CN114866956B - Monitoring method and device for illegal production of mine in abnormal state - Google Patents

Monitoring method and device for illegal production of mine in abnormal state Download PDF

Info

Publication number
CN114866956B
CN114866956B CN202210356750.7A CN202210356750A CN114866956B CN 114866956 B CN114866956 B CN 114866956B CN 202210356750 A CN202210356750 A CN 202210356750A CN 114866956 B CN114866956 B CN 114866956B
Authority
CN
China
Prior art keywords
user
area
mine
information
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210356750.7A
Other languages
Chinese (zh)
Other versions
CN114866956A (en
Inventor
袁珲
高华超
宋雨伦
李大中
闫龙
胡博文
尹杰
任亚伟
孙绍文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202210356750.7A priority Critical patent/CN114866956B/en
Publication of CN114866956A publication Critical patent/CN114866956A/en
Application granted granted Critical
Publication of CN114866956B publication Critical patent/CN114866956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides a monitoring method and a device for illegal production of an abnormal mine, which relate to the field of big data analysis and comprise the following steps: the monitoring server obtains user information according to the interaction information of the user terminal and the base station in the monitoring area, screens out the user information of the occupied area which is not in the monitoring area, judges whether illegal production exists in the mine in an abnormal state according to the interaction time period of the user terminal and the base station and the identity information, and alarms when illegal production exists. The monitoring equipment is not required to be purchased additionally to monitor the behaviors of the crowd in the monitoring area, and the alarm can be immediately given when illegal production is monitored, so that the timeliness of supervision is effectively improved.

Description

Monitoring method and device for illegal production of mine in abnormal state
Technical Field
The application relates to the field of big data analysis, in particular to a monitoring method and device for illegal production of mine under abnormal state.
Background
Mine exploitation is a high-risk industry, accidents such as gas, flood, fire and dust afflict the production safety of mines, and accident investigation shows that safety accidents caused by illegal mining occupy a large proportion in mine exploitation accidents.
Thus, the supervision of illicit mining has been a major concern for regulatory authorities, especially for abnormally produced mines. In the prior art, supervision is generally performed by analyzing travel data of a carrying truck and shooting by using a camera. However, this method has the following disadvantages:
1) The phenomenon of illegal mining occurs in the early morning time period at night, so that higher expense is required to purchase high-quality camera monitoring equipment and monitoring personnel are required to monitor and analyze manually.
2) The mine resources which are not mined in a violation way can not be immediately carried away after the mine is produced, so that the mining breaking movement is finished when a mining transporting vehicle is transported, the hysteresis is serious, and the supervision is not facilitated.
Disclosure of Invention
The application provides a monitoring method and a device for illegal production of an abnormal mine, wherein a monitoring server can acquire user data according to interaction information of a user terminal and a base station in a monitoring area, and alarm is carried out and relevant alarm data are output when the user data meet preset illegal production conditions of the mine. The monitoring equipment is not required to be purchased additionally to monitor the behaviors of the crowd in the monitoring area, and the alarm can be immediately given when illegal production is monitored, so that the timeliness of supervision is effectively improved.
In a first aspect, the present application provides a method for monitoring production violations of an abnormal mine, including:
acquiring the number information of a terminal of a first user interacting with a base station in a monitoring area and the interaction time period of the terminal interacting with the base station in a daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an area of a mine in an abnormal state;
in the first user, acquiring a second user of which the occupancy area of the user is not in the monitoring area, and acquiring identity information associated with the number information of the terminal of the second user from an operator server;
judging whether illegal production exists in the mine in an abnormal state according to the time information and the identity information of the interaction time period of the terminal of the second user, and alarming when the illegal production exists.
Optionally, judging whether the mine in the abnormal state has illegal production according to the time information and the identity information of the interaction time period of the terminal of the second user includes:
determining a third user meeting preset age and gender from the second users according to the identity information;
judging whether continuous N hours exist or not according to the time information, wherein the number of third users in each hour is larger than the preset reference number, and N is an integer larger than 1;
If yes, judging whether the number of the third users in each hour is larger than the number of the third users in each hour in the first two days, wherein the number of the third users in each hour in the first two days is larger than the preset number, and M is smaller than N; if yes, determining that illegal production exists in the mine in the abnormal state.
Optionally, the monitoring method for the illegal production of the mine under the abnormal state further comprises the following steps:
acquiring the number of fourth users which are located in a monitoring area and are not located in the monitoring area and meet the preset age and sex in a daily preset time period in a historical time, wherein the historical time comprises a plurality of continuous natural days;
and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and taking the average value of the number of the remaining fourth users to obtain the preset reference number.
Optionally, judging whether the mine in the abnormal state has illegal production according to the time information and the identity information of the interaction time period of the terminal of the second user includes:
determining a fifth user meeting preset age and gender in the second users according to the identity information; judging whether continuous p hours exist or not according to the time information, wherein the number of fifth users in each hour is larger than a preset value, and p is an integer larger than 1;
If yes, acquiring historical stay information of the fifth user according to the number information corresponding to the fifth user; and if the historical stay information of the fifth user is the same, determining that illegal production exists in the mine in the abnormal state.
Optionally, in the first user, acquiring a second user whose occupancy area is not in the monitoring area includes:
and determining a second user which is not in the occupancy list from the first user, wherein the occupancy list stores the users with the occupancy areas as monitoring areas.
Optionally, before the number information of the terminal of the user interacting with the base station in the monitoring area and the interaction time period of the terminal interacting with the base station are obtained in the preset time period, the monitoring method for the abnormal mine illegal production further comprises the following steps:
acquiring position information of a mine in an abnormal state, wherein the position information comprises longitude and latitude information; constructing a plurality of areas to be monitored according to longitude and latitude information; the area where the longitude and latitude are located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored;
and acquiring a monitoring instruction, and determining a monitoring area from the area to be monitored according to the monitoring instruction.
Optionally, the monitoring method for abnormal mine offending production before determining the second user not in the list in the first user further comprises:
According to interaction between the terminals of the crowd and the base station, historical action information of the crowd is obtained, wherein the historical action information comprises a first area to be monitored, in which each sixth user in the crowd appears most in working time, and a second area to be monitored, in which each sixth user appears most in work and rest time;
if the first area to be monitored is the same as the second area to be monitored, adding a sixth user in the job list of the same area to be monitored.
Optionally, before constructing the plurality of areas to be monitored according to the longitude and latitude information, the monitoring method for the illegal production of the mine in the abnormal state further comprises the following steps: and taking the longitude and latitude as the center, judging whether a base station exists in a preset range, and obtaining a judging result that the base station exists in the preset range.
In a second aspect, the present application provides a monitoring device for abnormal mine illegal production, comprising:
the acquisition module is used for acquiring the number information of the terminal of the first user which interacts with the base station in the monitoring area and the interaction time period of the terminal which interacts with the base station in the daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an area of an abnormal state mine; in the first user, acquiring a second user of which the occupancy area of the user is not in the monitoring area, and acquiring identity information associated with the number information of the terminal of the second user from an operator server;
The judging module is used for judging whether illegal production exists in the mine in an abnormal state according to the time information and the identity information of the interaction time period of the terminal of the second user;
and the alarm module is used for alarming when illegal production exists in the mine in an abnormal state.
In a third aspect, the present application provides an electronic device, comprising: a memory and a processor;
the memory is used for storing computer instructions; the processor is configured to execute the computer instructions stored in the memory to implement the method of any one of the first aspects.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program for execution by a processor to implement the method of any one of the first aspects.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method of any one of the first aspects.
According to the monitoring method and device for illegal production of the mine in the abnormal state, the corresponding monitoring area is constructed according to mine information to be monitored, the crowd in the monitoring area is divided by acquiring the interaction information of the crowd in the monitoring area and the base station, the user information of the staff area not in the monitoring area is obtained, whether illegal production exists in the mine in the abnormal state is judged according to the interaction time information and the identity information of the user of the staff area not in the monitoring area and the base station, and an alarm is given when illegal production exists. The corresponding user information can be obtained only by normal use of crowd mobile phones in the monitoring area, whether illegal production exists or not can be judged according to the user information, the monitoring equipment is not required to be additionally purchased to monitor the behaviors of crowd in the monitoring area, and the monitoring equipment can immediately give an alarm when illegal production is monitored, so that the timeliness of supervision is effectively improved.
Drawings
Fig. 1 is a schematic view of a scenario provided in an embodiment of the present application;
FIG. 2 is a flow chart of a method for monitoring illegal production of an abnormal mine according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for determining whether illegal production exists in an abnormal mine by judging the number of people in a monitoring area for a plurality of days according to the embodiment of the application;
FIG. 4 is a flowchart of a method for determining whether illegal production exists in an abnormal state mine by judging historical stay information of a user in a monitoring area according to an embodiment of the application;
fig. 5 is a complete flow chart of a method for monitoring a mine with abnormal state according to an embodiment of the present application;
FIG. 6 an embodiment of the present application provides a schematic diagram of a mine monitoring device for status anomalies;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to facilitate the clear description of the technical solutions of the embodiments of the present application, the following simply describes some terms and techniques related to the embodiments of the present application:
1) The mine in abnormal state refers to the mine in abnormal production and operation, including the coal mine in the states of stopping production and setting, closing, stopping building for a long time and the like.
2) GeoHash is an address coding method. He can encode two-dimensional spatial longitude and latitude data into a character string, geoHash is essentially a way of spatial indexing, the basic principle of which is to understand the earth as a two-dimensional plane, recursively decompose the plane into smaller sub-blocks, each having the same encoding within a certain longitude and latitude range.
3) The base station, i.e., the public mobile communication base station, is one type of radio station, and refers to a radio transceiver station that performs information transfer with a mobile phone terminal through a mobile communication switching center in a certain radio coverage area.
4) Other terms
In the embodiments of the present application, the words "first", "second", etc. are used to distinguish identical items or similar items having substantially the same function and action, and the order of them is not limited. It will be appreciated by those of skill in the art that the words "first," "second," and the like do not limit the amount and order of execution, and that the words "first," "second," and the like do not necessarily differ.
The following describes in detail the monitoring method for abnormal mine illegal production provided in the embodiment of the application with reference to the accompanying drawings. The term "at … …" in the embodiment of the present application may be instantaneous when a certain situation occurs, or may be a period of time after a certain situation occurs, which is not particularly limited in the embodiment of the present application.
Mine exploitation is a high-risk industry, accidents such as gas, flood, fire and dust afflict the production safety of mines, and accident investigation shows that safety accidents caused by illegal mining occupy a large proportion in mine exploitation accidents.
Thus, the supervision of illicit mining has been a major concern for regulatory authorities, especially for abnormally produced mines.
In the prior art, supervision is generally performed by analyzing travel data of a carrying truck and shooting with a camera. The supervision department can acquire the position data of the carrying truck, if the carrying truck frequently appears around the supervision mine, the supervision department assists in supervising the production state of the mine by analyzing the position data of the carrying truck. In addition, the camera can shoot suspicious personnel and appear in detecting the mine, if the supervisor discovers suspicious personnel and goes out through shooting the video, the supervisor arrives the scene and surveys the identity of suspicious personnel and the activity of pursuing, then judges whether there is the condition of unusual existence.
However, the process of monitoring illegal production by the above method has the following disadvantages:
1) The phenomenon of illegal mining occurs in the early morning time period at night, so that higher expense is required to purchase high-quality camera monitoring equipment and monitoring personnel are required to monitor and analyze manually.
2) The mine resources which are not mined in a violation way can not be immediately carried away after the mine is produced, so that the mining breaking movement is finished when a mining transporting vehicle is transported, the hysteresis is serious, and the supervision is not facilitated.
In view of this, the application provides a monitoring method of illegal production of mine in abnormal state, through monitoring and analyzing whether there is illegal production in the mine based on mine information, around the mine crowd track information and attribute, as long as around the mine crowd cell-phone can normally use, will have the interaction with the basic station to obtain data, need not equipment such as extra purchase control. Based on the coverage of the national base stations, people flow conditions near the mine are provided in the whole time period, the supervision pressure is lightened by means of big data technology and scientific analysis, the suspected illegal production mine is focused, the supervision departments are assisted in finding problems, and the supervision deterrence is improved.
The following describes the technical scheme of the present invention and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic view of a scenario provided in an embodiment of the present application, as shown in fig. 1, including a plurality of monitoring areas, a plurality of terminals, a plurality of base stations located in the monitoring areas, and corresponding operator servers and monitoring servers corresponding to the mine a.
The terminal can interact with the base station, the operator server can interact with the monitoring server, the base station covers the monitoring area, and the mine A is a mine with abnormal state.
The operator server may obtain information about the terminal through interaction with the base station, for example, may include number information of the terminal, identity information associated with the number information, time information for generating interaction between the terminal and the base station, location information of the terminal during interaction, and the like.
For example, when the terminal is in the signal coverage of the base station a, the operator server may obtain, through the base station, the mobile phone number corresponding to the terminal, the user identity information of the mobile phone number, and the like when the terminal is normally powered on. The user identity information includes the user's name, gender, age, native place, etc. The operator server may also obtain the residence information of the user through the base station, for example, the user F enters the a area when xx is the year xx, the month xx, the day xx, and leaves the a area when xx is the year xx, the month xx, and the like.
The monitoring server can interact with the operator server to acquire relevant information of the terminal. In the following description, the process that the monitoring server interacts with the operator server to obtain the relevant information of the terminal is referred to as the process that the monitoring server obtains the relevant information of the terminal.
In this embodiment of the present application, for accurate monitoring, the monitoring server first determines whether there is a base station in the mine in an abnormal state, so as to determine whether the above interaction can be completed, and then divides the mine into a plurality of areas to be monitored, and selects a monitoring area needing to be monitored in a plurality of areas to be monitored.
Specifically, the monitoring server acquires position information of the mine in the abnormal state according to the mine information to be monitored, wherein the position information comprises longitude and latitude information. And the monitoring server judges whether a base station exists in a preset range by taking the longitude and latitude of the mine in an abnormal state as a center, and obtains a judging result of the existence of the base station in the preset range.
Exemplary, as shown in fig. 1, the monitoring server sends an instruction to the operator server according to longitude and latitude information of the mine a to obtain all base station lists of the area where the mine a is located
And latitude and longitude information of the mine A, and the area of the mine A is determined according to the latitude and longitude information of the mine A
And the latitude and longitude information of the domain base station is used for judging whether a physical base station exists in 1 km near the mine A, and if the physical base station exists, the monitoring server can monitor the mine A and judge whether illegal production exists in the mine A. It can be understood that the preset range can be adjusted according to practical situations, and the embodiment of the present application is not limited to this.
With continued reference to fig. 1, the monitoring server constructs a plurality of areas to be monitored according to latitude and longitude information of the mine a, where the area where the latitude and longitude of the mine a is located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored.
For example, the monitoring server may use a GeoHash algorithm to convert the longitude and latitude coordinate points into GeoHash grids, and obtain 8 surrounding grids to jointly construct a nine-grid region to be monitored.
Optionally, the monitoring server may also construct a monitoring area with latitude and longitude information of the mine a as a center and N kilometers as a radius. Wherein the radius distance can be set according to the actual situation.
In the embodiment of the application, the monitoring server acquires the monitoring instruction, and determines the monitoring area from the area to be monitored according to the monitoring instruction.
For example, the monitoring server may select one or more grids from the region to be monitored in a nine-grid shape as the monitoring region according to a monitoring instruction of the user.
The application scenario of the embodiment of the application is described above, and the monitoring area is taken as an example to describe in detail how the embodiment of the application monitors abnormal mine illegal production.
Fig. 2 is a flowchart of a monitoring method for abnormal mine illegal production provided in an embodiment of the present application, and is described by taking the application of the method to the monitoring server in fig. 1 as an example, and includes the following steps:
s201, in a preset time period of each day, acquiring the number information of a terminal of a first user interacting with the base station in a monitoring area and the interaction time period of the terminal interacting with the base station.
In order to distinguish users in the embodiments of the present application, the user is referred to as a first user, where the first user may represent all users corresponding to a terminal having interaction with a base station, and a second user, a third user, and the like appearing in subsequent representations are also used to distinguish users in the embodiments of the present application.
Illustratively, mine violation production usually occurs at night, and the preset daily time period can be set to be 22 hours later to 5 hours next day, and can be adjusted according to actual conditions; the obtaining of the number information of the terminal of the first user interacting with the base station in the monitoring area may include a mobile phone number, a mobile phone serial number, etc. corresponding to the terminal, and the obtaining of the interaction time period of the terminal interacting with the base station may be that the terminal enters the monitoring area at night 23, leaves the monitoring area at the next day 3, and resides in the monitoring area for 4 hours.
S202, in the first user, acquiring a second user of which the occupancy area of the user is not in the monitoring area, and acquiring identity information associated with the number information of the terminal of the second user from an operator server.
The occupancy area refers to an area to which the user's professional and accommodation sites belong.
In the specific implementation process, a second user which is not in the job list is determined in the first user, wherein the job list stores the users with the job areas as monitoring areas.
The job list is a file for recording user information of the same professional place and accommodation place as the monitoring area of the user, and is stored in the monitoring server. The job list may be a plain text file, or may be another file, which is not specifically limited in this embodiment of the present application.
Alternatively, the job ticket may be preset in the monitoring server. And building a job list by collecting user information of which the monitoring area is the same as the job area of the user, and presetting the job list in the monitoring server.
Alternatively, the job list may be generated by interaction between the terminal and the base station, and then preset in the monitoring server.
Specifically, the monitoring server acquires historical action information of the crowd according to interaction between the terminals of the crowd and the base station. The historical information is resident information of a natural month on the crowd. The historical action information comprises a first to-be-monitored area with the largest occurrence of each sixth user in the crowd in working hours and a second to-be-monitored area with the largest occurrence of each sixth user in work and rest hours. If the first area to be monitored is the same as the second area to be monitored, adding a corresponding sixth user in the job list of the same area to be monitored.
The first area to be monitored may be considered as a professional location of the crowd and the second area to be monitored may be considered as an accommodation location of the crowd.
Illustratively, the monitoring server obtains that the last natural month, monday, through friday, from 8 hours to 12 hours and 13 hours to 17 hours of the user a occur in the area to be monitored a, and the rest of the time occurs in the area to be monitored B, and if the area to be monitored a is the same as the area to be monitored B, the occupation location and the accommodation location of the user a are the areas to be monitored. The information of user a may be added to the job title list. In this way, information of all eligible users of the monitored area is added to the job title list.
And the monitoring server removes the user information in the existing job list according to the acquired user information interacted with the base station, and other users are second users, and the monitoring server acquires user identity information corresponding to the second users by interacting with the operator server.
S203, judging whether illegal production exists in the mine in the abnormal state according to the time information and the identity information of the interaction time period of the terminal of the second user, and alarming when the illegal production exists.
The monitoring server can determine that illegal production exists in the mine in an abnormal state according to the fact that the second user exists, for example, when the second user appears in the monitoring area in a fixed time period for a plurality of continuous days and the number of people exceeds the preset number, and then alarm is given.
Specifically, when the monitoring server acquires that the second user in the monitoring area continuously resides for 2 hours and more in the monitoring area from the time of late 22 days to the time of 5 days, and the number of users per hour is greater than the number of users in the first two days and the number of users per hour is greater than 15, determining that illegal production exists in the mine in an abnormal state.
Optionally, the monitoring server may further determine that the mine in the abnormal state has illegal production when it is acquired that the second user in the monitored area has men aged 22-50 years old and older continuously residing in the monitored area from 22 hours a day later to 5 hours a day later, and that the occupation sites of more than 15 people over the last month are the same and are not in the area where the mine is located.
According to the method, the corresponding monitoring area is constructed according to mine information to be monitored, the crowd in the monitoring area is divided by acquiring the interaction information of the crowd in the monitoring area and the base station, the user information of the occupied area not in the monitoring area is acquired, whether illegal production exists in the mine in an abnormal state or not is judged according to the interaction time information and the identity information of the user of the occupied area not in the monitoring area and the base station, and an alarm is given when the illegal production exists. The corresponding user information can be obtained only by normal use of crowd mobile phones in the monitoring area, whether illegal production exists or not can be judged according to the user information, the monitoring equipment is not required to be additionally purchased to monitor the behaviors of crowd in the monitoring area, and the monitoring equipment can immediately give an alarm when illegal production is monitored, so that the timeliness of supervision is effectively improved.
The following examples are set forth to illustrate how the present application can determine whether there is illegal production in an abnormal mine based on a second user and alert when there is illegal production.
FIG. 3 is a flowchart of a method for determining whether illegal production exists in an abnormal mine by judging the number of people in a monitored area for a plurality of days according to an embodiment of the application.
As shown in fig. 3, the step of judging whether illegal production exists in the mine in the abnormal state further comprises the following steps:
s301, determining a third user meeting preset age and gender from the second users according to the identity information.
Illustratively, the monitoring server will be a third user of age 25-50 years, male in gender, among the second users. It is understood that the preset age and sex conditions may be adjusted according to actual conditions.
S302, judging whether continuous N hours exist or not according to the time information, wherein the number of third users in each hour is larger than the preset reference number, and N is an integer larger than 1.
The time information is a time period for interaction between the terminal of the non-occupied crowd in the monitoring area and the base station. The preset reference number is the number of non-occupied groups of illegal production in the mine area in an abnormal state, which is judged by the supervision department according to past law enforcement experience. If the number of non-occupied people in a mine area in an abnormal state exceeds a certain proportion of the preset reference number, illegal production of the mine can occur.
The method for determining the preset reference quantity comprises the following steps:
the method comprises the steps of acquiring the number of users with preset ages and sexes, wherein the number of users with preset ages and sexes is continuously located in a monitoring area in a preset time period of each day in a historical time, and the historical time comprises a plurality of continuous natural days. For example, the acquisition monitoring area is continuously resident for 2 hours or more in the monitoring area from the last 22 hours a day later to the next 5 hours a natural month, and neither the professional place nor the lodging place is in the area, so as to satisfy the number of users with the gender of men and years between 25-50 years. The user who satisfies the condition is taken as the fourth user.
And removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and taking the average value of the number of the remaining fourth users to obtain the preset reference number. To ensure the accuracy of the reference number, the preset condition may be set to remove the natural days with the largest number of two users and the natural days with the smallest number of two users.
The monitoring server judges whether the monitoring area has continuous N hours according to the interaction information of the terminal and the base station, and the number of the third users in each hour is greater than the preset reference number, if yes, the step shown in S303 can be executed, and if not, the flow is ended.
For example, when the monitoring server monitors that the time period from the last 22 hours to the next 5 hours is 4 hours and the number of third users in each hour is 1.3 times the reference number in the monitoring area, the next judgment can be made.
S303, judging whether the number of the third users in each hour is larger than the number of the third users in each hour in the first two days, wherein the number of the third users in each hour in the first two days is larger than the preset number, and M is smaller than N.
The monitoring server may take 3 days as a monitoring period. The preset number can be adjusted according to actual conditions. When the above condition is satisfied, the monitoring server may execute the step shown in S304, and if not, the flow ends.
For example, on the basis of step S302, the monitoring server determines that there are 2 consecutive hours, and performs the step S304 when the third user number per hour is greater than the third user number per hour for the first two days, and the third user number per hour for the first two days is greater than 15 people.
S304, illegal production exists in the mine in the abnormal state.
And when the monitoring server monitors that the user information of the monitoring area meets the conditions, determining that illegal production exists in the mine in the abnormal state.
And when the monitoring server determines that illegal production exists in the mine in the abnormal state, alarming is carried out, and abnormal state mine information and related data description are output.
The monitoring server outputting abnormal state mine information and related data description may include: mine number, mine name, city and county of mine province, alarm type, alarm date, number of users who continuously reside in the monitoring area for 2 hours from 22 hours a day later to 5 hours a day next and who are not in the monitoring area. The alarm type can be abnormal alarm of the number of people, and the alarm date can be the last day of the monitoring period.
In the method, whether illegal production exists in the mine with abnormal states is determined by judging the identity information, residence time information and number change of non-occupied people in the monitoring area. Only the user terminal can interact with the base station, whether illegal production exists in the mine to be supervised or not can be analyzed, and the timeliness of supervision is effectively improved.
FIG. 4 is a flowchart of a method for determining whether illegal production exists in an abnormal state mine by judging historical stay information of a user in a monitoring area according to an embodiment of the application. As shown in fig. 4, the step of judging whether illegal production exists in the mine in the abnormal state further comprises the following steps:
S401, determining a fifth user meeting preset age and gender in the second users according to the identity information.
The specific implementation process is the same as the step shown in S301, and will not be described here again.
S402, judging whether continuous p hours exist or not according to the time information, wherein the number of fifth users in each hour is larger than a preset value, and p is an integer larger than 1.
For example, the monitoring server determines whether there is a continuous 2 hours in the monitoring area according to the interaction information between the terminal and the base station, and if there is a fifth number of users greater than 15 users per hour, the step shown in S403 may be executed. If not, the process ends. It is understood that the preset value may be adjusted according to the actual situation.
S403, acquiring historical stay information of the fifth user according to the number information corresponding to the fifth user.
The historical stay information may be a occupation location of a last natural month of the fifth user and not a mine location.
S404, judging whether the historical stay information of the fifth user is the same. If the history resident information of the fifth user is the same, the step shown in S405 may be performed, and if not, the flow ends.
S405, illegal production exists in the mine in the abnormal state.
And when the monitoring server monitors that the user information of the monitoring area meets the conditions, determining that illegal production exists in the mine in the abnormal state.
The same historical stay information of the fifth user can indicate that the occupation places of the last natural month of the users exceeding the preset number are the same and are not mine places, and at the moment, illegal production of the mine in an abnormal state can be determined.
And when the monitoring server determines that illegal production exists in the mine in the abnormal state, alarming is carried out, and abnormal state mine information and related data description are output.
The monitoring server outputting abnormal state mine information and related data description may include: mine number, mine name, city and county of mine, alarm type, alarm date, user source of historical stay information, and number of users who continuously stay in the monitoring area for 2 hours from 22 hours a day to 5 hours a day and who are not in the monitoring area for the job. The alarm type can be outsourcing personnel alarm, and the alarm date can be monitoring date.
In the method, whether illegal production exists in the mine with abnormal states is determined by judging resident information of non-occupied people in the monitoring area, the number of people and the historical occupation places. Only the user terminal can interact with the base station, whether illegal production exists in the mine to be supervised or not can be analyzed, and the timeliness of supervision is effectively improved.
Fig. 5 is a complete flow chart of a method for monitoring a mine with abnormal state, which is provided in an embodiment of the present application, and includes a complete process from obtaining position information of the mine with abnormal state to monitoring that there is illegal production in the mine and alarming.
As shown in fig. 5, the method for monitoring the mine with abnormal state comprises the following steps:
s501, judging whether a base station exists in a preset range of the mine with abnormal state.
When the monitoring server determines that the base station exists in the preset range of the mine with abnormal state, the step shown in S502 may be executed, if the base station does not exist, the flow ends.
S502, constructing a plurality of areas to be monitored according to longitude and latitude information of the mine.
S503, building a job and hold list of the monitoring area.
S504, acquiring the preset reference number of the monitoring area.
S505, determining whether illegal production exists in the mine in the abnormal state by judging the number of people in the monitoring area for a plurality of days according to the acquired user information.
When the monitoring server determines that there is illegal production in the mine in the abnormal state, the step shown in S507 may be executed, and if there is no illegal production, the flow ends.
S506, determining whether illegal production exists in the mine in the abnormal state or not by judging historical stay information of the user in the monitoring area according to the acquired user information.
When the monitoring server determines that there is illegal production in the mine in the abnormal state, the step shown in S507 may be executed, and if there is no illegal production, the flow ends.
S507, alarming when illegal production is determined, and outputting mine information in abnormal state and related data description.
The specific implementation of the above steps is described in the foregoing embodiments, and is not repeated here.
According to the method, the user data can be obtained according to the interaction information of the user terminal and the base station, whether illegal production exists or not is judged, the monitoring equipment is not required to be additionally purchased to monitor the behaviors of the crowd in the monitoring area, and the alarm can be immediately given when the illegal production is monitored, so that the timeliness of supervision is effectively improved.
As shown in fig. 6, the embodiment of the present application further provides a status anomaly mine monitoring device 60, which includes an acquisition module 601, a judgment module 602, and an alarm module 603.
The acquiring module 601 is configured to acquire, in a preset time period of each day, number information of a terminal of a first user having interaction with a base station in a monitoring area and an interaction time period of the terminal having interaction with the base station, where the base station covers the monitoring area, and the monitoring area is an area of an abnormal state mine; and in the first user, acquiring a second user of which the occupancy area of the user is not in the monitoring area, and acquiring identity information associated with the number information of the terminal of the second user from the operator server.
And the judging module 602 is configured to judge whether illegal production exists in the mine in an abnormal state according to the time information and the identity information of the interaction time period of the terminal of the second user.
And the alarm module 603 is used for alarming when illegal production exists in the mine in an abnormal state.
The state anomaly mine monitoring device provided in this embodiment may execute the technical scheme of the method embodiment shown in fig. 2, and its implementation principle and technical effects are similar, and will not be described here again.
Further, the embodiment of the present application further provides a state anomaly mine monitoring device, which further includes a construction module 604 on the basis of the state anomaly mine monitoring device 60 provided in the embodiment of fig. 6.
Further, the obtaining module 601 is further configured to obtain location information of the mine in an abnormal state, obtain a preset reference number of the monitoring area, obtain historical action information of a crowd in the monitoring area, and obtain a monitoring instruction of a user.
Specifically, the acquiring module 601 acquires a preset reference number of the monitoring area, including: acquiring the number of fourth users which are located in a monitoring area for N continuous hours in a preset time period of each day in the historical time, are not located in the monitoring area and meet preset ages and sexes; and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and taking the average value of the number of the remaining fourth users to obtain the preset reference number.
Further, the judging module 602 is further configured to determine, according to the identity information, a third user satisfying the preset age and sex among the second users; judging whether continuous N hours exist or not according to the time information, wherein the number of third users in each hour is larger than the preset reference number; if yes, judging whether the number of the third users in each hour is larger than the number of the third users in each hour in the first two days, and if yes, determining that illegal production exists in the mine in the abnormal state.
And determining a fifth user satisfying the preset age and sex among the second users according to the identity information; judging whether continuous p hours exist or not according to the time information, wherein the number of the fifth users in each hour is larger than a preset value; if yes, acquiring historical stay information of the fifth user according to the number information corresponding to the fifth user; and if the historical stay information of the fifth user is the same, determining that illegal production exists in the mine in the abnormal state.
And the method is used for judging whether the base station exists in the preset range by taking the longitude and the latitude as the center, and obtaining the judging result of the base station existing in the preset range.
Further, a construction module 604 is configured to construct a plurality of areas to be monitored according to latitude and longitude information of the mine with abnormal status. The area where the longitude and latitude of the mine with abnormal state is located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored. And the method is used for constructing a job and housing list, wherein the job and housing list is a file for recording user information of the same professional place and accommodation place of the user as the monitoring area.
Specifically, the building module 604 is configured to build a job ticket list including: according to interaction between the terminals of the crowd and the base station, historical action information of the crowd is obtained, wherein the historical action information comprises a first area to be monitored, in which each sixth user in the crowd appears most in working time, and a second area to be monitored, in which each sixth user appears most in work and rest time; if the first area to be monitored is the same as the second area to be monitored, adding a sixth user in the job list of the same area to be monitored.
The abnormal state mine monitoring device provided in this embodiment may execute the technical schemes of the method embodiments shown in fig. 3 and fig. 4, and its implementation principle and technical effects are similar, and will not be described here again.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the apparatus 70 provided in this embodiment may include:
a processor 701.
Memory 702 for storing executable instructions for the electronic device.
The processor is configured to execute the technical scheme of the embodiment of the abnormal state mine monitoring method by executing the executable instruction, so that the implementation principle and the technical effect are similar, and the description is omitted herein.
The embodiment of the application further provides a computer readable storage medium, on which a computer program is stored, and the technical scheme of the embodiment of the abnormal state mine monitoring method is implemented when the computer program is executed by a processor, and the implementation principle and the technical effect are similar, and are not repeated here.
In one possible implementation, the computer readable medium may include random access Memory (Random Access Memory, RAM), read-Only Memory (ROM), compact disk (compact disc Read-Only Memory, CD-ROM) or other optical disk Memory, magnetic disk Memory or other magnetic storage device, or any other medium targeted for carrying or storing the desired program code in the form of instructions or data structures, and accessible by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes optical disc, laser disc, optical disc, digital versatile disc (Digital Versatile Disc, DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The embodiment of the application also provides a computer program product, which comprises a computer program, and the computer program realizes the technical scheme of the embodiment of the abnormal state mine monitoring method when being executed by a processor, and the implementation principle and the technical effect are similar, and are not repeated here.
In the specific implementation of the terminal device or the server, it should be understood that the processor may be a central processing unit (in english: central Processing Unit, abbreviated as CPU), or may be other general purpose processors, digital signal processors (in english: digital Signal Processor, abbreviated as DSP), application specific integrated circuits (in english: application Specific Integrated Circuit, abbreviated as ASIC), or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
Those skilled in the art will appreciate that all or part of the steps of any of the method embodiments described above may be accomplished by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium, which when executed, performs all or part of the steps of the method embodiments described above.
The technical solution of the present application, if implemented in the form of software and sold or used as a product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the technical solutions of the present application may be embodied in the form of a software product stored in a storage medium comprising a computer program or several instructions. The computer software product causes a computer device (which may be a personal computer, a server, a network device, or similar electronic device) to perform all or part of the steps of the methods described in embodiments of the present application.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the corresponding technical solutions from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method for monitoring illegal production of an abnormal mine, comprising the steps of:
Acquiring the number information of a terminal of a first user interacting with a base station in a monitoring area and the interaction time period of the terminal interacting with the base station in a daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an area of a mine in an abnormal state;
acquiring a second user of which the occupancy area is not in the monitoring area from the first user, and acquiring identity information associated with the number information of a terminal of the second user from an operator server, wherein the occupancy area is an area of the occupancy area and the accommodation area of the first user;
judging whether illegal production exists in the mine in the abnormal state according to the time information and the identity information of the interaction time period of the terminal of the second user, and alarming when the illegal production exists;
the step of judging whether the abnormal state mine has illegal production according to the time information of the interaction time period of the terminal of the second user and the identity information comprises the following steps:
determining a third user meeting preset age and gender from the second users according to the identity information;
Judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than a preset reference number, and N is an integer larger than 1;
if yes, judging whether the number of the third users in each hour is larger than the number of the third users in each hour in the first two days, wherein the number of the third users in each hour in the first two days is larger than the preset number, and M is smaller than N; if yes, determining that illegal production exists in the mine in the abnormal state.
2. The method according to claim 1, wherein the method further comprises:
acquiring the number of fourth users which are located in the monitoring area and are not located in the monitoring area and meet the preset age and gender in a daily preset time period in a historical time, wherein the historical time comprises a plurality of continuous natural days;
and removing the number of the fourth users meeting the preset condition from the number of the fourth users corresponding to each natural day, and averaging the number of the remaining fourth users to obtain the preset reference number.
3. The method according to claim 1, wherein the determining whether the abnormal mine has illegal production according to the time information of the interaction time period of the terminal of the second user and the identity information comprises:
Determining a fifth user meeting preset age and gender in the second users according to the identity information;
judging whether continuous p hours exist or not according to the time information, wherein the number of the fifth users in each hour is larger than a preset value, and p is an integer larger than 1;
if yes, acquiring the historical stay information of the fifth user according to the number information corresponding to the fifth user;
and if the historical stay information of the fifth user is the same, determining that illegal production exists in the mine in the abnormal state.
4. A method according to any one of claims 1 to 3, further comprising: the step of acquiring, in the first user, a second user whose occupancy area is not in the monitoring area includes:
and determining a second user which is not in the occupancy list from the first user, wherein the occupancy list stores occupancy areas as the users of the monitoring areas.
5. The method of claim 4, wherein the acquiring the number information of the terminal of the first user interacting with the base station in the monitored area and the interaction time period before the terminal interacts with the base station in the preset daily time period further comprises:
Acquiring position information of the mine in the abnormal state, wherein the position information comprises longitude and latitude information;
constructing a plurality of areas to be monitored according to the longitude and latitude information; the area where the longitude and latitude are located is a central area to be monitored, and other areas to be monitored are arranged around the central area to be monitored;
and acquiring a monitoring instruction, and determining the monitoring area from the area to be monitored according to the monitoring instruction.
6. The method of claim 5, wherein the determining of the first user is not preceded by a second user in the listing, the method further comprising:
according to interaction between the terminals of the crowd and the base station, historical action information of the crowd is obtained, wherein the historical action information comprises a first area to be monitored, in which each sixth user in the crowd appears most in working time, and a second area to be monitored, in which each sixth user appears most in work and rest time;
and if the first area to be monitored is the same as the second area to be monitored, adding the sixth user in the job list of the same area to be monitored.
7. The method of claim 5, wherein prior to constructing a plurality of areas to be monitored from the latitude and longitude information, the method further comprises:
And judging whether a base station exists in a preset range by taking the longitude and the latitude as the center, and obtaining a judging result of the base station exists in the preset range.
8. A monitoring device for abnormal mine violation production, comprising:
the acquisition module is used for acquiring the number information of a terminal of a first user which interacts with a base station in a monitoring area and the interaction time period of the terminal interacting with the base station in a daily preset time period, wherein the base station covers the monitoring area, and the monitoring area is an area of a mine in an abnormal state; acquiring a second user of which the occupancy area is not in the monitoring area from the first user, and acquiring identity information associated with the number information of a terminal of the second user from an operator server, wherein the occupancy area is an area of the occupancy area and the accommodation area of the first user;
the judging module is used for judging whether illegal production exists in the mine in the abnormal state according to the time information of the interaction time period of the terminal of the second user and the identity information;
the alarm module is used for alarming when illegal production exists in the mine in the abnormal state;
The judging module is further used for determining a third user meeting preset age and gender from the second users according to the identity information; judging whether continuous N hours exist or not according to the time information, wherein the number of the third users in each hour is larger than a preset reference number, and N is an integer larger than 1; if yes, judging whether the number of the third users in each hour is larger than the number of the third users in each hour in the first two days, wherein the number of the third users in each hour in the first two days is larger than the preset number, and M is smaller than N; if yes, determining that illegal production exists in the mine in the abnormal state.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the method of any one of claims 1-7.
10. A computer readable storage medium, having stored thereon a computer program, the computer program being executed by a processor to implement the method of any of claims 1-7.
CN202210356750.7A 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state Active CN114866956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210356750.7A CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210356750.7A CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Publications (2)

Publication Number Publication Date
CN114866956A CN114866956A (en) 2022-08-05
CN114866956B true CN114866956B (en) 2024-04-09

Family

ID=82629412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210356750.7A Active CN114866956B (en) 2022-04-06 2022-04-06 Monitoring method and device for illegal production of mine in abnormal state

Country Status (1)

Country Link
CN (1) CN114866956B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648096A (en) * 2013-12-11 2014-03-19 北京联合大学 Method for rapidly detecting and positioning illegal base station intrusion
CN105894194A (en) * 2016-03-31 2016-08-24 左凌云 Coal mine management system and method
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment
CN111464991A (en) * 2020-04-01 2020-07-28 煤炭科学技术研究院有限公司 Law enforcement terminal and system
CN112488488A (en) * 2020-11-25 2021-03-12 神华信息技术有限公司 Behavior processing method and device based on work ticket, computer and storage medium
CN113011263A (en) * 2021-02-19 2021-06-22 深圳英飞拓科技股份有限公司 Mine monitoring method, device, terminal equipment and medium
WO2022083375A1 (en) * 2020-10-23 2022-04-28 泰华智慧产业集团股份有限公司 Employee location anomaly detection method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103648096A (en) * 2013-12-11 2014-03-19 北京联合大学 Method for rapidly detecting and positioning illegal base station intrusion
CN105894194A (en) * 2016-03-31 2016-08-24 左凌云 Coal mine management system and method
CN110688931A (en) * 2019-09-20 2020-01-14 北京百分点信息科技有限公司 Abnormal behavior monitoring method and device, storage medium and electronic equipment
CN111464991A (en) * 2020-04-01 2020-07-28 煤炭科学技术研究院有限公司 Law enforcement terminal and system
WO2022083375A1 (en) * 2020-10-23 2022-04-28 泰华智慧产业集团股份有限公司 Employee location anomaly detection method and device
CN112488488A (en) * 2020-11-25 2021-03-12 神华信息技术有限公司 Behavior processing method and device based on work ticket, computer and storage medium
CN113011263A (en) * 2021-02-19 2021-06-22 深圳英飞拓科技股份有限公司 Mine monitoring method, device, terminal equipment and medium

Also Published As

Publication number Publication date
CN114866956A (en) 2022-08-05

Similar Documents

Publication Publication Date Title
US11328163B2 (en) Methods and apparatus for automated surveillance systems
Power et al. Emergency situation awareness: Twitter case studies
US10810695B2 (en) Methods and systems for security tracking and generating alerts
US8717172B2 (en) Alert for real-time risk of theft or loss
EP2801083B1 (en) Released offender geospatial location information trend analysis
US20150100355A1 (en) Method and apparatus for identifying early status
JP6355683B2 (en) Risk early warning method, apparatus, storage medium, and computer program
KR100892415B1 (en) Cyber Threat Forecasting System and Method therefor
CN109460744B (en) Video monitoring system based on deep learning
Singh Walia et al. A dynamic pipeline for spatio-temporal fire risk prediction
JP2012189462A (en) Navigation device, navigation method, and program
CN112835769A (en) Service data abnormity diagnosis method, device, equipment and storage medium
JP2008059251A (en) Safety information providing apparatus, safety information providing system, safety information providing program, safety information providing method, terminal, and terminal program
CN111260215A (en) Risk early warning method and related device
CN111815177A (en) Fire safety assessment method, server, system and storage medium
KR101830748B1 (en) Method and server for providing danger notification service
CN114866956B (en) Monitoring method and device for illegal production of mine in abnormal state
Song et al. Floating car data‐based method for detecting flooding incident under grade separation bridges in Beijing
San Too et al. Railway suicide clusters: how common are they and what predicts them?
US20180374333A1 (en) Autonomous Cloud-Based Third Party Monitoring
Skolnik et al. Seismic structural health monitoring to prevent unnecessary economic loss from non-damaging earthquakes in European and Middle Eastern cities
CN111199504B (en) Block chain-based decentralization fire control maintenance supervision method
KR20210084182A (en) Device and method for analyzing accident vulnerability area by analyzing accident occurrence pattern
JP6937105B2 (en) Road abnormality response support device, road abnormality response support method, and program
JP2006285640A (en) Caution information notification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant