CN114866956A - Monitoring method and device for illegal production of abnormal state mine - Google Patents

Monitoring method and device for illegal production of abnormal state mine Download PDF

Info

Publication number
CN114866956A
CN114866956A CN202210356750.7A CN202210356750A CN114866956A CN 114866956 A CN114866956 A CN 114866956A CN 202210356750 A CN202210356750 A CN 202210356750A CN 114866956 A CN114866956 A CN 114866956A
Authority
CN
China
Prior art keywords
user
area
monitoring
information
mine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210356750.7A
Other languages
Chinese (zh)
Other versions
CN114866956B (en
Inventor
袁珲
高华超
宋雨伦
李大中
闫龙
胡博文
尹杰
任亚伟
孙绍文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210356750.7A priority Critical patent/CN114866956B/en
Publication of CN114866956A publication Critical patent/CN114866956A/en
Application granted granted Critical
Publication of CN114866956B publication Critical patent/CN114866956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Emergency Management (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a monitoring method and a device for illegal production of an abnormal state mine, which relate to the field of big data analysis and comprise the following steps: the monitoring server obtains user information according to the interaction information between the user terminal and the base station in the monitoring area, screens out the user information of the working area which is not in the monitoring area, judges whether illegal production exists in the abnormal state mine or not according to the interaction time period and the identity information of the user terminal and the base station, and gives an alarm when the illegal production exists. The behavior of the crowd in the monitoring area is monitored without additionally purchasing monitoring equipment, and the alarm can be given immediately when the illegal production is monitored, so that the monitoring timeliness is effectively improved.

Description

Monitoring method and device for illegal production of abnormal state mine
Technical Field
The application relates to the field of big data analysis, in particular to a method and a device for monitoring illegal production of an abnormal state mine.
Background
Mine mining is a high-risk industry, accidents such as gas, flood, fire, dust and the like disturb the production safety of a mine, and accident investigation shows that safety accidents caused by illegal mining occupy a large proportion of mine mining accidents.
Therefore, the supervision of illegal mining has been an important part of the regulatory authorities, especially illegal mining of abnormally producing mines. In the prior art, monitoring is generally performed by analyzing travel data of a delivery truck and shooting the travel data by using a camera. However, this method has the following disadvantages:
1) the phenomenon of illegal collection mostly occurs in the time period in the morning at night, so that high-quality camera shooting supervision equipment needs to be purchased with high expenditure, and supervision personnel need to monitor and analyze the camera shooting supervision equipment manually.
2) The mine resources which are illegally mined cannot be immediately transported away after illegal production in the mine, so that illegal mining activities are completed when the mining vehicles transport, the hysteresis is serious, and the monitoring is not facilitated.
Disclosure of Invention
The application provides a monitoring method and a monitoring device for illegal production of abnormal mines, wherein a monitoring server can obtain user data according to interaction information between a user terminal and a base station in a monitoring area, and gives an alarm and outputs related alarm data when the user data meet preset illegal production conditions of mines. The behavior of the crowd in the monitoring area is monitored without additionally purchasing monitoring equipment, and the alarm can be given immediately when the illegal production is monitored, so that the monitoring timeliness is effectively improved.
In a first aspect, the present application provides a method for monitoring illegal production of an abnormal-state mine, including:
acquiring number information of a terminal of a first user interacting with a base station in a monitoring area and interaction time periods of interaction between the terminal and the base station in a daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an abnormal mine area;
in the first user, acquiring a second user of which the occupational area of the user is not in the monitoring area, and acquiring identity information associated with number information of a terminal of the second user from an operator server;
and judging whether illegal production exists in the abnormal state mine or not according to the time information and the identity information of the interactive time period of the terminal of the second user, and giving an alarm when the illegal production exists.
Optionally, the determining, according to the time information and the identity information of the interactive time period of the terminal of the second user, whether the mine in the abnormal state has the illegal production includes:
determining a third user meeting the preset age and gender among the second users according to the identity information;
judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than the preset reference number, and N is an integer larger than 1;
if yes, judging whether the number of the third users per hour is larger than the number of the third users per hour in the previous two days within continuous M hours, wherein the number of the third users per hour in the previous two days is larger than a preset number, and M is smaller than N; and if so, determining that illegal production exists in the abnormal state mine.
Optionally, the method for monitoring illegal production of abnormal condition mines further includes:
acquiring the number of fourth users who are located in a monitoring area within N continuous preset time periods of each day in historical time, are out of the monitoring area in a working area and meet preset ages and sexes, wherein the historical time comprises a plurality of continuous natural days;
and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and averaging the number of the remaining fourth users to obtain the preset reference number.
Optionally, the determining, according to the time information and the identity information of the interactive time period of the terminal of the second user, whether the mine in the abnormal state has the illegal production includes:
determining a fifth user meeting the preset age and gender among the second users according to the identity information; judging whether p hours exist continuously or not according to the time information, wherein the number of fifth users in each hour is larger than a preset value, and p is an integer larger than 1;
if yes, acquiring historical stay information of a fifth user according to the number information corresponding to the fifth user; and if the historical stopping information of the fifth user is the same, determining that illegal production exists in the abnormal state mine.
Optionally, in the first user, acquiring a second user whose working area of the user is not in the monitoring area includes:
and determining a second user which is not in a working list in the first user, wherein the working list stores users of which the working areas are monitoring areas.
Optionally, before acquiring number information of a terminal of a user interacting with the base station in a monitoring area and acquiring an interaction time period of the terminal interacting with the base station in a preset time period, the monitoring method for illegal production of the abnormal-state mine further includes:
acquiring position information of a mine in an abnormal state, wherein the position information comprises longitude and latitude information; constructing a plurality of areas to be monitored according to the longitude and latitude information; the area where the longitude and the latitude are located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored;
and acquiring a monitoring instruction, and determining a monitoring area from the area to be monitored according to the monitoring instruction.
Optionally, before determining that the second user is not on the job list among the first users, the method for monitoring illegal production of the abnormal-state mine further includes:
acquiring historical action information of the crowd according to interaction between terminals of the crowd and a base station, wherein the historical action information comprises a first area to be monitored, which appears most in the crowd during working hours, of each sixth user and a second area to be monitored, which appears more in the crowd during working hours and rest hours, of each sixth user;
and if the first area to be monitored is the same as the second area to be monitored, adding a sixth user in the stop list of the same area to be monitored.
Optionally, before the plurality of areas to be monitored are established according to the longitude and latitude information, the method for monitoring illegal production of the abnormal-state mine further includes: and judging whether the base station exists in the preset range by taking the longitude and the latitude as a center, and obtaining a judgment result that the base station exists in the preset range.
In a second aspect, the present application provides a monitoring device for illegal production of abnormal condition mines, comprising:
the system comprises an acquisition module, a monitoring module and a processing module, wherein the acquisition module is used for acquiring number information of a terminal of a first user interacting with a base station in a monitoring area and an interaction time period of the terminal interacting with the base station in a daily preset time period, the base station covers the monitoring area, and the monitoring area is an abnormal-state mine area; acquiring a second user of the user whose occupational area is not in the monitoring area from the first user, and acquiring identity information associated with number information of a terminal of the second user from an operator server;
the judging module is used for judging whether illegal production exists in the abnormal state mine or not according to the time information and the identity information of the interactive time period of the terminal of the second user;
and the alarm module is used for alarming when illegal production exists in the abnormal state mine.
In a third aspect, the present application provides an electronic device, comprising: a memory and a processor;
the memory is used for storing computer instructions; the processor is configured to execute the memory-stored computer instructions to implement the method of any of the first aspects.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program for execution by a processor to perform the method of any of the first aspects.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, performs the method of any one of the first aspects.
The application provides a monitoring method and device for illegal production of abnormal state mines, corresponding monitoring areas are constructed according to mine information monitored as required, interaction information of crowd in the monitoring areas and a base station is obtained, the crowd in the monitoring areas is divided, user information of a working area which is not in the monitoring areas is obtained, whether illegal production exists in the abnormal state mines is judged according to interaction time information and identity information of users of the working area which is not in the monitoring areas and the base station, and an alarm is given when the illegal production exists. The corresponding user information can be obtained only by using the mobile phone of the crowd in the monitoring area normally, whether illegal production exists or not is judged according to the user information, monitoring equipment does not need to be purchased additionally to monitor the behaviors of the crowd in the monitoring area, an alarm can be given immediately when illegal production is monitored, and the monitoring timeliness is effectively improved.
Drawings
Fig. 1 is a schematic view of a scenario provided in an embodiment of the present application;
fig. 2 is a flowchart of a method for monitoring illegal production of a mine in an abnormal state according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of a method for determining whether an illegal production exists in an abnormal mine by judging the number of people in a monitoring area for multiple days according to an embodiment of the present application;
FIG. 4 is a flowchart of a method for determining whether an abnormal mine has illegal production by judging historical stay information of users in a monitoring area according to an embodiment of the present application;
fig. 5 is a schematic view of a complete flow of a monitoring method for a mine with abnormal conditions according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a mine monitoring device in an abnormal state according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to facilitate clear description of the technical solutions of the embodiments of the present application, some terms and techniques referred to in the embodiments of the present application are briefly described below:
1) the abnormal mine refers to a mine which is not operated normally, and comprises a coal mine in the states of stopping production and stopping working, closing and stopping building for a long time, and the like.
2) GeoHash is an address coding method. The GeoHash is a mode of spatial indexing essentially, and the basic principle of the GeoHash is that the earth is understood as a two-dimensional plane, the plane is decomposed into smaller subblocks in a recursion mode, and each subblock has the same code in a certain latitude and longitude range.
3) A base station, i.e., a common mobile communication base station, is a form of a radio station, which refers to a radio transceiver station for information transfer with a mobile phone terminal through a mobile communication switching center in a certain radio coverage area.
4) Other terms
In the embodiments of the present application, the terms "first" and "second" are used to distinguish the same items or similar items having substantially the same functions and actions, and the order of the items or similar items is not limited. Those skilled in the art will appreciate that the terms "first," "second," etc. do not denote any order or quantity, nor do the terms "first," "second," etc. denote any order or importance.
The method for monitoring illegal production of abnormal condition mines provided by the embodiment of the application is described in detail below with reference to the accompanying drawings. It should be noted that "at … …" in the embodiment of the present application may be at the instant of a certain condition, or may be within a certain period of time after a certain condition occurs, and the embodiment of the present application is not particularly limited to this.
Mine mining is a high-risk industry, accidents such as gas, flood, fire, dust and the like disturb the production safety of a mine, and accident investigation shows that safety accidents caused by illegal mining occupy a large proportion of mine mining accidents.
Therefore, the supervision of illegal mining has been an important part of the regulatory authorities, especially illegal mining of abnormally producing mines.
In the prior art, the monitoring is generally carried out by analyzing travel data of a delivery truck and shooting by using a camera. The monitoring department can acquire the position data of the delivery trucks, and if the delivery trucks frequently appear around the monitoring mine, the monitoring department can assist in monitoring the production state of the mine by analyzing the position data of the delivery trucks. In addition, the camera can shoot suspicious personnel and appear in detecting the mine, if the supervisor finds that suspicious personnel are gone out and gone out through shooting the video, the supervisor arrives the on-the-spot and surveys suspicious personnel's identity and the activity of pursuing, then judges whether the condition of abnormal survival exists.
However, the monitoring of the illegal production by the above method has the following disadvantages:
1) the phenomenon of illegal collection mostly occurs in the time period in the morning at night, so that high-quality camera shooting supervision equipment needs to be purchased with high expenditure, and supervision personnel need to monitor and analyze the camera shooting supervision equipment manually.
2) The mine resources which are illegally mined cannot be immediately transported away after illegal production in the mine, so that illegal mining activities are completed when the mining vehicles transport, the hysteresis is serious, and the monitoring is not facilitated.
In view of the above, the application provides a monitoring method for illegal production of a mine in an abnormal state, which analyzes whether illegal production exists in the mine or not through monitoring based on mine information, mine surrounding crowd track information and attributes, and interacts with a base station as long as a crowd mobile phone around the mine can be normally used, so that data is obtained, and additional equipment such as monitoring and the like is not required to be purchased. Based on the coverage of national base stations, people flow conditions near mines are provided in the whole time period, the pressure of supervision is reduced by relying on big data technology and scientific analysis, the suspected illegal production mines are focused, the supervision department is assisted in finding problems, and the deterrence of supervision is improved.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is a scene schematic diagram provided in an embodiment of the present application, and as shown in fig. 1, the scene schematic diagram includes a plurality of monitoring areas corresponding to a mine a, a plurality of terminals, a plurality of base stations located in the monitoring areas, and corresponding operator servers and monitoring servers.
The terminal can interact with the base station, the operator server can interact with the monitoring server, the base station covers the monitoring area, and the mine A is a mine with abnormal state.
The operator server may obtain information related to the terminal through interaction with the base station, for example, the information may include number information of the terminal, identity information associated with the number information, time information of interaction between the terminal and the base station, location information of the terminal when the terminal is located during the interaction, and the like.
For example, when the terminal is in the signal coverage of the base station a and the terminal is normally powered on, the operator server may obtain, for example, a mobile phone number corresponding to the terminal and user identity information of the mobile phone number through the base station. The user identity information includes user name, gender, age, native place, and the like. The operator server can also obtain the residence information of the user through the base station, for example, the user F enters the area A when xx month xx days xx in xx years, and leaves the area A when xx month xx days xx in xx years.
The monitoring server can interact with the operator server to acquire the relevant information of the terminal. In the following description, the monitoring server is used to acquire the relevant information of the terminal by referring to the relevant information acquired by the monitoring server, so that the monitoring server and the operator server perform interaction to acquire the relevant information of the terminal.
In the embodiment of the application, for accurate monitoring, the monitoring server firstly judges whether a base station exists in an abnormal state mine or not so as to determine whether the interaction can be completed or not, then divides the mine area into a plurality of areas to be monitored, and selects a monitoring area needing important monitoring in the plurality of areas to be monitored.
Specifically, the monitoring server acquires the position information of the abnormal state mine according to the mine information to be monitored, wherein the position information comprises longitude and latitude information. And the monitoring server judges whether the base station exists in the preset range by taking the longitude and latitude of the abnormal mine as a center, and obtains a judgment result that the base station exists in the preset range.
For example, as shown in fig. 1, the monitoring server sends an instruction to the operator server according to the latitude and longitude information of the mine a to obtain all the base station lists of the area where the mine a is located
And the longitude and latitude information of the mine A, according to the longitude and latitude information of the mine A and the area of the mine A
And judging whether a physical base station exists in 1 kilometer near the mine A or not by the latitude and longitude information of the domain base station, and if so, monitoring the mine A by a monitoring server to judge whether illegal production exists in the mine A or not. It is understood that the preset range can be adjusted according to actual situations, and the embodiment of the present application is not limited thereto.
Referring to fig. 1, the monitoring server constructs a plurality of areas to be monitored according to the longitude and latitude information of the mine a, wherein the area where the longitude and latitude of the mine a is located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored.
For example, the monitoring server may convert the longitude and latitude coordinate points into a GeoHash grid by using a GeoHash algorithm, and obtain 8 surrounding grids to jointly construct a nine-grid-shaped region to be monitored.
Optionally, the monitoring server may further construct a monitoring area with the longitude and latitude information of the mine a as a center and N kilometers as a radius. Wherein the radius distance can be set according to actual conditions.
In the embodiment of the application, the monitoring server acquires the monitoring instruction and determines the monitoring area from the area to be monitored according to the monitoring instruction.
For example, the monitoring server may select one or more grids from the nine-grid-shaped areas to be monitored as the monitoring areas according to the monitoring instructions of the user.
The application scenario of the embodiment of the present application is described above, and how to monitor illegal production of a mine in an abnormal state is described in detail below by taking a monitoring area as an example.
Fig. 2 is a flowchart of a method for monitoring illegal production of a mine in an abnormal state according to an embodiment of the present application, which is described by taking the method applied to the monitoring server in fig. 1 as an example, and includes the following steps:
s201, acquiring number information of a terminal of a first user interacting with the base station in a monitoring area and an interaction time period of the terminal interacting with the base station in a daily preset time period.
In order to distinguish the users in the embodiment of the present application, the user is referred to as a first user, the first user may represent all users corresponding to a terminal interacting with a base station, and a second user, a third user, and the like appearing in subsequent representations are also used for distinguishing the users in the embodiment of the present application.
For example, mine illegal production usually occurs at night, and the preset time period of each day can be set from 22 nights to 5 next days, and can also be adjusted according to actual conditions; the number information of the terminal of the first user, which is interacted with the base station in the monitoring area, can be acquired to include a mobile phone number, a mobile phone serial number and the like corresponding to the terminal, and the interaction time period for acquiring the interaction between the terminal and the base station can be that the terminal enters the monitoring area at 23 pm, leaves the monitoring area at 3 days next time, and resides in the monitoring area for 4 hours.
S202, in the first user, obtaining a second user of which the occupational region of the user is not in the monitoring region, and obtaining identity information related to number information of a terminal of the second user from an operator server.
Wherein, the occupational region refers to the region where the occupational site and the accommodation site of the user belong.
In a specific implementation process, a second user not in the working list is determined in the first user, wherein users with working areas as monitoring areas are stored in the working list.
The job list is a file for recording user information of the same occupation location and accommodation location of the user as the monitoring area, and is stored in the monitoring server. The job list may be a plain text file, and may also be a file in other forms, and the embodiment of the present application is not particularly limited.
Optionally, the job list may be preset in the monitoring server. The method comprises the steps of establishing a job and live list by collecting user information of a monitoring area which is the same as a job and live area of a user, and presetting the job and live list in a monitoring server.
Optionally, the occupation list may also be generated by interaction between the terminal and the base station, and then preset in the monitoring server.
Specifically, the monitoring server acquires historical action information of the crowd according to interaction between the terminals of the crowd and the base station. The historical information is the resident information of a natural month in the crowd. The historical action information comprises a first area to be monitored, which appears most at work hours, of each sixth user in the crowd and a second area to be monitored, which appears most at work and rest hours, of each sixth user. And if the first area to be monitored is the same as the second area to be monitored, adding a corresponding sixth user in the stop list of the same area to be monitored.
The first area to be monitored may be considered as the professional location of the crowd and the second area to be monitored may be considered as the accommodation location of the crowd.
Illustratively, the monitoring server acquires that the user a appears in the area a to be monitored from 8 hours to 12 hours and from 13 hours to 17 hours per day on one to five weeks of the last natural month, and the rest of the time appears in the monitoring area B, and if the area a to be monitored is the same as the area B to be monitored, the occupation location and the accommodation location of the user a are the areas to be monitored. The information of user a may be added to the job listing. According to the mode, the information of all users meeting the conditions in the monitoring area is added to the job list.
And the monitoring server removes the user information in the working list according to the acquired user information interacting with the base station, the rest users are second users, and the monitoring server interacts with the operator server to acquire the user identity information corresponding to the second users.
S203, judging whether illegal production exists in the abnormal state mine or not according to the time information and the identity information of the interactive time period of the terminal of the second user, and giving an alarm when the illegal production exists.
The monitoring server can determine that illegal production exists in the abnormal state mine and give an alarm according to the fact that the second user exists in the monitoring area for a plurality of continuous days in a fixed time period and the number of people exceeds the preset number.
Specifically, when acquiring that males aged 22-50 years continuously reside in the monitoring area for 2 hours or more from 22 nights to 5 days every day among the second users in the monitoring area, and the number of users per hour is larger than the number of users in the first two days and the number of users per hour in the first two days is larger than 15 people, the monitoring server determines that illegal production exists in the abnormal mine.
Optionally, the monitoring server may further determine that the illegal production exists in the abnormal state mine when acquiring that males with age of 22-50 years continuously reside in the monitoring area for 2 hours or more from 22 nights to 5 nights each day in the second user in the monitoring area, and the occupation sites of more than 15 people in the previous month are the same and are not in the area where the mine is located.
According to the method, a corresponding monitoring area is constructed according to mine information needing to be monitored, the crowd in the monitoring area is divided by obtaining the interaction information of the crowd in the monitoring area and the base station, the user information of the working and living area which is not in the monitoring area is obtained, whether illegal production exists in the abnormal state mine or not is judged according to the interaction time information and the identity information of the users of the working and living area which are not in the monitoring area and the base station, and an alarm is given when the illegal production exists. The corresponding user information can be obtained only by using the mobile phone of the crowd in the monitoring area normally, whether illegal production exists or not is judged according to the user information, monitoring equipment does not need to be purchased additionally to monitor the behaviors of the crowd in the monitoring area, an alarm can be given immediately when illegal production is monitored, and the monitoring timeliness is effectively improved.
Specific examples are listed below to illustrate how the application judges whether the abnormal condition mine has the illegal production based on the second user, and gives an alarm when the illegal production exists.
Fig. 3 is a flowchart of a method for determining whether an abnormal mine has illegal production by judging the number of people in a monitoring area for multiple days according to the embodiment of the application.
As shown in fig. 3, the step of determining whether the abnormal mine has the illegal production further includes the following steps:
s301, according to the identity information, determining a third user meeting the preset age and gender in the second users.
Illustratively, the monitoring server takes a user with an age of 25-50 years and a gender of male as the third user in the second user. It will be appreciated that the pre-set age and gender conditions may be adjusted to suit the circumstances.
S302, judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than a preset reference number, and N is an integer larger than 1.
The time information is a time period for interaction between the terminals of the non-working crowd and the base station in the monitoring area. The preset reference number is the number of non-working crowds which are judged by a supervision department according to past law enforcement experience and have no illegal production in the mine area in the abnormal state. If the number of non-working crowds in a mine area in an abnormal state exceeds a preset reference number by a certain proportion, illegal production of the mine can occur.
The method for determining the preset reference number is as follows:
the method comprises the steps of obtaining the number of users who are located in a monitoring area within N continuous preset time periods of each day in historical time, are out of the monitoring area in a working area and meet preset ages and sexes, and the historical time comprises a plurality of continuous natural days. For example, the residence time in the monitoring area is continuously acquired from 22 nights to 5 nights of each day for 2 hours or more in the last natural month of the monitoring area, and neither the occupation site nor the accommodation site is in the area, so that the gender of the users is male and the number of the users between 25 and 50 years old is satisfied. The user who satisfies the condition is taken as the fourth user.
And removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and averaging the number of the remaining fourth users to obtain the preset reference number. In order to ensure the accuracy of the reference number, the preset conditions may be set to remove the natural day with the largest number of two users and remove the natural day with the smallest number of two users.
And the monitoring server judges whether the monitoring area has N continuous hours or not according to the interactive information between the terminal and the base station, the number of the third users in each hour is more than the preset reference number, if yes, the step shown in S303 can be executed, and if not, the process is ended.
For example, when the monitoring server monitors that the number of the third users in the monitoring area is 4 hours from 22 nights to 5 days next day, and the number of the third users in each hour reaches 1.3 times of the reference number, the next judgment can be performed.
S303, judging whether the number of the third users per hour is larger than that of the third users per hour in the previous two days within M continuous hours, wherein the number of the third users per hour in the previous two days is larger than a preset number, and M is smaller than N.
The monitoring server may take 3 days as a monitoring period. The preset number can be adjusted according to actual conditions. When the above conditions are satisfied, the monitoring server may execute the step shown in S304, and if not, the process ends.
For example, on the basis of step S302, the monitoring server determines that there are 2 consecutive hours, the number of third users per hour is greater than the number of third users per hour on the first two days, and the number of third users per hour on the first two days is greater than 15 people, and then the step S304 is executed.
And S304, illegal production exists in the abnormal state mine.
And when monitoring that the user information in the monitoring area meets the conditions, the monitoring server determines that illegal production exists in the abnormal mine.
And when the monitoring server determines that the abnormal state mine has illegal production, the monitoring server gives an alarm and outputs abnormal state mine information and relevant data description.
The monitoring server outputting the abnormal state mine information and the related data description may include: the number of users who continuously reside in the monitoring area for 2 hours from 22 nights to 5 days next day and are not in the monitoring area in the working area is determined by mine number, mine name, province and county of the mine, alarm type, alarm date. Wherein, the alarm type can be alarm for abnormal people number, and the alarm date can be the last day of the monitoring period.
According to the method, whether illegal production exists in the mine with abnormal state or not is determined by judging the identity information, residence time information and the number change of the non-working crowd in the monitoring area. Only the terminal of the user can interact with the base station, whether illegal production exists in the mine to be supervised can be analyzed, and the supervision timeliness is effectively improved.
Fig. 4 is a flowchart of a method for determining whether an abnormal mine has production violation by judging historical stopping information of users in a monitoring area according to an embodiment of the present application. As shown in fig. 4, the step of determining whether the abnormal mine has the illegal production further includes the following steps:
s401, according to the identity information, determining a fifth user meeting the preset age and gender in the second users.
The specific implementation process is the same as the step shown in S301, and is not described herein again.
S402, judging whether p hours exist continuously or not according to the time information, wherein the number of fifth users in each hour is larger than a preset value, and p is an integer larger than 1.
For example, the monitoring server determines whether 2 consecutive hours exist in the monitoring area and the number of fifth users per hour is greater than 15 according to the interaction information between the terminal and the base station, and if so, may execute the step shown in S403. If not, the process ends. It is understood that the preset value can be adjusted according to actual conditions.
And S403, acquiring historical stay information of the fifth user according to the number information corresponding to the fifth user.
The historical stay information may be a place of occupation of the fifth user last natural month, and not a mine place.
S404, judging whether the historical staying information of the fifth user is the same. If the historical staying information of the fifth user is the same, the step shown in S405 may be executed, and if not, the process ends.
S405, illegal production exists in the abnormal state mine.
And when monitoring that the user information in the monitoring area meets the conditions, the monitoring server determines that illegal production exists in the abnormal mine.
The historical staying information of the fifth user is the same, and can show that the occupational sites of the users with the number exceeding the preset number in the last natural month are the same and are not the sites of the mines, and at the moment, the fact that illegal production exists in the abnormal state of the mines can be determined.
And when the monitoring server determines that the abnormal state mine has illegal production, the monitoring server gives an alarm and outputs abnormal state mine information and relevant data description.
The monitoring server outputting the abnormal state mine information and the related data description may include: the number of the users who stay in the monitoring area for 2 hours and the working area is not in the monitoring area continuously from 22 nights to 5 days each day. Wherein, the alarm type can be the outsourcing personnel alarm, and the alarm date can be the monitoring day.
According to the method, whether illegal production exists in the mine with abnormal state is determined by judging the resident information, the number of the crowd and the historical occupation location of the non-working crowd in the monitoring area. Only the terminal of the user can interact with the base station, whether illegal production exists in the mine to be supervised can be analyzed, and the supervision timeliness is effectively improved.
Fig. 5 is a schematic view of a complete process of the abnormal-state mine monitoring method provided by the embodiment of the application, including a complete process from obtaining position information of the abnormal-state mine to monitoring that illegal production exists in the mine and performing alarm.
As shown in fig. 5, the abnormal-state mine monitoring method includes the following steps:
s501, judging whether a base station exists in the preset range of the mine with the abnormal state.
When the monitoring server determines that the base station exists in the abnormal state mine preset range, the step shown in S502 may be executed, and if the base station does not exist, the process ends.
S502, building a plurality of areas to be monitored according to the longitude and latitude information of the mine.
And S503, constructing a job and place list of the monitoring area.
And S504, acquiring the preset reference number of the monitoring areas.
And S505, determining whether illegal production exists in the abnormal state mine or not by judging the change of the number of people in the monitoring area for multiple days according to the acquired user information.
When the monitoring server determines that the abnormal mine has illegal production, the step shown in S507 may be executed, and if the illegal production does not exist, the process is ended.
S506, according to the obtained user information, whether illegal production exists in the abnormal state mine is determined by judging historical stay information of the users in the monitoring area.
When the monitoring server determines that the abnormal mine has illegal production, the step shown in S507 may be executed, and if the illegal production does not exist, the process is ended.
And S507, when the illegal production is determined, alarming is carried out, and abnormal state mine information and related data description are output.
The specific implementation manner of the above steps has been described in detail in the foregoing embodiments, and is not described herein again.
According to the method, the user data can be obtained according to the interaction information of the user terminal and the base station, whether illegal production exists or not is judged, monitoring behaviors of people in a monitoring area are monitored without additionally purchasing monitoring equipment, an alarm can be given immediately when illegal production is monitored, and the monitoring timeliness is effectively improved.
As shown in fig. 6, the embodiment of the present application further provides a state abnormal mine monitoring device 60, which includes an obtaining module 601, a determining module 602, and an alarm module 603.
The acquiring module 601 is configured to acquire number information of a terminal of a first user interacting with a base station in a monitoring area and an interaction time period during which the terminal interacts with the base station in a daily preset time period, where the base station covers the monitoring area, and the monitoring area is an area of a mine in an abnormal state; and in the first user, acquiring a second user of which the working area of the user is not in the monitoring area, and acquiring identity information associated with the number information of the terminal of the second user from the operator server.
The determining module 602 is configured to determine whether the mine in the abnormal state has illegal production according to the time information and the identity information of the interactive time period of the terminal of the second user.
And the alarm module 603 is used for giving an alarm when the mine in the abnormal state has illegal production.
The abnormal-state mine monitoring device provided by this embodiment can implement the technical scheme of the method embodiment shown in fig. 2, and the implementation principle and technical effect are similar, which are not described herein again.
Further, the embodiment of the present application further provides a state abnormal mine monitoring device, which further includes a building module 604 on the basis of the state abnormal mine monitoring device 60 provided in the embodiment of fig. 6.
Further, the obtaining module 601 is further configured to obtain position information of the abnormal mine, obtain a preset reference number of the monitoring area, obtain historical action information of the crowd in the monitoring area, and obtain a monitoring instruction of the user.
Specifically, the acquiring module 601 acquires the preset reference number of the monitoring area, including: acquiring the number of fourth users who are located in a monitoring area for N hours continuously within a preset time period of each day in historical time, are out of the monitoring area and meet preset ages and sexes; and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and averaging the number of the remaining fourth users to obtain the preset reference number.
Further, the determining module 602 is further configured to determine, according to the identity information, a third user meeting a preset age and a preset gender among the second users; judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than the preset reference number; if yes, judging whether the number of the third users per hour is larger than the number of the third users per hour in the previous two days within M continuous hours, and if yes, determining that illegal production exists in the abnormal mine.
And a fifth user meeting the preset age and gender is determined in the second users according to the identity information; judging whether p continuous hours exist or not according to the time information, wherein the number of the fifth users in each hour is larger than a preset value; if yes, acquiring historical stay information of a fifth user according to the number information corresponding to the fifth user; and if the historical stopping information of the fifth user is the same, determining that illegal production exists in the abnormal state mine.
And the base station judging device is used for judging whether the base station exists in the preset range by taking the longitude and the latitude as a center, and obtaining a judgment result that the base station exists in the preset range.
Further, the building module 604 is configured to build a plurality of areas to be monitored according to the longitude and latitude information of the mine with the abnormal state. The area where the longitude and latitude of the mine in the abnormal state are located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored. And the system is used for constructing a job and live list, wherein the job and live list is a file used for recording user information of the same occupation location and accommodation location as the monitoring area of the user.
Specifically, the building module 604 is configured to build the job list, and includes: acquiring historical action information of the crowd according to interaction between terminals of the crowd and a base station, wherein the historical action information comprises a first area to be monitored, which appears most in the crowd during working hours, of each sixth user and a second area to be monitored, which appears more in the crowd during working hours and rest hours, of each sixth user; and if the first area to be monitored is the same as the second area to be monitored, adding a sixth user in the stop list of the same area to be monitored.
The abnormal-state mine monitoring device provided in this embodiment may implement the technical solutions of the method embodiments shown in fig. 3 and fig. 4, and the implementation principles and technical effects thereof are similar and will not be described herein again.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the apparatus 70 provided in this embodiment may include:
a processor 701.
A memory 702 for storing executable instructions of the electronic device.
The processor is configured to execute the technical scheme of the abnormal-state mine monitoring method embodiment by executing the executable instruction, and the implementation principle and the technical effect are similar, and are not described herein again.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the technical solution of the abnormal-state mine monitoring method embodiment is implemented, and the implementation principle and the technical effect of the method are similar, and are not described herein again.
In one possible implementation, the computer-readable medium may include Random Access Memory (RAM), Read-Only Memory (ROM), compact disc Read-Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and Disc, as used herein, includes Disc, laser Disc, optical Disc, Digital Versatile Disc (DVD), floppy disk and blu-ray Disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The embodiment of the present application further provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the technical solution of the abnormal-state mine monitoring method embodiment is implemented, and the implementation principle and the technical effect of the method are similar, and are not described herein again.
In the above Specific implementation of the terminal device or the server, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
Those skilled in the art will appreciate that all or a portion of the steps of any of the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium, and when executed, performs all or part of the steps of the above-described method embodiments.
The technical scheme of the application can be stored in a computer readable storage medium if the technical scheme is realized in a software form and is sold or used as a product. Based on this understanding, all or part of the technical solutions of the present application may be embodied in the form of a software product stored in a storage medium, including a computer program or several instructions. The computer software product enables a computer device (which may be a personal computer, a server, a network device, or a similar electronic device) to perform all or part of the steps of the method described in the embodiments of the present application.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (11)

1. A method for monitoring illegal production of abnormal-state mines is characterized by comprising the following steps:
acquiring number information of a terminal of a first user interacting with a base station in a monitoring area and interaction time periods of the terminal interacting with the base station in a daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an area of a mine in an abnormal state;
in the first user, acquiring a second user of which the working area of the user is not in the monitoring area, and acquiring identity information associated with number information of a terminal of the second user from an operator server, wherein the working area is an area to which a professional location and an accommodation location of the first user belong;
and judging whether the abnormal state mine has illegal production or not according to the time information of the interactive time period of the terminal of the second user and the identity information, and giving an alarm when the illegal production exists.
2. The method according to claim 1, wherein the determining whether the abnormal mine has the illegal production according to the time information of the interaction time period of the terminal of the second user and the identity information comprises:
determining a third user meeting preset age and gender in the second users according to the identity information;
judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than a preset reference number, and N is an integer larger than 1;
if yes, judging whether the number of the third users per hour is larger than the number of the third users per hour in the previous two days within M continuous hours, wherein the number of the third users per hour in the previous two days is larger than a preset number, and M is smaller than N; and if so, determining that illegal production exists in the abnormal state mine.
3. The method of claim 2, further comprising:
acquiring the number of fourth users who are located in the monitoring area for N hours continuously within a preset time period of each day in historical time, are out of the monitoring area, and meet preset ages and sexes, wherein the historical time comprises a plurality of continuous natural days;
and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and averaging the number of the remaining fourth users to obtain the preset reference number.
4. The method according to claim 1, wherein the determining whether the abnormal mine has the illegal production according to the time information of the interaction time period of the terminal of the second user and the identity information comprises:
determining a fifth user meeting preset age and gender in the second users according to the identity information;
judging whether p hours exist continuously or not according to the time information, wherein the number of the fifth users in each hour is larger than a preset value, and p is an integer larger than 1;
if yes, acquiring historical stay information of the fifth user according to the number information corresponding to the fifth user;
and if the historical stopping information of the fifth user is the same, determining that illegal production exists in the abnormal state mine.
5. The method according to any one of claims 1 to 4, further comprising: the obtaining, in the first user, a second user whose accommodation area of the user is not in the monitoring area includes:
and determining a second user which is not in a job list in the first user, wherein the job list stores users whose job areas are the monitoring areas.
6. The method according to claim 5, wherein before the obtaining of the number information of the terminal of the first user interacting with the base station in the monitoring area and the interaction time period of the terminal interacting with the base station within the preset time period of each day, the method further comprises:
acquiring position information of the abnormal state mine, wherein the position information comprises longitude and latitude information;
constructing a plurality of areas to be monitored according to the longitude and latitude information; the area where the longitude and latitude is located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored;
and acquiring a monitoring instruction, and determining the monitoring area from the area to be monitored according to the monitoring instruction.
7. The method of claim 6, wherein prior to determining, among the first users, a second user not on a duty list, the method further comprises:
acquiring historical action information of the crowd according to interaction between terminals of the crowd and the base station, wherein the historical action information comprises a first area to be monitored, in which each sixth user in the crowd appears most during working hours, and a second area to be monitored, in which each sixth user does more during work and rest hours;
and if the first area to be monitored is the same as the second area to be monitored, adding the sixth user to the stop list of the same area to be monitored.
8. The method of claim 6, wherein prior to said constructing a plurality of areas to be monitored from said latitude and longitude information, said method further comprises:
and judging whether a base station exists in a preset range by taking the longitude and latitude as a center, and obtaining a judgment result that the base station exists in the preset range.
9. A monitoring device for illegal production of abnormal state mines is characterized by comprising:
the system comprises an acquisition module, a monitoring module and a processing module, wherein the acquisition module is used for acquiring number information of a terminal of a first user interacting with a base station in a monitoring area and an interaction time period of the terminal interacting with the base station in a daily preset time period, the base station covers the monitoring area, and the monitoring area is an abnormal mine area; and in the first user, acquiring a second user of which the working area of the user is not in the monitoring area, and acquiring identity information associated with number information of a terminal of the second user from an operator server, wherein the working area is an area to which the professional location and the accommodation location of the first user belong;
the judging module is used for judging whether illegal production exists in the abnormal state mine or not according to the time information of the interactive time period of the terminal of the second user and the identity information;
and the alarm module is used for alarming when illegal production exists in the abnormal state mine.
10. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the method of any one of claims 1-8.
11. A computer-readable storage medium, on which a computer program is stored, which computer program is executable by a processor to implement the method according to any one of claims 1-8.
CN202210356750.7A 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state Active CN114866956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210356750.7A CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210356750.7A CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Publications (2)

Publication Number Publication Date
CN114866956A true CN114866956A (en) 2022-08-05
CN114866956B CN114866956B (en) 2024-04-09

Family

ID=82629412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210356750.7A Active CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Country Status (1)

Country Link
CN (1) CN114866956B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648096A (en) * 2013-12-11 2014-03-19 北京联合大学 Method for rapidly detecting and positioning illegal base station intrusion
CN105894194A (en) * 2016-03-31 2016-08-24 左凌云 Coal mine management system and method
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment
CN111464991A (en) * 2020-04-01 2020-07-28 煤炭科学技术研究院有限公司 Law enforcement terminal and system
CN112488488A (en) * 2020-11-25 2021-03-12 神华信息技术有限公司 Behavior processing method and device based on work ticket, computer and storage medium
CN113011263A (en) * 2021-02-19 2021-06-22 深圳英飞拓科技股份有限公司 Mine monitoring method, device, terminal equipment and medium
WO2022083375A1 (en) * 2020-10-23 2022-04-28 泰华智慧产业集团股份有限公司 Employee location anomaly detection method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648096A (en) * 2013-12-11 2014-03-19 北京联合大学 Method for rapidly detecting and positioning illegal base station intrusion
CN105894194A (en) * 2016-03-31 2016-08-24 左凌云 Coal mine management system and method
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment
CN111464991A (en) * 2020-04-01 2020-07-28 煤炭科学技术研究院有限公司 Law enforcement terminal and system
WO2022083375A1 (en) * 2020-10-23 2022-04-28 泰华智慧产业集团股份有限公司 Employee location anomaly detection method and device
CN112488488A (en) * 2020-11-25 2021-03-12 神华信息技术有限公司 Behavior processing method and device based on work ticket, computer and storage medium
CN113011263A (en) * 2021-02-19 2021-06-22 深圳英飞拓科技股份有限公司 Mine monitoring method, device, terminal equipment and medium

Also Published As

Publication number Publication date
CN114866956B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
US11328163B2 (en) Methods and apparatus for automated surveillance systems
CN106056690B (en) Shield line intelligent polling method and system based on big data, cloud platform and Internet of Things
Power et al. Emergency situation awareness: Twitter case studies
CN109460744B (en) Video monitoring system based on deep learning
US9953517B2 (en) Risk early warning method and apparatus
CN111917877A (en) Data processing method and device for Internet of things equipment, electronic equipment and storage medium
CN103718170A (en) Systems and methods for distributed rule-based correlation of events
Singh Walia et al. A dynamic pipeline for spatio-temporal fire risk prediction
CN112153044B (en) Flow data detection method and related equipment
CN113011833A (en) Safety management method and device for construction site, computer equipment and storage medium
CN110401660B (en) False flow identification method and device, processing equipment and storage medium
CN111260215A (en) Risk early warning method and related device
Power et al. The social media intelligence analyst for emergency management
Sekimoto et al. Real-time people movement estimation in large disasters from several kinds of mobile phone data
CN113869589A (en) Power transmission line accident prediction method based on knowledge graph and inspection system
CN111832867A (en) Time-sharing rental vehicle management method, electronic device and storage medium
CN111049838B (en) Black product equipment identification method and device, server and storage medium
CN114866956A (en) Monitoring method and device for illegal production of abnormal state mine
CN112257546A (en) Event early warning method and device, electronic equipment and storage medium
CN112116511A (en) State monitoring method and device for urban rail transit system
CN116644962A (en) Risk assessment method and device for building construction supervision based on artificial intelligence
CN111383150A (en) Method and device for identifying and supervising traffic police violation
CN113673870B (en) Enterprise data analysis method and related components
Gray et al. Social media during multi-hazard disasters: Lessons from the KAIKOURA EARTHQUAKE 2016
Arslan et al. Using spatio-temporal trajectories to monitor construction sites for safety management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant