TWI647664B - Data fusion based safety surveillance system and method - Google Patents

Data fusion based safety surveillance system and method Download PDF

Info

Publication number
TWI647664B
TWI647664B TW107103279A TW107103279A TWI647664B TW I647664 B TWI647664 B TW I647664B TW 107103279 A TW107103279 A TW 107103279A TW 107103279 A TW107103279 A TW 107103279A TW I647664 B TWI647664 B TW I647664B
Authority
TW
Taiwan
Prior art keywords
data
monitoring system
ith
fusion
nth
Prior art date
Application number
TW107103279A
Other languages
Chinese (zh)
Other versions
TW201933293A (en
Inventor
管晉陞
錢為任
陳俊才
蕭文豪
Original Assignee
國家中山科學研究院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 國家中山科學研究院 filed Critical 國家中山科學研究院
Priority to TW107103279A priority Critical patent/TWI647664B/en
Application granted granted Critical
Publication of TWI647664B publication Critical patent/TWI647664B/en
Publication of TW201933293A publication Critical patent/TW201933293A/en

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

一種基於資料融合的安全監控系統,其包括至少一實體監控系統基於不同演算法而形成的第一至第N虛擬監控系統與資料融合與決策裝置。資料融合與決策裝置定義第i虛擬監控系統的第i偵測模型,並根據第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之多筆第i監控資料的多個偵測漏失樣本數、第i偵測模型、第i虛擬監控系統之多個位置的多筆第i監控資料與多筆環境脈絡(context)資料估算出第i虛擬監控系統的第i偵測漏失機率。資料融合與決策裝置根據第一至第N偵測漏失機率決定融合參數組,且根據融合參數組將第一至第N虛擬監控系統之第一至第N偵測結果進行資料融合,以產生決策結果。如此,可以在不提高建置成本增設精確的實體監控系統的情況下,透過資料融合的方式降低整體的偵測漏失機率。A data fusion-based security monitoring system includes at least one physical monitoring system based on different algorithms to form first to Nth virtual monitoring systems and data fusion and decision making devices. The data fusion and decision device defines an ith detection model of the i-th virtual monitoring system, and according to the ith virtual monitoring system, multiple ith monitoring data under the condition of corresponding multiple locations, multiple environmental context data, and intruders The number of detected missing samples, the i-th detection model, multiple i-th monitoring data of multiple locations of the i-th virtual monitoring system, and multiple context data to estimate the i-th virtual monitoring system Detect misses. The data fusion and decision making device determines the fusion parameter group according to the first to the Nth detection loss probability, and performs data fusion on the first to Nth detection results of the first to Nth virtual monitoring systems according to the fusion parameter group to generate a decision. result. In this way, the overall detection and loss probability can be reduced through data fusion without increasing the cost of construction and adding an accurate physical monitoring system.

Description

基於資料融合的安全監控系統與方法Security monitoring system and method based on data fusion

本發明係關於一種安全監控技術,尤其指一種可以將由一個或多個實體監控系統執行不同演算法而形成的多個虛擬監控系統的偵測結果進行資料融合以進行判斷決策的基於資料融合的安全監控系統與方法。 The present invention relates to a security monitoring technology, and more particularly to a data fusion-based security that can combine data detection results of multiple virtual monitoring systems formed by one or more physical monitoring systems to perform different algorithms to perform judgment and decision making. Monitoring systems and methods.

近年來,安全監控技術一直備受產業與政府單位所重視,尤其是在具有高科技、軍事或行政機密的建物或設施的監控上。然而,實體監控系統本身都有個別的物理限制,且可能因為環境(包括天候)等因素,而影響實體監控系統本身的偵測結果,從而導致發生偵測漏失(註:有入侵者,但卻未偵測到入侵者的情況)或錯誤告警(註:沒入侵者,但卻偵測到入侵者的情況)。 In recent years, safety monitoring technology has been highly valued by industry and government agencies, especially in the monitoring of buildings or facilities with high-tech, military or administrative secrets. However, the physical monitoring system itself has individual physical limitations, and may affect the detection results of the physical monitoring system itself due to factors such as the environment (including weather), resulting in detection loss (Note: there are intruders, but No intruder detected or false alarm (Note: no intruders, but detected intruders).

一般來說,偵測漏失造成的損失可能會遠大於錯誤告警的損失。因此,傳統作法是將實體監控系統的敏感度調高,以避免偵測漏失。然而,此種作法導致監控人員常常地收到錯誤告警的告警訊息,導致監控制人員可能會因此對告警訊息麻木,從而忽視了正確告警的告警訊息。另外,設置更精確的實體監控系統並汰換現有的實體監控系統之作法雖可以解決上述技術問題,但此作法又導致了額外的成本增加。 In general, the loss caused by detecting a leak may be much greater than the loss of a false alarm. Therefore, the traditional approach is to increase the sensitivity of the physical monitoring system to avoid detecting misses. However, this practice causes the monitoring personnel to frequently receive the alarm message of the false alarm, which may cause the monitoring personnel to numb the alarm message, thereby ignoring the alarm message of the correct alarm. In addition, the establishment of a more accurate physical monitoring system and the replacement of the existing physical monitoring system can solve the above technical problems, but this approach leads to additional cost increases.

因此,為了克服現有技術的不足之處,本發明實施例提供一種融合由現有實體監控系統執行不同演算法而形成的多個虛擬監控系統之多個偵測結果的安全監控系統與方法。所述安全監控系統與方法在無須汰換現有的實體監控系統的情況下,便能夠使得整個安全監控系統的偵測漏失與錯誤告警的機率大幅地下降。 Therefore, in order to overcome the deficiencies of the prior art, the embodiments of the present invention provide a security monitoring system and method for integrating multiple detection results of multiple virtual monitoring systems formed by different physical algorithms of an existing entity monitoring system. The security monitoring system and method can greatly reduce the probability of detecting and error warning of the entire security monitoring system without replacing the existing physical monitoring system.

基於前述目的之至少其中一者,本發明實施例提供一種基於資料融合的安全監控系統,其包括由至少一實體監控系統執行不同演算法而形成的第一至第N虛擬監控系統與連結第一至第N虛擬監控系統的資料融合與決策裝置,其中N大於等於2。資料融合與決策裝置定義第一至第N虛擬監控系統的第一至第N偵測模型,其中第i偵測模型用以表示第i虛擬監控系統之多筆第i監控資料與對應多筆第i監控資料之多個第i偵測結果之間的關係,其中i為1至N的整數。資料融合與決策裝置根據第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之多筆第i監控資料的多個偵測漏失樣本數、第i偵測模型、第i虛擬監控系統之多個位置的多筆第i監控資料與多筆環境脈絡(context)資料估算出第i虛擬監控系統的第i偵測漏失機率。資料融合與決策裝置根據第一至第N偵測漏失機率決定融合參數組,且資料融合與決策裝置根據融合參數組將第一至第N虛擬監控系統之第一至第N偵測結果進行資料融合,以產生決策結果。 Based on at least one of the foregoing objectives, an embodiment of the present invention provides a data fusion-based security monitoring system, including first to Nth virtual monitoring systems and links formed by performing at least one entity monitoring system to perform different algorithms. Data fusion and decision making device to the Nth virtual monitoring system, where N is greater than or equal to 2. The data fusion and decision device defines first to Nth detection models of the first to Nth virtual monitoring systems, wherein the i-th detection model is used to represent the plurality of i-th monitoring data of the i-th virtual monitoring system and the corresponding multi-number i The relationship between the plurality of i-th detection results of the monitoring data, where i is an integer from 1 to N. The data fusion and decision-making apparatus according to the i-th virtual monitoring system, the plurality of detection data of the plurality of ith monitoring data corresponding to the plurality of locations, the plurality of environmental context data, and the intruder The plurality of i-th monitoring data and the plurality of environmental context data of the plurality of locations of the i-th virtual monitoring system estimate an ith detection and leakage probability of the i-th virtual monitoring system. The data fusion and decision making device determines the fusion parameter group according to the first to Nth detection loss probability factors, and the data fusion and decision making device performs the first to Nth detection results of the first to Nth virtual monitoring systems according to the fusion parameter group. Convergence to produce decision outcomes.

基於前述目的之至少其中一者,本發明實施例還提供一種基於資料融合的安全監控方法。首先,定義由至少一實體監控系統執行不同演算法而形 成的第一至第N虛擬監控系統的第一至第N偵測模型,其中第i偵測模型用以表示第i虛擬監控系統之多筆第i監控資料與對應多筆第i監控資料之多個第i偵測結果之間的關係,其中i為1至N的整數,以及N大於等於2。根據第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之多筆第i監控資料的多個偵測漏失樣本數、第i偵測模型、第i虛擬監控系統之多個位置的多筆第i監控資料與多筆環境脈絡資料估算出第i虛擬監控系統的第i偵測漏失機率。根據第一至第N偵測漏失機率決定融合參數組。然後,根據融合參數組將第一至第N虛擬監控系統之第一至第N偵測結果進行資料融合,以產生決策結果。 Based on at least one of the foregoing objectives, an embodiment of the present invention further provides a security monitoring method based on data fusion. First, the definition is performed by at least one entity monitoring system executing different algorithms The first to the Nth detection models of the first to the Nth virtual monitoring systems, wherein the i-th detection model is used to represent the plurality of i-th monitoring data of the i-th virtual monitoring system and the corresponding plurality of i-th monitoring data The relationship between the plurality of ith detection results, where i is an integer from 1 to N, and N is greater than or equal to two. According to the i-th virtual monitoring system, the plurality of detection data of the plurality of i-th monitoring data corresponding to the plurality of locations, the plurality of environmental context data, and the intruder are the number of the missing detection samples, the i-th detection model, and the i-th virtual monitoring The plurality of i-th monitoring data and the plurality of environmental context data in multiple locations of the system estimate the ith detection and leakage probability of the i-th virtual monitoring system. The fusion parameter set is determined according to the first to the Nth detection loss probability. Then, the first to Nth detection results of the first to Nth virtual monitoring systems are data fusion according to the fusion parameter group to generate a decision result.

可選地,於本發明實施例中,更可以根據第i虛擬監控系統的在對應多個位置、多筆環境脈絡資料且未有入侵者的假設條件下之多筆第i監控資料的多個錯誤告警樣本數、第i偵測模型、第i虛擬監控系統之多個位置的多筆第i監控資料與多筆環境脈絡資料估算出第i虛擬監控系統的第i錯誤告警機率,且融合參數組根據第一至第N偵測漏失機率與第一至第N錯誤告警機率而被決定。 Optionally, in the embodiment of the present invention, multiple pieces of the i-th monitoring data of the i-th virtual monitoring system under the assumption of multiple locations, multiple environmental context data, and no intruders are further selected. The number of erroneous alarm samples, the i-th detection model, multiple ith monitoring data of multiple locations of the i-th virtual monitoring system, and multiple environmental context data estimates the ith error warning probability of the i-th virtual monitoring system, and the fusion parameters The group is determined according to the first to Nth detection loss probability and the first to Nth false alarm probability.

可選地,於本發明實施例中,基於獲取之第i虛擬監控系統之多筆已知的監控資料與對應多筆已知的監控資料的多筆已知之偵測結果基於機器學習演算法、人工智慧演算法或其他求解模型的演算法定義第i偵測模型 Optionally, in the embodiment of the present invention, the plurality of known monitoring data based on the acquired i-th virtual monitoring system and the plurality of known detection results corresponding to the plurality of known monitoring data are based on a machine learning algorithm, The artificial intelligence algorithm or other algorithm for solving the model defines the i-th detection model

可選地,於本發明實施例中,進行資料融合的方式為透過邏輯運算函數、可靠度規則或環境脈絡規則來進行資料融合,且融合參數組用以決定邏輯運算函數、可靠度規則與環境脈絡規則。 Optionally, in the embodiment of the present invention, the data fusion is performed by using a logical operation function, a reliability rule, or an environment context rule, and the fusion parameter group is used to determine a logical operation function, a reliability rule, and an environment. Thread rules.

可選地,於本發明實施例中,多筆環境脈絡資料的每一者為定義有雨量、風力、溫度與亮度等變量的天候資料。 Optionally, in the embodiment of the present invention, each of the plurality of environmental context data is weather data defining variables such as rainfall, wind, temperature, and brightness.

簡言之,本發明實施例提供的基於資料融合的安全監控系統與方法係定義由現有一個或多個實體監控系統執行不同演算法形成之多個虛擬監控系統的多個偵測模型。然後,基於資料融合的安全監控系統根據每個虛擬監控系統的多筆監控資料、偵測模型、多筆環境脈絡資料與多個不同條件下的多個監控資料平均數估算出其偵測漏失/錯誤告警機率。接著,基於資料融合的安全監控系統根據偵測漏失與錯誤告警機率決定用於對多個偵測結果進行資料融合的融合參數組。如此一來,基於資料融合的安全監控系統與方法提供了一種不需增設實體監控系統之低成本的技術方案,且其可以減少整體偵測漏失機率與錯誤告警機率。 In short, the data fusion-based security monitoring system and method provided by the embodiments of the present invention define multiple detection models of multiple virtual monitoring systems formed by different one or more entity monitoring systems to execute different algorithms. Then, the data fusion-based security monitoring system estimates the detection loss based on the multiple monitoring data, the detection model, the multiple environmental context data of each virtual monitoring system, and the average number of multiple monitoring data under different conditions. Error alert probability. Then, the data fusion-based security monitoring system determines a fusion parameter set for data fusion of multiple detection results according to the detection loss and the false alarm probability. As a result, the data fusion-based security monitoring system and method provides a low-cost technical solution that does not require the addition of a physical monitoring system, and which can reduce the overall detection loss probability and false alarm probability.

1‧‧‧基於資料融合的安全監控系統 1‧‧‧Security monitoring system based on data fusion

111‧‧‧第一虛擬監控系統 111‧‧‧First Virtual Surveillance System

112‧‧‧第二虛擬監控系統 112‧‧‧Second virtual monitoring system

11N‧‧‧第N虛擬監控系統 11N‧‧‧Nth Virtual Monitoring System

12、3‧‧‧資料融合與決策裝置 12.3‧‧‧Information fusion and decision-making devices

S201~S205‧‧‧步驟 S201~S205‧‧‧Steps

31‧‧‧偵測模型定義單元 31‧‧‧Detection model definition unit

32‧‧‧機率估算單元 32‧‧‧ probability estimation unit

33‧‧‧融合參數設定單元 33‧‧‧Fused parameter setting unit

34‧‧‧決策單元 34‧‧‧Decision unit

圖1是本發明實施例的基於資料融合的安全監控系統的方塊圖。 1 is a block diagram of a data fusion based security monitoring system in accordance with an embodiment of the present invention.

圖2是本發明實施例的基於資料融合的安全監控方法的流程圖。 2 is a flow chart of a data fusion based security monitoring method according to an embodiment of the present invention.

圖3是本發明實施例的資料融合與決策裝置的方塊圖。 3 is a block diagram of a data fusion and decision apparatus according to an embodiment of the present invention.

為充分瞭解本發明之目的、特徵及功效,茲藉由下述具體之實施例,並配合所附之圖式,對本發明做一詳細說明,說明如後。 In order to fully understand the objects, features and advantages of the present invention, the present invention will be described in detail by the accompanying drawings.

本發明實施例提供一種基於資料融合的安全監控系統與方法,其無須額外的增設實體監控系統,而是將由現有的一個或多個的實體監控系統執 行不同演算法形成的多個虛擬監控系統的偵測結果融合,以進一步產生決策結果。 The embodiment of the invention provides a security monitoring system and method based on data fusion, which does not need to add an additional entity monitoring system, but will be implemented by one or more existing entity monitoring systems. The detection results of multiple virtual monitoring systems formed by different algorithms are combined to further generate decision results.

於實施例中,針對每一個虛擬監控系統,安全監控系統與方法會先進行訓練,以定義出每一個虛擬監控系統的偵測模型。訓練的方式是搜集每一虛擬監控系統的多筆已知的監控資料與對應多筆已知的監控資料的多筆已知的偵測結果後,透過機器學習演算法、人工智慧演算法或其他求解模型的演算法獲得每一虛擬監控系統之多筆監控資料與多筆偵測結果之間的偵測模型。接著,針對每一個虛擬監控系統,安全監控系統與方法根據在有入侵者的多個不同條件下之多個監控資料的多個偵測漏失樣本數、多個位置的環境脈絡機率、多個位置對應的多筆監控資料與偵測模型估算出偵測漏失機率,以及根據在未有入侵者的多個不同條件下之多個監控資料的多個錯誤告警樣本數、多個位置的環境脈絡機率、多個位置對應的多筆監控資料與偵測模型估算出錯誤告警機率。 In an embodiment, for each virtual monitoring system, the security monitoring system and method are first trained to define a detection model for each virtual monitoring system. The training method is to collect a plurality of known monitoring data of each virtual monitoring system and a plurality of known detection results corresponding to a plurality of known monitoring data, and then use machine learning algorithms, artificial intelligence algorithms or other The algorithm for solving the model obtains a detection model between multiple monitoring data of each virtual monitoring system and multiple detection results. Then, for each virtual monitoring system, the security monitoring system and method detects the number of missing samples, the environmental latitude of multiple locations, and multiple locations according to multiple monitoring data under multiple different conditions of the intruder. Corresponding multiple monitoring data and detection models estimate the probability of detecting leakage, and the number of multiple false alarm samples according to multiple monitoring data under different conditions of the intruder, and the environmental pulse probability of multiple locations Multiple monitoring data and detection models corresponding to multiple locations estimate the probability of false alarms.

進行完訓練後,接著進行推論,以產生決策結果。進一步地,安全監控系統與方法根據估算出來的多個虛擬監控系統的偵測漏失機率與錯誤告警機率設置融合參數組,其中融合參數組用以決定多個偵測結果的融合方式。之後,安全監控系統與方法便能根據融合參數組與多個虛擬監控系統的偵測結果來產生決策結果(亦即,根據融合參數組來進行多個偵測結果的資料融合,以產生決策結果)。 After the training is completed, an inference is then made to produce a decision result. Further, the security monitoring system and method set a fusion parameter group according to the estimated detection failure probability and the false alarm probability of the plurality of virtual monitoring systems, wherein the fusion parameter group is used to determine a fusion manner of the multiple detection results. After that, the security monitoring system and method can generate the decision result according to the detection result of the fusion parameter group and the multiple virtual monitoring systems (that is, the data fusion of the multiple detection results according to the fusion parameter group to generate the decision result) ).

在此請注意,由於偵測漏失造成的損失可能會遠大於錯誤告警的損失。因此,在本發明其中一個實施例中,可以不估算錯誤告警機率,且安全監 控系統與方法僅根據估算出來的多個虛擬監控系統的偵測漏失機率設置融合參數組。 Please note that the loss due to detection loss may be much greater than the loss of false alarms. Therefore, in one embodiment of the present invention, the probability of false alarms may not be estimated, and the security supervision The control system and method only set the fusion parameter group according to the estimated detection and loss probability of multiple virtual monitoring systems.

可選地,於本發明其中一個實施例中,多個偵測結果的資料融合方式可以是透過邏輯運算函數來進行資料融合,且融合參數組可用來決定多個虛擬監控系統的偵測結果的邏輯運算函數。例如,部分偵測結果進行邏輯「和」的運算,另一部分偵測結果進行邏輯「或」的運算,然後多個邏輯運算結果再進行邏輯「和」或「或」的運算,以產生決策結果。 Optionally, in one embodiment of the present invention, the data fusion manner of the multiple detection results may be performed by using a logical operation function, and the fusion parameter group may be used to determine detection results of multiple virtual monitoring systems. Logical operation function. For example, some detection results are logically ANDed, and another part of the detection results are logically ORed, and then multiple logical operations are logically ORed or ORed to generate decision results. .

可選地,於本發明其中一個實施例中,多個偵測結果的資料融合方式可以是透過可靠度規則來進行資料融合,且所述融合參數組可用來決定可靠度規則。例如,要求最後的決策結果需大於可靠度門限值,才能輸出決策結果,或要求偵測結果的可靠度須大於可靠度門限值,才能把偵測結果拿來進行資料融合。 Optionally, in one embodiment of the present invention, the data fusion manner of the multiple detection results may be performed by using a reliability rule, and the fusion parameter group may be used to determine a reliability rule. For example, if the final decision result needs to be greater than the reliability threshold, the decision result may be output, or the reliability of the detection result must be greater than the reliability threshold, so that the detection result can be used for data fusion.

可選地,於本發明其中一個實施例中,所述多個偵測結果的資料融合方式可以是透過環境脈絡(context)規則來進行資料融合,且所述融合參數組可用來決定環境脈絡規則。例如,每一個偵測結果對應有環境脈絡資訊,如座標、物件類型、物件數與精確率,而多個偵測結果機於環境脈絡資訊根據環境脈絡規則來進行資料融合。 Optionally, in an embodiment of the present invention, the data fusion manner of the multiple detection results may be performed by using an environment context rule, and the fusion parameter group may be used to determine an environment context rule. . For example, each detection result corresponds to environmental context information, such as coordinates, object type, number of objects, and accuracy rate, and multiple detection results are based on environmental context information for data fusion according to environmental context rules.

首先,請參照本案圖1,圖1是本發明實施例的基於資料融合的安全監控系統的方塊圖。基於資料融合的安全監控系統1包括第一虛擬監控系統111、第二虛擬監控系統112、...、第N虛擬監控系統11N與資料融合與決策裝置 12,其中第一虛擬監控系統111、第二虛擬監控系統112、...、第N虛擬監控系統11N透過有線或無線的方式連結資料融合與決策裝置12。 First, please refer to FIG. 1 of the present invention. FIG. 1 is a block diagram of a data fusion-based security monitoring system according to an embodiment of the present invention. The data fusion-based security monitoring system 1 includes a first virtual monitoring system 111, a second virtual monitoring system 112, ..., an Nth virtual monitoring system 11N, and a data fusion and decision making device. 12, wherein the first virtual monitoring system 111, the second virtual monitoring system 112, ..., the Nth virtual monitoring system 11N connects the data fusion and decision making device 12 by wire or wirelessly.

在此請注意,實際上,一個或多個實體監控系統的每一者有不同的演算法,以形成上述第一至第N虛擬監控系統111~11N,亦即第一至第N虛擬監控系統111~11N的每一者是由一個實體監控系統基於其中一個演算法所產生。前述實體的監控系統例如為熱像系統、電子圍籬系統、雷射測距系統或虛擬圍牆系統等,但本發明並不以此為限制。前述變數N為正整數,例如,實體監控系統有兩個,且分別具有一個演算法與兩個演算法被執行,故N可以為3,然而,本發明並不以此為限制。 Please note here that, in fact, each of the one or more entity monitoring systems has different algorithms to form the first to Nth virtual monitoring systems 111~11N, that is, the first to Nth virtual monitoring systems. Each of 111~11N is generated by a physical monitoring system based on one of the algorithms. The monitoring system of the foregoing entity is, for example, a thermal image system, an electronic fence system, a laser ranging system or a virtual wall system, but the invention is not limited thereto. The foregoing variable N is a positive integer. For example, there are two entity monitoring systems, and one algorithm and two algorithms are respectively executed, so N can be 3. However, the present invention is not limited thereto.

資料融合與決策裝置12包括多個電路,並經組態後,使得資料融合與決策裝置12具有計算能力。舉例來說,資料融合與決策裝置12為一般電腦,其安裝有相應的軟體程式,從而進行相關的運算,以執行資料融合與決策裝置12所需執行的步驟與所欲達到的功能。 The data fusion and decision making device 12 includes a plurality of circuits and is configured to cause the data fusion and decision device 12 to have computing power. For example, the data fusion and decision making device 12 is a general computer that is equipped with a corresponding software program to perform related operations to perform the steps required to perform the data fusion and decision device 12 and the desired functions.

一般來說,熱像系統容易受到溫度的影響。電子圍籬系統或雷射測距系統因為偵測信號之波段的特性,而容易受到水氣的干擾。另外,虛擬圍牆系統是由可見光攝影機提供影像來源作為辨識的依據,故一旦影像品質不佳或遭受先天條件的影響(例如,夜晚無光源、風速過大造成樹葉晃動或影像像素(解析度)不足等),其最後的偵測結果也會直接或間接地被影響。因此,可以知悉,環境脈絡資料中是影響上述各虛擬監控系統之偵測結果的一個重要因素。由上述例子,環境脈絡資料可以例如是包括溼度、風速、溫度與亮度的等變量的天候資料,但本發明不以環境脈絡資料為天候資料為限制。 In general, thermal imaging systems are susceptible to temperature. Electronic fence systems or laser ranging systems are susceptible to moisture interference because they detect the characteristics of the signal band. In addition, the virtual wall system is provided by the visible light camera as the basis for identification, so if the image quality is not good or affected by the innate conditions (for example, no light source at night, excessive wind speed, leaf sway or insufficient image pixels (resolution), etc. ), the final detection results will be directly or indirectly affected. Therefore, it can be known that the environmental context data is an important factor affecting the detection results of the above virtual monitoring systems. From the above example, the environmental context data may be, for example, weather data including variables such as humidity, wind speed, temperature, and brightness, but the present invention does not limit the environmental context data to weather data.

由於環境會對虛擬監控系統之偵測結果有所影響,故在估算偵測漏失機率與錯誤告警機率時,仍須將環境脈絡因素考量進去。以環境脈絡資料為天候資料為例,溼度可使用「雨天」或「無雨」的二元值來表示,或單純以雨量來表示;風速可以使用「無風」、「微風」或「強風」的三元值,或單純以風力來表示;溫度可使用「低溫」或「高溫」的二元值來表示,或單純以溫度值來表示;以及亮度可使用「白天」或「黑夜」的二元值來表示,或單純以亮度值來表示。 Since the environment will have an impact on the detection results of the virtual monitoring system, the environmental context factor must still be taken into account when estimating the probability of detecting the missed rate and the probability of the false alarm. Taking environmental context data as weathering data as an example, humidity can be expressed as a binary value of "rainy weather" or "no rain", or simply by rainfall; wind speed can use "no wind", "breezes" or "strong wind" The ternary value is expressed simply by the wind; the temperature can be expressed as a binary value of "low temperature" or "high temperature", or simply by temperature value; and the brightness can be binary of "day" or "night" Value is expressed, or simply expressed as a brightness value.

資料融合與決策裝置12會先蒐集第一虛擬監控系統111、第二虛擬監控系統112、...、第N虛擬監控系統11N的多筆已知的第一至第N監控資料與多筆已知的第一至第N偵測結果。前述多筆已知的第一監控資料、第二監控資料與第N監控資料分別是第一虛擬監控系統111、第二虛擬監控系統112、...、第N虛擬監控系統11N之偵測錯誤漏失與錯誤告警的原始資料,以利於減少取得後續之在有侵入者與未有侵入者之多個不同條件下的多個監控資料的多個偵測漏失樣本數與多個錯誤告警樣本數的計算。然而,本發明並不限制於此,前述多筆已知的第一監控資料、第二監控資料與第N監控資料亦可以分別是第一虛擬監控系統111、第二虛擬監控系統112、...、第N虛擬監控系統11N之非偵測錯誤漏失與非錯誤告警的原始資料,但此作法需要額外地再計算統計在有侵入者與未有侵入者之多個不同條件下的多個監控資料的多個偵測漏失樣本數與多個錯誤告警樣本數。 The data fusion and decision making device 12 first collects a plurality of known first to Nth monitoring data and multiple pens of the first virtual monitoring system 111, the second virtual monitoring system 112, ..., the Nth virtual monitoring system 11N. Know the first to Nth detection results. The plurality of known first monitoring data, the second monitoring data, and the Nth monitoring data are detection errors of the first virtual monitoring system 111, the second virtual monitoring system 112, ..., and the Nth virtual monitoring system 11N, respectively. Missing and false alarm source data, in order to reduce the number of multiple detected missing samples and multiple false alarm samples for multiple monitoring data in multiple different conditions of intruder and non-intruder Calculation. However, the present invention is not limited thereto, and the plurality of known first monitoring data, second monitoring data, and Nth monitoring data may also be the first virtual monitoring system 111, the second virtual monitoring system 112, respectively. The Nth virtual monitoring system 11N does not detect the original data of error and non-error alarms, but this method requires additional recalculation of multiple monitoring under different conditions of intruders and non-intrusives. The number of missing samples of the data and the number of multiple false alarm samples.

接著,資料融合與決策裝置12可根據第i虛擬監控系統之多筆已知的第i監控資料與對應多筆已知的第i監控資料的多筆已知的第i偵測結果,透過 機器學習演算法、人工智慧演算法或其他求解模型的演算法(亦即,本發明不以求解模型的演算法之類行為限制)定義出第i監控資料與第i偵測結果之關係的偵測模型,其中i等於1至N的整數。之後,資料融合與決策裝置12根據第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之多筆第i監控資料的多個偵測漏失樣本數、多筆環境脈絡資料(用以取得多個位置的環境脈絡機率)、多個位置對應的多筆第i監控資料與第i虛擬監控系統的偵測模型估算出第i虛擬監控系統的第i偵測漏失機率;以及資料融合與決策裝置12根據第i虛擬監控系統的在對應多個位置、多筆環境脈絡資料且未有入侵者的條件下之多筆第i監控資料的多個錯誤告警樣本數、多筆環境脈絡資料(用以取得多個位置的環境脈絡機率)、多個位置對應的多筆第i監控資料與第i虛擬監控系統的偵測模型估算出第i虛擬監控系統的第i錯誤告警機率。 Then, the data fusion and decision making device 12 can transmit through the plurality of known i-th monitoring data of the i-th virtual monitoring system and the plurality of known i-th detecting results corresponding to the plurality of known i-th monitoring data. A machine learning algorithm, an artificial intelligence algorithm, or other algorithm for solving a model (that is, the present invention does not limit behavior such as solving a model) to define the relationship between the i-th monitoring data and the ith detection result. Test model, where i is equal to an integer from 1 to N. After that, the data fusion and decision-making apparatus 12 detects, according to the plurality of positions, multiple pieces of the i-th monitoring data of the i-th virtual monitoring system corresponding to the plurality of locations, the plurality of environmental context data, and the intruder. Environmental context data (to obtain the environmental context probability of multiple locations), multiple ith monitoring data corresponding to multiple locations, and detection model of the ith virtual monitoring system to estimate the ith detection loss of the ith virtual monitoring system The probability of the plurality of erroneous alarm samples of the plurality of ith monitoring data of the i-th virtual monitoring system under the condition of corresponding multiple locations, multiple environmental context data, and no intruders, Multiple environmental context data (to obtain the environmental context probability of multiple locations), multiple ith monitoring data corresponding to multiple locations, and detection model of the ith virtual monitoring system to estimate the ith error of the ith virtual monitoring system Alarm probability.

之後,資料融合與決策裝置12會根據第一至第N虛擬監控系統111~11N的第一至第N偵測漏失機率與第一至第N虛擬監控系統111~11N的第一至第N錯誤告警機率設置融合參數組,其中融合參數組係用以決定第一至第N虛擬監控系統111~11N之第一至第N偵測結果的融合方式。之後,資料融合與決策裝置12根據融合參數組與第一至第N虛擬監控系統111~11N之第一至第N偵測結果產生決策結果,以判斷是否有入侵者闖入。 Thereafter, the data fusion and decision making device 12 detects the first to Nth detection failure rate and the first to Nth errors of the first to Nth virtual monitoring systems 111 to 11N according to the first to Nth virtual monitoring systems 111 to 11N. The alarm probability setting fusion parameter group is used to determine the fusion manner of the first to Nth detection results of the first to Nth virtual monitoring systems 111~11N. Then, the data fusion and decision making device 12 generates a decision result according to the first to Nth detection results of the fusion parameter group and the first to Nth virtual monitoring systems 111-11N to determine whether an intruder breaks in.

舉例來說,第一至第N監控系統111~11N之第一至第N偵測結果的資料融合方式可以是透過邏輯運算函數來進行資料融合,且所述融合參數組可用來決定第一至第N監控系統111~11N之第一至第N偵測結果的邏輯運算函 數。例如,N為3,第一與第二偵測結果以邏輯「和」進行運算後,所獲得的運算結果再與第三偵測結果以邏輯「或」進行運算,從而得到決策結果。 For example, the data fusion manner of the first to the Nth detection results of the first to Nth monitoring systems 111 to 11N may be performed by using a logical operation function, and the fusion parameter group may be used to determine the first to Logical operation function of the first to Nth detection results of the Nth monitoring system 111~11N number. For example, if N is 3, the first and second detection results are logically ANDed, and the obtained operation result is logically ORed with the third detection result, thereby obtaining a decision result.

接著,進一步說明估算第i虛擬監控系統的第i偵測漏失機率與第i錯誤告警機率的細節如下。第i虛擬監控系統的第i偵測漏失機率可以表示為Mi,l k ʃʃ(1-R i,l (y i,k ))p(y i,k ,W m ,L k |H 1)dy i,k dW m (簡稱為公式一),其中變數i、k與l分別表示虛擬監控系統索引值、位置索引值與參數組索引值,變數L k 表示位置索引值k對應的位置,變數y i,k 表示第i虛擬監控系統於位置L k 所獲取的第i監控資料,函數R i,l (y i,k )表示第i虛擬監控系統採用第1參數組時基於第i監控資料y i,k 的第i偵測結果,函數R i,l (y i,k )可為1或0,以表示是否偵測到入侵者,變數H 1表示有入侵者侵入的條件,變數W m 表示環境脈絡資料的向量(其如前所述,可以例如是定義包括有溼度、風速、溫度與亮度等四個變量的天候資料),參數組索引值l是由位置L k 與環境脈絡資料W m 所決定,以及函數p(y i,k ,W m ,L k |H 1)表示在有入侵者侵入的條件下,第i虛擬監控系統在位置L k 、環境脈絡資料為W m 以及第i監控資料為y i,k 的聯合機率。 Next, the details of estimating the ith detection loss probability and the ith error warning probability of the i-th virtual monitoring system are further explained as follows. The ith detection and loss probability of the i-th virtual monitoring system can be expressed as M i,l k ʃʃ(1- R i,l ( y i,k )) p ( y i,k ,W m ,L k | H 1 ) dy i,k dW m (referred to as Formula 1 for short), wherein the variables i, k and l respectively represent the virtual monitoring system index value, the position index value and the parameter group index value, and the variable L k represents the position index value k corresponding to The position, the variable y i,k represents the i-th monitoring data acquired by the i-th virtual monitoring system at the position L k , and the function R i,l ( y i,k ) indicates that the i-th virtual monitoring system adopts the first parameter group based on the i monitors the ith detection result of the data y i,k , the function R i,l ( y i,k ) can be 1 or 0 to indicate whether an intruder is detected, and the variable H 1 indicates a condition in which an intruder invades The variable W m represents a vector of environmental context data (which may, for example, be defined as weather data including four variables such as humidity, wind speed, temperature, and brightness), and the parameter group index value l is determined by the position L k and The environmental context data W m is determined, and the function p ( y i,k , W m , L k | H 1 ) indicates that under the condition of intruder intrusion, the i-th virtual monitoring system is at the position L k and the environmental context data is W m and the i-th monitoring data are the joint probability of y i,k .

由於熱像系統與虛擬圍牆系統都可能因為周圍樹木之樹葉晃動而影響偵測結果,電子圍籬系統對於地下水或水坑敏感,而容易被影響,以及上述各實體監控系統執行不同演算法所對應產生的各虛擬監控系統也都對山坡地的地形很敏感。因此,上述公式一中的函數p(y i,k ,W m ,L k |H 1)可以簡化改寫為p(y i,k ,W m ,L k |H 1)=p(y i,k |H 1 ,W m ,L k )p(W m ,L k )(簡稱為公式二),其中函數p(y i,k |H 1 ,W m ,L k )在位置L k 、環境脈絡資料W m 且有入侵者的條件下,第i虛擬監 控之第i監控資料為y i,k 的機率,以及函數p(W m ,L k )表示位置L k 及環境脈絡資料W m 的機率(亦即位置L k 的環境脈絡機率)。 Since both the thermal image system and the virtual wall system may affect the detection results due to the sway of the surrounding trees, the electronic fence system is sensitive to groundwater or puddles and is easily affected, and the above-mentioned entity monitoring systems perform different algorithms. The resulting virtual surveillance systems are also sensitive to the terrain of the hillside. Therefore, the function p ( y i,k , W m , L k | H 1 ) in the above formula 1 can be simplified to be p ( y i,k , W m , L k | H 1 )= p ( y i, k | H 1 , W m , L k ) p ( W m , L k ) (referred to as formula 2), where the function p ( y i,k | H 1 , W m , L k ) is at position L k , environment Under the condition that the network data W m and there are intruders, the i-th monitoring data of the i-th virtual monitoring is the probability of y i,k , and the function p ( W m , L k ) represents the position L k and the environmental context data W m Probability (that is, the environmental systolic probability of position L k ).

由於變數p(W m ,L k )獨立於H 1之條件,因此將公式二代入公式一後,公式一可以改寫為(簡稱為公式三),其中是在位置L k 、環境脈絡資料W m 且有入侵者的條件下,第i虛擬監控系統之第i監控資料y i,k 的期望值。 Since the variable p ( W m , L k ) is independent of the condition of H 1 , after formula 2 is substituted into formula 1, formula 1 can be rewritten as (referred to as formula 3), among them The expected value of the i-th monitoring data y i,k of the i-th virtual monitoring system under the condition of the location L k , the environmental context data W m and the intruder.

接著,利用樣本數近似於期望值的統計概念,公式三可以改寫為(簡稱為公式四),其中是在位置L k 、環境脈絡資料W m 且有入侵者的條件下之第i虛擬監控系統的第i監控資料y i,k 的偵測漏失樣本數。 Then, using the statistical concept that the number of samples approximates the expected value, Equation 3 can be rewritten as (referred to as Formula 4), where The number of detected missing samples of the i-th monitoring data y i,k of the i-th virtual monitoring system under the condition of the location L k , the environmental context data W m and the intruder.

由於無法根據第i虛擬監控系統的第i監控資料y i,k 得知第i偵測結果R i,l (y i,k ),因此,透過機器學習演算法、人工智慧演算法或其他求解模型的演算法,基於已知的第i監控資料y i,k 與已知的對應偵測結果R i,l (y i,k ),可以定義出第i監控資料y i,k 與第i測結果R i,l (y i,k )的偵測模型,亦即可以知悉函數R i,l (y i,k )的模型。接著,透過公式四,便能夠基於第i虛擬監控系統的偵測模型,根據環境脈絡資料W m (可以透過統計知悉位置L k 的環境機率)、位置L k 、在位置L k 、環境脈絡資料W m 且有入侵者的條件下之第i虛擬監控系統的第i監控資料y i,k 的偵測漏失樣本數及各位置L k 的第i監控資料y i,k 算出第i虛擬監控系統的第i偵測漏失機率。 Since the i-th detection result R i,l ( y i,k ) cannot be obtained from the i-th monitoring data y i,k of the i-th virtual monitoring system, the machine learning algorithm, the artificial intelligence algorithm or other solution is obtained. The algorithm of the model can define the i-th monitoring data y i,k and the i-th based on the known i-th monitoring data y i,k and the known corresponding detection result R i,l ( y i,k ) measurement results R i, l (y i, k) of the detection model, i.e., can know the function R i, l (y i, k) of the model. Then, through Equation 4, based on the detection model of the i-th virtual monitoring system, according to the environmental context data W m (the environmental probability of the position L k can be statistically learned), the position L k , the position L k , the environmental context data The number of detected missing samples of the i-th monitoring data y i,k of the i-th virtual monitoring system under the condition of W m and intruder And the i-th monitoring data y i,k of each position L k calculates the ith detection leakage probability of the i-th virtual monitoring system.

同樣地,第i虛擬監控系統的第i錯誤告警機率可以表示為Fi,l k ʃʃR i,l (y i,k )p(y i,k ,W m ,L k |H 0)dy i,k dW m (簡稱為公式五),其中函數 p(y i,k ,W m ,L k |H 0)表示在未有入侵者侵入的條件下,第i虛擬監控系統在位置L k 、環境脈絡資料W m 及第i監控資料為y i,k 的聯合機率,以及變數H 0表示未有入侵者侵入的條件。基於類似的推導方式,公式五可以因此簡化為Mi,l k ʃ Ri,l (y i,k )p(W m ,L k )dW m (簡稱為公式六),其中是在位置L k 、環境脈絡資料W m 且未有入侵者的條件下之第i虛擬監控系統的第i監控資料本平均數。 Similarly, the ith error alarm probability of the ith virtual monitoring system can be expressed as F i,l k ʃʃ R i,l ( y i,k ) p ( y i,k ,W m ,L k | H 0 ) dy i,k dW m (abbreviated as Equation 5), where the function p ( y i,k , W m , L k | H 0 ) indicates that the i-th virtual monitoring system is in position without intruder intrusion L k , the environmental context data W m and the i-th monitoring data are the joint probability of y i,k , and the variable H 0 indicates the condition that no intruder invades. Based on a similar derivation, Equation 5 can therefore be reduced to M i,l k ʃ Ri,l ( y i,k ) p ( W m ,L k ) dW m (referred to as formula 6), wherein The average number of the i-th monitoring data of the i-th virtual monitoring system under the condition of the location L k , the environmental context data W m and no intruders.

接著,透過公式六,便能夠基於第i虛擬監控系統的偵測模型,根據環境脈絡資料W m (可以透過統計知悉位置L k 的環境機率)、位置L k 、在位置L k 、環境脈絡資料W m 且未有入侵者的條件下之第i虛擬監控系統的第i監控資料y i,k 的錯誤告警樣本數及各位置L k 的第i監控資料y i,k 算出第i虛擬監控系統的錯誤告警機率。在獲得第1至第N虛擬監控系統111~11N的第1至第N偵測漏失機率與第1至第N錯誤告警機率後,便能夠根據需求基於算出來的第1至第N偵測漏失機率與第1至第N錯誤告警機率來決定融合參數組,且接著基於融合參數組將第1至第N虛擬監控系統111~11N的第1至第N偵測結果進行融合,以產生決策結果。如此,可以在不改變現有實體監控系統的情況下,利用至少一實體監控系統執行不同演算法所形成之各虛擬監控系統的偵測結果來產生更為精確的決策結果,從而降低基於資料融合的安全監控系統1整體的偵測漏失與錯誤告警機率。 Then, through Equation 6, the detection model based on the ith virtual monitoring system can be used, according to the environmental context data W m (the environmental probability of the location L k can be statistically learned), the position L k , the position L k , the environmental context data Number of false alarm samples of the i-th monitoring data y i,k of the i-th virtual monitoring system under the condition of W m and no intruder And the i-th monitoring data y i,k of each position L k calculates the false alarm probability of the i-th virtual monitoring system. After obtaining the first to Nth detection leakage probability and the first to Nth false alarm probability of the first to Nth virtual monitoring systems 111 to 11N, the first to Nth detection errors can be calculated based on the demand. The probability and the first to Nth false alarm probability determine the fusion parameter set, and then merge the first to Nth detection results of the first to Nth virtual monitoring systems 111~11N based on the fusion parameter group to generate a decision result. . In this way, the detection result of each virtual monitoring system formed by different algorithms can be generated by at least one entity monitoring system without changing the existing entity monitoring system to generate more accurate decision results, thereby reducing data fusion. The overall security detection system 1 detects the loss and the probability of false alarms.

接著,請參照圖2與圖3,圖2是本發明實施例的基於資料融合的安全監控方法的流程圖,圖3是本發明實施例的資料融合與決策裝置的方塊圖。 圖2的基於資料融合的安全監控方法可以透過如圖1的資料融合與決策裝置12來實現,且資料融合與決策裝置12可以透過圖3的資料融合與決策裝置3來實現。 2 and FIG. 3, FIG. 2 is a flowchart of a data fusion-based security monitoring method according to an embodiment of the present invention, and FIG. 3 is a block diagram of a data fusion and decision device according to an embodiment of the present invention. The data fusion based security monitoring method of FIG. 2 can be implemented by the data fusion and decision device 12 of FIG. 1, and the data fusion and decision device 12 can be implemented by the data fusion and decision device 3 of FIG.

圖3的資料融合與決策裝置3透過多個硬體電路(或者由硬體電路配合軟體)的組態,而包括偵測模型定義單元31、機率估算單元32、融合參數設定單元33與決策單元34,其中偵測模型定義單元31連接機率估算單元32,機率估算單元32連接融合參數設定單元33,以及融合參數設定單元33連接決策單元34。 The data fusion and decision device 3 of FIG. 3 is configured by a plurality of hardware circuits (or a hardware circuit), and includes a detection model definition unit 31, a probability estimation unit 32, a fusion parameter setting unit 33, and a decision unit. 34, wherein the detection model definition unit 31 is connected to the probability estimation unit 32, the probability estimation unit 32 is connected to the fusion parameter setting unit 33, and the fusion parameter setting unit 33 is connected to the decision unit 34.

首先,在步驟S201,偵測模型定義單元31定義第一至第N虛擬監控系統的多筆已知之第一至第N監控資料與對應多筆已知之第一至第N監控資料的多筆已知之第一至第N偵測結果。然後,在步驟S202中,偵測模型定義單元31用以求解模型的演算法(例如,透過機器學習演算法、人工智慧演算法或其他求解模型的演算法)定義第一至第N監控制系統的偵測模型,其中第i虛擬監控系統的偵測模型是基於多筆已知之第i監控資料與對應的多筆已知之第i偵測結果而獲得。 First, in step S201, the detection model definition unit 31 defines a plurality of known first to Nth monitoring data of the first to Nth virtual monitoring systems and a plurality of corresponding first to Nth monitoring materials. Know the first to the Nth detection results. Then, in step S202, the detection model definition unit 31 defines the first to the Nth monitoring system for solving the model's algorithm (for example, through a machine learning algorithm, an artificial intelligence algorithm, or other algorithms for solving the model). The detection model, wherein the detection model of the i-th virtual monitoring system is obtained based on a plurality of known i-th monitoring data and corresponding plurality of known i-th detection results.

然後,在步驟S203中,機率估算單元32根據多筆環境脈絡資料(可以透過統計知悉各位置的環境機率)、多個位置對應的多筆第i監控資料、第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之多筆第i監控資料的多個偵測漏失樣本數與第i虛擬監控系統的偵測模型來估算出第i虛擬監控系統的第i偵測漏失機率,以及根據多筆環境脈絡資料(可以透過統計知悉各位置的環境脈絡機率)、多個位置對應的多筆第i監控資料、第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且未有入侵者的條件下之多筆第i監控資料的多 個錯誤告警樣本數與第i虛擬監控系統的偵測模型來算出第i虛擬監控系統的第i錯誤告警機率。 Then, in step S203, the probability estimating unit 32 responds to the plurality of environmental context data (the environmental probability of each location can be known through statistics), the plurality of i-th monitoring data corresponding to the plurality of locations, and the i-th virtual monitoring system. Position, multiple environmental context data, and multiple detection samples of the i-th monitoring data under the condition of the intruder and the detection model of the i-th virtual monitoring system to estimate the i-th virtual monitoring system Detecting the probability of missed, and according to multiple environmental context data (which can be used to know the environmental context probability of each location through statistics), multiple ith monitoring data corresponding to multiple locations, and the i-th virtual monitoring system corresponding to multiple locations and multiple pens Environmental context data and more than the number of i-monitoring data under the conditions of intruders The number of error alarm samples and the detection model of the i-th virtual monitoring system are used to calculate the probability of the ith error alarm of the i-th virtual monitoring system.

然後,在步驟S204中,融合參數設定單元33用以根據估算出來的第i至第N虛擬監控系統的第i至第N偵測漏失機率與第i至第N錯誤告警機率設置融合參數組。然後,在步驟S205中,決策單元34依據融合參數組將第i至第N虛擬監控系統的第i至第N偵測結果進行資料的融合,以產生決策結果。 Then, in step S204, the fusion parameter setting unit 33 is configured to set the fusion parameter group according to the estimated i-th to N-th detection leakage probability and the i-th to Nth false alarm probability of the i-th to N-th virtual monitoring systems. Then, in step S205, the determining unit 34 performs data fusion of the i-th to N-th detection results of the i-th to N-th virtual monitoring systems according to the fusion parameter group to generate a decision result.

據此,透過本發明實施例提供的基於資料融合的安全監控系統與方法可以在無須增設實體監控系統的情況下,利用現有的至少一實體監控系統執行不同演算法所形成之多個虛擬監控系統的多個偵測結果,進行多個偵測結果的資料融合,從而產生決策結果,以減少整體的偵測漏失機率與錯誤告警機率。換言之,基於資料融合的安全監控系統與方法提供了一種低成本之減少整體偵測漏失機率與錯誤告警機率的技術方案。 Accordingly, the data fusion-based security monitoring system and method provided by the embodiments of the present invention can perform multiple virtual monitoring systems formed by different algorithms by using at least one physical monitoring system without adding an entity monitoring system. Multiple detection results, data fusion of multiple detection results, resulting in decision-making results, to reduce the overall detection of missed probability and false alarm probability. In other words, the data fusion-based security monitoring system and method provides a low-cost technical solution for reducing the overall detection loss probability and false alarm probability.

本發明在上文中已以較佳實施例揭露,然熟習本項技術者應理解的是,上述實施例僅用於描繪本發明,而不應解讀為限制本發明之範圍。應注意的是,舉凡與前述實施例等效之變化與置換,均應設為涵蓋於本發明之範疇內。因此,本發明之保護範圍當以申請專利範圍所界定者為準。 The present invention has been disclosed in its preferred embodiments, and it should be understood by those skilled in the art that the present invention is not intended to limit the scope of the invention. It should be noted that variations and permutations equivalent to those of the foregoing embodiments are intended to be included within the scope of the present invention. Therefore, the scope of protection of the present invention is defined by the scope of the patent application.

Claims (10)

一種基於資料融合的安全監控系統,包括:一第一至第N虛擬監控系統,其中一個或多個實體監控系統執行不同的多個演算法以形成該第一至第N虛擬監控系統,且N大於等於2;以及一資料融合與決策裝置,連結該第一至第N虛擬監控系統,用以定義該第一至第N虛擬監控系統的一第一至第N偵測模型,其中第i偵測模型用以表示該第i虛擬監控系統之多筆第i監控資料與對應該等多筆第i監控資料之多個第i偵測結果之間的關係,其中i為1至N的整數;其中該資料融合與決策裝置根據該第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之該等多筆第i監控資料的多個偵測漏失樣本數、該第i偵測模型、該第i虛擬監控系統之該等位置的該等多筆第i監控資料與該等多筆環境脈絡資料估算出該第i虛擬監控系統的一第i偵測漏失機率;該資料融合與決策裝置根據該第一至第N偵測漏失機率決定一融合參數組;以及該資料融合與決策裝置根據該融合參數組將該第一至第N虛擬監控系統之一第一至第N偵測結果進行資料融合,以產生一決策結果。 A data fusion-based security monitoring system includes: a first to an Nth virtual monitoring system, wherein one or more entity monitoring systems execute different multiple algorithms to form the first to Nth virtual monitoring systems, and And greater than or equal to 2; and a data fusion and decision making device, connecting the first to Nth virtual monitoring systems for defining a first to Nth detection model of the first to Nth virtual monitoring systems, wherein the i-th detecting The measurement model is used to indicate the relationship between the plurality of i-th monitoring data of the i-th virtual monitoring system and the plurality of i-th detecting results corresponding to the plurality of i-th monitoring data, wherein i is an integer from 1 to N; The data fusion and decision-making apparatus according to the ith virtual monitoring system, the number of the plurality of detected erroneous samples of the plurality of ith monitoring data under the condition of corresponding multiple locations, multiple environmental context data, and an intruder, The ith detection model, the plurality of ith monitoring data at the locations of the ith virtual monitoring system, and the plurality of environmental context data estimates an ith detection loss probability of the ith virtual monitoring system ; the data fusion and decision The device determines a fusion parameter group according to the first to Nth detection loss probability rates; and the data fusion and decision device detects the first to Nth detections of the first to Nth virtual monitoring systems according to the fusion parameter group The results were fused to produce a decision result. 如請求項第1項所述之基於資料融合的安全監控系統,其中該資料融合與決策裝置更根據該第i虛擬監控系統在對應該等位置、該等環境脈絡資料且未有入侵者的條件下之該等多筆第i監控資料的多個錯誤告警樣本數、該第i偵測模型、該第i虛擬監控系統之該 等位置的該等多筆第i監控資料與該等多筆環境脈絡資料估算出該第i虛擬監控系統的一第i錯誤告警機率;以及該資料融合與決策裝置根據該第一至第N偵測漏失機率與該第一至第N錯誤告警機率決定該融合參數組。 The data fusion-based security monitoring system according to Item 1, wherein the data fusion and decision-making device is further configured according to the condition of the i-th virtual monitoring system corresponding to the environment context data and the intruder. The number of the plurality of erroneous alarm samples of the plurality of ith monitoring data, the ith detection model, and the ith virtual monitoring system The plurality of ith monitoring data of the equal position and the plurality of environmental context data estimates an ith error warning probability of the ith virtual monitoring system; and the data fusion and decision device according to the first to Nth Detecting The measurement failure rate and the first to Nth false alarm probability determine the fusion parameter set. 如請求項第1項所述之基於資料融合的安全監控系統,其中基於獲取之該第i虛擬監控系統之多筆已知的監控資料與對應該等多筆已知的監控資料的多筆已知之偵測結果基於一機器學習演算法或一人工智慧演算法定義該第i偵測模型。 The data fusion-based security monitoring system of claim 1, wherein the plurality of known monitoring data obtained by the ith virtual monitoring system and the plurality of known monitoring materials corresponding to the plurality of The detection result is based on a machine learning algorithm or an artificial intelligence algorithm to define the i-th detection model. 如請求項第1項所述之基於資料融合的安全監控系統,其中進行資料融合的方式為透過一邏輯運算函數、一可靠度規則或一環境規則來進行資料融合,且該融合參數組用以決定該邏輯運算函數、該可靠度規則或該環境規則。 The data fusion-based security monitoring system of claim 1, wherein the data fusion is performed by using a logical operation function, a reliability rule or an environmental rule, and the fusion parameter group is used. The logical operation function, the reliability rule, or the environmental rule is determined. 如請求項第1項所述之基於資料融合的安全監控系統,其中該等多筆環境脈絡資料的每一者係為定義有雨量、風力、溫度與亮度等變量的一天候資料。 The data fusion-based security monitoring system of claim 1, wherein each of the plurality of environmental context data is a one-day data defining variables such as rainfall, wind, temperature, and brightness. 一種基於資料融合的安全監控方法,包括:定義一第一至第N虛擬監控系統的一第一至第N偵測模型,其中一個或多個實體監控系統執行不同的多個演算法以形成該第一至第N虛擬監控系統,第i偵測模型用以表示該第i虛擬監控系統之多筆第i監控資料與對應該等多筆第i監控資料之多個第i偵測結果之間的關係,其中i為1至N的整數,以及N大於等於2; 根據該第i虛擬監控系統在對應多個位置、多筆環境脈絡資料且有入侵者的條件下之該等多筆第i監控資料的多個偵測漏失樣本數、該第i偵測模型、該第i虛擬監控系統之該等位置的該等多筆第i監控資料與該等多筆環境脈絡資料估算出該第i虛擬監控系統的一第i偵測漏失機率;根據該第一至第N偵測漏失機率決定一融合參數組;以及根據該融合參數組將該第一至第N虛擬監控系統之一第一至第N偵測結果進行資料融合,以產生一決策結果。 A data fusion-based security monitoring method includes: defining a first to Nth detection models of a first to an Nth virtual monitoring system, wherein one or more entity monitoring systems execute different multiple algorithms to form the The first to the Nth virtual monitoring system, the ith detection model is configured to indicate between the plurality of i-th monitoring data of the i-th virtual monitoring system and the plurality of i-th detecting results corresponding to the plurality of i-th monitoring data Relationship, where i is an integer from 1 to N, and N is greater than or equal to 2; According to the ith virtual monitoring system, the plurality of Detected Missing samples, the ith detection model, and the plurality of ith monitoring data, corresponding to the plurality of locations, the plurality of environmental context data, and the intruder The plurality of ith monitoring data at the locations of the i-th virtual monitoring system and the plurality of environmental context data estimates an ith detection probability of the ith virtual monitoring system; according to the first to the first The N detection miss rate determines a fusion parameter group; and the first to Nth detection results of the first to Nth virtual monitoring systems are data fusion according to the fusion parameter group to generate a decision result. 如請求項第6項所述之基於資料融合的安全監控方法,更包括:根據該第i虛擬監控系統的在對應該等位置、該等多筆環境脈絡資料且未有入侵者的條件下之該等多筆第i監控資料的多個錯誤告警樣本數、該第i偵測模型、該第i虛擬監控系統之該等位置的該等多筆第i監控資料與該等多筆環境脈絡資料估算出該第i虛擬監控系統的一第i錯誤告警機率,其中該融合參數組係根據該第一至第N偵測漏失機率與該第一至第N錯誤告警機率而被決定。 The data fusion-based security monitoring method according to Item 6 of the claim further includes: according to the ith virtual monitoring system, corresponding to the location, the plurality of environmental context data, and no intruder The plurality of erroneous alarm samples of the plurality of ith monitoring data, the ith detection model, the plurality of ith monitoring data of the ith virtual monitoring system, and the plurality of environmental context data An ith error alarm probability of the ith virtual monitoring system is estimated, wherein the fused parameter set is determined according to the first to Nth detection loss probability and the first to Nth false alarm probability. 如請求項第6項所述之基於資料融合的安全監控方法,其中基於獲取之該第i虛擬監控系統之多筆已知的監控資料與對應該等多筆已知的監控資料的多筆已知之偵測結果基於基於一機器學習演算法或一人工智慧演算法定義該第i偵測模型。 The data fusion-based security monitoring method according to Item 6 of the claim, wherein the plurality of known monitoring data of the ith virtual monitoring system obtained and the plurality of known monitoring materials corresponding to each other are obtained. The detection result is based on defining the i-th detection model based on a machine learning algorithm or an artificial intelligence algorithm. 如請求項第6項所述之基於資料融合的安全監控方法,其中進行資料融合的方式為透過一邏輯運算函數、一可靠度規則或一環境 規則來進行資料融合,且該融合參數組用以決定該邏輯運算函數、該可靠度規則或該環境規則。 The data fusion-based security monitoring method according to Item 6 of the claim, wherein the data fusion is performed by using a logical operation function, a reliability rule or an environment. The rules are used for data fusion, and the fusion parameter set is used to determine the logical operation function, the reliability rule or the environment rule. 如請求項第6項所述之基於資料融合的安全監控方法,其中該等多筆環境脈絡資料的每一者係為定義有雨量、風力、溫度與亮度等變量的一天候資料。 The data fusion-based security monitoring method of claim 6, wherein each of the plurality of environmental context data is a one-day data defining variables such as rainfall, wind, temperature, and brightness.
TW107103279A 2018-01-30 2018-01-30 Data fusion based safety surveillance system and method TWI647664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107103279A TWI647664B (en) 2018-01-30 2018-01-30 Data fusion based safety surveillance system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107103279A TWI647664B (en) 2018-01-30 2018-01-30 Data fusion based safety surveillance system and method

Publications (2)

Publication Number Publication Date
TWI647664B true TWI647664B (en) 2019-01-11
TW201933293A TW201933293A (en) 2019-08-16

Family

ID=65803775

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107103279A TWI647664B (en) 2018-01-30 2018-01-30 Data fusion based safety surveillance system and method

Country Status (1)

Country Link
TW (1) TWI647664B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI387869B (en) * 2009-09-10 2013-03-01 Ind Tech Res Inst Industrial module apparatus
CN104808197A (en) * 2015-05-06 2015-07-29 四川九洲空管科技有限责任公司 Multi-surveillance-source flying target parallel track processing method
CN107067019A (en) * 2016-12-16 2017-08-18 上海交通大学 Based on the ADS B under variation Bayesian Estimation and TCAS data fusion methods

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI387869B (en) * 2009-09-10 2013-03-01 Ind Tech Res Inst Industrial module apparatus
CN104808197A (en) * 2015-05-06 2015-07-29 四川九洲空管科技有限责任公司 Multi-surveillance-source flying target parallel track processing method
CN107067019A (en) * 2016-12-16 2017-08-18 上海交通大学 Based on the ADS B under variation Bayesian Estimation and TCAS data fusion methods

Also Published As

Publication number Publication date
TW201933293A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN110084165B (en) Intelligent identification and early warning method for abnormal events in open scene of power field based on edge calculation
CN113645232B (en) Intelligent flow monitoring method, system and storage medium for industrial Internet
CN110414400B (en) Automatic detection method and system for wearing of safety helmet on construction site
CN102673979B (en) Method and device for judging deviation of conveying belt
US20210124914A1 (en) Training method of network, monitoring method, system, storage medium and computer device
CN109886117A (en) A kind of method and apparatus of goal behavior detection
CN104658152A (en) Video-based moving object intrusion alarm method
CN108229524A (en) A kind of chimney and condensing tower detection method based on remote sensing images
CN104463253A (en) Fire fighting access safety detection method based on self-adaptation background study
CN105469054A (en) Model construction method of normal behaviors and detection method of abnormal behaviors
CN111931573A (en) Helmet detection and early warning method based on YOLO evolution deep learning model
Buemi et al. Efficient fire detection using fuzzy logic
TWI647664B (en) Data fusion based safety surveillance system and method
US10509968B2 (en) Data fusion based safety surveillance system and method
CN111460917B (en) Airport abnormal behavior detection system and method based on multi-mode information fusion
CN117009903A (en) Data anomaly detection method, device, equipment and storage medium
CN110751014A (en) Flame detection system and method
CN113596064B (en) Analysis control method and system for security platform
CN105451235A (en) Wireless sensor network intrusion detection method based on background updating
CN110782431B (en) High-voltage wire icing area detection method based on deep learning
CN110855467B (en) Network comprehensive situation prediction method based on computer vision technology
CN109246691B (en) Intrusion detection method based on channel impulse response
CN113627284B (en) Real-time flame detection method and device based on improved CenterNet
Bin et al. Design of power intelligent safety supervision system based on deep learning
CN110309838A (en) Video detection area contour of object based on exponential transform detects preprocess method