Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Monocular and binocular multiplexed invading object monitoring method and system

An intruder, single-dual purpose technology, applied in the field of computer vision, can solve problems such as high cost of 3G wireless transmission traffic, monitoring accuracy, reliability, maintainability constraints of state monitoring equipment, difficulties in obtaining electrical and mechanical parameters, etc.

Active Publication Date: 2016-08-31
CHENGDU TOPPLUSVISION TECH CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Limited by the strong electromagnetic environment of the power transmission corridor, the high-altitude working environment, and the harsh climate along the line, it is relatively difficult for traditional monitoring and sensing devices to obtain electrical, mechanical and other parameters, resulting in the condition monitoring equipment being limited in terms of monitoring accuracy, reliability, and maintainability. Therefore, the image / video monitoring method is still the most commonly used on transmission lines at present.
However, due to technical constraints, there are still many defects in the application of image / video monitoring devices on transmission lines: the anti-breakage monitoring system using 3G wireless video needs a special person on duty 24 hours a day, and the traffic cost consumed by 3G wireless transmission is huge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monocular and binocular multiplexed invading object monitoring method and system
  • Monocular and binocular multiplexed invading object monitoring method and system
  • Monocular and binocular multiplexed invading object monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the implementation described below Examples are only some embodiments of the present invention, not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monocular and binocular multiplexed invading object monitoring method and a system which relate to the technical field of computer visions. The method comprises the following steps: shooting a background image; acquiring a monitoring video image in a monitored zone by a first camera; determining whether any invading object enters the monitored zone according to the background image and the monitoring video image acquired by the first camera; controlling to initiate a second camera if such invading object is found; otherwise, repeating the above steps and this step; calculating the spatial three-dimensional coordinate of the invading object in space as well as the three-dimensional coordinate of a protected object in the monitored zone based on the video images acquired by the first camera and the second camera and determining the space distance from the invading object to the protected object and the moving speed of the invading object; and based on the space distance from the invading object to the protected object as well as the moving speed of the invading object, determining the threat grade.

Description

technical field [0001] The invention relates to the technical field of computer vision. Background technique [0002] With the continuous improvement of the requirements for the reliability of power supply for economic development and construction, the impact caused by power interruption is becoming more and more intolerable. The transmission line corridor refers to the land area and space area occupied by the path of the overhead transmission line. Ensuring the safety of the transmission line corridor is an important aspect to ensure the reliability of power supply. However, transmission line corridors often face the threat of being invaded and destroyed by foreign objects, especially with the rapid development of the national economy, the speed of urbanization is getting faster and faster, municipal and civil projects occupy transmission line corridors, and cranes or dump trucks accidentally touch Situations that lead to line trips also occur from time to time. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/18G08B13/196G06K9/00
CPCH04N7/181G08B13/19645G06V20/52
Inventor 龙学军周剑陆宏伟徐一丹
Owner CHENGDU TOPPLUSVISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products