CN117522017B - Smart city security monitoring system based on image recognition technology - Google Patents

Smart city security monitoring system based on image recognition technology Download PDF

Info

Publication number
CN117522017B
CN117522017B CN202311457873.0A CN202311457873A CN117522017B CN 117522017 B CN117522017 B CN 117522017B CN 202311457873 A CN202311457873 A CN 202311457873A CN 117522017 B CN117522017 B CN 117522017B
Authority
CN
China
Prior art keywords
security
value
variation
interval
warning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311457873.0A
Other languages
Chinese (zh)
Other versions
CN117522017A (en
Inventor
周耆
杜成凤
曹雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Tunan Software Technology Co ltd
Original Assignee
Guangzhou Tunan Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Tunan Software Technology Co ltd filed Critical Guangzhou Tunan Software Technology Co ltd
Priority to CN202311457873.0A priority Critical patent/CN117522017B/en
Publication of CN117522017A publication Critical patent/CN117522017A/en
Application granted granted Critical
Publication of CN117522017B publication Critical patent/CN117522017B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/774Generating sets of training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/77Processing image or video features in feature spaces; using data integration or data reduction, e.g. principal component analysis [PCA] or independent component analysis [ICA] or self-organising maps [SOM]; Blind source separation
    • G06V10/776Validation; Performance evaluation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Artificial Intelligence (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Emergency Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Primary Health Care (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a smart city security monitoring system based on an image recognition technology, which relates to the technical field of monitoring systems, and discloses an image recognition module, a security early warning module and a security preset module.

Description

Smart city security monitoring system based on image recognition technology
Technical Field
The invention relates to the technical field of monitoring systems, in particular to a smart city security monitoring system based on an image recognition technology.
Background
The smart city originates in the media field, and is characterized in that key infrastructure components and services formed by cities such as city management, education, medical treatment, real estate, transportation, public utilities, public safety and the like are interconnected, efficient and intelligent through application of intelligent computing technologies such as Internet of things, cloud computing, big data, space geographic information integration and the like in the fields of city planning, design, construction, management, operation and the like, so that better life and working services are provided for citizens, a more favorable business development environment is created for enterprises, and a more efficient operation and management mechanism is provided for governments.
The development of the smart city in various facilities is synchronous, and the security supervision of the smart city is required to be well done. The current smart city security system monitors the security of the smart city through the cooperation of monitoring equipment and security personnel. Corresponding monitoring equipment is arranged in each area to monitor and security personnel patrol, but the configuration can only process security events when security crisis occurs, and early warning can not be carried out on the security events in advance.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide a smart city security monitoring system based on an image recognition technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
A smart city security monitoring system based on an image recognition technology comprises an image recognition module, a security early warning module and a security preset module;
the image recognition module is used for collecting video data shot by the monitoring equipment and sending the shot video data to the server for storage;
The security early warning module is used for sending security early warning information to security personnel positioned in a security early warning range, and specifically comprises the following steps:
Converting video data into image frames, taking the image frames as input data of a security detection model, obtaining output data of the security detection model, marking the output data as security detection values, sequencing the obtained security detection values according to the time sequence of the corresponding image frames, obtaining security variation values Af, setting one security standard variation value of each security variation value corresponding to the security monitoring type, marking the security variation value as a security optimal variation value when the security variation value is smaller than the security standard variation value, obtaining An Youzhi Bn, and marking the security variation value as security risk variation value when the security variation value is larger than or equal to the security standard variation value, and obtaining security risk value Rc;
Acquiring a security monitoring value Gt, setting a security monitoring threshold value as Dm, when the security monitoring value Gt is more than or equal to the security monitoring threshold value Dm, not performing processing, marking monitoring equipment to which the video data belongs as security early warning equipment when the security monitoring value Gt is less than the security monitoring threshold value Dm, and drawing a circle with a preset radius by taking the position of the security early warning equipment as a circle center to acquire a security early warning range, and sending security early warning information to security personnel positioned in the security early warning range;
the security protection preset module is used for adjusting the number of security protection personnel corresponding to the monitoring equipment in the security protection early warning range, and specifically comprises the following steps:
When the monitoring equipment is marked as security early-warning equipment, marking the marking time as security early-warning time, acquiring all security early-warning time of the monitoring equipment in the current time n days of the system, sequencing the security early-warning time according to the time sequence, performing time difference calculation on two adjacent security early-warning time after sequencing, acquiring to acquire security early-warning intervals, setting each security early-warning interval to correspond to a standard early-warning interval, marking the security early-warning interval as an early-warning low-standard interval when the security early-warning interval is smaller than the standard early-warning interval, acquiring to acquire to a pre-low value Xb, and marking the security early-warning interval as an early-warning high-standard interval when the security early-warning interval is larger than or equal to the standard early-warning interval, and acquiring to acquire to a pre-high value Sa;
Obtaining a security preset value Ty, setting a security preset high value as Hd, setting a security preset low value as Lm, when the security preset value Ty is larger than or equal to the security preset high value Hd, adjusting the number of security personnel of the monitoring equipment in a security early warning range upwards, when the security preset low value Lm is smaller than or equal to the security preset value Ty and smaller than the security preset high value Hd, not adjusting the number of security personnel of the monitoring equipment in the security early warning range, and when the security preset value Ty is smaller than the security preset low value Lm, adjusting the number of security personnel of the monitoring equipment in the security early warning range downwards.
Further, the security change value Af is obtained by the following steps: and marking the next previous security detection value after sequencing as a previous security detection value, marking the next security detection value after sequencing as a next security detection value, performing difference value calculation on the next security detection value and the previous security detection value, obtaining a security change value, and marking the security change value as Af.
Further, the larger the value of the output data of the security detection model is, the higher the security risk is.
Further, an Youzhi Bn is obtained by the following steps: calculating the difference value between the security standard variation value and the security variation value to obtain security variation, summing all security variation values and taking an average value to obtain average variation, marking as Wz, obtaining the shooting time of an image frame to which the security variation value belongs before the security variation is subjected, marking the time as security variation time, sequencing all security variation time according to time sequence, calculating the time difference value between two adjacent security variation time after sequencing to obtain security variation interval, summing all security variation intervals and taking an average value to obtain security variation interval, marking as Mh, and utilizing a formulaAnd obtaining An Youzhi Bn, wherein a1 is an average variable coefficient, and a2 is a security variable uniform coefficient.
Further, the security risk value Rc is obtained through the following steps: performing difference calculation on security risk variation values and security standard variation values to obtain security risk variation, summing all security risk variation values and taking an average value to obtain average security risk variation, marking as Ts, obtaining shooting time of an image frame to which a security check value belongs before the security risk variation is subjected, marking the time as security risk variation time, sequencing all security risk variation time according to time sequence, performing time difference calculation on two adjacent security risk variation time after sequencing to obtain security risk variation intervals, summing all security risk variation intervals and taking an average value to obtain security risk variation intervals, marking as Qz, and utilizing a formulaAnd obtaining an security risk value Rc, wherein b1 is an average risk variation coefficient, and b2 is a security risk variation uniform coefficient.
Further, the security monitoring value Gt is obtained through the following steps: and obtaining a security monitoring value Gt by using a formula Gt=Bn×c1-Rc×c2, wherein c1 is An Youzhi coefficients, and c2 is an security risk value coefficient.
Further, the pre-low value Xb is obtained by the following steps: and calculating the difference value between the standard early warning interval and the early warning low standard interval to obtain a pre-low interval difference, summing all the pre-low interval differences to obtain a pre-low interval total difference, marking the pre-low interval total difference as Dk, obtaining the total number of the early warning low standard intervals marked as the safety warning interval and Wg marked as the safety warning interval, and obtaining a pre-low value Xb by using a formula Xb=Dk×d1+Wg×d2, wherein d1 is a pre-low interval total difference coefficient, and d2 is an early warning low standard quantity coefficient.
Further, the pre-high value Sa is obtained by: and calculating the difference value between the early warning high standard interval and the standard early warning interval to obtain a pre-high interval difference, summing all the pre-high interval differences to obtain a pre-high interval total difference, marking the pre-high interval total difference as Rd, obtaining the total number of the early warning high standard intervals marked as the early warning high standard interval and marking the safety pre-warning interval as Kc, and obtaining the pre-high value Sa by using a formula Sa=Rd×e1+Kc×e2, wherein e1 is a pre-high interval total difference coefficient, and e2 is an early warning high standard quantity coefficient.
Further, the security protection preset value Ty is obtained through the following steps: and obtaining a security preset value Ty by using a formula Uj=Xb×f1-Saxf 2, wherein f1 is a pre-low value coefficient, and f2 is a pre-high value coefficient.
Compared with the prior art, the invention has the following beneficial effects:
1. The security early warning module is arranged, so that whether security early warning information needs to be sent to security personnel positioned in a security early warning range or not can be judged according to the change of security risks, early warning is carried out before security crisis occurs, and the security personnel can timely and efficiently handle security events;
2. The security protection preset module is arranged, the number of security protection personnel corresponding to the monitoring equipment in the security protection early warning range can be adjusted, the reasonable number of security protection personnel nearby each monitoring equipment is guaranteed on the basis of reducing the probability of security protection accidents nearby the monitoring equipment, and the security protection personnel are adjusted in real time according to the security protection conditions.
Drawings
FIG. 1 is a schematic block diagram of a security early warning module of the present invention;
fig. 2 is a schematic block diagram of a security protection preset module according to the present invention.
Detailed Description
Example 1
Referring to fig. 1, a smart city security monitoring system based on an image recognition technology comprises an image recognition module and a security early warning module.
The image recognition module is used for collecting video data shot by the monitoring equipment and sending the shot video data to the server for storage.
The security early warning module is used for sending security early warning information to security personnel positioned in a security early warning range, and specifically comprises the following steps:
Converting video data into image frames, taking the image frames as input data of a security detection model, and obtaining the security detection model through the following steps: obtaining a plurality of image frames, marking the image frames as training images, giving image labels to the training images, dividing the training images into a training set and a verification set according to a set proportion, constructing a neural network model, carrying out iterative training on the neural network model through the training set and the verification set, judging that the neural network model is completed to train when the iterative training times are greater than the iterative times threshold, and marking the trained neural network model as a security detection model. The larger the value of the output data of the security detection model is, the higher the security risk is. Obtaining output data of the security detection model, marking the output data as security detection values, sequencing the obtained security detection values according to the time sequence of corresponding image frames, obtaining a security variation value Af, and obtaining the security variation value Af through the following steps: and marking the next previous security detection value after sequencing as a previous security detection value, marking the next security detection value after sequencing as a next security detection value, performing difference value calculation on the next security detection value and the previous security detection value, obtaining a security change value, and marking the security change value as Af. Setting a security standard change value of each security change value corresponding to the security monitoring type, marking the security change value as a security optimal change value when the security change value is smaller than the security standard change value, and acquiring An Youzhi Bn and An Youzhi Bn through the following steps: calculating the difference value between the security standard variation value and the security variation value to obtain security variation, summing all security variation values and taking an average value to obtain average variation, marking as Wz, obtaining the shooting time of an image frame to which the security variation value belongs before the security variation is subjected, marking the time as security variation time, sequencing all security variation time according to time sequence, calculating the time difference value between two adjacent security variation time after sequencing to obtain security variation interval, summing all security variation intervals and taking an average value to obtain security variation interval, marking as Mh, and utilizing a formula An Youzhi Bn is obtained, wherein a1 is an average variable coefficient, a2 is a security variable uniform coefficient, the value of a1 is 0.65, and the value of a2 is 0.47. When the security change value is more than or equal to the security standard change value, marking the security change value as a security risk change value, and obtaining a security risk value Rc. The security risk value Rc is obtained by the following steps: performing difference calculation on security risk variation values and security standard variation values to obtain security risk variation, summing all security risk variation values and taking an average value to obtain average security risk variation, marking as Ts, obtaining shooting time of an image frame to which a security check value belongs before the security risk variation is subjected, marking the time as security risk variation time, sequencing all security risk variation time according to time sequence, performing time difference calculation on two adjacent security risk variation time after sequencing to obtain security risk variation intervals, summing all security risk variation intervals and taking an average value to obtain security risk variation intervals, marking as Qz, and utilizing a formula/>And obtaining an security risk value Rc, wherein b1 is an average risk variation coefficient, b2 is a security risk variation uniform coefficient, b1 is 0.64, and b2 is 0.48.
The security monitoring value Gt is obtained by the following steps: and obtaining a security monitoring value Gt by using a formula Gt=Bn×c1-Rc×c2, wherein c1 is An Youzhi coefficients, c2 is an security value coefficient, c1 is 0.99, and c2 is 0.98. Setting a security monitoring threshold value as Dm, when the security monitoring value Gt is more than or equal to the security monitoring threshold value Dm, not performing processing, marking the monitoring equipment to which the video data belongs as security early warning equipment when the security monitoring value Gt is less than the security monitoring threshold value Dm, and taking the position of the security early warning equipment as a circle center, drawing a circle with a preset radius to obtain a security early warning range, and sending security early warning information to security personnel positioned in the security early warning range. The security early warning module is arranged, whether security early warning information needs to be sent to security personnel positioned in a security early warning range or not can be judged according to the change of security risks, early warning is carried out before security crisis occurs, and the security personnel can timely and efficiently handle security events.
Example 2
Referring to fig. 2, on the basis of embodiment 1, the system further includes a security protection preset module, where the security protection preset module is used to adjust the number of security protection personnel corresponding to the monitoring device in the security protection early warning range, specifically:
When the monitoring equipment is marked as security early-warning equipment, marking the marking time as security early-warning time, acquiring all security early-warning time of the monitoring equipment at the current time n days of the system, sequencing the security early-warning time according to the time sequence, performing time difference calculation on two adjacent security early-warning time after sequencing, acquiring security early-warning intervals, setting each security early-warning interval to correspond to a standard early-warning interval, and marking the security early-warning interval as early-warning low-standard interval when the security early-warning interval is smaller than the standard early-warning interval, acquiring a pre-low value Xb, wherein the pre-low value Xb is acquired through the following steps: and carrying out difference value calculation on the standard early warning interval and the early warning low standard interval to obtain a pre-low interval difference, carrying out summation treatment on all the pre-low interval differences to obtain a pre-low interval total difference, marking the pre-low interval total difference as Dk, obtaining the total number of the safety protection early warning intervals marked as the early warning low standard interval and marking the safety protection early warning intervals as Wg, and obtaining a pre-low value Xb by using a formula Xb=Dk multiplied by d1+Wg multiplied by d2, wherein d1 is a pre-low interval total difference coefficient, d2 is an early warning low standard quantity coefficient, d1 has a value of 0.72, and d2 has a value of 0.58. When the security early warning interval is more than or equal to the standard early warning interval, marking the security early warning interval as an early warning high-standard interval, and obtaining the pre-high value Sa. The pre-high value Sa is obtained by the following steps: and calculating the difference value between the early warning high standard interval and the standard early warning interval to obtain a pre-high interval difference, summing all the pre-high interval differences to obtain a pre-high interval total difference, marking the pre-high interval total difference as Rd, obtaining the total number of the safety protection early warning intervals marked as the early warning high standard interval and marking the safety protection early warning intervals as Kc, and obtaining the pre-high value Sa by using a formula Sa=Rd×e1+Kc×e2, wherein e1 is a pre-high interval total difference coefficient, e2 is an early warning high standard quantity coefficient, e1 has a value of 0.71, and e2 has a value of 0.59.
The security preset value Ty is obtained by the following steps: obtaining a security preset value Ty by using a formula Uj=Xb×f1-Saxf2, wherein f1 is a pre-low value coefficient, f2 is a pre-high value coefficient, the value of f1 is 1.02, and the value of f2 is 1.01. Setting a security preset high value as Hd, setting a security preset low value as Lm, when the security preset value Ty is greater than or equal to the security preset high value Hd, upwardly adjusting the number of security personnel of the monitoring equipment in a security early warning range, when the security preset low value Lm is less than or equal to the security preset value Ty and less than the security preset high value Hd, not adjusting the number of security personnel of the monitoring equipment in the security early warning range, and when the security preset value Ty is less than the security preset low value Lm, downwardly adjusting the number of security personnel of the monitoring equipment in the security early warning range. The security protection preset module is arranged, the number of security protection personnel corresponding to the monitoring equipment in the security protection early warning range can be adjusted, the reasonable number of security protection personnel nearby each monitoring equipment is guaranteed on the basis of reducing the probability of security protection accidents nearby the monitoring equipment, and the security protection personnel are adjusted in real time according to the security protection conditions.
Working principle:
The security early warning module is arranged, whether security early warning information needs to be sent to security personnel positioned in a security early warning range or not can be judged according to the change of security risks, early warning is carried out before security crisis occurs, and the security personnel can timely and efficiently handle security events. The security protection preset module is arranged, the number of security protection personnel corresponding to the monitoring equipment in the security protection early warning range can be adjusted, the reasonable number of security protection personnel nearby each monitoring equipment is guaranteed on the basis of reducing the probability of security protection accidents nearby the monitoring equipment, and the security protection personnel are adjusted in real time according to the security protection conditions.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to those skilled in the art without departing from the principles of the present invention are intended to be considered as protecting the scope of the present template.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.

Claims (2)

1. The intelligent city security monitoring system based on the image recognition technology is characterized by comprising an image recognition module, a security early warning module and a security preset module;
the image recognition module is used for collecting video data shot by the monitoring equipment and sending the shot video data to the server for storage;
The security early warning module is used for sending security early warning information to security personnel positioned in a security early warning range, and specifically comprises the following steps:
Converting video data into image frames, taking the image frames as input data of a security detection model, obtaining output data of the security detection model, marking the output data as security detection values, sequencing the obtained security detection values according to the time sequence of the corresponding image frames, obtaining security variation values Af, setting each security variation value to correspond to a security standard variation value, marking the security variation value as a security optimal variation value when the security variation value is smaller than the security standard variation value, obtaining An Youzhi Bn, and marking the security variation value as security risk variation value when the security variation value is larger than or equal to the security standard variation value, and obtaining security risk value Rc;
Acquiring a security monitoring value Gt, setting a security monitoring threshold value as Dm, when the security monitoring value Gt is more than or equal to the security monitoring threshold value Dm, not performing processing, marking monitoring equipment to which the video data belongs as security early warning equipment when the security monitoring value Gt is less than the security monitoring threshold value Dm, and drawing a circle with a preset radius by taking the position of the security early warning equipment as a circle center to acquire a security early warning range, and sending security early warning information to security personnel positioned in the security early warning range;
the security protection preset module is used for adjusting the number of security protection personnel corresponding to the monitoring equipment in the security protection early warning range, and specifically comprises the following steps:
When the monitoring equipment is marked as security early-warning equipment, marking the marking time as security early-warning time, acquiring all security early-warning time of the monitoring equipment n days before the current time of the system, sequencing the security early-warning time according to time sequence, performing time difference calculation on two adjacent security early-warning time after sequencing, acquiring to acquire security early-warning intervals, setting each security early-warning interval to correspond to a standard early-warning interval, marking the security early-warning interval as early-warning low-standard interval when the security early-warning interval is smaller than the standard early-warning interval, acquiring to acquire to obtain a pre-low value Xb, and marking the security early-warning interval as early-warning high-standard interval when the security early-warning interval is larger than or equal to the standard early-warning interval, and acquiring to acquire to a pre-high value Sa;
Obtaining a security preset value Ty, setting a security preset high value Hd and setting a security preset low value Lm, when the security preset value Ty is larger than or equal to the security preset high value Hd, upwardly adjusting the number of security personnel of the monitoring equipment in a security early warning range, when the security preset low value Lm is smaller than or equal to the security preset high value Hd, not adjusting the number of security personnel of the monitoring equipment in the security early warning range, and when the security preset value Ty is smaller than the security preset low value Lm, downwardly adjusting the number of security personnel of the monitoring equipment in the security early warning range;
The security change value Af is obtained through the following steps: marking the sequenced adjacent previous security detection value as a pre-change security value, marking the sequenced adjacent next security detection value as a post-change security value, performing difference value calculation on the post-change security value and the pre-change security value to obtain a security change value, and marking the security change value as Af;
An Youzhi Bn is obtained by the following steps: calculating the difference value between the security standard variation value and the security variation value to obtain security variation, summing all security variation values and taking an average value to obtain average variation, marking as Wz, obtaining the shooting time of an image frame to which the security variation value belongs before the security variation is subjected, marking the time as security variation time, sequencing all security variation time according to time sequence, calculating the time difference value between two adjacent security variation time after sequencing to obtain security variation interval, summing all security variation intervals and taking an average value to obtain security variation interval, marking as Mh, and utilizing a formula An Youzhi Bn is obtained, wherein a1 is an average variable coefficient, and a2 is a security variable uniform coefficient;
the security risk value Rc is obtained by the following steps: performing difference calculation on security risk variation values and security standard variation values to obtain security risk variation, summing all security risk variation values and taking an average value to obtain average security risk variation, marking as Ts, obtaining shooting time of an image frame to which a security check value belongs before the security risk variation is subjected, marking the time as security risk variation time, sequencing all security risk variation time according to time sequence, performing time difference calculation on two adjacent security risk variation time after sequencing to obtain security risk variation intervals, summing all security risk variation intervals and taking an average value to obtain security risk variation intervals, marking as Qz, and utilizing a formula Obtaining an security risk value Rc, wherein b1 is an average risk variation coefficient, and b2 is a security risk variation uniform separation coefficient;
The security monitoring value Gt is obtained through the following steps: obtaining a security monitoring value Gt by using a formula Gt=Bn×c1-Rc×c2, wherein c1 is An Youzhi coefficients, and c2 is an security risk value coefficient;
The pre-low value Xb is obtained by the following steps: calculating the difference value between the standard early warning interval and the early warning low standard interval to obtain a pre-low interval difference, summing all the pre-low interval differences to obtain a pre-low interval total difference, marking the pre-low interval total difference as Dk, obtaining the total number of the early warning low standard intervals marked as the safety warning interval, marking the safety warning interval as Wg, and obtaining a pre-low value Xb by using a formula Xb=Dk×d1+Wg×d2, wherein d1 is a pre-low interval total difference coefficient, and d2 is an early warning low standard quantity coefficient;
The pre-high value Sa is obtained by the following steps: calculating the difference value between the early warning high standard interval and the standard early warning interval to obtain a pre-high interval difference, summing all the pre-high interval differences to obtain a pre-high interval total difference, marking the pre-high interval total difference as Rd, obtaining the total number of the early warning high standard intervals marked as the early warning high standard interval and marking the safety pre-warning interval as Kc, and obtaining the pre-high value Sa by using a formula Sa=Rd×e1+Kc×e2, wherein e1 is a pre-high interval total difference coefficient, and e2 is an early warning high standard quantity coefficient;
The security protection preset value Ty is obtained through the following steps: and obtaining a security preset value Ty by using a formula Uj=Xb×f1-Saxf 2, wherein f1 is a pre-low value coefficient, and f2 is a pre-high value coefficient.
2. The smart city security monitoring system based on the image recognition technology of claim 1, wherein the larger the value of the security detection model output data is, the higher the security risk is.
CN202311457873.0A 2023-11-04 2023-11-04 Smart city security monitoring system based on image recognition technology Active CN117522017B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311457873.0A CN117522017B (en) 2023-11-04 2023-11-04 Smart city security monitoring system based on image recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311457873.0A CN117522017B (en) 2023-11-04 2023-11-04 Smart city security monitoring system based on image recognition technology

Publications (2)

Publication Number Publication Date
CN117522017A CN117522017A (en) 2024-02-06
CN117522017B true CN117522017B (en) 2024-06-04

Family

ID=89742974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311457873.0A Active CN117522017B (en) 2023-11-04 2023-11-04 Smart city security monitoring system based on image recognition technology

Country Status (1)

Country Link
CN (1) CN117522017B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040707A (en) * 2018-09-19 2018-12-18 信利光电股份有限公司 A kind of security monitoring device and method
CN113066248A (en) * 2021-03-25 2021-07-02 武汉畅途网络科技有限公司 Intelligent community construction security monitoring intelligent management system based on video image processing
CN114615471A (en) * 2022-03-21 2022-06-10 安徽老品牌智能科技有限公司 Security protection monitored control system based on intelligent electronic product
CN114743141A (en) * 2022-04-07 2022-07-12 安徽晶奇网络科技股份有限公司 Dangerous behavior detection system for intelligent community
CN115273413A (en) * 2022-07-04 2022-11-01 江苏启智电子工程有限公司 Building intelligent security system based on Internet of things
CN115393140A (en) * 2022-07-20 2022-11-25 郑州轻工业大学 Community fire-fighting management system based on Internet of things
KR20230051851A (en) * 2021-10-12 2023-04-19 (주)비바 Control system for preventing safety accidents and operation method thereof
CN116279519A (en) * 2023-05-17 2023-06-23 山东新凌志检测技术有限公司 Active safety early warning system for automobile
CN116844105A (en) * 2023-06-10 2023-10-03 广州启盟信息科技有限公司 Logistics service monitoring system
CN116906836A (en) * 2023-08-30 2023-10-20 广东胜昌科技有限公司 Visual management monitoring system and method based on GIS (geographic information system) urban drainage pipe network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040707A (en) * 2018-09-19 2018-12-18 信利光电股份有限公司 A kind of security monitoring device and method
CN113066248A (en) * 2021-03-25 2021-07-02 武汉畅途网络科技有限公司 Intelligent community construction security monitoring intelligent management system based on video image processing
KR20230051851A (en) * 2021-10-12 2023-04-19 (주)비바 Control system for preventing safety accidents and operation method thereof
CN114615471A (en) * 2022-03-21 2022-06-10 安徽老品牌智能科技有限公司 Security protection monitored control system based on intelligent electronic product
CN114743141A (en) * 2022-04-07 2022-07-12 安徽晶奇网络科技股份有限公司 Dangerous behavior detection system for intelligent community
CN115273413A (en) * 2022-07-04 2022-11-01 江苏启智电子工程有限公司 Building intelligent security system based on Internet of things
CN115393140A (en) * 2022-07-20 2022-11-25 郑州轻工业大学 Community fire-fighting management system based on Internet of things
CN116279519A (en) * 2023-05-17 2023-06-23 山东新凌志检测技术有限公司 Active safety early warning system for automobile
CN116844105A (en) * 2023-06-10 2023-10-03 广州启盟信息科技有限公司 Logistics service monitoring system
CN116906836A (en) * 2023-08-30 2023-10-20 广东胜昌科技有限公司 Visual management monitoring system and method based on GIS (geographic information system) urban drainage pipe network

Also Published As

Publication number Publication date
CN117522017A (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN108256447A (en) A kind of unmanned plane video analysis method based on deep neural network
CN116824859B (en) Intelligent traffic big data analysis system based on Internet of things
CN103000029B (en) Automobile video frequency recognition methods and application thereof
CN108270999A (en) A kind of object detection method, image recognition server and system
CN108549862A (en) Abnormal scene detection method and device
CN113569956A (en) Mountain fire disaster investigation and identification method based on AI algorithm
CN114693053A (en) AI intelligent analysis and detection-based risk assessment and risk early warning system and method
CN117522017B (en) Smart city security monitoring system based on image recognition technology
CN113963373A (en) Video image dynamic detection and tracking algorithm based system and method
Statsenko et al. Developing software and hardware for automation of ground urban transport traffic management
CN103824074A (en) Crowd density estimation method based on background subtraction and texture features and system
CN113628172A (en) Intelligent detection algorithm for personnel handheld weapons and smart city security system
CN117319809A (en) Intelligent adjusting method for monitoring visual field
CN112270207A (en) Smoke and fire detection method in community monitoring scene
Choi et al. Air quality prediction with 1-dimensional convolution and attention on multi-modal features
CN110070344A (en) The city management system of task quantization
Beiji et al. Crime hotspot detection and monitoring using video based event modeling and mapping techniques
CN113191170B (en) Public facility two-dimensional code damage inspection effectiveness prediction method and system
CN117830949B (en) Smart city management system and method based on image processing
CN115393900A (en) Intelligent construction site safety supervision method and system based on Internet of things
CN114973704A (en) Method, device, equipment and storage medium for generating signal control strategy
Prezioso et al. Integrating Object Detection and Advanced Analytics for Smart City Crowd Management
CN114373145A (en) Monitoring video scene classification method based on ORB algorithm and capable of obtaining key frames
CN113946464A (en) Alarm noise reduction method combining model and experience pre-training and parallel deduction
CN113516850A (en) Pipeline traffic flow data acquisition method based on space syntactic analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant