CN108965475A - Wisdom scenic spot visitor location security risk real time information sampling analysis method and system - Google Patents
Wisdom scenic spot visitor location security risk real time information sampling analysis method and system Download PDFInfo
- Publication number
- CN108965475A CN108965475A CN201810982291.7A CN201810982291A CN108965475A CN 108965475 A CN108965475 A CN 108965475A CN 201810982291 A CN201810982291 A CN 201810982291A CN 108965475 A CN108965475 A CN 108965475A
- Authority
- CN
- China
- Prior art keywords
- hidden danger
- scenic spot
- analysis
- buffer area
- radius
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004458 analytical method Methods 0.000 title claims abstract description 103
- 238000005070 sampling Methods 0.000 title claims abstract description 10
- 239000000872 buffer Substances 0.000 claims abstract description 100
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims abstract description 36
- 238000012732 spatial analysis Methods 0.000 claims abstract description 30
- 238000003860 storage Methods 0.000 claims abstract description 20
- 238000000034 method Methods 0.000 claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 12
- 230000000694 effects Effects 0.000 claims abstract description 7
- 238000007405 data analysis Methods 0.000 claims abstract description 5
- 230000008859 change Effects 0.000 claims description 19
- 238000001556 precipitation Methods 0.000 claims description 16
- 238000004891 communication Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 claims description 11
- 230000003139 buffering effect Effects 0.000 claims description 10
- 238000009826 distribution Methods 0.000 claims description 9
- 241000282693 Cercopithecidae Species 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 7
- 230000009471 action Effects 0.000 claims description 6
- 238000007726 management method Methods 0.000 claims description 5
- 230000001681 protective effect Effects 0.000 claims description 5
- 239000011435 rock Substances 0.000 claims description 5
- 238000013461 design Methods 0.000 claims description 4
- 238000011835 investigation Methods 0.000 claims description 4
- 238000012937 correction Methods 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 3
- 238000007689 inspection Methods 0.000 claims description 3
- 238000002955 isolation Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 230000000877 morphologic effect Effects 0.000 claims description 3
- 238000012502 risk assessment Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 claims description 2
- 238000011160 research Methods 0.000 claims description 2
- 238000007619 statistical method Methods 0.000 claims description 2
- 238000012876 topography Methods 0.000 claims description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical group OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 claims 1
- 239000004575 stone Substances 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 4
- 238000013500 data storage Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 3
- 239000002699 waste material Substances 0.000 description 2
- 239000003643 water by type Substances 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 241001494479 Pecora Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/14—Travel agencies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- Computing Systems (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of wisdom scenic spot visitor location security risk real time information sampling analysis method and systems.The visitor location security risk real time information sampling analysis method that inventive embodiments provide, it include: that tourist security hidden danger coordinate information is acquired by handheld terminal, the incipient fault data of acquisition and spatial analysis are requested, it is connect in real time with GIS spatial analysis server by Web server, realizes the buffer zone analysis for taking the gradient into account.Hidden danger buffer area radius and warning grade parameter information are calculated in real time based on scenic spot position security knowledge base and rainfall, water depth sensor information, save the knowledge that analytic process is formed.The technical program has reached the processing storage technical effect that real-time acquisition can be analyzed in real time convenient for grasping;And the embodiment of the invention provides a set of real-time acquisition analysis systems, significantly reduce the workload of later data analysis and storage arrangement, improve the efficiency of scenic spot security risk information collection and analysis storage.
Description
Technical field
The present invention relates to scene GIS information real-time intelligent process field, in particular to a kind of wisdom scenic spot visitor location peace
Full hidden danger real time information sampling analysis method and system.
Background technique
The safety of tourist is most important to scenic spot, and scenic spot is often hidden with the natural land that the words such as " surprise ", " danger " are focused on is permitted
The natural and artificial hidden danger for threatening tourist more.With flourishing for smart travel industry, the increasingly increase of scenic spot number, scenic spot
Safety problem is growing day by day.Many scenic spots, sight spot possess complicated landform landforms, and there are the hidden danger prestige of numerous point-line-surface shapes
Region is coerced, the random distribution in scenic spot carrys out great threat to scenic spot visitor location safety belt.The image capturing range of scenic spot security risk
I.e. the boundary of hidden danger is different due to hidden danger type, and as month or precipitation etc. change a lot, such as natural lake in scenic spot
The boundary of pool changes with precipitation event, and the scope of activities of wild monkey group is sent out also with month in season and tourist zone of action
Raw regular or periodic variation, similar hidden danger area coverage need a kind of more scientific, more effective spatial information
Acquisition is obtained with processing analysis method.
Currently, the position security risk information collection at scenic spot and processing analysis method also rest on hand-kept, offline hand
The electrical form storage system of work acquisition, however existing scheme can not rapidly and accurately carry out real-time Hidden Danger, quickly
Spatial analysis, thus the efficiency acquired in real time to position security risk generates important influence, position has occurred in many scenic spot tourists
Safe investigation just is carried out to scenic spot hidden danger when setting safety accident, the effect mended the fold after the sheep is lost, made up afterwards can not be played.And lack
It is dynamic to meet the real-time acquisition of scenic spot hidden danger space-time data that convenient and fast scenic spot position security risk acquires storage update method in real time
State analyzes demand.
Summary of the invention
The purpose of invention is to provide a kind of wisdom scenic spot visitor location security risk real time information sampling analysis method and is
System.The slope change for considering scenic spot, take into account to the point hidden danger of acquisition, line hidden danger, face incipient fault data the hidden danger of terrain slope
Buffer zone analysis, will exist using the real-time Spatial Data Analysis of GIS in scenic spot or potential hidden danger threat range is marked and drawn
Come, existing scenic spot incipient fault data can be acquired and real-time spatial analysis is carried out to it, meets wisdom scenic spot real-time update and enter
The requirement in library, solution scenic spot are used for the security risk information update of hidden danger early warning not in time, scenic spot visitor location security risk letter
Cease the critical issue of inaccuracy.
In order to achieve the above objectives, it is as follows to use technical solution for the embodiment of the present invention:
A kind of wisdom scenic spot visitor location security risk real time information sampling analysis method and system, comprising the following steps:
(1) scenic spot Data correction be registrated: obtain scenic spot high score satellite image data in recent years and high resolution DEM,
Landforms several point coordinates being evenly distributed that no change has taken place in recent years are chosen to correct and be registrated as high score image geography
Control point.
(2) hidden danger endangers Spatio-temporal factors analysis: investigation scenic spot nature hidden danger and tourist's tour factor, analysis and summary is not
Scenic spot tourist with month is threatened contacting between situation and scenic spot weather or tourist track etc. by hidden danger.In conjunction with scenic spot history
Image selects hidden danger point and hidden danger region by morphological analysis.
(3) it acquires highway route design: comprehensively considering scenic spot topography and geomorphology, precipitation, the depth of water, tourist's Location distribution and tour
Tourist flow data statistics, obtain the hidden danger area range with month dynamic change and optimized, with actually closer hidden danger
Area geological location determines acquisition route.
(4) handheld terminal acquires: acquiring hidden danger point information according to the acquisition route made, records the coordinate information of acquisition
Including coordinate (x, y), acquisition time and hidden danger type.
(5) incipient fault data encodes: scenic spot security risk information is divided into hidden danger, line hidden danger, face hidden danger three types.
Encoded content includes hidden danger information type, and 01 represents point hidden danger, 02 represents line hidden danger, 03 represents face hidden danger information, is wrapped in coding
Containing data acquisition time and hidden danger buffer area least radius.
(6) GIS is analyzed in real time: GIS spatial analysis server realizes real-time space buffer zone analysis and semi-automatic editor, real
Existing real-time information collection and analysis storage processing function.
(7) web server response: by handheld terminal acquisition incipient fault data and spatial analysis request, in real time by with
The GIS spatial analysis server in the associated GIS spatial data library of Web server connects, and realizes that storage is handled with analysis.
(8) result inspection and analysis: scene GIS spatial analysis server generate three layers of buffer data of point, line, surface into
Row superposition forms comprehensive Analysis of Potential data and scenic spot security risk map.
(9) visitor location security knowledge base creates: for storing and providing Analysis of Potential initial parameter values in real time, realizing acquisition
The historical information of buffer parameters and position security knowledge base after analysis compares, and determines optimal hidden danger parameter values.
(10) mobile terminal real-time update: by GIS web server software, new hidden danger buffer area element figure layer is sent out in real time
It send to handheld terminal.
The embodiment of the invention also provides a kind of wisdom scenic spot visitor location security risk real time information sampling analysis methods
And system, the system include:
Handheld terminal, scenic spot communication base station, scenic spot mobile gateway server, scenic spot center service net, water depth sensor, rain
Quantity sensor, video monitor.
The handheld terminal, for acquiring/updating existing or potential security risk data in scenic spot.
The scenic spot communication base station, the realization for communication function between handheld terminal and scenic spot mobile gateway server.
The scenic spot mobile gateway server realizes flow for connecting scenic spot communication base station and scenic spot center service net
Control, security protection and business isolation, the real-time acquisition analysis system for wisdom scenic spot visitor location security risk information provide
One safe and efficient access environment.
The scenic spot center service net sends HTTP request to Web server by handheld terminal for collector, asks
Ask storage and spatial analysis operation;The hidden danger information analysis of real-time storage space is also used to as a result, handheld terminal, the depth of water are sensed
The information that device, precipitation rain fall sensor and video monitor are sent is compared via scenic spot position security knowledge base, is handled, and is fed back to hand-held
Terminal, accurate instruction security risk information collection.
The position security knowledge base, for providing scenic spot security risk knowledge, including index point part, basis in real time
Message part, knowledge output module and knowledge comparison module.
The water depth sensor and precipitation rain fall sensor, for obtaining the real-time depth of water in scenic spot and rainfall data.
The video monitor, for obtaining tourist zone of action density and tour tourist flow data.
The beneficial effect of the embodiment of the present invention is:
The embodiment of the present invention sufficiently combine image data determine have been found that or potential point of safes hidden danger, line hidden danger,
Face hidden danger comprehensively considers scenic spot landform, precipitation, tourist's Location distribution and position and flow data statistics, obtains and becomes with month dynamic
The hidden danger area range of change and optimized, with practical closer hidden danger area geological location.This method has under knowledge elicitation
Real-time, provides more detailed scenic spot position terrestrial reference compared with the Map Services such as Baidu map, Amap and security risk is believed
Breath improves the precision of scenic spot security risk analysis of information collection, meets the real-time demand that hidden danger endangers forecasting and warning.
Also, position security knowledge base creation in wisdom scenic spot realizes real-time spatial analysis, is convenient for scenic spot hidden danger type
Expansion.Binding site knowledge base improves the efficiency of hidden danger coverage analysis, to avoid unchanged in repeated acquisition scenic spot
Hidden danger object reduces unnecessary manpower and financial resources waste.The embodiment of the present invention is based on spatial database and spatial analysis takes
Business device provides a set of real-time data collection and transmission, the workload for significantly reducing later data acquisition and arranging,
Improve the speed of scenic spot security risk information update.
It should be pointed out that others skilled in the art develops on the basis of not departing from the present invention and example
And other examples come, belong to protection scope of the present invention.
Detailed description of the invention
Fig. 1 is the real-time capturing analysis method process of visitor location security risk information provided by one embodiment of the present invention
Figure;
Fig. 2 is visitor location security risk information classification schemes provided by one embodiment of the present invention;
Fig. 3 is neighborhood buffer area equatorial projection radius calculating side under different gradient provided by one embodiment of the present invention
Method schematic diagram;
Fig. 4 is provided by one embodiment of the present invention hidden danger buffer zone analysis floor map;
Fig. 5 is line hidden danger buffer zone analysis floor map provided by one embodiment of the present invention;
Fig. 6 is hidden danger buffer zone analysis floor map in face provided by one embodiment of the present invention;
Fig. 7 is the real-time acquisition analysis system structure of visitor location security risk information provided by one embodiment of the present invention
Schematic diagram is interacted with each module section of system.
Fig. 8 is security knowledge base modular structure schematic diagram in position provided by one embodiment of the present invention.
Specific embodiment
In order to illustrate more clearly of technical solution of the present invention, the present invention is done specifically combined with specific embodiments below
Bright, following embodiment facilitates those skilled in the art and better understands the present invention.
A kind of real-time acquisition of wisdom scenic spot visitor location security risk information shown in Fig. 1 and analysis method flow chart,
Detailed step is as follows:
(1) scenic spot Data correction be registrated: obtaining scenic spot high score satellite image data in recent years, (spatial resolution is higher than
1 meter), using LocaSpaceViewer software, " selection operation " menu clicks the downloading of high score image, finishes the region of being downloaded
Range.Choose in recent years landforms several point coordinates being evenly distributed that no change has taken place as high score image geography correct and
Registration control points.In order to ensure the spatial position consistency of image data Yu collection in worksite data, by all image datas and now
Field security risk position data projects to unified projection coordinate system.
The coordinate system of the data default of LocaSpaceViewer software download is WGS1984 coordinate system spherical projection, and
The projection pattern of coordinate is Universal Transverse Mercator plane projection in Google Earth, so to convert the data into utm projection.With
For Guilin City scenic spot, the central meridian of Guilin City is 111 ° of E, chooses projection reel number publicity: reel number=Int (111 °/6)
+ 31=49N, Int are to be rounded to calculate, and N is north latitude.The projected coordinate system transverse Mercator projection of handheld terminal setting acquisition data
Coordinate system.Being converted to utm projection is advantageous in that, the coordinate that Google Earth and handheld terminal are shown all is the seat as unit of rice
Mark, it is easier to which comparative analysis determines whether the coordinate acquired under handheld terminal meets the practical position in scenic spot, obtains space orientation essence
Degree.
Using unmanned plane stereoscopic imaging apparatus obtain scenic spot high-resolution digital elevation model (DEM scale bar be greater than 1:
1000)。
(2) hidden danger endangers Spatio-temporal factors analysis: investigation scenic spot nature hidden danger and tourist's tour factor, including month and
It travels caused by precipitation, the depth of water insecurity factor, analysis and summary goes out the difference rule in annual each month, and researchs and analyses difference
The scenic spot tourist in month is threatened contacting between situation and scenic spot precipitation or tour tourist flow by hidden danger.
Enter the tourist flow at scenic spot, video monitoring tourist zone of action density and trip over the years to scenic spot and each month
Route tourist flow data of looking at is for statistical analysis, analyze each month tourist flow rule and with of that month weather conditions
Connection and comprehensive analysis weather condition cause the coverage of disaster, to specific positions such as scenic spot trip pavement, road, bridges
The threat of communal facility, such as flood, avalanche are come down, mud-rock flow, the buffering of security risk caused by the factors such as wild monkey group activity
Area's radius, which updates, and tourist security is by hidden danger is influenced frequent hot spot region.
In conjunction with scenic spot history image, topographic survey and morphological analysis are carried out to scenic spot using unmanned plane image, pass through landforms
Hidden danger point and hidden danger region are selected in analysis, extract visible hidden danger waters by high score satellite image.
(3) acquire highway route design: determined in conjunction with image data have been found that or potential point of safes hidden danger, line hidden danger,
Face hidden danger comprehensively considers scenic spot landform, precipitation, tourist's Location distribution and position and flow data statistics, obtains and becomes with month dynamic
The hidden danger area range of change and optimized, with practical closer hidden danger area geological location, be distributed according to security risk, at scenic spot
Middle selection point calibrates field as analog acquisition, determines visitor location security risk information collection route, gets the bid in map layer
Note.
(4) handheld terminal acquires: according to the information collection route made, having been marked in systems using handheld terminal acquisition
Knowledge or potential hidden danger point.The coordinate information of record acquisition includes coordinate (x, y), while recording the point data of good each acquisition
Corresponding acquisition time and hidden danger type.A line hidden danger is determined by several nodes, is acquired at intersecting point appropriate
Coordinate to determine the accuracy of line hidden danger position;At the intersecting point of polygon, multiple coordinate points are acquired to guarantee polygon
Corner accuracy.
(5) incipient fault data encodes: referring to fig. 2, scenic spot security risk information being divided into hidden danger, line hidden danger, face hidden danger
Three types, point hidden danger refer to location point, unopened solution cavity openings position point that the location point of the easy falling rocks of tor, slope are easily fallen suddenly more
Deng;Line hidden danger refers to too wide no protective fence, protective fence gap or river, tidal bore boundary and bridge more, is easy falling rocks, forms mudstone
Stream, the section come down;Face hidden danger refers to that protective fence is too low, gap is too wide, the polygon waters on unshielded column, wild monkey behaviour area more
Deng.Hidden danger point-line-surface further includes unopened in scenic spot, but tourist can take a risk the point hidden danger, line hidden danger and the face hidden danger that set foot in.
Encoded content includes hidden danger information type, 01 represents point hidden danger, 02 represents line hidden danger, 03 represents face incipient fault data, and is encoded
There must be data acquisition time T1~Tn, hidden danger buffer area least radius rmin, can allow what administrative staff will be apparent that understanding and managing
The representative Meaning of Information of solution coding.Incipient fault data coding is carried out to point hidden danger, line hidden danger and the face hidden danger that acquisition obtains respectively,
By code storage.
(6) GIS is analyzed in real time: GIS spatial analysis server realizes real-time space buffer zone analysis and semi-automatic editor, real
Existing real-time information collection and analysis storage processing function.Buffering differentiation is carried out to the point hidden danger of acquisition, line hidden danger, face incipient fault data
It analyses, scenic spot hidden danger buffer zone analysis purpose is in the certain regions in scenic spot, line region or face region specific range,
Tourist is received close to during hidden danger by the Internet of Things information equipment such as scenic spot wisdom information platform or electronic curtain, scenic spot broadcast
Warning information is arrived or shows, to avoid the generation of visitor location unsafe incidents.The buffering of the geometric object A, A given for one
Area definition are as follows: P=x | and d (x, A)≤r } (x is buffer area boundary, and d is Euclidean distance calculation formula, is known safely from scenic spot position
Know the neighborhood threat radius r) that variety classes security risk is exported in library.
(7) incipient fault data being collected is subjected to buffer zone analysis: referring to Fig. 3, the slow of acquisition is calculated in two-dimensional map
Rush radius: r=d × cos (θ), in which: r is equatorial projection radius, and d is that three-dimensional distance, θ are the angle of gradient on the spot.
(8) the basic calculating analysis method for putting hidden danger buffer area is as follows: buffer area is set as using P point as the center of circle, radius r
Plane geometry region.By taking collapse rock-fall buffer area as an example, referring to Fig. 3, buffer area radius calculates knot in different gradient positions
Fruit is different.
(9) coverage for putting hidden danger P calculates: slope map is exported from DEM using GIS terrain analysis automatically working stream,
Gradient θ is switched into angular unit by radian;Falling rocks point P is located at road in scenic area and swims the side of pavement, coverage and ground
The shape gradient is closely related, and referring to fig. 4, the distance of buffer area frontier distance hidden danger point P changes as terrain slope changes.It is identical
Three-dimensional distance on the spot, the bigger (θ of the gradient1≥θ2), the smaller (R of two-dimensional projection's buffer area radius1≤R2).Work as θ1=θ2, buffer area half
Diameter R1=R2.R value, rmin≤r≤rmax。
(10) what line hidden danger buffer area was taken is to do a certain range of buffer area with the side of axis, containing security risk can
Buffer area is done in certain distance in the outside of broken line using a multiple spot broken line in water breakthrough domain.Basic calculating analysis method is such as
Under: the buffering radius r obtained is calculated according to specific embodiment (7) formula in two-dimensional map, then buffer area is set as with L line (river
Flow center line) centered on, radius is the plane geometry region of r.By taking scenic spot river two sides buffer area as an example, referring to fig. 4, buffer area
Radius is in different gradient position calculated result difference.
(11) coverage of line hidden danger L calculates: exporting slope map from DEM using GIS terrain analysis automatically working stream;
River two sides coverage and terrain slope are closely related, referring to Fig. 5, buffer area frontier distance hidden danger line L (river axis)
Distance (left side and right side) with terrain slope change and change.Identical three-dimensional distance, the bigger (θ of the gradient1≥θ2), two dimension is thrown
The shadow buffer area smaller (R of radius1≤R2).Work as θ1=θ2, buffer area radius R1=R2.R value, rmin≤r≤rmax。
(12) the basic calculating analysis method of face hidden danger buffer area is as follows: according to specific embodiment (7) public affairs in two-dimensional map
Formula calculates the buffering radius r obtained, then buffer area is set as being to extend out basis with the perimeter edge point of face F, and radius is the plane of r
Geometric areas.By taking the natural lake buffer area of scenic spot as an example, referring to Fig. 6, buffer area radius is in different lake circumference calculated result
It is different.
(13) coverage of face hidden danger F calculates: exporting slope map from DEM using GIS terrain analysis automatically working stream;
Face coverage and terrain slope are closely related, and referring to Fig. 6, the distance of buffer area frontier distance hidden danger face F is with terrain slope
Change and changes.Identical three-dimensional distance, the bigger (θ of the gradient1≥θ2), the smaller (R of two-dimensional projection's buffer area radius1≤R2).Work as θ1=
θ2, buffer area radius R1=R2.R value, rmin≤r≤rmax。
(14) it is based on the real-time rainfall in scenic spot and water depth sensor, obtains the real-time depth of water in scenic spot water body lake, pool, river
The too wide tidal bore in the lake on information or unshielded column, protective fence gap see tides with water body sprawling after circumference significant point.Pass through
The depth of water, month parameter, dynamic change the boundary in lake polygon and wild Hou Qun hidden danger area, increase neighborhood buffer area radius r value:
R=rmin+ Δ r, wherein rminFor buffer area least radius, radius increment is recorded as Δ r, and is recorded in scenic spot position and knows safely
Know in library, wherein wild monkey group threatens class hidden danger to establish according to buffer area, no guardrail river and tidal bore is established month according to hour
Buffer area obtains the dynamic change buffer area radius of neighbourhood at any time.
Month, parameter determined that the activity of wild monkey group influences buffering radius r, and the buffering radius of different month acquisitions is remembered respectively
Record is got off.No guardrail river and tidal bore establish buffer area radius of neighbourhood incremental computations: Δ r=a × Δ h+b according to hour, wherein
Δ h is hour depth of water increment;A, b is equation undetermined coefficient, the trip pavement that is covered using history depth of water record with tidal bore or water body,
The history farthest point calculating of road, bridge.
The daily rainfall dr recorded in database determines same day collapse rock-fall point, easily falls a hidden danger grade D.Day drops
Rainfall is bigger, and hidden danger warning grade is higher.The grade of D is determined according to piecewise function, fragmentation threshold is by the security knowledge base of position
Hidden danger danger occur rainfall threshold limit value determine.
(15) GIS is analyzed in real time: the incipient fault data of handheld terminal acquisition and spatial analysis being requested, Web service is passed through
Device and GIS server are made storage, working process and coding and are responded.
(16) web server response: by handheld terminal acquisition incipient fault data and spatial analysis request, in real time by with
The GIS spatial analysis server in the associated GIS spatial data library of Web server connects, and realizes that storage is handled with analysis.Processing point
Hidden danger information after analysis is stored in the relevant databases such as SQL Server, and to the operation requests that handheld terminal issues, is led to
It crosses the spatial position GIS server and realizes real-time space buffer zone analysis, overlay analysis and semi-automatic editor, realize that real time information is adopted
Collection and analysis processing function.
(17) in scene GIS spatial analysis server, hidden danger, line hidden danger, face hidden danger buffer area result inspection and analysis: are put
Three layers of buffer data superposition of point, line, surface are generated after analysis, with forming comprehensive Analysis of Potential data and scenic spot security risk
Figure.Hidden danger information after spatial analysis is brought into visitor location security knowledge base, with the history in the security knowledge base of position
The time and space changing rule of new addition hidden danger feature is excavated in the comparison of hidden danger information.
(18) position security knowledge base, for storing and providing Analysis of Potential initial parameter values in real time, to buffer area figure and
Buffer area least radius, maximum radius, radius of neighbourhood increment, rainfall, depth of water increment, tourist's Location distribution and position and flow number
According to hidden danger grade, buffer area radius of neighbourhood incremental computations formula undetermined coefficient is stored.
(19) position security knowledge base, buffer parameters and position security knowledge base after being also used to real-time collection analysis
Historical information compares, and is used for hidden danger buffer area radius ratio pair, warning level aspect ratio is to analysis;Matching is using syntax matching skill
Art records the information of successful match, provides optimal hidden danger parameter values, for real-time hidden danger information collection and space point
Analysis.Position security knowledge base is convenient for the expansion of scenic spot hidden danger type, to avoid hidden danger object unchanged in repeated acquisition scenic spot,
Reduce unnecessary manpower and financial resources waste.
(20) by GIS-Geographic Information System web server software, such as Arcgis Server is by new map elements figure layer
It is sent to handheld terminal, for instructing scenic spot security risk information collection.
(21) the present invention also provides a kind of real-time acquisition analysis system of wisdom scenic spot visitor location security risk information,
Referring to Fig. 7, the system comprises:
Handheld terminal S1, scenic spot communication base station S2, scenic spot mobile gateway server S 3, scenic spot center service net S4, the depth of water
Sensor S5, precipitation rain fall sensor S6, video monitor S7.
The handheld terminal S1, comprising: palm portable equipment pad and smart phone.Handheld terminal communicates base by scenic spot
Stand S2, scenic spot mobile gateway server S 3 and the S4 two-way communication of scenic spot center service net.Application program is mainly used for acquisition/update
The identified or security risk data that do not identify in this system.Handheld terminal is provided simultaneously with room other than having positioning function
Outer inquiry, drawing, geocoding function.
The scenic spot communication base station S2, refers in the area of wireless network coverage of scenic spot, mobile with handheld terminal S1 and scenic spot
Radio station, the realization for communication function are believed in the transceiving that information bidirectional transmitting is carried out between gateway server S3.It is hand-held whole
End equipment connects upper scenic spot apart from nearest communication base station by approach such as WIFI, passes through base station and scenic spot mobile gateway server
Contacted, and then the handheld terminal S2 incipient fault data acquired and spatial analysis requested, be transmitted to S4, at the same also by system more
Data after new are passed back to S1.
The scenic spot mobile gateway server S 3 is gateway and protocol converter, for connecting scenic spot communication base
Stand S2 and scenic spot center service net S4, realizes traffic management and control, security protection and business isolation, is wisdom scenic spot visitor location safety
The real-time acquisition analysis system of hidden danger information provides a safe and efficient access environment.
The scenic spot center service net S4, including following components of system as directed: Web server S41, GIS spatial data library S42,
Spatial analysis server S 43, position security knowledge base S44 and scenic spot center local area network S45.
Web server S41 sends HTTP request, request storage to Web server by handheld terminal for collector
With spatial analysis operation;It is also used to pass through spatial analysis when hand-held terminal application program sends HTTP request to Web server
Server S 43 and position security knowledge base S44, the information that handheld terminal is sent compared via position security knowledge base and
Spatial analysis feeds back to handheld terminal by Web server http response and shows, accurate instruction security risk information collection.
GIS spatial data library S42 is used for real-time storage rainfall, depth of water increment, tourist's Location distribution and position and flow number
According to collected tourist security incipient fault data and the analysis of hidden danger message buffer, overlay analysis result.Drawn using spatial database
The spatial database under (SDE) management is held up, checks the change of topological knowledge in real time according to topological relation, updates spatial data full
The consistency and integrality of sufficient scenic spot hidden danger element etale topology relationship.
It is empty to provide real-time online by service pool example using the real-time space analytic unit of GIS for spatial analysis server S 43
Between Analysis Service.Specifically for the reading position incipient fault data from the S42 of GIS spatial data library, in conjunction with knowledge output module S443
Hidden danger parameters knowledge is exported, the buffer zone analysis and overlay analysis of point, line, surface incipient fault data are completed.
Position security knowledge base S44 is inquired, comprising: rope using spatial database engine SDE and relevant database storage
Draw pointer part S441, basic information part S442, knowledge output module S443 and knowledge comparison module S444, referring to Fig. 8.
Index point part S441, including property index and spatial index part and database pointer.By indexing and referring to
Needle part, which only needs to input the information key required to look up in index part, can obtain relevant hidden danger historical information.
Basic information part S442, the basic information part in hidden danger parameter deposit knowledge base formed after analysis.Safety
Analysis of Potential knowledge in knowledge base is encoded by different hidden danger types, is stored in SQL Server database, in the number
It modifies and deletes according in base management system.
Knowledge output module S443 writes for passing through from the space field of knowledge base, attribute field and time field
Database script program integrated structure query language (SQL) automatically extracts out the neighborhood that spatial dimension is influenced comprising different hidden danger
The production rule of buffer area radius.Rule knowledge, analysis result figure is whole back to holding by Web server http response
It is shown in end, instructs security risk analysis of information collection.
Knowledge contrast module S444 compares the information that handheld terminal is sent via position security knowledge base, processing, feedback
To handheld terminal.The buffer area radius inaccuracy problem that discovery is compared via scenic spot position security knowledge base, can be managed by scenic spot
Reason personnel audit, more new knowledge base and is issued again in system.
Scenic spot center local area network S45, for connecting Web server S41, GIS spatial data library S42, spatial analysis service
Device S43, position security knowledge base.
The water depth sensor S5 and precipitation rain fall sensor S6 is specifically used for obtaining the real-time depth of water in scenic spot and rainfall data, packet
Include hour depth of water and daily rainfall data.
The video monitor S7, for obtaining tourist zone of action density and tour tourist flow data.
By upper, the embodiment of the present invention proposes a set of effective, objective wisdom scenic spot visitor location security risk information
The scheme and system of real-time collection analysis, avoid scenic spot hidden danger information update and bring the unsafe influence of tourist not in time, mention
The high efficiency of scenic spot safety in production.
Based on objective scenic spot visitor location security risk data and the wisdom scenic spot visitor location security knowledge created
Library is continuously replenished, and is excavated and is obtained new scenic spot visitor location safety management knowledge, and the position peace constantly updated at scenic spot is formed
The basic condition and knowledge guaranteeing of full knowledge base and tourist in hidden danger area intelligent early-warning.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention, it is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (8)
1. a kind of wisdom scenic spot visitor location security risk real time information sampling analysis method, which is characterized in that including following step
It is rapid:
Step 1: scenic spot Data correction be registrated: obtain scenic spot high score satellite image data in recent years and high resolution DEM, choosing
Take in recent years landforms several point coordinates being evenly distributed that no change has taken place as high score image geography correct be registrated control
Point processed;
Step 2: hidden danger endangers Spatio-temporal factors analysis: investigation scenic spot nature hidden danger and tourist's tour factor, analysis and summary is not
Scenic spot tourist with month is threatened contacting between situation and scenic spot weather or tourist track etc. by hidden danger, in conjunction with scenic spot history
Image selects hidden danger point and hidden danger region by morphological analysis;
Step 3: acquisition highway route design: comprehensively considering scenic spot topography and geomorphology, precipitation, the depth of water, tourist's Location distribution and tour
Tourist flow data statistics, obtain the hidden danger area range with month dynamic change and optimized, with actually closer hidden danger
Area geological location determines acquisition route;
Step 4: handheld terminal acquisition: acquiring hidden danger point information according to the acquisition route made, record the coordinate information of acquisition
Including coordinate (x, y), acquisition time and hidden danger type;
Step 5: incipient fault data coding: being divided into hidden danger, line hidden danger, face hidden danger three types for scenic spot security risk information,
Encoded content includes hidden danger information type, and 01 represents point hidden danger, 02 represents line hidden danger, 03 represents face hidden danger information, is wrapped in coding
Containing data acquisition time and hidden danger buffer area least radius;
Step 6:GIS is analyzed in real time: GIS spatial analysis server realizes real-time space buffer zone analysis and semi-automatic editor, real
Existing real-time information collection and analysis storage processing function;
Step 7:Web server response: by handheld terminal acquisition incipient fault data and spatial analysis request, in real time by with
The GIS spatial analysis server in the associated GIS spatial data library of Web server connects, and realizes that storage is handled with analysis;
Step 8: result inspection and analysis: scene GIS spatial analysis server generate three layers of buffer data of point, line, surface into
Row superposition forms comprehensive Analysis of Potential data and scenic spot security risk map;
Step 9: the creation of visitor location security knowledge base: for storing and providing Analysis of Potential initial parameter values in real time, realizing acquisition
The historical information of buffer parameters and position security knowledge base after analysis compares, and determines optimal hidden danger parameter values;
Step 10: mobile terminal real-time update: by GIS web server software, new hidden danger buffer area element figure layer being sent out in real time
It send to handheld terminal.
2. the method according to claim 1, wherein the hidden danger endangers Spatio-temporal factors analysis and acquisition route
Design specifically:
Investigate tourism caused by scenic spot nature hidden danger and tourist's tour factor, including month and precipitation, the depth of water it is dangerous because
Element, analysis and summary go out the difference rule in annual each month, and research and analyse the scenic spot tourist in different months and threatened feelings by hidden danger
Contacting between condition and scenic spot precipitation or tour tourist flow;
Enter the tourist flow at scenic spot, video monitoring tourist zone of action density and visit road over the years to scenic spot and each month
Line tourist flow data is for statistical analysis, analyzes the rule of each month tourist flow and the connection with of that month weather conditions
System and comprehensive analysis weather condition cause the coverage of disaster, public to specific positions such as scenic spot trip pavement, road, bridges
The threat of facility altogether, such as flood, avalanche are come down, mud-rock flow, the buffer area of security risk caused by the factors such as wild monkey group activity
Radius, which updates, and tourist security is by hidden danger is influenced frequent hot spot region;
It determines and has been found that or potential point of safes hidden danger, line hidden danger, face hidden danger in conjunction with image data, with comprehensively considering scenic spot
Shape, precipitation, tourist's Location distribution and position and flow data statistics obtain the hidden danger area range with month dynamic change and optimized
, with practical closer hidden danger area geological location, be distributed according to security risk, point chosen in scenic spot as analog acquisition
Field is calibrated, visitor location security risk information collection route is determined, is marked in map layer.
3. the method according to claim 1, wherein described visited based on the real-time daily rainfall in scenic spot with the depth of water in real time
It surveys sensor foundation and realizes and replace dynamic buffer with month at any time specifically:
Based on the real-time rainfall in scenic spot and water depth sensor, the real-time Water Depth Information in scenic spot water body lake, pool, river is obtained, or
The too wide tidal bore in lake, the protective fence gap on unshielded column see tides with water body sprawling after circumference significant point;Pass through the depth of water, the moon
Part parameter, dynamic change the boundary in lake polygon and wild Hou Qun hidden danger area, increase neighborhood buffer area radius r value: r=rmin+
Δ r, wherein rminFor buffer area least radius, radius increment is recorded as Δ r, and is recorded in the security knowledge base of scenic spot position,
Wherein wild monkey group threatens class hidden danger according to establishing buffer area month, and no guardrail river and tidal bore establish buffer area according to hour,
Obtain the dynamic change buffer area radius of neighbourhood at any time;
Month, parameter determined that the activity of wild monkey group influences buffering radius r, and the buffering radius of different month acquisitions is recorded respectively
Come, no guardrail river and tidal bore establish buffer area radius of neighbourhood incremental computations: Δ r=a × Δ h+b according to hour, and wherein Δ h is
Hour depth of water increment;A, b is equation undetermined coefficient, the trip pavement that is covered using history depth of water record with tidal bore or water body, road,
The history farthest point of bridge calculates.
4. the method according to claim 1, wherein the operation requests issued to handheld terminal, pass through
The spatial position GIS server realizes real-time space buffer zone analysis and semi-automatic editor specifically:
The basic calculating analysis method of point hidden danger buffer area is as follows: a radius r is given in two-dimensional map, then buffer area is set
For using P point as the center of circle, radius is the plane geometry region of r;
The basic calculating analysis method of line hidden danger buffer area is as follows: a radius r is given in two-dimensional map, then buffer area is set
For centered on L line (river axis), radius is the plane geometry region of r, by taking scenic spot river two sides buffer area as an example, buffering
Area's radius is different in different river position calculated result;
The basic calculating analysis method of face hidden danger buffer area is as follows: a radius r is given in two-dimensional map, then buffer area is set
To be to extend out basis with the perimeter edge of face F point, radius is the plane geometry region of r, by taking the natural lake buffer area of scenic spot as an example,
Buffer area radius is different in different lake circumference calculated result.
5. according to the method described in claim 4, feature exists during the buffer zone analysis to point, line, surface hidden danger
In, using GIS terrain analysis automatically working stream from DEM export hidden danger regional slope figure;
Buffer area radius is different in different orientation calculated result:
R=d × cos (θ)
Wherein:
D is that three-dimensional distance, r are equatorial projection radius on the spot, and θ is the angle of gradient;
The coverage of point hidden danger P calculates: dropstone point P is located at road in scenic area and swims the side of pavement, coverage and landform slope
Spend closely related, the distance of buffer area frontier distance hidden danger point P changes as terrain slope changes, same distance (on the spot three
Tie up distance), the bigger (θ of the gradient1≥θ2), the smaller (R of two-dimensional projection's buffer area radius1≤R2), work as θ1=θ2, buffer area radius R1=
R2, r value, rmin≤r≤rmax;
The coverage of line hidden danger L calculates: river two sides coverage and terrain slope are closely related, and buffer area frontier distance is hidden
The distance (left side and right side) for suffering from line L (river axis) with terrain slope change and changes, same distance (on the spot three-dimensional away from
From), the bigger (θ of the gradient1≥θ2), the smaller (R of two-dimensional projection's buffer area radius1≤R2), work as θ1=θ2, buffer area radius R1=R2, r
Value, rmin≤r≤rmax;
The coverage of face hidden danger F calculates: natural lake coverage and terrain slope are closely related, and buffer area frontier distance is hidden
The distance for suffering from face F changes, same distance (three-dimensional distance on the spot), the bigger (θ of the gradient as terrain slope changes1≥θ2), two dimension
Project the smaller (R of buffer area radius1≤R2), work as θ1=θ2, buffer area radius R1=R2, r value, rmin≤r≤rmax。
6. method according to claim 1 or 3, which is characterized in that the scenic spot position security knowledge base major function are as follows:
Storage and offer Analysis of Potential initial parameter values in real time, to buffer area figure and buffer area least radius, maximum radius, neighborhood
Radius increment, rainfall, depth of water increment, tourist's Location distribution and position and flow data, hidden danger grade, buffer area radius of neighbourhood increment
Calculation formula undetermined coefficient is stored;
The historical information of buffer parameters and position security knowledge base after being also used to real-time collection analysis compares, and is used for hidden danger
Buffer area radius ratio pair, warning level aspect ratio is to analysis;Matching remembers the information of successful match using grammatical matching technique
Record, provides optimal hidden danger parameter values, is used for real-time hidden danger information collection and spatial analysis.
7. a kind of wisdom scenic spot visitor location security risk real time information sampling analysis system, which is characterized in that the system packet
Include: handheld terminal, scenic spot communication base station, scenic spot mobile gateway server, scenic spot center service net, water depth sensor, rainfall pass
Sensor, video monitor;
The handheld terminal, for acquiring/updating existing or potential security risk data in scenic spot;
The scenic spot communication base station, the realization for communication function between handheld terminal and scenic spot mobile gateway server;
The scenic spot mobile gateway server, for connecting scenic spot communication base station and scenic spot center service net, realize traffic management and control,
Security protection and business isolation, provide a peace for the real-time acquisition analysis system of wisdom scenic spot visitor location security risk information
Entirely, efficient access environment;
The scenic spot center service net sends HTTP request to Web server by handheld terminal for collector, and request is deposited
Storage and spatial analysis operation;The hidden danger information analysis of real-time storage space is also used to as a result, the feedback information sent to handheld terminal
It is compared via scenic spot position security knowledge base, processing, feeds back to user, accurate instruction security risk information collection;
The water depth sensor and precipitation rain fall sensor, for obtaining the real-time early warning rank of scenic spot position hidden danger in real time, increase is fallen
Stone point buffers the foundation that radius realization replaces dynamic buffer with month at any time with the neighborhood for easily falling region, to pass through scenic spot
Tourist's sightseeing tour is more effectively instructed in security information service;
The video monitor, for obtaining tourist zone of action density and tour tourist flow data.
8. system according to claim 7, it is characterised in that:
The position security knowledge base, for when hand-held terminal application program sends HTTP request to Web server, position to be pacified
Data, result map are returned in handheld terminal by Web server http response and are shown by full knowledge base, position security knowledge base
Show, the feedback information that handheld terminal is sent is compared, processing via position security knowledge base, feed back to handheld terminal, correctly referred to
Security risk information collection is led, knowledge base is stored using spatial database engine and relevant database;
The position security knowledge base, including index point part, basic information part, knowledge output module and knowledge compare mould
Block;
Index point part, including property index and spatial index part and database pointer pass through index and pointer part
It needs to input the information key required to look up in index part and can obtain relevant hidden danger historical information;
Basic information part, the basic information part in hidden danger information deposit knowledge data base after analysis, in security knowledge base
Analysis of Potential knowledge be stored in SQL Server database by certain coding criterion, modify and delete;
Knowledge output module, for from the space field of knowledge base, attribute field and time field by writing database foot
This program integrated structure query language (SQL) automatically extracts out the buffer area neighborhood half that spatial dimension is influenced comprising different hidden danger
Rule knowledge, analysis result figure are returned in handheld terminal by Web server http response and are shown by the production rule of diameter
Show, instructs security risk analysis of information collection;
Knowledge contrast module compares the feedback information that handheld terminal is sent via position security knowledge base, processing, feeds back to hand
Hold terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810982291.7A CN108965475B (en) | 2018-08-27 | 2018-08-27 | Method and system for collecting and analyzing potential safety hazard information of tourist position in intelligent scenic spot in real time |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810982291.7A CN108965475B (en) | 2018-08-27 | 2018-08-27 | Method and system for collecting and analyzing potential safety hazard information of tourist position in intelligent scenic spot in real time |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108965475A true CN108965475A (en) | 2018-12-07 |
CN108965475B CN108965475B (en) | 2023-06-27 |
Family
ID=64474173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810982291.7A Active CN108965475B (en) | 2018-08-27 | 2018-08-27 | Method and system for collecting and analyzing potential safety hazard information of tourist position in intelligent scenic spot in real time |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108965475B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109710660A (en) * | 2018-12-18 | 2019-05-03 | 武汉烽火众智数字技术有限责任公司 | A kind of scenic spot data management system and method |
CN110598154A (en) * | 2019-09-16 | 2019-12-20 | 新疆银狐数据科技有限公司 | Tourism comprehensive statistics big data platform based on fusion of multi-channel data |
TWI728351B (en) * | 2019-05-06 | 2021-05-21 | 國家災害防救科技中心 | Disaster simulation system and method |
CN112991125A (en) * | 2021-02-03 | 2021-06-18 | 桂林理工大学 | Quick emergency system of wisdom scenic spot conflagration |
CN113240354A (en) * | 2021-07-12 | 2021-08-10 | 湖南中惠旅智能科技有限责任公司 | Intelligent scenic spot data processing method and system based on electronic map |
CN114153937A (en) * | 2022-02-09 | 2022-03-08 | 天津仁爱学院 | Urban cultural heritage tourism data interactive map system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003044552A (en) * | 2001-07-27 | 2003-02-14 | Nec Mobiling Ltd | System and method for providing of local information and for storing record |
CN104036352A (en) * | 2014-06-09 | 2014-09-10 | 陕西师范大学 | Space-time regulation and emergency guidance system and method for scenic spot tourists |
US20150219470A1 (en) * | 2014-02-04 | 2015-08-06 | Nils E. Hoffman | System and method for virtual interactive ski and snowboard tour guidance, enhancement and safety |
CN105407139A (en) * | 2015-10-23 | 2016-03-16 | 桂林理工大学 | Intelligent scenic spot tourist safety service system based on GIS interoperation and LBS |
CN105719428A (en) * | 2016-03-21 | 2016-06-29 | 上海斐讯数据通信技术有限公司 | Security prewarning system and method for scenic spot |
-
2018
- 2018-08-27 CN CN201810982291.7A patent/CN108965475B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003044552A (en) * | 2001-07-27 | 2003-02-14 | Nec Mobiling Ltd | System and method for providing of local information and for storing record |
US20150219470A1 (en) * | 2014-02-04 | 2015-08-06 | Nils E. Hoffman | System and method for virtual interactive ski and snowboard tour guidance, enhancement and safety |
CN104036352A (en) * | 2014-06-09 | 2014-09-10 | 陕西师范大学 | Space-time regulation and emergency guidance system and method for scenic spot tourists |
CN105407139A (en) * | 2015-10-23 | 2016-03-16 | 桂林理工大学 | Intelligent scenic spot tourist safety service system based on GIS interoperation and LBS |
CN105719428A (en) * | 2016-03-21 | 2016-06-29 | 上海斐讯数据通信技术有限公司 | Security prewarning system and method for scenic spot |
Non-Patent Citations (3)
Title |
---|
李百寿 等: ""GNSS/高分影像结合的复杂地形城市居住区灾情制图"", 《桂林理工大学学报》 * |
李运钊;: "GIS在旅游规划中的应用研究――以崂山风景区为例", 经贸实践, no. 03 * |
范伟;彭昱忠;元昌安;: "智慧景区安全信息管理与智能预警系统研究与设计", 广西师范学院学报(自然科学版), no. 04 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109710660A (en) * | 2018-12-18 | 2019-05-03 | 武汉烽火众智数字技术有限责任公司 | A kind of scenic spot data management system and method |
TWI728351B (en) * | 2019-05-06 | 2021-05-21 | 國家災害防救科技中心 | Disaster simulation system and method |
CN110598154A (en) * | 2019-09-16 | 2019-12-20 | 新疆银狐数据科技有限公司 | Tourism comprehensive statistics big data platform based on fusion of multi-channel data |
CN110598154B (en) * | 2019-09-16 | 2023-04-07 | 新疆银狐数据科技有限公司 | Tourism comprehensive statistics big data system based on fusion multi-channel data |
CN112991125A (en) * | 2021-02-03 | 2021-06-18 | 桂林理工大学 | Quick emergency system of wisdom scenic spot conflagration |
CN113240354A (en) * | 2021-07-12 | 2021-08-10 | 湖南中惠旅智能科技有限责任公司 | Intelligent scenic spot data processing method and system based on electronic map |
CN113240354B (en) * | 2021-07-12 | 2021-10-15 | 湖南中惠旅智能科技有限责任公司 | Intelligent scenic spot data processing method and system based on electronic map |
CN114153937A (en) * | 2022-02-09 | 2022-03-08 | 天津仁爱学院 | Urban cultural heritage tourism data interactive map system |
Also Published As
Publication number | Publication date |
---|---|
CN108965475B (en) | 2023-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108965475A (en) | Wisdom scenic spot visitor location security risk real time information sampling analysis method and system | |
CN103942941B (en) | Mobile monitoring convergence platform based on GIS | |
EP2191233B1 (en) | Apparatus and method for updating map data | |
CN113806897B (en) | Power engineering construction decision optimization method based on three-dimensional GIS technology | |
CN103426061B (en) | A kind of emergency maintenance based on target following and renewal integral system and method | |
d Alan | Digital photogrammetric change analysis as applied to active coastal dunes in Michigan | |
CN102103713A (en) | Method and system for monitoring wetland resource and ecological environment | |
CN201853252U (en) | Wetland resource and ecological environment supervising system | |
CN109522603A (en) | Vehicle-mounted Lagrangian Real-Time Atmospheric pollution traceability system and method based on cloud platform | |
CN101556165A (en) | Method for updating embedded mobile electronic map data base in real time | |
CN111340394B (en) | Environment management information system for drainage basin cascade power station | |
CN108510124A (en) | Refuse on water surface paths planning method based on machine learning and device | |
CN102103201B (en) | Wetland data acquisition method of multi-task mode | |
CN112819340A (en) | Urban flood disaster dynamic evaluation method based on multi-source data | |
Liu et al. | LiDAR data reduction for efficient and high quality DEM generation | |
CN109612445B (en) | High-precision terrain establishing method under WebGIS platform based on unmanned aerial vehicle | |
Kincey et al. | Monitoring fragile upland landscapes: The application of airborne lidar | |
Laefer et al. | Evacuation route selection based on tree-based hazards using light detection and ranging and GIS | |
CN103164420A (en) | Geological information processing method and device | |
CN116153140A (en) | River basin emergency unmanned aerial vehicle management method and platform | |
Goksel | Monitoring of a water basin area in Istanbul using remote sensing data | |
CN103164849A (en) | Geological image processing method and device | |
Bartelme | Geographic information systems | |
CN201681156U (en) | Wetland data acquisition system in multitasking mode | |
CN115375864A (en) | Unmanned aerial vehicle-based completion acceptance method for high-speed railway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20181207 Assignee: Guangxi Yuzhi Information Technology Co.,Ltd. Assignor: GUILIN University OF TECHNOLOGY Contract record no.: X2023980044314 Denomination of invention: Real time collection and analysis method and system for safety hazards information of tourist locations in smart scenic spots Granted publication date: 20230627 License type: Common License Record date: 20231023 |
|
EE01 | Entry into force of recordation of patent licensing contract |