-
E-mail
249828795@qq.com
-
Phone
15291856570
-
Address
No. 11 Tangyan South Road, High tech Zone, Xi'an City, Yicui Garden, Metropolis 2-2-1708
Xi'an Chiyun Technology Co., Ltd
249828795@qq.com
15291856570
No. 11 Tangyan South Road, High tech Zone, Xi'an City, Yicui Garden, Metropolis 2-2-1708
Perimeter protection photoelectric radar warning
The main components of the unmanned monitoring front-end are;Radar, remote optoelectronic monitoring front-end (visible light, thermal imager, turntable)(AIS)Beidou, EdgeAIIntegrating analysis of industrial control computers, intelligent control boxesUPSComposition of power supply, etc.
By utilizing computer vision, deep learning, artificial intelligence, the Internet of Things, and other technologies, multiple front-end devices are empowered to form an automated collaborative work system; The system is fully automated, intelligent, and real-time to obtain the surrounding target situation, forming comprehensive control of key targets.
Flexible access: Information can be directly accessed to the monitoring center platform, various functional units, etc., to achieve information sharing. Achieve: unmanned information collection, intelligent information processing, automated perimeter control, and shared perception information.
Perimeter protection photoelectric radar warning
1) Using radar AIS、 Beidou (fishing vessels) automatically senses the position, heading, speed and other parameters of water surface targets within its coverage area, obtains real-time information on the target situation on the surrounding sea surface, and forms comprehensive control of key targets.
2) According to business requirements, electronic fences can be set up through radar to support alarm zones and lines, automatically warning and alerting water surface targets within the alarm zone and crossing the alarm lines.
3)ByAISSensors such as Beidou screen targets entering the alarm area and detect suspicious "three no ships".
4) Utilize the Radar Plotting (ARPA) feature. Automatically lock and track suspicious targets (1000 batches).
5) Store, record, and gather evidence of the trajectory of each suspicious target
6) Using AI technology to identify target types. Accurately identify the specific type of target, ship hull number and other information, and implement different disposal strategies for different warning information
7) Radar automatically guides electro-optical equipment to lock suspicious targets, track them automatically, capture images, and collect evidence through video recording
8) Automatic fusion of radar and AIS targets; Store and upload suspicious target information, radar tracks, AIS target information, etc., and upload them to the electronic chart situation information.