Disclosure of Invention
The invention aims to make up the defects of the prior art and provides an optical fiber fence intrusion alarm system, which can immediately trigger a biological recognition subsystem to carry out identity verification on an intruder once a potential intrusion behavior is detected through abnormal vibration or pressure change in a monitoring area of the optical fiber fence subsystem, simultaneously capture and analyze physiological information such as heartbeat, respiration and the like of the intruder by utilizing a weak biological signal detection module to assist in judging the physiological state and possible behavior intention, and finally, comprehensively process data of each subsystem by an intelligent analysis and decision-making platform, automatically select and trigger corresponding alarm response measures, thereby obviously improving the accuracy and efficiency of safety precaution.
The invention provides a technical scheme for solving the technical problems, which comprises an optical fiber fence intrusion alarm system, a communication and linkage module and a control module, wherein the optical fiber fence intrusion alarm system comprises an optical fiber fence subsystem, a biological recognition subsystem, a weak biological signal detection module, an intelligent analysis and decision-making platform and a communication and linkage module;
The biological recognition subsystem is integrated in key monitoring points and mobile monitoring equipment, and comprises a fingerprint recognition module and a face recognition camera, wherein the fingerprint recognition module and the face recognition camera are used for recognizing the identity of an intruder immediately after the optical fiber fence subsystem detects the intrusion;
the weak biological signal detection module collects weak biological signals including heartbeat and respiration generated by an intruder by using an optical fiber sensor, processes the collected weak signals by using a signal enhancement technology and a filtering algorithm, and extracts biological characteristic parameters of the heartbeat frequency and the respiration frequency from the processed signals by using the algorithm, wherein an extraction algorithm formula of the heartbeat frequency is as follows: Wherein Δt heart_i is the time interval corresponding to two adjacent heartbeat peaks in the selected scale range, n is the statistical heartbeat peak logarithm, and the formula of the extraction algorithm of the respiratory rate is: Wherein, The method comprises the steps of analyzing and judging the current state of an intruder according to extracted biological characteristic parameters and by combining a preset physiological state and a behavior intention model, specifically, setting the heartbeat frequency as F h, the respiratory frequency as F r, the average heartbeat frequency as F h0 in a preset normal state, the average respiratory frequency as F r0 in a normal state, the heartbeat frequency weight coefficient as alpha and the respiratory frequency weight coefficient as beta, and defining a comprehensive deviation index D: Judging the state of an intruder according to the comprehensive deviation index D, setting threshold values T 1 and T 2, and T 1<T2, judging a relatively calm state for D less than or equal to T 1, judging a light tension state for T 1<D≤T2, judging a high tension or potential threat state for D > T 2, and feeding back an analysis result to an intelligent analysis and decision platform;
The intelligent analysis and decision platform receives data from the optical fiber fence and the biological recognition subsystem, performs comprehensive analysis and judges whether the identity of the intruder is legal or not and the behavior intention of the intruder;
and the communication and linkage module realizes linkage response among all subsystems under the control of the intelligent analysis and decision platform.
Further, the optical fiber fence subsystem is used for arranging an optical fiber sensor network around the area to be protected according to a preset layout scheme, monitoring vibration and pressure parameter changes in the area in real time, preprocessing an original signal acquired by the optical fiber sensor through a special signal processing unit to extract the characteristics of an access intrusion signal, comparing the processed signal with a preset intrusion threshold, judging potential intrusion behaviors if the processed signal exceeds the threshold, generating a preliminary intrusion alarm signal, and immediately sending alarm information to an intelligent analysis and decision-making platform through a communication module when the intrusion behaviors are confirmed, and preparing to receive further instructions.
Further, after the optical fiber fence subsystem triggers an alarm, a fingerprint identification module and a face identification camera in the biological identification subsystem are quickly started and enter a working state, facial features and fingerprint information of an intruder are captured through the high-definition camera, the acquired biological data are preprocessed, feature parameters are extracted, the extracted feature parameters are compared with a prestored authorized personnel database, whether the identity of the intruder is legal or not is judged by utilizing an identification algorithm, and the identity comparison result is sent to an intelligent analysis and decision platform so as to carry out subsequent decision processing.
Further, the biometric subsystem performs preprocessing on the collected biometric data to extract a feature parameter, specifically, sets the collected biometric data as a matrix X, wherein each row represents a sample data, each column represents a feature dimension, calculates a mean value of each feature dimension for n samples, each sample having m feature dimensions, that is, X is a matrix of n×m, and obtains a mean vector μ, whereinX i is the ith row of matrix X, representing one sample data, subtracting the mean vector from each sample data to obtain a de-centered matrix X ′, i.e., X ′ =x- μ, and calculating the covariance matrix S of the de-centered matrix X ′
Wherein X ′T is the transpose matrix of X ′, performing eigenvalue decomposition on the covariance matrix S to obtain eigenvalue λ 1,λ2,…,λm and corresponding eigenvector v 1,v2,…,vm, sorting eigenvectors according to the order of the eigenvalues from large to small, selecting eigenvectors corresponding to the first k eigenvalues to form a projection matrix P, where p= (v 1,v2,…,vk), and projecting the original data into the principal component space to obtain an eigenvalue matrix Y, i.e., y=x ′ P.
Further, the biometric subsystem uses an identification algorithm to determine whether the identity of the intruder is legal, and the algorithm formula is as follows: wherein k is the adjustment parameter, when And judging the identity as legal identity, wherein T is a preset similarity threshold value.
Furthermore, the intelligent analysis and decision platform receives the data and alarm information from the optical fiber fence subsystem, the biological recognition subsystem and the weak biological signal detection module, performs comprehensive analysis on the received data and information, including the identification result, the physiological state analysis and the severity of the invasion behavior of the invader, and according to the comprehensive analysis result, the intelligent analysis and decision platform makes corresponding countermeasures, sends the decision result to the corresponding execution unit through the communication module, monitors the execution condition of the execution unit, records the whole event process and generates reports.
Furthermore, the intelligent analysis and decision platform receives data and alarm information from the optical fiber fence subsystem, the biological recognition subsystem and the weak biological signal detection module, performs comprehensive analysis on the received data and information, and an algorithm formula of the analysis is as follows: Wherein, I fiber is an intrusion probability index provided by the optical fiber fence subsystem, I bio is an identity validity index provided by the biological recognition subsystem, T stress is a tension index provided by the weak biological signal detection module, T stressmax is a preset maximum tension value, and w 1、w2、w3 is the weight coefficients of the optical fiber fence subsystem, the biological recognition subsystem and the weak biological signal detection module respectively.
Furthermore, the intelligent analysis and decision platform makes corresponding countermeasures according to the result of the comprehensive analysis, and the specific measures comprise:
(1) According to the emergency degree and the potential threat of the intrusion event, the intelligent analysis and decision-making platform starts a series of automatic defense measures, including activating an automatic door lock, spraying non-lethal defense spray and releasing warning gas;
(2) Dynamically adjusting deployment of security resources according to the behavior mode and risk assessment result of an invader;
all data related to the intrusion event, including the identity information of the intruder, the intrusion process, and the execution of countermeasures, are recorded and stored.
Compared with the prior art, the optical fiber fence intrusion alarm system has the following beneficial effects:
1. The invention utilizes the sensitivity of the optical fiber sensor to weak biological signals such as heart beat, respiration and the like to assist in judging the physiological state and possible behavioral intention of an intruder, thereby not only providing more comprehensive intruder information for security personnel, but also enabling the system to make more intelligent decisions based on the information, and simultaneously, the intelligent analysis and decision-making platform can automatically select and trigger the alarm response measures most suitable for the current situation by comprehensively analyzing the collected multi-source data, thereby greatly improving the response speed and efficiency of security precautions and enhancing the intelligent level of the system.
2. The invention realizes the accurate identification of the identity of the invader by integrating the biological identification technology and the optical fiber sensing technology, overcomes the limitation that the traditional optical fiber fence system can only detect the invasion behavior and can not identify the identity of the invader, effectively reduces the false alarm rate caused by environmental factors, ensures the accurate identification of the invader even in night or in complex environments, and further improves the overall safety and reliability of the system.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Detailed Description
The following will clearly and completely describe the technical solutions in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
The embodiment describes the specific application of the optical fiber fence intrusion alarm system in the scientific laboratory environment in detail, and is used for safe driving protection navigation of scientific research achievements and experimental equipment by integrating the optical fiber fence subsystem, the biological recognition subsystem, the weak biological signal detection module, the intelligent analysis and decision-making platform and the communication and linkage module.
Firstly, an optical fiber sensor network is arranged around a laboratory building according to a well-designed layout scheme, each potential intrusion path of the laboratory is covered, channels, such as ventilation pipelines, underground pipelines and the like, which are possibly used for intrusion, are extended and covered, a signal processing unit monitors vibration and pressure changes in the areas in real time, an advanced adaptive filtering technology is adopted to amplify and filter original signals acquired by the optical fiber sensor, preprocessing such as better adapting to signal interference in different environments is carried out, more accurate intrusion signal characteristics are extracted, when an intrusion threshold is preset, the influence of different time periods and environmental factors is considered, for example, a dynamic threshold adjustment mechanism is set, when the threshold is quite quiet at night or in the surrounding environment, so as to improve sensitivity, when more external interference exists in daytime, the threshold is properly improved so as to reduce false alarm, when the processed signals exceed the threshold, the potential intrusion behavior is judged, and a preliminary intrusion alarm signal is generated, and once the intrusion behavior is confirmed, alarm information is immediately sent to an intelligent analysis and decision-making platform through a high-speed communication module, and a local acousto-optic alarm device is started to act as a preliminary deterrent to the intrusion of a person.
Secondly, installing a face recognition camera and a fingerprint recognition module at key inlets and important monitoring points in a laboratory, adding iris recognition equipment, improving the accuracy and safety of identity recognition, after an optical fiber fence subsystem triggers an alarm, rapidly starting the biological recognition subsystem, judging whether the behavior of an invader is abnormal or not by an intelligent image analysis technology through the high-definition camera, adopting a non-contact technology to improve the acquisition efficiency and the sanitation, simultaneously, accurately recognizing the acquired biological data by the iris recognition equipment under different illumination conditions by utilizing an infrared light source, preprocessing the acquired biological data, extracting characteristic parameters according to a principal component analysis method, further optimizing the characteristics by combining a deep learning algorithm, comparing the processed characteristic parameters with a prestored authorized person database, judging whether the identity of the invader is legal or not by utilizing an advanced recognition algorithm, judging the identity to be legal if the similarity is larger than a preset similarity threshold, otherwise, transmitting the comparison result to an intelligent analysis and decision platform, and locally storing and backing up for subsequent investigation.
Then, the optical fiber is utilized, the sensor collects weak biological signals such as heartbeat and respiration generated by a possibly intruded person, the sensor adopts a high-sensitivity fiber bragg grating technology, the weak signals can be detected more accurately, the collected weak signals are processed through a signal enhancement technology and a filtering algorithm, biological characteristic parameters of the heartbeat frequency and the respiration frequency are calculated respectively according to an extraction algorithm of the heartbeat frequency and the respiration frequency, meanwhile, the biological signals are analyzed by introducing an artificial intelligence algorithm, different emotion states such as tension, fear, anger and the like are identified, more basis is provided for judging the behavioral intention of the intruder, specifically, the heartbeat frequency is F h, the respiration frequency is F r, the average heartbeat frequency in a preset normal state is F h0, the average respiration frequency in a normal state is F r0, the heartbeat frequency weight coefficient is alpha, the respiration frequency weight coefficient is beta, and a comprehensive deviation index D is defined: The state of an intruder is judged according to the comprehensive deviation index D, the thresholds T 1 and T 2 are set, and T 1<T2 is judged to be in a relatively calm state for D less than or equal to T 1, is judged to be in a slightly stressed state for T 1<D≤T2, is judged to be in a highly stressed or potential threat state for D > T 2, and analysis results are fed back to an intelligent analysis and decision platform and can be sent to handheld equipment of on-site security personnel in a wireless communication mode so that the intruder can be known timely.
Then, the intelligent analysis and decision platform receives data and alarm information from the optical fiber fence subsystem, the biological recognition subsystem and the weak biological signal detection module, adopts a big data analysis technology to mine historical intrusion event data so as to optimize a comprehensive analysis algorithm, and according to a formula of the comprehensive analysis algorithm The comprehensive analysis is carried out, wherein I f iber is an intrusion possibility index provided by an optical fiber fence subsystem, I bio is an identity validity index provided by a biological recognition subsystem, T stress is a tension index provided by a weak biological signal detection module, w 1、w2、w3 is a weight coefficient of each subsystem, T stressmaπ is a preset maximum tension value, the weight coefficient is dynamically adjusted according to different security level requirements and actual conditions so as to realize more accurate analysis and decision, corresponding countermeasures are formulated according to comprehensive analysis results, for example, if illegal intrusion is judged and the conditions are urgent, audible and visual alarm is started, remote notification is sent to security personnel, deployment of security resources is dynamically adjusted according to a behavior mode and a risk assessment result of an intruder, meanwhile, all data related to intrusion events, including identity information of the intruder, intrusion process and execution conditions of the countermeasures, a detailed report is generated for subsequent analysis and improvement, and in case of emergency, real-time can be realized with a command center of the police, and emergency response speed is improved.
Finally, the communication and linkage module establishes stable and reliable communication links between subsystems and between the subsystems and an external safety system, adopts redundancy design and encryption technology to ensure the safety and reliability of real-time data transmission and information sharing, automatically starts a biological recognition subsystem to identify when the optical fiber fence subsystem triggers an alarm, simultaneously, the intelligent analysis and decision-making platform starts automatic defending measures according to the situation, such as activating an automatic door lock of a laboratory to prevent an intruder from further entering an important area, spraying non-lethal defending spray and releasing warning gas to prevent the intruder from moving and remind surrounding personnel when necessary, and can also link surrounding monitoring cameras to realize omnibearing monitoring coverage, simultaneously monitor the state of the communication links in real time, adopts intelligent fault diagnosis technology to discover and solve the problem in data transmission in time, automatically starts a standby communication channel and an emergency processing program to ensure the normal operation of the system when the communication link or the subsystem breaks down, and simultaneously, periodically maintains and upgrades the system to adapt to the continuously changing safety requirements.
In summary, the optical fiber fence subsystem of the embodiment realizes comprehensive intrusion monitoring on the periphery of a laboratory through careful layout and advanced signal processing technology, a dynamic threshold adjustment mechanism effectively reduces false alarm, improves alarm accuracy, a biological recognition subsystem integrates various devices, a deep learning algorithm is used for preprocessing biological data to accurately recognize identities, a weak biological signal detection module extracts biological characteristic parameters and analyzes emotion states, an intelligent analysis and decision-making platform synthesizes data making and processing measures of all subsystems, and a communication and linkage module establishes a reliable communication link to realize linkage for the laboratory for comprehensive, accurate and efficient safety protection and safe driving and navigation for scientific research results and experimental devices.
Example two
The embodiment describes the specific application of the optical fiber fence intrusion alarm system under the security protection of the bank vault, and the security protection of the bank vault is carried out through the integrated optical fiber fence subsystem, the biological recognition subsystem, the weak biological signal detection module, the intelligent analysis and decision platform and the communication and linkage module.
Firstly, carefully distributing optical fiber sensor networks on all possible intrusion paths such as walls, channels, entrances and ventilating ducts around a vault, adopting high-sensitivity materials and advanced manufacturing processes for the optical fiber sensors, detecting extremely tiny vibration and pressure changes, arranging a high-performance processor and professional signal analysis software on a signal processing unit, continuously monitoring vibration and pressure changes in a region, carrying out multistage preprocessing on collected original signals, including noise reduction, filtering, feature extraction and the like, so as to accurately identify potential intrusion signals, immediately judging potential intrusion actions when abnormal signals are detected, triggering alarm signals, simultaneously, automatically locking all the illumination systems and ventilating systems once alarm is carried out, closing unnecessary illumination and adjusting the ventilating systems, preventing intruders from escaping or damaging by using environmental factors, and in order to improve the reliability of the system, arranging a redundancy backup mechanism on the optical fiber entrance subsystem, and automatically taking over tasks when a main sensor fails, so as to ensure uninterrupted safety protection by the backup sensor.
Secondly, install facial recognition camera, fingerprint identification module, iris recognition equipment and palmprint recognition device at the national treasury entry and key monitoring point, these biological recognition equipment adopts high-resolution image acquisition technique and advanced biological feature extraction algorithm, can discern the identity of entering personnel fast, accurately, after optic fibre rail subsystem triggers the warning, biological recognition subsystem starts rapidly, high definition camera not only can catch the facial features of entering personnel, can also judge whether facial expression and the action of personnel are unusual through intelligent image analysis technique, fingerprint identification module and iris recognition equipment carry out identity verification simultaneously, ensure only authorized personnel can get into the national treasury, palmprint recognition device then regard as an auxiliary means, further improve the accuracy of identity recognition, to the invasion of unauthorized personnel, biological recognition subsystem can discern fast and send information to intelligent analysis and decision platform, start local acousto-optic warning device simultaneously, act as deterrent to the intruder, biological recognition subsystem still carries out real-time connection with staff database and visitor management system of bank, in time update authorized personnel information and carry out strict identity verification to the visitor.
The weak biological signal detection module detects weak biological signals such as heartbeat, respiration, body temperature and the like of a possible intruder by using an optical fiber sensor and professional biological signal acquisition equipment, the equipment adopts an advanced sensor technology and a signal processing algorithm, the biological signals can be accurately detected under the condition of not contacting the intruder, the acquired weak signals are processed by an advanced signal enhancement technology and a filtering algorithm, biological characteristic parameters such as heartbeat frequency, respiratory frequency, body temperature change and the like are extracted, and according to the parameters, the stress degree, health condition and potential threat of the intruder are judged by combining a preset physiological state and behavior intention model, for example, if the abnormal rise of the heartbeat and respiratory frequency and the abnormal change of the body temperature are detected, the system can immediately send out a higher-level alarm, and the weak biological signal detection module can also be linked with an environment monitoring system in a database according to the change of the biological signals, such as temperature, humidity, air quality and the like, so that discomfort of the intruder is improved, and further actions of the intruder are prevented.
Then, the intelligent analysis and decision platform receives data and alarm information from the optical fiber fence subsystem, the biological recognition subsystem and the weak biological signal detection module, adopts a big data analysis technology and an artificial intelligent algorithm to deeply mine and analyze historical intrusion event data so as to optimize the comprehensive analysis algorithm, combines intrusion possibility indexes provided by the optical fiber fence subsystem, identity validity indexes provided by the biological recognition subsystem, tension and health condition indexes provided by the weak biological signal detection module and the like according to a comprehensive analysis algorithm formula, comprehensively and accurately analyzes comprehensively, wherein the weight coefficient of each index is dynamically adjusted according to actual conditions so as to adapt to different safety level requirements and the risk conditions, and corresponding countermeasures are formulated according to comprehensive analysis results, for example, if illegal intrusion and emergency are judged, sound and light alarm is started, security personnel are notified, a police is contacted, a defensive system in the vault is automatically started, such as releasing and electronic barriers are started, and the like, simultaneously, all activities in the vault are recorded in real time, including video monitoring, biological recognition data and biological signal change and the like, detailed emergency response and subsequent emergency report are generated, the emergency response speed and the emergency response can be improved, and the financial response speed can be cooperatively processed with other authorities.
Finally, the communication and linkage module establishes highly stable and reliable communication links between subsystems and between the communication and linkage module and an external safety system, adopts an encryption technology and a redundant communication channel, ensures the safety and reliability of real-time data transmission and information sharing, automatically starts a biological recognition subsystem and a weak biological signal detection module when an optical fiber fence subsystem triggers an alarm, realizes quick response and linkage, simultaneously maintains real-time communication with a safety monitoring center of a bank, an alarm system of a police, a fire department, a medical emergency system and the like, ensures that the state of the communication link can be quickly supported when an emergency occurs, monitors the state of the communication link in real time, adopts an intelligent fault diagnosis technology, timely discovers and solves the problem in data transmission, automatically starts a standby communication channel and an emergency processing program when the communication link or the subsystem fails, ensures the normal operation of the system, simultaneously integrates the communication and linkage module with other business systems of the bank, such as a financial management system, a risk management system and the like, realizes sharing and cooperative processing of information, and improves the overall safety management level of the bank.
In summary, the optical fiber fence subsystem of the embodiment can accurately detect any tiny vibration and pressure change around the vault through the high-sensitivity optical fiber sensor and the advanced signal processing technology, so that comprehensive monitoring of potential intrusion behaviors is realized, the biological recognition subsystem is combined with various technologies such as facial recognition, fingerprint recognition, iris recognition and palm print recognition, so that only authorized personnel can enter the vault, the weak biological signal detection module can detect weak biological signals such as heartbeat, respiration and body temperature of an intruder through the advanced sensor and the signal processing algorithm, and the stress degree and potential threat of the intruder can be accurately judged through analysis of the biological characteristic parameters and the combination of the preset physiological state and the behavior intention model, so that important basis is provided for timely taking countermeasures.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.