Abstract
In recent years, video monitoring equipment has covered almost all production aspects of the power system, realizing real-time recording of power system operation information. However, for the abnormal operation information appearing in the monitoring video, it can only be observed and identified by security personnel uninterruptedly at present, which consumes a lot of labor cost and has low reliability. To tackle the above problems, in this paper, based on the state-of-the-art object detection algorithm, a real-time analysis system for fire detection and early warning of power systems is built to monitor and warn of sudden fires by detecting whether flames or smoke appear in the surveillance video. Meanwhile, a deployable Web version and an IoT (Internet of Things) version suitable for industrialized scenarios are provided. Specifically, to address the problem of lack of data for fire warning in power systems, we construct a fire image dataset for power systems, containing 7634 fire images, to train an object detection model; To improve the convergence speed of the general target detection algorithm, we use genetic algorithm to optimize the super parameters in the model. Finally, 200 video clips containing flames, smoke, and confusing targets mixed with fire clouds, dark clouds, and red headlights are selected as the test set, and the experiments show that the accuracy and recall are 0.985, and the recognition speed is about 207 fps on an Nvidia RTX 3080 10GB GPU.
Similar content being viewed by others
Data Availability
The datasets generated during and/or analysed during the current study are not publicly available due to the authors do not have the permission, but are available from the corresponding author on reasonable request.
References
Hatziargyriou, N., Milanovic, J., Rahmann, C., Ajjarapu, V., Canizares, C., Erlich, I., Hill, D., Hiskens, I., Kamwa, I., Pal, B., et al. (2020). Definition and classification of power system stability-revisited & extended. IEEE Transactions on Power Systems, 36(4), 3271–3281.
Liu, L., Wang, D., Hou, K., Jia, H. J., & Li, S. Y. (2020). Region model and application of regional integrated energy system security analysis. Applied Energy, 260, 114268.
Ali, M., Gryazina, E., Dymarsky, A., & Vorobev, P. (2021). Voltage feasibility boundaries for power system security assessment. Preprint retrieved from http://arxiv.org/abs/2103.00168
Jiang, T., Zhang, R., Li, X., Chen, H., & Li, G. (2021). Integrated energy system security region: Concepts, methods, and implementations. Applied Energy, 283, 116124.
Li, C., Liu, Y., et al. (2021). Online dynamic security assessment of wind integrated power system using sdae with svm ensemble boosting learner. International Journal of Electrical Power & Energy Systems, 125,
Zhang, Y., Shi, X., Zhang, H., Cao, Y., & Terzija, V. (2022). Review on deep learning applications in frequency analysis and control of modern power system. International Journal of Electrical Power & Energy Systems, 136, 107744.
Li, J., Wang, L., Lin, X., & Qu, S. (2020). Analysis of china’s energy security evaluation system: Based on the energy security data from 30 provinces from 2010 to 2016. Energy, 198, 117346.
Qiu, M., Jia, Z., et al. (2007). Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology.
Qiu, M., Ming, Z., et al. (2012). Three-phase time-aware energy minimization with dvfs and unrolling for chip multiprocessors. Journal of Systems Architecture, 58(10), 439–445.
Qiu, M., Li, H., & Sha, E. (2009). Heterogeneous real-time embedded software optimization considering hardware platform. In Proceedings of the 2009 ACM symposium on Applied Computing (pp. 1637–1641).
Tao, L., Golikov, S., et al. (2015). A reusable software component for integrated syntax and semantic validation for services computing. In IEEE Symposium on Service-Oriented System Engineering (pp. 127–132).
Niu, J., Gao, Y., et al. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565–1575.
Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In IEEE EUC Conference (pp. 25–34).
Papageorgiou, C., & Poggio, T. (2000). A trainable system for object detection. International Journal of Computer Vision, 38(1), 15–33.
Zou, Z., Shi, Z., Guo, Y., & Ye, J. (2019). Object detection in 20 years: A survey. Preprint retrieved from http://arxiv.org/abs/1905.05055
Agrawal, D., Bernstein, P., Bertino, E., Davidson, S., Dayal, U., Franklin, M., Gehrke, J., Haas, L., Halevy, A., Han, J., et al. (2011). Challenges and opportunities with big data 2011-1.
Davenport, T. H., Barth, P., & Bean, R. (2012). How big data is different?
Sagiroglu, S., & Sinanc, D. (2013). Big data: A review. In 2013 International Conference on Collaboration Technologies and Systems (CTS) (pp. 42–47). IEEE.
Bertasius, G., Torresani, L., & Shi, J. (2018). Object detection in video with spatiotemporal sampling networks. In Proceedings of the European Conference on Computer Vision (ECCV) (pp. 331–346).
Kang, K., Ouyang, W., Li, H., & Wang, X. (2016). Object detection from video tubelets with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 817–825).
Zhai, Y., & Shah, M. (2006). Visual attention detection in video sequences using spatiotemporal cues. In Proceedings of the 14th ACM International Conference on Multimedia (pp. 815–824).
Jocher, G., Stoken, A., Borovec, J., Changyu, L., Hogan, A., Diaconu, L., Ingham, F., Poznanski, J., Fang, J., Yu, L., et al. (2020). ultralytics/yolov5: v3. 1-bug fixes and performance improvements. Version v3 1.
Hu, F., Lakdawala, S., et al. (2009). Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Transactions on Information Technology in Biomedicine, 13(4), 656–663.
Li, J., Ming, Z., et al. (2011). Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture, 57(9), 840–849.
Qiu, H., Zheng, Q., et al. (2020). Deep residual learning-based enhanced JPEG compression in the internet of things. IEEE Transactions on Industrial Informatics, 17(3), 2124–2133.
Li, J., Qiu, M., et al. (2013). Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads. ACM Transactions on Embedded Computing Systems (TECS), 12(2), 1–22.
Qiu, M., Xue, C., et al. (2007). Energy minimization with soft real-time and dvs for uniprocessor and multiprocessor embedded systems. In IEEE DATE Conference (pp. 1–6).
Qiu, M., Yang, L., et al. (2009). Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI, 18(3), 501–504.
Papageorgiou, C. P., Oren, M., & Poggio, T. (1998). A general framework for object detection. In Sixth International Conference on Computer Vision (IEEE Cat. No. 98CH36271) (pp. 555–562). IEEE.
Zhao, Z. Q., Zheng, P., Xu, S. T., & Wu, X. (2019). Object detection with deep learning: A review. IEEE Transactions on Neural Networks and Learning Systems, 30(11), 3212–3232.
Divvala, S. K., Hoiem, D., Hays, J. H., Efros, A. A., & Hebert, M. (2009). An empirical study of context in object detection. In 2009 IEEE Conference on computer vision and Pattern Recognition (pp. 1271–1278). IEEE.
He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017). Mask r-cnn. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2961–2969).
Girshick, R. (2015). Fast r-cnn. In Proceedings of the IEEE international conference on computer vision (pp. 1440–1448).
Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in Neural Information Processing Systems, 28.
Szegedy, C., Toshev, A., & Erhan, D. (2013). Deep neural networks for object detection. Advances in Neural Information Processing Systems, 26.
Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 779–788).
Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C. Y., & Berg, A. C. (2016). Ssd: Single shot multibox detector. In European Conference on Computer Vision (pp. 21–37). Springer.
Huang, J., Rathod, V., Sun, C., Zhu, M., Korattikara, A., Fathi, A., Fischer, I., Wojna, Z., Song, Y., Guadarrama, S., et al. (2017). Speed/accuracy trade-offs for modern convolutional object detectors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 7310–7311).
Everingham, M., Van Gool, L., Williams, C. K., Winn, J., & Zisserman, A. (2010). The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 88(2), 303–338.
Felzenszwalb, P., McAllester, D., & Ramanan, D. (2008). A discriminatively trained, multiscale, deformable part model. In 2008 IEEE conference on computer vision and pattern recognition (pp. 1–8). IEEE.
Redmon, J., & Farhadi, A. (2017). Yolo9000: Better, faster, stronger. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 7263–7271).
Redmon, J., & Farhadi, A. (2018). Yolov3: An incremental improvement. Preprint retrieved from http://arxiv.org/abs/1804.02767
Benjdira, B., Khursheed, T., Koubaa, A., Ammar, A., & Ouni, K. (2019). Car detection using unmanned aerial vehicles: Comparison between faster r-cnn and yolov3. In 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS) (pp. 1–6). IEEE.
Li, M., Zhang, Z., Lei, L., Wang, X., & Guo, X. (2020). Agricultural greenhouses detection in high-resolution satellite images based on convolutional neural networks: Comparison of faster r-cnn, yolo v3 and ssd. Sensors, 20(17), 4938.
Michalewicz, Z., & Schoenauer, M. (1996). Evolutionary algorithms for constrained parameter optimization problems. Evolutionary Computation, 4(1), 1–32.
Mirjalili, S. (2019). Genetic algorithm. In Evolutionary Algorithms and Neural Networks (pp. 43–55). Springer.
Katoch, S., Chauhan, S. S., & Kumar, V. (2021). A review on genetic algorithm: Past, present, and future. Multimedia Tools and Applications, 80(5), 8091–8126.
Rezatofighi, H., Tsoi, N., Gwak, J., Sadeghian, A., Reid, I., & Savarese, S. (2019). Generalized intersection over union: A metric and a loss for bounding box regression. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 658–666).
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
Li Zheng: Writing, Methodology, Supervision, Software. Xinxin Zhang: Writing, reviewing, Idea. Haolei Wan: Software, Draw figures, Data set.
Corresponding author
Ethics declarations
Ethics Approval
Not Applicable.
Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection on Big Data Security Track
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zheng, L., Zhang, X. & Wang, H. Big Data Approach for Fire Prevention and Warning for Power Systems. J Sign Process Syst 95, 1391–1403 (2023). https://doi.org/10.1007/s11265-023-01857-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11265-023-01857-9