[go: up one dir, main page]

CN114973564A - A method and device for detecting remote personnel intrusion under no-light conditions - Google Patents

A method and device for detecting remote personnel intrusion under no-light conditions Download PDF

Info

Publication number
CN114973564A
CN114973564A CN202210461907.2A CN202210461907A CN114973564A CN 114973564 A CN114973564 A CN 114973564A CN 202210461907 A CN202210461907 A CN 202210461907A CN 114973564 A CN114973564 A CN 114973564A
Authority
CN
China
Prior art keywords
camera
lidar
intruder
data
control signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210461907.2A
Other languages
Chinese (zh)
Inventor
王强
李博伦
李建飞
杨嘉业
程建刚
鲍海龙
吴恒城
陈籽妍
张翔
吴有彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Machinery Equipment Research Institute
Original Assignee
Beijing Machinery Equipment Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Machinery Equipment Research Institute filed Critical Beijing Machinery Equipment Research Institute
Priority to CN202210461907.2A priority Critical patent/CN114973564A/en
Publication of CN114973564A publication Critical patent/CN114973564A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1609Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems
    • G08B13/1618Actuation by interference with mechanical vibrations in air or other fluid using active vibration detection systems using ultrasonic detection means
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19689Remote control of cameras, e.g. remote orientation or image zooming control for a PTZ camera

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The disclosure relates to a method and a device for detecting remote personnel intrusion under non-illumination conditions, electronic equipment and a storage medium. Wherein, the method comprises the following steps: acquiring environmental data based on a laser radar, and generating laser radar data; analyzing the laser radar data, presetting a first threshold value based on the size of an invader, judging and generating a camera control signal; operating the holder of the camera to rotate, focusing the focal length of the camera to the corresponding position in the position information, collecting the image at the position, and generating an image signal; and carrying out invader identification processing on the image signal, judging the characteristics of the invader and generating an alarm signal. According to the method, the laser radar and the camera are combined to control monitoring, the detection and monitoring of the over-distance target are achieved, the influence of external environment factors is small, and the detection performance and the application scene are greatly improved.

Description

一种无光照条件下的远距离人员入侵检测方法以及装置A method and device for detecting remote personnel intrusion under no-light conditions

技术领域technical field

本公开涉及安防监控领域,具体而言,涉及一种无光照条件下的远距离人员入侵检测方法、装置、电子设备以及计算机可读存储介质。The present disclosure relates to the field of security monitoring, and in particular, to a method, device, electronic device, and computer-readable storage medium for detecting remote personnel intrusion under no-light conditions.

背景技术Background technique

在目前的安防应用中,通常使用摄像装置和图像识别技术,对摄像装置所采集的待检测区域的图像进行图像识别,以确定待检测区域中是否有外人或外物进入。但是通常一个摄像头能覆盖的视野范围小于50米,同时由于受外界环境的干扰,如光照、雨雪等干扰,摄像装置所摄取的有些图像无法保证清晰,导致图像识别可能出错,从而无法及时检测到区域入侵的发生,还有如果是基于纯视觉的方式,如果入侵人员通过遮挡等其它方式伪装,视觉无法判断出有人员入侵,导致漏报。In current security applications, a camera device and an image recognition technology are usually used to perform image recognition on the image of the area to be detected collected by the camera device, so as to determine whether there is an outsider or foreign object entering the area to be detected. However, usually the field of view that a camera can cover is less than 50 meters. At the same time, due to the interference of the external environment, such as light, rain and snow, some images captured by the camera device cannot be guaranteed to be clear, resulting in errors in image recognition, which cannot be detected in time. To the occurrence of regional intrusion, and if it is based on pure vision, if the intruder camouflages through other methods such as occlusion, the vision cannot determine that there is a human intrusion, resulting in missed reports.

因此,需要一种或多种方法解决上述问题。Therefore, one or more methods are needed to solve the above problems.

需要说明的是,在上述背景技术部分公开的信息仅用于加强对本公开的背景的理解,因此可以包括不构成对本领域普通技术人员已知的现有技术的信息。It should be noted that the information disclosed in the above Background section is only for enhancement of understanding of the background of the present disclosure, and therefore may contain information that does not form the prior art that is already known to a person of ordinary skill in the art.

发明内容SUMMARY OF THE INVENTION

本公开的目的在于提供一种无光照条件下的远距离人员入侵检测方法、装置、电子设备以及计算机可读存储介质,进而至少在一定程度上克服由于相关技术的限制和缺陷而导致的一个或者多个问题。The purpose of the present disclosure is to provide a method, device, electronic device, and computer-readable storage medium for detecting remote personnel intrusion under no-light conditions, so as to at least to a certain extent overcome one or more of the limitations and defects of the related art. Multiple questions.

根据本公开的一个方面,提供一种无光照条件下的远距离人员入侵检测方法,包括:According to one aspect of the present disclosure, a method for detecting remote personnel intrusion under no-light conditions is provided, including:

基于激光雷达采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Collect environmental data based on lidar, generate lidar data, and send the lidar data to the main controller;

主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;After receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a first threshold based on the size of the intruder, determines and generates a camera control signal, and controls the camera to control the signal to the camera;

摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号;After the camera receives the camera control signal sent by the main controller, it analyzes and extracts the position information in the camera control signal, operates the pan-tilt rotation of the camera according to the camera control signal, and makes the camera focal length. Focusing on the corresponding position in the position information, collecting the image of the shown position, and generating an image signal;

基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。Based on the image signal, an intruder identification process is performed, the characteristics of the intruder are judged, and an alarm signal is generated.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

基于激光雷达采集环境数据,生成激光雷达数据为电云激光雷达数据。Collect environmental data based on lidar, and generate lidar data as electric cloud lidar data.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,将所述激光雷达数据与预设背景数据进行对比,生成异物入侵数据,并将所述异物入侵数据与入侵物尺寸预设第一阈值对比,判断所述异物入侵数据是否达到入侵物标准。After receiving the laser radar data sent by the laser radar, the main controller analyzes the laser radar data, compares the laser radar data with the preset background data, generates foreign object intrusion data, and analyzes the foreign object. The intrusion data is compared with a preset first threshold of the size of the intruder to determine whether the foreign object intrusion data meets the intrusion standard.

在本公开的一种示例性实施例中,所述方法中基于激光雷达的入侵物判断还包括:In an exemplary embodiment of the present disclosure, the intruder judgment based on the lidar in the method further includes:

背景学习步骤,在所述激光雷达安装初始化的时,将环境进行清场,采集预设帧点云,然后将点云存储到八叉树结构中,统计各网格中点云数量和点出现的概率,将概率大于80%以上的网格判定为包含背景点网格,否则判定所述网格中没有点或所述点为噪点;In the background learning step, when the lidar is installed and initialized, the environment is cleared, the preset frame point cloud is collected, and then the point cloud is stored in the octree structure, and the number of point clouds in each grid and the number of points appearing in each grid are counted. Probability, the grid with a probability greater than 80% is determined as a grid containing background points, otherwise it is determined that there are no points in the grid or the points are noise points;

背景更新步骤,当环境中没有检测到异物存在时,每隔预设时长进行背景更新;In the background update step, when no foreign object is detected in the environment, the background update is performed every preset time period;

入侵物点云筛选步骤,将实时点云中的点在背景八叉树结构中查找距离最近的点,如在预设距离阈值范围内找到与所述实时点云中的点对应的点,则判定所述实时点云中的点为背景,反则判定所述实时点云中的点为入侵物的点;In the step of screening the point cloud of the intruder, the point in the real-time point cloud is searched for the point with the closest distance in the background octree structure. If the point corresponding to the point in the real-time point cloud is found within the preset distance threshold range, then Determine that the point in the real-time point cloud is the background, otherwise determine that the point in the real-time point cloud is the point of the intruder;

目标聚类步骤,当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸小于第一聚类阈值或大于第二聚类阈值则判定为噪点,否则判定为入侵物,检测并生成所述入侵物的尺寸和位置信息。In the target clustering step, when it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on Euclidean distance information, and the size of the clustered object is smaller than the size of the first cluster. If the class threshold is greater than the second clustering threshold, it is determined as a noise point, otherwise it is determined as an intruder, and size and position information of the intruder is detected and generated.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

将摄像头覆盖区域的位置信息将所述摄像头照射区域分为多个预设区域,摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的预设区域。The position information of the camera coverage area is divided into a plurality of preset areas, and after receiving the camera control signal sent by the main controller, the camera analyzes and extracts the position information in the camera control signal, The pan/tilt of the camera is operated to rotate according to the camera control signal, and the focal length of the camera is focused to the corresponding preset area in the position information.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

基于YOLOV5算法对所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。Based on the YOLOV5 algorithm, the image signal is processed for intruder identification, the characteristics of the intruder are judged, and an alarm signal is generated.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第二阈值,生成报警信号。After receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a second threshold based on the size of the intruder, and generates an alarm signal.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸大于第三聚类阈值则判定为激光雷达异物遮挡,生成报警信号。When it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on the Euclidean distance information, and the size of the clustered object is greater than the third clustering threshold, and it is determined as The lidar is blocked by foreign objects and generates an alarm signal.

在本公开的一种示例性实施例中,所述方法还包括:In an exemplary embodiment of the present disclosure, the method further includes:

在生成报警信号后,将所述报警信号及所述报警信号对应的图像信号基于通信模块发送至远程终端。After the alarm signal is generated, the alarm signal and the image signal corresponding to the alarm signal are sent to the remote terminal based on the communication module.

在本公开的一个方面,提供一种无光照条件下的远距离人员入侵检测装置,包括:In one aspect of the present disclosure, a device for detecting remote personnel intrusion under no-light conditions is provided, including:

激光雷达,用于采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Lidar, for collecting environmental data, generating Lidar data, and sending the Lidar data to the main controller;

主控制器,用于在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;The main controller is used to analyze the lidar data after receiving the lidar data sent by the lidar, and preset a first threshold based on the size of the intruder, judge and generate a camera control signal, and use the The camera control signal is sent to the camera;

摄像头,用于在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号,基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。The camera is used for analyzing and extracting the position information in the camera control signal after receiving the camera control signal sent by the main controller, operating the pan-tilt of the camera to rotate according to the camera control signal, and making all The focal length of the camera is focused to the corresponding position in the position information, the image of the shown position is collected, an image signal is generated, the intruder identification processing is performed based on the image signal, the characteristics of the intruder are judged, and an alarm signal is generated.

在本公开的一个方面,提供一种电子设备,包括:In one aspect of the present disclosure, an electronic device is provided, comprising:

处理器;以及processor; and

存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时实现根据上述任意一项所述的方法。and a memory, where computer-readable instructions are stored thereon, and when the computer-readable instructions are executed by the processor, implement the method according to any one of the above.

在本公开的一个方面,提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现根据上述任意一项所述的方法。In one aspect of the present disclosure, there is provided a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, implements the method according to any one of the above.

本公开的示例性实施例中的一种无光照条件下的远距离人员入侵检测方法,其中,该方法包括:基于激光雷达采集环境数据,生成激光雷达数据;对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号;操作所述摄像头的云台转动,使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号;对图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。本公开通过激光雷达与摄像头组合控制监测的方式,实现了超距目标的检测监控,受外界环境因素影响小,大幅提高了检测性能和应用场景。In an exemplary embodiment of the present disclosure, a method for detecting long-distance personnel intrusion under no-light conditions, wherein the method includes: collecting environmental data based on lidar to generate lidar data; analyzing the lidar data, And preset a first threshold based on the size of the intruder, determine and generate a camera control signal; operate the pan-tilt of the camera to rotate, so that the camera focal length is focused to the corresponding position in the position information, and the image of the displayed position is performed. Collect and generate image signals; perform intruder identification processing on the image signals, judge the characteristics of the intruders and generate alarm signals. The present disclosure realizes the detection and monitoring of ultra-distance targets through the combined control and monitoring method of the laser radar and the camera, is less affected by external environmental factors, and greatly improves the detection performance and application scenarios.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.

附图说明Description of drawings

通过参照附图来详细描述其示例实施例,本公开的上述和其它特征及优点将变得更加明显。The above and other features and advantages of the present disclosure will become more apparent from the detailed description of example embodiments thereof with reference to the accompanying drawings.

图1示出了根据本公开一示例性实施例的一种无光照条件下的远距离人员入侵检测方法的流程图;FIG. 1 shows a flowchart of a method for detecting remote personnel intrusion under no-light conditions according to an exemplary embodiment of the present disclosure;

图2示出了根据本公开一示例性实施例的一种无光照条件下的远距离人员入侵检测方法的应用场景示意图;FIG. 2 shows a schematic diagram of an application scenario of a method for detecting remote personnel intrusion under no-light conditions according to an exemplary embodiment of the present disclosure;

图3示出了根据本公开一示例性实施例的一种无光照条件下的远距离人员入侵检测方法的八叉图算法示意图;FIG. 3 shows a schematic diagram of an octogram algorithm of a method for detecting remote personnel intrusion under no-light conditions according to an exemplary embodiment of the present disclosure;

图4示出了根据本公开一示例性实施例的一种无光照条件下的远距离人员入侵检测装置的示意框图;FIG. 4 shows a schematic block diagram of a device for detecting remote personnel intrusion under no-light conditions according to an exemplary embodiment of the present disclosure;

图5示意性示出了根据本公开一示例性实施例的电子设备的框图;以及FIG. 5 schematically shows a block diagram of an electronic device according to an exemplary embodiment of the present disclosure; and

图6示意性示出了根据本公开一示例性实施例的计算机可读存储介质的示意图。FIG. 6 schematically shows a schematic diagram of a computer-readable storage medium according to an exemplary embodiment of the present disclosure.

具体实施方式Detailed ways

现在将参考附图更全面地描述示例实施例。然而,示例实施例能够以多种形式实施,且不应被理解为限于在此阐述的实施例;相反,提供这些实施例使得本公开将全面和完整,并将示例实施例的构思全面地传达给本领域的技术人员。在图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments, however, can be embodied in various forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus their repeated descriptions will be omitted.

此外,所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多实施例中。在下面的描述中,提供许多具体细节从而给出对本公开的实施例的充分理解。然而,本领域技术人员将意识到,可以实践本公开的技术方案而没有所述特定细节中的一个或更多,或者可以采用其它的方法、组元、材料、装置、步骤等。在其它情况下,不详细示出或描述公知结构、方法、装置、实现、材料或者操作以避免模糊本公开的各方面。Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of the embodiments of the present disclosure. However, one skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details, or other methods, components, materials, devices, steps, etc. may be employed. In other instances, well-known structures, methods, devices, implementations, materials, or operations are not shown or described in detail to avoid obscuring aspects of the present disclosure.

附图中所示的方框图仅仅是功能实体,不一定必须与物理上独立的实体相对应。即,可以采用软件形式来实现这些功能实体,或在一个或多个软件硬化的模块中实现这些功能实体或功能实体的一部分,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。The block diagrams shown in the figures are merely functional entities and do not necessarily necessarily correspond to physically separate entities. That is, these functional entities may be implemented in software, or in one or more software-hardened modules or parts of functional entities, or in different network and/or processor devices and/or microcontroller devices implement these functional entities.

在本示例实施例中,首先提供了一种无光照条件下的远距离人员入侵检测方法;参考图1中所示,该一种无光照条件下的远距离人员入侵检测方法可以包括以下步骤:In this exemplary embodiment, a method for detecting remote personnel intrusion under no-light conditions is first provided; with reference to FIG. 1 , the method for detecting long-distance personnel intrusion under no-light conditions may include the following steps:

步骤S110,基于激光雷达采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Step S110, collect environmental data based on the lidar, generate lidar data, and send the lidar data to the main controller;

步骤S120,主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;Step S120, after receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a first threshold based on the size of the intruder, determines and generates a camera control signal, and uses the The camera control signal is sent to the camera;

步骤S130,摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号;Step S130, after receiving the camera control signal sent by the main controller, the camera analyzes and extracts the position information in the camera control signal, operates the pan-tilt of the camera to rotate according to the camera control signal, and makes all the camera heads rotate. The focal length of the camera is focused to the corresponding position in the position information, and the image of the shown position is collected to generate an image signal;

步骤S140,基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。In step S140, an intruder identification process is performed based on the image signal, the characteristics of the intruder are determined, and an alarm signal is generated.

本公开的示例性实施例中的一种无光照条件下的远距离人员入侵检测方法,其中,该方法包括:基于激光雷达采集环境数据,生成激光雷达数据;对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号;操作所述摄像头的云台转动,使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号;对图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。本公开通过激光雷达与摄像头组合控制监测的方式,实现了超距目标的检测监控,受外界环境因素影响小,大幅提高了检测性能和应用场景。In an exemplary embodiment of the present disclosure, a method for detecting long-distance personnel intrusion under no-light conditions, wherein the method includes: collecting environmental data based on lidar to generate lidar data; analyzing the lidar data, And preset a first threshold based on the size of the intruder, determine and generate a camera control signal; operate the pan-tilt of the camera to rotate, so that the camera focal length is focused to the corresponding position in the position information, and the image of the displayed position is performed. Collect and generate image signals; perform intruder identification processing on the image signals, judge the characteristics of the intruders and generate alarm signals. The present disclosure realizes the detection and monitoring of ultra-distance targets through the combined control and monitoring method of the laser radar and the camera, is less affected by external environmental factors, and greatly improves the detection performance and application scenarios.

下面,将对本示例实施例中的一种无光照条件下的远距离人员入侵检测方法进行进一步的说明。Next, a method for detecting remote personnel intrusion under no-light conditions in this exemplary embodiment will be further described.

在本示例的实施例中,为解决变电站、工厂、高铁站、边境等人员入侵检测依赖于光照,覆盖范围较窄,以及误报率和漏报率较高的问题,本发明特提出一种不依赖光照条件,单台设备可以覆盖最远150米,7*24小时无人值守的人员入侵检测方法与系统,该系统在有光照的白天和无光照的晚上都能正常工作,不影响检测性能。In the embodiment of this example, in order to solve the problems that personnel intrusion detection in substations, factories, high-speed railway stations, borders, etc. relies on illumination, the coverage is narrow, and the false alarm rate and the false alarm rate are high, the present invention proposes a Independent of lighting conditions, a single device can cover up to 150 meters, 7*24 hours unattended personnel intrusion detection method and system, the system can work normally in the daytime with light and night without light, without affecting the detection performance.

在步骤S110中,可以基于激光雷达采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器。In step S110, the environment data may be collected based on the lidar, the lidar data may be generated, and the lidar data may be sent to the main controller.

在本示例的实施例中,基于激光雷达采集环境数据,生成激光雷达数据为电云激光雷达数据。In the embodiment of this example, the environment data is collected based on the lidar, and the generated lidar data is the electric cloud lidar data.

在本示例的实施例中,激光雷达能向三维空间不同的角度主动发射激光束,因为是主动发光所以不依赖环境光照,激光光束遇到物体后,经过漫反射返回至激光接收器,激光雷达模块根据发送和接收信号的时间间隔乘以光速再除以2,即可计算出发射器与物体的距离和位置信息,误差精度小于±2cm,激光雷达传感器最终获取到的是整个三维空间的一些精确的点,称之为“点云”。In the embodiment of this example, the lidar can actively emit laser beams to different angles in the three-dimensional space. Because it is actively emitting light, it does not rely on ambient lighting. After the laser beam encounters an object, it returns to the laser receiver through diffuse reflection. The module can calculate the distance and position information between the transmitter and the object according to the time interval between sending and receiving signals multiplied by the speed of light and then divided by 2. The error accuracy is less than ±2cm. The lidar sensor finally obtains some parts of the entire three-dimensional space. The precise points are called "point clouds".

在本示例的实施例中,激光雷达的点云数据能扫描出整个三维空间的物体,并获取到精确尺寸和位置信息。系统在安装初始化的时候记录下当时的场景为背景,实时运行过程中,用当前的点云数据和背景数据进行对比,实时数据减去背景数据为异物入侵数据,然后通过点云聚类算法获取到入侵异物的位置和尺寸。在距离比较远的时候(大于50米),激光雷达检测到入侵异物点云成像像素较低,无法通过点云来识别入侵物类型,需要借助摄像头的图片来进行类型识别。In the embodiment of this example, the point cloud data of the lidar can scan objects in the entire three-dimensional space, and obtain precise size and position information. During the installation and initialization, the system records the current scene as the background. During the real-time operation, the current point cloud data is compared with the background data. The real-time data minus the background data is the foreign body intrusion data, and then obtained through the point cloud clustering algorithm. to the location and size of the invading foreign body. When the distance is relatively long (greater than 50 meters), the lidar detects that the image pixel of the intrusion point cloud is low, and the type of the intruder cannot be identified through the point cloud.

在本示例的实施例中,激光雷达选取TELE-15,检测距离500米,距离精度2厘米,视场角14.5°*16.2°(可以根据不同需求适配不同激光雷达);摄像头DS-2DC7423IW-AE,红外夜视150米,球机(云台),400万像素,23倍变焦。In the embodiment of this example, the lidar selects TELE-15, the detection distance is 500 meters, the distance accuracy is 2 cm, and the field of view angle is 14.5°*16.2° (different lidars can be adapted according to different needs); camera DS-2DC7423IW- AE, infrared night vision 150 meters, ball camera (gimbal), 4 million pixels, 23 times zoom.

在步骤S120中,可以主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头。In step S120, after receiving the lidar data sent by the lidar, the main controller may analyze the lidar data, and preset a first threshold based on the size of the intruder to determine and generate a camera control signal, The camera control signal is sent to the camera.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,将所述激光雷达数据与预设背景数据进行对比,生成异物入侵数据,并将所述异物入侵数据与入侵物尺寸预设第一阈值对比,判断所述异物入侵数据是否达到入侵物标准。After receiving the laser radar data sent by the laser radar, the main controller analyzes the laser radar data, compares the laser radar data with the preset background data, generates foreign object intrusion data, and analyzes the foreign object. The intrusion data is compared with a preset first threshold of the size of the intruder to determine whether the foreign object intrusion data meets the intrusion standard.

在本示例的实施例中,所述方法中基于激光雷达的入侵物判断还包括:In the embodiment of this example, the intruder judgment based on the lidar in the method further includes:

背景学习步骤,在所述激光雷达安装初始化的时,将环境进行清场,采集预设帧点云,然后将点云存储到八叉树结构中,统计各网格中点云数量和点出现的概率,将概率大于80%以上的网格判定为包含背景点网格,否则判定所述网格中没有点或所述点为噪点;In the background learning step, when the lidar is installed and initialized, the environment is cleared, the preset frame point cloud is collected, and then the point cloud is stored in the octree structure, and the number of point clouds in each grid and the number of points appearing in each grid are counted. Probability, the grid with a probability greater than 80% is determined as a grid containing background points, otherwise it is determined that there are no points in the grid or the points are noise points;

背景更新步骤,当环境中没有检测到异物存在时,每隔预设时长进行背景更新;In the background update step, when no foreign object is detected in the environment, the background update is performed every preset time period;

入侵物点云筛选步骤,将实时点云中的点在背景八叉树结构中查找距离最近的点,如在预设距离阈值范围内找到与所述实时点云中的点对应的点,则判定所述实时点云中的点为背景,反则判定所述实时点云中的点为入侵物的点;In the step of screening the point cloud of the intruder, the point in the real-time point cloud is searched for the point with the closest distance in the background octree structure. If the point corresponding to the point in the real-time point cloud is found within the preset distance threshold range, then Determine that the point in the real-time point cloud is the background, otherwise determine that the point in the real-time point cloud is the point of the intruder;

目标聚类步骤,当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸小于第一聚类阈值或大于第二聚类阈值则判定为噪点,否则判定为入侵物,检测并生成所述入侵物的尺寸和位置信息。In the target clustering step, when it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on Euclidean distance information, and the size of the clustered object is smaller than the size of the first cluster. If the class threshold is greater than the second clustering threshold, it is determined as a noise point, otherwise it is determined as an intruder, and size and position information of the intruder is detected and generated.

在本示例的实施例中,激光雷达入侵检测,异物入侵检测算法包括:背景学习,背景更新,入侵物点云筛选,目标聚类三个步骤,详细描述如下:In the embodiment of this example, the laser radar intrusion detection and foreign object intrusion detection algorithm includes three steps: background learning, background update, intrusion point cloud screening, and target clustering, which are described in detail as follows:

1)背景学习,在设备安装初始化的时候,将环境进行清场,采集50帧点云,然后将点云存储到如图3所示的八叉树结构中,统计每一个网格中点云数量和点出现的概率,概率大于80%以上的认为该网格有背景点,否则认为该网格中没有点或者是噪点。1) Background learning, when the device is installed and initialized, the environment is cleared, 50 frames of point clouds are collected, and then the point clouds are stored in the octree structure as shown in Figure 3, and the number of point clouds in each grid is counted If the probability is greater than 80%, it is considered that the grid has background points, otherwise it is considered that there are no points or noise in the grid.

2)背景更新,当环境中有逐步变化的情况,比如下雪,树木生长,如果不做背景更新,会把环境中正常变化的物体当作入侵物识别,导致误报产生。背景更新方法是每隔2小时进行一次背景更新,执行背景更新的前提是环境中没有检测到异物存在。2) Background update, when there are gradual changes in the environment, such as snowfall and tree growth, if the background update is not performed, objects that change normally in the environment will be recognized as intrusions, resulting in false positives. The background update method is to perform a background update every 2 hours, and the premise of performing the background update is that no foreign objects are detected in the environment.

3)入侵物点云筛选,实时点云的每一个点在背景八叉树结构中查找最近的点,如果在距离阈值范围内找到对应的点,则认为该点是背景,如果在阈值范围内没有找到合适的点,则认为是入侵物的点。3) Screening of the intruder point cloud, each point of the real-time point cloud is searched for the nearest point in the background octree structure, if the corresponding point is found within the distance threshold range, the point is considered to be the background, if it is within the threshold range If no suitable point is found, it is considered to be the point of the intruder.

4)目标聚类,得到入侵物的所有点云以后,最终再将所有点云按照欧式距离信息进行聚类,聚类后的物体尺寸小于阈值(比如30cm*30cm)或大于阈值(比如300cm*100cm)认为是噪点,否则认为是入侵物,最终得到入侵物体的尺寸和位置信息。4) Target clustering, after obtaining all the point clouds of the intruder, finally cluster all the point clouds according to the Euclidean distance information, the size of the clustered object is smaller than the threshold (such as 30cm*30cm) or larger than the threshold (such as 300cm* 100cm) is considered as noise, otherwise it is considered as an intrusion, and finally the size and position information of the intrusion is obtained.

在步骤S130中,可以摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号。In step S130, after receiving the camera control signal sent by the main controller, the camera may analyze and extract the position information in the camera control signal, and operate the pan/tilt of the camera to rotate according to the camera control signal, and make the focal length of the camera focus on the corresponding position in the position information, and collect the image of the shown position to generate an image signal.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

将摄像头覆盖区域的位置信息将所述摄像头照射区域分为多个预设区域,摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的预设区域。The position information of the camera coverage area is divided into a plurality of preset areas, and after receiving the camera control signal sent by the main controller, the camera analyzes and extracts the position information in the camera control signal, The pan/tilt of the camera is operated to rotate according to the camera control signal, and the focal length of the camera is focused to the corresponding preset area in the position information.

在本示例的实施例中,通过图片识别出环境中的人或者其它物体,需要一个前提是能拍到比较清晰的图片。如果摄像头处于一个固定的姿态,特别是在晚上无光照的时候,摄像头的清晰画面区域非常小,超出了该范围内就不能拍到清晰照片,更不能检测到环境中有人员入侵。本发明中,通过激光雷达事先检测出异物入侵位置(不依赖光照),然后通过已获取到的位置信息调整摄像机的云台和焦距到指定区域,拍到高清图片以后用YOLOV5算法识别出入侵物体类型,确定是人员入侵还是其它物体入侵。在部分场景中,如果对入侵防护要求较高,可以通过点云尺寸来判定是否是入侵异物,摄像头主要起监控作用,辅助工作人员识别入侵物类型。In the embodiment of this example, a premise of identifying a person or other object in the environment through a picture is that a relatively clear picture can be taken. If the camera is in a fixed posture, especially when there is no light at night, the clear picture area of the camera is very small, beyond this range, no clear photos can be taken, and no human intrusion can be detected in the environment. In the present invention, the intrusion position of foreign objects is detected in advance by the laser radar (independent of light), and then the pan/tilt and focal length of the camera are adjusted to the designated area through the obtained position information, and the YOLOV5 algorithm is used to identify the intrusion object after taking high-definition pictures. Type, determine whether it is a human intrusion or other object intrusion. In some scenarios, if the requirements for intrusion protection are high, the size of the point cloud can be used to determine whether it is an intruding foreign object. The camera mainly plays a monitoring role and assists the staff to identify the type of intrusion.

在本示例的实施例中,激光雷达和摄像头联合标定方法为,如图2所示,激光雷检测覆盖区域是10~150米,检测结果中包含准确的位置信息和尺寸信息。摄像头一张图片大概覆盖区域是20米,可以将激光雷达的覆盖区域划分成7个区,每一个区对应摄像头云台的一个预置点位,主控制器可以通过命令控制摄像头的每一个预置点,比如激光雷达检测到在35米处有异物入侵,对应摄像的预置点2,主控器给摄像头发送相应的命令摄像头就能自动的将焦点和焦距设置到该区域,实现高清图像拍照。In the embodiment of this example, the joint calibration method of the lidar and the camera is, as shown in FIG. 2 , the detection coverage area of the lidar is 10-150 meters, and the detection result contains accurate position information and size information. The coverage area of a picture of the camera is about 20 meters, and the coverage area of the lidar can be divided into 7 areas, each area corresponds to a preset point of the camera head, and the main controller can control each preset point of the camera through commands. For example, if the lidar detects a foreign body intrusion at a distance of 35 meters, corresponding to preset point 2 of the camera, the main controller sends the corresponding command to the camera and the camera can automatically set the focus and focal length to this area to achieve high-definition images. Photograph.

在步骤S140中,可以基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。In step S140, an intruder identification process may be performed based on the image signal to determine the characteristics of the intruder and generate an alarm signal.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

基于YOLOV5算法对所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。Based on the YOLOV5 algorithm, the image signal is processed for intruder identification, the characteristics of the intruder are judged, and an alarm signal is generated.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第二阈值,生成报警信号。After receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a second threshold based on the size of the intruder, and generates an alarm signal.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸大于第三聚类阈值则判定为激光雷达异物遮挡,生成报警信号。When it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on the Euclidean distance information, and the size of the clustered object is greater than the third clustering threshold, and it is determined as The lidar is blocked by foreign objects and generates an alarm signal.

在本示例的实施例中,当激光雷达镜面被异物遮挡的时候,通过和背景对比发现较大差别,会给系统发送激光雷达被遮挡的告警信息。In the embodiment of this example, when the lidar mirror is blocked by a foreign object, a large difference is found by comparing with the background, and a warning message that the lidar is blocked will be sent to the system.

在本示例的实施例中,所述方法还包括:In the embodiment of this example, the method further includes:

在生成报警信号后,将所述报警信号及所述报警信号对应的图像信号基于通信模块发送至远程终端。After the alarm signal is generated, the alarm signal and the image signal corresponding to the alarm signal are sent to the remote terminal based on the communication module.

在本示例的实施例中,数据通信统支持光纤和4G两种通信方式,数据传输采用TCP的方式。In the embodiment of this example, the data communication system supports two communication modes of optical fiber and 4G, and the data transmission adopts the mode of TCP.

在本示例的实施例中,远程视频系统支持两种方式来查看视频:第一种,省流量模式,在只有4G通信条件下,为了节省流量,前端以10FPS的帧率,向后台推送JPG格式的图片;第二种,正常模式,通过推流的方式,将视频流直接推动送到后台。后台也可以远程遥控摄像头云台,查看整个防护区的实时情况。In the embodiment of this example, the remote video system supports two ways to view video: The first is the traffic-saving mode. Under the condition of only 4G communication, in order to save traffic, the front-end pushes the JPG format to the background at a frame rate of 10FPS. The second, normal mode, pushes the video stream directly to the background by means of streaming. You can also remotely control the camera pan/tilt in the background to view the real-time situation of the entire protection area.

需要说明的是,尽管在附图中以特定顺序描述了本公开中方法的各个步骤,但是,这并非要求或者暗示必须按照该特定顺序来执行这些步骤,或是必须执行全部所示的步骤才能实现期望的结果。附加的或备选的,可以省略某些步骤,将多个步骤合并为一个步骤执行,以及/或者将一个步骤分解为多个步骤执行等。It should be noted that although the various steps of the methods of the present disclosure are depicted in a particular order in the drawings, this does not require or imply that the steps must be performed in that particular order, or that all illustrated steps must be performed in order to achieve the desired result. Additionally or alternatively, certain steps may be omitted, multiple steps may be combined into one step for execution, and/or one step may be decomposed into multiple steps for execution, and the like.

此外,在本示例实施例中,还提供了一种无光照条件下的远距离人员入侵检测装置。参照图4所示,该一种无光照条件下的远距离人员入侵检测装置400可以包括:激光雷达410、主控制器420以及摄像头430。In addition, in this exemplary embodiment, a device for detecting remote personnel intrusion under no-light conditions is also provided. Referring to FIG. 4 , the device 400 for detecting remote personnel intrusion under no-light conditions may include: a lidar 410 , a main controller 420 and a camera 430 .

其中:in:

激光雷达410,用于采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Lidar 410, for collecting environmental data, generating Lidar data, and sending the Lidar data to the main controller;

主控制器420,用于在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;The main controller 420 is configured to analyze the lidar data after receiving the lidar data sent by the lidar, and preset a first threshold based on the size of the intruder, determine and generate a camera control signal, the camera control signal is sent to the camera;

摄像头430,用于在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号,基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。The camera 430 is configured to analyze and extract the position information in the camera control signal after receiving the camera control signal sent by the main controller, operate the pan/tilt of the camera to rotate according to the camera control signal, and make the camera rotate. The focal length of the camera is focused to the corresponding position in the position information, the image of the shown position is collected, an image signal is generated, the intruder identification processing is performed based on the image signal, the characteristics of the intruder are judged, and an alarm signal is generated.

上述中各一种无光照条件下的远距离人员入侵检测装置模块的具体细节已经在对应的一种无光照条件下的远距离人员入侵检测方法中进行了详细的描述,因此此处不再赘述。The specific details of each of the above-mentioned remote personnel intrusion detection device modules under no-light conditions have been described in detail in the corresponding method for long-distance personnel intrusion detection under no-light conditions, so they will not be repeated here. .

应当注意,尽管在上文详细描述中提及了一种无光照条件下的远距离人员入侵检测装置400的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本公开的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。It should be noted that although several modules or units of a remote person intrusion detection device 400 under no-light conditions are mentioned in the above detailed description, such division is not mandatory. Indeed, according to embodiments of the present disclosure, the features and functions of two or more modules or units described above may be embodied in one module or unit. Conversely, the features and functions of one module or unit described above may be further divided into multiple modules or units to be embodied.

此外,在本公开的示例性实施例中,还提供了一种能够实现上述方法的电子设备。In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.

所属技术领域的技术人员能够理解,本发明的各个方面可以实现为系统、方法或程序产品。因此,本发明的各个方面可以具体实现为以下形式,即:完全的硬件实施例、完全的软件实施例(包括固件、微代码等),或硬件和软件方面结合的实施例,这里可以统称为“电路”、“模块”或“系统”。As will be appreciated by one skilled in the art, various aspects of the present invention may be implemented as a system, method or program product. Therefore, various aspects of the present invention can be embodied in the following forms, namely: a complete hardware embodiment, a complete software embodiment (including firmware, microcode, etc.), or an embodiment combining hardware and software aspects, which may be collectively referred to herein as "circuit", "module" or "system".

下面参照图5来描述根据本发明的这种实施例的电子设备500。图5显示的电子设备500仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。An electronic device 500 according to such an embodiment of the present invention is described below with reference to FIG. 5 . The electronic device 500 shown in FIG. 5 is only an example, and should not impose any limitation on the function and scope of use of the embodiments of the present invention.

如图5所示,电子设备500以通用计算设备的形式表现。电子设备500的组件可以包括但不限于:上述至少一个处理单元510、上述至少一个存储单元520、连接不同系统组件(包括存储单元520和处理单元510)的总线530、显示单元540。As shown in FIG. 5, electronic device 500 takes the form of a general-purpose computing device. Components of the electronic device 500 may include, but are not limited to, the above-mentioned at least one processing unit 510 , the above-mentioned at least one storage unit 520 , a bus 530 connecting different system components (including the storage unit 520 and the processing unit 510 ), and a display unit 540 .

其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理单元510执行,使得所述处理单元510执行本说明书上述“示例性方法”部分中描述的根据本发明各种示例性实施例的步骤。例如,所述处理单元510可以执行如图1中所示的步骤S110至步骤S140。Wherein, the storage unit stores program codes, and the program codes can be executed by the processing unit 510, so that the processing unit 510 executes various exemplary methods according to the present invention described in the above-mentioned “Exemplary Methods” section of this specification Example steps. For example, the processing unit 510 may perform steps S110 to S140 as shown in FIG. 1 .

存储单元520可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)5201和/或高速缓存存储单元5202,还可以进一步包括只读存储单元(ROM)5203。The storage unit 520 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 5201 and/or a cache storage unit 5202 , and may further include a read only storage unit (ROM) 5203 .

存储单元520还可以包括具有一组(至少一个)程序模块5203的程序/实用工具5204,这样的程序模块5205包括但不限于:操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。The storage unit 520 may also include a program/utility 5204 having a set (at least one) of program modules 5203, such program modules 5205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, An implementation of a network environment may be included in each or some combination of these examples.

总线550可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。The bus 550 may be representative of one or more of several types of bus structures, including a memory cell bus or memory cell controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local area using any of a variety of bus structures. bus.

电子设备500也可以与一个或多个外部设备570(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该电子设备500交互的设备通信,和/或与使得该电子设备500能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口550进行。并且,电子设备500还可以通过网络适配器560与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器560通过总线550与电子设备500的其它模块通信。应当明白,尽管图中未示出,可以结合电子设备500使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。The electronic device 500 may also communicate with one or more external devices 570 (eg, keyboards, pointing devices, Bluetooth devices, etc.), with one or more devices that enable a user to interact with the electronic device 500, and/or with Any device (eg, router, modem, etc.) that enables the electronic device 500 to communicate with one or more other computing devices. Such communication may occur through input/output (I/O) interface 550 . Also, the electronic device 500 may communicate with one or more networks (eg, a local area network (LAN), a wide area network (WAN), and/or a public network such as the Internet) through a network adapter 560 . As shown, network adapter 560 communicates with other modules of electronic device 500 via bus 550 . It should be understood that, although not shown, other hardware and/or software modules may be used in conjunction with electronic device 500, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives and data backup storage systems.

通过以上的实施例的描述,本领域的技术人员易于理解,这里描述的示例实施例可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施例的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本公开实施例的方法。From the description of the above embodiments, those skilled in the art can easily understand that the exemplary embodiments described herein may be implemented by software, or may be implemented by software combined with necessary hardware. Therefore, the technical solutions according to the embodiments of the present disclosure may be embodied in the form of software products, and the software products may be stored in a non-volatile storage medium (which may be CD-ROM, U disk, mobile hard disk, etc.) or on a network , including several instructions to cause a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to an embodiment of the present disclosure.

在本公开的示例性实施例中,还提供了一种计算机可读存储介质,其上存储有能够实现本说明书上述方法的程序产品。在一些可能的实施例中,本发明的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当所述程序产品在终端设备上运行时,所述程序代码用于使所述终端设备执行本说明书上述“示例性方法”部分中描述的根据本发明各种示例性实施例的步骤。In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium on which a program product capable of implementing the above-described method of the present specification is stored. In some possible embodiments, aspects of the present invention may also be implemented in the form of a program product comprising program code for causing the program product to run on a terminal device when the program product is run The terminal device performs the steps according to various exemplary embodiments of the present invention described in the above-mentioned "Example Method" section of this specification.

参考图6所示,描述了根据本发明的实施例的用于实现上述方法的程序产品600,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本发明的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。Referring to FIG. 6, a program product 600 for implementing the above method according to an embodiment of the present invention is described, which can adopt a portable compact disk read only memory (CD-ROM) and include program codes, and can be used in a terminal device, For example running on a personal computer. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.

所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus or device, or a combination of any of the above. More specific examples (non-exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard disks, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage devices, magnetic storage devices, or any suitable combination of the foregoing.

计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer readable signal medium may include a propagated data signal in baseband or as part of a carrier wave with readable program code embodied thereon. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. A readable signal medium can also be any readable medium, other than a readable storage medium, that can transmit, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.

可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。Program code embodied on a readable medium may be transmitted using any suitable medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.

可以以一种或多种程序设计语言的任意组合来编写用于执行本发明操作的程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including object-oriented programming languages—such as Java, C++, etc., as well as conventional procedural Programming Language - such as the "C" language or similar programming language. The program code may execute entirely on the user computing device, partly on the user device, as a stand-alone software package, partly on the user computing device and partly on a remote computing device, or entirely on the remote computing device or server execute on. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (eg, using an Internet service provider business via an Internet connection).

此外,上述附图仅是根据本发明示例性实施例的方法所包括的处理的示意性说明,而不是限制目的。易于理解,上述附图所示的处理并不表明或限制这些处理的时间顺序。另外,也易于理解,这些处理可以是例如在多个模块中同步或异步执行的。Furthermore, the above-mentioned figures are merely schematic illustrations of the processes included in the methods according to the exemplary embodiments of the present invention, and are not intended to be limiting. It is easy to understand that the processes shown in the above figures do not indicate or limit the chronological order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, in multiple modules.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其他实施例。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由权利要求指出。Other embodiments of the present disclosure will readily suggest themselves to those skilled in the art upon consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the present disclosure that follow the general principles of the present disclosure and include common knowledge or techniques in the technical field not disclosed by the present disclosure . The specification and examples are to be regarded as exemplary only, with the true scope and spirit of the disclosure being indicated by the claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限。It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (12)

1.一种无光照条件下的远距离人员入侵检测方法,其特征在于,所述方法包括:1. a long-distance personnel intrusion detection method under no illumination condition, is characterized in that, described method comprises: 基于激光雷达采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Collect environmental data based on lidar, generate lidar data, and send the lidar data to the main controller; 主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;After receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a first threshold based on the size of the intruder, determines and generates a camera control signal, and controls the camera to control the signal to the camera; 摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号;After the camera receives the camera control signal sent by the main controller, it analyzes and extracts the position information in the camera control signal, operates the pan-tilt rotation of the camera according to the camera control signal, and makes the camera focal length. Focusing on the corresponding position in the position information, collecting the image of the shown position, and generating an image signal; 基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。Based on the image signal, an intruder identification process is performed, the characteristics of the intruder are judged, and an alarm signal is generated. 2.如权利要求1所述的方法,其特征在于,所述方法还包括:2. The method of claim 1, wherein the method further comprises: 基于激光雷达采集环境数据,生成激光雷达数据为电云激光雷达数据。Collect environmental data based on lidar, and generate lidar data as electric cloud lidar data. 3.如权利要求1所述的方法,其特征在于,所述方法还包括:3. The method of claim 1, wherein the method further comprises: 主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,将所述激光雷达数据与预设背景数据进行对比,生成异物入侵数据,并将所述异物入侵数据与入侵物尺寸预设第一阈值对比,判断所述异物入侵数据是否达到入侵物标准。After receiving the laser radar data sent by the laser radar, the main controller analyzes the laser radar data, compares the laser radar data with the preset background data, generates foreign object intrusion data, and analyzes the foreign object. The intrusion data is compared with a preset first threshold of the size of the intruder to determine whether the foreign object intrusion data meets the intrusion standard. 4.如权利要求3所述的方法,其特征在于,所述方法中基于激光雷达的入侵物判断还包括:4. The method according to claim 3, wherein the intruder judgment based on lidar in the method further comprises: 背景学习步骤,在所述激光雷达安装初始化的时,将环境进行清场,采集预设帧点云,然后将点云存储到八叉树结构中,统计各网格中点云数量和点出现的概率,将概率大于80%以上的网格判定为包含背景点网格,否则判定所述网格中没有点或所述点为噪点;In the background learning step, when the lidar is installed and initialized, the environment is cleared, the preset frame point cloud is collected, and then the point cloud is stored in the octree structure, and the number of point clouds in each grid and the number of points appearing in each grid are counted. Probability, the grid with a probability greater than 80% is determined as a grid containing background points, otherwise it is determined that there are no points in the grid or the points are noise points; 背景更新步骤,当环境中没有检测到异物存在时,每隔预设时长进行背景更新;In the background update step, when no foreign object is detected in the environment, the background update is performed every preset time period; 入侵物点云筛选步骤,将实时点云中的点在背景八叉树结构中查找距离最近的点,如在预设距离阈值范围内找到与所述实时点云中的点对应的点,则判定所述实时点云中的点为背景,反则判定所述实时点云中的点为入侵物的点;In the step of screening the point cloud of the intruder, the point in the real-time point cloud is searched for the point with the closest distance in the background octree structure. If the point corresponding to the point in the real-time point cloud is found within the preset distance threshold range, then Determine that the point in the real-time point cloud is the background, otherwise determine that the point in the real-time point cloud is the point of the intruder; 目标聚类步骤,当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸小于第一聚类阈值或大于第二聚类阈值则判定为噪点,否则判定为入侵物,检测并生成所述入侵物的尺寸和位置信息。In the target clustering step, when it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on Euclidean distance information, and the size of the clustered object is smaller than the size of the first cluster. If the class threshold is greater than the second clustering threshold, it is determined as a noise point, otherwise it is determined as an intruder, and size and position information of the intruder is detected and generated. 5.如权利要求1所述的方法,其特征在于,所述方法还包括:5. The method of claim 1, wherein the method further comprises: 将摄像头覆盖区域的位置信息将所述摄像头照射区域分为多个预设区域,摄像头在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的预设区域。The position information of the camera coverage area is divided into a plurality of preset areas, and after receiving the camera control signal sent by the main controller, the camera analyzes and extracts the position information in the camera control signal, The pan/tilt of the camera is operated to rotate according to the camera control signal, and the focal length of the camera is focused to the corresponding preset area in the position information. 6.如权利要求1所述的方法,其特征在于,所述方法还包括:6. The method of claim 1, wherein the method further comprises: 基于YOLOV5算法对所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。Based on the YOLOV5 algorithm, the image signal is processed for intruder identification, the characteristics of the intruder are judged, and an alarm signal is generated. 7.如权利要求1所述的方法,其特征在于,所述方法还包括:7. The method of claim 1, wherein the method further comprises: 主控制器在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第二阈值,生成报警信号。After receiving the lidar data sent by the lidar, the main controller analyzes the lidar data, presets a second threshold based on the size of the intruder, and generates an alarm signal. 8.如权利要求4所述的方法,其特征在于,所述方法还包括:8. The method of claim 4, wherein the method further comprises: 当判定所述实时点云中的点为入侵物的点时,基于欧式距离信息对所有所述实时点云中的点进行聚类,聚类后的物体尺寸大于第三聚类阈值则判定为激光雷达异物遮挡,生成报警信号。When it is determined that a point in the real-time point cloud is a point of an intruder, all points in the real-time point cloud are clustered based on the Euclidean distance information, and the size of the clustered object is greater than the third clustering threshold, and it is determined as The lidar is blocked by foreign objects and generates an alarm signal. 9.如权利要求1、7或8所述的方法,其特征在于,所述方法还包括:9. The method of claim 1, 7 or 8, wherein the method further comprises: 在生成报警信号后,将所述报警信号及所述报警信号对应的图像信号基于通信模块发送至远程终端。After the alarm signal is generated, the alarm signal and the image signal corresponding to the alarm signal are sent to the remote terminal based on the communication module. 10.一种无光照条件下的远距离人员入侵检测装置,其特征在于,所述装置包括:10. A device for detecting remote personnel intrusion under no-light conditions, wherein the device comprises: 激光雷达,用于采集环境数据,生成激光雷达数据,并将所述激光雷达数据发送至主控制器;Lidar, for collecting environmental data, generating Lidar data, and sending the Lidar data to the main controller; 主控制器,用于在接收到所述激光雷达发送的激光雷达数据后,对所述激光雷达数据进行分析,并基于入侵物尺寸预设第一阈值,判断并生成摄像头控制信号,将所述所摄像头控制信号发送至摄像头;The main controller is used to analyze the lidar data after receiving the lidar data sent by the lidar, and preset a first threshold based on the size of the intruder, judge and generate a camera control signal, and use the The camera control signal is sent to the camera; 摄像头,用于在接收到所述主控制器发送的摄像头控制信号后,分析并提取所述摄像头控制信号中的位置信息,根据所述摄像头控制信号操作所述摄像头的云台转动,并使所述摄像头焦距对焦至所述位置信息中对应的位置,对所示位置的图像进行采集,生成图像信号,基于所述图像信号进行入侵物识别处理,判断入侵物特征并生成报警信号。The camera is used for analyzing and extracting the position information in the camera control signal after receiving the camera control signal sent by the main controller, operating the pan-tilt of the camera to rotate according to the camera control signal, and making all The focal length of the camera is focused to the corresponding position in the position information, the image of the shown position is collected, an image signal is generated, the intruder identification processing is performed based on the image signal, the characteristics of the intruder are judged, and an alarm signal is generated. 11.一种电子设备,其特征在于,包括11. An electronic device, characterized in that it comprises 处理器;以及processor; and 存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令被所述处理器执行时实现根据权利要求1至9中任一项所述的方法。a memory having computer readable instructions stored thereon, the computer readable instructions implementing the method according to any one of claims 1 to 9 when executed by the processor. 12.一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现根据权利要求1至9中任一项所述方法。12. A computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 9.
CN202210461907.2A 2022-04-28 2022-04-28 A method and device for detecting remote personnel intrusion under no-light conditions Pending CN114973564A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210461907.2A CN114973564A (en) 2022-04-28 2022-04-28 A method and device for detecting remote personnel intrusion under no-light conditions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210461907.2A CN114973564A (en) 2022-04-28 2022-04-28 A method and device for detecting remote personnel intrusion under no-light conditions

Publications (1)

Publication Number Publication Date
CN114973564A true CN114973564A (en) 2022-08-30

Family

ID=82979227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210461907.2A Pending CN114973564A (en) 2022-04-28 2022-04-28 A method and device for detecting remote personnel intrusion under no-light conditions

Country Status (1)

Country Link
CN (1) CN114973564A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115497242A (en) * 2022-09-07 2022-12-20 东南大学 Intelligent monitoring system and monitoring method for foreign matter invasion in railway business line construction
CN115512281A (en) * 2022-11-21 2022-12-23 北京数字绿土科技股份有限公司 Invader monitoring method and system combining video camera and laser radar
CN117274905A (en) * 2023-09-27 2023-12-22 北京数字绿土科技股份有限公司 Scene monitoring and invader tracking method
CN120468873A (en) * 2025-07-14 2025-08-12 杭州定川信息技术有限公司 Intrusion detection method, device and electronic equipment based on laser radar

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106872995A (en) * 2017-04-14 2017-06-20 北京佳讯飞鸿电气股份有限公司 A kind of laser radar detection method and device
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN110220529A (en) * 2019-06-17 2019-09-10 深圳数翔科技有限公司 A kind of localization method of trackside automatic driving vehicle
CN110515095A (en) * 2019-09-29 2019-11-29 北京智行者科技有限公司 Data processing method and system based on multiple laser radars
CN110719442A (en) * 2019-10-12 2020-01-21 深圳市镭神智能系统有限公司 Security monitoring system
CN210515560U (en) * 2019-11-06 2020-05-12 浙江大有实业有限公司杭州科技发展分公司 Electronic fence system
CN111337941A (en) * 2020-03-18 2020-06-26 中国科学技术大学 Dynamic obstacle tracking method based on sparse laser radar data
CN111928862A (en) * 2020-08-10 2020-11-13 廊坊和易生活网络科技股份有限公司 Method for constructing semantic map on line by fusing laser radar and visual sensor
CN112133050A (en) * 2020-09-15 2020-12-25 朱新培 Perimeter alarm device based on microwave radar and method thereof
CN112132857A (en) * 2020-09-18 2020-12-25 福州大学 Dynamic Object Detection and Static Map Reconstruction Method for Dynamic Environment Hybrid Vision System
CN112883866A (en) * 2021-02-08 2021-06-01 上海新纪元机器人有限公司 Method, system and storage medium for detecting regional invasion in real time
CN113240887A (en) * 2021-05-14 2021-08-10 深圳市安泰数据监测科技有限公司 Slope rockfall collapse monitoring method, device and equipment
WO2022022694A1 (en) * 2020-07-31 2022-02-03 北京智行者科技有限公司 Method and system for sensing automated driving environment
CN114241298A (en) * 2021-11-22 2022-03-25 腾晖科技建筑智能(深圳)有限公司 Tower crane environment target detection method and system based on laser radar and image fusion

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106872995A (en) * 2017-04-14 2017-06-20 北京佳讯飞鸿电气股份有限公司 A kind of laser radar detection method and device
CN108615321A (en) * 2018-06-07 2018-10-02 湖南安隆软件有限公司 Security pre-warning system and method based on radar detecting and video image behavioural analysis
CN110220529A (en) * 2019-06-17 2019-09-10 深圳数翔科技有限公司 A kind of localization method of trackside automatic driving vehicle
CN110515095A (en) * 2019-09-29 2019-11-29 北京智行者科技有限公司 Data processing method and system based on multiple laser radars
CN110719442A (en) * 2019-10-12 2020-01-21 深圳市镭神智能系统有限公司 Security monitoring system
CN210515560U (en) * 2019-11-06 2020-05-12 浙江大有实业有限公司杭州科技发展分公司 Electronic fence system
CN111337941A (en) * 2020-03-18 2020-06-26 中国科学技术大学 Dynamic obstacle tracking method based on sparse laser radar data
WO2022022694A1 (en) * 2020-07-31 2022-02-03 北京智行者科技有限公司 Method and system for sensing automated driving environment
CN111928862A (en) * 2020-08-10 2020-11-13 廊坊和易生活网络科技股份有限公司 Method for constructing semantic map on line by fusing laser radar and visual sensor
CN112133050A (en) * 2020-09-15 2020-12-25 朱新培 Perimeter alarm device based on microwave radar and method thereof
CN112132857A (en) * 2020-09-18 2020-12-25 福州大学 Dynamic Object Detection and Static Map Reconstruction Method for Dynamic Environment Hybrid Vision System
CN112883866A (en) * 2021-02-08 2021-06-01 上海新纪元机器人有限公司 Method, system and storage medium for detecting regional invasion in real time
CN113240887A (en) * 2021-05-14 2021-08-10 深圳市安泰数据监测科技有限公司 Slope rockfall collapse monitoring method, device and equipment
CN114241298A (en) * 2021-11-22 2022-03-25 腾晖科技建筑智能(深圳)有限公司 Tower crane environment target detection method and system based on laser radar and image fusion

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115497242A (en) * 2022-09-07 2022-12-20 东南大学 Intelligent monitoring system and monitoring method for foreign matter invasion in railway business line construction
CN115497242B (en) * 2022-09-07 2023-11-17 东南大学 An intelligent monitoring system and monitoring method for foreign matter intrusion for railway business line construction
CN115512281A (en) * 2022-11-21 2022-12-23 北京数字绿土科技股份有限公司 Invader monitoring method and system combining video camera and laser radar
CN117274905A (en) * 2023-09-27 2023-12-22 北京数字绿土科技股份有限公司 Scene monitoring and invader tracking method
CN120468873A (en) * 2025-07-14 2025-08-12 杭州定川信息技术有限公司 Intrusion detection method, device and electronic equipment based on laser radar

Similar Documents

Publication Publication Date Title
CN114973564A (en) A method and device for detecting remote personnel intrusion under no-light conditions
US6989745B1 (en) Sensor device for use in surveillance system
US8743204B2 (en) Detecting and monitoring event occurrences using fiber optic sensors
US7242295B1 (en) Security data management system
US7342489B1 (en) Surveillance system control unit
WO2021253961A1 (en) Intelligent visual perception system
CN111696390B (en) Intelligent airport runway FOD device and working process thereof
WO2019179024A1 (en) Method for intelligent monitoring of airport runway, application server and computer storage medium
CN109040693B (en) Intelligent alarm system and method
CN106781165A (en) A kind of indoor multi-cam intelligent linkage supervising device based on depth sensing
CN108802758A (en) A kind of Intelligent security monitoring device, method and system based on laser radar
CN102811343A (en) An Intelligent Video Surveillance System Based on Behavior Recognition
CN103929592A (en) All-dimensional intelligent monitoring equipment and method
CN105574468A (en) Video flame detection method, device and system
KR20210103210A (en) Apparatus for Processing Images and Driving Method Thereof
CN111460949B (en) Real-time monitoring method and system for preventing external damage of power transmission line
CN107547867A (en) A kind of outside transformer substation video monitoring system and monitoring method
CN104243894A (en) Audio and video fused monitoring method
CN119484781A (en) A smart security integrated management and control system based on cloud services
CN118823940A (en) A regional intrusion warning system based on edge computing and fusion perception
CN106303461A (en) Movable-type intelligent safety device based on video analysis
TWI706381B (en) Method and system for detecting image object
TWI476735B (en) Abnormal classification detection method for a video camera and a monitering host with video image abnormal detection
KR100902275B1 (en) Closed Circuit System for Intelligent Security Crime and Its Method
Ilić The Integration of Artificial Intelligence and Computer Vision in Large-Scale Video Surveillance of Railway Stations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220830