CN116723465A - Behavior prediction method, management platform and system based on signal detection - Google Patents

Behavior prediction method, management platform and system based on signal detection Download PDF

Info

Publication number
CN116723465A
CN116723465A CN202310605397.6A CN202310605397A CN116723465A CN 116723465 A CN116723465 A CN 116723465A CN 202310605397 A CN202310605397 A CN 202310605397A CN 116723465 A CN116723465 A CN 116723465A
Authority
CN
China
Prior art keywords
ship
target
target terminal
information
user identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310605397.6A
Other languages
Chinese (zh)
Inventor
戈东
吴岩
舒康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202310605397.6A priority Critical patent/CN116723465A/en
Publication of CN116723465A publication Critical patent/CN116723465A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the application provides a behavior prediction method based on signal detection, which is applied to a server of a management platform of a system based on the behavior prediction of the signal detection and can comprise the following steps: the method comprises the steps that a control code detection device collects user identification codes of mobile terminals in a first preset range according to a first preset period; judging whether a target terminal exists according to the user identification code; if the target terminal exists, calculating a first distance between the position of the target terminal and the target position; when the first distance is larger than a first preset value, controlling the ship monitoring equipment to acquire ship information of a preset area; judging whether a target ship exists according to the ship information; and when the target ship and the target terminal stop moving at the same time and the time for stopping moving is larger than a second preset value, determining that suspected theft exists. It can be seen that the embodiment of the application can adopt different monitoring means for different suspected theft behaviors, thereby improving the accuracy of identifying the suspected theft behaviors.

Description

Behavior prediction method, management platform and system based on signal detection
Technical Field
The application relates to the technical field of Internet, in particular to a behavior prediction method, a management platform and a system based on signal detection.
Background
With the progress of technology, aquaculture has gradually changed into industrialized aquaculture. Industrial aquaculture is a mode of aquaculture that industrializes traditional fishery and utilizes modern scientific techniques (including mechanical engineering, biology, water treatment chemistry, electromechanical engineering, modern electronic informatics, modern architecture, etc.) to produce aquatic products with high density and intensification. Through scientific demonstration and careful design, the low-pollution, low-risk, high-benefit and sustainable-development management target of the aquaculture industry is finally realized.
Theft prevention is an extremely important working content in the field of industrial aquaculture, particularly mariculture. At present, operators mostly adopt monitoring means to conduct theft investigation on the cultivation water areas, but workers are difficult to timely identify suspected theft behaviors from a plurality of monitoring pictures, so that economic crops of farmers are lost.
Therefore, how to realize efficient burglary prevention on the basis of reducing burglary prevention cost is a problem which needs to be solved by the technicians in the field.
Disclosure of Invention
The embodiment of the application provides a behavior prediction method, a management platform and a system based on signal detection, which can adopt different monitoring means according to different suspected theft situations (or behaviors), so that the monitoring of the suspected theft situations (or behaviors) is more targeted, and the accuracy of identifying the suspected theft events (or behaviors) is improved. In addition, the embodiment of the application can generate the corresponding reminding information according to the time and/or the position of the suspected theft by the suspected theft person, and send the relevant reminding information to the suspected theft person and the staff, and the reminding information containing the detailed suspected theft information not only can play a role in frightening the suspected theft, but also is beneficial to the staff to stop the suspected theft more quickly and accurately.
In a first aspect, an embodiment of the present application provides a method for behavior prediction based on signal detection, which is applied to a server of a management platform of a system for behavior prediction based on signal detection, where the system may include a code detection device, a ship monitoring device, and a management platform, where the management platform is in communication connection with the code detection device and the ship monitoring device, and the method may include the following steps:
The method comprises the steps that a control code detection device collects user identification codes of mobile terminals in a first preset range according to a first preset period;
judging whether a target terminal exists according to the user identification code, wherein the target terminal can be a terminal of which the user identification code does not belong to a mobile terminal white list;
if the target terminal exists, calculating a first distance between the position of the target terminal and the target position;
when the first distance is greater than a first preset value, controlling the ship monitoring device to acquire ship information of a preset area, wherein the ship information can comprise the position of the ship and the identity information of the ship;
judging whether a target ship exists according to the ship information, wherein the target ship can be a ship of which the identity information does not belong to a ship white list;
if the target ship exists and the positions of the target ship and the target terminal are the same, controlling the ship monitoring equipment to monitor the moving state of the target ship according to a second preset period, controlling the detecting equipment to acquire the user identification code of the target terminal according to the second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal, wherein the moving state comprises a moving direction and a moving speed;
when the target ship and the target terminal are determined to stop moving at the same time, and the time for stopping moving is larger than a second preset value, the suspected theft is determined to exist;
Generating first warning information, and sending the first warning information to the target ship and/or the target terminal, wherein the first warning information can be used for informing the target terminal and/or the corresponding personnel of the target ship to leave a preset area;
generating first alarm information, and sending the first alarm information to a worker, wherein the first alarm information can comprise identity information and position information of a target ship and/or user identification codes and position information of a target terminal, and the first alarm information can be used for informing the worker that suspected theft exists in a preset area.
In one possible implementation manner, after calculating the first distance between the location of the target terminal and the target location if the target terminal exists, the method further includes the following steps:
when the first distance is smaller than or equal to a first preset value, controlling the code detection equipment to acquire a user identification code of the target terminal according to a second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal;
if the position of the target terminal in the preset area is determined to be unchanged and the time of keeping unchanged is larger than a second preset value, determining that suspected theft exists;
generating second warning information, and sending the second warning information to the target terminal, wherein the second warning information can be used for informing people corresponding to the target terminal to leave a preset area;
Generating second alarm information, and sending the second alarm information to the staff, wherein the second alarm information can comprise a user identification code and position information of the target terminal, and the second alarm information can be used for informing the staff that suspected theft exists in a preset area.
In another possible implementation manner, after the control code detecting device obtains the user identification code of the target terminal according to the second preset period when the first distance is smaller than or equal to the first preset value, the method may further include the following steps:
and if the position change of the target terminal in the preset area is determined or the time for keeping the position change is smaller than a second preset value, the monitoring of the target terminal is released.
In another possible embodiment, the method may further comprise the steps of:
storing suspected theft information corresponding to suspected theft to a sample library, wherein the sample library is stored in a management platform, and the suspected theft information can comprise suspected theft time and a user identification code of a target terminal;
and generating a suspected theft behavior function according to the sample library, wherein the suspected theft behavior function can be used for representing the relation between the suspected theft occurrence frequency and the time period.
In another possible embodiment, the method may further comprise the steps of:
and adjusting the working mode of the code detection equipment according to the suspected theft behavior function, wherein the working mode can comprise a high-power consumption mode and a low-power consumption mode, the detection range covered by the high-power consumption mode is larger than that covered by the low-power consumption mode, and/or the first preset period corresponding to the high-power consumption mode is smaller than the first preset period corresponding to the low-power consumption mode.
In another possible embodiment, after determining that there is suspected theft when it is monitored that the target ship and the target terminal stop moving at the same time and the time of stopping moving is greater than the second preset value, or after determining that there is suspected theft if it is determined that the position of the target terminal in the preset area remains unchanged and the time of remaining unchanged is greater than the second preset value, the steps of:
storing the user identification code of the target terminal to a mobile terminal blacklist, and storing the identity information of the target ship to a ship blacklist; or alternatively, the first and second heat exchangers may be,
and storing the user identification code of the target terminal into a mobile terminal blacklist.
In another possible embodiment, the method may further comprise the steps of:
When the user identification code of the mobile terminal in the mobile terminal blacklist is acquired in a first preset range through the code detection equipment and/or the identity information of the ship in the ship blacklist is acquired through the ship monitoring equipment, third alarm information is generated, and the third alarm information can be used for reminding a worker of people and/or ships possibly carrying out suspected theft;
and sending the third alarm information to the staff member.
In a second aspect, an embodiment of the present application provides a management platform, where the management platform may include: the device comprises a communication module, a judging module and a calculating module;
the communication module can be used for controlling the code detection equipment to acquire the user identification code of the mobile terminal in a first preset range according to a first preset period;
the judging module can be used for judging whether a target terminal exists according to the user identification code, and the target terminal can be a terminal of which the user identification code does not belong to a mobile terminal white list;
the calculation module is also used for calculating a first distance between the position of the target terminal and the target position when the target terminal exists;
the communication module is further used for controlling the ship monitoring equipment to acquire ship information of a preset area when the first distance is larger than a first preset value, wherein the ship information can comprise the position of the ship and the identity information of the ship;
The judging module can be used for judging whether a target ship exists according to the ship information, wherein the target ship can be a ship of which the identity information does not belong to a ship white list;
the communication module is further used for controlling the ship monitoring device to monitor the moving state of the target ship according to a second preset period when the target ship exists and the positions of the target ship and the target terminal are the same, controlling the code detection device to collect the user identification code of the target terminal according to the second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal, wherein the moving state can comprise a moving direction and a moving speed;
the calculation module is further used for determining that suspected theft exists when the target ship and the target terminal stop moving at the same time and the time for stopping moving is larger than a second preset value;
the computing module is further used for generating first warning information, and the first warning information can be used for informing a target terminal and/or a person corresponding to the target ship to leave a preset area;
the communication module is also used for sending first warning information to the target ship and/or the target terminal;
the computing module is further used for generating first alarm information, the first alarm information can comprise identity information and position information of the target ship and/or user identification codes and position information of the target terminal, and the first alarm information can be used for informing workers that suspected theft exists in a preset area;
The communication module can also be used for sending the first alarm information to the staff.
In a third aspect, embodiments of the present application provide a management platform, which may include: a processor, a memory, and a bus;
the processor and the memory are connected by a bus, wherein the memory is adapted to store a set of program code and the processor is adapted to invoke the program code stored in the memory for performing the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a system for behavior prediction based on signal detection, the system may include: a code detection device, a ship monitoring device and a management platform according to the second to third aspects, the management platform being in communication connection with the code detection device and the ship monitoring device;
the code detection equipment can be used for collecting the user identification codes of the mobile terminals in a first preset range according to a first preset period;
the ship monitoring device may be configured to collect ship information of a preset area when a first distance is greater than a first preset value, where the ship information may include a position of a ship and identity information of the ship, the first distance is a distance between a position where a target terminal is located and a target position, and the target terminal is a terminal where a user identification code does not belong to a mobile terminal whitelist;
The ship monitoring device is further used for monitoring the moving state of the target ship according to a second preset period when the target ship exists and the positions of the target ship and the target terminal are the same, wherein the moving state can comprise a moving direction and a moving speed, and the target ship is a ship with identity information not belonging to a ship white list;
the code detection device can also be used for collecting the user identification code of the target terminal according to a second preset period.
By implementing the embodiment of the application, different monitoring modes can be adopted according to the distance relation between the mobile terminal suspected of being stolen and the target position, so that the suspected theft is monitored with stronger pertinence, and the accuracy of analyzing whether the suspected theft event (or behavior) exists is improved; after the distance between the mobile terminal with suspected theft and the target position is larger than a certain value, the embodiment of the application monitors the ship running condition in the preset area, screens out suspicious ships with similar or same movement tracks as the mobile terminal with suspected theft, establishes a behavior connection between the suspicious ships and the mobile terminal with suspected theft, and is helpful for locking suspicious personnel more accurately and comprehensively; after determining that the suspected theft time (or behavior) exists, the embodiment of the application also generates the reminding information comprising the time, the position and the identity of the suspected theft by the suspected theft person and sends the corresponding reminding information to the corresponding personnel, so that the method can not only play a role in frightening the suspected theft person, but also be used as evidence of the suspected theft by the suspected theft person, and further help the staff to lock the suspected theft more quickly, thereby timely preventing the suspected theft event (or behavior).
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a system for behavior prediction based on signal detection according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for behavior prediction based on signal detection according to an embodiment of the present application;
FIG. 3 is a schematic view of a scenario for determining a target ship and a target terminal according to an embodiment of the present application;
fig. 4 is a schematic view of a scenario for determining a target terminal according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a management platform according to an embodiment of the present application;
fig. 6 is a schematic diagram of another management platform according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims and drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical scheme of the embodiment of the application, the system for predicting the behavior based on the signal detection provided by the embodiment of the application is introduced. Referring to fig. 1, an architecture diagram of a system for behavior prediction based on signal detection according to an embodiment of the present application, as shown in fig. 1, the system for behavior prediction based on signal detection may include: the system comprises a code detection device 110, a ship monitoring device 120 and a management platform 130, wherein the management platform 130 is in communication with the code detection device 110 and the ship monitoring device 120 respectively.
Specifically, the management platform 130 controls the detecting device 110 to collect the user identification codes of the mobile terminals in the first preset range according to the first preset period, and determines whether a target terminal exists according to the user identification codes collected by the detecting device 110, where the target terminal may be a terminal whose user identification code does not belong to a mobile terminal whitelist; when the target terminal exists, the management platform 130 calculates or predicts the position of the target terminal according to the user identification code of the target terminal, and further calculates the first distance between the target terminal and the target position; if the first distance is greater than the first preset value, controlling the ship monitoring device 120 to collect ship information in the preset area, wherein the ship information can include the position of the ship and the identity information of the ship; the management platform 130 may also determine whether a target ship exists according to the identity information of the ship, where the identity information of the target ship is not a ship belonging to the ship whitelist; if the target ship exists and the positions of the target ship and the target terminal are the same, controlling the ship monitoring device 120 to monitor the moving state of the target ship according to a second preset period, and controlling the detecting device 110 to acquire the user identification code of the target terminal according to the second preset period and calculating the moving state of the target terminal according to the user identification code of the target terminal, wherein the moving state can comprise a moving direction and a moving speed; when the target ship and the target terminal are determined to stop moving at the same time, and the time for stopping moving is larger than a second preset value, the suspected theft is determined to exist; subsequently, the management platform 130 may generate first warning information, and send the first warning information to the target ship and/or the target terminal, where the first warning information may be used to inform the target terminal and/or the person corresponding to the target ship to leave the preset area; the management platform 130 may also generate first alarm information, which may include identity information and location information of the target ship and/or user identification code and location information of the target terminal, and send the first alarm information to the staff member, where the first alarm information may be used to inform the staff member that there is suspected theft in the preset area.
More, when the first distance is less than or equal to the first preset value, the management platform 130 may further control the code detection device 110 to obtain the user identification code of the target terminal according to the second preset period, and calculate the movement state of the target terminal according to the user identification code of the target terminal; if it is determined that the position of the target terminal in the preset area remains unchanged and the time of keeping unchanged is greater than the second preset value, the management platform 130 may determine that suspected theft exists; generating second warning information and sending the second warning information to the target terminal, wherein the second warning information can be used for informing people corresponding to the target terminal to leave a preset area; the second alarm information may also be generated and sent to the staff (the corresponding terminal may be mobile or fixed), where the second alarm information may include the user identification code and the location information of the target terminal, and the second alarm information may be used to inform the staff that there is a suspected theft in the preset area.
The following describes methods of use according to embodiments of the present application with reference to the accompanying drawings.
Referring to fig. 2, a method for predicting behavior based on signal detection according to an embodiment of the present application is applied to a server of a management platform of a system for predicting behavior based on signal detection, where the system may include a code detection device, a ship monitoring device, and a management platform, where the management platform is communicatively connected to the code detection device and the ship monitoring device, and the method may include the following steps:
S201, controlling the code detection equipment to collect the user identification codes of the mobile terminals in a first preset range according to a first preset period.
Specifically, a worker (or a user) may use the management platform through the user terminal, and set a specific value of the first preset period on the management platform. More, the staff (or the user) can also directly set the specific value of the first preset value period on the detecting device. A user terminal may also be referred to as a terminal device, and may be stationary or mobile. The specific form of the mobile phone can be a mobile phone (mobile phone), a tablet personal computer (Pad), a computer with a wireless receiving and transmitting function or a wearable terminal device. The operating system of the terminal equipment at the PC end, such as an all-in-one machine, may include, but is not limited to, an operating system such as a Linux system, a Unix system, a Windows series system (e.g., windows xp or Windows 7, etc.), or a Mac OS X system (operating system of an apple computer). The operating system of the terminal device of the mobile terminal, such as a smart phone, may include, but is not limited to, an operating system such as an android system, an IOS (operating system of an apple phone), or a Window system.
For example, if the staff (or the user) sets the first preset period to 1 second on the management platform through the user terminal, the management platform will send a data acquisition instruction (for instructing the detection code device to acquire the user identification code of the mobile terminal) to the detection code device every 1 second, and receive the data returned by the detection code device (such as the user identification code of the mobile terminal). Or, the management platform may send the value of the first preset period (i.e. 1 second) to the code detection device, where the code detection device may collect the user identification code of the mobile terminal in the first preset range once every 1 second, and send the user identification code to the management platform.
More, the first preset range is related to an operation mode of the code detection device, and the operation mode of the code detection device may include a high power consumption mode and a low power consumption mode, where a detection range covered by the high power consumption mode (i.e., the first preset range) is greater than a detection range covered by the low power consumption mode (i.e., the first preset range), and/or a first preset period corresponding to the high power consumption mode is less than a first preset period corresponding to the low power consumption mode. The first preset range corresponding to the low power consumption mode may be a circular area with the detection device as a center and a diameter of 10 km, and the first preset range corresponding to the high power consumption mode may be a circular area with the detection device as a center and a diameter of 20 km; or, if the first preset period corresponding to the low power consumption mode is 1 minute, the first preset period corresponding to the high power consumption mode may be 30 seconds.
S202, judging whether a target terminal exists according to the user identification code, wherein the target terminal is a terminal of which the user identification code does not belong to a mobile terminal white list.
It should be noted that the target terminal may be a terminal whose user identification code does not belong to the mobile terminal whitelist. The whitelist may be set by a worker and saved in the management platform.
For example, if the code detection device collects the user identification codes of the first mobile terminal, the second mobile terminal and the third mobile terminal in the first preset range, and can query the user identification codes of the first mobile terminal and the third mobile terminal in the mobile terminal white list, it can be determined that the second mobile terminal is the target terminal.
And S203, if the target terminal exists, calculating a first distance between the position of the target terminal and the target position.
The management platform can calculate or determine the position of the target terminal according to the signal intensity of the target terminal acquired by the detection code device, and the data corresponding to the user identification code of the target terminal sent to the management platform by the detection code device can contain the information of the signal intensity of the target terminal.
More, the target position may be the position of the code detection device, or may be the center point of a preset area (such as a cultivation water area), etc.
And S204, when the first distance is larger than a first preset value, controlling the ship monitoring equipment to acquire ship information in a preset area.
It should be noted that the ship information may include the position of the ship and the identity information of the ship, and may also include the number of ships. The collection of ship information may be implemented based on an automatic ship identification system (Automatic Identification System, abbreviated as AIS system).
For example, when the first distance is greater than the first preset value, it may indicate that the suspicious person (i.e. the owner of the target terminal) is in the open sea water area, and then the suspicious person may have the ship to travel to the preset area (i.e. the cultivation water area) to perform suspected theft, so that the ship information in the preset area is collected, which is helpful to more timely and accurately detect the suspicious person and the suspicious ship, and further improves the anti-theft efficiency.
S205, judging whether a target ship exists according to the ship information.
It should be noted that the target ship may be a ship whose identity information does not belong to the ship whitelist. The whitelist may be set by a worker and saved in the management platform.
For example, if the ship monitoring device collects the ship information of the first ship, the second ship and the third ship in the preset area, and can inquire the identity information of the second ship and the third ship in the ship white list, it may be determined that the first ship is the target ship.
S206, if a target ship exists and the positions of the target ship and the target terminal are the same, controlling the ship monitoring equipment to monitor the moving state of the target ship according to a second preset period, controlling the code detection equipment to collect the user identification code of the target terminal according to the second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal.
The movement state includes a movement direction and a movement speed.
More, in view of the error problem of the positioning technology, when the target ship exists and the distance between the target ship and the target terminal is kept within a certain range, the ship monitoring device can be controlled to monitor the moving state of the target ship according to the second preset period, the detecting device can be controlled to collect the user identification code of the target terminal according to the second preset period, and the moving state of the target terminal can be calculated according to the user identification code of the target terminal.
Exemplary, case one: in the preset area, a first target ship and a first target terminal exist, and the positions of the first target ship and the first target terminal relative to the target position are the same, for example, the first target ship and the first target terminal are both positioned at the position which is 20 degrees in the southwest direction of the target position and 8 kilometers away from the target position; or the longitude and latitude coordinates of the first target ship and the first target terminal are the same. And a second case: in the preset area, a second target ship and a second target terminal are arranged, wherein the second target ship and the second target terminal are both positioned in the direction of 20 degrees in the southwest of the target position, but the second target ship is 7 kilometers away from the target position and the second target terminal is 6.95 kilometers away from the target position, and the positions of the second target ship and the second target terminal are considered to be the same under the condition that the distances between the second target ship and the second target terminal are only 50 meters; or the second target ship is located in the 19-degree southwest direction of the target position, the second target terminal is located in the 20-degree southwest direction of the target position, the second target ship is 7 km away from the target position, the second target terminal is 7 km away from the target position, and only a slight difference exists between the second target ship and the target position in the direction, and the positions of the second target ship and the second target terminal can be considered to be the same in the case; or the second target ship is positioned in the 19-degree direction of the southwest of the target position, the second target terminal is positioned in the 20-degree direction of the southwest of the target position, the second target ship is 7 kilometers away from the target position, the second target terminal is 6.97 kilometers away from the target position, and the distance difference and the direction difference between the second target ship and the second target terminal are smaller, so that the second target ship and the second target terminal can be considered to be the same in position; alternatively, the difference between the longitude and latitude coordinates of the second target ship and the second target terminal is also within a certain range. It should be noted that, the position error range (including the difference of the distance and the difference of the direction) of the target ship and the target terminal is set by a technician and/or a staff, and the embodiment of the present application only describes the method of the embodiment of the present application in more detail, and the above examples of the position and the direction should not limit the present application.
And S207, when the target ship and the target terminal stop moving at the same time and the time for stopping moving is larger than a second preset value, determining that suspected theft exists.
Possibly, if the target ship stops moving and the target terminal keeps moving all the time, but the distance between the target terminal and the target ship is kept within a certain range when the target terminal moves, after determining that the time for stopping moving the target ship is greater than a second preset value, the suspected theft can be determined.
For example, if the third target ship and the third target terminal are present, it is monitored that the third target ship has not moved for more than 8 minutes (the second preset value is set to 5 minutes), but the third target terminal is always in a moving state, and the moving range of the third target terminal does not exceed 20 meters of the square circle of the third target ship, the third target terminal may be considered to be moving on the third target ship, and suspected theft may be considered to exist. The "square and round 20 meters" is not true, and indicates that the movable range provided by the third target ship to the third target terminal is greater than or equal to 20 meters, which is a corresponding determination range given by considering the positioning error and the ship size (used for assisting in determining whether there is suspected theft), and the moving atmosphere of the target terminal may be set by a technician and/or a staff according to the actual situation, and the "20 meters" is only for illustrating the method of the embodiment of the present application in more detail, and should not be limited.
Referring to fig. 3, a schematic diagram of a scenario for determining a target ship and a target terminal according to an embodiment of the present application is shown. As shown in fig. 3, there are a ship 1, a ship 2, and a ship 3 in the target area 310, and there are a mobile terminal 1, a mobile terminal 2, and a mobile terminal 3. Let the distance between the ship 1, the ship 2, the mobile terminal 1 and the mobile terminal 2 be smaller than the above-mentioned judgment range (i.e., the distance range related to the positioning error, as above, "square circle of 20 m" between the target terminal 3 and the target ship 3 is a judgment range), the ship 1 moves to the east, the ship 2 moves to the west, the ship 3 moves to the east, the mobile terminal 1 moves to the east, the mobile terminal 2 moves to the west, and the mobile terminal 3 moves to the east. By analyzing the moving states of the ship and the mobile terminal, the corresponding relationship between the mobile terminal 1 and the ship 1, the corresponding relationship between the mobile terminal 2 and the ship 2, and the corresponding relationship between the mobile terminal 3 and the ship 3 can be obtained by taking the mobile terminal 1 and the mobile terminal 2 as target terminals and taking the ship 1 and the ship 3 as target ships. Since the mobile terminal 3 is not the target terminal, monitoring of the ship 3 can be canceled according to the correspondence; since the ship 2 is not the target ship, the monitoring of the mobile terminal 2 can be canceled according to the correspondence; since the mobile terminal 1 belongs to the target terminal and the ship 1 is the target ship, the mobile terminal 1 and the ship 1 need to be continuously monitored.
It should be noted that, there may be a case where two or more target terminals exist in the same target ship, and for this case, the process of determining the target ship and the target terminal may refer to the process described in fig. 3, which is not described herein. S208, generating first warning information and sending the first warning information to the target ship and/or the target terminal.
It should be noted that, the first warning information may be used to inform the target terminal and/or the person corresponding to the target ship to leave the preset area.
The first warning message may be, for example, a message similar to "this area belongs to a private aquaculture area, you are now monitoring for a stay time in this area of more than 10 minutes, you leave this area westernly".
Furthermore, the management platform can also control the warning device (such as a laser lamp, a loudspeaker and the like) to take warning measures. For example, a laser lamp is irradiated to the position (or direction) where the target terminal and/or the target ship are/is located, or a loud speaker is used for broadcasting the first warning information so as to achieve the purpose of driving suspected thieves.
S209, generating first alarm information and sending the first alarm information to staff.
It should be noted that, the first alarm information may include identity information and location information of the target ship, and/or user identification code and location information of the target terminal, and the first alarm information may be used to inform a worker that there is a suspected theft in the preset area.
By way of example, the first alert message may be similar to "there is suspected theft 15 ° north west from the target location, ship number xxx". Wherein, the management terminal can achieve the alarm purpose by sending alarm information to the user terminal of the staff (or the user).
Further, the management platform may also send the first alert information to a preset public security authority (which may be a nearest dispatch office or the like from the target location). For example, when there is a fourth target terminal and a fourth target ship at a position 30 ° in the west of the target position, an alarm message similar to "there is a fourth target terminal (user identification code is xxxx) and a fourth target ship (ship code is xxx) at a position 30 ° in the west of the target position is being subjected to suspected theft, please go to a stop" may be transmitted to the first dispatch place (the dispatch place closest to the target position is set as the first dispatch place).
It can be seen that the embodiment of the application can provide diversified warning/warning means, and is helpful to improve the efficiency and effect of preventing suspected theft.
In one possible implementation manner, after calculating the first distance between the location of the target terminal and the target location if the target terminal exists, the method further includes the following steps:
When the first distance is smaller than or equal to a first preset value, controlling the code detection equipment to acquire a user identification code of the target terminal according to a second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal;
if the position of the target terminal in the preset area is determined to be unchanged and the time of keeping unchanged is larger than a second preset value, determining that suspected theft exists;
generating second warning information, and sending the second warning information to the target terminal, wherein the second warning information can be used for informing people corresponding to the target terminal to leave a preset area;
generating second alarm information, and sending the second alarm information to the staff, wherein the second alarm information can comprise a user identification code and position information of the target terminal, and the second alarm information can be used for informing the staff that suspected theft exists in a preset area.
Specifically, when the first distance is smaller than or equal to the first preset value, it may be indicated that the suspicious person (i.e. the owner of the target terminal) is in the offshore water area, and then the suspicious person may drive or ride a vehicle similar to a motorcycle to go to the target area (i.e. the aquaculture water area), and then suspected theft is implemented, so that the moving state of the target terminal needs to be continuously monitored, and whether the suspected theft exists in the owner of the target terminal is further determined, which is helpful for improving the accuracy and timeliness of the theft judgment and providing more reliable theft protection for the aquaculture water area.
Further, when it is determined that the target terminal exists, a second preset period smaller than the first preset period may be selected. For example, if the first preset period is 1 second, the second preset period may be set to 0.5 second, which is helpful for obtaining the movement information of the target terminal more timely. The setting manner of the second preset period may refer to the setting manner of the first preset period, which is not described herein.
The calculation and/or determination of the position and the movement state of the target terminal are the same as those described in steps S203 to S207 and the embodiments thereof, and are not described herein. More, the content and the receiving object of the second alarm and the second alarm are the same as those in steps S208 to S209 and related embodiments, and are not described herein.
In one possible implementation manner, after the control code detecting device obtains the user identification code of the target terminal according to the second preset period when the first distance is smaller than or equal to the first preset value, the method may further include the following steps:
and if the position change of the target terminal in the preset area is determined or the time for keeping the position change is smaller than a second preset value, the monitoring of the target terminal is released.
For example, if the target terminal is kept moving all the time, it may be considered that the user of the target terminal does not perform suspected theft, so that the monitoring of the target terminal may be released after the first distance is greater than the first preset value; if the target terminal stops moving at a position within the first preset range and the stop time is 6 minutes, the second preset value is set to 10 (minutes), the user of the target terminal may be considered to have not performed suspected theft, and thus the monitoring of the target terminal may be released after the first distance is greater than the first preset value.
Fig. 4 is a schematic diagram of a scenario for determining a target terminal according to an embodiment of the present application. As shown in fig. 4, there are mobile terminal 4 (distance from target position 420 is 2 km), mobile terminal 5 (distance from target position 420 is 2 km), and mobile terminal 6 (distance from target position 420 is 1 km) within first range 410, wherein mobile terminal 4 is kept stationary for 30 minutes (set to a second preset value of 5 minutes), mobile terminal 5 is kept moving straight at a uniform velocity in the south, mobile terminal 6 is stationary for 3 minutes and then moves at a uniform velocity in the east. If the first preset value is set to be 3 km, the management platform queries whether the user identification codes of the mobile terminal 4, the mobile terminal 5 and the mobile terminal 6 acquired by the code detection device exist and move the white list, and if only the user identification codes of the mobile terminal 4 exist and move the white list of the mobile terminal, the mobile terminal 5 and the mobile terminal 6 are judged to be target terminals. If the mobile terminal 5 is found to keep moving until the distance from the target position 420 is more than 3 km through monitoring, the monitoring of the mobile terminal 5 is released after the distance from the mobile terminal 5 to the target position 420 is more than 3 km; if it is found by monitoring that the mobile terminal 6 has been moved south to a position more than 3 km away from the target position 420 after being kept stationary for 3 minutes, the monitoring of the mobile terminal 6 can be released after the mobile terminal 6 is more than 3 km away from the target position 420.
Further, the above-mentioned two different monitoring modes (or means) for the case where the first distance is greater than the first preset value and the first distance is less than or equal to the first preset value may be performed simultaneously, and the two monitoring modes (or means) do not conflict.
It can be seen that when the first distance is smaller than or equal to the first preset value, different monitoring means are adopted in the embodiment of the application, so that the pertinence of monitoring is stronger, and the accuracy of identifying suspected theft is improved.
In one possible implementation manner, the method according to the embodiment of the present application may further include the following steps:
storing suspected theft information corresponding to suspected theft to a sample library, wherein the sample library is stored in a management platform, and the suspected theft information can comprise suspected theft time and a user identification code of a target terminal;
and generating a suspected theft behavior function according to the sample library, wherein the suspected theft behavior function can be used for representing the relation between the suspected theft occurrence frequency and the time period.
Further, the suspected theft information may further include identity information of the target ship corresponding to the suspected theft.
In particular, the suspected theft function may be used to represent the probability of suspected theft occurring at various times of the day.
In another possible implementation manner, the method according to the embodiment of the present application may further include the following steps:
and adjusting the working mode of the code detection equipment according to the suspected theft behavior function, wherein the working mode can comprise a high-power consumption mode and a low-power consumption mode, the detection range covered by the high-power consumption mode is larger than that covered by the low-power consumption mode, and/or the first preset period corresponding to the high-power consumption mode is smaller than the first preset period corresponding to the low-power consumption mode.
More, the working modes of the code detection device may further include a middle power consumption mode, a detection range covered by the middle power consumption mode is located between a detection range covered by the high power consumption mode and a detection range covered by the low power consumption mode, and/or a first preset period corresponding to the middle power consumption mode is located between a first preset period corresponding to the low power consumption mode and a first preset period corresponding to the high power consumption mode. For example, if the detection range covered by the high power consumption mode is an area with a diameter of 20 km centered on the target position, and the detection range covered by the low power consumption mode is an area with a diameter of 5 km centered on the target position, the detection range covered by the medium power consumption mode may be an area with a diameter of 10 km centered on the target position; or, if the first preset period corresponding to the high power consumption mode is set to be 30 seconds and the first preset period corresponding to the low power consumption mode is set to be 1 minute, the first preset period corresponding to the medium power consumption mode may be 45 seconds.
By way of example, if the theft function is displayed at 21 per day: the probability of suspected theft occurring between 00 and 2:00 of the next day was 70%, at 6: the probability of suspected theft during the period of 00 to 12:00 is 5%, at 13: the probability of suspected theft in the time of 00 to 14:00 is 20 percent, and the probability can be 21 percent per day: the detection device is put into a high power consumption mode for a period of 00 to 2:00 of the next day, at 6: the 00-12:00 period enables the code detection device to be in a low power consumption mode, and the code detection device is in a 13:00 to 14:00 places the detection device in a medium power mode.
It should be noted that, the foregoing examples of the detection ranges and/or the first preset periods of the coverage of the high power consumption mode, the middle power consumption mode and the low power consumption mode and the occurrence probability of the suspected theft in different periods are only for more vividly describing the method of the embodiment of the present application, and should not limit the present application, and the specific relevant coverage detection ranges are set by technicians and/or staff according to actual situations, which is not limited herein.
It can be seen that the embodiment of the application can adjust the working efficiency of the code detection equipment according to the probability of suspected theft in different time periods, and reduces the anti-theft cost while not affecting the accuracy of the theft identification.
In another possible embodiment, after determining that there is suspected theft when it is monitored that the target ship and the target terminal stop moving at the same time and the time of stopping moving is greater than the second preset value, or after determining that there is suspected theft if it is determined that the position of the target terminal in the preset area remains unchanged and the time of remaining unchanged is greater than the second preset value, the steps of:
storing the user identification code of the target terminal to a mobile terminal blacklist, and storing the identity information of the target ship to a ship blacklist; or alternatively, the first and second heat exchangers may be,
and storing the user identification code of the target terminal into a mobile terminal blacklist.
In another possible implementation manner, the method according to the embodiment of the present application may further include the following steps:
when the user identification code of the mobile terminal in the mobile terminal blacklist is acquired in a first preset range through the code detection equipment and/or the identity information of the ship in the ship blacklist is acquired through the ship monitoring equipment, third alarm information is generated, and the third alarm information can be used for reminding a worker of people and/or ships possibly carrying out suspected theft;
and sending the third alarm information to the staff member.
The management platform may send the third alarm information to the staff and/or the public security mechanism and/or use other alarm means when the detection device detects that the fifth mobile terminal is in the first preset range; if the identity information of the fifth ship exists in the ship blacklist, the management platform can send third alarm information to staff and/or public security institutions and/or adopt other alarm means when the ship monitoring equipment monitors that the fifth ship appears in the first preset range. The content of the third alarm information and the receiver may refer to the related content of the first alarm information and the second alarm information, which are not described herein.
Further, after receiving the third alarm information, the worker may choose to ignore the third alarm information according to the actual situation. For example, after confirming that the user (or owner) of the fifth mobile terminal is currently a trusted person, the staff member may manually release the alarm, or may save the identity information of the fifth mobile terminal in the mobile terminal whitelist. Similarly, the staff can confirm that the personnel on the fifth ship are all trusted personnel, so that the alarm can be manually released, and the identity information of the fifth ship can be stored in the ship white list.
It can be seen that the method of the embodiment of the application can adopt different anti-theft monitoring means according to different suspicious conditions, so that the monitoring is more targeted, the accuracy of anti-theft identification is improved, and a better anti-theft effect is obtained. The embodiment of the application can also obtain a more scientific suspected theft function by analyzing the suspected theft data, thereby being beneficial to adopting the equipment working efficiency which is more in line with the actual situation, reducing the theft-proof cost and simultaneously keeping a better theft-proof effect. More, the embodiment of the application can also utilize the blacklist (the blacklist of the mobile terminal and/or the blacklist of the ship) to carry out quick judgment, thereby being beneficial to shortening the identification time of suspected theft and enabling the theft to be more efficient.
The following describes an apparatus according to an embodiment of the present application with reference to the drawings.
Referring to fig. 5, a schematic composition diagram of a management platform according to an embodiment of the present application may include: a communication module 510, a judgment module 520, and a calculation module 530;
the communication module 510 may be configured to control the code detection device to collect, according to a first preset period, a user identification code of the mobile terminal within a first preset range;
the judging module 520 may be configured to judge whether a target terminal exists according to the user identification code, where the target terminal may be a terminal whose user identification code does not belong to a mobile terminal white list;
The calculating module 530 may be further configured to calculate, when the target terminal exists, a first distance between a location where the target terminal is located and the target location;
the communication module 510 may be further configured to control the ship monitoring device to collect ship information of a preset area when the first distance is greater than a first preset value, where the ship information may include a position of the ship and identity information of the ship;
a judging module 520, configured to judge whether a target ship exists according to the ship information, where the target ship may be a ship whose identity information does not belong to a ship whitelist;
the communication module 510 may be further configured to, when the target ship exists and the positions of the target ship and the target terminal are the same, control the ship monitoring device to monitor the movement state of the target ship according to a second preset period, and control the detection device to collect the user identification code of the target terminal according to the second preset period, and calculate the movement state of the target terminal according to the user identification code of the target terminal, where the movement state may include a movement direction and a movement speed;
the calculating module 530 is further configured to determine that there is suspected theft when it is determined that the target ship and the target terminal stop moving at the same time and the time for stopping moving is greater than a second preset value;
The calculating module 530 may be further configured to generate first warning information, where the first warning information may be used to inform a target terminal and/or a person corresponding to the target ship to leave a preset area;
the communication module 510 may be further configured to send first alert information to the target ship and/or the target terminal;
the calculating module 530 may be further configured to generate first alarm information, where the first alarm information may include identity information and location information of the target ship, and/or a user identification code and location information of the target terminal, and the first alarm information may be used to inform a worker that there is a suspected theft in the preset area;
the communication module 510 may also be configured to send the first alert information to a worker.
In one possible implementation, the management platform may further include:
the communication module 510 may be further configured to control the code detection device to obtain the user identification code of the target terminal according to the second preset period when the first distance is less than or equal to the first preset value;
the calculating module 530 may be further configured to calculate a movement state of the target terminal according to the user identification code of the target terminal;
the calculating module 530 may be further configured to determine that there is a suspected theft if it is determined that the position of the target terminal in the preset area remains unchanged and the time of the keeping unchanged is greater than a second preset value;
The calculating module 530 may be further configured to generate second warning information, where the second warning information may be used to inform a person corresponding to the target terminal to leave the preset area;
the communication module 510 may be further configured to send second alert information to the target terminal;
the computing module 530 may be further configured to generate second alarm information, where the second alarm information may include a user identification code and location information of the target terminal, and the second alarm information may be used to inform a worker that there is suspected theft in the preset area;
the communication module 510 may also be configured to send a second alert message to the staff member.
In another possible implementation manner, the management platform may further include:
the calculating module 530 may be further configured to, when it is determined that the position of the target terminal in the preset area changes, or the time that the position of the target terminal remains unchanged is less than the second preset value, release the monitoring of the target terminal.
In another possible implementation manner, the management platform may further include:
the computing module 530 may be further configured to store suspected theft information corresponding to the suspected theft to a sample library, where the sample library is stored in the management platform, and the suspected theft information may include suspected theft time and a user identification code of the target terminal;
The computing module 530 may be further configured to generate a suspected theft behavior function from the sample library, where the suspected theft behavior function may be used to represent a relationship between a frequency of occurrence of suspected theft and a time period.
In another possible implementation manner, the management platform may further include:
the communication module 510 may be further configured to adjust a working mode of the code detection device according to the suspected theft function, where the working mode may include a high power consumption mode and a low power consumption mode, a detection range covered by the high power consumption mode is greater than a detection range covered by the low power consumption mode, and/or a first preset period corresponding to the high power consumption mode is less than a first preset period corresponding to the low power consumption mode.
In another possible implementation manner, the management platform may further include:
the calculating module 530 may be further configured to store the user identification code of the target terminal to a blacklist of the mobile terminal, and store the identity information of the target ship to the blacklist of the ship; or alternatively, the first and second heat exchangers may be,
the calculating module 530 may be further configured to save the user identification code of the target terminal to the mobile terminal blacklist.
In another possible implementation manner, the management platform may further include:
the calculating module 530 may be further configured to generate third alarm information when the user identification code of the mobile terminal in the mobile terminal blacklist is collected by the code detection device within the first preset range and/or the identity information of the ship in the ship blacklist is collected by the ship monitoring device, where the third alarm information may be used to remind a worker that a person and/or a ship who may possibly implement suspected theft exists;
The communication module 510 may also be configured to send the third alarm information to a worker.
Referring to fig. 6, a schematic composition diagram of another management platform according to an embodiment of the present application may include:
a processor 610, a memory 620, and an I/O interface 630. The processor 610, the memory 620 and the I/O interface 630 may be communicatively connected, the memory 620 being configured to store instructions, the processor 610 being configured to execute the instructions stored by the memory 620 to implement the method steps corresponding to fig. 2 as described above.
The processor 610 is configured to execute the instructions stored in the memory 620 to control the I/O interface 630 to receive and transmit signals, thereby completing the steps in the method described above. The memory 620 may be integrated into the processor 610 or may be provided separately from the processor 610.
Memory 620 may also include a storage system 621, cache 622, and RAM623. Wherein the cache 622 is a level one memory that exists between the RAM623 and the CPU, consisting of static memory chips (SRAMs), which are smaller in capacity but much faster than main memory, approaching the CPU's speed; RAM623 is internal memory that exchanges data directly with the CPU, can be read and written at any time (except when refreshed), and is fast, typically as a temporary data storage medium for an operating system or other program in operation. The three combine to implement the memory 620 function.
As an implementation, the functions of the I/O interface 630 may be considered to be implemented by a transceiver circuit or a dedicated chip for transceiving. Processor 610 may be considered to be implemented by a dedicated processing chip, a processing circuit, a processor, or a general-purpose chip.
As another implementation, a manner of using a general purpose computer may be considered to implement the apparatus provided by the embodiments of the present application. I.e., program code that implements the functions of the processor 610, i/O interface 630 is stored in the memory 620. A general purpose processor implements the functions of the processor 610, i/O interface 630 by executing code in the memory 620.
The concepts related to the technical solutions provided by the embodiments of the present application, explanation and detailed description of the concepts related to the embodiments of the present application and other steps refer to the foregoing methods or descriptions of the contents of the method steps performed by the apparatus in other embodiments, which are not repeated herein.
As another implementation of this embodiment, a computer-readable storage medium is provided, on which instructions are stored, which when executed perform the method in the method embodiment described above.
As another implementation of this embodiment, a computer program product is provided that contains instructions that, when executed, perform the method of the method embodiment described above.
Those skilled in the art will appreciate that only one memory and processor is shown in fig. 6 for ease of illustration. In an actual terminal or server, there may be multiple processors and memories. The memory may also be referred to as a storage medium or storage device, etc., and embodiments of the present application are not limited in this respect.
It should be appreciated that in embodiments of the present application, the processor may be a central processing unit (Central Processing Unit, CPU for short), other general purpose processor, digital signal processor (Digital Signal Processing, DSP for short), application specific integrated circuit (Application Specific Integrated Circuit, ASIC for short), off-the-shelf programmable gate array (Field-Progracmable Gate Array, FPGA for short) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
It should also be understood that the memory referred to in embodiments of the present application may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable ROM (Electrically EPROM, EEPROM), or a flash Memory. The volatile memory may be a random access memory (Random Access Memory, RAM for short) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and direct memory bus RAM (Direct Rambus RAM, DR RAM).
Note that when the processor is a general-purpose processor, DSP, ASIC, FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, the memory (storage module) is integrated into the processor.
It should be noted that the memory described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
The bus may include a power bus, a control bus, a status signal bus, and the like in addition to the data bus. But for clarity of illustration, the various buses are labeled as buses in the figures.
It should also be understood that the first, second, third, fourth and various numerical numbers referred to herein are merely descriptive convenience and are not intended to limit the scope of the application.
It should be understood that the term "and/or" is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method. To avoid repetition, a detailed description is not provided herein.
In various embodiments of the present application, the sequence number of each process does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative logical blocks (illustrative logical block, abbreviated ILBs) and steps described in connection with the embodiments disclosed herein can be implemented in electronic hardware, or in combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk), etc.
Embodiments of the present application also provide a computer storage medium storing a computer program that is executed by a processor to implement some or all of the steps of any of the signal detection-based behavior prediction methods described in the method embodiments above.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program operable to cause a computer to perform part or all of the steps of any one of the methods of signal detection-based behavior prediction as described in the method embodiments above.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of behavior prediction based on signal detection, a server for a management platform of a system of behavior prediction based on signal detection, the system comprising a detection device, a ship monitoring device and the management platform, the management platform being in communication connection with the detection device and the ship monitoring device, the method comprising the steps of:
Controlling the code detection equipment to acquire the user identification code of the mobile terminal in a first preset range according to a first preset period;
judging whether a target terminal exists according to the user identification code, wherein the target terminal is a terminal of which the user identification code does not belong to a mobile terminal white list;
if the target terminal exists, calculating a first distance between the position of the target terminal and the target position;
when the first distance is larger than a first preset value, controlling the ship monitoring equipment to acquire ship information in a preset area, wherein the ship information comprises the position of a ship and the identity information of the ship;
judging whether a target ship exists according to the ship information, wherein the target ship is a ship of which the identity information does not belong to a ship white list;
if a target ship exists and the positions of the target ship and the target terminal are the same, controlling the ship monitoring equipment to monitor the moving state of the target ship according to a second preset period, controlling the code detection equipment to acquire the user identification code of the target terminal according to the second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal, wherein the moving state comprises a moving direction and a moving speed;
When the target ship and the target terminal are determined to stop moving at the same time, and the time for stopping moving is larger than a second preset value, determining that suspected theft exists;
generating first warning information, and sending the first warning information to the target ship and/or the target terminal, wherein the first warning information is used for informing the target terminal and/or the personnel corresponding to the target ship to leave the preset area;
generating first alarm information, and sending the first alarm information to staff, wherein the first alarm information comprises identity information and position information of the target ship and/or user identification code and position information of the target terminal, and the first alarm information is used for informing the staff that suspected theft exists in the preset area.
2. The method according to claim 1, further comprising the step, after calculating a first distance from a target location, where the target terminal is located, if the target terminal is present, of:
when the first distance is smaller than or equal to the first preset value, controlling the code detection equipment to acquire a user identification code of the target terminal according to the second preset period, and calculating the moving state of the target terminal according to the user identification code of the target terminal;
If the position of the target terminal in the preset area is determined to be unchanged and the unchanged time is greater than the second preset value, determining that suspected theft exists;
generating second warning information, and sending the second warning information to the target terminal, wherein the second warning information is used for informing people corresponding to the target terminal to leave the preset area;
generating second alarm information, and sending the second alarm information to the staff, wherein the second alarm information comprises a user identification code and position information of the target terminal, and the second alarm information is used for informing the staff that suspected theft exists in the preset area.
3. The method according to claim 2, wherein after controlling the code detection device to acquire the user identification code of the target terminal according to the second preset period and calculating the movement state of the target terminal according to the user identification code of the target terminal when the first distance is less than or equal to the first preset value, further comprising the steps of:
and if the position change of the target terminal in the preset area is determined or the time for keeping the position change is smaller than the second preset value, the monitoring of the target terminal is released.
4. A method according to claim 1 or 3, characterized in that the method further comprises the steps of:
storing suspected theft information corresponding to the suspected theft to a sample library, wherein the sample library is stored in the management platform, and the suspected theft information comprises suspected theft time and a user identification code of the target terminal;
and generating a suspected theft behavior function according to the sample library, wherein the suspected theft behavior function is used for representing the relation between the suspected theft occurrence frequency and the time period.
5. The method according to claim 4, further comprising the step of:
and adjusting the working mode of the code detection device according to the suspected theft behavior function, wherein the working mode comprises a high-power consumption mode and a low-power consumption mode, the detection range covered by the high-power consumption mode is larger than the detection range covered by the low-power consumption mode, and/or the first preset period corresponding to the high-power consumption mode is smaller than the first preset period corresponding to the low-power consumption mode.
6. The method according to claim 1 or 2, characterized in that after said determining that there is a suspected theft if it is determined that there is a time greater than a second preset value when it is monitored that the target ship is stopped moving simultaneously with the target terminal, or after said determining that there is a suspected theft if it is determined that the position of the target terminal in the preset area remains unchanged and the time remaining unchanged is greater than the second preset value, further comprising the steps of:
Storing the user identification code of the target terminal to a mobile terminal blacklist, and storing the identity information of the target ship to a ship blacklist; or alternatively, the first and second heat exchangers may be,
and storing the user identification code of the target terminal to the mobile terminal blacklist.
7. The method according to claim 6, further comprising the step of:
when the user identification code of the mobile terminal in the mobile terminal blacklist is acquired within the first preset range through the code detection equipment and/or the identity information of the ship in the ship blacklist is acquired through the ship monitoring equipment, generating third alarm information, wherein the third alarm information is used for reminding the staff of people and/or ships possibly carrying out suspected theft;
and sending the third alarm information to the staff member.
8. A management platform, the management platform comprising: the device comprises a communication module, a judging module and a calculating module;
the communication module is used for controlling the code detection equipment to acquire the user identification code of the mobile terminal in a first preset range according to a first preset period;
the judging module is used for judging whether a target terminal exists according to the user identification code, wherein the target terminal is a terminal of which the user identification code does not belong to a mobile terminal white list;
The computing module is further used for computing a first distance between the position of the target terminal and the target position when the target terminal exists;
the communication module is further used for controlling the ship monitoring equipment to acquire ship information of a preset area when the first distance is larger than a first preset value, wherein the ship information comprises the position of a ship and the identity information of the ship;
the judging module is used for judging whether a target ship exists according to the ship information, wherein the target ship is a ship of which the identity information does not belong to a ship white list;
the communication module is further used for controlling the ship monitoring equipment to monitor the moving states of the target ship and the target terminal according to a second preset period when the target ship exists and the positions of the target ship and the target terminal are the same, and the moving states comprise a moving direction and a moving speed;
the calculation module is further used for determining that suspected theft exists when the target ship and the target terminal stop moving at the same time and the time for stopping moving is larger than a second preset value;
the computing module is further configured to generate first warning information, where the first warning information is used to inform the target terminal and/or a person corresponding to the target ship to leave the preset area;
The communication module is further used for sending the first warning information to the target ship and/or the target terminal;
the computing module is further configured to generate first alarm information, where the first alarm information includes identity information and location information of the target ship, and/or a user identification code and location information of the target terminal, and the first alarm information is used to inform the staff that there is a suspected theft in a preset area;
the communication module is further used for sending the first alarm information to staff.
9. A management platform, the management platform comprising:
a processor, a memory and a bus, said processor and said memory being connected by said bus, wherein said memory is adapted to store a set of program code, said processor being adapted to invoke said program code stored in said memory to perform the method according to any of claims 1-7.
10. A system for behavior prediction based on signal detection, the system comprising: a code detection device, a ship monitoring device and a management platform according to any of claims 8-9, which management platform is in communication connection with the code detection device and the ship monitoring device;
The code detection equipment is used for collecting the user identification codes of the mobile terminals in a first preset range according to a first preset period;
the ship monitoring equipment is used for collecting ship information of a preset area when a first distance is larger than a first preset value, wherein the ship information comprises the position of a ship and the identity information of the ship, the first distance is the distance between the position of a target terminal and the target position, and the target terminal is a terminal with a user identification code which does not belong to a mobile terminal white list;
the ship monitoring device is further configured to monitor a movement state of the target ship according to a second preset period if the target ship exists and the target ship is located at the same position as the target terminal, where the movement state includes a movement direction and a movement speed, and the target ship is a ship whose identity information does not belong to a ship whitelist
The code detection device may be further configured to collect a user identification code of the target terminal according to the second preset period.
CN202310605397.6A 2023-05-25 2023-05-25 Behavior prediction method, management platform and system based on signal detection Pending CN116723465A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310605397.6A CN116723465A (en) 2023-05-25 2023-05-25 Behavior prediction method, management platform and system based on signal detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310605397.6A CN116723465A (en) 2023-05-25 2023-05-25 Behavior prediction method, management platform and system based on signal detection

Publications (1)

Publication Number Publication Date
CN116723465A true CN116723465A (en) 2023-09-08

Family

ID=87874418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310605397.6A Pending CN116723465A (en) 2023-05-25 2023-05-25 Behavior prediction method, management platform and system based on signal detection

Country Status (1)

Country Link
CN (1) CN116723465A (en)

Similar Documents

Publication Publication Date Title
US10771945B2 (en) Tracking and theft-recovery system for mobile assets
CN102724478B (en) Embedded mobile intelligent monitoring system facing public safety service
CN109698934B (en) Region monitoring method and device
US9916742B2 (en) Automatic notification of a conclusion of real property showing based on user device detection
US11145209B2 (en) Method and system for identifying location of a parked vehicle
US20170278382A1 (en) Risk early warning method and apparatus
CN112530601A (en) Campus epidemic situation monitoring method and device, computer equipment and storage medium
CN112037477A (en) Indoor electronic fence positioning method and system based on RFID
US10033457B2 (en) Blind spot determination
CN104796981B (en) Safety region alarming method and system based on multiple base station identifications and mobile terminal
KR101324933B1 (en) Position tracing method and system using wireless lan
CN111724556A (en) Anti-theft tracking method, device and system for seismic instrument
Radianti et al. Smartphone sensing platform for emergency management
CN107645650B (en) Security area monitoring method and security area monitoring system
CN106534516A (en) Intelligent mobile phone, theft tracking system and theft tracking method
CN116723465A (en) Behavior prediction method, management platform and system based on signal detection
CN101521928A (en) Positioned mobile alarm method and system based on mobile network
CN116668954A (en) Personnel management method, device, terminal and storage medium based on electronic fence
US11195403B2 (en) Activity-based rules for compliance detection using body-worn offender monitoring electronic devices
CN106530641A (en) Intelligent anti-lost device, working method thereof and intelligent anti-lost system
CN113810847A (en) Position calculation method, device, system, equipment and readable storage medium
Suleiman et al. Vehicle theft alert and location identification using GSM, GPS and web technologies
EP3710947B1 (en) Method for tracking chemical applications and providing warnings regarding chemical exposure times
KR101580816B1 (en) Sensor node detection system and method for the sensor node detection system
CN213814930U (en) Distance over-range alarm system based on LoRa technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination