Alarm method and device for illegal boundary crossing based on video monitoring

A video surveillance and alarm device technology, applied in alarms, burglar alarms, closed-circuit television systems, etc., can solve the problems of high cost and inability to effectively judge the monitoring screen, and achieve the effect of avoiding disasters and reducing potential safety hazards

Inactive Publication Date: 2018-03-20
华润电力技术研究院有限公司 +1
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing ordinary video surveillance requires additional staff, and the cost is high. For some factories with a large factory area, there are many places where security protection is required, and the number of vid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method and device for illegal boundary crossing based on video monitoring
  • Alarm method and device for illegal boundary crossing based on video monitoring
  • Alarm method and device for illegal boundary crossing based on video monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The embodiment of the present application provides a method and device for illegal border crossing alarm based on video monitoring, which is used for real-time and accurate automatic analysis of video images, automatic alarm for potential safety risks, reducing potential safety hazards, and avoiding disasters.

[0025] In order to enable those skilled in the art to better understand the solutions of the present application, the following will describe the embodiments of the present application with reference to the drawings in the embodiments of the present application.

[0026] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the application disclose an alarm method and device for illegal boundary crossing based on video monitoring. The method and the device are used to make a real-time, accurate and automatic analysis of vide pictures and automatically give an alarm for potential safety risks, so as to reduce potential safety hazard and avoid disasters. The method disclosed by one embodiment of theapplication includes the following steps: acquiring a video monitoring image of a target area; when detecting a target person in the video monitoring image, setting a pedestrian detection box around the target person in the video monitoring image; determining whether the boundary line of a preset warning area in the video monitoring image coincides with the pedestrian detection box; and if the pedestrian detection box coincides with the boundary line, giving an alarm.

Description

technical field [0001] The present application relates to the field of security protection, and in particular to a method and device for alarming illegal border crossing based on video surveillance. Background technique [0002] With the development of video technology, the use of video technology for security monitoring has become the main security option. [0003] At present, many factories use infrared monitoring and other methods to monitor specific areas, but infrared rays are easily interfered by strong sunlight and other light sources containing red danger, so factories are also equipped with other auxiliary measures, for example, using ordinary video surveillance, And configure the corresponding staff to judge. [0004] Existing ordinary video surveillance requires additional staff, and the cost is high. For some factories with a large factory area, there are many places where security protection is required, and the number of video surveillance points arranged is l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08B13/196G06K9/00G06T7/13H04N7/18
CPCH04N7/18G06T7/13G08B13/19602G08B13/19608G06T2207/10016G06T2207/30232G06T2207/30201G06V40/10G06V20/52
Inventor 王化冰徐雷陈振杰任建国胡效雷王峰陈华吴翔陈世和
Owner 华润电力技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products