Perimeter intrusion detection method

An intrusion detection and perimeter technology, applied in neural learning methods, biological neural network models, probabilistic networks, etc., can solve the problem of high false alarm rate

Pending Publication Date: 2021-11-02
HUADI COMP GROUP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the false alarm rate of the existing perimeter protection technology is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perimeter intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] Example: figure 1 A flow chart showing the implementation of the perimeter intrusion detection method according to the embodiment of the present invention is shown.

[0048] refer to figure 1 , the perimeter intrusion detection method of the embodiment of the present invention includes the following steps:

[0049] Using a predetermined deep learning algorithm to identify the moving object in the surveillance video image covering the perimeter area, and acquire the entity type, two-dimensional coordinate data and behavior type of the moving object;

[0050] Acquiring three-dimensional coordinate data of the moving object according to the two-dimensional coordinate data of the moving object;

[0051] Acquiring the positional relationship between the moving object and the preset warning zone and buffer zone according to the three-dimensional coordinate data of the moving object;

[0052] According to the positional relationship between the moving object, the warning area...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a perimeter intrusion detection method. The method comprises the steps of obtaining an entity type, a two-dimensional coordinate and a behavior type of a moving object in a monitoring video image covering a perimeter region based on a deep learning algorithm; acquiring a three-dimensional coordinate of the object according to the two-dimensional coordinate; obtaining the position relation between the object and a warning area and the position relation between the object and a buffer area according to the three-dimensional coordinates; judging whether the moving object accords with an early warning or alarm rule according to the position relation, the entity type, the behavior type and a video alarm strategy; detecting whether an integrated perimeter intrusion detection system deployed in the perimeter area sends out early warning or warning information, and if yes, performing adaptive conversion on coordinates of corresponding moving objects; and when the moving object accords with the early warning or warning rule and/or early warning or warning information is detected, judging whether the moving object is an intrusion object based on a Bayesian decision algorithm, and if so, carrying out early warning or warning. According to the invention, the problem of high false alarm rate of the existing perimeter prevention technology can be solved.

Description

technical field [0001] The invention belongs to the field of perimeter defense, and more specifically relates to a perimeter intrusion detection method. Background technique [0002] With the development and progress of society, people pay more and more attention to perimeter security monitoring and prevention. Perimeter defense is the most basic system in public security prevention. It is the first line of defense against illegal intrusion and abnormal events, and it is also a very important line of defense. It has made due contributions to social security. [0003] Existing perimeter defense technologies mainly include infrared radiation, laser detection, electronic fence, video camera and optical fiber sensing, etc. These perimeter defense technologies have a large number of applications in their respective applicable scenarios, but due to These perimeter defense technologies still have their own problems and deficiencies in terms of monitoring principles, monitoring cap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G08B13/196G08B13/24G06K9/00G06N3/04G06N3/08G06N7/00
CPCG08B13/19613G08B13/2491G06N3/08G06N7/01G06N3/045
Inventor 方志军
Owner HUADI COMP GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products