This non-provisional application claims priority under 35 U.S.C. §119(a) on Patent Application No. 104122234 filed in Taiwan, R.O.C. on Jul. 8, 2015 the entire contents of which are hereby incorporated by reference.
The instant disclosure relates to a monitoring method, in particular to a region monitoring method.
The field of factory floor monitoring has been one of the earlier applications of security surveillance. Since factories often deal with a large number of staff and goods, and the equivalent property price is much higher than other businesses, most factories have taken early action to incorporate security monitoring systems. As monitoring systems continue to evolve, the level of monitoring capabilities for factory settings has also been raised.
For factories, most of the current monitoring systems utilize employee badges and image capturing devices to monitor the flow of personnel entering or exiting a complex. For example, the security staff in the control room can view the captured images to identify any suspected person, or rely on a scanner to verify employee badges.
However, the use of monitoring systems for inventories has been neglected. For example, current systems cannot tell if the stored goods are of the correct quantity, or if the correct type of goods is stored, etc. As the storage capacity and/or goods quantity increases, the standard for proper inventory management also increases.
Additionally, more improvements are needed in the area of personnel management. Some examples may be an employee using someone else's ID badge, employees trespassing into unauthorized areas, a non-factory related individual misusing an ID badge to gain entry illegally, etc. These issues are unaccounted for by existing monitoring systems.
To address the above issues, the instant disclosure provides a region monitoring method.
In one embodiment, the method comprises: utilizing an image capturing device to obtain an image frame of a monitored region; analyzing the image frame to generate the image information for at least one target subject; receiving at least one wireless signal from at least one wireless transmitter by at least one wireless receiver; and determining whether to issue a warning signal based on at least one ID code and the image information. The wireless signal includes the ID code, and for multiple wireless signals, each wireless signal includes a different ID code.
In one embodiment, the method includes utilizing a biometric identification process to monitor at least one target subject in the monitored region.
Based on the above, the monitoring method of the instant disclosure can utilize the image and biometric identification procedures to monitor at least one target subject in the monitoring region. When an unusual situation arises for the target subject, the server can issue a warning signal. Therefore, the security staff or management members can be notified quickly to enhance monitoring efficiency.
Please refer to
The monitoring system is capable of monitoring at least one target subject 50 in a monitored region, and the wireless transmitter 10 may be disposed on the target subject 50. The wireless transmitter 10 is communicable with the wireless receiver 20. The target subject 50 is monitored by electrically connecting the wireless receiver 20 and the image capturing device 30 to the server module 40. In some embodiments, the target subject 50 may be the personnel, a robot, an animal, goods, transport equipment, or other movable subject. The monitored region could be a factory entrance, an elevator entrance, a work area, etc.
The wireless transmitter 10 has a unique device ID, which can be carried by the transmitted signal. This way, the wireless signals provided by respective transmitters 10 can have different ID codes. Alternatively, an ID code can be assigned by a user to the wireless transmitter 10 to achieve the same effect. The identification code may include a media access control address (MAC address), the device ID of the wireless transmitter 10, or the unique identification code (UID) of the wireless transmitter 10.
Additionally, the wireless transmitter 10 and wireless receiver 20 may conform to the Bluetooth standard for signal transmission, preferably Bluetooth 4.0 or a higher standard.
The server module 40 may be a personal computer (PC), industrial-grade computer, a cloud server, or a medium having a processor and a storage unit. The server module 40 may be hardwired to the wireless receiver 20 and the image capturing device 30 by a USB or Ethernet cable. Wireless technology may also be utilized, such as Zigbee, Bluetooth, infrared, radio-frequency identification (RFID), Wifi, WiMax, 2G, 2.5G, 3G, 4G, etc.
Please refer to
Please refer to
The event server 43 may transmit the warning signal wirelessly to the mobile electronic device 60 operable by the security staff or management personnel, such that the party may be notified of the unusual situation.
The abovementioned wireless communication can be performed through Zigbee, Bluetooth, infrared, RFID, Wifi, WiMax, 2G, 2.5G, 3G, or 4G. The mobile electronic device 60 may be a cellular phone, laptop computer, desktop computer, or tablet computer. Various embodiments of the monitoring system and method of the instant disclosure are provided below.
The image capturing device 30 and the wireless receiver 20 may be disposed according to the storage area of these items, in particular to fixed locations in a warehouse. For example, the location may be a wall (as shown in
Thus, after the image capturing device 30 has obtained the image frame 51 (step S110), the image frame 51 is sent by the image capturing device 30 to the image identification server 42. The image identification server 42 analyzes the received image frame 51 to provide the image information of the items (step S120). Meanwhile, the wireless receiver 20 receives different wireless signals from different items (step S130), and transmits those wireless signals to the event server 43. Based on the ID code of each wireless signal and the image information of the items, the event server 43 determines whether to send out the warning signal (step S140).
In some embodiments, the image frame 51 shows the number of item images 511 such that the image identification server 42 can analyze the contour of those images 511 and calculate how many of those images 511 are present. In addition, the event server 43 calculates the number of different ID codes (step S 141), to determine the number of wireless transmitters 10. Next, the event server 43 compares the number of item images 511 and the number of ID codes to determine if they match with each other (step S142). If the numbers do not match, the event server 43 proceeds to issue the warning signal (step S143). On the other hand, if the numbers match, the event server 43 does not issue the warning signal. In some embodiments, regardless whether the numbers match or not, the event server 43 records the comparison result in the memory unit 41 (step S150), so the warehouse staff can manage the stored items conveniently.
In other words, if the wireless receiver 20 receives a signal originated outside of the monitored region, the scenario is indicating that an item is stored at the wrong location (i.e., the number of item images 511 does not match the number of ID codes). In that case, the event server 43 issues the warning signal (step S143), to the mobile electronic device 60 so as to inform the staff to move the item to the correct location. By relocating the misplaced item, the number of item images becomes the same as the number of ID codes. For some embodiments, the warning signal may include the image frame 51 of the monitored region obtained by the image capturing device 30, such that the management staff may be informed about the monitored region in real time.
In some embodiments, the wireless transmitter 10 may be fit with the employee badge, uniform, or other accessory worn by the employee. In addition, the wireless signal outputted by the wireless transmitter 10 may further include employee number, work area, title, or any other work identification information.
For some embodiments, the biometric identification process may include fingerprint identification, voiceprint identification, or palm print identification. Taking voiceprint identification as an example, step S144 involves utilizing a microphone 70 to obtain a voice signal of every employee (step S144a). Then, the microphone 70 follows by transmitting the voice signals to a voice recognition server 45. The voice recognition server 45 analyzes the received voice signals to generate a target voiceprint for each of the employees (step S144b). Additionally, for every ID code, the memory unit 41 stores a corresponding voiceprint template, and the event server 43 reads the voiceprint templates corresponding to the ID codes associated with the monitored region (step S144c). The event server 43 then compares each of the target voiceprints with the voiceprint templates to determine if there is a match (step S144d). When a target voiceprint matches one of the voiceprint templates, the event server 43 does not issue the warning signal. However, if any of the target voiceprints does not match with any voiceprint template, the event server 43 proceeds to issue the warning signal (step S143). Therefore, in addition to monitoring the number of employees in a working area, the monitoring system can also verify the identity of each employee via the biometric identification process.
For the instant embodiment, the microphone 70 may be a microphone of a cellular phone, computer, or headset, but is not limited thereto. The microphone 70 may be any other voice capturing device.
For some embodiments, regardless whether a target voiceprint matches any voiceprint template or not, the event server 43 records the comparison result in the memory unit 41 (step S150).
The event server 43 may also pick one target facial image and compare it with facial templates of all ID codes. When the target facial image matches any facial template, the event server 43 moves on to compare another target facial image with the facial templates, until all of the target facial images for the human-like images 512 have been compared. Alternatively, the event server 43 may select a facial template correspond to an ID code and compare it to all of the target facial images of the human-like images 512. When the selected facial template (corresponding to an ID code), matches any target facial image of a human-like image 512, the event server 43 moves on to select another facial template corresponding to another ID code and compare it to all of the target facial images of the human-like images 512, until the facial templates corresponding to all of the ID codes have been compared.
If each of the target facial images matches one facial template, the event server 43 does not send out the warning signal. However, if any target facial image does not match with a facial template, or any facial template does not match with a target facial image, the event server 43 sends out the warning signal (step S143).
In some embodiments, the target facial image may be an employee's front-view or side-view facial image. In step S146, when the event server 43 compares each target facial image with the facial templates, a similarity coefficient is generated based on the level of image likeness. In step S147, the event server 43 compares the similarity coefficient with an image threshold value to determine if any facial template matches a target facial image. If the similarity coefficient is substantially greater than or equal to the image threshold value, the relationship indicates a facial templates matches a target facial image. However, if the similarity coefficient is substantially less than the image threshold value, the relationship indicates none of the facial templates matches a target facial image. For example, if the image threshold value is 80%, when the similarity coefficient is substantially greater than or equal to 80%, the scenario indicates that a facial template matches a target facial image.
Alternatively, for some embodiments, the image frame 51 of the monitored region obtained by the image capturing device 30 may include at least one item image 511. The image identification server 42 analyzes the item image 511 to generate a target item image. Meanwhile, product templates of respective ID codes have been pre-stored in the memory unit 41. Based on the wireless signal, the event server 43 can read the product template corresponding to the particular ID code. Then, the event server 43 can compare each of the target item images to the item templates of all the ID codes to determine if there is a match. When each of the target item images matches one item template, the event server 43 does not send out the warning signal. However, when none of the target item images matches any product template, or none of the product templates matches any target item image, the event server 43 proceeds to send out the warning signal. In addition, based on the level of similarity between the target item image and the item template, the event server 43 may generate another similarity coefficient to determine if both images match with each other.
For some embodiments, regardless whether or not a facial template matches a target facial image, or a item template matches a target item image, the event server 43 records the comparison result in the memory unit 41 (step S150).
For some embodiments, when no match could be found between any facial template and a target facial image, the event server 43 may initiate a biometric identification process (step S144), before deciding whether to send out a warning signal. Please refer to
Please refer to
For instance, the closer is the test-pending facial image to the image capturing device 30, the bigger is the facial size. The closer is the wireless signal to the wireless receiver 20, the stronger is the signal strength. From the target facial images, the event server 43 may pick the one with largest facial size as the test-pending facial image. Similarly, from the wireless signals, the event server 43 may pick the one with strongest signal strength as the test-pending ID code. Therefore, the monitoring system may verify the identity of the person closest to the image capturing device 30. In some embodiments, the aforementioned signal strength may be the received signal strength indicator (RSSI).
If the test-pending facial image matches the facial template, the match indicates the person closest to the image capturing device 30 has passed image identification verification, and the event server 43 does not proceed to issue the warning signal.
However, if there is not match, the event server 43 responds by issuing the warning signal (step S143).
For some embodiments, if the test-pending facial image does not match with the facial template, the event server 43 initiates the biometric identification process (step S144), before deciding whether to send the warning signal.
In step S144d, the event server 43 can generate a voiceprint similarity coefficient when comparing the level of similarity between the test-pending target voiceprint and the test-pending voiceprint template. If the voiceprint similarity coefficient is substantially greater than or equal to a voiceprint threshold value, the scenario suggests the test-pending target voiceprint is the same as the test-pending voiceprint template. However, if the voiceprint similarity coefficient is substantially less than the voiceprint threshold value, the scenario is indicating the test-pending target voiceprint does not match with the test-pending voiceprint template.
Please refer to
Next, please refer to
The first, second, third, and fourth wireless signal have a first, second, third, and forth signal strength, respectively. In addition, the first, second, third, and fourth wireless signals all have a first ID code. Therefore, the event server 43 may compare the signal strengths between the first and third wireless signals and between the second and fourth signals, in order to determine the movement information of the wireless transmitter 10 corresponding to the first ID code.
If the first signal strength is greater than the third signal strength, and the second signal strength is less than the fourth signal strength, the scenario indicates the wireless transmitter 10 is moving from the first position to the second position. In other words, the wireless transmitter 10 is moving away from the first position and toward the second position. That is to say the employee is entering the main gate 80 (second direction B). For example, if the RSSI values for the first, third, second, and fourth signal strength are 8, 5, 2, and 9, respectively, the values indicate the employee is entering the main gate 80. However, if the first signal strength is less than the third signal strength, and the second signal strength is greater than the fourth signal strength, the scenario is indicating the wireless transmitter 10 is moving from the second position toward the first position. In other words, the wireless transmitter 10 is moving away from the second position and toward the first position. That is to say the employee is exiting the main gate 80 (first direction A). For example, if the RSSI values for the first, third, second, and fourth signal strengths are 5, 8, 9, and 2, respectively, the values indicate the employee is leaving the main gate 80. Moreover, if the first signal strength is the same as the third signal strength, and the second signal strength is the same as the fourth signal strength, the scenario is indicating the employee is staying in the work area.
Thus, for some embodiments, the event server 43 may record the movement information of the employee in the memory unit 41 (step S170). If one or more wireless transmitter 10 shows abnormality, the event server 43 may issue the warning signal that includes the movement information to the mobile device, in order to notify the management staff. For example, if the number of ID codes and the number of target images do not match, the target voiceprint and the voiceprint template do not match, the target facial image and the facial template do not match, the target item image and the item template do not match, or the test-pending facial image and the test-pending facial template do not match, the event server 43 will send out the warning signal. Thus, based on the warning signal, the management staff may be notified of the movement information of the wireless transmitter 10 showing unusual activity, such as entering or leaving the main gate 80 or staying in the work area.
Based on the above, the monitoring method of the instant disclosure utilizes the monitoring system to monitor at least one target subject in a monitored area, via the image and biometric identification process. If any target subject shows unusual activity, the server responds by sending the warning signal. Thus, the monitoring or management staff may be notified quickly to enhance monitoring efficiency.
While the instant disclosure has been described by way of example and in terms of the preferred embodiments, it is to be understood that the instant disclosure needs not be limited to the disclosed embodiments. For anyone skilled in the art, various modifications and improvements within the spirit of the instant disclosure are covered under the scope of the instant disclosure. The covered scope of the instant disclosure is based on the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
104122234 | Jul 2015 | TW | national |