CN117132438B - Safety production management method, system and equipment - Google Patents

Safety production management method, system and equipment Download PDF

Info

Publication number
CN117132438B
CN117132438B CN202311401972.7A CN202311401972A CN117132438B CN 117132438 B CN117132438 B CN 117132438B CN 202311401972 A CN202311401972 A CN 202311401972A CN 117132438 B CN117132438 B CN 117132438B
Authority
CN
China
Prior art keywords
risk
safety
information
real
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311401972.7A
Other languages
Chinese (zh)
Other versions
CN117132438A (en
Inventor
胡海亮
周歆
叶青
陶平
万俊龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Sangeshu Information Technology Co ltd
Original Assignee
Jiangxi Sangeshu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Sangeshu Information Technology Co ltd filed Critical Jiangxi Sangeshu Information Technology Co ltd
Priority to CN202311401972.7A priority Critical patent/CN117132438B/en
Publication of CN117132438A publication Critical patent/CN117132438A/en
Application granted granted Critical
Publication of CN117132438B publication Critical patent/CN117132438B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Educational Administration (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Primary Health Care (AREA)
  • Computer Security & Cryptography (AREA)
  • Game Theory and Decision Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Alarm Systems (AREA)

Abstract

The application is applicable to the technical field of safety production management, and particularly relates to a safety production management method, a safety production management system and safety production management equipment, wherein the safety production management method comprises the following steps: acquiring preset information and real-time information of an activity target of a production site; based on the preset information and the real-time information, performing security detection analysis, wherein the security detection analysis is used for detecting whether the movable target has security risks or not; when the safety risk of the movable target is determined, a safety risk avoidance signal is triggered, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk, so that the safety risk of a production site is prevented, warned and eliminated, and the problem that the production safety is influenced due to the fact that people or objects moving in the production site are difficult to manage is solved.

Description

Safety production management method, system and equipment
Technical Field
The application belongs to the technical field of safety production management, and particularly relates to a safety production management method, system and equipment.
Background
Secure production management refers to providing customers with prevention and early warning of security risks in production site activities. It relates to various aspects of prevention, monitoring, management, alarming and the like. Aims to assist clients in preventing and warning the safety risk in production and provides a feasible management means.
Safety production is the production foundation of various industries, but at present, much enterprises pay little attention to safety production. In production management, especially in production sites, movable people or objects need to move between different areas, so that management confusion is caused, such as random personnel flow, undefined cargo flow, random foreign personnel entering and exiting from a secret area or a dangerous area, and the like, and the production safety is affected.
Disclosure of Invention
The embodiment of the application provides a safe production management method, system and equipment, which can solve the problem that the production safety is affected due to the fact that people or objects moving in a production site are difficult to manage.
In a first aspect, an embodiment of the present application provides a method for secure production management, including:
acquiring preset information and real-time information of an activity target of a production site;
based on the preset information and the real-time information, performing security detection analysis, wherein the security detection analysis is used for detecting whether the movable target has security risks or not;
triggering a safety risk avoidance signal when the safety risk exists in the movable target, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk.
The technical scheme in the embodiment of the application has at least the following technical effects:
according to the safety production management method, the preset information related to the movable targets is acquired, and the real-time information related to the movable targets is acquired in real time, so that potential safety risks of the movable targets can be quickly identified later. And the safety detection analysis after the preset information and the real-time information are acquired is performed based on the real-time data, so that real-time safety state evaluation can be provided, the current safety condition of the movable target can be quickly known, and a data-driven decision can be made. If the safety detection analysis determines that the movable target has safety risk, a safety risk avoidance signal is triggered, the movable target and/or management personnel can be prompted to take measures to eliminate the safety risk, the identification and coping capacity of the potential safety risk of the movable target can be improved, safety and production flow are improved, potential dangerous situations can be found before or just before the accident occurs, early warning is facilitated, measures are taken to prevent the accident, and therefore the accident occurrence rate of the production site is reduced, the safety situations of people or objects moving in the production site are effectively managed, and the safety of staff and the site is ensured.
In a possible implementation manner of the first aspect, the acquiring preset information and real-time information of the activity target of the production site includes:
and receiving preset information and real-time information sent by monitoring equipment on the production site.
In a possible implementation manner of the first aspect, the receiving preset information and real-time information sent by monitoring equipment on a production site includes:
receiving preset information and real-time information sent by first sub-monitoring equipment assembled on the movable target; the first sub-monitoring equipment comprises at least one of a monitoring bracelet, a monitoring helmet and a monitoring card;
receiving real-time information sent by second sub-monitoring equipment of a production site; the second sub-monitoring device comprises an image monitoring device, and the real-time information sent by the second sub-monitoring device comprises real-time video data reflecting the condition of the production site.
In a possible implementation manner of the first aspect, the performing a security detection analysis based on the preset information and the real-time information includes:
according to preset information and real-time information sent by the first sub-monitoring equipment, performing first safety detection analysis;
When the safety risk of the movable target is preliminarily determined according to the detection result of the first safety detection analysis, performing a second safety detection analysis according to the detection result of the first safety detection analysis and the real-time video data;
and finally determining whether the movable target has safety risk according to the detection result of the second safety detection analysis.
In a possible implementation manner of the first aspect, the performing a first security detection analysis according to preset information and real-time information sent by the first sub-monitoring device includes:
acquiring a plurality of risk type information and actual values corresponding to the risk type information according to preset information and real-time information sent by the first sub-monitoring equipment;
generating a plurality of pairs of actual key value pairs associated with the risk type information and the actual value according to the risk type information and the actual value;
generating an actual key value table formed by all the actual key value pairs according to the actual key value pairs;
matching the actual key value table with a preset security risk key value table; wherein, the actual key value pairs in the actual key value table and the preset key value pairs in the preset security risk key value table are in the same-name one-to-one correspondence;
And preliminarily determining whether the activity target has safety risk according to the matching result.
In a possible implementation manner of the first aspect, when the active target is initially determined that there is a security risk according to the detection result of the first security detection analysis, performing a second security detection analysis according to the detection result of the first security detection analysis and the real-time video data, where the second security detection analysis includes:
when the safety risk of the movable target is preliminarily determined according to the matching result of the actual key value table and the preset safety risk key value table, acquiring an actual key value pair and a data head with a risk matching relationship according to the matching result;
restoring corresponding risk type information according to the actual key value pairs with the risk matching relationship;
restoring the detected time information and position information according to the data head;
acquiring video data corresponding to the time and the position from the real-time video data according to the restored time information and the position information detected at the time;
performing video verification on the video data of the corresponding moment and position according to the restored risk type information;
and finally determining whether the movable target has a safety risk according to the detection result of the second safety detection analysis, including:
And finally determining whether the active target has safety risk according to the video verification result.
In a possible implementation manner of the first aspect, the triggering a security risk avoidance signal when the determining that the moving target has a security risk includes:
determining that at least one risk type information obtained by the video verification is identical to the restored risk type information;
determining a corresponding safety risk type according to the same risk type information;
triggering a preset safety risk avoiding signal according to the safety risk type.
In a possible implementation manner of the first aspect, the performing a security detection analysis based on the preset information and the real-time information includes:
performing a third security detection analysis according to the real-time video data;
when the safety risk of the movable target is preliminarily determined according to the detection result of the third safety detection analysis, fourth safety detection analysis is carried out according to the detection result of the third safety detection analysis and preset information and real-time information sent by the first sub-monitoring equipment;
and finally determining whether the movable target has safety risk according to the detection result of the fourth safety detection analysis.
In a possible implementation manner of the first aspect, the performing a third security detection analysis according to the real-time video data includes:
smoothing the video data frame image of the real-time video data by adopting a filtering algorithm;
performing wavelet transformation processing on the smoothed video data frame image to obtain a segmented sub-image;
extracting visual features of the segmented sub-images to obtain visual feature information of the sub-images;
matching the sub-image visual characteristic information with a security risk behavior image visual characteristic library;
and determining whether the movable target has safety risk according to the matching result.
In a possible implementation manner of the first aspect, the performing a third security detection analysis according to the real-time video data further includes:
confirming the identity identification information of the movable target according to the sub-image visual characteristic information;
when the security risk of the movable target is preliminarily determined according to the detection result of the third security detection analysis, a fourth security detection analysis is performed according to the detection result of the third security detection analysis and preset information and real-time information sent by the first sub-monitoring device, including:
When the safety risk of the movable target is preliminarily determined according to the matching result of the matching of the sub-image visual characteristic information and the safety risk behavior image visual characteristic library, acquiring the risk type information of the preliminary identification according to the matching result;
acquiring preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target according to the identity identification information of the movable target;
generating an actual key value table according to preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target;
matching the actual key value table with a preset security risk key value table;
verifying the primarily identified risk type information according to a matching result of the actual key value table and the preset security risk key value table;
and finally determining whether the movable target has a safety risk according to the detection result of the fourth safety detection analysis, including:
and finally determining whether the movable target has safety risk according to the verification result.
In a possible implementation manner of the first aspect, the triggering a security risk avoidance signal when the determining that the moving target has a security risk includes:
Determining that risk type information corresponding to at least one matching risk result exists between the actual key value table and the preset security risk key value table, and the risk type information is the same as the risk type information of the preliminary identification;
determining a corresponding safety risk type according to the same risk type information;
triggering a preset safety risk avoiding signal according to the safety risk type.
In a second aspect, embodiments of the present application provide a secure production management system, including:
the acquisition unit is used for acquiring preset information and real-time information of the movable target of the production site;
the detection unit is used for carrying out safety detection analysis based on the preset information and the real-time information, wherein the safety detection analysis is used for detecting whether the movable target has safety risk or not;
the triggering unit is used for triggering a safety risk avoidance signal when the safety risk exists in the movable target, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk.
In a third aspect, embodiments of the present application provide a secure production management device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the method according to any one of the first aspects when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer program product for, when run on a terminal device, causing the terminal device to perform the method of any one of the first aspects described above.
It will be appreciated that the advantages of the second to fourth aspects may be found in the relevant description of the first aspect and are not repeated here.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following description will briefly introduce the drawings that are needed in the embodiments or the description of the prior art, it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for secure production management according to an embodiment of the present disclosure;
FIG. 2 is a flowchart of step S200 in a method for secure production management according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of step S210 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 4 is a flowchart of step S220 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 5 is a flowchart of step S225 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 6 is a flowchart of step S300 of a method for secure production management according to an embodiment of the present application;
FIG. 7 is a schematic flow chart of another process of step S200 of the method for managing secure production according to an embodiment of the present application;
FIG. 8 is a flowchart of step S240 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 9 is a flowchart of step S250 of a method for secure production management according to an embodiment of the present disclosure;
fig. 10 is a flowchart of step S253 of the secure production management method according to an embodiment of the present application;
FIG. 11 is a flowchart illustrating a step S300 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 12 is a flowchart illustrating a step S200 of a method for secure production management according to an embodiment of the present disclosure;
FIG. 13 is a flowchart of step S370 of a secure production management method according to an embodiment of the present disclosure;
FIG. 14 is a schematic diagram of a secure production management system according to an embodiment of the present disclosure;
fig. 15 is a schematic structural view of a safety production management device according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system configurations, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
In addition, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and are not to be construed as indicating or implying relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Safety production is the production foundation of various industries, but at present, much enterprises pay little attention to safety production. In enterprise production management, lack of effective supervision and feedback mechanism leads to management confusion, equipment and tool ageing and insufficient maintenance, relies heavily on manual supervision, and risk assessment and safety prevention cannot be effectively carried out. Problems such as random personnel flow, undefined cargo flow, non-compliance of personnel or cargo with safety regulations, random ingress and egress of foreign personnel into and out of a secret area or a dangerous area occur in a production field, and the safety of production is affected.
In order to solve the above problems, embodiments of the present application provide a method, a system, and an apparatus for secure production management. In the method, the preset information and the real-time information of the movable target of the production site are acquired, so that the potential safety risk can be quickly identified later; based on preset information and real-time information, safety detection analysis is carried out to detect whether the movable target has safety risk or not, the safety detection analysis is carried out based on real-time data, real-time safety state assessment can be provided, the current safety condition can be known quickly, and the provided analysis and data are beneficial to a management layer to make a decision based on facts, so that safety and production flow are improved; when the safety risk exists in the movable target, the safety risk avoidance signal is triggered, the movable target and/or management personnel can be prompted, measures are needed to eliminate the safety risk, the identification and coping capacity of the potential safety risk of the movable target can be improved, the safety and the production flow are improved, the potential dangerous situation can be found before or just before the accident occurs, early warning is facilitated, measures are taken to prevent the accident, and therefore the accident occurrence rate of the production site is reduced, the safety situation of people or objects moving in the production site is effectively managed, and the safety of staff and the site is guaranteed.
The method for managing the safe production provided by the embodiment of the application can be applied to terminal equipment, and the terminal equipment is the execution main body of the method for managing the safe production provided by the embodiment of the application, and the embodiment of the application does not limit the specific type of the terminal equipment.
For example, the terminal device may be a cellular phone, a cordless phone, a Session InitiationProtocol, SIP phone, a handset, a tablet, a wearable device, an in-vehicle device, an augmented reality (augmented reality, AR)/Virtual Reality (VR) device, a notebook, an ultra-mobile personal computer, a UMPC, a netbook, a personal digital assistant (personal digital assistant, PDA), a desktop, a smart large screen, a smart television, or other terminal device with wireless communication capabilities, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, an internet of vehicles terminal, a computer, a laptop, a handheld communication device, a handheld computing device, a satellite wireless device, or the like.
In order to better understand the secure production management method provided by the embodiment of the present application, a specific implementation procedure of the secure production management method provided by the embodiment of the present application is described below as an example.
Fig. 1 shows a schematic flow chart of a method for secure production management according to an embodiment of the present application, where the method for secure production management includes:
s100, acquiring preset information and real-time information of an activity target of a production site.
It is understood that the production site is a site engaged in production, manufacturing, or providing production services, for example, the production site may be a workshop, a site, a factory floor active area, or the like, but is not limited thereto. The moving object is a person or object that needs to move or can move in the production site, and may include, for example, a manager, a technician, a worker, a visitor, or the like, a person moving in the production site, a vehicle, a movable machine, a transported cargo, or the like, but is not limited thereto. The preset information is information of preset specific information, and the real-time information is a real-time value of the monitored changeable information at a certain moment. The preset information and the real-time information may include information describing temperature, pressure, humidity, dust concentration, etc. reflecting the security problem, device status reflecting the security problem, personal health information (body temperature, blood pressure, heart rate, etc.), flow authority, and behavior status of the moving object, etc., but are not limited thereto. The preset information and the real-time information are required to be processed, and the possible safety risk of the moving target of the production site is reflected through the information, for example, the preset information can be identity information for identifying the moving target such as a person, a vehicle and the like, flow permission information of the moving target such as the person, the vehicle and the like, and preset region information required to be reached, but the method is not limited to the above. For example, the real-time information may be, but not limited to, video recordings taken by video monitoring of a production site, real-time monitored sensor data, and real-time location information.
These preset information and real-time information can be used to monitor and evaluate the safety of the moving object of the workplace and trigger necessary countermeasures when problems are found, ensuring the safety of the moving object. The combination of preset information and real-time information facilitates more comprehensive management and improved safety production.
In one possible implementation manner, S100, acquiring preset information and real-time information of an activity target of a production site includes:
s110, receiving preset information and real-time information sent by monitoring equipment on a production site.
It will be appreciated that the monitoring device is a device for monitoring the safety of an active object at a production site, for example but not limited to a monitoring helmet, a monitoring card, a monitoring bracelet, video monitoring, etc. The monitoring device may be used to collect preset information and real-time information of an activity target of a production site, for example, but not limited to, environmental parameters, device status, employee location and activity, real-time video data, alarms, event records, and the like. But not limited to, safety regulations, work plans, equipment operation requirements, PPE requirements, etc. are also possible. The acquired information is uploaded to the terminal equipment by the monitored equipment and is used as an important basis for judging the safety risk problem, accurate and efficient data can be provided for a decision maker by accurately receiving the information, the decision accuracy is improved, the occurrence of the safety risk is prevented in advance, and the safety problem is effectively avoided.
Optionally, S110, receiving preset information and real-time information sent by monitoring equipment on a production site, including:
s111, receiving preset information and real-time information sent by first sub-monitoring equipment assembled on an activity target; the first sub-monitoring device comprises at least one of a monitoring bracelet, a monitoring helmet and a monitoring card. Receiving real-time information sent by second sub-monitoring equipment of a production site; the second sub-monitoring device comprises an image monitoring device, and the real-time information sent by the second sub-monitoring device comprises real-time video data reflecting the condition of the production site.
It will be appreciated that the first sub-monitoring device comprises at least one of a monitoring bracelet, a monitoring helmet or a monitoring card. These devices may be worn by staff to monitor their activity and physiological data. These devices may provide real-time information about the employee, such as physiological status, location, activity, etc. This information may include, but is not limited to, employee heart rate, body temperature, location, movement trajectory, vehicle location, cargo trajectory, cargo real-time temperature, cargo real-time pressure, etc. The second sub-monitoring device comprises an image monitoring device, which may be a camera or a monitoring system installed at the production site. These devices provide real-time video data to reflect the real-time status of the active targets of the production site. This may include monitoring staff's behavior, the status of the work environment, the behavior of the device, etc.
Both types of monitoring devices are used to collect information of moving targets (employees or objects), aimed at monitoring their status, behaviour and working environment, and upload these information to the terminal device. Such information may be used for security management, production efficiency monitoring, emergency response, and the like. The terminal device can analyze this information and trigger alarms if necessary, provide real-time data feedback, or be used to make decisions to ensure safe and efficient operation of the production site.
S200, based on preset information and real-time information, performing safety detection analysis, wherein the safety detection analysis is used for detecting whether the movable target has safety risks or not.
It will be appreciated that performing security detection analysis based on preset information and real-time information is a critical task aimed at identifying and assessing whether a security risk exists for an active object, for example, preset information and real-time information may be integrated together, analysis tools and algorithms, such as taxonomic analysis, comparative analysis, correlation analysis, image processing algorithms, etc., may be used to identify potential security risks, involve pattern recognition, anomaly detection and trend analysis of the data, and compare analysis results with preset security rules and criteria to determine whether there is a violation or potential unsafe behavior or condition, and evaluate the severity and likelihood of the detected potential risks. If a high risk condition is found, the system may trigger an alarm or notification to immediately take action, record the results of the detection analysis and the actions taken, and generate a report for review by regulatory authorities and management layers, the purpose of the safety detection analysis being to discover potential risks in advance to take appropriate actions to ensure the safety of staff and the site.
In one possible implementation, referring to fig. 2, S200, performing a security detection analysis based on preset information and real-time information includes:
s210, performing first safety detection analysis according to preset information and real-time information sent by the first sub-monitoring equipment.
It will be appreciated that based on the obtained preset information and real-time information sent by the first sub-monitoring device, the real-time data may be processed, analyzed, a detection analysis is provided for the moving object at the production site, a preliminary detection result is provided, which is a preliminary risk result of the moving object analysis at the production site, so as to determine whether there is a violation or potential unsafe behavior or condition, and evaluate the severity and possibility of the detected potential risk, thereby guaranteeing production safety.
And S220, when the safety risk of the movable target is preliminarily determined according to the detection result of the first safety detection analysis, performing a second safety detection analysis according to the detection result of the first safety detection analysis and the real-time video data.
It can be understood that when the first security detection determines that the active target of the production site has a primarily confirmed security risk, the second security detection analysis is triggered, and the second security detection analysis performs detection comparison on the primary result of the first security detection analysis based on the image data acquired by the second sub-monitoring device, so as to further test and confirm the result of the security risk, improve the detection accuracy, reduce the detection error rate, ensure the true and reliable detection result, and improve the security.
S230, finally determining whether the movable target has safety risk according to the detection result of the second safety detection analysis.
It can be understood that the two-stage safety detection analysis method allows more comprehensive assessment of the safety risk according to the final result of the safety condition of the movable target on the production site obtained by the first safety detection analysis and the second safety detection analysis, and the final result of the safety condition of the movable target on the production site and confirmation of whether the safety risk exists in the movable target.
Optionally, referring to fig. 3, S210, performing a first security detection analysis according to preset information and real-time information sent by the first sub-monitoring device includes:
s211, acquiring a plurality of risk type information and actual values corresponding to the risk type information according to preset information and real-time information sent by the first sub-monitoring equipment.
It is understood that the first sub-monitoring device can collect preset information and real-time information of the moving object of the production site and upload the information to the terminal device, and the actual values of the information are actual safety information of the moving object of the production site, for example, the body temperature or the surface temperature of the moving object of the production site represented by the actual temperature value, the surface pressure or the air pressure of the moving object of the production site represented by the actual pressure value, etc., the humidity actual value represents the environmental humidity of the moving object of the production site, the dust concentration in the environment of the moving object of the production site represented by the actual dust concentration, etc., but not limited thereto. The actual values have corresponding risk type information, and the risk type information is the most possible safety risk situation generated by the actual safety information of the moving target, for example, the temperature actual value corresponds to "high temperature risk", the pressure actual value corresponds to "overpressure risk", the humidity actual value corresponds to "over-humidity risk", the dust concentration actual value corresponds to "explosion risk", and the like, but the invention is not limited thereto. The actual information corresponds to the risk information, and the actual information is connected with the risk condition, so that the safety risk of the movable target of the production site is checked, and the safety prevention capability is improved.
S212, generating a plurality of pairs of actual key value pairs associated with the risk type information and the actual value according to the risk type information and the actual value.
It can be understood that according to the correspondence between risk type information and the actual value of the information, the risk type information and the actual value can be processed into a direct key value pair, the key value pair is divided into a key name and a key value, each key name (such as "high temperature risk", "overpressure risk", "over-humidity risk", "explosion risk") is associated with one key value (respectively "37.5 ℃," 2kPa "," 80%, "5 mg/m"), all the information is processed into an actual key value pair with the key value as the actual value, and the key can be used for searching and acquiring the corresponding value, so that the data can be organized and retrieved efficiently, and the safety risk detection efficiency is improved.
S213, generating an actual key value table formed by all the actual key value pairs according to the actual key value pairs.
It can be understood that, all generated key value pairs are organized, all actual key value pair sets are all actual safety information including the activity targets of the production site collected by the first sub-monitoring device, all key values are integrated into one data table, namely an actual key value table, which can be a list or dictionary, and all actual key value pairs are included, and the actual key value table is a direct data object of the first safety monitoring analysis, so as to provide a data basis for analyzing the safety risks of the activity targets of the production site.
S214, matching the actual key value table with a preset security risk key value table. The actual key value pairs in the actual key value table and the preset key value pairs in the preset security risk key value table are in the same-name one-to-one correspondence, namely, the unique correspondence exists between the actual key value pairs in the actual key value table and the preset key value pairs with the same key name in the preset security risk key value table.
It will be appreciated that the preset security risk key table is a preset information table for storing various security risk types and risk thresholds associated therewith. For each actual key value pair of the actual key value table, traversing key names and key values in the actual key value table to find a preset security risk type matched with the key names and key values, wherein the key names and the key values generally relate to nested loops, one key is used for traversing actual data, and the other key is used for traversing risk types in the preset security risk key value table, so that the purpose of analyzing security risks is achieved, security is improved, and the level of preventing the security risks is improved.
S215, preliminarily determining whether the activity target has safety risk according to the matching result.
It can be understood that according to the result of the matching analysis of the actual security situation of the security risk value domain to the activity target in the preset security risk key value table, the key value reaching the security risk value is matched, that is, the security risk type corresponding to the activity target, and the actual value of which risk type information exceeds the preset security range is determined, that is, whether the security risk exists is primarily determined, which is helpful for early identification of potential problems, and appropriate measures are taken to manage and weaken the risk.
Optionally, referring to fig. 4, S220, when it is preliminarily determined that the moving object has a security risk according to the detection result of the first security detection analysis, performing a second security detection analysis according to the detection result of the first security detection analysis and the real-time video data, including:
s221, when the safety risk of the activity target is preliminarily determined according to the matching result of the matching of the actual key value table and the preset safety risk key value table, acquiring the actual key value pair and the data head with the risk matching relation according to the matching result.
It can be understood that once the matching result is judged and the security risk is determined, the actual key value pairs related to the risk matching relationship and other data head information can be obtained, the data head can be a specific data stream containing information such as time stamp, position and the like, the fragment information to be detected in the video can be accurately positioned, and a detection basis is provided for the second security detection analysis.
S222, restoring the corresponding risk type information according to the actual key value pairs with the risk matching relationship.
It can be understood that, according to the actual key value pair with the risk matching relationship, the corresponding risk type information can be directly restored, and the checked object can be provided for the second security detection analysis.
S223, restoring the time information and the position information of the detection according to the data head.
It can be understood that the data head can restore the time information and the position information of the detection, which is helpful to accurately position the fragment information to be detected in the video, and provides detection basis for the second security detection analysis.
S224, video data corresponding to the time and the position are obtained from the real-time video data according to the restored time information and the restored position information of the detection.
It can be understood that according to the restored time information and position information of the detection, the corresponding segments in the video data corresponding to the time and the position are searched and intercepted, so that the complete and smooth implementation of the second safety detection analysis is ensured, and the accuracy of the safety detection analysis is improved.
S225, video verification is carried out on the video data at the corresponding moment and position according to the restored risk type information.
It can be understood that after the video data of the corresponding moment and position are intercepted, the video frame is checked according to the restored risk type information, whether the safety risk determined in the first safety detection appears on the movable target of the production site at the corresponding moment and position is checked, and an analysis result is obtained, so that whether the safety risk exists on the movable target is determined, the occurrence of the safety risk is prevented, the safety and accuracy are improved, and the life and property safety is guaranteed.
For example, referring to fig. 5, S225, performing video verification on video data corresponding to a time and a location according to the restored risk type information includes:
s2251, smoothing the video data frame image of the real-time video data by adopting a filtering algorithm for the intercepted video frame.
It can be understood that the filtering algorithm in the image processing technology is adopted for the video data frame to highlight the wide area, the low frequency component and the main part of the image, inhibit the image noise and the interference high frequency component, so as to smoothly change the brightness of the image, reduce the abrupt gradient, improve the image quality and be beneficial to improving the accuracy of detection.
S2252, performing wavelet transform processing on the smoothed video data frame image to obtain a segmented sub-image.
It can be understood that wavelet transformation is a multi-resolution analysis method, and can decompose an image into sub-images with various different scales, so that the purposes of extracting the characteristics of the image or realizing image compression and the like can be realized, the local characteristics and structural information of the image can be captured more finely, and the accuracy of the subsequent characteristic extraction can be improved.
S2253, performing image processing on the sub-images, and extracting visual characteristic information of the sub-images.
It can be understood that, the segmented sub-images are respectively processed by adopting a plurality of different image processing technologies, and specific information of the images, such as visual characteristic information of colors, textures, shapes and the like, can be obtained, and can be used for subsequent matching and analysis, wherein the visual characteristic information is an indirect representation of the behavior of the moving target in the production site, and provides basis for safety detection analysis.
S2254, matching the corresponding visual characteristic information of the risk type information image in the safety risk behavior image characteristic library with the visual characteristic information of the sub-image according to the restored risk type information.
It can be understood that the security risk behavior image feature library is a feature information library containing risk type information and image visual feature information of risk behavior images corresponding to the risk type information, the image visual feature information of the corresponding risk behavior images is searched according to the restored risk type information, whether the extracted sub-image visual feature information accords with the image visual feature information of the risk behavior images corresponding to the corresponding risk type information or not is compared, if yes, the existence of security risk is indicated, whether the movable target has the security risk or not can be checked according to the comparison result, the accuracy of the detection result is ensured, the accuracy of security detection analysis is improved, and the occurrence rate of detection errors is reduced.
S230, finally determining whether the movable target has a security risk according to the detection result of the second security detection analysis, including:
s231, finally determining whether the movable target has safety risk according to the video verification result.
It can be understood that after video verification is performed on video data corresponding to time and position according to the restored risk type information and a result is obtained, whether the activity target has a safety risk or not can be finally determined according to the result. The two-stage safety detection analysis method allows to evaluate this safety risk more comprehensively, i.e. to realize a double confirmation, avoiding the occurrence of a situation in which the production site is disturbed due to the occurrence of a fault or false detection by only one detection. And combining various information sources provided by the monitoring equipment to support timely decision and action, and improving the accuracy of safety detection analysis, thereby ensuring the safety of the movable target.
S300, triggering a safety risk avoidance signal when the safety risk of the movable target is determined, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk.
It will be appreciated that the safety risk avoidance signal will be triggered when the presence of a safety risk is detected in accordance with the safety detection and analysis procedure. This may be accomplished by an automated process or monitoring equipment, which upon triggering a safety risk avoidance signal, notifies the active object and/or associated manager to eliminate the safety risk, which may be by sending an alarm message, calling the associated personnel, or using other means of communication. The preset safety risk avoidance signal can be in various forms, such as an acoustic alarm, a flash lamp, a short message notice, an email notice and a mobile phone application program reminder, but is not limited to the form, and triggering the safety risk avoidance signal is a key step for ensuring timely treatment of potential risks, so that damage caused by risks can be reduced to the greatest extent.
In one possible implementation, referring to fig. 6, S300, when determining that the active target has a security risk, triggering a security risk avoidance signal includes:
s310, determining that at least one risk type information obtained by video verification is the same as the restored risk type information.
It can be understood that when the first security detection analysis preliminarily confirms that the security risk exists, and triggers the second security analysis to perform video verification, at least one risk type information is obtained by analyzing the corresponding real-time video data. These information are compared with risk type information preliminarily confirmed by the previous first security detection analysis to confirm whether they exist the same risk type information. When the risk type information preliminarily confirmed by the first safety detection analysis is matched with the risk type information obtained by the second safety detection analysis after video verification, namely the safety risk is determined to exist, a basis is provided for triggering information, the judgment accuracy is improved, and the safety risk occurrence rate is reduced.
S320, determining a corresponding security risk type according to the same risk type information.
It will be appreciated that specific security risk types may be determined from the same risk type information and correspondence of the security risk type signal table, and that one risk type information may correspond to one or more specific security risk types in the security risk type signal table. The safety risk type signal table is a basis table for triggering the safety risk avoidance signals, namely, according to the type of the safety risk, the safety risk avoidance signals are triggered. The security risk type table may include all possible security risk types. The list can comprise various safety risk types such as 'hyperthermia', 'tire overpressure', 'cargo humidity exceeding', 'dust explosion prone', and the like, for example, risk type information is 'high Wen Fengxian', the mapping of the risk type information to the safety risk type list can be 'hyperthermia', 'overpressure risk' mapping to the safety risk type list can be 'vehicle overweight' safety risk type, the mapping of the 'overweight risk' to the safety risk type list can be 'cargo humidity exceeding', 'explosion risk' mapping to the safety risk type list can be 'dust explosion prone' safety risk type, the specific safety risk type provides basis for triggering what signal, disorder is avoided, safety management efficiency is improved, and safety is improved. This mapping of risk type information to security risk types helps translate monitoring and analysis results into more specific security risk classifications, thereby better understanding and coping with potential security threats.
S330, triggering a preset safety risk avoidance signal according to the safety risk type.
It can be appreciated that, according to determining a specific security risk type, a preset security rule and policy of the security risk type in the security risk type signal table are triggered to trigger a corresponding security risk avoidance signal. These signals may take various forms such as an audible alarm, a flashing light signal, a GSM sms notification, etc. For example, the method can trigger a production site sound alarm to remind that the active target is too high in temperature when the safety risk type is 'over-high in temperature', trigger a production site yellow flash lamp signal to remind that the active target (vehicle) is overweight when the safety risk type is 'vehicle-mounted overweight', trigger a GSM short message to remind related personnel that the active target (cargo) is overweight when the safety risk type is 'cargo humidity exceeding standard', trigger a production site red flash lamp signal when the safety risk type is 'dust explosion-prone', and the like, but the method is not limited to the method, and the triggered signal can be adjusted according to different scenes and different requirements to inform related personnel or systems to take appropriate measures so as to achieve the purposes of preventing the safety risk and improving the safety.
In another possible implementation, referring to fig. 7, S200, performing a security detection analysis based on the preset information and the real-time information includes:
S240, performing third safety detection analysis according to the real-time video data.
It can be appreciated that the third security detection analysis may utilize computer vision techniques to detect and track moving objects in the video, analyze the behavior of the objects, determine if suspicious or abnormal activity is present, identify different objects or people in the video to distinguish between normal and abnormal conditions, initially determine if a security risk is present, and perform a preliminary analysis of possible problems, thereby improving security and reducing potential risks.
S250, when the safety risk of the movable target is preliminarily determined according to the detection result of the third safety detection analysis, fourth safety detection analysis is carried out according to the detection result of the third safety detection analysis, and preset information and real-time information sent by the first sub-monitoring equipment.
It will be appreciated that when the security risk is initially determined to exist according to the third security detection analysis, a preliminary analysis may be performed on the possible problems, and the security risk of the activity target may be further analyzed according to the result of the third security detection analysis and the preset information and real-time information of the first sub-monitoring device, so as to secondarily confirm the security risk, thereby improving security, reducing potential risk, and supporting rapid adoption of appropriate measures, which has the effect of providing more comprehensive and accurate security analysis and decision support.
And S260, finally determining whether the movable target has safety risk according to the detection result of the fourth safety detection analysis.
It can be understood that the final result of the safety condition of the movable target on the production site is obtained according to the third safety detection analysis and the fourth safety detection analysis, the final result is obtained, whether the movable target has safety risk is confirmed, the safety condition of the movable target can be completely detected and analyzed by combining two different detection analysis modes, the aim of improving the accuracy of detection and analysis can be achieved by double detection, potential safety hazards can be detected more perfectly, the safety risk can be evaluated more comprehensively, and the accuracy of safety detection and analysis can be improved by combining various information sources provided by monitoring equipment, supporting timely decision and action, so that the safety of the movable target is ensured.
Optionally, referring to fig. 8, S240, performing a third security detection analysis according to the real-time video data includes:
s241, smoothing the video data frame image of the real-time video data by adopting a filtering algorithm.
It will be appreciated that by smoothing the video data frame image of the real-time video data using a filtering algorithm, noise may be reduced and image quality may be improved. The filtering algorithm can help to remove high-frequency noise in the image, so that the image is clearer, subsequent safety detection analysis processing is facilitated, and analysis accuracy is improved.
S242, performing wavelet transformation processing on the video data frame image after the smoothing processing to obtain a segmented sub-image.
It can be understood that wavelet transformation is a multi-resolution analysis method, and can decompose an image into sub-images with different scales, so that the characteristics of the image can be extracted or the purposes of image compression and the like can be realized, the local characteristics and structural information of the image can be captured more finely, and the accuracy of the subsequent characteristic extraction can be improved.
S243, visual feature extraction is carried out on the segmented sub-images, and sub-image visual feature information is obtained.
It can be understood that the visual feature extraction is performed on the segmented sub-images, specific information of the images, such as the features of color, texture, shape and the like, can be obtained, the features can be used for subsequent matching and analysis, and the feature information is the indirect representation of the behavior of the activity target in the production field, so that the basis is provided for safety detection analysis.
S244, matching the sub-image visual characteristic information with the security risk behavior image visual characteristic library.
It will be appreciated that features of the captured sub-images will match features in the security risk behavioural image feature library. The matching may use different similarity measures, such as cosine similarity or euclidean distance, to compare the degree of similarity between the two feature vectors. The security risk behavior image feature library is a library containing various kinds of image visual feature information corresponding to security risk behaviors, the visual feature information of an actual image of a moving object extracted from a sub-image is matched with the security risk behavior image visual feature library, so that whether the visual information feature of the actual image corresponding to the sub-image accords with the image information feature of the security risk behavior image visual feature library or not is determined, the corresponding security risk behavior exists according to the matching, for example, the color visual information of a heat sensing monitoring image can be matched for a moving object with a preliminary confirmation of 'high Wen Fengxian', the edge texture visual information of a video image can be matched for a moving object with a preliminary confirmation of 'excessive humidity risk', the color visual information of the heat sensing monitoring image can be matched for a moving object with a preliminary confirmation of 'explosion risk', and the like.
S245, determining whether the activity target has safety risk according to the matching result.
It can be understood that according to the matching result of the sub-image visual feature information and the security risk behavior image visual feature library, whether the moving target accords with a predefined specific security risk type can be determined, and the accuracy and timeliness of detecting the security risk of the moving target are improved by analyzing the real-time video data in combination with the image processing, feature extraction and matching technology.
Optionally, S240, performing a third security detection analysis according to the real-time video data, further includes:
s246, according to the sub-image visual characteristic information, the identity identification information of the movable target is confirmed.
It can be understood that firstly, the visual characteristic information of the sub-images is detected by the targets to find the targets in the images, then the visual characteristics of each target are extracted, finally, the specific identity of the target is determined by using the identity recognition model, the specific identity of the moving target is determined, the real identity information of the moving target is confirmed, the analyzed real objects are clearly detected, the safety is improved, and the safety risk is avoided.
Referring to fig. 9, S250, when it is preliminarily determined that the moving target has a security risk according to the detection result of the third security detection analysis, performing a fourth security detection analysis according to the detection result of the third security detection analysis and the preset information and the real-time information sent by the first sub-monitoring device, including:
S251, when the safety risk of the activity target is preliminarily determined according to the matching result of the sub-image visual characteristic information and the safety risk behavior image visual characteristic library, primarily-identified risk type information is acquired according to the matching result.
It can be understood that the similarity between the features of the sub-images and a certain feature in the security risk behavior image feature library is higher according to the preliminary matching result, namely, when the security risk exists, the security risk type information corresponding to the security risk behavior image can be preliminarily confirmed and determined through the matched security risk behavior image, the security risk of the movable target is identified, and the accident rate is reduced.
S252, acquiring preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target according to the identity identification information of the movable target.
It can be understood that the specific identity and the real identity information of the movable target are determined, and the first sub-monitoring device assembled by the movable target can be searched according to the real identity information, namely, the preset information and the real-time information sent by the first sub-monitoring device assembled by the movable target can be obtained, so that the basis of the bottom data is provided for detection, and the accuracy of detection analysis is improved.
S253, generating an actual key value table according to preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target.
It can be understood that the obtained preset information and real-time information sent by the first sub-monitoring device of the activity target are generated into a key value pair, all key values are integrated into one data table, namely an actual key value table, namely a direct data object of fourth safety monitoring analysis, and a data basis is provided for analyzing the safety risk of the activity target of the production site.
For example, referring to fig. 10, S253, generating an actual key value table according to preset information and real-time information sent by a first sub-monitoring device assembled on a corresponding activity target includes:
s2531, acquiring a plurality of risk type information and actual values corresponding to the risk type information according to preset information and real-time information sent by the first sub-monitoring equipment.
It can be understood that, according to the preset information and the real-time information sent by the received first sub-monitoring device target assembled by the movable target, the risk type information of the collected movable target and the actual value corresponding to the risk type information can be obtained, the risk type information indicates the risk type possibly generated by the movable target, the actual safety information corresponding to the actual value of the movable target on the production site is the basic data basis of subsequent detection and analysis, the actual information corresponds to the risk information, and the actual information is connected with the risk condition, so that the safety risk of the movable target on the production site is checked, and the safety prevention capability is improved.
S2532, generating a plurality of pairs of actual key value pairs associated with the risk type information and the actual value according to the risk type information and the actual value.
It can be understood that according to the correspondence between risk type information and the actual value of the information, the risk type information and the actual value can be processed into a direct key value pair, the key value pair is divided into a key name and a key value, each key name ("high temperature risk", "overpressure risk", "overwet risk", "explosion risk") is associated with one key value ("40 ℃," 5kPa "," 80%, "5 mg/m" and the like), all the information is processed into an actual key value pair with the key value as the actual value, and the key name can be used for searching and acquiring the corresponding value, thereby being beneficial to efficient organization and retrieval of data and improving the efficiency of security risk detection.
S2533, generating an actual key value table formed by all the actual key value pairs according to the actual key value pairs.
It can be understood that, all generated key value pairs are organized, all actual key value pair sets are all actual safety information including the activity targets of the production site collected by the first sub-monitoring device, all key values are integrated into one data table, namely an actual key value table, which can be a list or dictionary, and all actual key value pairs are included, and the actual key value table is a direct data object of the first safety monitoring analysis, so as to provide a data basis for analyzing the safety risks of the activity targets of the production site.
S254, matching the actual key value table with a preset security risk key value table.
It can be understood that according to the matching analysis of the actual security condition of the security risk threshold value to the movable target in the preset security risk key value table, the key value pair reaching the security risk value is matched. The security risk key table may be a key table containing various security risk types and their corresponding thresholds, with a threshold being defined for each security risk type, indicating under what circumstances the risk is considered to be out of security. Specifically, for each risk type, the actual value is compared with a preset threshold value. If the actual value exceeds the threshold value, the risk type is considered to exist, namely the safety risk type corresponding to the activity target exists, and the actual value of the risk type information is determined to be beyond the preset safety range. This helps to identify potential problems early and take appropriate action to manage and mitigate risk.
And S255, verifying the primarily identified risk type information according to a matching result of the actual key value table and the preset security risk key value table.
It can be understood that the result of matching the actual key value table with the preset security risk key value table can obtain corresponding security risk type information, the information is compared with the risk type information primarily identified by the third security detection analysis for analysis and verification, whether the security risk exists in the movable target is finally determined according to the analysis and verification result, and the identification, data matching, verification and final decision are combined to determine whether the security risk exists in the movable target.
S260, finally determining whether the movable target has a safety risk according to the fourth safety detection analysis and verification result, including:
and S261, finally determining whether the movable target has safety risk according to the verification result.
It can be understood that, firstly, identity recognition is performed on visual feature information of a sub-image, a specific identity of an active target is determined, when the fact that the active target has a security risk is preliminarily determined according to the visual feature information of the sub-image and the visual feature library matching result of the security risk behavior image, preliminary recognized risk type information is obtained, which is conducive to rapid recognition of possible risks, through the recognized identity information of the active target, preset information and real-time information of a first sub-monitoring device associated with the active target are obtained, finally, based on the preset information and the real-time information of the first sub-monitoring device, an actual key value table is generated, the generated actual key value table is matched with the preset security risk key value table to determine whether actual data accords with security rules, and by matching the actual key value table with the preset security risk key value table, preliminary recognized risk type information is checked, namely, whether the security risk type information obtained by comparing a fourth security detection analysis and a third security detection analysis has the same condition, if the security type information obtained by matching of the two key value tables in the fourth security detection analysis and the security risk type information obtained by the third security detection analysis has the same condition, finally, whether the preliminary security type information is the risk exists is matched with the final security decision, and whether the risk exists is determined, and whether the risk exists is matched with the final security decision or not.
In another possible implementation, referring to fig. 11, S300, when determining that the active target has a security risk, triggering a security risk avoidance signal includes:
s340, determining that risk type information corresponding to at least one matching risk result exists in the actual key value table and the preset security risk key value table, and the risk type information is the same as the risk type information of the preliminary identification.
It can be understood that when the third security detection analysis preliminarily confirms that the security risk exists, and triggers the fourth security analysis to perform key value data verification, the actual key value table and the preset security risk key value table are compared to confirm whether at least one matched risk result exists between the actual key value table and the preset security risk key value table, the actual data is compared with the preset rule to verify that the risk exists, and if at least one matched risk result exists, whether risk type information of the matched results is identical to the risk type information of the preliminarily identified risk needs to be compared, so that basis is provided for a trigger signal, judgment accuracy is improved, and the security risk occurrence rate is reduced.
S350, determining a corresponding security risk type according to the same risk type information.
It will be appreciated that specific security risk types are determined from the same risk type information and correspondence of the security risk type signal table, and that one risk type information may correspond to one or more specific security risk types in the security risk type signal table. The safety risk type signal table is a basis table for triggering the safety risk avoidance signals, namely, according to the type of the safety risk, the safety risk avoidance signals are triggered. The security risk type table may include all possible security risk types. The list can comprise various safety risk types such as 'hyperthermia', 'tire overpressure', 'cargo humidity exceeding', 'dust explosion prone', and the like, for example, risk type information is 'high Wen Fengxian', the mapping of the risk type information to the safety risk type list can be 'hyperthermia', 'overpressure risk' mapping to the safety risk type list can be 'vehicle overweight' safety risk type, the mapping of the 'overweight risk' to the safety risk type list can be 'cargo humidity exceeding', 'explosion risk' mapping to the safety risk type list can be 'dust explosion prone' safety risk type, the specific safety risk type provides basis for triggering what signal, disorder is avoided, safety management efficiency is improved, and safety is improved. This mapping of risk type information to security risk types helps translate monitoring and analysis results into more specific security risk classifications, thereby better understanding and coping with potential security threats.
S360, triggering a preset safety risk avoidance signal according to the safety risk type.
It can be appreciated that, according to determining a specific security risk type, a preset security rule and policy of the security risk type in the security risk type signal table are triggered to trigger a corresponding security risk avoidance signal. These signals may take various forms such as an audible alarm, a flashing light signal, a GSM sms notification, etc. For example, the method can trigger a production site sound alarm to remind that the active target is too high in temperature when the safety risk type is 'over-high in temperature', trigger a production site yellow flash lamp signal to remind that the active target (vehicle) is overweight when the safety risk type is 'vehicle-mounted overweight', trigger a GSM short message to remind related personnel that the active target (cargo) is overweight when the safety risk type is 'cargo humidity exceeding standard', trigger a production site red flash lamp signal when the safety risk type is 'dust explosion-prone', and the like, but the method is not limited to the method, and the triggered signal can be set according to different scenes and different requirements to inform related personnel or systems to take appropriate measures so as to achieve the purposes of preventing the safety risk and improving the safety.
In another possible implementation manner, referring to fig. 12, S200, based on the preset information and the real-time information, performing a security detection analysis further includes:
S270, identifying the identity of the movable target according to the real-time information sent by the second sub-monitoring device.
It can be understood that in a special machine or an active area needing strict confidentiality, the second sub-monitoring device monitors an active target close to the special machine or the active area in real time, and recognizes the identity information of the active target by matching the active target in the video image with the identity information library, if no matching result is recognized between the active target and the identity information library, the type of the intrusion security risk is directly determined, if the active target and the identity information library are recognized to be in the matching result, namely, the identity information of the active target is confirmed, the active target recognized with the identity information is continuously detected and analyzed, so that the security risk prevention, personnel information recognition and security risk occurrence rate reduction are facilitated.
S280, acquiring preset information and real-time information sent by the first sub-monitoring equipment assembled by the movable target in real time according to the identified identity information of the movable target.
It can be understood that after the identity information of the movable target is identified, the information uploaded by the first sub-monitoring device assembled by the movable target can be obtained according to the identity of the movable target, and the information is used for subsequent detection and analysis, so that a direct data basis is provided for the next detection and analysis, the accuracy of the detection and analysis is guaranteed, the safety is improved, the accident occurrence rate is reduced, and the safety risk is prevented in advance.
S290, detecting authority and timing information of the movable target in real time according to preset information and real-time information sent by first sub-monitoring equipment assembled by the movable target, and judging whether the movable target has safety risk or not, wherein the authority of the movable target comprises regional access authority and machine operation authority, and the timing information is preset machine operation residual timing.
It may be understood that, according to the obtained preset information and real-time information sent by the first sub-monitoring device of the moving object assembly, the security detection analysis may be performed on the information of the moving object in real time, and an operation authority risk key value pair and an area access risk key value pair may be generated based on the actual values of the machine operation authority and the area access authority in the preset information of the moving object, where the real-time operation authority risk key value pair and the real-time area access risk key value pair may be in a data format including a key name and a key value, for example, "operation authority risk': 1"," 'regional access rights risk': 1". The timing information of the movable target can be read in real time based on the real-time information of the movable target, the timing information is a preset machine operation remaining time, namely, the dynamic remaining time of the movable target for operating the machine, the actual value of the timing information is a continuous decrementing number, the decrementing is stopped when the actual value reaches '1', for example, '5000', '4999', '4998', '0', '1', and when the timing information is detected to be smaller than 0, a trigger command is triggered to modify the machine operation authority of the first sub-monitoring device assembled by the movable target to be 0. And comparing the real-time operation authority risk key value pair with the preset operation authority risk key value pair and the preset area access risk key value pair, and judging as an 'unauthorized operation' safety risk type when the key value of the real-time area access risk key value pair is larger than or equal to the key value of the preset area access risk key value pair and the key value of the real-time operation authority risk key value pair is smaller than the key value of the preset operation authority risk key value pair, and judging as an 'unauthorized access' safety risk type when the key value of any one of the two sets of real-time key value pairs is smaller than the key value of the preset key value pair except the above.
In another possible implementation manner, S300, when determining that the active target has a security risk, triggers a security risk avoidance signal, including:
and S370, triggering a safety risk avoidance signal according to the determined safety risk type.
It can be understood that, according to the determined specific security risk type, a preset security rule and policy of the security risk type in the security risk type signal table may be triggered to trigger a corresponding security risk avoidance signal. The triggering signal can be set differently according to different scenes and demands to inform related personnel or systems to take appropriate measures, so as to achieve the purposes of preventing safety risks and improving safety.
For example, referring to fig. 13, S370, triggering a security risk avoidance signal according to the determined security risk type includes:
s371, when the type of the safety risk is judged as 'invasion', triggering a production site alarm lamp red lamp normally-on signal and an area circuit cut-off signal. The regional circuit cutting signal is used for cutting off the working circuit of the security special machine or the regional so as to stop the operation of the security special machine or the regional and realize self-locking.
It can be understood that when the determined security risk type is "intrusion", i.e. a person or an object, etc. unable to identify identity approaches a special machine or an active area needing security, a security risk avoidance signal corresponding to the security risk type is triggered, i.e. a red light normally-on signal of a production field alarm lamp and a circuit cut-off signal of the security special machine or area are notified to relevant personnel or systems to take appropriate measures, so as to achieve the purposes of eliminating security risk and improving security.
And S372, triggering a yellow lamp normally-on signal of a production field alarm lamp when the type of security risk is judged to be 'unauthorized access'.
It can be understood that when the determined security risk type is "access-free", a person or object with identity identification but no access authority is close to a special machine or an active area needing confidentiality, and a security risk avoidance signal corresponding to the security risk type, namely a yellow lamp normally-on signal of a production field alarm lamp, is triggered to inform related persons or systems to take appropriate measures, so that the purposes of eliminating security risks and improving security are achieved.
And S373, triggering a yellow lamp flashing signal of a production field alarm lamp when the type of security risk of 'unauthorized operation' is judged.
It can be understood that when the determined security risk type is "unauthorized operation", it can identify that the person or object whose identity has access authority but has no operation authority is close to the special machine or activity area needing confidentiality, and trigger the security risk avoidance signal corresponding to the security risk type, that is, the yellow lamp normally-on signal of the production field alarm lamp, so as to inform the relevant person or system to take appropriate measures, thereby achieving the purposes of eliminating security risk and improving security.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic of each process, and should not limit the implementation process of the embodiment of the present application in any way.
Corresponding to the safety production management method described in the above embodiments, the embodiments of the present application further provide a safety production management system, where each unit of the system may implement each step of the safety production management method. Fig. 14 shows a block diagram of the secure production management system provided in the embodiment of the present application, and only a portion related to the embodiment of the present application is shown for convenience of explanation.
Referring to fig. 14, the secure production management system includes:
the acquisition unit is used for acquiring preset information and real-time information of the movable target of the production site;
the detection unit is used for carrying out safety detection analysis based on preset information and the real-time information, wherein the safety detection analysis is used for detecting whether a movable target has safety risks or not;
the triggering unit is used for triggering a safety risk avoidance signal when the safety risk exists in the movable target, wherein the safety risk avoidance signal is used for prompting the movable target and/or management personnel to eliminate the safety risk.
It should be noted that, because the content of information interaction and execution process between the above units is based on the same concept as the method embodiment of the present application, specific functions and technical effects thereof may be referred to in the method embodiment section, and will not be described herein again.
It will be clear to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units is illustrated, and in practical application, the above-mentioned functional allocation may be performed by different functional units according to needs, that is, the internal structure of the safety production management system is divided into different functional units, so as to perform all or part of the above-mentioned functions. The functional units in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present application. The specific working process of the units in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
The embodiment of the application also provides a safety production management device, and fig. 15 is a schematic structural diagram of the safety production management device according to the embodiment of the application. As shown in fig. 15, the secure production management apparatus 6 of this embodiment includes: at least one processor 60 (only one is shown in fig. 15), at least one memory 61 (only one is shown in fig. 15), and a computer program 62 stored in the at least one memory 61 and executable on the at least one processor 60, which processor 60, when executing the computer program 62, causes the safety production management device 6 to implement the steps of any of the respective safety production management method embodiments described above, or causes the safety production management device 6 to implement the functions of the respective units of the respective apparatus embodiments described above.
Illustratively, the computer program 62 may be partitioned into one or more units that are stored in the memory 61 and executed by the processor 60 to complete the present application. The one or more elements may be a series of computer program instruction segments capable of performing a specific function for describing the execution of the computer program 62 in the safety production management device 6.
The safety production management device 6 may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The secure production management device may include, but is not limited to, a processor 60, a memory 61. It will be appreciated by those skilled in the art that fig. 15 is merely an example of the secure production management device 6 and is not meant to be limiting of the secure production management device 6, and may include more or fewer components than shown, or may combine certain components, or different components, such as may also include input-output devices, network access devices, buses, etc.
The processor 60 may be a central processing unit (Central Processing Unit, CPU), the processor 60 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may in some embodiments be an internal storage unit of the secure production management device 6, such as a hard disk or a memory of the secure production management device 6. The memory 61 may in other embodiments also be an external storage device of the Secure production management device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the Secure production management device 6. Further, the memory 61 may also include both an internal storage unit and an external storage device of the secure production management device 6. The memory 61 is used for storing an operating system, application programs, boot loader (BootLoader), data, other programs, etc., such as program codes of the computer program. The memory 61 may also be used for temporarily storing data that has been output or is to be output.
Embodiments of the present application also provide a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the various method embodiments described above.
Embodiments of the present application provide a computer program product for causing an electronic device to carry out the steps of any of the various method embodiments described above when the computer program product is run on the electronic device.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application implements all or part of the flow of the method of the above embodiments, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, where the computer program, when executed by a processor, may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a terminal device, a recording medium, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunication signal, and a software distribution medium. Such as a U-disk, removable hard disk, magnetic or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed secure production management system/secure production management apparatus and method may be implemented in other manners. For example, the secure production management system/secure production management device embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

1. A method of secure production management, comprising:
acquiring preset information and real-time information of an activity target of a production site;
based on the preset information and the real-time information, performing security detection analysis, wherein the security detection analysis is used for detecting whether the movable target has security risks or not;
Triggering a safety risk avoidance signal when the safety risk exists in the movable target, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk;
the obtaining the preset information and the real-time information of the activity target of the production site comprises the following steps:
receiving preset information and real-time information sent by monitoring equipment of a production site;
the receiving of the preset information and the real-time information sent by the monitoring equipment of the production site comprises the following steps:
receiving preset information and real-time information sent by first sub-monitoring equipment assembled on the movable target; the first sub-monitoring equipment comprises at least one of a monitoring bracelet, a monitoring helmet and a monitoring card;
receiving real-time information sent by second sub-monitoring equipment of a production site; the second sub-monitoring device comprises an image monitoring device, and the real-time information sent by the second sub-monitoring device comprises real-time video data reflecting the condition of the production site;
the performing security detection analysis based on the preset information and the real-time information includes:
according to preset information and real-time information sent by the first sub-monitoring equipment, performing first safety detection analysis;
When the safety risk of the movable target is preliminarily determined according to the detection result of the first safety detection analysis, performing a second safety detection analysis according to the detection result of the first safety detection analysis and the real-time video data;
finally determining whether the movable target has safety risk according to the detection result of the second safety detection analysis;
and performing a first security detection analysis according to the preset information and the real-time information sent by the first sub-monitoring device, including:
acquiring a plurality of risk type information and actual values corresponding to the risk type information according to preset information and real-time information sent by the first sub-monitoring equipment;
generating a plurality of pairs of actual key value pairs associated with the risk type information and the actual value according to the risk type information and the actual value;
generating an actual key value table formed by all the actual key value pairs according to the actual key value pairs;
matching the actual key value table with a preset security risk key value table; wherein, the actual key value pairs in the actual key value table and the preset key value pairs in the preset security risk key value table are in the same-name one-to-one correspondence;
Preliminarily determining whether the activity target has safety risk according to the matching result;
the safety detection analysis is performed based on the preset information and the real-time information, and the method further comprises the following steps:
performing a third security detection analysis according to the real-time video data;
when the safety risk of the movable target is preliminarily determined according to the detection result of the third safety detection analysis, fourth safety detection analysis is carried out according to the detection result of the third safety detection analysis and preset information and real-time information sent by the first sub-monitoring equipment;
finally determining whether the movable target has safety risk according to the detection result of the fourth safety detection analysis;
and performing a third security detection analysis according to the real-time video data, including:
smoothing the video data frame image of the real-time video data by adopting a filtering algorithm;
performing wavelet transformation processing on the smoothed video data frame image to obtain a segmented sub-image;
extracting visual features of the segmented sub-images to obtain visual feature information of the sub-images;
matching the sub-image visual characteristic information with a security risk behavior image visual characteristic library;
Determining whether the movable target has a safety risk according to the matching result;
the third security detection analysis is performed according to the real-time video data, and the method further includes:
confirming the identity identification information of the movable target according to the sub-image visual characteristic information;
when the security risk of the movable target is preliminarily determined according to the detection result of the third security detection analysis, a fourth security detection analysis is performed according to the detection result of the third security detection analysis and preset information and real-time information sent by the first sub-monitoring device, including:
when the safety risk of the movable target is preliminarily determined according to the matching result of the matching of the sub-image visual characteristic information and the safety risk behavior image visual characteristic library, acquiring preliminarily identified risk type information according to the matching result;
acquiring preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target according to the identity identification information of the movable target;
generating an actual key value table according to preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target;
Matching the actual key value table with a preset security risk key value table;
verifying the primarily identified risk type information according to a matching result of the actual key value table and the preset security risk key value table;
and finally determining whether the movable target has a safety risk according to the detection result of the fourth safety detection analysis, including:
and finally determining whether the movable target has safety risk according to the verification result.
2. The safety production management method according to claim 1, wherein when it is preliminarily determined that the moving object has a safety risk based on the detection result of the first safety detection analysis, performing a second safety detection analysis based on the detection result of the first safety detection analysis and the real-time video data, comprises:
when the safety risk of the movable target is preliminarily determined according to the matching result of the actual key value table and the preset safety risk key value table, acquiring an actual key value pair and a data head with a risk matching relationship according to the matching result;
restoring corresponding risk type information according to the actual key value pairs with the risk matching relationship;
Restoring the detected time information and position information according to the data head;
acquiring video data corresponding to the time and the position from the real-time video data according to the restored time information and the position information detected at the time;
performing video verification on the video data of the corresponding moment and position according to the restored risk type information;
and finally determining whether the movable target has a safety risk according to the detection result of the second safety detection analysis, including:
and finally determining whether the active target has safety risk according to the video verification result.
3. The method of claim 2, wherein triggering a safety risk avoidance signal when it is determined that the active target is at risk for safety, comprises:
determining that at least one risk type information obtained by the video verification is identical to the restored risk type information;
determining a corresponding safety risk type according to the same risk type information;
triggering a preset safety risk avoiding signal according to the safety risk type.
4. The method of claim 1, wherein triggering a safety risk avoidance signal when it is determined that the active target is at risk for safety comprises:
Determining that risk type information corresponding to at least one matching risk result exists between the actual key value table and the preset security risk key value table, and the risk type information is the same as the risk type information of the preliminary identification;
determining a corresponding safety risk type according to the same risk type information;
triggering a preset safety risk avoiding signal according to the safety risk type.
5. The method of claim 1, wherein the performing a security detection analysis based on the preset information and the real-time information comprises:
identifying the identity of the movable target according to the real-time information sent by the second sub-monitoring equipment;
acquiring preset information and real-time information sent by first sub-monitoring equipment assembled by the movable target in real time according to the identified identity information of the movable target;
detecting authority and timing information of the movable target in real time according to preset information and real-time information sent by first sub-monitoring equipment assembled by the movable target, and judging whether the movable target has safety risks or not, wherein the authority of the movable target comprises regional access authority and machine operation authority, and the timing information is preset machine operation residual timing.
6. The method of claim 5, wherein triggering a security risk avoidance signal when the active target is determined to be at a security risk comprises:
triggering a safety risk avoiding signal according to the determined safety risk type;
the triggering of the safety risk avoidance signal according to the determined safety risk type comprises the following steps:
when the type of safety risk of intrusion is judged, triggering a production site alarm lamp red light normally-on signal and an area circuit cut-off signal; the regional circuit cutting signal is used for cutting off the working circuit of the secret special machine or the regional so as to stop the operation of the machine and realize self-locking;
when the security risk type is judged to be "unauthorized access", a yellow lamp normally-on signal of a production field alarm lamp is triggered;
and when the type of security risk is judged to be "unauthorized operation", triggering a yellow lamp flashing signal of a production field alarm lamp.
7. A secure production management system, comprising:
the acquisition unit is used for acquiring preset information and real-time information of the movable target of the production site;
the detection unit is used for carrying out safety detection analysis based on the preset information and the real-time information, wherein the safety detection analysis is used for detecting whether the movable target has safety risk or not;
The triggering unit is used for triggering a safety risk avoidance signal when the safety risk exists in the movable target, wherein the safety risk avoidance signal is used for prompting the movable target and/or a manager to eliminate the safety risk;
wherein, the acquisition unit is further used for:
receiving preset information and real-time information sent by monitoring equipment of a production site;
the receiving of the preset information and the real-time information sent by the monitoring equipment of the production site comprises the following steps:
receiving preset information and real-time information sent by first sub-monitoring equipment assembled on the movable target; the first sub-monitoring equipment comprises at least one of a monitoring bracelet, a monitoring helmet and a monitoring card;
receiving real-time information sent by second sub-monitoring equipment of a production site; the second sub-monitoring device comprises an image monitoring device, and the real-time information sent by the second sub-monitoring device comprises real-time video data reflecting the condition of the production site;
the detection unit is further used for:
according to preset information and real-time information sent by the first sub-monitoring equipment, performing first safety detection analysis;
when the safety risk of the movable target is preliminarily determined according to the detection result of the first safety detection analysis, performing a second safety detection analysis according to the detection result of the first safety detection analysis and the real-time video data;
Finally determining whether the movable target has safety risk according to the detection result of the second safety detection analysis;
and performing a first security detection analysis according to the preset information and the real-time information sent by the first sub-monitoring device, including:
acquiring a plurality of risk type information and actual values corresponding to the risk type information according to preset information and real-time information sent by the first sub-monitoring equipment;
generating a plurality of pairs of actual key value pairs associated with the risk type information and the actual value according to the risk type information and the actual value;
generating an actual key value table formed by all the actual key value pairs according to the actual key value pairs;
matching the actual key value table with a preset security risk key value table; wherein, the actual key value pairs in the actual key value table and the preset key value pairs in the preset security risk key value table are in the same-name one-to-one correspondence;
preliminarily determining whether the activity target has safety risk according to the matching result;
the detection unit is further used for:
performing a third security detection analysis according to the real-time video data;
when the safety risk of the movable target is preliminarily determined according to the detection result of the third safety detection analysis, fourth safety detection analysis is carried out according to the detection result of the third safety detection analysis and preset information and real-time information sent by the first sub-monitoring equipment;
Finally determining whether the movable target has safety risk according to the detection result of the fourth safety detection analysis;
and performing a third security detection analysis according to the real-time video data, including:
smoothing the video data frame image of the real-time video data by adopting a filtering algorithm;
performing wavelet transformation processing on the smoothed video data frame image to obtain a segmented sub-image;
extracting visual features of the segmented sub-images to obtain visual feature information of the sub-images;
matching the sub-image visual characteristic information with a security risk behavior image visual characteristic library;
determining whether the movable target has a safety risk according to the matching result;
the third security detection analysis is performed according to the real-time video data, and the method further includes:
confirming the identity identification information of the movable target according to the sub-image visual characteristic information;
when the security risk of the movable target is preliminarily determined according to the detection result of the third security detection analysis, a fourth security detection analysis is performed according to the detection result of the third security detection analysis and preset information and real-time information sent by the first sub-monitoring device, including:
When the safety risk of the movable target is preliminarily determined according to the matching result of the matching of the sub-image visual characteristic information and the safety risk behavior image visual characteristic library, acquiring preliminarily identified risk type information according to the matching result;
acquiring preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target according to the identity identification information of the movable target;
generating an actual key value table according to preset information and real-time information sent by the first sub-monitoring equipment assembled on the corresponding movable target;
matching the actual key value table with a preset security risk key value table;
verifying the primarily identified risk type information according to a matching result of the actual key value table and the preset security risk key value table;
and finally determining whether the movable target has a safety risk according to the detection result of the fourth safety detection analysis, including:
and finally determining whether the movable target has safety risk according to the verification result.
8. A secure production management device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 6 when executing the computer program.
CN202311401972.7A 2023-10-27 2023-10-27 Safety production management method, system and equipment Active CN117132438B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311401972.7A CN117132438B (en) 2023-10-27 2023-10-27 Safety production management method, system and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311401972.7A CN117132438B (en) 2023-10-27 2023-10-27 Safety production management method, system and equipment

Publications (2)

Publication Number Publication Date
CN117132438A CN117132438A (en) 2023-11-28
CN117132438B true CN117132438B (en) 2024-01-23

Family

ID=88863218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311401972.7A Active CN117132438B (en) 2023-10-27 2023-10-27 Safety production management method, system and equipment

Country Status (1)

Country Link
CN (1) CN117132438B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007135695A1 (en) * 2006-05-18 2007-11-29 Roberto Ragazzi A control device for domotic applications
CN107609775A (en) * 2017-09-12 2018-01-19 北京必可测科技股份有限公司 A kind of active safety production risk apparatus for evaluating and method
JP2018156232A (en) * 2017-03-16 2018-10-04 i Smart Technologies株式会社 Production management device, production management system and production management method
CN113411302A (en) * 2021-05-11 2021-09-17 银雁科技服务集团股份有限公司 Network security early warning method and device for local area network equipment
CN115641229A (en) * 2022-10-31 2023-01-24 浙江浙能长兴天然气热电有限公司 Production safety management and control system of wisdom power plant
CN116307674A (en) * 2022-09-09 2023-06-23 北京脑陆科技有限公司 Security supervision method, device, system, equipment, medium and product
CN116629589A (en) * 2023-07-26 2023-08-22 华能信息技术有限公司 Safety production management system of power plant

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220230106A1 (en) * 2021-01-20 2022-07-21 Saudi Arabian Oil Company Systems and methods for asset integrity management and monitoring of safety critical elements

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007135695A1 (en) * 2006-05-18 2007-11-29 Roberto Ragazzi A control device for domotic applications
JP2018156232A (en) * 2017-03-16 2018-10-04 i Smart Technologies株式会社 Production management device, production management system and production management method
CN107609775A (en) * 2017-09-12 2018-01-19 北京必可测科技股份有限公司 A kind of active safety production risk apparatus for evaluating and method
CN113411302A (en) * 2021-05-11 2021-09-17 银雁科技服务集团股份有限公司 Network security early warning method and device for local area network equipment
CN116307674A (en) * 2022-09-09 2023-06-23 北京脑陆科技有限公司 Security supervision method, device, system, equipment, medium and product
CN115641229A (en) * 2022-10-31 2023-01-24 浙江浙能长兴天然气热电有限公司 Production safety management and control system of wisdom power plant
CN116629589A (en) * 2023-07-26 2023-08-22 华能信息技术有限公司 Safety production management system of power plant

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Early and Intelligent Bearing Fault Detection Using Adaptive Superlets;Sukanya Mitra等;《IEEE》;第23卷(第7期);第7992-8000页 *
基于逻辑结构的配电网作业风险智能辨识方法研究;喻伟军等;《微型电脑应用》;第39卷(第2期);第140-142页 *

Also Published As

Publication number Publication date
CN117132438A (en) 2023-11-28

Similar Documents

Publication Publication Date Title
JP5560397B2 (en) Autonomous crime prevention alert system and autonomous crime prevention alert method
US10657250B2 (en) Method and apparatus for detecting anomaly based on behavior-analysis
CN112653678B (en) Network security situation perception analysis method and device
CN111629181B (en) Fire-fighting life passage monitoring system and method
CN112565676A (en) Method, system and equipment for identifying violation of on-duty personnel based on intelligent camera
EP2779133A2 (en) System and method of anomaly detection
CN105006089A (en) Safety monitoring alarm method and system based on images
CN113824682A (en) Modular SCADA security situation perception system architecture
CN111652185A (en) Safety construction method, system, device and storage medium based on violation behavior recognition
EP4141715A1 (en) Anomaly detection
CN108809886A (en) A kind of computer network security guard system
CN116246416A (en) Intelligent analysis early warning platform and method for security protection
CN117132438B (en) Safety production management method, system and equipment
CN116993265A (en) Intelligent warehouse safety management system based on Internet of things
JP6978986B2 (en) Warning system, warning control device and warning method
CN108090416B (en) Intelligent financial supervision method and financial supervision system based on video analysis
CN114285596A (en) Transformer substation terminal account abnormity detection method based on machine learning
CN115100572A (en) System and method for analyzing abnormal behaviors of campus
CN113779566A (en) Computer network security situation sensing system and method
CN113721564A (en) Intelligent workshop safety management system
CN117456471B (en) Perimeter security method, perimeter security system, terminal equipment and storage medium
CN112328998A (en) Computer information security monitoring method
CN112887288B (en) Internet-based E-commerce platform intrusion detection front-end computer scanning system
CN118072255B (en) Intelligent park multisource data dynamic monitoring and real-time analysis system and method
US20230047013A1 (en) System and method for artificial intelligence (ai)-based protocol compliance tracking for workplace applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant