Nothing Special   »   [go: up one dir, main page]

CN110377050A - A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology - Google Patents

A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology Download PDF

Info

Publication number
CN110377050A
CN110377050A CN201910592306.3A CN201910592306A CN110377050A CN 110377050 A CN110377050 A CN 110377050A CN 201910592306 A CN201910592306 A CN 201910592306A CN 110377050 A CN110377050 A CN 110377050A
Authority
CN
China
Prior art keywords
intrusion
unmanned plane
monitoring
communication terminal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910592306.3A
Other languages
Chinese (zh)
Inventor
何茜
王宗强
蒋恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha University of Science and Technology
Original Assignee
Changsha University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha University of Science and Technology filed Critical Changsha University of Science and Technology
Priority to CN201910592306.3A priority Critical patent/CN110377050A/en
Publication of CN110377050A publication Critical patent/CN110377050A/en
Pending legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64CAEROPLANES; HELICOPTERS
    • B64C39/00Aircraft not otherwise provided for
    • B64C39/02Aircraft not otherwise provided for characterised by special use
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/10Simultaneous control of position or course in three dimensions
    • G05D1/101Simultaneous control of position or course in three dimensions specially adapted for aircraft
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B64AIRCRAFT; AVIATION; COSMONAUTICS
    • B64UUNMANNED AERIAL VEHICLES [UAV]; EQUIPMENT THEREFOR
    • B64U2101/00UAVs specially adapted for particular uses or applications
    • B64U2101/30UAVs specially adapted for particular uses or applications for imaging, photography or videography

Landscapes

  • Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)

Abstract

一种结合多无人机和光纤技术的周界安防系统,其特征在于,包括云数据中心、监控主机、传感光纤、第一无人机和第二无人机。发现疑似入侵事件后,通过第一无人机进行快速确认,若发生入侵事件则立刻报警并启动第二无人机协助进行追踪,全方位拍摄入侵现场和入侵人员面部信息,从而有效降低追踪跟丢率,通过双警报和喊话器对入侵人员造成强大威慑力,迫使其放弃入侵,利于入侵的早期制止,降低损失,极大提高人员、财物安全;海量数据存储在云数据中心,方便监控人员和相关管理、执法人员进行数据查询、取证,同时在云数据中心对入侵事件进行数据挖掘与分析,得出入侵事件发生的地点、该地点的入侵次数、该地点的入侵时间等信息,通过无线通信模块发送到监控主机,为监控人员加强入侵防范提供依据。A perimeter security system combining multiple drones and optical fiber technology is characterized in that it includes a cloud data center, a monitoring host, a sensing optical fiber, a first drone and a second drone. After a suspected intrusion event is found, the first drone will be used for quick confirmation. If an intrusion event occurs, the alarm will be immediately activated and the second drone will be activated to assist in tracking. Loss rate, through dual alarms and megaphones, it creates a strong deterrent force for intruders, forcing them to give up the intrusion, which is conducive to early stop of intrusion, reduces losses, and greatly improves the safety of personnel and property; massive data is stored in the cloud data center, which is convenient for monitoring personnel Conduct data query and evidence collection with relevant management and law enforcement personnel, and at the same time conduct data mining and analysis on intrusion events in the cloud data center to obtain information such as the location of the intrusion event, the number of intrusions at the location, and the intrusion time at the location. The communication module is sent to the monitoring host to provide a basis for monitoring personnel to strengthen intrusion prevention.

Description

一种结合多无人机和光纤技术的周界安防系统A Perimeter Security System Combining Multi-UAV and Optical Fiber Technology

技术领域technical field

本发明涉及周界安防,具体涉及一种结合多无人机和光纤技术的周界安防系统。The invention relates to perimeter security, in particular to a perimeter security system combining multiple drones and optical fiber technologies.

背景技术Background technique

周界安防可对设防区域的入侵、盗窃、破坏和抢劫等非法行为进行实时有效的探测和报警。但敏感区域普遍存在合围面积大,监测范围广,非法入侵常常不易发现,且无法有效阻止入侵行为等弊端,因此在入侵还处于初期状态时立即发现并追踪警告显得尤为重要。Perimeter security can detect and alarm in real time and effectively for illegal acts such as intrusion, theft, sabotage and robbery in the fortified area. However, sensitive areas generally have disadvantages such as large enclosed area and wide monitoring range, illegal intrusions are often difficult to detect, and intrusions cannot be effectively prevented. Therefore, it is particularly important to detect and track warnings immediately when the intrusion is still in the initial state.

当前周界安防主要是靠人工巡查、视频监视的方式,不仅效率非常低,可靠性差,尤其在夜间监控效果不好等固有缺陷,亟需建立智能安防系统,实现敏感区域防入侵的实时化、智能化和信息化。At present, perimeter security mainly relies on manual inspection and video surveillance, which is not only very inefficient, but also has poor reliability, especially at night with inherent defects such as poor monitoring effect. Intelligence and information.

发明内容SUMMARY OF THE INVENTION

本发明的目的是针对上述不足,提出了一种对敏感区域疑似入侵事件进行实时、空间连续监测并准确定位、快速确认和追踪拍摄取证的系统。具体实现方式是在敏感区域土层内浅埋传感光纤,基于相位敏感光时域反射技术进行分布式振动监测,在发现振动异常的疑似入侵事件后自动引导第一无人机到达指定位置进行现场拍摄,并将现场信息回传到用户端,确认入侵事件后自动引导第二无人机配合第一无人机 进行追踪和报警喊话,确保入侵能及时、准确的发现、定位和实时追踪。The purpose of the present invention is to solve the above shortcomings, and propose a system for real-time, continuous spatial monitoring, accurate positioning, rapid confirmation, and tracking and photographing of suspected intrusion events in sensitive areas. The specific implementation method is to bury the sensing fiber shallowly in the soil layer of the sensitive area, and perform distributed vibration monitoring based on the phase-sensitive optical time domain reflectometry technology. Shoot on-site, and send the on-site information back to the user terminal. After confirming the intrusion event, it will automatically guide the second drone to cooperate with the first drone to track and call the police to ensure timely and accurate detection, positioning and real-time tracking of the intrusion.

发明具体采用如下技术方案:一种结合多无人机和光纤技术的周界安防系统,系统结构包括云数据中心、监控主机、传感光纤、第一无人机和第二无人机,所述云数据中心与监控主机通过无线网络连接,云数据中心涵盖数据存储单元和大数据分析模块,监控主机包括光信号收发模块、无线通信模块和人机交互模块,光信号收发模块与传感光纤通过光纤进行连接,第一无人机包括第一通信终端、第一飞行控制模块、第一可见光/红外摄像头和第一喊话器,第二无人机包括第二通信终端、第二飞行控制模块、第二可见光/红外摄像头和第二扬声器,第一通信终端与第一飞行控制模块、第一可见光/红外摄像头、第一喊话器通过电路连接,第二通信终端与第二飞行控制模块、第二可见光/红外摄像头、第二喊话器通过电路连接,监控主机的无线通信模块与第一通信终端、第二通信终端通过无线网络连接。The invention specifically adopts the following technical scheme: a perimeter security system combining multiple drones and optical fiber technology, the system structure includes a cloud data center, a monitoring host, a sensing optical fiber, a first drone and a second drone. The cloud data center and the monitoring host are connected through a wireless network. The cloud data center covers a data storage unit and a big data analysis module. The monitoring host includes an optical signal transceiver module, a wireless communication module, and a human-computer interaction module. The optical signal transceiver module and sensing fiber Connected by optical fibers, the first drone includes a first communication terminal, a first flight control module, a first visible light/infrared camera and a first microphone, and the second drone includes a second communication terminal and a second flight control module , a second visible light/infrared camera and a second speaker, the first communication terminal is connected with the first flight control module, the first visible light/infrared camera, and the first microphone through a circuit, and the second communication terminal is connected with the second flight control module, the first The two visible light/infrared cameras and the second microphone are connected through a circuit, and the wireless communication module of the monitoring host is connected with the first communication terminal and the second communication terminal through a wireless network.

优选地,所述光监控主机安装于监控室内;传感光纤浅埋在监测区域外围土层内,利用后向瑞利散射光信号检测传感光纤周边的振动事件,当发生疑似入侵事件时将事件的精确位置信息通过人机交互模块显示并提示入侵报警,同时将事件的位置信息由无线通信模块发送到第一无人机的第一通信终端,第一通信终端将疑似入侵事件的位置信息发送到第一飞行控制模块,第一无人机在第一飞行控制模块的引导下巡航到疑似入侵事件位置,第一通信终端通过无线通信模块将第一无人机到达的提醒显示在人机交互模块;第一无人机到达指定位置后通过第一可见光/红外光双光摄像头实时、全角度范围监测疑似入侵现场情况,并通过第一通信终端将拍摄图像实时回传到监控主机并显示,确认有入侵行为后,监控人员通过第一喊话器向入侵人员喊话警告并启动入侵追踪模式,监控主机通过无线通信模块向第二无人机的第二通信终端发送实时更新入侵人员位置,第二无人机开启第二喊话器报警并在飞行控制模块的引导下巡航到达指定位置,随后第一无人机与第二无人机共同追踪入侵人员,全角度、实时拍摄追踪画面并回传到监控主机,完成任务后第一无人机和第二无人机返回监控室。Preferably, the optical monitoring host is installed in the monitoring room; the sensing fiber is shallowly buried in the outer soil layer of the monitoring area, and the back Rayleigh scattered light signal is used to detect vibration events around the sensing fiber. The precise location information of the event is displayed through the human-computer interaction module and prompts an intrusion alarm, and at the same time, the location information of the event is sent by the wireless communication module to the first communication terminal of the first drone, and the first communication terminal sends the location information of the suspected intrusion event. Sent to the first flight control module, the first drone cruises to the suspected intrusion event position under the guidance of the first flight control module, and the first communication terminal displays the reminder of the arrival of the first drone on the man-machine through the wireless communication module. Interactive module; after the first drone arrives at the designated position, the first visible light/infrared light dual-light camera monitors the suspected intrusion scene in real time and in a full angle range, and sends the captured image back to the monitoring host in real time through the first communication terminal and displays it , after confirming that there is an intrusion, the monitoring personnel shouts a warning to the intruder through the first megaphone and starts the intrusion tracking mode, and the monitoring host sends a real-time update of the intruder's position to the second communication terminal of the second drone through the wireless communication module. The second drone turns on the second megaphone to alarm and cruises to the designated position under the guidance of the flight control module. Then the first drone and the second drone jointly track the intruder, shoot the tracking image from all angles and in real time and send it back. Go to the monitoring host, and after completing the task, the first drone and the second drone return to the monitoring room.

优选地,所述传感光纤的探测信息包括光纤沿线的振动幅度、振动频率、振动模式和疑似入侵事件的精确位置信息。Preferably, the detection information of the sensing fiber includes vibration amplitude, vibration frequency, vibration mode and precise location information of a suspected intrusion event along the fiber.

优选地,所述第一无人机和第二无人机到达指定位置后可由用户切换控制模式为手动模式或自动模式进行拍摄监测和返航。Preferably, after the first UAV and the second UAV arrive at the designated position, the user can switch the control mode to manual mode or automatic mode for photographing monitoring and returning home.

优选地,所述传感光纤的探测信息、第一无人机的巡航信息和追踪信息和第二无人机的巡航信息和追踪信息都通过监控主机的无线通信模块存入云数据中心的数据存储单元。Preferably, the detection information of the sensing fiber, the cruise information and tracking information of the first drone, and the cruise information and tracking information of the second drone are all stored in the data center of the cloud data center through the wireless communication module of the monitoring host. storage unit.

优选地,所述云数据中心的大数据分析模块对数据存储单元的大量数据进行分析,得出入侵事件发生的地点、该地点的入侵次数、该地点的入侵时间等信息,通过无线通信模块发送到监控主机,为监控人员加强入侵防范提供依据。Preferably, the big data analysis module of the cloud data center analyzes a large amount of data in the data storage unit to obtain information such as the location where the intrusion event occurred, the number of intrusions at the location, the intrusion time at the location, etc., and send the information through the wireless communication module. to the monitoring host to provide a basis for monitoring personnel to strengthen intrusion prevention.

本发明具有如下有益效果:将传感光纤浅埋于敏感区域外围,不易被入侵人员发现并破坏;发现疑似入侵事件后,通过第一无人机进行快速确认,若发生入侵事件则立刻报警并启动第二无人机协助进行追踪,全方位拍摄入侵现场和入侵人员面部信息,从而有效降低追踪跟丢率,通过双警报和喊话器对入侵人员造成强大威慑力,迫使其放弃入侵,利于入侵的早期制止,降低损失,极大提高人员、财物安全;海量数据存储在云数据中心,方便监控人员和相关管理、执法人员进行数据查询、取证,同时在云数据中心对入侵事件进行数据挖掘与分析,得出入侵事件发生的地点、该地点的入侵次数、该地点的入侵时间等信息,通过无线通信模块发送到监控主机,为监控人员加强入侵防范提供依据。The invention has the following beneficial effects: the sensing optical fiber is shallowly buried in the periphery of the sensitive area, which is not easy to be discovered and destroyed by intruders; after a suspected intrusion event is found, the first drone is used to quickly confirm, and if an intrusion event occurs, an alarm is immediately issued and Start the second drone to assist in tracking, and shoot the intrusion scene and the intruder's face information in an all-round way, thereby effectively reducing the tracking and tracking loss rate, and creating a strong deterrent force for intruders through dual alarms and megaphones, forcing them to give up the intrusion, which is conducive to intrusion Early prevention, reduce losses, and greatly improve the safety of personnel and property; massive data is stored in the cloud data center, which is convenient for monitoring personnel and relevant management and law enforcement personnel to conduct data inquiries and forensics, and at the same time in the cloud data center. Through the analysis, the location of the intrusion event, the number of intrusions in the location, the intrusion time of the location and other information are obtained, which are sent to the monitoring host through the wireless communication module to provide the basis for monitoring personnel to strengthen intrusion prevention.

附图说明Description of drawings

图1为本发明系统结构框图。FIG. 1 is a block diagram of the system structure of the present invention.

其中,1为云数据中心,2为监控主机,3为传感光纤,4为第一无人机,5为第二无人机,11为数据存储单元,12为大数据分析模块,21为光信号收发模块,22为无线通信模块,23为人机交互模块,41为第一通信终端,42为第一飞行控制模块,43为第一可见光/红外摄像头,43为第一喊话器,51为第二通信终端,52为第二飞行控制模块,53为第二可见光/红外摄像头,54为第二喊话器。Among them, 1 is the cloud data center, 2 is the monitoring host, 3 is the sensing fiber, 4 is the first drone, 5 is the second drone, 11 is the data storage unit, 12 is the big data analysis module, and 21 is the Optical signal transceiver module, 22 is a wireless communication module, 23 is a human-computer interaction module, 41 is a first communication terminal, 42 is a first flight control module, 43 is a first visible light/infrared camera, 43 is a first microphone, 51 is The second communication terminal, 52 is the second flight control module, 53 is the second visible light/infrared camera, and 54 is the second microphone.

具体实施方式Detailed ways

下面结合附图和具体实施例对本发明的具体实施方式做进一步说明:如图1所示,一种结合多无人机和光纤技术的周界安防系统,其特征在于,包括云数据中心1、监控主机2、传感光纤3、第一无人机4和第二无人机5,所述云数据中心1与监控主机2通过无线网络连接,云数据中心1包括数据存储单元11和大数据分析模块12,监控主机2包括光信号收发模块21、无线通信模块22和人机交互模块23,光信号收发模块21与传感光纤3通过光纤进行连接,第一无人机4包括第一通信终端41、第一飞行控制模块42、第一可见光/红外摄像头43和第一喊话器44,第二无人机5包括第二通信终端51、第二飞行控制模块52、第二可见光/红外摄像头53和第二扬声器54,第一通信终端41与第一飞行控制模块42、第一可见光/红外摄像头43、第一喊话器44通过电路连接,第二通信终端51与第二飞行控制模块52、第二可见光/红外摄像头53、第二喊话器54通过电路连接,监控主机2的无线通信模块22与第一通信终端41、第二通信终端51通过无线网络连接。The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments: as shown in Figure 1, a perimeter security system combining multiple drones and optical fiber technology is characterized in that, including cloud data center 1, The monitoring host 2, the sensing fiber 3, the first drone 4 and the second drone 5, the cloud data center 1 and the monitoring host 2 are connected through a wireless network, and the cloud data center 1 includes a data storage unit 11 and a big data The analysis module 12, the monitoring host 2 includes an optical signal transceiver module 21, a wireless communication module 22 and a human-computer interaction module 23, the optical signal transceiver module 21 is connected with the sensing fiber 3 through an optical fiber, and the first drone 4 includes a first communication module The terminal 41, the first flight control module 42, the first visible light/infrared camera 43 and the first megaphone 44, the second drone 5 includes the second communication terminal 51, the second flight control module 52, the second visible light/infrared camera 53 and the second speaker 54, the first communication terminal 41 is connected with the first flight control module 42, the first visible light/infrared camera 43, and the first microphone 44 through a circuit, and the second communication terminal 51 is connected with the second flight control module 52, The second visible light/infrared camera 53 and the second microphone 54 are connected through a circuit, and the wireless communication module 22 of the monitoring host 2 is connected with the first communication terminal 41 and the second communication terminal 51 through a wireless network.

优选地,所述光监控主机2安装于监控室内;传感光纤3浅埋在监测区域外围土层内,利用后向瑞利散射光信号检测传感光纤周边的振动事件,当发生疑似入侵事件时将事件的精确位置信息通过人机交互模块23显示并提示入侵报警,同时将事件的位置信息由无线通信模块22发送到第一无人机4的第一通信终端41,第一通信终端41将疑似入侵事件的位置信息发送到第一飞行控制模块42,第一无人机4在第一飞行控制模块42的引导下巡航到疑似入侵事件位置,第一通信终端41通过无线通信模块22将第一无人机4到达的提醒显示在人机交互模块23;第一无人机4到达指定位置后通过第一可见光/红外光双光摄像头43实时、全角度范围监测疑似入侵现场情况,并通过第一通信终端41将拍摄图像实时回传到监控主机2并显示,确认有入侵行为后,监控人员通过第一喊话器44向入侵人员喊话警告并启动入侵追踪模式,监控主机2通过无线通信模块22向第二无人机5的第二通信终端51发送实时更新入侵人员位置,第二无人机5开启第二喊话器54报警并在飞行控制模块52的引导下巡航到达指定位置,随后第一无人机4与第二无人机5共同追踪入侵人员,全角度、实时拍摄追踪画面并回传到监控主机2,完成任务后第一无人机4和第二无人机5返回监控室。Preferably, the optical monitoring host 2 is installed in the monitoring room; the sensing fiber 3 is shallowly buried in the outer soil layer of the monitoring area, and the backward Rayleigh scattered light signal is used to detect vibration events around the sensing fiber. When a suspected intrusion event occurs At the same time, the precise location information of the event is displayed through the human-computer interaction module 23 and an intrusion alarm is prompted, and at the same time, the location information of the event is sent to the first communication terminal 41 of the first drone 4 by the wireless communication module 22, and the first communication terminal 41 The location information of the suspected intrusion event is sent to the first flight control module 42 , the first drone 4 cruises to the suspected intrusion event position under the guidance of the first flight control module 42 , and the first communication terminal 41 sends the information to the first communication terminal 41 through the wireless communication module 22 . The reminder of the arrival of the first drone 4 is displayed on the human-computer interaction module 23; after the first drone 4 reaches the designated position, the first visible light/infrared light dual-light camera 43 monitors the situation of the suspected intrusion site in real time and in a full-angle range, and The captured image is sent back to the monitoring host 2 in real time through the first communication terminal 41 and displayed. After confirming that there is an intrusion behavior, the monitoring personnel shouts a warning to the intruder through the first megaphone 44 and starts the intrusion tracking mode, and the monitoring host 2 communicates through wireless communication. The module 22 sends a real-time update of the location of the intruder to the second communication terminal 51 of the second drone 5, the second drone 5 turns on the second microphone 54 to give an alarm and cruises to the designated position under the guidance of the flight control module 52, and then The first drone 4 and the second drone 5 jointly track the intruder, shoot the tracking image from all angles and in real time and send it back to the monitoring host 2. After completing the task, the first drone 4 and the second drone 5 return monitoring room.

优选地,所述传感光纤3的探测信息包括光纤沿线的振动幅度、振动频率、振动模式和疑似入侵事件的精确位置信息。Preferably, the detection information of the sensing fiber 3 includes vibration amplitude, vibration frequency, vibration mode and precise location information of a suspected intrusion event along the fiber.

优选地,所述第一无人机4和第二无人机5到达指定位置后可由用户切换控制模式为手动模式或自动模式进行拍摄监测和返航。Preferably, after the first drone 4 and the second drone 5 arrive at the designated position, the user can switch the control mode to manual mode or automatic mode for photographing monitoring and returning home.

优选地,所述传感光纤3的探测信息、第一无人机4的巡航信息和追踪信息和第二无人机5的巡航信息和追踪信息都通过监控主机2的无线通信模块22存入云数据中心1的数据存储单元11。Preferably, the detection information of the sensing fiber 3 , the cruise information and tracking information of the first drone 4 and the cruise information and tracking information of the second drone 5 are all stored in the wireless communication module 22 of the monitoring host 2 The data storage unit 11 of the cloud data center 1 .

优选地,所述云数据中心1的大数据分析模块12对数据存储单元11的大量数据进行分析,得出入侵事件发生的地点、该地点的入侵次数、该地点的入侵时间等信息,通过无线通信模块22发送到监控主机2,为监控人员加强入侵防范提供依据。Preferably, the big data analysis module 12 of the cloud data center 1 analyzes a large amount of data in the data storage unit 11 to obtain information such as the location of the intrusion event, the number of intrusions at the location, the intrusion time at the location, etc. The communication module 22 is sent to the monitoring host 2 to provide a basis for monitoring personnel to strengthen intrusion prevention.

以上所述是本发明的优选实施方式,应当指出,本技术领域的技术人员在本发明的实质范围内所做出的变化、改型、添加或替换,也应属于本发明的保护范围。The above are preferred embodiments of the present invention. It should be pointed out that changes, modifications, additions or substitutions made by those skilled in the art within the essential scope of the present invention should also belong to the protection scope of the present invention.

Claims (6)

1. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology, which is characterized in that including cloud data center, monitoring Host, sensor fibre, the first unmanned plane and the second unmanned plane, the cloud data center and monitoring host computer are connected by wireless network It connects, cloud data center includes data storage cell and big data analysis module, and monitoring host computer includes optical signal transceiver module, wireless Communication module and human-computer interaction module, optical signal transceiver module and sensor fibre are attached by optical fiber, the first unmanned plane packet Include the first communication terminal, the first flight control modules, the first visible light/infrared camera and the first megaphone, the second unmanned plane Including the second communication terminal, the second flight control modules, the second visible light/infrared camera and the second loudspeaker, the first communication Terminal and the first flight control modules, the first visible light/infrared camera, the first megaphone pass through circuit connection, the second communication Terminal and the second flight control modules, the second visible light/infrared camera, the second megaphone pass through circuit connection, monitoring host computer Wireless communication module and the first communication terminal, the second communication terminal pass through wireless network connection.
2. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology as described in claim 1, which is characterized in that institute Light monitoring host computer is stated to be installed in monitoring room;Sensor fibre shallow embedding is in monitoring area periphery soil layer, to Rayleigh scattering after utilization The vibration event on optical signal detecting sensor fibre periphery passes through the precise position information of event when doubtful intrusion event occurs Human-computer interaction module shows and prompts intrusion alarm, while sending the first nothing by wireless communication module for the location information of event The location information of doubtful intrusion event is sent the first flight control mould by the first man-machine communication terminal, the first communication terminal Block, the first unmanned plane cruises under the guidance of the first flight control modules arrives doubtful intrusion event position, and the first communication terminal is logical Wireless communication module is crossed to show the prompting that the first unmanned plane reaches in human-computer interaction module;First unmanned plane reaches designated position Afterwards by the double light video camera heads of the first visible light/infrared light in real time, full angle range monitors doubtful invasion field condition, and passes through the One communication terminal passes back to image is shot monitoring host computer in real time and shows, and after confirmation has intrusion behavior, monitoring personnel passes through the One megaphone is propagandaed directed to communicate to invasion personnel warning and starts Intrusion traing mode, monitoring host computer by wireless communication module to the second nothing The second man-machine communication terminal sends real-time update and invades personnel positions, and the second unmanned plane is opened the alarm of the second megaphone and flown Cruise reaches designated position under the guidance of row control module, and subsequent first unmanned plane and the second unmanned plane track invasion people jointly Member, full angle, captured in real-time tracking picture simultaneously pass back to monitoring host computer, and the first unmanned plane and the second unmanned plane return after completion task Return monitoring room.
3. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology as described in claim 1, which is characterized in that institute The detection information for stating sensor fibre includes Oscillation Amplitude, vibration frequency, vibration mode and doubtful intrusion event along optical fiber Precise position information.
4. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology as described in claim 1, which is characterized in that institute Stating after the first unmanned plane and the second unmanned plane reach designated position can be manual mode or automatic mold by user's switching control mode Formula carries out shooting and monitoring and makes a return voyage.
5. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology as described in claim 1, which is characterized in that institute It states the cruise information of the detection information of sensor fibre, the cruise information of the first unmanned plane and tracked information and the second unmanned plane and chases after Track information all passes through the data storage cell of the wireless communication module deposit cloud data center of monitoring host computer.
6. a kind of perimeter security system of combination multiple no-manned plane and optical fiber technology as described in claim 1, which is characterized in that institute The big data analysis module for stating cloud data center analyzes the mass data of data storage cell, obtains intrusion event Place, the invasion number in the place, the place the information such as invasion time, module is sent to monitoring master by wireless communication Machine reinforces intrusion defense for monitoring personnel and provides foundation.
CN201910592306.3A 2019-07-03 2019-07-03 A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology Pending CN110377050A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910592306.3A CN110377050A (en) 2019-07-03 2019-07-03 A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910592306.3A CN110377050A (en) 2019-07-03 2019-07-03 A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology

Publications (1)

Publication Number Publication Date
CN110377050A true CN110377050A (en) 2019-10-25

Family

ID=68251696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910592306.3A Pending CN110377050A (en) 2019-07-03 2019-07-03 A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology

Country Status (1)

Country Link
CN (1) CN110377050A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114708695A (en) * 2022-04-01 2022-07-05 潍坊欣龙生物材料有限公司 Perimeter Security Surveillance System
CN114756053A (en) * 2022-03-30 2022-07-15 中科融信科技有限公司 Police service inspection method and system based on unmanned aerial vehicle and storage medium
CN115762025A (en) * 2022-12-12 2023-03-07 德昱电力工程设计有限公司 Intelligent early warning method and system for communication optical cable

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100166357A1 (en) * 2008-12-29 2010-07-01 At&T Intellectual Property I, L.P. Remote Optical Fiber Surveillance System and Method
CN203134031U (en) * 2013-01-04 2013-08-14 中国电子科技集团公司第二十八研究所 Perimeter protecting system based on wireless sensor network
CN205665842U (en) * 2016-05-19 2016-10-26 湖北华锐新能电业科技有限公司 Optical fiber sensing slope monitoring early warning system
CN106452947A (en) * 2016-09-22 2017-02-22 上海波汇科技股份有限公司 Method for optical fiber security large data storage
CN106530544A (en) * 2016-11-21 2017-03-22 国网山东省电力公司肥城市供电公司 Fiber grating array perimeter intrusion system
KR101853903B1 (en) * 2017-08-07 2018-05-02 김은주 Invasion detecting method and system including CCTV, drone and fiber to the fence
CN109323132A (en) * 2017-11-16 2019-02-12 中国石油化工股份有限公司 A kind of long distance pipeline unmanned plane detection system based on optical fiber early warning technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100166357A1 (en) * 2008-12-29 2010-07-01 At&T Intellectual Property I, L.P. Remote Optical Fiber Surveillance System and Method
CN203134031U (en) * 2013-01-04 2013-08-14 中国电子科技集团公司第二十八研究所 Perimeter protecting system based on wireless sensor network
CN205665842U (en) * 2016-05-19 2016-10-26 湖北华锐新能电业科技有限公司 Optical fiber sensing slope monitoring early warning system
CN106452947A (en) * 2016-09-22 2017-02-22 上海波汇科技股份有限公司 Method for optical fiber security large data storage
CN106530544A (en) * 2016-11-21 2017-03-22 国网山东省电力公司肥城市供电公司 Fiber grating array perimeter intrusion system
KR101853903B1 (en) * 2017-08-07 2018-05-02 김은주 Invasion detecting method and system including CCTV, drone and fiber to the fence
CN109323132A (en) * 2017-11-16 2019-02-12 中国石油化工股份有限公司 A kind of long distance pipeline unmanned plane detection system based on optical fiber early warning technology

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114756053A (en) * 2022-03-30 2022-07-15 中科融信科技有限公司 Police service inspection method and system based on unmanned aerial vehicle and storage medium
CN114756053B (en) * 2022-03-30 2022-10-04 中科融信科技有限公司 Police service inspection method and system based on unmanned aerial vehicle and storage medium
CN114708695A (en) * 2022-04-01 2022-07-05 潍坊欣龙生物材料有限公司 Perimeter Security Surveillance System
CN115762025A (en) * 2022-12-12 2023-03-07 德昱电力工程设计有限公司 Intelligent early warning method and system for communication optical cable

Similar Documents

Publication Publication Date Title
US12190693B2 (en) Video analytics system for identifying events
CN201766663U (en) A community property monitoring system
CN106657921A (en) Portable radar perimeter security and protection system
CN110377050A (en) A kind of perimeter security system of combination multiple no-manned plane and optical fiber technology
KR101345270B1 (en) Total management system and method of improved field control function
TWI819450B (en) Monitoring systems
CN106448036A (en) Intelligent building security monitoring system
CN104700535A (en) Video review alarm method and device for illegal invasion of nuclear power plant
CN102419883A (en) Monitoring method and system for monitoring defense area
CN107958562A (en) A kind of household safe Active Defending System Against and method
CN201974677U (en) Port restricted area safety monitoring system
Kim et al. Intelligent surveillance and security robot systems
KR101046819B1 (en) Intrusion monitoring method and intrusion monitoring system by software fence
CN105336089A (en) Intelligent all-weather networking warning system
CN115841727B (en) Airport perimeter intrusion alarm system and method
CN217643544U (en) Visual ship lock security protection system
CN216719205U (en) Anti-interference vibrating optical cable perimeter alarm system
CN202210845U (en) Intelligent video monitoring device
CN115762046A (en) Early warning and intervention device for building top light life person
CN204087402U (en) Circumference intelligent protecting system
Cao et al. Design of the airport perimeter security system based on Internet of Things
CN114708695A (en) Perimeter Security Surveillance System
CN110942578A (en) Intelligent analysis anti-theft alarm system
CN212750030U (en) Laser radar perimeter alarm system
CN221149428U (en) Visual radar intrusion monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191025