CN116166839B - Core drilling process supervision system, method, medium and computer - Google Patents

Core drilling process supervision system, method, medium and computer Download PDF

Info

Publication number
CN116166839B
CN116166839B CN202310183326.1A CN202310183326A CN116166839B CN 116166839 B CN116166839 B CN 116166839B CN 202310183326 A CN202310183326 A CN 202310183326A CN 116166839 B CN116166839 B CN 116166839B
Authority
CN
China
Prior art keywords
video
information
equipment
module
user interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310183326.1A
Other languages
Chinese (zh)
Other versions
CN116166839A (en
Inventor
陈松
袁杰
阳亮
胡涛
唐秋惠
陈德乐
伍梓铭
刘慰
吕梦然
方周杰
蔡旭颖
谢乙隆
路强
刘宗涛
黄小友
曾燕红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Dewei Information Technology Co ltd
Guangzhou Guangjian Construction Engineering Testing Center Co ltd
Original Assignee
Guangzhou Dewei Information Technology Co ltd
Guangzhou Guangjian Construction Engineering Testing Center Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Dewei Information Technology Co ltd, Guangzhou Guangjian Construction Engineering Testing Center Co ltd filed Critical Guangzhou Dewei Information Technology Co ltd
Priority to CN202310183326.1A priority Critical patent/CN116166839B/en
Publication of CN116166839A publication Critical patent/CN116166839A/en
Application granted granted Critical
Publication of CN116166839B publication Critical patent/CN116166839B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/7867Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title and artist information, manually generated time, location and usage information, user ratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/787Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention relates to a supervision system, a supervision method, a supervision medium and a supervision computer for a core drilling process, which have the following beneficial effects: locking a core sample sampling place through satellite positioning by providing a core drilling process supervision system; through the process of video recording core sample and lifting the tablet, core sample drilling process, drilling position, label posting process, can avoid core sample to make a false, guarantee the authenticity of core sample, through storing core drilling process information and video HASH information to the blockchain platform, only through the equipment after the mutual authentication can read and visit, can avoid the video to be tampered, guaranteed the authenticity of sampling video.

Description

Core drilling process supervision system, method, medium and computer
Technical Field
The invention relates to the technical field of packaging equipment, in particular to a supervision system, a supervision method, a supervision medium and a supervision computer for a core drilling process.
Background
The core drilling method is a simple, visual and high-detection-precision detection method for local damage, and is widely applied to on-site concrete quality detection, and the core drilling method generally reflects the quality of the interior of concrete. The internal quality of the concrete is a main factor influencing the strength of the concrete, and bubbles, honeycombs, holes and loose vibration formed by poor control of links such as raw materials, mix proportion, construction factors, age, maintenance and the like can influence the strength of the concrete, and the influence of the analysis core drilling detection process on structural safety and concrete strength assessment cannot be ignored. The core drilling method is a local micro-damage field detection method for estimating the concrete strength of a structure or a component by utilizing a special concrete core drilling machine to directly drill a cylindrical concrete core sample from the structure or the component, carrying out compression test after processing according to related specifications and estimating the concrete strength of the structure or the component according to the compression strength of the core sample.
At present, the core drilling sampling method has the following technical defects: 1. the construction site is mostly located in towns, suburbs, rural areas and the like, the sites are remote, the mobile network signals are poor, wi-Fi signals are not generated on the detection site, and the real-time positioning of equipment and the network transmission of data are blocked; 2. the construction site can generate larger vibration due to the conditions of construction, vehicle running and the like, so that the stability of the monitoring equipment during erection and the safety during crash can not be ensured; the length of time for detecting the drill core, if considering the real-time positioning of the equipment and the transmission of the monitoring picture, the energy consumption, the battery capacity or the external power supply of the equipment may not meet the use requirement; 3. the matched software service of the conventional portable monitoring equipment in the market at present is mainly an application program of a mobile phone end, the functions are fewer, the stored video files cannot embody key information suitable for engineering according to automatic naming of the system, so that the video files are disordered, and the classification and management of monitoring data cannot be well achieved; meanwhile, the files are required to be manually stored in a computer hard disk, so that the time cost of management personnel is increased; 4. at present, effective means for monitoring the core drilling process are lacking, and the reliability of the core sample source is completely dependent on the responsibility of field operators; there is the illegal problem of data tampering and label mess.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide a supervision system, a supervision method, a supervision medium and a supervision medium for a core drilling process, so as to solve the problems that samples existing in the existing core drilling sampling process are easy to be counterfeited, equipment communication connection is imperfect and accurate and objective implementation is difficult.
The technical aim of the invention is realized by the following technical scheme: a core drilling process supervision system, comprising:
and a user management module: the system is used for managing departments and users in the system, and comprises the following steps: creation department, update department, creation user, update user information, and user rights management;
and the log management module is used for: the system log collecting device is used for intercepting and collecting system logs, service logs and login logs in a system and storing the service logs into a log database; the system log comprises abnormal data generated in the running process of the system; the service log includes: the system comprises a functional module, input parameters, execution entry time, execution completion time and execution time consumption; the log includes: the login user IP, login name, current URL, request header, request parameter, client information, browser information, request method, COOKIE information and login execution result;
And the core drilling equipment management module: the system is used for managing core drilling equipment, and comprises equipment information management, equipment positioning management, equipment log management and equipment work video management;
video information extraction module: the method comprises the steps of extracting positioning information, a video recording time period, an equipment serial number, a session ID (identity) during uploading, an operator identity code and HASH information of video recording, wherein the positioning information, the video recording time period, the equipment serial number and the HASH information are contained in working video recording of equipment;
video information encryption module: submitting the video information extracted by the video information extraction module to an uplink port of a block chain for uplink storage, and correspondingly returning a unique block chain number;
and a communication guarantee module: the method is used for searching the signal strength of the wireless signal and realizing the balance point of the optimal communication and the longest endurance through the optimization logic.
Optionally, the creation department includes: the module provides a user interface, firstly inputs parameters of department name, department code, responsible person and contact phone, then selects an upper-level department, finally clicks a storage button, and sends information to the server, and the server takes the newly added department as a child node according to the selected upper-level department and adds the newly added department under the upper-level department node to finish the creation of the child node of the department;
The update department includes: the module provides a user interface, firstly searches departments needing to be updated, clicks an editing button, modifies department information in a pop-up dialog box, wherein the modifiable information comprises department names, department codes, responsible persons, contact phones and superior departments, finally clicks a storage button, sends the modified information to a server, judges whether a mobile department node is needed according to whether the selected superior department changes or not, and stores the information to a database;
the creating user includes: the module provides a user interface, inputs parameters of 'user name, password, name, sex, post, mobile phone number and affiliated department' in the user interface, clicks a save button and sends information to a server; after receiving, the server firstly searches whether the user is repeated, whether the password meets the requirement of waiting for protection, refuses to save the information which does not meet the requirement, returns to the user interface for reminding, and saves the data which meets the requirement to the database;
the updating of the user information includes: the module provides a user interface, searches a user to be edited in the user interface, clicks an editing button, modifies user information in a pop-up dialog box, inputs parameters of a password, a name, a gender, a post, a mobile phone number and a department, finally clicks a save, sends the information to a server, performs data verification after the server receives the information, refuses to save the information which does not meet the requirements, and saves the data which meets the requirements to a database;
The user rights management includes: the module provides a user interface, searches the user interface for the user needing to be updated, clicks a role authorization button, selects the role to be granted in the pop-up dialog box, and clicks 'authorization' to be added to the authorization list.
Optionally, the log management module is further configured to: querying a system log, querying a service log and querying a login log;
the query system log includes: the module provides a user interface, the user interface inputs parameters of 'time period and log level', the system returns corresponding logs generated in the time period, and the log level comprises 'information level, warning level and error level';
the query service log includes: the module provides a user interface, the user interface inputs the parameters of 'time period, function module name and execution time consumption range', and the system returns to the corresponding log generated in the time period;
the query log comprises: the module provides a user interface, the user interface inputs parameters of 'time period, login user IP, login name and login result', and the system returns the corresponding log generated in the time period.
Optionally, the device information management includes: the module provides a user interface, inputs 'equipment name, serial number and operator' in the user interface, clicks a save button, sends information to the server, and the server detects whether the serial number is repeated or not, if not, corresponding equipment data is created; if the serial number is repeated, returning error information, blocking the storage process, and prompting in a user interface;
The device location management includes: the module provides a standard domestic map, marks the device position on the map by using a Mars coordinate system, and displays the device statistical information on an interface: total number, number of online devices, number of devices being recorded, number of devices being returned; clicking any equipment mark on the interface, and correspondingly checking the name and preview information of the equipment;
the device log management includes: the module records user request data including a requester serial number, a request session ID, a request time, equipment signal intensity, equipment electric quantity, equipment residual space, equipment video recording state and equipment satellite positioning information under the condition that the equipment remote control synchronization module receives a synchronization request, and stores the parameters into a log database; further comprises: inquiring the equipment system: the module provides a user interface, inputs parameters of 'time period, equipment serial number and equipment name', and the system returns a corresponding log generated in the time period;
the equipment work video management comprises: the module provides a user interface, the parameters of 'video name, equipment serial number, equipment name and operator name' are input in the user interface, the system returns to the video file of the time period or matching condition, and the video can be watched in real time by clicking any video.
Optionally, the video information encryption module is further configured to provide an encryption information verification function, and after the module receives the "blockchain block number" and "positioning information, video recording time period, equipment serial number, session ID during uploading, and operator ID", the module performs verification query on the blockchain platform, matches data one by one, and completely matches and returns a success code 0; the match error returns an error code of-1.
Optionally, the retrieving the signal strength of the wireless signal and optimizing logic to achieve a balance point of the optimal communication and the longest endurance includes:
the module detects 4G mobile signals, 5G mobile signals and WIFI signal intensity, and is connected and switched through the following logic control:
firstly, detecting the WIFI signal intensity, and if the WIFI signal intensity is > -70dbm, keeping the WIFI connection;
under the condition that the WIFI signal intensity is < -80dbm, if the 5G mobile signal intensity is > -70dbm, switching to the 5G mobile signal connection;
in the case of 5G mobile signal < -80dbm, if the 4G mobile signal strength is > -70dbm, switching to the 4G mobile signal connection;
if all signal intensities are < -80dbm, the 4G mobile signal connection is maintained.
Optionally, the method further comprises: video recording module and video compression module:
The video recording module is used for recording the whole process of drilling core sampling;
the video compression module is used for compressing video and reducing the data size of the video, and comprises: firstly, carrying out frame pretreatment on video, extracting key frame images, carrying out quantization treatment on key frame image characteristics, reducing information which has weak influence on the key frame images, and removing statistical redundancy of the key frame images, so that effective compression of the information of the key frame images is realized, the scale of the images is recovered through a convolutional neural network trained in advance, the compressed key frame images are obtained, and the compressed video is obtained through recombination.
The application also provides a supervision method of the core drilling process, which comprises the following steps:
s1, shooting a process video of core drilling sampling, and recording positioning information of the video, a time period of video shooting, a serial number of core drilling equipment, a session ID during uploading and an operator identity code;
s2, compressing the shot video by using a pre-trained convolutional neural network, and uploading the compressed video to a database of a cloud server;
s3, storing positioning information, a video shooting time period, a serial number of drilling core equipment, a session ID in uploading, an operator identification code and HASH information of a video file into a block chain through an uplink port, correspondingly acquiring a unique block number, and storing the block number into local equipment;
S4, checking the integrity of the video in the cloud server, and deleting the video stored in the local equipment when the video in the cloud server is the complete video.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method described above when the processor executes the computer program.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method described above.
In summary, the invention has the following beneficial effects: locking a core sample sampling place through satellite positioning by providing a core drilling process supervision system; through the process of video recording core sample and lifting the tablet, core sample drilling process, drilling position, label posting process, can avoid core sample to make a false, guarantee the authenticity of core sample, through storing core drilling process information and video HASH information to the blockchain platform, only through the equipment after the mutual authentication can read and visit, can avoid the video to be tampered, guaranteed the authenticity of sampling video.
Drawings
FIG. 1 is a flow chart of a method of supervision of a core drilling process according to the present invention;
Fig. 2 is an internal structural view of a computer device in the embodiment of the present invention.
Detailed Description
In order that the objects, features and advantages of the invention will be readily understood, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Several embodiments of the invention are presented in the figures. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
In the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances. The terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature.
In the present invention, unless expressly stated or limited otherwise, a first feature "above" or "below" a second feature may include both the first and second features being in direct contact, as well as the first and second features not being in direct contact but being in contact with each other through additional features therebetween. Moreover, a first feature being "above," "over" and "on" a second feature includes the first feature being directly above and obliquely above the second feature, or simply indicating that the first feature is higher in level than the second feature. The first feature being "under", "below" and "beneath" the second feature includes the first feature being directly under and obliquely below the second feature, or simply means that the first feature is less level than the second feature. The terms "vertical," "horizontal," "left," "right," "up," "down," and the like are used for descriptive purposes only and are not to indicate or imply that the devices or elements being referred to must have a particular orientation, be constructed and operated in a particular orientation, and therefore should not be construed as limiting the invention.
The present invention will be described in detail below with reference to the accompanying drawings and examples.
The present invention provides a core drilling process supervision system, as shown in fig. 1, comprising:
And a user management module: the system is used for managing departments and users in the system, and comprises the following steps: creation department, update department, creation user, update user information, and user rights management;
and the log management module is used for: the system log collecting device is used for intercepting and collecting system logs, service logs and login logs in a system and storing the service logs into a log database; the system log comprises abnormal data generated in the running process of the system; the service log includes: the system comprises a functional module, input parameters, execution entry time, execution completion time and execution time consumption; the log includes: the login user IP, login name, current URL, request header, request parameter, client information, browser information, request method, COOKIE information and login execution result;
and the core drilling equipment management module: the system is used for managing core drilling equipment, and comprises equipment information management, equipment positioning management, equipment log management and equipment work video management;
video information extraction module: the method comprises the steps of extracting positioning information, a video recording time period, an equipment serial number, a session ID (identity) during uploading, an operator identity code and HASH information of video recording, wherein the positioning information, the video recording time period, the equipment serial number and the HASH information are contained in working video recording of equipment;
Video information encryption module: submitting the video information extracted by the video information extraction module to an uplink port of a block chain for uplink storage, and correspondingly returning a unique block chain number;
and a communication guarantee module: the method is used for searching the signal strength of the wireless signal and realizing the balance point of the optimal communication and the longest endurance through the optimization logic.
Specifically, in the actual core drilling sampling process, the shot video in the core drilling process is usually required to be recorded, and the shot video is transmitted to a cloud server for storage in real time, but in the prior art, engineering construction is usually located in a communication signal blind area, signal transmission is unstable, long-time transmission of the video is difficult to maintain, so that the problems of clipping, fake-making of core samples, secondary filling and the like easily exist in the video shot on line, and therefore, aiming at the situation, the application provides a core drilling process supervision system, which comprises a plurality of modules, namely 1, a user management module: the system is used for storing the related information of the responsible persons related to enterprises, companies and the like into the system, and an operator account needs to be logged in corresponding operation equipment in each core drilling sampling process so as to ensure the responsibility of the operator to be implemented and reduce the sampling and counterfeiting probability. 2. And the log management module is used for: the log is a record of the running of the equipment, the running state of the system can be read through the log, and meanwhile, the loopholes in the system can be found according to the log, so that the risk of system breakdown is reduced. By reading the log on the equipment, the actual operator at a certain moment can be correspondingly traced, the sampling responsibility is further realized, and the sampling counterfeits are avoided. 3. And a drill core management module: the core drilling equipment is used for managing core drilling equipment, particularly, the core drilling equipment generally has a positioning function, can position the place where a core is sampled, is matched with the core drilling place on a core sample label, and ensures the stability of the sampling place. 4. Video encryption module: because the video file occupies a larger storage space, the video file is not directly stored in the blockchain platform, but the related information shot in the video and the HASH information of the complete video are uploaded to the blockchain platform for encryption storage, and the source file of the video is stored in the cloud server, so that the HASH information of the video in the server is checked and compared with the HASH information stored in the blockchain, the video information in the cloud server can be prevented from being tampered, and the integrity and the authenticity of the information are ensured. 5. And a communication guarantee module: because construction area is comparatively cool generally, communication means is comparatively deficient, consequently in order to guarantee that the video of shooing can be complete, steadily transmit to the high in the clouds server, need correspond the network that select signal strength is enough to the environment of shooting scene to guarantee that the video can be steadily transmitted to the high in the clouds, can also reduce the electric quantity that the communication connection of equipment consumes simultaneously, extension equipment's operating time.
Further, the creation department includes: the module provides a user interface, firstly inputs parameters of department name, department code, responsible person and contact phone, then selects an upper-level department, finally clicks a storage button, and sends information to the server, and the server takes the newly added department as a child node according to the selected upper-level department and adds the newly added department under the upper-level department node to finish the creation of the child node of the department;
the update department includes: the module provides a user interface, firstly searches departments needing to be updated, clicks an editing button, modifies department information in a pop-up dialog box, wherein the modifiable information comprises department names, department codes, responsible persons, contact phones and superior departments, finally clicks a storage button, sends the modified information to a server, judges whether a mobile department node is needed according to whether the selected superior department changes or not, and stores the information to a database;
the creating user includes: the module provides a user interface, inputs parameters of 'user name, password, name, sex, post, mobile phone number and affiliated department' in the user interface, clicks a save button and sends information to a server; after receiving, the server firstly searches whether the user is repeated, whether the password meets the requirement of waiting for protection, refuses to save the information which does not meet the requirement, returns to the user interface for reminding, and saves the data which meets the requirement to the database;
The updating of the user information includes: the module provides a user interface, searches a user to be edited in the user interface, clicks an editing button, modifies user information in a pop-up dialog box, inputs parameters of a password, a name, a gender, a post, a mobile phone number and a department, finally clicks a save, sends the information to a server, performs data verification after the server receives the information, refuses to save the information which does not meet the requirements, and saves the data which meets the requirements to a database;
the user rights management includes: the module provides a user interface, searches the user interface for the user needing to be updated, clicks a role authorization button, selects the role to be granted in the pop-up dialog box, and clicks 'authorization' to be added to the authorization list.
Specifically, the constituent departments are different for different enterprises, so that in the actual department creation process, the actual architecture of the enterprise needs to be determined by selecting the upper level department, and when the upper level department of the department is the enterprise, the department is set as the top level department, and the arrangement of the departments is completed through the tree diagram. When the user is set, the departments of the user are required to be correspondingly determined, and the authority of the user is determined according to the departments of the user, so that the unauthorized operation of the user is avoided, and the stability of the system is influenced.
Further, the log management module is further configured to: querying a system log, querying a service log and querying a login log; the query system log includes: the module provides a user interface, the user interface inputs parameters of 'time period and log level', the system returns corresponding logs generated in the time period, and the log level comprises 'information level, warning level and error level'; the query service log includes: the module provides a user interface, the user interface inputs the parameters of 'time period, function module name and execution time consumption range', and the system returns to the corresponding log generated in the time period; the query log comprises: the module provides a user interface, the user interface inputs parameters of 'time period, login user IP, login name and login result', and the system returns the corresponding log generated in the time period.
Specifically, the log is mainly used for recording the daily operation of the system, and some operations of people are required to be recorded, so that the operation process of the user can be correspondingly read through the log as long as the user operates the system, the user is prevented from logging in privately to modify the system data, and the stability and the completeness of the system are ensured.
Further, the device information management includes: the module provides a user interface, and the device name, the serial number and the operator are input into the user interface, so that the serial number of the device cannot be modified, the serial number of the device can be edited only when the device is initially bound into the system, but the serial number of the device is invariable in the subsequent use process, so that the quality of a core sample can be correspondingly determined according to the device, and the device mainly refers to a video shooting device with a network connection function because the supervision of the core sample is aimed at in the application. Clicking a storage button, sending information to a server, detecting whether the serial number is repeated or not by the server, and if not, creating corresponding equipment data; if the serial number is repeated, returning error information, blocking the storage process, and prompting in a user interface; the device location management includes: the module provides a standard domestic map, marks the device position on the map by using a Mars coordinate system, and displays the device statistical information on an interface: total number, number of online devices, number of devices being recorded, number of devices being returned; clicking any equipment mark on the interface, and correspondingly checking the name and preview information of the equipment; the device log management includes: the module records user request data including a requester serial number, a request session ID, a request time, equipment signal intensity, equipment electric quantity, equipment residual space, equipment video recording state and equipment satellite positioning information under the condition that the equipment remote control synchronization module receives a synchronization request, and stores the parameters into a log database; further comprises: inquiring the equipment system: the module provides a user interface, inputs parameters of 'time period, equipment serial number and equipment name', and the system returns a corresponding log generated in the time period; the equipment work video management comprises: the module provides a user interface, the parameters of 'video name, equipment serial number, equipment name and operator name' are input in the user interface, the system returns to the video file of the time period or matching condition, and the video can be watched in real time by clicking any video. Specifically, in the application, the equipment map is used for positioning the equipment, displaying information such as the places, the states and the like of all the equipment and the equipment which is returning on the terminal equipment, and ensuring that the system can completely master the working state of the sampling equipment.
Furthermore, the data gradually become the latest production materials, and on the premise that the assets of the whole society are on the premise of being in line and digitized, the data, namely the assets, namely the data, are safe, and the interaction and the cooperation between the data are difficult. The traditional cloud and local server architecture prevents the problem of data tampering by means of administrative specifications, but based on benefit temptation, the tampering of the existing data by external or internal factors cannot be completely prevented finally. The platform uses a blockchain technology to ensure the accuracy and auditability of the pass records, data stores HASH information through an uplink port, important features are stored on a chain (video recordings are temporarily not stored on the chain), and when the video files need to be verified, the information is submitted through a verification interface for comparison, so that whether the video files are tampered or not is verified. After uploading video, the equipment end of the data uploading link port firstly carries out integrity check on the video file, and after the integrity check, extracts positioning information, video time period, equipment serial number, session ID and operator identity code in uploading in the video, and submits the positioning information, the video time period, the equipment serial number and the operator identity code to the uploading link port together with the file HASH for uplink storage. After the block chain platform receives the information, the information is written into the block first, and a unique block number is returned and stored by the submitting end. The module provides a verification function, a user inputs a block chain block number, positioning information, a video recording time period, an equipment serial number, a session ID during uploading and an operator identity identification code, and after the module receives the information, the module performs verification inquiry on a block chain platform, matches data one by one and completely matches and returns a success code 0; the match error returns an error code of-1.
Further, the retrieving the signal strength of the wireless signal and implementing, by the optimizing logic, a balance point between the optimal communication and the longest endurance includes: the module detects 4G mobile signals, 5G mobile signals and WIFI signal intensity, and is connected and switched through the following logic control: firstly, detecting the WIFI signal intensity, and if the WIFI signal intensity is > -70dbm, keeping the WIFI connection; under the condition that the WIFI signal intensity is < -80dbm, if the 5G mobile signal intensity is > -70dbm, switching to the 5G mobile signal connection; in the case of 5G mobile signal < -80dbm, if the 4G mobile signal strength is > -70dbm, switching to the 4G mobile signal connection; if all signal intensities are less than-80 dbm, the 4G mobile signal connection is maintained, and when video information is transmitted to the remote management equipment, the system correspondingly adjusts the transmitted data according to the actual video information so as to ensure the flow and stability, and the specific adjustment method is as follows: and no matter what communication connection is adopted for data transmission, the type of the transmitted file is correspondingly selected according to the signal intensity, and 1, if the signal is good, the equipment state data and the standard definition video picture video stream are transmitted. 2. And if the signal is medium, transmitting the equipment state data and the video stream of the low-definition video picture. 3. If the signals are bad, transmitting the equipment state data and the single video picture.
Further, the management of the video evidence obtaining equipment is further included, and the video evidence obtaining equipment is specifically as follows: identity authentication module: the user inputs a user name and a password on the interface, clicks a login to perform identity authentication, and different user types enter different interfaces: an administrator: entering a device configuration interface; the average user: entering a video recording working interface to verify failure: and giving a prompt, not switching the interface, counting failures, stopping receiving input after 5 times of continuous failures, and unlocking after 30 minutes. And a device configuration module: the device configuration module is used for carrying out parameter configuration on the terminal, registering the terminal to the server, activating the terminal function and automatically connecting to the appointed wireless network. The administrator firstly fills in the following information in the configuration interface: a server port number (intranet), a server port number (extranet), a trusted wireless network SSID, a wireless password, and a local name. When the configuration is correctly saved, an administrator can click on "device registration", the device automatically connects to the wireless network to perform registration, and when the device cannot connect through the designated wireless network, the registration cannot be performed (i.e., the registration must be performed in the intranet). When the equipment is registered, the local name and the local serial number are sent to the server after being encrypted by the PRI_KEY of the current equipment, the server uses the PUB_KEY to check the data integrity, and a signal 0 is sent after the verification is passed to indicate that the registration is successful; otherwise, issuing an error code. And a positioning module: the current main stream satellite positioning system in China has GPS and Beidou, but has the defects of poor positioning effect, larger error and the like due to the defects of dislocation communication, over-high time delay index, large network blocking rate, poor network destruction resistance and the like in the GPS communication satellite network structure. The Beidou satellite navigation system is a global satellite navigation system which is fully independently researched and developed by China, and the Beidou second-generation satellite navigation system has transmitted 23 satellites. The Beidou second-generation satellite navigation system adopts a pseudo-range positioning principle, namely obtaining the specific position of a satellite according to the speed of signal propagation multiplied by the time of signal propagation, and then determining the position of a user by utilizing the spatial position relation of a plurality of satellites. The two positioning systems with the module structure have the advantages of comprehensive treatment, iterative calculation through a dynamic model Kalman filtering, and continuous optimization of positioning results. First,: when the earth rotation correction is performed and the positioning signal is received, the z-axis in the coordinate system is shifted relative to the satellite transmission signal, and the received signal coordinate needs to be corrected. Second,: the satellite clock error correction, because of time deviation and frequency drift of an atomic clock of a satellite, a certain difference exists between the atomic clock and standard time, and the difference can cause positioning error, an optimization algorithm is added into a module, and the satellite clock error is corrected through clock correction parameters in broadcast ephemeris messages. Third,: the free electrons present in the ionosphere have an influence on the propagation speed and direction of electromagnetic waves and also on different frequencies. The module performs correlation calculation through ionosphere model parameters given by satellite navigation messages.
Further, the method further comprises the following steps: after the user completes identity authentication, entering a video module; the operation function of the module is as follows: and in the recording process, the module compresses the video through a convolutional neural network to optimize the storage space and the network transmission efficiency. Video compression: because the video key frames have local invariance, and the local sensitivity characteristic of the convolutional neural network is combined, the video compression method based on the convolutional neural network is beneficial to improving the use experience. Firstly, carrying out frame pretreatment on a video, extracting a key frame image, and inputting the key frame image into a convolutional neural network for learning; then reducing the space scale and the feature number of the video key frame image through a convolutional neural network, and distributing relatively more code words for points with high significance; and finally, carrying out quantization processing on the key frame image characteristics, removing information which has weak influence on the key frame image, and removing statistical redundancy of the key frame image, so that effective compression of the information of the key frame image is realized, the scale of the image is restored through a convolutional neural network, the compressed key frame image is obtained, and the compressed video is obtained through recombination.
Video recording is an important digital asset, and is required to be fixedly stored for more than 1 year according to the supervision requirement for verification, so that the safety of video recording files and the reliability of transmission channels must be ensured in the video recording transmission process; meanwhile, due to storage limitation of video equipment, after a video file is uploaded to a server, deleting processing is carried out locally, and at the moment, the integrity of the video file is required to be checked by the server; the module mainly completes mutual authentication of equipment and a server, thereby ensuring reliable transmission and complete preservation. Firstly, the system needs to ensure the confidentiality and the integrity of data, and the confidentiality of the data ensures that the data of an object is not exposed to any unauthorized entity, so that the unauthorized reading of the data is prevented. The data integrity ensures that the data of the object is not damaged by vandalism attacks such as intentional or accidental deletion, tampering, forging, insertion, replay and the like in the process of transmitting and storing information or data, and prevents unauthorized writing of the data. Unlinkability of devices: the intercepted data of the previous session period does not affect the security of the data of the current and future session periods, and a malicious attacker cannot predict the current and future session periods by continuously monitoring the previous session period. And (3) bidirectional authentication: mutual authentication between interactive entities ensures that only authorized opposite ends can communicate with the device; only legitimate users can interact data with the device. Meanwhile, sensitive information such as real identity, current position and the like is prevented from being revealed in the interaction process, and anonymous data transmission is realized.
And (3) equipment authentication: and after the equipment is accessed into the wireless local area network, automatically starting an intranet authentication flow. 1. The equipment encrypts the local serial number and the identification code through a built-in private key and sends the encrypted local serial number and the identification code to a server; 2. the server decrypts the public key to verify the validity of the equipment, the verification succeeds in returning the session ID, and the verification fails to return an error code. The session ID adopts an HMAC function and pseudo-random number generation, so that the confidentiality of the data of the session ID and the pseudo-identity identifier is realized, sensitive data is ensured not to be exposed to any unauthorized entity, and illegal access and acquisition of the data are prevented. 3. After successful verification, the device establishes a session with the server, the subsequent file uploading is completed through the session, the session ID is updated in each session interaction process, and the forward security of the session is improved, so that the session cannot be continuously monitored and linked. 4. When verification fails, a prompt is given on the UI of the device, if the network is not reachable, automatic authentication is disabled for 10 minutes, and authentication can be manually initiated during the period. Integrity verification: before uploading the file, the device submits the file HASH to the server, the server keeps the HASH until the file transmission is completed, and recalculates the file HASH at the server, and if the two HASH are inconsistent in comparison, the client is prompted to retransmit.
Further, the present application also provides a supervision method for a core drilling process, which is characterized by comprising:
s1, shooting a process video of core drilling sampling, and recording positioning information of the video, a time period of video shooting, a serial number of core drilling equipment, a session ID during uploading and an operator identity code;
s2, compressing the shot video by using a pre-trained convolutional neural network, and uploading the compressed video to a database of a cloud server;
s3, storing positioning information, a video shooting time period, a serial number of drilling core equipment, a session ID in uploading, an operator identification code and HASH information of a video file into a block chain through an uplink port, correspondingly acquiring a unique block number, and storing the block number into local equipment;
s4, checking the integrity of the video in the cloud server, and deleting the video stored in the local equipment when the video in the cloud server is the complete video.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in FIG. 2. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The computer program when executed by a processor implements a core drilling process supervision method.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 2 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting as to the computer device to which the present inventive arrangements are applicable, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of: comprising the following steps:
s1, shooting a process video of core drilling sampling, and recording positioning information of the video, a time period of video shooting, a serial number of core drilling equipment, a session ID during uploading and an operator identity code;
s2, compressing the shot video by using a pre-trained convolutional neural network, and uploading the compressed video to a database of a cloud server;
s3, storing positioning information, a video shooting time period, a serial number of drilling core equipment, a session ID in uploading, an operator identification code and HASH information of a video file into a block chain through an uplink port, correspondingly acquiring a unique block number, and storing the block number into local equipment;
S4, checking the integrity of the video in the cloud server, and deleting the video stored in the local equipment when the video in the cloud server is the complete video.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the present invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.

Claims (9)

1. A core drilling process supervision system, comprising:
and a user management module: the system is used for managing departments and users in the system, and comprises the following steps: creation department, update department, creation user, update user information, and user rights management;
and the log management module is used for: the system log collecting device is used for intercepting and collecting system logs, service logs and login logs in a system and storing the service logs into a log database; the system log comprises abnormal data generated in the running process of the system; the service log includes: the system comprises a functional module, input parameters, execution entry time, execution completion time and execution time consumption; the log includes: the login user IP, login name, current URL, request header, request parameter, client information, browser information, request method, COOKIE information and login execution result;
And the core drilling equipment management module: the system is used for managing core drilling equipment, and comprises equipment information management, equipment positioning management, equipment log management and equipment work video management;
video information extraction module: the method comprises the steps of extracting positioning information, a video recording time period, an equipment serial number, a session ID (identity) during uploading, an operator identity code and HASH information of video recording, wherein the positioning information, the video recording time period, the equipment serial number and the HASH information are contained in working video recording of equipment;
video information encryption module: submitting the video information extracted by the video information extraction module to an uplink port of a block chain for uplink storage, and correspondingly returning a unique block chain number;
and a communication guarantee module: the system is used for searching the signal strength of the wireless signal and realizing the balance point of the optimal communication and the longest endurance through the optimization logic;
the searching the signal strength of the wireless signal and realizing the balance point of the optimal communication and the longest endurance through the optimizing logic comprises the following steps:
the module detects 4G mobile signals, 5G mobile signals and WIFI signal intensity, and is connected and switched through the following logic control:
firstly, detecting the WIFI signal intensity, and if the WIFI signal intensity is > -70dbm, keeping the WIFI connection;
Under the condition that the WIFI signal intensity is < -80dbm, if the 5G mobile signal intensity is > -70dbm, switching to the 5G mobile signal connection;
in the case of 5G mobile signal < -80dbm, if the 4G mobile signal strength is > -70dbm, switching to the 4G mobile signal connection;
if all signal intensities are < -80dbm, the 4G mobile signal connection is maintained.
2. A core drilling process monitoring system according to claim 1, wherein,
the creation department includes: the module provides a user interface, firstly inputs parameters of department name, department code, responsible person and contact phone, then selects an upper-level department, finally clicks a storage button, and sends information to the server, and the server takes the newly added department as a child node according to the selected upper-level department and adds the newly added department under the upper-level department node to finish the creation of the child node of the department;
the update department includes: the module provides a user interface, firstly searches departments needing to be updated, clicks an editing button, modifies department information in a pop-up dialog box, wherein the modifiable information comprises department names, department codes, responsible persons, contact phones and superior departments, finally clicks a storage button, sends the modified information to a server, judges whether a mobile department node is needed according to whether the selected superior department changes or not, and stores the information to a database;
The creating user includes: the module provides a user interface, inputs parameters of 'user name, password, name, sex, post, mobile phone number and affiliated department' in the user interface, clicks a save button and sends information to a server; after receiving, the server firstly searches whether the user is repeated, whether the password meets the requirement of waiting for protection, refuses to save the information which does not meet the requirement, returns to the user interface for reminding, and saves the data which meets the requirement to the database;
the updating of the user information includes: the module provides a user interface, searches a user to be edited in the user interface, clicks an editing button, modifies user information in a pop-up dialog box, inputs parameters of a password, a name, a gender, a post, a mobile phone number and a department, finally clicks a save, sends the information to a server, performs data verification after the server receives the information, refuses to save the information which does not meet the requirements, and saves the data which meets the requirements to a database;
the user rights management includes: the module provides a user interface, searches the user interface for the user needing to be updated, clicks a role authorization button, selects the role to be granted in the pop-up dialog box, and clicks 'authorization' to be added to the authorization list.
3. The core drilling process monitoring system of claim 1, wherein the log management module is further configured to: querying a system log, querying a service log and querying a login log;
the query system log includes: the module provides a user interface, the user interface inputs parameters of 'time period and log level', the system returns corresponding logs generated in the time period, and the log level comprises 'information level, warning level and error level';
the query service log includes: the module provides a user interface, the user interface inputs the parameters of 'time period, function module name and execution time consumption range', and the system returns to the corresponding log generated in the time period;
the query log comprises: the module provides a user interface, the user interface inputs parameters of 'time period, login user IP, login name and login result', and the system returns the corresponding log generated in the time period.
4. A core drilling process monitoring system according to claim 1, wherein,
the device information management includes: the module provides a user interface, inputs 'equipment name, serial number and operator' in the user interface, clicks a save button, sends information to the server, and the server detects whether the serial number is repeated or not, if not, corresponding equipment data is created; if the serial number is repeated, returning error information, blocking the storage process, and prompting in a user interface;
The device location management includes: the module provides a standard domestic map, marks the device position on the map by using a Mars coordinate system, and displays the device statistical information on an interface: total number, number of online devices, number of devices being recorded, number of devices being returned; clicking any equipment mark on the interface, and correspondingly checking the name and preview information of the equipment;
the device log management includes: the module records user request data including a requester serial number, a request session ID, a request time, equipment signal intensity, equipment electric quantity, equipment residual space, equipment video recording state and equipment satellite positioning information under the condition that the equipment remote control synchronization module receives a synchronization request, and stores the parameters into a log database; further comprises: inquiring the equipment system: the module provides a user interface, inputs parameters of 'time period, equipment serial number and equipment name', and the system returns a corresponding log generated in the time period;
the equipment work video management comprises: the module provides a user interface, the parameters of 'video name, equipment serial number, equipment name and operator name' are input in the user interface, the system returns to the video file of the time period or matching condition, and the video can be watched in real time by clicking any video.
5. A core drilling process monitoring system according to claim 1, wherein,
the video information encryption module is also used for providing an encryption information verification function, and after receiving the information, the module performs verification inquiry on the blockchain platform, matches data one by one and completely matches and returns a success code 0 after sending the blockchain block number, positioning information, a video recording time period, an equipment serial number, a session ID (identity) during uploading and an operator identity; the match error returns an error code of-1.
6. A core drilling process monitoring system according to claim 1, wherein,
further comprises: video recording module and video compression module:
the video recording module is used for recording the whole process of drilling core sampling;
the video compression module is used for compressing video and reducing the data size of the video, and comprises: firstly, carrying out frame pretreatment on video, extracting key frame images, carrying out quantization treatment on key frame image characteristics, reducing information which has weak influence on the key frame images, and removing statistical redundancy of the key frame images, so that effective compression of the information of the key frame images is realized, the scale of the images is recovered through a convolutional neural network trained in advance, the compressed key frame images are obtained, and the compressed video is obtained through recombination.
7. A method of supervising a core drilling process, comprising:
s1, shooting a process video of core drilling sampling, and recording positioning information of the video, a time period of video shooting, a serial number of core drilling equipment, a session ID during uploading and an operator identity code;
s2, compressing the shot video by using a pre-trained convolutional neural network, and uploading the compressed video to a database of a cloud server;
s3, storing positioning information, a video shooting time period, a serial number of drilling core equipment, a session ID in uploading, an operator identification code and HASH information of a video file into a block chain through an uplink port, correspondingly acquiring a unique block number, and storing the block number into local equipment;
s4, checking the integrity of the video in the cloud server, and deleting the video stored in the local equipment when the video in the cloud server is the complete video.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of claim 7 when executing the computer program.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of claim 7.
CN202310183326.1A 2023-03-01 2023-03-01 Core drilling process supervision system, method, medium and computer Active CN116166839B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310183326.1A CN116166839B (en) 2023-03-01 2023-03-01 Core drilling process supervision system, method, medium and computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310183326.1A CN116166839B (en) 2023-03-01 2023-03-01 Core drilling process supervision system, method, medium and computer

Publications (2)

Publication Number Publication Date
CN116166839A CN116166839A (en) 2023-05-26
CN116166839B true CN116166839B (en) 2023-09-12

Family

ID=86414580

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310183326.1A Active CN116166839B (en) 2023-03-01 2023-03-01 Core drilling process supervision system, method, medium and computer

Country Status (1)

Country Link
CN (1) CN116166839B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056268A (en) * 2016-05-17 2016-10-26 北京诺士诚国际工程项目管理有限公司 Engineering project management cloud platform system based on material tracking
CN109477376A (en) * 2016-06-03 2019-03-15 吉奥奎斯特系统公司 Detect the event in drilling well report
CN110278090A (en) * 2019-06-27 2019-09-24 尚菊红 Environment monitoring data monitoring system, processing method, computer equipment and storage medium
CN111316332A (en) * 2017-09-07 2020-06-19 Cmte发展有限公司 Spatial data processing system and method
CN111648206A (en) * 2020-04-21 2020-09-11 中建路桥集团有限公司 Real-time paving auxiliary monitoring system for asphalt pavement
CN112084529A (en) * 2020-09-09 2020-12-15 清华大学 Privacy data encryption access method and system based on block chain technology for community
CN113409141A (en) * 2021-05-27 2021-09-17 航天信息江苏有限公司 Grain storage full-flow traceable supervision method based on block chain technology
CN113672972A (en) * 2021-07-01 2021-11-19 国网浙江省电力有限公司建设分公司 Important asset safety monitoring method based on middleboxes
CN115019252A (en) * 2022-02-28 2022-09-06 北京建工集团有限责任公司 Concrete quality detection method and device and monitoring equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7035897B1 (en) * 1999-01-15 2006-04-25 California Institute Of Technology Wireless augmented reality communication system
US9482086B2 (en) * 2013-09-27 2016-11-01 Well Checked Systems International LLC Remote visual and auditory monitoring system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056268A (en) * 2016-05-17 2016-10-26 北京诺士诚国际工程项目管理有限公司 Engineering project management cloud platform system based on material tracking
CN109477376A (en) * 2016-06-03 2019-03-15 吉奥奎斯特系统公司 Detect the event in drilling well report
CN111316332A (en) * 2017-09-07 2020-06-19 Cmte发展有限公司 Spatial data processing system and method
CN110278090A (en) * 2019-06-27 2019-09-24 尚菊红 Environment monitoring data monitoring system, processing method, computer equipment and storage medium
CN111648206A (en) * 2020-04-21 2020-09-11 中建路桥集团有限公司 Real-time paving auxiliary monitoring system for asphalt pavement
CN112084529A (en) * 2020-09-09 2020-12-15 清华大学 Privacy data encryption access method and system based on block chain technology for community
CN113409141A (en) * 2021-05-27 2021-09-17 航天信息江苏有限公司 Grain storage full-flow traceable supervision method based on block chain technology
CN113672972A (en) * 2021-07-01 2021-11-19 国网浙江省电力有限公司建设分公司 Important asset safety monitoring method based on middleboxes
CN115019252A (en) * 2022-02-28 2022-09-06 北京建工集团有限责任公司 Concrete quality detection method and device and monitoring equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
supervisory control for underbalanced drilling operations;Torbjorn Pedersen et al.;《IFAC-PapersOnline》;第48卷(第6期);120-127 *

Also Published As

Publication number Publication date
CN116166839A (en) 2023-05-26

Similar Documents

Publication Publication Date Title
CN104240342A (en) Access control method and device
CN109886709B (en) Intelligent lock management method, system, computer equipment and storage medium
CN106796708A (en) Electronic voting system and method
CN112084529A (en) Privacy data encryption access method and system based on block chain technology for community
CN110825776B (en) Air quality detection report processing method and device, computing equipment and storage medium
CN104240014A (en) Door access control method and door access control platform
CN109871673A (en) Based on the lasting identity identifying method and system in different context environmentals
CN112511484B (en) U shield safety control management system
CN116166839B (en) Core drilling process supervision system, method, medium and computer
CN116542765B (en) Vehicle management method and related equipment
CN111386711A (en) Method, device and system for managing electronic fingerprints of electronic files
CN108965317B (en) Network data protection system
CN111885085A (en) Electronic data comprehensive certificate storing method and certificate storing system
US20190097816A1 (en) Computer systems for generating certified data
CN114095521A (en) Storage method, device, equipment and storage medium of remote sensing data
Feng et al. Autonomous Vehicles' Forensics in Smart Cities
CN108200532A (en) It is a kind of to verify the method and system made up SIM card user identity and be associated with SIM card
CN114036480B (en) Security access control method and system for private application and readable storage medium
CN115982681A (en) Computer network identity verification system
CN109982247A (en) A kind of two dimensional code combines the smart phone localization method of current WIFI information
CN106326769B (en) A kind of field monitoring information processing unit
CN111654591B (en) Picture tamper-proof method, computer device and storage medium
CN106934702A (en) False invoice monitoring method and device
CN113612771A (en) Protection method and device based on Internet of things authentication
CN113132106B (en) User identity recognition system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant