the security alarm device based on the dispelling device may include:
the acquiring module 301 is configured to acquire real-time monitoring data of a security area acquired by a monitoring device corresponding to the security area;
the judging module 302 is configured to judge whether an abnormal target of abnormal intrusion exists in the security area according to the real-time monitoring data of the security area;
and the control module 303 is configured to control the target dispelling device in the security area to perform alarm processing and/or dispelling processing when the judging module 302 judges that the security area has an abnormal target, where the alarm processing may be used to remind the security area of the abnormal target, and the dispelling processing may be used to drive the abnormal target to leave the security area.
Therefore, when the monitoring device monitors the abnormal targets with abnormal invasion, the device described in the implementation figure 4 can control the corresponding dispelling device to alarm and dispel, so that the situations that peripheral abnormal conditions cannot be found in time and security personnel cannot arrive at the site to process due to the fact that security is too dependent on subjective activity of monitoring personnel are reduced, the reliability of security is improved, and the life safety and property safety of people are guaranteed.
In an alternative embodiment, as shown in fig. 5, the apparatus may further include:
the analysis module 304 is configured to analyze a real-time intrusion condition of an abnormal target based on real-time monitoring data before the control module 303 controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing, so as to obtain a first analysis result;
a determining module 305, configured to determine, according to the first analysis result, an emergency attribute that matches the abnormal target;
the generating module 306 is configured to generate, according to the emergency attribute, an alarm control parameter and/or a dispersion control parameter that are matched with the target dispersing device in the security area;
the specific manner in which the control module 303 controls the target dispelling device of the security area to perform the alarm processing and/or the dispelling processing may include:
Based on the alarm control parameters, the control target dispelling equipment carries out alarm processing on related personnel in the security area so as to remind the security area of abnormal targets; and/or the number of the groups of groups,
based on the dispelling control parameters, the control target dispelling device carries out dispelling processing on the abnormal target so as to drive the abnormal target to leave the security area.
Therefore, the device described in the implementation fig. 5 analyzes the real-time intrusion condition of the abnormal target in real time, and further determines the matched dispelling control parameter and alarm control parameter, so that the dispelling equipment is adaptively controlled according to the real-time intrusion condition of the abnormal target, the flexibility and accuracy of alarm and dispelling are improved, and the success rate of dispelling the abnormal target is improved.
In another alternative embodiment, as shown in fig. 5, the analysis result may include first location information of the abnormal target and/or first attribute information of the abnormal target;
the determining module 305 determines, according to the first analysis result, a specific manner of the emergency attribute matching the abnormal target, which may include:
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
Determining an emergency attribute matched with the abnormal target according to the hazard degree parameter, wherein the emergency attribute can comprise an alarm attribute and/or a dispersing attribute, the dispersing attribute can comprise one or more of dispersing modes matched with the abnormal target, dispersing intensity matched with the abnormal target and dispersing space information matched with the abnormal target, and the dispersing space information comprises one or more of dispersing directions matched with the abnormal target, dispersing tracks matched with the abnormal target and dispersing ranges matched with the abnormal target.
It can be seen that implementing the apparatus described in fig. 5 determines the corresponding emergency attribute by analyzing the hazard degree parameter of the abnormal target, thereby determining the corresponding alarm control parameter and the dispersion control parameter, and improving the matching degree of the alarm control parameter and the dispersion control parameter with the hazard degree of the abnormal target, which is not only beneficial to improving the success rate and the accuracy of the alarm and the dispersion, but also reducing the excessive dispersion of the abnormal target, thereby reducing unnecessary damage to the abnormal target and excessive waste of the dispersion resource, and reducing the damage to the life safety and the property safety of people due to the excessive dispersion strength.
In yet another alternative embodiment, as shown in fig. 5, when the target dissipating device of the security area includes a non-contact dissipating device based on fluctuation, the specific manner of generating, by the generating module 306, the dissipating control parameter that matches the target dissipating device of the security area according to the emergency attribute may include:
determining a target working mode matched with a dispersing mode from at least one fluctuation working mode of the target dispersing equipment as a dispersing control parameter of the target dispersing equipment; and/or the number of the groups of groups,
according to the dispersing intensity and/or the dispersing space information, determining a fluctuation attribute parameter matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment, wherein the fluctuation attribute parameter comprises one or more of fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength; and/or the number of the groups of groups,
according to the dispelling space information, determining a fluctuation propagation direction matched with the target dispelling device as a dispelling control parameter of the target driving device;
wherein the non-contact dispersing device comprises one or more of an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device.
Therefore, the device described in the implementation fig. 5 can determine the working mode, the fluctuation attribute parameter and the dispersing space information of the fluctuation-based non-contact dispersing equipment according to the emergency attribute, so that the accuracy and the reliability of determining the dispersing control parameter are further improved, and the accuracy and the reliability of dispersing the abnormal target are further improved.
In yet another alternative embodiment, as shown in fig. 5, the determining module 302 is further configured to determine, based on the real-time monitoring data, whether the target to be protected exists in the peripheral range of the abnormal target;
the analysis module 304 is further configured to, when the judging module 302 judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result;
the apparatus may further include:
and the updating module 307 is configured to update the emergency attribute according to the second analysis result, and trigger and execute the above operation of generating the alarm control parameter and/or the dissipation control parameter matched with the target dissipation device of the security area according to the emergency attribute.
It can be seen that the device described in fig. 5 can also adjust the emergency attribute according to the real-time situation of the target to be protected when the target to be protected exists in the peripheral range of the abnormal target, so as to be beneficial to reducing the damage to the target to be protected in the process of dispelling the abnormal target.
In yet another alternative embodiment, as shown in fig. 5, the second analysis result may include one or more of second location information of the object to be protected, second number information of the object to be protected, and second attribute information of the object to be protected;
And, the specific way of updating the attribute of the response by the updating module 307 according to the second analysis result may include:
according to the second analysis result, determining a risk degree parameter of the target to be protected, wherein the risk degree parameter can be used for representing the severity degree of threat generated by the abnormal target to be protected and/or the severity degree of threat generated by the target to be protected when the target dispelling equipment of the security area dissipates the abnormal target;
and updating the attribute of the emergency according to the risk degree parameter.
It can be seen that the implementation of the apparatus described in fig. 5 is also capable of adjusting the emergency attribute according to the risk level parameter to be protected, so as to facilitate reducing the security threat generated by the abnormal target to be protected and the security threat generated by the abnormal target to be protected due to dispelling the abnormal target.
In yet another alternative embodiment, as shown in fig. 5, the determining module 302 is further configured to determine, before the control module 303 controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing, whether the abnormal target meets a preset processing condition according to intrusion time information of the abnormal target; when it is determined that the abnormal target meets the preset processing condition, the control module 303 is triggered to execute the operation of controlling the target dispelling device of the security area to perform alarm processing and/or dispelling processing, where the preset processing condition may include a preset alarm condition and/or a preset dispelling condition;
Optionally, the determining module 302 determines, according to intrusion time information of the abnormal target, whether the abnormal target meets a specific manner of the preset processing condition, may include:
judging whether the intrusion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
It can be seen that the device described in fig. 5 can also determine whether to disperse the abnormal target according to the intrusion time or intrusion duration of the abnormal target, so as to reduce unnecessary alarm processing and dispersing processing and reduce the waste of security resources.
Example IV
The embodiment of the invention discloses a security control device, which can comprise a dispelling device, a monitoring device and a control host, as shown in fig. 3, wherein the control host or the monitoring device can be used for executing the steps in the security alarm method based on the dispelling device described in the first embodiment or the second embodiment of the invention.
Example five
Referring to fig. 6, fig. 6 is a schematic structural diagram of a security alarm device based on a dispelling device according to an embodiment of the present invention. As shown in fig. 6, the security alarm device based on the dispelling device may include:
a memory 401 storing executable program codes;
a processor 402 coupled with the memory 401;
the processor 402 invokes executable program codes stored in the memory 401 to execute the steps in the security alarm method based on the dispelling device described in the first embodiment or the second embodiment of the present invention.
Example six
The embodiment of the invention discloses a computer storage medium which stores computer instructions for executing the steps in the security alarm method based on dispelling equipment described in the first embodiment or the second embodiment of the invention when the computer instructions are called.
Example seven
An embodiment of the present invention discloses a computer program product, which includes a non-transitory computer readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform the steps in the security alarm method based on a dispelling device described in the first embodiment or the second embodiment.
The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above detailed description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product that may be stored in a computer-readable storage medium including Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disc Memory, magnetic disc Memory, tape Memory, or any other medium that can be used for computer-readable carrying or storing data.
Finally, it should be noted that: the embodiment of the invention discloses a security alarm device and a security alarm method based on dispelling equipment, which are disclosed by the embodiment of the invention only for illustrating the technical scheme of the invention, but not limiting the technical scheme; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (6)

1. A security alarm device based on dispelling equipment, the device comprising:
the acquisition module is used for acquiring real-time monitoring data of the security area, which are acquired by monitoring equipment corresponding to the security area;
the judging module is used for judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
the control module is used for controlling target dispelling equipment of the security area to perform alarm processing and dispelling processing when the judging module judges that the abnormal target exists in the security area, wherein the alarm processing is used for reminding that the abnormal target exists in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area;
The analysis module is used for analyzing the real-time invasion condition of the abnormal target based on the real-time monitoring data before the control module controls the target dispelling equipment of the security area to perform alarm processing and dispelling processing, so as to obtain a first analysis result, wherein the first analysis result comprises first position information of the abnormal target, first quantity information of the abnormal target and first attribute information of the abnormal target, the first position information comprises first real-time position of the abnormal target, historical movement track information of the abnormal target and predicted movement track information of the abnormal target, the first attribute information of the abnormal target comprises predicted age, predicted sex, dangerous object carrying information, predicted state information and equipment configuration information of the abnormal target if the abnormal target is an abnormal animal, the predicted age, predicted state information and predicted state information of the abnormal target, and the first attribute information of the abnormal target comprises the predicted state information of the abnormal state, the predicted state information and the movement capacity of the abnormal target if the abnormal target is an abnormal device, and the first attribute information of the abnormal target comprises the predicted state information of the abnormal state information and the movement capacity of the abnormal state;
The determining module is used for determining emergency attributes matched with the abnormal targets according to the first analysis result, wherein the emergency attributes comprise alarm attributes and dispersing attributes, the dispersing attributes comprise dispersing modes matched with the abnormal targets, dispersing intensities matched with the abnormal targets and dispersing space information matched with the abnormal targets, and the dispersing space information comprises dispersing directions matched with the abnormal targets, dispersing tracks matched with the abnormal targets and dispersing ranges matched with the abnormal targets;
the judging module is further used for judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
the analysis module is further configured to, when the judgment module judges that the target to be protected exists in the peripheral range, analyze a real-time situation of the target to be protected based on the real-time monitoring data, and obtain a second analysis result, where the second analysis result includes second location information of the target to be protected, second number information of the target to be protected, and second attribute information of the target to be protected;
The updating module is used for updating the emergency attribute according to the second analysis result;
the generation module is used for generating alarm control parameters and dissipation control parameters matched with target dissipation equipment of the security area according to the emergency attribute, wherein the alarm control parameters are used for controlling the alarm processing, and the dissipation control parameters are used for controlling the dissipation processing;
the determining module determines a specific mode of the emergency attribute matched with the abnormal target according to the first analysis result, and the specific mode comprises the following steps:
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
determining emergency attributes matched with the abnormal targets according to the hazard degree parameters;
the specific way for updating the emergency attribute by the updating module according to the second analysis result comprises the following steps:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected generated by the abnormal target and the severity degree of threat to the target to be protected generated by target dispelling equipment in the security area when dispelling the abnormal target;
Updating the emergency attribute according to the risk degree parameter;
the judging module judges whether the security area has a specific mode of an abnormal target of abnormal invasion according to the real-time monitoring data of the security area, and comprises the following steps:
determining a target recognition model matched with the real-time monitoring data from a preset abnormal recognition model set according to the data type of the real-time monitoring data of the security area, wherein the abnormal recognition model set comprises a video abnormal recognition model, an image abnormal recognition model, an infrared abnormal recognition model, a radar abnormal recognition model, a thermal perception abnormal recognition model, a sound abnormal recognition model and a three-dimensional information abnormal recognition model, each abnormal recognition model comprises an abnormal biological recognition algorithm, an abnormal equipment recognition algorithm and an abnormal environment recognition algorithm, and the abnormal biological recognition algorithm comprises an abnormal personnel recognition algorithm and an abnormal animal recognition algorithm;
inputting the real-time monitoring data into the target recognition model so that the target recognition model analyzes the real-time monitoring data to obtain an abnormal target recognition result of the real-time monitoring data, wherein the abnormal target recognition result is used for representing whether an abnormal target with abnormal invasion exists in the security area;
The judging module is further configured to construct three-dimensional model information of the security area according to the real-time monitoring data when the target recognition model includes the three-dimensional information anomaly recognition model, and to input the new real-time monitoring data into the three-dimensional information anomaly recognition model as new real-time monitoring data, so that the three-dimensional information anomaly recognition model analyzes the new real-time monitoring data to obtain an anomaly target recognition result of the new real-time monitoring data;
the analysis module analyzes the real-time invasion condition of the abnormal target based on the real-time monitoring data to obtain a specific mode of a first analysis result, and the specific mode comprises the following steps:
determining a target intrusion analysis model matched with the abnormal target from a preset intrusion analysis model set according to the data type of the real-time monitoring data, wherein the intrusion analysis model set comprises a video intrusion analysis model, an image intrusion analysis model, an infrared intrusion analysis model, a radar intrusion analysis model, a thermal perception intrusion analysis model, a sound intrusion analysis model and a three-dimensional information intrusion analysis model, and each intrusion analysis model comprises a biological intrusion condition analysis algorithm and an equipment intrusion condition analysis algorithm, and the biological intrusion condition analysis algorithm comprises a personnel intrusion condition analysis algorithm and an animal intrusion condition analysis algorithm;
Inputting data to be analyzed into the target intrusion analysis model so that the target intrusion analysis model analyzes the data to be analyzed to obtain a first analysis result, wherein the data to be analyzed at least comprises the real-time monitoring data, and the data to be analyzed also comprises a target type to which the abnormal target belongs and the abnormal target identification result;
the target dispelling device of the security area comprises non-contact dispelling device based on fluctuation, and the generating module generates dispelling control parameters matched with the target dispelling device of the security area according to the emergency attribute, and comprises the following specific modes:
determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device, wherein the fluctuation working mode comprises a warning mode and a fluctuation dispersing mode, the warning mode is used for outputting warning information to prompt the abnormal target to actively leave the security area, and the fluctuation dispersing mode is used for outputting strong fluctuation to cause the abnormal target to generate discomfort and be forced to leave the security area;
According to the dispersing intensity and the dispersing space information, determining fluctuation attribute parameters matched with the target dispersing equipment as dispersing control parameters of the target dispersing equipment, wherein the fluctuation attribute parameters comprise fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength;
according to the dispersing space information, determining a fluctuation propagation direction matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment;
wherein the non-contact dispersing device comprises an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device;
the determining module is further configured to determine, from the target dispelling devices in the security area, a target dispelling device that is matched with the abnormal target according to a target type to which the abnormal target belongs and the abnormal target identification result before the control module controls the target dispelling devices in the security area to perform alarm processing and dispelling processing, if the target type indicates that the abnormal target is an abnormal person and/or an abnormal animal, the target dispelling device that is matched with the abnormal target includes a sound wave dispelling device and/or a light wave dispelling device, and if the target type indicates that the abnormal target is an abnormal device, the target dispelling device that is matched with the abnormal target includes an electromagnetic wave dispelling device.
2. The security alarm device based on the dispelling device according to claim 1, wherein the specific manner of controlling the target dispelling device in the security area to perform alarm processing and/or dispelling processing by the control module includes:
based on the alarm control parameters, controlling the target dispelling equipment to alarm related personnel in the security area so as to remind the security area of the abnormal target; and/or the number of the groups of groups,
and controlling the target dispelling equipment to carry out dispelling processing on the abnormal target based on the dispelling control parameter so as to drive the abnormal target to leave the security area.
3. The security alarm device based on a dispelling device according to claim 1 or 2, wherein the judging module is further configured to judge, according to intrusion time information of the abnormal target, whether the abnormal target meets a preset processing condition before the control module controls the target dispelling device of the security area to perform alarm processing and/or dispelling processing; when the abnormal target meets the preset processing condition, triggering the control module to execute the operation of controlling the target dispelling equipment of the security area to perform alarm processing and/or dispelling processing, wherein the preset processing condition comprises a preset alarm condition and/or a preset dispelling condition;
The judging module judges whether the abnormal target meets a specific mode of a preset processing condition according to the invasion time information of the abnormal target, and comprises the following steps:
judging whether the invasion time of the abnormal target aiming at the security area is within a dispersion triggering time period corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the invasion time information comprises the invasion time; and/or the number of the groups of groups,
judging whether the intrusion duration of the abnormal target aiming at the security area is greater than an intrusion duration threshold corresponding to a preset processing condition, and when the judgment result is yes, determining that the abnormal target meets the preset processing condition, wherein the intrusion time information comprises the intrusion duration.
4. A security alarm method based on dispelling equipment, the method comprising:
acquiring real-time monitoring data of a security area, which are acquired by monitoring equipment corresponding to the security area;
judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area;
when the judgment result is yes, controlling target dispelling equipment of the security area to perform alarm processing and dispelling processing, wherein the alarm processing is used for reminding the existence of the abnormal target in the security area, and the dispelling processing is used for driving the abnormal target to leave the security area;
Before controlling the dispelling equipment corresponding to the security area to alarm and dispel the abnormal target, the method further comprises the following steps:
analyzing the real-time invasion condition of the abnormal target based on the real-time monitoring data to obtain a first analysis result, wherein the first analysis result comprises first position information of the abnormal target, first quantity information of the abnormal target and first attribute information of the abnormal target, the first position information comprises first real-time position of the abnormal target, historical movement track information of the abnormal target and predicted movement track information of the abnormal target, the first attribute information of the abnormal target comprises predicted age, predicted sex, dangerous object carrying information, predicted state information and equipment configuration information of the abnormal target if the abnormal target is an abnormal animal, the first attribute information of the abnormal target comprises animal type, predicted age, predicted sex and predicted state information of the abnormal target, the first attribute information of the abnormal target comprises equipment type, equipment size and predicted state information of the abnormal target if the abnormal target is an abnormal equipment, and the predicted state information is used for representing the mobility of the abnormal target to the mobility state, and the mobility state of the abnormal target comprises abnormal mobility state;
Determining emergency attributes matched with the abnormal target according to the first analysis result, wherein the emergency attributes comprise an alarm attribute and a dispersing attribute, the dispersing attribute comprises a dispersing mode matched with the abnormal target, dispersing intensity matched with the abnormal target and dispersing space information matched with the abnormal target, and the dispersing space information comprises a dispersing direction matched with the abnormal target, a dispersing track matched with the abnormal target and a dispersing range matched with the abnormal target;
judging whether a target to be protected exists in the peripheral range of the abnormal target or not based on the real-time monitoring data;
when the target to be protected exists in the peripheral range, analyzing the real-time situation of the target to be protected based on the real-time monitoring data to obtain a second analysis result, wherein the second analysis result comprises second position information of the target to be protected, second quantity information of the target to be protected and second attribute information of the target to be protected;
updating the emergency attribute according to the second analysis result;
Generating an alarm control parameter and a dispersion control parameter matched with target dispersion equipment of the security area according to the emergency attribute, wherein the alarm control parameter is used for controlling the alarm processing, and the dispersion control parameter is used for controlling the dispersion processing;
determining an emergency attribute matched with the abnormal target according to the first analysis result, wherein the emergency attribute comprises;
determining a hazard degree parameter of the abnormal target according to the first analysis result, wherein the hazard degree parameter is used for representing the severity degree of threat of the abnormal target to the security area;
determining emergency attributes matched with the abnormal targets according to the hazard degree parameters;
the updating the emergency attribute according to the second analysis result includes:
determining a risk degree parameter of the target to be protected according to the second analysis result, wherein the risk degree parameter is used for representing the severity degree of threat to the target to be protected generated by the abnormal target and the severity degree of threat to the target to be protected generated by target dispelling equipment in the security area when dispelling the abnormal target;
Updating the emergency attribute according to the risk degree parameter;
judging whether an abnormal target of abnormal invasion exists in the security area according to the real-time monitoring data of the security area, wherein the method comprises the following steps:
determining a target recognition model matched with the real-time monitoring data from a preset abnormal recognition model set according to the data type of the real-time monitoring data of the security area, wherein the abnormal recognition model set comprises a video abnormal recognition model, an image abnormal recognition model, an infrared abnormal recognition model, a radar abnormal recognition model, a thermal perception abnormal recognition model, a sound abnormal recognition model and a three-dimensional information abnormal recognition model, each abnormal recognition model comprises an abnormal biological recognition algorithm, an abnormal equipment recognition algorithm and an abnormal environment recognition algorithm, and the abnormal biological recognition algorithm comprises an abnormal personnel recognition algorithm and an abnormal animal recognition algorithm;
inputting the real-time monitoring data into the target recognition model so that the target recognition model analyzes the real-time monitoring data to obtain an abnormal target recognition result of the real-time monitoring data, wherein the abnormal target recognition result is used for representing whether an abnormal target with abnormal invasion exists in the security area;
The method further comprises the steps of:
when the target recognition model comprises the three-dimensional information anomaly recognition model, constructing three-dimensional model information of the security area according to the real-time monitoring data to serve as new real-time monitoring data, and inputting the new real-time monitoring data into the three-dimensional information anomaly recognition model to enable the three-dimensional information anomaly recognition model to analyze the new real-time monitoring data so as to obtain an anomaly target recognition result of the new real-time monitoring data;
the real-time intrusion condition of the abnormal target is analyzed based on the real-time monitoring data to obtain a first analysis result, which comprises the following steps:
determining a target intrusion analysis model matched with the abnormal target from a preset intrusion analysis model set according to the data type of the real-time monitoring data, wherein the intrusion analysis model set comprises a video intrusion analysis model, an image intrusion analysis model, an infrared intrusion analysis model, a radar intrusion analysis model, a thermal perception intrusion analysis model, a sound intrusion analysis model and a three-dimensional information intrusion analysis model, and each intrusion analysis model comprises a biological intrusion condition analysis algorithm and an equipment intrusion condition analysis algorithm, and the biological intrusion condition analysis algorithm comprises a personnel intrusion condition analysis algorithm and an animal intrusion condition analysis algorithm;
Inputting data to be analyzed into the target intrusion analysis model so that the target intrusion analysis model analyzes the data to be analyzed to obtain a first analysis result, wherein the data to be analyzed at least comprises the real-time monitoring data, and the data to be analyzed also comprises a target type to which the abnormal target belongs and the abnormal target identification result;
when the target dispelling device of the security area comprises a non-contact dispelling device based on fluctuation, generating dispelling control parameters matched with the target dispelling device of the security area according to the emergency attribute, including:
determining a target working mode matched with the dispersing mode from at least one fluctuation working mode of the target dispersing device, wherein the fluctuation working mode comprises a warning mode and a fluctuation dispersing mode, the warning mode is used for outputting warning information to prompt the abnormal target to actively leave the security area, and the fluctuation dispersing mode is used for outputting strong fluctuation to cause the abnormal target to generate discomfort and be forced to leave the security area;
according to the dispersing intensity and the dispersing space information, determining fluctuation attribute parameters matched with the target dispersing equipment as dispersing control parameters of the target dispersing equipment, wherein the fluctuation attribute parameters comprise fluctuation intensity, fluctuation bundling degree, fluctuation frequency and fluctuation wavelength;
According to the dispersing space information, determining a fluctuation propagation direction matched with the target dispersing equipment as a dispersing control parameter of the target dispersing equipment;
wherein the non-contact dispersing device comprises an acoustic wave dispersing device, an optical wave dispersing device and an electromagnetic wave dispersing device;
before the target dispelling device controlling the security area performs alarm processing and dispelling processing, the method further comprises:
and determining target dispelling equipment matched with the abnormal target from dispelling equipment in the security area according to the target type of the abnormal target and the abnormal target identification result, wherein if the target type indicates that the abnormal target is an abnormal person and/or an abnormal animal, the target dispelling equipment matched with the abnormal target comprises sound wave dispelling equipment and/or light wave dispelling equipment, and if the target type indicates that the abnormal target is an abnormal equipment, the target dispelling equipment matched with the abnormal target comprises electromagnetic wave dispelling equipment.
5. A security alarm device based on dispelling equipment, the device comprising:
a memory storing executable program code;
a processor coupled to the memory;
The processor invokes the executable program code stored in the memory to perform the security alarm method based on the dispelling device of claim 4.
6. A computer storage medium storing computer instructions which, when invoked, are operable to perform the dispelling device based security alarm method of claim 4.
CN202310711609.9A 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment Active CN116453284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310711609.9A CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310711609.9A CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Publications (2)

Publication Number Publication Date
CN116453284A CN116453284A (en) 2023-07-18
CN116453284B true CN116453284B (en) 2023-09-26

Family

ID=87124093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310711609.9A Active CN116453284B (en) 2023-06-15 2023-06-15 Security alarm device and method based on dispelling equipment

Country Status (1)

Country Link
CN (1) CN116453284B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117407573B (en) * 2023-11-13 2024-04-12 广州智业节能科技有限公司 Visual security data processing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424371B1 (en) * 1997-09-24 2002-07-23 Sheree H. Wen Intelligent video monitor system
CN202373096U (en) * 2011-12-12 2012-08-08 杭州市电力局 Invasion alarm system for electrical facilities
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN109493553A (en) * 2018-11-08 2019-03-19 华南理工大学 A kind of strong sound system of intelligent positioning based on image recognition
CN111272021A (en) * 2019-08-28 2020-06-12 建投物联(江西)股份有限公司 Intelligent reversible sound wave expelling system
CN210895724U (en) * 2020-01-21 2020-06-30 西安科技大学 Voice warning system based on wireless cluster technology
CN112150747A (en) * 2020-09-04 2020-12-29 广州市声讯电子科技股份有限公司 Novel protection early warning system
CN114973573A (en) * 2022-06-14 2022-08-30 浙江大华技术股份有限公司 Target intrusion determination method and device, storage medium and electronic device
CN115100808A (en) * 2022-06-29 2022-09-23 广州市声讯电子科技股份有限公司 Acousto-optic intelligent dispersing system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424371B1 (en) * 1997-09-24 2002-07-23 Sheree H. Wen Intelligent video monitor system
CN202373096U (en) * 2011-12-12 2012-08-08 杭州市电力局 Invasion alarm system for electrical facilities
CN206212165U (en) * 2015-11-02 2017-05-31 克拉玛依市格恩赛电子科技有限公司 A kind of over-the-horizon radar wide area joint defense system
CN109493553A (en) * 2018-11-08 2019-03-19 华南理工大学 A kind of strong sound system of intelligent positioning based on image recognition
CN111272021A (en) * 2019-08-28 2020-06-12 建投物联(江西)股份有限公司 Intelligent reversible sound wave expelling system
CN210895724U (en) * 2020-01-21 2020-06-30 西安科技大学 Voice warning system based on wireless cluster technology
CN112150747A (en) * 2020-09-04 2020-12-29 广州市声讯电子科技股份有限公司 Novel protection early warning system
CN114973573A (en) * 2022-06-14 2022-08-30 浙江大华技术股份有限公司 Target intrusion determination method and device, storage medium and electronic device
CN115100808A (en) * 2022-06-29 2022-09-23 广州市声讯电子科技股份有限公司 Acousto-optic intelligent dispersing system

Also Published As

Publication number Publication date
CN116453284A (en) 2023-07-18

Similar Documents

Publication Publication Date Title
CN107911653B (en) Intelligent video monitoring module, system, method and storage medium for residence
CN116453284B (en) Security alarm device and method based on dispelling equipment
US20100231714A1 (en) Video pattern recognition for automating emergency service incident awareness and response
CN107645652A (en) A kind of illegal geofence system based on video monitoring
CN110544360B (en) Train safe driving monitoring system and method
CN109618287B (en) Prisoner management method and device based on UWB positioning
CN107818312A (en) A kind of embedded system based on abnormal behaviour identification
CN105516659B (en) A kind of intelligent safety and defence system and method based on face's Emotion identification
CN111564224A (en) Intelligent monitoring system with health monitoring function and implementation method thereof
CN112737121A (en) Intelligent video monitoring, analyzing, controlling and managing system for power grid
CN110675586A (en) Airport enclosure intrusion monitoring method based on video analysis and deep learning
CN102708643A (en) Invasion detection method and system
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
CN110718041B (en) Method, device and system for preventing children from getting lost and storage medium
CN104658188A (en) Channel security early-warning system and channel early-warning method
CN110634506A (en) Voice data processing method and device
CN111165466A (en) Method, device and system for repelling insects
CN111127798A (en) Warning method and device, display board equipment and computer readable storage medium
US20140206293A1 (en) Blind spot determination
CN111696292A (en) Artificial intelligence early warning system
CN212933554U (en) Workshop management and control system
CN114511978B (en) Intrusion early warning method, device, vehicle and computer readable storage medium
CN116740874A (en) Intrusion detection method and related device
CN117456471B (en) Perimeter security method, perimeter security system, terminal equipment and storage medium
CN113111332A (en) Artificial intelligence real-time detection security attack system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant