CN111179136A - Dynamic control method and device and electronic equipment - Google Patents

Dynamic control method and device and electronic equipment Download PDF

Info

Publication number
CN111179136A
CN111179136A CN201910709122.0A CN201910709122A CN111179136A CN 111179136 A CN111179136 A CN 111179136A CN 201910709122 A CN201910709122 A CN 201910709122A CN 111179136 A CN111179136 A CN 111179136A
Authority
CN
China
Prior art keywords
target
controlled
behavior
behavior track
position coordinate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910709122.0A
Other languages
Chinese (zh)
Inventor
高体伟
冯国武
周泽彪
康宁
王生明
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baifendian Information Science & Technology Co ltd
Original Assignee
Beijing Baifendian Information Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baifendian Information Science & Technology Co ltd filed Critical Beijing Baifendian Information Science & Technology Co ltd
Priority to CN201910709122.0A priority Critical patent/CN111179136A/en
Publication of CN111179136A publication Critical patent/CN111179136A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses a dynamic management and control method, which is used for solving the problems of long time consumption and low efficiency in the implementation process due to the fact that the existing management and control method needs to be in direct or indirect contact with a target to be managed and controlled. The method comprises the following steps: determining a resident area of the target to be controlled based on the behavior track data of the target to be controlled; matching the resident area of the target to be controlled with a preset standard resident area to determine whether the behavior state of the target to be controlled is abnormal or not; and when the behavior state of the target to be controlled is determined to be abnormal, executing control related processing on the target to be controlled. The application also discloses a dynamic management and control device, electronic equipment and a computer readable storage medium.

Description

Dynamic control method and device and electronic equipment
Technical Field
The present application relates to the field of security technologies, and in particular, to a dynamic management and control method, an apparatus, an electronic device, and a computer-readable storage medium.
Background
Currently, monitoring and management can be performed on a target to be controlled in a manner of direct or indirect contact with the target to be controlled, or monitoring and control can be performed on the target to be controlled in a manner of manual identification, manual registration, and manual comparison.
However, since the above-mentioned management and control method needs to directly or indirectly contact with the target to be controlled in the implementation process, which results in long time consumption and low efficiency in the implementation process, and cannot meet the requirement of a new period, there is a need for a method for determining whether the behavior of the target to be controlled is abnormal and controlling the target to be controlled under the condition that the behavior of the user is determined to be abnormal, which can solve the above-mentioned problems.
Disclosure of Invention
The embodiment of the application provides a dynamic management and control method, which is used for solving the problems of long time consumption and low efficiency in the implementation process due to the fact that the existing management and control method needs to be in direct or indirect contact with a target to be managed and controlled.
The embodiment of the application also provides a dynamic management and control device, electronic equipment and a computer readable storage medium.
The embodiment of the application adopts the following technical scheme:
a dynamic management and control method comprises the following steps:
determining a resident area of a target to be controlled based on behavior track data of the target to be controlled;
matching the resident area of the target to be controlled with a preset standard resident area to determine whether the behavior state of the target to be controlled is abnormal or not;
and executing management and control related processing when the behavior state of the target to be managed and controlled is determined to be abnormal.
A dynamic management and control device comprises a determining module, a matching module and a management and control module, wherein:
the determining module is used for determining a resident area of the target to be controlled based on behavior track data of the target to be controlled;
the matching module is used for matching the resident area of the target to be controlled with a preset standard resident area so as to determine whether the behavior state of the target to be controlled is abnormal or not;
and the management and control module is used for executing management and control related processing when the behavior state of the target to be managed and controlled is determined to be abnormal.
An electronic device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the dynamic policing method as described above.
A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of a dynamic policing method as described above.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
according to the method provided by the embodiment of the application, firstly, a resident area of a target to be controlled is determined based on behavior track data of the target to be controlled; secondly, matching can be carried out through the determined resident area and a preset standard resident area, and whether the behavior state of the target to be controlled is abnormal or not is further determined; finally, when the behavior state of the target to be controlled is determined to be abnormal, the management and control related processing is executed, and the problem that the target to be controlled needs to be in direct or indirect contact with the whole process is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart illustrating an implementation of a dynamic management and control method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a dynamic management and control apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example 1
The embodiment of the application provides a dynamic management and control method, which is used for solving the problems of long time consumption and low efficiency in the implementation process due to the fact that the existing management and control method needs to be in direct or indirect contact with a target to be managed and controlled.
The execution subject of the method may be various types of electronic devices, or may be an Application program or Application (APP) installed on the electronic device. The electronic device may be, for example, an electronic device with a data processing function, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, or a personal digital assistant, and the specific form of the electronic device is not limited in this embodiment.
For convenience of description, the embodiment of the present application describes the method by taking an electronic device with a data processing function as an execution subject of the method as an example. It can be understood by those skilled in the art that the embodiments of the present application are described by taking the electronic device as an example, which is only an exemplary illustration and does not limit the scope of the claims corresponding to the present application.
Specifically, an implementation flow of the method provided by the embodiment of the present application is shown in fig. 1, and includes the following steps:
step 11, determining a resident area of the target to be controlled based on the behavior track data of the target to be controlled;
the behavior trajectory data may include position transformation sequence data formed by all base stations through which a person to be controlled passes in a certain time period, that is, a path trajectory of a target to be controlled, for example, a path trajectory composed of a passing point, a staying point, and the like of the target to be controlled during activity.
Or, in the moving process of the target to be controlled, the limb part of the target to be controlled also moves along with the target to generate a corresponding track, so in the embodiment of the application, the behavior track data can also be a passing track detected in real time through a track sensor, such as a gravity sensor, a gyroscope, an acceleration sensor, and the like.
In the embodiment of the application, when behavior trajectory data corresponding to a target to be controlled is acquired, the behavior trajectory data may be acquired, but is not limited to be acquired, by a mobile terminal of the target to be controlled.
Or, according to the embodiment of the application, the behavior trajectory data of the target to be controlled can be acquired through various electronic devices with identification and positioning functions, such as a bayonet camera, a WIFI probe, an electronic fence and the like, except for the mobile terminal of the target to be controlled.
When the behavior track data corresponding to the target to be controlled is acquired through the mobile terminal of the target to be controlled, for example, the behavior track data of the target to be controlled corresponding to the mobile terminal may be acquired according to the position information by acquiring the position information of each network connection device of the mobile terminal.
Specifically, assuming that a target to be controlled walks on the road with the mobile terminal, where the network connection device 1, the network connection device 2, and the network connection device 3 detect three MAC addresses corresponding to the smartphone, respectively, the movement trajectory of the mobile terminal may be determined as behavior trajectory data of the target to be controlled by obtaining positions of the three network connection devices and performing connection to obtain a movement trajectory of the mobile terminal.
In the embodiment of the application, after behavior trajectory data of the target to be controlled is collected, a resident area of the target to be controlled can be determined by adopting the following method:
step 111, determining the duration of the target to be controlled at the station of each behavior track cluster based on the behavior track data of the target to be controlled;
optionally, in this embodiment of the application, the behavior trajectory data of the target to be controlled may be divided into a plurality of behavior trajectory clusters through a spatial clustering algorithm, and then a duration that the target to be controlled is located at a residence of each behavior trajectory cluster may be determined.
The behavior track cluster is used for describing a position area of a target to be controlled; the densities of all action track points in the same action track cluster are connected and the direct density can be reached, and the action track points are used for describing the geographical position of the target to be controlled.
And the spatial clustering algorithm takes the residence time of each behavior trace point and the density of the behavior trace data of the target to be controlled as the basis for dividing the behavior trace cluster.
Specifically, the behavior trace data of the target to be managed and controlled can be divided into a plurality of behavior trace clusters by the following method:
determining core behavior track points and neighborhoods of the core behavior track points of behavior track data of the target to be controlled based on a spatial clustering algorithm;
calculating the distances between other behavior track points which do not contain the core behavior track point in the behavior track data of the target to be controlled and the neighborhood of the core behavior track point;
and dividing the behavior track data of the target to be controlled into a plurality of behavior track clusters according to the distances between other behavior track points and the neighborhoods of the core behavior track points.
For example, the behavior trace points may be divided, but not limited to, into clusters in which neighborhoods of core behavior trace points closer to their respective ones are located.
In the related art, because behavior trace data is usually a continuous straight line or curve, when dividing a behavior trace cluster, behavior trace points in a plurality of different regions, which are closely connected, may be divided into the same behavior trace cluster to form a long-chain cluster, thereby causing a situation that the behavior trace point regions are wrongly divided.
Based on the above description, in the embodiment of the present application, in order to avoid forming long-chain clusters, when dividing the behavior trajectory cluster, the behavior trajectory data may be divided based on density, for example, behavior trajectory points having the same density in the behavior trajectory data in the same segment, or meeting the requirement of direct density reachability may be divided into one behavior trajectory cluster, or behavior trajectory points connected with any point density in a set of behavior trajectory points that can be reached by direct density may be divided into the same behavior trajectory cluster.
After the behavior track data is divided into behavior track clusters, the duration of the target to be controlled located at the residence of each behavior track cluster can be further determined.
And the residence time length of the behavior track cluster can be determined by the time of two adjacent behavior track clusters. For example, assuming that there are two adjacent behavior trace clusters, namely a behavior trace cluster a and a behavior trace cluster B, where the time for the target to be controlled to enter the behavior trace cluster a is 14:32 in 2019, 1, 11, and the time for the target to be controlled to enter the behavior trace cluster a is 18:32 in 2019, 1, 11, and then the duration of the target to be controlled at the premises of the behavior trace cluster a may be determined to be 4 hours.
It should be noted that, because the behavior trace data volume of the target to be controlled is large, which easily causes the problems of large data processing pressure of the server, low execution efficiency, and the like, in this embodiment of the application, in order to improve the availability of the behavior trace data and the execution efficiency of the server, before dividing the behavior trace data of the target to be controlled into a plurality of behavior trace clusters, the method further includes:
and cleaning and integrating the behavior track data of the target to be controlled.
Specifically, the following invalid data can be removed to clean the behavior trace data of the target to be managed and controlled:
(1) removing repeated behavior trace data; (2) removing wrong behavior track data, wherein the wrong behavior track data is used for reducing the influence on the spatial clustering model, such as behavior track data with wrong acquisition time, behavior track data with wrong equipment asset information, behavior track data with wrong target asset information to be managed and controlled, and the like; (3) and removing the illogical behavior track data, wherein the illogical behavior track data represents behavior track data which are positioned at two different places at the same time with the target to be controlled, for example.
In the embodiment of the application, when the illogical behavior trace data are removed, parallel branches existing on a time axis can be removed according to the preset priority level of the electronic equipment, namely, the behavior trace data located in two different places at the same time, for example, the preset priority level of the electronic equipment can be that the priority level of the behavior trace data collected by the electronic fence is higher than that of the behavior trace data collected by the WIFI probe, and the priority level of the behavior trace data collected by the WIFI probe is higher than that of the behavior trace data collected by the bayonet camera.
The preset priority level of the electronic device is only an exemplary illustration, and does not limit the embodiments of the present application in any way.
In the embodiment of the application, after the behavior trace data of the target to be controlled is cleaned, the behavior trace data can be further integrated, wherein the integration mode is, for example, day-by-day division or time-by-time division can be performed on the behavior trace data of the target to be controlled according to time.
And step 112, determining a resident area of the target to be controlled according to the residence time and the density of the behavior track data of the target to be controlled.
In general, because the time that the target to be controlled is located in the resident area, for example, the action track points such as a work place and an accommodation place is relatively longer than the residence time of the action track points in the rest of the resident area, in this embodiment of the present application, the resident area may be determined based on the residence time that the target to be controlled is located in each action track cluster.
Specifically, in the embodiment of the present application, the behavior trace cluster with the longest residence time may be determined as the resident area of the target to be managed and controlled, but not limited to. For example, in one embodiment, the behavior trace cluster containing the largest number of behavior trace points may also be determined as the resident area of the target to be managed.
By adopting the method provided by the embodiment of the application, the time dimension is increased on the basis of density measurement, and the problem of poor clustering quality caused by adopting a traditional density clustering algorithm when the density of behavior track data is not uniform and the difference of clustering intervals is large can be avoided.
Step 12, matching the resident area of the target to be controlled with a preset standard resident area to determine whether the behavior state of the target to be controlled is abnormal;
the preset standard resident area can be determined by related departments according to historical behavior trajectory data of the target to be controlled.
Specifically, if the resident area of the target to be controlled is not matched with the preset standard resident area, determining that the behavior state of the target to be controlled is abnormal; and if the resident area of the target to be controlled is matched with the preset standard resident area, determining that the behavior state of the target to be controlled is normal.
It should be noted that, if the permanent area of the target to be controlled is not matched with the preset standard permanent area due to the replacement of the permanent area by the target to be controlled, a part of the behavior trace cluster may be reconstructed or the preset standard permanent area may be re-determined.
For example, assuming that a residential area of a target to be controlled is behavior track cluster a in 2018, the residential area is changed into behavior track cluster B in 2019 due to the replacement of the working position, and a preset standard residential area C is matched with the behavior track cluster a and is not matched with the behavior track cluster B, the preset standard residential area may be re-determined based on the current behavior track data of the target to be controlled.
And step 13, when the behavior state of the target to be controlled is determined to be abnormal, executing control related processing on the target to be controlled.
The behavior state exception includes a situation that a resident area of the target to be managed and controlled is not matched with a preset standard resident area.
The related processing may include sending warning information to the background and sending current position information of the target to be managed and controlled to the background.
For example, the warning information is sent to the background, where the warning information may include an intention of the target to be controlled to illegally enter or touch the preset important area, a traveling direction of the target to be controlled, and position information of the preset important area closest to the target to be controlled currently.
Alternatively, the process related to management and control may further include defining an early warning level. The early warning level includes follow-up report, immediate report by touching the border, and the like.
By adopting the method provided by the embodiment of the application, firstly, the resident area of the target to be controlled can be determined based on the behavior track data of the target to be controlled; secondly, matching can be carried out through the determined resident area and a preset standard resident area, and whether the behavior state of the target to be controlled is abnormal or not is further determined; finally, when the behavior state of the target to be controlled is determined to be abnormal, the target to be controlled is executed with control related processing, and the problem that the target to be controlled needs to be in direct or indirect contact is avoided.
In general, in order to avoid that the target to be controlled illegally enters or touches the preset key area and adversely affects the preset key area, in this embodiment of the application, after determining that the behavior state of the target to be controlled is abnormal, the control method further includes:
judging whether the target to be controlled has the intention of illegally entering or touching a preset key area, wherein the preset key area comprises an authority area which is forbidden to enter or touch randomly;
if yes, executing the relevant control processing.
The preset key area comprises an authority area which is forbidden to enter or touch at will.
The method for judging whether the target to be controlled has the intention of illegally entering or touching the preset key area specifically comprises the following steps:
judging whether the current moving distance and the moving direction of the target to be controlled meet preset conditions; the preset conditions comprise a preset first condition and a preset second condition;
if yes, determining that the target to be controlled has the intention of illegally entering or touching the preset key area.
Specifically, the preset first condition includes that the minimum distance between the current position coordinate of the target to be controlled and the position coordinate of the preset important area is less than or equal to a first threshold, and the ratio of the first distance between the current position coordinate of the target to be controlled and the permanent area to the second distance between the position coordinate of the preset important area and the permanent area is less than or equal to a second threshold.
For example, assume the current position coordinates pos of the target to be managednowIs (x)0,y0,z0) Presetting the position coordinates b of the key areaiIs (x)b,yb,zb) Wherein b isiE, border (1 ≦ i ≦ n), and the resident region satisfies Ax + By + Cz + D ≦ 0, the first condition may be preset By the following equation [1 ≦ n]And [2]]Represents:
Min(di)≤α(1≤i≤n) [1]
wherein d isi=Distance(posnow,bi),(1≤i≤n);
Min(di) and alpha represents a first threshold value.
Figure RE-GDA0002444135140000091
Wherein d ispRepresenting a first distance between the current position coordinate of the object to be controlled and the resident area; dbRepresenting a second distance between the position coordinate of the preset key area and the resident area; μ denotes a second threshold value.
In particular, the amount of the solvent to be used,
Figure RE-GDA0002444135140000092
presetting a second condition, wherein the product of the first position coordinate difference and the second position coordinate difference is larger than zero;
the first position coordinate difference is the difference between the current position coordinate of the target to be controlled and the last position coordinate of the target to be controlled, and the second position coordinate difference is the difference between the position coordinate of the preset key area closest to the target to be controlled and the last position coordinate of the target to be controlled.
Following the above example, the preset second condition can be expressed by the following equation [3 ]:
(posnow-poslast)*(bmin-poslast)>0 [3]
it should be noted that, in the embodiment of the present application, the above formulas [1] and [2] are used to determine the current moving distance of the target to be controlled; the formula [3] is used for determining the current moving direction of the target to be controlled, and specifically, if the calculation result of the formula [3] is greater than zero, it indicates that the target to be controlled is close to the preset key area, that is, the target to be controlled has an intention of illegally entering or touching the preset key area; on the contrary, if the calculation result of the formula [3] is less than zero, it indicates that the target to be controlled is far away from the preset key area, that is, there is no intention to illegally enter or touch the preset key area.
In order to bring the target to be controlled into the investigation range in time and obtain the investigation initiative, in the embodiment of the present application, if it is determined that the target to be controlled has an intention of illegally entering or touching the preset key area, the relevant management and control processing is executed, for example, a warning message is sent to the background, where the warning message may include the intention of illegally entering or touching the preset key area, the traveling direction of the target to be controlled, and the position information of the preset key area closest to the target to be controlled.
Alternatively, the process related to management and control may further include defining an early warning level. The early warning level includes follow-up report, immediate report by touching the border, and the like.
Example 2
In order to solve the problems that the time consumption is long and the efficiency is low in the implementation process due to the fact that the existing governing and managing mode needs to be in direct or indirect contact with the target to be managed, the embodiment of the application provides a dynamic managing and controlling device 20, and the specific structural schematic diagram of the device is shown in fig. 2 and comprises a determining module 21, a matching module 22 and a managing and controlling module 23. The functions of the modules are as follows:
the determining module is used for determining a resident area of the target to be controlled based on the behavior track data of the target to be controlled;
the matching module is used for matching the resident area of the target to be controlled with a preset standard resident area so as to determine whether the behavior state of the target to be controlled is abnormal or not;
and the management and control module is used for executing management and control related processing on the target to be managed and controlled when the abnormal behavior state of the target to be managed and controlled is determined.
The determining module is specifically configured to:
determining the residence time of the target to be controlled in each behavior track cluster based on the behavior track data of the target to be controlled;
specifically, behavior track data of the target to be controlled can be divided into a plurality of behavior track clusters through a spatial clustering algorithm, and the behavior track clusters are used for describing the position area of the target to be controlled; and the densities of all the behavioral track points in the same behavioral track cluster are connected and can be directly reached.
And determining a resident area of the target to be controlled according to the residence time.
In one embodiment, the dynamic management and control apparatus 20 further includes a determining module, configured to:
judging whether the target to be controlled has the intention of illegally entering or touching a preset key area, wherein the preset key area comprises an authority area which is forbidden to enter or touch randomly;
and if so, executing management and control related processing on the target to be managed and controlled.
The managing and controlling related processing may include sending warning information to the background.
For example, the warning information is sent to the background, where the warning information may include an intention of the target to be controlled to illegally enter or touch the preset important area, a traveling direction of the target to be controlled, and position information of the preset important area closest to the target to be controlled currently.
Alternatively, the process related to management and control may further include defining an early warning level. The early warning level includes follow-up report, immediate report by touching the border, and the like.
In one embodiment, the judging module may include a judging unit and a determining unit, and particularly,
the judging unit is used for judging whether the current moving distance and the moving direction of the target to be controlled meet preset conditions; the preset conditions comprise a preset first condition and a preset second condition;
and the determining unit is used for determining that the target to be controlled has the intention of illegally entering or touching the preset key area when the current moving distance and the moving direction of the target to be controlled meet the preset conditions.
Specifically, the preset first condition includes that the minimum distance between the current position coordinate of the target to be controlled and the position coordinate of the preset important area is less than or equal to a first threshold, and the ratio of the first distance between the current position coordinate of the target to be controlled and the resident area to a second distance between the position coordinate of the preset important area and the resident area is less than or equal to a second threshold.
The preset second condition comprises that the product of the first position coordinate difference and the second position coordinate difference is larger than zero;
the first position coordinate difference is the difference between the current position coordinate of the target to be controlled and the last position coordinate of the target to be controlled; the second position coordinate difference is the difference between the position coordinate of the preset key area closest to the target to be controlled and the last position coordinate of the target to be controlled.
By adopting the device provided by the embodiment of the application, firstly, the determining module can determine the resident area of the target to be controlled based on the behavior track data of the target to be controlled; secondly, the matching module can match the determined resident area with a preset standard resident area so as to determine whether the behavior state of the target to be controlled is abnormal; finally, when the management and control module determines that the behavior state of the target to be managed is abnormal, management and control related processing is executed on the target to be managed, and the problem that the target to be managed needs to be in direct or indirect contact with the target to be managed is avoided in the whole process.
Example 3
An embodiment of the present application further provides an electronic device for dynamic management and control, where a hardware structure diagram of the electronic device is shown in fig. 3, and in a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 3, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the data synchronization device on the logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
determining a resident area of a target to be controlled based on behavior track data of the target to be controlled;
matching the resident area of the target to be controlled with a preset standard resident area to determine whether the behavior state of the target to be controlled is abnormal or not;
and executing management and control related processing when the behavior state of the target to be managed and controlled is determined to be abnormal.
In one case, the processor may further perform the following: determining the residence time of the target to be controlled in each behavior track cluster based on the behavior track data of the target to be controlled;
and determining a resident area of the target to be controlled according to the residence time.
Optionally, the determining, by the processor, a length of time that the target to be controlled is located at a premises of each behavior track cluster based on the behavior track data of the target to be controlled specifically includes:
dividing the behavior track data of the target to be controlled into a plurality of behavior track clusters through a spatial clustering algorithm, wherein the behavior track clusters are used for describing the position area of the target to be controlled; the densities of all the behavioral track points in the same behavioral track cluster are connected and the direct density can be reached;
and determining the duration of the target to be controlled at the residence of each behavior track cluster.
Optionally, in an embodiment, the processor may further perform the following operations:
judging whether the current moving distance and the moving direction of the target to be controlled meet preset conditions; the preset conditions comprise a preset first condition and a preset second condition;
if yes, determining that the target to be controlled has the intention of illegally entering or touching the preset key area.
Wherein the preset first condition includes: the minimum distance between the current position coordinate of the target to be controlled and the position coordinate of the preset key area is smaller than or equal to a first threshold, and the ratio of the first distance between the current position coordinate of the target to be controlled and the permanent area to the second distance between the position coordinate of the preset key area and the permanent area is smaller than or equal to a second threshold.
The preset second condition includes: the product of the first position coordinate difference and the second position coordinate difference is greater than zero;
the first position coordinate difference is the difference between the current position coordinate of the target to be controlled and the last position coordinate of the target to be controlled, and the second position coordinate difference is the difference between the position coordinate of the preset key area closest to the target to be controlled and the last position coordinate of the target to be controlled.
The dynamic policing method disclosed in the embodiment of fig. 3 of the present application may be applied to a processor, or may be implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, besides the software implementation, the electronic device of the present application does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
In addition, fig. 3 also includes some functional modules that are not shown, and are not described herein again.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned image cropping method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (11)

1. A dynamic management and control method is characterized by comprising the following steps:
determining a resident area of a target to be controlled based on behavior track data of the target to be controlled;
matching the resident area of the target to be controlled with a preset standard resident area to determine whether the behavior state of the target to be controlled is abnormal or not;
and executing management and control related processing when the behavior state of the target to be managed and controlled is determined to be abnormal.
2. The method according to claim 1, wherein determining the resident area of the target to be managed based on the behavior trace data of the target to be managed specifically comprises:
determining the duration of the target to be controlled at the station of each behavior track cluster based on the behavior track data of the target to be controlled;
and determining a resident area of the target to be controlled according to the residence time and the density of the behavior track data of the target to be controlled.
3. The method according to claim 2, wherein determining a residence time length of the target to be controlled at each behavior locus cluster based on the behavior locus data of the target to be controlled specifically comprises:
dividing the behavior track data of the target to be controlled into a plurality of behavior track clusters through a spatial clustering algorithm, wherein the behavior track clusters are used for describing the position area of the target to be controlled; the densities of all the behavioral track points in the same behavioral track cluster are connected and the direct density can be reached;
and determining the duration of the target to be controlled at the residence of each behavior track cluster.
4. The method according to claim 3, wherein the behavior trace data of the target to be controlled is divided into a plurality of behavior trace clusters by a spatial clustering algorithm, and the method specifically comprises the following steps:
determining core behavior track points of the behavior track data of the target to be controlled and a neighborhood of the core behavior track points based on a spatial clustering algorithm;
calculating the distances between other behavior track points except the core behavior track point in the behavior track data of the target to be controlled and the neighborhood of the core behavior track point;
and dividing the behavior track data of the target to be controlled into a plurality of behavior track clusters according to the distances between the other behavior track points and the neighborhoods of the core behavior track points.
5. The method according to claim 1, when the behavior state of the target to be managed is judged to be abnormal, further comprising:
judging whether the target to be controlled has the intention of illegally entering or touching a preset key area, wherein the preset key area comprises an authority area which is forbidden to enter or touch randomly;
if yes, executing the relevant control processing.
6. The method according to claim 5, wherein determining whether the target to be managed has an intention to illegally enter or touch a preset key area specifically includes:
judging whether the current moving distance and the moving direction of the target to be controlled meet preset conditions or not; the preset conditions comprise a preset first condition and a preset second condition;
if yes, determining that the target to be controlled has the intention of illegally entering or touching a preset key area.
7. The method of claim 6, wherein the pre-set first condition comprises:
the minimum distance between the current position coordinate of the target to be controlled and the position coordinate of the preset key area is smaller than or equal to a first threshold, and the ratio of the current position coordinate of the target to be controlled to the first distance of the resident area and the second distance between the position coordinate of the preset key area and the resident area is smaller than or equal to a second threshold.
8. The method of claim 6, wherein the pre-set second condition comprises:
the product of the first position coordinate difference and the second position coordinate difference is greater than zero;
the first position coordinate difference is the difference between the current position coordinate of the target to be controlled and the last position coordinate of the target to be controlled, and the second position coordinate difference is the difference between the position coordinate of the preset key area closest to the target to be controlled and the last position coordinate of the target to be controlled.
9. A dynamic management and control device, comprising:
the determining module is used for determining a resident area of the target to be controlled based on behavior track data of the target to be controlled;
the matching module is used for matching the resident area of the target to be controlled with a preset standard resident area so as to determine whether the behavior state of the target to be controlled is abnormal or not;
and the management and control module is used for executing management and control related processing when the behavior state of the target to be managed and controlled is determined to be abnormal.
10. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the dynamically governed method according to any one of claims 1 to 8.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, carries out the steps of the dynamic policing method according to any one of claims 1 to 8.
CN201910709122.0A 2019-08-01 2019-08-01 Dynamic control method and device and electronic equipment Pending CN111179136A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910709122.0A CN111179136A (en) 2019-08-01 2019-08-01 Dynamic control method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910709122.0A CN111179136A (en) 2019-08-01 2019-08-01 Dynamic control method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111179136A true CN111179136A (en) 2020-05-19

Family

ID=70655766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910709122.0A Pending CN111179136A (en) 2019-08-01 2019-08-01 Dynamic control method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111179136A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914657A (en) * 2020-07-06 2020-11-10 浙江大华技术股份有限公司 Pet behavior detection method and device, electronic equipment and storage medium
CN112331361A (en) * 2020-11-06 2021-02-05 中国联合网络通信集团有限公司 Method and device for determining person in close contact
CN113705985A (en) * 2021-08-12 2021-11-26 河南工业职业技术学院 Student think of political affairs condition analysis and early warning method, system, terminal and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622861A (en) * 2012-03-26 2012-08-01 陈寒冰 Security monitoring alarm system based on geographical position and method therefor
CN105338541A (en) * 2014-06-30 2016-02-17 华为技术有限公司 Mobile wireless network data-based abnormal trajectory detection method and device
CN105916116A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Monitoring method and device based on movement locus information
CN107133269A (en) * 2017-04-01 2017-09-05 中国人民解放军国防科学技术大学 Frequent location track generation method and device based on mobile target
CN107146386A (en) * 2017-05-05 2017-09-08 广东小天才科技有限公司 Abnormal behavior detection method and device, and user equipment
CN107392245A (en) * 2017-07-19 2017-11-24 南京信息工程大学 A kind of taxi trajectory clustering algorithm Tr OPTICS
CN108122012A (en) * 2017-12-28 2018-06-05 百度在线网络技术(北京)有限公司 Definite method, apparatus, equipment and the storage medium of resident dot center point
CN108566618A (en) * 2018-04-04 2018-09-21 广州杰赛科技股份有限公司 Obtain method, apparatus, equipment and storage medium that user is resident rule
CN109241138A (en) * 2018-08-30 2019-01-18 跨越速运集团有限公司 A kind of motion track construction method and device
CN109903045A (en) * 2019-01-24 2019-06-18 平安科技(深圳)有限公司 Action trail monitoring method, device, computer equipment and medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622861A (en) * 2012-03-26 2012-08-01 陈寒冰 Security monitoring alarm system based on geographical position and method therefor
CN105338541A (en) * 2014-06-30 2016-02-17 华为技术有限公司 Mobile wireless network data-based abnormal trajectory detection method and device
CN105916116A (en) * 2016-06-30 2016-08-31 北京奇虎科技有限公司 Monitoring method and device based on movement locus information
CN107133269A (en) * 2017-04-01 2017-09-05 中国人民解放军国防科学技术大学 Frequent location track generation method and device based on mobile target
CN107146386A (en) * 2017-05-05 2017-09-08 广东小天才科技有限公司 Abnormal behavior detection method and device, and user equipment
CN107392245A (en) * 2017-07-19 2017-11-24 南京信息工程大学 A kind of taxi trajectory clustering algorithm Tr OPTICS
CN108122012A (en) * 2017-12-28 2018-06-05 百度在线网络技术(北京)有限公司 Definite method, apparatus, equipment and the storage medium of resident dot center point
CN108566618A (en) * 2018-04-04 2018-09-21 广州杰赛科技股份有限公司 Obtain method, apparatus, equipment and storage medium that user is resident rule
CN109241138A (en) * 2018-08-30 2019-01-18 跨越速运集团有限公司 A kind of motion track construction method and device
CN109903045A (en) * 2019-01-24 2019-06-18 平安科技(深圳)有限公司 Action trail monitoring method, device, computer equipment and medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
仇功达,等: "异常轨迹数据预警与预测关键技术综述" *
周维柏,等: "基于轨迹特征分析的行人异常行为识别" *
姚迪,等: "时空数据语义理解:技术与应用" *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914657A (en) * 2020-07-06 2020-11-10 浙江大华技术股份有限公司 Pet behavior detection method and device, electronic equipment and storage medium
CN111914657B (en) * 2020-07-06 2023-04-07 浙江大华技术股份有限公司 Pet behavior detection method and device, electronic equipment and storage medium
CN112331361A (en) * 2020-11-06 2021-02-05 中国联合网络通信集团有限公司 Method and device for determining person in close contact
CN112331361B (en) * 2020-11-06 2023-06-16 中国联合网络通信集团有限公司 Method and device for determining intimate contact person
CN113705985A (en) * 2021-08-12 2021-11-26 河南工业职业技术学院 Student think of political affairs condition analysis and early warning method, system, terminal and medium
CN113705985B (en) * 2021-08-12 2023-09-29 河南工业职业技术学院 Student status analysis early warning method, system, terminal and medium

Similar Documents

Publication Publication Date Title
CN111179136A (en) Dynamic control method and device and electronic equipment
CN111131783A (en) Monitoring method and device based on electronic fence, terminal equipment and storage medium
CN109561052B (en) Method and device for detecting abnormal flow of website
CN107818301B (en) Method and device for updating biological characteristic template and electronic equipment
CN109086734B (en) Method and device for positioning pupil image in human eye image
CN112102288B (en) Water body identification and water body change detection method, device, equipment and medium
CN110751515A (en) Decision-making method and device based on user consumption behaviors, electronic equipment and storage medium
CN113709006B (en) Flow determination method and device, storage medium and electronic device
CN111985438A (en) Static face processing method, device and equipment
CN115567371B (en) Abnormity detection method, device, equipment and readable storage medium
CN109145821B (en) Method and device for positioning pupil image in human eye image
CN116327060A (en) Method and device for judging regional overlapping, electronic equipment and medium
CN113497721A (en) Network fault positioning method and device
CN113902356B (en) Regional flow data analysis method and device
CN113205079B (en) Face detection method and device, electronic equipment and storage medium
CN111083636B (en) Motion state information processing method and device
CN111091022A (en) Machine vision efficiency evaluation method and system
CN106454884A (en) Method for distinguishing homonymous wireless access points and equipment thereof
CN112752222B (en) Behavior recognition method and device, electronic equipment and computer storage medium
CN111179319B (en) Face recognition-based indoor movement track acquisition method and system
CN110082794B (en) Vehicle GPS track data filtering method
CN110933161A (en) Information anti-theft management method, device, server and readable storage medium
CN117290741B (en) Vehicle clustering method, device, computer equipment and storage medium
CN111367897B (en) Data processing method, device, equipment and storage medium
CN110148225B (en) Traffic station determining method, device, equipment and storage equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100081 No.101, 1st floor, building 14, 27 Jiancai Chengzhong Road, Haidian District, Beijing

Applicant after: Beijing PERCENT Technology Group Co.,Ltd.

Address before: 100081 16 / F, block a, Beichen Century Center, building 2, courtyard 8, Beichen West Road, Chaoyang District, Beijing

Applicant before: BEIJING BAIFENDIAN INFORMATION SCIENCE & TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200519