Laboratory Intelligent Monitoring Operation and Maintenance Management System with Multisensor Technology

Recently, following the rapid development of information technology and computer technology, various universities have higher and higher requirements for themanagement eciency of their laboratories.erefore, this paper studies the laboratory operation and maintenance management system (LOMMS) based on video surveillance, focusing on the detection and tracking of moving targets in the laboratory, and detecting possible abnormal behaviors. Compared with the traditional manual operation and maintenance management laboratory, the eciency of LOMMS is signicantly improved. At the same time, LOMSS video surveillance ensures the normal operation of the laboratory and the safety of the laboratory. is paper designs the complete scheme of LOMSS comprehensively with the video surveillance technology and the multisensor technology. First of all, through the detailed demand analysis of the university laboratory related sta, teachers, and students, the research objectives of LOMSS based on video surveillance are determined through repeated investigation with them. Secondly, through the demand analysis results, combined with the characteristics of LOMSS based on video surveillance, the system function is generally designed. irdly, based on the top-down principle, the overall function of the designed system is dierentiated to obtain a more detailed functional map. At the same time, the database of LOMSS is designed to better store the data and other information in the system. e experimental results show that the temperature collected by the sensor is 10∼30°C, and the humidity is 35∼65%, which meets the environmental standards of the laboratory. is also shows that the test results of the sensor are normal, and also shows that the intelligent monitoring operation and maintenance management system (IMOMMS) of the laboratory meets the needs of the laboratory.


Introduction
With computer-related technologies and related facilities developed rapidly, university laboratories are also facing rapid adjustment. Traditional manual management loses the e cient characteristics of the laboratory monitoring, operation, and maintenance management system. Manual monitoring operations management laboratory system does not use advanced electronic equipment for e cient laboratory management, and when the laboratory abnormal behavior of the corresponding management system did not make abnormal judgment and corresponding response, which also makes the previous laboratory monitoring operations management system lose due value. An excellent and well-designed laboratory monitoring operation and maintenance management system will e ectively improve the scienti c research level of the whole university, so the role of designing an excellent laboratory monitoring operation and maintenance management system is self-evident. Although at present, the relevant laboratory operations management system is very diverse, but most of these software did not add relevant video monitoring function, which also makes the existing laboratory operations management system cannot adapt to the latest development trend, and the lack of video monitoring laboratory operations management system cannot maximize the safety of laboratory and students. At the present stage, many application systems are suitable for speci c schools, and many universities are not comprehensive enough, which cannot bring convenience to the university management laboratory, nor can it fully meet the actual needs of the laboratory. erefore, it is very necessary to design a LOMSS based on video monitoring.
In this paper, three different nuclear functions such as linear core, polynomial core, and Gaussian radial base core are used to train the monitoring operation and maintenance test experiment to determine the optimal nuclear function of laboratory monitoring operation and maintenance. Considering the results of three training tests, when the number of training samples is 180, the average correct identification rate of the monitoring operation and maintenance model is the highest, reaching 98. 61%. erefore, this study uses the linear kernel function as the kernel function of the SVM. e temperature collected by the sensor is 10∼30°C, and the humidity is 35∼65%, which is in line with the environmental standard of the laboratory, which also shows that the detection result of the sensor is normal. It also shows that the laboratory intelligent monitoring operation and maintenance management system meets the needs of the laboratory.

Related Work
As a result, many scholars have provided a lot of reference. Hesti aimed to understand the extent to which operational activities affect the water system in the Trinondo marsh irrigation area. Andrews and Fecarotti reported an approach for combining Petri networks and Bayesian networks to study the impact of design and maintenance functions on the performance of the O & M management system [1,2]. Ismail improved the traditional approach adopted in the Development and Facilities Management Maintenance Management System (MMS) of MIT [3]. aduri et al. emphasized the potential challenges, consequences, threats, vulnerabilities, and risk management of railway infrastructure data security in the context of electronic maintenance [4]. Ismail concentrated on building an integrated computerised maintenance management system to improve information storage for the design and construction, diagnosis, and defect risk assessment of IBS buildings through the Integrated Building Information Model (BIM) [5]. Guo et al. has established a remote operation system that greatly improves the operation level of charging piles. Recording the inspection results of operation and maintenance personnel can provide effective basis for performance assessment [6]. Alseiari and Farrell investigate the technical barriers to the successful implementation of full productive maintenance in the Abu Dhabi power industry [7]. Song et al. proposed a large equipment industry operation and maintenance (OM) management technology suitable for the wind power industry [8]. Mohanty et al. highlight different state monitoring tools and maintenance techniques to improve the reliability of ash pools [9]. Matveev and Matveeva have developed an autonomous three-channel digital recorder. e recorder is designed to meet the requirements of particularly harsh climatic conditions, minimum energy consumption, and easy maintenance [10]. e data used in these studies cannot be collected in real time, so multisensor technology can be used to collect real-time data. Regarding the multisensor technology, an all-fibre level sensor using a tandem multimode-single-mode-multimode (MSM) fibre structure is proposed and demonstrated by Sun et al. [11]. Zhang et al. studied a weighted fusion scheme for target tracking in underwater wireless sensor networks [12]. erefore, this paper combines multisensor technology and OMMS to design a sensor-based OMMS to meet the needs of the public.

Method
is research aims to realize the automation, remote, and intelligence of laboratory video surveillance system and equipment operation and maintenance management, use of Internet technology and multisensor technology, reduce the pressure of manual maintenance and management laboratory equipment and system, and improve the efficiency and level of maintenance and management [13,14].
is paper aims to realize the automation and intelligent operation and maintenance management (IOMM) of the laboratory video surveillance system, develop operational and associated hardware devices through software design. To test the operation status of the laboratory system equipment such as the camera, video signal, coding video equipment, video optical terminal machine, network switch, system management platform server in the system, intelligent analysis, detection and fault diagnosis of video quality, can realize real-time status monitoring, video inspection, equipment fault alarm, billing and settlement, fault query, fault statistics, and other operation supervision functions. e contents studied in this paper include the requirement analysis, the system overall design, the system detailed design, the software programming and implementation, the system deployment, and the practical operation testing [15].
Based on the current situation, construction mode, and operation mechanism, and taking it into account the future construction problems to reduce the cost of the system, that need to build a system operation and maintenance platform and ensure the normal operation of the system, the platform can effectively manage and monitor the main equipment, system, and link. e overall hardware structure of the system is shown in Figure 1.
According to the requirements of the system function analysis, the embedded front-end machine takes AVR Atmega128 as the core, detects the environmental data through the sensor, uploads it to the monitoring center, and saves the data to the flash, while the processed laboratory environment variable information is displayed on the LCD screen. If there is a warning, the corresponding LED indicator will be lit. e hardware structure of the laboratory intelligent monitoring system is mainly divided into the following parts: Embedded front-end machine control module mainly composed of AVR processor and its peripheral circuits (including memory connection circuit, LCD display circuit, serial port expansion circuit, and power supply circuit.).

Mobile Information Systems
Temperature sensor module: the temperature sensor DS18B20 of a single bus is directly connected to the port of the AVR.
Humidity sensor module: mainly put the wet sensitivity capacitor HS1101 in the TLC555 oscillation circuit.
Alcohol sensor module: the alcohol sensor and its peripheral test loop circuit. CO 2 module: the connection of the CO 2 sensor TGS4161 to the ADC. e laboratory intelligent monitoring system integrates temperature monitoring, humidity monitoring, carbon dioxide concentration monitoring, alcohol concentration monitoring, infrared alarm, and other multiple functions.
e system designs temperature monitoring, humidity monitoring, carbon dioxide concentration monitoring, alcohol concentration monitoring, infrared alarm, and other modules.
is research collects data through multiple sensors in the hardware system, then integrates the data collected by multiple sensors through multisensor technology, and feeds back the processed data to the software system at the same time.
e system software part consists of device detection server, image detection server, management server, database server, Web server, client, and third-party service (mobile phone SMS, e-mail service) interface module, as shown in Figure 2.
e IOMM platform adopts a hierarchical, modular, and SOA service-oriented (the service-oriented architecture can deploy, combine, and use loosely coupled coarse-grained application components in a distributed manner through the network according to requirements) software architecture, which is divided into four levels: Communication interface and service layer (as shown in Figure 3): through the unified interface adaptation service, it communicates with DVR equipment, bayonet equipment (future expansion), switch network management, optical terminal network management, video quality diagnosis system, obtain relevant status data, and write to the database.
Database layer (as shown in Figure 4): it uniformly stores relevant data information, including equipment information, engineering information, maintenance information, detection data, alarm data, department information, and personnel information; database design refers to the technology of database establishment and corresponding planning of each entity in the database, which is the core technology of laboratory monitoring, OMMS. Due to the relatively complex relationship between the entities in the database, in order to ensure the smooth procedures, great attention is needed to the database design, therefore. e arrangement and allocation of the entities in the database is a crucial step in the management and design of the laboratory monitoring, operation, and maintenance management system. Application service layer (as shown in Figure 5): it provides basic services for the system maintenance management and application of the upper client, including equipment information management, data display, data query, alarm display, alarm distribution, server management, work order management, and WEB services.
Client layer (as shown in Figure 6) is the system management maintenance and application interface interface, responsible for the information interaction between users and the system. e client includes B/S end, C/S end, and mobile phone short message service. e node information of the organization directory tree includes the number, name, parent node number, responsible person, telephone number, and other information. e data table design is shown in Table 1.
e video coding device information includes the IP address, communication port, name, number, number of video input ports, device type, brand, model, and video coding protocol. e database table design is shown in Table 2.
e video transmission channel information of the card slot is a subtable of the card slot information table, corresponding to the video transmission channel of a card slot of the optical terminal machine. e information includes serial number, video transmission channel number, and status. e data table design is shown in Table 3. e information of network switch equipment includes number, name, network module IP address, and port number. e data table design is shown in Table 4.
Network switch: the network port information table is a subtable of the network switch information table, including the number, name, network management module IP address, and port number. e data table design is shown in Table 5.
Abnormal behavior detection mainly analyzes and identifies the motion target in the video scene, according to the movement-related information obtained by the motion target detection and tracking; it gives corresponding early warning to the identified abnormal behavior. Abnormal behavior detection is a key step of video surveillance technology, and detecting the abnormal behavior in the video also completes the core purpose of video surveillance technology.  Figure 1: Overall topology.
is paper mainly realizes the detection of three abnormal behaviors, namely, target wandering, long time retention, and target transgression. e following three abnormal behaviors are analyzed in detail.
In the video surveillance system, if someone is found in the corridor outside the laboratory, there has been wandering action, which generally can not be regarded as normal behavior, easy to lead to criminal behavior. is is mainly because when a person has wandering behavior, he often reflects the inner anxiety and hesitation. It is generally closely related to crime which should be focused on monitoring, and general crime before need certain preparation. So, in this wandering, too long behavior is likely to be for time and conditions for crime. erefore, in the video surveillance technology of this paper, a person will wander in the same place for too long as an abnormal behavior performance, and the system will identify and give early warning. e video monitoring system determines the abnormal behavior of pedestrians wandering, which is generally based on the motion trajectory obtained by the motion target tracking. For the wandering abnormal behavior, because the wandering trajectory is mostly circular, it can be judged according to the movement trajectory. In conclusion, the test requires the following two steps to extract the trajectory of the target in the video and determine whether the behavior is according to the extracted trajectory. e movement trajectory was extracted: pedestrian wandering abnormal behavior detection start, first through a motion direction four tuple to define the trajectory, namely composed of four four direction, the four motion variables value range only 0 or 1, motion involves the direction is 1, otherwise 0. So up and bottom, left and right cannot appear at the same time, is mutually exclusive relationship.
Judgment wandering abnormal behavior: it uses the first step to determine the trajectory, to determine the direction of movement in the pedestrian trajectory. According to the change of the movement direction in the pedestrian movement trajectory, the analysis starts from the pedestrian entering the video surveillance area, and the number of times opposite to the movement direction is counted as Num. If the Num is greater than the set threshold, the pedestrian wandering behavior is detected.
In the video surveillance system, monitoring target into the prohibited area will be regarded as the target cross abnormal behavior, mainly because in the video surveillance system, an unauthorized person appearing in key areas (such as laboratory key equipment reserves and laboratory key data storage area.) is likely to cause serious damage to the laboratory. erefore, in general, if an unauthorized person appears in a key area and exceeds the specified time, the video surveillance system will use it as an abnormal behavior and make an early warning mark. Video surveillance system usually identifies the pedestrian abnormal behavior by tracking the motion trajectory obtained from the motion target.
e key to cross-border detection is to detect whether the target appears in the no-stop alert area. When the target enters the prohibited zone, it is considered as abnormal boundary behavior, and the target activity outside the prohibited zone is considered normal.
In a video surveillance system, if a person stays outside a lab for a long time, the system automatically treats the behavior as an abnormal behavior. It is mainly because in the video surveillance system. If a person stays in a place for too long, such as the door of the laboratory, reference room or key equipment room, he is likely to be doing improper unlocking or placing dangerous goods. erefore, in general, in a place for a long time retention behavior, the video surveillance system will be regarded as abnormal behavior and early warning.
For long retention behavior detection, the video surveillance system is generally through the motion speed of this information to determine, namely for long stranded this behavior, the motion speed keep zero or almost zero state, the system will judge the behavior for a  long time, so as to complete the long stranded abnormal behavior detection. Target long-time retention behavior detection is mainly achieved through motion and time thresholds. When the movement speed of the moving target is zero or close to zero, the timing starts. When the timing time is greater than the time threshold set by the   Mobile Information Systems system, the video monitoring system will judge the above behavior as the abnormal behavior of the target for a long time.
In the process of video surveillance, the camera is first used to collect the image sequence of the laboratory surveillance area and conduct the motion target detection and track of the collected video image sequence, so as to obtain the motion related information of the visual target, providing a large amount of information and clues for the subsequent abnormal behavior detection. Finally, based on the above information, the corresponding algorithm is designed to detect the abnormal behavior of the motion targets. If the abnormal behavior detection fails, no abnormal behavior occurs, indicating that the behavior in the video surveillance area is normal, and the video surveillance will continue. When the abnormal behavior is successfully detected, it indicates that the abnormal behavior has occurred, and the corresponding text annotation is made according to the detected abnormal behavior. At the same time, the corresponding early warning is given.
is paper uses the multisensor data fusion method of support vector machine (SVM).
Let the sample set (Ω Γ , Ξ Γ ), Γ � 1, . . . , Λ be a set of linear separable points, where Ω ∈ Ψ Σ and Σ are the dimensions of the sample space, and Ξ ∈ +1, −1 { } is the sample classification number, then the linear discriminant function and classification surface equation in the Σ -dimensional space: When satisfying formula (2), find the minimum value of the function (3).
By solving the optimization problem, the optimal classification function is obtained as follows: where sign () is thesymbol function, Ω Γ is the support vector, ζ & is the Ω Γ corresponding Lagrange coefficient, Ω is the sample to be tested, and Φ & is the classification threshold.
In the case, the sample set is linear inseparable, then a relaxation factor ∀ Γ ≥ 0 and penalty parameter τ are added, and then the minimum of the function (5) is obtained under the constraint of Equation (6).
Linear kernel function: Secondary kernel function: Term kernel function: where ι is the constant and Σ is the polynomial exponent. When ι � 0, Σ � 1, the kernel is a linear kernel. Radial basis core function: where |Ω − Ξ| is the distance between two vectors, the z is constant.
Multilayer perceptron kernel function: where the ∇, # are the scale and decay parameters. Several algorithms commonly used for motion object detection include frame difference method, background subtraction method, and background modeling.
Frame difference method: where @ is the threshold value, which ◇ @ (Ω, Ξ) is the image after the difference. Background subtraction: Background Modeling: Among them, ! is the mean and% is the variance. Background to initialize: Update the background image: where ε is the background update parameter, which is a constant that reflects the background update rate.

System Experimental Simulation and Result Analysis
Monitoring data of 72,126 and 180 sets were taken as training samples, where each control class selected 8,14 and 20 sets, and the remaining samples of 180,120,72 sets were used as test samples. e SVM laboratory monitoring operation and maintenance model were constructed for testing, and the results are shown in Figures 7-9.
According to the experimental results in Figures 7-9, when the training samples are 72, linear kernel and polynomial kernel have the highest average correct recognition rate of 96. 11%. When the training sample number is 180, linear kernel is adopted, the average correct recognition rate of monitoring operation and maintenance model is 98. 61%; and RBF kernel function is adopted, the average correct recognition rate of monitoring operation and maintenance model is 65. 27%. e acquisition of the laboratory temperature sensor and the humidity sensor is shown in Figure 10.    Figure 10 shows that the temperature collected by the sensor is 10∼30°C and the humidity is 35∼65%, which meets the environmental standards of the laboratory.
is also shows that the test results of the sensor are normal and indicates that the intelligent monitoring and operation management system of the laboratory meets the needs of the laboratory.

Conclusion
In order to manage the laboratory more conveniently, this paper designs a laboratory intelligent monitoring operation and maintenance management system through multisensor technology. e system includes two modules: hardware and software.
e hardware system is composed of AVR Atmega128 chip, multiple sensors, and it is composed of monitoring and other equipment, and the data collected by the sensor are fused through the multisensor data fusion method of SVM to complete the collection and monitoring of laboratory data. e software part is to process the data, and also in order to provide an operation and maintenance platform for the operation and maintenance personnel, the data collected by the sensor are finally analyzed experimentally, and the conclusion shows that the laboratory intelligent monitoring OMMS meets the needs of the laboratory. Although the design and implementation of the system are smooth, the construction of the system is not accomplished overnight, the investigation work is relatively  Mobile Information Systems smooth, and the thinking is relatively clear, but the compatibility problem in the development process accounts for a considerable part of the energy and time to realize, which is in line with thefFeatures of system development that integrates resources.

Data Availability
e data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest
e authors declare no conflicts of interest.