CN112507830A - High-risk area protection management and control method, system and storage medium - Google Patents

High-risk area protection management and control method, system and storage medium Download PDF

Info

Publication number
CN112507830A
CN112507830A CN202011376631.5A CN202011376631A CN112507830A CN 112507830 A CN112507830 A CN 112507830A CN 202011376631 A CN202011376631 A CN 202011376631A CN 112507830 A CN112507830 A CN 112507830A
Authority
CN
China
Prior art keywords
protection
area
information
risk area
high risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011376631.5A
Other languages
Chinese (zh)
Inventor
赵天啸
于芳
谢应凯
张振中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN202011376631.5A priority Critical patent/CN112507830A/en
Publication of CN112507830A publication Critical patent/CN112507830A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2411Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • G06V40/28Recognition of hand or arm movements, e.g. recognition of deaf sign language
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H40/00ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices
    • G16H40/20ICT specially adapted for the management or administration of healthcare resources or facilities; ICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Computational Linguistics (AREA)
  • General Business, Economics & Management (AREA)
  • Biophysics (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Social Psychology (AREA)
  • Psychiatry (AREA)
  • Evolutionary Biology (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Epidemiology (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses a high-risk area protection and control method, a high-risk area protection and control system and a storage medium, wherein the method comprises the following steps: acquiring protection information of a monitored object to pass through a high risk area; analyzing the protection information based on a preset algorithm; and when the protection information indicates that the monitored object executes the scheduled killing operation and the protection operation, generating an opening instruction of the entrance guard in the high-risk area. According to the embodiment of the application, the protection information of the personnel passing through the high-risk area is collected, identified and analyzed, so that the personnel entering the anti-risk area can meet the corresponding disinfection and protection requirements, the personnel entering the high-risk area can be strictly controlled, the virus infection between the high-risk area and the outside can be cut off, the safety in the high-risk area can be improved, and the management of the high-risk area can be optimized.

Description

High-risk area protection management and control method, system and storage medium
Technical Field
The present invention relates generally to the field of monitoring and control technologies, and in particular, to a high risk area protection and control method, system, and storage medium.
Background
With the frequent occurrence of infection diseases, it becomes more important to monitor the infection in hospitals, and the management and control of wards in hospitals are more strict.
At present, medical personnel mainly complete killing under the control of a ward management group, and due to the influence of personal attention or other events, a certain killing step is easy to omit, so that a ward is infected, and potential safety hazards exist. And the traditional management and control mode has high risk and low efficiency, and will increase extra labor cost.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a high risk area protection and control method, system and storage medium for effectively controlling the safety of a high risk area by monitoring and analyzing the protection behaviors of people entering the high risk area.
In a first aspect, a high risk zone protection and management method is provided, the method comprising:
acquiring protection information of a monitoring object to pass through a high risk area;
analyzing the protection information based on a preset algorithm;
and when the identity information indicates that the monitored object executes the scheduled killing operation and the protection operation, generating an opening instruction of the entrance guard in the high-risk area.
In a second aspect, an embodiment of the present application provides a high risk zone protection management and control system, including:
the acquisition equipment is arranged in the high risk area and used for acquiring the protection information of the monitored object to pass through the high risk area;
a computer processing device for receiving the protection information, the processing device comprising a memory unit, a processor unit and a computer program stored on the memory and executable on the processor, the processor unit when executing the program implementing the high risk zone protection management method according to the first aspect.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, the computer program being used for implementing the high risk zone protection and control method according to the first aspect.
In summary, the high-risk area protection and control method, the high-risk area protection and control system and the storage medium provided by the embodiment of the application ensure that the personnel who pass through the high-risk area reach the preset killing and protection requirements by collecting, identifying and analyzing the protection information of the personnel passing through the high-risk area, realize the strict control on the protection and killing of the personnel passing through the high-risk area, cut off the virus infection between the high-risk area and the outside, improve the safety in the high-risk area and optimize the management of the high-risk area.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a schematic diagram of a high risk zone protection management system according to an embodiment of the present application;
fig. 2 is a scene schematic diagram of high risk zone protection management and control according to an embodiment of the present application;
FIG. 3 is a schematic flow chart illustrating a high risk zone protection and control method according to an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart illustrating a high risk zone protection and control method according to another embodiment of the present application;
FIG. 5 is a schematic flow chart illustrating a high risk zone protection and control method according to another embodiment of the present application;
FIG. 6 is a schematic flow chart illustrating a high risk zone protection and control method according to yet another embodiment of the present application;
FIG. 7 is a schematic flow chart illustrating a high risk zone protection and control method according to yet another embodiment of the present application;
FIG. 8 is a schematic flow chart illustrating a high risk zone shield management method according to yet another embodiment of the present application;
fig. 9 is a schematic structural diagram of a high risk zone protection and control device according to another embodiment of the present application;
fig. 10 is a schematic structural diagram of a processing device of a high risk zone protection and control apparatus according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It can be understood that in the high-risk environment with high cleanliness requirement, strict management and control on the disinfection operation and the protection state of the personnel entering and exiting are needed to ensure the safety in the high-risk area, cut off the virus and bacteria propagation outside the high-risk area and keep the sterility in the high-risk area.
The high risk area mentioned above, for example, an infection area in a hospital, or a biochemical laboratory, or a sterile workshop, etc., is not limited by the embodiments of the present application.
It is understood that in the high risk area scenario, a gate may be provided and an entrance guard may be provided at the gate to limit intrusion. Then when the management and control module determines that the identity of the current person to be entered is legal according to the received identity information and the protection information, and executes the killing operation meeting the requirement and is in the protection state meeting the requirement, an opening instruction can be generated to control a bayonet or an entrance guard to execute the opening operation and allow the monitored object to pass through.
The passing of the monitoring object can be from the outside to enter a high risk area, namely before entering the high risk area, the disinfection operation and the entering after the protection operation are executed. Or the personnel in the high-risk area can execute disinfection operation and remove the protection leaving after finishing the work.
In order to realize dynamic management of operators in the scene needing cleaning and disinfection and ensure safety in a high risk area, the embodiment of the application provides a high risk area protection management and control system and a method.
Fig. 1 is a schematic diagram of an architecture of a high risk zone protection management system according to an embodiment of the present application, and as shown in fig. 1, the system may include:
the collecting device comprises collecting devices 10 arranged in a high risk area and management and control devices 20 arranged in an office area, wherein the collecting devices can comprise first collecting assemblies 11 for collecting protection information and killing information of a monitored object, for example, the collecting devices can comprise first collecting devices for collecting head protection information, second collecting devices for collecting hand killing information and third collecting devices for collecting trunk protection information.
It is understood that the respective acquisition devices in the first acquisition assembly 11 may be distributed in different areas with high risk, and are used for acquiring the head protection information, the body protection information, and the cameras of the limb, such as the hand and foot killing information, of the monitored object. For example, as shown in fig. 2, for an infected area in a hospital, three areas with sequentially increasing risk coefficients, such as a first protected area, i.e., a green area, a second protected area, i.e., a yellow area, and a third protected area, i.e., a red area, may be arranged adjacently. Wherein, green region is connected with external office area, and personnel need enter from green region, pass through yellow region, enter into red ward district at last. Entrance guards are arranged at the entrance of the green area, between the green area and the yellow area and between the yellow area and the red area so as to limit the intrusion of illegal persons.
Then in this scenario, the second capture assembly 11 may include two sets of cameras disposed in the green region and one set of cameras disposed in the red region.
Under this kind of arrangement, set up two sets of cameras in green region can be used for gathering monitoring object's head protection information respectively to and hand information of killing. The camera arranged in the yellow area can be used for collecting body protection information of the monitored object.
The division of the high risk area and the distribution of the cameras in the acquisition device in the above embodiments are merely exemplary illustrations, and may be determined specifically according to actual situations, which is not limited in this application.
The protection information and the killing information collected by the first collecting component 11 may be a head image frame and a body image frame of the monitoring object collected by the camera, and an image frame of the hand killing.
The management and control device 20 may be a computer device built in an office area, and may be provided with a storage unit, a processor unit, and a computer program stored in a memory and running on the processor, so as to perform operation processing on information acquired by the acquisition component.
The management and control equipment can comprise a storage module, an acquisition module and an analysis module, wherein the acquisition module can be used for receiving the killing information and the protection information of the monitoring object to be in the high risk area, acquired and transmitted by the acquisition equipment, and analyzing the received protection information to identify whether the killing and protection of the monitoring object meet the requirements.
Further, in this embodiment of the application, in order to realize the management and control of personnel who pass in and out of the high risk area, the second collecting assembly 12 may be further arranged to collect the identity information of the passing personnel. For example, cameras distributed at the entrance and inside of the high risk area to collect identity information of the monitored object. Such as face information, pupil information, or identification information attached to the detected object, or may also be an acquisition component for acquiring fingerprint information, or may be an acquisition device for acquiring a radio frequency signal of an access control card. This identification information can be for the identification information of printing on monitoring object's protective clothing to gather through collection equipment such as camera, and then realize discerning through OCR technique.
For example, in the above hospital infection ward scenario, a second acquisition section 12 may be provided in front of the entrance guard of each area for acquiring the identity information of the monitored object.
It is understood that the identity information collected by the second collecting component 12 may be an image frame of a human face collected by a camera, or may be biometric information such as finger veins or pupils of the monitored object collected by other collecting devices, or may be an identifier attached to the monitored object, such as an identification code for implementing identity recognition through OCR technology.
Correspondingly, in this scenario, the management and control device 20 may store in advance identity information of all legal persons in the high-risk area, such as face information or identification information, such as text identification information on a protective clothing, so as to construct an employee information base.
For example, for an infected area of a hospital, the legitimate personnel may be medical personnel who are able to enter the infected area. For a sterile laboratory, the legal personnel can be operators or scientific researchers who can enter the laboratory; for a sterile workshop, the legitimate person may be an operator or the like who can enter the workshop.
Correspondingly, the legal identity information may be biometric information of the person who can enter, such as face information, or identification information of the equipped magnetic card, such as video information, or identification information of the person who can enter. Such as a employee number attached to a protective garment for a legitimate person, and the like. The specific content of the identity information is not limited in the present application.
It can be understood that the legal information is pre-stored in the management and control module, so that in actual use, when image information or video signals including identity information collected by the monitoring module are received, the collected information can be analyzed, and the analysis result is compared with the pre-stored information to determine whether the identity of the current monitoring object to be entered is legal.
It can also be understood that the management and control module stores algorithms in advance to identify whether the monitored object performs a predetermined killing operation and is in a protection state meeting the requirement.
Optionally, a deep learning model may be pre-established and stored in the management and control module, and when the protection information of the monitoring object collected by the monitoring module is received, the deep learning model may be utilized to determine whether the monitoring object performs killing operation and is currently in a protection state meeting the requirements.
For example, the labeled hand washing action/gesture data can be trained in advance by using a picture classification model, key action features are extracted, and then a convolutional neural network model fusing hand washing action hierarchical features can be established by learning a training set. Standard, non-standard hand washing operations may be included in the training set. Wherein standard hand washing maneuvers include, but are not limited to, seven step washing maneuvers. The collected image information including the motion/gesture may be compared to the classification model to determine whether the hand washing requirements are met, i.e., whether a power hand killing operation is performed.
If the identification finds that the entering person does not finish a certain step, the corresponding detection system carries out voice reminding of unfinished operation.
As another example, a convolutional neural network based on deep learning is established in advance. When the head protection image and the body protection image are received, whether medical personnel wear face protection articles such as a mask and a hat or not can be analyzed and identified, and whether the monitoring object is in a head protection state or not is determined. The same is true. The method can be applied to a deep learning image recognition model, preprocessing, detecting and segmenting body wearing images, sending a training set into a convolutional neural network, extracting local features of the convolutional neural network and classifying SVM (support vector machine) to obtain a wearing detection model, comparing the collected face and body wearing images with the model, and distinguishing whether passing personnel meet standard requirements or not.
The high-risk area management and control system provided by the embodiment of the application acquires the identity and the protection information of personnel entering the high-risk area through the monitoring module arranged in the high-risk area, identifies and analyzes the acquired information through the management and control module, and determines whether to open the access control of the passing high-risk area according to the analysis result, so that the identity of the personnel entering the high-risk area is legal, the corresponding killing and protection requirements are met, the strict management and control of the personnel entering the high-risk area are realized, the virus infection of the high-risk area and the outside is cut off, the safety in the high-risk area is improved, and the management of the high-risk area is optimized.
In order to better understand the strict control of the access personnel in the practical use of the control system, the high risk control method provided by the embodiment of the present application is explained in detail below through fig. 3 to fig. 7.
Fig. 3 is a schematic flow chart of a high risk zone protection and control method according to an embodiment of the present application, and as shown in fig. 3, the method includes:
s110, obtaining protection information of a monitoring object to pass through a high risk area;
s120, analyzing the protection information based on a preset algorithm;
and S130, when the protection information shows that the monitored object executes the scheduled killing operation and the protection operation, generating an opening instruction of the entrance guard in the high-risk area.
Specifically, in this application embodiment, the collection equipment that arranges transmits the image information of the personnel that wait to pass through that gathers to the management and control equipment, and this management and control equipment can utilize the algorithm of storage to carry out analysis and identification to the information of gathering to judge whether this monitoring object has carried out the killing operation that satisfies the requirement, and whether be in the protection state that satisfies the requirement, and then show that this monitoring object has carried out the killing operation when the judged result, and protection state satisfies the requirement, then generates the opening instruction of opening entrance guard.
For example, for personnel entering a hospital infection area, such as visiting family members or medical personnel, the disinfection and protection of the personnel to be entered are judged whether to be executed in place or not through the collection of the protection behaviors and states of the personnel to be entered, so as to ensure the safety of the infection area.
For another example, for a person leaving a hospital infection area, such as visiting family members, or medical staff, the disinfection and protection of the person to be left is judged to be in place or not through collecting the protection behaviors and states of the person to be left, so as to ensure the safety of the person and the outside.
According to the embodiment of the application, the protection information of the personnel entering the high-risk area is collected, identified and analyzed, the personnel entering the wind-proof risk area are ensured to meet the preset killing and protection requirements, the strict control on the protection and killing of the personnel entering the high-risk area is realized, the virus infection of the high-risk area and the outside is cut off, the safety in the high-risk area is improved, and the management of the high-risk area is optimized.
Further, as shown in fig. 4, in another embodiment, the identities of people to enter may also be strictly managed by using a second acquisition component, so as to avoid the wrong entry of idle people.
The method can comprise the following steps:
s210, acquiring identity information and protection information of a monitoring object to pass through a high risk area;
s220, analyzing the identity information and the protection information based on a preset algorithm;
and S230, when the identity information shows that the identity of the monitored object is legal, and the protection information shows that the monitored object executes scheduled killing operation and protection operation, generating an opening instruction of the entrance guard in the high-risk area.
Specifically, in this example, the identity information and the protection information of the detection object are collected, and the identity information is verified, so that the validity of the passing person is ensured, and the intrusion of unauthorized persons is avoided.
For example, in the scenario of a hospital infection ward in the above embodiment, when a certain person needs to enter the ward, a complete management and control flow diagram is shown in fig. 5.
Specifically, the monitoring object is located in front of the green area, as shown in fig. 2 and 6, the identity information is collected by the first collecting component, and is transmitted to the control device. Then, the collected identity information, such as face information or identification information, is contrasted and analyzed with the prestored legal identity information through a face recognition algorithm or an OCR (optical character recognition) technology by the control equipment, so as to recognize whether the current person to be entered is a legal person, namely a medical person. When the current person to be entered is determined to be medical personnel, an opening instruction is generated to control the entrance guard at the entrance of the green area to be opened, and the monitoring object enters the green area through the entrance guard.
It can be understood that when the judgment result of the control device indicates that the monitoring object is an illegal person, a prompt instruction can be generated, the monitoring object is prompted through the voice device or the display device, and no permission is given to enter.
Optionally, when the management and control device further counts the number of people entering and exiting the high risk area within a time period, and stores the number for subsequent optimization management.
Further, as shown in fig. 7, after the monitoring object enters the green area, one of the group of cameras disposed in the green area collects head protection information, that is, collects facial wearing images of the object to be monitored, such as facial wearing images of a mask, a hat and the like of the monitoring object, and further transmits the collected images to the management and control module. The control module can utilize a pre-constructed deep learning model to judge whether the monitored object meets the head protection requirement after the facial wearing image is acquired.
Meanwhile, a second group of cameras arranged in the green area collect image frames of the hand killing operation of the monitoring object, such as image frame sequences of hand washing of the monitoring object, so as to transmit the image frames to the control equipment. After receiving the image frame sequence absorbed by the monitoring object, the management and control device can process the image frame sequence, extract key action features, and further input the key action features into a pre-constructed learning module to judge whether the current monitoring object completes all hand washing steps, namely, determine whether the monitoring object performs disinfection and killing operations meeting requirements.
Further, when the management and control equipment determines that the head protection of the monitored object meets the requirements through analysis and the executed hand killing operation meets the requirements, an opening instruction is generated to control opening of the access control between the green area and the yellow area, so that the monitored object can enter the yellow area.
Finally, as shown in fig. 8, when the monitored object is in the yellow region, the camera arranged in the yellow region may collect the protection information of the body of the monitored object, that is, the protection state of the whole body of the monitored object, such as collecting the image frames of the protection of the protective clothing, gloves, etc. of the monitored object, and transmit the image frames to the management and control device.
The management and control equipment analyzes the received body protection information to determine whether the body protection state of the object to be monitored meets the requirement, namely whether the integral protection of the body meets the requirement. When the requirements are met, an opening instruction can be further generated to open the entrance guard between the red area and the yellow area and allow the to-be-monitored entrance to the red area, namely the ward area.
It can be understood that when the management and control device determines that the head protection state of the object to be monitored does not meet the requirement through analysis of the head protection image, or the object to be detected does not strictly perform the hand killing step, or the body state of the object to be monitored does not meet the requirement, a prompt instruction can be generated, so that the object to be monitored performs a response operation according to the prompt.
It can also be understood that before each entrance guard, the identity information of the monitored object can be collected through the first collecting device.
For example, in a red area, if a monitoring object wears the protective clothing, the person is identified by marking obvious characters or marks on the protective clothing and identifying the characters on the protective clothing by using an OCR technology; if the medical personnel do not wear the protective clothing, then gather the people's face information of cominging in and going out red district medical personnel with the camera, use face identification technique discernment personnel that get into the ward district, the record entering information to utilize every personnel in the visual tracking technique pursuit red district.
Further, for an infectious disease isolation ward, the stay time of the person in the red zone may be calculated based on the current system time and the recorded entry time of each person, and a reminder may be given if the prescribed time is exceeded.
It can also be understood that when the medical staff or the operating staff finishes the operation and leaves in the high risk area, such as from the ward to the office, the same camera in each area collects the image frames of the monitored object to judge whether the relevant killing steps are finished, and the monitoring staff can exit after being qualified.
For example, when the medical staff is in a green area, the medical staff can choose to open a first access door by verifying the identity information so as to exit the green area; in the yellow area or the red area, the hospital personnel can also open the second card slot to exit the yellow area or the red area by verifying the identity information.
Further, in this application embodiment, in order to realize intelligent management, when medical personnel or operator exited from the high risk zone, acquireed through personnel's identity information and departure time through the identity collection to with all data upload to management and control equipment, be used for the record personnel condition of flowing, if implement dynamic monitoring to the ward stream of people, with promotion ward operating efficiency, the material resources of using manpower sparingly.
The high-risk area management and control method provided by the embodiment of the application comprises the steps of collecting identity information of passing personnel, head protection information, hand protection information and body protection information, which are collected by collecting equipment distributed in different risk level areas, further learning and analyzing the collected information through a preset algorithm, determining whether the current passing personnel are legal personnel, determining whether to execute disinfection operation meeting the requirement, determining whether to open an entrance guard, further realizing strict management and control on the passing personnel in and out of the high-risk area, effectively isolating virus propagation paths between the high-risk area and the outside, ensuring the safety in the high-risk area, and improving the management efficiency.
On the other hand, as shown in fig. 9, an embodiment of the present application further provides a high risk protection management and control device, where the device 800 includes:
a first obtaining module 810, configured to obtain protection information of a monitored object to pass through a high risk area;
an analyzing module 820, configured to analyze the protection information based on a preset algorithm;
the generating module 830 is configured to generate an opening instruction of the door access in the high-risk area when the protection information indicates that the monitored object performs a predetermined killing operation and a protection operation.
Optionally, in the high-risk area protection management and control device according to the embodiment of the application, the protection information includes hand killing information, head protection information, and body protection information of the monitored object.
Optionally, in the high-risk area protection and control device according to the embodiment of the present application, the high-risk area includes a first protection area, a second protection area, and a third protection area, where risk coefficients are sequentially increased, and the first protection area, the second protection area, and the third protection area are adjacently disposed, where an entrance guard is disposed at an entrance of the first protection area, between the first protection area and the second protection area, and between the second protection area and the third protection area,
the first obtaining module includes:
a first acquiring unit 811 for acquiring the head protection information acquired by the first acquiring device disposed in the second protection zone, and the hand sterilizing information acquired by the second acquiring device,
a second obtaining unit 812, configured to obtain body protection information collected by a third collecting device disposed in the third protection zone.
Optionally, the high-risk area protection and control apparatus according to the embodiment of the present application further includes a second obtaining module 840:
and the identity information of the monitored object is acquired through the fourth acquisition equipment.
Optionally, in the high-risk area protection management and control apparatus according to the embodiment of the present application, the identity information includes biometric information of the monitoring subject, or identification information or a radio frequency signal attached to a body of the monitoring subject.
Optionally, in the high-risk area protection and control device according to the embodiment of the present application, the generating module is specifically configured to:
when the identity information indicates that the identity of the monitored object is legal, generating an opening instruction for opening the entrance guard of the first protection area;
when the head protection information acquired by the first acquisition equipment indicates that the monitored object is in a head protection state and the hand killing information acquired by the second acquisition equipment indicates that the monitored object executes hand killing operation, generating an opening instruction for opening the access control between the first protection area and the second protection area;
and when the body protection information acquired by the third acquisition equipment indicates that the monitoring exclusive share is in a body protection state, generating an opening instruction for opening the access control between the second protection area and the third protection area.
Optionally, in the high-risk area protection and control device according to the embodiment of the present application, the device further includes:
and the prompting module 850 is configured to generate a prompting instruction when the protection information does not meet a preset condition, or the identity of the monitored object is illegal, or the retention time of the monitored object in the third protection area is greater than a preset threshold.
Optionally, in the high-risk area protection and control device according to the embodiment of the present application, the parsing module is specifically configured to:
and identifying whether the monitored object is in a head protection state and a body protection state or not and whether hand killing operation is executed or not based on a deep learning model.
On the other hand, the embodiment of the present application further provides a computer device, where the computer device includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the high risk management and control method as described above when executing the program.
Referring now to FIG. 8, shown is a block diagram of a computer system 900 suitable for use in implementing the apparatus of an embodiment of the present application.
As shown in fig. 8, the computer system 900 includes a Central Processing Unit (CPU)901 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage section 903 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data necessary for the operation of the system 900 are also stored. The CPU 901, ROM 902, and RAM 903 are connected to each other via a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
The following components are connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
In particular, the process described above with reference to fig. 1 may be implemented as a computer software program according to embodiments of high risk zone protection policing as disclosed herein. For example, embodiments of high risk zone protection policing disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method of fig. 1. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various high risk zone protection governance embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, and may be described as: a processor comprises an acquisition module, an analysis module and a generation module. The names of the units or modules do not limit the units or modules, for example, the generating module may be further described as "generating an opening instruction for entrance guard in the high risk area when the identity information indicates that the identity of the monitored object is legal and the protection information indicates that the monitored object performs a predetermined killing operation and a protection operation".
As another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the foregoing device in the foregoing embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the high risk zone protection and management methods described herein, and in particular:
acquiring identity information of a monitored object to pass through a high risk area and protection information of the monitored object;
analyzing the identity information and the protection information based on a preset algorithm;
and when the identity information shows that the identity of the monitored object is legal and the protection information shows that the monitored object executes scheduled killing operation and protection operation, generating an opening instruction of the entrance guard in the high-risk area.
According to the high-risk area protection and control method, system and storage medium, the identity and protection information of personnel entering the high-risk area are collected, identified and analyzed, the identity of the personnel entering the low-risk area is legal, corresponding disinfection and protection requirements are met, strict control over the personnel entering the high-risk area is achieved, virus infection between the high-risk area and the outside is cut off, safety in the high-risk area is improved, and management of the high-risk area is optimized.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by a person skilled in the art that the scope of the invention as referred to in the present application is not limited to the embodiments with a specific combination of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A high risk zone protection management method, the method comprising:
acquiring protection information of a monitoring object to pass through a high risk area;
analyzing the protection information based on a preset algorithm;
and when the protection information shows that the monitored object executes preset killing operation and protection operation, generating an opening instruction of the entrance guard in the high-risk area.
2. The high risk zone protection management method according to claim 1, wherein the protection information comprises hand disinfection information, head protection information and body protection information of the monitored subject.
3. The high-risk area protection and control method according to claim 2, wherein the high-risk area comprises a first protection area, a second protection area and a third protection area, the risk coefficients of which are sequentially increased, the first protection area, the second protection area and the third protection area are adjacently arranged, the entrance of the first protection area, the space between the first protection area and the second protection area, and the space between the second protection area and the third protection area are provided with entrance guards,
the acquiring of the protection information of the monitoring object to pass through the high risk area includes:
acquiring head protection information acquired by first acquisition equipment arranged in the second protection area and hand sterilization information acquired by second acquisition equipment,
and acquiring body protection information acquired by third acquisition equipment arranged in the third protection area.
4. The high risk zone shield management method of claim 3, further comprising:
and acquiring the identity information of the monitored object acquired by a fourth acquisition device.
5. The high risk zone protective management method of claim 4, wherein the identity information comprises biometric information of the monitored subject, or identification information or radio frequency signals affixed to the body of the monitored subject.
6. The high-risk area guard control method according to claim 4, wherein generating the opening instruction of the entrance guard in the high-risk area comprises:
when the identity information indicates that the identity of the monitored object is legal, generating an opening instruction for opening the entrance guard of the first protection area;
when the head protection information acquired by the first acquisition equipment indicates that the monitored object is in a head protection state and the hand killing information acquired by the second acquisition equipment indicates that the monitored object executes hand killing operation, generating an opening instruction for opening the access control between the first protection area and the second protection area;
and when the body protection information acquired by the third acquisition equipment shows that the monitoring exclusive share is in a body protection state, generating an opening instruction for opening the access control between the second protection area and the third protection area.
7. The high risk zone shield management method of any one of claims 3-6, further comprising:
and when the protection information indicates that the monitored object does not execute the preset killing operation and the protection operation, or the identity of the monitored object is illegal, or the retention time of the monitored object in the third protection area is greater than a preset threshold value, generating a prompt instruction.
8. The high risk zone protection management method according to any one of claims 3-6, wherein the parsing the protection information based on a preset algorithm comprises:
and identifying whether the monitored object is in a head protection state and a body protection state or not and whether hand killing operation is executed or not based on a deep learning model.
9. A high risk zone protective management system, the system comprising:
the acquisition equipment is arranged in the high risk area and used for acquiring the protection information of the monitored object to pass through the high risk area;
computer processing device for receiving said guard information, said processing device comprising a memory unit, a processor unit and a computer program stored on the memory and executable on the processor, the processor unit when executing the program implementing the high risk zone guard management method according to any of the preceding claims 1-8.
10. A computer-readable storage medium, having stored thereon a computer program for implementing a high risk zone protection management method according to any of claims 1-8.
CN202011376631.5A 2020-11-30 2020-11-30 High-risk area protection management and control method, system and storage medium Pending CN112507830A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011376631.5A CN112507830A (en) 2020-11-30 2020-11-30 High-risk area protection management and control method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011376631.5A CN112507830A (en) 2020-11-30 2020-11-30 High-risk area protection management and control method, system and storage medium

Publications (1)

Publication Number Publication Date
CN112507830A true CN112507830A (en) 2021-03-16

Family

ID=74968639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011376631.5A Pending CN112507830A (en) 2020-11-30 2020-11-30 High-risk area protection management and control method, system and storage medium

Country Status (1)

Country Link
CN (1) CN112507830A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113096366A (en) * 2021-03-25 2021-07-09 国网河北省电力有限公司沧州供电分公司 Electrified interval false-entry-prevention method and device and terminal equipment
CN113569671A (en) * 2021-07-13 2021-10-29 北京大数医达科技有限公司 Abnormal behavior alarm method and device
CN114067471A (en) * 2021-11-11 2022-02-18 深圳市第三人民医院(深圳市肝病研究所) Medical staff management method, system and storage medium
CN114429676A (en) * 2022-01-27 2022-05-03 山东纬横数据科技有限公司 Medical institution disinfection supply room personnel identity and behavior recognition system
CN116740852A (en) * 2023-06-02 2023-09-12 江苏龙腾门业有限公司 Intelligent control system based on nuclear power station shielding door

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113096366A (en) * 2021-03-25 2021-07-09 国网河北省电力有限公司沧州供电分公司 Electrified interval false-entry-prevention method and device and terminal equipment
CN113096366B (en) * 2021-03-25 2022-10-14 国网河北省电力有限公司沧州供电分公司 Electrified interval false-entry-prevention method and device and terminal equipment
CN113569671A (en) * 2021-07-13 2021-10-29 北京大数医达科技有限公司 Abnormal behavior alarm method and device
CN114067471A (en) * 2021-11-11 2022-02-18 深圳市第三人民医院(深圳市肝病研究所) Medical staff management method, system and storage medium
CN114429676A (en) * 2022-01-27 2022-05-03 山东纬横数据科技有限公司 Medical institution disinfection supply room personnel identity and behavior recognition system
CN116740852A (en) * 2023-06-02 2023-09-12 江苏龙腾门业有限公司 Intelligent control system based on nuclear power station shielding door
CN116740852B (en) * 2023-06-02 2024-01-30 江苏龙腾门业有限公司 Intelligent control system based on nuclear power station shielding door

Similar Documents

Publication Publication Date Title
CN112507830A (en) High-risk area protection management and control method, system and storage medium
CN109069072B (en) Fraud detection system and method
CN110321780B (en) Abnormal falling behavior detection method based on space-time motion characteristics
EP3118810A1 (en) Information processing method and information processing system
CN107958258A (en) For following the trail of the method and system of the object in limited area
CN106778556A (en) Intelligent identity identification system based on dynamic human face identification and Gait Recognition fusion
CN111460962A (en) Mask face recognition method and system
CN111563480B (en) Conflict behavior detection method, device, computer equipment and storage medium
CN106203458A (en) Crowd's video analysis method and system
CN108898093A (en) A kind of face identification method and the electronic health record login system using this method
KR102012672B1 (en) Anti-crime system and method using face recognition based people feature recognition
KR20090018036A (en) Procedure for identifying a person by eyelash analysis and acquisition device using thereof
CN107293301B (en) Recognition methods and system based on dental articulation sound
CN206224519U (en) Intelligent identity identification system based on dynamic human face identification and Gait Recognition fusion
CN108416254A (en) A kind of statistical system and method for stream of people's Activity recognition and demographics
CN108171138A (en) A kind of biological information acquisition methods and device
US20210364356A1 (en) System and method for using artificial intelligence to enable elevated temperature detection of persons using commodity-based thermal cameras
Alrahawe et al. A biometric technology‐based framework for tackling and preventing crimes
CN107220623A (en) A kind of face identification method and system
Garg et al. Biometric authentication using soft biometric traits
CN106775346A (en) A kind of method and device of finger-image identification
EP2441032A1 (en) System and method for biometric identification
CN113673343B (en) Open set palmprint recognition system and method based on weighting element measurement learning
CN111316335A (en) System for monitoring a person
US20040052403A1 (en) High volume mobile identity verification system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination