CN116486548A - Perimeter intrusion monitoring method, electronic equipment and computer readable medium - Google Patents
Perimeter intrusion monitoring method, electronic equipment and computer readable medium Download PDFInfo
- Publication number
- CN116486548A CN116486548A CN202310457864.5A CN202310457864A CN116486548A CN 116486548 A CN116486548 A CN 116486548A CN 202310457864 A CN202310457864 A CN 202310457864A CN 116486548 A CN116486548 A CN 116486548A
- Authority
- CN
- China
- Prior art keywords
- information
- target
- monitoring method
- potential target
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 64
- 238000000034 method Methods 0.000 title claims abstract description 54
- 230000033001 locomotion Effects 0.000 claims abstract description 33
- 230000007613 environmental effect Effects 0.000 claims abstract description 17
- 238000005286 illumination Methods 0.000 claims description 21
- 239000013307 optical fiber Substances 0.000 claims description 18
- 230000003993 interaction Effects 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 description 10
- 238000006073 displacement reaction Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 235000008694 Humulus lupulus Nutrition 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000003064 k means clustering Methods 0.000 description 2
- 238000012806 monitoring device Methods 0.000 description 2
- 229910000831 Steel Inorganic materials 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007797 corrosion Effects 0.000 description 1
- 238000005260 corrosion Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/88—Radar or analogous systems specially adapted for specific applications
- G01S13/886—Radar or analogous systems specially adapted for specific applications for alarm systems
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/86—Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
- G01S13/867—Combination of radar systems with cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19608—Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
Landscapes
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The present disclosure provides a perimeter intrusion monitoring method, comprising: determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions; determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition; the first potential target, which is the same object as the second potential target, is determined to be an intrusion target. In the perimeter intrusion monitoring method provided by the disclosure, potential targets in the target area are determined according to radar information and video information, so that the problem that single monitoring equipment is easily interfered by environmental factors is effectively avoided, and the false alarm rate are reduced. The present disclosure also provides an electronic device and a computer-readable medium.
Description
Technical Field
The present disclosure relates to the field of rail transit perimeter monitoring, and in particular, to a perimeter intrusion monitoring method, electronic device, and computer readable medium.
Background
At present, a mode of combining vibration optical fibers with cameras is mostly adopted as a monitoring means for perimeter intrusion monitoring along the track traffic, but the problems of missing report and false report are easy to occur in the current perimeter intrusion monitoring method because the environment where monitoring equipment is located is generally complex.
Disclosure of Invention
The main objective of the embodiments of the present disclosure is to provide a perimeter intrusion monitoring method, an electronic device and a computer readable medium, so as to solve the problems of missing report and false report that easily occur in the prior art.
To achieve the above object, in a first aspect, an embodiment of the present disclosure provides a perimeter intrusion monitoring method, including:
determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
the first potential target, which is the same object as the second potential target, is determined to be an intrusion target.
Optionally, the motion characteristic satisfying a predetermined condition includes at least one of:
the speed of entering the target area exceeds a first predetermined speed;
the speed of departure from the target zone exceeds the first predetermined speed;
the speed of movement while staying within the target area is lower than a second predetermined speed.
Optionally, the determining the second potential target using the video information includes:
carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
and determining the object meeting the clustering result as the second potential target.
Optionally, the perimeter intrusion monitoring method further comprises, after the determining the first potential target from radar information of the target area:
obtaining vibration information of the optical fiber in the target area;
wherein the step of determining the second potential target using the video information is performed in case the vibration information satisfies a predetermined condition.
Optionally, the vibration information meeting a predetermined condition includes: the signal strength of the vibration information exceeds a predetermined signal strength.
Optionally, the perimeter intrusion monitoring method further comprises:
determining an information acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
Optionally, the environmental information includes illumination intensity, and determining the information acquisition period according to the environmental information of the target area includes:
counting the times that the illumination intensity meets the preset condition;
and determining an information acquisition period corresponding to the number of times that the environment information meets the preset condition according to preset information.
Optionally, the light intensity satisfying the predetermined condition includes: the illumination intensity exceeds a first predetermined illumination intensity; the illumination intensity is lower than a second predetermined illumination intensity.
In a second aspect, embodiments of the present disclosure provide an electronic device, including:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method according to any of the first aspects;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
In a third aspect, embodiments of the present disclosure provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to any of the first aspects.
In the perimeter intrusion monitoring method provided by the disclosure, potential targets in the target area are determined according to the radar information and the video information successively. The perimeter intrusion is monitored by using various monitoring devices, and the video information is utilized to carry out secondary recheck on the monitoring, so that the problem that single monitoring device is easily interfered by environmental factors is effectively avoided, and the false alarm rate are reduced.
In addition, when the environment information in the target area is in short jump due to natural factors, the environment information can be misjudged as the characteristic information of the potential target, and the corresponding information acquisition interval is determined through different environment information of different target areas, so that the perimeter intrusion monitoring can be better adapted to the short jump of the environment information, the false alarm rate is further reduced, and the processing efficiency of the perimeter intrusion monitoring is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure, and are incorporated in and constitute a part of this specification, illustrate the disclosure and together with the description serve to explain, but do not limit the disclosure.
Fig. 1 is a flowchart of a perimeter intrusion monitoring method provided in an embodiment of the present disclosure;
FIG. 2 is a flowchart of a portion of steps in a perimeter intrusion monitoring method provided by an embodiment of the present disclosure;
FIG. 3 is a flowchart of some steps in a perimeter intrusion monitoring method according to an embodiment of the present disclosure;
FIG. 4 is a flowchart of some steps in a perimeter intrusion monitoring method according to an embodiment of the present disclosure;
FIG. 5 is a flow chart of a perimeter intrusion monitoring method provided by an embodiment of the present disclosure;
fig. 6 is a flowchart of an electronic device provided in an embodiment of the disclosure.
Detailed Description
Specific embodiments of the present disclosure are described in detail below with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the disclosure, are not intended to limit the disclosure.
As used in this disclosure, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
When the terms "comprises," "comprising," and/or "including" are used in this disclosure, they specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Embodiments of the present disclosure may be described with reference to plan and/or cross-sectional views with the aid of idealized schematic diagrams of the present disclosure. Accordingly, the example illustrations may be modified in accordance with manufacturing techniques and/or tolerances.
Unless otherwise defined, all terms (including technical and scientific terms) used in this disclosure have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present disclosure, and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The inventor of the present disclosure repeatedly researches and discovers that in the perimeter monitoring method in the related technology, false alarm and missing report often occur to the intrusion of the target, and the reason is that:
in the existing perimeter intrusion monitoring system, the monitoring system usually performs one review on the monitoring data acquired by the radar, the vibration optical fiber and the like, and the monitoring data is always acquired in real time and acts on monitoring analysis. Specifically, in the current perimeter intrusion alarm system, when a monitoring system is used for finding possible intrusion behaviors and generating an alarm, environmental interference factors of various moment changes and irregular changes often exist to influence the accuracy of the alarm, and at the moment, a plurality of environmental information acquired by equipment is generally used for eliminating possible error conditions. However, a small number of error conditions still exist in the intrusion behavior excluded by the environmental information, and the existing alarm system generally directly adopts the intrusion alarm passing one round of recheck and performs corresponding alarm behavior. In addition, in actual perimeter intrusion monitoring, the monitoring data of the radar, the vibrating optical fiber and the like do not always need to be responded in real time for rechecking, so that false alarm and false alarm can be effectively reduced by acquiring the corresponding monitoring data for rechecking according to the information sampling interval.
As a first aspect of the present disclosure, an embodiment of the present disclosure provides a perimeter intrusion monitoring method, as shown in fig. 1, including:
step S110, determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
step S130, determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
step S150, determining the first potential target which is the same object as the second potential target as an intrusion target.
It is noted that the perimeter intrusion monitoring method provided by the present disclosure is performed by an electronic device.
For application scenes such as rail traffic, highway traffic and the like, a general moving object near the perimeter and an intrusion object have obvious distinguishing motion characteristics. In particular, for rail traffic, the speed of travel of pedestrians at a platform is typically near constant, while intrusion targets are typically not meeting the above-described movement characteristics.
Therefore, in the present disclosure, the motion characteristics of the corresponding moving object are determined according to the radar information and the video information of the target area, and the intrusion target is determined according to the motion characteristics.
In the present disclosure, potential targets are determined by at least radar information, video information of a target area, respectively. Wherein the first potential target is determined by radar information, optionally the motion characteristics of the first potential target should satisfy at least one of the predetermined conditions: the speed of entering the target area exceeds a first predetermined speed; the speed of departure from the target zone exceeds the first predetermined speed; the speed of movement while staying within the target area is lower than a second predetermined speed.
In the present disclosure, when it is determined that the motion characteristics of a moving object do not satisfy a predetermined condition by any one of radar information and video information, it is directly determined that the moving object is not an intrusion target, without performing subsequent review. For example: when the potential target is determined by utilizing radar information, if the motion characteristics of the moving object meet the condition that the speed entering the target area does not exceed a first preset speed, judging that the moving object is not the first potential target, and directly judging that the moving object is not an intrusion target.
In an exemplary embodiment, the radar may be a 24G frequency domain radar sensor, and the detected positioning error of the radar may be below 10 meters. Alternatively, the radar information of the radar may include a return time, which is a time from when the radar wave is emitted to when the radar receives the reflected wave, and phase information.
In the present disclosure, there is no particular limitation on how to determine the motion characteristics of the first potential target, and optionally, the method for determining the motion characteristics of the first potential target may include: determining the displacement variation of a first object according to radar information, wherein the first potential target is the first object with the motion characteristics meeting preset conditions; obtaining a time variation corresponding to the displacement variation; and determining the movement speed of the first object according to the displacement variation and the time variation.
In the present disclosure, there is no particular limitation on how to determine the displacement variation amount of the first object from the radar information. Optionally, the distance difference between the first object and the sensor origin of the radar is calculated. In this case, the approach speed is a ratio of a distance difference/displacement variation to a time variation, and the position of the moving target and the positional relationship between the moving target and the warning area can be obtained in the radar coordinate system of the radar. For example: when the radar is a 180-degree sector rotation type radar, and the radar monitors a first object for the first time, the first object is located at a position which is 150 meters away from a sensor origin of the radar and is 30 degrees in phase angle, after 120 seconds, the first object is located at a position which is 150 meters away from the sensor origin of the radar and is 150 degrees in phase angle, the displacement variation is 240 meters, and the moving speed of the first object is 2m/s.
In the present disclosure, there is no particular limitation on how to locate the first object based on the radar information. Optionally, the position of the first object in the target area is determined by combining the relative position of the first object in the radar with the radar information of the radar and the installation position of the radar in the target area. For example: when the radar is a 180-degree sector rotary radar, the installation position of the radar has a corresponding relation with a kilometer sign of a track in the target area, and the radar is used for monitoring the outer periphery of the track, and when the kilometer sign is 1 km, then when the first object is positioned 150 m away from the origin of a sensor of the radar and at a position with a phase angle of 30 degrees, the first object is positioned at 120m on the right side of the radar, namely, the first object is positioned at the track at 1120 m.
In the present disclosure, there is no particular limitation on how to perform step S110, and as described above, the method for perimeter intrusion monitoring, according to the first potential target, which is determined according to radar information of the target, as shown in fig. 2, further includes:
step S101, determining an acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
The information acquisition interval is set for the purpose of further reducing false positives. In an actual monitoring environment, the environmental information in the target area may have short hops caused by natural factors, and these hops may be misjudged as characteristic information of the potential target. At this time, determining the information acquisition time by acquiring the necessary environmental information of the target area enables the monitoring system to better accommodate short hops of these environmental information.
Optionally, the corresponding information acquisition period is obtained by counting the times that the illumination intensity meets the preset condition and through the preset corresponding relation between the counted times and the information acquisition period, wherein the time length of the information acquisition period is longer as the counted times are higher. The predetermined condition that the illumination intensity satisfies may include: the illumination intensity exceeds a first predetermined illumination intensity; the illumination intensity is lower than a second predetermined illumination intensity.
The information acquisition interval is also provided for improving the operating pressure of the processing unit of the monitoring system. When radar information is acquired through the radar and video information is acquired through the camera, the processing capability requirement of processing the radar and the video information in real time for rechecking the processing unit of the corresponding monitoring system is considered. In general, the application scenario of the perimeter intrusion monitoring method does not require the device to feed back and review the corresponding information based on the limited capability of the device to acquire the corresponding information. Therefore, when the corresponding information of the target area is acquired, radar information, video information and the like are acquired according to the information acquisition interval, and the processing efficiency of the processing unit of the corresponding monitoring system is effectively improved.
In the present disclosure, the information obtained according to the information acquisition interval is not particularly required. Optionally, the method comprises the step of. The acquiring the necessary information in the target area according to the information acquisition interval may include: radar information, vibration signals of the vibration optical fiber, video signals of the camera, and interactive signaling between the monitoring system and the alarm system of the target area is acquired according to the information acquisition interval when the monitoring system formed by the radar, the vibration optical fiber, the camera and the like and the alarm system formed by the alarm equipment are respectively controlled by different main control equipment.
In the present disclosure, a mapping relationship between how to determine the environmental information of the target area and the information collection interval is not particularly limited, and optionally, the environmental information may include an illumination duration of the target area, where the transient jump may be from a mutation of illumination intensity, and a cause thereof may be cloud and fog shielding. A camera that collects video information may capture shadows caused by such changes in light intensity and determine it as a second potential target. Therefore, the sunshine duration of different areas is collected in advance, and different information collection intervals are set according to the collected sunshine duration, so that the collection of the error information can be effectively improved.
In the present disclosure, there is no particular limitation on how to perform step S110, and the perimeter intrusion monitoring method further includes, after determining the first potential target according to the radar information of the target area, as shown in fig. 3, including:
step S121, obtaining vibration information of the optical fiber in the target area, wherein,
in the case where the vibration information satisfies a predetermined condition, the step of determining a second potential target using video information (i.e., step S130) is performed.
The laser emits laser into the optical cable part of the vibrating optical fiber, when the optical cable is subjected to external vibration, part of laser with on-site vibration information returns along the optical cable, enters the photoelectric conversion structure and is converted into an electric signal, and whether the next operation needs to be executed is judged by analyzing the spectrum surface of the electric signal.
In an exemplary embodiment, the vibration optical fiber is a positioning vibration optical fiber, and the vibration optical fiber records the time t from the laser to the return, and the propagation speed of the laser in the light is known as the light speed c, so that the vibration position of the external vibration is s=c×t/2.
In an exemplary embodiment, the vibrating optical fiber is a direct buried optical fiber cable, and the exterior is provided with armor and laid underground. Specifically, the vibration optical fiber is protected by armor, so that the vibration optical fiber can better support long-distance laying, and the optical fiber protected by armor can better resist performance damage caused by mechanical damage and better resist soil corrosion. Optionally, the vibrating fiber is protected by armor made of steel wire.
In the present disclosure, there is no particular limitation on how S121 is performed, and optionally, the vibration information satisfying the predetermined condition includes: the change rate of the signal intensity of the vibration information at a certain moment exceeds a preset threshold value. In an optional implementation manner, the step of determining the second potential target by using the video information may be performed by continuously receiving the electrical signal returned by the optical cable of the vibrating optical fiber, and when the signal intensity of the electrical signal at a certain moment generates a jump, and when the signal intensity of the electrical signal after the jump is greater than a preset threshold, judging that the vibration information meets a condition.
In the present disclosure, there is no particular limitation on how to perform step S130, where the determining the second potential target using the video information, as shown in fig. 4, includes:
step S131, carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
step S132, determining the object meeting the clustering result as the second potential target;
the moving objects within the target area have a variety of characteristic information, and as described above, there are distinct motion characteristics between a general moving object and an intruding object near the perimeter. In particular, for rail traffic, the speed of travel of pedestrians at a platform is typically near constant, while intrusion targets are typically not meeting the above-described movement characteristics. Therefore, the potential targets are rechecked secondarily through the video information, and the method is mainly aimed at extracting and analyzing the motion characteristics of the moving objects in the video, and when the motion characteristics of the moving objects meet the preset conditions, the invasion targets can be distinguished in the moving objects.
In the present disclosure, there is no particular limitation on how to perform speed feature clustering on the moving objects in the video, and optionally, implementation of the feature clustering adopts a clustering algorithm, where the clustering algorithm may include: at least one of a K-means clustering algorithm, a K-means++ clustering algorithm and a bi-means clustering algorithm.
The K-means clustering algorithm is a common clustering algorithm, and the basic operation thought is that a plurality of clustering centers are designated in advance, and repeated iteration is carried out until the clustering center of each cluster is closer to the data point of the same type and the distances between the data points of different types are farther. On this basis, a predetermined range can be given, which gives a range based on the cluster center, and data points within the predetermined range are regarded as features of the same category as the cluster center, and data points outside the predetermined range are regarded as features different from the category of the cluster center.
In an alternative embodiment, the clustering center may be a preset motion feature that meets the second potential target, and then the motion feature within the preset range is the second potential target.
In the present disclosure, an object whose motion characteristic satisfies a predetermined condition is determined as the second potential target, and optionally, the predetermined condition may include: the speed of entering the target area exceeds a first predetermined speed; the speed of departure from the target zone exceeds the first predetermined speed; the speed of movement while staying within the target area is lower than a second predetermined speed. And after the object meets the motion characteristics, the monitoring system judges that the behavior of the object is suspicious, and determines the object as the second potential target.
In order to more intuitively present a specific implementation procedure of the perimeter intrusion monitoring method according to the embodiments of the present disclosure, an embodiment is described below, and the illustrated embodiment is not intended to limit the protection scope of the embodiments of the first aspect of the present application.
Examples
This embodiment describes a perimeter intrusion monitoring method acting between radar, vibrating fiber optic, cameras. In this embodiment, a flow of monitoring an object to be intruded by the device is described as an example, as shown in fig. 5, the method includes:
step 501, obtaining radar information of a moving object obtained by monitoring a radar in a target area;
step 502, judging whether the speed of the moving object entering the target area exceeds a first preset speed; if not, go to step 503; if yes, go to step 504;
step 503, judging that the moving object is not an intrusion target;
step 504, determining the moving object as a first potential target;
step 505, obtaining a vibration signal of the vibration fiber in the target area
Step 506, judging whether the signal intensity change rate of the vibration signal exceeds a preset threshold value; if not, go to step 507; if yes, go to step 508;
step 507, judging that the moving object is not an intrusion target;
step 508, obtaining video information of the camera in the target area;
step 509, performing speed feature clustering on the moving objects in the video information to obtain a clustering result;
step 510, determining whether the distance between the speed characteristic clustering result of the moving object and the clustering center meets a preset threshold value; if not, go to step 511; if yes, go to step 512;
step 511, judging that the moving object is not an intrusion target;
step 512, determining the moving object as a second potential target;
in step 513, the first potential target that is the same object as the second potential target is determined to be an intrusion object.
Referring to fig. 6, an embodiment of the present disclosure provides an electronic device including:
one or more processors 601;
a memory 602 having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the perimeter intrusion monitoring method of any of the above;
one or more I/O interfaces 603, coupled between the processor and the memory, are configured to enable information interaction of the processor with the memory.
Wherein the processor 601 is a device having data processing capabilities including, but not limited to, a Central Processing Unit (CPU) or the like; memory 602 is a device with data storage capability including, but not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically charged erasable programmable read-only memory (EEPROM), FLASH memory (FLASH); an I/O interface (read/write interface) 603 is connected between the processor 601 and the memory 602, and enables information interaction between the processor 601 and the memory 602, including but not limited to a data Bus (Bus) or the like.
In some embodiments, processor 601, memory 602, and I/O interface 603 are interconnected by a bus to further connect with other components of a computing device.
The present embodiment also provides a computer readable medium, on which a computer program is stored, where the program when executed by a processor implements the perimeter intrusion monitoring method provided in the present embodiment, and in order to avoid repetitive description, specific steps of the corresponding perimeter intrusion monitoring method are not described herein.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods of the invention described above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the embodiments and form different embodiments.
It is to be understood that the above embodiments are merely exemplary embodiments employed to illustrate the principles of the present disclosure, however, the present disclosure is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the disclosure, and are also considered to be within the scope of the disclosure.
Claims (10)
1. A perimeter intrusion monitoring method comprises
Determining a first potential target according to radar information of a target area, wherein the first potential target is an object with motion characteristics meeting preset conditions;
determining a second potential target by utilizing video information, wherein the second potential target is an object with motion characteristics meeting the preset condition;
the first potential target, which is the same object as the second potential target, is determined to be an intrusion target.
2. The perimeter intrusion monitoring method of claim 1, wherein the motion characteristics meeting a predetermined condition comprises at least one of:
the speed of entering the target area exceeds a first predetermined speed;
the speed of departure from the target zone exceeds the first predetermined speed;
the speed of movement while staying within the target area is lower than a second predetermined speed.
3. The perimeter intrusion monitoring method of claim 1, wherein the determining a second potential target using video information comprises:
carrying out speed characteristic clustering on the moving objects in the video information to obtain a clustering result;
and determining the object meeting the clustering result as the second potential target.
4. The perimeter intrusion monitoring method of claim 1, further comprising, after the determining the first potential target from radar information of the target area:
obtaining vibration information of the optical fiber in the target area;
wherein the step of determining the second potential target using the video information is performed in case the vibration information satisfies a predetermined condition.
5. The perimeter intrusion monitoring method of claim 4, wherein the vibration information meeting a predetermined condition comprises: the signal strength of the vibration information exceeds a predetermined signal strength.
6. The perimeter intrusion monitoring method of claim 1, wherein the perimeter intrusion monitoring method further comprises:
determining an information acquisition period according to the environmental information of the target area;
and periodically acquiring the radar information and the video information according to the information acquisition period.
7. The perimeter intrusion monitoring method of claim 6, wherein the environmental information includes illumination intensity, the determining an information acquisition period from the environmental information of the target area includes:
counting the times that the illumination intensity meets a preset condition;
and determining an information acquisition period corresponding to the number of times that the environment information meets the preset condition according to preset information.
8. The perimeter intrusion monitoring method of claim 7, wherein the illumination intensity satisfying a predetermined condition comprises:
the illumination intensity exceeds a first predetermined illumination intensity;
the illumination intensity is lower than a second predetermined illumination intensity.
9. An electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-8;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
10. A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method according to any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310457864.5A CN116486548A (en) | 2023-04-25 | 2023-04-25 | Perimeter intrusion monitoring method, electronic equipment and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310457864.5A CN116486548A (en) | 2023-04-25 | 2023-04-25 | Perimeter intrusion monitoring method, electronic equipment and computer readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116486548A true CN116486548A (en) | 2023-07-25 |
Family
ID=87217447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310457864.5A Pending CN116486548A (en) | 2023-04-25 | 2023-04-25 | Perimeter intrusion monitoring method, electronic equipment and computer readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116486548A (en) |
-
2023
- 2023-04-25 CN CN202310457864.5A patent/CN116486548A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230154329A1 (en) | Vehicular information systems and methods | |
US9075143B2 (en) | Sparse array RF imaging for surveillance applications | |
JP5821419B2 (en) | Moving object detection apparatus, moving object detection method, and computer program for moving object detection | |
JP6673030B2 (en) | Information processing apparatus, information processing method, and program | |
CN111856507B (en) | Environment sensing implementation method, intelligent mobile device and storage medium | |
CN110443275B (en) | Method, apparatus and storage medium for removing noise | |
CN114202783A (en) | Target tracking method based on millimeter wave radar | |
US11879992B2 (en) | Method for identifying static radar targets using a radar sensor for motor vehicles | |
CN111951582A (en) | Road traffic data determination method, system and equipment | |
CN116547562A (en) | Point cloud noise filtering method, system and movable platform | |
CN113625232B (en) | Method, device, medium and equipment for restraining multipath false target in radar detection | |
AU2020428822A1 (en) | Method, apparatus, server, and computer program for collision accident prevention | |
Haghighat et al. | A computer vision‐based deep learning model to detect wrong‐way driving using pan–tilt–zoom traffic cameras | |
US20210398425A1 (en) | Vehicular information systems and methods | |
US8483478B1 (en) | Grammar-based, cueing method of object recognition, and a system for performing same | |
CN116486548A (en) | Perimeter intrusion monitoring method, electronic equipment and computer readable medium | |
CN117677862A (en) | Pseudo image point identification method, terminal equipment and computer readable storage medium | |
CN112466114A (en) | Traffic monitoring system and method based on millimeter wave technology | |
US20230408686A1 (en) | Method and apparatus for detecting static object by means of radar sensor of roadside unit | |
CN111751796B (en) | Traffic radar angle measurement method, system and device based on one-dimensional linear array | |
US11984030B2 (en) | Vehicular information systems and methods | |
CN117630845A (en) | Target detection method, target detection device, data processing device, radar and storage medium | |
CN116246398A (en) | Method, processor, system and storage medium for identifying an intrusion object | |
CN115147783A (en) | Vehicle counting method and device, electronic equipment and storage medium | |
Gao et al. | High-accurate vehicle trajectory extraction and denoising from roadside LIDAR sensors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |