CN113141485B - Alarm system - Google Patents

Alarm system Download PDF

Info

Publication number
CN113141485B
CN113141485B CN202011139233.1A CN202011139233A CN113141485B CN 113141485 B CN113141485 B CN 113141485B CN 202011139233 A CN202011139233 A CN 202011139233A CN 113141485 B CN113141485 B CN 113141485B
Authority
CN
China
Prior art keywords
alarm
message
camera
image
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011139233.1A
Other languages
Chinese (zh)
Other versions
CN113141485A (en
Inventor
高肖肖
梁启超
李杨
冯博
董明明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Tianhe Defense Technology Co ltd
Original Assignee
Xi'an Tianhe Defense Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Tianhe Defense Technology Co ltd filed Critical Xi'an Tianhe Defense Technology Co ltd
Priority to CN202011139233.1A priority Critical patent/CN113141485B/en
Publication of CN113141485A publication Critical patent/CN113141485A/en
Application granted granted Critical
Publication of CN113141485B publication Critical patent/CN113141485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/695Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses alarm system belongs to land resource protection field. The acquisition module in the warning system acquires the camera identification, the plot identification and the image shot on the plot, which are acquired by the camera. And the analysis module performs target recognition on the image to obtain the identifier of the alarm target which does not accord with the use requirement of the land parcel and is contained in the image. And the data association micro service determines attribute information corresponding to the camera identifier, the parcel identifier and the identifier of the alarm target as first alarm information. And the rule engine micro service takes the first alarm information meeting the alarm condition as second alarm information. And the business module generates a work order according to the second alarm information, wherein the work order is used for indicating and processing the illegal behaviors which do not meet the use requirements of the land parcel. According to the warning system based on the micro-service, the warning and work order generation aiming at the illegal action can be automatically realized by processing the monitoring information collected by the camera in real time, and the warning system is beneficial to performing efficient supervision of the land and ensuring efficient processing of the illegal action.

Description

Alarm system
Technical Field
The application relates to the field of land resource protection, in particular to an alarm system.
Background
At present, the phenomenon that land resources are subjected to illegal abuse is prominent, and various land reasonable utilization problems are increasingly shown. Various geological disasters are aggravated continuously due to improper land utilization. With the environmental issues being emphasized, land resource conservation is becoming increasingly important.
In the related art, a video monitoring system is used for monitoring illegal behaviors such as illegal construction and illegal land occupation. Specifically, a video monitoring system is built in an area needing attention, and if a technician finds an illegal action in a shot video, the technician goes to the site to process the illegal action.
However, since the area of the land management area is often large, the technical staff is relied on to visually identify the violation, which not only causes great stress on the technical staff, but also easily causes problems of violation omission, untimely handling and the like.
Disclosure of Invention
The embodiment of the application provides an alarm system which can automatically realize alarming and work order generation aiming at illegal behaviors.
In a first aspect, an alarm system is provided, the system comprising: the system comprises an acquisition module, an analysis module, a micro-service module and a business module, wherein the micro-service module comprises data association micro-service and rule engine micro-service;
the acquisition module is used for acquiring monitoring information acquired by a camera, and the monitoring information comprises a camera identifier, a plot identifier and an image shot by the camera on the plot;
the analysis module is used for carrying out target identification on the image to obtain an identifier of an alarm target contained in the image, wherein the alarm target is a target which does not meet the use requirement of a land parcel;
the data association microservice is used for acquiring first warning information, wherein the first warning information comprises camera attribute information corresponding to the camera identifier, parcel attribute information corresponding to the parcel identifier and warning attribute information corresponding to the identifier of the warning target;
the rule engine microserver is used for taking the first alarm information as second alarm information under the condition that the first alarm information meets alarm conditions;
and the business module is used for generating a work order according to the second alarm information, and the work order is used for indicating and processing the violation behaviors which do not meet the use requirements of the land parcel.
In the application, the alarm system micro-services functions such as data association, a rule engine and the like and is decoupled with the back-end service module, so that the stability of the system can be improved, and the system is more flexibly deployed. The warning system based on the micro-service can process the monitoring information collected by the camera in real time, automatically realize warning and work order generation aiming at illegal behaviors, and is beneficial to performing efficient supervision of land and ensuring efficient processing of the illegal behaviors.
Optionally, the analysis module is specifically configured to:
and inputting the image into a target recognition model, and outputting the identifier of the alarm target contained in the image by the target recognition model, wherein the target recognition model is used for recognizing the target contained in the image and not meeting the use requirement of the land parcel.
Optionally, the system further includes a message transmission module, where the message transmission module performs communication based on a publish-subscribe mode;
the analysis module is used for publishing a first message to the message transmission module, wherein the subject of the first message is a first subject, and the load of the first message comprises the camera identifier, the parcel identifier and the identifier of the warning target;
the message transmission module is configured to send the load of the first message to the data-associated microservice subscribed to the first topic.
Optionally, the message transmission module is specifically configured to:
determining that the camera authentication is successful under the condition that the camera identification is the same as the specified camera identification, wherein the specified camera identification is used for identifying the camera with legality;
and under the condition that the authentication of the camera is successful, sending the load of the first message to the data associated microservice subscribed to the first theme.
Optionally, the analysis module is configured to encode the image to obtain encoded data, carry the encoded data in a load of the first message, and send the encoded data to the message transmission module;
the data-associated microservice is used for decoding the encoded data to obtain the image; and storing the image to obtain a storage address of the image.
Optionally, the system further comprises a message middleware, the message middleware communicating based on a publish-subscribe pattern;
the data association microservice is used for publishing a second message to the message middleware, the theme of the second message is a second theme, and the load of the second message comprises the first alarm information and the storage address of the image;
the message middleware is used for sending the load of the second message to the rule engine microservice which subscribes to the second theme.
Optionally, the rule engine microservice is configured to publish a third message to the message middleware, where a subject of the third message is a third subject, and a load of the third message includes the second warning information and a storage address of the image;
the message middleware is configured to send a load of the third message to the service module subscribed to the third topic;
and the service module is used for acquiring the image according to the storage address of the image and determining the image and the second alarm information as an alarm record.
Optionally, the service module is further configured to:
acquiring a plurality of historical alarm records;
and statistically displaying the plurality of historical alarm records in an electronic map.
Optionally, the camera attribute information includes one or more of a camera name, a camera position, and a jurisdiction to which the camera belongs;
the parcel attribute information comprises one or more of a parcel name and a parcel property;
the alarm attribute information comprises one or more of an alarm name, an alarm type and an alarm level.
Optionally, the system further comprises a message push microservice;
the service module is used for setting the processing state of the second alarm information as unfinished;
the message pushing micro-service is used for sending the work order to a terminal used by a person handling the violation;
and the service module is used for setting the processing state of the second alarm information to be finished under the condition of receiving a processing finishing instruction aiming at the work order.
In a second aspect, a computer device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when executed by the processor, the computer program implements the operations performed by the respective modules in the above alarm system.
In a third aspect, a computer-readable storage medium is provided, which stores a computer program that, when executed by a processor, implements the operations performed by the respective modules in the above-described alert system.
In a fourth aspect, a computer program product containing instructions is provided, which when run on a computer, causes the computer to perform the operations performed by the various modules in the alert system described above.
It can be understood that, for the beneficial effects of the second aspect, the third aspect and the fourth aspect, reference may be made to the relevant description in the first aspect, and details are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an alarm system according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of another alarm system provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a Rete network provided in an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating an operation process of a rule engine microservice provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of an interface displaying a result of a statistical analysis according to an embodiment of the present application;
FIG. 6 is a diagram illustrating an operation of a rights management microservice according to an embodiment of the present application;
FIG. 7 is a schematic diagram of an operating process of an alarm system according to an embodiment of the present application;
FIG. 8 is a flowchart illustrating an alarm system according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Reference numerals are as follows:
11: acquisition module, 12: analysis module, 13: micro-service module, 131: data association microservice, 132: rules engine microservices, 133: data collection microservice, 134: message push microservice, 135: rights management microservice, 14: service module, 15: message transmission module, 16: message middleware, 17: database, 18: and (5) a file module.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
It should be understood that reference to "a plurality" in this application means two or more. In the description of this application, "/" indicates an inclusive meaning, for example, A/B may indicate either A or B; "and/or" herein is only an association relationship describing an association object, and means that there may be three relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, for the convenience of clearly describing the technical solutions of the present application, the terms "first", "second", and the like are used to distinguish the same items or similar items having substantially the same functions and actions. Those skilled in the art will appreciate that the terms "first," "second," and the like do not denote any order or importance, but rather the terms "first," "second," and the like do not denote any order or importance.
Before explaining the embodiments of the present application in detail, an application scenario of the embodiments of the present application will be described.
At present, the phenomenon that land resources are subjected to illegal abuse is prominent, and various land reasonable utilization problems are increasingly shown. Improper land utilization can lead to continuous aggravation of various geological disasters. How to strengthen the management of land resources and improve the processing efficiency of violation behaviors and realize the real-time monitoring and alarm processing of violation behaviors such as various violation constructions, violation lands and the like is an urgent problem to be solved.
Therefore, the alarm system based on the micro-service is provided by the embodiment of the application, the alarm and the work order distribution aiming at the illegal behaviors can be automatically realized by processing the monitoring information acquired by the camera in real time, and the alarm system is beneficial to performing efficient supervision on the land and ensuring efficient processing of the illegal behaviors.
The following explains the alarm system provided in the embodiment of the present application in detail.
The alarm system can be a server or a server cluster consisting of a plurality of servers. The alert system may include a plurality of modules. If the alarm system is a server, all modules in the alarm system are located in the same server. If the alarm system is a server cluster composed of a plurality of servers, for any one of a plurality of modules in the alarm system, the module may be located in a single server, or the module may be located in the same server as other modules.
Fig. 1 is a schematic structural diagram of an alarm system according to an embodiment of the present application. Referring to fig. 1, the alarm system may include an acquisition module 11, an analysis module 12, a micro service module 13, and a business module 14, the micro service module 13 including a data association micro service 131 and a rules engine micro service 132.
The following explains the acquisition module 11:
the acquisition module 11 may acquire monitoring information acquired by a camera, and the monitoring information may include a camera identifier, a parcel identifier, and an image of the parcel captured by the camera.
The camera and the acquisition module 11 can communicate with each other through a wired network or a wireless network. After the camera acquires the image of the land, the image, the camera identifier and the land identifier may be uploaded to the acquisition module 11 through a wired network or a wireless network.
The camera identification is used to uniquely identify the camera. For example, the camera Identifier may be a UUID (universal Unique Identifier), a MAC (Media Access Control) address, a factory serial number, or the like of the camera, which is not limited in this embodiment of the present application.
The parcel identification is used to uniquely identify the parcel. For example, the parcel identifier may be a number of the parcel, and the like, which is not limited in this embodiment of the present application.
The camera is capable of capturing one or more plots. The number of plots that can be shot by the camera and the uploading frequency of the shot images can be set according to specific requirements.
In a possible mode, the camera can fixedly shoot a land, and the land is monitored.
In this way, the camera may upload the images taken of the land to the acquisition module 11 once every predetermined time period. And, the camera can prestore a plot mark for uniquely identifying the plot, so that the plot mark can be uploaded while uploading the image.
In another possible mode, the camera can shoot a plurality of land parcels to realize the monitoring of the land parcels.
Alternatively, the camera may be rotated by a predetermined angle each time, and an image of the land in the current direction may be captured after each rotation, and then the captured image may be uploaded to the acquisition module 11. In this case, the number of the plots that can be photographed by the camera can be obtained by rounding up the value obtained by dividing 360 degrees by the angle of the field of view of the camera.
For example, the camera rotates one revolution every five minutes for a total of six revolutions, each of 60 degrees. In this way, the camera can photograph the land in six different directions. For any of the six plots, the camera uploads the image taken of this plot to the acquisition module 11 every five minutes.
In this way, the camera can pre-store the corresponding relationship between the rotation angle and the parcel identification. In this correspondence, the land mark corresponding to any one rotation angle is the mark of the land shot by the camera at that rotation angle. Therefore, the camera can upload the plot identification corresponding to the current rotation angle of the camera in the corresponding relation while uploading the image.
It should be noted that the monitoring information uploaded to the acquisition module 11 by the camera may include not only the camera identifier, the plot identifier and the image captured on the plot, but also other information such as the image acquisition time.
After acquiring the monitoring information acquired by the camera, the acquisition module 11 may send the monitoring information to the analysis module 12, so that the analysis module 12 may process the monitoring information.
The analysis module 12 is explained below:
the analysis module 12 may perform target recognition on the image to obtain an identifier of an alarm target included in the image.
The alarm target is a target which does not meet the use requirement of the land parcel. The identity of the alarm target may be the name of the alarm target, etc.
An alert target that does not meet the plot use requirements refers to a target that should not occur in the event that land is being used properly. In other words, if the warning target appears, it indicates that there is a high possibility that an illegal action (illegal construction, illegal land, or the like) that does not meet the use requirement of the parcel is present. For example, for land or protected areas and other land areas which cannot be built, the warning targets which do not meet the use requirements of the land areas can comprise engineering vehicles, soil piles, buildings and the like.
In particular, the analysis module 12 may input the image into a target recognition model, and output, by the target recognition model, an identification of the alert object contained in the image.
After the analysis module 12 identifies the target of the image, if the warning target identifier is obtained, it indicates that the image includes a warning target; and if the warning target identification is not obtained, indicating that the warning target is not contained in the image. That is, after the analysis module 12 inputs the image into the target recognition model, if the target recognition model outputs the warning target identifier, it indicates that the image includes the warning target; and if the target recognition model does not output the alarm target identification, indicating that the image does not contain the alarm target.
The target recognition model is used for recognizing targets contained in the image and not meeting the use requirement of the land parcel. The target recognition model may be obtained by training a neural network model using a plurality of training samples.
The plurality of training samples may be preset. The input data in each training sample in the plurality of training samples is an image containing an alarm target, the sample in each training sample is marked as an alarm target identifier, and the alarm target identifier in each training sample is used for identifying the alarm target contained in the corresponding image.
The neural network model may include a plurality of network layers including an input layer, a plurality of hidden layers, and an output layer. The input layer is responsible for receiving input data; the output layer is responsible for outputting the processed data; the plurality of hidden layers are positioned between the input layer and the output layer and are responsible for processing data, and the plurality of hidden layers are invisible to the outside. For example, the neural network model may be a deep neural network or the like, and may be a convolutional neural network or the like in the deep neural network.
When a plurality of training samples are used for training the neural network model, for each training sample in the plurality of training samples, input data in the training sample can be input into the neural network model to obtain output data; determining a loss value between the output data and a sample marker in the training sample by a loss function; and adjusting parameters in the neural network model according to the loss value. After parameters in the neural network model are adjusted by using each training sample in the plurality of training samples, the neural network model with the adjusted parameters is the target recognition model.
The operation of adjusting the parameters in the neural network model according to the loss values may refer to related technologies, which are not described in detail in this application.
For example, by formula
Figure BDA0002737743270000081
To adjust any one of the parameters in the neural network model. Wherein,
Figure BDA0002737743270000082
is the adjusted parameter. w is a parameter before adjustment. α is a learning rate, α may be preset, for example, α may be 0.001, 0.000001, and the like, which is not limited in this embodiment of the application. dw is the partial derivative of the loss function with respect to w, which can be found from the loss value.
Further, in one case, after the analysis module 12 obtains the monitoring information, it may first determine whether the parcel identified by the parcel identifier in the monitoring information is not constructable. If the analysis module 12 determines that the plot cannot be constructed, then performing target identification on the image to judge whether the image contains an alarm target; if the analysis module 12 determines that the plot can be constructed, the operation can be directly ended.
In another case, after the analysis module 12 acquires the monitoring information, the analysis module 12 may first perform target identification on the image, and if it is determined that the image includes the warning target, the analysis module 12 then determines whether the parcel identified by the parcel identifier in the monitoring information cannot be constructed. If the analysis module 12 determines that the plot cannot be constructed, the subsequent modules can continue to process the plot; if the analysis module 12 determines that the plot is constructable, the operation may be ended directly.
The analysis module 12 may obtain the property of the land parcel corresponding to the land parcel identifier when determining whether the land parcel identified by the land parcel identifier in the monitoring information is not constructable, and determine whether the land parcel identified by the land parcel identifier is constructable or not constructable according to the property of the land parcel corresponding to the land parcel identifier.
The properties of the land can be divided into constructable and non-constructable land, and the non-constructable land can be further divided into cultivated land, protected areas and the like. An illegal act of construction in a cultivated land can be called illegal construction, and an illegal act of construction in a protected area can be called illegal land.
Optionally, referring to fig. 2, the alarm system may further comprise a database 17. The analysis module 12 may retrieve the property of the parcel corresponding to the parcel identification from the database 17.
The database 17 may be a PostgreSQL, mySQL, or other database, which is not limited in this embodiment. The database 17 may store therein a camera attribute table, a parcel attribute table, and an alarm attribute table. The camera attribute table may include configuration data about the camera, such as camera identification and its corresponding camera attribute information. The parcel attribute table may include configuration data about the parcel, such as a parcel identifier and its corresponding parcel attribute information, which may include parcel properties. The alarm attribute table may include configuration data about the alarm target, such as an alarm target identifier and its corresponding alarm attribute information. The analysis module 12 may obtain the property of the parcel corresponding to the parcel identification from the parcel attribute table in the database 17.
After acquiring the monitoring information and the identifier of the alarm target, the analysis module 12 may send the monitoring information and the identifier of the alarm target to the data-related microservice 131 in the microservice module 13, so that the data-related microservice 131 continues to process the monitoring information and the identifier of the alarm target.
In one possible scenario, referring to FIG. 2, the alarm system may further include a message transmission module 15, and the analysis module 12 may send the monitoring information and the identity of the alarm target to the data correlation microservice 131 through the message transmission module 15.
The following explains the message transmission module 15:
the message transfer module 15 communicates based on a publish-subscribe (Pub/Sub) mode. The message transmitted in the publish-subscribe mode includes a Topic (Topic) and a payload (payload). The messages published by the publishers may include topics and loads. After a subscriber subscribes to a topic, the subscriber receives the message load of the topic. The format of the message transmitted in the publish-subscribe mode may be a JSON (JavaScript Object Notation) format or the like.
Message middleware may be included in the message transfer module 15. The message middleware can receive a message issued by a certain module, wherein the message comprises a theme and a load. The message middleware may send the load of the message to other modules subscribing to the topic.
For example, the Message transmission module 15 may be an EMQ X server, and the EMQ X server may include MQTT (Message Queuing Telemetry Transport) Message middleware, which is a lightweight Message component.
Data association microservice 131 may subscribe to a first topic in message transfer module 15 in advance. In this case, the analysis module 12 may publish a first message to the message transmission module 15, the subject of the first message being a first subject, the payload of the first message comprising the camera identification, the parcel identification and the identification of the alert target. The message transport module 15 may send the payload of the first message to the data-associated microservice 131 that subscribes to the first topic.
It should be noted that the load of the first message may include not only the camera identifier, the parcel identifier, and the identifier of the warning target, but also encoded data obtained by encoding the image in the monitoring information. Of course, the load of the first message may also include other information such as the image capturing time in the monitoring information.
For example, the analysis module 12 may encode the image in the monitoring information (including but not limited to Base64 encoding, etc.) to obtain encoded data, and then carry the encoded data in the payload of the first message to the message transmission module 15.
Further, before the message transmission module 15 sends the load of the first message to the data-associated microservice 131 subscribed to the first topic, camera authentication may be performed. The message transmission module 15 may send the load of the first message to the data-associated microservice 131 subscribed to the first topic if the camera authentication is successful; and in the case of failure of camera authentication, directly ending the operation.
Specifically, the message transmission module 15 may determine that the camera authentication is successful in a case that the camera identifier in the load of the first message is the same as the specified camera identifier; in case the camera identification in the payload of the first message is different from the specified camera identification, it is determined that the camera authentication has failed.
The specified camera identification may be preset. The designated camera identification is used to identify cameras that are legitimate. The message transmission module 15 may obtain the specified camera identification from the database 17, for example, may obtain the camera identification in the camera attribute table in the database 17 as the specified camera identification.
When the camera identification in the load of the first message is the same as the specified camera identification, the camera identified by the camera identification is legal. At this point, the message transport module 15 may determine that the first message is reliable and may send the payload of the first message to the data-associated microservices 131 subscribing to the first topic.
Before explaining each micro service in the micro service module 13, a registration process of the micro service in the micro service module 13 is explained:
alternatively, eureka (registry) can be used for microservice registration, as follows:
1. the Eureka service starts.
2. When the micro service in the Eureka client (in the embodiment of the present application, the micro service module 13) is started, information is registered with the Eureka service according to the configured Eureka service address. The Eureka service stores information of the micro service in a service registration list.
3. And monitoring the running condition of the micro-service by adopting a heartbeat mechanism, and canceling the micro-service by the Eureka service when the heartbeat is over time. For example, the Eureka client sends a heartbeat request to the Eureka service every 30 seconds, proving that the microservice is normal. And if the heartbeat request sent by the Eureka client is not received by the Eureka service for 60 seconds, the micro-service is cancelled.
4. When the micro-service is called, the Eureka client acquires service registration information and initiates calling. Alternatively, the Eureka client may periodically acquire the service registration information in the service registration list from the Eureka service in a full or incremental manner, and cache the acquired service registration information locally. In this way, when the Eureka service cannot be accessed due to network failure, it can be ensured that the Eureka client can still obtain the service registration information from the cache.
5. When the micro-service is offline, the Eureka client sends a cancellation request to the Eureka service, which deletes the instance of the micro-service from the service registration list.
Of course, other manners besides the above manners may also be adopted for performing microservice registration, and this is not limited in this embodiment of the present application.
The following explains data association microservice 131:
the data association microservice 131 may obtain the first alert information. The first warning information may include camera attribute information corresponding to the camera identifier, parcel attribute information corresponding to the parcel identifier, and warning attribute information corresponding to the identifier of the warning target.
The camera attribute information may include one or more of a camera name, a camera location (including but not limited to latitude and longitude, etc.), a jurisdiction (including but not limited to a city, county, town, village, etc.) to which the camera belongs, and the like. The parcel attribute information may include one or more of a parcel name, parcel nature, and the like. The alarm attribute information may include one or more of an alarm name, an alarm type, an alarm level, and the like. Optionally, the alert type may be an alert target identification, and the alert level may include alert, secondary, important, urgent, and the like.
The data association microservice 131 may obtain camera attribute information corresponding to the camera identifier from a camera attribute table in the database 17, obtain parcel attribute information corresponding to the parcel identifier from a parcel attribute table in the database 17, and obtain alarm attribute information corresponding to the identifier of the alarm target from an alarm attribute table in the database 17.
Further, if the load of the first message includes encoded data obtained by encoding the image in the monitoring information, the data-related microserver 131 may decode the encoded data to obtain the image, and then store the image to obtain the storage address of the image.
Optionally, referring to fig. 2, the alert system may also include a file module 18. The data association microservice 131 can store the image to the file module 18, resulting in the address where the image is stored in the file module 18. The File module 18 may be a FastDFS (Distributed File System) or the like.
It should be noted that the first warning information may include not only the camera attribute information, the parcel attribute information, and the warning attribute information, but also other information besides the image in the monitoring information, such as the camera identifier, the parcel identifier, the image capturing time, and the like.
After the data association microservice 131 acquires the first warning information and the storage address of the image, the first warning information and the storage address of the image may be sent to the rule engine microservice 132, so that the rule engine microservice 132 continues to process the first warning information and the storage address of the image.
Also, referring to fig. 2, a data collection microservice 133 may also be included in the microservice module 13. The data association microservice 131 may send the first alert information and the storage address of the image to the data collection microservice 133 for storage by the data collection microservice 133. The data collection microservice 133 can implement persistent storage of business data (i.e., the first alert message and the storage address of the image) to facilitate later big data statistics. Alternatively, the data collection microservice 133 may save the business data to a business table in the database 17.
In one possible scenario, referring to FIG. 2, the alert system may further include message middleware 16, and the data association microservice 131 may send the first alert information and the storage address of the image to the rules engine microservice 132 and the data collection microservice 133 via the message middleware 16.
The following explains the message middleware 16:
the message middleware 16 communicates based on a publish-subscribe pattern. For example, the message middleware 16 may be Kafka message middleware or the like. The Kafka message middleware is a message component with higher performance and has the advantages of high throughput, load balance, dynamic capacity expansion and the like.
Both the rules engine microservice 132 and the data collection microservice 133 may subscribe to the second topic in the messaging middleware 16 in advance. In this case, the data correlation microservice 131 can publish a second message to the message middleware 16, the subject of the second message being a second subject, the payload of the second message including the first alert information and the storage address of the image. The message middleware 16 may send the payload of the second message to the rules engine microservice 132 and the data collection microservice 133 that subscribe to the second topic.
In the embodiment of the present application, the message transmission module 15 and the message middleware 16 may be used to forward data, so that modules may be decoupled from each other, thereby reducing the complexity of the whole system and realizing a fast response when a peak request is made.
The following explains the rules engine microservices 132:
the rules engine microserver 132 may treat the first alarm information as the second alarm information if the first alarm information satisfies the alarm condition.
After obtaining the first alarm information, the rules engine microserver 132 may filter the first alarm information according to the alarm condition. The screened first alarm information (namely, the first alarm information meeting the alarm condition) can be used as the second alarm information and continue to be subjected to subsequent processing, and the screened first alarm information (namely, the first alarm information not meeting the alarm condition) is not subjected to subsequent processing.
The alarm conditions may be preset and may be stored in a rule base. After the rule engine microserver 132 obtains the first alarm information, the alarm condition may be read from the rule base, and then the first alarm information may be screened according to the alarm condition.
In one possible implementation, the process of filtering the first warning information by the rule engine microserver 132 may be implemented by a Rete network. The Rete network includes a plurality of rules (rule) therein, each rule including a condition and a conclusion, the corresponding conclusion being activated when the condition is satisfied by a fact.
In the embodiment of the application, a Rete network can be established according to the preset alarm condition, and then the first alarm information is screened through the Rete network. The number of the alarm conditions is the same as the number of the rules in the Rete network, and when the first alarm information meets a certain alarm condition, the first alarm information can be used as the second alarm information. At this time, the condition of each rule in the plurality of rules in the Rete network is different, but the rules are all alarm conditions. The conclusion of each rule in the plurality of rules in the Rete network is the same, and the input first alarm information is used as second alarm information.
As an example, referring to fig. 3, the rete network is divided into an alpha network and a beta network.
The alpha network is used to filter the fact (in this embodiment, referred to as the first alarm information) input into the Rete network, find the set that meets each mode in the rule, and generate an alpha memory (i.e., the set of facts that satisfy this mode). The alpha network comprises a root node (root), a type node (type node), an alpha node and an alpha memory. The root node is a virtual node and is an entrance into the Rete network. The type node stores therein various types of facts, each fact entering the alpha node from the corresponding type node. Various attributes of the types are stored in the alpha nodes, and each fact enters the alpha memory from the corresponding alpha node according to the attributes of the fact.
There are two types of nodes in a beta network, namely a join node (join node) and a beta memory. The connection node comprises two input ports, and the two input ports respectively input two fact sets which need to be matched. The connecting node may merge the fact sets input from the two input ports and transmit to the next node. The beta memory is used for storing the fact set obtained by the connecting node.
In an alternative embodiment, as shown in fig. 3, the root node of the Rete network may include three types of nodes, namely "alarm level", "alarm type", and "property of parcel". The "alarm level" may include four alpha nodes of "prompt", "secondary", "important" and "emergency", the "alarm type" may include three alpha nodes of "engineering vehicle", "building" and "sand heap", and the "land property" may include two alpha nodes of "cultivated land" and "protected area".
The Rete network includes four rules. The first rule conditions that the alarm level in the first alarm information is prompt and the property of the land is cultivated land, and the conclusion is that the first alarm information is used as the second alarm information. The second rule is conditioned by the fact that the alarm level in the first alarm information is important, the alarm type is a building, and the property of the land is arable land, and the conclusion is that the first alarm information is taken as the second alarm information. The third rule is conditioned on the fact that the alarm level in the first alarm information is urgent and the property of the geographical area is a protected area, and the conclusion is that the first alarm information is taken as the second alarm information. The fourth rule has the conditions that the alarm type in the first alarm information is an engineering vehicle and the property of the land is a protection area, and the conclusion is that the first alarm information is used as the second alarm information.
In some embodiments, the alarm condition may be configured by a user, who may configure the alarm condition on a visual user interface. In this case, the operation of the rules engine microservice 132 may be as shown in FIG. 4.
Referring to fig. 4, a user logs in the alarm system first, and then configures the alarm condition, for example, the user may choose to configure the alarm condition according to "alarm level", "alarm type", "property of land", and so on. After the alarm system obtains the configured alarm condition, the configured alarm condition is written into a rule base in the rule engine microservice 132. If the rule engine microserver 132 obtains the first alarm information, the alarm condition is read from the rule base, and the first alarm information is screened according to the read alarm condition.
After the rule engine microserver 132 obtains the second warning message, the second warning message and the storage address of the image may be sent to the business module 14, so that the business module 14 may continue to process the second warning message. Also, the rules engine microserver 132 may also save the second alert information and the storage address of the image to a business table in the database 17.
The rules engine microserver 132 may send the second alert information and the memory address of the image to the business module 14 and database 17, possibly through the messaging middleware 16.
Specifically, both the business module 14 and the database 17 may subscribe to the third topic in the message middleware 16 in advance. In this case, the rules engine microservice 132 may publish a third message to the message middleware 16, the third message having a third subject, the third message having a payload that includes the second alert information and the storage address of the image. The message middleware 16 may send the payload of the third message to the service module 14 and the database 17 subscribed to the third topic.
The service module 14 is explained below:
the service module 14 has the functions of work order management, alarm management, statistical analysis, service configuration and the like.
The work order management function of the service module 14 means that the service module 14 can generate a work order according to the second warning information, and the work order is used for instructing to process the violation behavior which does not meet the use requirement of the parcel.
After the service module 14 obtains the second warning information, the staff attribute table may be queried to determine staff capable of handling the violation behavior reflected in the second warning information, and then a work order is generated according to the work order template. The work order may include violation information (including but not limited to parcel name, alarm type, etc.), and handler information (including but not limited to handling department, handler name, etc.). For example, the work order may be the work order shown in table 1 below.
TABLE 1
Name of land parcel Type of alarm Processing department Name of processing person
Cultivation of land 1 Construction of buildings A team Zhang San
In the embodiments of the present application, the work order is described only by taking the above table 1 as an example, and the above table 1 does not limit the embodiments of the present application.
The personnel attribute table may include violation information and corresponding handler information. Alternatively, for different violations occurring in different places, the handling personnel under the corresponding processing department can be responsible for handling the violations. For example, if a building appears in the farmland 1, a large team of Zhang III can be responsible for the treatment. If the engineering vehicle appears in the cultivated land 1, a large team of Li IV can be responsible for the treatment. If the engineering vehicle appears in the protection area 1, the engineering vehicle can be handled by the king of two teams.
The staff attribute table may be stored in the database 17, and after the service module 14 obtains the second warning information, the service module may obtain corresponding information of the processing staff from the staff attribute table in the database 17 according to the violation information in the second warning information, and then generate the work order according to the configured work order template. And, the business module 14 may also save the work order to a business table in the database 17.
In some embodiments, the personnel attribute table may be configurable by a user, who may configure the personnel attribute table on a visual user interface, such that management of the processing department and personnel may be achieved. Specifically, operations such as addition and deletion of processing departments, configuration of an upper-level department and a sub-department, and operations such as entry, deletion and modification of processing personnel can be realized.
Further, after the business module 14 generates the work order, the work order may be automatically issued. In particular, referring to fig. 2, the microservice module 13 may also include a message push microservice 134. The business module 14 may send the work order to the message push microservice 134, and the message push microservice 134 may send the work order to a terminal used by a person handling the violation.
In one possible approach, the work order may further include a contact address (including but not limited to a phone number, an instant messaging account number, etc.), and the message push microserver 134 may send the work order to the terminal according to the contact address.
In another possible mode, when the message push microserver 134 obtains the work order, the corresponding staff contact information may be obtained according to the processing staff information in the work order, and then the work order may be sent to the terminal according to the staff contact information.
The message push microservice 134 may send the work order to the terminal in different manners according to different obtained contact information of the person.
For example, if the contact information of the person obtained by the message push microservice 134 is a phone number, the worksheet may be sent to the terminal in a short message manner, and specifically, the sms may be sent by integrating a Software Development Kit (SDK) of tworio and calling an Application Program Interface (API).
For another example, if the contact information of the person obtained by the message push microservice 134 is an instant messaging account, the work order may be sent to the terminal in an application message push manner, and specifically, an API opened by an application developer may be called to push the application message. In this case, the terminal may integrate the SDK of the application developer, and implement one-to-one message pushing by binding a device token (device token) of the terminal with the instant messaging account.
Further, the service module 14 may also perform alarm handling tracking. Specifically, before issuing the work order, the service module 14 may set the processing status of the second alarm information as unfinished, and then send the work order to the terminal through the message push micro-service 134. Thereafter, if the service module 14 receives a processing completion instruction for the work order, the processing state of the second warning information may be set to be completed.
The process completion instruction is used to indicate that processing of the violation reflected in the work order has been completed. The processing completion instruction can be triggered by a processing person after the illegal action is processed, and the processing person can trigger the illegal action through operations such as click operation, voice operation, gesture operation and motion sensing operation.
The alarm management function of the service module 14 means that the service module 14 can obtain the image according to the storage address of the image, and then determine the image and the second alarm information as an alarm record. The service module 14 may save this alarm record to a service table in the database 17.
When the service module 14 acquires the image according to the storage address of the image, the service module may acquire the image from the file module 18 according to the storage address of the image.
The service module 14 may also query the historical alarm records in the database 17, and may specifically support the user to implement accurate or fuzzy query of the historical alarm records according to the image acquisition time, the alarm type, the alarm level, the property of the parcel, and the like.
The statistical analysis function of the service module 14 means that the service module 14 can obtain a plurality of historical alarm records, and statistically display the plurality of historical alarm records in the electronic map.
The business module 14 may statistically display the plurality of historical alarm records in the electronic map according to multiple dimensions to provide an intuitive and graphical statistical analysis result. The multiple dimensions may include, but are not limited to, a time dimension, which may include years, months, days, and a space dimension, which may include alarm levels, alarm types, parcel properties, and the like.
For example, the business module 14 may display the result of the statistical analysis of the alarm record on a visual user interface, and the visual user interface with the result of the statistical analysis may be as shown in fig. 5. In the interface, an electronic map is embedded, the camera positions and the number of the historical alarm records corresponding to each camera position can be displayed, and the number of the alarm levels can be displayed. Therefore, the technical personnel can quickly master the details of the alarm according to the interface.
The visual user interface can be displayed on a terminal, and the terminal can be a desktop computer, a notebook computer, a mobile phone or other mobile equipment. The terminal and the alarm system can communicate through a wired network or a wireless network, for example, a WebSocket connection can be established between the terminal and the alarm system for communication.
The service configuration function in the service module 14 means that the service module 14 can implement configuration of the above-mentioned camera attribute table, parcel attribute table, alarm condition, work order template, and the like. For example, the camera attribute table may be configured to implement operations such as adding, deleting, etc. of cameras, and to implement operations such as adding, deleting, modifying, and associating with cameras of the jurisdiction. The parcel attribute table may be configured to enable setting of parcel names, parcel properties, etc.
The service module 14 may be developed based on a Java programming language and a Spring Boot framework, and may also be developed based on other programming languages and frameworks, which is not limited in this embodiment of the present application.
In some embodiments, the camera attribute table, the parcel attribute table, the alarm attribute table, the work order template, and other configuration data may be stored in the database 17. Alternatively, the interaction between other modules in the alarm system than the database 17 and the database 17 may be implemented based on the Mybatis framework. The alarm conditions described above may be stored in a rule base in the rules engine microservice 132.
In some embodiments, the configuration of the camera attribute table, the parcel attribute table, the alarm condition, the work order template, and the like may be configured when the user logs in the alarm system and has a corresponding right.
In this case, referring to FIG. 2, a rights management microservice 135 may also be included in the microservice module 13. The rights management microservice 135 may include user management and role management. The user management can realize the registration, login, information modification and logout of the user. The role management can configure the operation authority, and the management of the user authority is realized by allocating different roles to the user.
Alternatively, the rights management microservice 135 may be developed based on the Apache Shiro framework, and may of course be developed based on other frameworks, which is not limited in this embodiment.
As an example, referring to FIG. 6, the rights management microservice 135 works as follows:
1. the system administrator logs in the alarm system, creates a user name, and assigns a password and a role to the user.
2. The rights management microservice 135 encrypts this password using an encryption algorithm, including but not limited to using the Sha256Hash algorithm, and stores it in a database.
3. And when the user logs in, a user name and a password are input.
4. The rights management microserver 135 encrypts the password entered by the user using the encryption algorithm to obtain encrypted data, reads the encrypted password stored in the database, and compares the two to determine whether the password is successfully verified.
5. If the password verification is successful, the rights management microserver 135 generates a token (token) for the user using JWT (Json web token) technology. The JWT technology can effectively avoid CSRF (Cross-site request for forgery) attacks, and the token itself contains all the information required for authentication, thereby greatly relieving the pressure of the rights management microserver 135.
6. When a user requests to access the API in the alarm system, the rights management microserver 135 parses the token carried in the request to obtain user information, and then obtains a role associated with the user information.
7. The rights management microservice 135 determines whether the user has API access rights based on the role; if yes, the request result is returned, and if not, the request is rejected.
In the embodiment of the application, the automatic identification, real-time warning, automatic work order issuing and warning record visualization of illegal behaviors such as illegal construction and illegal land can be realized, the working efficiency of processing personnel is improved, and the labor cost is reduced.
In addition, the alarm system in the embodiment of the application is developed based on a micro-service architecture, the micro-service architecture can decouple huge services into independent small services, the fault tolerance and the stability of the whole system can be improved, and developers are supported to develop the alarm system in parallel, so that the development period can be shortened. In the embodiment of the application, functions such as data association, data collection, rule engine, authority management and message pushing are micro-serviced and decoupled with the back-end service module, so that the whole system is more flexibly deployed.
For the sake of understanding, the overall operation of the alarm system will be described with reference to fig. 7. Referring to fig. 7, the overall operation of the alarm system is as follows:
the user logs in the warning system to configure the camera attribute table, the parcel attribute table, the warning attribute table, the work order template and the like, and the configuration data is written into the database 17. After acquiring the monitoring information acquired by the camera, the alarm system reads the configuration data from the database 17 to associate the monitoring information with the first alarm information, and then screens the first alarm information to obtain the second alarm information. Then, the alarm system reads the work order template from the database 17, and automatically generates and issues a work order through the work order template according to the second alarm information. In this process, the alarm system writes the first alarm information, the second alarm information, the work order, and the like as service data into the database 17. And the alarm system displays a plurality of historical alarm records in an electronic map in a statistical manner.
The operation process shown in fig. 7 is described in detail below with reference to fig. 8, and referring to fig. 8, the operation process may include the following steps 801 to 815.
Step 801: the acquisition module 11 acquires monitoring information acquired by the camera.
The monitoring information comprises a camera mark, a land mark and an image shot for the land.
Step 802: the analysis module 12 performs target recognition on the image in the monitoring information.
Step 803: the analysis module 12 determines whether there is a violation based on the target recognition result.
If the target identification result has the alarm target identification, determining that illegal behaviors exist; and if the target identification result does not have the warning target identification, determining that no violation behavior exists.
Step 804: if there is a violation, the analysis module 12 generates a first message and issues the first message to the message transmission module 15.
The subject of the first message is a first subject, and the load of the first message comprises an alarm target identifier, a camera identifier and a parcel identifier in the monitoring information, and encoded data obtained by encoding an image in the monitoring information.
Step 805: the message transmission module 15 performs camera authentication based on the camera identification in the payload of the first message.
If the camera authentication is successful, the message transfer module 15 sends the payload of the first message to the data-associated microservice 131 that subscribes to the first topic. And if the camera authentication fails, ending the operation.
Step 806: the data association microserver 131 obtains the first warning information from the database 17 according to the camera identifier, the parcel identifier, and the warning target identifier in the payload of the first message.
The first warning information comprises camera attribute information corresponding to the camera identifier, parcel attribute information corresponding to the parcel identifier, and warning attribute information corresponding to the warning target identifier.
Step 807: the data-associated microservice 131 decodes the encoded data in the payload of the first message to obtain the image, stores the image in the file module 18, and obtains the storage address of the image.
Step 808: data correlation microservice 131 generates a second message that is posted to messaging middleware 16.
The subject of the second message is a second subject, and the load of the second message is the first warning information and the storage address of the image.
The message middleware 16 sends the load of the second message to the data collection microservices 133 and the rules engine microservices 132 subscribed to the second topic.
Step 809: the data collection microserver 133 saves the first alert information in the payload of the second message and the storage address of the image to the database 17.
Step 810: the rule engine microserver 132 screens the first warning information in the load of the second message to obtain the second warning information. The rules engine microservice 132 generates a third message, which is published to the message middleware 16.
The subject of the third message is a third subject, and the load of the third message is the second warning information and the storage address of the image.
Step 811: the message middleware 16 sends the payload of the third message to the service module 14 subscribed to the third topic.
Step 812: the service module 14 obtains the image from the file module 18 according to the storage address of the image in the load of the third message, and stores the image and the second alarm information as an alarm record in the database 17.
Step 813: the business module 14 displays the plurality of historical alarm records in an electronic map in a statistical mode.
Step 814: the service module 14 generates a work order according to the second warning information in the load of the third message, and invokes the message push micro-service 134 to dispatch the work order.
Step 815: the business module 14 saves the work order to the database 17.
In the embodiment of the application, the alarm system micro-services functions such as data association and a rule engine and is decoupled from the back-end service module, so that the stability of the system can be improved, and the system is more flexibly deployed. The warning system based on the micro-service can process the monitoring information collected by the camera in real time, automatically realize warning and work order generation aiming at illegal behaviors, and is beneficial to performing efficient supervision of land and ensuring efficient processing of the illegal behaviors.
Fig. 9 is a schematic structural diagram of a computer device according to an embodiment of the present application. The above-mentioned alarm system may be implemented by the computer device 9. As shown in fig. 9, the computer device 9 includes: a processor 90, a memory 91 and a computer program 92 stored in the memory 91 and operable on the processor 90, the operations performed by the various modules in the alert system in the above embodiments being implemented when the computer program 92 is executed by the processor 90.
The computer device 9 may be a general purpose computer device or a special purpose computer device. In a specific implementation, the computer device 9 may be one server or may be a server cluster composed of a plurality of servers. Those skilled in the art will appreciate that fig. 9 is only an example of the computer device 9, and does not constitute a limitation to the computer device 9, and may include more or less components than those shown, or may combine some components, or different components, such as an input output device, a network access device, and the like.
The Processor 90 may be a Central Processing Unit (CPU), and the Processor 90 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field-Programmable Gate arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or any conventional processor.
The storage 91 may in some embodiments be an internal storage unit of the computer device 9, such as a hard disk or a memory of the computer device 9. The memory 91 may also be an external storage device of the computer device 9 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the computer device 9. Further, the memory 91 may also include both an internal storage unit and an external storage device of the computer device 9. The memory 91 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of a computer program. The memory 91 may also be used to temporarily store data that has been output or is to be output.
In some embodiments, a computer-readable storage medium is also provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the operations performed by the respective modules in the alarm system in the above embodiments. For example, the computer-readable storage medium may be a ROM (Read-Only Memory), a RAM (Random Access Memory), a CD-ROM (Compact Disc Read-Only Memory), a magnetic tape, a floppy disk, an optical data storage device, and the like.
It is noted that the computer-readable storage medium referred to herein may be a non-volatile storage medium, in other words, a non-transitory storage medium.
It should be understood that all or part of the steps for implementing the above embodiments may be implemented by software, hardware, firmware or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The computer instructions may be stored in the computer-readable storage medium described above.
That is, in some embodiments, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the operations performed by the various modules in the alert system in the embodiments described above.
The above description is not intended to limit the present application to the particular embodiments disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present application.

Claims (10)

1. An alarm system, characterized in that the system comprises: the system comprises an acquisition module, an analysis module, a micro-service module and a business module, wherein the micro-service module comprises data association micro-service and rule engine micro-service;
the acquisition module is used for acquiring monitoring information acquired by a camera, and the monitoring information comprises a camera identifier, a plot identifier and an image shot by the camera on the plot;
the analysis module is used for carrying out target identification on the image to obtain an identifier of an alarm target contained in the image, wherein the alarm target is a target which does not meet the use requirement of a land parcel;
the data association microservice is used for acquiring first warning information, wherein the first warning information comprises camera attribute information corresponding to the camera identifier, parcel attribute information corresponding to the parcel identifier and warning attribute information corresponding to the identifier of the warning target;
the rule engine microserver is used for taking the first alarm information as second alarm information under the condition that the first alarm information meets alarm conditions;
and the business module is used for generating a work order according to the second alarm information, and the work order is used for indicating and processing the illegal behaviors which do not meet the use requirements of the land parcel.
2. The system of claim 1, wherein the analysis module is specifically configured to:
and inputting the image into a target recognition model, and outputting the identification of the alarm target contained in the image by the target recognition model, wherein the target recognition model is used for recognizing the target contained in the image and not meeting the use requirement of the land parcel.
3. The system of claim 1, further comprising a message transfer module that communicates based on a publish-subscribe pattern;
the analysis module is used for publishing a first message to the message transmission module, wherein the subject of the first message is a first subject, and the load of the first message comprises the camera identifier, the parcel identifier and the identifier of the warning target;
the message transmission module is configured to send the load of the first message to the data-associated microservice subscribed to the first topic.
4. The system of claim 3, wherein the message transmission module is specifically configured to:
determining that the camera authentication is successful under the condition that the camera identification is the same as the specified camera identification, wherein the specified camera identification is used for identifying the camera with legality;
and under the condition that the camera authentication is successful, sending the load of the first message to the data-associated micro-service subscribed to the first theme.
5. The system of claim 3,
the analysis module is configured to encode the image to obtain encoded data, and send the encoded data to the message transmission module, where the encoded data is carried in a load of the first message;
the data-associated micro service is used for decoding the coded data to obtain the image; and storing the image to obtain a storage address of the image.
6. The system of claim 5, further comprising message middleware that communicates based on a publish-subscribe pattern;
the data association microservice is used for publishing a second message to the message middleware, the theme of the second message is a second theme, and the load of the second message comprises the first alarm information and the storage address of the image;
the message middleware is used for sending the load of the second message to the rule engine microservice which subscribes to the second theme.
7. The system of claim 6,
the rule engine microservice is used for issuing a third message to the message middleware, the subject of the third message is a third subject, and the load of the third message comprises the second alarm information and the storage address of the image;
the message middleware is used for sending the load of the third message to the business module subscribed to the third theme;
and the service module is used for acquiring the image according to the storage address of the image and determining the image and the second alarm information as an alarm record.
8. The system of claim 7, wherein the traffic module is further to:
acquiring a plurality of historical alarm records;
and carrying out statistical display on the plurality of historical alarm records in an electronic map.
9. The system of any one of claims 1-8,
the camera attribute information comprises one or more of camera name, camera position and jurisdiction area to which the camera belongs;
the parcel attribute information comprises one or more of a parcel name and a parcel property;
the alarm attribute information comprises one or more of an alarm name, an alarm type and an alarm level.
10. The system of any of claims 1-8, wherein the system further comprises a message push microservice;
the service module is used for setting the processing state of the second alarm information as unfinished;
the message pushing micro service is used for sending the work order to a terminal used by a person handling the violation;
and the service module is used for setting the processing state of the second alarm information as finished under the condition of receiving a processing finishing instruction aiming at the work order.
CN202011139233.1A 2020-10-22 2020-10-22 Alarm system Active CN113141485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011139233.1A CN113141485B (en) 2020-10-22 2020-10-22 Alarm system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011139233.1A CN113141485B (en) 2020-10-22 2020-10-22 Alarm system

Publications (2)

Publication Number Publication Date
CN113141485A CN113141485A (en) 2021-07-20
CN113141485B true CN113141485B (en) 2022-12-20

Family

ID=76809757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011139233.1A Active CN113141485B (en) 2020-10-22 2020-10-22 Alarm system

Country Status (1)

Country Link
CN (1) CN113141485B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113377626B (en) * 2021-08-11 2021-11-23 上海领健信息技术有限公司 Visual unified alarm method, device, equipment and medium based on service tree
CN114244844B (en) * 2021-11-23 2023-10-24 深圳市优必选科技股份有限公司 Multimedia data transmission method, terminal equipment and storage medium
CN116957883B (en) * 2023-07-25 2024-04-05 南京智绘星图信息科技有限公司 Construction land use control method based on data analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491351A (en) * 2013-09-29 2014-01-01 东南大学 Intelligent video monitoring method for illegal buildings
CN103546726A (en) * 2013-10-28 2014-01-29 东南大学 Method for automatically discovering illegal land use
CN108965808A (en) * 2018-07-20 2018-12-07 江苏省测绘工程院 A kind of fixed point imaging monitoring method
CN111259840A (en) * 2020-01-21 2020-06-09 中南民族大学 Land occupation early warning method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10296990B2 (en) * 2013-06-21 2019-05-21 International Business Machines Corporation Verifying compliance of a land parcel to an approved usage

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491351A (en) * 2013-09-29 2014-01-01 东南大学 Intelligent video monitoring method for illegal buildings
CN103546726A (en) * 2013-10-28 2014-01-29 东南大学 Method for automatically discovering illegal land use
CN108965808A (en) * 2018-07-20 2018-12-07 江苏省测绘工程院 A kind of fixed point imaging monitoring method
CN111259840A (en) * 2020-01-21 2020-06-09 中南民族大学 Land occupation early warning method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113141485A (en) 2021-07-20

Similar Documents

Publication Publication Date Title
CN113141485B (en) Alarm system
US11848927B1 (en) Using social graph for account recovery
US20160248798A1 (en) Method and apparatus for automating threat model generation and pattern identification
CN111369242B (en) Method for recovering blockchain assets through intelligent contracts, wallet and blockchain nodes
CN111149122B (en) Block chain-based security management method, related device and storage medium
US8914864B1 (en) Temporary virtual identities in a social networking system
US20210089673A1 (en) Information processing apparatus, information processing method, and program
CN110519280B (en) Crawler identification method and device, computer equipment and storage medium
US20160344656A1 (en) Communication exchanges and methods of use thereof
US20220239668A1 (en) Blockchain-based message processing method and apparatus, device, and storage medium
CN112822267B (en) Data processing method and device based on block chain
CN110808839B (en) Processing method, device, equipment and medium for block chain abnormal data
CN110838067A (en) Real estate transaction data processing method, device, server and storage medium
CN112581129A (en) Block chain transaction data management method and device, computer equipment and storage medium
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN105988998B (en) Relational network construction method and device
CN110191097A (en) Detection method, system, equipment and the storage medium of login page safety
CN116451279A (en) Data processing method, device, equipment and readable storage medium
WO2020208429A1 (en) System and method to find origin and to prevent spread of false information on an information sharing systems
CN114567678B (en) Resource calling method and device for cloud security service and electronic equipment
CN115840965A (en) Information security guarantee model training method and system
CN115455485A (en) Database access method, device, client and storage medium
Murali et al. Crowdsourcing for disaster relief: A multi-platform model
CN114006701A (en) Method, device and equipment for sharing name list and storage medium
Vidya et al. Adaptation trust based protocol for IoT using smartphones in social media: Travel map guide

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant