• Chinese Journal of Lasers
  • Vol. 46, Issue 10, 1006001 (2019)
Peichao Chen1、2, Citian You1、2, and Panfeng Ding3、*
Author Affiliations
  • 1College of Information Science and Engineering, Huaqiao University, Xiamen, Fujian 361021, China
  • 2Fujian Key Laboratory of Optical Beam Transmission and Transformation, Xiamen, Fujian 361021, China
  • 3College of Engineering, Huaqiao University, Quanzhou, Fujian 362021, China
  • show less
    DOI: 10.3788/CJL201946.1006001 Cite this Article Set citation alerts
    Peichao Chen, Citian You, Panfeng Ding. Pattern Recognition of Intrusion Events in Perimeter Defense Areas of Optical Fiber[J]. Chinese Journal of Lasers, 2019, 46(10): 1006001 Copy Citation Text show less
    SMS fiber structural diagram
    Fig. 1. SMS fiber structural diagram
    Structure of convolutional neural network
    Fig. 2. Structure of convolutional neural network
    Experimental diagrams of pattern recognition in perimeter defense area. (a) Knocking; (b) shaking; (c) winding; (d) raining
    Fig. 3. Experimental diagrams of pattern recognition in perimeter defense area. (a) Knocking; (b) shaking; (c) winding; (d) raining
    Normalized waveforms of four intrusion signals. (a) Knocking; (b) shaking; (c) winding; (d) raining
    Fig. 4. Normalized waveforms of four intrusion signals. (a) Knocking; (b) shaking; (c) winding; (d) raining
    STFT time-frequency diagrams of two kinds of window functions for processing four intrusion events.(a)(c)(e)(g) Time-frequency diagrams of knocking, shaking, winding, and raining signals after passing through the Hanning window;(b)(d)(f)(h) time-frequency diagrams of knocking, shaking, winding, and raining signals after passing through the Kaiser window
    Fig. 5. STFT time-frequency diagrams of two kinds of window functions for processing four intrusion events.(a)(c)(e)(g) Time-frequency diagrams of knocking, shaking, winding, and raining signals after passing through the Hanning window;(b)(d)(f)(h) time-frequency diagrams of knocking, shaking, winding, and raining signals after passing through the Kaiser window
    Binarization diagrams of disturbance signals at different resolutions. (a)(c)(e)(g) Time-frequency binarization diagrams of knocking, shaking, winding, and raining signals processed by Kaiser window with window length of 9600; (b)(d)(f)(h) time-frequency binarization diagrams of knocking, shaking, winding, and raining signals processed by Kaiser window with window length of 4800
    Fig. 6. Binarization diagrams of disturbance signals at different resolutions. (a)(c)(e)(g) Time-frequency binarization diagrams of knocking, shaking, winding, and raining signals processed by Kaiser window with window length of 9600; (b)(d)(f)(h) time-frequency binarization diagrams of knocking, shaking, winding, and raining signals processed by Kaiser window with window length of 4800
    Iteration loss diagram of three network models with Hanning window length of 4800
    Fig. 7. Iteration loss diagram of three network models with Hanning window length of 4800
    Recognition rates of Hanning window and Kaisei window with window lengths of 4800 and 9600, respectively
    Fig. 8. Recognition rates of Hanning window and Kaisei window with window lengths of 4800 and 9600, respectively
    Time domain diagrams of knocking signal with different Gaussian noise. (a) SNR is 40 dB; (b) SNR is 50 dB; (c) SNR is 60 dB; (d) SNR is 70 dB
    Fig. 9. Time domain diagrams of knocking signal with different Gaussian noise. (a) SNR is 40 dB; (b) SNR is 50 dB; (c) SNR is 60 dB; (d) SNR is 70 dB
    Recognition rates of intrusion signals with different SNR. (a) Knocking; (b) shaking; (c) winding; (d) raining
    Fig. 10. Recognition rates of intrusion signals with different SNR. (a) Knocking; (b) shaking; (c) winding; (d) raining
    Identification results with noise signal
    Fig. 11. Identification results with noise signal
    Application indexNetworkparameterAverage lossLoss afterstabilizationAveragerecognition rate /%Training time /s
    Inception-v2112641110.1720.0722594.87126.674
    Inception-v3247340480.2680.1470492.881158.717
    Resnet256437650.3430.1700390.7176.746
    Table 1. Parameters and test results of different network models
    Input data format parameterTraining sampleAveragerecognition rate /%Averagetraining time /sAveragerecognition time /s
    Time domain map102075.0000.4380.279
    Time-frequency diagram102093.6110.3130.185
    Table 2. Comparison of parameters of different input data formats
    ParameterSTFT+CNNMulti-characteristicEMDMulticore SVM
    ABCDADABAC
    Recognition rate /%93.8399.7995.9399.391.29070.999.78595
    Table 3. Identification results of artificial and non-human intrusion signals
    Peichao Chen, Citian You, Panfeng Ding. Pattern Recognition of Intrusion Events in Perimeter Defense Areas of Optical Fiber[J]. Chinese Journal of Lasers, 2019, 46(10): 1006001
    Download Citation