Unlock instant, AI-driven research and patent intelligence for your innovation.

Identification method of optical fiber perimeter security intrusion events based on hybrid feature extraction

A technology of optical fiber perimeter security and mixed features, which is applied in anti-theft alarms, anti-theft alarm mechanical start-ups, alarms that rely on broken/disturbed straightened ropes/metal wires, etc., can solve problems such as reducing efficiency, and avoid The effect of false alarm phenomenon, high recognition accuracy and high recognition efficiency

Inactive Publication Date: 2018-07-20
TIANJIN UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in order to obtain each intrinsic mode function, the EMD method has to go through multiple iterations, thus generating a huge amount of calculation and reducing the efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method of optical fiber perimeter security intrusion events based on hybrid feature extraction
  • Identification method of optical fiber perimeter security intrusion events based on hybrid feature extraction
  • Identification method of optical fiber perimeter security intrusion events based on hybrid feature extraction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with the drawings:

[0041] First, a brief description of the hardware implementing the present invention: figure 1 As shown, the signal x(t) to be filtered is first detected by the endpoint to determine the starting point of the event. From the starting point, the signal for a later period of time is sent to the A / D (analog-to-digital converter) for sampling to obtain the sample sequence x (n), enter the DSP device in the form of parallel data input, and set the filter order N, the number of 0 and 1 in the frequency vector H, e and λ, and process them through the internal algorithm of the DSP device (including input data x( n) All-phase preprocessing and convolution window, Q filter coefficient vectors h 0 …H Q-1 , Get the filtered output y of the signal 0 …Y Q-1 , And then get the feature vector F, and finally SVM support vector machine to identify 4 different infringement actions).

[0042] among them, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying opening fiber surrounding security invasion events based on mixed characteristic extraction. The method ensures both high precision and high efficiency, and includes the steps of conducting end point detection for incoming signals, determining a disturbance starting point, parallellly feeding signals after the starting point being triggered to each channel of a filter for pretreatment, calculating the kurtosis value of each channel according to the output of each channel, forming mixed characteristic vectors by combining the zero-crossing rate of the disturbance signals, and feeding the vectors into SVM for mode identification. Invasion action can be classified and identified rapidly and efficiently.

Description

Technical field [0001] The invention belongs to the technical field of digital signal processing, and specifically relates to a method for accurately identifying intrusion events in a DMZI optical fiber perimeter security system. Background technique [0002] With the continuous maturity of optical fiber and optical fiber communication technology [1], the application of optical fiber sensors [2] has developed rapidly. Perimeter security systems based on optical fiber sensing technology [3] are also gradually being valued in the security field. Compared with traditional security systems such as infrared [4], electronic fences [5] and lasers [6], optical fiber sensing systems are more sensitive to pressure and vibration, and have the functions of sensing and signal transmission. Various disturbances indirectly transmitted to the optical fiber are monitored in real time, and the tiny vibrations on the sensing optical fiber are converted into electrical signals and transmitted to th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/12
CPCG08B13/124
Inventor 黄翔东王越冬刘铁根刘琨
Owner TIANJIN UNIV