CN115420147A - Method, system, storage medium and electronic device for dynamic scheduling of devices - Google Patents

Method, system, storage medium and electronic device for dynamic scheduling of devices Download PDF

Info

Publication number
CN115420147A
CN115420147A CN202210855132.7A CN202210855132A CN115420147A CN 115420147 A CN115420147 A CN 115420147A CN 202210855132 A CN202210855132 A CN 202210855132A CN 115420147 A CN115420147 A CN 115420147A
Authority
CN
China
Prior art keywords
target object
target
data
scheduling
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210855132.7A
Other languages
Chinese (zh)
Inventor
邓建鑫
蒲桃园
祁麟
王柯力
陈磊
白茹月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jiuzhou Prevention And Control Technology Co ltd
Original Assignee
Sichuan Jiuzhou Prevention And Control Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuzhou Prevention And Control Technology Co ltd filed Critical Sichuan Jiuzhou Prevention And Control Technology Co ltd
Priority to CN202210855132.7A priority Critical patent/CN115420147A/en
Publication of CN115420147A publication Critical patent/CN115420147A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41HARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
    • F41H11/00Defence installations; Defence devices
    • F41H11/02Anti-aircraft or anti-guided missile or anti-torpedo defence installations or systems
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/50Systems of measurement based on relative movement of target
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/86Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to the field of equipment control, in particular to a method, a system, a storage medium and electronic equipment for dynamically scheduling equipment, and solves the problem of resource waste caused by the fact that detection equipment and/or counter-braking equipment cannot be flexibly configured in the prior art. The method comprises the following steps: detecting a target object entering a monitoring area through first detection equipment, and acquiring basic data of the target object; based on the azimuth information in the basic data, dispatching detection equipment to move to a target area, and detecting the target object through the detection equipment; acquiring target data of the target object; determining a threat level of the target object based on the basic data and the target data; and under the condition that the threat degree meets a preset condition, scheduling the counter-braking equipment to move to the target area.

Description

Method, system, storage medium and electronic device for dynamic scheduling of devices
Technical Field
The present application relates to the field of device control technologies, and in particular, to a method, a system, a storage medium, and an electronic device for dynamically scheduling a device.
Background
Generally, a plurality of spying devices and countering devices are deployed in a monitoring area for spying on and/or countering objects entering the monitoring area. The radar is used as a basic detection device of a monitoring area and is used for carrying out primary detection on a target. However, the radar cannot accurately judge the target attribute, so that a plurality of detection devices other than the radar are combined to fuse the target so as to obtain more accurate target attribute, and meanwhile, a countering device is used to counteract the threatened target. However, currently, the detection equipment and the counter-control equipment are configured in a fixed place, and when no target enters a monitoring area, most of the equipment can only be in an idle state, so that the equipment is difficult to be fully utilized, and huge waste is generated on resources.
Disclosure of Invention
In view of the above problems, the present application provides a method, a system, a storage medium, and an electronic device for dynamically scheduling a device, which improve the utilization rate of the device and reduce the cost by flexibly scheduling a detection device and a counter device.
In a first aspect, the present application provides a method for dynamically scheduling a device, where the method includes:
detecting a target object entering a monitoring area through first detection equipment to obtain basic data of the target object;
scheduling a second detection device to move to a target area based on the azimuth information in the basic data, and detecting the target object through the second detection device;
acquiring target data of the target object;
determining a threat level of the target object based on the basic data and the target data;
and under the condition that the threat degree meets a preset condition, scheduling the countering equipment to move to the target area.
In some embodiments, said scheduling the second probe device to move to the target area of the target object based on the orientation information in the base data comprises:
determining a target area of the target object based on the orientation information;
judging whether a schedulable second detection device exists or not;
in the presence of the schedulable second probe device, determining a course of travel along which the second probe device moves based on the target area;
and scheduling the second detection equipment to move to the target area of the target object based on the running route.
In some embodiments, the scheduling a movement of the countering device to the target area of the target object comprises:
determining a target area of the target object based on the orientation information;
judging whether a reversible device capable of being dispatched exists or not;
determining a running route of movement of the countering device based on the target area in the presence of the schedulable countering device;
scheduling the countering device to move to a target area of the target object based on the travel route.
In some embodiments, the method further comprises:
and under the condition that the schedulable second detection device and/or the countercheck device does not exist, controlling an alarm module to alarm.
In some embodiments, the detecting by the second detecting device to obtain the target data of the target object includes:
determining a detection orientation of the second detection device based on the orientation information of the target object; wherein the second detection device comprises at least one of a photo detection device and/or a radio detection device;
and acquiring target data detected by the detection equipment on the target object.
In some embodiments, said determining a threat level of said target object based on said base data and said target data comprises:
determining an attribute of the target object based on the base data and the target data;
based on the attributes, a threat level of the target object is determined.
In some embodiments, the method further comprises:
matching a countering strategy of the countering device based on the attribute of the target object; wherein the attribute is determined based on the base data and target data;
and countermaking the target object based on the countermaking strategy.
In a second aspect, the present application provides a system for dynamic scheduling of devices, the system comprising:
the detection module is used for detecting a target object entering a monitoring area through first detection equipment and acquiring basic data of the target object; acquiring target data of the target object through the second detection equipment;
the scheduling module is used for scheduling the second detection equipment to move to a target area based on the azimuth information in the basic data; and scheduling a countering device to move to the target area;
and the data processing module is used for determining the threat degree of the target object based on the basic data and the target data.
In a third aspect, the present application provides a storage medium storing a computer program which, when executed by one or more processors, is configured to implement the method for dynamic scheduling of devices as described above.
In a fourth aspect, the present application provides an electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, performs the method for dynamic scheduling of devices as described above.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
according to the method, the system, the storage medium and the electronic device for dynamically scheduling the equipment, the first detection equipment is used for detecting the target object entering a monitoring area, and basic data of the target object is obtained; scheduling a second detection device to move to a target area based on the azimuth information in the basic data to acquire target data of the target object; and scheduling the reverse device to move to the target area based on the basic data and the target data. By the method, the detection equipment and the counter-braking equipment can be scheduled as required, the flexibility of the equipment is improved, the cost for configuring the equipment is reduced, the utilization rate of the equipment is improved, and waste caused by resource idling is avoided.
Drawings
The present application will be described in more detail hereinafter on the basis of embodiments and with reference to the accompanying drawings.
Fig. 1 is a schematic application scenario diagram of a system for dynamically scheduling devices according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a method for dynamically scheduling a device according to an embodiment of the present application;
fig. 3 is a schematic block diagram of a device dynamic scheduling system according to an embodiment of the present application.
In the drawings, like parts are designated with like reference numerals, and the drawings are not drawn to scale.
Detailed Description
The following detailed description will be provided with reference to the accompanying drawings and embodiments, so that how to apply the technical means to solve the technical problems and achieve the corresponding technical effects can be fully understood and implemented. The embodiments and various features in the embodiments of the present application can be combined with each other on the premise of no conflict, and the formed technical solutions are all within the protection scope of the present application.
Example one
An application scenario of a system for dynamically scheduling devices is provided in an embodiment of the present application, and fig. 1 is a schematic diagram of an application scenario 100 of a system for dynamically scheduling devices provided in an embodiment of the present application. As shown in fig. 1, an application scenario 100 of a system for device dynamic scheduling may include a processor 110, a network 120, a first probe device 130, a second probe device and/or counter device 140, a movable apparatus 150, an object 160, and a user terminal 170.
In some embodiments, the processor 110 may process information and/or data related to the first probe device 130, the second probe device and/or the countering device 140 and the user terminal 170 to perform one or more functions described herein. In some embodiments, the processor 110 may obtain data of the first probe device 130, the second probe device and/or the counter device 140 and the user terminal 170 through the network 120. In some embodiments, processor 110 may include one or more processing engines (e.g., single core processing engines or multi-core processing engines). Merely by way of example, the processor 110 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), an application specific instruction set processor (ASIP), an image processing unit (GPU), a physical arithmetic processing unit (PPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a micro-controller unit, a Reduced Instruction Set Computer (RISC), a microprocessor, or the like, or any combination thereof.
In some embodiments, processor 110 may include a processing device. The processor 110 may be a single server or a group of servers. The set of servers may be centralized or distributed (e.g., the processor 110 may be a distributed system). In some embodiments, the processor 110 may be local or remote. In some embodiments, the processor 110 may be implemented on a cloud platform. By way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, an internal cloud, a multi-tiered cloud, and the like, or any combination thereof. In some embodiments, the processor 110 may be a control center of a device dynamic scheduling system, configured to execute a method corresponding to the system.
Network 120 may facilitate the exchange of information and/or data. In some embodiments, one or more components (e.g., the processor 110, the first probe device 130, the second probe device and/or the countering device 140, the user terminal 170, etc.) in an application scenario of the device dynamic scheduling system may receive and/or transmit information and/or data via the network 120. In some embodiments, the network 120 may be any form of wired or wireless network, or any combination thereof. By way of example only, network 120 may include a cable network, a wired network, a fiber optic network, a telecommunications network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Public Switched Telephone Network (PSTN), a bluetooth network, a zigbee network, a Near Field Communication (NFC) network, the like, or any combination thereof. In some embodiments, network 120 may include one or more network access points.
The first detecting device 130 refers to a detecting device for acquiring basic data of the object 160. In an embodiment of the application, the first detection device is a detection device fixed at a specific position. The first detection device 130 may be any type of radar device that uses radio detection to discover the spatial location, type of profile of the target entering the monitored area.
The second detection device and/or the countering device 140 is a device that can be mobile scheduled according to the object location. The second detection device may be a device for detection by radio and/or by photo-electricity for obtaining target data of the target object. For example, the second detection device may acquire data information such as frequency, specific type, and the like of the target object. The countering device may be a device for countering a highly threatening target. In some embodiments, the countering device may act to counter the target object by navigation spoofing, laser scanning, signal interference, etc., disrupting the action of the target object.
The mobile device 150 may be a mobile device, such as an autonomous vehicle. In some embodiments, the mobile device 150 may obtain the planned route via the network 120, and move to dispatch to the target area with the second probe device and/or the countering device 140.
The object 160 refers to an object to be detected entering the monitoring area, and the object 160 may be a living body with vital signs (e.g., a bird) or a movable and/or flyable non-living body (e.g., a drone, a balloon, etc.).
In some embodiments, user terminal 170 may refer to one or more terminal devices or software used by a user. In some embodiments, the user terminal 170 refers to a portable device having input and/or output functions. For example, the user terminal 140 may include a smart phone 170-1, a laptop 170-2, a desktop 170-3, a smart mobile device, and the like, or any combination thereof. In some embodiments, the smart mobile device may include a smart phone, a Personal Digital Assistant (PDA), a gaming device, a navigation device, a hand-held terminal (POS), and the like, or any combination thereof. In some embodiments, the user may input instructions through the user terminal to control the second detection device and/or the counter device 140. For example, the user may enter a counteraction policy via the cell phone 170-1. In some embodiments, the user terminal may also obtain data and/or information of other components (e.g., the processor 110, the first probe device 130, the second probe device, and/or the countering device 140) over the network 120.
Example two
Fig. 2 is a schematic flow diagram of a method for dynamically scheduling devices according to an embodiment of the present disclosure. In some embodiments, the method of dynamic scheduling of the device may be performed by the processor 110. As shown in fig. 2, the method includes:
step S210, detecting a target entering a monitoring area by a first detection device, and acquiring basic data of the target.
A surveillance zone refers to an area that requires advanced regulations, such as a military surveillance zone or other security-related area. In some embodiments, the first detection device may acquire basic data of the object within the monitored area. The primary data may include an approximate category of the target object, orientation information, and the like.
Step S220, based on the azimuth information in the basic data, a second detection device is scheduled to move to a target area, and the target object is detected through the second detection device.
In some embodiments, the orientation information of the target object may include height information and coordinate information of the target object. In some embodiments, the coordinate information may be based on geographic coordinates acquired by a GPS system, for example, the orientation information of the target object may be 300 meters high, 50 degrees north latitude, and 85 degrees east longitude. In some embodiments, the coordinate information may also set coordinate information to a regional map of the monitoring region, for example, a coordinate system is established with the lower left corner of the monitoring region as an origin, a coordinate position of the ground position where the target object is projected on the monitoring region is used as the coordinate information of the target object, such as (200, 10, 18), which represents the height 200 of the target object, and the projection position is 10 unit distances from the origin on the abscissa and 18 unit distances on the ordinate.
In some embodiments, said scheduling the second probe device to move to the target area of the target object based on the positional information in the base data comprises: determining a target area of the target object based on the orientation information; judging whether a schedulable second detection device exists or not; in the presence of the schedulable second probe device, determining a course of travel along which the second probe device moves based on the target area; and scheduling the second detection equipment to move to the target area of the target object based on the running route.
In some embodiments, the target area may be set by the user in different situations. The target area is determined by the detection range of the second detection device, ensuring that the second detection device can acquire target data of the target object in the target area. For example, the target region may be a region within 1 unit distance of 5 square circles centered on the projection position of the target object.
In some embodiments, it may be determined whether a schedulable second detection device is present within the detection area, the second detection device being only a movable detection device. The schedulable second detection device is the second detection device that is not in operation. For example, the monitoring area is configured with three movable detection devices, two of which are detecting other objects, and when a third object appears in the monitoring area, the processor may assign a scheduling task instruction to the detection device in an idle state.
In some embodiments, the alarm module is controlled to alarm in the absence of said schedulable second detection device.
In some embodiments, a travel route for movement of a second probe device may be determined based on the target area and a location of the second probe device receiving the task instructions, and the second probe device may be scheduled to move to the target area of the target object based on the travel route.
Step S230, acquiring target data of the target object.
In some embodiments, the detecting by the second detecting device to obtain the target data of the target object specifically includes: determining a detection orientation of the second detection device based on the orientation information of the target object; wherein the second detection device comprises at least one of a photo detection device and/or a radio detection device; and acquiring target data detected by the detection equipment on the target object. The target data may include specific categories of targets, frequency information, etc.
Step S240, based on the basic data and the target data, determining the threat degree of the target object.
In some embodiments, said determining a threat level of said target object based on said base data and said target data comprises: determining an attribute of the target object based on the basic data and the target data; based on the attributes, a threat level of the target object is determined.
In some embodiments, the basic data and the target data may be fused to obtain the attribute of the target object. The attribute of the target object may include a function provided by the target object, information on an article carried by the target object, and the like. For example, the target object is detected as a balloon by the first detection device, the second detection device detects an article possibly carried in the balloon, the attribute of the target object is determined through data fusion processing, the article carried in the target object is considered to be unconventional, and the threat level of the target object is determined to be high based on the attribute.
And step S250, under the condition that the threat degree meets the preset condition, the control device is dispatched to move to the target area.
In some embodiments, the threat level may be set on its own as the case may be. The predetermined condition of the degree of threat can be set according to the way of representing the degree of threat. For example, the threat level may be indicated by low and high, and when the predetermined condition for the threat level is high, the countermeasure device is scheduled to prepare for countermeasures. For another example, the threat degree may also be expressed in percentage, and a threat degree threshold is set, the preset condition may be 60%, and when the threat degree is higher than 60%, the countermeasure device is scheduled to prepare for countermeasures.
In some embodiments, the scheduling a movement of the countering device to the target area of the target object comprises: determining a target area of the target object based on the orientation information; judging whether a reversible device capable of being dispatched exists or not; determining a running route of movement of the countering device based on the target area in the presence of the schedulable countering device; and scheduling the countering device to move to the target area of the target object based on the running route. The method for scheduling the counter device is similar to the method for scheduling the second detection device, and reference may be specifically made to step S220 and the details thereof, which are not described herein again.
In some embodiments, the alarm module is controlled to alarm in the absence of the dispatchable counter device.
In some embodiments, the method further comprises: matching a countering strategy of the countering device based on the attribute of the target object; wherein the attribute is determined based on the base data and target data; and countering the target object based on the countering strategy.
In some embodiments, the countering strategy refers to a method of countering a target object, including navigation spoofing, laser scanning, signal interference, and the like. In some embodiments, the user may configure the corresponding counter-policy in advance according to the attribute of the target object through the user terminal. For example, a countermeasure for laser scanning may be matched for balloons with dangerous objects; a counter-policy for drones that can be configured to navigate spoofing or signal jamming forced landing.
EXAMPLE III
The present application provides a system for dynamically scheduling a device, and fig. 3 is a schematic block diagram of a system for dynamically scheduling a device according to an embodiment of the present application. As shown in fig. 3, the system includes:
the detection module 310 is configured to detect a target object entering a monitoring area through a first detection device, and obtain basic data of the target object; and acquiring target data of the target object through the second detection equipment.
A scheduling module 320, configured to schedule the second probe device to move to a target area based on the azimuth information in the basic data; and scheduling the countering device to move to the target area.
A data processing module 330, configured to determine a threat level of the target object based on the basic data and the target data.
In some embodiments, the scheduling module 320 may also be configured to include: determining a target area of the target object based on the orientation information; judging whether a schedulable second detection device exists or not; in the presence of the schedulable second probe device, determining a course of travel for movement of the second probe device based on the target area; and scheduling the second detection equipment to move to the target area of the target object based on the running route.
In some embodiments, the scheduling module 320 may also be configured to include: determining a target area of the target object based on the orientation information; judging whether a reversible device capable of being dispatched exists or not; determining a running route of movement of the countering device based on the target area in the presence of the schedulable countering device; scheduling the countering device to move to a target area of the target object based on the travel route.
In some embodiments, the system further comprises an alarm module for controlling the alarm module to alarm in the absence of the dispatchable detection device and/or counter device.
In some embodiments, reconnaissance module 310 may be further operable to, including: determining a detection orientation of the second detection device based on the orientation information of the target object; wherein the second detection device comprises at least one of a photo detection device and/or a radio detection device; and acquiring target data detected by the detection equipment on the target object.
In some embodiments, spy module 310 may further comprise a computing unit for determining an attribute of the object based on the base data and the object data; based on the attributes, a threat level of the target object is determined.
In some embodiments, the system further comprises a countering unit for matching a countering strategy of the countering device based on the attributes of the target object; wherein the attribute is determined based on the base data and target data; and countering the target object based on the countering strategy.
In some embodiments, the system further comprises a playback module for playback of historical data, i.e., playback of the track using historical state data of the recording device, historical target data, etc., on the map engine for the second probe device and/or the counter device state according to the historical time period.
Example four
The present embodiments also provide a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., having stored thereon a computer program that, when executed by a processor, performs the above-described method steps.
For the specific embodiment of the process of the above method steps, reference may be made to the above embodiments, and details are not repeated here.
EXAMPLE five
The embodiment of the present application provides an electronic device, which may be a mobile phone, a computer, a tablet computer, or the like, and includes a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, implements the application management method as described in the first embodiment. It is understood that the electronic device may also include multimedia components, input/output (I/O) interfaces, and communication components.
Wherein, the processor is used for executing all or part of the steps in the application management method in the first embodiment. The memory is used to store various types of data, which may include, for example, instructions for any application or method in the electronic device, as well as application-related data.
The Processor may be implemented by an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a controller, a microcontroller, a microprocessor, or other electronic components, and is configured to execute the Application management method in the first embodiment.
The Memory may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically Erasable Programmable Read-Only Memory (EEPROM), erasable Programmable Read-Only Memory (EPROM), programmable Read-Only Memory (PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk.
The multimedia component may include a screen, which may be a touch screen, and an audio component for outputting and/or inputting an audio signal. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in a memory or transmitted through a communication component. The audio assembly also includes at least one speaker for outputting audio signals.
The I/O interface provides an interface between the processor and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons.
The communication component is used for carrying out wired or wireless communication between the electronic equipment and other equipment. Wireless Communication, such as Wi-Fi, bluetooth, near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 405 may include: wi-Fi module, bluetooth module, NFC module.
In summary, the present application provides a method, a system, a storage medium, and an electronic device for dynamically scheduling a device.
In the several embodiments provided in the embodiments of the present application, it should be understood that the disclosed system and method may be implemented in other manners. The system and method embodiments described above are merely illustrative.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
Although the embodiments disclosed in the present application are described above, the descriptions are only for the convenience of understanding the present application, and are not intended to limit the present application. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims.

Claims (10)

1. A method for dynamic scheduling of a device, the method comprising:
detecting a target object entering a monitoring area through first detection equipment to obtain basic data of the target object;
scheduling second detection equipment to move to a target area based on the azimuth information in the basic data, and detecting the target object through the second detection equipment;
acquiring target data of the target object;
determining a threat level of the target object based on the basic data and the target data;
and under the condition that the threat degree meets a preset condition, scheduling the countering equipment to move to the target area.
2. The method of claim 1, wherein scheduling a second probe device to move to a target area of the target object based on the orientation information in the base data comprises:
determining a target area of the target object based on the orientation information;
judging whether schedulable second detection equipment exists or not;
in the presence of the schedulable second probe device, determining a course of travel along which the second probe device moves based on the target area;
and scheduling the second detection equipment to move to the target area of the target object based on the running route.
3. The method of claim 1, wherein the scheduling a movement of a countering device to a target area of the target object comprises:
determining a target area of the target object based on the orientation information;
judging whether a reversible device capable of being dispatched exists or not;
determining a running route of movement of the countering device based on the target area in the presence of the schedulable countering device;
and scheduling the countering device to move to the target area of the target object based on the running route.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
and under the condition that the schedulable second detection device and/or the countercheck device does not exist, controlling an alarm module to alarm.
5. The method of claim 1, wherein said detecting by said second detection device to obtain target data of said target object comprises:
determining a detection orientation of the second detection device based on the orientation information of the target object; wherein the second detection device comprises at least one of a photo detection device and/or a radio detection device;
and acquiring target data detected by the second detection equipment on the target object.
6. The method of claim 1, wherein determining the threat level of the target object based on the base data and the target data comprises:
determining an attribute of the target object based on the basic data and the target data;
based on the attributes, a threat level of the target object is determined.
7. The method of claim 1, further comprising:
matching a countering strategy of the countering device based on the attribute of the target object; wherein the attribute is determined based on the base data and target data;
and countermaking the target object based on the countermaking strategy.
8. A system for dynamic scheduling of devices, the system comprising:
the detection module is used for detecting a target object entering a monitoring area through first detection equipment and acquiring basic data of the target object; acquiring target data of the target object through the second detection equipment;
the scheduling module is used for scheduling the second detection equipment to move to a target area based on the azimuth information in the basic data; and scheduling a countering device to move to the target area;
and the data processing module is used for determining the threat degree of the target object based on the basic data and the target data.
9. A storage medium storing a computer program which, when executed by one or more processors, performs the method of dynamic scheduling of the device as claimed in any one of claims 1 to 7.
10. An electronic device, comprising a memory and a processor, the memory having stored thereon a computer program which, when executed by the processor, performs the method of dynamic scheduling of devices according to any of claims 1-7.
CN202210855132.7A 2022-07-19 2022-07-19 Method, system, storage medium and electronic device for dynamic scheduling of devices Pending CN115420147A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210855132.7A CN115420147A (en) 2022-07-19 2022-07-19 Method, system, storage medium and electronic device for dynamic scheduling of devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210855132.7A CN115420147A (en) 2022-07-19 2022-07-19 Method, system, storage medium and electronic device for dynamic scheduling of devices

Publications (1)

Publication Number Publication Date
CN115420147A true CN115420147A (en) 2022-12-02

Family

ID=84196077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210855132.7A Pending CN115420147A (en) 2022-07-19 2022-07-19 Method, system, storage medium and electronic device for dynamic scheduling of devices

Country Status (1)

Country Link
CN (1) CN115420147A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002147996A (en) * 2000-11-14 2002-05-22 Mitsubishi Electric Corp Missile system
EP2051039A1 (en) * 2007-10-16 2009-04-22 LFK-Lenkflugkörpersysteme GmbH Method and assembly for defending against ballistic missiles with the help of diverting missiles
KR101750500B1 (en) * 2016-07-27 2017-06-26 엘아이지넥스원 주식회사 AIRCRAFT INTERCEPT SYSTEM AND METHOD USING Ka-BAND
CN109283521A (en) * 2018-10-18 2019-01-29 广州市海林电子科技发展有限公司 It blocks the method for unmanned plane and blocks the anti-UAV system of formula
US10338213B1 (en) * 2017-02-02 2019-07-02 Northrop Grumman Systems Corporation Auto tier II
CN110441751A (en) * 2019-07-26 2019-11-12 大亚湾核电运营管理有限责任公司 Dual radars detection method, device, readable storage medium storing program for executing and terminal device
CN112485781A (en) * 2020-11-18 2021-03-12 济南和普威视光电技术有限公司 Anti-unmanned aerial vehicle unattended system and method based on deep learning

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002147996A (en) * 2000-11-14 2002-05-22 Mitsubishi Electric Corp Missile system
EP2051039A1 (en) * 2007-10-16 2009-04-22 LFK-Lenkflugkörpersysteme GmbH Method and assembly for defending against ballistic missiles with the help of diverting missiles
KR101750500B1 (en) * 2016-07-27 2017-06-26 엘아이지넥스원 주식회사 AIRCRAFT INTERCEPT SYSTEM AND METHOD USING Ka-BAND
US10338213B1 (en) * 2017-02-02 2019-07-02 Northrop Grumman Systems Corporation Auto tier II
CN109283521A (en) * 2018-10-18 2019-01-29 广州市海林电子科技发展有限公司 It blocks the method for unmanned plane and blocks the anti-UAV system of formula
CN110441751A (en) * 2019-07-26 2019-11-12 大亚湾核电运营管理有限责任公司 Dual radars detection method, device, readable storage medium storing program for executing and terminal device
CN112485781A (en) * 2020-11-18 2021-03-12 济南和普威视光电技术有限公司 Anti-unmanned aerial vehicle unattended system and method based on deep learning

Similar Documents

Publication Publication Date Title
AU2019321145B2 (en) Method, device, and equipment for obstacle or ground recognition and flight control, and storage medium
US20220075375A1 (en) Dynamically adjusting uav flight operations based on radio frequency signal data
US9429945B2 (en) Surveying areas using a radar system and an unmanned aerial vehicle
US10082802B2 (en) Method and system for continued navigation of unmanned aerial vehicles beyond restricted airspace boundaries
CN111131783A (en) Monitoring method and device based on electronic fence, terminal equipment and storage medium
EP4072173B1 (en) Data transmission method and device
EP3195239A1 (en) Regulation via geofence boundary segment crossings
US11039280B2 (en) Methods and systems for service transfer
EP4047570A1 (en) Electronic device for controlling entry or exit by using wireless communication, and method therefor
US11487017B2 (en) Drone detection using multi-sensory arrays
Sun et al. Distributed probabilistic search and tracking of agile mobile ground targets using a network of unmanned aerial vehicles
CN112823353A (en) Object localization using machine learning
ES2667096T3 (en) Monitoring
US20210357620A1 (en) System, moving object, and information processing apparatus
CN113920447A (en) Ship harbor detection method and device, computer equipment and storage medium
CN113899367A (en) Positioning method and device for unmanned aerial vehicle landing, computer equipment and storage medium
CN115420147A (en) Method, system, storage medium and electronic device for dynamic scheduling of devices
EP3361428A1 (en) Asset location identification system, program and method
CN110940994B (en) Positioning initialization method and system thereof
JP2022174248A (en) Method and apparatus for detecting operating terrain, and engineering equipment for detecting operating terrain
CN115454121A (en) System and method for servicing drone landing zone operations
CN115460539A (en) Method, device, medium and program product for acquiring electronic fence
CN113822372A (en) Unmanned aerial vehicle detection method based on YOLOv5 neural network
CN109246606B (en) Expansion method and device of robot positioning network, terminal equipment and storage medium
CN112334880A (en) Obstacle processing method and device for movable platform and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination