Virtual Reality Technology Based on Embedded Image System Simulates Urban Disasters

At present, urban disasters are generally valued by various companies and organizations. Although many companies claim to have effectively tested their urban disaster recovery plans, the effectiveness, completeness, and efficiency of their test plans still exist in many aspects. Therefore, it is very important to effectively check the city's disaster recovery plan. Nowadays, both the scientific research community and the industrial community have paid enough attention and research to urban disaster backup. This is a shield of a guaranteed simulation system. The research in this paper belongs to the category of urban disaster virtual reality technology. Urban disaster virtualization is an integral part of virtual reality technology in the current information technology field. Based on the embedded image system, this article divides the virtualization of urban disasters into two meanings: one is to virtualize various disasters into one type of disaster, so as to focus attention on the process and mechanism of disasters on the information system. The meaning is to virtualize different disaster response methods in the standard process, and all links are interrelated and interdependent so that the highest level of disaster response can be implemented. The main goal of disaster virtualization is to integrate different disasters into a comprehensive model. This paper studies urban disasters through embedded image systems and uses virtual reality technology to establish a simulation system to complete the test.


Introduction
At present, society pays great attention to all aspects of urban disasters, and at the same time, they have carried out preplans [1]. Many companies or organizations have conducted comprehensive tests on urban disaster recovery plans and have a complete set of procedures, but almost half of the tests are unsuccessful [2].
is phenomenon has led to many negative effects such as increased risks, increased costs, and impacts on corporate brands, customer experience, and customer loyalty [3]. Although many companies consider it very important to test urban disaster plans, there are still many IT personnel who have not worked out effective methods to improve the test plan, and one of the ideas for testing urban disaster recovery plans is the urban simulation system and the disaster-to-information system [4]. Since we only focus on the impact of the disaster on the information system, rather than the disaster itself, as long as we know what impact the disaster has on the information simulation system, we can simulate the disaster [5]. In this way, the verification of the disaster recovery plan comes down to the simulation of the disaster [6]. erefore, the urban disaster simulator designed in this paper relies on virtual reality technology to simulate the impact of fire, earthquake, and network information on the urban system [7]. It is more detailed, more comprehensive, and more effective than direct conversion to verify the disaster backup mechanism [8].
e disaster simulator is divided into three main modules: LAN IP address, disaster evolution module, and disaster on information system impact module. e LAN IP address module uses tools to find IP addresses and select nodes for simulation; the disaster evolution module uses FLEX technology to simulate disaster evolution process, dynamic simulation of the impact of time and space on the outbreak of disasters; the disaster impact module on the information system uses the schtasks statement in the DOS statement, which is intended to connect to the target node remotely, then copy the simulated program, and finally execute it on the target node of the system the disaster simulation program is used to simulate the consequences of a disaster, so as to simulate the impact of the disaster on the information system. e main research work of this paper is to simulate the occurrence, development, and impact of urban disasters on the information system. en, based on the embedded image system, the evacuation problem is studied [9]. is is an important safety factor in modern society and has attracted attention from all walks of life [10]. Aiming at the evacuation of people in urban disaster emergencies, combined with the uncertain factors in the evacuation process, a multiagent-based evacuation simulation model is established in a multidisaster environment in order to study the laws of people's behavior in disasters [11].

Related Work
e literature shows the general requirements of disaster simulators and the knowledge and technologies involved in this article, namely, JavaScript, JBoss, JSP, FLEX. e literature proposes a crowd evacuation simulation system in a multihazard environment and conducts a simulation test for the evacuation of the system [12]. e simulation results show that the system better demonstrates the impact of the disaster environment on the evacuation of the people, and the simulation effect on the evacuation is more realistic [13]. It embodies the scientificity and rationality of the crowd evacuation model and establishes a mathematical model based on current disasters [14]. Fire, explosion, and the spread of irritating toxic smoke are the main disasters.
is model focuses on the impact of fire and explosion sound on human health and establishes a human perception model and makes it as true as possible based on the actual location of each person. e information is imitated that people can perceive in the environment. e literature shows that FEKO creates a true and false target model in the SAR image, and according to the simulation results, starting from the scattering mechanism, it analyzes the effect of the difference in the geometric structure of the true and false target on the echo scattering [15]. According to the analysis result, a method is proposed. Combining the target feature extraction algorithm of gray and texture, the validity of SAR image authenticity target recognition is determined. e literature shows the definition and characteristics of virtual reality technology and its application advantages in urban disasters, as well as the definition of disaster process exploration mode and disaster processing mode steps [16]. A lot of research on the theoretical basis of virtual city disaster platform research has also been carried out. e literature shows the concept and meaning of unit testing, integration testing, and system testing, and lists some test cases, evaluates the final test results, and compares them with similar solutions and similar products, and finally shows the development and operating environment of the system.

Embedded Image System and Virtual
Reality Technology

Embedded Image System
3.1.1. Embedded System. e development of the embedded system from centralized to a system application platform, open system structure, resource service, intelligent management decision, and green direction is not only a technical upgrade but also meets the needs of practical applications. e system architecture is not only highly modular but also supports reconstruction, modification, and expansion. Chinese universities and scientific research institutes have accumulated some research foundations in embedded systems and reliability calculations, and some scientific research institutions have accumulated rich research experience in embedded systems and microprocessors. Based on the strategy of vigorously developing the advanced manufacturing industry, China has carried out embedded system research in the industrial field and puts forward the requirement of combining intelligence and industrialization. e equipment manufacturing industry is the basic requirement for industrialization. Hardware and software are used in the design of CNC machine tools in the software industry. It is very important in the manufacture of machine parent equipment. CNC system is a typical application of the embedded real-time system in the industrial field.
In foreign countries, the design of embedded systems is also a matter of close concern in academia and industry. Some countries have incorporated the research of embedded systems into the national key strategic research plans and support related research centers. Now, in the international manufacturing industry, mechanical or electrical components are completely embedded in controlled equipment to create a dedicated computer system designed for specific applications. In the future, embedded systems will develop into cyber-physical systems (CPS) in the industrial field. ere will be a large amount of data exchange between sensors, actuators, and computing devices, with the purpose of adapting to different application environments. Data interaction and cooperation are affected by the uncertain factors of the physical world, and it is also a new challenge to the reliability of the system. e design of embedded systems is more inclined to the requirements of low power consumption and higher reliability.

Image Simulation.
In the image simulation process, when electromagnetic waves are reflected on the target, a random elevation difference is added to the diameter of the tracking tube to simulate the scattering characteristics of the target surface. On this basis, the combined electromagnetic scattering mode of the target in a complex scene is established as follows: On the surface of the rail pipe with random elevation, the normal direction of the original reflecting surface is 2 Computational Intelligence and Neuroscience corrected, and n_î' is the normal direction of the triangle facet after the elevation difference is introduced.
Rayleigh distribution: Lognormal distribution: where m and ɑ represent the mean and variance of lnx, respectively, which can be obtained by maximum likelihood estimation: Weibull distribution: It can be obtained by the maximum likelihood estimation method: K distribution: In the case of a large number of sea clutter samples, the second-order and fourth-order methods are the most effective. e results are as follows: is the central moment of order n of the statistic. e KS test method is a test method to test whether the data distribution is consistent with the commonly used theoretical distribution. e KS value is the maximum value of the difference between the cumulative empirical data distribution function and the expected cumulative distribution function, denoted by De, used to test the statistics of sample data distribution, where De is expressed as KL distance is a measure of information theory. If the assumed distribution is F(x i ) and the actual distribution is F l (x i ), the expression of the measure is For the discrete case, the expression can be simplified to e detection mean square error can be defined as Sum the data of all subsegments and average them to obtain the power spectrum of the signal to be estimated, which can be expressed as e removal of phase imbalance can be removed by the following formula: e actual parameters of the measured scene are sea temperature 7.6°C, wind speed 5.3 m/s, 0°is true north, wind direction 300°, radar appearance direction 125.6°, maximum sea wave height at sea 0.8 m, distance direction 2575-2768 meters, a total of 196 meters, the distance resolution is 30 m, and the target distance tar A is in the seventh unit. e seventh distance unit data is selected as the analysis object. Figure 1 shows the amplitude-time characteristics of the seventh unit under the same data polarity. e maximum amplitude under VV polarity is 39.38, and the maximum amplitude under HH polarity is 111.5. Figure 2 shows the statistical probability density function of the echo amplitude.
Tables 1 and 2 respectively, check the distribution of the distance unit clutter under VV polarity and HH polarity. From the mean value test, under the condition of VV polarization, the clutter amplitude is very suitable for the K distribution. In the case of transformation, the amplitude of the clutter fits well with the Weibull distribution.
e clutter distribution test of the seventh distance unit of Document 54 is shown in Table 2: 3.2. Virtual Reality Technology. When a fire occurs, the nearby temperature rises and produces flames, smoke particles, and toxic gases. e harmful gases produced by the Computational Intelligence and Neuroscience fire have psychological and physiological effects on the evacuation of people. Since there are many substances produced by fire in practice, the impact on evacuation may be more complicated. Only by simplifying the factors considered in the fire can a corresponding fire model be established. e size of the fire is determined by the power of After a fire occurs, smoke is often produced and diffused to the edge, and its diffusion rate is generally determined according to the gas molecule velocity distribution function.
At the initial moment, the concentration and temperature distribution in the air mass are uniform, and the gas concentration is calculated according to the stable continuous point source smoke flow model.
e steady-state sound pressure level formula is used to calculate the sound pressure level at a certain position.
During the evacuation process, fires often produce smoke and other toxic gases, and other irritating odors may also appear. Pedestrians can perceive the existence of such irritating gases through their sense of smell during travel, which affects people's evacuation routes to a certain extent. Judgment, it also causes certain harm to pedestrians. After a gas leak occurs, people can use the location information and the above equation (18) to calculate the corresponding gas concentration. By obtaining the gas concentration within the range of the person, the human sense of smell can be realized. If the leaked gas is toxic, it will have a significant impact on human physiology. Assuming that the dose of poisonous gas a person bears is S and the probability of causing harm to the person is Ps, the probability formula can be calculated as follows: Among them, the random variable Y can appear in the form of a nonlinear equation. When the toxin concentration does not change with time, its toxin value can be calculated as follows: From this, a simple calculation formula for the degree of physiological influence β can be calculated as follows: is article derives a rough calculation following formula for the degree of psychological influence based on empirical data:

System Characteristics and Target Analysis
e disaster simulator is mainly used to remotely control the local information system, simulate the impact of the disaster on the information system, and simulate the consequences of the disaster. e key question is how to simulate the impact of the disaster on the information system. In order to accurately simulate the disaster effect, this paper divides the disaster simulator into three modules in the design process: scan to obtain IP address, disaster development module, and simulate the impact of disaster on nodes. First, the network is scanned to obtain the IP address module to achieve the simulation target and delimit the simulation range; that is, the simulator starts; then, the disaster development module can display the changes of the disaster over time and space, truly restore the occurrence and evolution of the disaster, and finally simulate the disaster. e node impact module is the core of the disaster simulator. e simulator creates three states of the information system so that it can truly simulate the impact of the disaster on the information system. e three states are error, malignant change, and crash. Errors indicate the system's failure. e calculation result is incorrect. Malignant change means that the system is running in a random state; crash means that the system is down. e simulator simulates the impact of disasters on the information system, but only as a simulation. erefore, security must be considered, and no irreversible impact on the system must be taken into account. In this way, efficiency and security can be achieved at the same time, and a real simulation effect can be achieved.
In addition to its functions, the system must also meet the following characteristics: Security: Because it is only a disaster simulation, it will not have an irreversible impact on the system. For programs that attack the system. Clean up after the simulation. Convenience: Easy to implement and run, the simulator is flexible and convenient, and user operation is simple.
Scalability: Due to technological progress and continuous changes in business conditions, this simulator must have a certain degree of scalability, which can be further expanded and improved.
Efficiency and safety are the basic requirements of this disaster simulator. Convenience and scalability are the Computational Intelligence and Neuroscience highest requirements for the disaster simulator and are the guarantee for improving the quality of the disaster simulator.
After analyzing the functions listed in the requirements, the simulator can be divided into 3 modules.
Automatically, the network is scanned to find the IP address: to obtain the IP address in the local network, you can select the node that simulates the disaster and enters its physical location. Here, you must select the node that needs to be simulated, or you can select all, because sometimes users do not want all the nodes on the local area network. e machines are simulated, so you can choose. Disaster propagation time and space effects are simulated: the type, intensity, and environmental factors of the disaster are selected to simulate the disaster propagation process. When the disaster spreads to a certain node, the simulator will simulate the impact of the disaster on the system on that node.
Simulation of the impact of disasters on nodes: e consequences of disasters on simulated nodes are realized through remote control. is module is the basic part of the disaster simulator, which can simulate the occurrence, development, and impact of disasters on information systems in detail and truly.

e Goal of the System.
e basic use of the disaster simulator is to detect the disaster backup mechanism by simulating the impact of fire, earthquake, and disaster virus on the information system and to simulate the occurrence of disaster and the impact on the information system.
In order to achieve the goal of the disaster simulator to simulate the impact of the disaster on the information system, the simulator must achieve the following effects: (1) Detailed and realistic simulation of the occurrence, development, and impact of disasters on information systems (2) Check the status of the information system after the attack, and check the stability of the system (3) Check the backup mechanism of the information system and provide data for user analysis (4) Check the database backup mechanism, which can be analyzed and improved by the database administrator (5) Check the stability and security of the network (6) Test all users' disaster recovery plans. Only when these overall effects are achieved, the goal of the disaster simulator can be achieved Many staff members participated in the operation, operation and cooperation of the disaster simulator, the main relevant participants: users, user system administrators, network administrators, database administrators, user system administrators, and disaster backup personnel. e following is a brief introduction of the main personnel.
User: e user needs to use the disaster simulator correctly according to the operation manual, input various effective parameters of the simulation, and clean up the simulated program according to the operation manual. System maintenance personnel: System maintenance personnel not only analyze its related data but also check the impact on the system. Network administrator: e network administrator is mainly responsible for two parts: checking and setting up the network, ensuring the normal use of the emulator, and checking the security and stability of the network according to the attack effect of the emulator.
Database administrator: Pay attention to the impact of the simulator on the database. e stability and backup mechanism of the database should be carefully checked.
User system administrator: e user system administrator needs to analyze and check the effect of the simulator, especially to check its security and stability.
Disaster backup personnel: When analyzing the entire operation process, disaster backup personnel monitors and improves their disaster backup mechanism. e development and design of disaster simulators need to fully consider relevant personnel so that the effects of disaster simulators are more perfect.

Overall System Design.
As a traditional tool, the flow chart of the disaster system is mainly used to describe the physical model of the system. It is a graph that uses some graphic symbols to describe the process of the system. It is required to describe various components, such as tables, files, and programs, and display them. e function of the flow chart of the disaster system is manifested in the following aspects: e flow chart of the disaster system is a tool for business operators, administrators, and system analysts to communicate with each other.
rough the flow chart of the entire disaster system, members can communicate well. Another function of the system flow chart is to allow the system analyst to effectively understand the overview of the disaster system business processing, which is also the basis for the disaster system analyst to make further analysis, and it is also the beginning of the system design.
e flowchart system not only understands the entire disaster system but can also analyze the rationality of the business process of the disaster system.
From the analysis of the requirements of disaster software to the completion of the final development, the most important step is the use case diagram. e use case diagram describes how people use the disaster system and shows the relationship between users and what services users need so that users of the system can understand more easily. e purpose of these elements is also convenient for software developers to finally realize these elements. Use case diagrams are generally used by various development activities, many of which are used to describe systems and subsystems. e system can be divided into very specific units, so it has become an excellent tool for software developers.
As shown in Figure 3, this system mainly has six use cases. Figure 4 shows the interaction events between the users of the system and the disaster system: first, the system is started, and then, the system returns all the IP addresses of the local area network, and then, the user selects the node, the disaster type, and environmental factors to simulate, and finally, the system simulates the evolution process of the disaster. e system simulates the consequences of implementing a disaster on the node. e system sequence diagram is a fast and simple product that illustrates the input and output events related to the system in question. e system sequence diagram is the input to the operation contract and object design, which shows the external participants directly interacting with the disaster system, and the participants initiated system events. For some use cases, system sequence diagrams should be drawn for the main success scenarios of each use case, as well as frequently occurring or complex alternative scenarios.

System Function Design. Receiving IP address module:
ere are four methods for receiving IP addresses, DNS, SNMP, ping command, and Traceroute command, but these contents are not the key issues of the disaster simulator, and we can obtain IP addresses by using tools. ere are many such tools and found that these tools are more complicated and confusing, not suitable for disaster simulators. Finally, this article found a simple and practical tool. Local area network IP auto-configurer, its interface, and operation are relatively simple and can be used in the disaster simulator designed in this paper. is module is to start the disaster simulator, find all the IP addresses on the device LAN, and then select the node to be simulated to achieve complete simulation, and the distribution map of the target node can be formulated according to the node selected by the user and input parameters for later dynamic demonstration.
Disaster evolution module: First, you need to use animation technology to simulate the evolution of fires, earthquakes, and computer viruses and make models. e simulator uses FLEX to achieve the simulation effect. Flex uses a non-Flash path to interpret the .mxml files to organize components and create corresponding files. Among them, this article uses FLEX technology to simulate the time and space effects of the disaster spread on the page, that is, dynamically simulate the evolution process of disasters. After the user selects the parameters, the background program formulates the evolution formula according to the parameters, and the page changes according to the evolution simulation to simulate the change of the disaster. For fires, earthquakes, and computer viruses, different evolution models are created to adapt to the different nature of disasters and try to truly simulate the evolution process of disasters in the local area network in reality.
System impact module: e core of the disaster simulator is the system impact module. To start using this module, you need to complete the following steps: (1) To set up a link to each target node, you must first be able to connect to each target node; (2) to create an empty folder in the designated area of the target node, it is best to create this folder on the C drive, because most computers have a C drive; (3) to copy the simulation program to an already created folder; (4) to remotely start the simulation program. e simulation program is mainly composed of bat files, VBScript programs, and enhanced computer code viruses. e process of system error, system malignancy, and system crash must be realized. ese steps must be controlled by the background program, adapt to the disaster evolution process, and be able to cover all target nodes. is module is essential for simulating disasters. It must be able to accurately and timely implement the simulation, and it must realistically simulate the consequences of the disaster. erefore, the simulation program must be designed to be effective and powerful. e disaster evolution structure is shown in Figure 5.

System Test Analysis.
In the development process of the entire disaster system, unit testing is the lowest level of testing. When testing a unit, the unit that needs to be tested is isolated from other parts. Unit testing is repeatable. Test units can be tested repeatedly to make the test results more accurate. erefore, the maintenance of unit testing cannot exceed the life cycle of all software. e unit test case style is shown in Table 3. e main purpose of integration testing is to combine different modules to test to find problems and defects in each interface. If data are not transmitted through the interface, the interface does not have a connection effect; the two modules are integrated together and affect each other, resulting in failure of function realization; after the integration, the module did not achieve the expected function and so on.  Computational Intelligence and Neuroscience e IP address module integration test case is obtained, as shown in Table 4.
System testing is a combination of software, hardware, external equipment, network, interface, and other elements required for system operation, and then, the overall test is performed to verify whether the system functions, performance, and functions meet the requirements of the entire system and to understand which areas are not. e requirements are met, and targeted changes and improvements are made. After testing the system and discovering the problem, it is necessary to be able to locate the problem and know where the problem is, so as to facilitate the improvement of the problem. e system test requirements can cover all the main functions, including not only the test software but also other components such as hardware, external equipment, and networks, interfaces.
Disaster simulator system test cases are shown in Table 5.

Conclusion
is paper focuses on the simulation of evacuation in an urban disaster environment based on virtual reality technology and establishes an evacuation awareness model. Compared with the research on evacuation based on perception patterns at home and abroad, this paper combines people and the environment and combines the environment and perception evacuation research from the perspective of human perception, and expounds the impact of disasters on    Computational Intelligence and Neuroscience evacuation. It also simulates the impact of fires, earthquakes, and information systems on the city. According to the analysis of the impact of urban disasters on the urban information system, the entire framework is designed. e simulator is divided into three functional modules: IP address acquisition, disaster evolution, and the impact of the system. e three modules were designed, developed, and tested in sequence, the three modules were integrated, and the system was tested, and a disaster simulator was deployed. In order to better respond to urban disasters, it is necessary to improve the recommendations and norms of disaster response, and it is urgent to conduct disaster simulation research.
is paper has done a lot of research on fire, earthquake, and information system simulation, and this direction will inevitably become a new and valuable research direction.

Data Availability
e data used to support the findings of this study are currently under embargo while the research findings are commercialized. Requests for data, after the publication of this article, will be considered by the corresponding author.

Conflicts of Interest
e authors declare that they have no conflicts of interest.