Font Size: a A A

The Emergency Command Model Research Of Crossing IOT Space And Cyberspace

Posted on:2017-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y P ZhangFull Text:PDF
GTID:2348330512477429Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet and gradually building of Internet of things and smart safety,websites of emergency plans,emergency resources and emergency organizations extremely enrich the emergency knowledge base.Anomaly detection and pre-warning model generated by offline mining historical sensitive data makes the event alert come true,thanks to the collections of states of emergency environment,emergency resources and emergency event.In this paper,the emergency command model crossing IOT space and cyberspace is proposed,that can integrate these Internet information and knowledge and effectively enhance the emergency command efficiency.Firstly,based on ABC ontology model as upper ontology,an emergency command model that cross IOT and cyberspace is proposed,which extends the concept of emergency,organization,scenario metadata and decision to express the concepts and knowledge of the above modelSecondly,learning from the metro traffic flow,an anomaly detection algorithm for IOT emergency is studied through combing path coding theory and KNN-Distort algorithm,which can be used for anomaly detection of metro traffic,recognizing potential emergency and giving out pre-warning after confirming.Finally,the platform framework of the cross IOT space and cyberspace emergency command is designed.The mainly function modules are developed,which mainly include resource crawl module,dynamic plan knowledge base module,emergency detection module,emergency command module and filed monitoring module.The results confirm that the model can initially realize the anomaly detection,event pre-warning and real-time state acquisition and enhance the efficiency of emergency command.
Keywords/Search Tags:Emergency Command Model, Crossing IOT Space and Cyberspace, Anomaly Detection, Plan Knowledge Base
PDF Full Text Request
Related items