A Regional Security Situation Model Based on Space Analysis Technology

被引:0
|
作者
Chen, Yafei [1 ]
Zhang, Huan [1 ]
Luo, Xiaoyang [1 ]
Wang, Mengsi [1 ]
机构
[1] Peoples Publ Secur Univ China, Inst Informat Technol & Network Secur, Beijing 100076, Peoples R China
关键词
regional security situation; evaluation system; spatial analysis; analytic hierarchy process; REMOTE-SENSING DATA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Based on the data of GF-2 remote sensing images and GIS, this paper mainly constructs the model of regional security situation. Through the data preprocessing with the remote sensing image processing software, on the basis of the extraction of the information of vegetation, road, and water and housing construction resources, this paper constructs the evaluation index system for the regional security situation by using spatial data analysis technology. Combined with the study of the real situation of regional police information, this paper uses the expert evaluation method to normalize each detailed index, and further uses the analytic hierarchy process to get the weight value of each index. In the grid GIS spatial environment supported by computer technology, the security situation map of the study area is obtained through security indexes. A breakthrough is made when the remote sensing space technology is applied to the public security business. According to the regional security situation map, combined with the field visits in the study area, this paper provides support for the public security affairs by using the research results.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [1] Prediction Model of Network Security Situation Based on Regression Analysis
    Xia Wei-wei
    Wang Hai-feng
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 616 - 619
  • [2] Analysis of Network Security Situation Based on Principal Component Analysis and Phase Space Reconstruction
    Zhu, Wenzhi
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MACHINERY, ELECTRONICS AND CONTROL SIMULATION (MECS 2017), 2017, 138 : 942 - 947
  • [3] A Scalable Model for Network Security Situation Based on Endsley Situation Model
    Deng, ChenHao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE OF MODERN COMPUTER SCIENCE AND APPLICATIONS, 2013, 191 : 137 - 143
  • [4] RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY
    Yang, Bingyu
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1107 - 1116
  • [5] Network security situation analysis based on a dynamic Bayesian network and phase space reconstruction
    Pu Zaiyi
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (02): : 1342 - 1357
  • [6] Communication network security situation analysis based on time series data mining technology
    Jiang, Qingjian
    OPEN COMPUTER SCIENCE, 2024, 14 (01)
  • [8] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Zhang, Huanyu
    Li, Tao
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 643 - 646
  • [9] Network Security Threats Situation Assessment and Analysis Technology Study
    Cai, Xiangdong
    Yang Jingyi
    Zhang, Huanyu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 217 - 224
  • [10] Security analysis of Kerberos protocol based on the strand space model
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    Gaojishu Tongxin, 2008, 9 (909-914): : 909 - 914