CN115439932B - Behavior and information detection method taking regular tetrahedral architecture as logic thinking - Google Patents

Behavior and information detection method taking regular tetrahedral architecture as logic thinking Download PDF

Info

Publication number
CN115439932B
CN115439932B CN202211073594.XA CN202211073594A CN115439932B CN 115439932 B CN115439932 B CN 115439932B CN 202211073594 A CN202211073594 A CN 202211073594A CN 115439932 B CN115439932 B CN 115439932B
Authority
CN
China
Prior art keywords
behavior
nodes
main
information
information conversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211073594.XA
Other languages
Chinese (zh)
Other versions
CN115439932A (en
Inventor
许诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siyuan Life Engineering Co ltd
Original Assignee
Siyuan Life Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siyuan Life Engineering Co ltd filed Critical Siyuan Life Engineering Co ltd
Priority to CN202211073594.XA priority Critical patent/CN115439932B/en
Publication of CN115439932A publication Critical patent/CN115439932A/en
Application granted granted Critical
Publication of CN115439932B publication Critical patent/CN115439932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Psychiatry (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Social Psychology (AREA)
  • Educational Administration (AREA)
  • Multimedia (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application provides a behavior and information detection method taking a regular tetrahedron architecture as logic thinking, wherein the behavior architecture comprises the following steps: the method comprises the steps of constructing connection relations between any two different main behavior nodes based on the behavior relations between the different main behavior nodes by four independent main behavior nodes distributed and arranged in a distributed mode; each main behavior node is used for storing different types of behavior data, and under the connection relation between different main behavior nodes, the different types of behavior data accord with preset constraint relation; and responding to the trigger of any one or four of the master behavior nodes, triggering the synchronization of other master behavior nodes, and executing a preset information conversion action to generate an information conversion event. The behavior architecture is constructed through the constraint relation among the four distributed main behavior nodes, so that the construction method of the behavior architecture is more simplified, the constructed behavior architecture is concise and not redundant, and the efficiency of object execution is improved.

Description

Behavior and information detection method taking regular tetrahedral architecture as logic thinking
Technical Field
The application relates to the technical field of computers, in particular to a behavior and information detection method taking a regular tetrahedron architecture as logic thinking.
Background
Behavior architecture is the basis for performing different behavior actions, and a reasonable behavior architecture is critical for reasonable execution of behaviors.
In the prior art, the behavior architecture has various forms and no unified specification, the nature of things is not considered, and the behavior architecture redundancy exists, so that the execution efficiency of behaviors is low.
Disclosure of Invention
The present application aims to solve at least one of the technical problems existing in the prior art.
To this end, the application proposes a behavioural architecture comprising: the method comprises the steps of constructing connection relations between any two different main behavior nodes based on the behavior relations between the different main behavior nodes by four independent main behavior nodes distributed and arranged in a distributed mode; each main behavior node is used for storing different types of behavior data, and under the connection relation between different main behavior nodes, the different types of behavior data accord with preset constraint relation; and responding to the condition that any one or more of the master behavior nodes are triggered, and synchronously triggering other master behavior nodes and executing a preset information conversion action to generate an information conversion event.
In some embodiments, the main behavior node further includes at least one child behavior node, where child behavior data corresponding to the child behavior node and main behavior data corresponding to the main behavior node conform to a preset constraint relationship.
In some embodiments, the master behavior nodes have different trigger priorities, and in response to any one or more of the master behavior nodes being triggered, the other master behavior nodes are triggered to execute a preset information conversion action based on the corresponding trigger priority order, so as to generate an information conversion event.
In some embodiments, after the master behavior node is triggered, the method further comprises:
and storing the information conversion event generated after the master behavior node is triggered and the information conversion event generated after other master behavior nodes are synchronously triggered and execute the preset information conversion action into a blockchain.
In some embodiments, the behavior architecture includes being built based on one or more regular tetrahedral architectures, the number of behavior nodes being four or a multiple of four, the behavior architecture being a regular tetrahedral based infrastructure.
In some embodiments, the number of corresponding behavior nodes and the connection relationship between different behavior nodes are determined based on a behavior scene, wherein the behavior nodes comprise a main behavior node and a sub behavior node.
The application also provides an information conversion method based on the behavior bottom layer logic thinking, which comprises the following steps:
receiving behavior information conversion requirements;
constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement;
in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
The present application also provides a method for verifying behavioral information conversion compliance, the method comprising:
acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data;
when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior;
and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior.
The present application also provides an apparatus for verifying compliance with behavioral information conversion, the apparatus comprising:
the acquisition module is used for acquiring a behavior data packet corresponding to behavior information conversion and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data;
the first judging module is used for judging that the behavior information conversion is an irregular behavior when the data type and/or the data relationship do not meet a preset condition;
and the second judging module is used for judging that the behavior information conversion is a compliance behavior when the data type and the data relation meet preset conditions.
The present application also provides an electronic device including:
a memory for storing executable instructions; the method comprises the steps of,
a processor for displaying with the memory to execute the executable instructions to perform a method of performing any of the behavioral information transformations described above, the method comprising: receiving behavior information conversion requirements; constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement; in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
The present application also provides an electronic device including:
a memory for storing executable instructions; the method comprises the steps of,
a processor for display with the memory to execute the executable instructions to perform a method for verifying behavioral information conversion compliance as described in any one of the above, the method comprising: acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data; when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior; and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior.
The present application also provides a computer-readable storage medium storing computer-readable instructions that when executed perform a method of behavior information conversion as described in any one of the above, the method comprising: receiving behavior information conversion requirements; constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement; in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
The present application also provides a computer readable storage medium storing computer readable instructions that when executed perform a method for verifying behavioral information conversion compliance as described in any one of the above, the method comprising: acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data; when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior; and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior.
The application also proposes a computer program product comprising a computer program which, when executed by a processor, implements a method of information conversion based on behavioral underlying logic thinking or a method for verifying compliance of behavioral information conversion.
The present application also provides an apparatus for verifying compliance with behavioral information conversion, the apparatus comprising:
the acquisition module is used for acquiring a behavior data packet corresponding to behavior information conversion and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data;
the first judging module is used for judging that the behavior information conversion is an irregular behavior when the data type and/or the data relationship do not meet a preset condition;
and the second judging module is used for judging that the behavior information conversion is a compliance behavior when the data type and the data relation meet preset conditions.
The above technical solutions in the embodiments of the present application have at least one of the following technical effects: the behavior architecture is constructed through the constraint relation among the four distributed main behavior nodes, so that the construction method of the behavior architecture is more simplified, the constructed behavior architecture is concise and not redundant, and the efficiency of executing the object behaviors is improved.
The main behavior node in the behavior architecture further can also comprise sub behavior nodes, and certain constraint relations are also met between the sub behavior nodes and the main behavior nodes, so that the behavior construction can be suitable for more complex behavior scenes, different behavior scenes can be constructed based on the constraint relations of the main behavior nodes and the sub behavior nodes, and the applicability of the behavior architecture is further improved.
The method not only can execute corresponding information conversion based on the behavior architecture, but also can detect the compliance of the information conversion based on the behavior architecture, and only the information conversion process conforming to the constraint relation in the behavior architecture is a compliant behavior, wherein the implementation of the constraint relation in behavior data can be understood as the data type and the data association relation in the data packet, and only the information conversion process corresponding to the data packet conforming to the preset relation is a compliant conversion behavior.
In order to further improve flexibility, suitability and universality of the behavior architecture, different behavior node priorities can be configured for each main behavior node and each sub behavior node, so that when different behavior nodes are triggered is determined according to the sequence corresponding to the priorities, and further things can be controlled to be executed correctly and smoothly.
The behavior framework is constructed based on the tetrahedral principle, and the behavior framework obtained based on the principle also has the advantages of stability, simplicity and balance in view of the stability, simplicity and balance of the tetrahedral framework.
Additional aspects and advantages of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a behavior architecture provided by one embodiment of the present application;
FIG. 2 is a flow chart for verifying compliance with behavioral information conversion provided by an embodiment of the application;
FIG. 3 is a schematic flow chart of behavior information conversion according to an embodiment of the present application;
FIG. 4 is a schematic block diagram of a device for verifying compliance with behavioral information conversion provided by an embodiment of the application;
FIG. 5 is a simplified schematic diagram of a behavior architecture provided by an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in further detail below with reference to the accompanying drawings and examples. The following examples are illustrative of the application but are not intended to limit the scope of the application.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the embodiments of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
The execution subject of the behavior architecture and the transaction processing method can be a central server or can also be a terminal of a user, including but not limited to a mobile phone, a tablet computer, a pc terminal and the like.
In some embodiments, as shown in FIG. 1, the behavior architecture includes: the module 101 is used for constructing connection relations between any two different main behavior nodes based on the behavior relations between the different main behavior nodes by four independent main behavior nodes distributed; the module 102 is configured to store different types of behavior data by using each of the master behavior nodes, where the different types of behavior data conform to a preset constraint relationship under a connection relationship between the different master behavior nodes; and a module 103, responding to the triggering of any one or more of the master behavior nodes, triggering the synchronization of other master behavior nodes, and executing a preset information conversion action to generate an information conversion event.
The distributed behavior architecture comprises four main behavior nodes, and each main behavior node is independent from each other. For example, each master behavior node may acquire data, process data, send data, and store data independently of each other. Thus, each master behavior node can be ensured to acquire, process and transmit data rapidly.
The four main behavior nodes are connected in a distributed mode, any two main behavior nodes can be connected independently, and therefore information communication between any two main behavior nodes can be achieved, and communication between any two main behavior nodes is achieved.
In the behavior framework, any two main behavior nodes are in communication connection, so that after any one main behavior node is triggered, other main behavior nodes connected with the main behavior node are also triggered in response to a trigger instruction, and the processing of corresponding object behaviors is realized.
In the behavior architecture, four master behavior nodes represent different roles in a behavior scene, and the different master behavior nodes are used for storing different types of behavior data, so that the four different roles jointly form a specific object behavior scene. And each main behavior node is used for storing different types of behavior data, and the execution of specific things behaviors is realized through data transmission and data processing among the four main behavior nodes in the distributed connection. Specifically, after any one of the four master behavior nodes is triggered, the master behavior node connected with the master behavior node receives information, executes corresponding object behavior steps, and records corresponding behavior data to realize corresponding object behaviors.
The behavior data of the four main behavior nodes accords with a preset constraint relation, and the constraint relation can be understood as a relation equation between the data or a constraint relation between upper and lower stages. And connecting different main behavior nodes through a preset constraint relation, so as to realize corresponding object behaviors. It can be appreciated that in different transaction behavior scenarios, different master behavior nodes conform to different constraint relationships. In some embodiments, the constraint relationship may be a relationship equation, or may be a linkage relationship between different master behavior nodes, for example, after a master behavior node is triggered, whether other master behavior nodes are triggered and actions performed after the master behavior node is triggered.
In some embodiments, the constraint relationship may be, for example, an equation relationship between any two or more main behavior nodes constructed based on the object behavior requirement, or may be a sequential relationship for completing the data transmission of the current behavior between different main behavior nodes, a data flow direction relationship, and the like, and complete the object behavior together based on the data transmission coordination between different behavior nodes.
In the embodiment, the behavior architecture is constructed through the constraint relation among the four distributed main behavior nodes, so that the construction method of the behavior architecture is more simplified, the constructed behavior architecture is concise and not redundant, and the efficiency of executing things is improved.
In some embodiments, when the behavior architecture is applied to a crisis system, each master behavior node in the distributed behavior architecture represents each processing module in the crisis system, and may be, for example, a terminal processing module, a transaction response processing module, a monitoring processing module, and a media processing module. When the user triggers the terminal processing module, the dangerous situation information is sent at the moment, and the object processing module, the monitoring processing module and the media processing module can simultaneously receive the dangerous situation information and store the dangerous situation information through the block chain. Because after the terminal processing module is triggered, other processing modules connected with the terminal processing module are also triggered simultaneously in response to the triggered signals of the terminal, after the corresponding signals are received, the corresponding triggering events are executed based on the received signals, and the processing and conversion of the behavior data information are realized in the process.
For example, the dangerous event corresponds to a robbery event, the behavior architecture includes four main behavior nodes, the four main behavior nodes can be specifically a terminal processing module, a thing processing module, a monitoring module and a media module, the four main behavior nodes are in distributed connection, and any two main behavior nodes can be in communication connection. When a user triggers a robbery instruction at a terminal device (such as a mobile phone APP), because the four main behavior nodes are in distributed connection, the robbery instruction is transmitted to a things processing module (such as a police module), a monitoring module (such as a monitoring organization module for monitoring police) and a media module at the same time, so that three different main behavior node modules conforming to a preset constraint relation receive the robbery instruction at the same time, and then execute corresponding triggering events to realize processing and conversion of behavior data information. For example, the local police is the first responsible person of the dangerous event, corresponding processing measures need to be executed, and a monitoring mechanism of the local police can monitor the processing behaviors of the first responsible person in real time and monitor the robbery event in time. Similarly, the media module can also acquire the dynamic and processing behaviors of the robbery event in real time, and monitor the behaviors of the first responsible person in time. The disclosure, transparency and fairness of event processing are ensured.
In some embodiments, the behavior architecture can be applied to the medical event field, the four main behavior nodes of the behavior architecture can be specifically different organs of a body, and the four main behavior nodes are connected in a distributed manner, any two main behavior nodes can mutually influence, for example, when any one organ is malfunctioned, other organs can be influenced accordingly.
The behavior architecture provided by the application is a universal architecture, corresponding main behavior nodes and sub behavior nodes can be obtained based on behavior characteristics of different behaviors, constraint relations among the different behavior nodes are constructed, the corresponding behavior architecture is further constructed, processing and information conversion of arbitrary behavior data can be realized based on the behavior architecture, further processing results are obtained, and processing efficiency of object behaviors is improved.
As shown in FIG. 5, if the behavior architecture is expressed in abstract terms, the behavior architecture can be understood as a regular tetrahedral structure, with each corner of the regular tetrahedral representing a primary behavior node, e.g., point P, point C, point A, point B. In a specific object processing process, each main behavior node can be used for storing corresponding type of behavior data, different main behavior nodes are connected to form a communication channel, and are connected to form object planes, and the four planes form a regular tetrahedron structure. When any one of the main behavior nodes is triggered, the other behavior node connected with the main behavior node can be triggered through any one communication channel, and rapid response and information processing on the triggering event can be realized.
In some embodiments, one or more of the main behavior nodes further includes at least one child behavior node, where child behavior data corresponding to the child behavior node and behavior data corresponding to the main behavior node conform to a preset constraint relationship.
In a specific embodiment, the main behavior node can be understood as a father node of the child behavior node, and when a constraint relation corresponding to a specific object is constructed, the determined constraint relation is more accurate and reasonable by introducing the association relation between the main behavior node and the child behavior node.
It should be noted that, in the behavior architecture, all the main behavior nodes are not limited to correspond to the sub behavior nodes, but the number of the sub behavior nodes can be flexibly set according to the actual object requirement.
In the above embodiment, the main behavior node in the behavior architecture may further include a sub behavior node, where a certain constraint relationship is also met between the sub behavior node and the main behavior node, so that the object construction can be applied to more complex object scenes, and different object scenes can be constructed based on the constraint relationship between the main behavior node and the sub behavior node, thereby further improving the applicability of the behavior architecture.
For example, when the thing corresponds to a crisis scenario, the master behavior node includes a police node, a media node, where the child behavior node of the police node may be a police node, and the media node may not have a corresponding child behavior node.
In some embodiments, the child behavior node includes child behavior data; and constructing a constraint relation between the main behavior node and other main behavior nodes based on the main behavior data of the main behavior node and the sub behavior data of the sub behavior nodes.
Specifically, the constraint relation includes a relation between a main behavior node and its corresponding sub behavior node, and the constraint relation also includes a constraint relation between different main behavior nodes.
For example, in the behavior architecture corresponding to the dangerous situation, the behavior nodes can be different functional departments, and the constraint relation between the different functional departments can be understood as the relation between the upper level and the lower level, but the behavior architecture form can ensure that the functional departments of different levels can mutually monitor, so that the transparency and the efficiency of processing the dangerous event can be promoted.
For example, in a dangerous scenario, after a dangerous event is triggered, an information event triggered by an end user may be transmitted to other behavior nodes at a first time, so that the other behavior nodes may receive the latest information of the event at the first event and perform corresponding processing. In addition, by standardizing and structuring the flow of dangerous event processing, the operational space is reduced, and events are prevented from being processed fairly and transparently due to manual operation.
For example, in the medical field, each behavior node of the behavior architecture may be specifically a main organ of a body, so, by pre-constructing a health relationship between organs, as long as a state of one organ changes, state changes of other organs associated with the one organ can be located at a first time, thereby assisting a user to more intelligently perceive the change of the body.
Through the constraint relationships of the multiple types, different main behavior nodes can be more accurately associated based on actual demands of different thing behaviors, and corresponding information conversion is cooperatively executed.
In some embodiments, the master behavior nodes have different trigger priorities, and in response to any one or more of the master behavior nodes being triggered, the other master behavior nodes are triggered to execute a preset information conversion action based on the corresponding trigger priority order, so as to generate an information conversion trigger event.
Trigger priorities of different master behavior nodes may be set based on different transaction requirements. For example, for different things, four distributed arranged master behavior nodes may have different priorities of things, so that different trigger priorities may be configured for the master behavior nodes, and when any one of the master behavior nodes is triggered, different master behavior nodes are triggered based on the sequence corresponding to the trigger priorities, so as to implement sequential execution of corresponding things behaviors.
In some embodiments, the master behavior node may further include one or a sub behavior node, and in practice, each master behavior node or sub behavior node may be configured based on a difference of things, whether and when, and a priority of the triggering, and the like. If a master behavior node corresponds to one of the branches, then different branches may have different priorities, so that in an actual scenario, it may be determined whether a branch is triggered based on the priorities corresponding to the different branches.
In some embodiments, after the master behavior node is triggered, the method further comprises: and storing the information conversion event generated after the master behavior node is triggered and the information conversion event generated after other master behavior nodes are synchronously triggered and execute the preset information conversion action into a blockchain. The data can be prevented from being tampered through the block chain storage, and transparency and fairness in the execution process of the things are guaranteed.
In some embodiments, further comprising: a method for verifying behavioral information conversion compliance, the method comprising: acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data; when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior; and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior.
The behavior architecture may also be used to detect normalization of information transformations. Specifically, the information conversion of compliance should meet certain specification requirements. For example, after the object behavior is executed, a behavior data packet is generated, and whether the data in the behavior data packet meets the preset data type and data relation is checked to judge the compliance of the information conversion. When the behavior data packet of an event comprises a preset data type and a preset data relationship, judging that the information is converted into a compliance behavior, otherwise, judging that the information is converted into an non-compliance behavior. The data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data.
In the above embodiment, in order to further improve flexibility, suitability and universality of the behavior architecture, different object priorities may be configured for each main behavior node and each sub behavior node, so that when different behavior nodes are triggered according to the sequence corresponding to the priorities, and further, objects can be controlled to be executed correctly and smoothly.
In some embodiments, the type of things that each information transformation needs to include, and the association and precedence relationships between different rows of data need to be predefined. If the behavior data generated after the information conversion is executed accords with the predefined behavior data type, the association relation and the precedence relation, the process of executing the information conversion is proved to accord with the predefined normative process, so that the compliance of the information conversion can be reversely presumed based on the subsequently generated data packet.
In the above embodiment, the behavior architecture is pre-built, and the constraint relationships between the main behavior nodes and the sub behavior nodes in the behavior architecture are customized based on different object requirements, so that the method is applicable to most objects. Such a generic behavior architecture greatly improves the efficiency of things. And, can also reverse the normative verification thing action execution based on the action data packet that produces after the information conversion is carried out.
In the above embodiment, not only the corresponding information conversion may be executed based on the behavior architecture, but also the compliance of the information conversion may be detected based on the behavior architecture, and only the information conversion conforming to the constraint relationship in the behavior architecture is the compliance behavior, where the implementation of the constraint relationship in the behavior data may be understood as the data type and the data association relationship in the data packet, and only the information conversion corresponding to the data packet conforming to the preset relationship is the compliance behavior.
In some embodiments, the behavior architecture is used for dangerous events, and the behavior architecture comprises a terminal module, a function module, a supervision module and a media module. When the terminal module triggers the dangerous event, at the moment, personal information, personal positions, real-time images, appeal and the like of the alarm person can be recorded in the terminal module, and based on the restriction relation among all the main behavior nodes, the information corresponding to the dangerous event can be transmitted to other main behavior nodes and/or sub-behavior nodes after being processed to a certain degree. And after other child behavior nodes and/or child behavior nodes receive the corresponding dangerous event information, executing corresponding information conversion actions.
In some embodiments, the object structure may further include an information collection module, which is configured to collect, for example, a scene where the terminal is located or personal information of the terminal user, where the terminal corresponds to the personal user, and when a dangerous situation event occurs, the information collection module at this time may be configured to capture or identify face information of the user, capture or identify environmental information where the user is located, and process the collected information through a preset algorithm, so as to obtain identity information of the user and details of the dangerous situation event in the environment where the user is located, for example, identify corresponding dangerous situation scenes including robbery scenes, traffic accident scenes, falling scenes, and so on based on things in the environment, relationships among things, actions, and so on. And triggering corresponding object behavior actions based on the object scene obtained after analysis, and timely storing the obtained information into a block chain.
The behavior architecture can be abstractly understood into a regular tetrahedron structure, the regular tetrahedron structure comprises four main behavior nodes distributed, and different main behavior nodes can be in communication connection, so that information transmission is realized, the efficiency of data transmission can be ensured, the transparency of the data transmission can be ensured, and the traceability of the data can be ensured or improved to the greatest extent.
In some embodiments, the present application also provides a transaction processing method, the method comprising: receiving a thing requirement, wherein the thing requirement comprises a plurality of types of behavior data; extracting a main behavior node of the object demand based on the association relation between different types of behavior data; and constructing a thing structure based on the extracted main behavior nodes and the association relations between the main behavior nodes, wherein the thing structure carries out thing processing on main behavior data corresponding to each main behavior node and the association relations between the main behavior data.
In some embodiments, the number of corresponding behavior nodes and the connection relationship between different behavior nodes may be determined based on a behavior scenario, where the behavior nodes include a main behavior node and a sub behavior node.
In an actual object scene, based on a received specific object demand, extracting main behavior nodes corresponding to the object from the received specific object demand, constructing a constraint relation between the main behavior nodes, further obtaining a behavior framework corresponding to the object demand, and executing corresponding information conversion based on the behavior framework.
As shown in fig. 4, the present application also provides an apparatus for verifying behavior information conversion compliance, the apparatus comprising:
the acquiring module 401 is configured to acquire a behavior data packet corresponding to behavior information conversion, and determine a data type and a data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data;
a first judging module 402, configured to judge that the behavior information conversion is a non-compliance behavior when the data type and/or the data relationship do not satisfy a preset condition;
a second judging module 403, configured to judge that the behavior information conversion is a compliance behavior when the data type and the data relationship satisfy a preset condition.
The application also provides a device for converting behavior information, which comprises:
the receiving module is used for receiving the behavior information conversion requirement;
the construction module is used for constructing a behavior architecture based on the main behavior nodes included in the behavior information conversion requirement and the association relation between the main behavior nodes;
and the event generation module is used for responding to the triggering of any one or more of the main behavior nodes in the behavior framework, triggering other main behavior nodes synchronously and executing a preset information conversion action, and generating an information conversion event.
The present application also provides an electronic device including:
a memory for storing executable instructions; the method comprises the steps of,
a processor for displaying with the memory to execute the executable instructions to perform a behavioral underlying logic thought-based information transformation method or a method for verifying behavioral information transformation compliance.
The present application also provides a computer-readable storage medium storing computer-readable instructions that, when executed, perform a method of information conversion based on behavioral underlying logic thinking or a method for verifying behavioral information conversion compliance.
Fig. 6 illustrates a physical schematic diagram of an electronic device, as shown in fig. 6, which may include: processor 610, communication interface (Communications Interface) 620, memory 630, and communication bus 640, wherein processor 610, communication interface 620, and memory 630 communicate with each other via communication bus 640. The processor 410 may invoke logic instructions in the memory 630 to perform a method for verifying behavior information conversion compliance, the method comprising: acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data; when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior; and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior. The processor 610 may invoke logic instructions in the memory 630 to perform a behavior-based underlying logic thought information conversion method comprising: receiving behavior information conversion requirements; constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement; in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
Further, the logic instructions in the memory 630 may be implemented in the form of software functional units and stored in a computer-readable storage medium when sold or used as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Further, the present application also provides a computer program product, where the computer program product includes a computer program, where the computer program can be stored on a non-transitory computer readable storage medium, and when the computer program is executed by a processor, the computer can execute an information conversion method based on a behavior bottom layer logic thinking provided by the foregoing method embodiments, where the method includes: receiving behavior information conversion requirements; constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement; in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
In another aspect, an embodiment of the present application further provides a non-transitory computer readable storage medium, on which a computer program is stored, where the computer program is implemented when executed by a processor to perform an information conversion method based on a behavior bottom layer logic thinking provided in the foregoing embodiments, where the method includes: receiving behavior information conversion requirements; constructing a behavior architecture based on the association relationship between the main behavior nodes included in the behavior information conversion requirement; in the behavior architecture, any one or more of the master behavior nodes are triggered, and other master behavior nodes are synchronously triggered and execute preset information conversion actions to generate an information conversion event.
In another aspect, embodiments of the present application also provide a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, is implemented to perform a method for verifying behavior information conversion compliance provided by the above embodiments, the method comprising: acquiring a behavior data packet corresponding to behavior information conversion, and determining the data type and the data relationship in the behavior data packet; the data relationship comprises an incidence relationship and a precedence relationship among different types of behavior data; when the data type and/or the data relationship do not meet a preset condition, judging that the behavior information conversion is an irregular behavior; and when the data type and the data relation meet a preset condition, judging that the behavior information conversion is a compliance behavior.
The apparatus embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present application without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product, which may be stored in a computer-readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the various embodiments or methods of some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.
The above embodiments are only for illustrating the present application, and are not limiting of the present application. While the application has been described in detail with reference to the embodiments, those skilled in the art will appreciate that various combinations, modifications, or equivalent substitutions can be made to the technical solutions of the present application without departing from the spirit and scope of the technical solutions of the present application, and it is intended to be covered by the scope of the claims of the present application.

Claims (4)

1. A critical system, comprising: the dangerous system comprises four independent main behavior nodes distributed, the four main behavior nodes are distributed and connected, any two main behavior nodes are in communication connection, each main behavior node represents each processing module in the dangerous system, the processing modules comprise a terminal processing module, a thing response processing module, a supervision processing module and a media processing module, the connection relation between any two different main behavior nodes is constructed based on the behavior relation between different main behavior nodes, an information acquisition module in the terminal processing module is used for acquiring the scene of the terminal or the personal information of the terminal user, shooting or identifying the face information of the user, shooting or identifying the environment information of the user, processing the acquired information through a preset algorithm, obtaining identity information of a user and details of dangerous events in an environment where the user is located at the moment, determining a dangerous situation scene corresponding to action recognition based on things and relations among the things in the dangerous situation scene detail environment, wherein the dangerous situation scene comprises one of a robbery scene, a traffic accident scene and a fall scene, triggering corresponding things action based on the analyzed things scene, timely storing the obtained information into a blockchain, when the user triggers the terminal processing module, sending the dangerous situation information at the moment, and simultaneously receiving the dangerous situation information by the things response processing module, the monitoring processing module and the media processing module and storing the dangerous situation information through the blockchain, and because after the terminal processing module is triggered, other processing modules connected with the terminal processing module are simultaneously triggered in response to a triggered signal of the terminal, when the corresponding signals are received, corresponding trigger events are executed based on the received signals, and the processing and conversion of behavior data information are realized in the process;
each main behavior node is used for storing different types of behavior data, under the connection relation between different main behavior nodes, the different types of behavior data conform to preset constraint relation, the constraint relation comprises a relation equation between the different types of behavior data or a linkage relation between the different main behavior nodes, and the linkage relation comprises whether other main behavior nodes are triggered after the main behavior nodes are triggered and actions executed after the main behavior nodes are triggered;
and responding to the fact that any one or four main behavior nodes are triggered, triggering other main behavior nodes connected with the main behavior nodes synchronously and executing preset information conversion actions, and generating an information conversion event, wherein the main behavior nodes have different triggering priorities, responding to the fact that any one or more main behavior nodes are triggered, triggering other main behavior nodes to execute the preset information conversion actions based on the corresponding triggering priority order, and generating the information conversion event, wherein the information conversion event comprises executing the corresponding triggering event after responding to the fact that the other main behavior nodes are triggered, and the information conversion event comprises processing and converting behavior data information to realize processing of dangerous events.
2. The crisis system of claim 1, wherein the master behavior node further comprises at least one child behavior node, and the child behavior data corresponding to the child behavior node and the master behavior data corresponding to the master behavior node conform to a preset constraint relationship.
3. The crisis system of claim 1, further comprising, after the master behavioral node is triggered:
and storing the information conversion event generated after the master behavior node is triggered and the information conversion event generated after other master behavior nodes are synchronously triggered and execute the preset information conversion action into a blockchain.
4. A crisis system according to any one of claims 1 to 3, wherein the number of corresponding behavior nodes and the connection relationship between different behavior nodes are determined based on a behavior scenario, and the behavior nodes include a main behavior node and a sub behavior node.
CN202211073594.XA 2022-09-02 2022-09-02 Behavior and information detection method taking regular tetrahedral architecture as logic thinking Active CN115439932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211073594.XA CN115439932B (en) 2022-09-02 2022-09-02 Behavior and information detection method taking regular tetrahedral architecture as logic thinking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211073594.XA CN115439932B (en) 2022-09-02 2022-09-02 Behavior and information detection method taking regular tetrahedral architecture as logic thinking

Publications (2)

Publication Number Publication Date
CN115439932A CN115439932A (en) 2022-12-06
CN115439932B true CN115439932B (en) 2023-10-10

Family

ID=84247210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211073594.XA Active CN115439932B (en) 2022-09-02 2022-09-02 Behavior and information detection method taking regular tetrahedral architecture as logic thinking

Country Status (1)

Country Link
CN (1) CN115439932B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674461A (en) * 2008-09-11 2010-03-17 上海市长宁区少年科技指导站 Intelligent network monitoring system for safety of primary and secondary school campuses
CN203057346U (en) * 2012-06-18 2013-07-10 电子科技大学 Public place emergent event handling system
CN106523020A (en) * 2016-11-26 2017-03-22 辽宁工程技术大学 Coal mine fire emergency disposal method
CN106530169A (en) * 2016-09-18 2017-03-22 广东建邦计算机软件股份有限公司 City event processing method and device
CN111738372A (en) * 2020-08-26 2020-10-02 中国科学院自动化研究所 Distributed multi-agent space-time feature extraction method and behavior decision method
CN112733798A (en) * 2021-01-22 2021-04-30 上海高诚智能科技有限公司 Flood control emergency management system and method for dike facilities

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9330262B2 (en) * 2012-09-21 2016-05-03 University Of Limerick Systems and methods for runtime adaptive security to protect variable assets
US9386034B2 (en) * 2013-12-17 2016-07-05 Hoplite Industries, Inc. Behavioral model based malware protection system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674461A (en) * 2008-09-11 2010-03-17 上海市长宁区少年科技指导站 Intelligent network monitoring system for safety of primary and secondary school campuses
CN203057346U (en) * 2012-06-18 2013-07-10 电子科技大学 Public place emergent event handling system
CN106530169A (en) * 2016-09-18 2017-03-22 广东建邦计算机软件股份有限公司 City event processing method and device
CN106523020A (en) * 2016-11-26 2017-03-22 辽宁工程技术大学 Coal mine fire emergency disposal method
CN111738372A (en) * 2020-08-26 2020-10-02 中国科学院自动化研究所 Distributed multi-agent space-time feature extraction method and behavior decision method
CN112733798A (en) * 2021-01-22 2021-04-30 上海高诚智能科技有限公司 Flood control emergency management system and method for dike facilities

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Ziaur Rahman 等.Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System.《EEE Communications Magazine》.2021,128-134. *
苑盛成.基于多智能体的大规模紧急疏散仿真系统研究.《中国优秀硕士学位论文全文数据库信息科技辑》.2013,(第08期),I138-715. *
董春桥.面向突发事件的智能建筑管理系统集成的研究.《中国博士学位论文全文数据库工程科技Ⅱ辑》.2008,(第03期),C038-12. *

Also Published As

Publication number Publication date
CN115439932A (en) 2022-12-06

Similar Documents

Publication Publication Date Title
CN109902446B (en) Method and apparatus for generating information prediction model
CN107168844B (en) Performance monitoring method and device
CN110740077B (en) Simulation system heterogeneity testing system, method and device based on network packet capturing
CN111467074B (en) Method and device for detecting livestock status
CN111918039A (en) Artificial intelligence high risk operation management and control system based on 5G network
CN108449571A (en) A kind of car monitoring method and equipment
CN114168429A (en) Error reporting analysis method and device, computer equipment and storage medium
CN115439932B (en) Behavior and information detection method taking regular tetrahedral architecture as logic thinking
CN114051116A (en) Video monitoring method, device and system for driving test vehicle
CN117435999A (en) Risk assessment method, apparatus, device and medium
Priovolos et al. Using anomaly detection techniques for securing 5G infrastructure and applications
CN110210215A (en) A kind of method and relevant apparatus of viral diagnosis
CN112419638B (en) Method and device for acquiring alarm video
CN112395695A (en) Method and system for establishing simulation scene in real time
CN113726779A (en) Rule false alarm test method and device, electronic equipment and computer storage medium
CN107295087B (en) System and method for realizing data aggregation between network systems
CN117749836B (en) Internet of things terminal monitoring method and system based on artificial intelligence
CN111476086A (en) Smoke and fire identification method and device, computer equipment and readable storage medium
CN110175456A (en) Software action sampling method, relevant device and software systems
CN112667671B (en) Road network data processing method and device, computer equipment and storage medium
CN118094640B (en) Data security transmission monitoring system and method based on AI federal learning
CN116468214B (en) Evidence electronization method and electronic equipment based on fault event processing process
CN117539674B (en) Exception handling method, device, equipment and storage medium
CN117456610B (en) Climbing abnormal behavior detection method and system and electronic equipment
CN115424348A (en) Dangerous situation behavior monitoring and rapid coping method based on regular tetrahedron framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant