Skip to main content

Advertisement

Log in

Big Data Approach for Fire Prevention and Warning for Power Systems

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

In recent years, video monitoring equipment has covered almost all production aspects of the power system, realizing real-time recording of power system operation information. However, for the abnormal operation information appearing in the monitoring video, it can only be observed and identified by security personnel uninterruptedly at present, which consumes a lot of labor cost and has low reliability. To tackle the above problems, in this paper, based on the state-of-the-art object detection algorithm, a real-time analysis system for fire detection and early warning of power systems is built to monitor and warn of sudden fires by detecting whether flames or smoke appear in the surveillance video. Meanwhile, a deployable Web version and an IoT (Internet of Things) version suitable for industrialized scenarios are provided. Specifically, to address the problem of lack of data for fire warning in power systems, we construct a fire image dataset for power systems, containing 7634 fire images, to train an object detection model; To improve the convergence speed of the general target detection algorithm, we use genetic algorithm to optimize the super parameters in the model. Finally, 200 video clips containing flames, smoke, and confusing targets mixed with fire clouds, dark clouds, and red headlights are selected as the test set, and the experiments show that the accuracy and recall are 0.985, and the recognition speed is about 207 fps on an Nvidia RTX 3080 10GB GPU.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

Data Availability

The datasets generated during and/or analysed during the current study are not publicly available due to the authors do not have the permission, but are available from the corresponding author on reasonable request.

References

  1. Hatziargyriou, N., Milanovic, J., Rahmann, C., Ajjarapu, V., Canizares, C., Erlich, I., Hill, D., Hiskens, I., Kamwa, I., Pal, B., et al. (2020). Definition and classification of power system stability-revisited & extended. IEEE Transactions on Power Systems, 36(4), 3271–3281.

    Article  Google Scholar 

  2. Liu, L., Wang, D., Hou, K., Jia, H. J., & Li, S. Y. (2020). Region model and application of regional integrated energy system security analysis. Applied Energy, 260, 114268.

    Article  Google Scholar 

  3. Ali, M., Gryazina, E., Dymarsky, A., & Vorobev, P. (2021). Voltage feasibility boundaries for power system security assessment. Preprint retrieved from http://arxiv.org/abs/2103.00168

  4. Jiang, T., Zhang, R., Li, X., Chen, H., & Li, G. (2021). Integrated energy system security region: Concepts, methods, and implementations. Applied Energy, 283, 116124.

    Article  Google Scholar 

  5. Li, C., Liu, Y., et al. (2021). Online dynamic security assessment of wind integrated power system using sdae with svm ensemble boosting learner. International Journal of Electrical Power & Energy Systems, 125,

    Article  Google Scholar 

  6. Zhang, Y., Shi, X., Zhang, H., Cao, Y., & Terzija, V. (2022). Review on deep learning applications in frequency analysis and control of modern power system. International Journal of Electrical Power & Energy Systems, 136, 107744.

    Article  Google Scholar 

  7. Li, J., Wang, L., Lin, X., & Qu, S. (2020). Analysis of china’s energy security evaluation system: Based on the energy security data from 30 provinces from 2010 to 2016. Energy, 198, 117346.

    Article  Google Scholar 

  8. Qiu, M., Jia, Z., et al. (2007). Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology.

  9. Qiu, M., Ming, Z., et al. (2012). Three-phase time-aware energy minimization with dvfs and unrolling for chip multiprocessors. Journal of Systems Architecture, 58(10), 439–445.

    Article  Google Scholar 

  10. Qiu, M., Li, H., & Sha, E. (2009). Heterogeneous real-time embedded software optimization considering hardware platform. In Proceedings of the 2009 ACM symposium on Applied Computing (pp. 1637–1641).

  11. Tao, L., Golikov, S., et al. (2015). A reusable software component for integrated syntax and semantic validation for services computing. In IEEE Symposium on Service-Oriented System Engineering (pp. 127–132).

  12. Niu, J., Gao, Y., et al. (2012). Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC, 72(12), 1565–1575.

    Google Scholar 

  13. Qiu, M., Xue, C., Shao, Z., et al. (2006). Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In IEEE EUC Conference (pp. 25–34).

  14. Papageorgiou, C., & Poggio, T. (2000). A trainable system for object detection. International Journal of Computer Vision, 38(1), 15–33.

    Article  Google Scholar 

  15. Zou, Z., Shi, Z., Guo, Y., & Ye, J. (2019). Object detection in 20 years: A survey. Preprint retrieved from http://arxiv.org/abs/1905.05055

  16. Agrawal, D., Bernstein, P., Bertino, E., Davidson, S., Dayal, U., Franklin, M., Gehrke, J., Haas, L., Halevy, A., Han, J., et al. (2011). Challenges and opportunities with big data 2011-1.

  17. Davenport, T. H., Barth, P., & Bean, R. (2012). How big data is different?

  18. Sagiroglu, S., & Sinanc, D. (2013). Big data: A review. In 2013 International Conference on Collaboration Technologies and Systems (CTS) (pp. 42–47). IEEE.

  19. Bertasius, G., Torresani, L., & Shi, J. (2018). Object detection in video with spatiotemporal sampling networks. In Proceedings of the European Conference on Computer Vision (ECCV) (pp. 331–346).

  20. Kang, K., Ouyang, W., Li, H., & Wang, X. (2016). Object detection from video tubelets with convolutional neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 817–825).

  21. Zhai, Y., & Shah, M. (2006). Visual attention detection in video sequences using spatiotemporal cues. In Proceedings of the 14th ACM International Conference on Multimedia (pp. 815–824).

  22. Jocher, G., Stoken, A., Borovec, J., Changyu, L., Hogan, A., Diaconu, L., Ingham, F., Poznanski, J., Fang, J., Yu, L., et al. (2020). ultralytics/yolov5: v3. 1-bug fixes and performance improvements. Version v3 1.

  23. Hu, F., Lakdawala, S., et al. (2009). Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Transactions on Information Technology in Biomedicine, 13(4), 656–663.

    Article  Google Scholar 

  24. Li, J., Ming, Z., et al. (2011). Resource allocation robustness in multi-core embedded systems with inaccurate information. Journal of Systems Architecture, 57(9), 840–849.

    Article  Google Scholar 

  25. Qiu, H., Zheng, Q., et al. (2020). Deep residual learning-based enhanced JPEG compression in the internet of things. IEEE Transactions on Industrial Informatics, 17(3), 2124–2133.

    Google Scholar 

  26. Li, J., Qiu, M., et al. (2013). Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads. ACM Transactions on Embedded Computing Systems (TECS), 12(2), 1–22.

    Article  MathSciNet  Google Scholar 

  27. Qiu, M., Xue, C., et al. (2007). Energy minimization with soft real-time and dvs for uniprocessor and multiprocessor embedded systems. In IEEE DATE Conference (pp. 1–6).

  28. Qiu, M., Yang, L., et al. (2009). Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI, 18(3), 501–504.

    Google Scholar 

  29. Papageorgiou, C. P., Oren, M., & Poggio, T. (1998). A general framework for object detection. In Sixth International Conference on Computer Vision (IEEE Cat. No. 98CH36271) (pp. 555–562). IEEE.

  30. Zhao, Z. Q., Zheng, P., Xu, S. T., & Wu, X. (2019). Object detection with deep learning: A review. IEEE Transactions on Neural Networks and Learning Systems, 30(11), 3212–3232.

    Article  Google Scholar 

  31. Divvala, S. K., Hoiem, D., Hays, J. H., Efros, A. A., & Hebert, M. (2009). An empirical study of context in object detection. In 2009 IEEE Conference on computer vision and Pattern Recognition (pp. 1271–1278). IEEE.

  32. He, K., Gkioxari, G., Dollár, P., & Girshick, R. (2017). Mask r-cnn. In Proceedings of the IEEE International Conference on Computer Vision (pp. 2961–2969).

  33. Girshick, R. (2015). Fast r-cnn. In Proceedings of the IEEE international conference on computer vision (pp. 1440–1448).

  34. Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in Neural Information Processing Systems, 28.

  35. Szegedy, C., Toshev, A., & Erhan, D. (2013). Deep neural networks for object detection. Advances in Neural Information Processing Systems, 26.

  36. Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 779–788).

  37. Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C. Y., & Berg, A. C. (2016). Ssd: Single shot multibox detector. In European Conference on Computer Vision (pp. 21–37). Springer.

  38. Huang, J., Rathod, V., Sun, C., Zhu, M., Korattikara, A., Fathi, A., Fischer, I., Wojna, Z., Song, Y., Guadarrama, S., et al. (2017). Speed/accuracy trade-offs for modern convolutional object detectors. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 7310–7311).

  39. Everingham, M., Van Gool, L., Williams, C. K., Winn, J., & Zisserman, A. (2010). The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 88(2), 303–338.

    Article  Google Scholar 

  40. Felzenszwalb, P., McAllester, D., & Ramanan, D. (2008). A discriminatively trained, multiscale, deformable part model. In 2008 IEEE conference on computer vision and pattern recognition (pp. 1–8). IEEE.

  41. Redmon, J., & Farhadi, A. (2017). Yolo9000: Better, faster, stronger. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (pp. 7263–7271).

  42. Redmon, J., & Farhadi, A. (2018). Yolov3: An incremental improvement. Preprint retrieved from http://arxiv.org/abs/1804.02767

  43. Benjdira, B., Khursheed, T., Koubaa, A., Ammar, A., & Ouni, K. (2019). Car detection using unmanned aerial vehicles: Comparison between faster r-cnn and yolov3. In 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS) (pp. 1–6). IEEE.

  44. Li, M., Zhang, Z., Lei, L., Wang, X., & Guo, X. (2020). Agricultural greenhouses detection in high-resolution satellite images based on convolutional neural networks: Comparison of faster r-cnn, yolo v3 and ssd. Sensors, 20(17), 4938.

    Article  Google Scholar 

  45. Michalewicz, Z., & Schoenauer, M. (1996). Evolutionary algorithms for constrained parameter optimization problems. Evolutionary Computation, 4(1), 1–32.

    Article  Google Scholar 

  46. Mirjalili, S. (2019). Genetic algorithm. In Evolutionary Algorithms and Neural Networks (pp. 43–55). Springer.

  47. Katoch, S., Chauhan, S. S., & Kumar, V. (2021). A review on genetic algorithm: Past, present, and future. Multimedia Tools and Applications, 80(5), 8091–8126.

    Article  Google Scholar 

  48. Rezatofighi, H., Tsoi, N., Gwak, J., Sadeghian, A., Reid, I., & Savarese, S. (2019). Generalized intersection over union: A metric and a loss for bounding box regression. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (pp. 658–666).

Download references

Funding

No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

Li Zheng: Writing, Methodology, Supervision, Software. Xinxin Zhang: Writing, reviewing, Idea. Haolei Wan: Software, Draw figures, Data set.

Corresponding author

Correspondence to Li Zheng.

Ethics declarations

Ethics Approval

Not Applicable.

Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Big Data Security Track

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, L., Zhang, X. & Wang, H. Big Data Approach for Fire Prevention and Warning for Power Systems. J Sign Process Syst 95, 1391–1403 (2023). https://doi.org/10.1007/s11265-023-01857-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-023-01857-9

Keywords

Navigation