CN116320324B - Intelligent park security visual management system and method - Google Patents

Intelligent park security visual management system and method Download PDF

Info

Publication number
CN116320324B
CN116320324B CN202310550227.2A CN202310550227A CN116320324B CN 116320324 B CN116320324 B CN 116320324B CN 202310550227 A CN202310550227 A CN 202310550227A CN 116320324 B CN116320324 B CN 116320324B
Authority
CN
China
Prior art keywords
monitoring device
screening
general
real
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310550227.2A
Other languages
Chinese (zh)
Other versions
CN116320324A (en
Inventor
骆虹
胡勇锋
谢建平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Caigen Technology Industry Development Co ltd
Original Assignee
Zhejiang Caigen Technology Industry Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Caigen Technology Industry Development Co ltd filed Critical Zhejiang Caigen Technology Industry Development Co ltd
Priority to CN202310550227.2A priority Critical patent/CN116320324B/en
Publication of CN116320324A publication Critical patent/CN116320324A/en
Application granted granted Critical
Publication of CN116320324B publication Critical patent/CN116320324B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a visual security management system and method for an intelligent park, which belong to the technical field of security management and specifically comprise the following steps: screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and dividing the monitoring devices into a general monitoring device and a core monitoring device based on real-time evaluation indexes of the screening monitoring devices; the method comprises the steps of displaying images of a core monitoring device in real time through a visual terminal, determining analysis frequency of a general monitoring device based on priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain analysis results, and determining whether to display the images in real time through the visual terminal based on the analysis results, so that differentiated management and visual display of the security monitoring device are achieved.

Description

Intelligent park security visual management system and method
Technical Field
The application relates to the technical field of security management, in particular to a visual security management system and method for an intelligent park.
Background
In order to realize security management to the wisdom garden, often carry out real time monitoring analysis, carry out real time monitoring and periodic equipment self-checking, carry out real-time linkage control to the security of garden access control to the fire control environment of garden through the unusual condition and the action to the garden respectively among the prior art scheme to realized the comprehensive analysis and the management to the security state of wisdom garden.
However, the object and sequence of the intelligent analysis of the different monitoring data are not considered in combination with the type of the park, so if the object and sequence of the intelligent analysis of the monitoring data cannot be determined in combination with the type of the park, the real-time performance of security management is affected to a certain extent, meanwhile, the analysis of the important monitoring data is not considered in combination with the historical data, generally, the probability of the occurrence of the potential safety hazard again is obviously larger for the monitoring device with the potential safety hazard in the history than for the monitoring device without the potential safety hazard in the history, and therefore, if the historical data cannot be combined, the discovery and the treatment of the potential safety hazard cannot be guaranteed in time.
The application provides a visual security management system and method for an intelligent park.
Disclosure of Invention
In order to achieve the purpose of the application, the application adopts the following technical scheme:
in a first aspect, a visual security management method for an intelligent park is provided.
A visual management method for security protection of an intelligent park is characterized by comprising the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Optionally, the screening and monitoring device determines the security management object of the intelligent park according to the type of the intelligent park, and performs the determination of the screening and monitoring device based on the security management object, wherein the security management object comprises personnel, articles and a fire-fighting environment.
Optionally, the specific steps of determining the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
Optionally, the access control type includes an access control which can be accessed without identity verification and an access control which can be accessed only by identity verification, and when the access control type is the access control which can be accessed without identity verification, the screening monitoring device is determined to be the alternative core monitoring device.
Optionally, the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, the priority of a specific general monitoring device includes a priority level, a sub-priority level and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed in a mapping manner based on the priority.
Optionally, when the security problem is found based on the analysis result, the image of the general monitoring device and the security problem are displayed in real time through a visual terminal.
In a second aspect, an embodiment of the present application provides a visual management system for security protection of an intelligent park, where the visual management method for security protection of an intelligent park specifically includes:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
In a third aspect, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer causes the computer to perform a smart park security visualization management method as described above.
The application has the beneficial effects that:
the intelligent park type screening monitoring device is combined to screen the monitoring device, screening of the screening monitoring device is achieved based on the intelligent park type, differentiated management of the monitoring device is achieved, the technical problem that analysis efficiency is low due to dynamic identification of all monitoring devices is avoided, an image analysis method is determined based on the installation position of the screening monitoring device, confirmation of the image analysis method according to the requirement difference of the screening monitoring device is achieved, and image analysis efficiency, pertinence and accuracy are guaranteed.
The real-time requirements of the screening monitoring device are determined based on the real-time evaluation indexes, and the monitoring device is divided into a general monitoring device and a core monitoring device based on the real-time requirements, so that the monitoring device is divided from the difference of the real-time requirements, the evaluation and analysis efficiency of the core monitoring device is ensured, and a foundation is further laid for the image analysis and display of the difference.
The priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device, so that the further screening of the core monitoring device is realized, and the comprehensive screening of the core monitoring device is ensured by combining the historical monitoring data of the general monitoring device.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present application will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings;
FIG. 1 is a flow chart of a method for intelligent campus security visualization management;
fig. 2 is a view showing the constitution of the real-time performance requirement evaluation index;
FIG. 3 is a flowchart showing specific steps in the construction of real-time requirements of a screening monitoring device;
FIG. 4 is a flowchart of specific steps of priority determination of a generic monitoring device;
fig. 5 is a frame diagram of a smart park security visualization management system.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present disclosure.
In order to solve the above problems, as shown in fig. 1, according to one aspect of the present application, there is provided a visual management method for security protection of an intelligent park, which is characterized in that the method specifically includes:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
specifically, the screening monitoring device determines security management objects of the intelligent park according to the type of the intelligent park, and performs screening monitoring device determination based on the security management objects, wherein the security management objects comprise personnel, articles and fire environments.
The specific steps of the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
In this embodiment, the screening of the screening monitoring device is performed by combining the types of the intelligent park, so that the screening of the screening monitoring device based on the types of the intelligent park is realized, the differential management of the monitoring devices is realized, the technical problem of low analysis efficiency caused by dynamic identification of all the monitoring devices is avoided, and the image analysis method is determined by determining the installation position of the screening monitoring device, so that the confirmation of the image analysis method according to the requirement difference of the screening monitoring device is realized, and the efficiency, pertinence and accuracy of image analysis are ensured.
Determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
as shown in fig. 2, the real-time performance requirement evaluation index includes:
when the security management object is a person, the real-time performance requirement evaluation index comprises the flow of people, the number of access control, the type of access control and the access control verification mode in a set time;
when the security management object is an article, the real-time requirement evaluation index is the number of the articles, the type of the articles, the flow of people in a set time and the storage mode of the articles;
when the security management object is a fire-fighting environment, the real-time performance requirement evaluation index comprises inflammable matter types and inflammable matter amounts.
Specifically, as shown in fig. 3, when the security management object is a person, the specific steps of constructing the real-time requirement of the screening and monitoring device are as follows:
s21, acquiring the traffic of the gateway corresponding to the screening monitoring device within a set time, determining whether the screening monitoring device is a core monitoring device or not based on the traffic, if so, constructing the real-time requirement of the core monitoring device by using the traffic, and if not, entering step S22;
when the flow rate of people in the set time is greater than a certain amount, the importance of the people is higher, so that the people is set as a core monitoring device.
S22, acquiring an entrance guard type of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S23, and if not, entering a step S25;
it can be understood that the access control type comprises an access control which can be accessed without identity verification and an access control which can be accessed only by identity verification, and when the access control type is the access control which can be accessed without identity verification, the screening monitoring device is determined to be an alternative core monitoring device, namely, the security risk is higher at the moment.
S23, acquiring an entrance guard verification mode of an entrance corresponding to the screening monitoring device to determine whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S24, and if not, entering a step S25;
it can be understood that when the entrance guard verification mode of the entrance corresponding to the screening monitoring device is simpler and the entrance guard can be accessed without more complicated verification, the entrance guard is determined to belong to the alternative core monitoring device, and specific examples include easy verification such as entrance guard card identification
S24, acquiring the number of entrance guards of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is a core monitoring device, if so, constructing real-time requirements of the core monitoring device based on the number of entrance guards and the traffic, and if not, entering a step S25;
s25, constructing real-time requirements based on the people flow, the gate inhibition quantity, the gate inhibition type and the gate inhibition verification mode in the set time of the gate corresponding to the screening and monitoring device.
In this embodiment, the real-time requirement of the screening monitoring device is determined based on the real-time evaluation index, and the monitoring device is divided into a general monitoring device and a core monitoring device based on the real-time requirement, so that the division of the monitoring device from the difference of the real-time requirement is realized, the evaluation and analysis efficiency of the core monitoring device is ensured, and a foundation is further laid for the difference of image analysis and display.
The priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
as shown in fig. 4, the specific steps of determining the priority of the general monitoring device are as follows:
s31, obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
s32, determining whether the general monitoring device is a core monitoring device or not by utilizing the failure times of the general monitoring device, if not, entering a step S33, and if so, setting the general monitoring device as the core monitoring device;
s33, determining whether the general monitoring device is a core monitoring device or not by using the historical security problem number in the set time, if so, setting the general monitoring device as the core monitoring device, and if not, entering step S34;
s34, determining whether the general monitoring device is a core monitoring device or not based on the number of the historical security problems and the number of the historical serious security problems of the general monitoring device, if so, setting the general monitoring device as the core monitoring device, and if not, entering a step S35;
s35, based on the history monitoring data of the general monitoring device, the number of the history security problems, the number of faults, the number of the history serious security problems, the number of the history security problems in a set time and the real-time requirement of the general monitoring device are obtained to determine the priority of the general monitoring device.
It can be appreciated that the priority of the general monitoring device is determined by adopting a prediction model based on FOA-SVR, wherein the specific steps of constructing the prediction model are as follows:
step 1: initializing parameters. The method comprises the steps of selecting a value range of SVR parameters [ C, g ], and selecting population scale, position, iteration number and the like of drosophila;
step 2: calculating the distance from an individual to an origin, taking the reciprocal of the distance as a taste concentration determination value, and assigning values to SVR parameters C and g;
step 3: taking the accuracy of the support vector machine 5-fold cross validation as an fitness function to obtain a drosophila concentration value;
step 4: finding out the optimal drosophila and storing the taste concentration and position information of the optimal drosophila;
step 5: iterative optimization is carried out until a termination condition is met;
step 6: outputting the optimal parameter combination.
In the FOA, the drosophila updates the individual positions around the best drosophila with a certain step size, and then calculates a taste concentration determination value from the positions where it is located, to obtain a candidate solution. The choice of strategy affects the progress of the search considerably and our desired results. The updating of the position of the drosophila in the original strategy is influenced by the optimal position and the step length of the drosophila, so that the drosophila is easy to sink into the regional extremum and the searching time is prolonged. Sine and cosine searching is adopted in the sine and cosine algorithm, and the sine or cosine is randomly selected to update the position information, so that the position information oscillates towards the optimal solution or flies outwards. Such a wave search method can not only reduce the search time, but also avoid obtaining results that are only regional extrema. Aiming at the defects of the original searching scheme and the advantages of the sine and cosine strategy, the application provides a method for improving the convergence rate by using the sine and cosine strategy instead of randomly generated direction and distance, solves the problem that the obtained result is only a regional extremum, and uses a specific formula of sine and cosine searching as follows:
wherein: g is the number of iterations, < >>Represents the position of the ith fruit fly in the jth dimension of the g iteration, +.>R is the current optimal position 1 ,r 2 ,r 3 、r 4 Is a random parameter, where r 1 The calculation formula of (2) is as follows:
where a=2, t is the maximum number of iterations, t is the current number of iterations, and P is a random number between 0 and 1.
It is understood that when the priority of the general monitoring device is greater than the set priority, the general monitoring device is determined to be a core monitoring device.
In this example, the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device, so that further screening of the core monitoring device is realized, and the comprehensive screening of the core monitoring device is ensured by combining the historical monitoring data of the general monitoring device.
And displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Specifically, for example, the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, where the priority of the specific general monitoring device includes a priority level, a sub-priority level, and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed by using a mapping manner based on the priority.
Specifically, when the security problem is found based on the analysis result, the image of the general monitoring device and the security problem are displayed in real time through the visual terminal.
On the other hand, as shown in fig. 5, the embodiment of the present application provides a visual management system for security protection of an intelligent park, which adopts the visual management method for security protection of an intelligent park, and specifically includes:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
In another aspect, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer, causes the computer to perform a smart park security visualization management method as described above.
The visual management method for security protection of the intelligent park specifically comprises the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Specifically, the specific steps of determining the priority of the general monitoring device are as follows:
s311, obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
s312, when the general monitoring device is determined to not belong to the core monitoring device by utilizing the failure times of the general monitoring device, and when the general monitoring device is determined to not belong to the core monitoring device by utilizing the historical security problem number in the set time, the general monitoring device is determined to not belong to the core monitoring device based on the historical security problem number and the historical serious security problem number of the general monitoring device, and then the next step is carried out;
s313, based on the history monitoring data of the general monitoring device, obtaining the number of the history security problems, the number of faults, the number of the history serious security problems, the number of the history security problems in a set time and real-time requirements of the general monitoring device, and determining the priority of the general monitoring device.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing is merely one or more embodiments of the present description and is not intended to limit the present description. Various modifications and alterations to one or more embodiments of this description will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, or the like, which is within the spirit and principles of one or more embodiments of the present description, is intended to be included within the scope of the claims of the present description.

Claims (8)

1. A visual management method for security protection of an intelligent park is characterized by comprising the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the screening monitoring device determines security management objects of the intelligent park according to the types of the intelligent park, and determines the screening monitoring device based on the security management objects, wherein the security management objects comprise personnel, articles and fire environments;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time requirement evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the real-time performance requirement evaluation index comprises:
when the security management object is a person, the real-time performance requirement evaluation index comprises the flow of people, the number of access control, the type of access control and the access control verification mode in a set time;
when the security management object is an article, the real-time requirement evaluation index is the number of the articles, the type of the articles, the flow of people in a set time and the storage mode of the articles;
when the security management object is a fire-fighting environment, the real-time performance requirement evaluation index comprises inflammable matter types and inflammable matter amounts;
when the security management object is a person, the specific steps of constructing the real-time requirement of the screening and monitoring device are as follows:
s21, acquiring the traffic of the gateway corresponding to the screening monitoring device within a set time, determining whether the screening monitoring device is a core monitoring device or not based on the traffic, if so, constructing the real-time requirement of the core monitoring device by using the traffic, and if not, entering step S22;
s22, acquiring an entrance guard type of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S23, and if not, entering a step S25;
s23, acquiring an entrance guard verification mode of an entrance corresponding to the screening monitoring device to determine whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S24, and if not, entering a step S25;
s24, acquiring the number of entrance guards of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is a core monitoring device, if so, constructing real-time requirements of the core monitoring device based on the number of entrance guards and the traffic, and if not, entering a step S25;
s25, constructing real-time requirements based on the people flow, the gate inhibition quantity, the gate inhibition type and the gate inhibition verification mode in the set time of the gate corresponding to the screening and monitoring device;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
2. The visual management method for security protection of an intelligent park as set forth in claim 1, wherein the specific steps of determining the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
3. The visual management method of security in an intelligent park according to claim 1, wherein the access control type includes access control which can be accessed without identity verification and access control which can be accessed only by identity verification, and the screening monitoring device is determined to be an alternative core monitoring device when the access control type is access control which can be accessed without identity verification.
4. The visual management method for security protection of intelligent parks as claimed in claim 1, wherein the specific steps of determining the priority of the general monitoring device are as follows:
obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
determining whether the general monitoring device is a core monitoring device or not by using the failure times of the general monitoring device, if not, entering the next step, and if so, setting the general monitoring device as the core monitoring device;
determining whether the general monitoring device is a core monitoring device or not by using the number of the historical security problems in the set time, if so, setting the general monitoring device as the core monitoring device, and if not, entering the next step;
determining whether the general monitoring device is a core monitoring device or not based on the number of the historical security problems and the number of the historical serious security problems of the general monitoring device, if so, setting the general monitoring device as the core monitoring device, and if not, entering the next step;
and determining the priority of the general monitoring device based on the historical monitoring data of the general monitoring device, namely the number of historical security problems, the number of faults, the number of historical serious security problems, the number of historical security problems in a set time and the real-time requirement of the general monitoring device.
5. The visual security management method of claim 4, wherein the general monitoring device is determined to be a core monitoring device when the priority of the general monitoring device is greater than a set priority.
6. The visual security management method of claim 1, wherein the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, the priority of a specific general monitoring device comprises a priority level, a sub-priority level and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed in a mapping manner based on the priority.
7. The visual management method for security protection in an intelligent park according to claim 1, wherein when security protection problems are found based on the analysis result, the images of the general monitoring device and the security protection problems are displayed in real time through a visual terminal.
8. A visual management system for security protection of an intelligent park, which adopts the visual management method for security protection of an intelligent park according to any one of claims 1 to 7, and specifically comprises the following steps:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time requirement evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
CN202310550227.2A 2023-05-16 2023-05-16 Intelligent park security visual management system and method Active CN116320324B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310550227.2A CN116320324B (en) 2023-05-16 2023-05-16 Intelligent park security visual management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310550227.2A CN116320324B (en) 2023-05-16 2023-05-16 Intelligent park security visual management system and method

Publications (2)

Publication Number Publication Date
CN116320324A CN116320324A (en) 2023-06-23
CN116320324B true CN116320324B (en) 2023-08-11

Family

ID=86801646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310550227.2A Active CN116320324B (en) 2023-05-16 2023-05-16 Intelligent park security visual management system and method

Country Status (1)

Country Link
CN (1) CN116320324B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117218294B (en) * 2023-09-18 2024-04-12 东莞市东智创新科技有限公司 Park security equipment distribution management method based on three-dimensional modeling
CN117424987B (en) * 2023-12-15 2024-03-19 浙江数思信息技术有限公司 Intelligent building operation management method, system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006268504A (en) * 2005-03-24 2006-10-05 Matsushita Electric Works Ltd Monitoring system
JP2015159503A (en) * 2014-02-25 2015-09-03 株式会社日立ビルシステム Video monitoring system
CN109599782A (en) * 2018-12-17 2019-04-09 武汉泰可电气股份有限公司 Intelligent substation management system based on Internet of Things and intelligent recognition
CN110572617A (en) * 2019-09-24 2019-12-13 腾讯科技(深圳)有限公司 environment monitoring processing method and device and storage medium
KR102131437B1 (en) * 2020-03-09 2020-07-08 (주)지인테크 Adaptive video surveillance system and method
CN111405246A (en) * 2020-03-12 2020-07-10 高宽友 Smart city monitoring method and device and management terminal
CN112333241A (en) * 2020-10-13 2021-02-05 浙江安防职业技术学院 Intelligent security system based on big data service
CN113536901A (en) * 2021-05-31 2021-10-22 浙江大华技术股份有限公司 Target capturing method and related device
CN114630077A (en) * 2022-02-28 2022-06-14 高新兴科技集团股份有限公司 Monitoring equipment optimized deployment method, device, medium and equipment of event gathering place

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021093568A (en) * 2019-12-06 2021-06-17 キヤノン株式会社 Imaging apparatus, information processing apparatus, and method for controlling these, and program and learned model selection system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006268504A (en) * 2005-03-24 2006-10-05 Matsushita Electric Works Ltd Monitoring system
JP2015159503A (en) * 2014-02-25 2015-09-03 株式会社日立ビルシステム Video monitoring system
CN109599782A (en) * 2018-12-17 2019-04-09 武汉泰可电气股份有限公司 Intelligent substation management system based on Internet of Things and intelligent recognition
CN110572617A (en) * 2019-09-24 2019-12-13 腾讯科技(深圳)有限公司 environment monitoring processing method and device and storage medium
KR102131437B1 (en) * 2020-03-09 2020-07-08 (주)지인테크 Adaptive video surveillance system and method
CN111405246A (en) * 2020-03-12 2020-07-10 高宽友 Smart city monitoring method and device and management terminal
CN112333241A (en) * 2020-10-13 2021-02-05 浙江安防职业技术学院 Intelligent security system based on big data service
CN113536901A (en) * 2021-05-31 2021-10-22 浙江大华技术股份有限公司 Target capturing method and related device
CN114630077A (en) * 2022-02-28 2022-06-14 高新兴科技集团股份有限公司 Monitoring equipment optimized deployment method, device, medium and equipment of event gathering place

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄照翠 ; 陈晖 ; 张鹏亮 ; 王海涛 ; .一种异地多校区分布式智慧校园视频服务系统设计研究.中国教育信息化.2018,(第21期),全文. *

Also Published As

Publication number Publication date
CN116320324A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN116320324B (en) Intelligent park security visual management system and method
Tong et al. A review of assessment methods for cellular automata models of land-use change and urban growth
CN108564460B (en) Real-time fraud detection method and device in internet credit scene
CN113094758B (en) Gradient disturbance-based federated learning data privacy protection method and system
Mohler et al. Rotational grid, PAI‐maximizing crime forecasts
CN108494810A (en) Network security situation prediction method, apparatus and system towards attack
CN108334647A (en) Data processing method, device, equipment and the server of Insurance Fraud identification
CN109141453A (en) A kind of route guiding method and system
CN110503267B (en) Urban financial invasion case prediction system and prediction method based on space-time scale self-adaptive model
CN116304250B (en) Intelligent rule engine management method and system based on visual operation
CN110991262A (en) Multi-bandwidth geographical weighted regression cellular automata method for ecological service value prediction
CN107493268A (en) A kind of difference method for secret protection based on front position vector
CN109934074A (en) Movement track determines method and device
CN113902185A (en) Method and device for determining regional land property, electronic equipment and storage medium
CN109615414A (en) House property predictor method, device and storage medium
CN116129307A (en) Method, device, system and storage medium for managing visual personnel of closed scene
CN113111963A (en) Method for re-identifying pedestrian by black box attack
CN109697392A (en) Draw the method and device of target object thermodynamic chart
CN107832848A (en) application management method, device, storage medium and electronic equipment
CN115859765B (en) Urban expansion prediction method, device, equipment and storage medium
Bone et al. Incorporating spatio-temporal knowledge in an Intelligent Agent Model for natural resource management
CN109711450A (en) A kind of power grid forecast failure collection prediction technique, device, electronic equipment and storage medium
Ma et al. Acceptable costs of minimax regret equilibrium: a solution to security games with surveillance-driven probabilistic information
CN115860144A (en) Machine learning system for anti-electricity-stealing site
CN116843891A (en) Graphic outline detection method, device, storage medium, equipment and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant