Campus visitor safety analysis system based on thing networking

文档序号:1964893 发布日期:2021-12-14 浏览:14次 中文

阅读说明:本技术 基于物联网的校园访客安全分析系统 (Campus visitor safety analysis system based on thing networking ) 是由 曾勇 曾兵 孙凯 蔡兵 于 2021-11-17 设计创作,主要内容包括:本发明公开了基于物联网的校园访客安全分析系统,涉及校园安全领域,通过将来访人员分为常设来访人员与临时来访人员,使得常设来访人员能够快速通过门禁进入校园,进而提高了来访人员进入校园的效率,通过处理器将临时身份证信息以及临时面部识别信息的储存时间进行提前预设,达到预设的储存时间阈值后可以自动删除,从而限制临时来访人员后期随意进入校园,减低校园安全隐患出现的概率;通过实时监控单元对进入校园的访客进行实时监控,并将采集的监控信息发送至处理器,根据接触次数以及每次接触时的接触速度,从而判定访客之间是否出现冲突,及时作出应急反应,保护访客人身安全,进而营造安全的校园环境。(The invention discloses a campus visitor security analysis system based on the Internet of things, which relates to the field of campus security.A visitor is divided into a permanent visitor and a temporary visitor, so that the permanent visitor can quickly enter a campus through a door access, the efficiency of the visitor entering the campus is further improved, the storage time of temporary identity card information and temporary facial recognition information is preset in advance through a processor, and the temporary identity card information and the temporary facial recognition information can be automatically deleted after reaching a preset storage time threshold, so that the temporary visitor is limited to randomly enter the campus at the later stage, and the probability of occurrence of potential safety hazards of the campus is reduced; carry out real time monitoring to the visitor that gets into the campus through the real time monitoring unit to monitor information transmission with gathering sends the processor, according to the contact velocity when contact number of times and contact at every turn, thereby judges whether conflict appears between the visitor, in time makes emergent reaction, protects visitor personal safety, and then builds safe campus environment.)

1. The campus visitor safety analysis system based on the Internet of things is characterized by comprising a processor, an access control unit, a data acquisition unit, a registration login unit, a real-time monitoring unit, a safety alarm unit and a safety visitor terminal;

the access control unit is used for receiving the access control closing signal or the access control opening signal sent by the processor and closing or opening the access control according to the access control closing signal or the access control opening signal;

the real-time monitoring unit is used for monitoring visitors entering a campus in real time and sending collected monitoring information to the processor for analysis, and the monitoring information comprises contact times JC and contact speed JS;

the processor is used for analyzing the monitoring information, generating a danger signal through the analysis of the monitoring information and sending the danger signal to the safety alarm unit, wherein the danger signal comprises a non-abnormal signal, a slight abnormal signal and a severe abnormal signal;

the specific process of analyzing the monitoring information by the processor is as follows:

after the processor receives the contact times JC and the contact speed JS, substituting numerical values of the contact times JC and the contact speed JS into a formulaRisk coefficient of visitor FKiWherein a and b are proportional coefficients, a is more than b and more than 0, gamma is an error correction factor with a value of 0.98, and the processor is used for calculating the risk coefficientComparison with a preset threshold YZ:

if WX is less than 0.9YZ, generating a non-abnormal signal;

if WX is more than or equal to 0.9YZ and less than or equal to WX, generating a slight abnormal signal;

if WX is larger than YZ, generating severe abnormal information;

the processor sends the generated non-abnormal signals, light abnormal signals and heavy abnormal signals to the safety alarm unit;

the safety alarm unit is used for receiving the danger signals sent by the processor, generating alarm signals according to the danger signals and sending the alarm signals to the safety visitor terminal, wherein the alarm signals comprise primary alarm signals and secondary alarm signals;

the safety visitor terminal comprises a monitor room display and a campus manager mobile phone terminal.

2. The Internet of things-based campus visitor security analysis system of claim 1, wherein the registration login unit is configured to receive campus information, identification card information, and facial recognition information submitted by a frequent visitor through a mobile phone terminal, and send the received campus information, identification card information, and facial recognition information to the processor;

the working process of the registration login unit is as follows:

the processor marks the identity card information submitted by the mobile phone terminal as permanent identity card information, marks the facial recognition information submitted by the mobile phone terminal as permanent facial recognition information, and compares the permanent identity card information and the permanent facial recognition information with criminal case related information in a case handling system respectively.

3. The Internet of things-based campus visitor security analysis system of claim 1, wherein the data collection unit is configured to collect identification card information and facial recognition information of temporary visitors and send the collected identification card information and facial recognition information to the processor;

the working process of the data acquisition unit is as follows:

the data acquisition unit acquires temporary visitor identity card information and facial recognition information, the acquired identity card information and the acquired facial recognition information are sent to the processor for storage, the processor marks the identity card information acquired by the data acquisition unit as temporary identity card information, marks the facial recognition information acquired by the data acquisition unit as temporary facial recognition information, the processor compares the temporary identity card information with temporary facial recognition information and criminal information involved in case handling systems through the temporary identity card information, if no matching object exists, the processor keeps the temporary identity card information and the temporary facial recognition information, the storage time of the temporary identity card information and the temporary facial recognition information is set to be Tc, when Tc = Ty, the processor deletes the temporary identity card information and the temporary facial recognition information, Ty is a preset storage time threshold, if a matching object exists, the processor immediately deletes the temporary identification card information and the temporary facial recognition information.

4. The Internet of things based campus visitor security analysis system of claim 1, the access control unit comprises a metal detector and a face recognition camera, the metal detector is used for detecting whether the visitor carries the control tool, the face recognition camera is used for shooting the face of the visitor, and send the facial photo of shooting to the treater in, the treater passes through facial recognition technology with the facial recognition information of standing to establish, interim facial recognition information compares, if there is not the matching object, the treater generates entrance guard's closing signal and sends entrance guard's closing signal to entrance guard's unit, entrance guard's unit carries out the entrance guard after receiving entrance guard's closing signal and closes, if there is the matching object, the treater generates entrance guard's opening signal and opens signal transmission to entrance guard's unit with entrance guard, entrance guard's unit carries out the entrance guard after receiving entrance guard's opening signal and opens.

5. The Internet of things-based campus visitor security analysis system of claim 1, wherein the real-time monitoring unit comprises a plurality of real-time monitoring cameras installed in a campus, and the working process of the real-time monitoring unit is as follows:

the monitoring camera marks FKi, i =1 … … n and n is a positive integer sequentially according to the time sequence of visitors entering a campus, marks the number of contact times generated by each visitor in unit time as JC, marks the contact speed corresponding to the contact generated by each visitor in unit time as JS, and sends the number of contact times JC and the contact speed JS to the processor for analysis.

6. The campus visitor security analysis system based on the internet of things as claimed in claim 1, wherein the working process of the security alarm unit is as follows:

the safety alarm unit receives the non-abnormal signals, the light abnormal signals and the severe abnormal signals sent by the processor, generates first-level alarm signals according to the light abnormal signals, sends the first-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'attention' words, generates second-level alarm signals according to the severe abnormal signals, and sends the second-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'danger' words.

Technical Field

The invention relates to the field of campus security, in particular to a campus visitor security analysis system based on the Internet of things.

Background

The campus safety is closely related to each teacher and student, parents and society, in a broad sense, a campus accident refers to an artificial injury event caused by a certain accidental sudden factor of a student during a school, generally, the campus accident is responsible for the carelessness of the person and the carelessness of the person instead of the accident caused by intention, school safety work is an important component of the whole society safety work, and is directly related to whether teenagers can safely and healthily grow up, the school safety work is related to happiness peace and social stability of thousands of families, the teenagers generally look after the teacher and the like when the teenagers are in school, the safety accident is not easy to occur, but the injury of irrelevant personnel outside the school to the students is sometimes avoided, and some lawless molecular students parents take away fake students and the school sometimes takes up activities, or purchasing materials and the like, and has no way to stop foreign personnel from entering the school.

Therefore, campus safety is the most concerned thing of schools, access of foreign people of schools is one of campus safety hazards, and how to confirm and register identities of campus visitors and real-time monitoring of visitors entering the campuses is an effective means for guaranteeing campus safety.

Disclosure of Invention

In order to overcome the technical problems, the invention aims to provide a campus visitor security analysis system based on the internet of things, which comprises the following steps: through the treater, entrance guard's unit, the data acquisition unit, register the login unit and carry out identity verification with the campus visitor at first, get rid of case or criminal, later divide it into and establish visitor and interim visitor, later utilize the treater, the real time monitoring unit, safety alarm unit and safety visitor terminal carry out real time monitoring to the visitor that gets into the campus, and analysis out factor of safety, later report to the police through the safety alarm unit, in time, make emergent anti-, the problem that the foreign personnel of school visited the campus and can cause the hidden danger to the campus safety is solved.

The purpose of the invention can be realized by the following technical scheme:

the campus visitor safety analysis system based on the Internet of things comprises a processor, an access control unit, a data acquisition unit, a registration login unit, a real-time monitoring unit, a safety alarm unit and a safety visitor terminal;

the access control unit is used for receiving the access control closing signal or the access control opening signal sent by the processor and closing or opening the access control according to the access control closing signal or the access control opening signal;

the real-time monitoring unit is used for monitoring visitors entering a campus in real time and sending collected monitoring information to the processor for analysis, and the monitoring information comprises contact times JC and contact speed JS;

the processor is used for analyzing the monitoring information, generating a danger signal through the analysis of the monitoring information and sending the danger signal to the safety alarm unit, wherein the danger signal comprises a non-abnormal signal, a slight abnormal signal and a severe abnormal signal;

the specific process of analyzing the monitoring information by the processor is as follows:

after the processor receives the contact times JC and the contact speed JS, substituting numerical values of the contact times JC and the contact speed JS into a formulaRisk coefficient obtained to visitor FKiWherein a and b are proportional coefficients, a is more than b and more than 0, gamma is an error correction factor with a value of 0.98, and the processor is used for calculating the risk coefficientComparison with a preset threshold YZ:

if WX is less than 0.9YZ, generating a non-abnormal signal;

if WX is more than or equal to 0.9YZ and less than or equal to WX, generating a slight abnormal signal;

if WX is larger than YZ, generating severe abnormal information;

the processor sends the generated non-abnormal signals, light abnormal signals and heavy abnormal signals to the safety alarm unit; the formulas are obtained by acquiring a large amount of data and performing software simulation, and the coefficients in the formulas are set by the technicians in the field according to actual conditions;

the safety alarm unit is used for receiving the danger signals sent by the processor, generating alarm signals according to the danger signals and sending the alarm signals to the safety visitor terminal, wherein the alarm signals comprise primary alarm signals and secondary alarm signals;

the safety visitor terminal comprises a monitor room display and a campus manager mobile phone terminal.

As a further scheme of the invention: the registration login unit is used for receiving campus information, identity card information and facial recognition information submitted by a frequently-set visitor through a mobile phone terminal, and sending the received campus information, identity card information and facial recognition information to the processor;

the working process of the registration login unit is as follows:

the processor marks the identity card information submitted by the mobile phone terminal as permanent identity card information, marks the facial recognition information submitted by the mobile phone terminal as permanent facial recognition information, and compares the permanent identity card information and the permanent facial recognition information with criminal case related information in a case handling system respectively.

As a further scheme of the invention: the data acquisition unit is used for acquiring the identity card information and the facial recognition information of the temporary visitor and sending the acquired identity card information and the facial recognition information to the processor;

the working process of the data acquisition unit is as follows:

the data acquisition unit acquires temporary visitor identity card information and facial recognition information, the acquired identity card information and the acquired facial recognition information are sent to the processor for storage, the processor marks the identity card information acquired by the data acquisition unit as temporary identity card information, marks the facial recognition information acquired by the data acquisition unit as temporary facial recognition information, the processor compares the temporary identity card information with temporary facial recognition information and criminal information involved in case handling systems through the temporary identity card information, if no matching object exists, the processor keeps the temporary identity card information and the temporary facial recognition information, the storage time of the temporary identity card information and the temporary facial recognition information is set to be Tc, when Tc = Ty, the processor deletes the temporary identity card information and the temporary facial recognition information, Ty is a preset storage time threshold, if a matching object exists, the processor immediately deletes the temporary identification card information and the temporary facial recognition information.

As a further scheme of the invention: entrance guard's unit includes metal detector and facial recognition camera, metal detector is used for surveying whether the visitor carries the control cutter, facial recognition camera is used for shooing visitor's face, and send the facial photo of shooing to the treater in, the treater passes through facial recognition technology with the facial photo of shooing and the facial recognition information of standing, interim facial recognition information is compared, if there is not the matching object, the treater generates entrance guard and closes the signal and send entrance guard's closing signal to entrance guard's unit, entrance guard's unit carries out the entrance guard after receiving entrance guard's closing signal and closes, if there is the matching object, the treater generates entrance guard's opening signal and sends entrance guard's opening signal to entrance guard's unit, entrance guard's unit carries out entrance guard and opens after receiving entrance guard's opening signal.

As a further scheme of the invention: the real-time monitoring unit comprises a plurality of real-time monitoring cameras installed in a campus, and the working process of the real-time monitoring unit is as follows:

sequentially marking FKi by the monitoring camera for visitors entering the campus according to the time sequence, wherein i =1 … … n, n is a positive integer, marking the contact times of each visitor in unit time as JC, marking the contact speed corresponding to the contact of each visitor in unit time as JS, and sending the contact times JC and the contact speed JS to the processor for analysis; the contact made by the visitor is represented as a contact made by the visitor with other visitors after the visitor enters the campus.

As a further scheme of the invention: the working process of the safety alarm unit is as follows:

the safety alarm unit receives the non-abnormal signals, the light abnormal signals and the severe abnormal signals sent by the processor, generates first-level alarm signals according to the light abnormal signals, sends the first-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'attention' words, generates second-level alarm signals according to the severe abnormal signals, and sends the second-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'danger' words.

The invention has the beneficial effects that:

the campus visitor security analysis system based on the Internet of things carries out information registration by utilizing campus information, identity card information and facial identification information of commonly-set visitors through a registration login unit, carries out information acquisition on the identity card information and the facial identification information of temporary visitors through a data acquisition unit, thereby dividing the visitors into the commonly-set visitors and the temporary visitors, further leading the commonly-set visitors to be capable of entering the campus through a door rapidly, further improving the efficiency of the visitors entering the campus, avoiding the phenomenon that the visitors are seriously jammed at the door entrance, firstly comparing the information with case-related criminal information in a case handling system in the process of carrying out information registration by the registration login unit and carrying out information acquisition by the data acquisition unit, and excluding the possibility that the visitors are case-related and criminal, the safety of campus visitor identity has been confirmed, and the time of storage with interim ID card information and interim facial recognition information through the treater is predetermine in advance simultaneously, can delete automatically after reaching the predetermined time threshold value of storage to restriction interim visitor later stage gets into the campus at will, reduces the probability that campus potential safety hazard appears.

This campus visitor safety analytic system based on thing networking carries out real time monitoring to the visitor that gets into the campus through the real time monitoring unit, and send the monitoring information who obtains to the treater and carry out the analysis, the treater is according to contact number JC, contact speed JS generates danger signal and sends to the safety alarm unit after the analysis, the safety alarm unit generates alarm signal according to danger signal, and send alarm signal to safe visitor terminal and show, contact speed according to contact number and at every turn contact, thereby judge whether conflict appears between the visitor, the danger coefficient is greater than the threshold value, thereby judge that there is the attack between the visitor, report to the police through the safety alarm unit, in time, make emergency response, the personal safety of protection visitor, and then build safe campus environment.

Drawings

The invention will be further described with reference to the accompanying drawings.

Fig. 1 is a schematic block diagram of a campus visitor security analysis system based on the internet of things in the invention.

Detailed Description

The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

Referring to fig. 1, the embodiment is a campus visitor security analysis system based on the internet of things, and the system includes a processor, an access control unit, a data acquisition unit, a registration unit, a real-time monitoring unit, a security alarm unit, and a security visitor terminal;

the registration login unit is used for receiving campus information, identity card information and facial recognition information submitted by a frequently-set visitor through a mobile phone terminal, and sending the received campus information, identity card information and facial recognition information to the processor;

the data acquisition unit is used for acquiring the identity card information and the facial recognition information of the temporary visitor and sending the acquired identity card information and the facial recognition information to the processor;

the access control unit is used for receiving the access control closing signal or the access control opening signal sent by the processor and closing or opening the access control according to the access control closing signal or the access control opening signal;

the real-time monitoring unit is used for monitoring visitors entering a campus in real time and sending collected monitoring information to the processor for analysis, wherein the monitoring information comprises contact times JC and contact speed JS;

the processor is used for analyzing the monitoring information, generating a danger signal through the monitoring information analysis, and sending the danger signal to the safety alarm unit, wherein the danger signal comprises a non-abnormal signal, a slight abnormal signal and a severe abnormal signal;

the safety alarm unit is used for receiving the danger signals sent by the processor, generating alarm signals according to the danger signals and sending the alarm signals to the safety visitor terminal, wherein the alarm signals comprise primary alarm signals and secondary alarm signals;

the safety visitor terminal comprises a monitor room display and a campus manager mobile phone terminal.

The working process of the registration login unit is as follows:

the method comprises the steps that a frequently-set visitor submits campus information, identity card information and facial recognition information by using a mobile phone terminal, the campus information, the identity card information and the facial recognition information are sent to a processor to be stored, the identity card information submitted by the mobile phone terminal is marked as frequently-set identity card information by the processor, the facial recognition information submitted by the mobile phone terminal is marked as frequently-set facial recognition information, the processor is respectively compared with case-related criminal information in a case handling system through the frequently-set identity card information and the frequently-set facial recognition information, if no matching object exists, the registration is successful, and if the matching object exists, the registration is unsuccessful and the campus information, the frequently-set identity card information and the frequently-set facial recognition information are deleted;

frequent visitors include teachers, students and campus workers, identity card information includes identity card numbers and names, and face identification information includes face photos; the campus information comprises a teacher work number, a student number and a campus staff number; the information of the criminal involved in the case comprises the identity card number, the name and the face photo of the criminal involved in the case.

The working process of the data acquisition unit is as follows:

the data acquisition unit acquires temporary visitor identity card information and facial recognition information, the acquired identity card information and the acquired facial recognition information are sent to the processor for storage, the processor marks the identity card information acquired by the data acquisition unit as temporary identity card information, marks the facial recognition information acquired by the data acquisition unit as temporary facial recognition information, the processor compares the temporary identity card information with temporary facial recognition information and criminal information involved in case handling systems through the temporary identity card information, if no matching object exists, the processor keeps the temporary identity card information and the temporary facial recognition information, the storage time of the temporary identity card information and the temporary facial recognition information is set to be Tc, when Tc = Ty, the processor deletes the temporary identity card information and the temporary facial recognition information, Ty is a preset storage time threshold, if a matching object exists, the processor immediately deletes the temporary identification card information and the temporary facial recognition information.

Entrance guard's unit includes metal detector and facial recognition camera, metal detector is used for surveying whether the visitor carries the control cutter, facial recognition camera is used for shooing visitor's face, and send the facial photo of shooting to the treater in, the treater passes through facial recognition technology with the facial photo of shooting and the facial recognition information of standing always, interim facial recognition information is compared, if there is not the matching object, the treater generates entrance guard's closing signal and closes signal transmission to entrance guard's unit with entrance guard, the entrance guard closes after the entrance guard closing signal is received to the entrance guard's unit, if there is the matching object, the treater generates entrance guard's opening signal and opens signal transmission to the entrance guard's unit with entrance guard, the entrance guard opens after the entrance guard's opening signal is received to the entrance guard's unit.

The real-time monitoring unit is including installing a plurality of real-time monitoring camera in the campus, and the working process of real-time monitoring unit specifically as follows:

sequentially marking FKi by the monitoring camera for visitors entering the campus according to the time sequence, wherein i =1 … … n, n is a positive integer, marking the contact times of each visitor in unit time as JC, marking the contact speed corresponding to the contact of each visitor in unit time as JS, and sending the contact times JC and the contact speed JS to the processor for analysis; the contact made by the visitor is represented as a contact made by the visitor with other visitors after the visitor enters the campus.

The specific process of analyzing the monitoring information by the processor is as follows:

after the processor receives the contact times JC and the contact speed JS, substituting numerical values of the contact times JC and the contact speed JS into a formulaRisk coefficient obtained to visitor FKiWherein a and b are proportional coefficients, a is more than b and more than 0, gamma is an error correction factor with a value of 0.98, and the processor is used for calculating the risk coefficientCompared to a preset threshold YZ, e is a mathematical constant, that is, the base of the natural logarithm, approximately equal to 2.718281828, also called euler number:

if WX is less than 0.9YZ, generating a non-abnormal signal;

if WX is more than or equal to 0.9YZ and less than or equal to WX, generating a slight abnormal signal;

if WX is larger than YZ, generating severe abnormal information;

the processor sends the generated non-abnormal signals, light abnormal signals and heavy abnormal signals; to a safety alarm unit;

the above formulas are obtained by collecting a large amount of data and performing software simulation, and the coefficients in the formulas are set by those skilled in the art according to actual conditions.

The working process of the safety alarm unit is as follows:

the safety alarm unit receives the non-abnormal signals, the light abnormal signals and the severe abnormal signals sent by the processor, generates first-level alarm signals according to the light abnormal signals, sends the first-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'attention' words, generates second-level alarm signals according to the severe abnormal signals, and sends the second-level alarm signals to the monitor room display and the campus manager mobile phone terminal and displays 'danger' words.

Referring to fig. 1, the working process of the campus visitor security analysis system based on the internet of things in the embodiment is as follows:

s1: the method comprises the steps that a frequently-set visitor needs to frequently enter a campus, campus information, identity card information and face identification information are submitted by a mobile phone terminal, the campus information, the identity card information and the face identification information are sent to a processor to be stored, the identity card information submitted by the mobile phone terminal is marked as frequently-set identity card information by the processor, the face identification information submitted by the mobile phone terminal is marked as frequently-set face identification information, the processor is compared with criminal case related information in a case handling system through the frequently-set identity card information and the frequently-set face identification information respectively, if no matching object exists, the registration is successful, and if the matching object exists, the registration is unsuccessful, and the campus information, the frequently-set identity card information and the frequently-set face identification information are deleted; therefore, the frequently-set visitors and the related personnel of the frequently-set visitors take pictures through face recognition camera shooting at the access control unit, a face recognition technology is used for comparing with the frequently-set face recognition information in the processor, if a matching object exists, the processor generates an access control opening signal and sends the access control opening signal to the access control unit, the access control unit receives the access control opening signal and then opens the access control, and the frequently-set visitors enter the campus;

s2: temporary visitors need to temporarily enter a campus, firstly, campus security personnel acquire temporary visitors identity card information and face identification information by using a data acquisition unit and send the identity card information and the face identification information to a processor for storage, the processor marks the identity card information acquired by the data acquisition unit as temporary identity card information and marks the face identification information acquired by the data acquisition unit as temporary face identification information, the processor compares the temporary identity card information and the temporary face identification information with criminals involved in case handling systems through the temporary identity card information and the temporary face identification information, if no matching object exists, the processor keeps the temporary identity card information and the temporary face identification information and sets the storage time of the temporary identity card information and the temporary face identification information as Tc, and when Tc = Ty, the processor deletes the temporary identity card information and the temporary face identification information, ty is a preset storage time threshold, and if a matched object exists, the processor immediately deletes the temporary identity card information and the temporary facial recognition information; therefore, later interim visitor makes a video recording through the facial recognition of entrance guard's unit department and shoots, utilize face identification technique and the interim facial recognition information in the treater to compare, if there is the matching object, the treater generates entrance guard opening signal and sends entrance guard opening signal to the entrance guard unit, the entrance guard unit carries out the entrance guard after receiving entrance guard opening signal and opens, interim visitor gets into the campus, after the save time reaches preset save time threshold value, because interim ID card information and interim facial recognition information delete, later stage interim visitor gets into the campus and need reacquire interim visitor ID card information and facial recognition information.

S3: the system comprises a normally set visitor, a temporary visitor enters a campus, a real-time monitoring unit monitors each visitor in real time, the real-time monitoring unit marks each visitor, contact times of contact points when two or more visitors are in contact, contact speed is brought into formula calculation, risk coefficients of the visitors are obtained, the risk coefficients are compared with preset threshold values, danger signals are generated and sent to a safety alarm unit, the alarm unit receives the danger signals and generates alarm signals according to the danger signals, and the alarm signals are sent to a safety visitor terminal to be displayed, so that alarm prompt is given to a campus manager, and the campus manager can timely make emergency response.

In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

The foregoing is illustrative and explanatory only and is not intended to be exhaustive or to limit the invention to the precise embodiments described, and various modifications, additions, and substitutions may be made by those skilled in the art without departing from the scope of the invention or exceeding the scope of the claims.

10页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:巡检方法、装置、电子设备和计算机可读存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!