Font Size: a A A

The Research Of Perimeter Security Technology Based On TMS320DM6437

Posted on:2014-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:D ZhangFull Text:PDF
GTID:2248330398453642Subject:Agricultural Electrification and Automation
Abstract/Summary:PDF Full Text Request
With the development of social economy, the production and people’s life demand for securitysystem become more and more higer, how to solve the security problems in the key areas hasbecome an important issue, the traditional scheme has been unable to meet the demand of thesociety. At present, the security system based on video has using in the production and people’lifewidely, in the agricultural, industrial, transportation and other fields have many application,relyingon its good intuitive, depended on the being simple in upgrading, display directly and otheradvantages, it has a broad application prospect in the future.This scheme introduced the background and significance of the security system firstly,expounded the development status of perimeter security system and the main study in this writing.Summary the advantages and disadvantages of traditional perimeter security solution, reaserch theachievements and development direction of perimeter security system based on image processing,judged the function needing and requirements of perimeter security technology. Put forward thewhole design of video processing system, and explaned the working principle of theperimetersecurity system.In the core processor selection, according to the achieve target, and compared the videoprocessing chip’s performance in the market, combined the price and other factors, we selectedTMS320DM6437under Davinci series chip produced by TI(Texas Instruments).The system hardware resources mainly includes: DM6437-PI board, CCD camera, monitorand PC. DM6437-PI board mainly includes central processor DM6437, video capture module,external memory module, UART communication module, Ethernet communication module. CCDcamera carred on image collecting, monitor used in software testing, PC used for the clientdesigning.In software design, introduced the software development platform firstly, illustrate the stepsof CCS3.3and DVSDK. Used the VILB resources provided by TI In the process of video, Adoptedthe gray to the image, establish and maintenanced the background model using Gauss mixturemodel, Wipped off noise by Gauss Pyramid and mathematical morphology, extracted edge anddisplay the front target, design and optimized the algorithm.Finally, we designed the system client,data transmission based on the RTSP layer protocol under TCP/IP, video decoding and displayusing FFMPEG and Vc programming, in the PC machine can realized perform real-time monitoring, alarm, capture, video and other functions.This article concentrated the image, communication, computer real time system integrationand other high-tech, workied for the video codecing, establish model, wippe the noise, display thefront image, client designing and other aim. Achieved the digitization, networking, intelligentializeof perimeter protection, surmount the poor visibility, Complex wiring, Performance deficiency inthe tradition perimeter protection. The technology can prevent the illegal invasion and destructioneffectively, and find the problem directly when received a report on destruction, we can take stepsin the first time to the question. This scheme overcomes the shortcoming of traditional perimetersecurity technology, has the important theory significance and practical application value, it willbe applied more and more widely in the future.
Keywords/Search Tags:TMS320DM6437, Perimeter security, Gauss mixture model, RSTP, FFMPEG
PDF Full Text Request
Related items