CN107423427A - One kind utilizes big data personnel's lost contact decision-making system and method in limited area - Google Patents
One kind utilizes big data personnel's lost contact decision-making system and method in limited area Download PDFInfo
- Publication number
- CN107423427A CN107423427A CN201710651309.0A CN201710651309A CN107423427A CN 107423427 A CN107423427 A CN 107423427A CN 201710651309 A CN201710651309 A CN 201710651309A CN 107423427 A CN107423427 A CN 107423427A
- Authority
- CN
- China
- Prior art keywords
- data
- lost contact
- personnel
- dpp
- limited area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/283—Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Abstract
The invention discloses one kind to utilize big data personnel's lost contact decision-making system and method in limited area, and its system includes multidimensional data acquisition and memory system and data processing platform (DPP);Multidimensional gathered data includes internet access data, all-purpose card consumption data, teaching educational administration data, unified certification data, and all data will be transmitted to data processing platform (DPP) by Ethernet;Its method is that first multidimensional data is gathered and stored, then personal data are associated into sorting, and classification noise data remove, self-defined lost contact rule match, finally carries out the transmission of alarm notification by all kinds of means, the backtracking of historical position track;The present invention need not wear hardware, and energy all weather operations, can predict potential site and historical track is recalled and people is subscribed in proactive notification.
Description
Technical field
The present invention relates to a kind of personnel's lost contact method of discrimination, is based particularly on one kind and utilizes big data people in limited area
Member's lost contact decision-making system and method.
Background technology
Some semiclosed places (such as campus, including colleges and universities or School), for safety management, wind is taken precautions against
The consideration of danger is, it is necessary to which timely alarm notification is done in (lower abbreviation " lost contact ") behavior out of touch to the personnel in region.Current
Most lost contact alarm wears the Intelligent hardware specified generally by administrative staff, real in the pattern of auxiliary electron fence
Existing, also some is realized by video monitoring system, such as following a few class patented technologies or product description:
Campus sensory perceptual system (CN201611144526.2) based on Intelligent bracelet:Use the Intelligent bracelet based on bluetooth.
A kind of method and system (CN201410010472.5) towards Campus Security monitoring mainly use RFID and video
Monitoring.
A kind of Campus Security pre-alarm system (CN201510634140.9) uses intelligence wearing terminal and WiFi network
It is combined.
A kind of personal identification method and system (CN201510421377.9) for merging video identification and UWB location technologies makes
With video and UWB technology.
Solution and product based on Intelligent worn device, it is relatively good in School (particularly primary school campus)
Effect because the smaller acceptance level for Intelligent worn device of students ' age is high;But such product is in university campus
It can not then use substantially (because university student has the independent judgment and selection of oneself for Intelligent worn device substantially).Based on video
The solution of linkage is limited to the technical requirements of intelligent monitoring device, such as high definition identification, environment (night vision and severe day
Gas), installation site, when big colony and high concurrent and do not apply to, and cost higher functionality is single.
The content of the invention
The defects of to overcome present in the said goods, present invention solves the technical problem that being automatic, efficient discovery loses
The personnel of contact, and actively give and subscribe to people's promotion warning information.After lost contact occurs, there is provided historical track information, assist to subscribe to
People enters line search.According to the content of open social information, there is provided the prediction of possible position is recommended.
The present invention provides one kind and utilizes big data personnel's lost contact decision-making system in limited area, and the system includes more dimensions
According to acquisition and memory system and data processing platform (DPP);Consumed including all-purpose card in the multidimensional data acquisition and memory system data acquisition path
Data are transmitted to data processing platform (DPP) by server, teaching educational administration server, unified certification server by Ethernet;In internet
Data data are transmitted to by data processing platform (DPP) by Ethernet by core outlet router;Access switch is handed over by core
Change planes and data are transmitted to data processing platform (DPP);Data processing platform (DPP) is handled the data of acquisition.
As a kind of preferred scheme of the present invention:Data are transmitted to data processing platform (DPP) by access switch by core switch
Mode using bypass mirror image or series connection bridge joint or compression interface report.
The present invention provides one kind and utilizes big data personnel's lost contact decision method in limited area, comprises the following steps:
S10:Multidimensional data gathers and storage;
S20:Personal data are associated sorting;
S30:Classification noise data remove;
S40:Self-defined lost contact rule match;
S50:The transmission of alarm notification by all kinds of means is carried out after system discovery someone's lost contact;
S60:Recall historical position track.
When the interval between the time and threshold value starting point that personnel locate at present is more than lost contact time threshold, user will be sent
Alarm.
As a kind of preferred scheme of the present invention:S10 is to first pass through the mode of local log daily records into the sheet of acquisition server
Ground file system, then the unified storage backup of distributed file system is entered by ElasticSearch components.
As a kind of preferred scheme of the present invention:S30 be to obtained in internet data, access switch, be included in exchange
The noise remove for the data that machine is obtained by core switch.
As a kind of preferred scheme of the present invention:S40 is divided not according to the confidence level of the positional information carried in multidimensional data
Same weights.
Compared with prior art, the beneficial effects of the invention are as follows:People need not be paid close attention to and wear specific customization intelligent terminal;No
Need to increase the advanced functional hardware such as HD video and image recognition, gathered completely in existing system by public data
The mode associated with excavation is realized;Possesses the ability of all weather operations;Possesses the energy of potential site prediction and historical track backtracking
Power;Possesses the ability that people is subscribed in proactive notification.
Brief description of the drawings
Fig. 1 is working environment schematic diagram of the present invention;
Fig. 2 is data acquisition of the present invention and process chart;
Fig. 3 is multidimensional data source schematic diagram;
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Embodiment:
Fig. 1 working environment schematic diagrames of the present invention, the present invention provide one kind and utilize big data personnel's lost contact in limited area
Decision-making system, the system include multidimensional data acquisition and memory system and data processing platform (DPP);The multidimensional data acquisition and memory system
Data acquisition path includes all-purpose card consumption service device, teaching educational administration server, unified certification server and passes through Ethernet by number
According to being transmitted to data processing platform (DPP);Data are transmitted at data by the data in internet by core outlet router by Ethernet
Platform;Data are transmitted to data processing platform (DPP) by access switch by core switch;Number of the data processing platform (DPP) to acquisition
According to being handled.
Specifically:Access switch, it is included in the side that data are transmitted to data processing platform (DPP) by core switch by interchanger
Formula is reported using bypass mirror image or series connection bridge joint or compression interface.
Fig. 2 is data acquisition of the present invention and process chart, and the present invention provides one kind and utilizes big data in limited area
Personnel's lost contact decision method, this method step are as follows:
S10:Multidimensional data gathers and storage;
S20:Personal data are associated sorting;
S30:Classification noise data remove;
S40:Self-defined lost contact rule match;
S50:The transmission of alarm notification by all kinds of means is carried out after system discovery someone's lost contact;
S60:Recall historical position track.
When the interval between the time and threshold value starting point that personnel locate at present is more than lost contact time threshold, user will be sent
Alarm
Specifically:S10 multi-dimensional datas gather and storage, data source mainly include:
(1) internet access data (using MAC Address as user identity identification) to come from core switch, acquisition modes
Including:Mirror image (Fig. 1 is mirror-image fashion networking), serial bridge joint are bypassed, compression interface reports.
(2) position data (installation site based on WiFi equipment) for the WiFi sniffs that come from WLAN (WLAN).
(3) the social topic data crawled from the open network platform (such as Baidu's mhkc, QQ space, Sina weibo), bag
Include the topic and deliver positional information inside content, also include being actively the position attribution that carries in issue content.
(4) user's real name data (such as name and the group to come from unified single sign-on system
Knit structure title).
(5) the daily consumption data to come from consumption all-purpose card settlement system, and the position data in the consumption place.
(6) data (such as book borrowing and reading, campus educational administration teaching) to come from specific organization internal system, and this is interior
The location of portion's system data.
Above-mentioned all processes, the mode for first passing through local log daily records enter the local file system of acquisition server.Then
The unified storage backup of distributed file system (such as optional HDFS etc.) is entered by ElasticSearch components.
S20:Individual data items association sorting, this progressively mainly completes the individual association sorting of a variety of data.
S21:(4-6) is organization internal behavioral data in S10, and pass can be realized by way of such as student number and job number
Lump is matched somebody with somebody.
S22:(1-2) in S10 is network behavior data, and its user is identified as terminal (such as mobile phone, PAD, notebook
Or PC) MAC Address, direct relation can not be carried out in such cases, and the solution method of use is to pass through " unified identity authentication
Platform " (usually network authentication server, such as PortalServer etc.) (wraps subscriber terminal equipment MAC and real name information
Include cell-phone number, job number or student number) send over.
S23:(3) in S10 are the social data of the network platform, are generally occurred in the form of the pet name, now
Protocol stream parsing processing, the corresponding relation of virtual identity and MAC Address is matched, then according to S22 corresponding to needing
In description carry out matching association.
S30:Classification noise removes:The noise remove of (1-3) categorical data is refered in particular in S10, is comprised the following steps:S31:It is more
MAC noise removes, generally each Internet user can there are multiple MAC (for example while to possess 2 mobile phones and a pen
Remember this computer), also occur that interim other terminals borrow;System can be according to geographical location information, usage time and usage frequency
Carry out noise removing;Such as:
(1) the PC types MAC of ad-hoc location (in garden multimedia computer room or multi-media classroom) will be not as mark MAC;
The frequency of occurrences is less than threshold value T1 in network in (2) one weeks;
The wifi network frequency of occurrences is less than threshold value T2 in (3) one weeks;
(4) frequency of occurrences is less than threshold value T3 in history overall network;
(5) the total frequencies of occurrences of history WiFi are less than threshold value T4;
S32:More cell-phone number (or job number, student number) noise removes;In network authentication platform, often occur that account is faced
When situation about borrowing, so as to cause A cell-phone numbers (or job number, student number) to appear in corresponding to B cell-phone numbers (or job number, student number)
Terminal.Now according to " cell-phone number and same type terminal MAC " corresponding relation are gone out, such as:
The interior A cell-phone numbers of special time period (Time1) and same type terminal MAC number occurrence number should be more than binding threshold
Value T1.
Same type terminal MAC is referred to:All it is PC, is all either mobile phone terminal or is all PAD.
S33:Virtual identity noise remove more of the same race;A part of colony in network being present, they possess multiple such as QQ numbers,
The virtual identity such as mailbox number or WeChat ID.Such as virtual identity, or some are logged in there is also many situations in strange land terminal
Virtual identity use (such as a large amount of QQ on-hooks etc.) is carried out for non-normal use purpose.Substantial amounts of virtual identity can now be caused
Noise.Minimizing technology is as follows:
(1) virtual identity of mobile model terminal has high priority (because most mobile terminals do not possess on-hook etc.
Special tool(s))
(2) once occurred virtual in ad-hoc location (such as garden multimedia computer room or multi-media classroom) PC type terminals
Identity possesses high priority (because this kind equipment possesses on-hook software installation characteristic)
(3) it is used for the terminal for logging in virtual identity, if the virtual identity quantity specific threshold M that the terminal logs in daily,
Then the terminal is deleted from the individual linked database in virtual identity identification and S20.
S40:Self-defined lost contact Size Match, the process are used for lost contact rule and calculated, because data have diversity, carry
Positional information there are different weights on confidence level, system data weights just enter in algorithm (project) implementation process
The unified demarcation of row:
(1) lost contact time threshold T (be a period, such as 24 hours, 48 hours, 72 hours etc.) is defined first, should
Intelligent regulation or manual adjustment are supported in threshold value setting;Such as in special time period (campus vacation, personal vacation etc.) threshold values
Automatic increase.
(2) built-in system (such as book lending system) possesses the first grade weights, once built-in system position occurs, then originally
Position and time are directly new threshold value starting point.
(3) all-purpose card consumption-orientation data, in the case where meeting its history average, possess the second grade weights;It is if newest
Consumption value once meets history same period average, then the position and time are new threshold value starting point.If it is equal not meet the history same period
It is worth, then this data is not adopted.
(4) (2) WiFi positions in S10 descriptions and time data:
If (a) terminal type is PC types, and possesses the real name identity that unified single sign-on system comes, then possess the 3rd
Deng weights, the position and time are new threshold value starting point when no first-class and two.
(b) if type is mobile model terminal, and is mobile terminal after the more MAC noise removes of S31, and has real name body
Part, then possess third weights, it is no first-class and two when the position and time be new threshold value starting point.
If (c) terminal type is virtual identity type, meets that the virtual identity in S33 removes condition, then possess the 3rd
Deng weights, the position and time are new threshold value starting point when no first-class and two.
(d) other situations belong to fourth class weights, reference position and reference time when only possessing position backtracking, will not touch
Send out new position and the setting of time threshold starting point.
(5) as being (1) situation description in S10, such data because is region Intranet without defined location information
Network switch communication is loaded, so can confirm that certainly as the behavior in region, the basis for estimation of the type is retouched in (4) together above
State.
(6) as being (3) situation description in S10, the position data of the type is the address bit confidence that user independently edits
Breath, random with certain subjectivity, so reference is only recalled in the type position according to time of origin as position history, or
Person's potential site is reminded and is used, and does not trigger new position and the setting of time threshold starting point.
(7) system sets cycle detection timer Timer, and general value is 30 minutes;Timers trigger can travel through later
All real name users, for " current time-threshold value starting point ">Lost contact time threshold T user triggers alarm.
S50:Alarm notification is sent by all kinds of means, can be by retrieving the message subscribing of lost contact personnel after system discovery alarm
Group, alarm information is sent to the personnel in the subscription group, alarm channel is including but not limited to such as:Wechat small routine and wechat are ordered
The number of readding, operator SMS, subscribe to people mail, message, third party's program of open message push interface in system platform station.
S60:Historical track position is recalled,, can basis after logging in the system after alarm information subscription people receives the message
The real name identity information of lost contact personnel is inputted, carries out time-based historical position backtracking, and potential site inquiry is reminded,
The information inquiry of social media can be carried out according to the virtual identity information situation of the personnel.
It is of the invention automatic, out of touch personnel are efficiently found, and actively give and subscribe to people's promotion warning information, lost contact
After generation, there is provided historical track information, assist subscription people to enter line search, according to the content of open social information, there is provided Ke Nengwei
The prediction put is recommended.
Based on above-mentioned, present invention has the advantage that:People need not be paid close attention to and wear specific customization intelligent terminal;Need not
Increase the advanced functional hardware such as HD video and image recognition, gather and dig by public data completely in existing system
The mode of pick association is realized;Possessing the ability of all weather operations, (intelligent terminal needs battery powered, and video identification is in bad weather
Under using effect it is bad);Possesses the ability of potential site prediction and historical track backtracking;Possesses the energy that people is subscribed in proactive notification
Power.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (6)
1. one kind utilizes big data personnel's lost contact decision-making system in limited area, it is characterised in that:The system includes more dimensions
According to acquisition and memory system and data processing platform (DPP);Data acquisition path disappears including all-purpose card in the multidimensional data acquisition and memory system
Data are transmitted to data processing platform (DPP) by expense server, teaching educational administration server, unified certification server by Ethernet;Internet
In data data are transmitted to by data processing platform (DPP) by Ethernet by core outlet router;Access switch passes through core
Data are transmitted to data processing platform (DPP) by interchanger;Data processing platform (DPP) is handled the data of acquisition.
2. one kind according to claim 1 utilizes big data personnel's lost contact decision-making system in limited area, its feature exists
In:Access switch is by way of data are transmitted to data processing platform (DPP) by core switch using bypass mirror image or series connection bridge joint
Or compression interface reports.
3. one kind utilizes big data personnel's lost contact decision method in limited area, it is characterised in that:This method includes following step
Suddenly:
S10:Multidimensional data gathers and storage;
S20:Personal data are associated sorting;
S30:Classification noise data remove;
S40:Self-defined lost contact rule match;
S50:The transmission of alarm notification by all kinds of means is carried out after system discovery someone's lost contact;
S60:Recall historical position track.
When the interval between the time and threshold value starting point that personnel locate at present is more than lost contact time threshold, announcement will be sent to user
It is alert.
4. one kind according to claim 3 utilizes big data personnel's lost contact decision method in limited area, its feature exists
In:S10 is that the mode for first passing through local log daily records enters the local file system of acquisition server, then is passed through
ElasticSearch components enter the unified storage backup of distributed file system.
5. one kind according to claim 3 utilizes big data personnel's lost contact decision method in limited area, its feature exists
In:S30 be to obtained in internet data, access switch, be included in the data that interchanger obtained by core switch
Noise remove.
6. one kind according to claim 3 utilizes big data personnel's lost contact decision method in limited area, its feature exists
In:S40 is according to the different weights of the confidence level of the positional information carried in multidimensional data point.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710651309.0A CN107423427A (en) | 2017-08-02 | 2017-08-02 | One kind utilizes big data personnel's lost contact decision-making system and method in limited area |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710651309.0A CN107423427A (en) | 2017-08-02 | 2017-08-02 | One kind utilizes big data personnel's lost contact decision-making system and method in limited area |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107423427A true CN107423427A (en) | 2017-12-01 |
Family
ID=60436604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710651309.0A Pending CN107423427A (en) | 2017-08-02 | 2017-08-02 | One kind utilizes big data personnel's lost contact decision-making system and method in limited area |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107423427A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694235A (en) * | 2018-05-11 | 2018-10-23 | 浙江正元智慧科技股份有限公司 | A kind of lost contact student's real time early warning method based on campus big data |
CN111221832A (en) * | 2019-12-27 | 2020-06-02 | 三盟科技股份有限公司 | Student loss early warning method, system and storage medium |
CN113806578A (en) * | 2021-09-01 | 2021-12-17 | 浪潮卓数大数据产业发展有限公司 | Missing person inquiry method and system based on artificial intelligence and big data |
CN115002074A (en) * | 2021-04-27 | 2022-09-02 | 中移互联网有限公司 | Information acquisition method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140317325A1 (en) * | 2012-01-18 | 2014-10-23 | International Business Machines Corporation | Warning track interruption facility |
CN105843803A (en) * | 2015-01-12 | 2016-08-10 | 上海悦程信息技术有限公司 | Big data security visualization interaction analysis system and method |
CN105913308A (en) * | 2016-05-27 | 2016-08-31 | 大连楼兰科技股份有限公司 | Self-service car returning method in car sharing process and car sharing method based on self-service car returning |
CN106912019A (en) * | 2017-03-01 | 2017-06-30 | 安徽大智睿科技技术有限公司 | A kind of campus student behavior analysis method and system based on wifi hotspot |
CN106991187A (en) * | 2017-04-10 | 2017-07-28 | 武汉朱雀闻天科技有限公司 | The analysis method and device of a kind of campus data |
-
2017
- 2017-08-02 CN CN201710651309.0A patent/CN107423427A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140317325A1 (en) * | 2012-01-18 | 2014-10-23 | International Business Machines Corporation | Warning track interruption facility |
CN105843803A (en) * | 2015-01-12 | 2016-08-10 | 上海悦程信息技术有限公司 | Big data security visualization interaction analysis system and method |
CN105913308A (en) * | 2016-05-27 | 2016-08-31 | 大连楼兰科技股份有限公司 | Self-service car returning method in car sharing process and car sharing method based on self-service car returning |
CN106912019A (en) * | 2017-03-01 | 2017-06-30 | 安徽大智睿科技技术有限公司 | A kind of campus student behavior analysis method and system based on wifi hotspot |
CN106991187A (en) * | 2017-04-10 | 2017-07-28 | 武汉朱雀闻天科技有限公司 | The analysis method and device of a kind of campus data |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694235A (en) * | 2018-05-11 | 2018-10-23 | 浙江正元智慧科技股份有限公司 | A kind of lost contact student's real time early warning method based on campus big data |
CN111221832A (en) * | 2019-12-27 | 2020-06-02 | 三盟科技股份有限公司 | Student loss early warning method, system and storage medium |
CN111221832B (en) * | 2019-12-27 | 2023-11-24 | 三盟科技股份有限公司 | Student disconnection early warning method, system and storage medium |
CN115002074A (en) * | 2021-04-27 | 2022-09-02 | 中移互联网有限公司 | Information acquisition method, device, equipment and storage medium |
CN115002074B (en) * | 2021-04-27 | 2023-08-15 | 中移互联网有限公司 | Information acquisition method, device, equipment and storage medium |
CN113806578A (en) * | 2021-09-01 | 2021-12-17 | 浪潮卓数大数据产业发展有限公司 | Missing person inquiry method and system based on artificial intelligence and big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107423427A (en) | One kind utilizes big data personnel's lost contact decision-making system and method in limited area | |
CN107358305A (en) | A kind of business model of intelligence community management | |
CN104635611B (en) | One kind is based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system | |
CN106304015B (en) | The determination method and device of user equipment | |
CN102440009A (en) | Mobile terminal and method for providing life observations and a related server arrangement and method with data analysis, distribution and terminal guiding features | |
Wu et al. | Oscillation resolution for mobile phone cellular tower data to enable mobility modelling | |
CN111049818B (en) | Abnormal information discovery method based on network traffic big data | |
CN104872973B (en) | Safety management method and system for intelligent luggage, terminal device and intelligent luggage | |
CN102460431A (en) | System and method for behavioural and contextual data analytics | |
Gundogdu et al. | Countrywide arrhythmia: emergency event detection using mobile phone data | |
CN105118000A (en) | Intelligent terminal and intelligent campus system | |
Asl et al. | How often social objects meet each other? Analysis of the properties of a social network of IoT devices based on real data | |
CN104376005A (en) | Method and system for processing user detail lists by software heartbeat mechanism signaling access probe | |
CN108416721A (en) | A kind of emergency management system | |
CN107235055A (en) | Railway level-crossing early warning protection and remote monitoring system | |
Fang et al. | Idle time window prediction in cellular networks with deep spatiotemporal modeling | |
CN107929973A (en) | A kind of overhead transmission line aloft work anti-falling intelligent alarm system | |
CN112506091A (en) | Engine after-sale maintenance intelligent monitoring system | |
CN104464007B (en) | Fingerprint attendance checking system | |
CN105307113A (en) | Loss identifying and finding method of mobile terminal and mobile terminal | |
CN208188895U (en) | emergency management system | |
CN206596012U (en) | A kind of Jingwutong's information transmission system | |
CN107426536A (en) | A kind of intelligent residential district manages communication system | |
CN204515463U (en) | A kind of based on video monitoring rapid strike terrorist activity networking security protection intelligence disposal system | |
CN107948312A (en) | A kind of information categorization dissemination method and system using location point as information entrance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171201 |