Nothing Special   »   [go: up one dir, main page]

CN117196492A - Comprehensive security system for dam - Google Patents

Comprehensive security system for dam Download PDF

Info

Publication number
CN117196492A
CN117196492A CN202310960292.2A CN202310960292A CN117196492A CN 117196492 A CN117196492 A CN 117196492A CN 202310960292 A CN202310960292 A CN 202310960292A CN 117196492 A CN117196492 A CN 117196492A
Authority
CN
China
Prior art keywords
dam
equipment
information
generating
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310960292.2A
Other languages
Chinese (zh)
Inventor
袁江
兰增武
熊鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Yangtze Power Co Ltd
Original Assignee
China Yangtze Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Yangtze Power Co Ltd filed Critical China Yangtze Power Co Ltd
Priority to CN202310960292.2A priority Critical patent/CN117196492A/en
Publication of CN117196492A publication Critical patent/CN117196492A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The application discloses a comprehensive security system for a dam, which comprises the following steps: acquiring comprehensive security operation data of the dam at regular time, and generating alarm information when the operation data is matched with preset alarm conditions; determining target internet of things equipment within the preset space range of the alarm information, and acquiring comprehensive security target operation data of the target dam; removing false alarm information in the alarm information according to the target operation data, and generating fusion alarm information according to the alarm information with the same working scene; and generating and outputting an event analysis report corresponding to the fusion alarm information. The technical problem that the efficiency of equipment linkage is low due to the fact that abnormal information of different equipment is analyzed independently in the related technology is solved, and the technical effect of comprehensively analyzing the abnormal information and rapidly responding is achieved.

Description

Comprehensive security system for dam
Technical Field
The application relates to the technical field of dam security, in particular to a comprehensive security system for a dam.
Background
The internet of things is an important component of a new generation of information technology, and an information sensing device is used for connecting an article with the internet according to a contracted protocol to exchange information and communicate so as to realize intelligent control, identification, positioning, tracking, monitoring and management of the article.
In the related art, the dam integrates supporting equipment such as monitoring, access control, street lamps, electric power monitoring and the like into the Internet of things on a unified data platform, so that data communication and sharing among the equipment are realized, and security check and equipment management are facilitated.
Disclosure of Invention
The embodiment of the application solves the technical problem of low efficiency of equipment linkage caused by independently analyzing abnormal information of different equipment in the related technology by providing the dam comprehensive security management method, the dam comprehensive security management equipment and the computer readable storage medium, and achieves the technical effects of comprehensively analyzing the abnormal information and quickly responding.
The embodiment of the application provides a comprehensive security management method for a dam, which comprises the following steps:
acquiring comprehensive security operation data of the dam at regular time, and generating alarm information when the operation data is matched with preset alarm conditions;
determining target internet of things equipment within the preset space range of the alarm information, and acquiring comprehensive security target operation data of the target dam;
removing false alarm information in the alarm information according to the target operation data, and generating fusion alarm information according to the alarm information with the same working scene;
And generating and outputting an event analysis report corresponding to the fusion alarm information.
Optionally, the timing acquiring the comprehensive security operation data of the dam includes:
acquiring equipment information stored in an equipment library;
generating a data acquisition request according to the equipment information and the frequency corresponding to a preset time interval;
determining the Internet of things equipment corresponding to the data acquisition request;
and determining the comprehensive security transmission protocol of the dam, and acquiring the operation data of the comprehensive security of the dam through an interface corresponding to the transmission protocol.
Optionally, generating the alarm information when the operation data is matched with the preset alarm condition includes:
determining the comprehensive security work scene and equipment information of the dam;
acquiring the pre-stored preset alarm condition according to the working scene and the equipment information;
and generating the alarm information when the data value meeting the preset alarm condition exists in the operation data.
Optionally, before determining the comprehensive security and protection working scene of the dam and the equipment information, the method further includes:
obtaining error information stored in a history error log;
determining the working scene corresponding to the error information and the Internet of things equipment;
And generating the preset alarm condition corresponding to the working scene based on the error information and a preset rule, and associating the preset alarm condition with the Internet of things equipment.
Optionally, the generating and outputting the event analysis report corresponding to the fusion alarm information includes:
when the working scene is event processing, the fusion alarm information comprises monitoring data and positioning data;
carrying out data analysis on the monitoring data and the positioning data, and determining the event number, event type, event positioning and alarm details of the abnormal event;
generating an event analysis report according to the event number, the event type and the alarm details;
and acquiring map data, associating the event analysis report with the map data according to the event positioning, and generating a comprehensive management interface according to the associated map data.
Optionally, the generating and outputting the event analysis report corresponding to the fusion alarm information further includes:
when the working scene is asset management, determining equipment parameters, equipment identifiers, physical addresses and gateway addresses corresponding to the Internet of things equipment in the fusion alarm information;
Generating the comprehensive security equipment model of the dam according to the equipment parameters and the equipment identification;
map data is acquired, and the equipment model is associated with a building in the map data according to the physical address and the gateway address;
acquiring standard operation parameters, and generating the event analysis report based on the matching condition of the operation data and the standard operation parameters;
and generating a comprehensive management interface according to the event analysis report and the associated map data.
Optionally, before the timing of acquiring the comprehensive security operation data of the dam, the method further includes:
when a device access request is received, determining device information of a device to be accessed corresponding to the device access request;
acquiring an interface script corresponding to the equipment information, and adapting the equipment to be accessed through the interface script;
and distributing authority identifiers to the equipment to be accessed according to the adapting result.
Optionally, the obtaining the interface script corresponding to the device information, adapting, by using the interface script, the device to be accessed includes:
determining a standard protocol corresponding to the equipment information, and acquiring the interface script which is pre-adapted to the standard protocol;
The equipment type, the equipment model, the operating system, the gateway address and the physical address of the equipment to be accessed are stored in an associated mode;
and generating an access completion instruction based on the interface script, and accessing the equipment to be accessed to a target area corresponding to the physical address.
In addition, the application also provides dam comprehensive security management equipment, which comprises a memory, a processor and a dam comprehensive security management program which is stored in the memory and can run on the processor, wherein the steps of the dam comprehensive security management method are realized when the processor executes the dam comprehensive security management program.
In addition, the application also provides a computer readable storage medium, wherein the computer readable storage medium is stored with a dam comprehensive security management program, and the dam comprehensive security management program realizes the steps of the dam comprehensive security management method when being executed by a processor.
One or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
1. the method comprises the steps of acquiring comprehensive security operation data of the dam at fixed time, and generating alarm information when the operation data are matched with preset alarm conditions; the alarm information is corrected by taking the corresponding internet of things equipment of the alarm information as a center and integrating security operation data of other dams within a certain range so as to remove false alarm information; after screening, generating fusion alarm information according to the alarm information of the same working scene, and outputting a time analysis report corresponding to the fusion alarm information, so that the technical problem of low efficiency of equipment linkage caused by independent analysis of abnormal information of different equipment in the related technology is solved, and the technical effect of comprehensively analyzing the abnormal information and rapidly responding is realized.
2. Because the preset physical model is adopted, when the equipment is detected to request access, the corresponding model and the interface protocol are called, the equipment is accessed to the dam comprehensive security management system, the equipment is allocated with a working scene, and the physical address, the network address and the working scene are bound, the technical problem that different Internet of things equipment is required to be managed through different application programs in the related art is effectively solved, and the technical effect of low management efficiency is further achieved, and the technical effect of high-efficiency management of all dams comprehensive security through one terminal is achieved.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of a dam comprehensive security management method of the present application;
FIG. 2 is a schematic diagram of an asset management interface in a first embodiment of a dam integrated security management method according to the present application;
FIG. 3 is a schematic flow chart before step S210 in a second embodiment of the method for managing comprehensive security of a dam according to the present application;
FIG. 4 is a schematic diagram of a refinement flow of step S140 in a third embodiment of the dam comprehensive security management method of the present application;
FIG. 5 is a schematic diagram of an event handling interface in a third embodiment of a dam integrated security management method according to the present application;
fig. 6 is a schematic diagram of a hardware structure related to an embodiment of the dam comprehensive security management apparatus of the present application.
Fig. 7 is a schematic view of a dam of the present application.
Detailed Description
In the related technology, when the dam area is managed, the internet of things device is connected to the internet of things, management is carried out on a unified data platform, data communication among devices is achieved, but when data analysis and alarming are carried out, abnormal information is usually analyzed independently, and linkage among the devices cannot be achieved. The embodiment of the application adopts the main technical scheme that: and acquiring alarm information at fixed time, correcting the alarm information by acquiring operation data of other devices in the same space with the device generating the alarm, generating fusion alarm information according to a working scene, and outputting an event analysis report. Thereby realizing the technical effects of comprehensively analyzing abnormal information and quickly responding.
In order that the above-described aspects may be better understood, exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the application to those skilled in the art.
Example 1
The embodiment of the application discloses a comprehensive security management method for a dam, and referring to fig. 1, the comprehensive security management method for the dam comprises the following steps:
step S110, acquiring comprehensive security operation data of the dam at regular time, and generating alarm information when the operation data is matched with preset alarm conditions;
in this embodiment, the operation data refers to data generated by the internet of things device during operation, including collected sensing data, generated log information, and environmental monitoring data such as electric power, water conservancy, and the like. Such as the brightness, the duration of operation, the location of operation, etc. of the lighting system. Such as image, audio, and video data of the monitoring system. Such as hydro-generator operating parameters, downtime, operating records, etc.
As an alternative embodiment, step S110 includes:
step S111, obtaining equipment information stored in an equipment library;
step S112, generating a data acquisition request according to the equipment information and the frequency corresponding to a preset time interval;
step S113, determining the Internet of things equipment corresponding to the data acquisition request;
step S114, determining the comprehensive security transmission protocol of the dam, and acquiring the operation data of the comprehensive security of the dam through an interface corresponding to the transmission protocol.
As an optional implementation manner, device information stored in a device library in a management system is acquired, a data acquisition request is generated according to a gateway address and an interface in the device information and a preset time interval, an internet of things device for acquiring data is determined according to the gateway address, the physical address and a device identifier, and dam comprehensive security operation data is acquired through the interface according to a dam comprehensive security transmission protocol. And for each Internet of things device in the device library, periodically traversing to obtain one-time operation data according to the process.
When a certain section of data in the operation data is matched with the preset alarm information, the alarm information is generated according to the operation data.
When the pressure sensing device senses the pressure value fed back by the preset forbidden area, the preset alarm information is taken as an alarm pressure value range, and when the fed back pressure value is in the alarm pressure value range, the alarm information is generated according to the fed back pressure value and the space coordinates of the forbidden area.
Step S120, determining target internet of things equipment within the preset space range of the alarm information, and acquiring comprehensive security target operation data of the target dam;
In this embodiment, the preset space range is a spherical space with an arbitrary radius value centered on the internet of things device.
As an optional implementation manner, determining a physical address of the comprehensive security protection of the dam corresponding to the alarm information, determining a preset space range according to the comprehensive security protection working scene of the dam, determining a spherical space with the physical address as the center according to the preset space range, determining target internet of things equipment with the working scene identical to the internet of things equipment in the spherical space, and obtaining comprehensive security protection operation data of the target dam.
The preset space range is preset, can be a fixed value, and can also be set according to the dam comprehensive security work scene corresponding to the alarm information. For example, when the pressure sensor generates alarm information, a spherical space with a radius of 50 meters is taken as a preset space range by taking the pressure sensor as the center. And acquiring the infrared detection equipment of the pressure sensor in the preset space range, and acquiring target operation data of the infrared detection equipment.
Step S130, false alarm information in the alarm information is removed according to the target operation data, and fusion alarm information is generated according to the alarm information with the same working scene;
In this embodiment, the false alarm information may be an error information generated by a sensor failure or an alarm information generated by oversensitivity. The fused alarm information refers to alarm information generated by a plurality of internet of things devices with the same working scene aiming at the same event. One internet of things device may have a plurality of working scenarios, for example, an internet of things device of a camera system, where the working scenarios may be personnel monitoring, vehicle monitoring, or fire protection.
As an optional implementation manner, the alarm information is screened according to the target operation data, false alarm information is removed, and fusion alarm information is generated according to the screened alarm information with the same working scene. The alarm information used for generating the fusion alarm information can be acquired by the internet of things equipment with the same physical address or acquired by the internet of things equipment with different physical addresses.
For example, when the air smoke density obtained by the smoke alarms positioned on two three layers is greater than the preset density, generating alarm information with the physical address of the installation place of the smoke alarms; the working scene at the moment is fire protection, a monitoring camera 30 meters close to the physical address is obtained, and because the monitoring camera is located between floors, the target internet of things equipment is determined to be two and three layers, and the monitoring camera is located 30 meters away from the physical address, and image data of the camera are obtained; judging whether the smoke alarm gives false alarm or not according to the image data, and when the false alarm is judged, marking the alarm information as false alarm information and recording the false alarm information into a log. The judging method can be intelligent image recognition or manual screening.
Exemplary, after false alarm information in the alarm information is removed, the infrared sensors corresponding to the five-layer 502 rooms are located, and the working scene is theft prevention; and generating fusion alarm information according to alarm information generated by the monitoring cameras with antitheft working scenes and five layers of physical addresses.
Step S140, generating and outputting an event analysis report corresponding to the fusion alarm information.
In this embodiment, the event analysis report is an analysis case of the event to which the fusion alarm information points. The analysis condition of the single alarm event is not only included, but also the comprehensive condition of the alarm event in the time period, such as operation trend, alarm area distribution, alarm level duty ratio and the like.
Illustratively, for a single alarm event, the information of the event analysis report includes, but is not limited to: alarm type, alarm details, alarm location, alarm frequency, etc. For general alarm events, event analysis reports include, but are not limited to, alarm general signboards, alarm lists, alarm trends, alarm type ratios, subsystem alarm distributions, alarm level ratios, important alarm information, and the like. The event analysis report can be displayed in an integrated manner on the same display panel.
Optionally, step S140 includes:
step S141, when the working scene is asset management, determining equipment parameters, equipment identifiers, physical addresses and gateway addresses corresponding to the Internet of things equipment in the fusion alarm information;
step S142, generating the comprehensive security equipment model of the dam according to the equipment parameters and the equipment identification;
step S143, obtaining map data, and associating the equipment model with a building in the map data according to the physical address and the gateway address;
step S144, obtaining standard operation parameters, and generating the event analysis report based on the matching condition of the operation data and the standard operation parameters;
and step S145, generating a comprehensive management interface according to the event analysis report and the associated map data.
As an optional implementation manner, when the working scene is asset management, determining parameters, equipment identification, physical address and gateway address of the comprehensive security equipment of the dam in the fusion alarm information; generating a comprehensive security equipment model of the dam according to the equipment parameters and the equipment identification, wherein the equipment model is the physical appearance model of the comprehensive security of the dam; acquiring map data, wherein the map data can be a scene map after modeling or a live-action map; determining the space coordinates in the map data or the accurate position of the device model installed in the building according to the physical address and the gateway address; and acquiring standard operation data of the Internet of things equipment in normal operation, and generating an event analysis report based on a difference value and a coincidence value between the operation data and the standard operation data. And generating an asset management interface according to the event analysis report and the associated map data.
As another alternative implementation mode, after generating the event analysis report, acquiring other comprehensive security normal operation data of the dams existing in the map data, generating all comprehensive security physical models of the dams, and generating an asset management interface based on the normal and abnormal physical models and the event analysis report.
For example, when the fusion alarm information is generated by the camera, a physical model of the camera is generated, and an event analysis report corresponding to the camera is generated; according to the physical address of the camera and the gateway address, determining that the corresponding map data is an A road in a dam area, generating a live-action map of the A road, adding a physical model corresponding to the camera to a road rod corresponding to the A road, binding the camera with an event analysis report, and popping up thumbnail information of the event analysis report when a cursor moves to the camera for viewing. Meanwhile, equipment information and operation data of other cameras on the road bar are acquired, a corresponding physical model is generated, and the physical model is added to a position corresponding to the road bar to form an asset management interface shown in fig. 2.
Further, traversing all the internet of things devices, generating all the comprehensive security equipment models of the dams, and binding the corresponding point positions in the equipment models and the map data one by one according to the physical addresses corresponding to the equipment models so as to generate the comprehensive security asset management interface covering all the dams.
Optionally, before step S110, the method further includes:
step S1, when a device access request is received, determining device information of a device to be accessed corresponding to the device access request;
step S2, an interface script corresponding to the equipment information is obtained, and the equipment to be accessed is adapted through the interface script;
and step S3, distributing authority identification to the equipment to be accessed according to the adapting result.
As an optional implementation manner, when a device access request is received, device information corresponding to a device to be accessed is determined, a corresponding interface script is selected according to the device information, the device to be accessed is adapted through the interface script, so that the device to be accessed can normally operate, operation data of the device can be obtained through a management system, and a management interface is generated. And according to the adapting result, distributing corresponding permission identification to the equipment to be accessed.
Optionally, step S2 includes:
step S21, determining a standard protocol corresponding to the equipment information, and acquiring the interface script which is pre-adapted to the standard protocol;
step S22, the equipment type, the equipment model, the operating system, the gateway address and the physical address of the equipment to be accessed are stored in an associated mode;
Step S23, an access completion instruction is generated based on the interface script, and the equipment to be accessed is accessed to the target area corresponding to the physical address.
As an optional implementation manner, determining a standard protocol corresponding to the equipment information, wherein the standard protocol is associated with a pre-adapted interface script, and storing the equipment type, the equipment model, the operating system, the gateway address and the physical address of the equipment to be accessed in an associated manner; and accessing the equipment to be accessed based on the interface script, and generating an access completion instruction after completing the access, wherein the equipment to be accessed is accessed to the target area corresponding to the gateway address and the physical address through the instruction.
Optionally, step S3 includes:
step S31, determining equipment attributes of the equipment to be accessed according to the adapting result, wherein the equipment attributes comprise public equipment and private equipment;
in this embodiment, the adapting result includes information such as an attribute of the device, a target area, a working scenario, information of the device, and an associated user added to the device to be accessed after the adapting is successful.
Step S32, generating the permission identification according to the target area, the gateway address and the equipment attribute corresponding to the adapting result;
And step S33, storing the adapting result, the equipment information and the authority identification in an associated mode.
As an optional implementation manner, whether the device to be accessed belongs to public device or private device is determined according to the adapting result, and the permission identifier of the device is generated according to the target area, gateway address and device attribute allocated by the installation site of the device to be accessed. The permission identifier is used for representing the working range of the equipment, and belongs to public equipment, private equipment and the like. And when the authority corresponding to the terminal sending the data acquisition instruction is matched with the dam comprehensive security authority identification, acquiring corresponding dam comprehensive security operation data. And storing the adaptation result, the equipment information and the permission identification in an associated mode.
The technical scheme provided by the embodiment of the application at least has the following technical effects or advantages:
the method comprises the steps of acquiring comprehensive security operation data of the dam at fixed time, and generating alarm information when the operation data are matched with preset alarm conditions; the alarm information is corrected by taking the corresponding internet of things equipment of the alarm information as a center and integrating security operation data of other dams within a certain range so as to remove false alarm information; after screening, generating fusion alarm information according to the alarm information of the same working scene, and outputting a time analysis report corresponding to the fusion alarm information, so that the technical problem of low efficiency of equipment linkage caused by independent analysis of abnormal information of different equipment in the related technology is solved, and the technical effect of comprehensively analyzing the abnormal information and rapidly responding is realized.
Example two
Based on the first embodiment, the second embodiment of the present application provides a comprehensive security management method for a dam, and step S110 includes:
step S210, determining comprehensive security work scenes and equipment information of the dam;
step S220, obtaining pre-stored preset alarm conditions according to the working scene and the equipment information;
and step S230, when the data value meeting the preset alarm condition exists in the operation data, generating the alarm information.
In this embodiment, the preset alarm condition may not be a fixed value or a fixed interval corresponding to each type of the internet of things device. For each internet of things device, the associated preset scene may not be unique.
As an optional implementation manner, determining comprehensive security working scenes and equipment information of the dam, and when the comprehensive security working scenes of the dam are not unique, respectively acquiring pre-stored preset alarm conditions according to each working scene and corresponding equipment information; when the running data has intersection with the data value or the data interval corresponding to any one preset alarm condition, generating alarm information under the working scene corresponding to the preset alarm condition.
As another alternative implementation manner, the internet of things device may have different operation data according to different working scenarios; or the same operation data under different working scenes.
Optionally, referring to fig. 3, before step S210, the method further includes:
step S240, obtaining error information stored in a history error log;
step S250, determining the working scenario and the internet of things device corresponding to the error information;
step S260, generating the preset alarm condition corresponding to the working scenario based on the error information and a preset rule, and associating the preset alarm condition with the internet of things device.
In this embodiment, the preset alarm condition may be continuously and automatically adjusted along with the operation of the internet of things device and the management system. For example, some preset alarm conditions make the internet of things device too sensitive, and when false alarm information based on the preset alarm conditions is too much, the preset alarm conditions are automatically adjusted.
As an optional implementation manner, alarm information generated in the running process of the Internet of things equipment is stored into a historical error log as error information after the error report information is deleted. And obtaining error information stored in the historical error log, generating preset alarm conditions according to the error information and manually set alarm rules, and storing the preset alarm conditions, working scenes corresponding to the error information and corresponding Internet of things equipment in an associated mode.
Illustratively, error information about the pressure sensor is obtained in a historical error log. When the working scene is a prohibited touch area, the error information is that the pressure value is 0.8 newton, but no touch is detected, and the error information is raindrops or insects, when the frequency of the error information is greater than a preset threshold value, for example, greater than 10 times per week, the preset alarm condition is adjusted according to the recorded information. If the original preset alarm condition is greater than or equal to 0.5 newton, the preset alarm condition is adjusted to be greater than or equal to 1 newton according to the error information.
Updating preset alarm conditions according to historical error information, and determining comprehensive security work scenes and equipment information of the dam; acquiring pre-stored preset alarm conditions according to the working scene and the equipment information; and generating alarm information when the data value meeting the preset alarm condition exists in the operation data. Therefore, the technical problem of excessive false alarm information in the related technology is effectively solved, and the technical effect of effectively reducing the number of false alarm information is further realized.
Example III
Based on the first embodiment, the third embodiment of the present application provides a method for managing comprehensive security of a dam, referring to fig. 4, step S140 further includes:
Step S310, when the working scene is event processing, the fusion alarm information comprises monitoring data and positioning data;
step S320, carrying out data analysis on the monitoring data and the positioning data, and determining the event number, event type, event positioning and alarm details of the abnormal event;
step S330, generating an event analysis report according to the event number, the event type and the alarm details;
step S340, obtaining map data, associating the event analysis report with the map data according to the event positioning, and generating a comprehensive management interface according to the associated map data.
In the present embodiment, the working scenario includes, but is not limited to, event processing, asset management, vehicle management, energy consumption management, and the like. And carrying out integration analysis on the alarm information and the operation data of different working scenes so as to output different comprehensive management interfaces. The monitoring data are real-time video data of the place where the abnormal event occurs.
As an optional implementation manner, when the working scene is event processing, the fusion alarm information includes alarm information, positioning data and real-time video data; carrying out data analysis on the information and the data, and determining the number of the events of the abnormal events, the event types of the abnormal events, the positioning of the abnormal events and the detailed information of the alarms; and generating an analysis report of the abnormal event based on the number of the events, the event types and the alarm details, wherein the content of the analysis report comprises, but is not limited to, alarm trend, alarm type duty ratio, subsystem alarm distribution, alarm level duty ratio, important alarm full-screen popup window reminding and the like. The event analysis report, the real-time video data, and the map data are correlated to generate an event processing interface as shown in fig. 5.
The map model is pre-established based on the dam area, after the fusion alarm data is received, the place where the abnormal event occurs, the abnormal details and the real-time video data of the place are determined, the data are marked in the map data, and the point corresponding to the place is marked, so that when the point is touched on the display screen, the corresponding abnormal detail information and the real-time video data of the point can be displayed. Meanwhile, based on the real-time generation of alarm information, an abnormal information alarm panel is generated, parameters such as the frequency, the type and the like of alarm are analyzed, so that normal operation equipment and abnormal operation equipment in a dam area are comprehensively displayed through a display panel, a manager can intuitively find out which abnormal event occurs at an accurate position in the dam area, and the processing efficiency is improved.
Because the method adopts the real-time video data corresponding to the positioning data and based on the positioning data, the fusion alarm information is fused in the map data for displaying the corresponding point positions, the number, the type and the frequency of the abnormal events are monitored in real time, further an event analysis report is generated, and a suggestion is provided for the management of the dam area according to the event analysis report. Therefore, the technical problem that the efficiency of equipment linkage is low due to the fact that abnormal information of different equipment is independently analyzed in the related technology is effectively solved, and the technical effects of comprehensively analyzing the abnormal information and quickly responding are achieved.
The application further provides dam comprehensive security management equipment, and referring to fig. 6, fig. 6 is a schematic structural diagram of the dam comprehensive security management equipment of the hardware operation environment according to the embodiment of the application.
As shown in fig. 6, the dam integrated security management apparatus may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a high-speed random access Memory (RandomAccess Memory, RAM) Memory or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the dam integrated security management apparatus, and may include more or fewer components than shown, or certain components may be combined, or a different arrangement of components.
Optionally, the memory 1005 is electrically connected to the processor 1001, and the processor 1001 may be configured to control operation of the memory 1005, and may also read data in the memory 1005 to implement comprehensive security management of the dam.
Optionally, as shown in fig. 6, an operating system, a data storage module, a network communication module, a user interface module, and a dam comprehensive security management program may be included in the memory 1005 as one storage medium.
Optionally, in the dam integrated security management apparatus shown in fig. 6, the network interface 1004 is mainly used for data communication with other apparatuses; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the dam integrated security management apparatus of the present application may be provided in the dam integrated security management apparatus.
As shown in fig. 6, the dam integrated security management apparatus invokes, through a processor 1001, a dam integrated security management program stored in a memory 1005, and executes related steps of the dam integrated security management method provided by the embodiment of the present application:
acquiring comprehensive security operation data of the dam at regular time, and generating alarm information when the operation data is matched with preset alarm conditions;
Determining target internet of things equipment within the preset space range of the alarm information, and acquiring comprehensive security target operation data of the target dam;
removing false alarm information in the alarm information according to the target operation data, and generating fusion alarm information according to the alarm information with the same working scene;
and generating and outputting an event analysis report corresponding to the fusion alarm information.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
acquiring equipment information stored in an equipment library;
generating a data acquisition request according to the equipment information and the frequency corresponding to a preset time interval;
determining the Internet of things equipment corresponding to the data acquisition request;
and determining the comprehensive security transmission protocol of the dam, and acquiring the operation data of the comprehensive security of the dam through an interface corresponding to the transmission protocol.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
determining the comprehensive security work scene and equipment information of the dam;
acquiring the pre-stored preset alarm condition according to the working scene and the equipment information;
And generating the alarm information when the data value meeting the preset alarm condition exists in the operation data.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
obtaining error information stored in a history error log;
determining the working scene corresponding to the error information and the Internet of things equipment;
and generating the preset alarm condition corresponding to the working scene based on the error information and a preset rule, and associating the preset alarm condition with the Internet of things equipment.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
when the working scene is event processing, the fusion alarm information comprises monitoring data and positioning data;
carrying out data analysis on the monitoring data and the positioning data, and determining the event number, event type, event positioning and alarm details of the abnormal event;
generating an event analysis report according to the event number, the event type and the alarm details;
and acquiring map data, associating the event analysis report with the map data according to the event positioning, and generating a comprehensive management interface according to the associated map data.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
when the working scene is asset management, determining equipment parameters, equipment identifiers, physical addresses and gateway addresses corresponding to the Internet of things equipment in the fusion alarm information;
generating the comprehensive security equipment model of the dam according to the equipment parameters and the equipment identification;
map data is acquired, and the equipment model is associated with a building in the map data according to the physical address and the gateway address;
acquiring standard operation parameters, and generating the event analysis report based on the matching condition of the operation data and the standard operation parameters;
and generating a comprehensive management interface according to the event analysis report and the associated map data.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
when a device access request is received, determining device information of a device to be accessed corresponding to the device access request;
acquiring an interface script corresponding to the equipment information, and adapting the equipment to be accessed through the interface script;
And distributing authority identifiers to the equipment to be accessed according to the adapting result.
Optionally, the processor 1001 may call the dam comprehensive security management program stored in the memory 1005, and further perform the following operations:
determining a standard protocol corresponding to the equipment information, and acquiring the interface script which is pre-adapted to the standard protocol;
the equipment type, the equipment model, the operating system, the gateway address and the physical address of the equipment to be accessed are stored in an associated mode;
and generating an access completion instruction based on the interface script, and accessing the equipment to be accessed to a target area corresponding to the physical address.
In addition, the embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium is stored with a dam comprehensive security management program, and the dam comprehensive security management program realizes the relevant steps of any embodiment of the dam comprehensive security management method when being executed by a processor.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. The dam comprehensive security management method is characterized by comprising the following steps of:
acquiring comprehensive security operation data of the dam at regular time, and generating alarm information when the operation data is matched with preset alarm conditions;
determining target internet of things equipment within the preset space range of the alarm information, and acquiring comprehensive security target operation data of the target dam;
removing false alarm information in the alarm information according to the target operation data, and generating fusion alarm information according to the alarm information with the same working scene;
And generating and outputting an event analysis report corresponding to the fusion alarm information.
2. The dam integrated security management method as set forth in claim 1, wherein the periodically acquiring dam integrated security operation data includes:
acquiring equipment information stored in an equipment library;
generating a data acquisition request according to the equipment information and the frequency corresponding to a preset time interval;
determining the Internet of things equipment corresponding to the data acquisition request;
and determining the comprehensive security transmission protocol of the dam, and acquiring the operation data of the comprehensive security of the dam through an interface corresponding to the transmission protocol.
3. The dam integrated security management method as set forth in claim 1, wherein the generating the alarm information when the operation data matches with a preset alarm condition comprises:
determining the comprehensive security work scene and equipment information of the dam;
acquiring the pre-stored preset alarm condition according to the working scene and the equipment information;
and generating the alarm information when the data value meeting the preset alarm condition exists in the operation data.
4. The dam integrated security management method as set forth in claim 3, wherein before determining the dam integrated security work scene and the equipment information, further comprises:
Obtaining error information stored in a history error log;
determining the working scene corresponding to the error information and the Internet of things equipment;
and generating the preset alarm condition corresponding to the working scene based on the error information and a preset rule, and associating the preset alarm condition with the Internet of things equipment.
5. The dam comprehensive security management method of claim 1, wherein the generating and outputting the event analysis report corresponding to the fusion alarm information comprises:
when the working scene is event processing, the fusion alarm information comprises monitoring data and positioning data;
carrying out data analysis on the monitoring data and the positioning data, and determining the event number, event type, event positioning and alarm details of the abnormal event;
generating an event analysis report according to the event number, the event type and the alarm details;
and acquiring map data, associating the event analysis report with the map data according to the event positioning, and generating a comprehensive management interface according to the associated map data.
6. The dam comprehensive security management method of claim 1, wherein the generating and outputting the event analysis report corresponding to the fusion alarm information further comprises:
When the working scene is asset management, determining equipment parameters, equipment identifiers, physical addresses and gateway addresses corresponding to the Internet of things equipment in the fusion alarm information;
generating the comprehensive security equipment model of the dam according to the equipment parameters and the equipment identification;
map data is acquired, and the equipment model is associated with a building in the map data according to the physical address and the gateway address;
acquiring standard operation parameters, and generating the event analysis report based on the matching condition of the operation data and the standard operation parameters;
and generating a comprehensive management interface according to the event analysis report and the associated map data.
7. The dam integrated security management method as set forth in claim 1, wherein before the timing of obtaining the dam integrated security operation data, further comprising:
when a device access request is received, determining device information of a device to be accessed corresponding to the device access request;
acquiring an interface script corresponding to the equipment information, and adapting the equipment to be accessed through the interface script;
and distributing authority identifiers to the equipment to be accessed according to the adapting result.
8. The dam comprehensive security management method of claim 7, wherein the obtaining the interface script corresponding to the device information, and adapting the device to be accessed through the interface script, comprises:
determining a standard protocol corresponding to the equipment information, and acquiring the interface script which is pre-adapted to the standard protocol;
the equipment type, the equipment model, the operating system, the gateway address and the physical address of the equipment to be accessed are stored in an associated mode;
and generating an access completion instruction based on the interface script, and accessing the equipment to be accessed to a target area corresponding to the physical address.
9. The dam comprehensive security management device is characterized by comprising a memory, a processor and a dam comprehensive security management program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the dam comprehensive security management method according to any one of claims 1 to 8 when executing the dam comprehensive security management program.
10. A computer readable storage medium, wherein a dam integrated security management program is stored on the computer readable storage medium, and the dam integrated security management program realizes the steps of the dam integrated security management method according to any one of claims 1 to 8 when executed by a processor.
CN202310960292.2A 2023-08-01 2023-08-01 Comprehensive security system for dam Pending CN117196492A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310960292.2A CN117196492A (en) 2023-08-01 2023-08-01 Comprehensive security system for dam

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310960292.2A CN117196492A (en) 2023-08-01 2023-08-01 Comprehensive security system for dam

Publications (1)

Publication Number Publication Date
CN117196492A true CN117196492A (en) 2023-12-08

Family

ID=88985918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310960292.2A Pending CN117196492A (en) 2023-08-01 2023-08-01 Comprehensive security system for dam

Country Status (1)

Country Link
CN (1) CN117196492A (en)

Similar Documents

Publication Publication Date Title
CN116155694B (en) Method and device for managing internet of things equipment and readable storage medium
US10810676B2 (en) Method and apparatus for increasing the density of data surrounding an event
CN112787992B (en) Method, device, equipment and medium for detecting and protecting sensitive data
CN116777713B (en) Intelligent park safety management method and system based on data analysis
CN109164780A (en) A kind of industrial field device control method based on edge calculations, apparatus and system
WO2014138677A1 (en) Predictive analysis using vehicle license plate recognition
CN113095132B (en) Neural network based gas field identification method, system, terminal and storage medium
US12061769B2 (en) Systems and methods for managing security events using a graphical user interface
CN116362445B (en) Multi-terminal-oriented intelligent city digital twin map management system
CN112291264B (en) Security control method, device, server and storage medium
CN112671767A (en) Security event early warning method and device based on alarm data analysis
CN115967821A (en) Video cloud storage method, device, equipment and storage medium
CN110505438B (en) Queuing data acquisition method and camera
CN112257546B (en) Event early warning method and device, electronic equipment and storage medium
JP2009239507A (en) Monitoring system
CN110324588B (en) Video analysis warning event information storage method based on dictionary structure
CN117196492A (en) Comprehensive security system for dam
CN114253518B (en) Intelligent project management method and system
KR20090132812A (en) Methods and devices for interlocking process of sensors and events
WO2022218001A1 (en) Video analysis method and related system
CN116224809A (en) Non-invasive intelligent home digital evidence obtaining system and method based on strategy model
CN113395234B (en) Method and device for detecting flow hijacking of popularization information
CN108319852B (en) Event discrimination strategy creating method and device
CN111696290A (en) Security decision method and device, computing equipment and computer storage medium
TWI784718B (en) Method and system for processing alarm event in factory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination