CN113393628A - Intelligent monitoring alarm method, system, intelligent terminal and storage medium - Google Patents

Intelligent monitoring alarm method, system, intelligent terminal and storage medium Download PDF

Info

Publication number
CN113393628A
CN113393628A CN202110503964.8A CN202110503964A CN113393628A CN 113393628 A CN113393628 A CN 113393628A CN 202110503964 A CN202110503964 A CN 202110503964A CN 113393628 A CN113393628 A CN 113393628A
Authority
CN
China
Prior art keywords
information
image information
image
intrusion
target image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110503964.8A
Other languages
Chinese (zh)
Inventor
许武燕
韩磊
刘向军
高珊珊
许振国
宁春鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Tailai Survey And Design Co ltd
Original Assignee
Tianjin Tailai Survey And Design Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Tailai Survey And Design Co ltd filed Critical Tianjin Tailai Survey And Design Co ltd
Priority to CN202110503964.8A priority Critical patent/CN113393628A/en
Publication of CN113393628A publication Critical patent/CN113393628A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19641Multiple cameras having overlapping views on a single scene
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/005Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives by electric shock
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to an intelligent monitoring alarm method, a system, an intelligent terminal and a storage medium, comprising the steps of obtaining target image information; judging whether the target image information is the invasion image information or not; if yes, alarm starting information is output. The invention improves the warning and detection effects.

Description

Intelligent monitoring alarm method, system, intelligent terminal and storage medium
Technical Field
The invention relates to the technical field of monitoring alarm, in particular to an intelligent monitoring alarm method, an intelligent monitoring alarm system, an intelligent terminal and a storage medium.
Background
At present, China has more population and less per capita water resources, so the water resources need to be reasonably protected and utilized in the aspect of water conservancy.
In-process of managing is carried out water resources in daily life, the mode of manual inspection is generally adopted for management, resources are wasted in the mode of inspection, the vulnerability is easily found by intruders in the inspection process, and the detection and warning effects are poor.
Disclosure of Invention
The invention aims to provide an intelligent monitoring alarm detection method which has the characteristic of improving the alarm effect.
The above object of the present invention is achieved by the following technical solutions:
an intelligent monitoring alarm detection method is provided,
acquiring target image information;
judging whether the target image information is the invasion image information or not;
if yes, alarm starting information is output.
By adopting the technical scheme, when needing to monitor and warn near the water resource, target image information is obtained to the target entering into the detection area, and whether the target image information is the invasion image information is judged, when the target image information is judged to be the invasion image information, then it shows that near the water resource there is the invader to enter into the area that near the water resource forbids entering at this moment, the start-up information of reporting an emergency and asking for help or increased vigilance is output this moment, warn the invader, remind the invader to have entered into the forbidden area, the condition of missed detection is reduced, thereby detection and warning effect are improved.
The present invention in a preferred example may be further configured to: the method for judging whether the target image information is the intrusion image information comprises the following steps:
presetting administrator image information;
judging whether the target image information is administrator image information or not;
and if not, defining the target image information as the intrusion image information.
By adopting the technical scheme, when judging whether the target image information is the intrusion image information, the administrator image information needs to be preset and whether the target image information is the administrator image information needs to be judged, when the target image information is the administrator image information, the fact that the personnel entering the area at the moment are the workers recorded in the system is shown, and at the moment, the alarm does not need to be given; when the target image information is judged to be the non-administrator image information, the fact that the person entering the area is not recorded in the list allowing entry is proved, the person is defined as an intruder and needs to be warned, the celebrity is warned to leave the area, and warning effect and detection effect are improved.
The invention may in a preferred example be further configured,
judging whether the intrusion image information generates intrusion behavior information or not;
if yes, outputting the roll-off warning information.
By adopting the technical scheme, when the target image information is determined as the intrusion image information, the warning is carried out, at the moment, the judgment needs to be carried out on the intrusion image information again, when the intrusion image information has further action, namely, the intrusion behavior information is generated, the fact that the personnel still take further intrusion behavior after receiving the first warning is proved, when the intruder moves to a specific position, the personnel can suffer from pulse cancellation attack of the guardrail, at the moment, the personnel need to be warned again, the personnel is prompted to continue to suffer from the pulse cancellation attack, and the warning effect is further improved.
The present invention in a preferred example may be further configured to: the method for judging whether the intrusion image information generates the intrusion behavior information comprises the following steps:
acquiring moving track information of the intrusion image information;
judging whether the moving track information is close to the guardrail or not;
and if the moving track information is close to the guardrail, judging that the intrusion image information generates intrusion behavior information.
By adopting the technical scheme, when judging whether the intrusion image information generates the intrusion behavior information, judging the movement track information of the intrusion image information, when displaying that the intruder is close to the guardrail, defining the behavior of the intruder as the intrusion behavior, judging that the intrusion image information generates the intrusion behavior information, needing to carry out back-off warning on the intruder, reminding the intruder to continue to advance, and receiving pulse back-off supply, thereby improving the warning effect.
The present invention in a preferred example may be further configured to: the method for judging whether the moving track information is close to the guardrail comprises the following steps:
presetting guardrail position information;
acquiring image depth information of the invasion image information;
acquiring position distance information between the intrusion image information and guardrail position information according to the image depth information;
judging whether the value of the position distance information is reduced or not;
if yes, the moving track information is close to the guardrail.
Through adopting above-mentioned technical scheme, when needs judge that the invading personnel continues to be close to the guardrail, at first predetermine the positional information of guardrail, and obtain the image depth information of invasion image information, obtain the positional distance information between invading personnel and the guardrail according to guardrail positional information and image depth information this moment, judge whether the value of positional distance information is reducing, when the value of positional distance information is reducing, then explain the invading personnel in the position that is close to the guardrail, can confirm this personnel and have the invasion action this moment, can carry out warning action on next step.
The present invention in a preferred example may be further configured to: the method for judging whether the value of the position distance information is reduced comprises the following steps:
presetting sampling time period information;
when the intrusion image information is judged as the intrusion behavior information, sampling time period information and timing;
collecting position distance information at the starting point of the sampling time period information and defining the position distance information as starting distance information;
acquiring position distance information at the termination point of the short message at the sampling time and defining the position distance information as end point distance information;
judging whether the starting distance information is larger than the end point distance information;
if so, the position distance information is reduced.
By adopting the technical scheme, when the change trend of the value of the position distance information needs to be judged, the position distance information is collected twice within a period of time, the position distance information is compared twice, when the values of the position distance information in the sampling period are different from each other, the invader is explained to move within the period of time, when the initial distance information is greater than the end point distance information, the invader is explained to move towards the direction close to the guardrail within the sampling period of time, and the position distance information is explained to be reduced.
The present invention in a preferred example may be further configured to:
presetting cycle time period information;
and taking the end point of the sampling time period information as the starting point of the starting timing of the cycle time period information, and taking the end point of the cycle time period information as the starting point of the sampling time period information.
By adopting the technical scheme, when sampling the sampling time period information, the cycle time period information is preset, when the cycle time period is finished, the sampling time period is started, the position distance information is sampled, and meanwhile, when the sampling time period is finished, the cycle time period is started, next sampling is waited, the moving trend of personnel is controlled by repeating the cycle, and the effectiveness of detection and warning is improved.
The invention also aims to provide an intelligent monitoring and alarming system which has the characteristic of improving the detection and alarming effects.
The second aim of the invention is realized by the following technical scheme:
an intelligent monitoring alarm system is characterized by comprising,
the image acquisition module is used for acquiring target image information;
the storage module is connected with the image acquisition module and stores administrator image information preset in the image acquisition module;
the image recognition module is connected with the storage module and used for carrying out image recognition on the target image information, comparing the target image information with the administrator image information and carrying out image recognition on the target image information;
and the processing module is connected with the image identification module and outputs alarm starting information when the target image information is not matched with the administrator image information.
By adopting the technical scheme, when needing to monitor and warn near the water resource, target image information is obtained to the target entering into the detection area, and whether the target image information is the invasion image information is judged, when the target image information is judged to be the invasion image information, then it shows that near the water resource there is the invader to enter into the area that near the water resource forbids entering at this moment, the start-up information of reporting an emergency and asking for help or increased vigilance is output this moment, warn the invader, remind the invader to have entered into the forbidden area, the condition of missed detection is reduced, thereby detection and warning effect are improved.
The third purpose of the invention is to provide an intelligent terminal which has the characteristic of improving the detection and alarm effects.
The third object of the invention is realized by the following technical scheme:
an intelligent terminal, comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes the method according to any one of claims 1 to 7.
By adopting the technical scheme, when needing to monitor and warn near the water resource, target image information is obtained to the target entering into the detection area, and whether the target image information is the invasion image information is judged, when the target image information is judged to be the invasion image information, then it shows that near the water resource there is the invader to enter into the area that near the water resource forbids entering at this moment, the start-up information of reporting an emergency and asking for help or increased vigilance is output this moment, warn the invader, remind the invader to have entered into the forbidden area, the condition of missed detection is reduced, thereby detection and warning effect are improved.
The fourth purpose of the invention is to provide a computer storage medium which can store corresponding programs and has the characteristic of improving the warning and detection effects.
The fourth object of the invention is realized by the following technical scheme:
a computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 7.
By adopting the technical scheme, when needing to monitor and warn near the water resource, target image information is obtained to the target entering into the detection area, and whether the target image information is the invasion image information is judged, when the target image information is judged to be the invasion image information, then it shows that near the water resource there is the invader to enter into the area that near the water resource forbids entering at this moment, the start-up information of reporting an emergency and asking for help or increased vigilance is output this moment, warn the invader, remind the invader to have entered into the forbidden area, the condition of missed detection is reduced, thereby detection and warning effect are improved.
In summary, the invention includes at least one of the following beneficial technical effects:
1. whether the target image information is the invasion image information or not is judged by acquiring the target image information, and when the target image information is the invasion image information, alarm starting information is output, so that the detection effect and the alarm effect are improved;
2. by setting the administrator image information, the target image information is convenient to judge, and the use convenience is improved;
3. by judging whether the intrusion image information generates the intrusion behavior information or not, and outputting the roll-off warning information when the intrusion behavior information is generated, the warning effect is further improved.
Drawings
FIG. 1 is a schematic flow chart of one embodiment of the present invention.
Fig. 2 is an overall structural view of one embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.
The embodiment of the invention provides an intelligent monitoring alarm detection method, which comprises the following steps: acquiring target image information; judging whether the target image information is the invasion image information or not; if yes, alarm starting information is output.
In the embodiment of the invention, when monitoring and warning near a water resource are needed, target image information is obtained for a target entering a detection area, whether the target image information is invasion image information or not is judged, when the target image information is judged to be the invasion image information, it is shown that an invader enters an area which is forbidden to enter near the water resource, alarm starting information is output at the moment, the invader is warned, the invader is reminded to enter the forbidden area, the condition of missed detection is reduced, and the detection and warning effects are improved.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present invention will be described in further detail with reference to the drawings attached hereto.
The embodiment of the invention provides an intelligent monitoring alarm detection method, and the main flow of the method is described as follows.
As shown in fig. 1:
step 1000: target image information is acquired.
When the protection is required for the area where the ground is forbidden, the guardrail is firstly placed at the edge of the area needing protection. The device for acquiring the target image information comprises a plurality of shooting or monitoring devices which can acquire videos or images, such as a camera, a gunlock, a dome camera and the like, or a device with a shooting function. The equipment for acquiring the target image information is arranged on the guardrail, has a certain shooting range, and can acquire the target image information when people enter the shooting range. The target image information may be a picture, a video image, or a picture in which a certain frame in the video image contains a person who has entered the inside of the photographing range.
Step 2000: and judging whether the target image information is the invasion image information.
Step 2100: administrator image information is preset.
The administrator image information is preset in the database and stored in the local storage or the cloud storage, and comprises a certain frame of picture in an image, a video or a video image of personnel who can enter the area. The administrator image information is image information of a worker who needs to enter the protection area or other persons who need to enter the protection area.
Step 2200: it is determined whether the target image information is administrator image information.
Step 2210: and preprocessing the target image information.
The main steps of image preprocessing include dead-center light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering, sharpening and the like of the target image, and the image is processed to be in a state convenient for feature extraction of the image.
Step 2220: and performing feature extraction on the target image information.
Features that can be used in face recognition are generally classified into visual features, pixel statistical features, face image transform coefficient features, face image algebraic features, and the like. The face feature extraction is performed on some features of the face. Face feature extraction, also known as face characterization, is a process of feature modeling for a face. The methods for extracting human face features are classified into two main categories: one is a knowledge-based characterization method, and the other is a characterization method based on algebraic features or statistical learning.
Step 2230: and carrying out image recognition on the target image information.
And then matching the identified target image information with the target image information, setting a threshold value when matching is performed, and judging that the target image information is administrator image information when the similarity of the two exceeds the threshold value.
Step 2300: and if not, defining the target image information as the intrusion image information.
If the target image information does not belong to the administrator image information, the personnel entering the area are not recorded in the system, the personnel designated by the target image information is the intruder, the target image information is judged as the intruder image information, and the next action is convenient to take.
Step 3000: and if the target image information is the intrusion image information, outputting alarm starting information.
When the target image information is judged to be the intrusion image information, warning needs to be given to the personnel, warning starting information is output at the moment, and the warning module is controlled to give a warning. The alarm mode of the alarm module comprises an audible and visual alarm or other alarm modes, and the alarm module is started after receiving the alarm starting information to alarm the intruder and remind the intruder to enter the forbidden area.
Step 4000: and judging whether the intrusion image information generates intrusion behavior information or not.
The intrusion behavior information mainly refers to a behavior that continues to approach the guardrail position within the range of the image pickup apparatus in the present embodiment.
The method for judging whether the intrusion image information generates the intrusion behavior information comprises the following steps:
step 4100: and acquiring the moving track information of the intrusion image information.
The movement trace information includes a distance between the position of the intruder and the guard rail.
Step 4200: and judging whether the moving track information is close to the guardrail.
Step 4300: and if the moving track information is close to the guardrail, judging that the intrusion image information generates intrusion behavior information.
The method for judging whether the moving track information is close to the guardrail comprises the following steps:
step 4310: guardrail position information is preset.
A three-dimensional coordinate system can be established in the system, the position of the guardrail is set as the zero point of the three-dimensional coordinate system, and the guardrail position information is stored in the local storage or the cloud storage.
Step 4320: and acquiring image depth information of the intrusion image information.
The image depth refers to the number of bits required in the pixel depth to actually store the gray or color of an image. Each pixel of the digitized image is described by a set of binary numbers containing bits representing the color of the image, the number of bits of binary bits occupied by each pixel color in the figure being referred to as the image depth. The image depth determines the number of colors each pixel of a color image may have or determines the number of gray levels each pixel of a gray scale image may have. It determines the maximum number of colors that can be present in a color image, or the maximum gray scale level in a gray scale image. For a bitmap where the image depth is a constant, which determines the number of colors that can be used in an image at most, if each pixel has only one color bit, then the pixel is either dark or light, i.e., a monochrome image (note that this is not necessarily a black and white image, but it simply limits the image to using only two shades or colors). If there are 4 color bits per pixel, the bitmap supports 2^4=16 colors; if there are 8 color bits per pixel, the bitmap can support 256 different colors. In the monocular image depth estimation problem, the depth information of a scene corresponding to an image is generally described by a gray map with the same size, the gray value of each pixel in the gray map describes the depth value of the scene corresponding to the pixel, the gray map is also called a depth map, and the depth value corresponding to each pixel can be calculated only if the pixel depth is known.
Step 4330: and acquiring position distance information between the intrusion image information and the guardrail position information according to the image depth information.
The more mature and widely applied binocular depth estimation method at home and abroad is a depth estimation method beyond double parallax, two cameras are used for imaging, a certain distance exists between the two cameras, so that the images of the same scene formed by the two lenses have a certain difference, namely parallax, and the general depth information of the scene can be estimated due to the existence of parallax information.
The binocular parallax depth estimation method is accurate in measurement only in a short distance, and the measurement accuracy in a long distance is difficult to guarantee. The binocular stereo vision imaging system generally comprises camera modeling, feature extraction, image matching, depth calculation and image interpolation operation, and the specific measurement process comprises the following steps: selecting some characteristic points from the left image; finding out a matching point of the feature point in the right image, which is generally called stereo matching; calculating the space three-dimensional coordinates of the matching points in the camera coordinate system according to the matching relationship of the point pairs; because only two-dimensional coordinates of the matching points can be calculated in the last step, other points need to be obtained by an interpolation method, and three-dimensional reconstruction is realized.
Step 4340: it is determined whether the value of the positional distance information is decreasing.
Step 4341: and presetting sampling time period information.
Step 4342: and when the intrusion image information is judged as the intrusion behavior information, sampling the time period information for timing.
Step 4343: the position distance information is collected at the start point of the sampling period information and defined as start distance information.
Step 4344: and acquiring position distance information at the end point of the short message at the sampling time and defining the position distance information as end point distance information.
Step 4345: and judging whether the starting distance information is larger than the end point distance information.
Step 4346: if so, the position distance information is reduced.
When the moving track of the invader needs to be judged whether to be the invasion action, the position between the invader and the guardrail is calculated within the appointed time, two distance values detected in the sampling time period are compared, when the value of the initial distance is greater than the end point distance, the fact that the invader moves towards the direction close to the guardrail within the time period is proved, and at the moment, the fact that the invader has the invasion action can be judged.
Step 4347: and presetting cycle time period information.
Step 4348: and taking the end point of the sampling time period information as the starting point of the starting timing of the cycle time period information, and taking the end point of the cycle time period information as the starting point of the sampling time period information.
When sampling the sampling time period information, presetting cycle time period information, starting the sampling time period when the cycle time period is finished, sampling the position distance information, starting the cycle time period when the sampling time period is finished, waiting for next sampling, and controlling the movement trend of the personnel by repeating the cycle.
Step 4350: if yes, judging that the moving track information is close to the guardrail.
Step 5000: and if the intrusion image generates intrusion behavior information, outputting roll-off warning information.
The electronic fence is arranged on the guardrail and is generally used for military facilities and other safe and sensitive places where prisons are caught up in early days, and the electronic fence is composed of an electronic fence host and a front-end detection fence, wherein the electronic fence host generates and receives high-voltage pulse signals, and generates alarm signals and high-voltage pulse signals when the front-end detection fence is in a net touching state, a short circuit state or a short circuit state, so that the electronic fence has the effects of warning and retreating intruders. The new generation of electronic fence can generate voltage within the safety range of human body, so that the electronic fence can be applied to more fields, and can also play a role in protection in districts, hospitals and other places needing safety protection.
Embodiments of the present invention provide a storage medium having stored thereon a set of instructions adapted to be loaded by a processor and executed to perform various steps including those described in the flowchart of fig. 1.
The computer storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Based on the same inventive concept, an embodiment of the present invention provides an intelligent terminal, including: a processor for loading and executing a set of instructions; and the storage medium described above.
Based on the same inventive concept, an embodiment of the present invention provides a system, including: the image acquisition module is used for acquiring target image information;
the storage module is connected with the image acquisition module and stores administrator image information preset in the image acquisition module;
the image recognition module is connected with the storage module and used for carrying out image recognition on the target image information, comparing the target image information with the administrator image information and carrying out image recognition on the target image information;
a processing module connected to the image recognition module for outputting alarm start information when the target image information is not matched with the administrator image information,
for loading and executing a set of instructions; and the storage medium described above.
It will be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
The above embodiments are only used to describe the technical solutions of the present application in detail, but the above embodiments are only used to help understanding the method and the core idea of the present invention, and should not be construed as limiting the present invention. Those skilled in the art should also appreciate that they can easily conceive of various changes and substitutions within the technical scope of the present disclosure.

Claims (10)

1. An intelligent monitoring alarm detection method is characterized in that,
acquiring target image information;
judging whether the target image information is the invasion image information or not;
if yes, alarm starting information is output.
2. The method of claim 1, wherein the determining whether the target image information is intrusion image information comprises:
presetting administrator image information;
judging whether the target image information is administrator image information or not;
and if not, defining the target image information as the intrusion image information.
3. The method of claim 1,
judging whether the intrusion image information generates intrusion behavior information or not;
if yes, outputting the roll-off warning information.
4. The method of claim 3, wherein the method of determining whether the intrusion image information generates intrusion behavior information comprises:
acquiring moving track information of the intrusion image information;
judging whether the moving track information is close to the guardrail or not;
and if the moving track information is close to the guardrail, judging that the intrusion image information generates intrusion behavior information.
5. The method of claim 4, wherein the method of determining whether the movement trace information is close to the guard rail comprises:
presetting guardrail position information;
acquiring image depth information of the invasion image information;
acquiring position distance information between the intrusion image information and guardrail position information according to the image depth information;
judging whether the value of the position distance information is reduced or not;
if yes, the moving track information is close to the guardrail.
6. The method according to claim 5, wherein the method of determining whether the value of the position distance information decreases comprises:
presetting sampling time period information;
when the intrusion image information is judged as the intrusion behavior information, sampling time period information and timing;
collecting position distance information at the starting point of the sampling time period information and defining the position distance information as starting distance information;
acquiring position distance information at the termination point of the short message at the sampling time and defining the position distance information as end point distance information;
judging whether the starting distance information is larger than the end point distance information;
if so, the position distance information is reduced.
7. The method of claim 6, further comprising:
presetting cycle time period information;
and taking the end point of the sampling time period information as the starting point of the starting timing of the cycle time period information, and taking the end point of the cycle time period information as the starting point of the sampling time period information.
8. An intelligent monitoring alarm system is characterized by comprising,
the image acquisition module is used for acquiring target image information;
the storage module is connected with the image acquisition module and stores administrator image information preset in the image acquisition module;
the image recognition module is connected with the storage module and used for carrying out image recognition on the target image information, comparing the target image information with the administrator image information and carrying out image recognition on the target image information;
and the processing module is connected with the image identification module and outputs alarm starting information when the target image information is not matched with the administrator image information.
9. An intelligent terminal, comprising a memory and a processor, the memory having stored thereon a computer program that can be loaded by the processor and that executes the method according to any one of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 7.
CN202110503964.8A 2021-05-10 2021-05-10 Intelligent monitoring alarm method, system, intelligent terminal and storage medium Pending CN113393628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110503964.8A CN113393628A (en) 2021-05-10 2021-05-10 Intelligent monitoring alarm method, system, intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110503964.8A CN113393628A (en) 2021-05-10 2021-05-10 Intelligent monitoring alarm method, system, intelligent terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113393628A true CN113393628A (en) 2021-09-14

Family

ID=77616756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110503964.8A Pending CN113393628A (en) 2021-05-10 2021-05-10 Intelligent monitoring alarm method, system, intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113393628A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113936405A (en) * 2021-10-08 2022-01-14 国能榆林能源有限责任公司 Alarm method, alarm system and storage medium
CN114550399A (en) * 2022-02-25 2022-05-27 西安热工研究院有限公司 Hydropower station safety electronic fence protection system and working method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090040046A1 (en) * 2007-08-06 2009-02-12 Browning Jr Thomas E Double-end fiber optic security system for sensing intrusions
CN108694812A (en) * 2018-06-08 2018-10-23 四川斐讯信息技术有限公司 A kind of intelligent monitor method and device
CN109426798A (en) * 2018-02-01 2019-03-05 广州弘度信息科技有限公司 A kind of border intrusion detection method, apparatus and system
CN109872482A (en) * 2019-01-21 2019-06-11 广东鑫诺安保安服务有限公司 Wisdom security protection monitoring and managing method, system and storage medium
CN111144232A (en) * 2019-12-09 2020-05-12 国网智能科技股份有限公司 Transformer substation electronic fence monitoring method based on intelligent video monitoring, storage medium and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090040046A1 (en) * 2007-08-06 2009-02-12 Browning Jr Thomas E Double-end fiber optic security system for sensing intrusions
CN109426798A (en) * 2018-02-01 2019-03-05 广州弘度信息科技有限公司 A kind of border intrusion detection method, apparatus and system
CN108694812A (en) * 2018-06-08 2018-10-23 四川斐讯信息技术有限公司 A kind of intelligent monitor method and device
CN109872482A (en) * 2019-01-21 2019-06-11 广东鑫诺安保安服务有限公司 Wisdom security protection monitoring and managing method, system and storage medium
CN111144232A (en) * 2019-12-09 2020-05-12 国网智能科技股份有限公司 Transformer substation electronic fence monitoring method based on intelligent video monitoring, storage medium and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113936405A (en) * 2021-10-08 2022-01-14 国能榆林能源有限责任公司 Alarm method, alarm system and storage medium
CN114550399A (en) * 2022-02-25 2022-05-27 西安热工研究院有限公司 Hydropower station safety electronic fence protection system and working method thereof

Similar Documents

Publication Publication Date Title
CN110795963A (en) Monitoring method, device and equipment based on face recognition
CN113393628A (en) Intelligent monitoring alarm method, system, intelligent terminal and storage medium
CN110516623B (en) Face recognition method and device and electronic equipment
CN112437280A (en) Intelligent monitoring security data processing management system based on big data analysis
CN111461078B (en) Fishing preventing and monitoring method based on computer vision technology
CN109035307B (en) Set area target tracking method and system based on natural light binocular vision
CN105957285A (en) Image monitoring and alarm method
CN111444555B (en) Temperature measurement information display method and device and terminal equipment
CN114495270A (en) Real-time monitoring and early warning method, device and system and storage medium
CN114898261A (en) Sleep quality assessment method and system based on fusion of video and physiological data
CN113392765A (en) Tumble detection method and system based on machine vision
CN112614260A (en) Intelligent security system based on face recognition and positioning
CN115346060A (en) Picture abnormity identification method and device, electronic equipment and storage medium
CN114078603A (en) Intelligent endowment monitoring system and method, computer equipment and readable storage medium
CN115205581A (en) Fishing detection method, fishing detection device and computer readable storage medium
CN114898443A (en) Face data acquisition method and device
JP5752976B2 (en) Image monitoring device
CN113076799A (en) Drowning identification alarm method, drowning identification alarm device, drowning identification alarm platform, drowning identification alarm system and drowning identification alarm system storage medium
CN112053382A (en) Access & exit monitoring method, equipment and computer readable storage medium
CN116246402A (en) Monitoring method and device
CN115909400A (en) Identification method for using mobile phone behaviors in low-resolution monitoring scene
CN106251545B (en) A kind of intelligent family monitoring system
CN115396591A (en) Intelligent double-light camera image processing method and device, camera and medium
CN111985331B (en) Detection method and device for preventing trade secret from being stolen
CN114267006A (en) Security monitoring method, device, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210914

RJ01 Rejection of invention patent application after publication