[go: up one dir, main page]

CN115578046B - Security system and security task execution method based on simulation model - Google Patents

Security system and security task execution method based on simulation model Download PDF

Info

Publication number
CN115578046B
CN115578046B CN202210999242.0A CN202210999242A CN115578046B CN 115578046 B CN115578046 B CN 115578046B CN 202210999242 A CN202210999242 A CN 202210999242A CN 115578046 B CN115578046 B CN 115578046B
Authority
CN
China
Prior art keywords
security
task
event
simulation model
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210999242.0A
Other languages
Chinese (zh)
Other versions
CN115578046A (en
Inventor
朱从政
孟雷同
赵笑苹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dongang Kexing Technology Co ltd
Original Assignee
Shenzhen Dongang Kexing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dongang Kexing Technology Co ltd filed Critical Shenzhen Dongang Kexing Technology Co ltd
Priority to CN202210999242.0A priority Critical patent/CN115578046B/en
Publication of CN115578046A publication Critical patent/CN115578046A/en
Application granted granted Critical
Publication of CN115578046B publication Critical patent/CN115578046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1097Time management, e.g. calendars, reminders, meetings or time accounting using calendar-based scheduling for task assignment
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • G06F30/27Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Geometry (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of simulation, and provides a security system and a security task execution method based on a simulation model, wherein the method comprises the following steps: the security events in the target security area are timely acquired by the monitoring center through the multi-terminal interaction mode, the monitoring center utilizes the simulation model to formulate different security clients into different security tasks corresponding to the security events based on the position information of the security clients in the target security area, the security clients are in one-to-one correspondence with the sharing security tasks, and each security personnel only needs to execute the security tasks according to the corresponding security clients, so that the security events can be timely and reasonably processed, and the security event processing efficiency is improved.

Description

Security system and security task execution method based on simulation model
Technical Field
The application relates to the technical field of simulation, in particular to a security system and a security task execution method based on a simulation model.
Background
At present, a very strict security system is arranged in factories, nuclear power plants and the like, a multistage security mechanism is arranged, security work is usually accepted in a team or group mode, when security events occur in a certain place, such as a fight, a fighting to the crowd and the like, security departments are notified by personnel or masses who find related security matters, and the security departments notify the related security personnel to timely process the security events, however, the mode often cannot conduct rapid coping, has poor instantaneity and is due to sudden matters, a reasonable security processing scheme is often not provided, and coping is lost, so that the existing security system is low in event processing efficiency.
Disclosure of Invention
Based on the above, it is necessary to provide a security system and a security task execution method based on a simulation model to solve the problem that the existing security system has low event processing efficiency.
The first aspect of the embodiment of the application provides a security system based on an analog simulation model, which comprises a server side, a monitoring center, at least one monitoring terminal and at least one security client side;
the monitoring terminal is configured to monitor events occurring in the target security area in real time, generate security event information based on monitoring data, and send the security event information to the monitoring center;
the monitoring center is configured to call a target simulation model corresponding to the target security area trained by the server side when receiving security event information sent by the monitoring terminal or the security client side, and generate different security sub-items of security tasks corresponding to security events corresponding to the security event information by utilizing the target simulation model based on the position information of each security client side in the target security area, and distribute each security sub-item of security tasks to the corresponding security client side; the security clients are in one-to-one correspondence with the sub-item security tasks;
the security client is configured to generate a task reminding message when receiving the sub-item security task sent by the monitoring center;
the server side is configured to construct an initial simulation model of a target security area, simulate a preset security event in the initial simulation model, train the initial simulation model to generate different security tasks corresponding to the preset security event based on the position information of each security client in the target security area, and obtain a trained target simulation model.
The second aspect of the embodiment of the application provides a security task execution method based on a simulation model, which comprises the following steps:
the method comprises the steps that a server side builds an initial simulation model of a target security area, a preset security event is simulated in the initial simulation model, the initial simulation model is trained, different security tasks corresponding to the preset security event are generated based on the position information of each security client in the target security area, and a trained target simulation model is obtained;
the monitoring terminal monitors events occurring in the target security area in real time, generates security event information based on monitoring data, and sends the security event information to the monitoring center;
when receiving security event information sent by the monitoring terminal or the security client, the monitoring center calls a target simulation model trained by the server, and generates different security sub-tasks corresponding to security events of the security event information based on the position information of each security client in the target security area by using the target simulation model, and distributes each security sub-task to the corresponding security client; the security clients are in one-to-one correspondence with the sub-item security tasks;
and when the security client receives the sub-item security task sent by the monitoring center, generating a task reminding message.
According to the security task execution method based on the simulation model, an initial simulation model of a target security area is built in advance through a server, a preset security event is simulated in the initial simulation model, the initial simulation model is trained, different security tasks corresponding to the preset security event are generated based on the position information of each security client in the target security area, and a trained target simulation model is obtained; when the method is applied, the monitoring terminal monitors the events occurring in the target security area in real time, security event information is generated based on the monitoring data, and the security event information is sent to the monitoring center; when receiving security event information sent by a monitoring terminal, a monitoring center calls a target simulation model trained by a server side, and utilizes the target simulation model to customize and generate a sub-security task corresponding to the security event information for each security client based on the position information of each security client in a target security area, and distributes each sub-security task to the corresponding security client; when receiving a sub-item security task sent by a monitoring center, the security client generates a task reminding message to remind security personnel corresponding to the security client to execute the sub-item security task; in the security task execution process, the monitoring terminal monitors events occurring in the target security area in real time, security event information is generated based on monitoring data, the security event information is simultaneously sent to the monitoring center, and if security personnel can also send the security event information to the monitoring center in real time through the security client, the monitoring center receives the security event information, namely, a target simulation model trained by the server side is called to customize a sub-security task corresponding to the security event information for each security client based on the position information of each security client in the target security area, and distributes each sub-security task to the corresponding security client, so that the real-time performance of security event processing is guaranteed, corresponding sub-security tasks are timely generated for different security clients, so that the optimal event response schemes are customized for security personnel at different positions, and the execution efficiency of the security task is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic structural diagram of a security system based on a simulated simulation model in an embodiment of the application;
FIG. 2 is an exemplary diagram of an application scenario of a security system based on an analog simulation model in an embodiment of the present application;
FIG. 3 is a schematic diagram of an implementation flow of a security task execution method based on an analog simulation model in an embodiment of the present application;
FIG. 4 is a schematic diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, fig. 1 shows a schematic structural diagram of a security system based on a simulation model in an embodiment of the application. As shown in fig. 1, the security system 100 based on the simulation model is used for security work based on the simulation model and the multi-terminal interaction receiving target security area, so as to ensure the real-time performance of security event processing and the reasonability of event handling schemes and improve the security event processing efficiency. It should be noted that, in the embodiment, the server side in the security system 100 may be an independent server, or a server cluster formed by a plurality of servers, or may be a cloud computing server, etc., which is not limited herein; the monitoring center can be a server or a terminal device with a memory, a processor and computer readable instructions; the monitoring terminal comprises, but is not limited to, a monitoring camera, intelligent monitoring and the like; security clients include, but are not limited to, personal computers, notebook computers, smart phones, tablet computers, among others.
In fig. 1, the security system 100 includes a server 40, a monitoring center 20, at least one monitoring terminal 10, and at least one security client 30, specifically:
the monitoring terminal 10 is configured to monitor an event occurring in the target security area in real time, generate security event information based on the monitoring data, and send the security event information to the monitoring center 20;
the monitoring center 20 is configured to call a target simulation model corresponding to the target security area trained by the server 40 when security event information sent by the monitoring terminal 10 is received, generate different security tasks corresponding to security events corresponding to the security event information based on the position information of each security client in the target security area by using the target simulation model, and distribute each security task to the corresponding security client 30; wherein, the security clients 30 are in one-to-one correspondence with the security tasks of the sub-items;
the security client 30 is configured to generate a task reminding message when receiving the sub-security task sent by the monitoring center 20;
the server 40 is configured to construct an initial simulation model of the target security area, simulate a preset security event in the initial simulation model, train the initial simulation model to generate different security tasks corresponding to the preset security event based on the position information of each security client 30 in the target security area, and obtain a trained target simulation model.
In this embodiment, in the process of adopting the security system 100 based on the simulation model to accept the security work of the target security area, security events in the target security area are timely acquired in a multi-terminal interaction manner, and based on the positions of security clients in the target security area, separate security tasks corresponding to different security events are generated and issued to each security client, the security clients at different positions correspond to different separate security tasks, the security clients at the same position may also correspond to different separate security tasks, and each security personnel only needs to execute the separate security tasks received by the corresponding security clients, so that the security events can be reasonably processed, and the security event processing efficiency is improved.
In all embodiments of the application, the monitoring terminal, the security client and the monitoring center are all in communication connection with the server, and perform data interaction with the server, and the security client and the monitoring terminal are simultaneously and respectively in communication connection with the monitoring center, and perform data interaction. The server side can be an independent server, a server cluster formed by a plurality of servers, a cloud computing server and the like. The server side can be configured to receive the data information sent by the monitoring terminal, the server side and the security client side in real time, construct a mapping list of security events, the security client side and the sub security tasks based on the data information, and update the mapping list in real time.
When the monitoring terminal is realized, the monitoring terminal can autonomously judge the monitoring data, for example, judge whether the personnel behaviors in the monitoring video in the monitoring range meet the condition of the security event, and when the security event is judged to exist, security event information is automatically generated according to the monitoring data and sent to the monitoring center, in addition, security personnel can find that a security event occurs at a certain position in the target security area, and then the security event information is sent to the monitoring center through the security client. In other embodiments, the security event information may be sent to the monitoring center by other terminals in the target security area, for example, by non-security personnel through the terminals. The monitoring center receives security event information sent by a monitoring terminal or a security client, invokes a target simulation model trained by a server in advance, generates different security tasks corresponding to the received security event based on the position information of each client in a target area by using the simulation model, and distributes each security task to the corresponding security client according to the corresponding relationship between the security tasks and the security client; and when the security client receives the sharing security task sent by the monitoring center, generating a task reminding message to remind corresponding security personnel to execute the security task according to the sub-item received by the corresponding security client. It should be noted that, the target simulation model may generate a corresponding sub-item security task based on the position information of the partial security client in the target security area according to the security event information, and correspondingly, the monitoring center may also send the sub-item security task to the partial security client.
The method comprises the steps that an initial simulation model of a target security area is built in advance by a server, a preset security event can be simulated in the initial simulation model, the initial simulation model can be trained in a man-machine interaction mode and the like, based on the position information of each security client in the target security area, different security tasks corresponding to the preset security event are generated, and the trained target simulation model is obtained.
As an implementation manner, the server side may first construct a three-dimensional digital panoramic model based on three-dimensional map data of the target security area and three-dimensional data of security devices in the target security area as an initial simulation model, and simultaneously attach positions of security clients, monitoring terminals, security devices and the like in the target security area to the three-dimensional digital panoramic model to obtain motion trajectories of corresponding security personnel, where the security clients are provided with positioning devices, such as beidou, GPS, AGPS and the like. The individual behavior under the three-dimensional digital panoramic model can be set based on the motion trail of security personnel and the position and three-dimensional data of security equipment, and the individual behavior model is trained through a deep reinforcement learning algorithm based on the individual behavior of the security personnel and a current environment rewarding function. Simulating a preset security event under a three-dimensional digital panoramic model, simulating the sub-item security tasks to be executed by security personnel corresponding to each security client by utilizing a plurality of individual behavior models based on the position data of the security clients in a real target security area, so as to obtain the optimal sub-item security tasks corresponding to each security client, and finally obtaining a trained target simulation model.
As an example, referring to fig. 2, fig. 2 is an exemplary diagram of an application scenario of a security system based on a simulation model in an embodiment of the present application. As shown in fig. 2, when a security event occurs in the target security area, the monitoring center generates a sub-item security task a, b, c, d based on the position information of the security client A, B, C, D in the target security area by using the target simulation model, and the monitoring center correspondingly sends the sub-item security task a, b, c, d to the security client A, B, C, D, because the positions of the security clients A, B, C, D are different, correspondingly, the optimal paths and the time for each security personnel in the sub-item security task a, b, c, d to reach the event occurrence position of the security event from the positions of the security clients A, B, C, D are different, and the response plans for the security event may also be different, for example, the sub-item security task a indicates that the corresponding security personnel carry a type of security equipment, the sub-item security task b indicates that the corresponding security personnel carry a type of security equipment, and specifically, the respective response plans may be planned according to the distances between the security clients and the security equipment. In other embodiments, the security client at the same location may also receive different separate security tasks.
In the actual application scene, a plurality of security events may occur in the target security area at the same time, and the monitoring center distributes corresponding security personnel for each security event to be generated and generates a sub security task corresponding to each security event and transmits the sub security task to the corresponding security client according to the event occurrence position of each security event and the actual position information of each security client in the target security area by using the target simulation model.
The security system based on the simulation model provided by the scheme comprises: the method comprises the steps that in the security work process of a target security area, an initial simulation model of the target security area is built in advance through the server, a preset security event is simulated in the initial simulation model, the initial simulation model is trained, based on the position information of each security client in the target security area, different security sub-items corresponding to the preset security event are generated, and a trained target simulation model is obtained; when the method is applied, the monitoring terminal monitors the events occurring in the target security area in real time, security event information is generated based on the monitoring data, and the security event information is sent to the monitoring center; when receiving security event information sent by a monitoring terminal or a security client, a monitoring center calls a target simulation model trained by a server, and utilizes the target simulation model to customize and generate a sub-security task corresponding to the security event information for each security client based on the position information of each security client in a target security area, and distributes each sub-security task to the corresponding security client; when receiving a sub-item security task sent by a monitoring center, the security client generates a task reminding message to remind security personnel corresponding to the security client to execute the sub-item security task; in the security task execution process, the monitoring terminal monitors events occurring in the target security area in real time, security event information is generated based on monitoring data, the security event information is simultaneously sent to the monitoring center, and if security personnel can also send the security event information to the monitoring center in real time through the security client, the monitoring center receives the security event information, namely, a target simulation model trained by the server side is called to customize a sub-security task corresponding to the security event information for each security client based on the position information of each security client in the target security area, and distributes each sub-security task to the corresponding security client, so that the real-time performance of security event processing is guaranteed, corresponding sub-security tasks are timely generated for different security clients, so that the optimal event response schemes are customized for security personnel at different positions, and the execution efficiency of the security task is improved.
As an embodiment, the monitoring terminal is specifically configured to determine whether the monitoring data meets a preset condition; and if the monitoring data meet the preset conditions, security event information is generated based on the monitoring data.
In this embodiment, the monitoring data includes, but is not limited to, behavior data in video or image of the occurrence of the monitoring event, information such as the number of people, time, location, etc. The preset condition is set according to the actual condition of the target security area, for example, an aggregation personnel number threshold value can be set, when the aggregation personnel number in the monitoring data reaches the aggregation personnel number threshold value, an alarm is triggered, security event information is generated according to the monitoring data, and the security event information is sent to the monitoring center. For another example, a sensor, such as a temperature sensor, may be set at the monitoring terminal, and when the temperature sensor monitors that the environmental temperature of a certain area is equal to or exceeds a preset environmental temperature threshold, an alarm is directly triggered, and meanwhile, the monitoring terminal generates security event information according to the monitoring data and the sensor monitoring data, and sends the security event information to the monitoring center. In other embodiments, it may also be determined manually whether the monitored event is a security event, and then whether to upload the security event to the monitoring center.
As an embodiment, the security event information at least comprises security event type, event occurrence position and event occurrence time of the security event corresponding to the security event.
In this embodiment, the security event refers to a behavior event requiring security personnel to be mobilized or necessary security measures to be taken, and may be an event such as fighting in a target security area, fighting by a crowd, or an accident such as fire disaster or collapse. The security event information can also comprise a monitoring video or image, so that the monitoring center can determine the security event type through video/image identification and the like. The security event information may also include urgency of the security event, and the like. The monitoring terminal is provided with a positioning device, a timer, a signal receiving/transmitting device and the like, and the event occurrence position and the event occurrence time in the range of the monitoring terminal can be obtained.
As an embodiment, the security client is further configured to send security event information to the monitoring center;
correspondingly, the monitoring center is further configured to call a target simulation model corresponding to the target security area trained by the server side when security event information sent by the security client side is received, and generate different security sub-items of security tasks corresponding to security events corresponding to the security event information by using the target simulation model based on the position information of each security client side in the target security area, and distribute each security sub-item of security tasks to the corresponding security client side; the security clients are in one-to-one correspondence with the sub-item security tasks.
As an embodiment, each sub-item security task at least comprises a sub-item response plan corresponding to the security event type and an optimal path and time for security personnel executing the sub-item security task to reach the event occurrence position.
In this embodiment, the security tasks of the sub-items are in one-to-one correspondence with the security clients, and each security task of the sub-item is generated by the monitoring center based on the position information of the corresponding security client by using the target simulation model. Each sub-item security task at least comprises a sub-item response plan for a security event of the security event type received by the monitoring center, the sub-item security plans corresponding to different security clients may be different, for example, the sub-item security plan corresponding to the security client A needs to carry tools, the security client B does not need to carry tools, specifically, the position information of the security client A and the security client B is determined, for example, the monitoring center utilizes a target simulation model to identify that the security client A is closer to the required tool position distance, so that the sub-item security plan sent to the security client A indicates that tools need to be carried. In addition, the optimal paths, time and the like for indicating security personnel to reach the event occurrence position in the separate security tasks of different security clients are also different, and specifically, the optimal paths and time for reaching the event occurrence position are generated by the target simulation model based on the position information of the security clients and the event occurrence position.
As an implementation mode, the sub-security tasks corresponding to the security clients can further comprise a time limit for reaching the event occurrence position set according to the emergency degree of the security event, and the security personnel in the target area can reach the time occurrence position within the set time, so that the security event can be processed in time, and the security event is prevented from being deteriorated.
As one embodiment, the monitoring center is further configured to use the target simulation model to mark the event occurrence position and the event occurrence time of the security event in real time, so as to send the event state of the security event to a security client in real time.
In this embodiment, the monitoring center marks the event occurrence position and the event occurrence time of the received security event in real time by using the target simulation model, determines the event occurrence state according to the event occurrence position and the event occurrence time of the security event, and sends the event state of the security event to the security client side which sends the security event corresponding to the security task. The event occurrence status may be whether the event is resolved (e.g. if the event occurrence location and the event occurrence time are no longer changed, indicating that the event is resolved), the event occurrence location change status, etc. The security personnel can check the event state through the security client, and timely make a scheme for coping with the event state change, so that the event processing time is saved, and the event processing efficiency is improved.
In other embodiments, the monitoring center may further instruct the monitoring terminal to monitor, in real time, an event occurrence position and an event occurrence time of a security event corresponding to the security event information after the security event information is sent, and send, in real time, the event occurrence position and the event occurrence time to the monitoring center.
As one embodiment, each of the security tasks further includes a task evaluation instruction;
correspondingly, the security client is further configured to respond to task submitting operation of security personnel, trigger the task evaluation instruction, display a task evaluation window, respond to task evaluation submitting operation of the security personnel, and send task evaluation information corresponding to the sub-security task received by the security client to the monitoring center.
In this embodiment, the task evaluation instruction is further included in the separate security tasks sent by the monitoring center to each security client. After the task is completed, a security personnel executing the sub-security task clicks a task submitting operation at a corresponding security client, namely, a task evaluating instruction is triggered, a person evaluating window is displayed at a security client interface, the security personnel enters the task evaluating window to evaluate the executed sub-security task, wherein evaluation contents comprise, but are not limited to, evaluation of sub-security plans, optimal paths reaching event occurrence positions, time and the like, improvement suggestions and the like, the security personnel clicks the submitting operation after the evaluation is completed, and the security client responds to the evaluation submitting operation of the security personnel and sends corresponding evaluation information to a monitoring center.
As an embodiment, the monitoring center is further configured to generate a model optimization instruction according to the received task evaluation information sent by each security client, and send the model optimization instruction to the server side, so as to instruct the server side to optimize the target simulation model.
In this embodiment, the monitoring center receives the task evaluation information sent by each security client, and obtains the improvement points of each security task by manually or automatically analyzing the task evaluation information, determines which model parameters, algorithms and the like can be improved by adjusting, and generates a model optimization instruction according to the model parameters, algorithms and the like which can be improved by determining, so as to instruct the server to optimize the target simulation model according to the model optimization instruction, so that security event processing is performed based on the optimized target simulation model, and the security event processing efficiency can be further improved.
Referring to fig. 3, fig. 3 is a schematic implementation flow chart of a security task execution method based on a simulation model in an embodiment of the application. As shown in fig. 3, the security task execution method based on the simulation model provided in this embodiment includes:
step S11: the method comprises the steps that a server side builds an initial simulation model of a target security area, a preset security event is simulated in the initial simulation model, the initial simulation model is trained, different security sub-items corresponding to the preset security event are generated based on the position information of each security client in the target security area, and a trained target simulation model is obtained.
Step S12: the monitoring terminal monitors events occurring in the target security area in real time, generates security event information based on monitoring data, and sends the security event information to the monitoring center.
As an embodiment, the monitoring terminal judges whether the monitoring data meets a preset condition; and if the monitoring data meet the preset conditions, security event information is generated based on the monitoring data.
As an embodiment, the security event information at least includes a security event type, an event occurrence position, and an event occurrence time of the security event corresponding to the security event.
Step S13: when receiving security event information sent by the monitoring terminal, the monitoring center calls a target simulation model trained by the server side, and generates different security sub-tasks corresponding to security events of the security event information based on the position information of each security client side in the target security area by using the target simulation model, and distributes each security sub-task to the corresponding security client side; the security clients are in one-to-one correspondence with the sub-item security tasks.
As an embodiment, each sub-item security task at least comprises a sub-item response plan corresponding to the security event type and an optimal path and time for security personnel executing the sub-item security task to reach the event occurrence position.
As an embodiment, the security task execution method further includes: the security client sends security event information to the monitoring center; when receiving security event information sent by the security client, the monitoring center calls a target simulation model trained by the server, generates different security sub-tasks corresponding to security events of the security event information based on the position information of each security client in the target security area by using the target simulation model, and distributes each security sub-task to the corresponding security client; the security clients are in one-to-one correspondence with the sub-item security tasks.
As an embodiment, the monitoring center invokes the trained target simulation model to mark the event occurrence position and the event occurrence time of the security event in real time, so as to send the event state of the security event to the security client in real time.
Step S14: and the security client generates a task reminding message when receiving the sub security task sent by the monitoring center.
As an embodiment, each of the security tasks further includes a task evaluation instruction;
correspondingly, when the security client receives the sub-item security task sent by the monitoring center, generating a task reminding message, the security client further comprises: the security client side responds to task submitting operation of security personnel, triggers the task evaluation instruction, displays a task evaluation window, responds to the task evaluation submitting operation of the security personnel, and sends task evaluation information corresponding to the sub-security task received by the security client side to the monitoring center.
As an embodiment, after the security client sends the received task evaluation information corresponding to the sub-security task to the monitoring center, the method further includes: and the monitoring center generates a model optimization instruction according to the received task evaluation information sent by each security client, and sends the model optimization instruction to the server side so as to instruct the server side to optimize the target simulation model.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
For specific limitation of the security task execution method based on the simulation model, reference may be made to the limitation of the security system based on the simulation model hereinabove, and the description thereof will not be repeated here. All or part of each end in the security system can be realized by software, hardware and a combination thereof. The above-mentioned terminals can be embedded in hardware form or can be independent from processor in computer equipment, also can be stored in memory in computer equipment in the form of software so as to make the processor call and execute the operation correspondent to the above-mentioned terminals.
In one embodiment, a computer device is provided, which may be a server side, a monitoring center, a monitoring terminal, or the like. As shown in fig. 4, the computer device includes a processor, a memory, a network interface, a database, and the like, which are connected through a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a readable storage medium, an internal memory. The readable storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the execution of an operating system and computer-readable instructions in a readable storage medium. The database of the computer equipment is used for storing data related to the file server and the business server in the operation and maintenance method of the edge computing platform. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer readable instructions, when executed by a processor, implement the functions of the file server and the business server described above. The readable storage medium provided by the present embodiment includes a nonvolatile readable storage medium and a volatile readable storage medium.
In one embodiment, a computer device is provided that includes a memory, a processor, and computer readable instructions stored on the memory and executable on the processor, when executing the computer readable instructions, implementing the functions of a monitoring terminal, a monitoring center, a server side, and a security client.
In one embodiment, one or more computer-readable storage media are provided having computer-readable instructions stored thereon, the readable storage media provided by the present embodiment including non-volatile readable storage media and volatile readable storage media. The readable storage medium stores computer readable instructions that when executed by one or more processors implement the functions of the monitoring terminal, the monitoring center, the server side, and the security client in the embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by instructing the associated hardware by computer readable instructions stored on a non-volatile readable storage medium or a volatile readable storage medium, which when executed may comprise the above described embodiment methods. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (9)

1. The security system based on the simulation model is characterized by comprising a server side, a monitoring center, at least one monitoring terminal and at least one security client side;
the monitoring terminal is configured to monitor an event occurring in a target security area in real time, generate security event information based on monitoring data, and send the security event information to the monitoring center, wherein the security event information at least comprises security event types, event occurrence positions and event occurrence time of security events corresponding to the security event;
the monitoring center is configured to call a target simulation model corresponding to the target security area trained by the server side when security event information sent by the monitoring terminal is received, and generate different security tasks corresponding to security events corresponding to the security event information by utilizing the target simulation model to mark the position information of each security client in the target security area in real time, wherein the security clients at different positions correspond to the different security tasks, the security clients at the same position also correspond to the different security tasks, and each security task is distributed to the corresponding security client; the security clients are in one-to-one correspondence with the sub-item security tasks, and each sub-item security task at least comprises a sub-item response plan corresponding to the security event type and an optimal path and time for security personnel executing the sub-item security task to reach the event occurrence position;
the security client is configured to generate a task reminding message when receiving the sub-item security task sent by the monitoring center; the security client is further configured to send security event information and task evaluation information to the monitoring center, and correspondingly, the monitoring center is further configured to receive the security event information and the task evaluation information sent by the security client and instruct the server to optimize a target simulation model;
the server side is configured to construct an initial simulation model of a target security area, simulate a preset security event in the initial simulation model, train the initial simulation model to mark in real time based on the position information of each security client in the target security area, and generate different security tasks corresponding to the preset security event to obtain a trained target simulation model.
2. The security system of claim 1, wherein the monitoring terminal is specifically configured to determine whether the monitored data satisfies a preset condition; and if the monitoring data meet the preset conditions, security event information is generated based on the monitoring data.
3. The security system of claim 1, wherein the monitoring center is further configured to mark the event occurrence location and the event occurrence time of the security event in real time using the target simulation model to send an event state of the security event to a security client in real time.
4. The security system of claim 1, wherein each of said separate security tasks further comprises task assessment instructions;
correspondingly, the security client is further configured to respond to task submitting operation of security personnel, trigger the task evaluation instruction, display a task evaluation window, respond to task evaluation submitting operation of the security personnel, and send the received task evaluation information corresponding to the sub-security task to the monitoring center.
5. The security system of claim 4, wherein the monitoring center is further configured to generate model optimization instructions according to the received task evaluation information sent by each security client, and send the model optimization instructions to the server side to instruct the server side to optimize the target simulation model.
6. The security task execution method based on the simulation model is characterized by comprising the following steps of:
the method comprises the steps that a server side builds an initial simulation model of a target security area, a preset security event is simulated in the initial simulation model, the initial simulation model is trained to mark in real time based on the position information of each security client side in the target security area, different security sub-items corresponding to the preset security event are generated, and a trained target simulation model is obtained;
the method comprises the steps that a monitoring terminal monitors an event occurring in a target security area in real time, security event information is generated based on monitoring data, and the security event information is sent to a monitoring center, wherein the security event information at least comprises security event types, event occurrence positions and event occurrence time of security events corresponding to the security event information;
when receiving security event information sent by the monitoring terminal, the monitoring center calls a target simulation model trained by the server, and utilizes the target simulation model to mark in real time based on the position information of each security client in the target security area, so as to generate different security tasks corresponding to security events corresponding to the security event information, wherein security clients at different positions correspond to different security tasks, and security clients at the same position also correspond to different security tasks, and each security task is distributed to the corresponding security client; the security clients are in one-to-one correspondence with the sub-item security tasks, and each sub-item security task at least comprises a sub-item response plan corresponding to the security event type and an optimal path and time for security personnel executing the sub-item security task to reach the event occurrence position;
when the security client receives the sub-item security task sent by the monitoring center, generating a task reminding message; the security client side also transmits security event information and task evaluation information to the monitoring center, and correspondingly, the monitoring center also receives the security event information and task evaluation information transmitted by the security client side and instructs the server side to optimize a target simulation model.
7. The security task execution method of claim 6, wherein each of the separate security tasks further comprises a task evaluation instruction; after the security client generates the task reminding message when receiving the item security task sent by the monitoring center, the method further comprises the following steps:
the security client side responds to task submitting operation of security personnel, triggers the task evaluation instruction, displays a task evaluation window, responds to the task evaluation submitting operation of the security personnel, and sends the received task evaluation information corresponding to the sub security task to the monitoring center.
8. The security task execution method according to claim 7, wherein after the security client sends the received task evaluation information corresponding to the sub-security task to the monitoring center, the method further comprises:
and the monitoring center generates a model optimization instruction according to the received task evaluation information sent by each security client, and sends the model optimization instruction to the server side so as to instruct the server side to optimize the target simulation model.
9. The security task execution method as claimed in claim 6, wherein the security task execution method further comprises:
the security client sends security event information to the monitoring center;
when receiving security event information sent by the security client, the monitoring center calls a target simulation model trained by the server, generates different security sub-items of security tasks corresponding to security events corresponding to the security event information based on the position information of each security client in the target security area by using the target simulation model, and distributes the security sub-items of security tasks to the corresponding security clients; the security clients are in one-to-one correspondence with the sub-item security tasks, and each sub-item security task at least comprises a sub-item response plan corresponding to the security event type, and an optimal path and time for security personnel executing the sub-item security task to reach the event occurrence position.
CN202210999242.0A 2022-08-19 2022-08-19 Security system and security task execution method based on simulation model Active CN115578046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210999242.0A CN115578046B (en) 2022-08-19 2022-08-19 Security system and security task execution method based on simulation model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210999242.0A CN115578046B (en) 2022-08-19 2022-08-19 Security system and security task execution method based on simulation model

Publications (2)

Publication Number Publication Date
CN115578046A CN115578046A (en) 2023-01-06
CN115578046B true CN115578046B (en) 2023-11-03

Family

ID=84579538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210999242.0A Active CN115578046B (en) 2022-08-19 2022-08-19 Security system and security task execution method based on simulation model

Country Status (1)

Country Link
CN (1) CN115578046B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194542A (en) * 2017-04-24 2017-09-22 深圳市龙岗远望软件技术有限公司 On-site emergency disposal method, system and moving emergency server
CN110826930A (en) * 2019-11-12 2020-02-21 杭州安恒信息技术股份有限公司 Security task scheduling method, device, equipment and readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109636131A (en) * 2018-11-21 2019-04-16 北京域天科技有限公司 A kind of emergency communication intelligent emergent DSS
US11438339B2 (en) * 2019-08-07 2022-09-06 Ventech Solutions, Inc. Method and system for synchronously generated security waiver interface

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194542A (en) * 2017-04-24 2017-09-22 深圳市龙岗远望软件技术有限公司 On-site emergency disposal method, system and moving emergency server
CN110826930A (en) * 2019-11-12 2020-02-21 杭州安恒信息技术股份有限公司 Security task scheduling method, device, equipment and readable storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
人脸识别技术在安全保卫工作中的应用及发展趋势研究;苏大伟;;无线互联科技(21);第135-137页 *
基于空间位置的大型活动安保信息系统的设计和实现;韩光瞬;孙丽丽;袁进军;程功;;北京测绘(10);第1230-1234页 *
当前机场安保工作面临的形势与对策;侯庆平;;民航管理(06);第77-79页 *
智能校园巡逻安保机器人设计;薛金言;张斌;武瀚;;无线互联科技(16);第131-132+135页 *
王欢.长庆油田油气安保指挥系统平台的设计与实现.《电脑知识与技术》.2020,86-89. *

Also Published As

Publication number Publication date
CN115578046A (en) 2023-01-06

Similar Documents

Publication Publication Date Title
US20210166197A1 (en) System and method for providing risk recommendation, mitigation and prediction
Khan et al. An ai and ml-enabled framework for proactive risk mitigation and resilience optimization in global supply chains during national emergencies
AU2023258418A1 (en) Emergency response system
WO2020259421A1 (en) Method and apparatus for monitoring service system
US10909630B2 (en) System and method for providing risk recommendation, mitigation and prediction
US10101244B2 (en) Self-learning simulation environments
US20180261100A1 (en) Decision aid system for remotely controlled/partially autonomous vessels
CN117370848B (en) Equipment fault prediction method, device, computer equipment and storage medium
US11308568B2 (en) Confined space configuration and operations management system
US11461691B2 (en) Performance manager to autonomously evaluate replacement algorithms
US11912410B2 (en) Drone cloud connectivity for asset and facility operations
CN111539861A (en) Fire-fighting emergency processing method and device, computer equipment and storage medium
KR20230164887A (en) Disaster response system using satellite image
US20160259869A1 (en) Self-learning simulation environments
CN115578046B (en) Security system and security task execution method based on simulation model
CN112241827A (en) Electronic device and control method
CN111539862A (en) Individual-soldier dispatch-based emergency processing method and device and computer equipment
US20230196137A1 (en) Computerized disruption handling in an environment
CN113222423B (en) Typhoon monitoring method for power grid equipment
CN115798146A (en) Drowning prevention early warning method and device, computer equipment and storage medium
Ruban et al. Methodology for determining the rational number of UAVs taking into account their reliability in emergency situations
CN112767636A (en) Fire alarm method, fire alarm device, computer equipment and storage medium
US20130340032A1 (en) System and method for achieving compliance through a closed loop integrated compliance framework and toolkit
KR102606669B1 (en) Method and system for fire-extinguishing-performance improvement and maintenance of fire-engine by using IoT
WO2013079086A1 (en) Environment observation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Security system and security task execution method based on simulation model

Granted publication date: 20231103

Pledgee: Shenzhen Rural Commercial Bank Co.,Ltd. Dapeng Branch

Pledgor: Shenzhen Dongang Kexing Technology Co.,Ltd.

Registration number: Y2024980041686

PE01 Entry into force of the registration of the contract for pledge of patent right