CN110826930A - Security task scheduling method, device, equipment and readable storage medium - Google Patents

Security task scheduling method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN110826930A
CN110826930A CN201911102022.8A CN201911102022A CN110826930A CN 110826930 A CN110826930 A CN 110826930A CN 201911102022 A CN201911102022 A CN 201911102022A CN 110826930 A CN110826930 A CN 110826930A
Authority
CN
China
Prior art keywords
scheduling
client
field data
security task
emergency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911102022.8A
Other languages
Chinese (zh)
Inventor
钟明轩
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201911102022.8A priority Critical patent/CN110826930A/en
Publication of CN110826930A publication Critical patent/CN110826930A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group

Abstract

The application discloses a security task scheduling method, a security task scheduling device, security task scheduling equipment and a readable storage medium. The method disclosed by the application comprises the following steps: receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information; analyzing the field data by using a neural network to obtain a scheduling strategy; and sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy. According to the method and the device, comprehensive field data can be obtained, the analysis efficiency and accuracy are improved to a certain extent, and therefore the time delay of security task scheduling is reduced. If an emergency happens, a scheduling strategy can be made at the highest speed, so that the processing of the emergency can be completed within the best processing time, and the efficiency of scheduling the security task is improved. Correspondingly, the security task scheduling device, the security task scheduling equipment and the readable storage medium disclosed by the application also have the technical effects.

Description

Security task scheduling method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a security task scheduling method, apparatus, device, and readable storage medium.
Background
When a major conference or a major meeting is held, the scheduling of security tasks around the conference or the meeting is particularly important. In the prior art, most on-site security personnel transmit the on-site situation to a command center in a single mode of telephone, short message, interphone and the like, and staff in the command center immediately make a scheduling scheme according to the on-site situation and then send the scheduling scheme to the on-site security personnel in a single mode of telephone, short message, interphone and the like. Therefore, in the prior art, the information collected by the command center is single, and the staff is required to make a scheduling scheme in real time according to the field situation, so that certain time delay is increased. In case of an emergency, the optimal processing time may be delayed.
Therefore, how to improve the efficiency of security task scheduling is a problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, an object of the present application is to provide a method, an apparatus, a device and a readable storage medium for scheduling a security task, so as to improve efficiency of scheduling the security task. The specific scheme is as follows:
in a first aspect, the present application provides a security task scheduling method, including:
receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information;
analyzing the field data by using a neural network to obtain a scheduling strategy;
and sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy.
Preferably, analyzing the field data by using a neural network to obtain a scheduling policy, including:
determining position information of field data;
and analyzing the field data and the position information by using a neural network to obtain a scheduling strategy containing the emergency route.
Preferably, before sending the scheduling policy to the client, the method further includes:
determining a scheduling range by taking the position information as a circle center and the circle center and a preset radius;
and inquiring the emergency resources in the scheduling range, and adding the emergency resources to the emergency route.
Preferably, the adding of the emergency resource to the emergency route and the sending of the scheduling policy to the client further comprise:
and determining the client in the scheduling range as the client with the receiving authority.
Preferably, after sending the scheduling policy to the client, the method further includes:
and adding all the clients in the scheduling range to the same group according to the group creation request sent by any client in the scheduling range.
Preferably, after sending the scheduling policy to the client, the method further includes:
and displaying the scheduling strategy on the client in an electronic map mode, wherein the electronic map is marked with position information, emergency routes, emergency resources, scheduling ranges and position information of each client in the scheduling ranges.
Preferably, after receiving the field data sent by the client, the method further includes:
and inquiring a scheduling strategy matched with the field data in a scheduling strategy library, and executing the step of sending the scheduling strategy to the client.
In a second aspect, the present application provides a security task scheduling apparatus, including:
the receiving module is used for receiving field data sent by the client, and the field data comprises: text information, voice information, and image information;
the analysis module is used for analyzing the field data by utilizing a neural network to obtain a scheduling strategy;
and the sending module is used for sending the scheduling strategy to the client so as to enable security personnel corresponding to the client to execute corresponding tasks according to the scheduling strategy.
In a third aspect, the present application provides a security task scheduling device, including:
a memory for storing a computer program;
and the processor is used for executing the computer program to realize the security task scheduling method disclosed in the foregoing.
In a fourth aspect, the present application provides a readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the security task scheduling method disclosed in the foregoing.
According to the scheme, the application provides a security task scheduling method, which comprises the following steps: receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information; analyzing the field data by using a neural network to obtain a scheduling strategy; and sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy.
Therefore, the field data received by the method comprises character information, voice information and image information, so that the information obtained by the command center is relatively comprehensive. And the information is analyzed and processed by the neural network, compared with a manual processing mode, the analysis efficiency and the accuracy can be improved to a certain extent, so that the delay of the security task scheduling can be reduced, and if an emergency dangerous situation occurs, a scheduling strategy can be made at the highest speed, so that the dangerous situation processing can be completed in the best processing opportunity, and the efficiency of the security task scheduling is improved.
Correspondingly, the security task scheduling device, the security task scheduling equipment and the readable storage medium have the technical effects.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a flow chart of a first security task scheduling method disclosed in the present application;
FIG. 2 is a flowchart of a second security task scheduling method disclosed in the present application;
FIG. 3 is a first security task scheduling scheme framework diagram disclosed herein;
FIG. 4 is a second security task scheduling scheme framework diagram as disclosed herein;
FIG. 5 is a schematic diagram of a decision model training and application disclosed herein;
FIG. 6 is a schematic diagram of a security task scheduling apparatus disclosed in the present application;
fig. 7 is a schematic diagram of a security task scheduling device disclosed in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, the information collected by a command center in the prior art is single, and a worker needs to make a scheduling scheme immediately according to the field situation, so that certain time delay is increased. In case of an emergency, the optimal processing time may be delayed. Therefore, the security task scheduling scheme is provided, and the efficiency of security task scheduling can be improved.
Referring to fig. 1, an embodiment of the present application discloses a first security task scheduling method, including:
s101, receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information;
s102, analyzing field data by using a neural network to obtain a scheduling strategy;
in one embodiment, analyzing the field data by using a neural network to obtain a scheduling policy, includes: determining position information of field data; and analyzing the field data and the position information by using a neural network to obtain a scheduling strategy containing the emergency route.
S103, sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy.
In a specific embodiment, before sending the scheduling policy to the client, the method further includes: determining a scheduling range by taking the position information as a circle center and the circle center and a preset radius; and inquiring the emergency resources in the scheduling range, and adding the emergency resources to the emergency route.
In one embodiment, adding the emergency resource to the emergency route and sending the scheduling policy to the client further comprises: and determining the client in the scheduling range as the client with the receiving authority.
In a specific embodiment, after sending the scheduling policy to the client, the method further includes:
and displaying the scheduling strategy on the client in an electronic map mode, wherein the electronic map is marked with position information, emergency routes, emergency resources, scheduling ranges and position information of each client in the scheduling ranges. The electronic map can also mark police force, vehicles, equipment, materials, high points, fire hydrants, cameras, road forbidding and other contents.
In this embodiment, after sending the scheduling policy to the client, the method further includes: and adding all the clients in the scheduling range to the same group according to the group creation request sent by any client in the scheduling range.
Therefore, the field data received by the embodiment of the application comprises the text information, the voice information and the image information, so that the information obtained by the command center is relatively comprehensive. And the information is analyzed and processed by the neural network, compared with a manual processing mode, the analysis efficiency and the accuracy can be improved to a certain extent, so that the delay of the security task scheduling can be reduced, and if an emergency dangerous situation occurs, a scheduling strategy can be made at the highest speed, so that the dangerous situation processing can be completed in the best processing opportunity, and the efficiency of the security task scheduling is improved.
Referring to fig. 2, an embodiment of the present application discloses a second security task scheduling method, including:
s201, receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information;
s202, inquiring a scheduling strategy matched with field data in a scheduling strategy library;
and S203, sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy.
In this embodiment, a scheduling policy base is preset in the device of the command center, so that after receiving the field data, a scheduling policy matched with the field data can be queried in the scheduling policy base, and thus the queried scheduling policy is sent to the client, and security personnel corresponding to the client can execute a corresponding task according to the scheduling policy.
It should be noted that other implementation steps in this embodiment are the same as or similar to those in the above embodiment, and therefore, the description of this embodiment is omitted here.
As can be seen from the above, the field data received by the embodiment includes text information, voice information and image information, so that the information obtained by the command center is relatively comprehensive. And the corresponding scheduling strategy is matched in real time according to the information without being established manually in real time, so that the scheduling delay of the security task can be reduced, and if an emergency happens, the scheduling strategy can be made at the highest speed, so that the processing of the emergency can be completed in the best processing time, and the scheduling efficiency of the security task is improved.
The following example can be implemented according to the method provided by this embodiment, and the security task scheduling scheme provided by this embodiment can be referred to fig. 3, and fig. 3 is a framework diagram of a first security task scheduling scheme provided by this embodiment. In fig. 3, security personnel each hold a client, and include field personnel, traffic control and peripheral police personnel. Field personnel: namely, commanders, security personnel, working personnel and volunteers who maintain the public security on site. Traffic assistance: namely, the police, the assistant police and the volunteers who maintain the traffic order around the activities and park the people and the vehicles. Peripheral police strength: namely, the police force for maintaining the safety guarantee of the periphery of the activity, patrolling, preventing and treating emergencies. The security command and dispatch platform is a command center. The client is installed on a mobile terminal (such as a mobile phone) of a security personnel in an AAP mode.
The APP is a Web front end, and the following tools are required in the development process of the APP: webpage layout and style, JavaScript scripting language, and Flash technology. The Style of the web page elements is controlled by CSS (Cascading Style Sheet). JavaScript is a web scripting language by which complex interactive effects, such as pull-down menus, form verification, animation effects, etc., can be achieved. The Flash technology can also realize various complex interaction effects, and the online playing of many video websites is realized by using the Flash technology.
The security command scheduling platform is a Web background and comprises a server and server software, wherein the server is a hardware host, the server software is software used for receiving a client request and processing return data, and when an application is developed and deployed on the server software to run, the application can monitor the request sent by the client and perform corresponding logic processing. The database is used for storing various data, when the server executes the program, the data in the database can be read and processed according to the requirement, and meanwhile, the operations of writing the data into the database and the like can be realized through executing the program.
The security command and dispatching platform can ensure the rapid and accurate command and dispatching of large-scale activities, provides plan making and displaying with luxuriant pictures and texts, and adopts a workflow technology to realize visual construction according to activity requirements. Wherein, the workflow refers to: the automation of parts or the whole of the business process in the environment of a computer application. The method is an abstract and general description of the workflow and the business rules among the operation steps of the workflow. The main problems mainly solved by the workflow are as follows: to achieve a business goal, documents, information, or tasks are automatically communicated between multiple participants using a computer according to some predetermined rule.
Referring to fig. 4, fig. 4 is a frame diagram of a second security task scheduling scheme provided in this embodiment.
The security command and dispatching platform comprises: the system comprises an information acquisition module, a decision-making module and a scheduling module. The information acquisition module acquires the field information fed back by the mobile terminal through the interface, so that the field condition can be monitored in real time. The real-time data are transmitted through a wireless base station, cable equipment and the like and are stored on a server corresponding to the security command and dispatching platform. The information acquisition module is connected with the decision-making module through a signal line. The decision module processes the character data, the image data and the voice information acquired by the information acquisition module, has the functions of early warning, emergency command scheduling, simulation deduction, analysis, study and judgment and the like, can judge the optimal scheme and outputs a corresponding result. The result is an electronic map, an emergency plan, etc. For the optimal processing scheme made by the decision module, the scheduling module supports visual alarm receiving and processing, alarm condition monitoring, alarm condition inquiry, district positioning, alarm condition situation analysis and emergency command scheduling management, and can also perform whole-network diffusion on decision information and send the decision information to the mobile terminal.
The information acquisition module comprises a map function module, a personnel real-time geographic position display function, a personnel peripheral emergency resource search function, a path planning function and the like. The map function module is developed based on Baidu map api for JavaScript. The real-time geographical position display function of the personnel can realize that the real-time position of the first-line emergency treatment personnel can be checked on the electronic map. The function realization process mainly comprises the step of periodically acquiring positioning information uploaded to a server by a mobile terminal held by an emergency treatment personnel from a background in real time through ajax. And the front end marks the terminal positioning information on the map layer after acquiring the terminal positioning information. The real-time tracking and displaying of the position of the personnel can be realized by continuously refreshing the positioning information transmitted from the background. Peripheral emergent resource search function of personnel can realize the search function of resource in the peripheral certain radius of the first-line emergency treatment personnel, and the search radius can self-defined setting, and the resource that can search includes: various resources such as a post, a public security bureau, a gas station, a hospital, a government department and the like are dispatched. After the search operation is executed, various resources within a certain radius range are synchronously displayed on the map. The path planning function may enable navigation from the location of the emergency personnel to the target destination and from the target origin to the location of the emergency personnel. According to the destination selected by the user, the platform automatically plans and selects an optimal path for the operation user, and carries out corresponding navigation information prompt according to the planned path, so that the efficiency of police dispatching is improved.
It should be noted that the decision module is internally provided with an analysis algorithm, and can also support the expansion of the analysis algorithm module. And various simulation calculation models are embedded, so that support is provided for more complex industrial application.
The decision-making module supports multi-dimensional parallel analysis and interactive linkage analysis. Multidimensional parallel analysis is as follows: the data information of a plurality of places is comprehensively analyzed and processed, data observation modes such as scrolling, drilling, slicing, rotating and the like can be provided, and the relation behind complex data is presented. Interactive linkage analysis namely: the rule of data back presented by the same data under different dimensions is displayed, and the user is helped to analyze the data from different angles, narrow the range of answers and display different influences of the data. For example: and displaying the data of the same place under different dimensions.
The decision module is internally provided with a neural network, and a decision model is established according to the neural network. Before the decision model is applied, the model is trained by the collected sample data, and when the model reaches a stable state, the model is applied to an actual system for decision reasoning. Please refer to fig. 5 for the training process of the decision model.
In a specific embodiment, the scheduling module further includes: the emergency management system comprises an emergency management module, a real-time personnel monitoring module, a temporary communication group module and the like. The emergency incident management module mainly has the following functions: the method comprises the following steps of marking address positioning and longitude and latitude positioning of emergency emergencies, automatically searching and displaying meteorological environment information around an incident point, inputting event related information, searching resources around the incident point and planning an optimal path. The real-time personnel monitoring module mainly has the following functions: the method comprises the steps of displaying geographic position information, identity information and a motion state of emergency treatment personnel in real time, searching peripheral resources of the personnel, planning a path, and viewing live audio and video live broadcast pictures of the personnel. The background commander can master real-time dynamics of front-line disposal personnel and a site in real time through the functional module. The function of the one-key frame selection temporary communication group establishing module is mainly to quickly establish a temporary communication group by frame selecting target persons on a map. After the target member frame selection is completed, the platform jumps to the instant messaging module and establishes a temporary communication group, and the commander can perform group communication with the group members.
When an emergency happens, an accident point is rapidly positioned on a map through the system platform, and event related information is input, so that the platform can automatically search information such as weather environment of surrounding areas according to positioning and present the information to commanders, and support is provided for the commanders to make scientific decisions. The commander can also search emergency resources around the accident point through the platform and check the optimal path for going to. Meanwhile, the commander can check real-time position information of emergency disposal personnel and live video live broadcast pictures through the platform, and supports instant communication with emergency disposal personnel at the same line. A temporary communication group can be established by selecting people with a key frame on the map, and the group communication function is carried out. The platform management function can divide different operation authorities according to different job grades of personnel, can also manage the operation to the data record of storage, manage emergency treatment personnel identity information, platform operation log, guarantee the scientificity and the reliability of commander dispatch work.
The interaction paths of (1) - (8) in fig. 4 are illustrated as follows:
route (1): the field personnel of the mobile terminal transmit the field condition to an information acquisition module of the command scheduling platform;
route (2): the traffic assistant of the mobile terminal transmits the traffic condition to an information acquisition module of the command and dispatch platform;
route (3): peripheral police force of the mobile terminal transmits the emergency to an information acquisition module of the command and dispatching platform;
route (4): an information acquisition module of the command scheduling platform transmits acquired and processed information to a decision module;
route (5): a decision module of the command scheduling platform transmits the made decision scheme to a scheduling module;
route (6): a dispatching module of the command dispatching platform transmits the police force dispatching scheme to the peripheral police force of the mobile terminal;
route (7): a dispatching module of the command dispatching platform transmits the electronic map to a traffic assistant of the mobile terminal;
route (8): and a scheduling module of the command scheduling platform transmits the real-time field arrangement to field personnel at the mobile terminal.
Specifically, the security task scheduling shown in fig. 4 can be implemented according to the following processes:
the mobile terminal sends information in real time: the field working personnel, the traffic police assistant, the surrounding police force and other multi-party personnel transmit the field activity condition, the traffic condition and the emergency condition to the information acquisition module of the command and dispatching platform in real time in the form of text data or image data through the mobile terminal.
The information acquisition module acquires and processes data: and the information acquisition module of the command and dispatch platform collects, analyzes and processes the collected situation data to form a field situation report and transmits the field situation report to the decision module of the command and dispatch platform.
The decision module makes a reference scenario: and the decision module of the command scheduling platform judges the optimal scheme according to the character data, the image data and the emergency situation processed by the information acquisition module, generates corresponding results such as an electronic map, an emergency scheme and the like, and sends the corresponding reference scheme to the scheduling module of the command scheduling platform for further processing.
The dispatching module adopts a diffusion processing scheme: and the scheduling module of the command scheduling platform performs whole-network diffusion on the optimal processing scheme made by the decision module, and timely sends the on-site real-time arrangement scheme, the well-planned electronic map and the police force maneuvering condition to on-site personnel, traffic polices and peripheral police force of the mobile terminal.
It can be seen that this embodiment effectively combines together security command dispatch platform and mobile terminal, and field personnel accessible APP uploads the condition of scene with the form of characters, picture, video, pronunciation, and APP can be with these data transmission to security command dispatch platform, has not only improved the comprehensiveness of the information of gathering, has avoided the flow of middle artifical input information moreover, has realized the synchronous link of scene with the commander, provides powerful help for analysis and decision-making. The emergency command dispatching work of the public security can be scientifically and efficiently carried out, and the dispatching actual combat requirement is met.
In the following, a security task scheduling device provided in an embodiment of the present application is introduced, and a security task scheduling device described below and a security task scheduling method described above may refer to each other.
Referring to fig. 6, an embodiment of the present application discloses a security task scheduling device, including:
the receiving module 601 is configured to receive field data sent by a client, where the field data includes: text information, voice information, and image information;
an analysis module 602, configured to analyze the field data by using a neural network to obtain a scheduling policy;
the sending module 603 is configured to send the scheduling policy to the client, so that a security worker corresponding to the client executes a corresponding task according to the scheduling policy.
In one embodiment, the analysis module is specifically configured to:
determining position information of field data;
and analyzing the field data and the position information by using a neural network to obtain a scheduling strategy containing the emergency route.
In a specific embodiment, the method further comprises the following steps:
the first determining module is used for determining a scheduling range by taking the position information as a circle center and taking the circle center and a preset radius;
and the first query module is used for querying the emergency resources in the scheduling range and adding the emergency resources to the emergency route.
In a specific embodiment, the method further comprises the following steps:
and the second determining module is used for determining the client in the scheduling range as the client with the receiving authority.
In a specific embodiment, the method further comprises the following steps:
and the creating module is used for adding all the clients in the scheduling range to the same group according to the group creating request sent by any client in the scheduling range.
In a specific embodiment, the method further comprises the following steps:
and the control display module is used for displaying the scheduling strategy on the client side in an electronic map mode, and position information, emergency routes, emergency resources, scheduling ranges and position information of each client side in the scheduling ranges are marked in the electronic map.
In a specific embodiment, the method further comprises the following steps:
and the second query module is used for querying the scheduling strategy matched with the field data in the scheduling strategy library and executing the step of sending the scheduling strategy to the client.
For more specific working processes of each module and unit in this embodiment, reference may be made to corresponding contents disclosed in the foregoing embodiments, and details are not described here again.
Therefore, the present embodiment provides a security task scheduling device, which can reduce the delay of security task scheduling, and if an emergency occurs, can make a scheduling policy at the fastest speed, so that the emergency processing can be completed within the best processing time, and the efficiency of security task scheduling is improved.
In the following, a security task scheduling device provided in an embodiment of the present application is introduced, and a security task scheduling device described below and a security task scheduling method and apparatus described above may refer to each other.
Referring to fig. 7, an embodiment of the present application discloses a security task scheduling device, including:
a memory 701 for storing a computer program;
a processor 702 for executing the computer program to implement the method disclosed in any of the embodiments above.
In the following, a readable storage medium provided in an embodiment of the present application is introduced, and a readable storage medium described below and a security task scheduling method, apparatus, and device described above may be referred to each other.
A readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the security task scheduling method disclosed in the foregoing embodiments. For the specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, which are not described herein again.
References in this application to "first," "second," "third," "fourth," etc., if any, are intended to distinguish between similar elements and not necessarily to describe a particular order or sequence. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises" and "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of readable storage medium known in the art.
The principle and the implementation of the present application are explained herein by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A security task scheduling method is characterized by comprising the following steps:
receiving field data sent by a client, wherein the field data comprises: text information, voice information, and image information;
analyzing the field data by using a neural network to obtain a scheduling strategy;
and sending the scheduling strategy to the client so that security personnel corresponding to the client execute corresponding tasks according to the scheduling strategy.
2. The security task scheduling method of claim 1, wherein the analyzing the field data by using a neural network to obtain a scheduling policy comprises:
determining location information of the field data;
analyzing the field data and the position information by using the neural network to obtain the dispatching strategy containing the emergency route.
3. The method according to claim 2, wherein before sending the scheduling policy to the client, the method further comprises:
determining a scheduling range by taking the position information as a circle center and the circle center and a preset radius;
and inquiring emergency resources in the scheduling range, and adding the emergency resources to the emergency route.
4. The security task scheduling method of claim 3, wherein the adding the emergency resource to the emergency route and the sending the scheduling policy to the client further comprise:
and determining the client in the scheduling range as the client with the receiving authority.
5. The method according to claim 3, wherein after sending the scheduling policy to the client, the method further comprises:
and adding all the clients in the scheduling range to the same group according to the group creation request sent by any client in the scheduling range.
6. The security task scheduling method according to claim 2 or 3, wherein after the sending the scheduling policy to the client, the method further comprises:
and displaying the scheduling strategy on the client in an electronic map mode, wherein the position information, the emergency route, the emergency resources, the scheduling range and the position information of each client in the scheduling range are marked in the electronic map.
7. The security task scheduling method according to claim 1, wherein after receiving the field data sent by the client, the method further comprises:
and inquiring a scheduling strategy matched with the field data in a scheduling strategy library, and executing the step of sending the scheduling strategy to the client.
8. A security task scheduling apparatus, comprising:
the receiving module is used for receiving field data sent by a client, and the field data comprises: text information, voice information, and image information;
the analysis module is used for analyzing the field data by utilizing a neural network to obtain a scheduling strategy;
and the sending module is used for sending the scheduling strategy to the client so as to enable security personnel corresponding to the client to execute corresponding tasks according to the scheduling strategy.
9. A security task scheduling apparatus, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the security task scheduling method of any of claims 1 to 7.
10. A readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the security task scheduling method of any of claims 1 to 7.
CN201911102022.8A 2019-11-12 2019-11-12 Security task scheduling method, device, equipment and readable storage medium Pending CN110826930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911102022.8A CN110826930A (en) 2019-11-12 2019-11-12 Security task scheduling method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911102022.8A CN110826930A (en) 2019-11-12 2019-11-12 Security task scheduling method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN110826930A true CN110826930A (en) 2020-02-21

Family

ID=69554380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911102022.8A Pending CN110826930A (en) 2019-11-12 2019-11-12 Security task scheduling method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110826930A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507574A (en) * 2020-03-19 2020-08-07 深圳奇迹智慧网络有限公司 Security personnel deployment method and device, computer equipment and storage medium
CN111539861A (en) * 2020-03-24 2020-08-14 深圳奇迹智慧网络有限公司 Fire-fighting emergency processing method and device, computer equipment and storage medium
CN111539862A (en) * 2020-03-24 2020-08-14 深圳奇迹智慧网络有限公司 Individual-soldier dispatch-based emergency processing method and device and computer equipment
CN111950908A (en) * 2020-08-13 2020-11-17 深圳市睿策者科技有限公司 Scheduling task configuration pushing method and device, computer and storage medium
CN115578046A (en) * 2022-08-19 2023-01-06 深圳市东昂科兴技术有限公司 Security system based on analog simulation model and security task execution method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408565A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Urban comprehensive emergency command scheduling task distributing system and task distributing method thereof
US20150264011A1 (en) * 2014-03-17 2015-09-17 Fortinet, Inc. Security information and event management
CN105233437A (en) * 2015-10-20 2016-01-13 南京信息工程大学 Safe evacuation guiding system and method
CN107194542A (en) * 2017-04-24 2017-09-22 深圳市龙岗远望软件技术有限公司 On-site emergency disposal method, system and moving emergency server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150264011A1 (en) * 2014-03-17 2015-09-17 Fortinet, Inc. Security information and event management
CN104408565A (en) * 2014-11-28 2015-03-11 东莞中国科学院云计算产业技术创新与育成中心 Urban comprehensive emergency command scheduling task distributing system and task distributing method thereof
CN105233437A (en) * 2015-10-20 2016-01-13 南京信息工程大学 Safe evacuation guiding system and method
CN107194542A (en) * 2017-04-24 2017-09-22 深圳市龙岗远望软件技术有限公司 On-site emergency disposal method, system and moving emergency server

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507574A (en) * 2020-03-19 2020-08-07 深圳奇迹智慧网络有限公司 Security personnel deployment method and device, computer equipment and storage medium
CN111507574B (en) * 2020-03-19 2023-08-18 深圳奇迹智慧网络有限公司 Security personnel deployment method and device, computer equipment and storage medium
CN111539861A (en) * 2020-03-24 2020-08-14 深圳奇迹智慧网络有限公司 Fire-fighting emergency processing method and device, computer equipment and storage medium
CN111539862A (en) * 2020-03-24 2020-08-14 深圳奇迹智慧网络有限公司 Individual-soldier dispatch-based emergency processing method and device and computer equipment
CN111539861B (en) * 2020-03-24 2023-08-04 深圳奇迹智慧网络有限公司 Fire emergency treatment method, fire emergency treatment device, computer equipment and storage medium
CN111539862B (en) * 2020-03-24 2023-08-18 深圳奇迹智慧网络有限公司 Emergency processing method and device based on individual dispatch and computer equipment
CN111950908A (en) * 2020-08-13 2020-11-17 深圳市睿策者科技有限公司 Scheduling task configuration pushing method and device, computer and storage medium
CN115578046A (en) * 2022-08-19 2023-01-06 深圳市东昂科兴技术有限公司 Security system based on analog simulation model and security task execution method
CN115578046B (en) * 2022-08-19 2023-11-03 深圳市东昂科兴技术有限公司 Security system and security task execution method based on simulation model

Similar Documents

Publication Publication Date Title
CN110826930A (en) Security task scheduling method, device, equipment and readable storage medium
CN108319234B (en) Security management system, method, device, storage medium and information processing cloud platform
US20180025458A1 (en) Self-customizing, multi-tenanted mobile system and method for digitally gathering and disseminating real-time visual intelligence on utility asset damage enabling automated priority analysis and enhanced utility outage response
JP6094132B2 (en) Disaster information management apparatus, disaster information system, disaster information management method, disaster information management program, portable terminal, portable terminal control method, and control program for controlling portable terminal operation
US20060276200A1 (en) Mobile and wireless network architecture for law enforcement
Kaufhold et al. 112. SOCIAL: design and evaluation of a mobile crisis app for bidirectional communication between emergency services and citizen
JP6276106B2 (en) Decision support system and decision support method
Abdalla et al. WebGIS for disaster management and emergency response
CN113554540A (en) Emergency handling method and system for marine dangerous chemical substance sudden accident
Gunawan et al. TravelThrough: a participatory-based guidance system for traveling through disaster areas
Kaminska et al. Social media in emergency management: capability assessment
Palestini Communication and Decision Support Systems
JP2022052355A (en) Information analysis device, information analysis method, and information analysis program
Vichova et al. Information Support of Crisis Management
Kumar et al. An information and communication technology (ICT)-driven disaster management system: a case of firefighting in Mumbai
Nespeca et al. Information sharing and coordination in collaborative flood warning and response systems
KR102516609B1 (en) Safety education system using virtual space, and method thereof
US20220229859A1 (en) System for site survey
US20230102182A1 (en) Incident Management System
Rothkrantz et al. Information system supporting the management of a flooding crisis in the city of Prague
Rivas et al. Intelligent Mobile Distributed Management Systems for Emergencies Such as Earthquakes or Fires: A Systematic Literature Review
Vichova et al. The comparative analysis of selected IT systems to support the solving of the crisis situations by FRS Zlin Region
Kaufhold Design and Evaluation of a Mobile Crisis App
Kamal et al. Original Research Article SOSFloodFinder: A text-based priority classification system for enhanced decision-making in optimizing emergency flood response
Lanfranchi et al. GPS-based solution for tracking and protecting humanitarians in conflict zones.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200221