CN111263302B - Hazardous area auditing method and system based on 5G edge computing network - Google Patents

Hazardous area auditing method and system based on 5G edge computing network Download PDF

Info

Publication number
CN111263302B
CN111263302B CN202010015128.0A CN202010015128A CN111263302B CN 111263302 B CN111263302 B CN 111263302B CN 202010015128 A CN202010015128 A CN 202010015128A CN 111263302 B CN111263302 B CN 111263302B
Authority
CN
China
Prior art keywords
audit
edge computing
mobile edge
computing node
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010015128.0A
Other languages
Chinese (zh)
Other versions
CN111263302A (en
Inventor
孙立新
孙玉飞
李娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baicells Technologies Co Ltd
Original Assignee
Beijing Bai Caibang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bai Caibang Technology Co ltd filed Critical Beijing Bai Caibang Technology Co ltd
Priority to CN202010015128.0A priority Critical patent/CN111263302B/en
Publication of CN111263302A publication Critical patent/CN111263302A/en
Application granted granted Critical
Publication of CN111263302B publication Critical patent/CN111263302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Abstract

The embodiment of the application provides a dangerous area auditing method and system based on a 5G edge computing network. The method comprises the following steps: setting a plurality of mobile edge computing nodes in the dangerous area according to the position and the type of an auditing object, and accessing the mobile edge computing nodes into a 5G network to form a mobile edge computing network; acquiring auditing parameters of each mobile edge computing node corresponding to an auditing object according to a preset time interval, and comparing the auditing parameters with instrument acquisition data of the auditing object to obtain a comparison result; if the comparison result exceeds a preset threshold value, triggering an assistance audit signal to a neighbor mobile edge computing node of the mobile edge computing node; and interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain audit result data of the audit object. According to the method and the device, the auditing efficiency is improved through the prediction algorithm.

Description

Hazardous area auditing method and system based on 5G edge computing network
Technical Field
The application relates to the field of fifth-generation mobile communication technology and auditing, in particular to a dangerous area auditing method and system based on a 5G edge computing network.
Background
Dangerous areas are frequently encountered in the auditing process, and on one hand, the dangerous areas are difficult to reach for accountants or cause personal danger after reaching; on the other hand, audit parameters for these hazardous areas are difficult to obtain, or the meters that monitor these hazardous areas themselves may not be accurate enough to provide confident audit data to the accountants. Moreover, the parameters of various types of audit objects in the dangerous area can be changed rapidly. For example, in a boiler pipeline house of a large-scale factory, various pipelines are often distributed, the pipeline is prevented from being high in temperature, high in humidity and weak in illumination, measurement of instruments and equipment is not accurate, difficulty is brought to auditors, and once the pipeline is leaked, personal safety of the auditors is threatened.
Therefore, there is a need for an efficient and accurate method and apparatus that addresses these problems during the rental housing installation process.
Disclosure of Invention
In view of this, the present application aims to provide a method and a system for auditing a hazardous area based on a 5G edge computing network, so as to improve auditing efficiency and solve the technical problem that in the current auditing process, an accountant cannot obtain detailed parameters of an auditing object timely and accurately without personal threat.
Based on the above purpose, the present application provides a hazardous area auditing method based on a 5G edge computing network, including:
setting a plurality of mobile edge computing nodes in the dangerous area according to the position and the type of an auditing object, and accessing the mobile edge computing nodes into a 5G network to form a mobile edge computing network;
acquiring auditing parameters of each mobile edge computing node corresponding to an auditing object according to a preset time interval, and comparing the auditing parameters with instrument acquisition data of the auditing object to obtain a comparison result;
if the comparison result exceeds a preset threshold value, triggering an assistance audit signal to a neighbor mobile edge computing node of the mobile edge computing node;
and interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain audit result data of the audit object.
In some embodiments, historical data corresponding to an audit object is analyzed, and when the historical data does not accord with an audit rule, an error warning is sent to a user;
and checking the working state of the neighbor mobile edge computing node, and returning the checking result to the user.
In some embodiments, setting up a plurality of mobile edge computing nodes within the hazardous area according to the location and type of the audit object includes:
setting a mobile edge computing node at a first position of the audit object, and setting neighbor mobile edge computing nodes at a plurality of positions adjacent to the mobile edge computing node;
calculating the audit parameter of the first position through the neighbor mobile edge computing node, and judging whether the audit parameter is equal to the audit parameter collected by the mobile edge computing node corresponding to the first position or not to obtain a judgment result;
and if the judgment results are not equal, performing initialization calibration.
In some embodiments, the initialization calibration comprises:
adjusting the position and/or type of the neighbor mobile edge computing node;
and checking the acquisition precision of the mobile edge computing node.
In some embodiments, collecting audit parameters of each moving edge computing node corresponding to an audit object at a preset time interval, and comparing the audit parameters with meter collection data of the audit object includes:
collecting the audit parameters of the audit object at n randomly selected time points according to the difference of the collection nodes to form an audit parameter set marked as An
Forming an instrument parameter set marked as B by data collected by the instrument at the n randomly selected time pointsn
A is describednAnd said BnThe comparison therebetween is made by the following formula:
Figure BDA0002358588660000021
wherein com is the result of said comparison, i is the ith time point of said n randomly selected time points, aiIs the AnThe ith audit parameter of (1), biIs the said BnThe ith data collected.
In some embodiments, triggering assistance audit signals to neighbor mobile edge computing nodes of the mobile edge mobile computing node comprises:
sending an audit signal to the neighbor edge computing node, and returning an in-doubt marking signal through a 5G network;
and searching the auditing case corresponding to the auditing object according to the doubt marking signal, and expanding the auditing content of the mobile edge computing node.
In some embodiments, interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain audit result data of the audit object, including:
and under the condition that the audit result data do not meet the audit requirement, continuously sending an audit assisting signal to the adjacent node of the neighbor mobile edge computing node through the 5G network.
Based on the above purpose, the present application further provides a hazardous area auditing system based on a 5G edge computing network, including:
the system comprises a construction module, a mobile edge computing network and a monitoring module, wherein the construction module is used for setting a plurality of mobile edge computing nodes in a dangerous area according to the position and the type of an audit object, and accessing the mobile edge computing nodes into a 5G network to form a mobile edge computing network;
the acquisition module is used for acquiring the auditing parameters of each mobile edge computing node corresponding to the auditing object according to a preset time interval, and comparing the auditing parameters with the instrument acquisition data of the auditing object to obtain a comparison result;
a triggering module, configured to trigger an assistance audit signal to a neighboring mobile edge computing node of the mobile edge mobile computing node if the comparison result exceeds a preset threshold;
and the computing module is used for interacting the collected audit data with the neighbor mobile edge computing node through the 5G network and computing to obtain audit result data of the audit object.
In some embodiments, the system further comprises:
the analysis module is used for analyzing the historical data corresponding to the audit object and sending out error warning to the user when the historical data does not accord with the audit rule;
and the checking module is used for checking the working state of the neighbor mobile edge computing node and returning the checking result to the user.
In some embodiments, the building module comprises:
an initial unit, configured to set a mobile edge computing node at a first position of the audit object, and set neighbor mobile edge computing nodes at a plurality of positions adjacent to the mobile edge computing node;
the judging unit is used for calculating the audit parameters of the first position through the neighbor mobile edge computing node, judging whether the audit parameters are equal to the audit parameters collected by the mobile edge computing node corresponding to the first position or not, and obtaining a judging result;
and the calibration unit is used for carrying out initialization calibration if the judgment results are not equal.
Drawings
In the drawings, like reference numerals refer to the same or similar parts or elements throughout the several views unless otherwise specified. The figures are not necessarily to scale. It is appreciated that these drawings depict only some embodiments in accordance with the disclosure and are therefore not to be considered limiting of its scope.
Fig. 1 shows a flowchart of a method for auditing a hazardous area based on a 5G edge computing network according to an embodiment of the present invention.
Fig. 2 shows a flowchart of a method for auditing a hazardous area based on a 5G edge computing network according to an embodiment of the present invention.
Fig. 3 is a block diagram showing a hazardous area auditing system based on a 5G edge computing network according to an embodiment of the present invention.
Fig. 4 is a block diagram showing a hazardous area auditing system based on a 5G edge computing network according to an embodiment of the present invention.
Fig. 5 shows a composition diagram of a building block according to an embodiment of the present invention.
Fig. 6 shows a schematic diagram of a hazardous area auditing system based on a 5G edge computing network according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows a flowchart of a method for auditing a hazardous area based on a 5G edge computing network according to an embodiment of the present invention. As shown in fig. 1, the method for auditing a hazardous area based on a 5G edge computing network includes:
and step S11, setting a plurality of mobile edge computing nodes in the dangerous area according to the position and the type of the auditing object, and accessing the mobile edge computing nodes into a 5G network to form a mobile edge computing network.
In particular, the mobile edge computing nodes may be unified or may be designed separately. For example, the mobile edge computing node for measuring the boiler pipeline can be arranged on the boiler pipeline as an integral device, or the mobile edge computing node can be divided into an acquisition part and an analysis part, wherein the acquisition part is arranged on the boiler pipeline, and the acquired result is transmitted to the remote analysis part through a 5G network. The split design has the advantages that the analysis part can perform operation in a relatively low-temperature environment, so that the calculation efficiency is improved, in addition, under the condition that leakage occurs at the boiler side, the split design only damages the acquisition part, the analysis part can also be normally used, and unnecessary loss is avoided.
In addition, the mobile edge computing node can be arranged outside the audit object and inside the audit object according to the difference of the audit object. For example, a moving edge calculation node for measuring a boiler pipe may measure parameters of contents flowing out of the pipe at the outside of the pipe, or may be provided at the inside of the pipe as needed to measure parameters such as the concentration of the contents in the pipe that can only be collected at the inside of the pipe.
Of course, the mobile edge computing nodes can adopt different types and structures to be mixed and set according to the requirements of the audit site, so that the audit efficiency and accuracy are improved.
In one embodiment, a plurality of mobile edge computing nodes are arranged in a dangerous area according to the position and the type of an audit object, and the method comprises the following steps:
setting a mobile edge computing node at a first position of the audit object, and setting neighbor mobile edge computing nodes at a plurality of positions adjacent to the mobile edge computing node;
calculating the audit parameter of the first position through the neighbor mobile edge computing node, and judging whether the audit parameter is equal to the audit parameter collected by the mobile edge computing node corresponding to the first position or not to obtain a judgment result;
and if the judgment results are not equal, performing initialization calibration.
In one embodiment, the initialization calibration includes:
adjusting the position and/or type of the neighbor mobile edge computing node;
and checking the acquisition precision of the mobile edge computing node.
In particular, when the contents of the boiler pipe are examined, because the liquid flow inside the pipe is not uniform and the flow contents may change, the edge computing nodes are arranged at one point separately, which may cause inaccurate data acquisition.
Fig. 6 shows a schematic diagram of a hazardous area auditing method based on a 5G edge computing network according to an embodiment of the present invention. As can be further seen from fig. 6, of the A, B, C points, only point B had contents attached to the tube wall, while neither point A, C had any attachments. Thus, if the move is set only at point B, it may be measured that a large amount of contents are present in the pipeline, making the audit result unreliable.
And step S12, acquiring auditing parameters of each mobile edge computing node corresponding to an auditing object according to a preset time interval, and comparing the auditing parameters with the instrument acquisition data of the auditing object to obtain a comparison result.
Specifically, a mobile edge computing node can be arranged to be connected with the meter and directly read the data of the specified meter, so that the automatic comparison of the audit data and the meter data can be realized. For example, when a boiler room pipeline is audited, one or more mobile edge computing nodes can be arranged on the pipeline, and then one mobile edge computing node connected with a pipeline instrument is arranged, when an auditing process is started, raw data collected from the one or more mobile edge computing nodes is preprocessed and then is compared with data of the mobile edge computing node of an instrument vector in real time.
In one embodiment, collecting audit parameters of each mobile edge computing node corresponding to an audit object at a preset time interval, and comparing the audit parameters with meter collection data of the audit object comprises:
collecting the audit parameters of the audit object at n randomly selected time points according to the difference of the collection nodes to form an audit parameter set marked as An
Forming an instrument parameter set marked as B by data collected by the instrument at the n randomly selected time pointsn
A is describednAnd said BnThe comparison therebetween is made by the following formula:
Figure BDA0002358588660000061
wherein com is the result of said comparison, i is the ith time point of said n randomly selected time points, aiIs the AnThe ith audit parameter of (1), biIs the said BnThe ith data collected.
Through the formula, the difference value of each parameter in the audit object can be calculated in real time, and positive and negative differences can be embodied in the comparison result.
Step S13, if the comparison result exceeds the preset threshold, triggering an assistance audit signal to the neighbor mobile edge computing node of the mobile edge computing node.
Specifically, when the difference between the actual audited value and the meter display data is large (so that the preset threshold is exceeded), there may be two cases: one condition is that the data displayed by the instrument panel is unreliable data, and the auditing object may have fake; another situation is where the data collected by the mobile edge compute nodes is not accurate enough. Still as shown in fig. 6, if only one moving edge computing node B is set in the auditing process of a certain pipeline, and the B happens to be a position with contents, the data displayed on the dashboard at this time will be inconsistent with the data collected by the moving edge computing node at the B.
In this case, the B point needs to trigger an assistance audit signal to the neighboring mobile edge computing node through the 5G network, that is, the B point triggers an assistance audit signal to the nodes a and C, and the mobile edge computing nodes of the a point and the C point acquire contents of their respective positions after receiving the assistance audit signal, and determine parameters of the B point through calculation.
In one embodiment, triggering assistance audit signals to neighboring mobile edge computing nodes of the mobile edge mobile computing node comprises:
sending an audit signal to the neighbor edge computing node, and returning an in-doubt marking signal through a 5G network;
and searching the auditing case corresponding to the auditing object according to the doubt marking signal, and expanding the auditing content of the mobile edge computing node.
Specifically, the audit of historical anomaly data is compared during the audit process. For example, a certain point (i.e., an audit object) of a pipeline in the historical manuscript can often detect an audit exception, so that the audit of the point is increased in the audit process. And once finding that the point has problems again, the audit case corresponding to the point can be found through the doubt mark, the audit exception is found under the condition that the point generally has the audit exception, the extended audit is carried out on the audit object once again according to all the historical exceptions, and whether the new audit exception exists is checked.
And step S14, interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain the audit result data of the audit object.
Specifically, in the auditing process, problems such as traffic monitoring may be encountered, and at this time, data collected at one point alone may not be accurate enough, and multiple mobile edge computing nodes are required to perform data interaction, so that a more accurate auditing result can be obtained.
In an embodiment, interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain audit result data of the audit object, includes:
and under the condition that the audit result data do not meet the audit requirement, continuously sending an audit assisting signal to the adjacent node of the neighbor mobile edge computing node through the 5G network.
Data interaction is carried out between adjacent nodes through a 5G network, so that the data interaction efficiency can be greatly improved, and the audit delay is reduced.
Fig. 2 shows a flowchart of a method for auditing a hazardous area based on a 5G edge computing network according to an embodiment of the present invention. As shown in fig. 2, the method for auditing a hazardous area based on a 5G edge computing network further includes:
and step S15, analyzing the historical data of the corresponding auditing object, and sending error warning to the user when the historical data does not accord with the auditing rule.
In particular, when the historical data does not comply with the audit rules, an anomaly may have occurred in the pipeline, requiring an error warning to be issued to the user. For example, an accountant may find that there is no pipe contents, which may be a failure of the mobile edge computing node itself, which requires a timely error warning to the accountant.
And step S16, checking the working state of the neighbor mobile edge computing node, and returning the checking result to the user.
Specifically, when a mobile edge computing node fails, it needs to determine whether the mobile edge computing nodes in its vicinity also fail, because the occurrence of the failure generally exhibits an aggregation rule during the auditing process, for example, when a mobile edge computing node is disconnected from a 5G network, it may be that a router connected to the mobile edge computing node has a problem, and one router may connect a plurality of mobile edge computing nodes. To solve this problem, the mobile edge compute node not only needs to be able to self-fail check, but also has the ability to check its neighboring neighbor edge compute nodes
Fig. 3 is a block diagram showing a hazardous area auditing system based on a 5G edge computing network according to an embodiment of the present invention. As shown in fig. 3, the whole hazardous area auditing system based on the 5G edge computing network may be divided into:
a building module 31, configured to set multiple mobile edge computing nodes in the hazardous area according to the position and type of the audit object, and access the multiple mobile edge computing nodes to a 5G network to form a mobile edge computing network;
the acquisition module 32 is used for acquiring the auditing parameters of each mobile edge computing node corresponding to the auditing object according to a preset time interval, and comparing the auditing parameters with the instrument acquisition data of the auditing object to obtain a comparison result;
a triggering module 33, configured to trigger an assistance audit signal to a neighboring mobile edge computing node of the mobile edge mobile computing node if the comparison result exceeds a preset threshold;
and the calculating module 34 is configured to interact the collected audit data with the neighbor mobile edge calculating node through the 5G network, and calculate to obtain audit result data of the audit object.
Fig. 4 is a block diagram showing a hazardous area auditing system based on a 5G edge computing network according to an embodiment of the present invention. As shown in fig. 4, the hazardous area auditing system based on the 5G edge computing network further includes:
the analysis module 35 is configured to analyze historical data of a corresponding audit object, and send an error warning to a user when the historical data does not meet an audit rule;
and the checking module 36 is used for checking the working state of the neighbor mobile edge computing node and returning the checking result to the user.
Fig. 5 shows a composition diagram of a building block according to an embodiment of the present invention. As shown in fig. 5, the building module 31 of the hazardous area auditing system based on the 5G edge computing network includes:
an initial unit 311, configured to set a mobile edge computing node at a first position of the audit object, and set neighbor mobile edge computing nodes at multiple positions adjacent to the mobile edge computing node;
a determining unit 312, configured to calculate, by the neighboring mobile edge computing node, an audit parameter of the first location, and determine whether the audit parameter is equal to the audit parameter collected by the mobile edge computing node corresponding to the first location, so as to obtain a determination result;
and the calibration unit 313 is used for performing initialization calibration if the judgment results are not equal.
The functions of the modules in the systems in the embodiments of the present application may refer to the corresponding descriptions in the above methods, and are not described herein again.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various changes or substitutions within the technical scope of the present invention, and these should be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (7)

1. A dangerous area auditing method based on a 5G edge computing network is characterized by comprising the following steps:
setting a plurality of mobile edge computing nodes in the dangerous area according to the position and the type of an audit object, wherein the mobile edge computing nodes comprise: setting a mobile edge computing node at a first position of the audit object, and setting neighbor mobile edge computing nodes at a plurality of positions adjacent to the mobile edge computing node; calculating the audit parameter of the first position through the neighbor mobile edge computing node, and judging whether the audit parameter is equal to the audit parameter collected by the mobile edge computing node corresponding to the first position or not to obtain a judgment result; if the judgment results are not equal, performing initialization calibration; accessing the plurality of mobile edge computing nodes to a 5G network to form a mobile edge computing network;
according to a preset time interval, collecting audit parameters of each mobile edge computing node corresponding to an audit object, and comparing the audit parameters with instrument collection data of the audit object to obtain a comparison result, wherein the comparison result comprises the following steps:
collecting the audit parameters of the audit object at n randomly selected time points according to the difference of the collection nodes to form an audit parameter set marked as An
Forming an instrument parameter set marked as B by data collected by the instrument at the n randomly selected time pointsn
A is describednAnd said BnThe comparison therebetween is made by the following formula:
Figure FDA0002947282530000011
wherein com is the result of said comparison, i is the ith time point of said n randomly selected time points, aiIs the AnThe ith audit parameter of (1), biIs the said BnThe ith acquisition data;
if the comparison result exceeds a preset threshold value, triggering an assistance audit signal to a neighbor mobile edge computing node of the mobile edge computing node;
and interacting the collected audit data with the neighbor mobile edge computing node through the 5G network, and calculating to obtain audit result data of the audit object.
2. The method of claim 1, further comprising:
analyzing historical data corresponding to an audit object, and sending an error warning to a user when the historical data does not accord with an audit rule;
and checking the working state of the neighbor mobile edge computing node, and returning the checking result to the user.
3. The method of claim 1, wherein the initializing calibration comprises:
adjusting the position and/or type of the neighbor mobile edge computing node;
and checking the acquisition precision of the mobile edge computing node.
4. The method of claim 1, wherein triggering assistance audit signals to neighboring mobile edge computing nodes of the mobile edge mobile computing node comprises:
sending an audit signal to the neighbor edge computing node, and returning an in-doubt marking signal through a 5G network;
and searching the auditing case corresponding to the auditing object according to the doubt marking signal, and expanding the auditing content of the mobile edge computing node.
5. The method of claim 1, wherein interacting the collected audit data with the neighbor mobile edge computing node through the 5G network to obtain audit result data of the audit object by calculation, comprises:
and under the condition that the audit result data do not meet the audit requirement, continuously sending an audit assisting signal to the adjacent node of the neighbor mobile edge computing node through the 5G network.
6. A hazardous area auditing system based on a 5G edge computing network is characterized by comprising:
the system comprises a construction module, a mobile edge computing network and a monitoring module, wherein the construction module is used for setting a plurality of mobile edge computing nodes in a dangerous area according to the position and the type of an audit object, and accessing the mobile edge computing nodes into a 5G network to form a mobile edge computing network; the building module comprises: an initial unit, configured to set a mobile edge computing node at a first position of the audit object, and set neighbor mobile edge computing nodes at a plurality of positions adjacent to the mobile edge computing node; the judging unit is used for calculating the audit parameters of the first position through the neighbor mobile edge computing node, judging whether the audit parameters are equal to the audit parameters collected by the mobile edge computing node corresponding to the first position or not, and obtaining a judging result; the calibration unit is used for carrying out initialization calibration if the judgment results are not equal; the acquisition module is used for acquiring audit parameters of each mobile edge computing node corresponding to an audit object according to a preset time interval, and comparing the audit parameters with instrument acquisition data of the audit object to obtain a comparison result, and the acquisition module comprises:
collecting the audit parameters of the audit object at n randomly selected time points according to the difference of the collection nodes to form an audit parameter set marked as An
Forming an instrument parameter set marked as B by data collected by the instrument at the n randomly selected time pointsn
A is describednAnd said BnThe comparison therebetween is made by the following formula:
Figure FDA0002947282530000021
wherein com is the result of said comparison, i is the ith time point of said n randomly selected time points, aiIs the AnThe ith audit parameter of (1), biIs the said BnThe ith acquisition data;
a triggering module, configured to trigger an assistance audit signal to a neighboring mobile edge computing node of the mobile edge mobile computing node if the comparison result exceeds a preset threshold;
and the computing module is used for interacting the collected audit data with the neighbor mobile edge computing node through the 5G network and computing to obtain audit result data of the audit object.
7. The system of claim 6, further comprising:
the analysis module is used for analyzing the historical data corresponding to the audit object and sending out error warning to the user when the historical data does not accord with the audit rule;
and the checking module is used for checking the working state of the neighbor mobile edge computing node and returning the checking result to the user.
CN202010015128.0A 2020-01-07 2020-01-07 Hazardous area auditing method and system based on 5G edge computing network Active CN111263302B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010015128.0A CN111263302B (en) 2020-01-07 2020-01-07 Hazardous area auditing method and system based on 5G edge computing network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010015128.0A CN111263302B (en) 2020-01-07 2020-01-07 Hazardous area auditing method and system based on 5G edge computing network

Publications (2)

Publication Number Publication Date
CN111263302A CN111263302A (en) 2020-06-09
CN111263302B true CN111263302B (en) 2021-06-04

Family

ID=70954172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010015128.0A Active CN111263302B (en) 2020-01-07 2020-01-07 Hazardous area auditing method and system based on 5G edge computing network

Country Status (1)

Country Link
CN (1) CN111263302B (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108495319B (en) * 2012-09-07 2022-07-01 索尼公司 Wireless transmission resource management device and method
CN105868533B (en) * 2016-03-23 2018-12-14 四川理工学院 Based on Internet of Things and the integrated perception of 3S technology river basin water environment and application method
CN105915388B (en) * 2016-05-31 2019-06-04 广东电网有限责任公司电力调度控制中心 A kind of Transducer-fault Detecting Method and system based on distributed network
CN106358245B (en) * 2016-11-07 2019-12-27 北京佰才邦技术有限公司 Method and controller for sharing load of mobile edge computing application
CN110249639B (en) * 2017-02-10 2021-10-22 霍尼韦尔国际公司 System and method for monitoring and mapping noise data from multiple noise monitoring devices
WO2018161338A1 (en) * 2017-03-10 2018-09-13 SZ DJI Technology Co., Ltd. Methods and systems for supporting flight restriction of unmanned aerial vehicles
CN108898528A (en) * 2018-06-22 2018-11-27 公安部天津消防研究所 A kind of reasoning by cases method towards hazardous chemical accident emergency aid decision
CN109922428B (en) * 2019-03-06 2021-01-01 山东科技大学 Quick remote location and emergent guarantee system of dangerous gas leakage source
CN110310007A (en) * 2019-05-22 2019-10-08 菜鸟智能物流控股有限公司 Risk Identification Method, device, equipment and storage medium
CN110228484B (en) * 2019-06-17 2021-02-19 福州视驰科技有限公司 Low-delay intelligent remote driving system with auxiliary driving function

Also Published As

Publication number Publication date
CN111263302A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN109239265B (en) Fault detection method and device for monitoring equipment
US10884404B2 (en) Method of predicting plant data and apparatus using the same
US20080168826A1 (en) Method and system for gas leak detection and localization
US20130088604A1 (en) Method for displaying a thermal image in an ir camera, and an ir camera
CN110274669B (en) Online calibration method for large-diameter electronic water meter
CN105512011B (en) A kind of electronics testability modeling appraisal procedure
CN101657770B (en) Machine condition monitoring using discontinuity detection
CN107255526A (en) A kind of temperature checking method, detection module and detecting system
CN109115807A (en) A kind of soil moisture automatic Observation data exception value detection method and system
CN111263302B (en) Hazardous area auditing method and system based on 5G edge computing network
CN108152458A (en) Gas detection method and device
CN103975557B (en) The method and system of evaluation for sensor observation
CN116973769A (en) Method, device, electronic equipment and medium for detecting state of energy storage battery
Kwon Implementation and evaluation of a low-cost weigh-in-motion system
JP2740718B2 (en) Leakage point and leak amount estimation system for gas, steam, etc.
CN116699093A (en) Underground water quality detection method, system and readable storage medium
CA3114323A1 (en) Method and apparatus for ascertaining the occurrence of a defect in a line by means of estimation
JP2006133225A (en) Advanced hit skid data collection
Corser et al. Field test results for a real-time intelligent drilling monitor
CN111047160B (en) Pollution cause analysis method and device, readable storage medium and electronic equipment
CN113033842A (en) Control management method and control management system for leakage of water supply network system
CN114331128A (en) Intelligent water affair management method, system, equipment and medium based on Internet of things
CN110083901B (en) Gas pipeline checking method and device
CN109714725B (en) Factory environment safety self-checking method based on fuzzy comprehensive evaluation
CN109669205A (en) A kind of Peak Search Method of seawater radionuclide K40 element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 100094 9 / F, 10 / F, building 1, zone 1, 81 Beiqing Road, Haidian District, Beijing

Patentee after: Beijing baicaibang Technology Co.,Ltd.

Address before: 100085 Beijing Haidian District city information industry base development road 1, 3 tier 3001

Patentee before: Beijing Bai Caibang Technology Co.,Ltd.

CP03 Change of name, title or address