CN113313899A - Security monitoring analysis processing method based on big data - Google Patents

Security monitoring analysis processing method based on big data Download PDF

Info

Publication number
CN113313899A
CN113313899A CN202110203618.8A CN202110203618A CN113313899A CN 113313899 A CN113313899 A CN 113313899A CN 202110203618 A CN202110203618 A CN 202110203618A CN 113313899 A CN113313899 A CN 113313899A
Authority
CN
China
Prior art keywords
target object
monitoring
module
picture
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110203618.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Hongqi Information Technology Co ltd
Original Assignee
Wenzhou Hongqi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Hongqi Information Technology Co ltd filed Critical Wenzhou Hongqi Information Technology Co ltd
Priority to CN202110203618.8A priority Critical patent/CN113313899A/en
Publication of CN113313899A publication Critical patent/CN113313899A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • G06V40/173Classification, e.g. identification face re-identification, e.g. recognising unknown faces across different face tracks

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security monitoring analysis processing method based on big data, which is used for solving the problems that security accidents cannot be timely alarmed and security monitoring strength is poor, and comprises the following specific steps: acquiring a video monitoring picture and marking a warning area; when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame; calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area according to the result value and a preset value, and identifying and monitoring a target object in the video monitoring picture; when the target object coincides with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.

Description

Security monitoring analysis processing method based on big data
Technical Field
The invention belongs to the technical field of big data, relates to a security monitoring analysis technology, and particularly relates to a security monitoring analysis processing method based on big data.
Background
The security monitoring system is an independent and complete system formed by transmitting video signals in a closed loop by using optical fibers, coaxial cables or microwaves, displaying and recording images, can reflect a monitored object in real time, vividly and truly, can replace manual work to monitor for a long time in a severe environment, and records the video signals through a video recorder. The video security monitoring system is an electronic system or a network which utilizes a video detection technology to monitor a fortification area and display and record field images in real time, and mainly comprises four parts, namely front-end equipment, transmission equipment, processing/control equipment and recording/display equipment.
In the current household life, only a monitoring camera is arranged for security monitoring, the current security accident cannot give an alarm in time, the current security accident can only be checked through a monitoring video afterwards, the security monitoring strength is poor, and therefore a security monitoring analysis processing method based on big data is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a security monitoring analysis processing method based on big data.
The technical problem to be solved by the invention is as follows:
(1) how to solve the problem that the security accident can not be alarmed in time and can only be checked through the monitoring video afterwards;
(2) how to promote the security protection monitoring strength of the household life.
The purpose of the invention can be realized by the following technical scheme:
a security monitoring analysis processing method based on big data comprises the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
Further, the construction steps of the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: and constructing a warning area in the initial picture through the coordinates of the specific marking points, wherein the warning area is mainly a valuable article storage area in indoor household life.
The monitoring system is applied to the security monitoring analysis processing method and comprises a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a safety monitoring module, a temporary storage module, an area judgment module and a central processing module, wherein the data acquisition module comprises a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object comprises face information, body shape information and action information, the face information comprises a face image and face complexion, and the body shape information comprises height information, head length, neck length and leg length;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: carrying out safety detection and identity recognition on the image information of the target object in the suspected detection frame through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data.
Further, the data acquisition module transmits the image information to an identity recognition module, the identity recognition module is used for carrying out identity recognition on the image information in the video monitoring picture, if identity matching is passed, the target object is determined to be the owner, and if identity matching is not passed, the target object is determined not to be the owner.
Further, the identity recognition module sends the image information of the target object which is not matched with the image information of the target object to the data analysis module;
the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends out an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on.
Furthermore, the camera consists of a main monitoring probe and three auxiliary probes arranged on the outer surface of the main monitoring probe;
the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the method, a warning area under a video monitoring picture is established, when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, the target picture of the target object is obtained according to the detection frame, the region coincidence judgment is carried out on an active region and the warning area of the target object through a region judgment module, pixel points of an initial picture and the target picture are calculated to obtain a result value, whether the detection frame coincides with the warning area or not is judged according to the result value and a preset value, when the result value is equal to the preset value, the detection frame coincides with the warning area, and when the result value is not equal to the preset value, the detection frame does not coincide with the warning area;
2. the method comprises the steps of carrying out safety detection and identity recognition on image information of a target object in a suspected detection frame in a video monitoring picture through a safety monitoring module and an identity recognition module, judging whether the image information is an owner or not through comparison, carrying out action information analysis on the image information of the target object which is not matched with the image information through a data analysis module, carrying out safety monitoring on the action information generating a safety monitoring signal through the safety monitoring module to obtain final identity information, starting timing if the target object is coincident with a warning area, comparing a timing result with a preset time threshold value, and sending an alarm if the time is out.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a flow chart of the operation of the present invention;
fig. 2 is an overall system block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a security monitoring analysis processing method based on big data is mainly applied to indoor home life, and includes the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
the construction steps of the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: constructing a warning area in an initial picture through coordinates of a specific marking point, wherein the warning area is mainly an indoor valuables storage area in home life, such as a safe box area, a household appliance area, a wallet placing area and the like;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
Example two
Referring to fig. 2, based on still another concept of the same invention, the security monitoring analysis processing method further includes a monitoring system, the monitoring system is applied to the security monitoring analysis processing method, the monitoring system includes a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a security monitoring module, a temporary storage module, an area determination module, and a central processing module, the data acquisition module includes a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object includes face information, body shape information, motion information, and the like, the face information includes face images, face complexion, and the like, and the body shape information includes height information, head length, neck length, leg length, and the like;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: the image information of the target object is subjected to safety detection and identity recognition through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data; the data acquisition module transmits the image information to an identity recognition module, the identity recognition module is used for carrying out identity recognition on the image information in the video monitoring picture, if identity matching is passed, the target object is judged to be the owner, and if identity matching is not passed, the target object is judged not to be the owner;
the identity recognition module sends the image information of the target object which is not matched with the image information of the target object to the data analysis module; the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on;
the camera consists of a main monitoring probe and three auxiliary probes arranged on the outer surface of the main monitoring probe; the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula which obtains the latest real situation by acquiring a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (6)

1. A security monitoring analysis processing method based on big data is characterized by comprising the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
2. The security monitoring, analyzing and processing method based on big data as claimed in claim 1, wherein the steps of constructing the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: and constructing a warning area in the initial picture through the coordinates of the specific marking points, wherein the warning area is mainly a valuable article storage area in indoor household life.
3. The security monitoring, analyzing and processing method based on big data as claimed in claim 1, it is characterized in that the security monitoring analysis processing method comprises a monitoring system, the monitoring system is applied to the security monitoring analysis processing method, the monitoring system comprises a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a safety monitoring module, a temporary storage module, an area judgment module and a central processing module, the data acquisition module comprises a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object comprises face information, body shape information and action information, the face information comprises a face image and face complexion, and the body shape information comprises height information, head length, neck length and leg length;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: carrying out safety detection and identity recognition on the image information of the target object in the suspected detection frame through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data.
4. The security monitoring analysis processing method based on big data as claimed in claim 3, wherein the data acquisition module transmits the image information to the identity recognition module, the identity recognition module is used for performing identity recognition on the image information in the video monitoring picture, if the identity matching is passed, the target object is determined to be the owner, and if the identity matching is not passed, the target object is determined not to be the owner.
5. The security monitoring, analyzing and processing method based on big data as claimed in claim 3, wherein the identity recognition module sends the image information of the target object which is not matched with the image information to the data analysis module;
the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends out an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on.
6. The security monitoring analysis processing method based on big data as claimed in claim 3, wherein the camera is composed of a main monitoring probe and three auxiliary probes installed on the outer surface of the main monitoring probe;
the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
CN202110203618.8A 2021-02-24 2021-02-24 Security monitoring analysis processing method based on big data Withdrawn CN113313899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110203618.8A CN113313899A (en) 2021-02-24 2021-02-24 Security monitoring analysis processing method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110203618.8A CN113313899A (en) 2021-02-24 2021-02-24 Security monitoring analysis processing method based on big data

Publications (1)

Publication Number Publication Date
CN113313899A true CN113313899A (en) 2021-08-27

Family

ID=77370505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110203618.8A Withdrawn CN113313899A (en) 2021-02-24 2021-02-24 Security monitoring analysis processing method based on big data

Country Status (1)

Country Link
CN (1) CN113313899A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113869159A (en) * 2021-09-16 2021-12-31 泰州蝶金软件有限公司 Cloud server data management system
CN115171361A (en) * 2022-09-02 2022-10-11 广东中科凯泽信息科技有限公司 Dangerous behavior intelligent detection and early warning method based on computer vision
CN116600087A (en) * 2023-06-09 2023-08-15 北京城建智控科技股份有限公司 Integrated machine device for video analysis, video analysis method and system
CN114978744B (en) * 2022-06-08 2024-05-17 北京多正科技有限公司 Block chain-based security information transmission method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090324010A1 (en) * 2008-06-26 2009-12-31 Billy Hou Neural network-controlled automatic tracking and recognizing system and method
CN107818651A (en) * 2017-10-27 2018-03-20 华润电力技术研究院有限公司 A kind of illegal cross-border warning method and device based on video monitoring
CN109257569A (en) * 2018-10-24 2019-01-22 广东佳鸿达科技股份有限公司 Security protection video monitoring analysis method
CN109492548A (en) * 2018-10-24 2019-03-19 广东佳鸿达科技股份有限公司 The preparation method of region mask picture based on video analysis
CN109785564A (en) * 2019-03-21 2019-05-21 安徽威尔信通信科技有限责任公司 A kind of home intelligent safety defense monitoring system
CN109951637A (en) * 2019-03-19 2019-06-28 温州洪启信息科技有限公司 Safety monitoring probe analysis and processing method based on big data
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110689694A (en) * 2019-10-17 2020-01-14 重庆工商职业学院 Intelligent monitoring system and method based on image processing
CN110853276A (en) * 2019-12-05 2020-02-28 电子科技大学中山学院 Intelligent security intrusion detection system
CN112183251A (en) * 2020-09-15 2021-01-05 合肥未来计算机技术开发有限公司 Monitoring system for weak current security engineering of Internet of things

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090324010A1 (en) * 2008-06-26 2009-12-31 Billy Hou Neural network-controlled automatic tracking and recognizing system and method
CN107818651A (en) * 2017-10-27 2018-03-20 华润电力技术研究院有限公司 A kind of illegal cross-border warning method and device based on video monitoring
CN109257569A (en) * 2018-10-24 2019-01-22 广东佳鸿达科技股份有限公司 Security protection video monitoring analysis method
CN109492548A (en) * 2018-10-24 2019-03-19 广东佳鸿达科技股份有限公司 The preparation method of region mask picture based on video analysis
CN109951637A (en) * 2019-03-19 2019-06-28 温州洪启信息科技有限公司 Safety monitoring probe analysis and processing method based on big data
CN111818308A (en) * 2019-03-19 2020-10-23 温州洪启信息科技有限公司 Security monitoring probe analysis processing method based on big data
CN109785564A (en) * 2019-03-21 2019-05-21 安徽威尔信通信科技有限责任公司 A kind of home intelligent safety defense monitoring system
CN110176117A (en) * 2019-06-17 2019-08-27 广东翔翼科技信息有限公司 A kind of monitoring device and monitoring method of Behavior-based control identification technology
CN110689694A (en) * 2019-10-17 2020-01-14 重庆工商职业学院 Intelligent monitoring system and method based on image processing
CN110853276A (en) * 2019-12-05 2020-02-28 电子科技大学中山学院 Intelligent security intrusion detection system
CN112183251A (en) * 2020-09-15 2021-01-05 合肥未来计算机技术开发有限公司 Monitoring system for weak current security engineering of Internet of things

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113869159A (en) * 2021-09-16 2021-12-31 泰州蝶金软件有限公司 Cloud server data management system
CN114978744B (en) * 2022-06-08 2024-05-17 北京多正科技有限公司 Block chain-based security information transmission method and system
CN115171361A (en) * 2022-09-02 2022-10-11 广东中科凯泽信息科技有限公司 Dangerous behavior intelligent detection and early warning method based on computer vision
CN116600087A (en) * 2023-06-09 2023-08-15 北京城建智控科技股份有限公司 Integrated machine device for video analysis, video analysis method and system

Similar Documents

Publication Publication Date Title
CN113313899A (en) Security monitoring analysis processing method based on big data
CN110044486B (en) Method, device and equipment for avoiding repeated alarm of human body inspection and quarantine system
CN110850723A (en) Fault diagnosis and positioning method based on transformer substation inspection robot system
CN110867046A (en) Intelligent car washer video monitoring and early warning system based on cloud computing
US20230076969A1 (en) Industrial equipment and device monitoring-alarm system, and method therefor
CN108873791A (en) A kind of substation field violation detection early warning system
CN111131478A (en) Light steel villa monitoring management system
CN112614260A (en) Intelligent security system based on face recognition and positioning
CN114155492A (en) High-altitude operation safety belt hanging rope high-hanging low-hanging use identification method and device and electronic equipment
CN210222962U (en) Intelligent electronic fence system
CN116403377A (en) Abnormal behavior and hidden danger detection device in public place
CN112991659B (en) Big data security monitoring management method with early warning processing function
CN114550082A (en) Easy-to-use efficient AI (Artificial Intelligence) recognition algorithm
CN213457742U (en) Welding operation monitoring system
CN106385559A (en) Three-dimensional monitoring system
CN112633157A (en) AGV working area safety real-time detection method and system
CN111640282A (en) Method, system and device for monitoring safety distance of personnel in power distribution room
CN116259013A (en) Intrusion detection system
CN110533889A (en) A kind of sensitizing range electronic equipment monitoring positioning device and method
CN116343429A (en) Fire monitoring and alarming system for chemical production place
CN111985331B (en) Detection method and device for preventing trade secret from being stolen
CN112804492B (en) Communication prompting method and device for electronic peepholes
CN108256502A (en) Security system based on image procossing
CN207097176U (en) A kind of household protection system based on kinect
CN110852170A (en) Personnel safety helmet detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210827

WW01 Invention patent application withdrawn after publication