CN116796703B - Custom generation method of vehicle overhaul or fault check processing scheme and storage medium - Google Patents

Custom generation method of vehicle overhaul or fault check processing scheme and storage medium Download PDF

Info

Publication number
CN116796703B
CN116796703B CN202310875062.6A CN202310875062A CN116796703B CN 116796703 B CN116796703 B CN 116796703B CN 202310875062 A CN202310875062 A CN 202310875062A CN 116796703 B CN116796703 B CN 116796703B
Authority
CN
China
Prior art keywords
file
overhaul
fault
data
scheme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310875062.6A
Other languages
Chinese (zh)
Other versions
CN116796703A (en
Inventor
严茗钰
崔青
曾升
刘昭翼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xinjiang University
Original Assignee
Xinjiang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xinjiang University filed Critical Xinjiang University
Priority to CN202310875062.6A priority Critical patent/CN116796703B/en
Publication of CN116796703A publication Critical patent/CN116796703A/en
Application granted granted Critical
Publication of CN116796703B publication Critical patent/CN116796703B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/103Formatting, i.e. changing of presentation of documents
    • G06F40/106Display of layout of documents; Previewing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/177Editing, e.g. inserting or deleting of tables; using ruled lines
    • G06F40/18Editing, e.g. inserting or deleting of tables; using ruled lines of spreadsheets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a custom generation method of a vehicle overhaul or fault check processing scheme and a storage medium, wherein the method comprises the following steps: step S1: encrypting the overhaul/fault handling scheme file: defining editable properties of all data nodes in the overhaul/fault treatment scheme file, and finishing the compiling of the file; encrypting binary data in the overhaul/fault treatment scheme file to form an encrypted file; step S2: editing an overhaul/fault treatment scheme file through visual software; firstly, loading an encrypted file through visual software, analyzing the file by adopting a ciphertext symmetric decryption algorithm, and displaying an analysis result through a UI (user interface); inquiring and editing the overhaul content item points needing to be modified by the user through the keywords; step S3: a service/fault handling scheme is displayed. The storage medium is used to store a computer program for executing the method. The invention has the advantages of simple principle, simple and convenient operation, wide application range, good flexibility and the like.

Description

Custom generation method of vehicle overhaul or fault check processing scheme and storage medium
Technical Field
The invention mainly relates to the technical field of vehicle overhaul, in particular to a custom generation method of a vehicle overhaul or fault check processing scheme and a storage medium.
Background
In order to better ensure that the masses of citizens have safe and comfortable riding environments, bus drivers need to prepare in advance to ensure that safe and comfortable riding environments are provided for passengers, that is to say, a new energy bus needs to be checked by staff every day in order. These conventional and necessary inspection contents include inspection of the appearance, circuits, tires, etc. of the vehicle, inspection of the circulatory system, braking system, air conditioning system, control system, etc. of the vehicle, and all inspection operations are required to refer to the established instruction manual or inspection specifications.
When a vehicle is subjected to maintenance work or has a fault, the following method is generally adopted for processing:
1. Daily maintenance is carried out on the components according to the overhaul operation instruction, for example, the battery is insufficient in electric quantity and needs to be charged;
2. according to the fault checking operation instruction, the faults are checked step by step according to the processing steps, for example, the brake is not powered off, whether the brake power-off switch is damaged is firstly confirmed, and then the controller is confirmed to burn;
In the above inspection or overhaul methods, the instruction manual plays a decisive role in component overhaul and fault handling. Typically, instruction manuals are stored in a fixed, electronically-formatted format.
However, when the control system of the driving motor of the electric automobile fails, the factors causing the failure are more, and the uncertainty of the factors is larger, so that the failure is difficult to judge and discriminate. During the traditional maintenance operation, the judgment can be carried out through abnormal conditions such as abnormal sound, abnormal temperature and the like. At this time, the diagnosis function of the control system and the corresponding fault treatment measures are needed to be used for checking, such as electric quantity display, wireless speed regulation, soft start, under-voltage protection, overcurrent protection, brake power failure and the like.
However, the above-mentioned situations are faced with the need of repairing the vehicle by referring to the established repair technical specifications or troubleshooting schemes, and when the control component is updated and replaced and the control system is not updated, or when the pre-established repair specifications need to update the operation steps according to the field needs of users. When the vehicle leaves the field, the existing operation instruction book or specification can not guide the field to carry out overhaul maintenance or fault investigation.
In summary, when the above-mentioned conventional method is adopted to perform overhaul maintenance or fault handling of the component, there are several technical disadvantages as follows:
1. the technical document or instruction manual cannot cover all fault scenes, when a new fault scene appears, if an existing similar fault processing scheme is adopted, a new fault is possibly brought, and the problem of improper treatment appears.
2. Because the technical specifications of overhaul maintenance or fault handling are not updated timely, along with batch updating iteration of the parts, slight differences exist in overhaul maintenance and fault overhaul methods; however, if the existing file is used for processing after the replacement of the component, there is a possibility that the problem is mishandled and a new failure is caused.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems existing in the prior art, the invention provides a custom generation method of a vehicle overhaul or fault check treatment scheme and a storage medium, wherein the custom generation method is simple in principle, simple and convenient to operate, wide in application range and good in flexibility.
In order to solve the technical problems, the invention adopts the following technical scheme:
a custom generation method for a vehicle overhaul or fault-tolerant treatment scheme, comprising:
Step S1: encrypting the overhaul/fault handling scheme file:
defining the editable attribute of all the data nodes in the overhaul/fault treatment scheme file, and finishing the compiling; encrypting binary data in the overhaul/fault treatment scheme file to form an encrypted file; the binary data comprises a file header and file content;
Step S2: editing an overhaul/fault treatment scheme file through visual software;
Firstly, loading an encrypted file through visual software, analyzing the file by adopting a ciphertext symmetric decryption algorithm, and displaying an analysis result through a UI (user interface); the user inquires the overhaul content item points needing to be modified through the keywords, analyzes the key fields and determines whether the file data elements can be edited or not; if the editing is possible, prompting the user of a content area available for modification, and completing the modification of the content according to the actual condition of the scene;
Step S3: displaying an overhaul/fault handling scheme;
And updating the modified scheme on the field display terminal, and displaying the corresponding content or printing and publishing through software loading.
As a further improvement of the process of the invention: in step S1, the contents in the overhaul/fault handling scheme file are compiled into data units according to overhaul contents, overhaul faults, fault types, handling schemes and editable or not, the whole frame and/or important contents of all overhaul contents are set as user-non-customizable parts, and release authorities are customized by users for operational contents or job contents changing along with environmental adaptability.
As a further improvement of the process of the invention: the flow of the step S1 includes:
step S101: injecting a file header ciphertext into the overhaul/fault treatment scheme file;
Step S102: the ciphertext is formed by the encryption process.
As a further improvement of the process of the invention: and processing the original file, converting the content of the original file into data, and then performing encryption operation through an encryption algorithm to finally form encrypted data.
As a further improvement of the process of the invention: in the step S102, when the file is encrypted, a reversible operation function is adopted to implement the encryption process, and the expression is:
Encryption algorithm: d=v×a1/(a2 (V/a 3)/(a 4);
wherein V represents original data, and D represents data obtained after encryption operation.
As a further improvement of the process of the invention: when decryption operation is carried out, original data is obtained firstly, and then file content is extracted to form structured data; next, it is determined whether the data elements in the structured data can be edited, and they are classified into two types: the content is only available for display review; the content may be modifiable; then, the decryption operation is completed.
As a further improvement of the process of the invention: when decrypting the encrypted file, the expression is:
V=POWER(D*a2/a1/(a3^a4),1/(1-a4))
Where the power () function represents the meaning of the evolution.
As a further improvement of the process of the invention: and initializing and compiling the overhaul/fault processing scheme file by adopting an excel file format.
The present invention further provides a storage medium readable by a computer or a processor, the storage medium having stored therein a computer program for performing any one of the methods described above.
Compared with the prior art, the invention has the advantages that:
1. The method for locally adjusting partial overhaul operation steps or fault investigation strategies by a user according to own operation habits is adopted, equipment overhaul maintenance and fault treatment are realized under a basic treatment frame, the purpose that the user modifies fine tuning and is more suitable for specific operation scenes of the user is achieved, and the accurate treatment of the equipment overhaul maintenance and faults is achieved.
2. The invention relates to a custom generation method of a vehicle overhaul or fault investigation processing scheme and a storage medium, and further discloses a method for customizing file data element attributes and opening rights to custom modify needed contents by a user by adopting a reversible algorithm. According to the method, the user-defined encryption and decryption algorithm is adopted to process the file content, so that the file provided for the user becomes invisible, the file is ensured not to be modified randomly, and the file security level is improved; the invention provides an original model for user-defined modification files.
Drawings
FIG. 1 is a schematic flow chart of the method of the present invention.
Fig. 2 is a detailed flowchart of step S1 in a specific application example of the present invention.
Fig. 3 is a schematic diagram of the content of a file in a specific application example of the present invention.
Fig. 4 is a flow chart of the file encryption process in a specific application example of the present invention.
Fig. 5 is a schematic diagram of the present invention handling a scene in a specific application example.
Fig. 6 is a flow chart of the file decryption process in a specific application example of the present invention.
Fig. 7 is a schematic diagram of a UI display interface in a specific application example of the present invention.
FIG. 8 is a schematic diagram of file batch delivery in a specific application example of the present invention.
Detailed Description
The invention will be described in further detail with reference to the drawings and the specific examples.
The invention relates to a custom generation method of a vehicle overhaul or fault check processing scheme, which has the following core principles: displaying overhaul maintenance specifications and contents of fault overhaul by adopting visual software; for specific content such as a fault handling scheme, a window which can be edited by a user is provided, and the user can customize the overhaul or the fault handling scheme; after modification, the overhauling/fault processing file is saved in a ciphertext mode, and finally, the scheme file can be loaded into any terminal equipment for an overhauling maintenance engineer to refer to and execute.
As shown in fig. 1,2, 4, 5 and 6, the method for custom generating a vehicle overhaul or fault check processing scheme of the present invention includes the following steps:
Step S1: encrypting the overhaul/fault handling scheme file:
Defining the editable attribute of all the data nodes in the overhaul/fault treatment scheme file, and finishing the compiling; encrypting the binary data of the file to form an encrypted file; the binary data comprises a file header and file content; after encryption is completed, the aim that the file cannot be opened by adopting other software is achieved, and the user cannot randomly modify the content of the file, and only the customized software can be used for modifying the fixed content.
Step S2: editing an overhaul/fault treatment scheme file through visual software;
Because the overhaul/fault processing scheme file is encrypted when leaving the factory along with the software, a user can carry out overhaul maintenance and fault processing according to the content in the processing scheme under normal conditions, but when the established measures cannot meet the field requirements of the user, the user is required to customize the processing scheme at the moment.
Firstly loading an encrypted file through visual software, analyzing the file by adopting a ciphertext symmetric decryption algorithm, and displaying an analysis result through a UI (user interface); at this time, the user can inquire about the maintenance content item points to be modified through the keywords, and analyze the key fields to determine whether the file data elements can be edited; if the editing can be performed, the user is prompted for a content area available for modification, and the user can complete the modification of the content according to the actual situation on site.
Step S3: displaying an overhaul/fault handling scheme;
The method is not applicable to the contents of the field operation of the user, the user has carried out the self-defining processing, and the processed proposal, such as in a bus management center, needs to be issued to all maintenance engineers on the field, only needs to update the modified proposal on a field display terminal, and adopts matched software to load and display the corresponding contents or print and issue.
By adopting the method of the invention, the method of encrypting/decrypting the file and customizing the data element attribute by adopting the reversible algorithm, not only can the file content be effectively protected (the encrypted file user can not open at will), but also the authority can be opened to carry out the custom modification on the needed content for the user, thereby achieving the purposes of protecting the software and enabling the user.
In a specific application example, the overhaul/fault handling scheme file may be compiled in a specific format according to actual needs, for example, an excel file format is adopted for file initialization compilation.
In a specific application example, according to the overhaul content, overhaul fault, fault type, processing scheme and whether the overhaul content can be edited into a data unit, the whole framework or important content of the processing scheme is set as a user-non-customizable part, and the release authority can be customized by a user for the operation content of operability or environmental adaptability change.
Referring to fig. 2, in a specific application example, the flow of step S1 may include, but is not limited to:
step S101: injecting a file header ciphertext into the overhaul/fault treatment scheme file;
Step S102: the ciphertext is formed by the encryption process.
Referring to fig. 3, a schematic diagram of file contents in a specific application example of the present invention is shown.
Referring to fig. 4, the present application processes an original file, converts the content of the original file into data, and then performs encryption operation through an encryption algorithm, thereby finally forming encrypted data.
In the step S102 of the present invention, the encryption process of the file may be implemented by using a reversible operation function; in one specific example, the algorithm is as follows:
Encryption algorithm: d=v×a1/(a2 (V/a 3)/(a 4);
Wherein V represents original data, D represents data obtained by encryption operation
Referring to fig. 6, in the decryption operation, first, original data is obtained, and then file contents are extracted to form structured data; next, it is determined whether the data elements in the structured data can be edited, and they are classified into two types: the content is only available for display review; the content may be modifiable; then, the decryption operation is completed.
As a preferred embodiment, when decrypting the encrypted file, the algorithm is as follows:
V=POWER(D*a2/a1/(a3^a4),1/(1-a4))
Where the power () function represents the meaning of the evolution.
All contents in the file are encrypted by adopting a data encryption method, the file header and the file contents are subjected to operation processing, and the file cannot be opened by adopting any tool under the condition of not decrypting, so that the user cannot perform any modification operation on the file under the condition that the user knows that the file is processed for scheme. Meanwhile, user-definable data attributes are added in fields of file contents, so that corresponding modification authorities can be opened to users after correct analysis.
Referring to fig. 5 and 7, fig. 5 is an operation flow in one processing scenario, and fig. 7 is a schematic diagram of a UI interface in one specific application example. First, after the encrypted file is first loaded by the visualization software, the processing scheme can be seen. And judging whether the processing scheme accords with the field use scene, and if not, entering a revision mode. After triggering the revision mode, the user may retrieve the target service content item point at the keyword; then, the user can directly edit the content of the modifiable part by presenting the modifiable part through the visualization software and then store the modifiable part; and finally, a complete overhaul/fault handling scheme is formed. Therefore, not only is the important content of the core not modified, but also the user can modify the whole practical scheme of overhaul/fault treatment according to the practical scene requirement.
The present invention further provides a storage medium readable by a computer or a processor, the storage medium having stored therein a computer program for performing the above method.
It will be appreciated by those skilled in the art that the above-described embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the invention without departing from the principles thereof are intended to be within the scope of the invention as set forth in the following claims.

Claims (5)

1. A custom generation method of a vehicle overhaul or fault check treatment scheme is characterized by comprising the following steps:
Step S1: encrypting the overhaul/fault handling scheme file:
defining the editable attribute of all the data nodes in the overhaul/fault treatment scheme file, and finishing the compiling; encrypting binary data in the overhaul/fault treatment scheme file to form an encrypted file; the binary data comprises a file header and file content;
Step S2: editing an overhaul/fault treatment scheme file through visual software;
Firstly, loading an encrypted file through visual software, analyzing the file by adopting a ciphertext symmetric decryption algorithm, and displaying an analysis result through a UI (user interface); the user inquires the overhaul content item points needing to be modified through the keywords, analyzes the key fields and determines whether the file data elements can be edited or not; if the editing is possible, prompting the user of a content area available for modification, and completing the modification of the content according to the actual condition of the scene;
Step S3: displaying an overhaul/fault handling scheme;
Updating the modified scheme on the field display terminal, and loading and displaying corresponding content or printing and publishing through software;
In step S1, the contents in the overhaul/fault handling scheme file are compiled into a data unit according to overhaul contents, overhaul faults, fault types, handling schemes and editable or not, the whole frame and/or important contents of all overhaul contents are set as user-non-customizable parts, and release authorities are customized by users for operational contents or job contents changing along with environmental adaptability;
When decryption operation is carried out, original data is obtained firstly, and then file content is extracted to form structured data; next, it is determined whether the data elements in the structured data can be edited, and they are classified into two types: the content is only available for display review; the content may be modifiable; then, the decryption operation is completed;
when the file is encrypted, the file is realized by adopting a reversible operation function, and the expression is as follows:
Encryption algorithm:
Wherein V represents original data, and D represents data obtained after encryption operation;
When decrypting the encrypted file, the expression is:
Where the power () function represents the meaning of the evolution.
2. The method for custom generation of a vehicle overhaul or fault investigation treatment scheme according to claim 1, wherein the flow of step S1 comprises:
step S101: injecting a file header ciphertext into the overhaul/fault treatment scheme file;
Step S102: the ciphertext is formed by the encryption process.
3. The custom generation method of a vehicle inspection or troubleshooting processing scheme according to claim 2, characterized in that the original file is processed, the contents of the original file are converted into data, and then encryption operation is performed by an encryption algorithm, finally forming encrypted data.
4. The method for custom generation of a vehicle overhaul or fault investigation treatment scheme according to any one of claims 1-3, wherein the overhaul/fault investigation treatment scheme file is prepared by initializing a file in an excel file format.
5. A storage medium readable by a computer or a processor, characterized in that the storage medium has stored therein a computer program for executing the method of any of the preceding claims 1-3.
CN202310875062.6A 2023-07-17 2023-07-17 Custom generation method of vehicle overhaul or fault check processing scheme and storage medium Active CN116796703B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310875062.6A CN116796703B (en) 2023-07-17 2023-07-17 Custom generation method of vehicle overhaul or fault check processing scheme and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310875062.6A CN116796703B (en) 2023-07-17 2023-07-17 Custom generation method of vehicle overhaul or fault check processing scheme and storage medium

Publications (2)

Publication Number Publication Date
CN116796703A CN116796703A (en) 2023-09-22
CN116796703B true CN116796703B (en) 2024-05-24

Family

ID=88042206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310875062.6A Active CN116796703B (en) 2023-07-17 2023-07-17 Custom generation method of vehicle overhaul or fault check processing scheme and storage medium

Country Status (1)

Country Link
CN (1) CN116796703B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102455700A (en) * 2010-10-21 2012-05-16 斯必克机电产品(苏州)有限公司 Method and system for realizing real-time interaction of automobile fault diagnosis information
CN108227579A (en) * 2017-12-29 2018-06-29 深圳市元征科技股份有限公司 A kind of processing method and processing device of vehicle diagnosis information, electronic equipment
CN109813999A (en) * 2019-01-22 2019-05-28 山东大学 A kind of Fault Diagnosis of Distribution Network algorithm automatically testing platform, method and application
CN113392988A (en) * 2021-05-10 2021-09-14 贵州乌江水电开发有限责任公司乌江渡发电厂 Maintenance file management method for paperless operation of hydraulic power plant
CN114285840A (en) * 2021-12-23 2022-04-05 浙江吉利控股集团有限公司 Vehicle data acquisition method, intelligent terminal and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AT504798B1 (en) * 2007-10-24 2008-08-15 Data Noah Gmbh METHOD AND DEVICE FOR SELF-CREATING BACKUP COPIES

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102455700A (en) * 2010-10-21 2012-05-16 斯必克机电产品(苏州)有限公司 Method and system for realizing real-time interaction of automobile fault diagnosis information
CN108227579A (en) * 2017-12-29 2018-06-29 深圳市元征科技股份有限公司 A kind of processing method and processing device of vehicle diagnosis information, electronic equipment
CN109813999A (en) * 2019-01-22 2019-05-28 山东大学 A kind of Fault Diagnosis of Distribution Network algorithm automatically testing platform, method and application
CN113392988A (en) * 2021-05-10 2021-09-14 贵州乌江水电开发有限责任公司乌江渡发电厂 Maintenance file management method for paperless operation of hydraulic power plant
CN114285840A (en) * 2021-12-23 2022-04-05 浙江吉利控股集团有限公司 Vehicle data acquisition method, intelligent terminal and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
改进MobileNetv3-YOLOv3交通标志牌检测算法;刘宇宸 等;东北师大学报(自然科学版);20220630;第54卷(第2期);第53-60页 *

Also Published As

Publication number Publication date
CN116796703A (en) 2023-09-22

Similar Documents

Publication Publication Date Title
CN109062152B (en) Local variable online monitoring method based on logic configuration generation
US20080249828A1 (en) Method and System for Workscope Management and Control
CN104204976B (en) Information processor, analogy method and program
CN106529715B (en) Aircraft engine maintenance policy optimization method based on markov decision process
CN116796703B (en) Custom generation method of vehicle overhaul or fault check processing scheme and storage medium
CN109240731A (en) A kind of security upgrading method and system of TBox
CN104842816A (en) Torque control method and torque control device of electric vehicle
JP5815504B2 (en) Safety controller and method for controlling automation equipment
Fekri et al. Fast model predictive control and its application to energy management of hybrid electric vehicles
CN104907932A (en) Method for achieving machining program processing through conversational parameters in computer numerical control grinding machine system
CN107733675A (en) A kind of method and system of license authentications
CN103235549B (en) The automatic generation method of programmable gain amplifying program and device
Macher et al. Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition.
Takata et al. Disassembly operation support system with motion monitoring of a human operator
CN101802827B (en) Configuration tool and system for intelligent electronic device (protector relay)
US8181172B2 (en) Method for operation of an automation system
del Olmo et al. Model-based fault analysis for railway traction systems
CN105739463A (en) Molding facility or peripheral apparatus for a molding facility
CN110781459A (en) Authorization permission management and control method, system and electronic equipment
Faraut et al. Control law synthesis and reconfiguration using SCT
US20180129793A1 (en) Precompile and encrypt industrial intellectual property
van de Mortel-Fronczak et al. Supervisor synthesis in model-based automotive systems engineering
EP2599258B1 (en) Method to process messages in a communication network of several network nodes
CN114041137A (en) Process for producing components for adapting a component set
JP2666990B2 (en) Accident recovery system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant