CN114169551A - Cabinet inspection management method and system - Google Patents

Cabinet inspection management method and system Download PDF

Info

Publication number
CN114169551A
CN114169551A CN202111490947.1A CN202111490947A CN114169551A CN 114169551 A CN114169551 A CN 114169551A CN 202111490947 A CN202111490947 A CN 202111490947A CN 114169551 A CN114169551 A CN 114169551A
Authority
CN
China
Prior art keywords
patrol
target key
target
permission request
labels
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111490947.1A
Other languages
Chinese (zh)
Inventor
张美华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai DC Science Co Ltd
Original Assignee
Shanghai DC Science Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai DC Science Co Ltd filed Critical Shanghai DC Science Co Ltd
Priority to CN202111490947.1A priority Critical patent/CN114169551A/en
Publication of CN114169551A publication Critical patent/CN114169551A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Abstract

According to the equipment cabinet inspection management method and system, the number of second target key inspection labels is calculated according to the number of the target key inspection labels and the description strategy of the first target key inspection labels according to the permission request of the target inspection information and the description strategy of the target key inspection labels corresponding to the preset permission request, and the target key inspection labels with the number of the second target key inspection labels are divided into the target inspection information. The method determines a target key patrol tag description strategy according to errors between a permission request and a preset permission request of target patrol information, and then uses the target key patrol tag description strategy to divide target key patrol tags which can be acquired when patrol description contents are input into the target patrol information in a correlated manner every time. Therefore, the accuracy of the division processing of the target key patrol labels is improved, and the integrity of the target key patrol labels among the target patrol information can be improved.

Description

Cabinet inspection management method and system
Technical Field
The application relates to the technical field of information division, in particular to a cabinet inspection management method and system.
Background
When the artificial intelligence is used in actual life, great convenience is brought to people, the artificial intelligence can work continuously for 24 hours, and complete relevant information can be accurately acquired, so that errors are reduced, and labor cost is also reduced. However, when the artificial intelligence is used for cabinet inspection management, the related information is not managed in place.
Disclosure of Invention
In view of this, the application provides a cabinet inspection management method and system.
In a first aspect, a cabinet inspection management method is provided, and the method includes:
when target patrol inspection information is associated with preset input patrol inspection description content, acquiring the number of first target key patrol inspection labels corresponding to the preset input patrol inspection description content and a permission request of the target patrol inspection information;
calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of a preset permission request;
calculating the number of second target key patrol labels according to the number of the first target key patrol labels and the target key patrol label description strategy;
dividing the target key patrol tags of the second target key patrol tag quantity into the target patrol information;
and managing the target inspection information to obtain a management result.
Optionally, the calculating, according to the first target key patrol tag number and the target key patrol tag description policy, a second target key patrol tag number includes:
acquiring the number of third target key patrol tags in a target key patrol tag set corresponding to the target patrol information;
when the number of the third target key patrol tags is larger than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the first target key patrol tags and the target key patrol tag description strategy;
and when the number of the third target key patrol labels is not more than the number of the first target key patrol labels, calculating to obtain the number of the second target key patrol labels according to the number of the third target key patrol labels and the target key patrol label description strategy.
Optionally, after dividing the target critical patrol tags of the second target critical patrol tag number into the target patrol information, the method further includes:
screening unassociated target key patrol labels in the target key patrol label set to obtain the number of third target key patrol labels after iteration, wherein the number of the unassociated target key patrol labels is the percentage parameter of the number of the second target key patrol labels and the target key patrol label description strategy;
when the target inspection information is associated with the preset input inspection description content, before acquiring the number of the first target key inspection labels corresponding to the preset input inspection description content and the permission request of the target inspection information, the method further comprises the following steps:
when the division of the important characteristic vector corresponding to the target patrol information is detected, acquiring the target patrol time of the target key patrol tag set corresponding to the target patrol information for recently finishing the target key patrol tag;
calculating patrol time distinction between the current patrol time and the target patrol time;
distinguishing and determining the number of fourth target key patrol labels according to the patrol time;
trimming the target key patrol labels with the fourth target key patrol label quantity into the target key patrol label set to obtain a third target key patrol label quantity;
wherein, the distinguishing and determining the number of the fourth target key patrol tags according to the patrol time comprises the following steps:
acquiring the number of fifth target key patrol labels needing to be trimmed in unit patrol time;
and distinguishing and calculating according to the fifth target key patrol label quantity and the patrol time to obtain a fourth target key patrol label quantity.
Optionally, the calculating a target key patrol tag description policy according to the permission request of the target patrol information and the error information of the preset permission request includes:
acquiring a target inspection information preset permission request corresponding to the current inspection time; calculating the error range of the preset permission request and the permission request of the permission request;
determining a target key patrol label description strategy according to the permission request error range;
wherein, the obtaining of the target patrol inspection information preset permission request corresponding to the current patrol inspection time comprises:
acquiring patrol time division of patrol time set up by a current patrol time matrix server;
and retrieving a preset permission request corresponding to the inspection time division from a first matching relation matrix to obtain a target inspection information preset permission request corresponding to the current inspection time, wherein the first matching relation matrix is the matching relation matrix of the inspection time division and the preset permission request.
Optionally, the determining a target key patrol tag description policy according to the permission request error range includes:
when the allowable request error range is larger than 0, retrieving a target key patrol tag description strategy corresponding to the allowable request error range from a second matching relation matrix, wherein the second matching relation matrix is a matching relation matrix of the allowable request error range and the target key patrol tag description strategy;
when the error range of the permission request is equal to 0, acquiring the number of the sixth target key patrol tags currently owned by the target patrol information;
when the number of the sixth target key patrol tags is less than the number of the standard target key patrol tags corresponding to the permission request, determining that the value of a target key patrol tag description policy is 1;
and when the number of the sixth target key patrol tags is not less than the number of the standard target key patrol tags, determining that the value of the target key patrol tag description strategy is 0.
The second aspect provides a management system is patrolled and examined to rack, including data acquisition equipment and data processing terminal, data acquisition equipment with data processing terminal communication connection, data processing terminal specifically is used for:
when target patrol inspection information is associated with preset input patrol inspection description content, acquiring the number of first target key patrol inspection labels corresponding to the preset input patrol inspection description content and a permission request of the target patrol inspection information;
calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of a preset permission request;
calculating the number of second target key patrol labels according to the number of the first target key patrol labels and the target key patrol label description strategy;
dividing the target key patrol tags of the second target key patrol tag quantity into the target patrol information;
and managing the target inspection information to obtain a management result.
Optionally, the data processing terminal is specifically configured to:
acquiring the number of third target key patrol tags in a target key patrol tag set corresponding to the target patrol information;
when the number of the third target key patrol tags is larger than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the first target key patrol tags and the target key patrol tag description strategy;
and when the number of the third target key patrol labels is not more than the number of the first target key patrol labels, calculating to obtain the number of the second target key patrol labels according to the number of the third target key patrol labels and the target key patrol label description strategy.
Optionally, the data processing terminal is specifically configured to:
screening unassociated target key patrol labels in the target key patrol label set to obtain the number of third target key patrol labels after iteration, wherein the number of the unassociated target key patrol labels is the percentage parameter of the number of the second target key patrol labels and the target key patrol label description strategy;
wherein the data processing terminal is further specifically configured to:
when the division of the important characteristic vector corresponding to the target patrol information is detected, acquiring the target patrol time of the target key patrol tag set corresponding to the target patrol information for recently finishing the target key patrol tag;
calculating patrol time distinction between the current patrol time and the target patrol time;
distinguishing and determining the number of fourth target key patrol labels according to the patrol time;
trimming the target key patrol labels with the fourth target key patrol label quantity into the target key patrol label set to obtain a third target key patrol label quantity;
wherein the data processing terminal is specifically configured to:
acquiring the number of fifth target key patrol labels needing to be trimmed in unit patrol time;
and distinguishing and calculating according to the fifth target key patrol label quantity and the patrol time to obtain a fourth target key patrol label quantity.
Optionally, the data processing terminal is specifically configured to:
acquiring a target inspection information preset permission request corresponding to the current inspection time; calculating the error range of the preset permission request and the permission request of the permission request;
determining a target key patrol label description strategy according to the permission request error range;
wherein the data processing terminal is specifically configured to:
acquiring patrol time division of patrol time set up by a current patrol time matrix server;
and retrieving a preset permission request corresponding to the inspection time division from a first matching relation matrix to obtain a target inspection information preset permission request corresponding to the current inspection time, wherein the first matching relation matrix is the matching relation matrix of the inspection time division and the preset permission request.
Optionally, the data processing terminal is specifically configured to:
when the allowable request error range is larger than 0, retrieving a target key patrol tag description strategy corresponding to the allowable request error range from a second matching relation matrix, wherein the second matching relation matrix is a matching relation matrix of the allowable request error range and the target key patrol tag description strategy;
when the error range of the permission request is equal to 0, acquiring the number of the sixth target key patrol tags currently owned by the target patrol information;
when the number of the sixth target key patrol tags is less than the number of the standard target key patrol tags corresponding to the permission request, determining that the value of a target key patrol tag description policy is 1;
and when the number of the sixth target key patrol tags is not less than the number of the standard target key patrol tags, determining that the value of the target key patrol tag description strategy is 0.
According to the equipment cabinet inspection management method and system, when the target inspection information is associated with the preset input inspection description content, the number of first target key inspection labels corresponding to the preset input inspection description content and a permission request of the target inspection information are acquired; calculating a corresponding target key patrol label description strategy according to a permission request of the target patrol information and error information of a preset permission request; calculating the number of second target key patrol labels according to the number of the target key patrol labels and the description strategy of the first target key patrol labels; and dividing the target key patrol tags with the second target key patrol tag quantity into target patrol information. The method determines a target key patrol tag description strategy according to errors between a permission request and a preset permission request of target patrol information, and then uses the target key patrol tag description strategy to divide target key patrol tags which can be acquired when patrol description contents are input into the target patrol information in a correlated manner every time. Therefore, the accuracy of the division processing of the target key patrol labels is improved, and the integrity of the target key patrol labels among the target patrol information can be improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart of a cabinet inspection management method according to an embodiment of the present application.
Fig. 2 is a block diagram of a cabinet inspection management device provided in the embodiment of the present application.
Fig. 3 is an architecture diagram of a cabinet inspection management system according to an embodiment of the present application.
Detailed Description
In order to better understand the technical solutions, the technical solutions of the present application are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present application are detailed descriptions of the technical solutions of the present application, and are not limitations of the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
Referring to fig. 1, a cabinet inspection management method is shown, which may include the technical solutions described in the following steps 100 to 500.
Step 100, when the target patrol inspection information is associated with the preset input patrol inspection description content, acquiring the number of first target key patrol inspection tags corresponding to the preset input patrol inspection description content and a permission request of the target patrol inspection information.
For example, the number of the first target key patrol tags represents the input information amount corresponding to the input patrol description content.
Further, the permission request of the target patrol inspection information is used for representing the input requirement corresponding to the input patrol inspection description content.
And 200, calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of the preset permission request.
For example, the target key patrol tag description policy is used for representing important description contents of an intersection of a permission request of the target patrol information and error information of a preset permission request.
And 300, calculating the number of second target key patrol labels according to the number of the first target key patrol labels and the target key patrol label description strategy.
And 400, dividing the target key patrol tags of the second target key patrol tag quantity into the target patrol information.
And 500, managing the target inspection information to obtain a management result.
It can be understood that, when the technical solutions described in the above steps 100 to 500 are performed, the first target key patrol tag number corresponding to the preset input patrol description content and the permission request of the target patrol information are acquired when the target patrol information is associated with the preset input patrol description content; calculating a corresponding target key patrol label description strategy according to a permission request of the target patrol information and error information of a preset permission request; calculating the number of second target key patrol labels according to the number of the target key patrol labels and the description strategy of the first target key patrol labels; and dividing the target key patrol tags with the second target key patrol tag quantity into target patrol information. The method determines a target key patrol tag description strategy according to errors between a permission request and a preset permission request of target patrol information, and then uses the target key patrol tag description strategy to divide target key patrol tags which can be acquired when patrol description contents are input into the target patrol information in a correlated manner every time. Therefore, the accuracy of the division processing of the target key patrol labels is improved, and the integrity of the target key patrol labels among the target patrol information can be improved.
In an alternative embodiment, the inventor finds that, when the first target key patrol tag number and the target key patrol tag description policy are based on, there is a problem that the third target key patrol tag number is not accurate, so that it is difficult to accurately calculate the second target key patrol tag number, and in order to improve the above technical problem, the step of calculating the second target key patrol tag number according to the first target key patrol tag number and the target key patrol tag description policy, which is described in step 300, may specifically include the technical solutions described in the following steps q 1-q 3.
And q1, acquiring the number of third target key patrol tags in the target key patrol tag set corresponding to the target patrol information.
And q2, when the number of the third target key patrol tags is greater than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the first target key patrol tags and the target key patrol tag description strategy.
And q3, when the number of the third target key patrol tags is not greater than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the third target key patrol tags and the target key patrol tag description strategy.
It can be understood that, when the technical solutions described in the above steps q 1-q 3 are executed, according to the first target key patrol tag quantity and the target key patrol tag description strategy, the problem that the third target key patrol tag quantity is inaccurate is solved, so that the second target key patrol tag quantity can be accurately calculated.
Based on the above basis, after dividing the target critical patrol tags of the second target critical patrol tag number into the target patrol information, the following technical solution described in step w1 may also be included.
Step w1, screening unassociated target key patrol labels in the target key patrol label set to obtain a third target key patrol label number after iteration, where the unassociated target key patrol label number is a percentage parameter of the second target key patrol label number and the target key patrol label description policy.
It can be understood that when the technical solution described in the above step w1 is executed, the accuracy of the second target key patrol tag number and the percentage parameter of the target key patrol tag description policy is improved by screening the unassociated target key patrol tags.
Based on the above basis, when the target inspection information is associated with the preset input inspection description content, before acquiring the number of the first target key inspection tags corresponding to the preset input inspection description content and the permission request of the target inspection information, the following technical scheme described in step e 1-step e4 may be further included.
And e1, when the important characteristic vector division corresponding to the target inspection information is detected, acquiring the target inspection time of the target key inspection label set which is corresponding to the target inspection information and used for finishing the target inspection label at the last time.
And e2, calculating the patrol time distinction between the current patrol time and the target patrol time.
And e3, distinguishing and determining the number of the fourth target key patrol labels according to the patrol time.
And e4, trimming the target key patrol labels with the fourth target key patrol label quantity into the target key patrol label set to obtain a third target key patrol label quantity.
It can be understood that, when the technical solutions described in the above steps e 1-e 4 are executed, the target patrol time of the target key patrol tag is modified last time by acquiring the target key patrol tag set corresponding to the target patrol information, so as to improve the integrity of the number of the third target key patrol tags.
In an alternative embodiment, the inventor finds that, when the patrol time is divided, there is a problem that the unit patrol time needs to be trimmed inaccurately, so that it is difficult to accurately determine the number of the fourth target key patrol tags, and in order to improve the above technical problem, the step of determining the number of the fourth target key patrol tags according to the patrol time division described in step e3 may specifically include the technical solutions described in the following steps e31 and e 32.
And e31, acquiring the number of the fifth target key patrol labels needing to be trimmed in unit patrol time.
And e32, calculating according to the fifth target key patrol label quantity and the patrol time to obtain a fourth target key patrol label quantity.
It can be understood that when the technical solutions described in the above steps e31 and e32 are executed, the problem that unit patrol time needs to be trimmed inaccurately is improved according to the patrol time differentiation, so that the fourth target key patrol tag quantity can be accurately determined.
In an alternative embodiment, the inventor finds that, when there is an error message between the permission request and the preset permission request according to the target patrol inspection information, there is a problem of an error range of the permission request, so that it is difficult to accurately calculate the target key patrol tag description policy, and in order to improve the above technical problem, the step of calculating the target key patrol tag description policy according to the error message between the permission request and the preset permission request of the target patrol inspection information, which is described in step 200, may specifically include the technical solutions described in the following step r1 and step r 2.
R1, acquiring a target inspection information preset permission request corresponding to the current inspection time; and calculating the error range of the preset permission request and the permission request of the permission request.
And step r2, determining a target key patrol label description strategy according to the permission request error range.
It can be understood that, when the technical solutions described in the above steps r1 and r2 are executed, the problem of the error range of the permission request is avoided when the permission request of the target patrol information is wrong with the preset permission request, so that the target key patrol tag description policy can be accurately calculated.
In an alternative embodiment, the inventor finds that, when obtaining the target inspection information preset permission request corresponding to the current inspection time, there is a problem that the inspection time is not accurately distinguished, so that it is difficult to accurately obtain the target inspection information preset permission request corresponding to the current inspection time, and in order to improve the above technical problem, the step of obtaining the target inspection information preset permission request corresponding to the current inspection time described in step r1 may specifically include the technical solutions described in the following steps r11 and r 12.
And r11, acquiring patrol time differences of patrol time built by the current patrol time matrix server.
And r12, retrieving a preset permission request corresponding to the patrol time division from a first matching relation matrix, and obtaining a target patrol information preset permission request corresponding to the current patrol time, wherein the first matching relation matrix is the matching relation matrix of the patrol time division and the preset permission request.
It can be understood that when the technical solutions described in the above steps r11 and r12 are executed and the target inspection information preset permission request corresponding to the current inspection time is obtained, the problem of inaccurate inspection time distinction is solved, so that the target inspection information preset permission request corresponding to the current inspection time can be accurately obtained.
In an alternative embodiment, the inventor finds that, according to the error range of the permission request, there is a problem that the matching relationship matrix of the second matching relationship matrix is unreliable for the error range of the permission request and the target key patrol tag description policy, so that it is difficult to reliably determine the target key patrol tag description policy, and in order to improve the above technical problem, the step of determining the target key patrol tag description policy according to the error range of the permission request described in step r2 may specifically include the technical solutions described in the following steps r 21-r 24.
And r21, when the error range of the permission request is greater than 0, retrieving a target key patrol tag description strategy corresponding to the error range of the permission request from a second matching relation matrix, wherein the second matching relation matrix is a matching relation matrix of the error range of the permission request and the target key patrol tag description strategy.
And r22, when the permission request error range is equal to 0, acquiring the number of the sixth target key patrol tags currently owned by the target patrol information.
And r23, when the sixth target key patrol tag quantity is less than the standard target key patrol tag quantity corresponding to the permission request, determining that the value of the target key patrol tag description policy is 1.
And r24, when the number of the sixth target key patrol tags is not less than the number of the standard target key patrol tags, determining that the value of the target key patrol tag description strategy is 0.
It can be understood that, when the technical solutions described in the above steps r 21-r 24 are executed, according to the allowable request error range, the problem that the matching relationship matrix of the second matching relationship matrix is unreliable for the allowable request error range and the target key patrol tag description policy is avoided as much as possible, so that the target key patrol tag description policy can be reliably determined.
In a possible embodiment, the inventor finds that, when the permission request of the target inspection information is an error message of a preset permission request, there is a problem that the permission request arrangement information step is accurate, so that it is difficult to accurately calculate a corresponding target key inspection tag description policy, and in order to improve the above technical problem, the step of calculating the corresponding target key inspection tag description policy according to the permission request of the target inspection information and the error message of the preset permission request, which is described in step 200, may specifically include the technical solutions described in the following steps y 1-y 4.
And step y1, obtaining the permission request configuration information of all the target patrol information.
And step y2, determining the preset permission request according to the permission request branch information.
And step y3, calculating that the permission request of the target patrol information is distinguished from the permission request of the preset permission request.
And step y4, determining a target key patrol label description strategy corresponding to the permission request differentiation according to the permission request differentiation.
It can be understood that, when the technical solutions described in the above steps y 1-y 4 are executed, and according to the error information between the permission request of the target patrol inspection information and the preset permission request, the problem that the permission request arrangement information step is accurate is solved, so that the corresponding target key patrol tag description policy can be accurately calculated.
On the basis, please refer to fig. 2 in combination, which provides a cabinet inspection management device 200 applied to a data processing terminal, the device includes:
a request obtaining module 210, configured to, when target inspection information is associated with a preset input inspection description, obtain a first target key inspection tag number corresponding to the preset input inspection description and a permission request of the target inspection information;
the content calculation module 220 is used for calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of the preset permission request;
a quantity calculating module 230, configured to calculate a second target key patrol tag quantity according to the first target key patrol tag quantity and the target key patrol tag description policy;
an information dividing module 240, configured to divide the target key patrol tags of the second target key patrol tag number into the target patrol information;
and the result management module 250 is configured to manage the target inspection information to obtain a management result.
On the basis of the above, please refer to fig. 3, which shows a cabinet inspection management system 300, which includes a processor 310 and a memory 320, which are communicated with each other, wherein the processor 310 is configured to read a computer program from the memory 320 and execute the computer program to implement the above method.
On the basis of the above, there is also provided a computer-readable storage medium on which a computer program is stored, which when executed implements the above-described method.
In summary, based on the above scheme, when the target inspection information is associated with the preset input inspection description content, the number of the first target key inspection tags corresponding to the preset input inspection description content and the permission request of the target inspection information are acquired; calculating a corresponding target key patrol label description strategy according to a permission request of the target patrol information and error information of a preset permission request; calculating the number of second target key patrol labels according to the number of the target key patrol labels and the description strategy of the first target key patrol labels; and dividing the target key patrol tags with the second target key patrol tag quantity into target patrol information. The method determines a target key patrol tag description strategy according to errors between a permission request and a preset permission request of target patrol information, and then uses the target key patrol tag description strategy to divide target key patrol tags which can be acquired when patrol description contents are input into the target patrol information in a correlated manner every time. Therefore, the accuracy of the division processing of the target key patrol labels is improved, and the integrity of the target key patrol labels among the target patrol information can be improved.
It should be appreciated that the system and its modules shown above may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided, for example, on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules of the present application may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the present application may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, various aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the numbers allow for adaptive variation. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
The entire contents of each patent, patent application publication, and other material cited in this application, such as articles, books, specifications, publications, documents, and the like, are hereby incorporated by reference into this application. Except where the application is filed in a manner inconsistent or contrary to the present disclosure, and except where the claim is filed in its broadest scope (whether present or later appended to the application) as well. It is noted that the descriptions, definitions and/or use of terms in this application shall control if they are inconsistent or contrary to the statements and/or uses of the present application in the material attached to this application.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application can be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A cabinet inspection management method is characterized by comprising the following steps:
when target patrol inspection information is associated with preset input patrol inspection description content, acquiring the number of first target key patrol inspection labels corresponding to the preset input patrol inspection description content and a permission request of the target patrol inspection information;
calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of a preset permission request;
calculating the number of second target key patrol labels according to the number of the first target key patrol labels and the target key patrol label description strategy;
dividing the target key patrol tags of the second target key patrol tag quantity into the target patrol information;
and managing the target inspection information to obtain a management result.
2. The method according to claim 1, wherein the calculating a second target key patrol tag number according to the first target key patrol tag number and the target key patrol tag description policy comprises:
acquiring the number of third target key patrol tags in a target key patrol tag set corresponding to the target patrol information;
when the number of the third target key patrol tags is larger than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the first target key patrol tags and the target key patrol tag description strategy;
and when the number of the third target key patrol labels is not more than the number of the first target key patrol labels, calculating to obtain the number of the second target key patrol labels according to the number of the third target key patrol labels and the target key patrol label description strategy.
3. The method according to claim 2, wherein the dividing the target critical routing tags of the second target critical routing tag number after the target routing information further comprises:
screening unassociated target key patrol labels in the target key patrol label set to obtain the number of third target key patrol labels after iteration, wherein the number of the unassociated target key patrol labels is the percentage parameter of the number of the second target key patrol labels and the target key patrol label description strategy;
when the target inspection information is associated with the preset input inspection description content, before acquiring the number of the first target key inspection labels corresponding to the preset input inspection description content and the permission request of the target inspection information, the method further comprises the following steps:
when the division of the important characteristic vector corresponding to the target patrol information is detected, acquiring the target patrol time of the target key patrol tag set corresponding to the target patrol information for recently finishing the target key patrol tag;
calculating patrol time distinction between the current patrol time and the target patrol time;
distinguishing and determining the number of fourth target key patrol labels according to the patrol time;
trimming the target key patrol labels with the fourth target key patrol label quantity into the target key patrol label set to obtain a third target key patrol label quantity;
wherein, the distinguishing and determining the number of the fourth target key patrol tags according to the patrol time comprises the following steps:
acquiring the number of fifth target key patrol labels needing to be trimmed in unit patrol time;
and distinguishing and calculating according to the fifth target key patrol label quantity and the patrol time to obtain a fourth target key patrol label quantity.
4. The method according to claim 1, wherein the calculating of the target key patrol tag description policy according to the permission request of the target patrol information and the error information of the preset permission request comprises:
acquiring a target inspection information preset permission request corresponding to the current inspection time; calculating the error range of the preset permission request and the permission request of the permission request;
determining a target key patrol label description strategy according to the permission request error range;
wherein, the obtaining of the target patrol inspection information preset permission request corresponding to the current patrol inspection time comprises:
acquiring patrol time division of patrol time set up by a current patrol time matrix server;
and retrieving a preset permission request corresponding to the inspection time division from a first matching relation matrix to obtain a target inspection information preset permission request corresponding to the current inspection time, wherein the first matching relation matrix is the matching relation matrix of the inspection time division and the preset permission request.
5. The method of claim 4, wherein determining a target critical patrol tag description policy based on the permission request error range comprises:
when the allowable request error range is larger than 0, retrieving a target key patrol tag description strategy corresponding to the allowable request error range from a second matching relation matrix, wherein the second matching relation matrix is a matching relation matrix of the allowable request error range and the target key patrol tag description strategy;
when the error range of the permission request is equal to 0, acquiring the number of the sixth target key patrol tags currently owned by the target patrol information;
when the number of the sixth target key patrol tags is less than the number of the standard target key patrol tags corresponding to the permission request, determining that the value of a target key patrol tag description policy is 1;
and when the number of the sixth target key patrol tags is not less than the number of the standard target key patrol tags, determining that the value of the target key patrol tag description strategy is 0.
6. The utility model provides a management system is patrolled and examined to rack, its characterized in that, includes data acquisition equipment and data processing terminal, data acquisition equipment with data processing terminal communication connection, data processing terminal specifically is used for:
when target patrol inspection information is associated with preset input patrol inspection description content, acquiring the number of first target key patrol inspection labels corresponding to the preset input patrol inspection description content and a permission request of the target patrol inspection information;
calculating a corresponding target key patrol label description strategy according to the permission request of the target patrol information and the error information of a preset permission request;
calculating the number of second target key patrol labels according to the number of the first target key patrol labels and the target key patrol label description strategy;
dividing the target key patrol tags of the second target key patrol tag quantity into the target patrol information;
and managing the target inspection information to obtain a management result.
7. The system of claim 6, wherein the data processing terminal is specifically configured to:
acquiring the number of third target key patrol tags in a target key patrol tag set corresponding to the target patrol information;
when the number of the third target key patrol tags is larger than the number of the first target key patrol tags, calculating to obtain the number of second target key patrol tags according to the number of the first target key patrol tags and the target key patrol tag description strategy;
and when the number of the third target key patrol labels is not more than the number of the first target key patrol labels, calculating to obtain the number of the second target key patrol labels according to the number of the third target key patrol labels and the target key patrol label description strategy.
8. The system of claim 7, wherein the data processing terminal is specifically configured to:
screening unassociated target key patrol labels in the target key patrol label set to obtain the number of third target key patrol labels after iteration, wherein the number of the unassociated target key patrol labels is the percentage parameter of the number of the second target key patrol labels and the target key patrol label description strategy;
wherein the data processing terminal is further specifically configured to:
when the division of the important characteristic vector corresponding to the target patrol information is detected, acquiring the target patrol time of the target key patrol tag set corresponding to the target patrol information for recently finishing the target key patrol tag;
calculating patrol time distinction between the current patrol time and the target patrol time;
distinguishing and determining the number of fourth target key patrol labels according to the patrol time;
trimming the target key patrol labels with the fourth target key patrol label quantity into the target key patrol label set to obtain a third target key patrol label quantity;
wherein the data processing terminal is specifically configured to:
acquiring the number of fifth target key patrol labels needing to be trimmed in unit patrol time;
and distinguishing and calculating according to the fifth target key patrol label quantity and the patrol time to obtain a fourth target key patrol label quantity.
9. The system of claim 6, wherein the data processing terminal is specifically configured to:
acquiring a target inspection information preset permission request corresponding to the current inspection time; calculating the error range of the preset permission request and the permission request of the permission request;
determining a target key patrol label description strategy according to the permission request error range;
wherein the data processing terminal is specifically configured to:
acquiring patrol time division of patrol time set up by a current patrol time matrix server;
and retrieving a preset permission request corresponding to the inspection time division from a first matching relation matrix to obtain a target inspection information preset permission request corresponding to the current inspection time, wherein the first matching relation matrix is the matching relation matrix of the inspection time division and the preset permission request.
10. The system of claim 9, wherein the data processing terminal is specifically configured to:
when the allowable request error range is larger than 0, retrieving a target key patrol tag description strategy corresponding to the allowable request error range from a second matching relation matrix, wherein the second matching relation matrix is a matching relation matrix of the allowable request error range and the target key patrol tag description strategy;
when the error range of the permission request is equal to 0, acquiring the number of the sixth target key patrol tags currently owned by the target patrol information;
when the number of the sixth target key patrol tags is less than the number of the standard target key patrol tags corresponding to the permission request, determining that the value of a target key patrol tag description policy is 1;
and when the number of the sixth target key patrol tags is not less than the number of the standard target key patrol tags, determining that the value of the target key patrol tag description strategy is 0.
CN202111490947.1A 2021-12-08 2021-12-08 Cabinet inspection management method and system Pending CN114169551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111490947.1A CN114169551A (en) 2021-12-08 2021-12-08 Cabinet inspection management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111490947.1A CN114169551A (en) 2021-12-08 2021-12-08 Cabinet inspection management method and system

Publications (1)

Publication Number Publication Date
CN114169551A true CN114169551A (en) 2022-03-11

Family

ID=80484346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111490947.1A Pending CN114169551A (en) 2021-12-08 2021-12-08 Cabinet inspection management method and system

Country Status (1)

Country Link
CN (1) CN114169551A (en)

Similar Documents

Publication Publication Date Title
CN110955661A (en) Data fusion method and device, readable storage medium and electronic equipment
CN113886468A (en) Online interactive data mining method and system based on Internet
CN113378554A (en) Medical information intelligent interaction method and system
CN113903473A (en) Medical information intelligent interaction method and system based on artificial intelligence
CN115757370A (en) User information communication method and system based on Internet of things
CN114663753A (en) Production task online monitoring method and system
CN113485203B (en) Method and system for intelligently controlling network resource sharing
CN114169551A (en) Cabinet inspection management method and system
CN113360562A (en) Interface pairing method and system based on artificial intelligence and big data and cloud platform
CN115359203A (en) Three-dimensional high-precision map generation method and system and cloud platform
CN114187552A (en) Method and system for monitoring power environment of machine room
CN113380363A (en) Medical data quality evaluation method and system based on artificial intelligence
CN114135992A (en) Air conditioner refrigeration method and system based on data center
CN111400282A (en) Data processing strategy adjusting method, device, equipment and storage medium
CN113613288A (en) Intelligent data distribution method and system based on 5G
CN113420158B (en) Standard medical term input method and system
CN113611381A (en) Outpatient service information registration method and system based on intelligent medical treatment
CN113610123B (en) Multi-source heterogeneous data fusion method and system based on Internet of things
CN113409076B (en) Method and system for constructing user portrait based on big data and cloud platform
CN113645604B (en) Intelligent medical ward help calling method and system
CN113627165A (en) Bedside interaction method and system based on intelligent medical treatment
CN113626429A (en) Method and system for constructing intelligent range emergency medical knowledge base based on metadata
CN113611425A (en) Software definition-based intelligent regional medical treatment integrated database method and system
CN113607178A (en) Intelligent navigation method and system based on neural network
CN113626688A (en) Intelligent medical data acquisition method and system based on software definition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination