FIELD: security monitoring.
SUBSTANCE: invention relates to methods of security monitoring of the area and can be used in cases of application of two-beam passive infrared detection devices (hereinafter – DD) for signaling control of the road network. The method consists in deploying of three passive infrared DD on a three-way road fork; installing each of the three DD near one of the three diverging roads so that it crosses it with the optical axis of its detection zone (hereinafter – DZ); orientation of axes of all three DD clockwise or counterclockwise so that they overlap each other in pairs on the roads forming a triangle below the center of the triangular fork in the road; the setting for each of the three DD the minimum permissible distance to the road far from it, where a man and a car DZ of DD crosses only the road closest to it, and DZ of a car only crosses only a far road; the detection of the intruder and the determination of his/her movement side when crossing the DZ; provision of the registration of DD signals with system for the collection and processing of information (hereinafter – SCPI); setting the maximum accumulation time of SCPI signals from DD from the receipt of the first alarm, based on the minimum possible speed of a man on the road and the distance traveled by him/her between DZs of DD detection; applying the algorithm of recognizing the type of intruder according to the number of alarms received within a set maximum time of signals accumulation: one alarm - a pedestrian intruder (hereinafter – PI), two or three signals - intruder on the car (hereinafter – IC); the recognition of the direction of intruder's movement with the algorithm by the number of one or several DD that issued the alarm signal, and the specified movement side of the intruder relatively to the center of the three-way fork in the road. The method includes a preparatory stage with the deployment of DD on the developed scheme at the fork of the road and the main stage, which begins with the receipt of an alarm signal and ends with the formation of a conclusion about the type of detected violator: PI or IC and the direction of its movement.
EFFECT: technical result is recognition of the type of violator - PI or IC with a low probability of error.
1 cl, 6 dwg
Authors
Dates
2021-02-25—Published
2020-06-09—Filed