CN118246777A - Performance assessment method, system, equipment and medium for security check work - Google Patents

Performance assessment method, system, equipment and medium for security check work Download PDF

Info

Publication number
CN118246777A
CN118246777A CN202211661597.5A CN202211661597A CN118246777A CN 118246777 A CN118246777 A CN 118246777A CN 202211661597 A CN202211661597 A CN 202211661597A CN 118246777 A CN118246777 A CN 118246777A
Authority
CN
China
Prior art keywords
security
personnel
performance assessment
working state
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211661597.5A
Other languages
Chinese (zh)
Inventor
党杰
胡驰峰
马艳芳
李玮
王涛
宁洪志
刘福建
张洋
佟宣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202211661597.5A priority Critical patent/CN118246777A/en
Publication of CN118246777A publication Critical patent/CN118246777A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a performance assessment method for security check work, which comprises the following steps: acquiring working state data of security personnel; acquiring detection data on detection equipment operated by the security check personnel; transmitting a contraband map to the detection apparatus; generating a judgment result according to feedback of the security check personnel to the forbidden graph; and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results. According to the performance assessment method, the working state and the working capacity of security personnel can be effectively reflected through the working state data, the detection data and the judgment of the forbidden article graph, the working quality level of the related security personnel can be assessed according to the generated performance assessment, and the improvement of the security quality control technology level is facilitated.

Description

Performance assessment method, system, equipment and medium for security check work
Technical Field
The application belongs to the technical field of security inspection, and particularly relates to a performance assessment method, a system, electronic equipment, a readable storage medium and a product for security inspection work.
Background
The performance assessment of the existing security inspection layering business system on security inspection personnel is generally based on statistics of traffic, and state information in the working process is not used as performance assessment content, so that the working quality condition of the security inspection personnel cannot be comprehensively assessed.
Disclosure of Invention
In view of the technical problems, the application provides a performance assessment method, a system, equipment, a medium and a product for security inspection work, which effectively reflect the working state of security inspection personnel and improve the quality of security inspection by taking the combination of the working state data, the detection data and the feedback result of a forbidden article graph as performance assessment indexes of the security inspection personnel.
The first aspect of the application provides a performance assessment method for security check work, comprising the following steps:
acquiring working state data of security personnel;
acquiring detection data on detection equipment operated by the security check personnel;
transmitting a contraband map to the detection apparatus;
generating a judgment result according to feedback of the security check personnel to the forbidden graph;
and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results.
According to the performance assessment method, the working state and the working capacity of security personnel can be effectively reflected through the working state data, the detection data and the judgment of the forbidden article graph, the working quality level of the related security personnel can be assessed according to the generated performance assessment, and the improvement of the security quality control technology level is facilitated.
Further, the method further comprises:
And feeding back the performance evaluation result to the security personnel in real time, and storing the performance evaluation result in a quality control server.
Further, acquiring working state data of security personnel includes:
acquiring a first graph judging result of a security check image, wherein the first graph judging result is obtained by calculation of an artificial intelligence algorithm;
Acquiring a second graph judging result of the security inspection image, wherein the second graph judging result is obtained by the security inspection personnel;
comparing the first graph judgment result with the second graph judgment result to obtain a comparison result;
and generating working state data according to the comparison result.
Further, generating working state data according to the comparison result includes:
The security inspection images comprise a plurality of groups, each group of security inspection images generates a comparison result, and working state data is generated according to the plurality of comparison results.
Further, sending the contraband graph to the detection apparatus includes:
Randomly selecting at least one forbidden article map in the forbidden article map library;
and issuing the forbidden article map to the detection equipment.
Further, transmitting the contraband map to the detection apparatus includes at least one of transmitting during a preset time period and transmitting during an arbitrary time period.
Further, before sending the contraband map to the detection apparatus, the method further includes:
Judging the state of the working state data or/and the detection data;
and when the working state data or/and the detection data are abnormal, transmitting a contraband map to the detection equipment.
Further, the working state data comprise working attitudes, working habits and working capacities of the security check staff, and the detection data comprise departure times and departure time of each time.
A second aspect of the present application provides a performance assessment system for security check work, comprising: the first acquisition module is used for acquiring working state data of security personnel; the second acquisition module is used for acquiring detection data on detection equipment operated by the security personnel; an image transmission module for: transmitting a contraband map to the detection apparatus; the result generation module is used for generating a judgment result according to feedback of the security personnel to the forbidden article map; a performance assessment module for: and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results.
A third aspect of the present application provides an electronic device comprising: one or more processors; and a memory configured to store one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the performance assessment method described above.
A fourth aspect of the present application also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the performance assessment method described above.
A fifth aspect of the present application also provides a computer program product comprising a computer program which when executed by a processor implements the performance assessment method described above.
Drawings
The foregoing and other objects, features and advantages of the application will be apparent from the following description of embodiments of the application with reference to the accompanying drawings, in which:
Fig. 1 schematically illustrates an application scenario diagram of a performance assessment method, system, device, medium and program product according to an embodiment of the present application;
fig. 2 schematically illustrates a flow chart of a performance assessment method in accordance with an embodiment of the present application;
FIG. 3 schematically illustrates a flow chart for graph error rate determination in accordance with an embodiment of the present application;
FIG. 4 schematically shows a schematic block diagram of a decision graph error rate according to an embodiment of the application;
FIG. 5 schematically illustrates a flow chart of transmitting a contraband graph to a detection apparatus using TIP in accordance with an embodiment of the present application;
fig. 6 schematically illustrates a block diagram of a performance assessment system in accordance with an embodiment of the present application; and
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement a performance assessment method in accordance with an embodiment of the present application.
Detailed Description
Hereinafter, embodiments of the present application will be described with reference to the accompanying drawings. It should be understood that the description is only illustrative and is not intended to limit the scope of the application. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the application. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the present application.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The effective performance assessment of security personnel is also an important management measure in security quality control. The performance assessment of the existing security inspection layering business system on security inspection personnel is generally based on statistics of traffic, and for example, the performance assessment comprises total number of image judgment, total number of open inspection, total number of recheck, total number of release, open inspection rate, average image judgment time, overtime alarm number, open package with or without forbidden number, and the like, and abnormal behaviors such as distraction, off duty, fatigue and the like can possibly occur in the image judgment process of the security inspection personnel, and the abnormal behaviors also become conditions affecting the working quality of the security inspection personnel. However, in the existing scheme, the working state information is not used as performance assessment content, so that the working quality condition of security personnel cannot be comprehensively assessed.
In order to solve the problems, the application provides a performance assessment method for security inspection work, which takes the combination of three aspects of working state data, detection data and feedback results of forbidden figures as performance assessment indexes of security inspection personnel, effectively reflects the working state of the security inspection personnel and is beneficial to improving the quality of security inspection.
Fig. 1 schematically illustrates an application scenario diagram of a performance assessment system according to an embodiment of the present application.
As shown in fig. 1, an application scenario 100 according to this embodiment may include a security check person using a quality control terminal judgment chart. The network 104 is used as a medium for providing a communication link between the quality control terminals 101, 102, 103 and the quality control server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The security personnel can use the quality control terminals 101, 102, 103 to interact with the quality control server 105 through the network 104 to receive or send messages, etc. For example, the quality control terminals 101, 102, 103 may send the collected working state data of the security personnel and the detection data on the detection device to the quality control server 105. The quality control server 105 may process the data collected by the quality control terminals 101, 102, 103. For example, the quality control server 105 may process the attention data and the workload data of the security personnel collected by the quality control terminals 101, 102, 103 to obtain the working state data index of the security personnel, and then combine the working state data index with the detection data of the security equipment to determine whether the working state data index is abnormal data.
The quality control terminals 101, 102 and 103 can be provided with software for a security check person to judge the graph and software for collecting detection data. The quality control terminals 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The quality control server 105 may be a server that provides data collection and processing functions, such as a quality control server that provides support for websites browsed by security personnel using the quality control terminals 101, 102, 103 (as examples only). The quality control server may be configured to process data collected by the quality control terminals 101, 102, 103, for example, the quality control server 105 may be a related server system configured to collect quality control data of inspection of passengers, line inspection, or cargo inspection systems.
It should be noted that, the performance assessment method provided in the embodiment of the present application may be generally executed by the quality control server 105. Accordingly, the performance assessment system provided in the embodiments of the present application may be generally disposed in the quality control server 105. The performance assessment method provided in the embodiment of the present application may also be performed by a quality control server or a quality control server cluster that is different from the quality control server 105 and is capable of communicating with the quality control terminals 101, 102, 103 and/or the quality control server 105. Accordingly, the performance assessment system provided in the embodiments of the present application may also be disposed in a quality control server or a quality control server cluster different from the quality control server 105 and capable of communicating with the quality control terminals 101, 102, 103 and/or the quality control server 105.
It should be understood that the numbers of quality control terminals, networks, and quality control servers in fig. 1 are merely illustrative. Any number of quality control terminals, networks and quality control servers can be provided according to the implementation requirements.
The performance assessment method of the application embodiment will be described in detail below with reference to fig. 2 to 4 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flow chart of a performance assessment method of a security check job in accordance with an embodiment of the present application.
As shown in fig. 2, the performance assessment method of this embodiment includes operations S210-S250, specifically:
in operation S210, working state data of security personnel is acquired.
The quality control terminal is provided with a camera which can acquire the facial data of the security personnel, the camera can acquire the working state data of the security personnel in real time, the working state data can comprise the working attitude, working habit and working capacity of the security personnel, and the facial expression of the security personnel is analyzed, so that the assessment of the working quality of the security personnel is realized.
The working attitude comprises the concentration degree of drawing recognition and the operation activity degree, such as the error rate of drawing judgment, the distraction times, the fatigue degree and the unpacking quantity; the first completion rate and the judgment chart review rate are included in the working habit, for example, security check image review; the working ability includes the working proficiency and the total quantity of the graph judgment, such as graph judgment time, graph judgment speed and graph judgment quantity.
In performance assessment of security personnel, the working quality of the relevant security personnel can be directly reflected through the working state data. The working state data of the security personnel collected by the quality control terminal can quantitatively evaluate the working quality of the related security personnel, provide reliable basis for the capability evaluation and screening of the security personnel, and reflect the working efficiency of the related security personnel in the graph judging process.
In operation S220, detection data on detection equipment operated by a security inspector is acquired.
And the security check personnel performs graph judgment processing on the quality control terminal, and related processing actions are completed by manual operation. The quality control terminal can collect detection data on the detection equipment so as to reflect the working condition of security check personnel operating the quality control terminal.
It is understood that the detection data is the operation state information of the detection device, such as online, offline, abnormality, and diagnosis information. By acquiring the on-line state information and the off-line state information of the detection equipment, the information such as the working time, the on-duty time, the off-line times and the off-line time of each time of the related security personnel can be calculated.
In performance assessment of security personnel, the working condition of the relevant security personnel can be reflected indirectly through the detection data. The quality control terminal is used for collecting detection data on the detection equipment as performance assessment indexes, so that the working state of related security check personnel can be effectively reflected, and the working quality of security check judgment diagrams is promoted.
In operation S230, a contraband map is transmitted to the detection apparatus.
Since the security inspection work mainly relies on the security inspection personnel to actively observe the security inspection image, the identification capability of the security inspection personnel to the prohibited object image in the security inspection work directly influences the quality of security inspection.
Aiming at performance assessment of the operation, the performance assessment can be carried out by using a TIP (THREAT IMAGE project, dangerous goods image injection) mode, wherein the TIP is used as an auxiliary function of detection equipment and is mainly used for randomly injecting virtual contraband in a contraband drawing library in a real security inspection image.
Aiming at the hand-held baggage security check service or the consignment baggage security check service, a quality controller can issue pictures to any one detection device, wherein the pictures comprise pseudo dangerous goods fused in the current security check image, and the working quality check of security check personnel is implemented. By inserting the examination results such as image categories, security personnel conclusions and the like, the working quality level of the security personnel is effectively reflected, so that the intervention treatment is timely performed when the poor working quality is found after the evaluation.
In operation S240, a determination result is generated according to feedback of the security personnel to the forbidden article map.
Feedback from security personnel to the contraband map may be understood as the security personnel's operational behavior on the contraband map, for example, finding and marking suspicious items from within the contraband map. And judging whether the judgment is correct or not through the feedback in a manual mode or an AT mode.
In one embodiment, the manual mode may be a recheck of the forbidden graph by a quality control person, the quality control person is used as a person with a certain proficiency and a great experience in identifying suspicious objects, the graph judging result of the security check person can be audited, and the result of judging correctly or judging incorrectly can be generated through the feedback verification of the quality control person to the security check person.
In another embodiment, the artificial intelligence form can be the reinspection of the forbidden article graph by the artificial intelligence graph, the graph judgment result of the security check personnel can be checked, and the result of correct judgment or incorrect judgment can be generated through the feedback verification of the artificial intelligence graph judgment to the security check personnel.
In operation S250, a performance evaluation result of the security personnel is obtained according to at least one of the working state data of the security personnel, the detection data on the detection device, and the judgment result.
The result of performance evaluation can reflect the working quality of the relevant security personnel, when the performance is higher, the working quality of the relevant security personnel is better, and when the performance is lower, the working quality of the relevant security personnel is poorer, and at this time, the quality control personnel needs to actively intervene, for example, the security equipment is controlled to stop running so as to ensure the overall security quality control level.
The working state data can show the working attitude, working habit and working capacity of related security personnel; the detection data can show the actual working time of the related security personnel; the judging result can show the working level of the related security personnel; and generating performance evaluation results at least at one point in the steps to evaluate the working quality level of the related security personnel, and reflecting the direction of the security personnel to be improved in working quality so as to improve the security level.
It should be noted that, when performance evaluation result calculation is performed through the working state data, the detection data and the judgment result, weight can be added according to the importance degree in practice, so as to attach to the actual situation and obtain a more real performance score.
According to the performance assessment method, the working state and the working capacity of security personnel can be effectively reflected through the working state data, the detection data and the judgment of the forbidden article graph, the working quality level of the related security personnel can be assessed according to the generated performance assessment, and the improvement of the security quality control technology level is facilitated.
The quality control server can effectively manage all stored images and security check data records, and can retrieve and check the images according to flight numbers, cabinet number, channel numbers, security check personnel for image interpretation, image judgment results, image generation time and the like. Of course, for the performance evaluation result of the security personnel, the performance evaluation result can be fed back to the security personnel in real time and stored at the quality control server.
Fig. 3 schematically shows a flowchart for determining the error rate of a graph in acquiring working state data of security personnel according to an embodiment of the present application. Fig. 4 is a schematic block diagram schematically showing the error rate of a graph in acquiring working state data of a security personnel according to an embodiment of the present application in combination with fig. 3.
As shown in fig. 3, the acquisition method of this embodiment includes operations S310 to S340. The following operation is a step of performing rechecking on the graph judging result of the security personnel by artificial intelligence, and the error rate of the graph judging of the related security personnel is generated by rechecking the graph judging result of the security personnel.
It should be noted that, the error rate of the graph judgment can be finished through manual recheck verification, and the quality inspector can remotely judge the graph judgment result of the security inspector through real-time monitoring of the graph recognition behavior of the security inspector, and generate the error rate of the related security inspector.
In operation S310, a first graph result of the security inspection image is obtained, where the first graph result is obtained by calculation of an artificial intelligence algorithm.
The quality control server side sends a security inspection image to the artificial intelligent image judging device and receives a first image judging result obtained by identifying the security inspection image returned by the artificial intelligent image judging device, wherein the first image judging result is a result of marking forbidden articles or suspected articles displayed in the security inspection image by the artificial intelligent image judging device.
In one embodiment, in the security inspection image, if the forbidden or suspected article exists, the artificial intelligence image judging device can perform marking processing on the forbidden or suspected article, and a result generated after the processing is a first image judging result. In another embodiment, in the security inspection image, if there is no forbidden article or suspicious article, the artificial intelligence image judgment device does not have a mark in the security inspection image, but the result is still the first image judgment result. It can be understood that whether the security check image is marked or not after passing through the artificial intelligence graph judging device, the processing result is regarded as a first graph judging result.
The artificial intelligence image judging device can be intelligent device of artificial intelligence algorithm for safety inspection image, the safety inspection image is generated according to safety inspection package, and forbidden articles or suspected articles can be displayed in the safety inspection image.
In operation S320, a second graph result of the security inspection image is obtained, where the second graph result is obtained by the security inspection personnel.
And the quality control server side sends the security inspection image to the quality control terminal and receives the security inspection image returned by the quality control terminal to identify and obtain a second graph judgment result, wherein the second graph judgment result is a result of marking forbidden articles or suspected articles in the security inspection image by security inspection personnel through the quality control terminal.
In one embodiment, if there is a forbidden or suspected article in the security inspection image, security inspection personnel can mark the forbidden or suspected article, and the processed result is the second graph judgment result. In another embodiment, in the security inspection image, if there is no forbidden article or suspicious article, the security inspection personnel has no mark in the security inspection image, but the result is still the second graph judgment result. It can be understood that whether the security inspection image is marked or not after the security inspection image passes through the judgment chart of the security inspection personnel, the processing result is regarded as a second judgment chart result.
In operation S330, the first graph judgment result and the second graph judgment result are compared to obtain a comparison result.
When the first graph judgment result and the second graph judgment result are the same, the comparison result is correct; and when the first judgment result and the second judgment result are different, the comparison result is an error.
In operation S340, working state data is generated according to the comparison results, wherein the security inspection images include a plurality of groups, each group of security inspection images generates a comparison result, and the working state data is generated according to the plurality of comparison results.
A quality inspection terminal is generally allocated with a plurality of groups of security inspection images, and each group of security inspection images is required to be subjected to security inspection personnel judgment and artificial intelligent equipment judgment, so that a result which is compared to be correct or incorrect is generated. The working quality level of the security personnel can be reflected by counting the proportion of the total number of errors of the related security personnel to the total judgment chart number and taking the proportion as one item of working state data in the examination index of the security personnel.
Through the comparison of the artificial intelligence judgment chart and the safety inspection personnel judgment chart, the judgment chart level of the safety inspection personnel is effectively checked, the safety inspection personnel judgment chart capacity based on experience is combined with the artificial intelligence equipment judgment chart result, and the performance assessment intelligence level can be improved.
Figure 5 schematically illustrates a flow chart for transmitting a contraband graph to a detection apparatus using TIP in accordance with an embodiment of the present application.
As shown in fig. 5, the transmission method of this embodiment includes operations S410 to S420.
At least one contraband graph in the contraband gallery is randomly selected in operation S410.
In operation S420, the contraband graph is issued to the detection apparatus.
When working state data and detection data of security personnel are abnormal, an X-ray image corresponding to the forbidden article or a figure of the forbidden article is selected from a forbidden article drawing library, the X-ray image or the figure of the forbidden article is transmitted to X-ray security equipment (detection equipment) of the security personnel in a superposition and insertion mode, and judgment drawing checking contents for fake forbidden articles of the security personnel are displayed on a quality inspection terminal.
According to one embodiment of the application, the contraband map is transmitted to the detection apparatus including at least one of transmission during a preset time period and transmission during an arbitrary time period.
The quality control server side supports a real-time service assessment function and a planning service assessment function.
The real-time service checking function has the functions of real-time service contraband object gallery management and real-time service checking detail statistics and query. The real-time business assessment is to send prohibited object images in any time period and monitor the image judgment results of security check personnel.
The plan service examination can set an examination plan by a quality inspector, and the quality control server side sends the contraband object diagram in a preset time period according to a preset rule. For example, the preset rules include time, detection equipment, and security personnel. And selecting prohibited object graphs from the prohibited object graph library, issuing the prohibited object graphs to a specified X-ray security inspection machine within a specified time, and performing graph judgment and examination on security inspection personnel.
According to one embodiment of the present application, before sending the contraband graph to the detection apparatus, the performance assessment method further includes:
Judging the state of the working state data or/and the detection data;
and when the working state data or/and the detection data are abnormal, transmitting a contraband map to the detection equipment.
For judging the abnormality of the working state data and the detection data, a security inspection working quality monitoring model can be trained in advance, the model can prejudge whether the security inspection working quality is abnormal or not, and whether the preset condition is met or not is confirmed according to a prejudging result.
The preset conditions may be preset thresholds of the working state data and the detection data, and the preset conditions may be preset by a quality control person according to related indexes, for example, the preset conditions may be set according to parameters such as working time, graph number, attention distribution, workload, graph error rate index of security personnel, and the like.
It is understood that the abnormality of the operating state data and the detection data can be judged by preset conditions set in advance. And when the working state data and the detection data are lower than the preset conditions, judging as an abnormal state.
When working state data and detection data are abnormal, the method sends a forbidden article image to detection equipment with abnormality, displays the forbidden article image on a quality control terminal and provides the forbidden article image for the security personnel to judge, and the feedback result is used as a part of performance assessment of the security personnel.
For example, when the security personnel has abnormal working behaviors such as fatigue, inattention, off-duty and the like, an X-ray image or a forbidden article image of the forbidden article image is selected from the forbidden article image library and provided for the security personnel to judge.
The performance of the security personnel is already affected when the working state data and the detection data are abnormal, and the judgment result also affects the performance of the related security personnel when the working quality of the security personnel is further evaluated. For example, the performance will remain unchanged when the determination is correct, and will float downwards when the determination is incorrect.
The application further provides a performance assessment system for the security check work based on the performance assessment method for the security check work. The system will be described in detail below in connection with fig. 6.
Fig. 6 schematically illustrates a block diagram of a performance assessment system in accordance with an embodiment of the present application.
As shown in fig. 6, the performance assessment system 500 of this embodiment includes a first acquisition module 510, a second acquisition module 520, an image transmission module 530, a result generation module 540, and a performance assessment module 550.
The first obtaining module 510 is configured to obtain working state data of a security personnel. In one embodiment, the first obtaining module 510 may be configured to perform the operation S210 described above, which is not described herein.
The second obtaining module 520 is configured to obtain detection data on a detection device operated by a security check person. In one embodiment, the second obtaining module 520 may be configured to perform the operation S220 described above, which is not described herein.
The image sending module 530 is configured to: and sending the contraband map to the detection device. In one embodiment, the image sending module 530 may be used to perform the operation S230 described above, which is not described herein.
The result generating module 540 is configured to generate a judgment result according to feedback of the security personnel on the forbidden article map. In one embodiment, the result generating module 540 may be used to perform the operation S240 described above, which is not described herein.
The performance assessment module 550 is configured to: and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results. In one embodiment, the performance evaluation module 550 may be configured to perform the operation S250 described above, which is not described herein.
According to the performance assessment system provided by the embodiment of the application, the performance assessment method can be executed, the working state and the working capacity of security personnel can be effectively reflected through the working state data, the detection data and the judgment of the forbidden article graph, the working quality level of the related security personnel can be assessed according to the generated performance assessment, and the improvement of the security quality control technology level is facilitated.
Any of the first acquisition module 510, the second acquisition module 520, the image transmission module 530, the result generation module 540, and the performance evaluation module 550 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules, according to an embodiment of the present application. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules. According to embodiments of the application, at least one of the first acquisition module 510, the second acquisition module 520, the image transmission module 530, the result generation module 540, and the performance evaluation module 550 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or as hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or as any one of or a suitable combination of three of software, hardware, and firmware. Or at least one of the first acquisition module 510, the second acquisition module 520, the image transmission module 530, the result generation module 540, and the performance evaluation module 550 may be at least partially implemented as a computer program module that, when executed, may perform the corresponding functions.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement a performance assessment method in accordance with an embodiment of the present application.
As shown in fig. 7, the electronic device 600 according to the embodiment of the present application includes a processor 601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. The processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. Processor 601 may also include on-board memory for caching purposes. Processor 601 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the application.
In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are stored. The processor 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. The processor 601 performs various operations of the method flow according to an embodiment of the present application by executing programs in the ROM 602 and/or the RAM 603. Note that the program may be stored in one or more memories other than the ROM 602 and the RAM 603. The processor 601 may also perform various operations of the method flow according to embodiments of the present application by executing programs stored in the one or more memories.
According to an embodiment of the application, the electronic device 600 may further comprise an input/output (I/0) interface 605, the input/output (I/0) interface 605 also being connected to the bus 604. The electronic device 600 may also include one or more of the following components connected to the I/0 interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/0 interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on drive 610 so that a computer program read therefrom is installed as needed into storage section 608.
The present application also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present application.
According to embodiments of the present application, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to an embodiment of the application, the computer-readable storage medium may include the ROM602 and/or RAM 603 and/or one or more memories other than R0M 602 and RAM 603 described above.
Embodiments of the present application also include a computer program product comprising a computer program containing program code for performing the method shown in the flowcharts. The program code means for causing a computer system to carry out the article recommendation method provided in the embodiments of the present application when the computer program product is run on the computer system.
The above-described functions defined in the system/apparatus of the embodiment of the present application are performed when the computer program is executed by the processor 601. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the application.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of signals over a network medium, and downloaded and installed via the communication section 609, and/or installed from the removable medium 611. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611. The above-described functions defined in the system of the embodiment of the present application are performed when the computer program is executed by the processor 601. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the application.
According to embodiments of the present application, program code for executing computer programs provided in embodiments of the present application can be written in any combination of one or more programming languages, and in particular, such computer programs can be implemented in high level procedural and/or object oriented programming languages, and/or in assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the application and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the application. In particular, the features recited in the various embodiments of the application and/or in the claims can be combined in various combinations and/or combinations without departing from the spirit and teachings of the application. All such combinations and/or combinations fall within the scope of the application.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The embodiments of the present application are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present application. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the application is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the application, and such alternatives and modifications are intended to fall within the scope of the application.

Claims (12)

1. The performance assessment method for the security check work is characterized by comprising the following steps of:
acquiring working state data of security personnel;
acquiring detection data on detection equipment operated by the security check personnel;
transmitting a contraband map to the detection apparatus;
generating a judgment result according to feedback of the security check personnel to the forbidden graph;
and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results.
2. The performance assessment method according to claim 1, wherein the method further comprises:
And feeding back the performance evaluation result to the security personnel in real time, and storing the performance evaluation result in a quality control server.
3. The performance assessment method according to claim 1, wherein obtaining operational status data of security personnel comprises:
acquiring a first graph judging result of a security check image, wherein the first graph judging result is obtained by calculation of an artificial intelligence algorithm;
Acquiring a second graph judging result of the security inspection image, wherein the second graph judging result is obtained by the security inspection personnel;
comparing the first graph judgment result with the second graph judgment result to obtain a comparison result;
and generating working state data according to the comparison result.
4. The performance assessment method according to claim 3, wherein generating the work state data based on the comparison result comprises:
The security inspection images comprise a plurality of groups, each group of security inspection images generates a comparison result, and working state data is generated according to the plurality of comparison results.
5. The performance assessment method according to claim 1, wherein sending a contraband map to the detection apparatus comprises:
Randomly selecting at least one forbidden article map in the forbidden article map library;
and issuing the forbidden article map to the detection equipment.
6. The performance assessment method according to claim 5, wherein transmitting a contraband map to the detection apparatus includes at least one of transmitting during a preset time period and transmitting during any time period.
7. The performance assessment method according to claim 1, further comprising, prior to sending a contraband map to the detection apparatus:
Judging the state of the working state data or/and the detection data;
and when the working state data or/and the detection data are abnormal, transmitting a contraband map to the detection equipment.
8. The performance assessment method according to any one of claims 1-7, wherein the work status data includes a work attitude, a work habit, and a work ability of the security personnel, and the detection data includes a departure time and a departure time of each time.
9. The utility model provides a performance assessment system of security check work which characterized in that includes:
the first acquisition module is used for acquiring working state data of security personnel;
The second acquisition module is used for acquiring detection data on detection equipment operated by the security personnel;
An image transmission module for: transmitting a contraband map to the detection apparatus;
The result generation module is used for generating a judgment result according to feedback of the security personnel to the forbidden article map; and
A performance assessment module, the performance assessment module configured to: and obtaining performance evaluation results of the security personnel according to at least one of the working state data of the security personnel, the detection data on the detection equipment and the judgment results.
10. An electronic device, comprising:
one or more processors;
Storage means for storing one or more programs,
Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the performance assessment method of any of claims 1-8.
11. A computer readable storage medium having stored thereon executable instructions that when executed by a processor cause the processor to perform the performance assessment method according to any one of claims 1-8.
12. A computer program product comprising a computer program which, when executed by a processor, implements the performance assessment method according to any one of claims 1-8.
CN202211661597.5A 2022-12-22 2022-12-22 Performance assessment method, system, equipment and medium for security check work Pending CN118246777A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211661597.5A CN118246777A (en) 2022-12-22 2022-12-22 Performance assessment method, system, equipment and medium for security check work

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211661597.5A CN118246777A (en) 2022-12-22 2022-12-22 Performance assessment method, system, equipment and medium for security check work

Publications (1)

Publication Number Publication Date
CN118246777A true CN118246777A (en) 2024-06-25

Family

ID=91562993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211661597.5A Pending CN118246777A (en) 2022-12-22 2022-12-22 Performance assessment method, system, equipment and medium for security check work

Country Status (1)

Country Link
CN (1) CN118246777A (en)

Similar Documents

Publication Publication Date Title
Skorupski et al. A fuzzy reasoning system for evaluating the efficiency of cabin baggage screening at airports
US7124119B2 (en) Communication between intelligent agents and humans in a distributed system environment
US8732838B2 (en) Evaluating the effectiveness of a threat model
KR20190044698A (en) X-ray inspection method that integrates manifest data with imaging/detection processing
CN109816056A (en) Computer room method for inspecting, device and storage medium based on planar bar code technology
CN108268624A (en) User data method for visualizing and system
CN111930603A (en) Server performance detection method, device, system and medium
CN104321753B (en) For the method for usage amount that monitoring resource is presented, computing device and record has the recording medium of the program for execution thereon
CN115686280A (en) Deep learning model management system, method, computer device and storage medium
CN114969040A (en) Data display method and device, electronic equipment and storage medium
US20160170395A1 (en) Case management linkage of updates, evidence, and triggers
CN118246777A (en) Performance assessment method, system, equipment and medium for security check work
JP6052177B2 (en) Monitoring device, monitoring method and program
Jang et al. A proactive alarm reduction method and its human factors validation test for a main control room for SMART
CN111798092B (en) Customs inspection monitoring method, customs inspection monitoring device, computer equipment and storage medium
US20140350995A1 (en) Characterizing Statistical Time-Bounded Incident Management Systems
CN114416422A (en) Problem locating method, apparatus, device, medium and program product
CN114312930A (en) Train operation abnormity diagnosis method and device based on log data
CN113781068A (en) Online problem solving method and device, electronic equipment and storage medium
CN104317859B (en) LED display intelligent classification system and method
CN109540467A (en) Optical fiber automatic test system based on industry internet platform
Bohrey et al. Human Error Management in Aviation Maintenance Using Hybrid FMEA With a Novel Fuzzy Approach.
CN111651753A (en) User behavior analysis system and method
CN109858814A (en) Degree of fatigue cognitive approach and air traffic control risk analysis method
CN116150737B (en) One-stop safety test and management method and system in software development process

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination