CN107564250A - A kind of alarm method and system - Google Patents
A kind of alarm method and system Download PDFInfo
- Publication number
- CN107564250A CN107564250A CN201710665041.6A CN201710665041A CN107564250A CN 107564250 A CN107564250 A CN 107564250A CN 201710665041 A CN201710665041 A CN 201710665041A CN 107564250 A CN107564250 A CN 107564250A
- Authority
- CN
- China
- Prior art keywords
- warning message
- alarm
- message
- warning
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of alarm method and system, receive the warning message of Internet user's issue, extract the key message in the warning message, according to Alarm Server corresponding to key message selection, the warning message and key message are sent to the Alarm Server, Alarm Server is stored and shown after being filtered according to the key message to the warning message, realize actively, comprehensively, timely alarm, each Internet user the event for needing alert process of its what is seen and heard can be alarmed in the very first time.
Description
Technical field
The present invention relates to field of signal processing, more particularly to a kind of alarm method and system.
Background technology
Current type of alarm is mainly alarmed by phone, recently as cloud computing and the development of big data,
The big data collected using high in the clouds is analyzed so as to carry out public sentiment judgement, the method for social event processing is also constantly being sent out
Exhibition.
The method of telephone call be built upon it is man-to-man on the basis of, an alarm call must have an operator to come pair
Should, this needs the input of great police strength resource.
And high in the clouds big data developed in recent years collects public feelings information, the method for social event, mainly pass through clothes
Business device is collected to data, analyzes and extracted based on the rule set in advance.This is a process passively alarmed, can be because
The leakage of some information or event is not caused to be extracted comprehensively for the rule of setting.
The content of the invention
The technical problems to be solved by the invention are:A kind of alarm method and system are provided, realized actively, comprehensively, in time
Alarm, each Internet user the event for needing alert process of its what is seen and heard can be reported in the very first time
It is alert.
In order to solve the above-mentioned technical problem, a kind of technical scheme for using of the present invention for:
A kind of alarm method, including step:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
S5, the Alarm Server are stored and shown after being filtered according to the key message to the warning message.
In order to solve the above-mentioned technical problem, the another technical solution that uses of the present invention for:
A kind of warning system, including alarm and Alarm Server, the alarm include first memory, the first processing
Device and storage are on the first memory and the first computer program that can be run on first processor;The Alarm Server bag
Include second memory, second processor and be stored in the second computer that can be run on second memory and in second processor
Program;The first processor realizes following steps when performing first computer program:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
The second processor realizes following steps when performing the second computer program:
S5, store and show after being filtered according to the key message to the warning message.
The beneficial effects of the present invention are:The warning message of Internet user's issue is received, is extracted in the warning message
Key message, the warning message and key message are sent to corresponding Alarm Server, Alarm Server is to the alarm
Store and show after information filtering, realize actively, comprehensively, timely alarm, allow each Internet user can be at first
Between the event for needing alert process of its what is seen and heard is alarmed.
Brief description of the drawings
Fig. 1 is a kind of flow chart of alarm method of the embodiment of the present invention;
Fig. 2 is a kind of structural scheme of mechanism of warning system of the embodiment of the present invention;
Label declaration:
1st, alarm;2nd, first memory;3rd, first processor;4th, Alarm Server;
5th, second memory;6th, second processor;7th, warning system.
Embodiment
To describe the technology contents of the present invention, the objects and the effects in detail, below in conjunction with embodiment and coordinate attached
Figure is explained.
The design of most critical of the present invention is:The warning message of Internet user's issue is received, extracts the warning message
In key message, the warning message and key message are sent to corresponding Alarm Server, Alarm Server is to the report
Store and show after alert information filtering, realize actively, comprehensively, timely alarm.
It refer to Fig. 1, a kind of alarm method, including step:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
S5, the Alarm Server are stored and shown after being filtered according to the key message to the warning message.
It was found from foregoing description, the beneficial effects of the present invention are:Receive the warning message of Internet user's issue, extraction
Key message in the warning message, the warning message and key message are sent to corresponding Alarm Server, alarm clothes
Business device is stored and shown after being filtered to the warning message, is realized actively, comprehensively, timely alarm, is allowed each internet to use
Family can alarm the event for needing alert process of its what is seen and heard in the very first time.
Further, the step S2 is specifically included:
The key message includes the user profile and alarm event information of the Internet user;
The field set according to internet client or alarm extracts the user profile of the Internet user;
Alarm event information in the warning message is extracted using semantics recognition algorithm;
The key message includes the user profile and alarm event information of the Internet user, the alert event
Packet contains personage, time, place and event.
Seen from the above description, the user that the field set by internet client extracts the Internet user believes
Breath, and the alarm event information in the warning message is extracted by semantics recognition algorithm, user profile and alert event are believed
Breath is used as key message, ensure that the comprehensive of key message, convenient subsequently to check.
Further, step is also included between the step S2 and step S3:
Judge the sending the warning message to report of Internet user's transmission whether is received in preset time
The request of alert server;If it is, perform step S3;If it is not, then according to the key message and preset alarm condition,
Alarm matching degree is calculated, if the alarm matching degree performs step S3, otherwise, ignore the report more than a predetermined threshold value
Alert information.
Seen from the above description, in the case of Internet user not initiative alarming, reported after preset time by calculating
Alert matching degree determines whether automatic alarm, has both ensured the promptness of alarm, also ensures the validity of warning message, avoids alarm signal
The redundancy of breath is invalid.
Further, the step S3 is specifically included:
According to the nearest Alarm Server in place described in the place chosen distance included in the key message.
Seen from the above description, the Alarm Server matched by the ground point selection included in key message, according to nearby
Principle realizes the timely processing to the warning message, improves the ageing of processing.
Further, filtering is carried out to the warning message according to the key message in the step S5 to specifically include:
S51, using the event included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S52;
S52, using the place included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S53;
S53, using the time included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S54;
S54, using the personage included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, the then warning message for judging the warning message to repeat or treated, by institute
Warning message is stated to ignore.
Seen from the above description, the information included in key message is defined according to importance and received according to tandem
Warning message record in search to exclude the warning message repeated, reduce information redundancy, improve effective utilization of memory space
Rate.
Fig. 2, a kind of warning system 7, including alarm 1 and Alarm Server 4 are refer to, the alarm 1 includes first
Memory 2, first processor 3 and it is stored in the first computer journey that can be run on first memory 2 and on first processor 3
Sequence;The Alarm Server 4 includes second memory 5, second processor 6 and is stored on second memory 5 and can be second
The second computer program run on processor 6;The first processor 3 is realized following when performing first computer program
Step:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
The second processor 6 realizes following steps when performing the second computer program:
S5, store and show after being filtered according to the key message to the warning message.
It was found from foregoing description, the beneficial effects of the present invention are:Receive the warning message of Internet user's issue, extraction
Key message in the warning message, the warning message and key message are sent to corresponding Alarm Server, alarm clothes
Business device is stored and shown after being filtered to the warning message, is realized actively, comprehensively, timely alarm, is allowed each internet to use
Family can alarm the event for needing alert process of its what is seen and heard in the very first time.
Further, the step S2 is specifically included:
The key message includes the user profile and alarm event information of the Internet user;
The field set according to internet client or alarm extracts the user profile of the Internet user;
Alarm event information in the warning message is extracted using semantics recognition algorithm;
The key message includes the user profile and alarm event information of the Internet user, the alert event
Packet contains personage, time, place and event.
Seen from the above description, the user that the field set by internet client extracts the Internet user believes
Breath, and the alarm event information in the warning message is extracted by semantics recognition algorithm, user profile and alert event are believed
Breath is used as key message, ensure that the comprehensive of key message, convenient subsequently to check.
Further, step is also included between the step S2 and step S3:
Judge the sending the warning message to report of Internet user's transmission whether is received in preset time
The request of alert server;If it is, perform step S3;If it is not, then according to the key message and preset alarm condition,
Alarm matching degree is calculated, if the alarm matching degree performs step S3, otherwise, ignore the report more than a predetermined threshold value
Alert information.
Seen from the above description, in the case of Internet user not initiative alarming, reported after preset time by calculating
Alert matching degree determines whether automatic alarm, has both ensured the promptness of alarm, also ensures the validity of warning message, avoids alarm signal
The redundancy of breath is invalid.
Further, the step S3 is specifically included:
According to the nearest Alarm Server in place described in the place chosen distance included in the key message.
Seen from the above description, the Alarm Server matched by the ground point selection included in key message, according to nearby
Principle realizes the timely processing to the warning message, improves the ageing of processing.
Further, filtering is carried out to the warning message according to the key message in the step S5 to specifically include:
S51, using the event included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S52;
S52, using the place included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S53;
S53, using the time included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S54;
S54, using the personage included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, the then warning message for judging the warning message to repeat or treated, by institute
Warning message is stated to ignore.
Seen from the above description, the information included in key message is defined according to importance and received according to tandem
Warning message record in search to exclude the warning message repeated, reduce information redundancy, improve effective utilization of memory space
Rate.
Embodiment one
A kind of alarm method, including step:
S1, the warning message for receiving Internet user's issue;
Alarm can be accessed by the client in each network platform, when Internet user uses the client of the network platform
During the issue warning message of end, the alarm can receive the warning message automatically;Or the alarm does not access each network
The client of platform, when Internet user will send warning message, the warning message is directly entered to the alarm, it is right
In the scene, then belong to Internet user's situation that actively selection is alarmed;
Key message in S2, the extraction warning message;
Wherein, the key message includes the user profile and alarm event information of the Internet user;
The field set according to internet client or alarm extracts the user profile of the Internet user,
Then it is according to interconnection netter if for the scene by accessing alarm in the client of each network platform
The field of family end setting extracts the user profile of the Internet user, if not accessing each network for the alarm
The client of platform, then it is the user profile that the field set according to alarm extracts the Internet user;
The user profile includes the main information of on-line customer, such as account, name, contact method, positional information, net
The information such as network IP address;
Alarm event information in the warning message is extracted using semantics recognition algorithm;
The key message includes the user profile and alarm event information of the Internet user, the alert event
Packet contains personage, time, place and event;
For the scene by accessing alarm in the client of each network platform, extract in the warning message
After key message, judge whether to receive in preset time the Internet user sends the warning message is sent to
The request of Alarm Server;If it is, perform step S3;If it is not, then according to the key message and preset alarm bar
Part, alarm matching degree is calculated, if the alarm matching degree performs step S3, otherwise, ignored described more than a predetermined threshold value
Warning message;
Wherein, preset alarm condition includes geographic area compatible degree, time compatible degree, keyword match degree and digital threshold values
Early warning degree, and the combination of this four conditions;
The geographic area compatible degree refers to ground set in place and alert if in extracted key message
Manage the band of position apart from degree of closeness, the more near then geographic area compatible degree of distance is higher, otherwise distance is more remote, then geographic area
Compatible degree is lower;
The time compatible degree refers to time and that time of typing information to alarm in extracted key message
Time interval size, the smaller then time compatible degree of time interval is higher, otherwise time interval is bigger, then time compatible degree is got over
It is low;
The keyword match degree refers to keyword and the alarm occurred in the event information in extracted key message
The coincidence degree of set keyword in condition, keyword set in more multiple alert if is included then in the event
Keyword match degree is higher, conversely, comprising keyword it is fewer, then keyword match degree is lower;
The digital threshold values early warning degree refers to the digital size occurred in the event information in extracted key message,
The numeral occurred is more more than digital threshold values set in alert if, then digital threshold values early warning degree is higher, otherwise is more less than
Set digital threshold values, then digital threshold values early warning degree is lower;
Set and weight for the geographic area compatible degree, time compatible degree, keyword match degree and digital threshold values early warning degree
Value, alarm is gone out according to geographic area compatible degree, time compatible degree, keyword match degree and digital threshold values early warning degree weighted calculation
With degree;
Between the value of the alarm matching degree is 0 to 100, this value is more big more meets alert if, and this value reaches more
Need alarm to be set according to actual conditions when big, a predetermined threshold value can be set according to actual conditions, alarm matching degree is more than
The predetermined threshold value, just carry out automatic alarm;Geographic area in alert if, keyword, digital threshold values can be actual according to various regions
Situation carries out different settings;
S3, the Alarm Server according to corresponding to key message selection;
Wherein it is possible to the alert service that the place according to the place chosen distance included in the key message is nearest
Device;
S4, the warning message and the key message sent to the Alarm Server;
S5, the Alarm Server are stored and shown after being filtered according to the key message to the warning message;
Wherein, filtering is carried out to the warning message according to the key message in the step S5 to specifically include:
S51, using the event included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S52;
S52, using the place included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S53;
S53, using the time included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, then performs step S54;
S54, using the personage included in key message as keyword received warning message record in search for, if
Come to nothing, then the warning message is judged for new warning message, using the warning message and user profile as one
Record storage is simultaneously shown, if result, the then warning message for judging the warning message to repeat or treated, by institute
Warning message is stated to ignore.
Embodiment two
A kind of warning system 7, including alarm 1 and Alarm Server 4, the alarm 1 include first memory 2, the
One processor 3 and storage are on the first memory and the first computer program that can be run on first processor 3;The alarm
Server 4 includes second memory 5, second processor 6 and is stored on second memory and can be run in second processor 6
Second computer program;
The first processor 3 realizes the step S1 to S4 in embodiment one when performing first computer program;
The second processor 6 realizes the step S5 in embodiment one when performing the second computer program.
In summary, alarm method provided by the invention and system, the warning message of Internet user's issue, extraction are received
Key message in the warning message, the warning message and key message are sent to corresponding Alarm Server, alarm clothes
Business device is stored and shown after being filtered to the warning message, is realized actively, comprehensively, timely alarm, is allowed each internet to use
Family can alarm the event for needing alert process of its what is seen and heard in the very first time, and in user without actively
In the case of alarm, according to the key message and preset alarm condition, alarm matching degree is calculated, it is real based on alarm matching degree
Existing automatic alarm, both ensures the comprehensive of alarm, also ensures the validity of alarm, the mistake by Alarm Server to warning message
Re-scheduling is filtered, ensure that the validity of shown warning message, reduces information redundancy, improves having for Alarm Server memory space
Imitate utilization rate.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made, or the technical field of correlation is directly or indirectly used in, similarly include
In the scope of patent protection of the present invention.
Claims (10)
1. a kind of alarm method, it is characterised in that including step:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
S5, the Alarm Server are stored and shown after being filtered according to the key message to the warning message.
2. alarm method according to claim 1, it is characterised in that
The step S2 is specifically included:
The key message includes the user profile and alarm event information of the Internet user;
The field set according to internet client or alarm extracts the user profile of the Internet user;
Alarm event information in the warning message is extracted using semantics recognition algorithm;
The key message includes the user profile and alarm event information of the Internet user, the alarm event information
Include personage, time, place and event.
3. alarm method according to claim 1, it is characterised in that
Also include step between the step S2 and step S3:
Judging, the warning message being sent to alarm for Internet user's transmission whether is received in preset time to be taken
The request of business device;If it is, perform step S3;If it is not, then according to the key message and preset alarm condition, calculate
Alarm matching degree, if the alarm matching degree performs step S3, otherwise, ignore the alarm signal more than a predetermined threshold value
Breath.
4. according to any described alarm method in claim 2 to 3, it is characterised in that
The step S3 is specifically included:
According to the nearest Alarm Server in place described in the place chosen distance included in the key message.
5. according to any described alarm method in claim 2 to 3, it is characterised in that
Filtering is carried out in the step S5 to the warning message according to the key message to specifically include:
S51, using the event included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S52;
S52, using the place included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S53;
S53, using the time included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S54;
S54, using the personage included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, the then warning message for judging the warning message to repeat or treated, by the report
Alert information is ignored.
6. a kind of warning system, including alarm and Alarm Server, the alarm includes first memory, first processor
And store the first computer program that can be run on the first memory and on first processor;The Alarm Server includes
Second memory, second processor and it is stored in the second computer journey that can be run on second memory and in second processor
Sequence;Characterized in that, the first processor realizes following steps when performing first computer program:
S1, the warning message for receiving Internet user's issue;
Key message in S2, the extraction warning message;
S3, the Alarm Server according to corresponding to key message selection;
S4, the warning message and the key message sent to the Alarm Server;
The second processor realizes following steps when performing the second computer program:
S5, store and show after being filtered according to the key message to the warning message.
7. warning system according to claim 6, it is characterised in that
The step S2 is specifically included:
The key message includes the user profile and alarm event information of the Internet user;
The field set according to internet client or alarm extracts the user profile of the Internet user;
Alarm event information in the warning message is extracted using semantics recognition algorithm;
The key message includes the user profile and alarm event information of the Internet user, the alarm event information
Include personage, time, place and event.
8. warning system according to claim 6, it is characterised in that
Also include step between the step S2 and step S3:
Judging, the warning message being sent to alarm for Internet user's transmission whether is received in preset time to be taken
The request of business device;If it is, perform step S3;If it is not, then according to the key message and preset alarm condition, calculate
Alarm matching degree, if the alarm matching degree performs step S3, otherwise, ignore the alarm signal more than a predetermined threshold value
Breath.
9. according to any described warning system in claim 7 to 8, it is characterised in that
The step S3 is specifically included:
According to the nearest Alarm Server in place described in the place chosen distance included in the key message.
10. according to any described warning system in claim 7 to 8, it is characterised in that
Filtering is carried out in the step S5 to the warning message according to the key message to specifically include:
S51, using the event included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S52;
S52, using the place included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S53;
S53, using the time included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, then perform step S54;
S54, using the personage included in key message as keyword received warning message record in search for, if do not had
As a result, then the warning message is judged for new warning message, using the warning message and user profile as a record
Store and show, if result, the then warning message for judging the warning message to repeat or treated, by the report
Alert information is ignored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710665041.6A CN107564250B (en) | 2017-08-07 | 2017-08-07 | A kind of alarm method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710665041.6A CN107564250B (en) | 2017-08-07 | 2017-08-07 | A kind of alarm method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107564250A true CN107564250A (en) | 2018-01-09 |
CN107564250B CN107564250B (en) | 2019-07-09 |
Family
ID=60974024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710665041.6A Active CN107564250B (en) | 2017-08-07 | 2017-08-07 | A kind of alarm method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107564250B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113673869A (en) * | 2021-08-20 | 2021-11-19 | 北京石油化工学院 | Comprehensive cooperative scheduling disposal system for urban frequent emergency |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801232A (en) * | 2004-12-31 | 2006-07-12 | 阿尔卡特公司 | Warning system comprising a warning mobile terminal and a warning server |
US20140203929A1 (en) * | 2011-11-10 | 2014-07-24 | At&T Intellectual Property I, L.P. | Methods, Systems, and Products for Security Services |
CN104036622A (en) * | 2014-06-18 | 2014-09-10 | 成都奥尼克斯科技有限公司 | Alarm service information release system based on internet |
CN106850391A (en) * | 2015-12-07 | 2017-06-13 | 天维尔信息科技股份有限公司 | Alarm treatment method and system based on internet |
-
2017
- 2017-08-07 CN CN201710665041.6A patent/CN107564250B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801232A (en) * | 2004-12-31 | 2006-07-12 | 阿尔卡特公司 | Warning system comprising a warning mobile terminal and a warning server |
US20140203929A1 (en) * | 2011-11-10 | 2014-07-24 | At&T Intellectual Property I, L.P. | Methods, Systems, and Products for Security Services |
CN104036622A (en) * | 2014-06-18 | 2014-09-10 | 成都奥尼克斯科技有限公司 | Alarm service information release system based on internet |
CN106850391A (en) * | 2015-12-07 | 2017-06-13 | 天维尔信息科技股份有限公司 | Alarm treatment method and system based on internet |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113673869A (en) * | 2021-08-20 | 2021-11-19 | 北京石油化工学院 | Comprehensive cooperative scheduling disposal system for urban frequent emergency |
Also Published As
Publication number | Publication date |
---|---|
CN107564250B (en) | 2019-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107547555B (en) | Website security monitoring method and device | |
CN109815818B (en) | Target person tracking method, system and related device | |
US20190266444A1 (en) | System and Method of Detecting Offensive Content Sent or Received on a Portable Electronic Device | |
CN104391979B (en) | Network malice reptile recognition methods and device | |
CN108491720B (en) | Application identification method, system and related equipment | |
CN106534164B (en) | Effective virtual identity depicting method based on cyberspace user identifier | |
CN111274340B (en) | Method, equipment and storage medium for monitoring and processing people stream density | |
CN104462509A (en) | Review spam detection method and device | |
CN102710770A (en) | Identification method for network access equipment and implementation system for identification method | |
CN109302434A (en) | Prompt information method for pushing and device, service platform and storage medium | |
CN105808583B (en) | File type identification method and device | |
CN106503111B (en) | Webpage code-transferring method, device and client terminal | |
CN104462285A (en) | Privacy protection method for mobile service inquiry system | |
CN112463422A (en) | Internet of things fault operation and maintenance method and device, computer equipment and storage medium | |
CN106992975A (en) | The recognition methods of malice network address and device | |
CN104598595A (en) | Fraud webpage detection method and corresponding device | |
CN113518075B (en) | Phishing warning method, device, electronic equipment and storage medium | |
CN108109071A (en) | The monitoring method and electronic equipment dynamically associated based on personnel's social relationships | |
CN117312098B (en) | Log abnormity alarm method and device | |
CN107564250A (en) | A kind of alarm method and system | |
CN114363839B (en) | Fraud data early warning method, device, equipment and storage medium | |
CN110163726A (en) | Order processing method and device | |
CN108900623A (en) | A kind of Web page text acquisition methods and device based on dynamic IP | |
US11756049B1 (en) | Detection of evasive item listings | |
CN113642519A (en) | Face recognition system and face recognition method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |