Multi-crowd-oriented face quick retrieval analysis system and methodTechnical Field
The invention relates to the technical field of intelligent security, in particular to a face rapid retrieval and analysis system and method for multiple people.
Background
With the development of intelligent technology, automatic character identification aiming at a video screen picture acquired by front-end monitoring equipment becomes an important development direction at present, wherein the automatic character identification is mainly realized based on face feature extraction and identification, and particularly in urban public spaces such as stations, squares, airports, commercial streets and the like, the identification can be rapidly locked by unfolding the identification aiming at the monitoring video picture with a large intersecting visual field range, so that the security and protection efficiency and pertinence are improved, and the public order and public safety are maintained.
The feature extraction and the identification of the face need stronger computing power, and particularly, a plurality of face areas exist in a monitoring video picture with a wide-angle visual field range, in the prior art, identity authentication can only be carried out through a face recognition device in a park, the advancing direction of a visitor in the monitoring area cannot be known, and when the visitor advances to a forbidden area, the visitor is likely to threaten a park security system, so that a face quick retrieval analysis system and a face quick retrieval analysis method for a plurality of people are needed.
Disclosure of Invention
The invention aims to provide a face quick retrieval analysis system and method for multiple crowds, which aims to solve the problems in the background technology, and the invention provides the following technical scheme:
a face quick retrieval analysis method for multiple people comprises the following steps:
s1, acquiring staff database data of an area to be monitored, checking identity information of personnel entering a garden according to staff warehousing information, monitoring a path of the personnel entering the garden, judging whether a attribution destination of the corresponding personnel entering the garden is abnormal according to a monitoring result, and generating an early warning signal according to a judging result;
s2, monitoring the state of an early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden area of the area to be monitored;
s3, combining threat coefficients of a visitor in a forbidden zone of the area to be monitored to generate an emergency driving condition value, and combining information of personnel entering a garden in a staff table M1 in the area to be monitored to generate optimal emergency treatment personnel selection;
s4, comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel by combining the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel selection.
Further, the method in S1 includes the following steps:
step 1001, obtaining employee database data in the area to be monitored, judging the information of the personnel entering the garden by combining the face recognition device, binding the judging result with the personnel entering the garden, marking as a set A,
A={[A1 ,P(A1 )],[A2 ,P(A2 )],[A3 ,P(A3 )],...,[An ,P(An )]},
wherein A isn Represents the nth person entering the garden, P () represents the condition judgment function, P (A)n ) Represents the judgment result of the nth person entering the garden, n represents the number of persons entering the garden,
if the face recognition device judges that the information of the person entering the garden is the data in the staff library, the judgment result of the corresponding information of the person entering the garden is output as 1,
if the face recognition device judges that the information of the person entering the garden is not the data in the staff library, outputting a judgment result of the information of the corresponding person entering the garden to be 0;
step 1002, dividing the personnel entering the garden based on the determination result in step 1001, and recording the determination result in the personnel table M1 of the personnel entering the garden corresponding to the data in the staff library, wherein the determination result is not in the visitor table M2 of the personnel entering the garden corresponding to the data in the staff library;
step 1003, any one extracts the information of the personnel entering the garden in the staff table M1, and combines the staff database data matching result to obtain the corresponding personnel on duty purpose, monitors the corresponding personnel entering the garden on duty condition in real time, and sends the monitoring report to the cloud platform in real time;
step 1004, randomly extracting the information of the personnel entering the garden in the visitor table M2, identifying whether the personnel entering the garden enter a forbidden zone in real time through a security device in the area to be monitored,
if the security device equipped in the forbidden zone identifies the personnel entering the garden in the visitor table M2, an early warning signal is sent out, the personnel entering the garden corresponding to the triggering early warning signal is marked,
if the security device equipped in the forbidden zone does not identify the personnel entering the garden in the visitor table M2, no early warning signal is sent.
According to the invention, employee database data in the area to be monitored is obtained, the information of the personnel entering the garden is judged by combining the face recognition device, and the mechanical energy of the personnel entering the garden is divided according to the judgment result, so that data reference is provided for the follow-up judgment of whether the personnel entering the garden threatens the security of the garden.
Further, the method in S2 includes the following steps:
step 2001, based on the analysis result of step 1004, arbitrarily extracting one of the marked garden entering personnel, and marking as visitor B;
2002, constructing a longitude and latitude coordinate system by taking a garden entrance of a region to be monitored as an origin, and marking coordinate points formed by all security devices in the region to be monitored in the longitude and latitude coordinate system;
step 2003, acquiring a route diagram of an area to be monitored, and mapping a travel route in the area to be monitored into a longitude and latitude coordinate system by combining the route diagram;
step 2004, combining the analysis results of steps 2002 and 2003, sequentially combining security devices in the area to be monitored in pairs, and marking as a set C,
C=[(C1 ,C2 ),(C2 ,C3 ),(C3 ,C4 ),...,(Cm-1 ,Cm )],
wherein (C)m-1 ,Cm ) Represents the combination of the m-1 th security device and the m-th security device in the area to be monitored, and m represents the area to be monitoredThe number of security devices;
step 2005, based on the analysis result of step 2004, extracting any one element in the set C to analyze the comprehensive travel speed value of the visitor B, and combining (Cm-1 ,Cm ) The analysis result of (2) is recorded as
Wherein the method comprises the steps ofIndicating the time when the mth security device in the area to be monitored recognizes visitor B, the +.>Indicating the time when the m-1 th security device in the area to be monitored recognizes visitor B,/I>Representing the distance value from the mth security device to the (m-1) th security device of the visitor B in the area to be monitored;
step 2006, a circulation step 2005 obtains comprehensive travelling speed values of the visitors B under each combination in the set C, records the obtained data into a table M3, analyzes the subsequent route information of the visitors in combination with the data in the table M3, calculates threat coefficients of the visitors B to the forbidden zone of the area to be monitored according to the analysis result,
in the longitude and latitude coordinate system, a coordinate point formed by an mth security device is used as a circle center, the product result of the minimum value data and unit time in the table M3 is used as an inner circle radius, the product result of the maximum value data and unit time in the table M3 is used as an outer circle radius, a circular ring is constructed and recorded as a circular ring G, wherein the unit time is preset customization,
analyzing threat coefficients of nodes of different time zones of a zone to be monitored of the visitor B, and determining the a time of the zone to be monitored of the visitor BThe corresponding threat coefficient of the node is recorded asWherein each time node is separated by e steps, e is a database preset value,
wherein alpha represents a proportionality coefficient, the proportionality coefficient is a database preset value, min () represents a minimum function, max () represents a maximum function, H () represents a condition judgment function,representing the shortest distance value from the position of visitor B after the mth security device travels a time nodes to the forbidden zone, SG Represents the area of the circular ring SForbidden zone Indicating the area of the exclusion zone in the area to be monitored,representing the intersection area of the circular ring and the area of the forbidden zone in the area to be monitored,
if it isThen->
If it isThen->
A point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked,sequentially connecting two adjacent coordinate points to generate a fitting fold line N1 (x 1), marking the transfer fold points of the fitting fold line N1 (x 1), calculating threat coefficients of a forbidden zone of a zone to be monitored of a visitor B, and marking the threat coefficients as SafeB ,
Wherein beta represents a proportionality coefficient, the proportionality coefficient is a database preset value, and q represents the number of the traveling time nodes of the visitor B.
According to the method, the comprehensive travelling speed value of the visitor in the area to be monitored is analyzed, the follow-up travelling route of the visitor is predicted by combining the analysis result, the threat coefficient of the visitor in the forbidden zone of the area to be monitored is calculated according to the prediction result, and data reference is provided for the follow-up screening of the optimal emergency driving personnel.
Further, the method in S3 includes the following steps:
step 3001, combining the analysis results of step 2006, generating an emergency driving condition value, if SafeB If the driving signal is not in the preset interval, a driving signal is sent to the cloud platform, and if SafeB In a preset interval, a driving-off signal is not sent to the cloud platform;
step 3002, monitoring the state of a driving-off signal lamp in the cloud platform in real time, acquiring the position information of the staff in the area to be monitored through the cloud platform in real time, marking in a longitude and latitude coordinate system, extracting the staff with the position information in the ring G, and marking the emergency treatment personnel selection fit degree of the s-th staff as Fitnesss ,
Fitnesss =γ·G(s)·ds→B ,
Wherein gamma represents a proportionality coefficient which is a database preset value, G(s) represents the number of staff at the duty destination of the s-th staff, and ds→B Representing the distance between the s-th staff member and visitor B;
step 3003, cycling step 3002 to obtain the emergency treatment personnel selection compliance degree of the corresponding personnel in the ring G, generating an emergency treatment personnel priority sequence according to the order from large to small, marking the emergency treatment personnel priority sequence as a sequence R, and taking the first element in the sequence R as the current optimal emergency treatment personnel selection.
According to the method, threat coefficient values of the areas to be monitored are combined by visitors, emergency driving-off conditions are generated, workers which accord with the execution of emergency driving-off personnel are analyzed according to the emergency driving-off conditions, the emergency treatment personnel selection fitting degree of the corresponding workers is calculated, a priority sequence is generated, and data reference is provided for the follow-up judgment of the rationality of the optimal emergency treatment personnel selection.
Further, the method in S4 includes the following steps:
step 4001, calibrating the sequence R by combining the importance degree of the positions of the workers in the ring G, calibrating the importance degree of the elements in the sequence R according to the positions of the corresponding workers in the ring G from small to large, generating a new emergency treatment personnel priority sequence, and recording the new emergency treatment personnel priority sequence as the sequence R* The importance degree is queried through a database preset form, wherein the importance degree conditions corresponding to different positions are recorded in the database preset form;
step 4002, extracting sequence R* The first element of (2) is the judgment sequence R* The first element of the sequence R is similar to the first element of the sequence R, an emergency treatment scheme is generated by combining the judging result,
if sequence R* The similarity degree of the first element in the sequence R and the first element in the sequence R is equal to 1, the judgment result of the corresponding staff as the optimal emergency processing staff is reasonable, the cloud platform is used for informing the corresponding staff to go to the visitor B for taking the driving measures,
if sequence R* The first element of the sequence R is similar to the first element of the sequence R to a degree equal to 0, and the sequence R is then* The first element in the system is used as an optimal emergency processing person, and the cloud platform informs corresponding staff to go to the visitor B to take a driving-away measure.
A multi-crowd-oriented face quick retrieval analysis system, the system comprising the following modules:
identity information recognition module: the identity information recognition module is used for acquiring staff database data of an area to be monitored, checking the identity information of the personnel entering the garden according to the staff warehousing information, monitoring the path of the personnel entering the garden, judging whether the attribution destination of the corresponding personnel entering the garden is abnormal according to the monitoring result, and generating an early warning signal according to the judging result;
threat coefficient analysis module: the threat coefficient analysis module is used for monitoring the state of the early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden zone of the area to be monitored;
the emergency measure implementation module is as follows: the emergency measure implementation module is used for generating an emergency driving condition value by combining threat coefficients of a visitor in a forbidden zone of a region to be monitored and generating optimal emergency treatment personnel options by combining personnel information of a garden entering person in a staff table M1 in the region to be monitored;
an emergency scheme calibration module: the emergency scheme calibration module is used for comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel according to the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel.
Further, the identity information recognition module comprises a face recognition unit, a data comparison unit and a data division unit:
the face recognition unit is used for acquiring employee database data in the area to be monitored and judging information of personnel entering a garden by combining a face recognition device;
the data comparison unit is used for comparing the analysis result of the face recognition unit with the data in the staff database;
the data dividing unit is used for acquiring the analysis result of the data comparing unit and classifying the personnel entering the garden according to the analysis result.
Further, the threat coefficient analysis module includes a data acquisition unit, a visitor data analysis unit, and a threat coefficient analysis unit:
the data acquisition unit is used for mapping the route in the area to be monitored and the position information of the security device into a longitude and latitude coordinate system and acquiring the visitor route in real time in the longitude and latitude coordinate system;
the visitor data analysis unit is used for comprehensively analyzing the advancing speed of the corresponding visitor by combining the analysis result of the data acquisition unit;
the threat coefficient analysis unit is used for combining the analysis result of the visitor data analysis unit to judge the threat coefficient value of the forbidden zone of the area to be monitored of the visitor.
Further, the emergency measure implementation module comprises an emergency driving condition generation unit, a priority sequence generation unit and an optimal emergency treatment personnel confirmation unit:
the emergency driving-off condition generating unit is used for generating an emergency driving-off condition value based on the analysis result of the threat coefficient analysis module, judging whether the threat coefficient of the corresponding visitor is in a preset interval in real time, and sending the judgment result to the cloud platform;
the priority sequence generation unit is used for monitoring the state of the driving-off signal lamp in the cloud platform in real time, calculating the competence fit value of the staff in the emergency driving-off range, and generating a priority sequence by combining the calculation result;
the optimal emergency treatment personnel confirming unit is used for acquiring the analysis result of the priority sequence production unit and taking the first element in the sequence as the optimal emergency treatment personnel.
Further, the emergency solution calibration module includes an emergency solution calibration unit and a driving-away measure execution unit:
the emergency scheme calibration unit is used for judging whether the analysis result of the optimal emergency treatment personnel confirmation unit is reasonable or not, and calibrating the optimal emergency treatment personnel in real time by combining the judgment result;
the driving-away measure executing unit is used for notifying corresponding staff to execute the visitor driving-away task through the cloud platform.
According to the method and the device for monitoring the visitor trajectory, the follow-up travelling route of the visitor is predicted, the threat coefficient formed by the forbidden zone of the area to be monitored of the corresponding visitor is calculated according to the prediction result, and the calculated result is pushed to related staff to execute the driving task, so that the security of the area to be monitored is improved, and meanwhile, the scheduling of the staff in the area to be monitored is more reasonably realized.
Drawings
FIG. 1 is a flow diagram of a face quick search analysis method for multiple people in the invention;
fig. 2 is a schematic block diagram of a face quick search analysis system for multiple people according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1: referring to fig. 1, in this embodiment:
a face quick retrieval analysis method for multiple people comprises the following steps:
s1, acquiring staff database data of an area to be monitored, checking identity information of personnel entering a garden according to staff warehousing information, monitoring a path of the personnel entering the garden, judging whether a attribution destination of the corresponding personnel entering the garden is abnormal according to a monitoring result, and generating an early warning signal according to a judging result;
the method in S1 comprises the following steps:
step 1001, obtaining employee database data in the area to be monitored, judging the information of the personnel entering the garden by combining the face recognition device, binding the judging result with the personnel entering the garden, marking as a set A,
A={[A1 ,P(A1 )],[A2 ,P(A2 )],[A3 ,P(A3 )],...,[An ,P(An )]},
wherein A isn Represents the nth person entering the garden, P () represents the condition judgment function, P (A)n ) Represents the judgment result of the nth person entering the garden, n represents the number of persons entering the garden,
if the face recognition device judges that the information of the person entering the garden is the data in the staff library, the judgment result of the corresponding information of the person entering the garden is output as 1,
if the face recognition device judges that the information of the person entering the garden is not the data in the staff library, outputting a judgment result of the information of the corresponding person entering the garden to be 0;
step 1002, dividing the personnel entering the garden based on the determination result in step 1001, and recording the determination result in the personnel table M1 of the personnel entering the garden corresponding to the data in the staff library, wherein the determination result is not in the visitor table M2 of the personnel entering the garden corresponding to the data in the staff library;
step 1003, any one extracts the information of the personnel entering the garden in the staff table M1, and combines the staff database data matching result to obtain the corresponding personnel on duty purpose, monitors the corresponding personnel entering the garden on duty condition in real time, and sends the monitoring report to the cloud platform in real time;
step 1004, randomly extracting the information of the personnel entering the garden in the visitor table M2, identifying whether the personnel entering the garden enter a forbidden zone in real time through a security device in the area to be monitored,
if the security device equipped in the forbidden zone identifies the person entering the garden in the visitor table M2, an early warning signal is sent out, and the person entering the garden corresponding to the triggering early warning signal is marked;
if the security device equipped in the forbidden zone does not identify the personnel entering the garden in the visitor table M2, no early warning signal is sent.
S2, monitoring the state of an early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden area of the area to be monitored;
the method in S2 comprises the steps of:
step 2001, based on the analysis result of step 1004, arbitrarily extracting one of the marked garden entering personnel, and marking as visitor B;
2002, constructing a longitude and latitude coordinate system by taking a garden entrance of a region to be monitored as an origin, and marking coordinate points formed by all security devices in the region to be monitored in the longitude and latitude coordinate system;
step 2003, acquiring a route diagram of an area to be monitored, and mapping a travel route in the area to be monitored into a longitude and latitude coordinate system by combining the route diagram;
step 2004, combining the analysis results of steps 2002 and 2003, sequentially combining security devices in the area to be monitored in pairs, and marking as a set C,
C=[(C1 ,C2 ),(C2 ,C3 ),(C3 ,C4 ),...,(Cm-1 ,Cm )],
wherein (C)m-1 ,Cm ) Representing the combination of the m-1 th security device and the m-th security device in the area to be monitored, wherein m represents the number of the security devices in the area to be monitored;
step 2005, based on the analysis result of step 2004, extracting any one element in the set C to analyze the comprehensive travel speed value of the visitor B, and combining (Cm-1 ,Cm ) The analysis result of (2) is recorded as
Wherein the method comprises the steps ofIndicating the time when the mth security device in the area to be monitored recognizes visitor B, the +.>Indicating the time when the m-1 th security device in the area to be monitored recognizes visitor B,/I>Representing the distance value from the mth security device to the (m-1) th security device of the visitor B in the area to be monitored;
step 2006, a circulation step 2005 obtains comprehensive travelling speed values of the visitor B under each combination in the set C, records the obtained data into a table M3, analyzes the follow-up route information of the visitor in combination with the data in the table M3, calculates threat coefficients of the visitor B to a forbidden zone of the area to be monitored according to the analysis result, wherein the unit time is a preset value,
in the longitude and latitude coordinate system, a coordinate point formed by an mth security device is taken as a circle center, the product result of the minimum value data and the unit time in the table M3 is taken as an inner circle radius, the product result of the maximum value data and the unit time in the table M3 is taken as an outer circle radius, a circular ring is constructed and recorded as a circular ring G,
analyzing threat coefficients of different time nodes in forbidden areas of the area to be monitored of the visitor B, and recording the corresponding threat coefficients of the a-th time node of the forbidden areas of the area to be monitored of the visitor B asWherein each time node is separated by e steps, e is a database preset value,
wherein alpha represents a proportionality coefficient, the proportionality coefficient is a database preset value, min () represents a minimum function, max () represents a maximum function, H () represents a condition judgment function,representing the shortest distance value from the position of visitor B after the mth security device travels a time nodes to the forbidden zone, SG Represents the area of the circular ring SForbidden zone Indicating the area of the exclusion zone in the area to be monitored,representing the intersection area of the circular ring and the area of the forbidden zone in the area to be monitored,
if it isThen->
If it isThen->
The point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked, two adjacent coordinate points are sequentially connected, a fitting fold line N1 (x 1) is generated, transfer fold points of the fitting fold line N1 (x 1) are marked, the threat coefficient of the forbidden zone of the region to be monitored of the visitor B is calculated, and the threat coefficient is marked as SafeB ,
Wherein beta represents a proportionality coefficient, the proportionality coefficient is a database preset value, and q represents the number of the traveling time nodes of the visitor B.
S3, combining threat coefficients of the visitor to the forbidden zone of the area to be monitored to generate an emergency driving condition value, and combining the information of the personnel entering the garden in the staff form in the area to be monitored to generate optimal emergency treatment personnel selection;
the method in S3 comprises the following steps:
step 3001, combining the analysis results of step 2006, generating an emergency driving condition value, if SafeB If the driving signal is not in the preset interval, a driving signal is sent to the cloud platform, and if SafeB In a preset interval, a driving-off signal is not sent to the cloud platform;
step 3002, monitoring the state of the driving signal lamp in the cloud platform in real time, and acquiring workers in the area to be monitored through the cloud platform in real timeThe personnel position information is marked in a longitude and latitude coordinate system, the personnel with the position information in the ring G are extracted, and the emergency treatment personnel selection fit degree of the s-th personnel is marked as Fitnesss ,
Fitnesss =γ·G(s)·ds→B ,
Wherein gamma represents a proportionality coefficient which is a database preset value, G(s) represents the number of staff at the duty destination of the s-th staff, and ds→B Representing the distance between the s-th staff member and visitor B;
step 3003, cycling step 3002 to obtain the emergency treatment personnel selection compliance degree of the corresponding personnel in the ring G, generating an emergency treatment personnel priority sequence according to the order from large to small, marking the emergency treatment personnel priority sequence as a sequence R, and taking the first element in the sequence R as the current optimal emergency treatment personnel selection.
S4, comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel by combining the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel selection.
The method in S4 includes the steps of:
step 4001, calibrating the sequence R by combining the importance degree of the positions of the workers in the ring G, calibrating the importance degree of the elements in the sequence R according to the positions of the corresponding workers in the ring G from small to large, generating a new emergency treatment personnel priority sequence, and recording the new emergency treatment personnel priority sequence as the sequence R* The importance degree is queried through a database preset form, wherein the importance degree conditions corresponding to different positions are recorded in the database preset form;
step 4002, extracting sequence R* The first element of (2) is the judgment sequence R* The first element of the sequence R is similar to the first element of the sequence R, an emergency treatment scheme is generated by combining the judging result,
if sequence R* The similarity degree of the first element in the sequence R and the first element in the sequence R is equal to 1, the judgment result of the corresponding staff as the optimal emergency processing staff is reasonable, and the corresponding staff is notified through the cloud platformThe person goes to visitor B to take the drive-away measure,
if sequence R* The first element of the sequence R is similar to the first element of the sequence R to a degree equal to 0, and the sequence R is then* The first element in the system is used as an optimal emergency processing person, and the cloud platform informs corresponding staff to go to the visitor B to take a driving-away measure.
In this embodiment: a face quick search analysis system (shown in figure 2) for multiple people is disclosed, which is used for realizing the specific scheme content of the method.
Example 2: setting a person B entering a garden as a visitor, setting 10 security devices in the area to be monitored,
constructing a longitude and latitude coordinate system by taking a garden entrance of the area to be monitored as an origin, marking coordinate points formed by each security device in the area to be monitored in the longitude and latitude coordinate system, mapping a travel route in a route schematic diagram of the area to be monitored into the longitude and latitude coordinate system,
setting the position of the visitor B at the moment at the 6 th security device, wherein a forbidden zone exists at the 7 th security device, wherein 3 routes are shared from the 6 th security device to the 7 th security device, and the travel route of the visitor B is combined through the formulaCalculating the comprehensive travelling speed value of the visitor B among the security devices, and recording the comprehensive travelling speed value as V(1,2) 、V(2,3) 、V(3,4) 、V(4,5) 、V(5,6) Wherein V is(2,3) Maximum value, V(4,5) The value of the minimum is the minimum value,
in a longitude and latitude coordinate system, a coordinate point formed by a 6 th security device is used as a circle center, and V is used as a circle center(4,5) The product of the unit time is the inner circle radius, and V(2,3) The result of the product of the unit time is the outer circle radius, a circular ring is constructed and marked as a circular ring G,
analyzing threat coefficients of nodes in forbidden areas of a zone to be monitored of the visitor B by monitoring intersection relation between the annular ring B and the zone to be monitored in real time in the advancing process of the visitor BB, recording the corresponding threat coefficient of the a-th time node of the forbidden zone of the area to be monitored as
If it isThen->
If it isThen->
The point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked, two adjacent coordinate points are sequentially connected, a fitting fold line N1 (x 1) is generated, transfer fold points of the fitting fold line N1 (x 1) are marked, the threat coefficient of the forbidden zone of the region to be monitored of the visitor B is calculated, and the threat coefficient is marked as SafeB ,
If SafeB If the driving signal is not in the preset interval, a driving signal is sent to the cloud platform, and if SafeB And in the preset interval, not sending a driving-off signal to the cloud platform.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.