CN113822227A - Tunnel engineering construction risk monitoring method, device and medium - Google Patents
Tunnel engineering construction risk monitoring method, device and medium Download PDFInfo
- Publication number
- CN113822227A CN113822227A CN202111215212.8A CN202111215212A CN113822227A CN 113822227 A CN113822227 A CN 113822227A CN 202111215212 A CN202111215212 A CN 202111215212A CN 113822227 A CN113822227 A CN 113822227A
- Authority
- CN
- China
- Prior art keywords
- tunnel
- real
- risk
- information
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010276 construction Methods 0.000 title claims abstract description 74
- 238000012544 monitoring process Methods 0.000 title claims abstract description 58
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000001514 detection method Methods 0.000 claims abstract description 22
- 230000001960 triggered effect Effects 0.000 claims abstract description 7
- 238000004891 communication Methods 0.000 claims description 89
- 238000012549 training Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 18
- 238000002372 labelling Methods 0.000 claims description 14
- 238000012423 maintenance Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000005516 engineering process Methods 0.000 claims description 8
- 238000012806 monitoring device Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 7
- 239000011435 rock Substances 0.000 description 11
- 230000001276 controlling effect Effects 0.000 description 8
- 230000000875 corresponding effect Effects 0.000 description 7
- 238000005259 measurement Methods 0.000 description 6
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000009412 basement excavation Methods 0.000 description 4
- 239000003086 colorant Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000013139 quantization Methods 0.000 description 3
- 235000002566 Capsicum Nutrition 0.000 description 2
- 239000006002 Pepper Substances 0.000 description 2
- 241000722363 Piper Species 0.000 description 2
- 235000016761 Piper aduncum Nutrition 0.000 description 2
- 235000017804 Piper guineense Nutrition 0.000 description 2
- 235000008184 Piper nigrum Nutrition 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 239000000654 additive Substances 0.000 description 2
- 230000000996 additive effect Effects 0.000 description 2
- 238000005034 decoration Methods 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 150000003839 salts Chemical class 0.000 description 2
- 239000002689 soil Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 206010027146 Melanoderma Diseases 0.000 description 1
- 229910001294 Reinforcing steel Inorganic materials 0.000 description 1
- 241000519995 Stachys sylvatica Species 0.000 description 1
- 229910000831 Steel Inorganic materials 0.000 description 1
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005422 blasting Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007596 consolidation process Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001125 extrusion Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000029058 respiratory gaseous exchange Effects 0.000 description 1
- 210000000697 sensory organ Anatomy 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 230000008093 supporting effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000004078 waterproofing Methods 0.000 description 1
Images
Classifications
-
- E—FIXED CONSTRUCTIONS
- E21—EARTH OR ROCK DRILLING; MINING
- E21F—SAFETY DEVICES, TRANSPORT, FILLING-UP, RESCUE, VENTILATION, OR DRAINING IN OR OF MINES OR TUNNELS
- E21F17/00—Methods or devices for use in mines or tunnels, not covered elsewhere
- E21F17/18—Special adaptations of signalling or alarm devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Life Sciences & Earth Sciences (AREA)
- Mining & Mineral Resources (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Artificial Intelligence (AREA)
- General Life Sciences & Earth Sciences (AREA)
- Geochemistry & Mineralogy (AREA)
- Geology (AREA)
- Alarm Systems (AREA)
Abstract
The application relates to a method, a device and a medium for monitoring the construction risk of tunnel engineering, which relate to the field of tunnel safety monitoring and comprise the following steps: when a data triggering instruction is detected, acquiring real-time tunnel image information, wherein the data triggering instruction is triggered by a monitoring person through target equipment; inputting the real-time tunnel image information into a trained risk network model for risk detection, and acquiring tunnel characteristic information in the real-time tunnel image information; identifying and analyzing the tunnel characteristic information to acquire risk data information of the real-time tunnel image information; and transmitting the risk data information to target equipment so as to control and display the risk data information. This application has the effect that improves tunnel engineering construction risk monitoring efficiency.
Description
Technical Field
The present disclosure relates to the field of tunnel safety monitoring, and in particular, to a method, an apparatus, and a medium for monitoring a risk of tunnel engineering construction.
Background
Tunnel engineering is a building generally built underground, underwater or in mountains, with railways or roads constructed for motor vehicles to pass through. The method can be divided into three categories of mountain tunnel engineering, underwater tunnel engineering and urban tunnel engineering according to the position of the device. A tunnel construction on mountains, which is a process of passing through a mountain or a hill to shorten the distance and avoid a large slope; an underwater tunnel construction for crossing a river or a strait and passing under a river or a sea floor; urban tunnel engineering is known in which a railway passes through the underground of a city to meet the need for passing through a large city.
With the construction of a large number of tunnel projects, the new Olympic method for monitoring the construction risk is greatly applied and popularized in the tunnel project construction in China. Therefore, in the tunnel engineering construction, a steel hanging ruler, a convergence gauge, a level gauge, a total station and the like are adopted for data acquisition, the stability of the surrounding rock is confirmed according to the measured data, the supporting effect is judged, the construction process is guided, so that the mechanical behaviors of the surrounding rock, the support and the lining and the mechanical relationship among the surrounding rock, the support and the lining are measured and observed conveniently, and the stability of the surrounding rock, the support and the lining is evaluated.
In view of the above-mentioned related technologies, the inventor thinks that when constructing the tunnel engineering, the traditional construction risk monitoring method needs the staff to carry a plurality of measuring tools to carry out data information acquisition on the tunnel engineering, which not only wastes manpower and material resources, but also easily causes construction obstruction, thereby having the defect of reducing the monitoring efficiency of the tunnel engineering construction risk.
Disclosure of Invention
In order to improve the efficiency of the inquiry of a patient, the application provides a method, a device and a medium for monitoring the construction risk of tunnel engineering.
In a first aspect, the present application provides a method for monitoring risk of tunnel engineering construction, which adopts the following technical scheme:
a method for monitoring the construction risk of tunnel engineering comprises the following steps:
when a data triggering instruction is detected, acquiring real-time tunnel image information, wherein the data triggering instruction is triggered by a monitoring person through target equipment;
inputting the real-time tunnel image information into a trained risk network model for risk detection, and acquiring tunnel characteristic information in the real-time tunnel image information;
identifying and analyzing the tunnel characteristic information to acquire risk data information of the real-time tunnel image information;
and transmitting the risk data information to target equipment so as to control and display the risk data information.
By adopting the technical scheme, when the construction risk monitoring is carried out on the tunnel engineering, a worker clicks a monitoring key of target equipment to obtain the tunnel image information for implementing the tunnel engineering, the tunnel image information is output to a risk network model trained in advance to carry out risk detection, so that whether a risk leak exists in the current tunnel engineering is determined, the tunnel characteristic information in the obtained real-time tunnel image information is identified and analyzed, the risk data information with a risk coefficient is retrieved, the risk data information is transmitted to the target equipment to be displayed, the worker monitors the construction risk of the current tunnel engineering by observing a monitoring picture displayed by the target equipment, and the effect of improving the efficiency of monitoring the construction risk of the tunnel engineering is achieved.
In another possible implementation manner, the inputting the real-time tunnel image information to the trained risk network model for risk detection further includes:
acquiring a tunnel training sample, wherein the tunnel training sample comprises a risk sample image of a tunnel and labeling information corresponding to each risk in the risk sample image, and the labeling information comprises: risk category information and risk level information;
and establishing a risk network model, and training the tunnel network model based on the tunnel training sample to obtain the trained risk network model.
Through the technical scheme, the tunnel training samples are collected in advance and comprise the risk sample images of the tunnel and the labeling information corresponding to each risk in the risk sample images, then the risk network model is created, the training samples are input into the risk network model, and the labeling information of the tunnel training samples is obtained, so that the trained risk network model is obtained, and the subsequent real-time tunnel information identification is facilitated.
In another possible implementation manner, the acquiring real-time tunnel image information then further includes:
acquiring real-time position information and real-time direction information based on the real-time tunnel image information;
and respectively binding the real-time position information and the real-time direction information with the real-time tunnel image information.
The real-time position information is position information when the real-time tunnel image information is collected, and the real-time direction information is angle information when the real-time tunnel image information is collected.
By adopting the technical scheme, after the target inquiry department is determined, the target inquiry department is positioned to obtain the department position information of the target inquiry department, and then the inquiry navigation route information of the patient going to the target inquiry department is determined based on the actual position information of the current patient, so that the patient can conveniently search the designated target inquiry department.
In another possible implementation manner, the obtaining real-time position information and real-time direction information based on the real-time tunnel image information further includes:
when a position acquisition instruction is detected, acquiring construction position information of a worker;
and generating tunnel maintenance route information according to the construction position information and the real-time position information, and controlling and displaying the tunnel maintenance route information.
By adopting the technical scheme, after the tunnel risk position is determined, the current worker is positioned, the construction position information of the worker is obtained, and then the tunnel maintenance route information that the worker goes to the tunnel risk position is determined based on the construction position information, so that the worker can conveniently find the appointed tunnel risk position.
In another possible implementation manner, the acquiring real-time tunnel image information then further includes:
and creating real-time tunnel image information for the real-time tunnel image information through a BIM modeling technology, denoising the real-time tunnel image information, and performing image enhancement processing on the denoised real-time tunnel image information.
By adopting the technical scheme, after the real-time tunnel image information of the tunnel is generated, because the initial real-time tunnel image information is often influenced by the imaging equipment, external environment noise interference and the like in the digitization and transmission processes, the denoising technology is needed to denoise the real-time tunnel image information so as to reduce the noise in the real-time tunnel image information, the real-time tunnel image information is more accurate, then the denoised real-time tunnel image information is subjected to image enhancement processing, the visual effect of the real-time tunnel image information is improved, the image is clearer, and the effect of improving the real-time tunnel image information identification degree of the tunnel is achieved.
In another possible implementation manner, the inputting the real-time tunnel image information into the trained risk network model for risk detection to obtain the tunnel feature information in the real-time tunnel image information includes:
performing convolution processing on the real-time tunnel image information to obtain at least one tunnel characteristic diagram;
performing feature scanning extraction on the at least one tunnel feature map to obtain a plurality of three-dimensional feature maps with different dimensions;
and fusing the three-dimensional characteristic graphs with different dimensions to obtain the tunnel characteristic information in the real-time tunnel image information.
By adopting the technical scheme, the real-time tunnel image information is subjected to convolution processing, at least one tunnel characteristic diagram in the real-time tunnel image information is obtained, the tunnel characteristic diagram is scanned to identify the three-dimensional characteristic diagrams with different dimensionalities of the tunnel characteristic diagram, and a plurality of three-dimensional characteristic diagrams are fused to generate the tunnel characteristic information so as to be convenient for analyzing and processing the risk data information subsequently.
In another possible implementation manner, the transmitting the risk data information to a target device to control display of the risk data information includes:
the method comprises the steps of obtaining a communication route of current target equipment, detecting the communication route, and determining whether the communication condition of the communication route meets a preset communication requirement;
if not, acquiring a standby communication route, detecting the standby communication route, and determining whether the standby communication condition of the standby communication route meets the current communication requirement;
if yes, switching the communication of the current target equipment from the communication route to the standby communication route;
if the preset mode does not meet the preset requirement, controlling the alarm equipment to output an alarm signal in a preset mode, wherein the preset mode comprises at least one of the following modes: sound output mode and light output mode.
Through adopting above-mentioned technical scheme, when the staff carries out data communication with tunnel engineering's construction risk, target equipment passes through wired network and the long-distance transmission of optic fibre and sends staff's data instruction to electronic equipment, nevertheless along with weather change, target equipment easily produces undulantly with electronic equipment's data transmission to lead to current communication route to appear unusually, consequently set up reserve communication line, switch to reserve communication line when communication line appears unusually, wherein, reserve communication line: the target device carries out 4G/5G communication with the satellite through the router, the satellite sends a data command to the electronic device, meanwhile, the standby communication line is detected, normal communication of the communication line is ensured, if the communication line is abnormal, abnormal communication information is generated, and the abnormal communication information is controlled and displayed.
In a second aspect, the present application provides a risk monitoring device for tunnel engineering construction, which adopts the following technical scheme:
a kind of tunnel engineering construction risk monitoring device, including:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring real-time tunnel image information when a data trigger instruction is detected, and the data trigger instruction is triggered by monitoring personnel through target equipment;
the second acquisition module is used for inputting the real-time tunnel image information into the trained risk network model for risk detection, and acquiring tunnel characteristic information in the real-time tunnel image information;
the analysis module is used for identifying and analyzing the tunnel characteristic information to acquire risk data information of the real-time tunnel image information;
and the data transmission module is used for transmitting the risk data information to target equipment so as to control and display the risk data information.
By adopting the technical scheme, when the construction risk monitoring is carried out on the tunnel engineering, a worker clicks a monitoring key of target equipment to obtain the tunnel image information for implementing the tunnel engineering, the tunnel image information is output to a risk network model trained in advance to carry out risk detection, so that whether a risk leak exists in the current tunnel engineering is determined, the tunnel characteristic information in the obtained real-time tunnel image information is identified and analyzed, the risk data information with a risk coefficient is retrieved, the risk data information is transmitted to the target equipment to be displayed, the worker monitors the construction risk of the current tunnel engineering by observing a monitoring picture displayed by the target equipment, and the effect of improving the efficiency of monitoring the construction risk of the tunnel engineering is achieved.
In one possible implementation, the apparatus further includes: a third obtaining module and a creating module, wherein,
the third obtaining module is configured to obtain a tunnel training sample, where the tunnel training sample includes a risk sample image of a tunnel and labeling information corresponding to each risk in the risk sample image, and the labeling information includes: risk category information and risk level information;
and the creating module is used for creating a risk network model and training the tunnel network model based on the tunnel training sample to obtain the trained risk network model.
In another possible implementation manner, the apparatus further includes: a fourth obtaining module and a binding module, wherein,
the fourth obtaining module is used for obtaining real-time position information and real-time direction information based on the real-time tunnel image information;
and the binding module is used for binding the real-time position information and the real-time direction information with the real-time tunnel image information.
The real-time position information is position information when the real-time tunnel image information is collected, and the real-time direction information is angle information when the real-time tunnel image information is collected.
In another possible implementation manner, the apparatus further includes: a fifth acquisition module and a position detection module, wherein,
the fifth acquisition module is used for acquiring the construction position information of the constructor when the position acquisition instruction is detected;
and the position detection module is used for generating tunnel maintenance route information according to the construction position information and the real-time position information and controlling and displaying the tunnel maintenance route information.
In another possible implementation manner, the apparatus further includes: an image processing module, wherein,
the image processing module is used for creating real-time tunnel image information for the real-time tunnel image information through a BIM modeling technology, denoising the real-time tunnel image information, and performing image enhancement processing on the denoised real-time tunnel image information.
In another possible implementation manner, the second obtaining module is configured to perform risk detection after inputting the real-time tunnel image information to the trained risk network model, and obtain tunnel feature information in the real-time tunnel image information, where the second obtaining module is specifically configured to:
performing convolution processing on the real-time tunnel image information to obtain at least one tunnel characteristic diagram;
performing feature scanning extraction on the at least one tunnel feature map to obtain a plurality of three-dimensional feature maps with different dimensions;
and fusing the three-dimensional characteristic graphs with different dimensions to obtain the tunnel characteristic information in the real-time tunnel image information.
In another possible implementation manner, the data transmission module is configured to transmit the risk data information to a target device to control display of the risk data information, and specifically configured to:
the method comprises the steps of obtaining a communication route of current target equipment, detecting the communication route, and determining whether the communication condition of the communication route meets a preset communication requirement;
if not, acquiring a standby communication route, detecting the standby communication route, and determining whether the standby communication condition of the standby communication route meets the current communication requirement;
if yes, switching the communication of the current target equipment from the communication route to the standby communication route;
if the preset mode does not meet the preset requirement, controlling the alarm equipment to output an alarm signal in a preset mode, wherein the preset mode comprises at least one of the following modes: sound output mode and light output mode.
In a third aspect, the present application provides an electronic device, which adopts the following technical solutions:
an electronic device, comprising:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: executing a method for monitoring the risk of the tunnel engineering construction according to any one of the possible implementation manners of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, comprising: a computer program is stored which can be loaded by a processor and executed to implement a method for monitoring risk in tunnel engineering construction according to any one of the possible implementations of the first aspect.
In summary, the present application includes at least one of the following beneficial technical effects:
1. by adopting the technical scheme, when the construction risk monitoring is carried out on the tunnel engineering, a worker clicks a monitoring key of target equipment to obtain the tunnel image information for implementing the tunnel engineering, the tunnel image information is output to a risk network model trained in advance for risk detection, so that whether the current tunnel engineering has a risk leak or not is determined, tunnel characteristic information in the obtained real-time tunnel image information is identified and analyzed, risk data information with a risk coefficient is retrieved, the risk data information is transmitted to the target equipment for display, the worker monitors the construction risk of the current tunnel engineering by observing a monitoring picture displayed by the target equipment, and the effect of improving the efficiency of monitoring the construction risk of the tunnel engineering is achieved;
2. by adopting the technical scheme, the tunnel training samples are collected in advance and comprise the risk sample images of the tunnel and the labeling information corresponding to each risk in the risk sample images, then the risk network model is created, the training samples are input into the risk network model, and the labeling information of the tunnel training samples is acquired, so that the trained risk network model is obtained, and the subsequent real-time tunnel information identification is facilitated.
Drawings
Fig. 1 is a schematic flowchart of a method for monitoring risk in tunnel engineering construction according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a risk monitoring device for tunnel engineering construction according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to figures 1-3.
A person skilled in the art, after reading the present description, may make modifications to the embodiments as required, without any inventive contribution thereto, but shall be protected by the patent laws within the scope of the claims of the present application.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship, unless otherwise specified.
The embodiments of the present application will be described in further detail with reference to the drawings attached hereto.
The embodiment of the application provides a method for monitoring the risk of tunnel engineering construction, which is executed by electronic equipment, wherein the electronic equipment can be a server or a terminal device, the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud computing service. The terminal device may be a smart phone, a tablet computer, a notebook computer, a desktop computer, and the like, but is not limited thereto, the terminal device and the server may be directly or indirectly connected through a wired or wireless communication manner, and an embodiment of the present application is not limited thereto, as shown in fig. 1, the method includes:
and step S10, acquiring real-time tunnel image information when a data triggering instruction is detected, wherein the data triggering instruction is triggered by a monitoring person through the target equipment.
For the embodiment of the present application, the target device may be a mobile terminal device used by a worker, or may be a fixed terminal device, which is not limited herein.
Specifically, the staff passes through the image acquisition instrument and gathers the tunnel hole in and the outer image in hole, and wherein, the image acquisition instrument includes: digital cameras, digital video cameras, scanners, and the like.
And step S11, inputting the real-time tunnel image information into the trained risk network model for risk detection, and acquiring the tunnel characteristic information in the real-time tunnel image information.
Specifically, after the real-time tunnel image information is input into the risk network model, the electronic device stores three independent matrices (the matrices can be understood as a two-dimensional array, and the later course will explain in detail) for storing the image, wherein the three matrices respectively correspond to red, green and blue colors of the image (all colors in the world can be formulated by three colors of red, green and blue). If the size of an image is 64 x 64 pixels (one pixel is a color point, and one color point is represented by three values of red, green and blue, for example, 255,255,255, then the color point is white), so that 3 matrices of 64 x 64 size represent the image in the electronic device, the values in the matrices correspond to the red, green and blue intensity values of the image, and in the field of artificial intelligence, each data input to the neural network is called a feature, and then 64 results in 12288 tunnel feature information in the image.
And step S12, identifying and analyzing the tunnel characteristic information, and acquiring risk data information of the real-time tunnel image information.
And step S13, transmitting the risk data information to the target device to control the display of the risk data information.
Specifically, risk data information is acquired through a control layer (controller), a service layer (service) and a data access layer (dao), the data access layer is only responsible for data interaction with a database, data is read, the service layer needs to write logic codes according to actual service requirements of the system, the service logic layer calls related methods of the data access layer to achieve interaction with the database and feeds execution results back to the control layer, the control layer sends the risk data information to a view renderer to render views of the risk data information, and finally the risk data information is displayed back.
The server sends the risk data information to the target equipment in a wireless data transmission mode, and the staff can know the basic condition of the current tunnel engineering construction through looking up the risk data information.
In the embodiment of the application, by adopting the technical scheme, when the construction risk monitoring is carried out on the tunnel engineering, a worker clicks a monitoring key of target equipment to obtain the implemented tunnel image information of the tunnel engineering, the tunnel image information is output to a risk network model trained in advance for risk detection so as to determine whether the current tunnel engineering has a risk leak, tunnel characteristic information in the obtained real-time tunnel image information is identified and analyzed, risk data information with a risk coefficient is retrieved and transmitted to the target equipment for display, the worker monitors the construction risk of the current tunnel engineering by observing a monitoring picture displayed by the target equipment, the effect of improving the construction risk monitoring efficiency of the tunnel engineering is achieved, and the time for communicating basic conditions of patients by an interventionalist is saved, the efficiency of the inquiry to the patient is improved.
In a possible implementation manner of the embodiment of the present application, step S11 further includes step S101 (not shown in the figure) and step S102 (not shown in the figure), wherein,
step S101, a tunnel training sample is obtained, the tunnel training sample comprises a risk sample image of a tunnel and labeling information corresponding to each risk in the risk sample image, and the labeling information comprises: risk category information and risk level information.
Specifically, the tunnel construction monitoring measurement project is divided into a necessary measurement project and a selected measurement project, wherein the necessary measurement project is a daily monitoring measurement project to be performed by the tunnel engineering, and the necessary monitoring measurement project comprises: 1) observing inside and outside the hole; 2) the vault is sunk; 3) the headroom is converged; 4) and (5) settling the earth surface.
The vault sinking represents the phenomenon that a tunnel top plate moves downwards due to the self weight and stress adjustment of surrounding rocks after the tunnel is excavated; the clearance convergence represents the phenomenon that the surrounding rock mass of the tunnel is invaded into the clearance of the tunnel after the tunnel is excavated; the surface subsidence representation refers to the surface subsidence phenomenon caused by extrusion of surrounding rocks on an excavated surface due to excavation, or relaxation of the surrounding rocks due to collapse, consolidation of gaps between the excavated surrounding rocks and supports, between the surrounding rocks and lining due to the reduction of underground water level, subsidence of the supports in weak surrounding rocks and the like.
Specifically, the risk category information of the tunnel engineering construction includes:
1. water inrush and mud gushing: the method has the advantages that the geological condition is very poor, underground water is rich in sections, the original stratum structure is broken and replaced in the underground engineering excavation process, the mechanical balance state of soil bodies and water bodies in the stratum is broken, and the process that water and the soil bodies are gushed into an excavation cavern together is caused when protection is not carried out in time;
2. collapse: mainly, the accidents of injury and casualty caused by that the support is untimely and unstable due to improper operation or other reasons, the strength of the engineering frame exceeds the strength limit of the engineering frame under the action of external force or gravity, or the structural stability is damaged;
3. striking an object: in the processes of excavation blasting, water proofing and lining construction, an out-of-control object moves under the action of inertia force, gravity and other external forces to strike a human body to cause personal casualty accidents;
4. high falling: the risk mainly occurs in the operations of excavating a platform, preventing water, reinforcing steel bars and a two-lining trolley, and the high-altitude falling accident is caused by high-altitude operation, has the highest incidence rate and great danger;
5. electric shock: the main risk points are high and low power supply lines and distribution boxes in the tunnel, and the main reasons are lack of knowledge of safe power utilization, installation and maintenance of electric appliances and electric wires which are not operated according to regulations and the like.
Specifically, the risk level information of the tunnel engineering construction is respectively a light level, a large level, a serious level and a disaster level from low to high.
And S102, creating a risk network model, and training the tunnel network model based on the tunnel training sample to obtain the trained risk network model.
In a possible implementation manner of the embodiment of the present application, step S10 further includes step Sa (not shown in the figure) and step Sb (not shown in the figure), wherein,
and step Sa, acquiring real-time position information and real-time direction information based on the real-time tunnel image information.
For the embodiment of the application, the actual position information of the collected real-time tunnel image information and the real-time direction information of the collected real-time tunnel image information are obtained in a satellite positioning mode.
In particular, satellite positioning is a technology for accurately positioning something using satellites, and it has been developed from the initial low positioning accuracy, inability to perform real-time positioning, difficulty in providing timely navigation services to the present high-precision GPS global positioning system, and it has been realized that 4 satellites can be observed at any time and at any point on the earth, so as to realize functions of navigation, positioning, and the like.
And step Sb, respectively binding the real-time position information and the real-time direction information with the real-time tunnel image information.
The real-time position information is position information during real-time tunnel image information acquisition, and the real-time direction information is angle information during real-time tunnel image information acquisition.
In a possible implementation manner of the embodiment of the present application, the step Sa (not shown) further includes a step Sa1 (not shown) and a step Sa2 (not shown), wherein,
in step Sa1, when the position acquisition command is detected, construction position information of the worker is acquired.
And step Sa2, generating tunnel maintenance route information according to the construction position information and the real-time position information, and controlling and displaying the tunnel maintenance route information.
Specifically, the server receives construction position information and real-time position information of the satellite, and sends the information to the terminal, and the terminal calculates tunnel maintenance route information based on the construction position information and the real-time position information.
In a possible implementation manner of the embodiment of the present application, step S10 is followed by step S103 (not shown in the figure), wherein,
and S103, creating real-time tunnel image information for the real-time tunnel image information through a BIM modeling technology, denoising the real-time tunnel image information, and performing image enhancement processing on the denoised real-time tunnel image information.
Specifically, noise can be understood as "a factor that hinders human sense organs from understanding the received source information" in particular. For example, if a black and white picture has a planar luminance distribution assumed to be f (x, y), then the luminance distribution R (x, y) interfering with its reception is referred to as image noise. Common image noise is additive noise, multiplicative noise, quantization noise, and "salt and pepper" noise. Additive vocal and image signal intensity are uncorrelated, for example: the television camera of "channel noise" that the picture introduces in the transmission process scans the noise of the picture; the vocal and image signals are correlated and tend to vary with changes in the image signal, such as: voice in flying spot scan images, television scan raster, film grain, etc.; quantization noise is the main noise source of digital images, and the size of the quantization noise shows the difference between the digital image and the original image; "salt and pepper" noise, for example: white spots on a black image, black spot noise on a white image, errors introduced in a transform domain, and transform noise caused by inverse image transformation.
In a possible implementation manner of the embodiment of the present application, the step S11 specifically includes a step S111 (not shown in the figure), a step S112 (not shown in the figure), and a step S113 (not shown in the figure), wherein,
and step S111, performing convolution processing on the real-time tunnel image information to obtain at least one tunnel characteristic diagram.
In particular, a convolutional network is essentially an input-to-output mapping that is capable of learning a large number of input-to-output mapping relationships without requiring any precise mathematical expression between the inputs and outputs, and the network has the ability to map between input-output pairs as long as the convolutional network is trained with known patterns. The convolutional network performs supervised training, so its sample set is formed by: vector pairs of (input vector, ideal output vector). All these vector pairs should be the actual "running" results from the system that the network is about to simulate. They may be collected from the actual operating system. Before training is started, all weights should be initialized with some different small random number. The small random number is used for ensuring that the network does not enter a saturation state due to overlarge weight value, so that training fails; "different" is used to ensure that the network can learn normally.
And step S112, performing feature scanning extraction on at least one tunnel feature map to obtain a plurality of three-dimensional feature maps with different dimensions.
And step S113, fusing a plurality of three-dimensional characteristic graphs with different dimensions to obtain tunnel characteristic information in the real-time tunnel image information.
Specifically, after a plurality of three-dimensional feature maps with different dimensions are obtained, fusion is performed based on the plurality of three-dimensional feature maps with different dimensions, and tunnel feature information is obtained.
In a possible implementation manner of the embodiment of the present application, the step S13 specifically includes a step S14 (not shown in the figure), a step S15 (not shown in the figure), a step S16 (not shown in the figure), and a step S17 (not shown in the figure), wherein,
step S14, acquiring a communication route of the current target device, detecting the communication route, and determining whether the communication condition of the communication route meets a preset communication requirement.
Specifically, when the server communicates with the terminal device, the server sends information to a specified base station through a signal transmitter, and when the information is sent to the terminal device through the base station, the signal sent by the base station is detected to determine the current communication condition.
And step S15, if not, acquiring the standby communication route, detecting the standby communication route, and determining whether the standby communication condition of the standby communication route meets the current communication requirement.
Specifically, when unexpected weather occurs, the connection between the server and the base station fluctuates, which causes the current communication route to be abnormal, and therefore, a backup communication line is set, and switching is performed to the backup communication route when the communication route is abnormal, wherein the backup communication line: the transmitter carries out 4G/5G communication with the satellite through the router, and the satellite sends the data to the ground after receiving the data, detects the spare communication line simultaneously, ensures that the communication line communicates normally.
And step S16, if yes, switching the communication of the current target device from the communication route to the standby communication route.
Step S17, if not, if yes, controlling the alarm device to output alarm signals in a preset mode, wherein the preset mode comprises at least one of the following: sound output mode and light output mode.
For example, the means for audibly signaling an alarm signal includes: buzzer, bell, whistle and steam whistle etc. send alarm signal's device through light output mode includes: breathing lights, flashing lights, engineering warning lights, and the like.
The above embodiments introduce a method for monitoring a risk of tunnel engineering construction from the perspective of a method flow, and the following embodiments introduce a device for monitoring a risk of tunnel engineering construction from the perspective of a virtual module or a virtual unit, which are described in detail in the following embodiments.
The embodiment of the present application provides a risk monitoring device for tunnel engineering construction, as shown in fig. 2, this risk monitoring device for tunnel engineering construction 20 may specifically include: a first acquisition module 21, a second acquisition module 22, an analysis module 23, and a data transmission module 24, wherein,
the first acquisition module 21 is configured to acquire real-time tunnel image information when a data trigger instruction is detected, where the data trigger instruction is triggered by a monitoring person through a target device;
the second obtaining module 22 is configured to input the real-time tunnel image information to the trained risk network model for risk detection, and obtain tunnel feature information in the real-time tunnel image information;
the analysis module 23 is configured to perform identification analysis on the tunnel feature information to obtain risk data information of the real-time tunnel image information;
and the data transmission module 24 is used for transmitting the risk data information to the target equipment so as to control and display the risk data information.
In a possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a third obtaining module and a creating module, wherein,
the third acquisition module is used for acquiring a tunnel training sample, the tunnel training sample comprises a risk sample image of the tunnel and labeling information corresponding to each risk in the risk sample image, and the labeling information comprises: risk category information and risk level information;
and the creating module is used for creating a risk network model and training the tunnel network model based on the tunnel training sample to obtain the trained risk network model.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a fourth obtaining module and a binding module, wherein,
the fourth acquisition module is used for acquiring real-time position information and real-time direction information based on the real-time tunnel image information;
and the binding module is used for binding the real-time position information and the real-time direction information with the real-time tunnel image information.
The real-time position information is position information during real-time tunnel image information acquisition, and the real-time direction information is angle information during real-time tunnel image information acquisition.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: a fifth acquisition module and a position detection module, wherein,
the fifth acquisition module is used for acquiring the construction position information of the constructors when the position acquisition instruction is detected;
and the position detection module is used for generating tunnel maintenance route information according to the construction position information and the real-time position information and controlling and displaying the tunnel maintenance route information.
In another possible implementation manner of the embodiment of the present application, the apparatus 20 further includes: an image processing module, wherein,
and the image processing module is used for creating the real-time tunnel image information through a BIM modeling technology for the real-time tunnel image information, denoising the real-time tunnel image information, and performing image enhancement processing on the denoised real-time tunnel image information.
In another possible implementation manner of the embodiment of the application, the second obtaining module 22 is configured to perform risk detection on the risk network model after inputting the real-time tunnel image information into the training, and obtain tunnel feature information in the real-time tunnel image information, where the tunnel feature information is specifically configured to:
performing convolution processing on the real-time tunnel image information to obtain at least one tunnel characteristic diagram;
performing feature scanning extraction on at least one tunnel feature map to obtain a plurality of three-dimensional feature maps with different dimensions;
and fusing the three-dimensional characteristic graphs with different dimensions to obtain the tunnel characteristic information in the real-time tunnel image information.
In another possible implementation manner of the embodiment of the present application, the data transmission module 24 is configured to transmit the risk data information to the target device to control and display the risk data information, and specifically configured to:
acquiring a communication route of current target equipment, detecting the communication route, and determining whether the communication condition of the communication route meets a preset communication requirement;
if not, acquiring a standby communication route, detecting the standby communication route, and determining whether the standby communication condition of the standby communication route meets the current communication requirement;
if yes, switching the communication of the current target equipment from the communication route to a standby communication route;
if the preset mode does not meet the preset requirement, controlling the alarm equipment to output an alarm signal in a preset mode, wherein the preset mode comprises at least one of the following modes: sound output mode and light output mode.
Specifically, the first obtaining module 21, the second obtaining module 22, the third obtaining module, the fourth obtaining module, and the fifth obtaining module may all be the same module, or may all be different modules, or may be partially different modules, which is not limited in this embodiment of the application.
In an embodiment of the present application, an electronic device is provided, as shown in fig. 3, where the electronic device 300 shown in fig. 3 includes: a processor 301 and a memory 303. Wherein processor 301 is coupled to memory 303, such as via bus 302. Optionally, the electronic device 300 may also include a transceiver 304. It should be noted that the transceiver 304 is not limited to one in practical applications, and the structure of the electronic device 300 is not limited to the embodiment of the present application.
The Processor 301 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 301 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The Memory 303 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 303 is used for storing application program codes for executing the scheme of the application, and the processor 301 controls the execution. The processor 301 is configured to execute application program code stored in the memory 303 to implement the aspects illustrated in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. But also a server, etc. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
The present application provides a computer-readable storage medium, on which a computer program is stored, which, when running on a computer, enables the computer to execute the corresponding content in the foregoing method embodiments. Compared with the prior art, in the embodiment of the application, when the construction risk monitoring is carried out on the tunnel engineering, the working personnel clicks the monitoring key of the target equipment to obtain the implemented tunnel image information of the tunnel engineering, the tunnel image information is output to the risk network model trained in advance to carry out risk detection so as to determine whether the current tunnel engineering has risk leaks or not, the tunnel characteristic information in the obtained real-time tunnel image information is identified and analyzed, the risk data information with risk coefficients is retrieved and transmitted to the target equipment to be displayed, the working personnel monitors the construction risk of the current tunnel engineering by observing the monitoring picture displayed by the target equipment, the inquiry doctor of the target inquiry department can improve the construction risk monitoring efficiency of the tunnel engineering, and the communication time of the doctor on the individual basic condition of the patient can be saved, the time for communicating the inquiry efficiency condition of the patient is prolonged, and the inquiry efficiency of the patient is improved.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.
Claims (10)
1. A method for monitoring the construction risk of tunnel engineering is characterized by comprising the following steps:
when a data triggering instruction is detected, acquiring real-time tunnel image information, wherein the data triggering instruction is triggered by a monitoring person through target equipment;
inputting the real-time tunnel image information into a trained risk network model for risk detection, and acquiring tunnel characteristic information in the real-time tunnel image information;
identifying and analyzing the tunnel characteristic information to acquire risk data information of the real-time tunnel image information;
and transmitting the risk data information to target equipment so as to control and display the risk data information.
2. The method for monitoring the risk of the tunnel engineering construction according to claim 1, wherein the step of inputting the real-time tunnel image information into the trained risk network model for risk detection further comprises:
acquiring a tunnel training sample, wherein the tunnel training sample comprises a risk sample image of a tunnel and labeling information corresponding to each risk in the risk sample image, and the labeling information comprises: risk category information and risk level information;
and establishing a risk network model, and training the tunnel network model based on the tunnel training sample to obtain the trained risk network model.
3. The method for monitoring the risk of the tunnel engineering construction according to claim 1, wherein the step of acquiring the real-time tunnel image information further comprises the following steps:
acquiring real-time position information and real-time direction information based on the real-time tunnel image information;
respectively binding the real-time position information and the real-time direction information with the real-time tunnel image information;
the real-time position information is position information when the real-time tunnel image information is collected, and the real-time direction information is angle information when the real-time tunnel image information is collected.
4. The method for monitoring the risk of the tunnel engineering construction according to claim 3, wherein the step of acquiring real-time position information and real-time direction information based on the real-time tunnel image information further comprises the steps of:
when a position acquisition instruction is detected, acquiring construction position information of a worker;
and generating tunnel maintenance route information according to the construction position information and the real-time position information, and controlling and displaying the tunnel maintenance route information.
5. The method for monitoring the risk of the tunnel engineering construction according to claim 1, wherein the step of acquiring the real-time tunnel image information further comprises the following steps:
and creating real-time tunnel image information for the real-time tunnel image information through a BIM modeling technology, denoising the real-time tunnel image information, and performing image enhancement processing on the denoised real-time tunnel image information.
6. The method for monitoring the risk of the tunnel engineering construction according to claim 1, wherein the step of inputting the real-time tunnel image information into the trained risk network model for risk detection to obtain the tunnel feature information in the real-time tunnel image information comprises:
performing convolution processing on the real-time tunnel image information to obtain at least one tunnel characteristic diagram;
performing feature scanning extraction on the at least one tunnel feature map to obtain a plurality of three-dimensional feature maps with different dimensions;
and fusing the three-dimensional characteristic graphs with different dimensions to obtain the tunnel characteristic information in the real-time tunnel image information.
7. The method for monitoring the risk of the tunnel engineering construction according to claim 1, wherein the transmitting the risk data information to a target device to control the display of the risk data information comprises:
the method comprises the steps of obtaining a communication route of current target equipment, detecting the communication route, and determining whether the communication condition of the communication route meets a preset communication requirement;
if not, acquiring a standby communication route, detecting the standby communication route, and determining whether the standby communication condition of the standby communication route meets the current communication requirement;
if yes, switching the communication of the current target equipment from the communication route to the standby communication route;
if the preset mode does not meet the preset requirement, controlling the alarm equipment to output an alarm signal in a preset mode, wherein the preset mode comprises at least one of the following modes: sound output mode and light output mode.
8. A tunnel engineering construction risk monitoring device, its characterized in that includes:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring real-time tunnel image information when a data trigger instruction is detected, and the data trigger instruction is triggered by monitoring personnel through target equipment;
the second acquisition module is used for inputting the real-time tunnel image information into the trained risk network model for risk detection, and acquiring tunnel characteristic information in the real-time tunnel image information;
the analysis module is used for identifying and analyzing the tunnel characteristic information to acquire risk data information of the real-time tunnel image information;
and the data transmission module is used for transmitting the risk data information to target equipment so as to control and display the risk data information.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the method for monitoring the construction risk of the tunnel engineering according to any one of claims 1 to 7 is carried out.
10. A computer-readable storage medium on which a computer program is stored, the program, when executed by a processor, implementing the method for monitoring risk in tunnel engineering construction according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111215212.8A CN113822227A (en) | 2021-10-19 | 2021-10-19 | Tunnel engineering construction risk monitoring method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111215212.8A CN113822227A (en) | 2021-10-19 | 2021-10-19 | Tunnel engineering construction risk monitoring method, device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113822227A true CN113822227A (en) | 2021-12-21 |
Family
ID=78916950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111215212.8A Pending CN113822227A (en) | 2021-10-19 | 2021-10-19 | Tunnel engineering construction risk monitoring method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113822227A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114819588A (en) * | 2022-04-20 | 2022-07-29 | 南京同筑盛世信息科技有限公司 | Construction risk monitoring and control system based on integration of Internet of things and 5G |
CN115457728A (en) * | 2022-08-18 | 2022-12-09 | 合肥未来计算机技术开发有限公司 | Tunnel constructor operation safety protection method |
CN116526682A (en) * | 2023-07-05 | 2023-08-01 | 河北万博电器有限公司 | Control method, device, equipment and medium of high-low voltage complete switch equipment |
CN116908214A (en) * | 2023-09-14 | 2023-10-20 | 中交路建交通科技有限公司 | Tunnel construction defect detection method and system based on digital twinning |
CN116906125A (en) * | 2023-09-06 | 2023-10-20 | 四川高速公路建设开发集团有限公司 | Soft rock tunnel safety monitoring method and system based on data synchronous transmission algorithm |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440600A (en) * | 2013-09-13 | 2013-12-11 | 成都中铁隆工程集团有限公司 | BIM (Building Information Modeling) risk monitoring system and method of multilayer 4D (4-Dimensional) model |
CN105736050A (en) * | 2014-12-08 | 2016-07-06 | 中国水利水电第四工程局有限公司 | Tunnel construction safety monitor method and system |
CN109931109A (en) * | 2019-04-19 | 2019-06-25 | 贵州省交通规划勘察设计研究院股份有限公司 | A kind of constructing tunnel dynamic landslide safety comprehensive method for early warning based on multivariate data |
CN110689042A (en) * | 2019-08-20 | 2020-01-14 | 中国矿业大学(北京) | Tunnel leakage grade identification method and device, storage medium and electronic device |
CN111401131A (en) * | 2020-02-13 | 2020-07-10 | 深圳供电局有限公司 | Image processing method and device for tunnel pipe gallery, computer equipment and storage medium |
CN212642810U (en) * | 2020-07-24 | 2021-03-02 | 中国建筑第七工程局有限公司 | Fault fracture zone tunnel construction early warning system |
CN112907901A (en) * | 2021-01-29 | 2021-06-04 | 中煤科工集团重庆研究院有限公司 | Tunnel monitoring entity risk early warning assessment model |
-
2021
- 2021-10-19 CN CN202111215212.8A patent/CN113822227A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103440600A (en) * | 2013-09-13 | 2013-12-11 | 成都中铁隆工程集团有限公司 | BIM (Building Information Modeling) risk monitoring system and method of multilayer 4D (4-Dimensional) model |
CN105736050A (en) * | 2014-12-08 | 2016-07-06 | 中国水利水电第四工程局有限公司 | Tunnel construction safety monitor method and system |
CN109931109A (en) * | 2019-04-19 | 2019-06-25 | 贵州省交通规划勘察设计研究院股份有限公司 | A kind of constructing tunnel dynamic landslide safety comprehensive method for early warning based on multivariate data |
CN110689042A (en) * | 2019-08-20 | 2020-01-14 | 中国矿业大学(北京) | Tunnel leakage grade identification method and device, storage medium and electronic device |
CN111401131A (en) * | 2020-02-13 | 2020-07-10 | 深圳供电局有限公司 | Image processing method and device for tunnel pipe gallery, computer equipment and storage medium |
CN212642810U (en) * | 2020-07-24 | 2021-03-02 | 中国建筑第七工程局有限公司 | Fault fracture zone tunnel construction early warning system |
CN112907901A (en) * | 2021-01-29 | 2021-06-04 | 中煤科工集团重庆研究院有限公司 | Tunnel monitoring entity risk early warning assessment model |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114819588A (en) * | 2022-04-20 | 2022-07-29 | 南京同筑盛世信息科技有限公司 | Construction risk monitoring and control system based on integration of Internet of things and 5G |
CN114819588B (en) * | 2022-04-20 | 2023-03-07 | 南京同筑盛世信息科技有限公司 | Construction risk monitoring and regulating system based on 5G integrated with Internet of things |
CN115457728A (en) * | 2022-08-18 | 2022-12-09 | 合肥未来计算机技术开发有限公司 | Tunnel constructor operation safety protection method |
CN115457728B (en) * | 2022-08-18 | 2023-12-26 | 合肥未来计算机技术开发有限公司 | Tunnel constructor operation safety protection method |
CN116526682A (en) * | 2023-07-05 | 2023-08-01 | 河北万博电器有限公司 | Control method, device, equipment and medium of high-low voltage complete switch equipment |
CN116906125A (en) * | 2023-09-06 | 2023-10-20 | 四川高速公路建设开发集团有限公司 | Soft rock tunnel safety monitoring method and system based on data synchronous transmission algorithm |
CN116906125B (en) * | 2023-09-06 | 2023-12-29 | 四川高速公路建设开发集团有限公司 | Soft rock tunnel safety monitoring method and system based on data synchronous transmission algorithm |
CN116908214A (en) * | 2023-09-14 | 2023-10-20 | 中交路建交通科技有限公司 | Tunnel construction defect detection method and system based on digital twinning |
CN116908214B (en) * | 2023-09-14 | 2023-12-08 | 中交路建交通科技有限公司 | Tunnel construction defect detection method and system based on digital twinning |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113822227A (en) | Tunnel engineering construction risk monitoring method, device and medium | |
JP6812404B2 (en) | Methods, devices, computer-readable storage media, and computer programs for fusing point cloud data | |
Duque et al. | Bridge deterioration quantification protocol using UAV | |
Mosalam et al. | Applications of laser scanning to structures in laboratory tests and field surveys | |
Dewez et al. | Towards cavity‐collapse hazard maps with Zeb‐Revo handheld laser scanner point clouds | |
CN110348138B (en) | Method and device for generating real underground roadway model in real time and storage medium | |
CN109556569B (en) | Topographic map surveying and mapping method and device | |
JP7065477B2 (en) | Disaster situation judgment system and disaster judgment flight system | |
Congress et al. | Methodology for resloping of rock slope using 3D models from UAV-CRP technology | |
CA3181086A1 (en) | Operating modes of magnetic navigation devices | |
CN109799503A (en) | Building Damage assessment drafting method and system | |
CN116012336B (en) | Tunnel intelligent geological sketch and surrounding rock grade identification device and method | |
CN114494633B (en) | Filling and digging data processing method and device, computer equipment and storage medium | |
EP3736610B1 (en) | Augmented reality system for electromagnetic buried asset location | |
CN117109524A (en) | Geological disaster unmanned plane airborne radar monitoring method and device and electronic equipment | |
US8314791B2 (en) | Method and apparatus for determining view impact | |
CN115185013A (en) | Pipeline detection method based on channel dredging engineering | |
CA3181630A1 (en) | Correlating overlapping magnetic measurement data from multiple magnetic navigation devices and updating a geomagnetic map with that data | |
Shan et al. | Feasibility of Accurate Point Cloud Model Reconstruction for Earthquake‐Damaged Structures Using UAV‐Based Photogrammetry | |
CN114943809A (en) | Map model generation method and device and storage medium | |
CN111366172B (en) | Quality detection method and device of digital elevation model and storage medium | |
Strandjord et al. | Framework and techniques for cooperative group situational awareness in urban environments | |
Soulakellis et al. | Synergistic Exploitation of Geoinformation Methods for Post-earthquake 3D Mapping and Damage Assessment | |
KR101969863B1 (en) | Method and apparatus for simulating of GPS receiver observation environment based on DSM | |
CN117349928A (en) | Building opening degree calculating method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211221 |