Movatterモバイル変換


[0]ホーム

URL:


CN117421446B - Multi-crowd-oriented face quick retrieval analysis system and method - Google Patents

Multi-crowd-oriented face quick retrieval analysis system and method
Download PDF

Info

Publication number
CN117421446B
CN117421446BCN202311420281.1ACN202311420281ACN117421446BCN 117421446 BCN117421446 BCN 117421446BCN 202311420281 ACN202311420281 ACN 202311420281ACN 117421446 BCN117421446 BCN 117421446B
Authority
CN
China
Prior art keywords
monitored
visitor
area
garden
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311420281.1A
Other languages
Chinese (zh)
Other versions
CN117421446A (en
Inventor
林海佳
李桂菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Haoyong Information Technology Co ltd
Original Assignee
Guangzhou Haoyong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Haoyong Information Technology Co ltdfiledCriticalGuangzhou Haoyong Information Technology Co ltd
Priority to CN202311420281.1ApriorityCriticalpatent/CN117421446B/en
Publication of CN117421446ApublicationCriticalpatent/CN117421446A/en
Application grantedgrantedCritical
Publication of CN117421446BpublicationCriticalpatent/CN117421446B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention relates to the technical field of intelligent security, in particular to a face quick retrieval analysis system and a face quick retrieval analysis method for multiple people, wherein the system comprises an identity information identification module, a threat coefficient analysis module, an emergency measure implementation module and an emergency scheme calibration module, the threat coefficient analysis module is used for monitoring the state of an early warning device of an area to be monitored in real time, analyzing the advancing gesture of a visitor according to a monitoring result, predicting the follow-up route information of the visitor according to the analysis result, and calculating the threat coefficient of the visitor in a forbidden area of the area to be monitored.

Description

Multi-crowd-oriented face quick retrieval analysis system and method
Technical Field
The invention relates to the technical field of intelligent security, in particular to a face rapid retrieval and analysis system and method for multiple people.
Background
With the development of intelligent technology, automatic character identification aiming at a video screen picture acquired by front-end monitoring equipment becomes an important development direction at present, wherein the automatic character identification is mainly realized based on face feature extraction and identification, and particularly in urban public spaces such as stations, squares, airports, commercial streets and the like, the identification can be rapidly locked by unfolding the identification aiming at the monitoring video picture with a large intersecting visual field range, so that the security and protection efficiency and pertinence are improved, and the public order and public safety are maintained.
The feature extraction and the identification of the face need stronger computing power, and particularly, a plurality of face areas exist in a monitoring video picture with a wide-angle visual field range, in the prior art, identity authentication can only be carried out through a face recognition device in a park, the advancing direction of a visitor in the monitoring area cannot be known, and when the visitor advances to a forbidden area, the visitor is likely to threaten a park security system, so that a face quick retrieval analysis system and a face quick retrieval analysis method for a plurality of people are needed.
Disclosure of Invention
The invention aims to provide a face quick retrieval analysis system and method for multiple crowds, which aims to solve the problems in the background technology, and the invention provides the following technical scheme:
a face quick retrieval analysis method for multiple people comprises the following steps:
s1, acquiring staff database data of an area to be monitored, checking identity information of personnel entering a garden according to staff warehousing information, monitoring a path of the personnel entering the garden, judging whether a attribution destination of the corresponding personnel entering the garden is abnormal according to a monitoring result, and generating an early warning signal according to a judging result;
s2, monitoring the state of an early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden area of the area to be monitored;
S3, combining threat coefficients of a visitor in a forbidden zone of the area to be monitored to generate an emergency driving condition value, and combining information of personnel entering a garden in a staff table M1 in the area to be monitored to generate optimal emergency treatment personnel selection;
S4, comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel by combining the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel selection.
Further, the method in S1 includes the following steps:
Step 1001, obtaining employee database data in the area to be monitored, judging the information of the personnel entering the garden by combining the face recognition device, binding the judging result with the personnel entering the garden, marking as a set A,
A={[A1,P(A1)],[A2,P(A2)],[A3,P(A3)],...,[An,P(An)]},
Wherein An represents the nth person entering the garden, P () represents a conditional judgment function, P (An) represents the judgment result of the information of the nth person entering the garden, n represents the number of persons entering the garden,
If the face recognition device judges that the information of the person entering the garden is the data in the staff library, the judgment result of the corresponding information of the person entering the garden is output as 1,
If the face recognition device judges that the information of the person entering the garden is not the data in the staff library, outputting a judgment result of the information of the corresponding person entering the garden to be 0;
Step 1002, dividing the personnel entering the garden based on the determination result in step 1001, and recording the determination result in the personnel table M1 of the personnel entering the garden corresponding to the data in the staff library, wherein the determination result is not in the visitor table M2 of the personnel entering the garden corresponding to the data in the staff library;
step 1003, any one extracts the information of the personnel entering the garden in the staff table M1, and combines the staff database data matching result to obtain the corresponding personnel on duty purpose, monitors the corresponding personnel entering the garden on duty condition in real time, and sends the monitoring report to the cloud platform in real time;
step 1004, randomly extracting the information of the personnel entering the garden in the visitor table M2, identifying whether the personnel entering the garden enter a forbidden zone in real time through a security device in the area to be monitored,
If the security device equipped in the forbidden zone identifies the personnel entering the garden in the visitor table M2, an early warning signal is sent out, the personnel entering the garden corresponding to the triggering early warning signal is marked,
If the security device equipped in the forbidden zone does not identify the personnel entering the garden in the visitor table M2, no early warning signal is sent.
According to the invention, employee database data in the area to be monitored is obtained, the information of the personnel entering the garden is judged by combining the face recognition device, and the mechanical energy of the personnel entering the garden is divided according to the judgment result, so that data reference is provided for the follow-up judgment of whether the personnel entering the garden threatens the security of the garden.
Further, the method in S2 includes the following steps:
step 2001, based on the analysis result of step 1004, arbitrarily extracting one of the marked garden entering personnel, and marking as visitor B;
2002, constructing a longitude and latitude coordinate system by taking a garden entrance of a region to be monitored as an origin, and marking coordinate points formed by all security devices in the region to be monitored in the longitude and latitude coordinate system;
step 2003, acquiring a route diagram of an area to be monitored, and mapping a travel route in the area to be monitored into a longitude and latitude coordinate system by combining the route diagram;
Step 2004, combining the analysis results of steps 2002 and 2003, sequentially combining security devices in the area to be monitored in pairs, and marking as a set C,
C=[(C1,C2),(C2,C3),(C3,C4),...,(Cm-1,Cm)],
Wherein (Cm-1,Cm) represents the combination of the (m-1) th security device and the (m) th security device in the area to be monitored, and m represents the number of the security devices in the area to be monitored;
Step 2005, based on the analysis result of step 2004, extracting any element in the set C to analyze the comprehensive travel speed value of the visitor B, and recording the analysis result of the combination (Cm-1,Cm) as
Wherein the method comprises the steps ofIndicating the time when the mth security device in the area to be monitored recognizes visitor B,Indicating the time when the m-1 th security device in the area to be monitored recognizes the visitor B,Representing the distance value from the mth security device to the (m-1) th security device of the visitor B in the area to be monitored;
Step 2006, a circulation step 2005 obtains comprehensive travelling speed values of the visitors B under each combination in the set C, records the obtained data into a table M3, analyzes the subsequent route information of the visitors in combination with the data in the table M3, calculates threat coefficients of the visitors B to the forbidden zone of the area to be monitored according to the analysis result,
In the longitude and latitude coordinate system, a coordinate point formed by an mth security device is used as a circle center, the product result of the minimum value data and unit time in the table M3 is used as an inner circle radius, the product result of the maximum value data and unit time in the table M3 is used as an outer circle radius, a circular ring is constructed and recorded as a circular ring G, wherein the unit time is preset customization,
Analyzing threat coefficients of different time nodes in forbidden areas of the area to be monitored of the visitor B, and recording the corresponding threat coefficients of the a-th time node of the forbidden areas of the area to be monitored of the visitor B asWherein each time node is separated by e steps, e is a database preset value,
Wherein alpha represents a proportionality coefficient, the proportionality coefficient is a database preset value, min () represents a minimum function, max () represents a maximum function, H () represents a condition judgment function,Representing the shortest distance value from the position of the visitor B after the mth security device travels a time nodes to the forbidden zone, SG represents the area of the circular ring, S Forbidden zone represents the area of the forbidden zone in the area to be monitored,Representing the intersection area of the circular ring and the area of the forbidden zone in the area to be monitored,
If it isThen
If it isThen
A point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked, two adjacent coordinate points are sequentially connected, a fitting fold line N1 (x 1) is generated, transfer fold points of the fitting fold line N1 (x 1) are marked, threat coefficients of the forbidden zone of the region to be monitored of the visitor B are calculated, and the threat coefficients are marked as SafeB,
Wherein beta represents a proportionality coefficient, the proportionality coefficient is a database preset value, and q represents the number of the traveling time nodes of the visitor B.
According to the method, the comprehensive travelling speed value of the visitor in the area to be monitored is analyzed, the follow-up travelling route of the visitor is predicted by combining the analysis result, the threat coefficient of the visitor in the forbidden zone of the area to be monitored is calculated according to the prediction result, and data reference is provided for the follow-up screening of the optimal emergency driving personnel.
Further, the method in S3 includes the following steps:
Step 3001, generating an emergency driving-off condition value by combining the analysis result of step 2006, if SafeB is not in a preset interval, sending a driving-off signal to the cloud platform, and if SafeB is in the preset interval, not sending the driving-off signal to the cloud platform;
Step 3002, monitoring the state of the driving-off signal lamp in the cloud platform in real time, acquiring the position information of the staff in the area to be monitored through the cloud platform in real time, marking in a longitude and latitude coordinate system, extracting the staff with the position information in the ring G, marking the emergency treatment personnel selection fit of the s-th staff as Fitnesss,
Fitnesss=γ·G(s)·ds→B
Wherein gamma represents a proportionality coefficient, the proportionality coefficient is a database preset value, G(s) represents the number of staff at the duty destination of the s-th staff, and ds→B represents the distance between the s-th staff and the visitor B;
Step 3003, cycling step 3002 to obtain the emergency treatment personnel selection compliance degree of the corresponding personnel in the ring G, generating an emergency treatment personnel priority sequence according to the order from large to small, marking the emergency treatment personnel priority sequence as a sequence R, and taking the first element in the sequence R as the current optimal emergency treatment personnel selection.
According to the method, threat coefficient values of the areas to be monitored are combined by visitors, emergency driving-off conditions are generated, workers which accord with the execution of emergency driving-off personnel are analyzed according to the emergency driving-off conditions, the emergency treatment personnel selection fitting degree of the corresponding workers is calculated, a priority sequence is generated, and data reference is provided for the follow-up judgment of the rationality of the optimal emergency treatment personnel selection.
Further, the method in S4 includes the following steps:
Step 4001, calibrating a sequence R by combining importance degrees of positions of workers in the ring G, calibrating elements in the sequence R from small to large according to the importance degrees of the positions of the corresponding workers in the ring G, generating a new emergency treatment personnel priority sequence, and recording the new emergency treatment personnel priority sequence as a sequence R*, wherein the importance degrees are queried through a database preset form, and importance degree conditions corresponding to different positions are recorded in the database preset form;
Step 4002, extracting the first element in the sequence R*, judging the similarity degree of the first element in the sequence R* and the first element in the sequence R, combining the judging result to generate an emergency treatment scheme,
If the similarity degree of the first element in the sequence R* and the first element in the sequence R is equal to 1, the judgment result of the corresponding staff as the optimal emergency treatment staff is reasonable, the cloud platform is used for informing the corresponding staff to go to the visitor B to take the driving measures,
If the similarity degree of the first element in the sequence R* and the first element in the sequence R is equal to 0, the first element in the sequence R* is used as the optimal emergency treatment personnel, and the cloud platform is used for informing the corresponding personnel to go to the visitor B to take the driving measures.
A multi-crowd-oriented face quick retrieval analysis system, the system comprising the following modules:
Identity information recognition module: the identity information recognition module is used for acquiring staff database data of an area to be monitored, checking the identity information of the personnel entering the garden according to the staff warehousing information, monitoring the path of the personnel entering the garden, judging whether the attribution destination of the corresponding personnel entering the garden is abnormal according to the monitoring result, and generating an early warning signal according to the judging result;
Threat coefficient analysis module: the threat coefficient analysis module is used for monitoring the state of the early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden zone of the area to be monitored;
The emergency measure implementation module is as follows: the emergency measure implementation module is used for generating an emergency driving condition value by combining threat coefficients of a visitor in a forbidden zone of a region to be monitored and generating optimal emergency treatment personnel options by combining personnel information of a garden entering person in a staff table M1 in the region to be monitored;
An emergency scheme calibration module: the emergency scheme calibration module is used for comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel according to the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel.
Further, the identity information recognition module comprises a face recognition unit, a data comparison unit and a data division unit:
the face recognition unit is used for acquiring employee database data in the area to be monitored and judging information of personnel entering a garden by combining a face recognition device;
The data comparison unit is used for comparing the analysis result of the face recognition unit with the data in the staff database;
The data dividing unit is used for acquiring the analysis result of the data comparing unit and classifying the personnel entering the garden according to the analysis result.
Further, the threat coefficient analysis module includes a data acquisition unit, a visitor data analysis unit, and a threat coefficient analysis unit:
the data acquisition unit is used for mapping the route in the area to be monitored and the position information of the security device into a longitude and latitude coordinate system and acquiring the visitor route in real time in the longitude and latitude coordinate system;
the visitor data analysis unit is used for comprehensively analyzing the advancing speed of the corresponding visitor by combining the analysis result of the data acquisition unit;
the threat coefficient analysis unit is used for combining the analysis result of the visitor data analysis unit to judge the threat coefficient value of the forbidden zone of the area to be monitored of the visitor.
Further, the emergency measure implementation module comprises an emergency driving condition generation unit, a priority sequence generation unit and an optimal emergency treatment personnel confirmation unit:
The emergency driving-off condition generating unit is used for generating an emergency driving-off condition value based on the analysis result of the threat coefficient analysis module, judging whether the threat coefficient of the corresponding visitor is in a preset interval in real time, and sending the judgment result to the cloud platform;
The priority sequence generation unit is used for monitoring the state of the driving-off signal lamp in the cloud platform in real time, calculating the competence fit value of the staff in the emergency driving-off range, and generating a priority sequence by combining the calculation result;
The optimal emergency treatment personnel confirming unit is used for acquiring the analysis result of the priority sequence production unit and taking the first element in the sequence as the optimal emergency treatment personnel.
Further, the emergency solution calibration module includes an emergency solution calibration unit and a driving-away measure execution unit:
The emergency scheme calibration unit is used for judging whether the analysis result of the optimal emergency treatment personnel confirmation unit is reasonable or not, and calibrating the optimal emergency treatment personnel in real time by combining the judgment result;
the driving-away measure executing unit is used for notifying corresponding staff to execute the visitor driving-away task through the cloud platform.
According to the method and the device for monitoring the visitor trajectory, the follow-up travelling route of the visitor is predicted, the threat coefficient formed by the forbidden zone of the area to be monitored of the corresponding visitor is calculated according to the prediction result, and the calculated result is pushed to related staff to execute the driving task, so that the security of the area to be monitored is improved, and meanwhile, the scheduling of the staff in the area to be monitored is more reasonably realized.
Drawings
FIG. 1 is a flow diagram of a face quick search analysis method for multiple people in the invention;
fig. 2 is a schematic block diagram of a face quick search analysis system for multiple people according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1: referring to fig. 1, in this embodiment:
a face quick retrieval analysis method for multiple people comprises the following steps:
s1, acquiring staff database data of an area to be monitored, checking identity information of personnel entering a garden according to staff warehousing information, monitoring a path of the personnel entering the garden, judging whether a attribution destination of the corresponding personnel entering the garden is abnormal according to a monitoring result, and generating an early warning signal according to a judging result;
the method in S1 comprises the following steps:
Step 1001, obtaining employee database data in the area to be monitored, judging the information of the personnel entering the garden by combining the face recognition device, binding the judging result with the personnel entering the garden, marking as a set A,
A={[A1,P(A1)],[A2,P(A2)],[A3,P(A3)],...,[An,P(An)]},
Wherein An represents the nth person entering the garden, P () represents a conditional judgment function, P (An) represents the judgment result of the information of the nth person entering the garden, n represents the number of persons entering the garden,
If the face recognition device judges that the information of the person entering the garden is the data in the staff library, the judgment result of the corresponding information of the person entering the garden is output as 1,
If the face recognition device judges that the information of the person entering the garden is not the data in the staff library, outputting a judgment result of the information of the corresponding person entering the garden to be 0;
Step 1002, dividing the personnel entering the garden based on the determination result in step 1001, and recording the determination result in the personnel table M1 of the personnel entering the garden corresponding to the data in the staff library, wherein the determination result is not in the visitor table M2 of the personnel entering the garden corresponding to the data in the staff library;
step 1003, any one extracts the information of the personnel entering the garden in the staff table M1, and combines the staff database data matching result to obtain the corresponding personnel on duty purpose, monitors the corresponding personnel entering the garden on duty condition in real time, and sends the monitoring report to the cloud platform in real time;
step 1004, randomly extracting the information of the personnel entering the garden in the visitor table M2, identifying whether the personnel entering the garden enter a forbidden zone in real time through a security device in the area to be monitored,
If the security device equipped in the forbidden zone identifies the person entering the garden in the visitor table M2, an early warning signal is sent out, and the person entering the garden corresponding to the triggering early warning signal is marked;
If the security device equipped in the forbidden zone does not identify the personnel entering the garden in the visitor table M2, no early warning signal is sent.
S2, monitoring the state of an early warning device of the area to be monitored in real time, analyzing the advancing gesture of the visitor according to the monitoring result, predicting the follow-up route information of the visitor by combining the analysis result, and calculating the threat coefficient of the forbidden area of the area to be monitored;
the method in S2 comprises the steps of:
step 2001, based on the analysis result of step 1004, arbitrarily extracting one of the marked garden entering personnel, and marking as visitor B;
2002, constructing a longitude and latitude coordinate system by taking a garden entrance of a region to be monitored as an origin, and marking coordinate points formed by all security devices in the region to be monitored in the longitude and latitude coordinate system;
step 2003, acquiring a route diagram of an area to be monitored, and mapping a travel route in the area to be monitored into a longitude and latitude coordinate system by combining the route diagram;
Step 2004, combining the analysis results of steps 2002 and 2003, sequentially combining security devices in the area to be monitored in pairs, and marking as a set C,
C=[(C1,C2),(C2,C3),(C3,C4),...,(Cm-1,Cm)],
Wherein (Cm-1,Cm) represents the combination of the (m-1) th security device and the (m) th security device in the area to be monitored, and m represents the number of the security devices in the area to be monitored;
Step 2005, based on the analysis result of step 2004, extracting any element in the set C to analyze the comprehensive travel speed value of the visitor B, and recording the analysis result of the combination (Cm-1,Cm) as
Wherein the method comprises the steps ofIndicating the time when the mth security device in the area to be monitored recognizes visitor B,Indicating the time when the m-1 th security device in the area to be monitored recognizes the visitor B,Representing the distance value from the mth security device to the (m-1) th security device of the visitor B in the area to be monitored;
Step 2006, a circulation step 2005 obtains comprehensive travelling speed values of the visitor B under each combination in the set C, records the obtained data into a table M3, analyzes the follow-up route information of the visitor in combination with the data in the table M3, calculates threat coefficients of the visitor B to a forbidden zone of the area to be monitored according to the analysis result, wherein the unit time is a preset value,
In the longitude and latitude coordinate system, a coordinate point formed by an mth security device is taken as a circle center, the product result of the minimum value data and the unit time in the table M3 is taken as an inner circle radius, the product result of the maximum value data and the unit time in the table M3 is taken as an outer circle radius, a circular ring is constructed and recorded as a circular ring G,
Analyzing threat coefficients of different time nodes in forbidden areas of the area to be monitored of the visitor B, and recording the corresponding threat coefficients of the a-th time node of the forbidden areas of the area to be monitored of the visitor B asWherein each time node is separated by e steps, e is a database preset value,
Wherein alpha represents a proportionality coefficient, the proportionality coefficient is a database preset value, min () represents a minimum function, max () represents a maximum function, H () represents a condition judgment function,Representing the shortest distance value from the position of the visitor B after the mth security device travels a time nodes to the forbidden zone, SG represents the area of the circular ring, S Forbidden zone represents the area of the forbidden zone in the area to be monitored,Representing the intersection area of the circular ring and the area of the forbidden zone in the area to be monitored,
If it isThen
If it isThen
A point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked, two adjacent coordinate points are sequentially connected, a fitting fold line N1 (x 1) is generated, transfer fold points of the fitting fold line N1 (x 1) are marked, threat coefficients of the forbidden zone of the region to be monitored of the visitor B are calculated, and the threat coefficients are marked as SafeB,
Wherein beta represents a proportionality coefficient, the proportionality coefficient is a database preset value, and q represents the number of the traveling time nodes of the visitor B.
S3, combining threat coefficients of the visitor to the forbidden zone of the area to be monitored to generate an emergency driving condition value, and combining the information of the personnel entering the garden in the staff form in the area to be monitored to generate optimal emergency treatment personnel selection;
The method in S3 comprises the following steps:
Step 3001, generating an emergency driving-off condition value by combining the analysis result of step 2006, if SafeB is not in a preset interval, sending a driving-off signal to the cloud platform, and if SafeB is in the preset interval, not sending the driving-off signal to the cloud platform;
Step 3002, monitoring the state of the driving-off signal lamp in the cloud platform in real time, acquiring the position information of the staff in the area to be monitored through the cloud platform in real time, marking in a longitude and latitude coordinate system, extracting the staff with the position information in the ring G, marking the emergency treatment personnel selection fit of the s-th staff as Fitnesss,
Fitnesss=γ·G(s)·ds→B
Wherein gamma represents a proportionality coefficient, the proportionality coefficient is a database preset value, G(s) represents the number of staff at the duty destination of the s-th staff, and ds→B represents the distance between the s-th staff and the visitor B;
Step 3003, cycling step 3002 to obtain the emergency treatment personnel selection compliance degree of the corresponding personnel in the ring G, generating an emergency treatment personnel priority sequence according to the order from large to small, marking the emergency treatment personnel priority sequence as a sequence R, and taking the first element in the sequence R as the current optimal emergency treatment personnel selection.
S4, comprehensively judging the rationality of the optimal emergency treatment personnel, calibrating the emergency treatment personnel by combining the judging result, and taking corresponding measures to drive away the visitor according to the calibrated emergency treatment personnel selection.
The method in S4 includes the steps of:
Step 4001, calibrating a sequence R by combining importance degrees of positions of workers in the ring G, calibrating elements in the sequence R from small to large according to the importance degrees of the positions of the corresponding workers in the ring G, generating a new emergency treatment personnel priority sequence, and recording the new emergency treatment personnel priority sequence as a sequence R*, wherein the importance degrees are queried through a database preset form, and importance degree conditions corresponding to different positions are recorded in the database preset form;
Step 4002, extracting the first element in the sequence R*, judging the similarity degree of the first element in the sequence R* and the first element in the sequence R, combining the judging result to generate an emergency treatment scheme,
If the similarity degree of the first element in the sequence R* and the first element in the sequence R is equal to 1, the judgment result of the corresponding staff as the optimal emergency treatment staff is reasonable, the cloud platform is used for informing the corresponding staff to go to the visitor B to take the driving measures,
If the similarity degree of the first element in the sequence R* and the first element in the sequence R is equal to 0, the first element in the sequence R* is used as the optimal emergency treatment personnel, and the cloud platform is used for informing the corresponding personnel to go to the visitor B to take the driving measures.
In this embodiment: a face quick search analysis system (shown in figure 2) for multiple people is disclosed, which is used for realizing the specific scheme content of the method.
Example 2: setting a person B entering a garden as a visitor, setting 10 security devices in the area to be monitored,
Constructing a longitude and latitude coordinate system by taking a garden entrance of the area to be monitored as an origin, marking coordinate points formed by each security device in the area to be monitored in the longitude and latitude coordinate system, mapping a travel route in a route schematic diagram of the area to be monitored into the longitude and latitude coordinate system,
Setting the position of the visitor B at the moment at the 6 th security device, wherein a forbidden zone exists at the 7 th security device, wherein 3 routes are shared from the 6 th security device to the 7 th security device, and the travel route of the visitor B is combined through the formulaThe comprehensive travelling speed value of the visitor B among the security devices is calculated and recorded as V(1,2)、V(2,3)、V(3,4)、V(4,5)、V(5,6), wherein the V(2,3) value is the largest, the V(4,5) value is the smallest,
In a longitude and latitude coordinate system, a coordinate point formed by a 6 th security device is taken as a circle center, a value of a product result of V(4,5) and unit time is taken as an inner circle radius, a product result of V(2,3) and unit time is taken as an outer circle radius, a circular ring is constructed and recorded as a circular ring G,
Analyzing threat coefficients of different time nodes in a forbidden zone of a zone to be monitored of the visitor B by monitoring intersection relation between the annular ring B and the zone to be monitored in real time in the advancing process of the visitor B, wherein the corresponding threat coefficients of an a-th time node of the forbidden zone of the zone to be monitored of the visitor B are recorded as follows
If it isThen
If it isThen
A point o1 is taken as an origin, a time node is taken as an x1 axis, a threat coefficient is taken as a y axis, a first plane rectangular coordinate system is constructed, in the first plane rectangular coordinate system, coordinate points of threat coefficients formed by different time nodes of a forbidden zone of a region to be monitored of a visitor B are marked, two adjacent coordinate points are sequentially connected, a fitting fold line N1 (x 1) is generated, transfer fold points of the fitting fold line N1 (x 1) are marked, threat coefficients of the forbidden zone of the region to be monitored of the visitor B are calculated, and the threat coefficients are marked as SafeB,
If SafeB is not in the preset interval, a driving-off signal is sent to the cloud platform, and if SafeB is in the preset interval, a driving-off signal is not sent to the cloud platform.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

CN202311420281.1A2023-10-302023-10-30Multi-crowd-oriented face quick retrieval analysis system and methodActiveCN117421446B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202311420281.1ACN117421446B (en)2023-10-302023-10-30Multi-crowd-oriented face quick retrieval analysis system and method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202311420281.1ACN117421446B (en)2023-10-302023-10-30Multi-crowd-oriented face quick retrieval analysis system and method

Publications (2)

Publication NumberPublication Date
CN117421446A CN117421446A (en)2024-01-19
CN117421446Btrue CN117421446B (en)2024-08-13

Family

ID=89532210

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202311420281.1AActiveCN117421446B (en)2023-10-302023-10-30Multi-crowd-oriented face quick retrieval analysis system and method

Country Status (1)

CountryLink
CN (1)CN117421446B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109447048A (en)*2018-12-252019-03-08苏州闪驰数控系统集成有限公司A kind of artificial intelligence early warning system
CN115909617A (en)*2023-01-062023-04-04之江实验室Visitor early warning method, system and device based on multi-source heterogeneous data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9711036B2 (en)*2012-09-212017-07-18Google Inc.Leveraging neighborhood to handle potential visitor at a smart-home

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109447048A (en)*2018-12-252019-03-08苏州闪驰数控系统集成有限公司A kind of artificial intelligence early warning system
CN115909617A (en)*2023-01-062023-04-04之江实验室Visitor early warning method, system and device based on multi-source heterogeneous data

Also Published As

Publication numberPublication date
CN117421446A (en)2024-01-19

Similar Documents

PublicationPublication DateTitle
CN109598885B (en)Monitoring system and alarm method thereof
US10812761B2 (en)Complex hardware-based system for video surveillance tracking
CN101751553B (en) A Large-Scale Crowd Density Analysis and Prediction Method
CN109461106A (en)A kind of multidimensional information perception processing method
CN109002744A (en)Image-recognizing method, device and video monitoring equipment
CN111325954B (en)Personnel loss early warning method, device, system and server
US20100007738A1 (en)Method of advanced person or object recognition and detection
CN106412501A (en)Construction safety behavior intelligent monitoring system based on video and monitoring method thereof
CN108898520B (en)Student safety monitoring method and system based on trajectory data
CN117135172A (en)Smart city accident rescue method and system based on Internet of things
Tran et al.UIT-ADrone: A novel drone dataset for traffic anomaly detection
WO2023071188A1 (en)Abnormal-behavior detection method and apparatus, and electronic device and storage medium
CN114900647B (en)Campus visitor monitoring system and method
CN113469080A (en)Individual, group and scene interactive collaborative perception method, system and equipment
CN115101216A (en)New infectious disease monitoring and coping system based on big data
Shen et al.Outlier detection from vehicle trajectories to discover roaming events
CN119360309A (en) A computer-based intelligent security monitoring platform and system
CN114706988A (en)Monitoring and early warning method and device based on knowledge graph
Verma et al.Vision-based accident anticipation and detection using deep learning
Malbog et al.PED-AI: pedestrian detection for autonomous vehicles using YOLOv5
CN117421446B (en)Multi-crowd-oriented face quick retrieval analysis system and method
CN106022311A (en)City monitoring video identification-based emergency event discovery method and system
CN116403162B (en) A method, system and electronic device for identifying target behavior on an airport surface
Ismail et al.PGTLP: a dataset for Tunisian license plate detection and recognition
Anithadevi et al.An Improved SSD Object Detection Algorithm For Safe Social Distancing and Face Mask Detection In Public Areas Through Intelligent Video Analytics

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp