Dangerous behavior early warning method and device based on action law and application thereof

A behavior and law technology, applied in the field of dangerous behavior early warning based on action law, can solve problems such as low superiority, weakened relevance of key personnel events, inability to effectively evaluate the danger of surrounding personnel, etc. Effect

Pending Publication Date: 2022-04-12
CITY CLOUD TECH HANGZHOU CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The monitoring of key personnel is the focus of continuous attention of various social departments and communities. In the past, conventional methods used one-person-one-watch or multiple-person-watching. However, with the gradual increase in labor costs and the efficiency of control In limited cases, the superiority of this method is increasingly low
[0003] With the development of science and technology, most of the existing management and control methods are based on original personnel visits. For example, during the epidemic, supervisors are arranged downstairs in each building, and monitoring and coordination are used to monitor personnel movements. control, but in many cases it is still unable to prevent the sneaking and random flow of personnel
This kind of management and control method is relatively simple. Although there are many face recognition monitoring on the market, which can effectively improve the strength of management and control, the relevance of events to key personnel is relatively weak, so that it is impossible to effectively evaluate key personnel's perception of the surrounding environment or people around them. the danger of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dangerous behavior early warning method and device based on action law and application thereof
  • Dangerous behavior early warning method and device based on action law and application thereof
  • Dangerous behavior early warning method and device based on action law and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] This embodiment provides a dangerous behavior early warning method based on action rules. In this embodiment, the method is as follows: figure 1 Shown can be summarized as the following 4 steps:

[0029] Step S1: Determine the key monitoring personnel and obtain at least one key event related to the key monitoring personnel, each of the key events includes behavior time information, behavior location information, behavior content information and at least one behavior personnel information;

[0030] Step S2: Determine at least one key control location corresponding to the key monitoring personnel;

[0031] Step S3: Monitor each of the key control locations in real time, and when the key monitoring personnel appear in any of the key control locations, obtain the time risk index, location risk index and the same personnel of the key monitoring personnel based on the key event type risk index;

[0032] Step S4: Predict the behavior risk index of the key monitoring personn...

Embodiment 2

[0056] Based on the same idea, this embodiment also provides a dangerous behavior early warning device based on action trajectory, which is used to realize the dangerous behavior early warning method based on action rules described in Embodiment 1. For details, refer to figure 2 , the device consists of the following modules:

[0057] An acquisition module, configured to determine key monitoring personnel and acquire at least one key event, each of the key events includes behavior time information, behavior location information, behavior content information and at least one behavior personnel information, and the key events include information related to the Focus on events of the same type of personnel as the monitoring personnel;

[0058] An deployment and control module, configured to determine at least one key control location corresponding to the key monitoring personnel;

[0059] A monitoring module, configured to monitor each of the key control locations in real time,...

Embodiment 3

[0062] This embodiment also provides an electronic device, refer to image 3 , including a memory 404 and a processor 402, the memory 404 stores a computer program, and the processor 402 is configured to run the computer program to execute the steps of any method for early warning of dangerous behaviors based on action rules in the above embodiments.

[0063] Specifically, the processor 402 may include a central processing unit (CPU), or an Application Specific Integrated Circuit (ASIC for short), or may be configured to implement one or more integrated circuits in the embodiments of the present application.

[0064] Wherein, the memory 404 may include a mass memory 404 for data or instructions. By way of example and not limitation, the memory 404 may include a hard disk drive (Hard Disk Drive, referred to as HDD), a floppy disk drive, a solid state drive (Solid State Drive, referred to as SSD), flash memory, optical disk, magneto-optical disk, magnetic tape or general serial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dangerous behavior early warning method based on action rules. The method comprises the following steps: determining key monitoring personnel and acquiring at least one key event; determining at least one key management and control place corresponding to the key monitoring personnel; monitoring each key management and control place in real time, and when the key monitoring personnel appear at any key management and control place, acquiring a time risk index, a place risk index and a same personnel type risk index of the key monitoring personnel based on the key events; and predicting a behavior risk index of the key monitoring personnel according to the time risk index, the place risk index and the same personnel type risk index, and performing early warning if the behavior risk index is greater than a set threshold value. According to the method, the behavior risk index of the key personnel is analyzed and evaluated from multiple dimensions, and timely early warning of the key personnel in each key management and control range is realized.

Description

technical field [0001] This application relates to the field of social governance, in particular to a dangerous behavior early warning method, device and application based on action rules. Background technique [0002] The monitoring of key personnel is the focus of continuous attention of various social departments and communities. In the past, conventional methods used one-person-one-watch or multiple-person-watching. However, with the gradual increase in labor costs and the efficiency of control In limited cases, the superiority of this method is increasingly low. [0003] With the development of science and technology, most of the existing management and control methods are based on original personnel visits. For example, during the epidemic, supervisors are arranged downstairs in each building, and monitoring and coordination are used to monitor personnel movements. control, but in many cases it is still unable to prevent the sneaking and random movement of personnel. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06V20/52G06Q10/06
Inventor 李圣权林森程智勇徐晨晖刘大宽
Owner CITY CLOUD TECH HANGZHOU CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products