CN111951507A - Intelligent security comprehensive control system based on building automation - Google Patents
Intelligent security comprehensive control system based on building automation Download PDFInfo
- Publication number
- CN111951507A CN111951507A CN202010719225.8A CN202010719225A CN111951507A CN 111951507 A CN111951507 A CN 111951507A CN 202010719225 A CN202010719225 A CN 202010719225A CN 111951507 A CN111951507 A CN 111951507A
- Authority
- CN
- China
- Prior art keywords
- video
- user
- security
- mobile phone
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19608—Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses an intelligent security and protection integrated control system based on building automation, which is used for solving the problems that the existing system can only depend on supervisors to retrieve video after the fact when suspicious personnel are found in a building, and can only manually screen and check the video for passive evidence obtaining work, so that the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss; the system comprises a data acquisition module, a server, a video analysis module, a video distribution module and a security control module; according to the invention, the human body characteristic recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, the user value of the user is obtained by acquiring and analyzing the basic information of the user, and the corresponding auditing user is conveniently and reasonably selected to check the suspicious video segment through the user value, so that the workload of security personnel is reduced, and the security processing efficiency is improved.
Description
Technical Field
The invention relates to the technical field of intelligent security of buildings, in particular to an intelligent security comprehensive control system based on building automation.
Background
With the rapid development of national economy and the continuous improvement of the living standard of people in China, the requirements of people on living environment are increasingly improved, and intelligent buildings become the development trend of future buildings. In order to effectively manage the safety problem, a user invests a large amount of financial resources, material resources and manpower in the aspect of security protection, and an anti-theft facility and a monitoring system are installed at important positions, and although the measures can play a certain precaution role, the phenomenon of 'passive supervision' exists at the same time;
the existing building security exists: the suspicious personnel of discovery inside the building can only rely on supervisory personnel to retrieve the video recording afterwards, and the manual screening is looked over and is carried out passive formula work of collecting evidence, and relevant staff's working strength is great and work efficiency is low, often omits key information easily.
Disclosure of Invention
The invention aims to solve the problems that in the prior art, suspicious people are found in a building, only a supervisor can read video after the fact, manual screening and checking are carried out for passive evidence obtaining work, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss, and provides an intelligent security and protection integrated control system based on building automation.
The purpose of the invention can be realized by the following technical scheme: an intelligent security and protection integrated control system based on building automation comprises a data acquisition module, a server, a video analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time of entering the job and marking the time as MRi;
s2: acquiring the real-time position of security personnel, and calculating the distance difference between the real-time position and the position of the camera shot correspondingly to the suspicious video segment to obtain a real-time distance GRi;
s3: setting the age of a security personnel as NRi;
s4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: obtaining a security control value WRi of a security personnel by using a formula WRi of (1/NRi) x c1+ (1/GRi) x c2+ MRi x c 3; wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; and after receiving the suspicious video segment and the camera position shot by the corresponding suspicious video segment through the mobile phone terminal, the selected person reaches the camera position shot by the corresponding suspicious video segment, and then inquires and processes the person in the suspicious video segment.
Preferably, the system further comprises a registration login module; the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building.
Preferably, the system further comprises a user analysis module, the user analysis module is configured to obtain user information of a user and perform analysis, and the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; calculating the time difference between the check-in time of the user and the current time of the system to obtain the check-in duration of the user and marking the check-in duration as T1 Ek;
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk;
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2 Ek;
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: obtaining a user value JEk of the user by using a formula JEk ═ T1Ek × c4+ YEk × c5+1/T2Ek × c 6; wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
Preferably, the specific steps of the video distribution module distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users are as follows:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
Compared with the prior art, the invention has the beneficial effects that:
1. the video analysis module acquires videos shot by the cameras and performs video analysis to obtain suspicious video segments, and the video distribution module sends the suspicious video segments and the positions of the corresponding shot cameras to the security control module; the human body feature recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, suspicious personnel are prevented from being found in the building, the situation that the video is read by a supervisor after the fact that the suspicious personnel only need to rely on the supervisor to manually screen and check the video for passive evidence obtaining is avoided, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss;
2. the video distribution module distributes the video segments to be distributed to the mobile phone terminals of corresponding auditing users, obtains the user values of the users by acquiring and analyzing the basic information of the users, and conveniently and reasonably selects the corresponding auditing users to check the suspicious video segments according to the user values, so that the workload of security personnel is reduced, and the security processing efficiency is improved.
Drawings
In order to facilitate understanding for those skilled in the art, the present invention will be further described with reference to the accompanying drawings.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an intelligent security and protection integrated control system based on building automation includes a data acquisition module, a server, a video analysis module, a registration and login module, a user analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time of entering the job and marking the time as MRi;
s2: acquiring the real-time position of security personnel, and calculating the distance difference between the real-time position and the position of the camera shot correspondingly to the suspicious video segment to obtain a real-time distance GRi;
s3: setting the age of a security personnel as NRi;
s4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: obtaining a security control value WRi of a security personnel by using a formula WRi of (1/NRi) x c1+ (1/GRi) x c2+ MRi x c 3; wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; the method comprises the steps that after receiving a suspicious video segment and a camera position shot by the suspicious video segment through a mobile phone terminal, a selected person arrives at the camera position shot by the suspicious video segment, and then the selected person inquires and processes the person in the suspicious video segment;
the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building;
the user analysis module is used for acquiring and analyzing user information of a user, and the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; calculating the time difference between the check-in time of the user and the current time of the system to obtain the check-in duration of the user and marking the check-in duration as T1 Ek;
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk;
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2 Ek;
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: obtaining a user value JEk of the user by using a formula JEk ═ T1Ek × c4+ YEk × c5+1/T2Ek × c 6; wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
The specific steps of distributing the video segment to be distributed to the corresponding mobile phone terminal of the auditing user by the video distribution module are as follows:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
When the video editing device is used, the video analyzing module is used for acquiring a video shot by the camera and carrying out video analysis, human body feature recognition is carried out on the shot video, when the human body feature is recognized, video cutting is started, when the human body feature is not recognized, the video cutting is stopped, and the cut video is marked as a primary selection video segment; carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed; matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building; the video distribution module sends the video segment to be distributed to the video distribution module; the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module; the human body feature recognition and the face recognition are carried out on the video shot by the camera, so that the building security is more intelligent, suspicious personnel are prevented from being found in the building, the situation that the video is read by a supervisor after the fact that the suspicious personnel only need to rely on the supervisor to manually screen and check the video for passive evidence obtaining is avoided, the working intensity of related workers is high, the working efficiency is low, and key information is easy to miss; the video distribution module distributes the video segments to be distributed to the mobile phone terminals of corresponding auditing users, obtains the user values of the users by acquiring the basic information of the users and analyzing the basic information, and conveniently and reasonably selects the corresponding auditing users to check the suspicious video segments according to the user values, so that the workload of security personnel is reduced, and the security processing efficiency is improved.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.
Claims (4)
1. An intelligent security and protection integrated control system based on building automation is characterized by comprising a data acquisition module, a server, a video analysis module, a video distribution module and a security and protection control module;
the data acquisition module is used for acquiring camera information of a camera in a building and sending the camera information to the server, and the camera information comprises the installation position of the camera. The number of the camera and the video shot by the camera;
the video analysis module is used for acquiring videos shot by the camera and performing video analysis, and the specific analysis steps are as follows:
the method comprises the following steps: carrying out human body feature recognition on the shot video, starting video cutting when the human body feature is recognized, stopping video cutting when the human body feature is not recognized, and marking the cut video as a primary video section;
step two: carrying out face recognition on the primary selection video segment, marking the primary selection video segment with the recognized face as a reselected video segment, and marking the primary selection video segment without the recognized face as a video segment to be distributed;
step three: matching the face picture identified in the video reselection segment with the face corresponding to the building stored in the server, and marking the video reselection segment as a video segment to be distributed if the face picture is not successfully matched with the face corresponding to the building;
step four: the video distribution module sends the video segment to be distributed to the video distribution module;
the video distribution module is used for distributing the video segments to be distributed to the corresponding mobile phone terminals of the auditing users, the auditing users check the video segments to be distributed after receiving the video segments through the mobile phone terminals, and when the auditing users input suspicious instructions to the video classification module through the mobile phone terminals, the total auditing times of the auditing users are increased once; after receiving the suspicious instruction, the video classification module marks the corresponding video segment to be distributed as a suspicious video segment; the video distribution module sends the suspicious video segments and the positions of the cameras shot correspondingly to the security control module;
the security control module is used for distributing security personnel to perform security check, and the specific distribution steps are as follows:
s1: acquiring basic information of security personnel, and marking the security personnel as Ri, i is 1, … … and n; calculating the time difference between the time of the security personnel entering the job and the current time of the system to obtain the time length of entering the job, and marking the time length as MRi;
S2: acquiring the real-time position of security personnel and carrying out corresponding shooting of the real-time position and the suspicious video segment on the camera positionObtaining the real-time distance G by calculating the distance differenceRi;
S3: setting the age of the security personnel to NRi;
S4: dequantizing the working duration, the real-time interval and the age, and then taking the numerical values;
s5: using the formula WRi=(1/NRi)×c1+(1/GRi)×c2+MRiObtaining the security value W of the security personnel by the Xc 3Ri(ii) a Wherein c1, c2 and c3 are all preset proportionality coefficients;
s6: selecting the security personnel with the maximum security control value as the selected personnel, and sending the suspicious video segment and the camera position shot by the suspicious video segment correspondingly to the mobile phone terminal of the selected personnel; and after receiving the suspicious video segment and the camera position shot by the corresponding suspicious video segment through the mobile phone terminal, the selected person reaches the camera position shot by the corresponding suspicious video segment, and then inquires and processes the person in the suspicious video segment.
2. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the system further comprises a registration login module; the registration login module is used for the security personnel and the users in the building to respectively submit basic information and user information through mobile phone terminals for registration and send the basic information and the user information which are successfully registered to the server for storage, wherein the basic information comprises the name, age, time of entry and mobile phone numbers of the security personnel; the user information comprises house numbers, names, check-in time, mobile phone numbers, mobile phone models and mobile phone purchase time of users in the building.
3. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the system further comprises a user analysis module, the user analysis module is used for obtaining user information of users and analyzing, the specific analysis steps are as follows:
SS 1: marking the user as Ek, k is 1, … …, n; carrying out time on check-in time of the user and current time of the systemThe difference calculation obtains the user's duration of employment and is labeled as T1Ek;
SS 2: setting all mobile phone models to a preset value; matching the mobile phone model of the user with all mobile phone models to obtain a corresponding preset value, and marking the preset value as YEk;
SS 3: calculating the time difference between the mobile phone purchasing time and the current system time to obtain purchasing duration T2Ek;
SS 4: extracting numerical values of the job time, the preset value and the purchase time;
SS 5: using the formula JEk=T1Ek×c4+YEk×c5+1/T2EkObtaining the user value J of the user by the x c6Ek(ii) a Wherein c4, c5 and c6 are all preset proportionality coefficients;
SS 6: and the user analysis module sends the user value to the server for storage.
4. The intelligent security and protection integrated control system based on building automation as claimed in claim 1, wherein the video distribution module distributes the video segments to be distributed to the mobile phone terminals of the corresponding auditing users by the specific steps of:
the method comprises the following steps: acquiring a user value of a user, and marking the user with the user value larger than a set threshold value as a primary selection user;
step two: acquiring the total number of audits of the primary selection user and marking the audits as FA; marking the user value of the primary user as JA;
step three: obtaining an audit value F of the primary user by using a formula F (FA × c7+ JA × c 8); and selecting the initial selection user with the maximum audit value as the audit user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010719225.8A CN111951507A (en) | 2020-07-23 | 2020-07-23 | Intelligent security comprehensive control system based on building automation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010719225.8A CN111951507A (en) | 2020-07-23 | 2020-07-23 | Intelligent security comprehensive control system based on building automation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111951507A true CN111951507A (en) | 2020-11-17 |
Family
ID=73340896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010719225.8A Pending CN111951507A (en) | 2020-07-23 | 2020-07-23 | Intelligent security comprehensive control system based on building automation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111951507A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112672010A (en) * | 2020-12-17 | 2021-04-16 | 珍岛信息技术(上海)股份有限公司 | Video generation system based on face recognition |
CN112837461A (en) * | 2020-12-23 | 2021-05-25 | 中鸿达信息科技有限公司 | Intelligent security comprehensive control system based on building automation |
CN115272948A (en) * | 2022-05-20 | 2022-11-01 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201965714U (en) * | 2010-12-29 | 2011-09-07 | 羊恺 | Home intelligent early-warning security system based on human face recognition |
CN205230242U (en) * | 2015-12-04 | 2016-05-11 | 重庆财信合同能源管理有限公司 | Intelligent residential district security protection system |
CN107613254A (en) * | 2017-09-26 | 2018-01-19 | 云丁网络技术(北京)有限公司 | It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors |
JP6387259B2 (en) * | 2014-07-16 | 2018-09-05 | トヨタホーム株式会社 | Security system |
CN108600700A (en) * | 2018-04-25 | 2018-09-28 | 北京市电话工程有限公司 | A kind of cell video monitoring system |
CN109872482A (en) * | 2019-01-21 | 2019-06-11 | 广东鑫诺安保安服务有限公司 | Wisdom security protection monitoring and managing method, system and storage medium |
CN110807888A (en) * | 2019-09-24 | 2020-02-18 | 北京畅景立达软件技术有限公司 | Intelligent security method, system and storage medium for park |
CN110969560A (en) * | 2019-12-26 | 2020-04-07 | 安徽唯诗杨信息科技有限公司 | Security monitoring management platform based on big data |
CN210666913U (en) * | 2019-08-09 | 2020-06-02 | 沈阳仁德科技有限公司 | Intelligent visitor system for access |
-
2020
- 2020-07-23 CN CN202010719225.8A patent/CN111951507A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201965714U (en) * | 2010-12-29 | 2011-09-07 | 羊恺 | Home intelligent early-warning security system based on human face recognition |
JP6387259B2 (en) * | 2014-07-16 | 2018-09-05 | トヨタホーム株式会社 | Security system |
CN205230242U (en) * | 2015-12-04 | 2016-05-11 | 重庆财信合同能源管理有限公司 | Intelligent residential district security protection system |
CN107613254A (en) * | 2017-09-26 | 2018-01-19 | 云丁网络技术(北京)有限公司 | It is a kind of to detect visitor, the method and device of identification visitor's identity outdoors |
CN108600700A (en) * | 2018-04-25 | 2018-09-28 | 北京市电话工程有限公司 | A kind of cell video monitoring system |
CN109872482A (en) * | 2019-01-21 | 2019-06-11 | 广东鑫诺安保安服务有限公司 | Wisdom security protection monitoring and managing method, system and storage medium |
CN210666913U (en) * | 2019-08-09 | 2020-06-02 | 沈阳仁德科技有限公司 | Intelligent visitor system for access |
CN110807888A (en) * | 2019-09-24 | 2020-02-18 | 北京畅景立达软件技术有限公司 | Intelligent security method, system and storage medium for park |
CN110969560A (en) * | 2019-12-26 | 2020-04-07 | 安徽唯诗杨信息科技有限公司 | Security monitoring management platform based on big data |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112672010A (en) * | 2020-12-17 | 2021-04-16 | 珍岛信息技术(上海)股份有限公司 | Video generation system based on face recognition |
CN112837461A (en) * | 2020-12-23 | 2021-05-25 | 中鸿达信息科技有限公司 | Intelligent security comprehensive control system based on building automation |
CN115272948A (en) * | 2022-05-20 | 2022-11-01 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
CN115272948B (en) * | 2022-05-20 | 2023-02-17 | 贵州丰立空间科技有限公司 | Intelligent security information system based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111951507A (en) | Intelligent security comprehensive control system based on building automation | |
CN106022649B (en) | Project supervision, cost, bid, the total management system of consulting | |
CN207690169U (en) | It can reservation type recognition of face gate inhibition's guest system | |
CN107862773A (en) | Can reservation type recognition of face gate inhibition guest system and method | |
CN110795989A (en) | Intelligent safety monitoring system for electric power operation and monitoring method thereof | |
CN107369222A (en) | Engineering staff's work attendance intelligent management and system based on GPS | |
CN106779380A (en) | A kind of intelligent construction safety checks evaluation system and method | |
CN211509189U (en) | Electric power operation field supervision equipment and system | |
CN110705482A (en) | Personnel behavior alarm prompt system based on video AI intelligent analysis | |
CN109858892A (en) | A kind of Aptitude Operation Order Sheet System | |
CN206179048U (en) | Personal identification device | |
CN207249727U (en) | A kind of site safety management system | |
CN111581417A (en) | Identity recognition method, terminal, system and storage medium for power distribution room constructors | |
CN107239868A (en) | End message processing method and processing device for security cruising inspection system | |
CN110888527A (en) | Remote support and field management and control system based on Internet of things technology | |
CN110543866A (en) | Safety management system and method for capital construction engineering constructors | |
CN105931338A (en) | Intelligent community management system based on face recognition | |
CN111063144A (en) | Abnormal behavior monitoring method, device, equipment and computer readable storage medium | |
CN110942580A (en) | Intelligent building visitor management method and system and storage medium | |
CN105976469A (en) | Intelligent doorkeeper management system with robot and application thereof | |
CN112614260A (en) | Intelligent security system based on face recognition and positioning | |
CN111784901A (en) | Cloud access control system based on cloud computing and mobile internet and implementation method | |
CN110599368A (en) | DBM intelligent building management tool | |
CN114420302A (en) | Intelligent epidemic prevention control system for enterprises and public institutions | |
CN107610261A (en) | The system of management of withdrawing from the arena is entered in a kind of building site that can carry out |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 215300 room 404, building a11, No. 18, Jinxing Road, Huaqiao Town, Kunshan City, Suzhou City, Jiangsu Province Applicant after: Anden wisdom construction Kunshan Co.,Ltd. Address before: 215300 3rd floor, 185 xinwudong street, Zhangpu Town, Kunshan City, Suzhou City, Jiangsu Province Applicant before: Kunshan andan Network Technology Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201117 |
|
RJ01 | Rejection of invention patent application after publication |