[go: up one dir, main page]

CN119810988A - An intelligent security monitoring system based on YOLOv8 - Google Patents

An intelligent security monitoring system based on YOLOv8 Download PDF

Info

Publication number
CN119810988A
CN119810988A CN202510288489.5A CN202510288489A CN119810988A CN 119810988 A CN119810988 A CN 119810988A CN 202510288489 A CN202510288489 A CN 202510288489A CN 119810988 A CN119810988 A CN 119810988A
Authority
CN
China
Prior art keywords
feature map
feature
yolov8
camera
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510288489.5A
Other languages
Chinese (zh)
Inventor
庄建军
王楠
庄宇辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202510288489.5A priority Critical patent/CN119810988A/en
Publication of CN119810988A publication Critical patent/CN119810988A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

本发明公开了一种基于YOLOv8的智能安全监测系统,包括:RFID工牌识别模块,用于识别进入监测区域的人员所佩戴的RFID工牌,并根据工牌信息判断人员的身份及访问权限;摄像设备检测模块,用于检测监测区域内是否有正在使用的摄像设备,并标记异常区域;特征精密模块,集成于YOLOv8目标检测模型中,用于增强模型对摄像设备目标的检测精度;中央处理单元,用于接收RFID工牌识别模块和摄像设备检测模块的检测结果,并根据检测结果触发相应的响应机制,包括活动轨迹记录、报警及响应处理;本发明有效地提高了工作人员监管工作的准确性和效率。

The present invention discloses an intelligent safety monitoring system based on YOLOv8, comprising: an RFID badge recognition module, used for recognizing the RFID badge worn by a person entering a monitoring area, and judging the identity and access rights of the person according to the badge information; a camera detection module, used for detecting whether there is a camera being used in the monitoring area, and marking abnormal areas; a feature precision module, integrated into a YOLOv8 target detection model, used for enhancing the detection accuracy of the model for camera targets; a central processing unit, used for receiving the detection results of the RFID badge recognition module and the camera detection module, and triggering a corresponding response mechanism according to the detection results, including activity track recording, alarming and response processing; the present invention effectively improves the accuracy and efficiency of staff supervision work.

Description

YOLOv 8-based intelligent safety monitoring system
Technical Field
The invention relates to the technical field of safety monitoring, in particular to an intelligent safety monitoring system based on YOLOv.
Background
With the continuous development of the information society, the safety guarantee problem of some places is increasingly outstanding. The traditional safety precaution measures such as manual patrol, closed-circuit monitoring and the like have the problems of slow response to emergency, dependence on manpower, incapability of real-time analysis and judgment and the like. Especially in the face of hidden extraneous personnel in the complex environment, the recognition accuracy of traditional technique is low, and misinformation and missing report risk are higher. The object detection technology can classify objects in videos according to different categories, but because of the variety of imaging devices sold in the market at present, extremely high omission rate can occur when the imaging devices used in places are monitored only by means of object detection based on videos, and the safety of place information cannot be guaranteed. Meanwhile, the current target detection technology can only detect all personnel types and cannot identify personnel identities, so that whether personnel in the place have relevant rights cannot be judged. Traditional rights management is only suitable for the fixed area of access control, security personnel are mainly adopted for supervision on the periphery of a large-scale place, a large amount of manpower resources are required to be consumed, and a great security monitoring loophole exists.
Disclosure of Invention
The invention aims to provide an intelligent safety monitoring system based on YOLOv, which solves the problems in the background technology by comprehensively utilizing deep learning, target detection, sensors and radio frequency technology.
The technical scheme is that the intelligent safety monitoring system based on YOLOv comprises:
the RFID work card identification module is used for identifying an RFID work card worn by a person entering the monitoring area and judging the identity and access authority of the person according to the work card information;
The image pickup device detection module is used for detecting whether the image pickup device in use exists in the monitoring area and marking the abnormal area;
the feature precision module is integrated in the YOLOv target detection model and is used for enhancing the detection precision of the model on the camera equipment target;
the central processing unit is used for receiving detection results of the RFID work card identification module and the camera equipment detection module, and triggering corresponding response mechanisms according to the detection results, including activity track recording, alarming and response processing;
Further, the RFID tag identification module comprises an RFID tag, a reader, a camera and a buzzer, wherein the reader is used for reading a unique electronic product code EPC in the tag and matching with identity information in an identity identification database to determine the identity and access authority of a person, the camera equipment detection module comprises a FLIR Lepton thermal imaging infrared sensor and a HackRF One software defined radio frequency module which are used for detecting a high-temperature target area and confirming whether the high-temperature target area emits a wireless signal or not, and the characteristic precision module processes a characteristic diagram through a depth separable space attention block DS-SAM and a double-pool extrusion excitation attention block DP-SE.
Further, the RFID tag adopts a passive tag, the working frequency band is ultrahigh frequency 860-960MHz, the identification distance is set to 10 meters, when the reader detects an unauthorized person, the reader triggers a corresponding buzzer to give a warning and records the moving track of the person, and when the reader detects the authorized person, the reader starts a corresponding camera to detect the equipment target.
Further, the camera equipment detection module screens a high-temperature target area by setting a temperature threshold value, and detects and confirms whether the target area emits a wireless signal by combining a radio frequency signal, if the wireless signal is detected, the area is marked as an abnormal area, and the position information of the area is recorded.
Furthermore, the feature precision module performs space dimension weighting on the feature images through a depth separable space attention block DS-SAM and enhances interaction among channels through channel shuffling, and the feature precision module performs global space information fusion on the feature images through a double-pooling extrusion excitation attention block DP-SE to generate channel weights and multiplies the channel weights with the original feature images bit by bit to obtain a final feature image.
Furthermore, the feature precision module performs space dimension weighting on the feature images through a depth separable space attention block DS-SAM and enhances interaction among channels through channel shuffling, and the feature precision module performs global space information fusion on the feature images through a double-pooling extrusion excitation attention block DP-SE to generate channel weights and multiplies the channel weights with the original feature images bit by bit to obtain a final feature image.
Further, the feature precision module comprises setting and inputting an ith batch feature map, wherein C is the number of input channels, H is the height, and W is the width, and obtaining depth feature maps after DS-SAM and DP-SEAnd pooling feature mapsThen willAnd (3) withAdding elements by elements to obtain final distinguishing characteristics, wherein the formula is as follows:
further, the DS-SAM comprises a spatial attention transform and a channel shuffling, wherein the spatial attention transform sequentially passes an input ith batch of feature images through two depth-separable convolution layers to weight importance of the feature images in spatial dimension, wherein a first depth-separable convolution layer reduces the number of channels to The second depth separable convolution layer scales the channel liters back to the original channel numbersThe space importance representation of the feature map is obtained after the operation of the batch normalization and activation function, and the formula is as follows:
;
Wherein, ,Representing the characteristic map of the input characteristic map after the separable convolution via the 1 st and 2 nd depths respectively,Representing zeroing out negative values in all output results, sigmoid functionOperation limits the output between [0,1 ];
Meanwhile, the DS-SAM replaces the standard convolution with the depth separable convolution, and the feature map is transformed by the space attention Enters a channel shuffling part to divide the number of channels into 4 groups, and rearranges the channels of the 4 groups to obtain a characteristic diagramFinally, the original characteristic diagramAnd channel shuffled feature mapAnd multiplying the two images bit by bit to obtain a final characteristic diagram.
Further, the DP-SE is specifically processed by mapping the ith batch characteristic mapIs compressed to global space information of (1) by adaptive average pooling and adaptive maximum pooling respectivelyAndFusing the double-pooling results and generating channel weights through the full-connection layerFinally multiplying the original feature map and the channel weight feature map bit by bit to obtain a final feature mapThe formula is as follows:
;
Wherein, Indicating full connectivity layer operation.
Further, the central processing unit triggers response mechanisms of different levels according to the detection result, wherein the response mechanisms comprise primary responses, secondary responses and tertiary responses, the primary responses are used for processing personnel which do not wear the tablet and are detected around the tablet, the secondary responses are used for processing unauthorized personnel, and the tertiary responses are used for processing the conditions that authorized personnel are detected around the tablet.
Compared with the prior art, the intelligent security monitoring method and system have the advantages that camera equipment is initially detected through the module integrating the FLIR Lepton thermal imaging infrared sensor and the HackRF One software defined radio frequency module, personnel identity in an area is confirmed through the RFID work card identification module, equipment target detection is carried out through the YOLOv target detection model added with the characteristic precision module, relevant alarm and response are carried out, the intelligent security monitoring method and system are designed for identifying the camera equipment and the personnel identity which are in use in a real-time scene, and further abnormal conditions of a scene are cooperatively monitored across a plurality of scenes.
Drawings
FIG. 1 is a schematic flow diagram of a system of the present invention;
fig. 2 is a flowchart of an image pickup apparatus detection module of the present invention;
FIG. 3 is a schematic diagram of a feature precision module of the present invention;
fig. 4 is a schematic diagram of an RFID patch identification module of the present invention.
Detailed Description
The technical scheme of the invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present invention provides an intelligent security monitoring system based on YOLOv, including:
As shown in FIG. 4, the RFID tag identification module is used for identifying an RFID tag worn by a person entering the monitoring area and judging the identity and access authority of the person according to the tag information, and specifically comprises an RFID tag, a reader, a camera and a buzzer. The RFID tag is embedded in the RFID tag, a unique Electronic Product Code (EPC) corresponding to a person to whom the tag belongs is contained, a passive tag is used, the working frequency band is ultrahigh frequency 860-960MHz, and the identification distance is set to be 10 meters. The reader comprises an antenna and a decoding module, and is used for reading tag data of the tablet and transmitting the decoded corresponding ID information to the system.
When personnel enter the monitoring range of the reader, if the worker card information is detected, the worker card information directly enters a subsequent link to carry out equipment target detection, and if the worker card information is detected, the RFID worker card recognition function is started. When the work card is close to the reader antenna, the RFID tag receives a radio frequency signal sent by the antenna, the passive tag acquires energy from the signal, the tag transmits the stored unique EPC to the decoding module in a wireless mode for decoding, the decoded information is transmitted to the system and is matched with the identity information in the identity recognition database, and the identity and the access authority of the person are determined according to the matching result, so that the identity verification is completed. If the worker card wearer is identified as an authorized person, a camera corresponding to the reader is started, equipment target detection is carried out on the area, and the security and protection condition of the area is further recorded.
Meanwhile, each reader is provided with corresponding numbers and position information during deployment, and when abnormal conditions are monitored, the positions and time information of the readers can be used for drawing the moving track of the personnel, so that the personnel can conveniently check and trace.
The image pickup device detection module is used for detecting whether the image pickup device is in use in the monitoring area and marking the abnormal area, the image pickup device detection module comprises FLIR Lepton thermal imaging infrared sensors and HackRF One software defined radio frequency modules and is used for detecting the high-temperature target area and confirming whether the high-temperature target area emits wireless signals or not, the image pickup device detection module screens the high-temperature target area by setting a temperature threshold and combines the radio frequency signals to detect and confirm whether the target area emits the wireless signals or not, and if the wireless signals are detected, the area is marked as the abnormal area and the position information of the area is recorded.
Specifically, as shown in fig. 2, FLIR Lepton thermal imaging infrared sensors detect real-time scene areas, thermal image data are obtained through SPI interfaces, openCV is used for processing thermal images, high-temperature target areas are screened out according to set temperature thresholds and marked, hackRF One software defined radio frequency modules perform spectrum analysis on radio frequency signals of the infrared sensor marked areas through Python interfaces, fast Fourier Transform (FFT) is used for detecting strong signals of a 2.4GHz frequency band, and whether the target areas emit wireless signals is confirmed. If a wireless signal is detected, the area is marked as an abnormal area, and the position information is recorded. The feature precision module is integrated in a YOLOv target detection model and used for enhancing the detection precision of the model to the camera equipment target, and processes a feature map through a depth separable space attention block DS-SAM and a double-pooling extrusion excitation attention block DP-SE;
The feature precision module performs space dimension weighting on the feature images through a depth separable space attention block DS-SAM and enhances interaction among channels through channel shuffling, and the feature precision module performs global space information fusion on the feature images through a double-pooling extrusion excitation attention block DP-SE to generate channel weights and multiplies the channel weights with the original feature images bit by bit to obtain a final feature image.
The specific process of the feature precision module is as follows, the ith batch feature map is set and inputWherein C is the number of input channels, H is the height, W is the width, and depth feature maps are obtained after DS-SAM and DP-SE are performedAnd pooling feature mapsThen willAnd (3) withAdding elements by element to obtain final distinguishing characteristicsThe formula is as follows:
The DS-SAM comprises a space attention transformation and a channel shuffling, wherein the space attention transformation sequentially passes the input ith batch of feature images through two depth separable convolution layers to weight the importance of the feature images in the space dimension, and the first depth separable convolution layer reduces the number of channels to The second depth separable convolution layer scales the channel liters back to the original channel numbersThe space importance representation of the feature map is obtained after the operation of the batch normalization and activation function, and the formula is as follows:
;
Wherein, ,Representing the characteristic map of the input characteristic map after the separable convolution via the 1 st and 2 nd depths respectively,Representing zeroing out negative values in all output results, sigmoid functionOperation limits the output between [0,1 ];
Meanwhile, the DS-SAM replaces the standard convolution with the depth separable convolution, and the feature map is transformed by the space attention Enters a channel shuffling part to divide the number of channels into 4 groups, and rearranges the channels of the 4 groups to obtain a characteristic diagramFinally, the original characteristic diagramAnd channel shuffled feature mapAnd multiplying the two images bit by bit to obtain a final characteristic diagram.
DP-SE is performed by mapping the ith lot characteristic patternIs compressed to global space information of (1) by adaptive average pooling and adaptive maximum pooling respectivelyAndFusing the double-pooling results and generating channel weights through the full-connection layerFinally multiplying the original feature map and the channel weight feature map bit by bit to obtain a final feature mapThe formula is as follows:
;
Wherein, Indicating full connectivity layer operation.
The system comprises a central processing unit, a first-level response unit, a second-level response unit and a third-level response unit, wherein the central processing unit is used for receiving detection results of an RFID (radio frequency identification) tablet identification module and a camera equipment detection module and triggering corresponding response mechanisms according to the detection results, the response mechanisms comprise activity track recording, alarming and response processing, the central processing unit triggers response mechanisms with different levels according to the detection results, the response mechanisms comprise the first-level response unit is used for processing personnel which do not wear the tablet and are detected around the camera equipment, the second-level response unit is used for processing unauthorized personnel, and the third-level response unit is used for processing the situation that authorized personnel are detected around the camera equipment. The method comprises the following steps of immediately triggering a first-level response if equipment is detected around a person wearing an unauthorized tablet, and immediately triggering a second-level response if equipment is detected around a person wearing an unauthorized tablet. If a device is detected around the person wearing the authorized tablet, a tertiary response is triggered immediately. And locking the identities of the personnel triggering the second-level response and the third-level response, dynamically recording the position information of the work card among a plurality of readers, analyzing the time of entering and leaving a specific area by utilizing the time stamp, and generating an activity track. When the secondary response triggers, relevant information is sent to the corresponding upper-level leader of the person to check the action track of the person, if the person has three or more abnormal conditions, the middle-level leader is informed to check by means of mobile phones, short messages and the like, and when the tertiary response triggers, the person needs to actively go to the relevant security department to check shooting information. Temporarily storing the abnormal video frames of the responses of each level of the system, and after the responses disappear, carrying out frame recombination to generate an abnormal video, and storing the abnormal video frames into a system database according to time and camera position information, so that the abnormal video frames are convenient to review and call in the later period.

Claims (9)

1.一种基于YOLOv8的智能安全监测系统,其特征在于,包括:RFID工牌识别模块,用于识别进入监测区域的人员所佩戴的RFID工牌,并根据工牌信息判断人员的身份及访问权限;摄像设备检测模块,用于检测监测区域内是否有正在使用的摄像设备,并标记异常区域;特征精密模块,集成于YOLOv8目标检测模型中,用于增强模型对摄像设备目标的检测精度;中央处理单元,用于接收RFID工牌识别模块和摄像设备检测模块的检测结果,并根据检测结果触发相应的响应机制,包括活动轨迹记录、报警及响应处理。1. An intelligent safety monitoring system based on YOLOv8, characterized in that it includes: an RFID badge recognition module, which is used to identify the RFID badge worn by the person entering the monitoring area, and judge the identity and access rights of the person according to the badge information; a camera detection module, which is used to detect whether there is a camera in use in the monitoring area and mark the abnormal area; a feature precision module, which is integrated into the YOLOv8 target detection model, and is used to enhance the detection accuracy of the model for the camera target; a central processing unit, which is used to receive the detection results of the RFID badge recognition module and the camera detection module, and trigger the corresponding response mechanism according to the detection results, including activity trajectory recording, alarm and response processing. 2.根据权利要求1所述的一种基于YOLOv8的智能安全监测系统,其特征在于,RFID工牌识别模块包括RFID工牌、阅读器、摄像头及蜂鸣器,阅读器用于读取工牌中的唯一电子产品代码EPC,并与身份识别数据库中的身份信息进行匹配,以确定人员的身份及访问权限;摄像设备检测模块包括FLIR Lepton热成像红外传感器和HackRF One软件定义无线电射频模块,用于检测高温目标区域并确认其是否发射无线信号;特征精密模块通过深度可分离空间注意块DS-SAM和双池化挤压激励注意块DP-SE处理特征图。2. According to claim 1, an intelligent safety monitoring system based on YOLOv8 is characterized in that the RFID work badge recognition module includes an RFID work badge, a reader, a camera and a buzzer, the reader is used to read the unique electronic product code EPC in the work badge and match it with the identity information in the identity recognition database to determine the identity and access rights of the personnel; the camera equipment detection module includes a FLIR Lepton thermal imaging infrared sensor and a HackRF One software-defined radio frequency module, which are used to detect high-temperature target areas and confirm whether they emit wireless signals; the feature precision module processes feature maps through a deeply separable spatial attention block DS-SAM and a dual-pooling squeeze excitation attention block DP-SE. 3.根据权利要求1所述的一种基于YOLOv8的智能安全监测系统,其特征在于,RFID工牌采用被动式标签,工作频段为超高频860-960MHz,识别距离设置为10米;阅读器在检测到未授权人员时,触发对应的蜂鸣器发出警告,并记录该人员的活动轨迹;阅读器在检测到已授权人员时,启动对应的摄像头进行设备目标检测。3. According to the YOLOv8-based intelligent safety monitoring system described in claim 1, it is characterized in that the RFID work badge adopts a passive tag, the working frequency band is ultra-high frequency 860-960MHz, and the recognition distance is set to 10 meters; when the reader detects an unauthorized person, it triggers the corresponding buzzer to issue a warning and records the activity trajectory of the person; when the reader detects an authorized person, it starts the corresponding camera to perform equipment target detection. 4.根据权利要求1所述的一种基于YOLOv8的智能安全监测系统,其特征在于,摄像设备检测模块通过设置温度阈值筛选高温目标区域,并结合射频信号检测确认目标区域是否发射无线信号;若检测到无线信号,则将该区域标记为异常区域,并记录其位置信息。4. According to claim 1, an intelligent safety monitoring system based on YOLOv8 is characterized in that the camera device detection module screens the high-temperature target area by setting a temperature threshold, and confirms whether the target area transmits a wireless signal in combination with radio frequency signal detection; if a wireless signal is detected, the area is marked as an abnormal area and its location information is recorded. 5.根据权利要求1所述的一种基于YOLOv8的智能安全监测系统,其特征在于,特征精密模块通过深度可分离空间注意块DS-SAM对特征图进行空间维度加权,并通过通道洗牌增强通道间的交互;特征精密模块通过双池化挤压激励注意块DP-SE对特征图进行全局空间信息融合,生成通道权重,并与原始特征图逐位相乘,得到最终特征图。5. According to claim 1, an intelligent safety monitoring system based on YOLOv8 is characterized in that the feature precision module performs spatial dimension weighting on the feature map through the deep separable spatial attention block DS-SAM, and enhances the interaction between channels through channel shuffling; the feature precision module performs global spatial information fusion on the feature map through the double pooling squeeze excitation attention block DP-SE, generates channel weights, and multiplies them bit by bit with the original feature map to obtain the final feature map. 6.根据权利要求5所述的一种基于YOLOv8的智能安全监测系统,其特征在于,特征精密模块具体过程如下:设置输入第i个批次特征图,其中C为输入通道数,H为高度,W为宽度,经过DS-SAM和DP-SE后,分别得到了深度特征图和池化特征图,然后将逐元素相加,得到最终的判别特征,公式如下:6. According to claim 5, an intelligent safety monitoring system based on YOLOv8 is characterized in that the specific process of the feature precision module is as follows: set the input i -th batch feature map, where C is the number of input channels, H is the height, and W is the width. After DS-SAM and DP-SE, the deep feature maps are obtained respectively. And pooling feature map , then and Add each element together to get the final discriminant feature. The formula is as follows: . 7.根据权利要求6所述的一种基于YOLOv8的智能安全监测系统,其特征在于,DS-SAM包含空间注意力变换和通道洗牌两个部分;其中,空间注意力变换将输入的第i个批次特征图先后通过两个深度可分离卷积层,对特征图的空间维度上的重要性进行加权,其中,第一个深度可分离卷积层将通道数降至,第二个深度可分离卷积层将通道数升维回原始通道数,在经由批归一化及激活函数操作后得到特征图空间重要性表示,公式如下:7. According to claim 6, a YOLOv8-based intelligent security monitoring system is characterized in that DS-SAM includes two parts: spatial attention transformation and channel shuffling; wherein the spatial attention transformation successively passes the input i- th batch feature map through two depth-separable convolutional layers to weight the importance of the spatial dimension of the feature map, wherein the first depth-separable convolutional layer reduces the number of channels to , the second depth-wise separable convolutional layer increases the number of channels back to the original number of channels , after batch normalization and activation function operation, the feature map space importance representation is obtained, the formula is as follows: ; 其中,分别代表输入特征图经由第1和第2个深度可分离卷积后的特征图,表示将所有输出结果中的负值置零,sigmoid函数操作将输出限制在[0,1]之间;in, , They represent the feature maps of the input feature map after the first and second depth-separable convolutions, respectively. Indicates that all negative values in the output results are set to zero, the sigmoid function The operation limits the output to the range [0,1]. 同时,DS-SAM将标准卷积替换为深度可分离卷积;经由空间注意力变换后的特征图进入通道洗牌部分,将通道数分为4组,对4组的通道进行重新排列得到特征图,最终将原始特征图和通道洗牌后的特征图逐位相乘,得到最终特征图。At the same time, DS-SAM replaces the standard convolution with a depth-separable convolution; the feature map after spatial attention transformation Enter the channel shuffling part, divide the number of channels into 4 groups, and rearrange the channels of the 4 groups to obtain the feature map , and finally the original feature map And the feature map after channel shuffle Multiply bit by bit to get the final feature map. 8.根据权利要求6所述的一种基于YOLOv8的智能安全监测系统,其特征在于,DP-SE具体过程如下:将第i个批次特征图的全局空间信息分别通过自适应平均池化和自适应最大池化压缩到,将双池化的结果进行融合并通过全连接层生成通道权重,最终将原始特征图和通道权重特征图逐位相乘,得到最终特征图,公式如下:8. According to claim 6, a YOLOv8-based intelligent safety monitoring system is characterized in that the specific process of DP-SE is as follows: the i- th batch feature map The global spatial information of is compressed into and , fuse the double pooling results and generate channel weights through the fully connected layer Finally, the original feature map and the channel weight feature map are multiplied bit by bit to obtain the final feature map , the formula is as follows: ; 其中,表示全连接层操作。in, Represents a fully connected layer operation. 9.根据权利要求1所述的一种基于YOLOv8的智能安全监测系统,其特征在于,中央处理单元根据检测结果触发不同级别的响应机制,包括一级响应、二级响应和三级响应;一级响应用于处理未佩戴工牌且周围检测到摄像设备的人员,二级响应用于处理未授权人员,三级响应用于处理已授权人员但周围检测到摄像设备的情况。9. According to claim 1, an intelligent safety monitoring system based on YOLOv8 is characterized in that the central processing unit triggers different levels of response mechanisms according to the detection results, including primary response, secondary response and tertiary response; the primary response is used to deal with personnel who do not wear work badges and have camera equipment detected around them, the secondary response is used to deal with unauthorized personnel, and the tertiary response is used to deal with situations where authorized personnel are detected around them.
CN202510288489.5A 2025-03-12 2025-03-12 An intelligent security monitoring system based on YOLOv8 Pending CN119810988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510288489.5A CN119810988A (en) 2025-03-12 2025-03-12 An intelligent security monitoring system based on YOLOv8

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510288489.5A CN119810988A (en) 2025-03-12 2025-03-12 An intelligent security monitoring system based on YOLOv8

Publications (1)

Publication Number Publication Date
CN119810988A true CN119810988A (en) 2025-04-11

Family

ID=95264324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510288489.5A Pending CN119810988A (en) 2025-03-12 2025-03-12 An intelligent security monitoring system based on YOLOv8

Country Status (1)

Country Link
CN (1) CN119810988A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009301521A (en) * 2008-06-17 2009-12-24 Takashi Nishihira Method and device for detecting eavesdropping device/hidden camera using internet
CN102521704A (en) * 2011-07-12 2012-06-27 武汉华工安鼎信息技术有限责任公司 RFID-based confidential carrier intelligent monitoring system and monitoring method of the same
CN104159243A (en) * 2014-07-30 2014-11-19 中国电子科技集团公司第三十八研究所 Mobile terminal detection method and system based on software radio
US20180129881A1 (en) * 2016-11-08 2018-05-10 Dedrone Holdings, Inc. Systems, Methods, Apparatuses, and Devices for Identifying, Tracking, and Managing Unmanned Aerial Vehicles
CN208689702U (en) * 2018-04-24 2019-04-02 成都恒高科技有限公司 A kind of monitoring management system based on fence
WO2020111353A1 (en) * 2018-11-30 2020-06-04 주식회사 지혜와비전 Method and apparatus for detecting privacy invasion equipment, and system thereof
US20210082265A1 (en) * 2019-09-18 2021-03-18 Sensormatic Electronics, LLC Systems and methods for averting crime with look-ahead analytics
CN113762201A (en) * 2021-09-16 2021-12-07 深圳大学 Mask detection method based on yolov4
CN114598848A (en) * 2022-04-16 2022-06-07 张志祥 Anti-shooting device
CN114743345A (en) * 2022-03-22 2022-07-12 广东电力通信科技有限公司 Electronic map-based intelligent core place management and control platform
CN115205667A (en) * 2022-08-02 2022-10-18 江苏大学 A Dense Object Detection Method Based on YOLOv5s
CN116188523A (en) * 2022-12-09 2023-05-30 西南交通大学烟台新一代信息技术研究院 A Lightweight Deepsort Vehicle Tracking Method
CN116503379A (en) * 2023-05-16 2023-07-28 重庆邮电大学 Parts recognition method based on lightweight improvement of YOLOv5
CN116524379A (en) * 2023-04-21 2023-08-01 东南大学 Aerial photographing target detection method based on attention mechanism and self-adaptive feature fusion
CN119229374A (en) * 2024-09-25 2024-12-31 重庆水淇数智科技有限公司 A lightweight and dense pedestrian detection method and system based on YOLOv8
CN119314064A (en) * 2024-10-29 2025-01-14 淮阴工学院 A ship remote sensing image detection method based on multi-dimensional attention mechanism

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009301521A (en) * 2008-06-17 2009-12-24 Takashi Nishihira Method and device for detecting eavesdropping device/hidden camera using internet
CN102521704A (en) * 2011-07-12 2012-06-27 武汉华工安鼎信息技术有限责任公司 RFID-based confidential carrier intelligent monitoring system and monitoring method of the same
CN104159243A (en) * 2014-07-30 2014-11-19 中国电子科技集团公司第三十八研究所 Mobile terminal detection method and system based on software radio
US20180129881A1 (en) * 2016-11-08 2018-05-10 Dedrone Holdings, Inc. Systems, Methods, Apparatuses, and Devices for Identifying, Tracking, and Managing Unmanned Aerial Vehicles
CN208689702U (en) * 2018-04-24 2019-04-02 成都恒高科技有限公司 A kind of monitoring management system based on fence
WO2020111353A1 (en) * 2018-11-30 2020-06-04 주식회사 지혜와비전 Method and apparatus for detecting privacy invasion equipment, and system thereof
US20210082265A1 (en) * 2019-09-18 2021-03-18 Sensormatic Electronics, LLC Systems and methods for averting crime with look-ahead analytics
CN113762201A (en) * 2021-09-16 2021-12-07 深圳大学 Mask detection method based on yolov4
CN114743345A (en) * 2022-03-22 2022-07-12 广东电力通信科技有限公司 Electronic map-based intelligent core place management and control platform
CN114598848A (en) * 2022-04-16 2022-06-07 张志祥 Anti-shooting device
CN115205667A (en) * 2022-08-02 2022-10-18 江苏大学 A Dense Object Detection Method Based on YOLOv5s
CN116188523A (en) * 2022-12-09 2023-05-30 西南交通大学烟台新一代信息技术研究院 A Lightweight Deepsort Vehicle Tracking Method
CN116524379A (en) * 2023-04-21 2023-08-01 东南大学 Aerial photographing target detection method based on attention mechanism and self-adaptive feature fusion
CN116503379A (en) * 2023-05-16 2023-07-28 重庆邮电大学 Parts recognition method based on lightweight improvement of YOLOv5
CN119229374A (en) * 2024-09-25 2024-12-31 重庆水淇数智科技有限公司 A lightweight and dense pedestrian detection method and system based on YOLOv8
CN119314064A (en) * 2024-10-29 2025-01-14 淮阴工学院 A ship remote sensing image detection method based on multi-dimensional attention mechanism

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴之昊;熊卫华;任嘉锋;姜明;: "基于轻量级SSD的电力设备锈蚀目标检测", 计算机系统应用, no. 02, 15 February 2020 (2020-02-15) *
夏东等: "《机器视觉入门与实战 人脸识别与人体识别》", 28 February 2023, 机械工业出版社, pages: 131 *

Similar Documents

Publication Publication Date Title
JP4924607B2 (en) Suspicious behavior detection apparatus and method, program, and recording medium
CN108062349B (en) Video surveillance method and system based on video structured data and deep learning
CN111860230B (en) Automatic detection system and method based on behavior of video monitoring personnel not wearing mask
Park et al. Construction worker detection in video frames for initializing vision trackers
US20230073717A1 (en) Systems And Methods For Electronic Surveillance
CN112785798A (en) Behavior analysis method for construction project constructors of electric power substation engineering
US20090024493A1 (en) Method and system for monitoring forestry products
US11941716B2 (en) Systems and methods for electronic signature tracking
CN107948585A (en) Video recording labeling method, device and computer-readable recording medium
CN109492509A (en) Personal identification method, device, computer-readable medium and system
CN116189052A (en) Security method, system, intelligent terminal and storage medium based on video stream analysis
CN112268554A (en) Regional range loitering detection method and system based on path trajectory analysis
Teng et al. EV: Efficient visual surveillance with electronic footprints
CN119810988A (en) An intelligent security monitoring system based on YOLOv8
CN118521872B (en) Intelligent identification method and system for personnel status based on independent visual unit
Mishra et al. Abnormal human behaviour detection by surveillance camera
CN112434670A (en) Equipment and method for detecting abnormal behavior of power operation
CN115984194B (en) An intelligent management system of UWB precise positioning base station based on the Internet of Things
CN117612107A (en) Method for detecting abnormal personnel in place
Sudeksha et al. Missing persons comprehensive tracking system
Kanimozhi et al. Enhancing smart city security: IoT-driven ANPR technology for identifying smuggling vehicles
CN117457032B (en) Storage medium destroying method based on volume identification
CN118135680B (en) Attendance checking statistical method, device and equipment for intelligent construction site and computer storage medium
CN119360310B (en) Security inspection data association method, device, computer equipment and storage medium
CN121147856B (en) Fire prevention and control methods and systems using computer vision

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination