CN116486548A - Perimeter intrusion monitoring method, electronic equipment and computer readable medium - Google Patents

Perimeter intrusion monitoring method, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN116486548A
CN116486548A CN202310457864.5A CN202310457864A CN116486548A CN 116486548 A CN116486548 A CN 116486548A CN 202310457864 A CN202310457864 A CN 202310457864A CN 116486548 A CN116486548 A CN 116486548A
Authority
CN
China
Prior art keywords
information
target
monitoring method
potential target
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310457864.5A
Other languages
Chinese (zh)
Inventor
罗静
唐均德
张峻华
周家梁
冯平
费冬
周涛
王鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CRSC Communication and Information Group Co Ltd CRSCIC
Original Assignee
CRSC Communication and Information Group Co Ltd CRSCIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CRSC Communication and Information Group Co Ltd CRSCIC filed Critical CRSC Communication and Information Group Co Ltd CRSCIC
Priority to CN202310457864.5A priority Critical patent/CN116486548A/en
Publication of CN116486548A publication Critical patent/CN116486548A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/886Radar or analogous systems specially adapted for specific applications for alarm systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/86Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
    • G01S13/867Combination of radar systems with cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Electromagnetism (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The present disclosure provides a perimeter intrusion monitoring method, comprising: determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions; determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition; the first potential target, which is the same object as the second potential target, is determined to be an intrusion target. In the perimeter intrusion monitoring method provided by the disclosure, potential targets in the target area are determined according to radar information and video information, so that the problem that single monitoring equipment is easily interfered by environmental factors is effectively avoided, and the false alarm rate are reduced. The present disclosure also provides an electronic device and a computer-readable medium.

Description

Perimeter intrusion monitoring method, electronic equipment and computer readable medium
Technical Field
The present disclosure relates to the field of rail transit perimeter monitoring, and in particular, to a perimeter intrusion monitoring method, electronic device, and computer readable medium.
Background
At present, a mode of combining vibration optical fibers with cameras is mostly adopted as a monitoring means for perimeter intrusion monitoring along the track traffic, but the problems of missing report and false report are easy to occur in the current perimeter intrusion monitoring method because the environment where monitoring equipment is located is generally complex.
Disclosure of Invention
The main objective of the embodiments of the present disclosure is to provide a perimeter intrusion monitoring method, an electronic device and a computer readable medium, so as to solve the problems of missing report and false report that easily occur in the prior art.
To achieve the above object, in a first aspect, an embodiment of the present disclosure provides a perimeter intrusion monitoring method, including:
determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
the first potential target, which is the same object as the second potential target, is determined to be an intrusion target.
Optionally, the motion characteristic satisfying a predetermined condition includes at least one of:
the speed of entering the target area exceeds a first predetermined speed;
the speed of departure from the target zone exceeds the first predetermined speed;
the speed of movement while staying within the target area is lower than a second predetermined speed.
Optionally, the determining the second potential target using the video information includes:
carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
and determining the object meeting the clustering result as the second potential target.
Optionally, the perimeter intrusion monitoring method further comprises, after the determining the first potential target from radar information of the target area:
obtaining vibration information of the optical fiber in the target area;
wherein the step of determining the second potential target using the video information is performed in case the vibration information satisfies a predetermined condition.
Optionally, the vibration information meeting a predetermined condition includes: the signal strength of the vibration information exceeds a predetermined signal strength.
Optionally, the perimeter intrusion monitoring method further comprises:
determining an information acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
Optionally, the environmental information includes illumination intensity, and determining the information acquisition period according to the environmental information of the target area includes:
counting the times that the illumination intensity meets the preset condition;
and determining an information acquisition period corresponding to the number of times that the environment information meets the preset condition according to preset information.
Optionally, the light intensity satisfying the predetermined condition includes: the illumination intensity exceeds a first predetermined illumination intensity; the illumination intensity is lower than a second predetermined illumination intensity.
In a second aspect, embodiments of the present disclosure provide an electronic device, including:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method according to any of the first aspects;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
In a third aspect, embodiments of the present disclosure provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to any of the first aspects.
In the perimeter intrusion monitoring method provided by the disclosure, potential targets in the target area are determined according to the radar information and the video information successively. The perimeter intrusion is monitored by using various monitoring devices, and the video information is utilized to carry out secondary recheck on the monitoring, so that the problem that single monitoring device is easily interfered by environmental factors is effectively avoided, and the false alarm rate are reduced.
In addition, when the environment information in the target area is in short jump due to natural factors, the environment information can be misjudged as the characteristic information of the potential target, and the corresponding information acquisition interval is determined through different environment information of different target areas, so that the perimeter intrusion monitoring can be better adapted to the short jump of the environment information, the false alarm rate is further reduced, and the processing efficiency of the perimeter intrusion monitoring is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure.
Fig. 1 is a flowchart of a perimeter intrusion monitoring method provided in an embodiment of the present disclosure;
FIG. 2 is a flowchart of a portion of steps in a perimeter intrusion monitoring method provided by an embodiment of the present disclosure;
FIG. 3 is a flowchart of some steps in a perimeter intrusion monitoring method according to an embodiment of the present disclosure;
FIG. 4 is a flowchart of some steps in a perimeter intrusion monitoring method according to an embodiment of the present disclosure;
FIG. 5 is a flow chart of a perimeter intrusion monitoring method provided by an embodiment of the present disclosure;
fig. 6 is a flowchart of an electronic device provided in an embodiment of the disclosure.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
As used in this disclosure, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
When the terms "comprises," "comprising," and/or "including" are used in this disclosure, they specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Embodiments of the present disclosure may be described with reference to plan and/or cross-sectional views with the aid of idealized schematic diagrams of the present disclosure. Accordingly, the example illustrations may be modified in accordance with manufacturing techniques and/or tolerances.
Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The inventor of the present disclosure repeatedly researches and discovers that in the perimeter monitoring method in the related technology, false alarm and missing report often occur to the intrusion of the target, and the reason is that:
in the existing perimeter intrusion monitoring system, the monitoring system usually performs one review on the monitoring data acquired by the radar, the vibration optical fiber and the like, and the monitoring data is always acquired in real time and acts on monitoring analysis. Specifically, in the current perimeter intrusion alarm system, when a monitoring system is used for finding possible intrusion behaviors and generating an alarm, environmental interference factors of various moment changes and irregular changes often exist to influence the accuracy of the alarm, and at the moment, a plurality of environmental information acquired by equipment is generally used for eliminating possible error conditions. However, a small number of error conditions still exist in the intrusion behavior excluded by the environmental information, and the existing alarm system generally directly adopts the intrusion alarm passing one round of recheck and performs corresponding alarm behavior. In addition, in actual perimeter intrusion monitoring, the monitoring data of the radar, the vibrating optical fiber and the like do not always need to be responded in real time for rechecking, so that false alarm and false alarm can be effectively reduced by acquiring the corresponding monitoring data for rechecking according to the information sampling interval.
As a first aspect of the present disclosure, an embodiment of the present disclosure provides a perimeter intrusion monitoring method, as shown in fig. 1, including:
step S110, determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
step S130, determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
step S150, determining the first potential target which is the same object as the second potential target as an intrusion target.
It is noted that the perimeter intrusion monitoring method provided by the present disclosure is performed by an electronic device.
For application scenes such as rail traffic, highway traffic and the like, a general moving object near the perimeter and an intrusion object have obvious distinguishing motion characteristics. In particular, for rail traffic, the speed of travel of pedestrians at a platform is typically near constant, while intrusion targets are typically not meeting the above-described movement characteristics.
Therefore, in the present disclosure, the motion characteristics of the corresponding moving object are determined according to the radar information and the video information of the target area, and the intrusion target is determined according to the motion characteristics.
In the present disclosure, potential targets are determined by at least radar information, video information of a target area, respectively. Wherein the first potential target is determined by radar information, optionally the motion characteristics of the first potential target should satisfy at least one of the predetermined conditions: the speed of entering the target area exceeds a first predetermined speed; the speed of departure from the target zone exceeds the first predetermined speed; the speed of movement while staying within the target area is lower than a second predetermined speed.
In the present disclosure, when it is determined that the motion characteristics of a moving object do not satisfy a predetermined condition by any one of radar information and video information, it is directly determined that the moving object is not an intrusion target, without performing subsequent review. For example: when the potential target is determined by utilizing radar information, if the motion characteristics of the moving object meet the condition that the speed entering the target area does not exceed a first preset speed, judging that the moving object is not the first potential target, and directly judging that the moving object is not an intrusion target.
In an exemplary embodiment, the radar may be a 24G frequency domain radar sensor, and the detected positioning error of the radar may be below 10 meters. Alternatively, the radar information of the radar may include a return time, which is a time from when the radar wave is emitted to when the radar receives the reflected wave, and phase information.
In the present disclosure, there is no particular limitation on how to determine the motion characteristics of the first potential target, and optionally, the method for determining the motion characteristics of the first potential target may include: determining the displacement variation of a first object according to radar information, wherein the first potential target is the first object with the motion characteristics meeting preset conditions; obtaining a time variation corresponding to the displacement variation; and determining the movement speed of the first object according to the displacement variation and the time variation.
In the present disclosure, there is no particular limitation on how to determine the displacement variation amount of the first object from the radar information. Optionally, the distance difference between the first object and the sensor origin of the radar is calculated. In this case, the approach speed is a ratio of a distance difference/displacement variation to a time variation, and the position of the moving target and the positional relationship between the moving target and the warning area can be obtained in the radar coordinate system of the radar. For example: when the radar is a 180-degree sector rotation type radar, and the radar monitors a first object for the first time, the first object is located at a position which is 150 meters away from a sensor origin of the radar and is 30 degrees in phase angle, after 120 seconds, the first object is located at a position which is 150 meters away from the sensor origin of the radar and is 150 degrees in phase angle, the displacement variation is 240 meters, and the moving speed of the first object is 2m/s.
In the present disclosure, there is no particular limitation on how to locate the first object based on the radar information. Optionally, the position of the first object in the target area is determined by combining the relative position of the first object in the radar with the radar information of the radar and the installation position of the radar in the target area. For example: when the radar is a 180-degree sector rotary radar, the installation position of the radar has a corresponding relation with a kilometer sign of a track in the target area, and the radar is used for monitoring the outer periphery of the track, and when the kilometer sign is 1 km, then when the first object is positioned 150 m away from the origin of a sensor of the radar and at a position with a phase angle of 30 degrees, the first object is positioned at 120m on the right side of the radar, namely, the first object is positioned at the track at 1120 m.
In the present disclosure, there is no particular limitation on how to perform step S110, and as described above, the method for perimeter intrusion monitoring, according to the first potential target, which is determined according to radar information of the target, as shown in fig. 2, further includes:
step S101, determining an acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
The information acquisition interval is set for the purpose of further reducing false positives. In an actual monitoring environment, the environmental information in the target area may have short hops caused by natural factors, and these hops may be misjudged as characteristic information of the potential target. At this time, determining the information acquisition time by acquiring the necessary environmental information of the target area enables the monitoring system to better accommodate short hops of these environmental information.
Optionally, the corresponding information acquisition period is obtained by counting the times that the illumination intensity meets the preset condition and through the preset corresponding relation between the counted times and the information acquisition period, wherein the time length of the information acquisition period is longer as the counted times are higher. The predetermined condition that the illumination intensity satisfies may include: the illumination intensity exceeds a first predetermined illumination intensity; the illumination intensity is lower than a second predetermined illumination intensity.
The information acquisition interval is also provided for improving the operating pressure of the processing unit of the monitoring system. When radar information is acquired through the radar and video information is acquired through the camera, the processing capability requirement of processing the radar and the video information in real time for rechecking the processing unit of the corresponding monitoring system is considered. In general, the application scenario of the perimeter intrusion monitoring method does not require the device to feed back and review the corresponding information based on the limited capability of the device to acquire the corresponding information. Therefore, when the corresponding information of the target area is acquired, radar information, video information and the like are acquired according to the information acquisition interval, and the processing efficiency of the processing unit of the corresponding monitoring system is effectively improved.
In the present disclosure, the information obtained according to the information acquisition interval is not particularly required. Optionally, the method comprises the step of. The acquiring the necessary information in the target area according to the information acquisition interval may include: radar information, vibration signals of the vibration optical fiber, video signals of the camera, and interactive signaling between the monitoring system and the alarm system of the target area is acquired according to the information acquisition interval when the monitoring system formed by the radar, the vibration optical fiber, the camera and the like and the alarm system formed by the alarm equipment are respectively controlled by different main control equipment.
In the present disclosure, a mapping relationship between how to determine the environmental information of the target area and the information collection interval is not particularly limited, and optionally, the environmental information may include an illumination duration of the target area, where the transient jump may be from a mutation of illumination intensity, and a cause thereof may be cloud and fog shielding. A camera that collects video information may capture shadows caused by such changes in light intensity and determine it as a second potential target. Therefore, the sunshine duration of different areas is collected in advance, and different information collection intervals are set according to the collected sunshine duration, so that the collection of the error information can be effectively improved.
In the present disclosure, there is no particular limitation on how to perform step S110, and the perimeter intrusion monitoring method further includes, after determining the first potential target according to the radar information of the target area, as shown in fig. 3, including:
step S121, obtaining vibration information of the optical fiber in the target area, wherein,
in the case where the vibration information satisfies a predetermined condition, the step of determining a second potential target using video information (i.e., step S130) is performed.
The laser emits laser into the optical cable part of the vibrating optical fiber, when the optical cable is subjected to external vibration, part of laser with on-site vibration information returns along the optical cable, enters the photoelectric conversion structure and is converted into an electric signal, and whether the next operation needs to be executed is judged by analyzing the spectrum surface of the electric signal.
In an exemplary embodiment, the vibration optical fiber is a positioning vibration optical fiber, and the vibration optical fiber records the time t from the laser to the return, and the propagation speed of the laser in the light is known as the light speed c, so that the vibration position of the external vibration is s=c×t/2.
In an exemplary embodiment, the vibrating optical fiber is a direct buried optical fiber cable, and the exterior is provided with armor and laid underground. Specifically, the vibration optical fiber is protected by armor, so that the vibration optical fiber can better support long-distance laying, and the optical fiber protected by armor can better resist performance damage caused by mechanical damage and better resist soil corrosion. Optionally, the vibrating fiber is protected by armor made of steel wire.
In the present disclosure, there is no particular limitation on how S121 is performed, and optionally, the vibration information satisfying the predetermined condition includes: the change rate of the signal intensity of the vibration information at a certain moment exceeds a preset threshold value. In an optional implementation manner, the step of determining the second potential target by using the video information may be performed by continuously receiving the electrical signal returned by the optical cable of the vibrating optical fiber, and when the signal intensity of the electrical signal at a certain moment generates a jump, and when the signal intensity of the electrical signal after the jump is greater than a preset threshold, judging that the vibration information meets a condition.
In the present disclosure, there is no particular limitation on how to perform step S130, where the determining the second potential target using the video information, as shown in fig. 4, includes:
step S131, carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
step S132, determining the object meeting the clustering result as the second potential target;
the moving objects within the target area have a variety of characteristic information, and as described above, there are distinct motion characteristics between a general moving object and an intruding object near the perimeter. In particular, for rail traffic, the speed of travel of pedestrians at a platform is typically near constant, while intrusion targets are typically not meeting the above-described movement characteristics. Therefore, the potential targets are rechecked secondarily through the video information, and the method is mainly aimed at extracting and analyzing the motion characteristics of the moving objects in the video, and when the motion characteristics of the moving objects meet the preset conditions, the invasion targets can be distinguished in the moving objects.
In the present disclosure, there is no particular limitation on how to perform speed feature clustering on the moving objects in the video, and optionally, implementation of the feature clustering adopts a clustering algorithm, where the clustering algorithm may include: at least one of a K-means clustering algorithm, a K-means++ clustering algorithm and a bi-means clustering algorithm.
The K-means clustering algorithm is a common clustering algorithm, and the basic operation thought is that a plurality of clustering centers are designated in advance, and repeated iteration is carried out until the clustering center of each cluster is closer to the data point of the same type and the distances between the data points of different types are farther. On this basis, a predetermined range can be given, which gives a range based on the cluster center, and data points within the predetermined range are regarded as features of the same category as the cluster center, and data points outside the predetermined range are regarded as features different from the category of the cluster center.
In an alternative embodiment, the clustering center may be a preset motion feature that meets the second potential target, and then the motion feature within the preset range is the second potential target.
In the present disclosure, an object whose motion characteristic satisfies a predetermined condition is determined as the second potential target, and optionally, the predetermined condition may include: the speed of entering the target area exceeds a first predetermined speed; the speed of departure from the target zone exceeds the first predetermined speed; the speed of movement while staying within the target area is lower than a second predetermined speed. And after the object meets the motion characteristics, the monitoring system judges that the behavior of the object is suspicious, and determines the object as the second potential target.
In order to more intuitively present a specific implementation procedure of the perimeter intrusion monitoring method according to the embodiments of the present disclosure, an embodiment is described below, and the illustrated embodiment is not intended to limit the protection scope of the embodiments of the first aspect of the present application.
Examples
This embodiment describes a perimeter intrusion monitoring method acting between radar, vibrating fiber optic, cameras. In this embodiment, a flow of monitoring an object to be intruded by the device is described as an example, as shown in fig. 5, the method includes:
step 501, obtaining radar information of a moving object obtained by monitoring a radar in a target area;
step 502, judging whether the speed of the moving object entering the target area exceeds a first preset speed; if not, go to step 503; if yes, go to step 504;
step 503, judging that the moving object is not an intrusion target;
step 504, determining the moving object as a first potential target;
step 505, obtaining a vibration signal of the vibration fiber in the target area
Step 506, judging whether the signal intensity change rate of the vibration signal exceeds a preset threshold value; if not, go to step 507; if yes, go to step 508;
step 507, judging that the moving object is not an intrusion target;
step 508, obtaining video information of the camera in the target area;
step 509, performing speed feature clustering on the moving objects in the video information to obtain a clustering result;
step 510, determining whether the distance between the speed characteristic clustering result of the moving object and the clustering center meets a preset threshold value; if not, go to step 511; if yes, go to step 512;
step 511, judging that the moving object is not an intrusion target;
step 512, determining the moving object as a second potential target;
in step 513, the first potential target that is the same object as the second potential target is determined to be an intrusion object.
Referring to fig. 6, an embodiment of the present disclosure provides an electronic device including:
one or more processors 601;
a memory 602 having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the perimeter intrusion monitoring method of any of the above;
one or more I/O interfaces 603, coupled between the processor and the memory, are configured to enable information interaction of the processor with the memory.
Wherein the processor 601 is a device having data processing capabilities including, but not limited to, a Central Processing Unit (CPU) or the like; memory 602 is a device with data storage capability including, but not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically charged erasable programmable read-only memory (EEPROM), FLASH memory (FLASH); an I/O interface (read/write interface) 603 is connected between the processor 601 and the memory 602, and enables information interaction between the processor 601 and the memory 602, including but not limited to a data Bus (Bus) or the like.
In some embodiments, processor 601, memory 602, and I/O interface 603 are interconnected by a bus to further connect with other components of a computing device.
The present embodiment also provides a computer readable medium, on which a computer program is stored, where the program when executed by a processor implements the perimeter intrusion monitoring method provided in the present embodiment, and in order to avoid repetitive description, specific steps of the corresponding perimeter intrusion monitoring method are not described herein.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods of the invention described above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the embodiments and form different embodiments.
It is to be understood that the above embodiments are merely exemplary embodiments employed to illustrate the principles of the present disclosure, however, the present disclosure is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the disclosure, and are also considered to be within the scope of the disclosure.

Claims (10)

1. A perimeter intrusion monitoring method comprises
Determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
the first potential target, which is the same object as the second potential target, is determined to be an intrusion target.
2. The perimeter intrusion monitoring method of claim 1, wherein the motion characteristics meeting a predetermined condition comprises at least one of:
the speed of entering the target area exceeds a first predetermined speed;
the speed of departure from the target zone exceeds the first predetermined speed;
the speed of movement while staying within the target area is lower than a second predetermined speed.
3. The perimeter intrusion monitoring method of claim 1, wherein the determining a second potential target using video information comprises:
carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
and determining the object meeting the clustering result as the second potential target.
4. The perimeter intrusion monitoring method of claim 1, further comprising, after the determining the first potential target from radar information of the target area:
obtaining vibration information of the optical fiber in the target area;
wherein the step of determining the second potential target using the video information is performed in case the vibration information satisfies a predetermined condition.
5. The perimeter intrusion monitoring method of claim 4, wherein the vibration information meeting a predetermined condition comprises: the signal strength of the vibration information exceeds a predetermined signal strength.
6. The perimeter intrusion monitoring method of claim 1, wherein the perimeter intrusion monitoring method further comprises:
determining an information acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
7. The perimeter intrusion monitoring method of claim 6, wherein the environmental information includes illumination intensity, the determining an information acquisition period from the environmental information of the target area includes:
counting the times that the illumination intensity meets a preset condition;
and determining an information acquisition period corresponding to the number of times that the environment information meets the preset condition according to preset information.
8. The perimeter intrusion monitoring method of claim 7, wherein the illumination intensity satisfying a predetermined condition comprises:
the illumination intensity exceeds a first predetermined illumination intensity;
the illumination intensity is lower than a second predetermined illumination intensity.
9. An electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-8;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
10. A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method according to any of claims 1-8.
CN202310457864.5A 2023-04-25 2023-04-25 Perimeter intrusion monitoring method, electronic equipment and computer readable medium Pending CN116486548A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310457864.5A CN116486548A (en) 2023-04-25 2023-04-25 Perimeter intrusion monitoring method, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310457864.5A CN116486548A (en) 2023-04-25 2023-04-25 Perimeter intrusion monitoring method, electronic equipment and computer readable medium

Publications (1)

Publication Number Publication Date
CN116486548A true CN116486548A (en) 2023-07-25

Family

ID=87217447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310457864.5A Pending CN116486548A (en) 2023-04-25 2023-04-25 Perimeter intrusion monitoring method, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN116486548A (en)

Similar Documents

Publication Publication Date Title
US20230154329A1 (en) Vehicular information systems and methods
US9075143B2 (en) Sparse array RF imaging for surveillance applications
JP5821419B2 (en) Moving object detection apparatus, moving object detection method, and computer program for moving object detection
JP6673030B2 (en) Information processing apparatus, information processing method, and program
CN111856507B (en) Environment sensing implementation method, intelligent mobile device and storage medium
CN110443275B (en) Method, apparatus and storage medium for removing noise
CN114202783A (en) Target tracking method based on millimeter wave radar
US11879992B2 (en) Method for identifying static radar targets using a radar sensor for motor vehicles
CN111951582A (en) Road traffic data determination method, system and equipment
CN116547562A (en) Point cloud noise filtering method, system and movable platform
CN113625232B (en) Method, device, medium and equipment for restraining multipath false target in radar detection
AU2020428822A1 (en) Method, apparatus, server, and computer program for collision accident prevention
Haghighat et al. A computer vision‐based deep learning model to detect wrong‐way driving using pan–tilt–zoom traffic cameras
US20210398425A1 (en) Vehicular information systems and methods
US8483478B1 (en) Grammar-based, cueing method of object recognition, and a system for performing same
CN116486548A (en) Perimeter intrusion monitoring method, electronic equipment and computer readable medium
CN117677862A (en) Pseudo image point identification method, terminal equipment and computer readable storage medium
CN112466114A (en) Traffic monitoring system and method based on millimeter wave technology
US20230408686A1 (en) Method and apparatus for detecting static object by means of radar sensor of roadside unit
CN111751796B (en) Traffic radar angle measurement method, system and device based on one-dimensional linear array
US11984030B2 (en) Vehicular information systems and methods
CN117630845A (en) Target detection method, target detection device, data processing device, radar and storage medium
CN116246398A (en) Method, processor, system and storage medium for identifying an intrusion object
CN115147783A (en) Vehicle counting method and device, electronic equipment and storage medium
Gao et al. High-accurate vehicle trajectory extraction and denoising from roadside LIDAR sensors

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination