Unlock instant, AI-driven research and patent intelligence for your innovation.

Intruder detection method and device applied to perimeter security system

A detection method and intruder technology, applied in the field of signal processing, can solve the problem of low accuracy of intruder detection

Active Publication Date: 2019-12-06
NEW SINGULARITY INT TECHN DEV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application discloses an intruder detection method and device applied to a perimeter security system, in order to solve the problem of intrusion caused by the perimeter security system using a wireless sensor network being easily interfered by the external environment in the prior art. The problem of low detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intruder detection method and device applied to perimeter security system
  • Intruder detection method and device applied to perimeter security system
  • Intruder detection method and device applied to perimeter security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0079] In order to solve the problem in the prior art that the perimeter security system using the wireless sensor network is easily disturbed by the external environment, resulting in low accuracy of intruder detection, this application discloses a perimeter security system applied to perimeter security through the following embodiments...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an invasion object detection method and an invasion object detection device for perimeter security systems. The method includes the steps of sequencing links according to positions of the links; acquiring a signal strength indication sequence of each link; acquiring a fluctuation measurement indicator of each link according to a signal strength indication sequence of each link; sequencing the fluctuation measurement indicators according to sequencing results of the links, clustering the spatial sequencing results of the fluctuation measurement indicators according to preset clustering thresholds, and acquiring each category after clustering; determining whether or not invasion objects exist in regions, in which the links corresponding to the categories are located,according to judgment parameters. The invasion object detection method and the invasion object detection device have the advantages that the fluctuation measurement indicators of the links are clustered spatially by considering the spatial relevance among the links, whether or not the corresponding links have invasion objects is determined according to the judgement parameters of the categories, interference of interfering substances on invasion object detection is effectively reduced, and the accuracy of invasion object detection is improved.

Description

technical field [0001] The present application relates to the technical field of signal processing, in particular to an intruder detection method and device applied to a perimeter security system. Background technique [0002] With the increasing awareness of the importance of security in all walks of life, perimeter security systems are usually installed around key control areas, such as airports, prisons, chemical plants, and important material storage areas, even in residences, office buildings, and schools. Perimeter security systems are often installed around conventional buildings and areas. The perimeter security system is used for real-time detection of the security area, and when illegal intrusion is detected, it can send out an alarm signal in time. As the first barrier against intrusion, vandalism and theft, the perimeter security system plays an important role in social security. [0003] At present, commonly used perimeter security systems usually include: vib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08B13/24
CPCG08B13/2491
Inventor 邵起明陈培郑明吉王庆磊
Owner NEW SINGULARITY INT TECHN DEV