Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security patrol resource deployment method and system

A resource and security technology, applied in the field of security patrol resource deployment methods and systems, can solve problems such as the inability to reasonably deploy security resources, and achieve the effects of improving utilization and patrol efficiency, preventing dangerous activities, and improving efficiency.

Pending Publication Date: 2022-01-14
HARBIN INST OF TECH
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem that limited security resources cannot be reasonably deployed by adopting existing methods, and propose a security patrol resource deployment method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security patrol resource deployment method and system
  • Security patrol resource deployment method and system
  • Security patrol resource deployment method and system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0045] Specific implementation mode 1. Combination figure 1 This embodiment will be described. A security patrol resource deployment method described in this embodiment, the method specifically includes the following steps:

[0046] Step 1. Randomly generate all possible patrol schedules for the entire patrol area, and use all the randomly generated patrol schedules to create an area graph G=(V, E), where each sub-patrol area serves as the vertex V of the area graph and is at the same The connection line between the sub-patrol areas patrolled at adjacent moments in the patrol schedule is edge E; the sub-patrol area is obtained after dividing the entire patrol area, and refers to the area where a single target to be protected is located ;

[0047] The sub-patrol area in the patrol schedule is combined with the corresponding defense activities to obtain the patrol plan;

[0048] The patrol schedule refers to patrolling a certain sub-patrol area at a certain time, and then the...

specific Embodiment approach 2

[0052] Specific embodiment two: the difference between this embodiment and specific embodiment one is: the defender reward function is:

[0053]

[0054] in, Represents the reward that the defender gets when the target i selected by the attacker is in the patrol plan, Represents the penalty obtained by the defender when the target i selected by the attacker is not in the patrol plan, A ijis the effectiveness of the defender's defensive activities, that is, the probability that the patrol plan j will conduct defensive activities on the target i, is the defender's reward function value.

[0055] Effectiveness probability value A of different defense activities ij It is determined according to the duration of the activity. The longer the activity, the higher the probability of catching the attacker. If the target i is not in the patrol plan j of the patrol team, A ij is 0.

[0056] Other steps and parameters are the same as those in Embodiment 1.

specific Embodiment approach 3

[0057] Specific implementation mode three: the difference between this implementation mode and specific implementation mode one or two is: the specific process of said step two is:

[0058] Step 21. In the patrol plan, merge the sub-patrol area and the defense activities corresponding to the sub-patrol area to obtain a single micro-defender strategy;

[0059] Step 22. Denote the maximum patrol time as τ, and the shortest duration of a single defensive activity as ρ, and calculate value, where Represents rounding down, the The value of is recorded as n;

[0060] Step two and three, in each patrol plan, randomly generate a micro strategy comprising n sub-patrol areas;

[0061] If the micro-policy generated in at least one patrol plan satisfies the condition: the generated micro-policy contains n sub-patrol areas that provide the defender with the highest reward (that is, each sub-patrol area in the n sub-patrol areas provides the defender with activity with the highest re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security patrol resource deployment method and system, and belongs to the technical field of security. The problem that limited security resources cannot be reasonably deployed by adopting an existing method is solved. The reward function of the defender is defined according to the reward and punishment conditions of the defender and the attacker, the reward function value is used for prioritizing the patrol targets, and the behavior of the attacker is predicted according to the quantum response model, so that the rational opponent hypothesis in the existing research is improved. In this way, the priority of the protection target and the uncertainty of the attacker are fully considered, the microscopic strategy is formulated based on the priority of the protection target and the uncertainty of the attacker, and a complete patrol deployment plan is expanded on the basis of the formulated microscopic strategy, so that limited security resources are fully scheduled and reasonably deployed, and the efficiency of the patrol system is effectively improved. The method and system can be applied to the technical field of security and protection.

Description

technical field [0001] The invention belongs to the field of security technology, and in particular relates to a security patrol resource deployment method and system. Background technique [0002] With the rapid development of the world economy and the continuous growth of population, how to maintain public safety is the focus of the world's common concern. Maintaining public safety is not only to protect national ports, airports, transportation hubs or other important infrastructure, but also to curb the illegal flow of weapons and money, to combat urban crime and to protect wild animals, fish and rare plants from being stolen. Prey by hunters and smugglers. For example, the patent application CN106447109A proposes a method for optimizing the design of community security patrol paths based on deep learning algorithms, using Hadoop database and deep learning system to analyze the characteristic data of community security patrols, which can solve the planning problem of com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06Q50/26
CPCG06Q10/06316G06Q10/0631G06Q50/265
Inventor 王健张昕明史远
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products