Font Size: a A A

Based On The Embedded Linux Security Monitoring Vision System Design And Implementation

Posted on:2019-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z X LuFull Text:PDF
GTID:2416330578473367Subject:Mechanical Manufacturing and Automation
Abstract/Summary:PDF Full Text Request
Along with the rapid development of electronic and network technology,security monitoring system applied to the software and hardware of the constantly updated,they are rich in function and good performance to brought greatly satisfy the demand of security monitoring system,so it makes us all safety protection.The security monitoring and control system of a class is basically by the electronics and computer technology,sensor technology,network communication technology of a few parts,several modern technology makes the better mutual combination and mutual support,it is now need to solve the problem.Based on the embedded technology and network technology,image wireless transmission technology and visual technology,the embedded operating system under development designed a remote wireless security monitoring system.The security monitoring system using JZ2440v3 development board as a basis for developing the research design,the camera is adopted to image acquisition.Firstly,the camera will be collected images compression,and then through the improved frame difference method for moving target detection,once the target is detected to start the alarm.Moreover,through WiFi wireless network card can realize video image data within a certain range wireless transmission,and through mjpg-streamer software on the video data stream to the client.The wireless network card supports a variety of encryption,it connected encryption is one of the most reliable,can prevent outsiders to enter into the system.Main work content is completed for the construction of the Linux operating system,including cross compile environment building,u-boot transplantation,the transplantation of the Linux kernel,the establishment of the root file system,camera,and configuration of the wireless network card driver;To build wireless network card working environment,install wpa_supplicant tools,install the DHCP,set the wireless WiFi network card to AP mode,and transplanted mjpg-streamer software;YUV images of collected data is converted to RGB data,using the weighted method does gray processing,median filtering to fuck.Construct a set of symmetric biorthogonal wavelet,put forward a new edge detection algorithm,makes the target edge detection is complete,not affected by noise;Between three frame difference method combined with the improved edge detection algorithm,on the basis of various morphological processing method,for three consecutive frames of cross processing transform to extract the target contour information,solved due to the background pixel value and prospect of roughly the same pixel values and moving target faster and mistakenly identified and residual problem;Testing the whole monitoring system,transplant the improved algorithm to the mjpg-streamer software can realize the function of image processing and installing madplay software call alarm music file to realize alarm function,and test system,verify the feasibility of remote monitoring and target detection.
Keywords/Search Tags:remote monitoring, image acquisition, wireless transmission, moving targets detection, interframe difference method
PDF Full Text Request
Related items