当前位置:网站首页>AI structured intelligent security video monitoring technology, supporting the protective umbrella of the reserve / wild animals
AI structured intelligent security video monitoring technology, supporting the protective umbrella of the reserve / wild animals
2022-06-24 16:21:00 【Tsingsee green rhino video】
One 、 Background analysis
4 month 23 Number , A Wild Amur tiger enters the village in Mishan city , Knocked down a villager , And hit a car , The incident of the Amur tiger entering the village by accident made the public realize the importance of continuously promoting the policy of wildlife protection , Relevant departments must strengthen the publicity of wildlife protection and residents' own protection , Improve the emergency plan .
In terms of the current domestic market , It is always difficult to protect and detect wild animals and plants , It is mainly because wild animals cover a wide range of fields 、 Large scope , And the distribution is large across regions , This has brought great difficulties to the protection of wild animals . In the past, the main method of wildlife protection was to install a large number of surveillance cameras in the areas where wild animals haunted , Through these monitoring devices, we can know the living habits of these animals 、 Reproductive characteristics 、 The kind of food 、 Equal important information , The most important thing is to monitor poachers , It provides important materials for the next step of formulating wildlife protection plan .
However, the previous security monitoring and protection area was large , Installing the camera has become a time-consuming and laborious work , And there is a risk of being damaged by animals or poachers . With AI After the rise of intelligence , Security monitoring 、AI The rapid development of intelligent technology , More and more industries hope to improve the convenience of security monitoring through artificial intelligence , The field of wildlife protection is also gradually penetrating .
Two 、 Solution deployment
This scheme is mainly divided into three modules :
1. Device end :
Surveillance cameras , Preferably with 4G\5G Or wireless networks , High definition infrared night vision function ; The surveillance camera is a high-speed spherical network camera and a fixed gun camera . The high-speed spherical network camera is placed in the center of the monitoring area , With voice intercom function , It has 20 Multiple optical zoom and cyclotron function , Easy to track and monitor on a large scale , Fixed cameras are arranged around the area , It monitors the selected direction , Stable and reliable performance . Both cameras can take clear pictures under low illumination conditions , Comply with dust and water proof standards , It can adapt to the climate and environment in the wild and dense forests .
2. Server side :
All equipment passes through RTSP/Onvif agreement 、GB/T28181 agreement 、RTMP agreement 、 The sea, SDK、Ehome And so on EasyCVR Intelligent video analysis platform , Application AI Intelligent analysis function and alarm function , Detect poachers or dangerous animals , Once detected, the alarm or alarm will be triggered , You can also shout from a distance , Frighten the attack of dangerous animals or poachers .
3. client :
The client can be either PC The end can also be a mobile end , Compatible with most client devices or applets on the market , Easy to watch anytime, anywhere 、 Query or receive alarm information .
3、 ... and 、 Program features
1. All weather protection : Guarantee HD webcam all day 24H The normal operation , Waterproof 、 Anticorrosive 、 Night vision 、 dustproof 、 Voice intercom and other functions ; 2. Wireless network transmission system : With wireless network connection 、4/5G The function of the network , Prevent unmanageable events caused by damaged network cables ; 3.AI Intelligent analysis :AI Intelligent picture analysis , It can not only play the role of safety monitoring , It can also analyze intelligently according to the pictures , Look around for dangerous people and things ; 4. Alarm message sending : The surveillance of poachers 、 Monitoring of wild animals, etc , Once a hazard or animal trail is found , The platform will send an alarm message , Be able to inform the management personnel in time ; 5. Voice talk : The monitoring equipment is equipped with voice intercom function, which can make real-time calls , Conduct voice intercom , It can drive away poachers 、 Dangerous animals ; 6. Flexible and scalable : It can be compatible with many types of monitoring devices , Provide secondary development interface , It can quickly expand functions .
Four 、 Realization function
1、 Species monitoring and identification
Data and collation for typical species , Realize the image 、 Automatic monitoring for capturing pictures , Accurately identify the species types in the picture 、 Number 、 Time of occurrence .
2、 Video monitoring management
Video monitoring management is based on EasyCVR The basic application of the real-time information integrated management platform , It is also the most intuitive display form of the surrounding environment , It can control video remotely 、 Real-time monitoring .
3、 Species monitoring data management
Establish a species monitoring data management system , Will pass through EasyCVR Real time collection of species types transmitted by the species monitoring and identification system 、 Number 、 Time of occurrence 、 Location information, etc , Carry out secondary editing and confirmation of data , To ensure its accuracy , In order to analyze the species population structure of the reserve 、 Quantitative changes provide data support .
边栏推荐
- Understanding of deep separable convolution, block convolution, extended convolution, transposed convolution (deconvolution)
- 企业安全攻击面分析工具
- 构建Go命令行程序工具链
- Enterprise security attack surface analysis tool
- 【Prometheus】2. Overview and deployment
- 存在安全隐患 部分冒险家混动版将召回
- Where is the most formal and safe account opening for speculation futures? How to open a futures account?
- 2021-04-28: force buckle 546, remove the box. Give some boxes of different colors
- 【附下载】汉化版Awvs安装与简单使用
- MySQL Innodb和Myisam
猜你喜欢

C. Three displays codeforces round 485 (Div. 2)

【云原生 | Kubernetes篇】Kubernetes基础入门(三)

ZOJ——4104 Sequence in the Pocket(思维问题)

Build go command line program tool chain
![[application recommendation] the hands-on experience and model selection suggestions of apifox & apipost in the recent fire](/img/dd/24df91a8a1cf1f1b9ac635abd6863a.png)
[application recommendation] the hands-on experience and model selection suggestions of apifox & apipost in the recent fire

一文详解JackSon配置信息

Implement Domain Driven Design - use ABP framework - domain logic & application logic

60 divine vs Code plug-ins!!

CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021
MySQL進階系列:鎖-InnoDB中鎖的情况
随机推荐
How does the effective date of SAP PP ECM affect the work order?
How FEA and FEM work together
MySQL進階系列:鎖-InnoDB中鎖的情况
Web page live broadcast on demand RTMP streaming platform easydss newly added virtual live broadcast support dash streaming function
MySQL Advanced Series: locks - locks in InnoDB
Is Guotai Junan Futures safe? How to open a futures account? How to reduce the futures commission?
Nature刊登量子计算重大进展:有史以来第一个量子集成电路实现
Pageadmin CMS solution for redundant attachments in website construction
【附下载】汉化版Awvs安装与简单使用
mysql时间戳格式转换日期格式字符串
Global and Chinese markets of stainless steel barbecue ovens 2022-2028: Research Report on technology, participants, trends, market size and share
A memory leak caused by timeout scheduling of context and goroutine implementation
MySQL date timestamp conversion
[go] concurrent programming channel
Percona Toolkit series - Pt deadlock logger
What is a framework?
【面试高频题】难度 3/5,可直接构造的序列 DP 题
Summer Challenge harmonyos - to do list with date effect
Some experiences of project K several operations in the global template
山金期货安全么?期货开户都是哪些流程?期货手续费怎么降低?