CN113313899A - Security monitoring analysis processing method based on big data - Google Patents
Security monitoring analysis processing method based on big data Download PDFInfo
- Publication number
- CN113313899A CN113313899A CN202110203618.8A CN202110203618A CN113313899A CN 113313899 A CN113313899 A CN 113313899A CN 202110203618 A CN202110203618 A CN 202110203618A CN 113313899 A CN113313899 A CN 113313899A
- Authority
- CN
- China
- Prior art keywords
- target object
- monitoring
- module
- picture
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/40—Scenes; Scene-specific elements in video content
- G06V20/41—Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
- G06V40/173—Classification, e.g. identification face re-identification, e.g. recognising unknown faces across different face tracks
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Software Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a security monitoring analysis processing method based on big data, which is used for solving the problems that security accidents cannot be timely alarmed and security monitoring strength is poor, and comprises the following specific steps: acquiring a video monitoring picture and marking a warning area; when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame; calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area according to the result value and a preset value, and identifying and monitoring a target object in the video monitoring picture; when the target object coincides with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
Description
Technical Field
The invention belongs to the technical field of big data, relates to a security monitoring analysis technology, and particularly relates to a security monitoring analysis processing method based on big data.
Background
The security monitoring system is an independent and complete system formed by transmitting video signals in a closed loop by using optical fibers, coaxial cables or microwaves, displaying and recording images, can reflect a monitored object in real time, vividly and truly, can replace manual work to monitor for a long time in a severe environment, and records the video signals through a video recorder. The video security monitoring system is an electronic system or a network which utilizes a video detection technology to monitor a fortification area and display and record field images in real time, and mainly comprises four parts, namely front-end equipment, transmission equipment, processing/control equipment and recording/display equipment.
In the current household life, only a monitoring camera is arranged for security monitoring, the current security accident cannot give an alarm in time, the current security accident can only be checked through a monitoring video afterwards, the security monitoring strength is poor, and therefore a security monitoring analysis processing method based on big data is provided.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a security monitoring analysis processing method based on big data.
The technical problem to be solved by the invention is as follows:
(1) how to solve the problem that the security accident can not be alarmed in time and can only be checked through the monitoring video afterwards;
(2) how to promote the security protection monitoring strength of the household life.
The purpose of the invention can be realized by the following technical scheme:
a security monitoring analysis processing method based on big data comprises the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
Further, the construction steps of the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: and constructing a warning area in the initial picture through the coordinates of the specific marking points, wherein the warning area is mainly a valuable article storage area in indoor household life.
The monitoring system is applied to the security monitoring analysis processing method and comprises a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a safety monitoring module, a temporary storage module, an area judgment module and a central processing module, wherein the data acquisition module comprises a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object comprises face information, body shape information and action information, the face information comprises a face image and face complexion, and the body shape information comprises height information, head length, neck length and leg length;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: carrying out safety detection and identity recognition on the image information of the target object in the suspected detection frame through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data.
Further, the data acquisition module transmits the image information to an identity recognition module, the identity recognition module is used for carrying out identity recognition on the image information in the video monitoring picture, if identity matching is passed, the target object is determined to be the owner, and if identity matching is not passed, the target object is determined not to be the owner.
Further, the identity recognition module sends the image information of the target object which is not matched with the image information of the target object to the data analysis module;
the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends out an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on.
Furthermore, the camera consists of a main monitoring probe and three auxiliary probes arranged on the outer surface of the main monitoring probe;
the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the method, a warning area under a video monitoring picture is established, when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, the target picture of the target object is obtained according to the detection frame, the region coincidence judgment is carried out on an active region and the warning area of the target object through a region judgment module, pixel points of an initial picture and the target picture are calculated to obtain a result value, whether the detection frame coincides with the warning area or not is judged according to the result value and a preset value, when the result value is equal to the preset value, the detection frame coincides with the warning area, and when the result value is not equal to the preset value, the detection frame does not coincide with the warning area;
2. the method comprises the steps of carrying out safety detection and identity recognition on image information of a target object in a suspected detection frame in a video monitoring picture through a safety monitoring module and an identity recognition module, judging whether the image information is an owner or not through comparison, carrying out action information analysis on the image information of the target object which is not matched with the image information through a data analysis module, carrying out safety monitoring on the action information generating a safety monitoring signal through the safety monitoring module to obtain final identity information, starting timing if the target object is coincident with a warning area, comparing a timing result with a preset time threshold value, and sending an alarm if the time is out.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
FIG. 1 is a flow chart of the operation of the present invention;
fig. 2 is an overall system block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a security monitoring analysis processing method based on big data is mainly applied to indoor home life, and includes the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
the construction steps of the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: constructing a warning area in an initial picture through coordinates of a specific marking point, wherein the warning area is mainly an indoor valuables storage area in home life, such as a safe box area, a household appliance area, a wallet placing area and the like;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
Example two
Referring to fig. 2, based on still another concept of the same invention, the security monitoring analysis processing method further includes a monitoring system, the monitoring system is applied to the security monitoring analysis processing method, the monitoring system includes a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a security monitoring module, a temporary storage module, an area determination module, and a central processing module, the data acquisition module includes a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object includes face information, body shape information, motion information, and the like, the face information includes face images, face complexion, and the like, and the body shape information includes height information, head length, neck length, leg length, and the like;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: the image information of the target object is subjected to safety detection and identity recognition through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data; the data acquisition module transmits the image information to an identity recognition module, the identity recognition module is used for carrying out identity recognition on the image information in the video monitoring picture, if identity matching is passed, the target object is judged to be the owner, and if identity matching is not passed, the target object is judged not to be the owner;
the identity recognition module sends the image information of the target object which is not matched with the image information of the target object to the data analysis module; the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on;
the camera consists of a main monitoring probe and three auxiliary probes arranged on the outer surface of the main monitoring probe; the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
The above formulas are all calculated by taking the numerical value of the dimension, the formula is a formula which obtains the latest real situation by acquiring a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.
Claims (6)
1. A security monitoring analysis processing method based on big data is characterized by comprising the following specific steps:
the method comprises the following steps: constructing a warning area: acquiring a video monitoring picture and marking a warning area;
step two: acquiring a target picture: when the video monitoring picture contains a target object, a detection frame surrounding the target object is defined for the target object, and the target picture of the target object is obtained according to the detection frame;
step three: and (3) detecting intrusion in an alarm area: calculating each pixel point of the initial picture and the target picture to obtain a result value, judging whether the detection frame is overlapped with the warning area or not according to the result value and a preset value, and judging that the detection frame is overlapped with the warning area when the result value is equal to the preset value; when the result value is not equal to the preset value, judging that the detection frame is not coincident with the warning area; wherein, each warning area zooms or enlarges the video monitoring picture with the same area in an equal ratio;
step four: target object identification and monitoring: identifying and monitoring a target object in a video monitoring picture;
step five: timing and alarming: and when the target object is coincident with the warning area, timing is started, the timing result is compared with a preset time threshold value, and when the target object is overtime, an alarm is given out.
2. The security monitoring, analyzing and processing method based on big data as claimed in claim 1, wherein the steps of constructing the warning area are as follows:
step S1, acquiring a video monitoring picture: acquiring video monitoring pictures of a plurality of monitoring devices;
step S2, establishing a coordinate system: acquiring the starting time of a video monitoring picture, establishing a coordinate system by taking the video monitoring picture at the starting time as an initial picture, wherein the origin of the coordinate system is a specific annotation point in the initial picture;
step S3, constructing an alert area: and constructing a warning area in the initial picture through the coordinates of the specific marking points, wherein the warning area is mainly a valuable article storage area in indoor household life.
3. The security monitoring, analyzing and processing method based on big data as claimed in claim 1, it is characterized in that the security monitoring analysis processing method comprises a monitoring system, the monitoring system is applied to the security monitoring analysis processing method, the monitoring system comprises a user terminal, a storage module, a data acquisition module, an identity recognition module, a data analysis module, a safety monitoring module, a temporary storage module, an area judgment module and a central processing module, the data acquisition module comprises a camera, the camera is used for monitoring an indoor video monitoring picture in real time and automatically acquiring image information of a target object in the indoor video monitoring picture, the image information of the target object comprises face information, body shape information and action information, the face information comprises a face image and face complexion, and the body shape information comprises height information, head length, neck length and leg length;
the area judgment module is used for carrying out area superposition judgment on the active area of the target object, and the area superposition judgment process specifically comprises the following steps:
k1: scaling or expanding the detection frame in an equal ratio until the area of the detection frame is equal to that of the warning area;
k2: calculating the proportion of the detection frame to pixel points with the same color in any warning area respectively;
k3: if the detection frame has the condition that the pixel point ratios are equal under the same color, marking the detection frame as a suspected detection frame;
k4: carrying out safety detection and identity recognition on the image information of the target object in the suspected detection frame through a safety monitoring module and an identity recognition module;
the storage module is used for storing the image information of the target object and the pre-stored image information which are acquired by the data acquisition module; the storage module is connected with the internet data and used for acquiring the internet data.
4. The security monitoring analysis processing method based on big data as claimed in claim 3, wherein the data acquisition module transmits the image information to the identity recognition module, the identity recognition module is used for performing identity recognition on the image information in the video monitoring picture, if the identity matching is passed, the target object is determined to be the owner, and if the identity matching is not passed, the target object is determined not to be the owner.
5. The security monitoring, analyzing and processing method based on big data as claimed in claim 3, wherein the identity recognition module sends the image information of the target object which is not matched with the image information to the data analysis module;
the data analysis module is used for carrying out data analysis on the image information of the target object which is not matched with the image information, generating a continuous safety monitoring signal or sending alarm information to the user terminal, the user terminal sends out an alarm sound after receiving the alarm information, and meanwhile, the central processing module controls the indoor light to be turned on.
6. The security monitoring analysis processing method based on big data as claimed in claim 3, wherein the camera is composed of a main monitoring probe and three auxiliary probes installed on the outer surface of the main monitoring probe;
the identity recognition module sends a safety monitoring signal to the safety monitoring module, and the safety monitoring module is used for carrying out safety monitoring on the image information of the target object after receiving the safety detection signal transmitted by the identity recognition module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110203618.8A CN113313899A (en) | 2021-02-24 | 2021-02-24 | Security monitoring analysis processing method based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110203618.8A CN113313899A (en) | 2021-02-24 | 2021-02-24 | Security monitoring analysis processing method based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113313899A true CN113313899A (en) | 2021-08-27 |
Family
ID=77370505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110203618.8A Withdrawn CN113313899A (en) | 2021-02-24 | 2021-02-24 | Security monitoring analysis processing method based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113313899A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113869159A (en) * | 2021-09-16 | 2021-12-31 | 泰州蝶金软件有限公司 | Cloud server data management system |
CN113947591A (en) * | 2021-10-28 | 2022-01-18 | 中国建设银行股份有限公司 | Method, device, electronic device, and storage medium for detecting object abnormality |
CN115171361A (en) * | 2022-09-02 | 2022-10-11 | 广东中科凯泽信息科技有限公司 | Dangerous behavior intelligent detection and early warning method based on computer vision |
CN116600087A (en) * | 2023-06-09 | 2023-08-15 | 北京城建智控科技股份有限公司 | Integrated machine device for video analysis, video analysis method and system |
CN114978744B (en) * | 2022-06-08 | 2024-05-17 | 北京多正科技有限公司 | Block chain-based security information transmission method and system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090324010A1 (en) * | 2008-06-26 | 2009-12-31 | Billy Hou | Neural network-controlled automatic tracking and recognizing system and method |
CN107818651A (en) * | 2017-10-27 | 2018-03-20 | 华润电力技术研究院有限公司 | A method and device for illegal border crossing alarm based on video surveillance |
CN109257569A (en) * | 2018-10-24 | 2019-01-22 | 广东佳鸿达科技股份有限公司 | Security protection video monitoring analysis method |
CN109492548A (en) * | 2018-10-24 | 2019-03-19 | 广东佳鸿达科技股份有限公司 | The preparation method of region mask picture based on video analysis |
CN109785564A (en) * | 2019-03-21 | 2019-05-21 | 安徽威尔信通信科技有限责任公司 | A kind of home intelligent safety defense monitoring system |
CN109951637A (en) * | 2019-03-19 | 2019-06-28 | 温州洪启信息科技有限公司 | Safety monitoring probe analysis and processing method based on big data |
CN110176117A (en) * | 2019-06-17 | 2019-08-27 | 广东翔翼科技信息有限公司 | A kind of monitoring device and monitoring method of Behavior-based control identification technology |
CN110689694A (en) * | 2019-10-17 | 2020-01-14 | 重庆工商职业学院 | Intelligent monitoring system and method based on image processing |
CN110853276A (en) * | 2019-12-05 | 2020-02-28 | 电子科技大学中山学院 | Intelligent security intrusion detection system |
CN112183251A (en) * | 2020-09-15 | 2021-01-05 | 合肥未来计算机技术开发有限公司 | A monitoring system for weak current security engineering of the Internet of Things |
-
2021
- 2021-02-24 CN CN202110203618.8A patent/CN113313899A/en not_active Withdrawn
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090324010A1 (en) * | 2008-06-26 | 2009-12-31 | Billy Hou | Neural network-controlled automatic tracking and recognizing system and method |
CN107818651A (en) * | 2017-10-27 | 2018-03-20 | 华润电力技术研究院有限公司 | A method and device for illegal border crossing alarm based on video surveillance |
CN109257569A (en) * | 2018-10-24 | 2019-01-22 | 广东佳鸿达科技股份有限公司 | Security protection video monitoring analysis method |
CN109492548A (en) * | 2018-10-24 | 2019-03-19 | 广东佳鸿达科技股份有限公司 | The preparation method of region mask picture based on video analysis |
CN109951637A (en) * | 2019-03-19 | 2019-06-28 | 温州洪启信息科技有限公司 | Safety monitoring probe analysis and processing method based on big data |
CN111818308A (en) * | 2019-03-19 | 2020-10-23 | 温州洪启信息科技有限公司 | Security monitoring probe analysis processing method based on big data |
CN109785564A (en) * | 2019-03-21 | 2019-05-21 | 安徽威尔信通信科技有限责任公司 | A kind of home intelligent safety defense monitoring system |
CN110176117A (en) * | 2019-06-17 | 2019-08-27 | 广东翔翼科技信息有限公司 | A kind of monitoring device and monitoring method of Behavior-based control identification technology |
CN110689694A (en) * | 2019-10-17 | 2020-01-14 | 重庆工商职业学院 | Intelligent monitoring system and method based on image processing |
CN110853276A (en) * | 2019-12-05 | 2020-02-28 | 电子科技大学中山学院 | Intelligent security intrusion detection system |
CN112183251A (en) * | 2020-09-15 | 2021-01-05 | 合肥未来计算机技术开发有限公司 | A monitoring system for weak current security engineering of the Internet of Things |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113869159A (en) * | 2021-09-16 | 2021-12-31 | 泰州蝶金软件有限公司 | Cloud server data management system |
CN113947591A (en) * | 2021-10-28 | 2022-01-18 | 中国建设银行股份有限公司 | Method, device, electronic device, and storage medium for detecting object abnormality |
CN114978744B (en) * | 2022-06-08 | 2024-05-17 | 北京多正科技有限公司 | Block chain-based security information transmission method and system |
CN115171361A (en) * | 2022-09-02 | 2022-10-11 | 广东中科凯泽信息科技有限公司 | Dangerous behavior intelligent detection and early warning method based on computer vision |
CN116600087A (en) * | 2023-06-09 | 2023-08-15 | 北京城建智控科技股份有限公司 | Integrated machine device for video analysis, video analysis method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113313899A (en) | Security monitoring analysis processing method based on big data | |
CN110044486B (en) | Method, device and equipment for avoiding repeated alarm of human body inspection and quarantine system | |
US20230076969A1 (en) | Industrial equipment and device monitoring-alarm system, and method therefor | |
CN108764668A (en) | A kind of facilities management system and method based on BIM technology | |
CN104318732A (en) | Transformer substation field worker monitoring and management system and method based on video analysis and RFID | |
CN105516653A (en) | Security and protection monitoring system | |
CN110867046A (en) | Intelligent car washer video monitoring and early warning system based on cloud computing | |
CN112991659B (en) | Big data security monitoring management method with early warning processing function | |
CN108873791A (en) | A kind of substation field violation detection early warning system | |
CN210222962U (en) | Intelligent electronic fence system | |
CN111985331B (en) | Detection method and device for preventing trade secret from being stolen | |
CN116259013B (en) | Intrusion detection system | |
CN114155492A (en) | High-altitude operation safety belt hanging rope high-hanging low-hanging use identification method and device and electronic equipment | |
CN112614260A (en) | Intelligent security system based on face recognition and positioning | |
CN116343429A (en) | Fire monitoring and alarming system for chemical production place | |
CN112348306A (en) | A TitanOS artificial intelligence development method and device for power distribution inspection | |
CN110533889A (en) | A kind of sensitizing range electronic equipment monitoring positioning device and method | |
CN118747872A (en) | Cable line abnormal status alarm method | |
CN213457742U (en) | Welding operation monitoring system | |
CN106385559A (en) | Three-dimensional monitoring system | |
CN108256502A (en) | Security system based on image procossing | |
CN111640282A (en) | Method, system and device for monitoring safety distance of personnel in power distribution room | |
CN112633157A (en) | AGV working area safety real-time detection method and system | |
CN115346170B (en) | Intelligent monitoring method and device for gas facility area | |
CN117373113A (en) | Live working personnel behavior recognition method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210827 |
|
WW01 | Invention patent application withdrawn after publication |