Abstract

For the sake of measuring the reliability of actual face recognition system with continuous variables, after analyzing system structure, common failures, influencing factors of reliability, and maintenance data of a public security face recognition system in use, we propose a reliability evaluation model based on Continuous Bayesian Network. We design a Clique Tree Propagation algorithm to reason and solve the model, which is realized by R programs, and as a result, the reliability coefficient of the actual system is obtained. Subsequently, we verify the Continuous Bayesian Network by comparing its evaluation results with those of traditional Bayesian Network and Ground Truth. According to these evaluation results, we find out some weaknesses of the system and propose some optimization strategies by the way of finding the right remedies and filling in blanks. In this paper, we synthetically apply a variety of methods, such as qualitative analysis, quantitative analysis, theoretical analysis, and empirical analysis, to solve the unascertained causal reasoning problem. The evaluation method is reasonable and valid, the results are consistent with realities and objective, and the proposed strategies are very operable and targeted. This work is of theoretical significance to research on reliability theory. It is also of practical significance to the improvement of the system’s reliability and the ability of public order maintenance.

1. Introduction

The public security face recognition system belongs to the intelligent video surveillance system, which can identify face images automatically in policing video surveillance. As for public order maintenance in public areas, it is a type of special technical equipment, which is deployed, managed, and utilized by public security agency. The emergence of the system has epochal significance, which is another major sign of the development of the security technology. In recent years, public security agency is devoted to constructing a three-dimensional system for public order maintenance, which can combat, prevent, and control crimes. The system has been “quietly” applied, and it has become a significant part of the security system. However, the system is deployed in unconstrained real scene, which is especially vulnerable to the influence of illumination, posture, expression, occlusion, age, and other unpredictable interference factors. The reliability is quite limited [1]. As the system grows more complex, the reliability problem is becoming increasingly prominent, and it is getting a lot of attention from scholars and public security agency. The reliability has become a significant factor in system effectiveness. As an essential link of system effectiveness evaluation, reliability evaluation naturally becomes a crucial research topic of actual face recognition system.

Today, the research achievements about system reliability evaluation are few. There is no public report in the academic community. However, the research on reliability analysis of other complex systems is in the ascendant, which has become a hot spot in the research field of system engineering [2]. Many mature theoretical achievements have been accumulated. The academic research on reliability begins in World War II, when the reliability analysis evolves from electronic system and aerospace system little by little [3]. Now, it has expanded into many fields, such as communication and machinery. Common reliability analysis methods are as follows: Fault Tree Analysis, Dynamic Fault Tree, Monte Carlo Simulation, Markov Process, Fuzzy Numbers, Failure Mode Effects and Criticality Analysis, Universal Generating Function, GO Methodology, Petri Net, Reliability Block Diagram, and Binary Decision Diagrams [4]. These methods have achieved some results for the reliability analysis of systems that match corresponding conditions, but they all have harsh application conditions and demands, and the modeling or calculating process is relatively complicated. In addition, some methods are not accurate enough. Consequently, the development and the application of these methods are more or less limited.

Although the academic community has not yet developed a specific reliability analysis method for the public security face recognition system, there have been some reliability analysis methods in the security system. Lv [5] evaluates the security equipment’s reliability through fitting failure function and testing life. This method is rather complicated and time-consuming, and it only takes internal factors into account. Qu et al. [6] propose a risk evaluation indicator system and a Fuzzy Analytic Hierarchy Process model for a video surveillance system to evaluate its failure possibility, which amounts to reliability evaluation. The evaluation model is quite subjective, and most of the evaluation indicators are qualitative. Therefore, the selection of evaluation methods is the key to evaluating a system’s reliability.

In order to find the weak links that affect the system reliability and put forward some system optimization strategies, we intend to construct a comparatively objective and valid reliability evaluation method for the public security face recognition system. We make a pioneering and beneficial attempt.This work may make more or less contributions to the development of the theory and technology of reliability analysis, it may make more or less contributions to filling the theoretical gap for reliability and effectiveness analysis of the public security face recognition system, and it may attract more valuable research. Accordingly, this work has theoretical significance. Furthermore, the measurement results and optimization strategies can make public security agency grasp the actual system’s state clearly and improve its effectiveness and reliability. The study has practical significance.

2. Basic Work

The reliability requirements of the public security face recognition system are derived from public security business’s demands for system functions. Therefore, the basic task of the system reliability analysis is to analyze public security business’s demands for system functions. The analysis of the system reliability should start from analyzing functions.

2.1. Analysis of System Functions

The public security face recognition system is a combination of video surveillance technology combining with face recognition technology, which is also a booster for value and efficiency of the public security video surveillance. The main principle is to match target faces with real-time faces acquired by public security video surveillance cameras automatically with image matching technology. Today, the public security face recognition system has been a kind of crucially technical equipment for public security agency [7], and it will play an increasingly important part in public order maintenance.

Public security business’s demands for system functions generally include the following three aspects: (1) Prevention, that is, effective prevention or warning before an event. The system can play a psychological deterrent and warning role for potential criminals, preventing their criminal acts in the bud. It can also monitor the whereabouts of some key populations closely. (2) Management and control, that is to manage and control criminals timely during an event. The traditional criminal management and control mainly relies on human watch and comparison. It is a time-consuming and labor-intensive task, and it is prone to cause false positive and false negative. The system can acquire real-time face images from the video surveillance front ends. It can automatically compare these real-time face images with those of watch list to realize automatically real-time control, watching target faces in important public places at all times; once the target faces appear in these places, control terminals will automatically alarm to prompt human intervention immediately. (3) Combating, namely, the efficient technical warfare method of cracking down on criminals after an event, including video image detection and forensics. Traditional video image detection and forensics can only rely on human access, viewing, and comparison. It is heavy workload, slow, and inefficient. Furthermore, police officers are prone to visual fatigue. The system can intelligently check the identity information of criminal suspects. It can discover case clues in massive historical video images to realize deep analysis for valuable information and then find the criminal clues and evidence of suspects quickly in historical video images.

Only when a public security face recognition system has higher reliability, it can meet the above-mentioned functional demands and thus can bring about a great improvement of the effectiveness of public order maintenance. Therefore, public security business’s demands for system functions put higher requirements on the reliability. The ideal state of system operating is that the main components or links of the system can run without breakdown in all hours, and its recognition error rate is as low as possible. The actual state is that any component or link has the possibility of failure, and the recognition error rate is not satisfactory. Any failure or error can result in the failure of the whole system. The purpose of the evaluation is to quantify and grasp the failure possibility and minimize it.

2.2. Analysis of System Structure, Common Failures, and Influencing Factors of the Reliability

The public security face recognition system is similar to other face recognition systems in structure. It consists of six modules, which are acquisition subsystem, transmission subsystem, storage subsystem, identification subsystem, display subsystem, and control subsystem. The camera is a core device of the acquisition subsystem, which can acquire video images and convert them into transmittable signals. In addition, the acquisition subsystem also includes light supplement lamp, power supply, surge protective device, and mounting bracket. Common failures of the acquisition subsystem are power outage, camera malfunction, light supplement lamp breakdown, lens occlusion or deviation, etc. The transmission subsystem can transmit video image data and control signals. The transmission subsystem can be divided into two categories by the type of the signals, which are digital and analog. Currently, most transmission subsystems are digital. This paper only studies the digital system. The transmission subsystem mainly includes twisted pair or fiber, switch, and the like. Common failures of the transmission subsystem are power outage, line breakdown, electromagnetic interference, etc. The storage subsystem can store and access original video images, face models, and recognition results, whose primary task is to ensure the integrity and security of the data on the premise of ensuring the access quality. The public security face recognition system varies in storage modes depending on solutions. Most of the current systems apply the network video recorder (NVR) mode, and some of them apply the distributed storage or cloud storage mode. The storage subsystem includes storage device hardware and supporting software. Common failures of the storage subsystem are power outage, storage hardware malfunction, and software malfunction. The identification subsystem can mainly implement modeling of face features and compare models of acquired faces with those in the watch list in real time. If the similarity reaches a set threshold, the system will automatically warn. The identification subsystem includes identification device hardware and supporting software. Common failures of the identification subsystem are power outage, identification hardware malfunction, and software malfunction. The display subsystem can mainly display real-time or historical surveillance video images, operation state of the devices, recognition results, and alarm signals. The display subsystem includes display device hardware and supporting software. Common failures of the display subsystem are power outage, display hardware malfunction, and software malfunction. The control subsystem can mainly implement equipment management, authority management, scheduling code stream, switching video signal, controlling transmission, controlling network, controlling storage, and sending various application instructions. It is a core part of a public security face recognition system. The control subsystem includes control device hardware and supporting software. Common failures of the control subsystem are power outage, control hardware malfunction, and software malfunction. According to the above analysis, we can get eighteen narrow-sense influencing factors of the reliability. Due to the system’s particularity, there is a broad-sense influencing factor of the reliability that does not belong to failures, which is recognition performance. So, there are nineteen influencing factors of the reliability in total.

3. Method

The reliability of the public security face recognition system refers to the possibility that it remains in an effective or normal working state. It reflects the continuous stability that the system provides technical support to public security business. The reliability reflects a system’s running state from a quantitative perspective. Reliability evaluation is mainly to measure the possibility that the system reaches an expected state [8]. It is an unascertained causal reasoning problem. There may be some incomplete information. There are both binary and polymorphic modules, both parallel and serial modules, both independent and related modules, as well as both redundant and nonredundant modules in the system. The structure is rather complex, and the types are various. Therefore, in the light of these characteristics, an advanced and valid model should be developed to measure the system’s reliability scientifically and reasonably.

3.1. Continuous Bayesian Network

Bayesian Network is also referred to as Belief Network, which is one of the most effective theoretical models in unascertained knowledge description and reasoning. It is also one of the main and the most widely used methods of system reliability analysis [9]. It is a directed graphical description based on network structure, and it is a combination of artificial intelligence, probability theory, graph theory, and decision theory. It has become a mainstream method and research hot spot in the fields of artificial intelligence and unascertained knowledge representation and reasoning.

Bayesian Network modeling is based on a directed acyclic graph. It is a mathematical method of probabilistic reasoning, which is defined completely [10]. It expresses information elements with node variables, and it expresses the relationship between information elements with a directed edge. However, the traditional Bayesian Network can only express discrete variables. Our proposed model is called Continuous Bayesian Network, which has distinct advantages in infinite states and logic descriptions of nondeterministic failures [11]. Its advantages are as follows: (1) the Continuous Bayesian Network is a visualized model of representing unascertained causal relationship, whose ability to process unascertained information is very high; (2) the Continuous Bayesian Network can describe continuous variables; (3) the Continuous Bayesian Network can fuse multi-source information effectively; (4) the Continuous Bayesian Network modeling is simple, while reasoning objectively. Because of these advantages, this paper constructs a Continuous Bayesian Network model to measure the reliability of the public security face recognition system.

3.2. Basic Data for Evaluation

The raw data are derived from operation and maintenance records of an actual face recognition system of a public security bureau within 2 years. The system passed the acceptance test in March 2017, and it was officially put into use in April of the same year. The system has 60 high-definition cameras for face recognition, whose installation locations are distributed in large-scale markets, shopping malls, bus stations, overpasses, and other crowded places. In this paper, after counting and processing the maintenance data, we acquire some related information, such as failure time, position, module, cause, the number of image channels affected, and duration of failure. Partially statistical results are shown in Table 1. There are more than 100 times failure events in total, which, respectively, occur in the acquisition subsystem, transmission subsystem, storage subsystem, identification subsystem, display subsystem, and control subsystem, including power-off events of each subsystem. Modeling and reasoning of the Continuous Bayesian Network are based on the basic data.

3.3. Modeling

The primary task of modeling the Continuous Bayesian Network is to determine the network nodes. As for the reliability evaluation model, it is to serve the nineteen specific influencing factors as root nodes, six subsystems as internal nodes, and system reliability as a leaf node. We first form an adjacency matrix according to the relationship between influencing factors of the reliability, subsystems, and system reliability. The model framework of the Continuous Bayesian Network can be acquired through connecting relevant nodes with directed edges according to the adjacency matrix. We draw the model framework by programming in R language. The model framework is shown in Figure 1. The conditional probabilities between nodes can be determined in accordance with equation and equation , where represents a conditional probability between parent node and child node , 1 represents failure, and 0 represents no failure. When the influencing factors are narrow-sense ones, several related reliability parameters of the corresponding root nodes can be calculated or measured as follows, including failure rate, failure restoration time, cumulative time of failure restoration, and failure possibility.

(1)Failure rate

The failure rate refers to failure times of an influencing factor within a quarter, in unit of times. In order to analyze and calculate conveniently, the failure rate of each influencing factor is uniformly converted into the number of corresponding image channels affected, which is called equivalent failure rate.(2)Failure restoration time

The failure restoration time refers to the duration from the occurrence of a failure to complete restoration, namely, the invalid duration of a factor, usually in unit of minute.(3)Cumulative time of failure restoration

The cumulative time of failure restoration refers to the sum of the restoration time of a factor within a quarter, that is, the total failure time of the factor within a quarter, in unit of minute. In order to analyze and calculate conveniently, the cumulative time of failure restoration of each factor is uniformly converted into the cumulative failure time of corresponding image channels affected. Suppose that is failure rate of factor in the quarter, is the failure restoration time of the failure in the quarter, and is equivalent failure rate of the failure in the quarter. The computation equation of the cumulative time of failure restoration of in the quarter is given by(4)Failure coefficient and failure possibility

The failure coefficient refers to the proportion of a factor’s failure time in a whole quarter. According to the basic data, we can obtain failure coefficient and related parameters of each factor in each quarter. The statistical results of a quarter are shown in Table 2. The failure possibility refers to the average of failure coefficients of each factor within 2 years. It is also an estimated value of a factor’s failure probability in the case of considering failure rate and maintenance efficiency. Under the condition where failure time obeys exponential distribution, the failure possibility of factor is given bywhere is the observation value of the failure coefficient of factor in the quarter. is the total observation times. can be calculated according to the following equation:where 90 is the number of days in a quarter, 24 is the number of hours in a day, and 60 is the number of minutes in an hour, and is the total of face cameras of the system.

When the influencing factor is the broad-sense one, specifically recognition performance, the recognition error rate is used as the failure coefficient. We evaluate false-negative identification rate for the system on face recognition dataset of LFW BLUFR when false-positive identification rate equals to 1%. At this point,

For , denotes the number of samples that are predicted to be positive ones which are actually positive in the quarter and denotes the number of samples that are predicted to be negative ones which are actually positive in the same quarter. We put the computation result of equation (4) into equation (2) to get failure possibility of this factor.

Geer and Klir [12] propose “Information preserving transformation” in the process of transformation between probability and possibility, that is, the uncertainty in information remains unchanged in the process of mutual transformation between two theories. Their proposed conversion equations are as follows:

The prior probabilities of root nodes in the Continuous Bayesian Networks can be calculated through equations (5) and (6).

3.4. Reasoning

The most basic forms of Continuous Bayesian Network reasoning are causal reasoning and diagnostic reasoning. Causal reasoning is to infer a result by reasons. On the basis of the specific and known reasons—also called evidences, the occurring probability of the result under the reasons’ conditions is calculated through reasoning. It is also called top-down reasoning. Diagnostic reasoning is to infer reasons by a result. On the basis of the specific and known result information, the reasons that cause the result and corresponding probabilities are obtained through reasoning. It is also called bottom-up reasoning.

We adopt causal reasoning that is to calculate the failure probability of each subsystem in accordance with the prior probabilities of specific influencing factors in the public security face recognition system and then calculate the reliability coefficient of the whole system.

In practical applications, the structure of the Continuous Bayesian Network model is usually complicated, and the process of manual reasoning calculation is rather difficult. Therefore, automatic algorithms are needed for more efficient reasoning calculation. At present, the solution algorithms of the Continuous Bayesian Network can be divided into the exact reasoning algorithms and the approximate reasoning algorithms. The exact reasoning algorithms include Multitree Propagation, Clique Tree Propagation, and Combination Optimization. Among them, Clique Tree Propagation is most commonly used because of its accuracy, efficiency, simplicity, and applicability. The principle of the Clique Tree Propagation algorithm is to convert the Continuous Bayesian Network into another equivalent expression graph—Clique Tree, and then implement the probability reasoning and calculating through transmitting information on Clique Tree. The implementation process of the Clique Tree Propagation algorithm for single query variable is as follows (Algorithms 1 and 2).

Input: —A Continuous Bayesian Network; —A Clique Tree that covers Continuous Bayesian Network ; —Evidence variable; —Value of evidence variable; Q—A Query variable;
Output: —System reliability coefficient;
(1)Initialize with , that is, store probability distribution functions of in each node of ;
(2)In the functions of , assign value to evidence variable ;
(3)Find a Clique containing Q in , and regard it as a pivot;
(4)for (each Node C being adjacent to ) do
(5)Call subroutine CollectMessage () to get a function;
(6)end for
(7)Multiply the function obtained in the previous step and the function stored in to obtain function h () of , where ;
(8)return .
Input: —Initialized Clique Tree; —Two adjacent nodes in ;
Output: —A Function, i.e. information transmitted from to ;
(1)Let be functions stored in node , and let ;
(2)if ( is a leaf node of ) then
(3)return ;
(4)else
(5)Let be nodes that are adjacent to with the exception of ;
(6)for () do
(7)  ⟵  CollectMessage ();
(8)end for
(9)return ;
(10)end if

Then, is just a query result, that is, system reliability coefficient.

We realize the calculation and reasoning process by programming in R Language. The system’s state probabilities are acquired by running the programs. The results are shown in Figure 2. In the reasoning process, there are 8 cliques created in total. The maximal number of clique nodes is 7, and the maximal number of state spaces is 128. The reliability coefficient of the system is 0.646426.

4. Results and Discussion

The evaluation results show that the reliability coefficient of the public security face recognition system is 64.6426%. The system’s reliability is not high enough. In this state, even if a watch target appears in the field of view of any camera, the possibility of system warning is 64.6426%. For public security agency, the system plays a considerably auxiliary role in the work of public order maintenance. As shown in achievement records of the system, more than 120 suspects are successfully matched and arrested with the face recognition technology within 2 years. Compared to traditional video detection means that rely on manual comparison, the system is highly efficient. Therefore, the system’s reliability can meet the requirements of public order maintenance to a certain extent. However, the system has a failure probability of 35.3574%. Some cases may just happen in the period of system failure. On August 17, 2017, a robbery occurred at a certain bus stop, and the location of the crime is in the field of view of a face camera. However, the core switch in sever room was in power-off state. The face images of suspects were not recorded by the system but by a civil camera of a nearby mall. Consequently, the police officers on duty nearby missed the opportunity to arrest. Obviously, the higher the system reliability, the less such kind of coincidences will be. Statistically, 67 suspects are arrested by the public security bureau through the traditional video surveillance system within 2 years. We serve these 67 suspects as slipping fish through the net of the face recognition system. We calculate recall rate, , and serve it as the Ground Truth of the system reliability.

In order to verify the accuracy of the evaluation results of the Continuous Bayesian Network model, we also conduct an evaluation experiment on an existing method, traditional Bayesian Network. Firstly, we discretize the continuous node variables, then calculate the prior probabilities according to equations (7) and (8), and finally use the Clique Tree Propagation algorithm to carry out the reasoning solution. The evaluation and reasoning results of the traditional Bayesian Network model are shown in Figure 3:where is the total number of observations on the failure coefficient of influencing factor and is the number of the factor’s unreliable state.

The comparison between the Continuous Bayesian Network and the traditional Bayesian Network in evaluation results is shown in Table 3.

On the basis of the comparison, it is found that there is a large difference between the evaluation results of the traditional Bayesian Network and the Ground Truth in the system’s reliability, while the difference between the Ground Truth and the evaluation results is severely closed with the Continuous Bayesian Network. The reliability coefficient gained from the Continuous Bayesian Network approximately equals to the Ground Truth. Thus, it is proved that the Continuous Bayesian Network has obvious advantages in describing continuous reliability variables.

The original intention and purpose of reliability evaluation is to find weak links of the system based on the evaluation results and then improve it. Statistically, the system’s recognition performance has the greatest influence on its reliability, whose failure possibility accounts for 55.2757% of all the failure possibilities. For the system, first of all, its recognition performance should be improved. Specifically, optimize installation locations and parameters of face cameras, upgrade, and improve the face recognition algorithm timely. Secondly, the power of the system also has a great influence on its reliability, whose failure possibility accounts for 20.8468% of all the failure possibilities. The reliability of power supply for server room should be improved. Specifically, equip with generators for server room or increase capacity for unattended power source (UPS). Furthermore, the restoration time is a little long, resulting in a relatively high overall failure rate. There is still a large room for improvement in repair efficiency. It is necessary to improve maintenance efficiency and shorten restoration time. Specifically, send maintenance personnel that are experienced and professional rush to repair in the event of a major failure.

5. Conclusions

In this paper, we propose a new reliability evaluation method for the public security face recognition system, which is based on the Continuous Bayesian Network, and we design and realize the exact reasoning algorithm of the Continuous Bayesian Network—Clique Tree Propagation algorithm. Then, we solve and obtain the reliability coefficient of the system and compare the evaluation results of the Continuous Bayesian Network with those of traditional Bayesian Network and the Ground Truth of the system reliability. Finally, we propose some strategies for the improvement of the system’s reliability in the light of the evaluation results. Because of the many advantages of the Continuous Bayesian Network, synthetic application of various methods, such as qualitative analysis, quantitative analysis, theoretical analysis, and empirical analysis, as well as the accuracy and validity of the basic data, the evaluation is quite objective and reasonable. The evaluation comparison experiments show that the reliability evaluation model based on the Continuous Bayesian Network is more scientific and reasonable, and the evaluation results are more consistent with realities and valid. So the reliability improvement strategies are comparatively targeted and operational too. The inadequacy of this paper is that the basic data for evaluation is small because it is relatively difficult to obtain data from the public security face recognition system, and the storage period of maintenance data is very limited. If maintenance data of more systems over a longer period of time can be acquired, the evaluation results will be more convincing and persuasive. Nevertheless, this paper pushes back the frontiers of the reliability analysis, opens up a new field for Bayesian Network modeling and reasoning, and proposes a novel model. The reliability evaluation results based on the proposed model can also be used for important parameters of system effectiveness evaluation. The proposed strategies can be used for some important decision references that help the public security bureau to improve the system’s effectiveness and reliability. Accordingly, this paper has both theoretical and practical significance. In the future, we will attempt to use the experience of the multiscale methods [13, 14] to measure the system’s reliability.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

There are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the Basic Special Project of Ministry of Public Security of China (grant no. 2016GABJC01), the National Key R&D Program of China (grant no. 2016YFC0801003), and the Fundemental Research Funds of People’s Public Security University of China (grant no. 2020JWCX14).