[go: up one dir, main page]

CN117812536A - Protective method for security electronic fence for radioactive article transportation - Google Patents

Protective method for security electronic fence for radioactive article transportation Download PDF

Info

Publication number
CN117812536A
CN117812536A CN202311840180.XA CN202311840180A CN117812536A CN 117812536 A CN117812536 A CN 117812536A CN 202311840180 A CN202311840180 A CN 202311840180A CN 117812536 A CN117812536 A CN 117812536A
Authority
CN
China
Prior art keywords
area
moving target
electronic fence
wifi
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311840180.XA
Other languages
Chinese (zh)
Other versions
CN117812536B (en
Inventor
聂明星
李一嵩
万亚平
刘征海
王超峰
曾铁军
毛宇
蒋盼盼
张明月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of South China
Original Assignee
University of South China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of South China filed Critical University of South China
Priority to CN202311840180.XA priority Critical patent/CN117812536B/en
Publication of CN117812536A publication Critical patent/CN117812536A/en
Application granted granted Critical
Publication of CN117812536B publication Critical patent/CN117812536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0249Determining position using measurements made by a non-stationary device other than the device whose position is being determined
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0252Radio frequency fingerprinting
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/12Mechanical actuation by the breaking or disturbance of stretched cords or wires
    • G08B13/122Mechanical actuation by the breaking or disturbance of stretched cords or wires for a perimeter fence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Measurement Of Radiation (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

本发明提出了一种放射性物品运输安保电子栅栏防护方法,设定监控区域,还包括以下步骤:进行定位准备;进行识别区定位;当定位到的移动目标处于不同区域时进行不同的反馈。本发明提出的一种放射性物品运输安保电子栅栏防护方法,实现放射性物质运输环节非法接近的高效定位识别,并按危险等级进行快速响应。

The invention proposes a security electronic fence protection method for the transportation of radioactive items. It sets the monitoring area and also includes the following steps: preparing for positioning; positioning the identification area; and providing different feedback when the positioned moving targets are in different areas. The invention proposes a security electronic fence protection method for the transportation of radioactive materials, which realizes efficient positioning and identification of illegal approaches in the transportation of radioactive materials, and provides rapid response according to the risk level.

Description

Protective method for security electronic fence for radioactive article transportation
Technical Field
The invention relates to the technical field of safety protection, in particular to a radioactive article transportation security electronic fence protection method.
Background
Security of radioactive materials, particularly during transportation, is a major challenge for traditional security systems compared to security protection in fixed settings. For radioactive substances, because the radioactive substances have certain harm, one of common consideration strategies is to pack the radioactive substances completely so as to prevent leakage; secondly, the road with lower crowd density is selected on the selection of the transportation route, so that the lost hazard is reduced, and the like. Therefore, the traditional security is passive, and has great defects in the transportation process of radioactive substances, so that the development of an intelligent nuclear security system by combining the technologies of artificial intelligence, the Internet of things, information physical fusion and the like has important practical significance.
In order to ensure nuclear safety, prevent and deal with nuclear accidents, nuclear energy is safely utilized, and safety measures such as sufficient prevention, protection, alleviation and supervision are adopted for nuclear facilities, nuclear materials and related radioactive wastes, so that nuclear accidents caused by technical reasons, artificial reasons or natural disasters are prevented, and the radioactive consequences under the condition of the nuclear accidents are relieved to the maximum extent.
In this context, radioactive material security is also faced with new challenges and demands. At present, one method commonly used is to use a GPS and a radiation dose detector to form a detection terminal, send position information and radiation dose data to a monitoring center in real time under a mobile communication network, so as to determine whether radioactive substances leak or exceed a specified limit value, and take corresponding emergency response measures. However, this approach has the following limitations:
1) Real-time dynamic monitoring cannot be achieved. Since the detection terminal needs to be replaced or calibrated regularly, the data precision is reduced or inaccurate, and the monitoring effect may be affected.
2) The multi-dimensional analysis requirements cannot be met. Decision making errors or delays may result from the fact that only location data and radiation dose data can be provided, but other influencing factors such as risk level, environmental conditions, personnel health, etc. are not reflected.
3) The radioactive substance serving as a protection object can only be passively protected by a protector, and a monitoring center does not know whether the radioactive substance is in danger or not.
Therefore, in order to improve the level of security of radioactive substances, more advanced, reliable and intelligent technical means are needed, such as developing novel nuclear security systems based on artificial intelligence, deep learning and other technologies.
The invention patent application with the application publication number of CN112466075A discloses an electronic security fence based on the Internet of things, which comprises a control host, a radar detector, a warning device, a power supply device and a lighting device; the control host is used for logic operation processing; the radar detector is connected with the control host and used for monitoring the distance between the out-of-range person and the vehicle in real time; the warning device is connected with the control host and used for sending out sound and voice warning prompt to out-of-range personnel and vehicles; a power supply device for supplying power to each device; when pedestrians, vehicles, construction operation machines and the like approach to the line iron towers and the electric power facilities, the radar detector sends signals to the control host, and the control host starts the buzzer and the voice alarm to remind the pedestrians and the vehicles to pay attention to keeping the safe distance. The method has the defects of higher power consumption and higher cost, and has dependence on network bandwidth delay.
The invention patent application with the application publication number of CN114566016A discloses an electronic fence protection method and an electronic fence protection system based on wireless networking, wherein the method comprises the following steps: firstly, an electronic fence started automatically becomes a host to establish a local area network, and a number 1 is allocated to the electronic fence to become a fence 1; after the electronic fence which is not started at first is started, adding a local area network, and obtaining a number n through a host to form an n-number fence; setting respective signal receiving and transmitting frequencies according to the number and receiving and transmitting frequency mapping table after each electronic fence is successfully accessed into the network, starting an infrared transmitting device and an infrared receiving device of the electronic fence to rotate around a shaft until a receiving and transmitting relation is successfully established between the electronic fence and an adjacent electronic fence, and stopping rotating; after the receiving-transmitting relation is successfully established among the N electronic fences, a protection area is formed, wherein the protection area is an area surrounded by the infrared gratings among all adjacent electronic fences; when any infrared grating is shielded, the electronic fence which cannot receive the infrared signal executes audible and visual alarm prompt operation. The method has the defects that the stability and the reliability of infrared signals of the electronic fence are affected due to low robustness, the detection precision and the sensitivity of the electronic fence are reduced, and meanwhile, the warning effect of the electronic fence is reduced due to the existence of performance hidden danger.
Disclosure of Invention
In order to solve the technical problems, the radioactive substance transportation security electronic fence protection method provided by the invention realizes the efficient positioning identification of illegal approaching of radioactive substance transportation links and carries out quick response according to the dangerous grade.
The invention aims to provide a radioactive article transportation security electronic fence protection method, which comprises the steps of setting a monitoring area and further comprising the following steps of:
step 1: performing positioning preparation;
step 2: positioning an identification area;
step 3: different feedback is performed when the located moving object is in different areas.
Preferably, the setting the monitoring area includes setting a monitoring area range according to an area environment where the radioactive substance is located, where the monitoring area range is located between the hot spot and the signal receiving end.
In any of the above schemes, preferably, the step 1 includes the following substeps:
step 11: the wifi data of the local position in the collecting area is migrated and optimized to the model;
step 12: collecting wifi data of the signal receiver to reposition the signal receiver;
step 13: and collecting wifi data in the monitoring area.
In any of the above aspects, it is preferable that the identification area is divided into a security area, a guard area, and a hazard area from far to near according to distances.
In any of the above schemes, preferably, the step 2 includes determining whether a new device enters the wifi coverage area according to broadcast information of the hot spot, if it is detected that the new device enters the monitoring area, acquiring RSSI values of positions of the moving targets relative to the hot spots, and tracking and positioning the moving targets through the RSSI.
In any of the above schemes, preferably, the method for tracking and positioning a moving object by RSSI includes the following steps:
1. after the mobile target enters the wifi coverage area, a mobile phone exists on the mobile target and the wifi switch is already turned on;
2. the mobile target mobile phone scans surrounding hot spot information, sends a request to surrounding hot spots, obtains an RSSI value of the position of the mobile target according to the request, and broadcasts response information;
3. combining the RSSI value with the relocated hot spot coordinates, and carrying the value into an attenuation formula to obtain the linear distance between the moving target and each hot spot;
4. and obtaining the position information of the moving target according to a least square method algorithm, and calculating the position of the moving target by continuously collecting WiFi information of a signal receiving end.
In any of the above schemes, preferably, when the hotspot obtains the signal RSSI value of the position of the moving object relative to each hotspot according to the request, a counting variable is introduced to record the number of times of reading the hotspot signal value of the moving object as N, the initial value as 0, n+1 is calculated when the data is read each time, the received signal strength RSSI is recorded as signal, and the formula is that
signal=-10nlog(d)+A
Where n is the path loss index, d is the distance between the transceiving nodes, and a is a constant.
In any of the above embodiments, it is preferable that the path loss index n is calculated by the formula of
Where λ is the wavelength of the wireless signal.
In any of the above embodiments, preferably, the calculation formula of the linear distance between the moving target and each hot spot is
In any of the above schemes, preferably, step 2 further includes if it is unable to detect that a new device enters the monitoring area, judging whether a moving target enters the monitoring area according to the similarity between the received wifi information and the wifi reference information, if so, positioning the moving target by using the migrated model, and if not, indicating that no moving target exists in the monitoring area.
In any of the above schemes, preferably, the method for determining whether the moving object enters the monitoring area through wifi information is to continuously collect information of the signal receiving end, compare the information with reference information collected in the preparation stage, calculate similarity of two pieces of information through a time sequence distance measurement algorithm DTW, align the two pieces of time sequence information, iteratively find the most similar piece alignment, and calculate similarity of the two pieces of time sequence information.
In any of the above schemes, preferably, after positioning is started, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, and then the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, i.e. no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, i.e. moving target.
In any of the above schemes, preferably, the step 3 includes the following:
1. when the moving target is in the dangerous area, a warning is broadcast, and security personnel are notified and guided to drive away the moving target;
2. when the moving target is in the warning zone, a warning is broadcast to the moving target;
3. when the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, continuously collecting data to carry out the next round of judgment.
The invention provides a radioactive article transportation security electronic fence protection method, which can more accurately predict and control dangerous invasion conditions to occur from continuous tracking and monitoring of low, higher and high-level risks, and well control possible police conditions.
Drawings
Fig. 1 is a flow chart of a preferred embodiment of a radioactive material transportation security electronic fence protection method according to the present invention.
Fig. 2 is a schematic view of the area where data is collected according to a preferred embodiment of the security electronic fence protection method for transporting radioactive articles according to the present invention.
Fig. 3 is a schematic diagram of a positioning model of a preferred embodiment of a security electronic fence protection method for transporting radioactive articles according to the present invention.
Fig. 4 is a schematic view of an embodiment of an illegal access identification area of a radioactive article transport security electronic fence protection method according to the present invention.
Fig. 5 is a system flow diagram of another preferred embodiment of a radioactive material transportation security electronic fence protection method according to the present invention.
Fig. 6 is a flow chart of one embodiment of an RSSI-based positioning of a radioactive article transportation security electronic fence protection method according to the present invention.
FIG. 7 is a flow chart of one embodiment of a model-based positioning of a radioactive article transport security electronic fence protection method according to the present invention.
Fig. 8 is a flowchart of an embodiment of a method for protecting a radioactive material transportation security electronic fence according to the present invention for determining whether a moving object exists in an area.
Detailed Description
The invention is further illustrated by the following figures and specific examples.
Example 1
As shown in fig. 1, a method for protecting a security electronic fence for transporting radioactive articles is performed, and step 100 is performed, wherein a monitoring area is set, and a monitoring area range is set according to an area environment where radioactive substances are located, wherein the monitoring area range is located between a hot spot and a signal receiving end.
Step 110 is performed to perform positioning preparation, including the following sub-steps:
step 11: the wifi data of the local position in the collecting area is migrated and optimized to the model;
step 12: collecting wifi data of the signal receiver to reposition the signal receiver;
step 13: and collecting wifi data in the monitoring area.
Step 120 is executed to locate the identification area, where the identification area is divided into a security area, a guard area and a danger area according to the distance from the far to the near. Judging whether new equipment enters a wifi coverage area according to broadcast information of hotspots, if the new equipment is detected to enter a monitoring area, acquiring RSSI values of positions of moving targets relative to the hotspots, and tracking and positioning the moving targets through the RSSI, wherein the method for tracking and positioning the moving targets through the RSSI comprises the following steps:
1) After the mobile target enters the wifi coverage area, a mobile phone exists on the mobile target and the wifi switch is already turned on;
2) The mobile target mobile phone scans surrounding hot spot information, sends a request to surrounding hot spots, obtains an RSSI value of the position of the mobile target according to the request, and broadcasts response information; when the hot spot obtains the signal RSSI value of the position of the moving target relative to each hot spot according to the request, introducing a counting variable to record the number of times of reading the hot spot signal value of the moving target as N, wherein the initial value is 0, and calculating the received signal strength RSSI as signal when reading data each time, wherein the formula is that
signal=-10nlog(d)+A
Where n is the path loss index, d is the distance between the transceiving nodes, and a is a constant.
The calculation formula of the path loss index n is as follows
Where λ is the wavelength of the wireless signal.
3) Combining the RSSI value with the relocated hot spot coordinates, and carrying the value into an attenuation formula to obtain the linear distance between the moving target and each hot spot; the calculation formula of the straight line distance between the moving target and each hot spot is as follows
4) And obtaining the position information of the moving target according to a least square method algorithm, and calculating the position of the moving target by continuously collecting WiFi information of a signal receiving end.
If the fact that new equipment enters the monitoring area cannot be detected, whether a moving target enters the monitoring area is judged through the similarity between the received wifi information and the wifi reference information, if yes, the moving target is positioned through the migrated model, and if not, the fact that the moving target does not exist in the monitoring area is indicated. The method for judging whether the moving target enters the monitoring area through wifi information is to continuously collect information of a signal receiving end, compare the information with reference information collected in a preparation stage, calculate similarity of two pieces of information through a time sequence distance measurement algorithm DTW, align the two pieces of time sequence information, iteratively find the most similar pieces to align, and calculate similarity of the two pieces of time sequence information. After the positioning is started, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, namely no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, namely the moving target.
Step 130 is executed to perform different feedback when the located moving object is in different areas, including the following:
1) When the moving target is in the dangerous area, a warning is broadcast, and security personnel are notified and guided to drive away the moving target;
2) When the moving target is in the warning zone, a warning is broadcast to the moving target;
3) When the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, continuously collecting data to carry out the next round of judgment.
Example two
For the implementation scheme of the electronic fence, the core theme is as follows:
the current common security technology can not meet the illegal approaching sensing requirement of radioactive articles in the transportation process, and the reason is that: 1) For three stages of illegal approaching, because the distances are different, the risk levels are different, and meanwhile, because the video information in the nuclear security system is sensitive and the identification accuracy of the WIFI is gradually accurate, the introduction of the risk perception based on the WIFI is necessary; 2) It is difficult to directly establish an effective model between the behavior characteristics and the dangers of the person to efficiently predict the behavior of the person to belong to the dangerous behavior. Therefore, the invention aims to solve the two problems, realizes the efficient positioning and identification of the illegal approach of the radioactive substance transportation link, and carries out quick response according to the dangerous grade.
The technical scheme comprises the following implementation processes:
step 1 sets up the monitoring area
After the system is started, a user starts to set a monitoring area range according to the area environment where the radioactive substance is located, and the range suggestion is located between a hot spot and a signal receiving end so as to collect wifi data in the area. The area is divided into three parts, namely a safe area of a far-distance area compared with the radioactive substance, a warning area of a distance area compared with the radioactive substance and a dangerous area of a near-distance area. The system sets up the electronic fence about these three regions, fixes a position the moving target in the region through the control to wifi spectral information to guarantee that radioactive substance can initiatively discern dangerous, and carry out the interaction assurance safety with the security personnel.
Step 2 start system and positioning preparation work
After an area is set in the system, the system is started, and the following tasks are executed after the system is started: 1) Guiding a user to collect wifi data of local positions in the area to optimize the model; 2) The system collects wifi data of the signal receiver to reposition the position of the signal receiver so as to facilitate follow-up tracking of the moving target; 3) Collecting reference information: and collecting wifi data in the monitoring area, wherein the data needs to ensure that no moving target exists in the area so as to facilitate the comparison of the follow-up models. For task one, a user needs to collect a small amount of wifi data as input by using the signal receiver as a moving target in a monitoring area so as to finely adjust the model, and therefore the model can achieve good positioning accuracy in different environments. After the electronic fence is set, the surrounding of the radioactive substance is divided, the accuracy of model positioning is higher as the size of the area is smaller, wifi data are collected by using a signal receiver based on the area division, the wifi data are input into the model according to the division sample of the area, for example, as shown in fig. 2, the positions of the three areas divided by the user are compared, the area where the center point is located is taken as a label to be input into the model together, and the model is subjected to fine adjustment through transfer learning. After the model is fine-tuned, the system repositions each signal receiver by collecting information from the signal receiver to facilitate building a position map information tracking the moving object in the display area.
Step 3 identification zone localization process
The identification area is divided into a safety area, a warning area and a dangerous area from far to near according to the distance. The distance division of the three regions may be modified by user definition.
After the system is started, whether new equipment enters a wifi coverage area is judged according to broadcast information of a hot spot, if the new equipment enters the area, a moving target enters a monitoring area, and if the new equipment does not enter the area, further judgment is carried out.
If the system can detect that a new device enters the monitoring area, the system can obtain RSSI values of the positions of the moving targets relative to the hot spots, and then the moving targets can be tracked and positioned by an RSSI method.
If the new equipment can not be detected to enter the area, namely the mobile target does not turn on the wifi switch, whether the mobile target enters the monitoring area is further judged through wifi information. The method is characterized in that the information of the signal receiving end is continuously collected and compared with the reference information collected in the preparation stage, the similarity of two pieces of information is calculated through a time sequence distance measurement algorithm DTW, the algorithm can align the two pieces of time sequence information, the most similar pieces of the two pieces of time sequence information are iteratively found out to be aligned, and then the similarity of the time sequence information at the two ends is calculated, so that the algorithm can effectively avoid the classification of similar sequences into different sequences due to inaccurate alignment, and the robustness of the system is improved. Based on the algorithm, a similarity threshold is set, the setting of which will be described later. Comparing the continuously collected information with a threshold value after similarity is calculated between the continuously collected information and the reference information, and if the continuously collected information and the reference information are dissimilar, namely a moving target exists in the area, positioning the moving target through a model algorithm; if the two are similar, i.e. there is no moving object in the area, the system continues to collect the signal receiver information.
After the moving target can be positioned, different feedback processes are performed on the area where the moving target is positioned. If the moving target is in a safe area, the moving target is far away from the radioactive substance, has low threat to the radioactive substance and is silent; if the moving target enters the warning area, the system needs to broadcast warning information on the moving target in real time, continuously positions the moving target to draw a moving path, judges the moving direction of the moving target through the moving path, and if the moving target is continuously close to the radioactive substance in the area, further warns security personnel to guide and drive the radioactive substance; if the moving target enters the dangerous area, the system not only needs to continuously calculate and draw the position of the moving target, but also should warn and guide security personnel to expel the moving target
Step 4 identification area positioning method
In order to ensure the accuracy and the universality of identification, the invention divides the induction of the identification area into two parts, and the two parts cooperate to carry out identification positioning.
The first part is located by RSSI. Firstly, after a mobile object enters a wifi coverage area, a mobile phone exists on the mobile object, and a wifi switch is already opened. This assumption accords with the wifi positioning schemes which are currently common, and the positioning performance of the positioning schemes is excellent due to the abundant research results of the schemes. The system is similar to the connection process of the STA and the AP in the 802.11 protocol, firstly, the STA scans, in the scanning stage of the STA, the STA sends request information to the AP, the AP broadcasts response information after receiving the request information, the connection state information of the AP and the STA equipment exists in a management frame of the response information message, and the connection state information contains the RSSI value of the AP where the STA equipment is located. In the system, the mobile phone of the mobile target can be considered to scan surrounding hot spot information, a request is sent to surrounding hot spots, the hot spot obtains an RSSI signal value of the position of the mobile target according to the request, and the response information is broadcasted, in the process, the system can obtain the RSSI value, and the obtaining method comprises, but is not limited to, capturing packets of the broadcast information, setting a hot spot router to obtain the broadcast information in a monitoring mode, and the like.
After the system obtains the RSSI value, the straight line distance between the moving target and each hot spot can be obtained by substituting the value into the attenuation formula by combining the hot spot coordinates after repositioning. And obtaining the position information of the moving target according to a least square method algorithm. The position of the moving target is calculated by continuously collecting WiFi information of the signal receiving end, so that the purpose of drawing the moving path of the moving target in real time can be achieved.
The second part is to locate by a deep-learned fingerprint algorithm. The model diagram is shown in fig. 3, a feature extractor for a positioning task is trained in a pre-selection connection stage, noise environments which are easy to collect data in indoor environments and the like can be selected for collection by data in the pre-training stage, so that the collected data can be trained easily, the collected data is used as input, feature extraction is performed after normalization processing, and region labels for the current data collection environment are output. The feature extractor trained in the pre-training stage is migrated to a target domain, namely an environment field of system application as known knowledge to be positioned, specifically, the weight and deviation of each layer of the feature extractor are frozen, two hidden layers are added in migration learning of the target domain, and all layers of the feature extractor are finely tuned through a Nanonet layer to learn small-area knowledge based on a source domain.
Nanone is a specific neural network layer that acts as a reconstruction input in transfer learning. In the transfer learning, the labeled data of the source domain is used to train a neural network model, and unlabeled data of the target domain is then reconstructed by nanonet. The goal of nanonet is to improve the accuracy of the target domain by narrowing the difference between the source domain and the target domain. By mapping the features of the source domain to the target domain, the nanonet can learn and reconstruct the feature representation of the target domain, making the prediction result on the target domain more accurate.
The identification area is divided into a safety area, a warning area and a dangerous area from far to near according to the distance. The distance division of the three areas can be modified by user definition, and the division mode is shown in fig. 4. The control end of the device in the figure is used to process the data collected by the signal receiving end and is placed adjacent to the radioactive material for convenience of presentation. In order to ensure the effectiveness of identification, three areas need to be arranged in the area of the signal receiving end as far as possible, and the feasibility of the scheme is not influenced by limiting the areas in the signal receiving end in consideration of the fact that wifi has a far propagation distance in outdoor positioning.
Example III
As shown in fig. 5, after the system is started, the area setting of the electronic fence is first performed. The user sets the position of the electronic fence in the hot spot and the signal receiving end area according to the system guide so as to divide three areas, wherein the areas are a safety area, a warning area and a danger area from far to near; and then, the user collects WiFi data input models at a small number of positions in the environment according to system guide, and the models are finely adjusted according to the WiFi data input models so as to improve the positioning accuracy in a specific scene. And then the system performs repositioning of the signal receiver and collects the empty information without the moving target in the wifi coverage area as reference information. The above is the preparation work before positioning. After that, the system continuously collects information of the signal receiving end, continuously acquires broadcasting information of the hot spot to check whether a new STA device enters a monitoring area, and if the STA device enters the monitoring area, it means that a moving target is to be located.
As shown in fig. 6, when the system confirms that a new STA device enters a wifi monitoring area, the system responds to the broadcast information of the connection request through the connection request information of the mobile phone and the hot spot aiming at the moving target, further reads the signal RSSI value of the position of the moving target relative to each hot spot, and simultaneously introduces a counting variable to record the number of times of reading the hot spot signal value of the moving target as N, the initial value as 0, and n+1 is used for reading data each time, so that the system is convenient to obtain the coordinates of the moving target. By signal attenuation formula
signal=-10nlog(d)+A
Where signal is the received signal strength, n is the path loss index, d is the distance, and a is a constant. The path loss index n is an index reflecting the propagation loss of the signal, and is typically between 2 and 4. The constant a is the value of the received radio signal strength at the receiving node 1m from the transceiving node, and is a parameter related to the source and the receiver, typically between 0 and-30 dBm.
The values of n and A can be determined by:
n in the formula can be determined by the above formula, wherein d is the distance between the receiving and transmitting nodes, λ is the wavelength of the wireless signal, so n can be conveniently calculated, the RSSI value at a distance of 1m from the hot spot is measured, and based on the known quantity substitution formula, a can be reversely solved to obtain the relation between the unknown quantity d and the known quantity RSSI value:
based on the above formula, the system can obtain the linear distance between the moving target and each hot spot through calculation, so that the optimal solution is iterated through a least square algorithm to obtain more accurate positioning coordinates, the positioning coordinates are drawn on a coordinate graph, and the moving track of the moving target is obtained through continuously drawing the coordinates of the moving target, so that the moving direction formed by the two latest moments of the moving track can be obtained. The area is divided from far to near, but the response priority of the system is in the direction of decreasing the priority from near to far, so after the coordinates are positioned, whether the position of the moving target is in a dangerous area is firstly judged, if the position of the moving target is in the dangerous area, warning words are broadcasted to the moving target, and security personnel are guided to drive away; if the warning sign is not in the dangerous area, judging whether the warning sign is in the warning area, broadcasting a warning sign to the moving target if the warning sign is in the warning area, further judging whether the moving mode of the warning sign is towards the dangerous area, if so, informing security personnel to perform persuasion, and if not, performing no action; if the moving target is in the safe area, the moving track is continuously focused.
After the system is started, data of a target domain is collected through the regional division to perform migration learning, a trimmed model is used for positioning, and the positioning flow is shown in fig. 7; the method comprises the steps that a hot spot is used as a signal transmitting end to be broadcasted, a signal receiver returns collected data to an equipment control end after receiving the signal broadcasted by the hot spot, the equipment control end runs a model, the equipment control end takes the collected data as input after filtering and other processing, the model outputs a label of an area where current data is located based on the input, the label is compared with an electronic fence set by a user, and the equipment control end outputs the area where a moving target is located. Firstly, judging whether the moving target is in a dangerous area, if so, broadcasting a warning, and informing and guiding security personnel to drive away the moving target; if the moving target is in the warning area, a warning is broadcast to the moving target; if the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, the system returns to continuously collect data to carry out the judgment of the next round.
As shown in fig. 8, in the model-based positioning method, since it is not possible to intuitively determine whether or not a moving target exists in the monitoring area, it is necessary to perform a comparative determination instead. After the system is started, the system samples wifi data of a detection area without a moving target, takes the wifi data as reference data to generate a time sequence diagram, judges whether the moving target exists in the area each time after the system starts to use model positioning, compares the moving target with the data, adopts a DTW algorithm with good effect for comparison, and can align two time sequences according to an optimal path by dynamically regulating the two time sequences and calculate a distance measurement value between the two time sequences. The metric value can be calculated directly using euclidean distance. In consideration of that the specific scene should have different values when the similarity is calculated by comparing with the reference data, the specific scene needs an additional similarity threshold value of the calculation standard. After the system is started, not only is a datum data required to be acquired, but also a plurality of groups of wifi data of the monitoring area without the moving target are required to be acquired for additional times, the datum data and the additional data are subjected to DTW similarity measurement, and the average value is calculated to be used as a standard similarity threshold value. Based on the above, after positioning starts, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, then the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, namely no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, namely moving target.
The invention achieves the technical effects that:
1) Constructing an integrated sensing region
2) From the continuous tracking and monitoring of low, higher and high-level risks, dangerous invasion conditions to be generated can be predicted and controlled more accurately, and possible police conditions can be well mastered.
The foregoing description of the invention has been presented for purposes of illustration and description, but is not intended to be limiting. Any simple modification of the above embodiments according to the technical substance of the present invention still falls within the scope of the technical solution of the present invention. In this specification, each embodiment is mainly described in the specification as a difference from other embodiments, and the same or similar parts between the embodiments need to be referred to each other. For system embodiments, the description is relatively simple as it essentially corresponds to method embodiments, and reference should be made to the description of method embodiments for relevant points.

Claims (10)

1.一种放射性物品运输安保电子栅栏防护方法,包括,其特征在于,还包括以下步骤:1. A security electronic fence protection method for transporting radioactive items, which includes, and is characterized by, further comprising the following steps: 步骤1:进行定位准备;Step 1: Prepare for positioning; 步骤2:进行识别区定位;Step 2: Locate the identification area; 步骤3:当定位到的移动目标处于不同区域时进行不同的反馈。Step 3: Provide different feedback when the located moving target is in different areas. 2.如权利要求1所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述设定监控区域包括根据放射性物质所处区域环境设置监控区域范围,所述监控区域范围处在热点与信号接收端之间。2. The electronic fence protection method for radioactive material transportation security as claimed in claim 1, wherein the setting of the monitoring area includes setting a monitoring area range according to the regional environment where the radioactive material is located, and the monitoring area range is between a hot spot and between signal receiving ends. 3.如权利要求2所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述步骤1包括以下子步骤:3. The radioactive material transportation security electronic fence protection method according to claim 2, characterized in that step 1 comprises the following sub-steps: 步骤11:收集区域内局部位置的wifi数据对模型进行迁移优化;Step 11: Collect wifi data from local locations in the area to migrate and optimize the model; 步骤12:收集信号接收器的wifi数据对信号接收器的位置进行重定位;Step 12: Collect the wifi data of the signal receiver and relocate the position of the signal receiver; 步骤13:收集监控区域内的wifi数据。Step 13: Collect wifi data in the monitored area. 4.如权利要求3所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述识别区按照距离从远及近分为安全区、警戒区和危险区。4. The electronic fence protection method for radioactive items transportation security as claimed in claim 3, characterized in that the identification area is divided into a safe area, a warning area and a dangerous area according to the distance from far to near. 5.如权利要求4所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述步骤2包括根据热点的广播信息判断是否有新的设备进入了wifi覆盖区域,如果检测到有新的设备进入了监测区域,则获得移动目标所处位置相对于各个热点的RSSI值,通过RSSI进行移动目标追踪定位。5. The electronic fence protection method for radioactive items transportation security as claimed in claim 4, wherein the step 2 includes judging whether a new device has entered the WiFi coverage area based on the broadcast information of the hotspot. If a new device is detected, When the device enters the monitoring area, it obtains the RSSI value of the moving target's location relative to each hotspot, and uses RSSI to track and locate the moving target. 6.如权利要求5所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述通过RSSI进行移动目标追踪定位方法包括以下内容:6. The radioactive material transportation security electronic fence protection method according to claim 5, characterized in that the method for tracking and locating a mobile target by RSSI comprises the following contents: 1)假设移动目标进入wifi覆盖区域之后,移动目标身上存在手机并且wifi开关已经打开;1) Assume that after the moving target enters the wifi coverage area, there is a mobile phone on the moving target and the wifi switch is turned on; 2)移动目标手机扫描周围的热点信息,并向周围热点发送请求,热点根据该请求得到移动目标所在位置的RSSI值,并且将回应信息进行广播;2) The mobile target mobile phone scans the surrounding hotspot information and sends a request to the surrounding hotspots. The hotspot obtains the RSSI value of the moving target's location based on the request and broadcasts the response information; 3)将RSSI值结合重定位后的热点坐标,通过该值带入衰减公式求得移动目标距离每个热点的直线距离;3) Combine the RSSI value with the hotspot coordinates after relocation, and use this value to enter the attenuation formula to calculate the straight-line distance between the moving target and each hotspot; 4)根据最小二乘法算法求取移动目标的位置信息,通过不断地收集信号接收端WiFi信息计算移动目标的位置。4) Obtain the location information of the moving target based on the least squares algorithm, and calculate the location of the moving target by continuously collecting WiFi information at the signal receiving end. 7.如权利要求6所述的放射性物品运输安保电子栅栏防护方法,其特征在于,当热点根据请求得到移动目标所在位置相对于各个热点的信号RSSI值时,引入计数变量记读取移动目标的热点信号值次数为N,初值为0,每次读取数据时将N+1,计算接收到的信号强度RSSI记为signal,公式为7. The electronic fence protection method for radioactive items transportation security as claimed in claim 6, characterized in that when the hotspot obtains the signal RSSI value of the location of the moving target relative to each hotspot according to the request, a counting variable is introduced to record the RSSI value of the moving target. The number of hotspot signal values is N, and the initial value is 0. Each time the data is read, N+1 is added. Calculate the received signal strength RSSI and record it as signal. The formula is: signal=-10nlog(d)+Asignal=-10nlog(d)+A 其中,n是路径损耗指数,d是收发节点之间的距离,A是常数。Among them, n is the path loss index, d is the distance between the sending and receiving nodes, and A is a constant. 8.如权利要求7所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述路径损耗指数n的计算公式为8. The electronic fence protection method for radioactive items transport security as claimed in claim 7, characterized in that the calculation formula of the path loss index n is: 其中,λ是无线信号的波长。Among them, λ is the wavelength of the wireless signal. 9.如权利要求8所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述移动目标距离每个热点的直线距离的计算公式为9. The radioactive material transportation security electronic fence protection method according to claim 8, characterized in that the calculation formula of the straight-line distance between the moving target and each hot spot is: 10.如权利要求9所述的放射性物品运输安保电子栅栏防护方法,其特征在于,所述步骤2还包括如果不能检测到有新的设备进入了监测区域,则通过接收到的wifi信息与wifi基准信息的相似度判断是否有移动目标进入监测区域,若有则通过迁移后的模型进行移动目标定位,若无,则说明监测区域内不存在移动目标。10. The electronic fence protection method for radioactive items transport security as claimed in claim 9, wherein the step 2 further includes: if it cannot be detected that a new device has entered the monitoring area, the received wifi information and wifi The similarity of the benchmark information determines whether there are moving targets entering the monitoring area. If so, the moving targets are positioned through the migrated model. If not, it means that there are no moving targets in the monitoring area.
CN202311840180.XA 2023-12-29 2023-12-29 A radioactive material transportation security electronic fence protection method Active CN117812536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311840180.XA CN117812536B (en) 2023-12-29 2023-12-29 A radioactive material transportation security electronic fence protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311840180.XA CN117812536B (en) 2023-12-29 2023-12-29 A radioactive material transportation security electronic fence protection method

Publications (2)

Publication Number Publication Date
CN117812536A true CN117812536A (en) 2024-04-02
CN117812536B CN117812536B (en) 2024-08-16

Family

ID=90433331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311840180.XA Active CN117812536B (en) 2023-12-29 2023-12-29 A radioactive material transportation security electronic fence protection method

Country Status (1)

Country Link
CN (1) CN117812536B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119758696A (en) * 2025-03-05 2025-04-04 四川京炜交通工程技术有限公司 Quick detection method and system for rise and fall time of electric railing for charging

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125538A (en) * 2014-08-14 2014-10-29 中国科学院重庆绿色智能技术研究院 WIFI (wireless fidelity) network based RSSI (received signal strength indicator) signal strength secondary locating method and device
CN107801147A (en) * 2017-07-21 2018-03-13 西安工程大学 One kind is based on the adaptive indoor orientation method of the improved multizone of RSSI rangings
CN112556710A (en) * 2020-10-26 2021-03-26 四川君逸数码科技股份有限公司 Pipe gallery personnel route planning method based on WIFI positioning
WO2023051774A1 (en) * 2021-10-01 2023-04-06 南宁市安普康商贸有限公司 Monitoring method and system, apparatus, and computer program product

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125538A (en) * 2014-08-14 2014-10-29 中国科学院重庆绿色智能技术研究院 WIFI (wireless fidelity) network based RSSI (received signal strength indicator) signal strength secondary locating method and device
CN107801147A (en) * 2017-07-21 2018-03-13 西安工程大学 One kind is based on the adaptive indoor orientation method of the improved multizone of RSSI rangings
CN112556710A (en) * 2020-10-26 2021-03-26 四川君逸数码科技股份有限公司 Pipe gallery personnel route planning method based on WIFI positioning
WO2023051774A1 (en) * 2021-10-01 2023-04-06 南宁市安普康商贸有限公司 Monitoring method and system, apparatus, and computer program product

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119758696A (en) * 2025-03-05 2025-04-04 四川京炜交通工程技术有限公司 Quick detection method and system for rise and fall time of electric railing for charging

Also Published As

Publication number Publication date
CN117812536B (en) 2024-08-16

Similar Documents

Publication Publication Date Title
Gomez-de-Gabriel et al. Monitoring harness use in construction with BLE beacons
US8502670B2 (en) Real-time RFID positioning system and method, repeater installation method therefor, position confirmation service system using the same
CN109765539A (en) Indoor user behavior monitoring method and device, electrical equipment and home monitoring system
JP5105100B2 (en) Intrusion detection system, alarm terminal, intruder detection method, program and recording medium
JP3521899B2 (en) Intruder detection method and intruder detector
US20180322755A1 (en) Localized hazard alert system and method of use
CN104284337A (en) Base station detection method and system
CN103606236A (en) Real time safety monitoring system based on distribution type optical fiber invasion alarm unit
CN106781145A (en) A kind of portable transformer and distribution power station intelligent patrol detection instrument system and its monitoring method
JP2000338234A (en) Monitoring system
CN112862273B (en) Tunnel construction site risk assessment method and system based on Internet of things
CN107064952A (en) Railway track barrier monitors the device of identification automatically
CN117812536A (en) Protective method for security electronic fence for radioactive article transportation
RU2595532C1 (en) Radar system for protection of areas with small-frame video surveillance system and optimum number of security guards
CN109257854A (en) Intelligent lighting lamp, monitoring method and monitoring system based on intelligent lighting lamp
CN118300708A (en) Multipath interference recognition analysis and reduction method for complex electromagnetic environment of airport
CN206431771U (en) A kind of portable transformer and distribution power station intelligent patrol detection instrument system
KR102188567B1 (en) System for monitoring the road using 3 dimension laser scanner
CN110995374A (en) Black broadcast signal monitoring system
RU2352995C1 (en) Radio-wave detection method of moving objects
Zhao et al. An Analysis of the optimal placement of beacon in Bluetooth-INS indoor localization
Xie et al. An IoT assisted early warning system for smart grid
JP5829855B2 (en) Mobile monitoring system
JP2014170284A (en) Moving object monitoring system
CN115662036A (en) Electronic fence type intrusion detection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant