CN116320324B - Intelligent park security visual management system and method - Google Patents
Intelligent park security visual management system and method Download PDFInfo
- Publication number
- CN116320324B CN116320324B CN202310550227.2A CN202310550227A CN116320324B CN 116320324 B CN116320324 B CN 116320324B CN 202310550227 A CN202310550227 A CN 202310550227A CN 116320324 B CN116320324 B CN 116320324B
- Authority
- CN
- China
- Prior art keywords
- monitoring device
- screening
- general
- real
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000000007 visual effect Effects 0.000 title claims abstract description 48
- 238000000034 method Methods 0.000 title abstract description 14
- 238000012806 monitoring device Methods 0.000 claims abstract description 319
- 238000012216 screening Methods 0.000 claims abstract description 104
- 238000004458 analytical method Methods 0.000 claims abstract description 56
- 238000011156 evaluation Methods 0.000 claims abstract description 28
- 238000003703 image analysis method Methods 0.000 claims abstract description 25
- 238000007726 management method Methods 0.000 claims description 60
- 238000012544 monitoring process Methods 0.000 claims description 22
- 238000012795 verification Methods 0.000 claims description 18
- 238000009434 installation Methods 0.000 claims description 12
- 230000005764 inhibitory process Effects 0.000 claims description 6
- 238000013507 mapping Methods 0.000 claims description 3
- 241000255581 Drosophila <fruit fly, genus> Species 0.000 description 9
- 238000010191 image analysis Methods 0.000 description 4
- 238000012800 visualization Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000255925 Diptera Species 0.000 description 1
- 241000255588 Tephritidae Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000002790 cross-validation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19645—Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
The application provides a visual security management system and method for an intelligent park, which belong to the technical field of security management and specifically comprise the following steps: screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and dividing the monitoring devices into a general monitoring device and a core monitoring device based on real-time evaluation indexes of the screening monitoring devices; the method comprises the steps of displaying images of a core monitoring device in real time through a visual terminal, determining analysis frequency of a general monitoring device based on priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain analysis results, and determining whether to display the images in real time through the visual terminal based on the analysis results, so that differentiated management and visual display of the security monitoring device are achieved.
Description
Technical Field
The application relates to the technical field of security management, in particular to a visual security management system and method for an intelligent park.
Background
In order to realize security management to the wisdom garden, often carry out real time monitoring analysis, carry out real time monitoring and periodic equipment self-checking, carry out real-time linkage control to the security of garden access control to the fire control environment of garden through the unusual condition and the action to the garden respectively among the prior art scheme to realized the comprehensive analysis and the management to the security state of wisdom garden.
However, the object and sequence of the intelligent analysis of the different monitoring data are not considered in combination with the type of the park, so if the object and sequence of the intelligent analysis of the monitoring data cannot be determined in combination with the type of the park, the real-time performance of security management is affected to a certain extent, meanwhile, the analysis of the important monitoring data is not considered in combination with the historical data, generally, the probability of the occurrence of the potential safety hazard again is obviously larger for the monitoring device with the potential safety hazard in the history than for the monitoring device without the potential safety hazard in the history, and therefore, if the historical data cannot be combined, the discovery and the treatment of the potential safety hazard cannot be guaranteed in time.
The application provides a visual security management system and method for an intelligent park.
Disclosure of Invention
In order to achieve the purpose of the application, the application adopts the following technical scheme:
in a first aspect, a visual security management method for an intelligent park is provided.
A visual management method for security protection of an intelligent park is characterized by comprising the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Optionally, the screening and monitoring device determines the security management object of the intelligent park according to the type of the intelligent park, and performs the determination of the screening and monitoring device based on the security management object, wherein the security management object comprises personnel, articles and a fire-fighting environment.
Optionally, the specific steps of determining the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
Optionally, the access control type includes an access control which can be accessed without identity verification and an access control which can be accessed only by identity verification, and when the access control type is the access control which can be accessed without identity verification, the screening monitoring device is determined to be the alternative core monitoring device.
Optionally, the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, the priority of a specific general monitoring device includes a priority level, a sub-priority level and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed in a mapping manner based on the priority.
Optionally, when the security problem is found based on the analysis result, the image of the general monitoring device and the security problem are displayed in real time through a visual terminal.
In a second aspect, an embodiment of the present application provides a visual management system for security protection of an intelligent park, where the visual management method for security protection of an intelligent park specifically includes:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
In a third aspect, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer causes the computer to perform a smart park security visualization management method as described above.
The application has the beneficial effects that:
the intelligent park type screening monitoring device is combined to screen the monitoring device, screening of the screening monitoring device is achieved based on the intelligent park type, differentiated management of the monitoring device is achieved, the technical problem that analysis efficiency is low due to dynamic identification of all monitoring devices is avoided, an image analysis method is determined based on the installation position of the screening monitoring device, confirmation of the image analysis method according to the requirement difference of the screening monitoring device is achieved, and image analysis efficiency, pertinence and accuracy are guaranteed.
The real-time requirements of the screening monitoring device are determined based on the real-time evaluation indexes, and the monitoring device is divided into a general monitoring device and a core monitoring device based on the real-time requirements, so that the monitoring device is divided from the difference of the real-time requirements, the evaluation and analysis efficiency of the core monitoring device is ensured, and a foundation is further laid for the image analysis and display of the difference.
The priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device, so that the further screening of the core monitoring device is realized, and the comprehensive screening of the core monitoring device is ensured by combining the historical monitoring data of the general monitoring device.
Additional features and advantages will be set forth in the description which follows, and in part will be apparent from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The above and other features and advantages of the present application will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings;
FIG. 1 is a flow chart of a method for intelligent campus security visualization management;
fig. 2 is a view showing the constitution of the real-time performance requirement evaluation index;
FIG. 3 is a flowchart showing specific steps in the construction of real-time requirements of a screening monitoring device;
FIG. 4 is a flowchart of specific steps of priority determination of a generic monitoring device;
fig. 5 is a frame diagram of a smart park security visualization management system.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present disclosure.
In order to solve the above problems, as shown in fig. 1, according to one aspect of the present application, there is provided a visual management method for security protection of an intelligent park, which is characterized in that the method specifically includes:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
specifically, the screening monitoring device determines security management objects of the intelligent park according to the type of the intelligent park, and performs screening monitoring device determination based on the security management objects, wherein the security management objects comprise personnel, articles and fire environments.
The specific steps of the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
In this embodiment, the screening of the screening monitoring device is performed by combining the types of the intelligent park, so that the screening of the screening monitoring device based on the types of the intelligent park is realized, the differential management of the monitoring devices is realized, the technical problem of low analysis efficiency caused by dynamic identification of all the monitoring devices is avoided, and the image analysis method is determined by determining the installation position of the screening monitoring device, so that the confirmation of the image analysis method according to the requirement difference of the screening monitoring device is realized, and the efficiency, pertinence and accuracy of image analysis are ensured.
Determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
as shown in fig. 2, the real-time performance requirement evaluation index includes:
when the security management object is a person, the real-time performance requirement evaluation index comprises the flow of people, the number of access control, the type of access control and the access control verification mode in a set time;
when the security management object is an article, the real-time requirement evaluation index is the number of the articles, the type of the articles, the flow of people in a set time and the storage mode of the articles;
when the security management object is a fire-fighting environment, the real-time performance requirement evaluation index comprises inflammable matter types and inflammable matter amounts.
Specifically, as shown in fig. 3, when the security management object is a person, the specific steps of constructing the real-time requirement of the screening and monitoring device are as follows:
s21, acquiring the traffic of the gateway corresponding to the screening monitoring device within a set time, determining whether the screening monitoring device is a core monitoring device or not based on the traffic, if so, constructing the real-time requirement of the core monitoring device by using the traffic, and if not, entering step S22;
when the flow rate of people in the set time is greater than a certain amount, the importance of the people is higher, so that the people is set as a core monitoring device.
S22, acquiring an entrance guard type of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S23, and if not, entering a step S25;
it can be understood that the access control type comprises an access control which can be accessed without identity verification and an access control which can be accessed only by identity verification, and when the access control type is the access control which can be accessed without identity verification, the screening monitoring device is determined to be an alternative core monitoring device, namely, the security risk is higher at the moment.
S23, acquiring an entrance guard verification mode of an entrance corresponding to the screening monitoring device to determine whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S24, and if not, entering a step S25;
it can be understood that when the entrance guard verification mode of the entrance corresponding to the screening monitoring device is simpler and the entrance guard can be accessed without more complicated verification, the entrance guard is determined to belong to the alternative core monitoring device, and specific examples include easy verification such as entrance guard card identification
S24, acquiring the number of entrance guards of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is a core monitoring device, if so, constructing real-time requirements of the core monitoring device based on the number of entrance guards and the traffic, and if not, entering a step S25;
s25, constructing real-time requirements based on the people flow, the gate inhibition quantity, the gate inhibition type and the gate inhibition verification mode in the set time of the gate corresponding to the screening and monitoring device.
In this embodiment, the real-time requirement of the screening monitoring device is determined based on the real-time evaluation index, and the monitoring device is divided into a general monitoring device and a core monitoring device based on the real-time requirement, so that the division of the monitoring device from the difference of the real-time requirement is realized, the evaluation and analysis efficiency of the core monitoring device is ensured, and a foundation is further laid for the difference of image analysis and display.
The priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
as shown in fig. 4, the specific steps of determining the priority of the general monitoring device are as follows:
s31, obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
s32, determining whether the general monitoring device is a core monitoring device or not by utilizing the failure times of the general monitoring device, if not, entering a step S33, and if so, setting the general monitoring device as the core monitoring device;
s33, determining whether the general monitoring device is a core monitoring device or not by using the historical security problem number in the set time, if so, setting the general monitoring device as the core monitoring device, and if not, entering step S34;
s34, determining whether the general monitoring device is a core monitoring device or not based on the number of the historical security problems and the number of the historical serious security problems of the general monitoring device, if so, setting the general monitoring device as the core monitoring device, and if not, entering a step S35;
s35, based on the history monitoring data of the general monitoring device, the number of the history security problems, the number of faults, the number of the history serious security problems, the number of the history security problems in a set time and the real-time requirement of the general monitoring device are obtained to determine the priority of the general monitoring device.
It can be appreciated that the priority of the general monitoring device is determined by adopting a prediction model based on FOA-SVR, wherein the specific steps of constructing the prediction model are as follows:
step 1: initializing parameters. The method comprises the steps of selecting a value range of SVR parameters [ C, g ], and selecting population scale, position, iteration number and the like of drosophila;
step 2: calculating the distance from an individual to an origin, taking the reciprocal of the distance as a taste concentration determination value, and assigning values to SVR parameters C and g;
step 3: taking the accuracy of the support vector machine 5-fold cross validation as an fitness function to obtain a drosophila concentration value;
step 4: finding out the optimal drosophila and storing the taste concentration and position information of the optimal drosophila;
step 5: iterative optimization is carried out until a termination condition is met;
step 6: outputting the optimal parameter combination.
In the FOA, the drosophila updates the individual positions around the best drosophila with a certain step size, and then calculates a taste concentration determination value from the positions where it is located, to obtain a candidate solution. The choice of strategy affects the progress of the search considerably and our desired results. The updating of the position of the drosophila in the original strategy is influenced by the optimal position and the step length of the drosophila, so that the drosophila is easy to sink into the regional extremum and the searching time is prolonged. Sine and cosine searching is adopted in the sine and cosine algorithm, and the sine or cosine is randomly selected to update the position information, so that the position information oscillates towards the optimal solution or flies outwards. Such a wave search method can not only reduce the search time, but also avoid obtaining results that are only regional extrema. Aiming at the defects of the original searching scheme and the advantages of the sine and cosine strategy, the application provides a method for improving the convergence rate by using the sine and cosine strategy instead of randomly generated direction and distance, solves the problem that the obtained result is only a regional extremum, and uses a specific formula of sine and cosine searching as follows:
wherein: g is the number of iterations, < >>Represents the position of the ith fruit fly in the jth dimension of the g iteration, +.>R is the current optimal position 1 ,r 2 ,r 3 、r 4 Is a random parameter, where r 1 The calculation formula of (2) is as follows:
where a=2, t is the maximum number of iterations, t is the current number of iterations, and P is a random number between 0 and 1.
It is understood that when the priority of the general monitoring device is greater than the set priority, the general monitoring device is determined to be a core monitoring device.
In this example, the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device, so that further screening of the core monitoring device is realized, and the comprehensive screening of the core monitoring device is ensured by combining the historical monitoring data of the general monitoring device.
And displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Specifically, for example, the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, where the priority of the specific general monitoring device includes a priority level, a sub-priority level, and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed by using a mapping manner based on the priority.
Specifically, when the security problem is found based on the analysis result, the image of the general monitoring device and the security problem are displayed in real time through the visual terminal.
On the other hand, as shown in fig. 5, the embodiment of the present application provides a visual management system for security protection of an intelligent park, which adopts the visual management method for security protection of an intelligent park, and specifically includes:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
In another aspect, the present application provides a computer storage medium having a computer program stored thereon, which when executed in a computer, causes the computer to perform a smart park security visualization management method as described above.
The visual management method for security protection of the intelligent park specifically comprises the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Specifically, the specific steps of determining the priority of the general monitoring device are as follows:
s311, obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
s312, when the general monitoring device is determined to not belong to the core monitoring device by utilizing the failure times of the general monitoring device, and when the general monitoring device is determined to not belong to the core monitoring device by utilizing the historical security problem number in the set time, the general monitoring device is determined to not belong to the core monitoring device based on the historical security problem number and the historical serious security problem number of the general monitoring device, and then the next step is carried out;
s313, based on the history monitoring data of the general monitoring device, obtaining the number of the history security problems, the number of faults, the number of the history serious security problems, the number of the history security problems in a set time and real-time requirements of the general monitoring device, and determining the priority of the general monitoring device.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-volatile computer storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing is merely one or more embodiments of the present description and is not intended to limit the present description. Various modifications and alterations to one or more embodiments of this description will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, or the like, which is within the spirit and principles of one or more embodiments of the present description, is intended to be included within the scope of the claims of the present description.
Claims (8)
1. A visual management method for security protection of an intelligent park is characterized by comprising the following steps:
screening monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the screening monitoring device determines security management objects of the intelligent park according to the types of the intelligent park, and determines the screening monitoring device based on the security management objects, wherein the security management objects comprise personnel, articles and fire environments;
determining a real-time requirement evaluation index based on a security management object of the screening monitoring device, determining the real-time requirement of the screening monitoring device based on the real-time requirement evaluation index, and dividing the monitoring device into a general monitoring device and a core monitoring device based on the real-time requirement;
the real-time performance requirement evaluation index comprises:
when the security management object is a person, the real-time performance requirement evaluation index comprises the flow of people, the number of access control, the type of access control and the access control verification mode in a set time;
when the security management object is an article, the real-time requirement evaluation index is the number of the articles, the type of the articles, the flow of people in a set time and the storage mode of the articles;
when the security management object is a fire-fighting environment, the real-time performance requirement evaluation index comprises inflammable matter types and inflammable matter amounts;
when the security management object is a person, the specific steps of constructing the real-time requirement of the screening and monitoring device are as follows:
s21, acquiring the traffic of the gateway corresponding to the screening monitoring device within a set time, determining whether the screening monitoring device is a core monitoring device or not based on the traffic, if so, constructing the real-time requirement of the core monitoring device by using the traffic, and if not, entering step S22;
s22, acquiring an entrance guard type of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S23, and if not, entering a step S25;
s23, acquiring an entrance guard verification mode of an entrance corresponding to the screening monitoring device to determine whether the screening monitoring device is an alternative core monitoring device, if so, entering a step S24, and if not, entering a step S25;
s24, acquiring the number of entrance guards of an entrance corresponding to the screening monitoring device, determining whether the screening monitoring device is a core monitoring device, if so, constructing real-time requirements of the core monitoring device based on the number of entrance guards and the traffic, and if not, entering a step S25;
s25, constructing real-time requirements based on the people flow, the gate inhibition quantity, the gate inhibition type and the gate inhibition verification mode in the set time of the gate corresponding to the screening and monitoring device;
the priority of the general monitoring device is obtained based on the historical monitoring data and real-time requirements of the general monitoring device, and the core monitoring device is obtained by screening the general monitoring device based on the priority of the general monitoring device;
and displaying the image of the core monitoring device in real time through a visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and an image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
2. The visual management method for security protection of an intelligent park as set forth in claim 1, wherein the specific steps of determining the image analysis method are as follows:
determining a security management object of the screening monitoring device according to the installation position of the screening monitoring device;
and determining an image analysis method of the screening monitoring device based on the security management object.
3. The visual management method of security in an intelligent park according to claim 1, wherein the access control type includes access control which can be accessed without identity verification and access control which can be accessed only by identity verification, and the screening monitoring device is determined to be an alternative core monitoring device when the access control type is access control which can be accessed without identity verification.
4. The visual management method for security protection of intelligent parks as claimed in claim 1, wherein the specific steps of determining the priority of the general monitoring device are as follows:
obtaining the number of the historical security problems, the number of faults, the number of the historical serious security problems and the number of the historical security problems in a set time of the general monitoring device based on the historical monitoring data of the general monitoring device;
determining whether the general monitoring device is a core monitoring device or not by using the failure times of the general monitoring device, if not, entering the next step, and if so, setting the general monitoring device as the core monitoring device;
determining whether the general monitoring device is a core monitoring device or not by using the number of the historical security problems in the set time, if so, setting the general monitoring device as the core monitoring device, and if not, entering the next step;
determining whether the general monitoring device is a core monitoring device or not based on the number of the historical security problems and the number of the historical serious security problems of the general monitoring device, if so, setting the general monitoring device as the core monitoring device, and if not, entering the next step;
and determining the priority of the general monitoring device based on the historical monitoring data of the general monitoring device, namely the number of historical security problems, the number of faults, the number of historical serious security problems, the number of historical security problems in a set time and the real-time requirement of the general monitoring device.
5. The visual security management method of claim 4, wherein the general monitoring device is determined to be a core monitoring device when the priority of the general monitoring device is greater than a set priority.
6. The visual security management method of claim 1, wherein the analysis frequency of the general monitoring device is determined according to the priority of the general monitoring device, the priority of a specific general monitoring device comprises a priority level, a sub-priority level and a no-priority level, and the determination of the analysis frequency of the general monitoring device is performed in a mapping manner based on the priority.
7. The visual management method for security protection in an intelligent park according to claim 1, wherein when security protection problems are found based on the analysis result, the images of the general monitoring device and the security protection problems are displayed in real time through a visual terminal.
8. A visual management system for security protection of an intelligent park, which adopts the visual management method for security protection of an intelligent park according to any one of claims 1 to 7, and specifically comprises the following steps:
an analysis method determining module; a monitoring device dividing module; the core monitoring device determines a module; a visual terminal module;
the analysis method determining module is responsible for screening the monitoring devices of the intelligent park based on the type of the intelligent park to obtain screening monitoring devices, and determining an image analysis method based on the installation positions of the screening monitoring devices;
the monitoring device dividing module is responsible for determining real-time requirement evaluation indexes based on security management objects of the screening monitoring devices, determining real-time requirements of the screening monitoring devices based on the real-time requirement evaluation indexes, and dividing the monitoring devices into general monitoring devices and core monitoring devices based on the real-time requirements;
the core monitoring device determining module is responsible for obtaining the priority of the general monitoring device based on the historical monitoring data and real-time requirements of the general monitoring device, and screening the general monitoring device based on the priority of the general monitoring device to obtain the core monitoring device;
the visual terminal module is responsible for displaying the image of the core monitoring device in real time through the visual terminal, determining the analysis frequency of the general monitoring device based on the priority, analyzing the general monitoring device in real time based on the analysis frequency and the image analysis method of the general monitoring device to obtain an analysis result, and determining whether to display the image in real time through the visual terminal based on the analysis result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310550227.2A CN116320324B (en) | 2023-05-16 | 2023-05-16 | Intelligent park security visual management system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310550227.2A CN116320324B (en) | 2023-05-16 | 2023-05-16 | Intelligent park security visual management system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116320324A CN116320324A (en) | 2023-06-23 |
CN116320324B true CN116320324B (en) | 2023-08-11 |
Family
ID=86801646
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310550227.2A Active CN116320324B (en) | 2023-05-16 | 2023-05-16 | Intelligent park security visual management system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116320324B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117218294B (en) * | 2023-09-18 | 2024-04-12 | 东莞市东智创新科技有限公司 | Park security equipment distribution management method based on three-dimensional modeling |
CN117424987B (en) * | 2023-12-15 | 2024-03-19 | 浙江数思信息技术有限公司 | Intelligent building operation management method, system and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268504A (en) * | 2005-03-24 | 2006-10-05 | Matsushita Electric Works Ltd | Monitoring system |
JP2015159503A (en) * | 2014-02-25 | 2015-09-03 | 株式会社日立ビルシステム | Video monitoring system |
CN109599782A (en) * | 2018-12-17 | 2019-04-09 | 武汉泰可电气股份有限公司 | Intelligent substation management system based on Internet of Things and intelligent recognition |
CN110572617A (en) * | 2019-09-24 | 2019-12-13 | 腾讯科技(深圳)有限公司 | environment monitoring processing method and device and storage medium |
KR102131437B1 (en) * | 2020-03-09 | 2020-07-08 | (주)지인테크 | Adaptive video surveillance system and method |
CN111405246A (en) * | 2020-03-12 | 2020-07-10 | 高宽友 | Smart city monitoring method and device and management terminal |
CN112333241A (en) * | 2020-10-13 | 2021-02-05 | 浙江安防职业技术学院 | Intelligent security system based on big data service |
CN113536901A (en) * | 2021-05-31 | 2021-10-22 | 浙江大华技术股份有限公司 | Target capturing method and related device |
CN114630077A (en) * | 2022-02-28 | 2022-06-14 | 高新兴科技集团股份有限公司 | Monitoring equipment optimized deployment method, device, medium and equipment of event gathering place |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021093568A (en) * | 2019-12-06 | 2021-06-17 | キヤノン株式会社 | Imaging apparatus, information processing apparatus, and method for controlling these, and program and learned model selection system |
-
2023
- 2023-05-16 CN CN202310550227.2A patent/CN116320324B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006268504A (en) * | 2005-03-24 | 2006-10-05 | Matsushita Electric Works Ltd | Monitoring system |
JP2015159503A (en) * | 2014-02-25 | 2015-09-03 | 株式会社日立ビルシステム | Video monitoring system |
CN109599782A (en) * | 2018-12-17 | 2019-04-09 | 武汉泰可电气股份有限公司 | Intelligent substation management system based on Internet of Things and intelligent recognition |
CN110572617A (en) * | 2019-09-24 | 2019-12-13 | 腾讯科技(深圳)有限公司 | environment monitoring processing method and device and storage medium |
KR102131437B1 (en) * | 2020-03-09 | 2020-07-08 | (주)지인테크 | Adaptive video surveillance system and method |
CN111405246A (en) * | 2020-03-12 | 2020-07-10 | 高宽友 | Smart city monitoring method and device and management terminal |
CN112333241A (en) * | 2020-10-13 | 2021-02-05 | 浙江安防职业技术学院 | Intelligent security system based on big data service |
CN113536901A (en) * | 2021-05-31 | 2021-10-22 | 浙江大华技术股份有限公司 | Target capturing method and related device |
CN114630077A (en) * | 2022-02-28 | 2022-06-14 | 高新兴科技集团股份有限公司 | Monitoring equipment optimized deployment method, device, medium and equipment of event gathering place |
Non-Patent Citations (1)
Title |
---|
黄照翠 ; 陈晖 ; 张鹏亮 ; 王海涛 ; .一种异地多校区分布式智慧校园视频服务系统设计研究.中国教育信息化.2018,(第21期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN116320324A (en) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116320324B (en) | Intelligent park security visual management system and method | |
Tong et al. | A review of assessment methods for cellular automata models of land-use change and urban growth | |
CN108564460B (en) | Real-time fraud detection method and device in internet credit scene | |
CN113094758B (en) | Gradient disturbance-based federated learning data privacy protection method and system | |
Mohler et al. | Rotational grid, PAI‐maximizing crime forecasts | |
CN108494810A (en) | Network security situation prediction method, apparatus and system towards attack | |
CN108334647A (en) | Data processing method, device, equipment and the server of Insurance Fraud identification | |
CN109141453A (en) | A kind of route guiding method and system | |
CN110503267B (en) | Urban financial invasion case prediction system and prediction method based on space-time scale self-adaptive model | |
CN116304250B (en) | Intelligent rule engine management method and system based on visual operation | |
CN110991262A (en) | Multi-bandwidth geographical weighted regression cellular automata method for ecological service value prediction | |
CN107493268A (en) | A kind of difference method for secret protection based on front position vector | |
CN109934074A (en) | Movement track determines method and device | |
CN113902185A (en) | Method and device for determining regional land property, electronic equipment and storage medium | |
CN109615414A (en) | House property predictor method, device and storage medium | |
CN116129307A (en) | Method, device, system and storage medium for managing visual personnel of closed scene | |
CN113111963A (en) | Method for re-identifying pedestrian by black box attack | |
CN109697392A (en) | Draw the method and device of target object thermodynamic chart | |
CN107832848A (en) | application management method, device, storage medium and electronic equipment | |
CN115859765B (en) | Urban expansion prediction method, device, equipment and storage medium | |
Bone et al. | Incorporating spatio-temporal knowledge in an Intelligent Agent Model for natural resource management | |
CN109711450A (en) | A kind of power grid forecast failure collection prediction technique, device, electronic equipment and storage medium | |
Ma et al. | Acceptable costs of minimax regret equilibrium: a solution to security games with surveillance-driven probabilistic information | |
CN115860144A (en) | Machine learning system for anti-electricity-stealing site | |
CN116843891A (en) | Graphic outline detection method, device, storage medium, equipment and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |