Background
Security of radioactive materials, particularly during transportation, is a major challenge for traditional security systems compared to security protection in fixed settings. For radioactive substances, because the radioactive substances have certain harm, one of common consideration strategies is to pack the radioactive substances completely so as to prevent leakage; secondly, the road with lower crowd density is selected on the selection of the transportation route, so that the lost hazard is reduced, and the like. Therefore, the traditional security is passive, and has great defects in the transportation process of radioactive substances, so that the development of an intelligent nuclear security system by combining the technologies of artificial intelligence, the Internet of things, information physical fusion and the like has important practical significance.
In order to ensure nuclear safety, prevent and deal with nuclear accidents, nuclear energy is safely utilized, and safety measures such as sufficient prevention, protection, alleviation and supervision are adopted for nuclear facilities, nuclear materials and related radioactive wastes, so that nuclear accidents caused by technical reasons, artificial reasons or natural disasters are prevented, and the radioactive consequences under the condition of the nuclear accidents are relieved to the maximum extent.
In this context, radioactive material security is also faced with new challenges and demands. At present, one method commonly used is to use a GPS and a radiation dose detector to form a detection terminal, send position information and radiation dose data to a monitoring center in real time under a mobile communication network, so as to determine whether radioactive substances leak or exceed a specified limit value, and take corresponding emergency response measures. However, this approach has the following limitations:
1) Real-time dynamic monitoring cannot be achieved. Since the detection terminal needs to be replaced or calibrated regularly, the data precision is reduced or inaccurate, and the monitoring effect may be affected.
2) The multi-dimensional analysis requirements cannot be met. Decision making errors or delays may result from the fact that only location data and radiation dose data can be provided, but other influencing factors such as risk level, environmental conditions, personnel health, etc. are not reflected.
3) The radioactive substance serving as a protection object can only be passively protected by a protector, and a monitoring center does not know whether the radioactive substance is in danger or not.
Therefore, in order to improve the level of security of radioactive substances, more advanced, reliable and intelligent technical means are needed, such as developing novel nuclear security systems based on artificial intelligence, deep learning and other technologies.
The invention patent application with the application publication number of CN112466075A discloses an electronic security fence based on the Internet of things, which comprises a control host, a radar detector, a warning device, a power supply device and a lighting device; the control host is used for logic operation processing; the radar detector is connected with the control host and used for monitoring the distance between the out-of-range person and the vehicle in real time; the warning device is connected with the control host and used for sending out sound and voice warning prompt to out-of-range personnel and vehicles; a power supply device for supplying power to each device; when pedestrians, vehicles, construction operation machines and the like approach to the line iron towers and the electric power facilities, the radar detector sends signals to the control host, and the control host starts the buzzer and the voice alarm to remind the pedestrians and the vehicles to pay attention to keeping the safe distance. The method has the defects of higher power consumption and higher cost, and has dependence on network bandwidth delay.
The invention patent application with the application publication number of CN114566016A discloses an electronic fence protection method and an electronic fence protection system based on wireless networking, wherein the method comprises the following steps: firstly, an electronic fence started automatically becomes a host to establish a local area network, and a number 1 is allocated to the electronic fence to become a fence 1; after the electronic fence which is not started at first is started, adding a local area network, and obtaining a number n through a host to form an n-number fence; setting respective signal receiving and transmitting frequencies according to the number and receiving and transmitting frequency mapping table after each electronic fence is successfully accessed into the network, starting an infrared transmitting device and an infrared receiving device of the electronic fence to rotate around a shaft until a receiving and transmitting relation is successfully established between the electronic fence and an adjacent electronic fence, and stopping rotating; after the receiving-transmitting relation is successfully established among the N electronic fences, a protection area is formed, wherein the protection area is an area surrounded by the infrared gratings among all adjacent electronic fences; when any infrared grating is shielded, the electronic fence which cannot receive the infrared signal executes audible and visual alarm prompt operation. The method has the defects that the stability and the reliability of infrared signals of the electronic fence are affected due to low robustness, the detection precision and the sensitivity of the electronic fence are reduced, and meanwhile, the warning effect of the electronic fence is reduced due to the existence of performance hidden danger.
Disclosure of Invention
In order to solve the technical problems, the radioactive substance transportation security electronic fence protection method provided by the invention realizes the efficient positioning identification of illegal approaching of radioactive substance transportation links and carries out quick response according to the dangerous grade.
The invention aims to provide a radioactive article transportation security electronic fence protection method, which comprises the steps of setting a monitoring area and further comprising the following steps of:
step 1: performing positioning preparation;
step 2: positioning an identification area;
step 3: different feedback is performed when the located moving object is in different areas.
Preferably, the setting the monitoring area includes setting a monitoring area range according to an area environment where the radioactive substance is located, where the monitoring area range is located between the hot spot and the signal receiving end.
In any of the above schemes, preferably, the step 1 includes the following substeps:
step 11: the wifi data of the local position in the collecting area is migrated and optimized to the model;
step 12: collecting wifi data of the signal receiver to reposition the signal receiver;
step 13: and collecting wifi data in the monitoring area.
In any of the above aspects, it is preferable that the identification area is divided into a security area, a guard area, and a hazard area from far to near according to distances.
In any of the above schemes, preferably, the step 2 includes determining whether a new device enters the wifi coverage area according to broadcast information of the hot spot, if it is detected that the new device enters the monitoring area, acquiring RSSI values of positions of the moving targets relative to the hot spots, and tracking and positioning the moving targets through the RSSI.
In any of the above schemes, preferably, the method for tracking and positioning a moving object by RSSI includes the following steps:
1. after the mobile target enters the wifi coverage area, a mobile phone exists on the mobile target and the wifi switch is already turned on;
2. the mobile target mobile phone scans surrounding hot spot information, sends a request to surrounding hot spots, obtains an RSSI value of the position of the mobile target according to the request, and broadcasts response information;
3. combining the RSSI value with the relocated hot spot coordinates, and carrying the value into an attenuation formula to obtain the linear distance between the moving target and each hot spot;
4. and obtaining the position information of the moving target according to a least square method algorithm, and calculating the position of the moving target by continuously collecting WiFi information of a signal receiving end.
In any of the above schemes, preferably, when the hotspot obtains the signal RSSI value of the position of the moving object relative to each hotspot according to the request, a counting variable is introduced to record the number of times of reading the hotspot signal value of the moving object as N, the initial value as 0, n+1 is calculated when the data is read each time, the received signal strength RSSI is recorded as signal, and the formula is that
signal=-10nlog(d)+A
Where n is the path loss index, d is the distance between the transceiving nodes, and a is a constant.
In any of the above embodiments, it is preferable that the path loss index n is calculated by the formula of
Where λ is the wavelength of the wireless signal.
In any of the above embodiments, preferably, the calculation formula of the linear distance between the moving target and each hot spot is
In any of the above schemes, preferably, step 2 further includes if it is unable to detect that a new device enters the monitoring area, judging whether a moving target enters the monitoring area according to the similarity between the received wifi information and the wifi reference information, if so, positioning the moving target by using the migrated model, and if not, indicating that no moving target exists in the monitoring area.
In any of the above schemes, preferably, the method for determining whether the moving object enters the monitoring area through wifi information is to continuously collect information of the signal receiving end, compare the information with reference information collected in the preparation stage, calculate similarity of two pieces of information through a time sequence distance measurement algorithm DTW, align the two pieces of time sequence information, iteratively find the most similar piece alignment, and calculate similarity of the two pieces of time sequence information.
In any of the above schemes, preferably, after positioning is started, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, and then the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, i.e. no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, i.e. moving target.
In any of the above schemes, preferably, the step 3 includes the following:
1. when the moving target is in the dangerous area, a warning is broadcast, and security personnel are notified and guided to drive away the moving target;
2. when the moving target is in the warning zone, a warning is broadcast to the moving target;
3. when the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, continuously collecting data to carry out the next round of judgment.
The invention provides a radioactive article transportation security electronic fence protection method, which can more accurately predict and control dangerous invasion conditions to occur from continuous tracking and monitoring of low, higher and high-level risks, and well control possible police conditions.
Detailed Description
The invention is further illustrated by the following figures and specific examples.
Example 1
As shown in fig. 1, a method for protecting a security electronic fence for transporting radioactive articles is performed, and step 100 is performed, wherein a monitoring area is set, and a monitoring area range is set according to an area environment where radioactive substances are located, wherein the monitoring area range is located between a hot spot and a signal receiving end.
Step 110 is performed to perform positioning preparation, including the following sub-steps:
step 11: the wifi data of the local position in the collecting area is migrated and optimized to the model;
step 12: collecting wifi data of the signal receiver to reposition the signal receiver;
step 13: and collecting wifi data in the monitoring area.
Step 120 is executed to locate the identification area, where the identification area is divided into a security area, a guard area and a danger area according to the distance from the far to the near. Judging whether new equipment enters a wifi coverage area according to broadcast information of hotspots, if the new equipment is detected to enter a monitoring area, acquiring RSSI values of positions of moving targets relative to the hotspots, and tracking and positioning the moving targets through the RSSI, wherein the method for tracking and positioning the moving targets through the RSSI comprises the following steps:
1) After the mobile target enters the wifi coverage area, a mobile phone exists on the mobile target and the wifi switch is already turned on;
2) The mobile target mobile phone scans surrounding hot spot information, sends a request to surrounding hot spots, obtains an RSSI value of the position of the mobile target according to the request, and broadcasts response information; when the hot spot obtains the signal RSSI value of the position of the moving target relative to each hot spot according to the request, introducing a counting variable to record the number of times of reading the hot spot signal value of the moving target as N, wherein the initial value is 0, and calculating the received signal strength RSSI as signal when reading data each time, wherein the formula is that
signal=-10nlog(d)+A
Where n is the path loss index, d is the distance between the transceiving nodes, and a is a constant.
The calculation formula of the path loss index n is as follows
Where λ is the wavelength of the wireless signal.
3) Combining the RSSI value with the relocated hot spot coordinates, and carrying the value into an attenuation formula to obtain the linear distance between the moving target and each hot spot; the calculation formula of the straight line distance between the moving target and each hot spot is as follows
4) And obtaining the position information of the moving target according to a least square method algorithm, and calculating the position of the moving target by continuously collecting WiFi information of a signal receiving end.
If the fact that new equipment enters the monitoring area cannot be detected, whether a moving target enters the monitoring area is judged through the similarity between the received wifi information and the wifi reference information, if yes, the moving target is positioned through the migrated model, and if not, the fact that the moving target does not exist in the monitoring area is indicated. The method for judging whether the moving target enters the monitoring area through wifi information is to continuously collect information of a signal receiving end, compare the information with reference information collected in a preparation stage, calculate similarity of two pieces of information through a time sequence distance measurement algorithm DTW, align the two pieces of time sequence information, iteratively find the most similar pieces to align, and calculate similarity of the two pieces of time sequence information. After the positioning is started, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, namely no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, namely the moving target.
Step 130 is executed to perform different feedback when the located moving object is in different areas, including the following:
1) When the moving target is in the dangerous area, a warning is broadcast, and security personnel are notified and guided to drive away the moving target;
2) When the moving target is in the warning zone, a warning is broadcast to the moving target;
3) When the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, continuously collecting data to carry out the next round of judgment.
Example two
For the implementation scheme of the electronic fence, the core theme is as follows:
the current common security technology can not meet the illegal approaching sensing requirement of radioactive articles in the transportation process, and the reason is that: 1) For three stages of illegal approaching, because the distances are different, the risk levels are different, and meanwhile, because the video information in the nuclear security system is sensitive and the identification accuracy of the WIFI is gradually accurate, the introduction of the risk perception based on the WIFI is necessary; 2) It is difficult to directly establish an effective model between the behavior characteristics and the dangers of the person to efficiently predict the behavior of the person to belong to the dangerous behavior. Therefore, the invention aims to solve the two problems, realizes the efficient positioning and identification of the illegal approach of the radioactive substance transportation link, and carries out quick response according to the dangerous grade.
The technical scheme comprises the following implementation processes:
step 1 sets up the monitoring area
After the system is started, a user starts to set a monitoring area range according to the area environment where the radioactive substance is located, and the range suggestion is located between a hot spot and a signal receiving end so as to collect wifi data in the area. The area is divided into three parts, namely a safe area of a far-distance area compared with the radioactive substance, a warning area of a distance area compared with the radioactive substance and a dangerous area of a near-distance area. The system sets up the electronic fence about these three regions, fixes a position the moving target in the region through the control to wifi spectral information to guarantee that radioactive substance can initiatively discern dangerous, and carry out the interaction assurance safety with the security personnel.
Step 2 start system and positioning preparation work
After an area is set in the system, the system is started, and the following tasks are executed after the system is started: 1) Guiding a user to collect wifi data of local positions in the area to optimize the model; 2) The system collects wifi data of the signal receiver to reposition the position of the signal receiver so as to facilitate follow-up tracking of the moving target; 3) Collecting reference information: and collecting wifi data in the monitoring area, wherein the data needs to ensure that no moving target exists in the area so as to facilitate the comparison of the follow-up models. For task one, a user needs to collect a small amount of wifi data as input by using the signal receiver as a moving target in a monitoring area so as to finely adjust the model, and therefore the model can achieve good positioning accuracy in different environments. After the electronic fence is set, the surrounding of the radioactive substance is divided, the accuracy of model positioning is higher as the size of the area is smaller, wifi data are collected by using a signal receiver based on the area division, the wifi data are input into the model according to the division sample of the area, for example, as shown in fig. 2, the positions of the three areas divided by the user are compared, the area where the center point is located is taken as a label to be input into the model together, and the model is subjected to fine adjustment through transfer learning. After the model is fine-tuned, the system repositions each signal receiver by collecting information from the signal receiver to facilitate building a position map information tracking the moving object in the display area.
Step 3 identification zone localization process
The identification area is divided into a safety area, a warning area and a dangerous area from far to near according to the distance. The distance division of the three regions may be modified by user definition.
After the system is started, whether new equipment enters a wifi coverage area is judged according to broadcast information of a hot spot, if the new equipment enters the area, a moving target enters a monitoring area, and if the new equipment does not enter the area, further judgment is carried out.
If the system can detect that a new device enters the monitoring area, the system can obtain RSSI values of the positions of the moving targets relative to the hot spots, and then the moving targets can be tracked and positioned by an RSSI method.
If the new equipment can not be detected to enter the area, namely the mobile target does not turn on the wifi switch, whether the mobile target enters the monitoring area is further judged through wifi information. The method is characterized in that the information of the signal receiving end is continuously collected and compared with the reference information collected in the preparation stage, the similarity of two pieces of information is calculated through a time sequence distance measurement algorithm DTW, the algorithm can align the two pieces of time sequence information, the most similar pieces of the two pieces of time sequence information are iteratively found out to be aligned, and then the similarity of the time sequence information at the two ends is calculated, so that the algorithm can effectively avoid the classification of similar sequences into different sequences due to inaccurate alignment, and the robustness of the system is improved. Based on the algorithm, a similarity threshold is set, the setting of which will be described later. Comparing the continuously collected information with a threshold value after similarity is calculated between the continuously collected information and the reference information, and if the continuously collected information and the reference information are dissimilar, namely a moving target exists in the area, positioning the moving target through a model algorithm; if the two are similar, i.e. there is no moving object in the area, the system continues to collect the signal receiver information.
After the moving target can be positioned, different feedback processes are performed on the area where the moving target is positioned. If the moving target is in a safe area, the moving target is far away from the radioactive substance, has low threat to the radioactive substance and is silent; if the moving target enters the warning area, the system needs to broadcast warning information on the moving target in real time, continuously positions the moving target to draw a moving path, judges the moving direction of the moving target through the moving path, and if the moving target is continuously close to the radioactive substance in the area, further warns security personnel to guide and drive the radioactive substance; if the moving target enters the dangerous area, the system not only needs to continuously calculate and draw the position of the moving target, but also should warn and guide security personnel to expel the moving target
Step 4 identification area positioning method
In order to ensure the accuracy and the universality of identification, the invention divides the induction of the identification area into two parts, and the two parts cooperate to carry out identification positioning.
The first part is located by RSSI. Firstly, after a mobile object enters a wifi coverage area, a mobile phone exists on the mobile object, and a wifi switch is already opened. This assumption accords with the wifi positioning schemes which are currently common, and the positioning performance of the positioning schemes is excellent due to the abundant research results of the schemes. The system is similar to the connection process of the STA and the AP in the 802.11 protocol, firstly, the STA scans, in the scanning stage of the STA, the STA sends request information to the AP, the AP broadcasts response information after receiving the request information, the connection state information of the AP and the STA equipment exists in a management frame of the response information message, and the connection state information contains the RSSI value of the AP where the STA equipment is located. In the system, the mobile phone of the mobile target can be considered to scan surrounding hot spot information, a request is sent to surrounding hot spots, the hot spot obtains an RSSI signal value of the position of the mobile target according to the request, and the response information is broadcasted, in the process, the system can obtain the RSSI value, and the obtaining method comprises, but is not limited to, capturing packets of the broadcast information, setting a hot spot router to obtain the broadcast information in a monitoring mode, and the like.
After the system obtains the RSSI value, the straight line distance between the moving target and each hot spot can be obtained by substituting the value into the attenuation formula by combining the hot spot coordinates after repositioning. And obtaining the position information of the moving target according to a least square method algorithm. The position of the moving target is calculated by continuously collecting WiFi information of the signal receiving end, so that the purpose of drawing the moving path of the moving target in real time can be achieved.
The second part is to locate by a deep-learned fingerprint algorithm. The model diagram is shown in fig. 3, a feature extractor for a positioning task is trained in a pre-selection connection stage, noise environments which are easy to collect data in indoor environments and the like can be selected for collection by data in the pre-training stage, so that the collected data can be trained easily, the collected data is used as input, feature extraction is performed after normalization processing, and region labels for the current data collection environment are output. The feature extractor trained in the pre-training stage is migrated to a target domain, namely an environment field of system application as known knowledge to be positioned, specifically, the weight and deviation of each layer of the feature extractor are frozen, two hidden layers are added in migration learning of the target domain, and all layers of the feature extractor are finely tuned through a Nanonet layer to learn small-area knowledge based on a source domain.
Nanone is a specific neural network layer that acts as a reconstruction input in transfer learning. In the transfer learning, the labeled data of the source domain is used to train a neural network model, and unlabeled data of the target domain is then reconstructed by nanonet. The goal of nanonet is to improve the accuracy of the target domain by narrowing the difference between the source domain and the target domain. By mapping the features of the source domain to the target domain, the nanonet can learn and reconstruct the feature representation of the target domain, making the prediction result on the target domain more accurate.
The identification area is divided into a safety area, a warning area and a dangerous area from far to near according to the distance. The distance division of the three areas can be modified by user definition, and the division mode is shown in fig. 4. The control end of the device in the figure is used to process the data collected by the signal receiving end and is placed adjacent to the radioactive material for convenience of presentation. In order to ensure the effectiveness of identification, three areas need to be arranged in the area of the signal receiving end as far as possible, and the feasibility of the scheme is not influenced by limiting the areas in the signal receiving end in consideration of the fact that wifi has a far propagation distance in outdoor positioning.
Example III
As shown in fig. 5, after the system is started, the area setting of the electronic fence is first performed. The user sets the position of the electronic fence in the hot spot and the signal receiving end area according to the system guide so as to divide three areas, wherein the areas are a safety area, a warning area and a danger area from far to near; and then, the user collects WiFi data input models at a small number of positions in the environment according to system guide, and the models are finely adjusted according to the WiFi data input models so as to improve the positioning accuracy in a specific scene. And then the system performs repositioning of the signal receiver and collects the empty information without the moving target in the wifi coverage area as reference information. The above is the preparation work before positioning. After that, the system continuously collects information of the signal receiving end, continuously acquires broadcasting information of the hot spot to check whether a new STA device enters a monitoring area, and if the STA device enters the monitoring area, it means that a moving target is to be located.
As shown in fig. 6, when the system confirms that a new STA device enters a wifi monitoring area, the system responds to the broadcast information of the connection request through the connection request information of the mobile phone and the hot spot aiming at the moving target, further reads the signal RSSI value of the position of the moving target relative to each hot spot, and simultaneously introduces a counting variable to record the number of times of reading the hot spot signal value of the moving target as N, the initial value as 0, and n+1 is used for reading data each time, so that the system is convenient to obtain the coordinates of the moving target. By signal attenuation formula
signal=-10nlog(d)+A
Where signal is the received signal strength, n is the path loss index, d is the distance, and a is a constant. The path loss index n is an index reflecting the propagation loss of the signal, and is typically between 2 and 4. The constant a is the value of the received radio signal strength at the receiving node 1m from the transceiving node, and is a parameter related to the source and the receiver, typically between 0 and-30 dBm.
The values of n and A can be determined by:
n in the formula can be determined by the above formula, wherein d is the distance between the receiving and transmitting nodes, λ is the wavelength of the wireless signal, so n can be conveniently calculated, the RSSI value at a distance of 1m from the hot spot is measured, and based on the known quantity substitution formula, a can be reversely solved to obtain the relation between the unknown quantity d and the known quantity RSSI value:
based on the above formula, the system can obtain the linear distance between the moving target and each hot spot through calculation, so that the optimal solution is iterated through a least square algorithm to obtain more accurate positioning coordinates, the positioning coordinates are drawn on a coordinate graph, and the moving track of the moving target is obtained through continuously drawing the coordinates of the moving target, so that the moving direction formed by the two latest moments of the moving track can be obtained. The area is divided from far to near, but the response priority of the system is in the direction of decreasing the priority from near to far, so after the coordinates are positioned, whether the position of the moving target is in a dangerous area is firstly judged, if the position of the moving target is in the dangerous area, warning words are broadcasted to the moving target, and security personnel are guided to drive away; if the warning sign is not in the dangerous area, judging whether the warning sign is in the warning area, broadcasting a warning sign to the moving target if the warning sign is in the warning area, further judging whether the moving mode of the warning sign is towards the dangerous area, if so, informing security personnel to perform persuasion, and if not, performing no action; if the moving target is in the safe area, the moving track is continuously focused.
After the system is started, data of a target domain is collected through the regional division to perform migration learning, a trimmed model is used for positioning, and the positioning flow is shown in fig. 7; the method comprises the steps that a hot spot is used as a signal transmitting end to be broadcasted, a signal receiver returns collected data to an equipment control end after receiving the signal broadcasted by the hot spot, the equipment control end runs a model, the equipment control end takes the collected data as input after filtering and other processing, the model outputs a label of an area where current data is located based on the input, the label is compared with an electronic fence set by a user, and the equipment control end outputs the area where a moving target is located. Firstly, judging whether the moving target is in a dangerous area, if so, broadcasting a warning, and informing and guiding security personnel to drive away the moving target; if the moving target is in the warning area, a warning is broadcast to the moving target; if the moving target is not in the dangerous area or the guard area, namely the moving target is in the safe area, the system returns to continuously collect data to carry out the judgment of the next round.
As shown in fig. 8, in the model-based positioning method, since it is not possible to intuitively determine whether or not a moving target exists in the monitoring area, it is necessary to perform a comparative determination instead. After the system is started, the system samples wifi data of a detection area without a moving target, takes the wifi data as reference data to generate a time sequence diagram, judges whether the moving target exists in the area each time after the system starts to use model positioning, compares the moving target with the data, adopts a DTW algorithm with good effect for comparison, and can align two time sequences according to an optimal path by dynamically regulating the two time sequences and calculate a distance measurement value between the two time sequences. The metric value can be calculated directly using euclidean distance. In consideration of that the specific scene should have different values when the similarity is calculated by comparing with the reference data, the specific scene needs an additional similarity threshold value of the calculation standard. After the system is started, not only is a datum data required to be acquired, but also a plurality of groups of wifi data of the monitoring area without the moving target are required to be acquired for additional times, the datum data and the additional data are subjected to DTW similarity measurement, and the average value is calculated to be used as a standard similarity threshold value. Based on the above, after positioning starts, wifi data obtained by sampling each time are compared with reference data, similarity measurement of the wifi data and the reference data is calculated, then the measurement is compared with a standard similarity threshold value, if the measurement is not higher than the threshold value, the monitoring area is regarded as having no activity, namely no moving target, and if the measurement is higher than the threshold value, the monitoring area is regarded as having activity, namely moving target.
The invention achieves the technical effects that:
1) Constructing an integrated sensing region
2) From the continuous tracking and monitoring of low, higher and high-level risks, dangerous invasion conditions to be generated can be predicted and controlled more accurately, and possible police conditions can be well mastered.
The foregoing description of the invention has been presented for purposes of illustration and description, but is not intended to be limiting. Any simple modification of the above embodiments according to the technical substance of the present invention still falls within the scope of the technical solution of the present invention. In this specification, each embodiment is mainly described in the specification as a difference from other embodiments, and the same or similar parts between the embodiments need to be referred to each other. For system embodiments, the description is relatively simple as it essentially corresponds to method embodiments, and reference should be made to the description of method embodiments for relevant points.