Font Size: a A A

Mobile Communication Network Based On Real-time Monitoring System

Posted on:2012-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:X F ZhangFull Text:PDF
GTID:2218330344450755Subject:Measuring and Testing Technology and Instruments
Abstract/Summary:PDF Full Text Request
Monitoring system in real life has been a large number of applications, schools, banks and other special departments and many public places are equipped with numerous surveillance cameras, security of these devices, data acquisition has played an important role. Their advantage is that the images in real time by controlling data collection and analysis staff of the Centre in order to achieve on-site monitoring.Traditional wired networks based video surveillance there is a clear disadvantage. These shortcomings include:limited distribution, monitoring site selection is generally close to the local wired access points, this approach limits the flexibility of distribution; distribution engineering capacity, need to lay cable and fiber; requires special duty personnel on-site analysis of data collected.With the continuous development of mobile communication technology, wireless video surveillance came into being, so that the video surveillance completely got rid of cable because of the limitations brought about. Can be expected, along with wireless video surveillance-related technology continues to progress, such as terminal technology, network technology, transmission technology, wireless video surveillance business will become the wireless network technology one of the most typical applications.This article analyzes the current commonly used target detection and tracking algorithm, and target tracking based on Kalman filter based on SIFT feature matching and tracking algorithm in the experiment. Target is lost, the data volume problem, a new region-based tracking algorithm between the before and after the Reform and realized. Furthermore, this article analyzes the basic principles of modern mobile communications and related technologies, and applied to the system control and data transfer module.
Keywords/Search Tags:Monitoring, intrusion detection, target tracking, wireless communication
PDF Full Text Request
Related items