Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

49results about How to "Implement intrusion detection" patented technology

Intelligent video analyzing method for pedestrians crossing zebra stripes

InactiveCN104091446AStrong deterrenceEliminate the herd mentalityControl with pedestrian guidance indicatorDetection of traffic movementGreen-lightAnalysis method
The invention discloses an intelligent video analyzing method for pedestrians crossing zebra stripes. The intelligent video analyzing method comprises the following steps that (1) a video analyzing system is arranged near the zebra stripes and is started regularly at preset time points, and cameras collect video information data in real time and transmit the video information data to a video analyzer; (2) the video analyzer analyzes the video information data and judges states of traffic lights, the intruder alarming function of an intelligent alarming module is started if the red light is turned on, and the prompt information playing function of the intelligent alarming module is started if the green light or the yellow light is turned on; (3) the video analyzing system is closed at preset time points, and the video information data of the day are stored before the video analyzing system is closed. By means of the scheme, the unique intelligent video analyzing method for the urban zebra stripe traffic lights and the moving pedestrians is achieved, the intrusion on the pedestrians crossing the zebra stripes is detected when the red light is turned on, and intelligent audio and video alarming is conducted according to detecting results.
Owner:厦门磐联科技有限公司

Method for intrusion detection based on wireless signal characters

The invention relates to a method for intrusion detection based on wireless signal characters, and belongs to the field of security and protection technology and wireless network application. According to the method for the intrusion detection, the state that whether object intrusion exists or not can be detected through the influence on the wireless link signal strength from an intrusion object. According to the intrusion detection algorithm, the signal strength information of all wireless links serves as input information, whether intrusion exists or not can be detected through the two-dimensional statistical properties of the mean value and the variance of the signal strength information. A system in which the method is adopted is composed of wireless scanning nodes, a wireless aggregation node, a general PC and the intrusion detection algorithm. The intrusion detection algorithm is installed in the general PC, and the wireless scanning nodes, the wireless aggregation node and the general PC are communicated wirelessly. The method is suitable for intrusion detection at wall shielding, dark environment and other severe environments. Whether a target intrudes or not can be detected through the change, caused by the fact that the intrusion object shields a wireless signal, of the wireless link signal strength.
Owner:DALIAN UNIV OF TECH

Perimeter defense system based on wireless sensor network

The invention discloses a perimeter defense system based on a wireless sensor network. The perimeter defense system comprises a wireless monitoring node, a sensor network central control node, a monitoring central server and a portable monitoring terminal. Information collected by the wireless monitoring node through an external expanded sensor and the collected information is sent to the sensor network central control node by the wireless monitoring node in a wireless mode; the sensor network central control node is used for building wireless communication networks, receiving the information sent by the wireless monitoring node and processing the information by utilizing a data diffusion method, and transmitting the processed monitoring data to the monitoring central server in a wired mode; the monitoring central server is used for storing and analyzing the monitoring data and displaying monitoring information, when a defended object is invaded, the monitoring central server alarms and sends the monitoring information and alarm information to the portable monitoring terminal in the wireless mode; and the portable monitoring terminal visits data in the monitoring central server in the wireless mode. The perimeter defense system based on the wireless sensor network has the advantages of being low in cost, low in power consumption, flexible in arrangement, wide in monitoring surface and good in applicability.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Intrusion detection and location method of distributed fiber optic fence based on φ-otdr

InactiveCN102280001AIntrusion detectionDefensiveBurglar alarmDistributed intrusion detectionFiber
The invention discloses a distributed optical fiber fence intrusion detection and location method based on a phi-OTDR (Optical Time Domain Reflectometer), and the method comprises the following steps of: firstly, subtracting an acquired ith signal by an acquired (i-1)th signal to obtain a preprocessing monitoring signal; secondly, carrying out at least four-layer wavelet decomposition on the preprocessing monitoring signal by adopting a plurality of wavelet functions; thirdly, judging whether actual intrusion exists according to the consistency of distribution positions of maximum-wavelet mode maximums in all scale signals; fourthly, judging that the actual intrusion exists if the distribution positions of the maximum-wavelet mode maximums in at least three scale signals are consistent; fifthly, corresponding multiplying the scale signals in which the intrusion exists and the distribution positions of the maximum-wavelet mode maximums are consistent to obtain a composite signal of which pseudo maximums are inhibited and mode maximums at a catastrophe point are enhanced, using a position corresponding to the maximum-mode maximum in the composite signal as a position of the determined intrusion point, determining the intrusion generation and the intrusion position by combining various composite signal judgment results of wavelet multi-scale analysis according to the majority voting criterion.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Intelligent power grid foreign matter intrusion detection method and system based on visual perception

The invention discloses an intelligent power grid foreign matter intrusion detection method and system based on visual perception. According to the method, intelligent power grid foreign matter intrusion detection is completed based on intelligent power grid video monitoring data and an intrusion object detection model; the construction method of the intrusion object detection model comprises thefollowing steps: step 1, carrying out multi-level feature extraction on input video frames with a sequential relationship to generate a high-order feature map and a low-order feature map; step 2, performing feature fusion by utilizing the up-sampling of the feature map and the cascade operation of the feature map along the channel dimension direction; 3, using a self-attention mechanism, and obtaining processed features; 4, obtaining a binary classification result and a coordinate position of the object belonging to the target or the background through a cascade module; and step 5, outputtinga pixel-level classification result by using a classifier to realize pixel-level detection. According to the invention, the pixel-level classification task of foreign matter intrusion detection of thesmart power grid can be completed, and the technical problem of model precision in the prior art can be solved.
Owner:STATE GRID SHAANXI ELECTRIC POWER RES INST +2

Full-tunnel safety monitoring system and implementation method

The invention relates to a full-tunnel safety monitoring system. The system comprises a GPS system and an optical fiber strain monitoring system which are electrically connected with a data acquisition center, and a strain monitoring optical cable which is electrically connected with the optical fiber strain monitoring system and is buried below a tunnel monitoring area. The optical fiber strain monitoring system is an optical fiber analyzer, and the GPS system is used for monitoring the overall settlement of a tunnel. The optical fiber strain monitoring system realizes tunnel omnibearing strain monitoring through continuous optical cables and provides accurate positioning, the measured deformation is relative deformation, and deformation quantities can be accumulated. The system has highmonitoring precision, the early warning of large accident deformation of the tunnel can be achieved, the tunnel deformation direction can be judged, the intelligent degree is high, an abnormal condition can be accurately positioned, various means for alarming can be realized, the monitoring service life is long, the monitoring in the whole life cycle of the tunnel can be realized, the maintenancecost is low, and the later maintenance is nearly zero.
Owner:LASER RES INST OF SHANDONG ACAD OF SCI

Optical fiber intrusion detection method based on space-time two-dimensional sparse representation k-s test of vibration signal

The invention provides a fiber intrusion detection method using time-space 2D sparseness of vibration signals to represent K-S test, and aims at a fiber intrusion early-warning system. The method comprises CFAR (Constant False Alarm Rate) detection is carried out on signals of different positions via the CFAR, time-domain K-S test is carried out on data, over-threshold CFAR data is grouped to obtain time-domain to-be-tested data sets, the time interval between data in each time-domain to-be-tested data set is compared with that of prior interference intrusion signals via K-S test, if distribution of the time interval is the same, the detected data set includes interference intrusion signals, and if distribution is different, amplitude K-S test is carried out, namely, the amplitude of data in each time-domain to-be-tested data set is compared with that of the prior interference intrusion signals via K-S test, if distribution of the amplitude is the same, the detected data set is an interference intrusion group, and otherwise, the set is a potential harmful intrusion group. The method detects the intrusion signals in the space-time 2D manner, influence of interference intrusion can rejected, and potential harmful intrusion information is obtained.
Owner:NORTH CHINA UNIVERSITY OF TECHNOLOGY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products