Traditional Culture Encyclopedia - Traditional stories - In-depth analysis of the application of big data in the field of public security

In-depth analysis of the application of big data in the field of public security

In-depth analysis of the application of big data in the field of public security

In the past year or two, big data began to popularize the application of public security and other industry sectors, in addition to the industry's own special requirements, big data has also led to the development of demand for related industries. In the future, industry applications based on big data will become more in-depth, more related vendors will also be involved, big data in the field of public security business model architecture gradually clear up.

In the security segment, big data in public security and intelligent transportation to explore the application of relatively early, the relevant solutions and technologies are also more mature, in Guangxi and other places have been related to the project has landed, big data application system has been on-line operation, and achieved the expected results.

Project application prospects

In terms of relevant cases, in Guangxi Public Security Bureau put into use in the big data system, the entire project is to the autonomous region's total data as a starting point, every day in all the bayonet aisle generated by tens of millions of data, each year, about three billion pieces of data for distributed storage and rapid retrieval. On this basis, the subsequent public security users can be provided with further solutions and value-added services, such as the launch of the card crossing big data, video image big data and public security intelligence big data three solutions. These programs provide a variety of functions of the query, as well as based on the measurement and control of the analysis and base station industry services, the purpose is to enable the public security can quickly and scientifically solve the case.

In the field of intelligent transportation, at present, the main application of vehicle diversion, such as based on different roads, intersections traffic flow statistics (hourly, daily, monthly statistics, etc.), according to these statistics can be analyzed at different times of a certain road real-time traffic density, direction of development and trends, etc.. These projects have been applied in many big cities, such as usually seen on the bus in the mobile TV playing the real-time picture of the peak commuting road, is based on the technical analysis of big data. From the application point of view, users actually feel convenient and easy to use, so the market potential is very large, the future application will be more extensive.

Difficulties in the application of big data

Big data itself is for the data storage, retrieval, correlation, derivation and other valuable mining, the data itself is universal. But in the field of security, which data is useful, which is what we need to care about and extract, this is the current problem in figuring out. In other words, the current difficulty lies in how to make the combination of technical hotspots and related business in order to extract more valuable data.

Technically, there are two technical difficulties:

The first difficulty is how to extract structured data from unstructured data. The so-called unstructured data refers to the extraction of features inside the video, these may be human can not understand and can not be processed; structured data, on the other hand, can be understood and processed by humans, for example, in the video there are a few active targets, whether it is a person or a car. If it is a person, what kind of clothes are wearing; if it is a car, what is the license plate number, what kind of brand model, color, travel speed, direction and other data, these can be converted into structured data for human use. At present, a lot of security data involves video data, and video data itself is not able to be structured data, can not be directly processed by the computer. So the future in front of the technicians is how to convert video data into structured or semi-structured data that can be processed by computers.

The second difficulty is to find the connection and value between these data. There is a difference between data that is related and data that is not related, and we can only find it through tools. All these stored feature data, including the public security industry, safe city in the massive video data generated every day, can provide valuable clues for the investigation of many cases. Now the technology needs to overcome the problem is whether these data through the corresponding tool module, through big data technology to the original neglected data information associated, find or extract the correlation between these data, for the detection of cases and program decision-making to provide scientific data basis.

One-way flow of public security data

The public security industry obtains tens of millions of data every day, and how to ensure the safety of these data and information has become a hotspot of concern for the industry***. In the traditional sense, after the data is generated, the first thing to do is to ensure the security of the data itself, and there are very mature technologies and solutions in the industry. In front of the massive amount of data, if you do not understand the data, even if the data in front of you, you are also very difficult to extract useful data, but this does not serve as an excuse for the industry to ignore its importance. Because for security vendors, a lot of valuable data is needed to provide protection, that is, the data application mode to take high-specification protection measures, because once these data are mined by unscrupulous people and associated, may be the entire region's security vulnerability will be exploited.

Nowadays, the data of public security is generally run in the local area network, and there are related protection measures to provide security. For example, the data will be divided into different networks and different levels, so that the data between different network security systems, from low-security network to high-security network to implement a one-way flow, and finally in the public security of the core network to bring together all the data (this security level is the highest, through the security border, physical isolation to protect). At the same time in the periphery of the video network, mainly video data, supplemented by video-related services, these data only into the public security network only after the occurrence of correlation with other data, in order to discover some valuable data. For example, the case police in the video network, you can get the suspect's photo, but who is this person, what is his information, only after entering the public security network can be obtained, in order to match the relevant information associated with the relevant information, and then through the correlation of other databases, to further excavate which Internet cafe he appeared in, which hotel he lived in... ...All of the above information can be mined, but this mining can only be done in a high-security network, and this flow of information is unidirectional.

Future business model

From the traditional security business, or to public security customers to invest in the construction of the system, vendors to provide products and integrated solutions, and ultimately by the integrator to do the implementation of the landing, and finally delivered to the customer to use and carry out the corresponding maintenance. At the same time, the future of the industry on big data in the data acquisition, storage, analysis, processing will become more professional, the user itself in the processing and application of various difficulties may be encountered, then there may be a number of small-scale service companies for such problems, to provide a variety of end-users with a variety of professional data services. For example, professional video extraction will have a professional company to cut, with professional algorithms tools to help you extract the data inside the video, or there are those professional communications vendors for data mining and processing, including the provision of some tools and services model (the future will be more inclined to the service model). But limited to the characteristics of the public security industry, these public **** services in the public security industry is still relatively difficult to do, but the future can also be built by a number of manufacturers of the entire application system to operate the service charges with public security customers or government agencies to cooperate.

For large, especially large-scale projects, such as those involving a city, a province or even a nationwide project, generally speaking, may look for professional IT vendors to do, especially Internet companies (now also involved), they are more involved in the role of technology providers, security vendors focus on the business. This is a clearer division of labor, because even if the technology is more leading industry vendors, it is difficult or not necessary to invest a lot of R & D in the basic research and development of big data, but should focus on the basic application of big data or business solutions, and then the underlying infrastructure by the IT vendors to share the completion. Mutually beneficial **** win, sustainable development.

The above is a small number of people to share about the depth of analysis of the application of big data in the field of public security related content, more information can be concerned about the Global Green Ivy to share more dry goods