CN113220758B - Project maturity analysis and demonstration method - Google Patents

Project maturity analysis and demonstration method Download PDF

Info

Publication number
CN113220758B
CN113220758B CN202110451369.4A CN202110451369A CN113220758B CN 113220758 B CN113220758 B CN 113220758B CN 202110451369 A CN202110451369 A CN 202110451369A CN 113220758 B CN113220758 B CN 113220758B
Authority
CN
China
Prior art keywords
management platform
project maturity
project
voice
amplitude
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110451369.4A
Other languages
Chinese (zh)
Other versions
CN113220758A (en
Inventor
戴一明
汪蓓
周宏文
赵根
侯伟
胡源
周安强
陈萃
李晶
李翔
张建
刘佳川
徐放
黎欢
高成军
杜康
万斯奇
郭云龙
黄凯
廖小莉
李柏林
马小明
周健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Planning And Natural Resources Information Center
Original Assignee
Chongqing Planning And Natural Resources Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Planning And Natural Resources Information Center filed Critical Chongqing Planning And Natural Resources Information Center
Priority to CN202110451369.4A priority Critical patent/CN113220758B/en
Publication of CN113220758A publication Critical patent/CN113220758A/en
Application granted granted Critical
Publication of CN113220758B publication Critical patent/CN113220758B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Remote Sensing (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a project maturity analysis and demonstration method, which comprises the following steps: s1, logging in a project maturity management platform; s2, importing project maturity basic data; and S3, the project maturity management platform processes the imported project maturity basic data, and the obtained project maturity is displayed on the intelligent handheld mobile equipment. The invention can reduce the complicated login process and the maturity of the visual display project, and enhance the user experience.

Description

Project maturity analysis and demonstration method
Technical Field
The invention relates to the technical field of data display, in particular to a project maturity analysis and demonstration method.
Background
And (3) developing and utilizing urban and rural planning big data and urban operation big data fusion treatment, and establishing a big data system combining static planning data and urban operation dynamic data. The method is characterized in that government affair business management requirements are used as guidance, three-tone data are used as the basis, the data of a map of a homeland space planning are subjected to fusion treatment, a layered space unit system which takes administrative areas, streets, communities, groups and traffic cells as frames is established, land use, building, population, facilities and urban hot spot data are fused into each level of space units, a data system integrating land use, building, population, urban operation and basic support is formed, and data support is provided for developing implementation of a comprehensive project of a plurality of general "one blueprint".
Disclosure of Invention
The invention aims at least solving the technical problems existing in the prior art, and particularly creatively provides a project maturity analysis and demonstration method.
In order to achieve the above object, the present invention provides a project maturity analysis and demonstration method, comprising the steps of:
s1, logging in a project maturity management platform;
s2, importing project maturity basic data;
s3, the project maturity management platform processes the imported project maturity basic data; and displaying the obtained project maturity on the intelligent handheld mobile device.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the project maturity management platform judges whether a login request trigger signal is received or not:
if the project maturity management platform receives the login request trigger signal, executing step S12;
if the project maturity management platform does not receive the login request trigger signal, continuing waiting, and returning to the step S11;
s12, the project maturity management platform judges whether equipment information of the intelligent handheld mobile equipment to be logged in the project maturity management platform and a login account are authenticated or not:
if the device information and the login account number of the intelligent handheld mobile device of the to-be-logged-in project maturity management platform are authenticated, the device information of the intelligent handheld mobile device is an international mobile equipment identification code IMEI of the intelligent handheld mobile device, and then step S13 is executed;
if the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in is not authenticated with the login account, authenticating the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in;
s13, the project maturity management platform generates a login account number according to the login account, and sends the generated login account number to a mobile phone number associated with the login account;
s14, the project maturity management platform judges whether the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform or not:
if the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device logs in successfully;
if the login account number input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device fails to log in.
In a preferred embodiment of the present invention, the step S12 of the item maturity management platform determining whether the device information of the smart handheld mobile device of the item maturity management platform to be logged in is authenticated with the login account includes the steps of:
s121, acquiring equipment information of the intelligent handheld mobile equipment by the project maturity management platform;
s122, performing equipment information authentication processing on the acquired equipment information of the intelligent handheld mobile equipment to obtain equipment codes of the intelligent handheld mobile equipment;
s123, judging whether the obtained equipment codes exist in an equipment code database of the project maturity management platform or not:
if the equipment code exists in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment of the project maturity management platform to be logged in are authenticated, and the login account number corresponding to the equipment code is extracted;
if the equipment code does not exist in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment to be logged in to the project maturity management platform are not authenticated.
In a preferred embodiment of the present invention, authenticating the device information of the smart handheld mobile device to be logged in to the project maturity management platform in step S12 comprises the steps of:
s121, the project maturity management platform acquires a login account of the project maturity management platform to be logged in;
s122, performing login account authentication processing on the acquired login account to obtain an account authentication code of the login account, and judging whether the account authentication code of the login account exists in an account authentication code database of the project maturity management platform or not:
if the account number authentication code exists in the account number authentication code database of the project maturity management platform, extracting a mobile phone number corresponding to the account number authentication code, and sending the generated account number mobile phone authentication code to the mobile phone number; the step S123 is performed such that,
if the account authentication code does not exist in the account authentication code database of the project maturity management platform, prompt information is sent to the intelligent handheld mobile equipment of the project maturity management platform to be logged in, wherein the prompt information is that the input login account is not existing in the project maturity management platform;
s123, the project maturity management platform judges whether an account mobile phone authentication code input by the intelligent handheld mobile device to be logged in the project maturity management platform is consistent with an account mobile phone authentication code sent by the project maturity management platform or not:
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the account mobile phone authentication code sent by the project maturity management platform, the device information of the intelligent handheld mobile device of the project maturity management platform to be logged in is associated with the account mobile phone authentication code;
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the account mobile phone authentication code sent by the project maturity management platform, sending prompt information to the intelligent handheld mobile device of the project maturity management platform to be logged in, wherein the prompt information is that the input account mobile phone authentication code is incorrect.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, classifying types in the project maturity basic data, wherein the classification method comprises the following steps:
s211, numbering each file in the project maturity basic data according to the sequence, wherein the file numbers are respectively 1 st file number, 2 nd file number, 3 rd file number, … … and A-th file number, and A is the total number of the files in the project maturity basic data; let increment a=1;
s212, judging whether the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform:
if the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform, storing the file corresponding to the a-th file number into a temporary storage database which is the same as the file extension of the file corresponding to the a-th file number; a=a+1;
if the file extension name of the file corresponding to the a-th file number is not the file extension name identified by the project maturity management platform, the project maturity management platform establishes a temporary invalid folder, and stores the file corresponding to the a-th file number into the temporary invalid folder; a=a+1;
s213, judging the relation between the increment a and the total number A of files in the project maturity base data:
if a is less than or equal to A, returning to the step S212;
if a is more than A, the type classification is finished;
s22, extracting files stored in each temporary storage database for analysis, and obtaining project maturity basic data identified by a project maturity management platform.
In a preferred embodiment of the present invention, the following steps are included in step S3:
s31, extracting three-dimensional coordinate points in project maturity basic data;
s32, acquiring a map stored in the project maturity management platform, and correspondingly calibrating all the extracted three-dimensional coordinate points on the map;
s33, conducting adjacent three-dimensional coordinate point connection on all three-dimensional coordinate points calibrated on the map to obtain a contour line of the project, wherein the contour line is a closed and disjoint curve;
s34, calculating the contour area according to the obtained contour line, obtaining the building area in the map where the contour line is located, and judging the building area
Figure BDA0003038811640000051
Within the range of v 1 Representing the building area, v, within the map where the contour line is located 2 Representing the outline area, v representing the item maturity, and representing its item maturity in different colors.
In a preferred embodiment of the present invention, the step S3 further comprises a query according to its keywords; the content of its query is presented on the smart handheld mobile device.
In summary, due to the adoption of the technical scheme, the login method and the login device can reduce the complicated login process and the maturity of the visual display item, and enhance the user experience.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
FIG. 1 is a schematic flow chart of the present invention.
FIG. 2 is a schematic representation of the maturity of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention provides a project maturity analysis and demonstration method, which is shown in figure 1 and comprises the following steps:
s1, logging in a project maturity management platform;
s2, importing project maturity basic data;
and S3, the project maturity management platform processes the imported project maturity basic data, and the obtained project maturity is displayed on the intelligent handheld mobile equipment.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the project maturity management platform judges whether a login request trigger signal is received or not:
if the project maturity management platform receives the login request trigger signal, executing step S12;
if the project maturity management platform does not receive the login request trigger signal, continuing waiting, and returning to the step S11;
s12, the project maturity management platform judges whether equipment information of the intelligent handheld mobile equipment to be logged in the project maturity management platform and a login account are authenticated or not:
if the device information and the login account number of the intelligent handheld mobile device of the to-be-logged-in project maturity management platform are authenticated, the device information of the intelligent handheld mobile device is an international mobile equipment identification code IMEI of the intelligent handheld mobile device, and then step S13 is executed;
if the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in is not authenticated with the login account, authenticating the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in;
s13, the project maturity management platform generates a login account number according to the login account, and sends the generated login account number to a mobile phone number associated with the login account; the method for generating the login account number by the project maturity management platform according to the login account number comprises the following steps:
Loginaccountnumber=Secure Hash Algorithm(Loginaccount-Devicecode),
wherein Secure Hash Algorithm () is a secure hash algorithm of SHA-1;
loginaccount represents a login account;
devicecode represents a device code;
-means to concatenate the device code Devicecode with the beginning and end of the login account Loginaccount; for example, when the device code Devicecode is 123 and the login account Loginaccount is 234, the Loginaccount-Devicecode is 234123; when its device code Devicecode is 789 and the login account number Loginaccount is 0145, the Loginaccount-Devicecode is 0145789; when its device code Devicecode is 148 and the login account Loginaccount is 51, loginaccount-Devicecode is denoted 51148.
Logina ccountnumber represents an arithmetic connection value;
Figure BDA0003038811640000071
wherein J represents the total number of bits of the operation connection value Logina ccountnumber;
loginaccountnumber (j) the j-th bit of the arithmetic connection value Loginaccountnumber;
d represents an adjustment coefficient and is a positive integer; d E [ alpha, beta ]],
Figure BDA0003038811640000072
Alpha is a lower limit adjustment value, beta is an upper limit adjustment value, and int () represents a rounding function;
number indicates a login account number.
S14, the project maturity management platform judges whether the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform or not:
if the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device logs in successfully;
if the login account number input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device fails to log in.
In a preferred embodiment of the present invention, the step S12 of the item maturity management platform determining whether the device information of the smart handheld mobile device of the item maturity management platform to be logged in is authenticated with the login account includes the steps of:
s121, acquiring equipment information of the intelligent handheld mobile equipment by the project maturity management platform;
s122, performing equipment information authentication processing on the acquired equipment information of the intelligent handheld mobile equipment to obtain equipment codes of the intelligent handheld mobile equipment; the method for obtaining the equipment code comprises the following steps:
Devicecode=Secure Hash Algorithm(DeviceInformation,DeviceInformation k ),
wherein Secure Hash Algorithm () is a secure hash algorithm of SHA-1;
DeviceInformation represents device information of the intelligent handheld mobile device;
DeviceInformation k a sum of top k-bit values representing device information DeviceInformation of the smart handheld mobile device; k is a positive integer less than or equal to K, and K is the total bit number of the device information of the intelligent handheld mobile device;
Secure Hash Algorithm(DeviceInformation,DeviceInformation k ) Representing DeviceInformation iterations of device information DeviceInformation for a smart handheld mobile device k A secure hash algorithm of secondary SHA-1;
devicecode represents a device code;
for example, when the device information DeviceInformation of the smart handheld mobile device is 359836049182979, the total bit number of the device information of the smart handheld mobile device is 15 bits, and when k is 2, the sum of the first 2 bit values of the device information DeviceInformation of the smart handheld mobile device is 3+5=8; when k is 4, the sum of the first 4 digits of the device information DeviceInformationof the intelligent handheld mobile device is 3+5+9+8=25; when k is 5, the sum of the first 5 digits of the device information DeviceInformation of the smart handheld mobile device is 3+5+9+8+3=28. When its devicecode= Secure Hash Algorithm (359836049182979,8), the secure hash algorithm for SHA-1 is performed 8 times on 359836049182979, namely:
Q 1 =Secure Hash Algorithm(359836049182979),
Q 2 =Secure Hash Algorithm(Q 1 ),
Q 3 =Secure Hash Algorithm(Q 2 ),
Q 4 =Secure Hash Algorithm(Q 3 ),
Q 5 =Secure Hash Algorithm(Q 4 ),
Q 6 =Secure Hash Algorithm(Q 5 ),
Q 7 =Secure Hash Algorithm(Q 6 ),
Q 8 =Secure Hash Algorithm(Q 7 ) The method comprises the steps of carrying out a first treatment on the surface of the At this time devicecode=q 8
When devicecode= Secure Hash Algorithm (359836049182979,25), the secure hash algorithm for SHA-1 is performed 25 times on 359836049182979, namely:
Q 1 =Secure Hash Algorithm(359836049182979),
Q 2 =Secure Hash Algorithm(Q 1 ),
Q 3 =Secure Hash Algorithm(Q 2 ),
Q 4 =Secure Hash Algorithm(Q 3 ),
Q 5 =Secure Hash Algorithm(Q 4 ),
Q 6 =Secure Hash Algorithm(Q 5 ),
Q 7 =Secure Hash Algorithm(Q 6 ),
Q 8 =Secure Hash Algorithm(Q 7 ),
Q 9 =Secure Hash Algorithm(Q 8 ),
Q 10 =Secure Hash Algorithm(Q 9 ),
Q 11 =Secure Hash Algorithm(Q 10 ),
Q 12 =Secure Hash Algorithm(Q 11 ),
Q 13 =Secure Hash Algorithm(Q 12 ),
Q 14 =Secure Hash Algorithm(Q 13 ),
Q 15 =Secure Hash Algorithm(Q 14 ),
Q 16 =Secure Hash Algorithm(Q 15 ),
Q 17 =Secure Hash Algorithm(Q 16 ),
Q 18 =Secure Hash Algorithm(Q 17 ),
Q 19 =Secure Hash Algorithm(Q 18 ),
Q 20 =Secure Hash Algorithm(Q 19 ),
Q 21 =Secure Hash Algorithm(Q 20 ),
Q 22 =Secure Hash Algorithm(Q 21 ),
Q 23 =Secure Hash Algorithm(Q 22 ),
Q 24 =Secure Hash Algorithm(Q 23 ),
Q 25 =Secure Hash Algorithm(Q 24 ) The method comprises the steps of carrying out a first treatment on the surface of the At this time devicecode=q 25
S123, judging whether the obtained equipment codes exist in an equipment code database of the project maturity management platform or not:
if the equipment code exists in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment of the project maturity management platform to be logged in are authenticated, and the login account number corresponding to the equipment code is extracted;
if the equipment code does not exist in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment to be logged in to the project maturity management platform are not authenticated.
In a preferred embodiment of the present invention, authenticating the device information of the smart handheld mobile device to be logged in to the project maturity management platform in step S12 comprises the steps of:
s121, the project maturity management platform acquires a login account of the project maturity management platform to be logged in;
s122, performing login account authentication processing on the acquired login account to obtain an account authentication code of the login account, and judging whether the account authentication code of the login account exists in an account authentication code database of the project maturity management platform or not:
if the account number authentication code exists in the account number authentication code database of the project maturity management platform, extracting a mobile phone number corresponding to the account number authentication code, and sending the generated account number mobile phone authentication code to the mobile phone number; the step S123 is performed such that,
if the account authentication code does not exist in the account authentication code database of the project maturity management platform, prompt information is sent to the intelligent handheld mobile equipment of the project maturity management platform to be logged in, wherein the prompt information is that the input login account is not existing in the project maturity management platform;
s123, the project maturity management platform judges whether an account mobile phone authentication code input by the intelligent handheld mobile device to be logged in the project maturity management platform is consistent with an account mobile phone authentication code sent by the project maturity management platform or not:
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the account mobile phone authentication code sent by the project maturity management platform, the device information of the intelligent handheld mobile device of the project maturity management platform to be logged in is associated with the account mobile phone authentication code;
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the account mobile phone authentication code sent by the project maturity management platform, sending prompt information to the intelligent handheld mobile device of the project maturity management platform to be logged in, wherein the prompt information is that the input account mobile phone authentication code is incorrect.
In a preferred embodiment of the present invention, in step S1, the login item maturity management platform may also include the steps of:
s11, judging whether the intelligent handheld mobile device triggering command is received:
if a trigger command for logging in the intelligent handheld mobile device is received, executing step S12;
if the triggering command of logging in the intelligent handheld mobile device is not received, returning to the step S11;
s12, acquiring login voice, and processing the acquired login voice to obtain login processing voice; sending the obtained login processing voice to a project maturity management platform;
s13, the project maturity management platform processes the received voice to obtain server processing voice, recognizes the obtained server processing voice to obtain server comparison voice, and judges that the server comparison voice is compared with stored voice prestored in the project maturity management platform:
if the comparison voice of the server is consistent with the stored voice prestored by the project maturity management platform, the project maturity management platform logs in successfully;
if the comparison voice of the server is inconsistent with the stored voice prestored in the project maturity management platform, the login is failed; returning to step S1 thereof.
In a preferred embodiment of the present invention, in step S12, the method for obtaining the login processing voice thereof is as follows:
the acquired login voice is subjected to a secure hash algorithm to obtain a voice security value, and the voice security value is calculated by the following steps:
Voice value=Secure Hash Algorithm(Voice 0 ),
wherein Secure Hash Algorithm () is a secure hash algorithm of SHA-1;
Voice 0 logging voice acquired for the intelligent handheld mobile device;
voice value is a Voice security value;
taking the Voice security value Voice value obtained by the Voice security value as the login Voice acquired by the intelligent handheld mobile device 0 Is a voice file name of (a); thus obtaining the login processing voice.
In a preferred embodiment of the present invention, in step S13, the method for obtaining the voice processed by the server thereof is as follows:
the voice received by the project maturity management platform is subjected to a secure hash algorithm to obtain a voice server security value, and the calculation method of the voice server security value comprises the following steps:
Voice value′=Secure Hash Algorithm(Voice 1 ),
wherein Secure Hash Algorithm () is a secure hash algorithm of SHA-1;
Voice 1 speech received for the project maturity management platform;
voice value' is the Voice server security value;
judging the Voice server security value' and the Voice received by the project maturity management platform 1 Whether the corresponding voice file names are consistent:
if the Voice server security value Voice value' and the Voice received by the project maturity management platform 1 The corresponding Voice file names of the (a) are consistent, and then the Voice received by the project maturity management platform 1 Namely, processing voice for the server;
if the Voice server security value Voice value' and the Voice received by the project maturity management platform 1 The corresponding voice file names of the mobile device are inconsistent, and the intelligent handheld mobile device is requested to resend the login processing voice.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, the project maturity management platform acquires voice amplitude of the acquired server processing voice, and selects a first voice amplitude and a second voice amplitude from the acquired voice amplitude, wherein the second voice amplitude is larger than the first voice amplitude;
s132, obtaining the upper and lower limits [ -Sound amplitude ], sound amplitude and Sound amplitude ] of the Sound amplitude by using the first Sound amplitude and the second Sound amplitude selected in the step S131, wherein Sound amplitude represents the third Sound amplitude; [ -Sound amplitude ] represents the upper and lower limits of the speech amplitude; when the Sound amplitude 'is more than or equal to the Sound amplitude', sound 'represents the first voice amplitude, sound' represents the second voice amplitude, and absolute value is calculated; sound amplitude= |sound amplitude ' | when it is |sound amplitude ' | < |sound amplitude ' |, sound amplitude= |sound amplitude ' | is Sound amplitude ' |.
S133, the upper and lower limits of the voice amplitude in the step S132 are [ -Sound amplitude, sound amplitude]Divided into upper and lower limits of P voice amplitude sub-ranges, respectively P 1 、P 2 、P 3 、……、P p P is a positive integer greater than or equal to 2; wherein P is 1 P is the upper and lower limits of the 1 st sub-amplitude of voice 2 P is the upper and lower limits of the 2 nd sub-amplitude of voice 3 P is the upper and lower limits of the 3 rd sub-amplitude of the voice p For the upper and lower limits of the p-th sub-amplitude of speech, [ -Sound amplitude, sound amplitude]=P 1 ∪P 2 ∪P 3 ∪…∪P p The u-degree represents the union,
Figure BDA0003038811640000131
the U represents intersection->
Figure BDA0003038811640000132
Representing an empty set, i+.j, i=1, 2, 3, … …, p; j=1, 2, 3, … …, p; upper and lower limits P of P' th sub-of speech amplitude p′ The upper limit value of (2) is smaller than the upper limit P of the P' +1 th sub-upper limit of the voice amplitude p′+1 P' =1, 2, 3, … …, p-1;
s134, p voice amplitudesThe upper limit value and the lower limit value in the sub upper limit and the lower limit value form an upper limit set and a lower limit set, wherein the same element values in the upper limit set and the lower limit set are repeatedly screened, and the element values in the upper limit set and the lower limit set are used for Q from small to large 0 、Q 1 、Q 2 、Q 3 、……、Q p The representation can be P 1 =[Q 0 ,Q 1 ](or P) 1 =[-Sound amplitude,Q 1 ])、P 2 =(Q 1 ,Q 2 ]、P 3 =(Q 2 ,Q 3 ]、P 4 =(Q 3 ,Q 4 ]、……、P p =(Q p-1 ,Q p ](or P) p =(Q p-1 ,Sound amplitude]) The method comprises the steps of carrying out a first treatment on the surface of the Or may also be P 1 =[Q 0 ,Q 1 ) (or P) 1 =[-Sound amplitude,Q 1 ))、P 2 =[Q 1 ,Q 2 )、P 3 =[Q 2 ,Q 3 )、P 4 =[Q 3 ,Q 4 )、……、P p =[Q p-1 ,Q p ](or P) p =[Q p-1 ,Sound amplitude]) The method comprises the steps of carrying out a first treatment on the surface of the Other forms are also possible; q (Q) 0 To Q p With progressively larger p-bit binary values O 1 O 2 O 3 ……O p Represented by O u =1 or 0, u=1, 2, 3, … …, p; wherein Q is p″′ The corresponding binary values have p ' "numbers 1 and p-p '" numbers 0, p ' "=0, 1, 2, 3, … …, p from leftmost to rightmost;
s135, the project maturity management platform segments the obtained server processing voice according to the playing time sequence thereof, acquires the amplitude of each section of server processing voice, judges the upper limit value or the lower limit value of the amplitude of each section of server processing voice, and represents the voice code of the section of server processing voice by using the binary value code corresponding to the nearest upper limit value or the lower limit value.
In a preferred embodiment of the present invention, the method for obtaining stored voices pre-stored by the project maturity management platform comprises the steps of:
s131, the project maturity management platform acquires voice amplitude of the acquired server processing voice, and selects a first voice amplitude and a second voice amplitude from the acquired voice amplitude, wherein the second voice amplitude is larger than the first voice amplitude;
s132, obtaining the upper and lower limits [ -Sound amplitude ], sound amplitude and Sound amplitude ] of the Sound amplitude by using the first Sound amplitude and the second Sound amplitude selected in the step S131, wherein Sound amplitude represents the third Sound amplitude; [ -Sound amplitude ] represents the upper and lower limits of the speech amplitude; when the Sound amplitude 'is more than or equal to the Sound amplitude', sound 'represents the first voice amplitude, sound' represents the second voice amplitude, and absolute value is calculated; sound amplitude= |sound amplitude ' | when it is |sound amplitude ' | < |sound amplitude ' |, sound amplitude= |sound amplitude ' | is Sound amplitude ' |.
S133, the upper and lower limits of the voice amplitude in the step S132 are [ -Sound amplitude, sound amplitude]Divided into upper and lower limits of P voice amplitude sub-ranges, respectively P 1 、P 2 、P 3 、……、P p P is a positive integer greater than or equal to 2; wherein P is 1 P is the upper and lower limits of the 1 st sub-amplitude of voice 2 P is the upper and lower limits of the 2 nd sub-amplitude of voice 3 P is the upper and lower limits of the 3 rd sub-amplitude of the voice p For the upper and lower limits of the p-th sub-amplitude of speech, [ -Sound amplitude, sound amplitude]=P 1 ∪P 2 ∪P 3 ∪…∪P p The u-degree represents the union,
Figure BDA0003038811640000151
the U represents intersection->
Figure BDA0003038811640000152
Representing an empty set, i+.j, i=1, 2, 3, … …, p; j=1, 2, 3, … …, p; upper and lower limits P of P' th sub-of speech amplitude p′ The upper limit value of (2) is smaller than the upper limit P of the P' +1 th sub-upper limit of the voice amplitude p′+1 P' =1, 2, 3, … …, p-1;
s134, forming an upper limit set and a lower limit set by the upper limit value and the lower limit value of the upper limit and the lower limit value of p voice amplitude sub-upper limit, and using the element values in the upper limit set and the lower limit set from small to largeQ 0 、Q 1 、Q 2 、Q 3 、……、Q p Representation, Q 0 To Q p With progressively larger p-bit binary values O 1 O 2 O 3 ……O p Represented by O u =1 or 0, u=1, 2, 3, … …, p; wherein Q is p″′ The corresponding binary values have p ' "numbers 1 and p-p '" numbers 0, p ' "=0, 1, 2, 3, … …, p from leftmost to rightmost;
s135, the project maturity management platform segments the obtained server processing voice according to the playing time sequence thereof, acquires the amplitude of each section of server processing voice, judges the upper limit value or the lower limit value of the amplitude of each section of server processing voice, and represents the voice code of the section of server processing voice by using the binary value code corresponding to the nearest upper limit value or the lower limit value. The safe login through voice is realized.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, classifying types in the project maturity basic data, wherein the classification method comprises the following steps:
s211, numbering each file in the project maturity basic data according to the sequence, wherein the file numbers are respectively 1 st file number, 2 nd file number, 3 rd file number, … … and A-th file number, and A is the total number of the files in the project maturity basic data; let increment a=1;
s212, judging whether the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform:
if the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform, storing the file corresponding to the a-th file number into a temporary storage database which is the same as the file extension of the file corresponding to the a-th file number; a=a+1;
if the file extension name of the file corresponding to the a-th file number is not the file extension name identified by the project maturity management platform, the project maturity management platform establishes a temporary invalid folder, and stores the file corresponding to the a-th file number into the temporary invalid folder; a=a+1;
s213, judging the relation between the increment a and the total number A of files in the project maturity base data:
if a is less than or equal to A, returning to the step S212;
if a is more than A, the type classification is finished;
s22, extracting files stored in each temporary storage database for analysis, and obtaining project maturity basic data identified by a project maturity management platform.
In a preferred embodiment of the present invention, the following steps are included in step S3:
s31, extracting three-dimensional coordinate points in project maturity basic data;
s32, acquiring a map stored in the project maturity management platform, and correspondingly calibrating all the extracted three-dimensional coordinate points on the map;
s33, conducting adjacent three-dimensional coordinate point connection on all three-dimensional coordinate points calibrated on the map to obtain a contour line of the project, wherein the contour line is a closed and disjoint curve;
s34, calculating the contour area according to the obtained contour line, obtaining the building area in the map where the contour line is located, and judging the building area
Figure BDA0003038811640000161
Within the range of v 1 Representing the building area, v, within the map where the contour line is located 2 Representing the outline area, v representing the item maturity, and representing its item maturity in different colors, which is displayed on the smart handheld mobile device, as shown in fig. 2. Wherein if v<v ', v' represents a first preset judgment threshold value, and then the item maturity is represented by light yellow; if v ' is more than or equal to v and less than or equal to v ', v ' represents a second preset judgment threshold value, and the second preset judgment threshold value is larger than the first preset judgment threshold value, the project maturity is represented by light green; if v<v<v '", v'" represents a third preset judgment threshold, and if the third preset judgment threshold is greater than the second preset judgment threshold, the third preset judgment threshold represents the maturity of the project in green; if it isv '"is more than or equal to v'" and less than or equal to v "", v "" represents a fourth preset judgment threshold, and if the fourth preset judgment threshold is greater than the third preset judgment threshold, the item maturity is represented by red; if v > v "", the item maturity is indicated by a dark red color.
In a preferred embodiment of the present invention, the step S3 further comprises a query according to its keywords; the content of its query is presented on the smart handheld mobile device. The method comprises the following steps:
s31, judging whether the query trigger command is received or not:
if a query triggering command is received, query is carried out by taking a query word or a query word input in a query box as a keyword;
if the inquiry trigger command is not received, executing step S32;
s32, judging whether a query word or a query word is input in the query frame:
if the query word or the query word is input in the query box, the query word is only one Chinese character, and the query word is two or more Chinese characters, the query word or the query word is used for carrying out forward or/and backward conjunctions to obtain the conjunctions; if the connecting word inquiry triggering command is triggered, inquiring by taking the connecting word as a keyword; for example, the query word "love" entered in the query box may be "love", "hobbies", "loving", and the connecting word obtained backward may be "loving", "favorite".
If no query word or query word is input in the query box, returning to the step S32;
in a preferred embodiment of the present invention, step S32 further includes forming D sentences according to the connective, where D is a positive integer greater than or equal to 1, and the D sentences are arranged from large to small according to the number of queries;
in step S32, R connective words are obtained, where R is a positive integer greater than or equal to 1, and the R connective words are arranged from large to small according to the number of queries. And realizing the data information required by the query.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (5)

1. A method for analytical demonstration of item maturity, comprising the steps of:
s1, logging in a project maturity management platform; the method for logging in the project maturity management platform comprises the following steps:
s11, the project maturity management platform judges whether a login request trigger signal is received or not:
if the project maturity management platform receives the login request trigger signal, executing step S12;
if the project maturity management platform does not receive the login request trigger signal, continuing waiting, and returning to the step S11;
s12, the project maturity management platform judges whether equipment information of the intelligent handheld mobile equipment to be logged in the project maturity management platform and a login account are authenticated or not:
if the device information and the login account number of the intelligent handheld mobile device of the to-be-logged-in project maturity management platform are authenticated, the device information of the intelligent handheld mobile device is an international mobile equipment identification code IMEI of the intelligent handheld mobile device, and then step S13 is executed;
if the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in is not authenticated with the login account, authenticating the equipment information of the intelligent handheld mobile equipment of the project maturity management platform to be logged in;
s13, the project maturity management platform generates a login account number according to the login account, and sends the generated login account number to a mobile phone number associated with the login account; the method for generating the login account number by the project maturity management platform according to the login account number comprises the following steps:
Loginaccountnumber=Secure Hash Algorithm(Loginaccount-Devicecode),
wherein Secure Hash Algorithm () is a secure hash algorithm of SHA-1;
loginaccount represents a login account;
devicecode represents a device code;
-means to concatenate the device code Devicecode with the beginning and end of the login account Loginaccount;
logina ccountnumber represents an arithmetic connection value;
Figure QLYQS_1
wherein J represents the total number of bits of the operation connection value Logina ccountnumber;
loginaccountnumber (j) the j-th bit of the arithmetic connection value Loginaccountnumber;
d represents an adjustment coefficient and is a positive integer; d E [ alpha, beta ]],
Figure QLYQS_2
Alpha is a lower limit adjustment value, beta is an upper limit adjustment value, and int () represents a rounding function;
number represents a login account number;
s14, the project maturity management platform judges whether the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform or not:
if the login account number input by the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device logs in successfully;
if the login account number input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the login account number sent by the project maturity management platform, the intelligent handheld mobile device fails to log in;
the method for logging in the project maturity management platform further comprises the following steps:
s11', judging whether the intelligent handheld mobile equipment triggering command is received:
if a trigger command for logging in the intelligent handheld mobile equipment is received, executing step S12';
if the triggering command of logging in the intelligent handheld mobile equipment is not received, returning to the step S11';
s12', acquiring login voice, and processing the acquired login voice to obtain login processing voice; sending the obtained login processing voice to a project maturity management platform;
s13', the project maturity management platform processes the received voice to obtain server processing voice, recognizes the obtained server processing voice to obtain server comparison voice, and judges that the server comparison voice is compared with stored voice prestored in the project maturity management platform:
if the comparison voice of the server is consistent with the stored voice prestored by the project maturity management platform, the project maturity management platform logs in successfully;
if the comparison voice of the server is inconsistent with the stored voice prestored in the project maturity management platform, the login is failed;
further, the method for obtaining the stored voice prestored by the project maturity management platform comprises the following steps:
s131, the project maturity management platform acquires voice amplitude of the acquired server processing voice, and selects a first voice amplitude and a second voice amplitude from the acquired voice amplitude, wherein the second voice amplitude is larger than the first voice amplitude;
s132, obtaining the upper and lower limits [ -Sound amplitude ], sound amplitude and Sound amplitude ] of the Sound amplitude by using the first Sound amplitude and the second Sound amplitude selected in the step S131, wherein Sound amplitude represents the third Sound amplitude; [ -Sound amplitude ] represents the upper and lower limits of the speech amplitude; when the Sound amplitude 'is more than or equal to the Sound amplitude', sound 'represents the first voice amplitude, sound' represents the second voice amplitude, and absolute value is calculated; sound amplitude= |sound amplitude ' | when it is |sound amplitude ' | < |sound amplitude ' |, sound amplitude= |sound amplitude ' | is Sound amplitude ' |.
S133, the upper and lower limits of the voice amplitude in the step S132 are [ -Sound amplitude, sound amplitude]Divided into upper and lower limits of P voice amplitude sub-ranges, respectively P 1 、P 2 、P 3 、……、P p P is a positive integer greater than or equal to 2; wherein P is 1 P is the upper and lower limits of the 1 st sub-amplitude of voice 2 P is the upper and lower limits of the 2 nd sub-amplitude of voice 3 P is the upper and lower limits of the 3 rd sub-amplitude of the voice p For the upper and lower limits of the p-th sub-amplitude of speech, [ -Sound amplitude, sound amplitude]=P 1 ∪P 2 ∪P 3 ∪…∪P p The u-degree represents the union,
Figure QLYQS_3
the U represents intersection->
Figure QLYQS_4
Representing an empty set, i+.j, i=1, 2, 3, … …, p; j=1, 2, 3, … …, p; upper and lower limits P of P' th sub-of speech amplitude p′ The upper limit value of (2) is smaller than the upper limit P of the P' +1 th sub-upper limit of the voice amplitude p′+1 P' =1, 2, 3, … …, p-1;
s134, forming an upper limit set and a lower limit set by the upper limit value and the lower limit value of the upper limit and the lower limit value of p voice amplitude sub-upper limit, and using Q from small to large by the element values in the upper limit set and the lower limit set 0 、Q 1 、Q 2 、Q 3 、……、Q p Representation, Q 0 To Q p With progressively larger p-bit binary values O 1 O 2 O 3 ……O p Represented by O u =1 or 0, u=1, 2, 3, … …, p; wherein Q is p″′ The corresponding binary values have p ' "numbers 1 and p-p '" numbers 0, p ' "=0, 1, 2, 3, … …, p from leftmost to rightmost;
s135, segmenting the obtained server processing voice according to the playing time sequence by the project maturity management platform, obtaining the amplitude of each section of server processing voice, judging the upper limit value or the lower limit value of the amplitude of each section of server processing voice, and representing the voice code of the section of server processing voice by using the binary value code corresponding to the nearest upper limit value or the lower limit value;
s2, importing project maturity basic data;
s3, the project maturity management platform processes the imported project maturity basic data, and the obtained project maturity is displayed on the intelligent handheld mobile device; the method for processing the imported project maturity base data to obtain the project maturity in the step S3 comprises the following steps:
s31, extracting three-dimensional coordinate points in project maturity basic data;
s32, acquiring a map stored in the project maturity management platform, and correspondingly calibrating all the extracted three-dimensional coordinate points on the map;
s33, conducting adjacent three-dimensional coordinate point connection on all three-dimensional coordinate points calibrated on the map to obtain a contour line of the project, wherein the contour line is a closed and disjoint curve;
s34, calculating the contour area according to the obtained contour line, obtaining the building area in the map where the contour line is located, and judging the building area
Figure QLYQS_5
Within the range of v 1 Representing the building area, v, within the map where the contour line is located 2 Representing the outline area, v representing the item maturity, and representing its item maturity in different colors.
2. The project maturity analysis and demonstration method according to claim 1, wherein the project maturity management platform judging whether the device information of the intelligent handheld mobile device to be logged in the project maturity management platform is authenticated with the login account number in step S12 comprises the steps of:
s121, acquiring equipment information of the intelligent handheld mobile equipment by the project maturity management platform;
s122, performing equipment information authentication processing on the acquired equipment information of the intelligent handheld mobile equipment to obtain equipment codes of the intelligent handheld mobile equipment;
s123, judging whether the obtained equipment codes exist in an equipment code database of the project maturity management platform or not:
if the equipment code exists in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment of the project maturity management platform to be logged in are authenticated, and the login account number corresponding to the equipment code is extracted;
if the equipment code does not exist in the equipment code database of the project maturity management platform, the equipment information and the login account number of the intelligent handheld mobile equipment to be logged in to the project maturity management platform are not authenticated.
3. The project maturity analysis demonstration method according to claim 1, wherein authenticating the device information of the smart handheld mobile device to be logged into the project maturity management platform in step S12 comprises the steps of:
s121, the project maturity management platform acquires a login account of the project maturity management platform to be logged in;
s122, performing login account authentication processing on the acquired login account to obtain an account authentication code of the login account, and judging whether the account authentication code of the login account exists in an account authentication code database of the project maturity management platform or not:
if the account number authentication code exists in the account number authentication code database of the project maturity management platform, extracting a mobile phone number corresponding to the account number authentication code, and sending the generated account number mobile phone authentication code to the mobile phone number; the step S123 is performed such that,
if the account authentication code does not exist in the account authentication code database of the project maturity management platform, prompt information is sent to the intelligent handheld mobile equipment of the project maturity management platform to be logged in, wherein the prompt information is that the input login account is not existing in the project maturity management platform;
s123, the project maturity management platform judges whether an account mobile phone authentication code input by the intelligent handheld mobile device to be logged in the project maturity management platform is consistent with an account mobile phone authentication code sent by the project maturity management platform or not:
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is consistent with the account mobile phone authentication code sent by the project maturity management platform, the device information of the intelligent handheld mobile device of the project maturity management platform to be logged in is associated with the account mobile phone authentication code;
if the account mobile phone authentication code input through the intelligent handheld mobile device of the project maturity management platform to be logged in is inconsistent with the account mobile phone authentication code sent by the project maturity management platform, sending prompt information to the intelligent handheld mobile device of the project maturity management platform to be logged in, wherein the prompt information is that the input account mobile phone authentication code is incorrect.
4. The project maturity analysis demonstration method according to claim 1, characterized in that it comprises the following steps in step S2:
s21, classifying types in the project maturity basic data, wherein the classification method comprises the following steps:
s211, numbering each file in the project maturity basic data according to the sequence, wherein the file numbers are respectively 1 st file number, 2 nd file number, 3 rd file number, … … and A-th file number, and A is the total number of the files in the project maturity basic data; let increment a=1;
s212, judging whether the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform:
if the file extension of the file corresponding to the a-th file number is the file extension identified by the project maturity management platform, storing the file corresponding to the a-th file number into a temporary storage database which is the same as the file extension of the file corresponding to the a-th file number; a=a+1;
if the file extension name of the file corresponding to the a-th file number is not the file extension name identified by the project maturity management platform, the project maturity management platform establishes a temporary invalid folder, and stores the file corresponding to the a-th file number into the temporary invalid folder; a=a+1;
s213, judging the relation between the increment a and the total number A of files in the project maturity base data:
if a is less than or equal to A, returning to the step S212;
if a is more than A, the type classification is finished;
s22, extracting files stored in each temporary storage database for analysis, and obtaining project maturity basic data identified by a project maturity management platform.
5. The method of claim 1, further comprising querying in step S3 based on keywords thereof; displaying the inquired content on the intelligent handheld mobile device; the method for inquiring according to the keywords comprises the following steps:
s31, judging whether the query trigger command is received or not:
if a query triggering command is received, query is carried out by taking a query word or a query word input in a query box as a keyword;
if the inquiry trigger command is not received, executing step S32;
s32, judging whether a query word or a query word is input in the query frame:
if the query word or the query word is input in the query box, the query word is only one Chinese character, and the query word is two or more Chinese characters, the query word or the query word is used for carrying out forward or/and backward conjunctions to obtain the conjunctions; if the connecting word inquiry triggering command is triggered, inquiring by taking the connecting word as a keyword;
if no query word or query word is input in the query box, the process returns to step S32.
CN202110451369.4A 2021-04-26 2021-04-26 Project maturity analysis and demonstration method Active CN113220758B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110451369.4A CN113220758B (en) 2021-04-26 2021-04-26 Project maturity analysis and demonstration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110451369.4A CN113220758B (en) 2021-04-26 2021-04-26 Project maturity analysis and demonstration method

Publications (2)

Publication Number Publication Date
CN113220758A CN113220758A (en) 2021-08-06
CN113220758B true CN113220758B (en) 2023-05-02

Family

ID=77089062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110451369.4A Active CN113220758B (en) 2021-04-26 2021-04-26 Project maturity analysis and demonstration method

Country Status (1)

Country Link
CN (1) CN113220758B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114491187B (en) * 2022-01-20 2022-11-18 重庆市规划和自然资源调查监测院 Intelligent natural resource monitoring integrated system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948192A (en) * 2017-12-22 2018-04-20 众安信息技术服务有限公司 A kind of block chain account customization identification and login method and system
CN111062013A (en) * 2019-12-18 2020-04-24 北京爱奇艺科技有限公司 Account filtering method and device, electronic equipment and machine-readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152400B (en) * 2013-02-07 2016-03-16 百度在线网络技术(北京)有限公司 The method, system and the cloud server that log in is carried out by mobile terminal
CN105515781B (en) * 2016-01-19 2018-09-14 上海众人网络安全技术有限公司 A kind of application platform login system and its login method
WO2018045529A1 (en) * 2016-09-08 2018-03-15 华为技术有限公司 Network station site planning method and device
CN108718337B (en) * 2018-05-22 2021-09-24 国政通科技股份有限公司 Website account login, verification and verification information processing method, device and system
CN109685452A (en) * 2018-12-04 2019-04-26 国网河北省电力有限公司石家庄供电分公司 A kind of power supply company's item data management platform
CN111950994B (en) * 2020-09-03 2021-03-23 深圳市不动产评估中心(深圳市地质环境监测中心) Geological environment and monitoring information management method, system, terminal and storage medium
CN112235265B (en) * 2020-09-29 2022-05-31 上海药明康德新药开发有限公司 System and method for external network to access project progress

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107948192A (en) * 2017-12-22 2018-04-20 众安信息技术服务有限公司 A kind of block chain account customization identification and login method and system
CN111062013A (en) * 2019-12-18 2020-04-24 北京爱奇艺科技有限公司 Account filtering method and device, electronic equipment and machine-readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈思光 等.基于雾计算的智能电网安全与隐私保护数据聚合研究.《南京邮电大学学报(自然科学版)》.2019,第39卷(第39期),62-72. *

Also Published As

Publication number Publication date
CN113220758A (en) 2021-08-06

Similar Documents

Publication Publication Date Title
US8571998B2 (en) Compatibility scoring of users
CN111883140B (en) Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN110781460A (en) Copyright authentication method, device, equipment, system and computer readable storage medium
CN106296195A (en) A kind of Risk Identification Method and device
CN105894028B (en) User identification method and device
CN109831459B (en) Method, device, storage medium and terminal equipment for secure access
CN110059981B (en) Trust degree evaluation method and device and terminal equipment
CN110796269B (en) Method and device for generating model, and method and device for processing information
CN113220758B (en) Project maturity analysis and demonstration method
CN110619545A (en) Big data-based vehicle insurance data pushing method, system, equipment and storage medium
CN113656661A (en) Mobile government affair system based on natural language identification
CN108573004B (en) Insurance-based service information processing method and device
CN112199412A (en) Payment bill processing method based on block chain and block chain bill processing system
CN114491187B (en) Intelligent natural resource monitoring integrated system
CN113190508B (en) Management-oriented natural language recognition method
CN112990868A (en) Method, system, equipment and storage medium for automatic vehicle insurance claims
KR102565485B1 (en) Server and Method for Providing City Street Search Service
AU2019200458B2 (en) Method and system for acquiring data files of blocks of land and of building plans and for automatic making of matches thereof
CN111325562A (en) Grain safety tracing system and method
CN112686732B (en) Abnormal address data identification method, device, equipment and medium
CN111367942B (en) Address book retrieval method and device
CN107729457A (en) The method, apparatus and storage medium of a kind of information intelligent retrieval
CN110288272B (en) Data processing method, device, electronic equipment and storage medium
US11068236B2 (en) Identification of users across multiple platforms
CN113010822A (en) Information processing method, server and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant