施工工程现场入侵监测系统设计
Design of Intrusion Monitoring System for Construction Site
DOI: 10.12677/CSA.2022.1212277, PDF,   
作者: 金国栋, 杨 钦, 杨大健:中国建筑第八工程局有限公司,上海
关键词: 施工现场入侵监测行为识别Construction Site Intrusion Detection Behavior Recognition
摘要: 随着社会的快速发展,隐私性和保密性问题日渐受到人们的关注,在施工领域也不例外。工程项目的图纸资料、施工现场的进程与技术本身就带有一定的保密性,而一些特殊的工程项目如机场等则更具有防泄密和防入侵的需求。针对这种问题,提出一种针对施工人员泄密行为和施工现场防入侵的监测系统设计思路。在设计中,分别从网络入侵和场地入侵两方面来进行系统设计,并采用一种融合卷积神经网络和长短时记忆网络的混合深度学习模型,用于自动处理施工现场环境中的可能泄密行为,通过模型识别训练证明了算法的可行性。
Abstract: With the rapid development of society, privacy and confidentiality issues are increasingly concerned by people, and the construction field is no exception. The drawing data of the engineering project, the process of the construction site and the technology itself have a certain degree of confidentiality, and some special engineering projects such as the airport are more anti-leak and anti-intrusion needs. In order to solve this problem, this paper puts forward a design idea of monitoring system aiming at the leakage behavior of construction personnel and the intrusion prevention of construction site. In the design, two aspects of network intrusion and site intrusion were respec-tively used to design the system, and a hybrid deep learning model integrating convolutional neural network and short and long time memory network was used to automate the possible leakage behavior in the construction site environment. The feasibility of the algorithm was proved through model recognition training.
文章引用:金国栋, 杨钦, 杨大健. 施工工程现场入侵监测系统设计[J]. 计算机科学与应用, 2022, 12(12): 2736-2743. https://doi.org/10.12677/CSA.2022.1212277

参考文献

[1] 王明吉, 张勇, 李玉爽, 曹文. 单主机高精度周界入侵探测报警系统[J]. 仪器仪表学报, 2006, 27(12): 1718-1720.
[2] 乔宏章, 张军. 泄漏电缆周界监视技术研究[J]. 无线电工程, 2013, 43(3): 43-46.
[3] 刘春, 文化锋, 刘太君, 等. 辐射型泄漏电缆入侵扰动检测系统仿真与实验验证[J]. 数据通信, 2017(2): 19-22.
[4] Harman, K. (2012) Outdoor Perimeter Security Sensors a Forty Year Perspective. 2012 IEEE International Carnahan Conference on Security Technology (ICCST), Newton, 15-18 October 2012, 1-9. [Google Scholar] [CrossRef
[5] 杨怀宇. 局域网环境下计算机网络安全防护技术应用研究[J]. 网络安全技术与应用, 2018(2): 28-29.
[6] 王丽琴. 局域网环境下计算机网络安全防护技术应用探讨[J]. 计算机产品与流通, 2020(4): 57.
[7] 陈志忠. 船舶监控网络入侵检测系统设计[J]. 舰船科学技术, 2018, 40(4): 178-180.
[8] 徐慧, 方策, 刘翔, 等. 改进的飞蛾扑火优化算法在网络入侵检测系统中的应用[J]. 计算机应用, 2018, 38(11): 3231-3235+3240.
[9] 李红军. 大规模网络入侵时联合云计算技术的协同预警技术研究[J]. 自动化与仪器仪表, 2017(3): 16-18.
[10] 李威, 顾海林, 黄兴. 网络被入侵后的信号检测系统设计与优化[J]. 现代电子技术, 2017, 40(3): 58-61.
[11] 程俊, 龚俭, 杨望, 等. 基于SDN技术的网络入侵追踪与响应系统的研究[J]. 通信学报, 2018, 39(S1): 244-250.
[12] Dang, Q., Yin, J., Wang, B., et al. (2019) Deep Learning Based 2d Human Pose Estimation: A Survey. Tsinghua Science and Technology, 24, 663-676. [Google Scholar] [CrossRef
[13] Cao, Z., Simon, T., Wei, S.-E., et al. (2017) Realtime Mul-ti-Person 2d Pose Estimation Using Part Affinity Fields. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, 21-26 July 2017, 7291-7299. [Google Scholar] [CrossRef
[14] 徐晋卿, 陈唐龙, 占栋, 于龙, 冯超. 基于机器视觉的钢轨轮廓测量方法研究[J]. 传感器与微系统, 2014, 33(4): 27-30.
[15] 朱超平, 杨艺. 机器视觉中的激光智能识别技术[J]. 激光杂志, 2018, 39(8): 122-126.
[16] Noori, F.M., Wallace, B., Uddin, M.Z., et al. (2019) A Robust Human Activity Recognition Approach Using Openpose, Mo-tion Features, and Deep Recurrent Neural Network. Scandinavian Conference on Image Analysis, Norrköping, 11-13 June 2019, 299-310. [Google Scholar] [CrossRef
[17] Suzuki, S., Amemiya, Y. and Sato, M. (2019) Enhancement of Gross-Motor Action Recognition for Children by CNN with OpenPose. IECON 2019-45th An-nual Conference of the IEEE Industrial Electronics Society, Lisbon, 14-17 October 2019, 5382-5387. [Google Scholar] [CrossRef