Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics

A technology of optical fiber perimeter security and identification method, which is applied to pattern recognition in signals, character and pattern recognition, computer parts and other directions, can solve the problems of lack of time domain information, affect practicability, and low recognition efficiency, and achieve the characteristics of Vector-reduced, high-accuracy effects

Inactive Publication Date: 2017-09-19
TIANJIN UNIV
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Among them, although the wavelet identification method proposed in literature [14] can be characterized by the energy of different frequency bands obtained by multi-level decomposition, the eigenvector [17] , but the amount of calculation will increase with the increase of the number of wavelet decomposition layers. In addition, the feature vector only considers the frequency domain features and lacks sufficient and rich time domain information, so the recognition accuracy is low, and only three types of intrusions can be recognized event;
[0005] However, the Empirical Mode Decomposition (EMD) method proposed in literature [16] needs to obtain the kurtosis value of the intrinsic mode function (IMF) in the decomposition process one by one, and the kurtosis value obtained by combining these kurtosis values Four types of common actions can be recognized with high precision by classifying the feature vectors. However, these IMFs need to go through multiple complex iterations to obtain, so the recognition efficiency is not high and affects the practicability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics
  • Fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics
  • Fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The embodiment of the present invention takes the dual Mach-Zehnder distributed optical fiber sensing system as the background, and proposes an intrusion event recognition method based on comprehensive features, see figure 1 , the method includes the following steps:

[0048] 101: Perform endpoint detection on the input disturbance signal, and determine the disturbance starting point;

[0049] 102: Feed the signal that determines the starting point of the disturbance into the all-phase filter bank [18][19][20] Each channel of each channel is separated in the frequency domain, and the normalized power value of the output signal of each channel is calculated;

[0050] 103: Synthesize the normalized power value and the time-domain zero-crossing rate (Zero-Crossing Rate, ZCR) of the entire disturbance signal to generate an eigenvector;

[0051]104: Feed feature vectors into radial basis function (RBF) neural network [21][22] Fast and high-precision identification of intr...

Embodiment 2

[0054] The scheme in embodiment 1 is further introduced below in conjunction with specific calculation formulas and examples, see the following description for details:

[0055] The structural principle of the distributed optical fiber sensing system based on the DMZI principle is as follows: figure 1 As shown, point P is the disturbance point, and the length of the sensing optical cable is L. The light emitted by the laser passes through the isolator and is divided into two beams of light by the coupler C1. These two beams of light are injected into the double Mach-Zehnder interferometer composed of C2 and C3. After that, the two beams are clockwise and The counterclockwise direction propagates in the sensing loop and interferes on the opposite coupler (C3 or C2) and outputs to the detectors PD1 and PD2. The detector converts the optical signal into an electrical signal, which is collected by the corresponding high-speed acquisition card (DataAcquisition, DAQ) after DC isola...

Embodiment 3

[0120] Below in conjunction with concrete test, accompanying drawing, and form, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0121] The experiment is carried out on a DMZI distributed optical fiber sensing system with a laser source of 1550nm distributed feedback laser and a light intensity of 3.5mV. The total length of the sensing optical cable is 2.25km, and the sampling rate of DAQ1 is f s =10kHz, recording time is 3s. 480 data collections were performed on 4 types of common intrusion events: climbing fences, knocking on optical cables, shaking and stealing shears, and the number of repetitions for each type of intrusion events was 120 times.

[0122] The selection of the feature vector length is mainly due to two considerations: on the one hand, considering the identification of P = 4 types of intrusion events, in order to ensure the accuracy of pattern recognition and classification, the feature ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics. The fiber perimeter security intrusion event identification method based on integrated characteristics includes the steps: feeding the signal disturbing the start point in each channel of an all-phase filter bank each channel to perform frequency domain separation processing, calculating the normalization power value of the output signal of each channel, wherein the plurality of normalization power values are output in parallel; integrating the normalization power values and the time domain zero-crossing rate of the whole section of disturbance signals to generate a characteristic vector, wherein the characteristic vector contains two aspects of information: the time domain and the frequency domain; and feeding the characteristic vector in a radial primary function neural network to realize intrusion motion quick high precision identification. The fiber perimeter security intrusion event identification apparatus based on integrated characteristics includes an analog-to-digital converter and a DSP (Digital Signal Processor) device. The fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics can accurately distinguish four types of intrusion events. Besides, compared with a current high precision intrusion event identification classifier, the DMZI (dual Mach-Zehnder interferometer) intrusion motion identifier has great advantages of work efficiency.

Description

technical field [0001] The invention relates to the technical field of digital signal processing, in particular to a method and device for identifying fiber optic perimeter security intrusion events based on comprehensive features. Background technique [0002] With the continuous maturity of optical fiber and optical fiber communication technology, optical fiber sensor has been developed rapidly. Perimeter Security System Based on Optical Fiber Sensing Technology [1][2][3] It is also gradually being valued in the field of security. with conventional infrared [4] ,electric fence [5] Compared with other security systems, the optical fiber sensing system can monitor various disturbances that are directly touched or indirectly transmitted to the optical fiber in real time, with higher sensitivity and thus more practical value. As a phase-modulated fiber optic sensor, the dual Mach-Zehnder interferometer (DMZI) distributed fiber optic sensing system [6][7] It has the advant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G08B29/18G08B13/02G06F3/08G06K9/00
CPCG06F3/08G08B13/02G08B29/185G06F2218/04G06F2218/08G06F2218/12
Inventor 黄翔东张皓杰刘铁根刘琨
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products