CN114491187B - Intelligent natural resource monitoring integrated system - Google Patents
Intelligent natural resource monitoring integrated system Download PDFInfo
- Publication number
- CN114491187B CN114491187B CN202210068453.2A CN202210068453A CN114491187B CN 114491187 B CN114491187 B CN 114491187B CN 202210068453 A CN202210068453 A CN 202210068453A CN 114491187 B CN114491187 B CN 114491187B
- Authority
- CN
- China
- Prior art keywords
- character
- natural resource
- password
- circle
- uploaded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 22
- 230000008676 import Effects 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 4
- 238000000034 method Methods 0.000 claims description 54
- 238000006243 chemical reaction Methods 0.000 claims description 52
- 238000007781 pre-processing Methods 0.000 claims description 19
- 230000008569 process Effects 0.000 claims description 13
- 238000004043 dyeing Methods 0.000 claims description 9
- 238000010186 staining Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 238000012216 screening Methods 0.000 claims description 4
- 230000006837 decompression Effects 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims 3
- 239000003086 colorant Substances 0.000 abstract description 2
- 238000013507 mapping Methods 0.000 description 8
- 230000008707 rearrangement Effects 0.000 description 5
- 230000009466 transformation Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 2
- 230000001131 transforming effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 229910052500 inorganic mineral Inorganic materials 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000011707 mineral Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/904—Browsing; Visualisation therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/29—Geographical information databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9537—Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9538—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/90—Determination of colour characteristics
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Remote Sensing (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides an intelligent natural resource monitoring integrated system, which comprises a platform login module, an import and upload module and a pattern spot generation module; the data output end of the platform login module is connected with the data input end of the import and upload module, and the data output end of the import and upload module is connected with the data input end of the pattern spot generation module; the platform login module is used for logging in the natural resource intelligent management platform; the import uploading module is used for uploading the imported collected data to the natural resource intelligent management platform; and the pattern spot generation module is used for processing the uploaded data by the intelligent natural resource management platform to obtain a pattern spot map. The invention can safely upload the acquired data to the natural resource intelligent management platform and display each pattern spot on the map in different colors.
Description
Technical Field
The invention relates to the technical field of natural resources, in particular to an intelligent monitoring integrated system for natural resources.
Background
In order to implement ecological civilization construction and establish the requirements of a natural resource investigation monitoring system, the intelligent monitoring work of natural resources is widely explored and implemented in all nationwide provinces at present. The natural resource intelligent monitoring is regularly developed for dynamically mastering the change condition of natural resources, the natural resource monitoring target relates to various aspects of natural resources such as land, mineral products, forest, grassland, water, wetland, sea island and the like, and needs to be applied to advanced technologies of various industries such as GIS technology, unmanned aerial vehicles, internet +, cloud computing and the like, however, if the acquired data cannot be displayed in a map form by the natural resource intelligent management platform, the situation of knowing the natural resources is very fuzzy.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides an intelligent natural resource monitoring integrated system.
In order to achieve the above purpose, the invention provides an intelligent natural resource monitoring integrated system, which comprises a platform login module, an import and upload module and a pattern spot generation module;
the data output end of the platform login module is connected with the data input end of the import and upload module, and the data output end of the import and upload module is connected with the data input end of the spot generation module;
the platform login module is used for logging in the natural resource intelligent management platform;
the import uploading module is used for uploading the imported collected data to the natural resource intelligent management platform;
and the pattern spot generation module is used for processing the uploaded data by the intelligent natural resource management platform to obtain a pattern spot map.
In a preferred embodiment of the present invention, the uploading module comprises the following steps:
s21, storing the imported collected data in a temporary storage folder, counting the number of files of the imported collected data, and recording the number as p;
s22, recording the size of each imported file, and constructing a folder to be uploaded according to the number and the size of the files;
s23, compressing each folder to be uploaded to obtain a compressed file to be uploaded;
and S24, uploading all the to-be-uploaded compressed packets to a natural resource intelligent management platform.
In a preferred embodiment of the present invention, the importing and uploading module further includes step S25, where the natural resource intelligent management platform decompresses the received uploaded compressed file; the method for decompressing the received uploaded compressed file by the intelligent natural resource management platform comprises the following steps:
s251, the natural resource intelligent management platform numbers the received uploaded compressed files, and the numbers are respectively L 1 、L 2 、L 3 、……、L l ;L l Indicating a received 1 st upload compressed file, L 2 Indicating a received 2 nd upload compressed file, L 3 Indicating a received 3 rd upload compressed file, L l The method comprises the steps of representing a received first uploaded compressed file, wherein l represents the total number of the received uploaded compressed files of a natural resource intelligent management platform; let l' =1;
s252, uploading the compressed file L to the I l′ Executing an integrity algorithm operation to obtain a name integrity code; the method for obtaining the complete name code comprises the following steps:
wherein, integrity Quality Algorithm < > represents an Integrity Algorithm, and preferably adopts an MD5 Algorithm.
L l′ indicating the l' name complete code;
s253, judging L l′ Upload compressed file L with the L l′ Whether the file names of (1) are consistent:
if L is l′ Upload compressed file L with the L l′ If the file names are consistent, executing the next step;
if L is l′ Upload compressed file L with the L l′ If the file names are not consistent, the first file name isL' uploading compressed file L l′ Screening, namely re-requesting the terminal to send the compressed file to be uploaded corresponding to the file name;
s254, judging the relation between l 'and l':
if l' is not less than l, executing the next step;
if l ' < Q, then l ' = l ' +1;
s255, establishing a merged folder, and moving all files in the uploaded compressed file after decompression to the merged folder.
In a preferred embodiment of the present invention, the pattern spot generation module comprises the following steps:
s31, generating a map template;
s32, identifying the coordinate points obtained by analysis on the map template to form identification points;
s33, determining the center coordinates of all the circle to be defined by taking the radius as r and defining that the number of the identification points is more than or equal to u;
if it isLess than or equal to D 0 ,Is shown asCentre distance between circle and circle of the eta circle, D 0 Represents a preset circle center distance threshold value,is shown asThe coordinates of the center of the circle (x) η ,y η ) Circle representing the circle defined by the eta circleHeart coordinate, thenThe circle and the eta circle are drawn to the same figure spot;
if it isGreater than D 0 If it is, then it will notThe circle and the eta circle are drawn to the same figure spot;
and S35, dyeing all the spots.
In a preferred embodiment of the present invention, the method for dyeing the pattern spots in step S3 is:
wherein, O represents the dyeing digit of one of R, G and B components in RGB; generally, 8 is taken.
int () represents a rounding function;
Area n represents the area of the nth pattern spot;
n represents the total number of the image spots;
m represents the amount of staining.
In a preferred embodiment of the present invention, the platform login module comprises the following steps:
s11, logging in a webpage to obtain a user name and a user password input by a user;
s12, preprocessing the input user name and the user password by the login webpage to obtain a preprocessed user name and a preprocessed password;
and S13, sending the preprocessed user name, the preprocessed password and the equipment ID number of the login webpage equipment to a natural resource intelligent management platform for verification.
In a preferred embodiment of the present invention, step S13 includes the following steps:
s131, after the natural resource intelligent management platform receives the pre-processing user name and the pre-processing password sent by the sending terminal and the equipment ID number of the login webpage equipment, the natural resource intelligent management platform takes the received pre-processing user name as a search word, and judges whether a storage user name consistent with the search word exists in a user database or not:
if the user database has a stored user name consistent with the search word, executing the next step;
if the user database does not have a stored user name consistent with the search word, prompting that the input user name is incorrect on the login webpage, and asking for re-inputting the correct user name;
s132, extracting a storage password and a storage ID which are stored in a database and are associated with the received preprocessed user name, and judging whether the equipment ID number of the received login webpage equipment is consistent with the storage ID:
if the received equipment ID number of the login webpage equipment is consistent with the storage ID, executing the next step;
if the received equipment ID number of the login webpage equipment is inconsistent with the stored ID, the equipment ID number of the login webpage equipment needs to be verified by sending a short message;
s133, judging whether the received preprocessed password is consistent with the stored password:
if the received preprocessing password is consistent with the stored password, the verification is passed, and the natural resource intelligent management platform is logged in;
if the received preprocessing password is inconsistent with the stored password, the input user password is prompted to be incorrect on the login webpage, and the correct user password is input again.
In a preferred embodiment of the present invention, the method for obtaining the preprocessed user name in step S12 includes the following steps:
s121, counting the total number of all user name characters;
s122, for the a' th user name character A in all the user name characters a″′ Conversion into a character string A a″ ′;
S123, converting the character string A a″ ' converting to a string of comparable size;
s124, judging the relationship between a' and a:
if a' is more than or equal to a, executing the next step;
if a "" < a, a "" = a "" +1, return to step S122;
s125, the character string is processedArranging the character strings in the order from small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ″;
S127, converting the character string A f "conversion to a string of comparable size;
s128, judging the relationship between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the step S122 is returned;
s129, character stringArranging the character strings in the order from small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a).
In a preferred embodiment of the present invention, the method for obtaining the pre-processing password in step S12 includes the following steps:
s121, counting the total number of all password characters;
s122, aiming at the a' th password character A in all password characters a″′ Conversion into a character string A a″ ′;
S123, converting the character string A a″ ' conversion to comparable size strings;
s124, judging the relationship between a' and a:
if a' is more than or equal to a, executing the next step;
if a "" < a, a "" = a "" +1, return to step S122;
s125, the character stringArranging the character strings in the order from small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ″;
S127, converting the character string A f "conversion to a string of comparable size;
s128, judging the relationship between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the process returns to step S122;
s129, character stringArranging the character strings in the order from small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a).
The invention also discloses an intelligent monitoring and integrating method for natural resources, which comprises the following steps:
s1, logging in a natural resource intelligent management platform;
s2, uploading the imported collected data to a natural resource intelligent management platform;
and S3, the natural resource intelligent management platform processes the uploaded data to obtain the map spot map.
In conclusion, due to the adoption of the technical scheme, the method and the system can safely upload the acquired data to the natural resource intelligent management platform and display each pattern spot on the map in different colors.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses an intelligent natural resource monitoring and integrating system, which comprises a platform login module, an import and upload module and a pattern spot generation module;
the data output end of the platform login module is connected with the data input end of the import and upload module, and the data output end of the import and upload module is connected with the data input end of the spot generation module;
the platform login module is used for logging in the natural resource intelligent management platform;
the import uploading module is used for uploading the imported collected data to the natural resource intelligent management platform;
and the pattern spot generation module is used for processing the uploaded data by the intelligent natural resource management platform to obtain a pattern spot map.
In a preferred embodiment of the present invention, the importing and uploading module includes the following steps:
s21, storing the imported collected data in a temporary storage folder, counting the number of files of the imported collected data, and recording the number as P, wherein the number is P 1 、P 2 、P 3 、……、P p ,P 1 Denotes the 1 st import file, P 2 Denotes the 2 nd import file, P 3 Denotes the 3 rd import file, P p Representing the p-th import file;
s22, recording the size of each imported file, and constructing a folder to be uploaded according to the number and the size of the files; the method specifically comprises the following steps:
s221, the file P is processed 1 、P 2 、P 3 、……、P p S is obtained according to the arrangement of the file sizes from large to small 1 、S 2 、S 3 、……、S 4 ,S 1 Representing a document P 1 、P 2 、P 3 、……、P p Arranging the files according to the sizes of the files from large to small and then arranging the files at the 1 st bit, S 2 Representing a document P 1 、P 2 、P 3 、……、P p The files in the 2 nd bit after being arranged according to the sizes of the files from large to small, S 3 Represents a file P 1 、P 2 、P 3 、……、P p The files in the 3 rd bit after being arranged according to the sizes of the files from large to small, S p Represents a file P 1 、P 2 、P 3 、……、P p Arranging files in the p-th order according to the sizes of the files from large to small; let q =1; s =1;
s222, establishing a qth folder to be uploaded, and adding S s Moving to the qth folder to be uploaded;indicating the document S at the S-th bit after arrangement s The size of (a) is (b),
s223, adding S s+1 Moving to the qth folder to be uploaded; judging the size between PresetSize and Presetspace:
if the PresetSize is not more than the Presetspace, the PresetSize represents the size of a folder in the current folder, and the Presetspace represents the size of a preset uploading file;indicating the file S at the S +1 th bit after arrangement s+1 The size of (d); s = s +1;
if PresetSize > PresetSpace, then S is added s+1 Moving the file from the qth file to be uploaded to a temporary storage file; s = s +1; t = s;
s224, judging whether the temporary storage folder contains files:
if the temporary storage folder contains files, executing the next step;
if the temporary storage folder does not have files, ending the process;
s225, judging the relation between S and p:
if s is more than or equal to p, q = q +1; s = t min ;t min Min { t }, where min represents the minimum value in the set, and { t } represents the set of values t, and the process returns to step S222;
if S < p, the process returns to step S223.
S23, compressing each folder to be uploaded to obtain a compressed file to be uploaded; the method specifically comprises the following steps:
s231, acquiring the number of the folders to be uploaded, and recording the number as Q, wherein Q is the number of the folders to be uploaded respectively 1 、q 2 、q 3 、……、q Q ,q 1 Represents the 1 st folder to be uploaded, q 2 Represents the 2 nd folder to be uploaded, q 3 Represents the 3 rd folder to be uploaded, q Q Representing the Q & ltth & gt folder to be uploaded; let Q' =1;
s232, for the Q' th folder Q to be uploaded Q′ Compressing to obtain the Q' th compressed file to be uploaded
S233, executing integrity algorithm operation on the Q' th compressed file to be uploaded to obtain an integral name code; the method for obtaining the complete name code comprises the following steps:
wherein, integrity Quality Algorithm < > represents an Integrity Algorithm, and preferably adopts an MD5 Algorithm.
s233, using the Q 'complete name code obtained in the step S233 as the Q' compressed file to be uploadedThe compressed file name of (2); judging the relation between Q' and Q:
if Q' is more than or equal to Q, ending;
if Q ' < Q, Q ' = Q ' +1;
and S24, uploading all the to-be-uploaded compressed packets to a natural resource intelligent management platform.
In a preferred embodiment of the present invention, the importing and uploading module further includes step S25, where the natural resource intelligent management platform decompresses the received uploaded compressed file; the method for decompressing the received uploaded compressed file by the intelligent natural resource management platform comprises the following steps:
s251, the natural resource intelligent management platform numbers the received uploaded compressed files, and the numbers are respectively L 1 、L 2 、L 3 、……、L l ;L l Indicating a received 1 st upload compressed file, L 2 Indicating a received 2 nd upload compressed file, L 3 Indicating a received 3 rd upload compressed file, L l The method comprises the steps of representing a received first uploaded compressed file, wherein l represents the total number of the received uploaded compressed files of a natural resource intelligent management platform; let l' =1;
s252, uploading the compressed file L to the L l′ Executing an integrity algorithm operation to obtain a name integrity code; the method for obtaining the complete name code comprises the following steps:
wherein, integrity Quality Algorithm < > represents an Integrity Algorithm, and preferably adopts an MD5 Algorithm.
L l′ indicating the l' name complete code;
s253, judging L l′ Upload compressed file L with the L l′ Whether the file names of (1) are consistent:
if L is l′ Upload compressed file L with the L l′ If the file names of the files are consistent, execution is performedThe next step;
if L is l′ Upload compressed file L with the L l′ If the file names are not consistent, the first' uploaded compressed file L is l′ Screening, namely re-requesting the terminal to send the compressed file to be uploaded corresponding to the file name;
s254, judging the relation between l 'and l':
if l' is more than or equal to l, executing the next step;
if l ' < Q, then l ' = l ' +1;
s255, establishing a merging folder, and moving all the files in the decompressed uploaded compressed files into the merging folder.
In a preferred embodiment of the present invention, the pattern spot generation module comprises the following steps:
s31, generating a map template;
s32, identifying the coordinate points obtained by analysis on the map template to form identification points;
s33, determining the center coordinates of all the circle to be determined by taking the radius as r and the number of the circle identification points to be determined to be more than or equal to u;
if it isLess than or equal to D 0 ,Is shown asThe distance between the circle center and the eta circle center, D 0 Represents a preset circle center distance threshold value,is shown asThe coordinates of the center of the circle (x) η ,y η ) Representing the centre coordinates of the eta circle, thenThe circle and the eta circle are drawn to the same figure spot;
if it isGreater than D 0 If it is, then notThe circle and the eta circle are drawn to the same figure spot;
s35, staining all the spots.
In a preferred embodiment of the present invention, the platform login module comprises the following steps:
s11, logging in a webpage to obtain a user name and a user password input by a user;
s12, the login webpage preprocesses the input user name and the user password to obtain a preprocessed user name and a preprocessed password;
and S13, sending the preprocessed user name, the preprocessed password and the equipment ID number of the login webpage equipment to a natural resource intelligent management platform for verification.
The invention also discloses an intelligent monitoring and integrating method for natural resources, which comprises the following steps as shown in figure 1:
s1, logging in a natural resource intelligent management platform;
s2, uploading the imported collected data to a natural resource intelligent management platform;
and S3, the natural resource intelligent management platform processes the uploaded data to obtain the map spot map.
In a preferred embodiment of the present invention, step S2 includes the following steps:
s21, storing the imported collected data in a temporary storage folder, and counting the imported collected dataThe number of files (1) is recorded as P and is respectively P 1 、P 2 、P 3 、……、P p ,P 1 Denotes the 1 st import File, P 2 Denotes the 2 nd import file, P 3 Denotes the 3 rd import file, P p Representing a pth import file;
s22, recording the size of each imported file, and constructing a folder to be uploaded according to the number and the size of the files; the method specifically comprises the following steps:
s221, the file P is processed 1 、P 2 、P 3 、……、P p S is obtained according to the arrangement of the file sizes from large to small 1 、S 2 、S 3 、……、S 4 ,S 1 Representing a document P 1 、P 2 、P 3 、……、P p Arranging the files according to the sizes of the files from large to small and then arranging the files at the 1 st bit, S 2 Representing a document P 1 、P 2 、P 3 、……、P p The files in the 2 nd bit after being arranged according to the sizes of the files from large to small, S 3 Represents a file P 1 、P 2 、P 3 、……、P p The files in the 3 rd bit after being arranged according to the sizes of the files from large to small, S p Representing a document P 1 、P 2 、P 3 、……、P p Arranging files in the p-th order according to the sizes of the files from large to small; let q =1; s =1;
s222, establishing a qth folder to be uploaded, and adding S s Moving to the qth folder to be uploaded;indicating the document S at the S-th bit after arrangement s The size of (a) is (b),
s223, adding S s+1 Moving to the qth folder to be uploaded; judging the size between PresetSize and Presetspace:
if the PresetSize is not more than the PresetSpace, the PresetSize represents the size of a folder in the current folder, and the PresetSpace represents the size of a preset uploading file;indicating the file S at the S +1 th bit after arrangement s+1 The size of (d); s = s +1;
if PresetSize > PresetSpace, then S is added s+1 Moving the file from the qth file to be uploaded to a temporary storage file; s = s +1; t = s;
s224, judging whether the temporary storage folder contains files:
if the temporary storage folder contains files, executing the next step;
if the temporary storage folder does not have files, ending the process;
s225, judging the relation between S and p:
if s is larger than or equal to p, q = q +1; s = t min ;t min Min { t }, where min represents the minimum value in the set, and { t } represents the set of values t, and the process returns to step S222;
if S < p, the process returns to step S223.
S23, compressing each folder to be uploaded to obtain a compressed file to be uploaded; the method specifically comprises the following steps:
s231, acquiring the number of the folders to be uploaded, and recording the number as Q, wherein Q is the number of the folders to be uploaded respectively 1 、q 2 、q 3 、……、q Q ,q 1 Represents the 1 st folder to be uploaded, q 2 Represents the 2 nd folder to be uploaded, q 3 Represents the 3 rd folder to be uploaded, q Q Representing the Q & ltth & gt folder to be uploaded; let Q' =1;
S233, executing integrity algorithm operation on the Q' compressed file to be uploaded to obtain an integral name code; the method for obtaining the complete name code comprises the following steps:
wherein, integrity Quality Algorithm < > represents an Integrity Algorithm, and preferably adopts an MD5 Algorithm.
s233, using the Q 'complete name code obtained in the step S233 as the Q' compressed file to be uploadedThe compressed file name of (2); judging the relation between Q' and Q:
if Q' is more than or equal to Q, ending;
if Q ' < Q, Q ' = Q ' +1;
and S24, uploading all the to-be-uploaded compressed packets to a natural resource intelligent management platform.
In a preferred embodiment of the present invention, step S2 further includes step S25, where the natural resource intelligent management platform decompresses the received uploaded compressed file; the method for decompressing the received uploaded compressed file by the intelligent natural resource management platform comprises the following steps:
s251, the natural resource intelligent management platform numbers the received uploaded compressed files, and the numbers are respectively L 1 、L 2 、L 3 、……、L l ;L l Indicating a received 1 st upload compressed file, L 2 Indicating a received 2 nd upload compressed file, L 3 Indicating a received 3 rd upload compressed file, L l The method comprises the steps of representing a received first uploaded compressed file, wherein l represents the total number of the received uploaded compressed files of a natural resource intelligent management platform; let l' =1;
s252, uploading the compressed file L to the L l′ Executing an integrity algorithm operation to obtain a name integrity code; get its nameThe method for weighing the complete code comprises the following steps:
wherein, integrity Quality Algorithm < > represents an Integrity Algorithm, and preferably adopts an MD5 Algorithm.
L l′ indicating the l' name complete code;
s253, judging L l′ Upload compressed file L with the L l′ Whether the file names of (1) are consistent:
if L is l′ Upload compressed file L with the L l′ If the file names are consistent, executing the next step;
if L is l′ Upload compressed file L with the L l′ If the file names are not consistent, the first' upload compressed file L l′ Screening, namely re-requesting the terminal to send the compressed file to be uploaded corresponding to the file name;
s254, judging the relation between l 'and l':
if l' is not less than l, executing the next step;
if l ' < Q, then l ' = l ' +1;
s255, establishing a merged folder, and moving all files in the uploaded compressed file after decompression to the merged folder.
In a preferred embodiment of the present invention, step S3 includes the following steps:
s31, generating a map template;
s32, identifying the coordinate points obtained by analysis on the map template to form identification points;
s33, determining the center coordinates of all the circle to be determined by taking the radius as r and the number of the circle identification points to be determined to be more than or equal to u;
if it isLess than or equal to D 0 ,Denotes the firstThe distance between the circle center and the eta circle center, D 0 Represents a preset circle center distance threshold value,is shown asThe coordinates of the center of the circle (x) η ,y η ) Representing the centre coordinates of the circle of the nth circle, thenThe circle and the eta circle are drawn to the same figure spot;
if it isGreater than D 0 If it is, then notThe circle and the eta circle are drawn to the same figure spot;
and S35, dyeing all the spots.
In a preferred embodiment of the present invention, the method for dyeing the pattern spots in step S35 is:
wherein, O represents the dyeing digit of one of R, G and B components in RGB; generally, 8 is taken.
int () represents a rounding function;
Area n represents the area of the nth pattern spot;
n represents the total number of the image spots;
m represents the amount of staining.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, logging in a webpage to obtain a user name and a user password input by a user;
s12, the login webpage preprocesses the input user name and the user password to obtain a preprocessed user name and a preprocessed password;
and S13, sending the preprocessed user name, the preprocessed password and the equipment ID number of the login webpage equipment to the natural resource intelligent management platform for verification.
In a preferred embodiment of the present invention, step S13 includes the following steps:
s131, after the natural resource intelligent management platform receives the preprocessed user name and the preprocessed password sent by the sending terminal and the equipment ID number of the login webpage equipment, the natural resource intelligent management platform takes the received preprocessed user name as a search word, and judges whether a stored user name consistent with the search word exists in a user database or not:
if the stored user name consistent with the search word exists in the user database, executing the next step;
if the stored user name consistent with the search word does not exist in the user database, prompting that the input user name is incorrect on the login webpage, and asking for inputting the correct user name again;
s132, extracting a storage password and a storage ID which are stored in a database and are associated with the received preprocessed user name, and judging whether the equipment ID number of the received login webpage equipment is consistent with the storage ID:
if the received equipment ID number of the login webpage equipment is consistent with the storage ID, executing the next step;
if the received equipment ID number of the login webpage equipment is inconsistent with the stored ID, a short message is sent to verify the equipment ID number of the login webpage equipment;
s133, judging whether the received preprocessing password is consistent with the stored password:
if the received preprocessing password is consistent with the stored password, the authentication is passed, and the natural resource intelligent management platform is logged in;
if the received preprocessing password is inconsistent with the stored password, the input user password is prompted to be incorrect on the login webpage, and the correct user password is input again.
In a preferred embodiment of the present invention, the method for obtaining the preprocessed user name in step S12 includes the following steps:
s121, counting the total number of all user name characters, recording as a, and respectively recording as A 1 、A 2 、A 3 、……、A a Wherein A is 1 Representing the 1 st username character, A, of all username characters 2 Representing the 2 nd username character of all username characters, A 3 Representing the 3 rd username character, A, of all username characters a Representing the a-th username character of all username characters; a. The a′ ≠A a″ ,A a′ Indicating the a' th username character, A, of all username characters a″ Represents the a "th username character, a '≠ a", a' =1, 2, 3, 8230; \8230; a, a =1, 2, 3, \8230; 8230; a, a ″ =1, 2, 3, \ 8230; a; let a' =1;
s122, for the a' th user name character A in all the user name characters a″′ Conversion into a character string A a″ ', will the a' th username character A a″′ Conversion into a character string A a″ The method of' is:
A a″ ′=One-to-one Mapping Algorithm<A a″′ >,
wherein, one-to-One Mapping Algorithm < > represents a transformation Algorithm, and preferably adopts an MD5 Algorithm.
A a″ ' means to changeChanging character strings;
A a″′ represents the a' ″ -th username character of all username characters;
s123, converting the character string A a″ ' conversion to a character string of comparable size, character string A a″ The' method of transforming to a comparison string of comparable size is:
A a″′,b ' expression string A a″ ' counting the value of the character corresponding to the b-th bit from left to right;
||A a″ ' | | represents a character string A a″ ' the corresponding carry;
s124, judging the relation between a' and a:
if a' is more than or equal to a, executing the next step;
if a "" < a, a "" = a "" +1, return to step S122;
s125, the character stringAccording to the size from small to largeThe order of (a) and (b) are arranged,representing a transform string A 1 ' the corresponding comparison string of characters,representing a conversion string A 2 ' the corresponding comparison string of characters,representing a conversion string A 3 ' the corresponding comparison string of characters,representing a conversion string A a ' the corresponding comparison character string; will character stringArranged in character strings The corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); obtaining the original sequence of all the user name characters; let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ", will character string A f ' conversion to character conversion string A f The method comprises the following steps:
A f ″=One-to-one Mapping Algorithm<A f ′>,
wherein, the One-to-One Mapping Algorithm < > represents a transformation Algorithm, and preferably adopts an MD5 Algorithm.
A f "represents a character transformation string;
A f ' means to changeChanging character strings;
s127, converting the character string A f "conversion to a string of comparable size, string A f "the method of converting to a comparable size character comparison string is:
A f,d "represents a character string A f "the numerical value of the character corresponding to the d-th digit from left to right;
||A f "| | denotes a character string A f "the corresponding carry;
s128, judging the relationship between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the step S122 is returned;
s129, character stringArranged in the order from small to large,representing a character conversion string A 1 "the corresponding character comparison string(s),representing a character conversion string A 2 "the corresponding character comparison string(s),representing a character conversion string A 3 "the corresponding character comparison string(s),representing a character conversion string A a "corresponding character comparison string, comparing the character stringsArranged in character strings The corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); obtaining the rearrangement sequence of all the user name characters; the characters in each original order correspond to the characters in the rearranged order. And obtaining the position of the input user name character in the original sequence through the input user name character, wherein the character in the rearrangement sequence corresponding to the position is the preprocessed user name character corresponding to the input user name character.
For example, assume that all username characters (not limited to including upper case letters A-Z, lower case letters a-Z, numbers 0-9, special characters, etc.) are 1, 2, 3, 4, 5, a, b, c, d, e,
through steps S121 to S125 of the present invention, the original sequence of the characters is assumed as:
d a 3 4 c 2 b 5 1 e
through steps S126 to S129 of the present invention, the character rearrangement sequence is assumed to be:
e 2 c 4 a 5 b 3 d 1
assuming that the input user name is 123aa, the preprocessing user name is d5c22; assuming that the input user name is bb23ca, preprocessing the user name as bb5ca2; assuming that the input user name is 12cba3aa, the preprocessing user name is d5ab2c22.
In a preferred embodiment of the present invention, the method for obtaining the pre-processing password in step S12 includes the following steps:
s121, counting the total number of all password characters, and recording the total number as a which is A respectively 1 、A 2 、A 3 、……、A a Wherein A is 1 Representing the 1 st of all password characters, A 2 Representing the 2 nd password character of the total password characters, A 3 Representing the 3 rd of all password characters, A a Representing the a-th password character of all password characters; a. The a′ ≠A a″ ,A a′ Representing the a' th password character, A, of all password characters a″ Represents the a ' th password character, a ' ≠ a ', a ' =1, 2, 3, 8230; \8230; a, a ' =1, 2, 3, \8230; 8230; a; let a' =1;
s122, for the a' th password character A in all password characters a″′ Conversion into a character string A a″ ', the a' th password character A a″′ Conversion into a character string A a″ The method of' is:
A a″ ′=One-to-one Mapping Algorithm<A a″′ >,
wherein, one-to-One Mapping Algorithm < > represents a transformation Algorithm, and preferably adopts an MD5 Algorithm.
A a″ ' represents a transform string;
A a ″ ′ represents the a' ″ -th password character of all the password characters;
s123, converting the character string A a″ ' conversion to a character string of comparable size, character string A a″ ' the method of transforming to a comparison string of comparable size is:
A a″′,b ' representation character string A a″ ' counting the number of the character corresponding to the b-th bit from left to right;
||A a″ ' | | represents a character string A a″ ' the corresponding carry;
s124, judging the relationship between a' and a:
if a' > a is equal to or more than a, executing the next step;
if a ""' < a, a "" = a "" +1, return to step S122;
s125, the character stringArranged in the order from small to large,representing a transform string A 1 ' the corresponding comparison string of characters,representing a conversion string A 2 ' the corresponding comparison string of characters,representing a conversion string A 3 ' the corresponding comparison string of characters,representing a transform string A a ' the corresponding comparison character string; will character stringArranged in character strings The corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); obtaining the original sequence of all password characters; let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ", will character string A f ' conversion to character conversion string A f The method comprises the following steps:
A f ″=One-to-one Mapping Algorithm〈A f ′〉,
wherein, one-to-One Mapping Algorithm < > represents a transformation Algorithm, and preferably adopts an MD5 Algorithm.
A f "represents a character conversion string;
A f ' represents a transform string;
s127, converting the character string A f "conversion to a character string of comparable size, character string A f "the method of converting to a character comparison string of comparable size is:
A f,d "represents a character string A f "the value of the character corresponding to the d-th digit from left to right;
||A f "| | denotes a character string A f "the corresponding carry;
s128, judging the relationship between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the step S122 is returned;
s129, character stringArranged in the order from small to large,representing a character conversion string A 1 "the corresponding character comparison string(s),representing a character conversion string A 2 "the corresponding character comparison string(s),representing a character conversion string A 3 "the corresponding character comparison string(s),representing a character conversion string A a Comparing the corresponding characters to stringsArranged in character strings The corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); obtaining the rearrangement sequence of all password characters; each character in the original order corresponds to a character in the rearranged order. The positions of the input user password characters in the original sequence are obtained through the input user password characters, and the characters in the rearrangement sequence corresponding to the positions are the preprocessed password characters corresponding to the input user password characters.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (9)
1. An intelligent natural resource monitoring integrated system is characterized by comprising a platform login module, an import and upload module and a pattern spot generation module;
the data output end of the platform login module is connected with the data input end of the import and upload module, and the data output end of the import and upload module is connected with the data input end of the spot generation module;
the platform login module is used for logging in the natural resource intelligent management platform;
the import uploading module is used for uploading the imported collected data to the natural resource intelligent management platform;
the pattern spot generation module is used for processing the uploaded data by the intelligent natural resource management platform to obtain a pattern spot map; the method for obtaining the map spot map comprises the following steps:
s31, generating a map template;
s32, identifying the coordinate points obtained by analysis on a map template to form identification points;
s33, determining the center coordinates of all the circle to be determined by taking the radius as r and the number of the circle identification points to be determined to be more than or equal to u;
if it isLess than or equal to D 0 ,Is shown asThe distance between the circle center and the eta circle center, D 0 Represents a preset circle center distance threshold value, is shown asCircle center coordinates (x) of circle η ,y η ) Representing the centre coordinates of the circle of the nth circle, thenThe circle and the eta circle are drawn to the same figure spot;
if it isGreater than D 0 If it is, then notThe circle and the eta circle are drawn to the same figure spot;
and S35, dyeing all the spots.
2. The intelligent natural resource monitoring integrated system according to claim 1, wherein the uploading module comprises the following steps:
s21, storing the imported collected data in a temporary storage folder, counting the number of files of the imported collected data, and recording the number as p;
s22, recording the size of each imported file, and constructing a folder to be uploaded according to the number and the size of the files;
s23, compressing each folder to be uploaded to obtain a compressed file to be uploaded;
and S24, uploading all the to-be-uploaded compressed packets to a natural resource intelligent management platform.
3. The intelligent natural resource monitoring and integration system according to claim 2, wherein the uploading module further includes a step S25, in which the intelligent natural resource management platform decompresses the received uploaded compressed file; the method for decompressing the received uploaded compressed file by the intelligent natural resource management platform comprises the following steps:
s251, the natural resource intelligent management platform numbers the received uploaded compressed files, and the numbers are respectively L 1 、L 2 、L 3 、……、L l ;L l Indicating the received 1 st upload compressed file, L 2 Indicating a received 2 nd upload compressed file,L 3 Indicating a received 3 rd upload compressed file, L l The method comprises the steps of representing a received first uploaded compressed file, wherein l represents the total number of the received uploaded compressed files of a natural resource intelligent management platform; let l' =1;
s252, uploading the compressed file L to the L l′ Executing the integrity algorithm operation to obtain a name integrity code; the method for obtaining the complete name code comprises the following steps:
wherein Integrity Quality Algorithm < > represents an Integrity Algorithm;
L l′ indicating the l' name complete code;
s253, determine L l′ Upload compressed file L with the L l′ Whether the file names of (1) are consistent:
if L is l′ Upload compressed file L with the L l′ If the file names are consistent, executing the next step;
if L is l′ Upload compressed file L with the L l′ If the file names are not consistent, the first' uploaded compressed file L is l′ Screening, and requesting the terminal to send the compressed file to be uploaded corresponding to the file name again;
s254, judging the relation between l' and l:
if l' is not less than l, executing the next step;
if l ' < l, l ' = l ' +1;
s255, establishing a merged folder, and moving all files in the uploaded compressed file after decompression to the merged folder.
4. The intelligent natural resource monitoring integrated system of claim 1, wherein the method for dyeing the pattern spots in step S3 is:
wherein, O represents the dyeing digit of one of R, G and B components in RGB;
int () represents a rounding function;
Area n represents the area of the nth pattern spot;
n represents the total number of the pattern spots;
m represents the amount of staining.
5. The intelligent natural resource monitoring and integration system of claim 1, wherein the platform login module comprises the following steps:
s11, logging in a webpage to obtain a user name and a user password input by a user;
s12, preprocessing the input user name and the user password by the login webpage to obtain a preprocessed user name and a preprocessed password;
and S13, sending the preprocessed user name, the preprocessed password and the equipment ID number of the login webpage equipment to the natural resource intelligent management platform for verification.
6. The intelligent natural resource monitoring integrated system according to claim 5, wherein step S13 includes the following steps:
s131, after the natural resource intelligent management platform receives the preprocessed user name and the preprocessed password sent by the sending terminal and the equipment ID number of the login webpage equipment, the natural resource intelligent management platform takes the received preprocessed user name as a search word, and judges whether a stored user name consistent with the search word exists in a user database or not:
if the stored user name consistent with the search word exists in the user database, executing the next step;
if the stored user name consistent with the search word does not exist in the user database, prompting that the input user name is incorrect on the login webpage, and asking for inputting the correct user name again;
s132, extracting a storage password and a storage ID which are stored in a database and associated with the received preprocessed user name, and judging whether the equipment ID number of the received login webpage equipment is consistent with the storage ID:
if the received equipment ID number of the login webpage equipment is consistent with the storage ID, executing the next step;
if the received equipment ID number of the login webpage equipment is inconsistent with the stored ID, the equipment ID number of the login webpage equipment needs to be verified by sending a short message;
s133, judging whether the received preprocessing password is consistent with the stored password:
if the received preprocessing password is consistent with the stored password, the authentication is passed, and the natural resource intelligent management platform is logged in;
if the received preprocessing password is inconsistent with the stored password, the input user password is prompted to be incorrect on the login webpage, and the correct user password is input again.
7. The intelligent natural resource monitoring integrated system according to claim 5, wherein the method for obtaining the preprocessed user name in step S12 comprises the following steps:
s121, counting the total number of all user name characters;
s122, for the a' th user name character A in all the user name characters a″′ Conversion into a character string A a″′ ′;
S123, converting the character string A a″′ ' conversion to comparable size strings;
s124, judging the relationship between a' and a:
if a' > a is equal to or more than a, executing the next step;
if a "" < a, a "" = a "" +1, return to step S122;
s125, the character stringAccording to the followingArranging the character strings in the order of small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ″;
S127, converting the character string A f "conversion to a string of comparable size;
s128, judging the relation between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the process returns to step S122;
8. The intelligent natural resource monitoring and integration system according to claim 5, wherein the method for obtaining the pre-processing password in step S12 comprises the following steps:
s121, counting the total number of all password characters;
s122, aiming at the a' th password character A in all password characters a″′ Conversion into a character string A a″′ ′;
S123, converting the character string A a″′ ' converting to a string of comparable size;
s124, judging the relation between a' and a:
if a' > a is equal to or more than a, executing the next step;
if a "" < a, a "" = a "" +1, return to step S122;
s125, the character stringArranging the character strings in the order from small to largeArranged in character stringsThe corresponding character A 1 、A 2 、A 3 、……、A a As character A 1 、A 2 、A 3 、……、A a The order of (a); let f =1;
s126, the character string A is processed f ' conversion to character conversion string A f ″;
S127, converting the character string A f "conversion to a string of comparable size;
s128, judging the relation between f and a:
if f is more than or equal to a, executing the next step;
if f is less than a, f = f +1, and the process returns to step S122;
9. An intelligent natural resource monitoring and integrating method is characterized by comprising the following steps:
s1, logging in a natural resource intelligent management platform;
s2, uploading the imported collected data to a natural resource intelligent management platform;
s3, the natural resource intelligent management platform processes the uploaded data to obtain a map spot map; the method for obtaining the map of the image spot comprises the following steps:
s31, generating a map template;
s32, identifying the coordinate points obtained by analysis on a map template to form identification points;
s33, determining the center coordinates of all the circle to be defined by taking the radius as r and defining that the number of the identification points is more than or equal to u;
if it isLess than or equal to D 0 ,Denotes the firstThe distance between the circle center and the eta circle center, D 0 Represents a preset circle center distance threshold value, denotes the firstCircle center coordinates (x) of circle η ,y η ) Representing the centre coordinates of the eta circle, thenThe circle and the eta circle are drawn to the same figure spot;
if it isGreater than D 0 If it is, then notThe circle and the eta circle are drawn to the same figure spot;
s35, staining all the spots.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210068453.2A CN114491187B (en) | 2022-01-20 | 2022-01-20 | Intelligent natural resource monitoring integrated system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210068453.2A CN114491187B (en) | 2022-01-20 | 2022-01-20 | Intelligent natural resource monitoring integrated system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114491187A CN114491187A (en) | 2022-05-13 |
CN114491187B true CN114491187B (en) | 2022-11-18 |
Family
ID=81473394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210068453.2A Active CN114491187B (en) | 2022-01-20 | 2022-01-20 | Intelligent natural resource monitoring integrated system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114491187B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368716B (en) * | 2020-02-28 | 2023-04-28 | 重庆市规划和自然资源调查监测院 | Geological disaster damage cultivated land extraction method based on multi-source space-time data |
CN116860807B (en) * | 2023-07-31 | 2024-04-19 | 重庆市规划和自然资源信息中心 | Visual rule engine working method for service management |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473465A (en) * | 2013-09-17 | 2013-12-25 | 武汉大学 | Method for optimizing spatial layout of land resources based on multi-target artificial immunization system |
CN113220758A (en) * | 2021-04-26 | 2021-08-06 | 重庆市规划和自然资源信息中心 | Project maturity analysis demonstration method |
CN113656661A (en) * | 2021-08-13 | 2021-11-16 | 重庆市规划和自然资源信息中心 | Mobile government affair system based on natural language identification |
CN215064667U (en) * | 2021-07-06 | 2021-12-07 | 广州林猫自然科技有限公司 | Natural resource integration intelligent monitoring device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120221366A1 (en) * | 2011-02-25 | 2012-08-30 | Bowman Charles V | Site Selection Data Analysis and System |
US9990380B2 (en) * | 2013-03-15 | 2018-06-05 | Locus Lp | Proximity search and navigation for functional information systems |
GB201507436D0 (en) * | 2015-04-30 | 2015-06-17 | Dymond Michael H T | Digital security management platform |
CN111709927B (en) * | 2020-06-12 | 2022-05-27 | 自然资源部四川测绘产品质量监督检验站(四川省测绘产品质量监督检验站) | Automatic identification method and system for type abnormal pattern spots |
CN112149874A (en) * | 2020-08-26 | 2020-12-29 | 安徽讯盛信息科技有限公司 | Intelligent tour guide system and use method thereof |
-
2022
- 2022-01-20 CN CN202210068453.2A patent/CN114491187B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473465A (en) * | 2013-09-17 | 2013-12-25 | 武汉大学 | Method for optimizing spatial layout of land resources based on multi-target artificial immunization system |
CN113220758A (en) * | 2021-04-26 | 2021-08-06 | 重庆市规划和自然资源信息中心 | Project maturity analysis demonstration method |
CN215064667U (en) * | 2021-07-06 | 2021-12-07 | 广州林猫自然科技有限公司 | Natural resource integration intelligent monitoring device |
CN113656661A (en) * | 2021-08-13 | 2021-11-16 | 重庆市规划和自然资源信息中心 | Mobile government affair system based on natural language identification |
Also Published As
Publication number | Publication date |
---|---|
CN114491187A (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114491187B (en) | Intelligent natural resource monitoring integrated system | |
CN110084377B (en) | Method and device for constructing decision tree | |
JPH09508739A (en) | Fingerprint matching device | |
CN111680480A (en) | Template-based job approval method and device, computer equipment and storage medium | |
CN111815432A (en) | Financial service risk prediction method and device | |
CN111784665A (en) | OCT image quality assessment method, system and device based on Fourier transform | |
CN114896594B (en) | Malicious code detection device and method based on image feature multi-attention learning | |
CN117036060A (en) | Vehicle insurance fraud recognition method, device and storage medium | |
CN111914166A (en) | Correction strategy personalized recommendation system applied to community correction personnel | |
CN116597461A (en) | Topic knowledge point association method and system based on artificial intelligence | |
CN117423299B (en) | Performance detection method, device and equipment for liquid crystal display screen and storage medium | |
CN117217710B (en) | Intelligent management method and system for virtual commodity and shortcut service | |
CN117333217A (en) | Product sales analysis method, device, equipment and medium based on model training | |
CN112199376A (en) | Standard knowledge base management method and system based on cluster analysis | |
CN116992880A (en) | Building name identification method, device, electronic equipment and storage medium | |
CN111652525A (en) | Risk tail end client analysis method, device, equipment and computer storage medium | |
CN111061779A (en) | Data processing method and device based on big data platform | |
CN115660538A (en) | Cargo transportation method and system | |
CN115601778A (en) | Job correction method, device and equipment based on image recognition and storage medium | |
CN113220758B (en) | Project maturity analysis and demonstration method | |
CN111131322B (en) | Network behavior detection method and device, computer equipment and storage medium | |
CN114138709A (en) | Librarian room integrated management realized based on cloud archive integrated platform | |
CN114491186A (en) | Step-by-step type village and town construction land site selection decision management and control system | |
CN112559589A (en) | Remote surveying and mapping data processing method and system | |
CN113778893B (en) | Method, device, equipment and storage medium for generating test case of dialogue robot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |