WO2023087269A1 - 人员活动控制方法、系统、终端及存储介质 - Google Patents

人员活动控制方法、系统、终端及存储介质 Download PDF

Info

Publication number
WO2023087269A1
WO2023087269A1 PCT/CN2021/131876 CN2021131876W WO2023087269A1 WO 2023087269 A1 WO2023087269 A1 WO 2023087269A1 CN 2021131876 W CN2021131876 W CN 2021131876W WO 2023087269 A1 WO2023087269 A1 WO 2023087269A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
social gathering
activity
personnel
hypergraph
Prior art date
Application number
PCT/CN2021/131876
Other languages
English (en)
French (fr)
Inventor
华井雅俊
泽奥多洛保罗斯·乔治斯
特斯里塔斯·尼古劳斯
Original Assignee
南方科技大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南方科技大学 filed Critical 南方科技大学
Priority to PCT/CN2021/131876 priority Critical patent/WO2023087269A1/zh
Publication of WO2023087269A1 publication Critical patent/WO2023087269A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Definitions

  • the invention relates to the technical field of intelligent monitoring, in particular to a method, system, terminal and storage medium for controlling personnel activities.
  • the present invention aims to solve at least one of the technical problems existing in the prior art. For this reason, the present invention proposes a method for controlling personnel activities, which can limit the flow of personnel in scenes that will increase the risk of transmission, rather than restricting the flow of personnel in all scenes, which can reduce the risk of spreading viruses or other infectious diseases. At the same time, Reduce the impact on the economy caused by blocking all scenes.
  • a method for controlling personnel activities comprising: acquiring personnel location information; generating social gathering activity information according to the personnel location information; acquiring a virus infection hypergraph according to the social gathering activity information; The viral infection hypergraph and the social gathering activity information generate social gathering activity restriction information.
  • the obtaining the location information of a person includes: obtaining individual location information according to a geographic information system data server; and obtaining corresponding personal identification information, time information, and location identification information according to the individual location information.
  • the acquiring the location information of the person further includes: retrieving the location information of the person according to the social network.
  • the generating social gathering activity information according to the personnel location information includes: generating the social gathering activity information according to time information and location identification information;
  • the acquiring a virus infection hypergraph according to the social gathering activity information includes: generating a virus infection hypergraph according to the social gathering activity information and personal identification information.
  • the generating social gathering activity restriction information according to the virus infection hypergraph and the social gathering activity information includes: according to the personal identification information, the time information, the location identification information and the virus infection hypergraph to obtain the maximization parameter of the activity influence transmission limit; generate social gathering activity limitation information according to the maximum activity influence transmission limitation parameter.
  • the method for controlling human activities further includes: obtaining a sample of social gathering activity information; performing repeated simulations according to the sample of social gathering activity information to obtain a propagation sample; applying a greedy algorithm according to the propagation sample to obtain High-risk social gathering activities; generating social gathering activity restriction information according to the high-risk social gathering activities.
  • the present invention after obtaining the high-risk social gathering activities by applying the greedy algorithm according to the propagation samples, it further includes: verifying the high-risk social gathering activities; if the high-risk social gathering activities do not meet the quality If required, then double the number of samples of the social gathering activity information, and return to repeat the simulation according to the samples of the social gathering activity information, so as to obtain propagation samples.
  • a terminal includes: a memory, a processor, and a computer program stored in the memory and operable on the processor.
  • the processor executes the program, it realizes: the first The personnel activity control method described in the aspect.
  • a personnel activity control system comprising: a location information acquisition module, configured to acquire personnel location information; a social gathering activity generation module, configured to generate social gathering activity information according to the personnel location information
  • a computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to: execute the method for controlling personnel activities as described in the first aspect.
  • FIG. 1 is a schematic flow diagram of a personnel activity monitoring method in the related art
  • FIG. 2 is a schematic flow diagram of a personnel activity monitoring method in an embodiment of the present application
  • FIG. 3 is a schematic flow diagram of a method for monitoring personnel activities in an embodiment of the present application
  • FIG. 4 is a schematic flow diagram of a method for obtaining personal location data from a geographic information system in an embodiment of the present application
  • FIG. 5 is a schematic flowchart of a method for generating a hypergraph according to social gathering activities in an embodiment of the present application
  • FIG. 6 is a schematic flow diagram of a method for calculating the maximization of activity impact propagation restrictions in the embodiment of the present application
  • FIG. 7 is a schematic flowchart of a dynamic sampling algorithm for maximizing activity influence propagation limitations in an embodiment of the present application.
  • orientation descriptions such as up, down, front, back, left, right, etc. indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings, and are only In order to facilitate the description of the present invention and simplify the description, it does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
  • FIG. 1 is a schematic flow diagram of a method for monitoring personnel activities in the related art.
  • the method for monitoring personnel activities as shown in FIG. Generate a chart; S103: Confirm the high transmission risk group according to the chart; S104: Isolate the high transmission risk group or contacts. That is, the personnel activity monitoring method in the related art can only be studied on individuals, and cannot effectively control social activities.
  • FIG. 2 is a schematic flow diagram of a method for monitoring personnel activities in an embodiment of the present application.
  • the method for controlling personnel activities as shown in FIG. 2 includes at least the following steps: S201: Obtain a virus-infected network through social gathering activities; Social gathering activities; S203: Reduce the risk of viral infection.
  • a method for controlling personnel activities comprising: acquiring personnel location information; generating social gathering activity information according to the personnel location information; acquiring a virus infection hypergraph according to the social gathering activity information; and social gathering activity information to generate social gathering activity restriction information.
  • the personnel activity monitoring method provided by the present application can monitor N scenarios, and screen out k scenarios that will increase the risk of transmission, where k is less than or equal to N, and further increase the risk of transmission for k scenarios Limit the flow of people in certain scenarios.
  • restricting the flow of people to k scenes that will increase the risk of transmission can reduce the risk of spreading viruses or other infectious diseases, and at the same time, reduce the risk of blocking all scenes. resulting impact on the economy.
  • FIG. 3 is a schematic flow diagram of a method for monitoring personnel activities in an embodiment of the present application.
  • the method for monitoring personnel activities as shown in FIG. 3 includes at least the following steps: S301: Obtain individual location data; Hypergraph; S303 Obtaining high-risk social gathering activities according to Hypergraph; S304: Restricting high-risk social gathering activities.
  • Hypergraph refers to a graph that each side can contain more than two points. Hypergraph Learning is gradually being introduced to solve problems in computer vision and machine learning. . Compared with ordinary graphs, hypergraphs can more accurately describe the relationship between objects with multiple associations.
  • the main difference between a hypergraph and a normal graph is the number of vertices on the edges in the graph. In a normal graph, an edge contains two vertices. In a hypergraph, an edge is called a hyperedge, and a hyperedge Edges contain multiple vertices. If in a hypergraph, all hyperedges contain at most two vertices, then the hypergraph degenerates into a normal graph.
  • obtaining a virus infection hypergraph according to social gathering activity information includes: generating social gathering activity information according to time information and location identification information; generating a virus infection hypergraph according to social gathering activity information and personal identification information.
  • Fig. 4 is the schematic flow chart of the method for obtaining personal position data from geographic information system (Geographic Information System, GIS) in the embodiment of the present application, as shown in Fig. 4 from geographic information system (Geographic Information System, GIS) ), the method for obtaining personal location data at least includes the following steps: S401: obtaining personnel data information from a geographic information system (Geographic Information System, GIS) data server; S402: obtaining individual location data.
  • GIS Geographic Information System
  • obtaining the location information of a person includes: obtaining individual location information according to a geographic information system data server; and obtaining corresponding personal identification information, time information, and location identification information according to the individual location information.
  • Obtaining individual location data for example, personal identification information can be set as A and B, where A arrives at location a at 2020-08-10-13:04, the park, and the latitude and longitude is ( 22.59280,114.00453), according to the information in the database, it can be marked as the work place, and then A arrives at the place b at 2020-08-10-13:29, SUSTech, (22.59396,113.99894), it can be marked as School. As shown, data for the individual with PIN B is also recorded.
  • acquiring the location information of the person further includes: retrieving the location information of the person according to the social network.
  • FIG. 5 is a schematic flowchart of a method for generating a hypergraph based on social gathering activities in an embodiment of the present application.
  • the method for generating a hypergraph based on social gathering activities as shown in FIG. 5 includes at least the following steps: S402: Acquire individual Location data; S501: Establishing a social gathering activity hypergraph according to time and space information; S502: Obtaining a social gathering activity hypergraph.
  • generating social gathering activity restriction information according to the virus infection hypergraph and social gathering activity information includes: obtaining activity influence propagation limit maximization parameters according to personal identification information, time information, location identification information and virus infection hypergraph; The social gathering activity restriction information is generated according to the maximization parameter of the activity influence propagation restriction.
  • step S502 Obtaining the social aggregation activity hypergraph, the social aggregation activity hypergraph records individual A, individual B, individual C, individual D, individual E, and social aggregation identification codes a, b, c, d, e. According to the scope of time and space, determine the social gathering activities a, b, c, d, e and the participating personnel individual A, individual B, individual C, individual D, individual E. Integrate all individual records into the social gathering activities described above and generate a hypergraph.
  • G(V, H) be the hypergraph obtained in S502, where V represents a set of vertices (persons), and H represents a set of hyperedges (social gathering activities).
  • the three basic social gathering activity restriction functions (h in H) are formulated as follows:
  • V(h) V(h′ 0 ) ⁇ V(h′ 1 )... ⁇ V(h′ n ).
  • V(h) represents the set of vertices added to h.
  • h' 0 ,h' 1 ,...,h' n denote hyperedges generated by constraints.
  • m can means to cancel the original activity h; m sh means to cancel the activity h and replace it with a small-scale activity h'0 ; m sp means to cancel the activity h and replace it with multiple small-scale activities h' 0 ,h' 1 ,...,h' n , where the added individuals are the same as h.
  • the cancel function indicates that the restaurant is completely closed.
  • the shrink function represents reducing the maximum capacity of the restaurant.
  • the segmentation function represents dividing customers into multiple isolated groups.
  • X is the set of hyperedges
  • the effect of restrictive measures m to suppress the spread of influence is represented by the reduction of the expected spread amount
  • m i (h i ) is the restrictive measures that represent hi .
  • O m (X) is the restriction effect
  • m is the restriction measure
  • n is the number of elements in the set V
  • v is the individual
  • h is the activity
  • V represents the set of vertices (individuals)
  • H represents the hyperedge (social gathering activities) Set
  • I(v,H) is the expected spread number of individual v (in V) in activity H
  • H ⁇ X ⁇ m(X) means that the set H first makes difference with X, and then merges with m(X) set
  • m(X) represents the restriction measure of the hyperedge set X
  • the present application calculates social activities that maximize the Activity Influence Restriction Maximization (AIRM), and uses a greedy algorithm to screen out k scenarios that will increase the risk of transmission.
  • Restrict means such as personnel restrictions or time restrictions on k scenarios that will increase the risk of transmission, so as to reduce the risk of epidemic disease transmission.
  • the Activity Influence Restriction Maximization (the Activity Influence Restriction Maximization, AIRM) can be expressed as:
  • X is the k subsets of H, namely: O m (X) is the restriction effect, and m is the restriction measure.
  • FIG. 6 is a schematic flow diagram of the calculation method for maximizing the activity influence propagation limit in the embodiment of the present application.
  • the calculation method for maximizing the activity influence transmission limit as shown in FIG. 6 includes at least the following steps: S502: Acquire social gathering activities Hypergraph; S601: input calculation parameters; S602: generate samples by simulating influence propagation on hypergraph; S603: run greedy algorithm to obtain top K influential social gathering activities; S604: end.
  • the personnel activity control method further includes: acquiring social gathering activity information samples; performing repeated simulations according to the social gathering activity information samples to obtain propagation samples; applying a greedy algorithm to obtain high-risk social gathering activities according to the propagation samples; Risky social gathering activity generates social gathering activity restriction information.
  • the activity influence propagation limit maximization calculation method provided in FIG. 6 is used to approximate the calculation of the objective function O m (X).
  • FIG. 7 is a schematic flow diagram of a dynamic sampling algorithm for maximizing activity influence propagation restrictions in an embodiment of the present application.
  • the dynamic sampling algorithm for maximizing activity influence propagation restrictions as shown in FIG. 7 includes at least the following steps: S502: Acquire social Aggregating the activity hypergraph; S701: input calculation parameters; S702: calculating the initial number of samples; S703: generating samples by simulating influence propagation on the hypergraph; S704: running the greedy algorithm to obtain the top K influential social gathering activities; S705: Verify the result according to the parameters; S706: Whether the requirements are met; S707: Double the number of samples; S708: End.
  • the high-risk social gathering activities after the high-risk social gathering activities are obtained by applying the greedy algorithm according to the propagation samples, it further includes: verifying the high-risk social gathering activities; if the high-risk social gathering activities do not meet the quality requirements, doubling the number of social gathering activity information samples , and return to repeat the simulation based on the social aggregation activity information sample to obtain the spread sample.
  • the calculation parameters include the number of restriction measures k, the quality loss factor ⁇ and the probability factor l, and the initial sample number ⁇ is calculated. Subsequently, the influence propagation simulation results on the hypergraph are calculated by an independent cascade model such as "IC model” or a linear threshold model such as "LT model”.
  • a terminal includes: a memory, a processor, and a computer program stored in the memory and operable on the processor.
  • the processor executes the program, it realizes: as in the embodiment of the first aspect Methods of personnel movement control.
  • a personnel activity control system includes: a location information acquisition module, used to acquire personnel location information; a social gathering activity generation module, used to generate social gathering activity information according to the personnel location information; a virus
  • a computer-readable storage medium stores computer-executable instructions, and the computer-executable instructions are used to: execute the method for controlling personnel activities in the embodiment of the first aspect.
  • the device embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cartridges, tape, magnetic disk storage or other magnetic storage devices, or can Any other medium used to store desired information and which can be accessed by a computer.
  • communication media typically embodies computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism, and may include any information delivery media .
  • references to the terms “one embodiment,” “some embodiments,” “exemplary embodiments,” “example,” “specific examples,” or “some examples” are intended to mean that the implementation A specific feature, structure, material, or characteristic described by an embodiment or example is included in at least one embodiment or example of the present invention.
  • schematic representations of the above terms do not necessarily refer to the same embodiment or example.
  • the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种人员活动控制方法、系统、终端及存储介质,该人员活动控制方法包括:获取人员位置信息;根据人员位置信息生成社交聚集活动信息;根据社交聚集活动信息获取病毒感染超图;根据病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息,能够对会提高传播风险的场景进行人员流动限制,而不是全部的场景进行人员流动限制,可以降低病毒或其他传染性疾病的传播风险,同时降低因封锁全部场景而导致的对经济的影响。

Description

人员活动控制方法、系统、终端及存储介质 技术领域
本发明涉及智能监控技术领域,尤其是涉及一种人员活动控制方法、系统、终端及存储介质。
背景技术
对于像新型冠状病毒这样传染性强且存在无症状感染的病毒而言,病毒检测和控制疫情蔓延是一项极其艰巨的任务。为了减少疫情高峰期的感染者数量,全球各地区普遍采取和实施了社交活动限制措施。这种疫情通常会一波又一波地持续扩散,因此,在找到合适的疫苗和治疗方法之前,社交活动限制措施仍将是政府和主管部门可以采取的主要疫情防控手段。限制社交活动虽然能够控制疫情的传播,但是,会给社会经济发展带来沉重的负担。
发明内容
本发明旨在至少解决现有技术中存在的技术问题之一。为此,本发明提出一种人员活动控制方法,能够对会提高传播风险的场景进行人员流动限制,而不是全部的场景进行人员流动限制,可以降低病毒或其他传染性疾病的传播风险,同时,降低因封锁全部场景而导致的对经济的影响。
根据本发明的第一方面实施例的一种人员活动控制方法,包括:获取人员位置信息;根据所述人员位置信息生成社交聚集活动信息;根据所述社交聚集活动信息获取病毒感染超图;根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息。
根据本发明的一些实施例,所述获取人员位置信息,包括:根据地理信息系统数据服务器获取个体位置信息;根据所述个体位置信息获取对应的个人识别信息、时间信息及位置识别信息。
根据本发明的一些实施例,所述获取人员位置信息,还包括:根据社交网络检索人员位置信息。
根据本发明的一些实施例,所述根据所述人员位置信息生成社交聚集活动信息,包括:根据时间信息及位置识别信息生成所述社交聚集活动信息;
根据本发明的一些实施例,,所述根据所述社交聚集活动信息获取病毒感染超图,包括:根据所述社交聚集活动信息和个人识别信息生成病毒感染超图。
根据本发明的一些实施例,所述根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息,包括:根据所述个人识别信息、所述时间信息、所述位置识别信息及所述病毒感染超图获得活动影响传播限制最大化参数;根据所述活动影响传播限制最大化参数生成社交聚集活动限制信息。
根据本发明的一些实施例,所述人员活动控制方法还包括:获取社交聚集活动信息样本;根据所述社交聚集活动信息样本进行重复模拟,以获取传播样本;根据所述传播样本应用贪婪算法获得高风险社交聚集活动;根据所述高风险社交聚集活动生成社交聚集活动限制信息。
根据本发明的一些实施例,在所述根据所述传播样本应用贪婪算法获得高风险社交聚集活动之后,还包括:验证所述高风险社交聚集活动;若所述高风险社交聚集活动不符合质量要求,则加倍所述社交聚集活动信息样本数量,并返回所述根据所述社交聚集活动信息样本进行重复模拟,以获取传播样本。
根据本发明的第二方面实施例的一种终端,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现:如第一方面所述的人员活动控制方法。
根据本发明的第三方面实施例的一种人员活动控制系统,包括:位置信息获取模块,用于获取人员位置信息;社交聚集活动生成模块,用于根据所述人员位置信息生成社交聚集活动信息;病毒感染超图获取模块,用于根据所述社交聚集活动信息获取病毒感染超图;社交聚集活动限制生成模块,用于根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息。
根据本发明的第四方面实施例的一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于:执如第一方面所述的人员活动控制方法。
本发明的附加方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本发明的实践了解到。
附图说明
本发明的上述和/或附加的方面和优点从结合下面附图对实施例的描述中将变得明显和容易理解,其中:
图1为相关技术中人员活动监控方法的流程示意图;
图2为本申请实施例中人员活动监控方法的流程示意图;
图3为本申请实施例中人员活动监控方法的流程示意图;
图4为本申请实施例中从地理信息系统中获取个人位置数据的方法的流程示意图;
图5为本申请实施例中根据社交聚集活动生成超图的方法的流程示意图;
图6为本申请实施例中活动影响传播限制最大化计算方法的流程示意图;
图7为本申请实施例中活动影响传播限制最大化动态采样算法的流程示意图。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能理解为对本发明的限制。
在本发明的描述中,需要理解的是,涉及到方位描述,例如上、下、前、后、左、右等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。
在本发明的描述中,若干的含义是一个或者多个,多个的含义是两个以上,大于、小于、超过等理解为不包括本数,以上、以下、以内等理解为包括本数。如果有描述到第一、第二只是用于区分技术特征为目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量或者隐含指明所指示的技术特征的先后关系。
本发明的描述中,除非另有明确的限定,设置、安装、连接等词语应做广义理解,所属技术领域技术人员可以结合技术方案的具体内容合理确定上述词语在 本发明中的具体含义。
对于像新型冠状病毒这样传染性强且存在无症状感染的病毒而言,病毒检测和控制疫情蔓延是一项极其艰巨的任务。为了减少疫情高峰期的感染者数量,全球各地区普遍采取和实施了社交活动限制措施。这种疫情通常会一波又一波地持续扩散,因此,在找到合适的疫苗和治疗方法之前,社交活动限制措施仍将是政府和主管部门可以采取的主要疫情防控手段。
目前,随着新型冠状病毒疫情防护进入常态化阶段,对于人员活动控制也提出了更高的要求。全面限制社交活动虽然能够控制疫情的传播,但是,会给社会经济发展带来沉重的负担。
参照图1,图1是相关技术中人员活动监控方法的流程示意图,如图1所示的人员活动监控方法,至少包括以下步骤:S101:获取人群物理接触数据;S102:根据人群间的物理接触生成图表;S103:根据图表确认高传播风险人群;S104:对高传播风险人群或接触者进行隔离。即,相关技术中的人员活动监控方法只能针对个体进行研究,无法给出对社交活动的有效控制。
参照图2,图2是本申请实施例中人员活动监控方法的流程示意图,如图2所示的人员活动控制方法,至少包括以下步骤:S201:通过社交聚集活动获得病毒感染网络;S202:限制社交聚集活动;S203:降低病毒感染风险。
在一些实施例中,如图2所示,以工作地、电影院、学校和餐馆四个场景为例,如图2所示,由于工作地和学校虽然不是最初的传染源地,但是,开放工作地和学校会加剧病毒的传播,因此,可以选择关闭工作地和学校而不是全部的场景,能够在保障经济活动可以部分运营的同时,降低了病毒的传播风险。
根据本发明的第一方面实施例的一种人员活动控制方法,包括:获取人员位置信息;根据人员位置信息生成社交聚集活动信息;根据社交聚集活动信息获取病毒感染超图;根据病毒感染超图和社交聚集活动信息生成社交聚集活动限制信息。
在一些实施例中,本申请提供的人员活动监控方法可以实现对N个场景进行监控,并筛选出k个会提高传播风险的场景,其中k小于等于N,并进一步对k个会提高传播风险的场景进行人员流动限制。
在一些实施例中,对k个会提高传播风险的场景进行人员流动限制,而不是 全部的场景进行人员流动限制,可以降低病毒或其他传染性疾病的传播风险,同时,降低因封锁全部场景而导致的对经济的影响。
参照图3,图3是本申请实施例中人员活动监控方法的流程示意图,如图3所示的人员活动监控方法,至少包括以下步骤:S301:获取个体位置数据;S302:根据社交聚集活动生成超图;S303根据超图获取高风险社交聚集活动;S304:对高风险社交聚集活动进行限制。
在一些实施例中,超图(Hypergraph)是指每一个边可以包含两个以上的点所构成的图,超图学习(Hypergraph Learning)正在逐渐被引入用来解决计算机视觉和机器学习上的问题。相对于普通图而言,超图可以更加准确的描述存在多元关联的对象之间的关系。超图与普通图的主要不同在于图中边上顶点的个数的不同,在普通图中,,一条边包含两个顶点,在超图中,边被称为超边(hyperedge),一条超边包含多个顶点。如果一个超图中,所有的超边最多只包含两个顶点,那么超图就会退化为普通图。
在一些实施例中,根据社交聚集活动信息获取病毒感染超图,包括:根据时间信息及位置识别信息生成社交聚集活动信息;根据社交聚集活动信息和个人识别信息生成病毒感染超图。
参照图4,图4是本申请实施例中从地理信息系统(Geographic Information System,GIS)中获取个人位置数据的方法的流程示意图,如图4所示的从地理信息系统(Geographic Information System,GIS)中获取个人位置数据的方法,至少包括以下步骤:S401:获取来自地理信息系统(Geographic Information System,GIS)数据服务器的人员数据信息;S402:获取个体位置数据。
在一些实施例中,获取人员位置信息,包括:根据地理信息系统数据服务器获取个体位置信息;根据个体位置信息获取对应的个人识别信息、时间信息及位置识别信息。
在一些实施例中,如S402:获取个体位置数据所示,例如个人的识别信息可以设置为A和B,其中A在2020-08-10-13:04分到达地点a,公园,经纬度为(22.59280,114.00453),根据数据库内的信息,可以将其标注为工作地,随后,A在2020-08-10-13:29到达地点b,南科大,(22.59396,113.99894),可以将其标注为学校。如图所示,还对个人识别码为B的个体的数据进行了记录。
在一些实施例中,获取人员位置信息,还包括:根据社交网络检索人员位置信息。
参照图5,图5是本申请实施例中根据社交聚集活动生成超图的方法的流程示意图,如图5所示的根据社交聚集活动生成超图的方法,至少包括以下步骤:S402:获取个体位置数据;S501:根据时间和空间信息建立社交聚集活动超图;S502:获取社交聚集活动超图。
在一些实施例中,根据病毒感染超图和社交聚集活动信息生成社交聚集活动限制信息,包括:根据个人识别信息、时间信息、位置识别信息及病毒感染超图获得活动影响传播限制最大化参数;根据活动影响传播限制最大化参数生成社交聚集活动限制信息。
在一些实施例中,如步骤S502:获取社交聚集活动超图所示,社交聚集活动超图记录了个体A、个体B、个体C、个体D、个体E,以及社交聚集识别码a、b、c、d、e。根据时间和空间的范围,确定社交聚会活动a、b、c、d、e及参与的人员个体A、个体B、个体C、个体D、个体E。将所有个体记录整合到上述社交聚会活动中并生成超图。
在一些实施例中,设G(V,H)为S502中获取的超图,其中V表示顶点(个人)集合,H表示超边(社交聚会活动)集合。三种基本的社交聚会活动限制函数(H中的h)公式如下:
Figure PCTCN2021131876-appb-000001
Figure PCTCN2021131876-appb-000002
Split:m sp(h):={h′ 0,h′ 1,...h′ n},
V(h)=V(h′ 0)∪V(h′ 1)...∪V(h′ n).。
其中,V(h)表示加入到h中的顶点的集合。h’ 0,h’ 1,…,h’ n表示由限制生成的超边。
在一些实施例中,m can表示取消原有的活动h;m sh表示取消活动h,替换成小范围的活动h’ 0;m sp表示取消活动h,替换成多个小范围的活动h’ 0,h’ 1,…,h’ n,其中加入的个体与h相同。
在一些实施例中,以餐馆场景为例,取消函数表示餐馆全面停止营业。缩小函数表示减少餐馆的最大容量。分割函数表示将客户分成多个孤立的群体。
在一些实施例中,设X为限制措施超边的集合。对于X的第i个元素h i, 设m i为h i的限制措施,则超边集合X的限制措施m的公式可以表示为:
Figure PCTCN2021131876-appb-000003
其中,X为超边集合,限制措施m抑制影响力传播的效果用预期传播数量的减少量表示,m i(h i)为表示h i的限制措施。
在一些实施例中,给定一个超图G(V,H),设I(v,H)为个体v(在V中)在活动H中的预期传播数量。那么,对于受m限制的超边集合X,限制效果O m(X)的公式可以表示为:
Figure PCTCN2021131876-appb-000004
其中,O m(X)为限制效果,m为限制措施,n为集合V中元素的数量,v为个体,h为活动,V表示顶点(个人)集合,H表示超边(社交聚会活动)集合,I(v,H)为个体v(在V中)在活动H中的预期传播数量,H\X∪m(X)表示集合H先与X做差,再与m(X)做并集,m(X)表示超边集合X的限制措施,
在一些实施例中,本申请通过计算得出活动影响传播限制最大化(the Activity Influence Restriction Maximization,AIRM)的社交活动,并利用贪婪算法筛选出k个会提高传播风险的场景。对k个会提高传播风险的场景进行人员限制或时间限制等限制手段,以降低流行性疾病的传播风险。
在一些实施例中,活动影响传播限制最大化(the Activity Influence Restriction Maximization,AIRM)可以表示为:
Figure PCTCN2021131876-appb-000005
其中,X为H的k个子集,即:
Figure PCTCN2021131876-appb-000006
O m(X)为限制效果,m为限制措施。
参照图6,图6是本申请实施例中活动影响传播限制最大化计算方法的流程示意图,如图6所示的活动影响传播限制最大化计算方法,至少包括以下步骤:S502:获取社交聚集活动超图;S601:输入计算参数;S602:通过模拟超图上的影响传播生成样本;S603:运行贪婪算法以获取前K位有影响力的社交聚会活动;S604:结束。
在一些实施例中,人员活动控制方法还包括:获取社交聚集活动信息样本;根据社交聚集活动信息样本进行重复模拟,以获取传播样本;根据传播样本应用贪婪算法获得高风险社交聚集活动;根据高风险社交聚集活动生成社交聚集活动限制信息。
在一些实施例中,图6提供的活动影响传播限制最大化计算方法的用于近似计算目标函数O m(X)。
参照图7,图7是本申请实施例中活动影响传播限制最大化动态采样算法的流程示意图,如图7所示的活动影响传播限制最大化动态采样算法,至少包括以下步骤:S502:获取社交聚集活动超图;S701:输入计算参数;S702:计算样本的初始数量;S703:通过模拟超图上的影响传播生成样本;S704:运行贪婪算法以获取前K位有影响力的社交聚会活动;S705:根据参数对结果进行验证;S706:是否满足要求;S707:加倍样本数量;S708:结束。
在一些实施例中,在根据传播样本应用贪婪算法获得高风险社交聚集活动之后,还包括:验证高风险社交聚集活动;若高风险社交聚集活动不符合质量要求,则加倍社交聚集活动信息样本数量,并返回根据社交聚集活动信息样本进行重复模拟,以获取传播样本。
在一些实施例中,计算参数包括限制措施k数量、质量损失因子ε和概率因子l,计算出初始样本数θ。随后,通过独立级联模型例如“IC模型”或线性阈值模型例如“LT模型”来计算超图上的影响传播模拟结果。
根据本发明的第二方面实施例的一种终端,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行程序时实现:如第一方面实施例的人员活动控制方法。
根据本发明的第三方面实施例的一种人员活动控制系统,包括:位置信息获取模块,用于获取人员位置信息;社交聚集活动生成模块,用于根据人员位置信息生成社交聚集活动信息;病毒感染超图获取模块,用于根据社交聚集活动信息获取病毒感染超图;社交聚集活动限制生成模块,用于根据病毒感染超图和社交聚集活动信息生成社交聚集活动限制信息。
根据本发明的第四方面实施例的一种计算机可读存储介质,存储有计算机可执行指令,计算机可执行指令用于:执如第一方面实施例的人员活动控制方法。
上面结合附图对本发明实施例作了详细说明,但是本发明不限于上述实施例,在所述技术领域普通技术人员所具备的知识范围内,还可以在不脱离本发明宗旨的前提下作出各种变化。
以上所描述的装置实施例仅仅是示意性的,其中作为分离部件说明的单元可以是或者也可以不是物理上分开的,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统可以被实施为软件、固件、硬件及其适当的组合。某些物理组件或所有物理组件可以被实施为由处理器,如中央处理器、数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示意性实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。
尽管已经示出和描述了本发明的实施例,本领域的普通技术人员可以理解:在不脱离本发明的原理和宗旨的情况下可以对这些实施例进行多种变化、修改、 替换和变型,本发明的范围由权利要求及其等同物限定。

Claims (11)

  1. 一种人员活动控制方法,其特征在于,包括:
    获取人员位置信息;
    根据所述人员位置信息生成社交聚集活动信息;
    根据所述社交聚集活动信息获取病毒感染超图;
    根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息。
  2. 根据权利要求1所述的人员活动控制方法,其特征在于,所述获取人员位置信息,包括:
    获取来自地理信息系统数据服务器的个体位置信息;
    根据所述个体位置信息获取对应的个人识别信息、时间信息及位置识别信息。
  3. 根据权利要求1所述的人员活动控制方法,其特征在于,所述获取人员位置信息,包括:
    根据社交网络检索人员位置信息。
  4. 根据权利要求2或3所述的人员活动控制方法,其特征在于,所述根据所述人员位置信息生成社交聚集活动信息,包括:
    根据时间信息及位置识别信息生成所述社交聚集活动信息;
  5. 根据权利要求4所述的人员活动控制方法,其特征在于,所述根据所述社交聚集活动信息获取病毒感染超图,包括:
    根据所述社交聚集活动信息和个人识别信息生成病毒感染超图。
  6. 根据权利要求5所述的人员活动控制方法,其特征在于,所述根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息,包括:
    根据所述个人识别信息、所述时间信息、所述位置识别信息及所述病毒感染超图获得活动影响传播限制最大化参数;
    根据所述活动影响传播限制最大化参数生成社交聚集活动限制信息。
  7. 根据权利要求1所述的人员活动控制方法,其特征在于,所述人员活动控制方法还包括:
    获取社交聚集活动信息样本;
    根据所述社交聚集活动信息样本进行重复模拟,以获取传播样本;
    根据所述传播样本应用贪婪算法获得高风险社交聚集活动;
    根据所述高风险社交聚集活动生成社交聚集活动限制信息。
  8. 根据权利要求7所述的人员活动控制方法,其特征在于,在所述根据所述传播样本应用贪婪算法获得高风险社交聚集活动之后,还包括:
    验证所述高风险社交聚集活动;
    若所述高风险社交聚集活动不符合质量要求,则加倍所述社交聚集活动信息样本数量,并返回所述根据所述社交聚集活动信息样本进行重复模拟,以获取传播样本。
  9. 一种终端,包括:存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现:
    如权利要求1至8中任一项所述的人员活动控制方法。
  10. 一种人员活动控制系统,包括:
    位置信息获取模块,用于获取人员位置信息;
    社交聚集活动生成模块,用于根据所述人员位置信息生成社交聚集活动信息;
    病毒感染超图获取模块,用于根据所述社交聚集活动信息获取病毒感染超图;
    社交聚集活动限制生成模块,用于根据所述病毒感染超图和所述社交聚集活动信息生成社交聚集活动限制信息。
  11. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于:
    执行权利要求1至8中任一项所述的人员活动控制方法。
PCT/CN2021/131876 2021-11-19 2021-11-19 人员活动控制方法、系统、终端及存储介质 WO2023087269A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/131876 WO2023087269A1 (zh) 2021-11-19 2021-11-19 人员活动控制方法、系统、终端及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/131876 WO2023087269A1 (zh) 2021-11-19 2021-11-19 人员活动控制方法、系统、终端及存储介质

Publications (1)

Publication Number Publication Date
WO2023087269A1 true WO2023087269A1 (zh) 2023-05-25

Family

ID=86396002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/131876 WO2023087269A1 (zh) 2021-11-19 2021-11-19 人员活动控制方法、系统、终端及存储介质

Country Status (1)

Country Link
WO (1) WO2023087269A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116934100A (zh) * 2023-09-18 2023-10-24 青岛安工数联信息科技有限公司 三维空间下人员聚集风险评估方法及系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013204719A1 (en) * 2012-05-11 2013-11-28 M4Group Pty Ltd Method and system for aggregation and analysis of metrics
US20140280052A1 (en) * 2013-03-14 2014-09-18 Microsoft Corporation Knowledge discovery using collections of social information
CN106846228A (zh) * 2017-02-13 2017-06-13 浪潮通信信息系统有限公司 一种基于位置信息及社交关系的公共安全预警方法及系统
CN107257356A (zh) * 2017-04-19 2017-10-17 苏州大学 一种基于超图分割的社交用户数据优化放置方法
CN111276256A (zh) * 2020-02-28 2020-06-12 苏州浪潮智能科技有限公司 一种疫情预警及处理的方法、系统、设备及介质
CN112365998A (zh) * 2020-11-12 2021-02-12 医渡云(北京)技术有限公司 传染病传播规模模拟方法、装置与电子设备
CN113627746A (zh) * 2021-07-21 2021-11-09 南方医科大学第七附属医院(佛山市南海区第三人民医院) 医共体新发重大传染病管理指挥系统和方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013204719A1 (en) * 2012-05-11 2013-11-28 M4Group Pty Ltd Method and system for aggregation and analysis of metrics
US20140280052A1 (en) * 2013-03-14 2014-09-18 Microsoft Corporation Knowledge discovery using collections of social information
CN106846228A (zh) * 2017-02-13 2017-06-13 浪潮通信信息系统有限公司 一种基于位置信息及社交关系的公共安全预警方法及系统
CN107257356A (zh) * 2017-04-19 2017-10-17 苏州大学 一种基于超图分割的社交用户数据优化放置方法
CN111276256A (zh) * 2020-02-28 2020-06-12 苏州浪潮智能科技有限公司 一种疫情预警及处理的方法、系统、设备及介质
CN112365998A (zh) * 2020-11-12 2021-02-12 医渡云(北京)技术有限公司 传染病传播规模模拟方法、装置与电子设备
CN113627746A (zh) * 2021-07-21 2021-11-09 南方医科大学第七附属医院(佛山市南海区第三人民医院) 医共体新发重大传染病管理指挥系统和方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116934100A (zh) * 2023-09-18 2023-10-24 青岛安工数联信息科技有限公司 三维空间下人员聚集风险评估方法及系统
CN116934100B (zh) * 2023-09-18 2023-12-26 青岛安工数联信息科技有限公司 三维空间下人员聚集风险评估方法及系统

Similar Documents

Publication Publication Date Title
US11687384B2 (en) Real-time synthetically generated video from still frames
CN109886997B (zh) 基于目标检测的识别框确定方法、装置及终端设备
WO2020029590A1 (zh) 基于联邦训练的样本预测方法、装置及存储介质
WO2019223313A1 (zh) 一种人员档案建立方法和装置
WO2021218314A1 (zh) 基于位置定位的事件识别方法、装置、设备及存储介质
US20210374386A1 (en) Entity recognition from an image
CN108280104B (zh) 目标对象的特征信息提取方法及装置
WO2021159738A1 (zh) 基于医学领域的数据推荐方法、设备、服务器及存储介质
WO2022100062A1 (zh) 风险管控方法、装置、电子设备和存储介质
CN110414299B (zh) 一种基于计算机视觉的猴脸亲缘关系分析方法
WO2021184847A1 (zh) 一种遮挡车牌字符识别方法、装置、存储介质和智能设备
CN109190588A (zh) 一种人口分类的方法及装置
CN110933040B (zh) 基于区块链的数据上链方法、装置、设备及介质
CN112420187A (zh) 一种基于迁移联邦学习的医疗疾病分析方法
WO2023087269A1 (zh) 人员活动控制方法、系统、终端及存储介质
WO2023109631A1 (zh) 数据处理方法、装置、设备、存储介质及程序产品
CN112365007A (zh) 模型参数确定方法、装置、设备及存储介质
Tanwar et al. Blockchain and AI-empowered social distancing scheme to combat COVID-19 situations
US20140181988A1 (en) Information processing technique for data hiding
WO2021189908A1 (zh) 基于深度学习的图像分类方法、装置、服务器及介质
US20210209396A1 (en) Information processing device, control method, and program
CN116361759B (zh) 一种基于量化权限指引的智能合规控制方法
WO2023246797A1 (zh) 流行病学调查中目标对象的识别方法、装置和计算机设备
Hua et al. A simulation study to compare three self‐controlled case series approaches: correction for violation of assumption and evaluation of bias
WO2023029758A1 (zh) 一种企业经济犯罪侦查方法、系统及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21964423

Country of ref document: EP

Kind code of ref document: A1