Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

169 results about "Perimeter Security" patented technology

Service function chain reliable deployment method based on deep reinforcement learning

The invention relates to a service function chain reliable deployment method based on deep reinforcement learning, and belongs to the technical field of communication. The method comprises the following steps: S1, obtaining a reliability value based on the reliability measurement mode of the equipment use degree and the peripheral safety coefficient; S2, preliminarily determining a reliability demand of each virtual network function through the functional characteristics and the topological characteristics; S3, obtaining the deployable length of the link reliability requirement meeting the virtual link reliability requirement; S4, searching an optimal mapping scheme suitable for the virtual network environment and the base environment by using deep reinforcement learning based on each reliability demand; and S5, if the VNF reliability cannot be satisfied in the mapping process, using an importance-based node backup method, and if the link deployment result does not satisfy the link reliability, using a link backup importance-based link backup method. The method can effectively deal with basic faults on the basis of ensuring reliability requirements, reduces the number of failure SFC, and ensures load balance to make the whole virtual network more stable and reliable.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Portable radar perimeter security and protection system

InactiveCN106657921ARemind in timeEstablish an intelligent identification and filtering mechanismClosed circuit television systemsBurglar alarm electric actuationNumerical controlDisplay device
The invention provides a portable radar perimeter security and protection system. The portable radar perimeter security and protection system comprises radars, first control boxes, a numerical control linkage dome camera, a second control box, a server, a displayer of the server, a switch, a monitoring video display device and an alarm device. The server, the numerical control linkage dome camera, the wireless equipment, the radars, the monitoring video display device and the alarm device are connected by the wireless network. The server is equipped with the portable perimeter security and protection system software; the core of the software is the control of 3D linkage of the radars and the numerical control linkage dome camera; the algorithm adopted by the linkage control is presetting the space coordinates of the left, center and right 3 points of the radars and the numerical control linkage dome camera, and the input data is the target location detected by the radars, and the calculating result which is calculated according to trigonometric function is the PTZ 3D coordinate of the numerical control linkage dome camera. The first control boxes are used for supplying power to the radars, and the second control box is used for supplying power to the numerical control linkage dome camera. The switch provides the connection ports for a plurality of cables, used for connecting the server, the monitoring video display device, and the numerical control linkage dome camera; and the switch adopts star topology and realizes the data exchange among the devices in the network.
Owner:秦皇岛博微智能科技有限公司

Vehicle turning safety assisting system

ActiveCN104960466APredict collisionPre-judging its likelihoodAcoustic signal devicesAutomatic initiationsAcousto-opticsElectric vehicle
The invention relates to a vehicle turning safety assisting system. The vehicle turning safety assisting system comprises a vehicle-mounted computer control module, and an angle sensing module connected, a longitudinal distance measurement sensing module connected, a vehicle speed sensing module, a vehicle power module, a vehicle braking module, and an acousto-optic warning module which are connected with the vehicle-mounted computer control module; after acquiring the turning state of a vehicle and the information of conditions surrounding the vehicle, the vehicle-mounted computer control module predicts the running route of the vehicle and the information of passers-by or objects, which are the closest from the vehicle, through calculation, so as to judge whether the vehicle can collide with the passers-by or other objects and the degree of danger or not; if a collision danger is discovered, the vehicle-mounted computer control module automatically takes safety measures, such as cutting off vehicle power, and starting emergent band-type brake immediately, and sends acousto-optic warning signals to drivers and the passers-by so as to guarantee the safe of people, the vehicle and the surroundings. The vehicle turning safety assisting system can be mounted on any vehicle using an internal combustion engine as power, and can also be applied to various electric vehicles and various engineering machinery; therefore, the vehicle turning safety assisting system is extensive in application prospect, good in timeliness, easy to realize, low in mounting cost, and easy to popularize.
Owner:FUZHOU UNIV

Distributed optical fiber vibration sensing method and system based on pulse coding external modulation

The invention discloses a distributed optical fiber vibration sensing method and system based on pulse coding external modulation. The method comprises the steps that a reverse echo curve obtained by continuous k times of optical pulse emitting is selected, an average time and interval parameters are preset, and a plurality of average curves are acquired; the standardized average curves are combined to form a two-dimensional signal matrix Y, a range matrix is selected to calculate a local range, the vibration strength of a sensing optical fiber is evaluated according to all elements in a range matrix to acquire a vibration space position, the data at the ith point in each echo curve after decoding delay are extracted to obtain time domain sampling signals of vibration. The system comprises a photoelectric detector which forms electrical signals and a signal collecting and regulating device which is used for conducting amplification and analog-digital conversion to achieve digital signals, the digital signals are transmitted into a computer to achieve decoding, time delay, positioning and extraction time domain processing, and the vibration condition along the line of distributed sensors. The distributed optical fiber vibration sensing method and system based on pulse coding external modulation meet the demand for various vibration detection and monitoring application, and is particularly suitable for long-distance pipeline monitoring and perimeter security.
Owner:天津精仪精测科技有限公司

Fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics

The invention discloses a fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics. The fiber perimeter security intrusion event identification method based on integrated characteristics includes the steps: feeding the signal disturbing the start point in each channel of an all-phase filter bank each channel to perform frequency domain separation processing, calculating the normalization power value of the output signal of each channel, wherein the plurality of normalization power values are output in parallel; integrating the normalization power values and the time domain zero-crossing rate of the whole section of disturbance signals to generate a characteristic vector, wherein the characteristic vector contains two aspects of information: the time domain and the frequency domain; and feeding the characteristic vector in a radial primary function neural network to realize intrusion motion quick high precision identification. The fiber perimeter security intrusion event identification apparatus based on integrated characteristics includes an analog-to-digital converter and a DSP (Digital Signal Processor) device. The fiber perimeter security intrusion event identification method and apparatus based on integrated characteristics can accurately distinguish four types of intrusion events. Besides, compared with a current high precision intrusion event identification classifier, the DMZI (dual Mach-Zehnder interferometer) intrusion motion identifier has great advantages of work efficiency.
Owner:TIANJIN UNIV

Method for identifying and detecting disturbance signals of phase-sensitive optical time domain reflectometer

The invention discloses a method for identifying and detecting disturbance signals of a phase-sensitive optical time domain reflectometer. The method mainly aims at improving detection and intelligent identification ability of the phase-sensitive optical time domain reflectometer to external disturbance, and reducing a misstatement rate and a false alarm rate of a system in a practical complicated noise environment. The method comprises the steps that longitudinal time sequence signals of various spatial points serve as processing objects; fractal characteristics of the longitudinal time sequence signals are extracted for disturbance detection and positioning; multi-scale decomposition is conducted on the time sequence signals by wavelet transformation; the energy characteristics of detail signal components under different scales are extracted by utilizing distribution differences of the different-type disturbance signals of time-varying interference signals such as fluctuating background noises and sound waves, real intrusion signals and the like on a multi-scale time frequency shaft; multi-scale time frequency distribution characteristic vectors of the signals are formed; and specific attributes of the disturbance signals are identified and classified by combining a back-propagation (BP) neural network identification method. The method is applicable to application fields of perimeter security and protection, long-distance pipeline security, large-scale structure health monitoring and the like.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Warning method for campus based on face recognition

The invention relates to the field of Internet of Things and intelligent security, and specifically discloses a warning method for a campus based on face recognition. The method comprises a personnelmanagement module, a warning module, a visitor reservation module, a perimeter security module, and a visual intercom module. The personnel management module is used for managing access authority andmonitoring personnel access. The warning module is used for pushing warning information to parents and teaching staffs. The visitor reservation module is used for temporary visitors to apply for access authorization. The perimeter security module is used for monitoring and recording a perimeter alarm device and sending out a warning signal. The visual intercom module for communication between security personnel and the teaching staffs and information query. According to the warning method for the campus based on face recognition, a smart camera with face recognition and license plate recognition is combined with a perimeter security device and attendance system to form a complete set of digital security system for the campus, so that the security system for the campus can further realize comprehensive intelligent and automated supervision, the pressure on the security personnel is reduced, and the security level of the campus is improved.
Owner:广东粤众互联信息技术有限公司

Pressure-sensitive type fiber sensing device for perimeter security protection

The invention discloses a pressure-sensitive type fiber sensing device for perimeter security protection. The device comprises at least a fiber bending sensing element which is arranged under a pavement flat plate and is buried in a soil layer. Each fiber bending sensing element comprises a signal fiber. At least one end of an optical cable is connected with a test unit. The test unit is connected with a processing unit. The processing unit is connected with alarm equipment and a camera. The fiber bending sensing element comprises a guide rod and a housing which is in sliding fit with the guide rod. The guide rod is in contact connection with one end of a curved support. The other end of the curved support is fixed on an inner wall of the housing. When extraneous force generates displacement to the pavement flat plate, displacement of the pavement flat plate further enables bending curvature of the signal fiber to change, an optical signal transmitted in the signal fiber changes with the above change, the change of the optical signal can be monitored through the test unit and is transmitted to the processing unit, and the processing unit starts the alarm equipment and the camera. According to the device, an intrusion behavior of an intruder can be effectively monitored.
Owner:XIAN JINHE OPTICAL TECH

Distributed optical fiber perimeter security-monitoring system, sound reduction system and method

The present disclosure provides a distributed optical fiber perimeter security-monitoring system, a sound reduction system and a method. The sound reduction system is applied to the distributed optical fiber perimeter security-monitoring system for monitoring a plurality of defense regions. The sound reduction system comprises a laser generation mechanism used for providing a laser signal; a light splitting mechanism used for splitting laser signals into multiple paths of input optical signals; a plurality of optical fiber Michelson interference mechanisms arranged in the plurality of defense regions correspondingly; and an audio output mechanism used for receiving each of all interference signals. Each optical fiber Michelson interference mechanism is configured to receive an input optical signal and output an interference signal in response to the peripheral sound pressure. When the audio output mechanism receives an alarm signal from any one defense region, the audio output mechanism outputs a sound signal obtained through reducing the interference signal in the corresponding defense region. The system of the invention facilitates people to further confirm and judge the occurrence of abnormal events, such as intrusion activities.
Owner:NUCTECH CO LTD

State-full perimeter security for data networks

The described embodiments include a system for controlling communications between a first network and a second network including a plurality of in-line security devices, the in-line security devices being configured to manage communication between the first network and the second network, and including a state server connected to the plurality of in-line security devices, the state server being configured to receive state information about the state of the connections established by a first one of the in-line security devices and to communicate the state information to at least a second one of said in-line security devices. In one embodiment, the in-line security devices are firewalls. In another embodiment, state server communicates the state information received from the first one of the firewall devices and communicates the state information to every other one of the plurality of firewall devices. The described embodiments also include a method for controlling communications between a first network and a second network including providing a plurality of in-line security devices, establishing communication between the first network and the second network via the in-line security devices, providing a state server connected to the plurality of in-line security devices, transmitting state information from a first one of the the in-line security devices about the state of the connections established by the a first one of the in-line security devices, and communicating the state information from the state server to at least a second one of said in-line security devices.
Owner:U S CELLULAR

Wide-range perimeter security monitoring method and system

The invention relates to a wide-range perimeter security monitoring method and system. The method comprises the following steps: creating an intrusion feature library; acquiring perturbation data at the boundary of a monitored area; quantifying the perturbation data and obtaining a quantized amplitude, comparing the quantized amplitude with an intrusion data feature, and determining whether the monitored area is intruded and determining a corresponding intrusion event type; analyzing intrusion information of an intruder according to the perturbation data; and determining a processing scheme according to the intrusion event type and the intrusion information. The system comprises a monitoring induction band and a monitoring center; and the monitoring center comprises an intrusion feature library creation module, a quantification analysis module, an intrusion information analysis module and a scheme determination module. The perturbation data are acquired and processed through the above method and system, then whether the monitored area is invaded, the invasion event type and the intrusion information can be determined, so that the security of the monitored area can be ensured, thus the wide-range perimeter security monitoring method and the system provided by the invention have the advantages of being high in accuracy, good in monitoring effect and low in operation and maintenance cost and so on, and are especially suitable for wide-range security monitoring of border lines, etc..
Owner:SHENZHEN SHENGLU IOT COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products