CN114332766A - Dangerous behavior early warning method and device based on action rule and application thereof - Google Patents

Dangerous behavior early warning method and device based on action rule and application thereof Download PDF

Info

Publication number
CN114332766A
CN114332766A CN202111629633.5A CN202111629633A CN114332766A CN 114332766 A CN114332766 A CN 114332766A CN 202111629633 A CN202111629633 A CN 202111629633A CN 114332766 A CN114332766 A CN 114332766A
Authority
CN
China
Prior art keywords
key
behavior
events
risk index
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111629633.5A
Other languages
Chinese (zh)
Inventor
李圣权
林森
程智勇
徐晨晖
刘大宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCI China Co Ltd
Original Assignee
CCI China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCI China Co Ltd filed Critical CCI China Co Ltd
Priority to CN202111629633.5A priority Critical patent/CN114332766A/en
Publication of CN114332766A publication Critical patent/CN114332766A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The application provides a dangerous behavior early warning method based on action rules, which comprises the following steps: determining key monitoring personnel and acquiring at least one key event; determining at least one key management and control place corresponding to key monitoring personnel; monitoring each key control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of key monitoring persons based on key events when the key monitoring persons appear in any key control location; and predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and performing early warning if the behavior risk index is greater than a set threshold value. According to the method, the behavior risk indexes of key personnel are analyzed and evaluated from multiple dimensions, and timely early warning of the key personnel in each key management and control range is realized.

Description

Dangerous behavior early warning method and device based on action rule and application thereof
Technical Field
The application relates to the field of social management, in particular to a dangerous behavior early warning method and device based on action rules and application thereof.
Background
The monitoring of key personnel is the key point of continuous attention of each social department and each community, and the conventional method adopts a mode of staring at one person or staring at multiple persons, but the superiority of the mode is lower as the labor cost is gradually improved and the management and control efficiency is limited.
With the development of science and technology, most of the existing management and control modes are performed based on the visit of original personnel, for example, during an epidemic situation, supervisors are arranged under each building, and the mode of monitoring, coordinating and supervising is used for realizing the management and control of the movement of the personnel, but the stealing and running of the personnel cannot be prevented and the personnel can not flow freely in many times. The management and control method is single, although many face recognition monitors exist in the market at present, the management and control strength can be effectively improved, the event relevance of key personnel is weakened, and the danger of the key personnel to the surrounding environment or the surrounding personnel cannot be effectively evaluated.
Disclosure of Invention
The application provides a dangerous behavior early warning method and device based on action rules, an electronic device, a computer program product and a readable storage medium. The method has the advantages that the key events related to key personnel are analyzed, the control is carried out on key management and control places, when the key personnel appear in the key management and control places, the risk indexes of the key personnel are analyzed and evaluated from multiple dimensions, and the management and control of the key personnel in each key management and control place are achieved.
In a first aspect, an embodiment of the present application provides a dangerous behavior early warning method based on an action rule, including the following steps:
determining key monitoring personnel and acquiring at least one key event related to the key monitoring personnel, wherein each key event comprises behavior time information, behavior location information, behavior content information and at least one person information;
determining at least one key management and control location corresponding to the key monitoring personnel;
monitoring each key management and control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key management and control location;
and predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and performing early warning if the behavior risk index is larger than a set threshold value.
In a second aspect, an embodiment of the present application provides a dangerous behavior early warning apparatus based on a behavior trace, which is used to implement the dangerous behavior early warning method based on a behavior rule in the first aspect, and the apparatus includes the following modules:
the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for determining key monitoring personnel and acquiring at least one key event related to the key monitoring personnel, and each key event comprises behavior time information, behavior location information, behavior content information and at least one person information;
the control arrangement module is used for determining at least one key control site corresponding to the key monitoring personnel;
the monitoring module is used for monitoring each key control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key control location;
and the evaluation module is used for predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and carrying out early warning if the behavior risk index is greater than a set threshold value.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the computer program to perform the behavior law-based dangerous behavior early warning method according to any of the embodiments of the present application.
In a fourth aspect, the present application provides a computer program product, which includes software code portions for performing the behavior-law-based dangerous behavior warning method according to any of the above application embodiments when the computer program product is run on a computer.
In a fifth aspect, the present application provides a readable storage medium, in which a computer program is stored, where the computer program includes program code for controlling a process to execute the process, and the process includes the dangerous behavior warning method based on behavior rules according to any of the embodiments described in the above application.
The main contributions and innovation points of the embodiment of the application are as follows:
the method and the device for monitoring the dangerous behavior of the key monitoring personnel can distribute and control the key monitoring personnel in key control places, when the key monitoring personnel appear in the key control places, behavior rules of the key monitoring personnel are measured from three dimensions of time, place and the like by analyzing key events related to the key monitoring personnel, risk indexes of the key monitoring personnel in all dimensions are calculated, the behavior risk indexes are predicted according to the risk indexes of all dimensions, early warning is carried out according to the behavior risk indexes, measuring of the risk of the key monitoring personnel from multiple dimensions is achieved, and whether the key monitoring personnel can carry out dangerous behaviors or not is predicted according to the risk indexes of the three dimensions of time, place and the like.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a dangerous behavior early warning method based on behavior rules according to an embodiment of the present application;
fig. 2 is a block diagram of a dangerous behavior early warning apparatus based on action trajectory according to an embodiment of the present application;
fig. 3 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
Example one
In this embodiment, the method may be summarized as the following 4 steps as shown in fig. 1:
step S1: determining key monitoring personnel and acquiring at least one key event related to the key monitoring personnel, wherein each key event comprises behavior time information, behavior location information, behavior content information and at least one person information;
step S2: determining at least one key management and control location corresponding to the key monitoring personnel;
step S3: monitoring each key management and control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key management and control location;
step S4: and predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and performing early warning if the behavior risk index is larger than a set threshold value.
It should be noted that the important monitoring personnel in this embodiment refers to personnel that need to be monitored or regulated, such as a regulator, a community correction personnel, and the like. The entry of important monitoring personnel is usually limited in some special places or special areas, because when the important monitoring personnel enters the special places or special areas, the important monitoring personnel is likely to perform some dangerous behaviors, and therefore, video monitoring needs to be arranged in the special places or special areas to detect whether the important monitoring personnel enter the special places or special areas in real time.
In step S1, an important monitoring person is determined, and an event related to the important monitoring person is acquired as an important event.
Specifically, a large number of events are acquired from various platforms or systems which are connected in a butt joint mode, each event comprises behavior time information, behavior location information, behavior content information and at least one person information, and the events comprising the person types of key monitoring persons are screened out from all the events and serve as key events. Wherein, the personnel type and other related information of each action personnel in the event can be determined according to the action personnel information, such as name, age, address, etc.
Preferably, each person to be monitored or controlled may be collected to establish a key monitoring person library, and then a corresponding key event may be obtained according to the person type of each key monitoring person. When key events corresponding to different key monitoring personnel are obtained, each event related to the key monitoring personnel can be screened out from all events through set key event screening rules to serve as the key event, for example, events including the same personnel type are screened out according to the personnel type of the key monitoring personnel, and further screening can be carried out according to screening conditions such as the event grade and the event type.
In step S2, a corresponding focus control point is set for the focus monitoring person.
Specifically, the important control point may be directly selected manually, or an event frequent point related to the important monitoring person may be obtained by analyzing data, for example, analyzing a behavior point in a history related event of the important monitoring person as the event frequent point, and/or analyzing behavior points of all important events screened by the important monitoring person as the event frequent point.
The method has the advantages that the key management and control places can be set according to needs, action places which are once visited by key monitoring personnel can be analyzed, historical related events of the key monitoring personnel are action places related to events belonging to the same event type, the action places can be used as the key management and control places in the embodiment, and action places with the highest occurrence frequency can be selected as the key management and control places.
In step S3, each of the key points is monitored in real time, each person appearing in the key point is identified, and when a key monitoring person is identified in any key point, the time risk index, the location risk index and the risk index of the same person type of the key monitoring person are analyzed based on a key event corresponding to the key monitoring person.
Specifically, monitoring equipment can be arranged at each key control location for real-time monitoring, a face recognition technology is used for detecting each person shot by the monitoring equipment, and if key monitoring personnel are recognized, the behavior risk index of the key monitoring personnel is predicted.
Acquiring the current time of a key monitoring person, and acquiring a time risk index based on the current time and the behavior time information of all key events; the method comprises the steps of obtaining a current key control place, obtaining place risk indexes based on the current key control place and the behavior place information of all key events, obtaining the risk indexes of the same personnel type based on the behavior personnel information of all key events, and performing all-around evaluation on key monitoring personnel from a time dimension, a place latitude and a latitude of the same personnel type to calculate the risk indexes of the key monitoring personnel.
The time risk index is obtained as follows:
setting a first initial evaluation value of the time risk index; counting the average times of the key events in unit time to obtain the average event number in unit time based on the behavior time information of all the key events, and obtaining the total number of the current unit time events by the times of the key events in unit time corresponding to the current time; and dividing the first initial evaluation value by the average event number per unit time to obtain an evaluation value per unit time, and calculating the time risk index according to the evaluation value per unit time and the total number of the current events per unit time.
Specifically, the average value may be directly calculated according to the number of times of the occurrence of the key events in each unit time, or the number of times of the occurrence of the key events in each unit time may be counted first, and then the average number of events in each unit time is calculated by taking the maximum value and the minimum value of the number of times of the occurrence of the key events. For example, when the unit time is 8 hours, the number of times of occurrence of an event of interest per unit time in one day is 15, 45, and 20, respectively, and the maximum value of the number of times of occurrence of the event of interest is 45 and the minimum value is 15, the average number of events per unit time is (45+15)/3 is 20.
The site risk index is obtained by the following method:
setting a second initial evaluation value of the site risk index; based on the behavior and location information of all the key events, counting the average times of the key events of each control location to obtain the number of location average events, and counting the times of the key events of the current key control location to obtain the total number of the current location events; and dividing the second initial evaluation value by the average number of the place events to obtain an average evaluation value of the place, and calculating the place seal risk index according to the average evaluation value of the place and the total number of the current place events.
Specifically, the average value may be directly calculated according to the number of times of the occurrence of the key events in each behavior location to obtain the location average event number, or the number of times of the occurrence of the key events in each behavior location may be counted first, and then the maximum value and the minimum value of the number of times of the occurrence of the key events are taken to calculate the average value to obtain the location average event number. For example, the managed locations include a location a, a location B, and a location C, where the number of times that an event with a focal point occurs at the location a is 5 times, the number of times that an event with a focal point occurs at the location B is 10 times, and the number of times that an event with a focal point occurs at the location C is 7 times, where the maximum value of the number of times that an event with a focal point occurs is 10 times and the minimum value thereof is 6 times, and then the average number of times that an event with a focal point occurs per managed location is (10+3)/3 — 5 times, that is, the average number of times of events with a location is 5 times.
The time risk index is obtained as follows:
setting a third initial evaluation value of the risk indexes of the same personnel types; counting the times of associating the key events with each behavior personnel of the same personnel type as the key monitoring personnel based on the behavior personnel information of all the key events, and calculating the total number of the events of the same type of personnel and the number of the events per person of the same type of personnel according to the times of associating the key events with each behavior personnel; and dividing the third initial evaluation value by the number of the human events of the same kind of people to obtain the average evaluation value of the same kind of people, and calculating the risk index of the same person type according to the average evaluation value of the same kind of people and the total number of the events of the same kind of people so as to measure the probability that the same person type of people makes the same event again and provide data support for the investigation and prevention range.
Specifically, the average value may be directly calculated according to the number of the person-related events of each same person type to obtain the number of the person-related events of the same type, or the number of the person-related events of each same person type may be counted first, and then the average value is calculated by taking the maximum value and the minimum value of the number of the related events to obtain the number of the person-related events of the same type.
For example, if the person a is associated with 5 major events of all major events, the person B is associated with 1 major event of all major events, and the person C is associated with 11 major events of all major events, the maximum value of the number of associated events is 11, the minimum value is 1, the total number of similar person events of the person is calculated to be 5+1+ 11-17, the number of per-person associated major events is (11+ 1)/3-4, that is, the number of human-to-human events of the similar person is 4.
It should be noted that, in this embodiment, the average event number per unit time, the average event number per site, and the average event number per person of the same kind are obtained by calculating the average value using the corresponding maximum value and minimum value, which has the advantage of ensuring the freshness of the real-time average value, because when the number of events is huge, the period for calculating the average value is elongated, and the current real data situation cannot be displayed in real time, so that the timeliness of the average value is lost.
In step S4, the behavior risk index of the key monitoring person is predicted according to the time risk index, the location risk index and the risk index of the same person type, specifically, the sum of the time risk index, the location risk index and the risk index of the same person type is calculated to obtain the behavior risk index, and if the behavior risk index is greater than a set threshold, a dangerous behavior early warning is performed.
Example two
Based on the same concept, the embodiment further provides a dangerous behavior early warning device based on action trajectory, which is used for implementing the dangerous behavior early warning method based on action rule described in the first embodiment, specifically referring to fig. 2, and the device includes the following modules:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for determining key monitoring personnel and acquiring at least one key event, each key event comprises behavior time information, behavior location information, behavior content information and at least one person information, and the key events comprise events of the same personnel type as the key monitoring personnel;
the control arrangement module is used for determining at least one key control site corresponding to the key monitoring personnel;
the monitoring module is used for monitoring each key control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key control location;
and the evaluation module is used for predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and carrying out early warning if the behavior risk index is greater than a set threshold value.
EXAMPLE III
The present embodiment further provides an electronic apparatus, referring to fig. 3, including a memory 404 and a processor 402, where the memory 404 stores a computer program, and the processor 402 is configured to execute the computer program to perform the steps of any one of the above-mentioned behavior-based dangerous behavior warning methods.
Specifically, the processor 402 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 404 may include, among other things, mass storage 404 for data or instructions. By way of example, and not limitation, memory 404 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. The memory 404 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 404 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 404 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory 404 (FPMDRAM), an Extended data output Dynamic Random-Access Memory (eddram), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
Memory 404 may be used to store or cache various data files for processing and/or communication use, as well as possibly computer program instructions for execution by processor 402.
The processor 402 reads and executes the computer program instructions stored in the memory 404 to implement any one of the above-described behavior-law-based dangerous behavior warning methods.
Optionally, the electronic apparatus may further include a transmission device 406 and an input/output device 408, where the transmission device 406 is connected to the processor 402, and the input/output device 408 is connected to the processor 402.
The transmitting device 406 may be used to receive or transmit data via a network. Specific examples of the network described above may include wired or wireless networks provided by communication providers of the electronic devices. In one example, the transmission device includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmitting device 406 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The input and output devices 408 are used to input or output information. In this embodiment, the input information may be a current data table such as an epidemic situation trend document, feature data, a template table, and the like, and the output information may be a feature fingerprint, a fingerprint template, text classification recommendation information, a file template configuration mapping table, a file template configuration information table, and the like.
Optionally, in this embodiment, the processor 402 may be configured to execute the following steps by a computer program:
determining key monitoring personnel and acquiring at least one key event, wherein each key event comprises behavior time information, behavior location information, behavior content information and at least one person information, and the key event comprises an event of the same personnel type as the key monitoring personnel;
determining at least one key management and control location corresponding to the key monitoring personnel;
monitoring each key management and control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key management and control location;
and predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and performing early warning if the behavior risk index is larger than a set threshold value.
In addition, in combination with any one of the above-mentioned dangerous behavior early warning methods based on behavior rules, the embodiments of the present application can be implemented as a computer program product. The computer program product comprises software code portions for performing a method for performing law of action based forewarning of dangerous behavior when the computer program product is run on a computer, the method implementing any of the above-mentioned embodiments.
In addition, in combination with any one of the above-mentioned first embodiments of the dangerous behavior early warning method based on the law of action, the embodiments of the present application may provide a readable storage medium to implement the method. The readable storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the above-described methods for behavior-based risk behavior early warning in embodiments.
In general, the various embodiments may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. Some aspects of the invention may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the invention is not limited thereto. While various aspects of the invention may be illustrated and described as block diagrams, flow charts, or using some other pictorial representation, it is well understood that these blocks, apparatus, systems, techniques or methods described herein may be implemented in, as non-limiting examples, hardware, software, firmware, special purpose circuits or logic, general purpose hardware or controller or other computing devices, or some combination thereof.
Embodiments of the invention may be implemented by computer software executable by a data processor of the mobile device, such as in a processor entity, or by hardware, or by a combination of software and hardware. Computer software or programs (also referred to as program products) including software routines, applets and/or macros can be stored in any device-readable data storage medium and they include program instructions for performing particular tasks. The computer program product may comprise one or more computer-executable components configured to perform embodiments when the program is run. The one or more computer-executable components may be at least one software code or a portion thereof. Further in this regard it should be noted that any block of the logic flow as in the figures may represent a program step, or an interconnected logic circuit, block and function, or a combination of a program step and a logic circuit, block and function. The software may be stored on physical media such as memory chips or memory blocks implemented within the processor, magnetic media such as hard or floppy disks, and optical media such as, for example, DVDs and data variants thereof, CDs. The physical medium is a non-transitory medium.
It should be understood by those skilled in the art that various features of the above embodiments can be combined arbitrarily, and for the sake of brevity, all possible combinations of the features in the above embodiments are not described, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the features.
The above examples are merely illustrative of several embodiments of the present application, and the description is more specific and detailed, but not to be construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (15)

1. The dangerous behavior early warning method based on the law of action is characterized by comprising the following steps of:
determining key monitoring personnel and acquiring at least one key event related to the key monitoring personnel, wherein each key event comprises behavior time information, behavior location information, behavior content information and at least one person information;
determining at least one key management and control location corresponding to the key monitoring personnel;
monitoring each key management and control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key management and control location;
and predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and performing early warning if the behavior risk index is larger than a set threshold value.
2. The dangerous behavior early warning method based on action rules according to claim 1, wherein the step of obtaining the time risk index, the location risk index and the risk index of the same person type of the important monitoring person based on the important event comprises the following steps: acquiring current time, and acquiring a time risk index based on the current time and the behavior time information of all the major events; acquiring a current key control location, acquiring a location risk index based on the current key control location and the behavior location information of all key events, and acquiring a risk index of the same personnel type based on the behavior personnel information of all key events.
3. The behavior law-based dangerous behavior warning method according to claim 2,
setting a first initial evaluation value of the time risk index;
counting the average times of the key events in unit time to obtain the average event number in unit time based on the behavior time information of all the key events, and obtaining the total number of the current unit time events by the times of the key events in unit time corresponding to the current time;
and dividing the first initial evaluation value by the average event number per unit time to obtain an evaluation value per unit time, and calculating the time risk index according to the evaluation value per unit time and the total number of the current events per unit time.
4. The behavior law-based dangerous behavior warning method according to claim 2,
setting a second initial evaluation value of the site risk index;
based on the behavior and location information of all the key events, counting the average times of the key events of each control location to obtain the number of location average events, and counting the times of the key events of the current key control location to obtain the total number of the current location events;
and dividing the second initial evaluation value by the average number of the place events to obtain an average evaluation value of the place, and calculating the place seal risk index according to the average evaluation value of the place and the total number of the current place events.
5. The behavior law-based dangerous behavior warning method according to claim 2,
setting a third initial evaluation value of the risk indexes of the same personnel types;
counting the times of associating the key events with each behavior personnel of the same personnel type as the key monitoring personnel based on the behavior personnel information of all the key events, and calculating the total number of the events of the same type of personnel and the number of the events per person of the same type of personnel according to the times of associating the key events with each behavior personnel;
and dividing the third initial evaluation value by the number of the human events of the same type of people to obtain the average evaluation value of the same type of people, and calculating the risk index of the same type of people according to the average evaluation value of the same type of people and the total number of the events of the same type of people.
6. The behavior law-based dangerous behavior early warning method according to claim 3, wherein the average event number per unit time is calculated by: and counting the number of the key events occurring in each unit time, and calculating an average value according to the maximum number and the minimum number of the key events occurring in the unit time to obtain the average event number in the unit time.
7. The behavior law-based dangerous behavior early warning method according to claim 4, wherein the site average event number is calculated by: and counting the number of the key events occurring in each behavior site, and calculating an average value according to the maximum number and the minimum number of the key events occurring in the behavior site to obtain the average number of the sites.
8. The dangerous behavior early warning method based on action rules according to claim 5, wherein the calculation mode of the number of the human-average events of the similar personnel is as follows: and counting the number of each person associated event of which the person type is the same as the key monitoring person in all the key events, and calculating an average value according to the maximum number and the minimum number of the person associated events of the same person type to obtain the number of the person-per-person events of the same type.
9. The dangerous behavior early warning method based on action rules according to claim 1, wherein determining at least one important control point corresponding to the important monitoring personnel comprises: setting at least one key point control location for the key point monitoring personnel, and/or acquiring event frequently-occurring locations related to the key point monitoring personnel based on the key point event, and selecting at least one event frequently-occurring location as the key point control location.
10. The dangerous behavior early warning method based on action rules according to claim 9, wherein the step of obtaining the frequent event locations related to the important monitoring personnel based on the important events comprises: and acquiring event frequent places according to the behavior places of all the major events, or acquiring historical related events of the major personnel based on all the major events, and acquiring event frequent places according to the behavior place information in each historical related event.
11. The behavioral law-based dangerous behavior early warning method according to claim 1, wherein the important event is an event including the same person type as the important monitoring person.
12. Dangerous behavior early warning device based on action track, its characterized in that includes following module:
the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for determining key monitoring personnel and acquiring at least one key event related to the key monitoring personnel, and each key event comprises behavior time information, behavior location information, behavior content information and at least one person information;
the control arrangement module is used for determining at least one key control site corresponding to the key monitoring personnel;
the monitoring module is used for monitoring each key control location in real time, and acquiring a time risk index, a location risk index and a risk index of the same person type of the key monitoring person based on the key event when the key monitoring person appears in any key control location;
and the evaluation module is used for predicting the behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the risk index of the same personnel type, and carrying out early warning if the behavior risk index is greater than a set threshold value.
13. An electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the processor is configured to execute the computer program to perform the behavior law-based dangerous behavior warning method according to any one of claims 1 to 11.
14. A computer program product, characterized in that it comprises software code portions for performing the law of action based dangerous behavior alerting method according to any one of claims 1 to 11 when the computer program product is run on a computer.
15. A readable storage medium having stored therein a computer program comprising program code for controlling a process to execute a process, the process comprising the law of action based hazardous behavior alerting method of any one of claims 1-11.
CN202111629633.5A 2021-12-28 2021-12-28 Dangerous behavior early warning method and device based on action rule and application thereof Pending CN114332766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111629633.5A CN114332766A (en) 2021-12-28 2021-12-28 Dangerous behavior early warning method and device based on action rule and application thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111629633.5A CN114332766A (en) 2021-12-28 2021-12-28 Dangerous behavior early warning method and device based on action rule and application thereof

Publications (1)

Publication Number Publication Date
CN114332766A true CN114332766A (en) 2022-04-12

Family

ID=81014205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111629633.5A Pending CN114332766A (en) 2021-12-28 2021-12-28 Dangerous behavior early warning method and device based on action rule and application thereof

Country Status (1)

Country Link
CN (1) CN114332766A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117612243A (en) * 2023-08-18 2024-02-27 全景智联(武汉)科技有限公司 Important personnel behavior early warning method and server based on multilayer attention

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858365A (en) * 2018-12-28 2019-06-07 深圳云天励飞技术有限公司 A kind of special population Assembling Behavior analysis method, device and electronic equipment
CN110866642A (en) * 2019-11-15 2020-03-06 北京明略软件系统有限公司 Security monitoring method and device, electronic equipment and computer readable storage medium
CN111191940A (en) * 2019-12-30 2020-05-22 广东东为信息技术有限公司 Screening method for high-risk personnel and storage medium thereof
CN111476696A (en) * 2020-03-27 2020-07-31 南京慧智灵杰信息技术有限公司 Community correction group position information monitoring and alarming system based on big data
CN111860230A (en) * 2020-07-03 2020-10-30 北京航空航天大学 Automatic detection system and method based on behavior of video monitoring personnel not wearing mask

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858365A (en) * 2018-12-28 2019-06-07 深圳云天励飞技术有限公司 A kind of special population Assembling Behavior analysis method, device and electronic equipment
CN110866642A (en) * 2019-11-15 2020-03-06 北京明略软件系统有限公司 Security monitoring method and device, electronic equipment and computer readable storage medium
CN111191940A (en) * 2019-12-30 2020-05-22 广东东为信息技术有限公司 Screening method for high-risk personnel and storage medium thereof
CN111476696A (en) * 2020-03-27 2020-07-31 南京慧智灵杰信息技术有限公司 Community correction group position information monitoring and alarming system based on big data
CN111860230A (en) * 2020-07-03 2020-10-30 北京航空航天大学 Automatic detection system and method based on behavior of video monitoring personnel not wearing mask

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117612243A (en) * 2023-08-18 2024-02-27 全景智联(武汉)科技有限公司 Important personnel behavior early warning method and server based on multilayer attention

Similar Documents

Publication Publication Date Title
KR101708444B1 (en) Method for evaluating relation between keyword and asset value and Apparatus thereof
US10915849B2 (en) Method and system for determining quality level of performance data associated with an enterprise
CN109143094B (en) Abnormal data detection method and device for power battery
Ebrahimian et al. Adaptive daily forecasting of seismic aftershock hazard
KR101959213B1 (en) Method for predicting cyber incident and Apparatus thereof
CN116223975A (en) Cable fault point positioning method, device, computer equipment and storage medium
CN114332766A (en) Dangerous behavior early warning method and device based on action rule and application thereof
CN118008478A (en) Coal mine goaf temperature monitoring method and device, electronic equipment and medium
CN114662772A (en) Traffic noise early warning method, model training method, device, equipment and medium
Niaz et al. A new propagation-based framework to enhance competency in regional drought monitoring
CN108900339B (en) Method and device for measuring service quality and electronic equipment
CN105046147A (en) Method and apparatus for monitoring degree of attack on system
JP6453784B2 (en) Reliability evaluation apparatus, reliability evaluation method, and program
CN112256529A (en) Web crawler monitoring method and device, computer equipment and storage medium
CN114495275A (en) Abnormal behavior early warning method, device and application
US20230101532A1 (en) Data processing device, data processing method, and data processing program
CN114938339A (en) Data processing method and related device
CN113891386A (en) Method, device and equipment for determining hidden fault of base station and readable storage medium
CN114091644A (en) Technical risk assessment method and system for artificial intelligence product
CN110956379A (en) Security situation awareness method and device, computer equipment and storage medium
CN111162931A (en) Shared vehicle management method, device, computer equipment and readable storage medium
CN113612639B (en) Method and device for analyzing and predicting file downloading behavior based on website access record
CN118468343B (en) Safety monitoring and management method and system for data center
CN113872947B (en) Data reporting method and device, electronic equipment and computer readable storage medium
CN115630322A (en) Outdoor advertisement hidden trouble point early warning method and application thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination