Disclosure of Invention
The application provides a cloud service-based intelligent security comprehensive management and control system, which comprises the following components:
A plurality of fixed point monitoring modules;
a plurality of mobile monitoring modules;
A cloud server;
The fixed point monitoring modules and the mobile monitoring modules are connected to the cloud server in a communication mode, and the fixed point monitoring modules are respectively positioned and installed at preset monitoring installation positions;
The fixed point monitoring module comprises a first camera module, an angle sensing module, an azimuth sensing module, an angle adjusting module and an azimuth adjusting module, wherein the angle sensing module, the azimuth sensing module, the angle adjusting module and the azimuth adjusting module are respectively connected with the first camera module;
The mobile monitoring module comprises a mobile module, a positioning module and a second camera module, wherein the positioning module and the second camera module are respectively connected to the mobile module;
The intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring deployment strategy, and the intelligent security comprehensive management and control system comprises the following steps:
A1, mapping a preset security area to obtain corresponding security area digital model data;
a2, determining corresponding security boundary area data according to security area digital model data and preset boundary width;
a3, acquiring corresponding shooting pitching angles and shooting azimuth angles through each fixed point monitoring module;
A4, acquiring installation positioning data, a vertical field angle and a horizontal field angle corresponding to each fixed point monitoring module;
A5, calculating corresponding monitoring view azimuth data according to the installation positioning data, the vertical view angle, the horizontal view angle, the shooting pitching angle and the shooting azimuth angle corresponding to each fixed point monitoring module;
a6, respectively determining corresponding fixed point monitoring area data according to the monitoring visual field azimuth data corresponding to each fixed point monitoring module and the security area digital model data;
A7, generating fixed-point monitoring coverage area data according to all fixed-point monitoring area data combinations;
A8, determining the data of the uncovered monitoring boundary region according to the comparison of the data of the fixed-point monitoring coverage region and the data of the security boundary region;
And A9, controlling the mobile monitoring module to move to the area corresponding to the uncovered boundary area data and executing the monitoring action.
Through adopting above-mentioned technical scheme, the wisdom security protection is synthesized management and control system based on cloud service can combine the data analysis and the management of cloud server through the collaborative work of fixed point control module and mobile monitoring module, not only can accurately cover the boundary in security protection district, can also automatic identification and fill the control blind area, has improved the reliability of security protection control.
Optionally, the cloud server includes a storage unit, an identification unit, a communication unit and a control unit, where the storage unit, the identification unit and the communication unit are connected to the control unit in data, and the communication unit is connected to each fixed point monitoring module and each mobile monitoring module in communication;
the intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring and early warning strategy, and the intelligent security comprehensive management and control system comprises the following steps:
B1, acquiring corresponding fixed-point monitoring video data through each fixed-point monitoring module;
B2, transmitting each fixed point monitoring video data to the cloud server in real time;
B3, generating corresponding event confidence and data time according to each fixed-point monitoring video data by the cloud server through a preset event recognition algorithm;
and B4, if the event confidence coefficient is larger than a preset event trigger threshold, defining the corresponding data moment as the event trigger moment, and sending a preset event trigger warning to a preset monitoring background.
By adopting the technical scheme, the intelligent security comprehensive management and control system based on the cloud service can analyze the monitoring video in real time through the event identification algorithm, and can accurately identify and rapidly respond to potential security threats through quantitative evaluation of event confidence and a threshold trigger mechanism, so that the early warning efficiency and accuracy of the security system are improved, and timely and reliable decision support is provided for security management staff.
Optionally, the storage unit includes a temporary storage module, a high-performance storage module and a general storage module, where the high-performance storage module and the general storage module are respectively connected to the temporary storage module by data, and the temporary storage module is respectively connected to the communication unit and the identification unit by data;
the intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring video storage strategy, and the intelligent security comprehensive management and control system comprises the following steps:
C1, after receiving the fixed point monitoring video data, the cloud server stores the fixed point monitoring video data in the temporary storage module;
C2, storing the fixed-point monitoring video data in the temporary storage module to the general storage module;
C3, determining corresponding event time window data according to all event trigger moments corresponding to the fixed point monitoring video data;
c4, acquiring a corresponding event time window video data set from the fixed-point monitoring video data according to the event time window data;
And C5, storing the event time window video data set in the high-performance storage module.
Through adopting above-mentioned technical scheme, the intelligent security comprehensive management and control system based on cloud service can be through the hierarchical storage framework of temporary storage module, high performance storage module and general storage module, has realized the classified management to monitoring video data, can be with important event video data priority storage in high performance storage module, ensure the quick access and the high-efficient processing of key video data, save all video data through general storage module simultaneously, not only improved response speed and the inquiry efficiency of system to important security events, still played the effect of backup to key video data.
Optionally, the identification unit includes an event identification module, a person identification module and a face identification module, where the event identification module, the person identification module and the face identification module are respectively connected with the temporary storage module and the control unit in a data manner.
Through the adoption of the technical scheme, the intelligent security comprehensive management and control system based on the cloud service can comprehensively capture each dimension of security events from the whole world to the part through the progressive recognition process of three layers of event recognition, person recognition and face recognition, the layered recognition not only improves the recognition accuracy and efficiency of the system, but also can provide more detailed event information and personnel characteristics, and provides powerful technical support for security management and event tracing.
Optionally, the cloud service-based intelligent security comprehensive management and control system further includes an event information identification policy, including the following steps:
D1, generating corresponding event confidence and data moment by an event recognition algorithm according to the fixed point monitoring video data in the event recognition module;
if the event confidence coefficient is larger than the event trigger threshold, transmitting an event video frame corresponding to the data moment to the person identification module;
d3, identifying event video frames through a preset human body identification algorithm in the human body identification module to determine corresponding human body image data;
If the human body image data is not null, identifying and generating corresponding human face image data according to the human body image data in the human face identification module through a preset human face identification algorithm;
D5, generating event information data according to the data moment and the corresponding monitoring number information combination corresponding to the event video frame, the human body image data, the human face image data and the fixed point monitoring video data;
and D6, transmitting the event information data to the monitoring background.
Through adopting above-mentioned technical scheme, intelligent security comprehensive management and control system based on cloud service can combine timestamp and monitor number through the series connection processing of incident identification, human discernment and face identification, has realized the omnidirectional information acquisition and the integration to security event, and this kind of identification flow that advances gradually layer upon layer not only can ensure the accuracy and the integrality of discernment, can also screen and integrate key information effectively, provides the event report of detail for security manager, has promoted security system's information timeliness and decision support ability.
Optionally, the event information identification policy further includes the steps of:
E1, matching and searching in a preset known personnel face database according to the face image data in the event information data;
E2, if the face image data is successfully matched with the face database of the known person, adding corresponding known person information into event information data;
E3, if the matching of the face image data in the face database of the known person fails, adding preset unknown person warning information into event information data;
e4, if the unknown person warning information exists in the event information data, estimating corresponding unknown person positioning data according to the event information data and the corresponding fixed point monitoring area data of the fixed point monitoring module;
And E5, adding the unknown personnel positioning data to the event information data.
Through adopting above-mentioned technical scheme, the wisdom security protection comprehensive control system based on cloud service can be through the real-time matching with known personnel database, not only can discern known personnel fast, can also mark and the position estimation to unknown personnel, has both improved the early warning ability to suspicious personnel, has provided accurate spatial information for subsequent security protection response through the estimation of position data again, has greatly strengthened security protection system's initiative defense and quick response ability.
Optionally, the event information identification policy further includes the following steps for estimating unknown person location data:
E401, determining the corresponding transverse length and longitudinal length of the area according to the fixed point monitoring area data of the fixed point monitoring module corresponding to the event information data;
e402, determining a corresponding human body identification frame in the event video frame according to the human body image data in the event information data;
E403, determining the pixel coordinate of the midpoint of the bottom edge of the human body identification frame in the event video frame and defining the pixel coordinate as the pixel coordinate of the human body position;
E404, determining a corresponding horizontal coordinate percentage position and a corresponding vertical coordinate percentage position according to the pixel coordinates of the human body position in the event video frame;
and E405, determining corresponding unknown personnel positioning data according to the data of the horizontal coordinate percentage position and the vertical coordinate percentage position in the fixed point monitoring area.
Through the adoption of the technical scheme, the intelligent security comprehensive management and control system based on the cloud service can realize conversion from a two-dimensional image to an actual space coordinate by mapping the pixel coordinates in the video frame and the physical size of the actual monitoring area and combining the midpoint positioning and the percentage position calculation of the bottom edge of the human body identification frame, so that the actual size characteristics of the monitoring area are considered, the accuracy and the applicability of position estimation are improved through standardized percentage positioning, and reliable space reference data are provided for the positioning and tracking of unknown personnel.
Optionally, the event information identification policy further includes the steps of:
F1, displaying corresponding personnel identification graphics in security area digital model data according to unknown personnel positioning data;
F2, controlling the mobile monitoring module to go to a corresponding area according to the unknown personnel positioning data, and acquiring the mobile positioning data corresponding to the mobile monitoring module;
F3, displaying a corresponding mobile monitoring identification graph in the security area digital model data according to the mobile positioning data;
and F4, determining optimal moving path data according to the unknown personnel positioning data, the moving positioning data and the security area digital model data, and displaying corresponding moving path graphs in the security area digital model data.
Through adopting above-mentioned technical scheme, the wisdom security protection comprehensive management and control system based on cloud service can be through showing personnel's position, mobile monitoring equipment position and best travel path on digital model in real time, has realized the visualized management of security protection control, based on automatic planning optimal inspection route, and then intelligent scheduling mobile monitoring module carries out dynamic tracking, through the show mode of graphics simultaneously, makes security protection personnel grasp the scene situation directly perceivedly, has greatly promoted security protection system's real-time monitoring effect and emergency response ability.
In summary, the present application includes at least one of the following beneficial technical effects:
1. Through the collaborative work of the fixed point monitoring module and the mobile monitoring module, the cloud server data analysis and management are combined, the boundary of the security area can be accurately covered, the monitoring blind area can be automatically identified and filled, and the security monitoring reliability is improved.
2. The monitoring video can be analyzed in real time through an event identification algorithm, potential security threats can be accurately identified and responded quickly through quantitative evaluation of event confidence and a threshold triggering mechanism, the early warning efficiency and accuracy of a security system are improved, and timely and reliable decision support is provided for security management staff.
3. The classified management of the monitoring video data can be realized through the classified storage architecture of the temporary storage module, the high-performance storage module and the general storage module, important event video data can be stored in the high-performance storage module preferentially, the quick access and the high-efficiency processing of the key video data are ensured, meanwhile, all video data are stored through the general storage module, the response speed and the query efficiency of the system to important security events are improved, and the backup effect of the key video data is also realized.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Embodiments of the application are described in further detail below with reference to the drawings.
Referring to fig. 1 and 2, the invention provides an intelligent security comprehensive management and control system based on cloud service, comprising:
A plurality of fixed point monitoring modules 10;
A plurality of mobile monitoring modules 20;
A cloud server 30;
Wherein, each fixed point monitoring module 10 and each mobile monitoring module 20 are connected to the cloud server 30 in a communication manner, and each fixed point monitoring module 10 is positioned and installed at a preset monitoring installation position;
The fixed point monitoring module 10 comprises a first camera module 11, an angle sensing module 12, an azimuth sensing module 13, an angle adjusting module 14 and an azimuth adjusting module 15, wherein the angle sensing module 12, the azimuth sensing module 13, the angle adjusting module 14 and the azimuth adjusting module 15 are respectively connected to the first camera module 11;
The mobile monitoring module 20 includes a mobile module 21, a positioning module 22 and a second camera module 23, where the positioning module 22 and the second camera module 23 are respectively connected to the mobile module 21.
Each fixed point monitoring module 10 is mainly used for being fixedly installed at each different position, and is used for obtaining monitoring videos of each azimuth of a monitoring area, and uploading the monitoring videos to the cloud server 30 for storage and analysis.
The first camera module 11 is mainly used for acquiring monitoring video data of corresponding directions;
the angle sensing module 12 is mainly used for acquiring a pitching angle value of the first camera module 11 in the vertical direction;
the azimuth sensing module 13 is mainly used for acquiring azimuth angle values of the first camera module 11 in the horizontal direction;
The angle adjusting module 14 is mainly used for adjusting the pitching angle of the first camera module 11 in the vertical direction;
The azimuth adjustment module 15 is mainly used for adjusting the azimuth angle of the first camera module 11 in the horizontal direction.
Each mobile monitoring module 20 is mainly used for supplementing video monitoring of the fixed point monitoring module 10, and can be used for filling an uncovered area for monitoring on one hand and controlling movement to monitor a specific area or object according to requirements on the other hand.
The moving module 21 is mainly used for controlled movement, so that the moving monitoring module 20 has moving capability, and the moving module 21 can be various carriers capable of controlled movement such as unmanned aerial vehicles or unmanned vehicles;
The positioning module 22 is mainly used for acquiring positioning data of the mobile monitoring module 20 so as to control movement;
The second camera module 23 is mainly configured to obtain a corresponding monitoring video, so as to supplement the monitoring video of each fixed point monitoring module 10;
the cloud server 30 is mainly used for receiving, storing and analyzing the monitoring video data acquired by the fixed point monitoring module 10 and the mobile monitoring module 20 to discover risks and warn.
The intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring deployment strategy, and the intelligent security comprehensive management and control system comprises the following steps:
A1, mapping a preset security area to obtain corresponding security area digital model data;
the security area is a preset area needing security monitoring;
The security area digital model data is three-dimensional model data of the security area, which can comprise objects such as terrain, roads, buildings and the like, and can be obtained through mapping by specific mapping equipment, and can also be obtained through mapping by mobile shooting of the mobile monitoring module 20 in the security area, for example, the existing mature technology can be used for mapping by unmanned aerial vehicle to build a three-dimensional model.
A2, determining corresponding security boundary area data according to security area digital model data and preset boundary width;
The boundary width is a preset width, is used for determining the width of an area needing to be monitored at the boundary of the security area, and can be set according to the monitoring requirement or the performance of monitoring equipment;
The security border area data is positioning information of an area needing video monitoring around the security area.
A3, acquiring corresponding shooting pitching angles and shooting azimuth angles through each fixed point monitoring module 10;
The shooting pitching angle is a pitching angle of the first shooting module 11 of the fixed point monitoring module 10 in the vertical direction;
The imaging azimuth angle is an azimuth angle of the first imaging module 11 of the fixed point monitoring module 10 in a horizontal direction.
A4, acquiring installation positioning data, a vertical field angle and a horizontal field angle corresponding to each fixed point monitoring module 10;
The installation positioning data is the positioning data of the installation position of the positioning monitoring module 20, and comprises horizontal coordinates and height data;
the installation positioning data can be measured and determined when the fixed point monitoring module 10 is installed;
The vertical angle of view is the angle of view of the first camera module 11 of the fixed point monitoring module 10 in the vertical direction, and determines the range of pictures that the first camera module 11 can shoot in the vertical direction;
The horizontal angle of view is the angle of view of the first camera module 11 of the fixed point monitoring module 10 in the horizontal direction, and determines the range of pictures that the first camera module 11 can shoot in the horizontal direction;
the vertical view angle and the horizontal view angle can be determined when the first camera module 11 of different model types is selected.
A5, calculating corresponding monitoring view azimuth data according to the installation positioning data, the vertical view angle, the horizontal view angle, the shooting pitching angle and the shooting azimuth angle corresponding to each fixed point monitoring module 10;
The monitoring view azimuth data is the shooting direction and the picture range of the monitoring video of the first camera module 11 of the fixed point monitoring module 10, and the corresponding shooting direction can be calculated according to the installation positioning data, the camera shooting pitching angle and the camera shooting azimuth angle, and the corresponding picture range can be determined according to the vertical view angle and the horizontal view angle;
For example, the monitoring view azimuth data may be determined by calculating ray azimuth data of four vertices in the monitoring screen of the fixed point monitoring module 10 based on the installation positioning data.
A6, respectively determining corresponding fixed point monitoring area data according to the monitoring visual field azimuth data corresponding to each fixed point monitoring module 10 in the security area digital model data;
The fixed point monitoring area data is the positioning data of the area where the fixed point monitoring module 10 can monitor and acquire the picture and the positioning data of the area where the monitoring picture can cover;
according to the digital model data projected to the security area at the installation position by the monitoring view azimuth data of the fixed point monitoring module 10, the coverage area of the corresponding monitoring picture can be determined.
A7, generating fixed-point monitoring coverage area data according to all fixed-point monitoring area data combinations;
The fixed point monitoring coverage area data is a set of fixed point monitoring area data corresponding to all the fixed point monitoring modules 10, and reflects all the areas covered by the fixed point monitoring modules 10.
A8, determining the data of the uncovered monitoring boundary region according to the comparison of the data of the fixed-point monitoring coverage region and the data of the security boundary region;
The monitoring uncovered boundary area data is an area which is not monitored and covered in the security boundary area data, and can be determined by comparing the fixed-point monitoring coverage area data with the security boundary area data;
a9, controlling the mobile monitoring module 20 to move to the area corresponding to the uncovered boundary area data and executing the monitoring action;
Controlling the mobile monitoring module 20 to move to an area which is not monitored and covered by the fixed point monitoring module 10 for monitoring and supplementing, for example, the mobile monitoring module can monitor by flying an unmanned aerial vehicle with a camera to a corresponding area;
Because the fixed point monitoring module 10 may be controlled to adjust the shooting direction and angle according to other requirements, so that the original shooting area is changed, and an unmonitored area with a certain area may be generated, the unmonitored area needs to be detected and monitored for replenishment.
Through the technical scheme, the intelligent security comprehensive management and control system based on cloud service can be used for combining data analysis and management of the cloud server through cooperative work of the fixed-point monitoring module and the mobile monitoring module, can accurately cover the boundary of a security area, can automatically identify and fill monitoring blind areas, and improves the reliability of security monitoring.
Further, the cloud server 30 includes a storage unit 31, an identification unit 32, a communication unit 33, and a control unit 34, where the storage unit 31, the identification unit 32, and the communication unit 33 are data-connected to the control unit 34, and the communication unit 33 is communicatively connected to each of the fixed point monitoring modules 10 and each of the mobile monitoring modules 20.
The storage unit 31 is mainly configured to store video image data collected by each of the fixed point monitoring modules 10 and each of the mobile monitoring modules 20, and various data and information generated based on analysis processing of the video image data;
The identifying unit 32 is mainly used for identifying and analyzing the video image data to find possible security risk events;
The communication unit 33 is mainly configured to establish a communication link and a data transmission path between the cloud server 30 and each of the fixed point monitoring modules 10, each of the mobile monitoring modules 20, and a corresponding control background;
The control unit 34 is mainly used for controlling each fixed point monitoring module 10 and each mobile monitoring module 20.
The intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring and early warning strategy, and the intelligent security comprehensive management and control system comprises the following steps:
B1, acquiring corresponding fixed-point monitoring video data through each fixed-point monitoring module 10;
the fixed point monitoring video data is monitoring video data obtained by shooting through the first camera module 11 of the fixed point monitoring module 10.
B2, transmitting each fixed point monitoring video data to the cloud server 30 in real time;
the site-directed surveillance video data is transmitted to the cloud server 30 for data analysis and data storage.
B3, generating corresponding event confidence and data time according to each fixed point monitoring video data by the cloud server 30 through a preset event recognition algorithm;
The event recognition algorithm is a preset algorithm, and can primarily recognize and judge whether an event occurs in a video picture according to the content of a plurality of video frames of video data, for example, whether an object displacement exists can be judged by judging the change of the video picture, the reliability degree of the recognition of the algorithm can be estimated further according to the displacement degree or the speed of the object, or a corresponding machine learning model can be trained through certain training data so as to generate a corresponding recognition model capable of carrying out event recognition, and the event occurrence is recognized;
the event confidence is a probability degree value of the occurrence event obtained by an event recognition algorithm;
The data time is the time corresponding to the event confidence, that is, the time corresponding to the video frame currently identified by the event identification algorithm, for example, the event identification algorithm performs event identification by extracting the video frame in the time window with the length of 3 seconds, and the corresponding data time may be the median time of the time window.
If the event confidence is larger than the preset event trigger threshold, defining the corresponding data moment as the event trigger moment, and sending a preset event trigger warning to a preset monitoring background;
the event triggering threshold is a preset reference value and is used for judging whether the event confidence is large enough to be considered as the occurrence of an event;
The event triggering moment can be the data moment corresponding to the event confidence coefficient of the event;
the event triggering warning is preset warning information and is used for reminding corresponding monitoring background staff;
the monitoring background is a background for monitoring staff.
Through the technical scheme, the intelligent security comprehensive management and control system based on the cloud service can analyze the monitoring video in real time through the event recognition algorithm, and can accurately recognize and rapidly respond to potential security threats through quantitative evaluation of event confidence and a threshold trigger mechanism, so that the early warning efficiency and accuracy of the security system are improved, and timely and reliable decision support is provided for security management staff.
Further, the storage unit 31 includes a temporary storage module 311, a high-performance storage module 312, and a general storage module 313, wherein the high-performance storage module 312 and the general storage module 313 are respectively connected to the temporary storage module 311 in data, and the temporary storage module 311 is respectively connected to the communication unit 33 and the identification unit 32 in data;
The temporary storage module 311 is mainly used for temporarily storing data, and the temporary storage module 311 may be a memory in a cloud server, and when the cloud server 30 receives video data, the video data is temporarily stored in the memory due to the far-reaching super-hard disk of the read-write speed of the memory, so that the identification unit 32 can quickly read and identify the video data;
The high-performance storage module 312 is mainly used for reading and storing data at high speed, for example, the high-performance storage module 312 can be used for storing video content of an event so as to be quickly read and called when a subsequent worker reviews, and the high-performance storage module 312 can be a high-performance read-write storage such as a solid state disk in a cloud server;
the general storage module 313 is mainly used for storing all received video contents in a conventional manner for ready for call viewing, and the general storage module 313 may be a storage with general performance such as a mechanical hard disk in a cloud server.
The intelligent security comprehensive management and control system based on cloud service further comprises a security monitoring video storage strategy, and the intelligent security comprehensive management and control system comprises the following steps:
c1, after receiving the fixed point monitoring video data, the cloud server 30 stores the fixed point monitoring video data in the temporary storage module 31;
The fixed point monitoring video data received from each fixed point monitoring module 10 is stored in the temporary storage module 31, so that the identification unit 32 can read and call quickly.
C2, storing the fixed point monitoring video data in the temporary storage module 31 to the general storage module 313;
the fixed point monitoring video data is stored in the general storage module 313 completely, so that the complete process of the monitoring video can be ensured for subsequent viewing.
C3, determining a corresponding event time window data set according to all event trigger moments corresponding to the fixed point monitoring video data;
the event time window data set is a data set for determining a time window according to each event trigger time, for example, the continuous event trigger time can be regarded as the time of the same event, and then the event trigger time can be connected to generate a corresponding event window for determining the continuous occurrence of the event in the event window.
C4, acquiring a corresponding event time window video data set from the fixed-point monitoring video data according to the event time window data set;
The event time window video data set is a collection of video data corresponding to each time window in the event time window data, and typically, one time window corresponds to a piece of video data.
And C5, storing the event window video data set in the high-performance storage module 312.
The event time window video dataset is stored in the high performance storage module 312 for subsequent quick retrieval.
Through the technical scheme, the intelligent security comprehensive management and control system based on cloud service can realize classified management of the monitoring video data through the hierarchical storage architecture of the temporary storage module, the high-performance storage module and the general storage module, can preferentially store important event video data in the high-performance storage module, ensures quick access and efficient processing of the key video data, and simultaneously stores all video data through the general storage module, so that the response speed and the query efficiency of the system to important security events are improved, and the backup effect of the key video data is also achieved.
Further, the recognition unit 32 includes an event recognition module 321, a person recognition module 322, and a face recognition module 323, where the event recognition module 321, the person recognition module 322, and the face recognition module 323 are respectively connected to the temporary storage module 311 and the control unit 34.
The event recognition module 321 is mainly used for recognizing whether an event occurs in the video data;
The person recognition module 322 is mainly used for recognizing whether a person appears in video data of an event.
The face recognition module 323 is mainly used for recognizing and acquiring face image data in video data of a person with an occurrence event.
Through the technical scheme, the intelligent security comprehensive management and control system based on the cloud service can comprehensively capture each dimension of security events from the whole world to the part through the progressive recognition process of three layers of event recognition, person recognition and face recognition, the layered recognition not only improves the recognition accuracy and efficiency of the system, but also can provide more detailed event information and personnel characteristics, and provides powerful technical support for security management and event tracing.
Further, the intelligent security comprehensive management and control system based on cloud service further comprises an event information identification strategy, and the intelligent security comprehensive management and control system comprises the following steps:
D1, generating corresponding event confidence and data time according to the fixed point monitoring video data by the event recognition module 321 through an event recognition algorithm;
And identifying the fixed point monitoring video data by the event identification module 321 to generate corresponding event confidence and data time.
If the event confidence coefficient is larger than the event trigger threshold, transmitting an event video frame corresponding to the data moment to the person identification module;
The event video frames are corresponding video frames in the fixed point monitoring video data at the data moment, namely, the corresponding video frames which are considered to be the occurrence of the event.
D3, identifying event video frames through a preset human body identification algorithm in the human body identification module 322 to determine corresponding human body image data;
the human body recognition algorithm is a preset algorithm and is used for recognizing human body images in the event video frames;
the human body image data is image data of a human body contained in an event video frame.
If the human body image data is not null, identifying and generating corresponding human face image data according to the human body image data in the human face recognition module 323 through a preset human face recognition algorithm;
The face recognition algorithm is a preset algorithm and is used for recognizing face image data in the human body image data;
the human face image data is image data containing human faces in the human body image data;
If the person recognition module 322 successfully recognizes the human body image data, the human face recognition module 323 tries to recognize the human face image data possibly existing in the obtained human body image data.
D5, generating event information data according to the data moment and the corresponding monitoring number information combination corresponding to the event video frame, the human body image data, the human face image data and the fixed point monitoring video data;
the monitoring number information is the number information of the fixed point monitoring module 10 corresponding to the fixed point monitoring video data, and is used for distinguishing each fixed point monitoring module 10;
the event information data is a data moment when an event possibly occurs and a combined set of an event video frame, human body image data, human face image data and monitoring number information.
D6, transmitting event information data to a monitoring background;
And transmitting the event information data to a monitoring background for evaluation and decision-making by staff.
Through the steps, the intelligent security comprehensive management and control system based on cloud service can realize the omnibearing information acquisition and integration of security events by means of serial processing of event recognition, human body recognition and face recognition and combining with a time stamp and a monitoring number, the layer-by-layer progressive recognition flow can ensure the accuracy and the completeness of recognition, key information can be efficiently screened and integrated, detailed event reports are provided for security management staff, and the information timeliness and decision support capability of the security system are improved.
Further, the event information identification policy further includes the steps of:
E1, matching and searching in a preset known personnel face database according to the face image data in the event information data;
the known person face database is a database containing the face data of the known person stored in advance, and may be the face data of the person related to the work.
E2, if the face image data is successfully matched with the face database of the known person, adding corresponding known person information into event information data;
The known personnel information is the personnel information corresponding to the successfully matched face image data in the known personnel face database.
E3, if the matching of the face image data in the face database of the known person fails, adding preset unknown person warning information into event information data;
the unknown personnel warning information is preset warning information and is used for warning and reminding workers in the monitoring background, so that the workers can be alerted and respond quickly.
If the unknown person warning information exists in the event information data, estimating corresponding unknown person positioning data according to the event information data and the corresponding fixed point monitoring area data of the fixed point monitoring module 10;
The unknown person positioning data is the position positioning data of the unknown person, and can be estimated and determined according to the fixed point monitoring area data of the fixed point monitoring module 10 which acquires the video image of the unknown person.
E5, adding unknown personnel positioning data into the event information data;
and adding the unknown personnel positioning data into the event information data to supplement the event information data and provide a basis for tracking data for the response measures of the follow-up monitoring background.
Through the steps, the intelligent security comprehensive management and control system based on the cloud service can be matched with the database of the known personnel in real time, so that the known personnel can be rapidly identified, the unknown personnel can be marked and the position estimated, the early warning capability of suspicious personnel is improved, accurate space information is provided for subsequent security response through the estimation of the position data, and the active defense and rapid response capability of the security system are greatly enhanced.
Further, the event information identification strategy further comprises the following steps for estimating unknown person positioning data:
e401, determining the corresponding transverse length and longitudinal length of the area according to the fixed point monitoring area data of the fixed point monitoring module 10 corresponding to the event information data;
The transverse length of the area is the transverse actual length of the area corresponding to the fixed-point monitoring area data;
The longitudinal length of the area is the longitudinal actual length of the area corresponding to the fixed-point monitoring area data;
The transverse actual length and the longitudinal actual length can be obtained through conversion according to positioning data corresponding to the fixed-point monitoring area data.
E402, determining a corresponding human body identification frame in the event video frame according to the human body image data in the event information data;
The human body recognition frame is a recognition frame generated by a corresponding recognition algorithm when the human body image data is recognized and determined.
E403, determining the pixel coordinate of the midpoint of the bottom edge of the human body identification frame in the event video frame and defining the pixel coordinate as the pixel coordinate of the human body position;
The human body position pixel coordinates are pixel coordinates of the midpoint of the bottom edge of the human body identification frame in the event video frame and are used for estimating and determining the positions of human feet in the event video frame.
E404, determining a corresponding horizontal coordinate percentage position and a corresponding vertical coordinate percentage position according to the pixel coordinates of the human body position in the event video frame;
The horizontal coordinate percentage position is a position percentage value of the midpoint of the bottom edge of the human body identification frame in the horizontal direction in the event video frame;
the vertical coordinate percentage position is a position percentage value of the midpoint of the bottom edge of the human body identification frame in the vertical direction in the event video frame.
E405, determining corresponding unknown personnel positioning data according to the data of the fixed point monitoring area of the horizontal coordinate percentage position and the vertical coordinate percentage position;
The unknown person positioning data is positioning data of the unknown person in the fixed-point monitoring area data;
according to the horizontal coordinate percentage position and the vertical coordinate percentage position, the percentage position of the unknown person in the fixed point monitoring area data can be mapped, and then the actual positioning data of the unknown person can be estimated and determined in the fixed point monitoring area data.
Through the steps, the intelligent security comprehensive management and control system based on the cloud service can realize conversion from a two-dimensional image to an actual space coordinate by mapping the pixel coordinates in the video frame and the physical size of the actual monitoring area and combining with the midpoint positioning and percentage position calculation of the bottom edge of the human body identification frame, so that the actual size characteristics of the monitoring area are considered, the accuracy and the applicability of position estimation are improved through standardized percentage positioning, and reliable space reference data are provided for positioning and tracking of unknown personnel.
Further, the event information identification policy further includes the steps of:
F1, displaying corresponding personnel identification graphics in security area digital model data according to unknown personnel positioning data;
the personnel identification graph is a position identification graph of unknown personnel positioning data in security area digital model data.
F2, controlling the mobile monitoring module 20 to go to a corresponding area according to the unknown personnel positioning data, and acquiring the mobile positioning data corresponding to the mobile monitoring module 20;
the mobile positioning data is the positioning data of the mobile monitoring module 20.
F3, displaying a corresponding mobile monitoring identification graph in the security area digital model data according to the mobile positioning data;
the mobile monitoring identification pattern is a position identification pattern of the mobile monitoring module 20 in the security area digital model data.
And F4, determining optimal moving path data according to the unknown personnel positioning data, the moving positioning data and the security area digital model data, and displaying corresponding moving path graphs in the security area digital model data.
The optimal moving path data is the optimal path between the mobile monitoring module 20 and the diameter of the unknown person, and can be determined through specific algorithm planning;
the moving path graph is a route identification graph of the optimal moving path data in the security area digital model data.
Through the steps, the intelligent security comprehensive management and control system based on cloud service can realize visualized management of security monitoring by displaying the positions of personnel, the positions of mobile monitoring equipment and the optimal moving path on the digital model in real time, and further intelligently schedule the mobile monitoring module to dynamically track based on automatic planning of the optimal inspection path, and meanwhile, the security personnel can intuitively grasp the scene situation in a graphical display mode, so that the real-time monitoring effect and the emergency response capability of the security system are greatly improved.
The foregoing description of the preferred embodiments of the application is not intended to limit the scope of the application in any way, including the abstract and drawings, in which case any feature disclosed in this specification (including abstract and drawings) may be replaced by alternative features serving the same, equivalent purpose, unless expressly stated otherwise. That is, each feature is one example only of a generic series of equivalent or similar features, unless expressly stated otherwise.