CN117542184A - Mining intrinsic safety type remote control method and device and electronic equipment - Google Patents

Mining intrinsic safety type remote control method and device and electronic equipment Download PDF

Info

Publication number
CN117542184A
CN117542184A CN202311835698.4A CN202311835698A CN117542184A CN 117542184 A CN117542184 A CN 117542184A CN 202311835698 A CN202311835698 A CN 202311835698A CN 117542184 A CN117542184 A CN 117542184A
Authority
CN
China
Prior art keywords
remote control
instruction
terminal equipment
target
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311835698.4A
Other languages
Chinese (zh)
Inventor
许飞
姜玉国
张春华
阚宝超
刘建华
刘明志
齐亚飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tangshan Dongrun Automation Engineering Co ltd
Original Assignee
Tangshan Dongrun Automation Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tangshan Dongrun Automation Engineering Co ltd filed Critical Tangshan Dongrun Automation Engineering Co ltd
Priority to CN202311835698.4A priority Critical patent/CN117542184A/en
Publication of CN117542184A publication Critical patent/CN117542184A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/30User interface
    • G08C2201/33Remote control using macros, scripts

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application provides a mining intrinsic safety type remote control method, a mining intrinsic safety type remote control device and electronic equipment, relates to the technical field of data processing, and is applied to a wireless remote controller, wherein the method comprises the following steps: responding to a remote control request input by a user; analyzing the remote control request and determining remote control content corresponding to the remote control request; determining target terminal equipment according to remote control content; and sending a control instruction to the target terminal equipment so that the target terminal equipment executes corresponding operation according to the control instruction, wherein the control instruction comprises a signal scram instruction, an operation scram instruction and a hydraulic station unloading instruction. By means of the technical scheme, the working efficiency of workers is improved conveniently.

Description

Mining intrinsic safety type remote control method and device and electronic equipment
Technical Field
The application relates to the technical field of data processing, in particular to a mining intrinsic safety type remote control method, a mining intrinsic safety type remote control device and electronic equipment.
Background
In conventional mine operations, personnel are required to enter the mine, directly contact the equipment and perform the corresponding operations.
However, this approach has some problems. Firstly, because the mine environment is severe, potential safety hazards exist, and the life safety of workers is easily threatened. Secondly, direct contact with equipment may cause equipment damage, prolong equipment maintenance time, and then influence the work progress. Therefore, the working efficiency of workers is low, and the requirement of automatic production cannot be met.
Therefore, there is an urgent need for a mining intrinsic safety type remote control method, device and electronic equipment.
Disclosure of Invention
The application provides a mining intrinsic safety type remote control method, device and electronic equipment, which are convenient for improving the working efficiency of workers.
In a first aspect of the application, there is provided a mining intrinsic safety type remote control method applied to a wireless remote controller, the method comprising: responding to a remote control request input by a user; analyzing the remote control request and determining remote control content corresponding to the remote control request; determining target terminal equipment according to the remote control content; and sending a control instruction to the target terminal equipment so that the target terminal equipment executes corresponding operation according to the control instruction, wherein the control instruction comprises a signal scram instruction, an operation scram instruction and a hydraulic station unloading instruction.
By adopting the technical scheme, safety is an important consideration in dangerous environments such as mines. By using the intrinsically safe remote control method, the need of personnel in dangerous areas can be reduced, thereby reducing the accident risk. Through remote control operation, staff can operate in the place of keeping away from the mine, has avoided the needs of getting into the mine. This not only improves work efficiency, but also reduces the exposure time of the staff in a harsh environment. The method can automatically analyze and determine the corresponding remote control content according to the remote control request and determine the target terminal equipment. This simplifies the operation flow, so that the worker can perform the operation more quickly and accurately. The method provides various control instructions including a signal emergency stop instruction, an operating emergency stop instruction and a hydraulic station unloading instruction. These instructions can cope with various emergency situations and ensure the safety of equipment and personnel. Therefore, the direct contact equipment of the staff is not needed any more, the damage probability of the direct contact is reduced, and the work efficiency of the staff is improved conveniently.
Optionally, the analyzing the remote control request, determining remote control content corresponding to the remote control request specifically includes: obtaining text data according to the remote control request; processing the text data by adopting a text fingerprint algorithm to obtain field data, wherein the field data comprises a target field; calculating the similarity between the target field and a preset field; and if the similarity is determined to be greater than or equal to a preset similarity threshold, determining the target field as the remote control content.
By adopting the technical scheme, the text data is processed by using the text fingerprint algorithm, so that the key information can be more accurately identified and extracted, the accuracy of remote control content is ensured, and the possibility of misjudgment is reduced. By calculating the similarity between the target field and the preset field, the remote control content can be quickly determined. This increases the processing speed, enabling the wireless remote control to respond to remote control requests in real time. By presetting the similarity threshold, it can be ensured that the target field is determined to be remote control content only when the similarity reaches a certain level. This increases reliability and reduces erroneous operation due to inaccurate remote control contents.
Optionally, the determining the target terminal device according to the remote control content specifically includes: searching the remote control content in a preset database, and if the target remote control content corresponding to the remote control content exists in the preset database, acquiring terminal equipment corresponding to the target remote control content, wherein the corresponding relation between the remote control content and the terminal equipment is stored in the preset database in advance; and setting the terminal equipment as target terminal equipment.
By adopting the technical scheme, the target terminal equipment corresponding to the remote control content can be rapidly determined by searching the remote control content in the preset database. This reduces response time and improves real-time. The corresponding relation between the remote control content and the terminal equipment is prestored in the preset database, so that accurate results can be obtained in each search, and the possibility of misjudgment is reduced. Since the data in the database is stored and verified in advance, the accuracy and reliability of the data can be ensured. This increases the reliability of operation, reducing erroneous operation due to erroneous matching. The structure and content of the preset database can be modified and maintained as required. This reduces maintenance costs and complexity, allowing for adjustments and optimizations to be made according to actual needs. The data in the preset database can be encrypted and backed up to ensure the safety and the integrity of the data. This increases security against data loss or tampering.
Optionally, the determining the target terminal device according to the remote control content specifically includes: acquiring first remote control content, wherein the first remote control content is signal scram content and/or operation scram content; determining that the target terminal equipment is a signal lamp and/or a car operating device according to the signal scram content and/or the car operating scram content; the sending a control instruction to the target terminal device specifically includes: and sending the signal emergency stop instruction to the signal lamp so as to enable the signal lamp to execute signal emergency stop operation, and/or sending the vehicle operation emergency stop instruction to the vehicle operation so as to enable the vehicle operation to execute the vehicle operation emergency stop operation.
By adopting the technical scheme, the wireless remote controller can rapidly identify and respond to emergency conditions, such as signal emergency stop and vehicle operation emergency stop, by acquiring the first remote control content. This ensures that the system can take action quickly in case of emergency, protecting personnel and equipment. By sending a control command to the target terminal equipment, the wireless remote controller can realize centralized control and uniformly manage various equipment and operations. This simplifies the operation flow and improves the work efficiency. The method can be flexibly configured and controlled according to different remote control contents and terminal equipment. This enables adaptation to different working environments and requirements, improving adaptability and scalability. By sending the signal emergency stop instruction to the signal lamp, the signal lamp can be ensured to respond rapidly under the emergency condition, and accidents are avoided. And meanwhile, by sending an operation emergency stop instruction to the operation vehicle, the operation vehicle can be ensured to stop in time under the emergency condition, and the safety of personnel and equipment is protected.
Optionally, the method further comprises: receiving a monitoring image sent by monitoring equipment and aiming at the terminal equipment; analyzing the monitoring image by adopting a preset analysis model to obtain an analysis result; if the analysis result indicates that the terminal equipment is abnormal, generating alarm data; and displaying the alarm data.
By adopting the technical scheme, the wireless remote controller can receive the monitoring image sent by the monitoring device and aiming at the terminal device, which means that the state and the running condition of the terminal device can be monitored in real time. This helps to find problems and anomalies in time and to take appropriate action. By analyzing the monitoring image with a preset analysis model, information in the image can be automatically identified and processed. This greatly reduces the time and cost of manual analysis and improves the accuracy and consistency of the analysis. If the analysis result indicates that the terminal equipment is abnormal, the wireless remote controller can generate alarm data. This ensures that the relevant personnel can learn about the abnormal situation in time and take measures to solve the problem rapidly, avoiding the expansion of accidents or losses. By displaying the alarm data, abnormal conditions and alarm information can be intuitively presented. This helps the relevant personnel to better understand and evaluate the problem, making accurate decisions and taking appropriate action. Through real-time monitoring and timely alarming, the safety of equipment and personnel can be greatly improved. This helps reduce the likelihood of accidents and ensures a quick response in case of emergency.
Optionally, training a preset analysis model before analyzing the monitoring image by adopting the preset analysis model to obtain an analysis result; the training of the preset analysis model specifically comprises the following steps: acquiring training information, wherein the training information comprises a monitoring image and an analysis result; inputting the training information into a self-adaptive feature fusion network for training to obtain a first training result; superposing and standardizing the first training result and the training information to obtain a second training result; inputting the second training result into the self-adaptive feature fusion network for processing to obtain a third training result; and superposing and standardizing the third training result and the second training result until the training information similarity matrix is output, wherein the training information similarity matrix meets a preset logistic regression condition.
By adopting the technical scheme, the accuracy of analysis can be improved by training a preset analysis model. The monitoring images and analysis results are used in the training process, so that the model can better understand and identify various conditions and anomalies. The self-adaptive feature fusion network can carry out self-adaptive training according to the input training information, so that the model can be better adapted to different monitoring images and abnormal conditions, and the adaptability and generalization capability of analysis are improved. By superposing and standardizing the training result and the original training information, the performance of the model can be further optimized, and the consistency and accuracy of the output result are ensured. By repeatedly superposing and standardizing the training result and the original training information, the performance and accuracy of the model can be gradually improved. This approach ensures that the model is continually optimized and improved during the training process. By satisfying the preset logistic regression condition, consistency and reliability of the output result can be ensured. This helps to improve the accuracy and reliability of the analysis and alarm.
Optionally, the analyzing the monitoring image by using a preset analysis model to obtain an analysis result specifically includes: inputting the monitoring image into the preset analysis model to obtain an output result; acquiring a historical operation image of the terminal equipment, wherein the historical operation image comprises an abnormal phenomenon set, and the abnormal phenomenon set comprises signal lamp abnormal phenomena, vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena; identifying the output result, and determining a target abnormal phenomenon, wherein the target abnormal phenomenon is at least one of signal lamp abnormal phenomenon, car operating abnormal phenomenon and hydraulic station load abnormal phenomenon, and is used for indicating the terminal equipment to be abnormal; and obtaining the analysis result according to the target abnormal phenomenon.
By adopting the technical scheme, the image can be automatically analyzed and processed by inputting the monitoring image into the preset analysis model, so that an analysis result can be rapidly obtained. This avoids the time and cost of manual analysis and improves the accuracy and efficiency of the analysis. By acquiring a historical running image of the terminal device, including the set of anomalies, a reference can be provided for current analysis. This helps to better identify and determine anomalies, improving the accuracy and reliability of the analysis. The method not only detects signal lamp abnormal phenomena, but also detects vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena. This enables the abnormality of the terminal device to be detected comprehensively, improving the coverage rate and accuracy of abnormality detection. The method can flexibly adjust and configure the abnormal phenomenon set according to actual requirements and scenes so as to adapt to different monitoring requirements and equipment types. This improves adaptability and scalability. By identifying the output result and determining the target abnormal phenomenon, the method can accurately identify the abnormal condition of the terminal equipment and give an alarm in time. This helps to improve equipment and personnel safety and reduce the likelihood of accidents.
In a second aspect of the application, a mining intrinsic safety type remote control device is provided, the mining intrinsic safety type remote control device is a wireless remote control, and the wireless remote control comprises an acquisition module and a processing module, wherein the acquisition module is used for responding to a remote control request input by a user; the processing module is used for analyzing the remote control request and determining remote control content corresponding to the remote control request; the processing module is further used for determining target terminal equipment according to the remote control content; the processing module is further configured to send a control instruction to the target terminal device, so that the target terminal device executes a corresponding operation according to the control instruction, where the control instruction includes a signal scram instruction, an operating scram instruction, and a hydraulic station unloading instruction.
In a third aspect of the present application, there is provided an electronic device comprising a processor, a memory for storing instructions, a user interface and a network interface, both for communicating to other devices, the processor being adapted to execute the instructions stored in the memory to cause the electronic device to perform the method as described above.
In a fourth aspect of the present application, there is provided a computer readable storage medium storing instructions that, when executed, perform a method as described above.
In summary, one or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
1. in dangerous environments such as mines, safety is an important consideration. By using the intrinsically safe remote control method, the need of personnel in dangerous areas can be reduced, thereby reducing the accident risk. Through remote control operation, staff can operate in the place of keeping away from the mine, has avoided the needs of getting into the mine. This not only improves work efficiency, but also reduces the exposure time of the staff in a harsh environment. The method can automatically analyze and determine the corresponding remote control content according to the remote control request and determine the target terminal equipment. This simplifies the operation flow, so that the worker can perform the operation more quickly and accurately. The method provides various control instructions including a signal emergency stop instruction, an operating emergency stop instruction and a hydraulic station unloading instruction. These instructions can cope with various emergency situations and ensure the safety of equipment and personnel. Therefore, the direct contact equipment of the staff is not needed any more, the damage probability of the direct contact is reduced, and the work efficiency of the staff is improved conveniently;
2. The wireless remote control can receive the monitoring image sent by the monitoring device and aimed at the terminal device, which means that the state and the running condition of the terminal device can be monitored in real time. This helps to find problems and anomalies in time and to take appropriate action. By analyzing the monitoring image with a preset analysis model, information in the image can be automatically identified and processed. This greatly reduces the time and cost of manual analysis and improves the accuracy and consistency of the analysis. If the analysis result indicates that the terminal equipment is abnormal, the wireless remote controller can generate alarm data. This ensures that the relevant personnel can learn about the abnormal situation in time and take measures to solve the problem rapidly, avoiding the expansion of accidents or losses. By displaying the alarm data, abnormal conditions and alarm information can be intuitively presented. This helps the relevant personnel to better understand and evaluate the problem, making accurate decisions and taking appropriate action. Through real-time monitoring and timely alarming, the safety of equipment and personnel can be greatly improved. This helps reduce the likelihood of accidents and ensures a quick response in case of emergency;
3. By inputting the monitoring image into a preset analysis model, the image can be automatically analyzed and processed, so that an analysis result can be quickly obtained. This avoids the time and cost of manual analysis and improves the accuracy and efficiency of the analysis. By acquiring a historical running image of the terminal device, including the set of anomalies, a reference can be provided for current analysis. This helps to better identify and determine anomalies, improving the accuracy and reliability of the analysis. The method not only detects signal lamp abnormal phenomena, but also detects vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena. This enables the abnormality of the terminal device to be detected comprehensively, improving the coverage rate and accuracy of abnormality detection. The method can flexibly adjust and configure the abnormal phenomenon set according to actual requirements and scenes so as to adapt to different monitoring requirements and equipment types. This improves adaptability and scalability. By identifying the output result and determining the target abnormal phenomenon, the method can accurately identify the abnormal condition of the terminal equipment and give an alarm in time. This helps to improve equipment and personnel safety and reduce the likelihood of accidents.
Drawings
Fig. 1 is a schematic flow chart of a mining intrinsic safety type remote control method provided in an embodiment of the present application.
Fig. 2 is a schematic module diagram of a mining intrinsic safety type remote control device according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Reference numerals illustrate: 21. an acquisition module; 22. a processing module; 31. a processor; 32. a communication bus; 33. a user interface; 34. a network interface; 35. a memory.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present application, but not all embodiments.
In the description of embodiments of the present application, words such as "for example" or "for example" are used to indicate examples, illustrations or descriptions. Any embodiment or design described herein as "such as" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "or" for example "is intended to present related concepts in a concrete fashion.
In the description of the embodiments of the present application, the term "plurality" means two or more. For example, a plurality of systems means two or more systems, and a plurality of screen terminals means two or more screen terminals. Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating an indicated technical feature. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
In conventional mine operations, personnel often need to go deep into the mine, interact directly with various equipment, and perform various operations. This model plays an important role in past mining production, but it begins to exhibit some significant problems and limitations as technology advances and production needs change.
First, the environment of a mine is often very harsh, filled with various uncertainties and risk factors. Toxic gases, inflammable and explosive substances and various complicated geological conditions can exist in the mine, and the toxic gases, inflammable and explosive substances and the various complicated geological conditions directly threaten the life safety of workers. In case of accident, the consequences are not considered.
Second, direct contact with mine equipment may result in damage or malfunction of the equipment. In mines, the equipment is often in a high-intensity, high-load operating condition, and any improper operation or accidental collision may cause damage to the equipment, thereby resulting in an increase in maintenance cost and an increase in maintenance time. This not only affects the continuity of production, but may also negatively impact the economics of the enterprise.
More importantly, this conventional mode of operation is relatively inefficient. In complex and dangerous environments, workers often spend more time and effort completing tasks, which undoubtedly reduces the work efficiency of the workers.
In order to solve the technical problems, the present application provides a mining intrinsic safety type remote control method, and referring to fig. 1, fig. 1 is a flow diagram of the mining intrinsic safety type remote control method provided in an embodiment of the present application. The mining intrinsic safety type remote control method is applied to a wireless remote controller and comprises the following steps of S110 to S140:
s110, responding to a remote control request input by a worker.
Specifically, the wireless remote controller is a staff device, and can communicate and control with devices under the mine through wireless signals. When the staff sends a remote control request through the wireless remote controller, the wireless remote controller can respond to the request and execute corresponding operation according to a preset program. For example, when a worker presses a "switch" key on a wireless remote control, the wireless remote control will send an "on/off" command to the target device via a wireless signal. In general, the wireless remote controller may communicate with and control the downhole equipment through wireless signals in response to a remote control request input by a worker, to realize remote operations of various equipment.
S120, analyzing the remote control request and determining remote control content corresponding to the remote control request.
Specifically, in the embodiment of the application, the user is a user of the wireless remote controller. After receiving the remote control request of the staff member, it further analyzes the request to determine the specific remote control content corresponding to the request, in addition to simply responding to the request. Wherein, the remote control content can be understood as a specific intention or instruction of a remote control request in the embodiment of the application. For example, the operator presses the "beacon switch" key, but the wireless remote control not only knows that the operator wants to turn on/off the device, it also analyzes the request to determine more specific remote control content, such as "beacon scram".
In one possible implementation manner, the remote control request is analyzed to determine the remote control content corresponding to the remote control request, which specifically includes: obtaining text data according to the remote control request; processing the text data by adopting a text fingerprint algorithm to obtain field data, wherein the field data comprises a target field; calculating the similarity between the target field and a preset field; and if the similarity is determined to be greater than or equal to the preset similarity threshold, determining the target field as remote control content.
Specifically, first, according to a received remote control request, the wireless remote controller extracts text data therefrom. For example, if the remote control request is entered by key or voice, the text data is the corresponding key code or voice transcribed text. The wireless remote control then processes the extracted text data using a text fingerprinting algorithm. The algorithm can identify and extract key information in the text to form field data. These field data may include time, device name, operation type, etc. Then, the wireless remote controller calculates the similarity between the target fields and the preset fields. The preset field is a reference field determined according to preset conditions and rules. Similarity calculation may be accomplished by comparing the text content, structure, or semantics of the fields. Finally, the wireless remote controller checks whether the calculated similarity is greater than or equal to a preset similarity threshold, and if the calculated similarity is greater than or equal to the threshold, the target field is considered to be matched with the preset field, so that the target field is determined to be remote control content.
For example, suppose a worker sends a request via a wireless remote controller to "turn off the signal lights for section a". After receiving the request, the wireless remote controller extracts text data from the request to turn off the signal lamp of the A road section. The data is then processed using a text fingerprinting algorithm to identify the target fields such as "type of operation" as "off", "device type" as "signal light" and "location" as "a road segment". Next, the wireless remote controller calculates the similarity between the target fields and the preset fields. If the similarity is greater than or equal to a preset threshold, the wireless remote controller can determine that the remote control content is "turn off the signal lamp of the A road section" and execute corresponding operation according to the remote control content.
S130, determining target terminal equipment according to the remote control content.
Specifically, the wireless remote controller, after determining the remote control content, needs to determine which target terminal device should be controlled based on this content. In short, it is necessary to know which device needs to perform this remote control operation. The target terminal equipment is any one of a plurality of underground terminal equipment, and the terminal equipment can comprise signal lamps, an operating vehicle, a hydraulic station and the like.
In one possible implementation manner, determining the target terminal device according to the remote control content specifically includes: searching remote control content in a preset database, and if the target remote control content corresponding to the remote control content exists in the preset database, acquiring terminal equipment corresponding to the target remote control content, wherein the corresponding relation between the remote control content and the terminal equipment is stored in the preset database in advance; and setting the terminal equipment as target terminal equipment.
Specifically, the wireless remote controller will first search the preset database for the information related to the remote control content. The database stores the corresponding relation between various remote control contents and corresponding terminal equipment in advance. If the target remote control content matched with the current remote control content exists in the database, the wireless remote controller can acquire terminal equipment information corresponding to the target remote control content from the database. Finally, the wireless remote controller sets the acquired terminal device as a target terminal device, namely, an object for executing remote control operation. In general, this process uses information in a preset database to determine which terminal device should be controlled to perform a remote control request of a worker by searching and matching. This method ensures that the correct equipment can be controlled, improving accuracy and reliability.
Therefore, by searching the remote control content in the preset database, the target terminal device corresponding to the remote control content can be rapidly determined. This reduces response time and improves real-time. The corresponding relation between the remote control content and the terminal equipment is prestored in the preset database, so that accurate results can be obtained in each search, and the possibility of misjudgment is reduced. Since the data in the database is stored and verified in advance, the accuracy and reliability of the data can be ensured. This increases the reliability of operation, reducing erroneous operation due to erroneous matching. The structure and content of the preset database can be modified and maintained as required. This reduces maintenance costs and complexity, allowing for adjustments and optimizations to be made according to actual needs. The data in the preset database can be encrypted and backed up to ensure the safety and the integrity of the data. This increases security against data loss or tampering.
And S140, sending a control instruction to the target terminal equipment so that the target terminal equipment executes corresponding operation according to the control instruction, wherein the control instruction comprises a signal scram instruction, an operation scram instruction and a hydraulic station unloading instruction.
Specifically, after the target terminal device is determined, the wireless remote controller sends a control instruction to the device. These control instructions are generated based on the remote control requests of the staff and the results of the wireless remote control analysis. The content of the control command can be various, including but not limited to a signal emergency stop command, an operation emergency stop command, a hydraulic station unloading command and the like. The instructions are determined according to the type and function of the target terminal device. And after the target terminal equipment receives the control instruction, executing corresponding operation according to the content of the instruction. For example, if the received instruction is a signal scram instruction, the target terminal device may immediately stop the current signal output; if the command is an operation scram command, the equipment can stop moving immediately or change the motion state; in the case of a hydraulic station unload command, the hydraulic station may immediately unload or stop operating.
Therefore, through remote control operation of the wireless remote controller, workers can operate in places far away from the mine, and the need of entering the mine is avoided. This not only improves work efficiency, but also reduces the exposure time of the staff in a harsh environment. The method can automatically analyze and determine the corresponding remote control content according to the remote control request and determine the target terminal equipment. This simplifies the operation flow, so that the worker can perform the operation more quickly and accurately. The method provides various control instructions including a signal emergency stop instruction, an operating emergency stop instruction and a hydraulic station unloading instruction. These instructions can cope with various emergency situations and ensure the safety of equipment and personnel. Therefore, no direct contact equipment is needed for the staff, the damage probability of the direct contact is reduced, and the work efficiency of the staff is improved conveniently.
In one possible implementation manner, determining the target terminal device according to the remote control content specifically includes: acquiring first remote control content which is signal scram content and/or operation scram content; determining target terminal equipment as a signal lamp and/or a car operating device according to the signal emergency stop content and/or the car operating emergency stop content; the method for sending the control instruction to the target terminal equipment specifically comprises the following steps: and sending a signal scram instruction to the signal lamp so as to enable the signal lamp to execute signal scram operation, and/or sending an operation scram instruction to the operation vehicle so as to enable the operation vehicle to execute operation scram operation.
Specifically, first, the wireless remote controller acquires first remote control content, and the content is specific to signal emergency stop content and/or operation emergency stop content. These directly reflect the particular operations that the worker wants to perform. The wireless remote controller determines a target terminal device according to the first remote control content. If the first remote control content is signal scram content, the target terminal device is a signal lamp; if the content is the emergency stop content of the vehicle operation, the target terminal equipment is the vehicle operation. Then, the wireless remote controller sends a corresponding control instruction to the target terminal device. If the target is a signal lamp, a signal scram instruction is sent; if the target is a car operation, a car operation scram command is sent. And after receiving the control instruction, the target terminal equipment executes corresponding operation. For signal lights, it will perform signal scram operations; for the car operation, it will execute the car operation scram operation.
For example, assume that a worker issues a request for "stop signal lamp immediately and operation of a car" through a wireless remote controller. The wireless remote controller firstly acquires the first remote control content in the request, namely signal scram content and car operating scram content. Then, the wireless remote controller determines the target terminal equipment as a signal lamp and a car operating device according to the contents. Then, the wireless remote controller sends a signal emergency stop instruction and an operation emergency stop instruction to the signal lamp and the operation vehicle respectively. And finally, the signal lamp and the car operating device respectively receive the control instructions and execute corresponding emergency stop operation, so that the safety of equipment and personnel is ensured.
In one possible implementation manner, a monitoring image sent by a monitoring device and aimed at a terminal device is received; analyzing the monitoring image by adopting a preset analysis model to obtain an analysis result; if the analysis result is determined to indicate that the terminal equipment is abnormal, generating alarm data; and displaying the alarm data.
Specifically, the wireless remote controller acquires a real-time monitoring image of the terminal device by receiving image data from the monitoring device. The image data may be in the form of a video stream containing real-time pictures of the terminal device. And the wireless remote controller analyzes the monitoring image by using a preset analysis model. This analytical model may be preconfigured to detect and identify specific abnormal situations or conditions. By analyzing the image content, the wireless remote controller can detect whether the terminal device has abnormal conditions, such as device faults, abnormal operation or abnormal states. If the analysis result shows that the terminal equipment is abnormal, the wireless remote controller can generate corresponding alarm data. The alarm data may be in the form of text, audio or video, etc. for indicating the type, location and severity of the anomaly. And finally, the wireless remote controller displays the generated alarm data so that the staff can know and respond to the abnormal situation in time. The manner of presentation may be an audible alert, a screen display, a push notification, etc., depending on the design of the wireless remote control and the needs of the staff.
For example, assume that a monitoring device monitors a signal lamp in real time and transmits a monitoring image to a wireless remote controller. And after the wireless remote controller receives the images, carrying out real-time analysis by using a preset analysis model. If the analysis result shows that a certain part of the signal lamp has a fault or abnormally flickers, the wireless remote controller can generate corresponding alarm data, such as 'signal lamp fault'. The wireless remote control then presents this alarm information to the staff in the form of an audible warning or screen pop-up. After receiving the alarm information, the staff can immediately take measures to handle abnormal conditions, so that the safety of equipment and production lines is ensured.
In one possible implementation, before analyzing the monitoring image by using a preset analysis model to obtain an analysis result, training the preset analysis model; training a preset analysis model, which specifically comprises: acquiring training information, wherein the training information comprises a monitoring image and an analysis result; inputting training information into a self-adaptive feature fusion network for training to obtain a first training result; the first training result and the training information are overlapped and standardized to obtain a second training result; inputting the second training result into the self-adaptive feature fusion network for processing to obtain a third training result; and superposing and standardizing the third training result and the second training result until a training information similarity matrix is output, wherein the training information similarity matrix meets the preset logistic regression condition.
Specifically, first, training information including a monitoring image and an analysis result needs to be acquired. The monitoring images are raw data for training, and the analysis results are the results of pre-analysis of these images for guiding training of the model. Next, training information is input into the adaptive feature fusion network for training. The adaptive feature fusion network is a deep learning model for extracting and fusing features from the original image to better identify and classify anomalies. And after each training iteration, overlapping and standardizing the first training result and the training information. The purpose of this step is to adjust the scale and scope of the training results to make them more suitable for subsequent network input and training. And inputting the standardized training result into the self-adaptive feature fusion network again for processing to obtain a third training result. This process is repeated until a predetermined condition is satisfied, such as outputting a training information similarity matrix. The training information similarity matrix represents the similarity of the input image to known anomaly types. This matrix needs to satisfy preset logistic regression conditions to ensure that the model can accurately classify and identify anomalies.
Therefore, by repeatedly superposing and standardizing the training result and the original training information, the performance and accuracy of the model can be gradually improved. This approach ensures that the model is continually optimized and improved during the training process. By satisfying the preset logistic regression condition, consistency and reliability of the output result can be ensured. This helps to improve the accuracy and reliability of the analysis and alarm.
In one possible implementation manner, the monitoring image is analyzed by adopting a preset analysis model to obtain an analysis result, which specifically includes: inputting the monitoring image into a preset analysis model to obtain an output result; acquiring a historical operation image of the terminal equipment, wherein the historical operation image comprises an abnormal phenomenon set, and the abnormal phenomenon set comprises signal lamp abnormal phenomena, vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena; identifying an output result, and determining a target abnormal phenomenon, wherein the target abnormal phenomenon is at least one of signal lamp abnormal phenomenon, vehicle operation abnormal phenomenon and hydraulic station load abnormal phenomenon, and is used for indicating that the terminal equipment is abnormal; and obtaining an analysis result according to the target abnormal phenomenon.
Specifically, first, the wireless remote controller inputs the received monitoring image into a preset analysis model. This model has been trained to extract useful features and information from the image. Meanwhile, the wireless remote controller can acquire a history operation image related to the current monitoring image. These historical images include anomalies that have previously occurred, such as signal lamp anomalies, vehicle handling anomalies, or hydraulic station load anomalies. And the analysis model analyzes the input monitoring image to obtain an output result. This result may be an indication of one or more anomalies. The wireless remote controller can recognize the output result and determine the abnormal phenomenon of the target. These target anomalies may be at least one of signal lamp anomalies, vehicle handling anomalies, or hydraulic station load anomalies. And generating a corresponding analysis result by the wireless remote controller according to the identified target abnormal phenomenon. This result may be one or more anomaly indications for indicating the possible occurrence of anomalies by the terminal equipment.
For example, assume an analytical model is being used to monitor a downhole road segment signal wireless remote control. The monitoring device captures a real-time image of a signal lamp and inputs it into the analysis model. Meanwhile, historical operation images of the signal lamp are also called, and the previous signal lamp faults and other abnormal conditions are recorded by the images. After the analysis model processes the input real-time image, a potential failure mode of the signal lamp is identified. This anomaly was further confirmed after comparison with the history image. And the wireless remote controller generates an analysis result according to the identified abnormal phenomenon, and indicates that the traffic signal lamp may have faults. According to the result, related personnel can perform timely inspection and maintenance, and normal operation of traffic is ensured.
The application also provides a mining intrinsic safety type remote control device, and referring to fig. 2, fig. 2 is a schematic module diagram of the mining intrinsic safety type remote control device provided by the embodiment of the application. The mining intrinsic safety type remote control device is a wireless remote control, and the wireless remote control comprises an acquisition module 21 and a processing module 22, wherein the acquisition module 21 responds to a remote control request input by a user; the processing module 22 analyzes the remote control request and determines remote control content corresponding to the remote control request; the processing module 22 determines a target terminal device according to the remote control content; the processing module 22 sends control instructions to the target terminal device, so that the target terminal device performs corresponding operations according to the control instructions, and the control instructions include a signal scram instruction, an operating scram instruction and a hydraulic station unloading instruction.
In one possible implementation, the processing module 22 analyzes the remote control request to determine remote control content corresponding to the remote control request, and specifically includes: the processing module 22 obtains text data according to the remote control request; the processing module 22 processes the text data by adopting a text fingerprint algorithm to obtain field data, wherein the field data comprises a target field; the processing module 22 calculates the similarity between the target field and the preset field; if the processing module 22 determines that the similarity is greater than or equal to the preset similarity threshold, then the target field is determined to be remote control content.
In a possible implementation manner, the processing module 22 determines the target terminal device according to the remote control content, and specifically includes: the processing module 22 searches the remote control content in a preset database, and if it is determined that the preset database contains target remote control content corresponding to the remote control content, the obtaining module 21 obtains terminal equipment corresponding to the target remote control content, and the preset database stores the corresponding relation between the remote control content and the terminal equipment in advance; the processing module 22 sets the terminal device as the target terminal device.
In a possible implementation manner, the processing module 22 determines the target terminal device according to the remote control content, and specifically includes: the acquisition module 21 acquires first remote control content, wherein the first remote control content is signal scram content and/or operation scram content; the processing module 22 determines the target terminal equipment to be a signal lamp and/or a car operating according to the signal emergency stop content and/or the car operating emergency stop content; the processing module 22 sends a control instruction to the target terminal device, specifically including: the processing module 22 sends a signal scram instruction to the signal light to cause the signal light to perform a signal scram operation and/or the processing module 22 sends an operator scram instruction to the operator to cause the operator to perform an operator scram operation.
In one possible implementation manner, the acquisition module 21 receives a monitoring image sent by a monitoring device and directed to a terminal device; the processing module 22 analyzes the monitoring image by adopting a preset analysis model to obtain an analysis result; if the processing module 22 determines that the analysis result indicates that the terminal equipment is abnormal, alarm data are generated; the processing module 22 presents the alarm data.
In one possible implementation, the processing module 22 trains the preset analysis model before analyzing the monitoring image with the preset analysis model to obtain an analysis result; the processing module 22 trains a preset analysis model, specifically including: the acquisition module 21 acquires training information including a monitoring image and an analysis result; the processing module 22 inputs the training information into the self-adaptive feature fusion network for training to obtain a first training result; the processing module 22 performs superposition and standardization processing on the first training result and the training information to obtain a second training result; the processing module 22 inputs the second training result into the adaptive feature fusion network to be processed, so as to obtain a third training result; the processing module 22 performs superposition and standardization processing on the third training result and the second training result until a training information similarity matrix is output, where the training information similarity matrix meets a preset logistic regression condition.
In one possible implementation, the processing module 22 analyzes the monitored image by using a preset analysis model to obtain an analysis result, which specifically includes: the processing module 22 inputs the monitoring image into a preset analysis model to obtain an output result; the acquisition module 21 acquires a historical operation image of the terminal equipment, wherein the historical operation image comprises an abnormal phenomenon set, and the abnormal phenomenon set comprises signal lamp abnormal phenomena, vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena; the processing module 22 identifies the output result, determines a target abnormal phenomenon, wherein the target abnormal phenomenon is at least one of signal lamp abnormal phenomenon, vehicle operation abnormal phenomenon and hydraulic station load abnormal phenomenon, and is used for indicating the abnormality of the terminal equipment; the processing module 22 obtains an analysis result according to the target anomaly.
It should be noted that: in the device provided in the above embodiment, when implementing the functions thereof, only the division of the above functional modules is used as an example, in practical application, the above functional allocation may be implemented by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to implement all or part of the functions described above. In addition, the embodiments of the apparatus and the method provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the embodiments of the method are detailed in the method embodiments, which are not repeated herein.
The application further provides an electronic device, and referring to fig. 3, fig. 3 is a schematic structural diagram of the electronic device provided in the embodiment of the application. The electronic device may include: at least one processor 31, at least one network interface 34, a user interface 33, a memory 35, at least one communication bus 32.
Wherein the communication bus 32 is used to enable connected communication between these components.
The user interface 33 may include a Display screen (Display) and a Camera (Camera), and the optional user interface 33 may further include a standard wired interface and a standard wireless interface.
The network interface 34 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Wherein the processor 31 may comprise one or more processing cores. The processor 31 connects various parts within the overall server using various interfaces and lines, performs various functions of the server and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 35, and invoking data stored in the memory 35. Alternatively, the processor 31 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 31 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), an image processor (Graphics Processing Unit, GPU), and a modem etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 31 and may be implemented by a single chip.
The Memory 35 may include a random access Memory (Random Access Memory, RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 35 includes a non-transitory computer readable medium (non-transitory computer-readable storage medium). Memory 35 may be used to store instructions, programs, code sets, or instruction sets. The memory 35 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the above-described respective method embodiments, etc.; the storage data area may store data or the like involved in the above respective method embodiments. The memory 35 may alternatively be at least one memory device located remotely from the aforementioned processor 31. As shown in fig. 3, an operating system, a network communication module, a user interface module, and an application program of a mining intrinsic safety type remote control method may be included in the memory 35 as a computer storage medium.
In the electronic device shown in fig. 3, the user interface 33 is mainly used for providing an input interface for a user, and acquiring data input by the user; and processor 31 may be configured to invoke an application program in memory 35 that stores a mining intrinsically safe remote control method, which when executed by one or more processors, causes the electronic device to perform the method as in one or more of the embodiments described above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
The present application also provides a computer-readable storage medium having instructions stored thereon. When executed by one or more processors, cause an electronic device to perform the method as described in one or more of the embodiments above.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided herein, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as a division of units, merely a division of logic functions, and there may be additional divisions in actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some service interface, device or unit indirect coupling or communication connection, electrical or otherwise.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned memory includes: various media capable of storing program codes, such as a U disk, a mobile hard disk, a magnetic disk or an optical disk.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the scope of the present disclosure. That is, equivalent changes and modifications are contemplated by the teachings of this disclosure, which fall within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a scope and spirit of the disclosure being indicated by the claims.

Claims (10)

1. The mining intrinsic safety type remote control method is characterized by being applied to a wireless remote controller, and comprises the following steps:
responding to a remote control request input by a user;
analyzing the remote control request and determining remote control content corresponding to the remote control request;
determining target terminal equipment according to the remote control content;
and sending a control instruction to the target terminal equipment so that the target terminal equipment executes corresponding operation according to the control instruction, wherein the control instruction comprises a signal scram instruction, an operation scram instruction and a hydraulic station unloading instruction.
2. The mining intrinsic safety type remote control method according to claim 1, wherein the analyzing the remote control request to determine the remote control content corresponding to the remote control request specifically comprises:
obtaining text data according to the remote control request;
processing the text data by adopting a text fingerprint algorithm to obtain field data, wherein the field data comprises a target field;
calculating the similarity between the target field and a preset field;
and if the similarity is determined to be greater than or equal to a preset similarity threshold, determining the target field as the remote control content.
3. The mining intrinsic safety type remote control method according to claim 1, wherein the determining the target terminal device according to the remote control content specifically comprises:
searching the remote control content in a preset database, and if the target remote control content corresponding to the remote control content exists in the preset database, acquiring terminal equipment corresponding to the target remote control content, wherein the corresponding relation between the remote control content and the terminal equipment is stored in the preset database in advance;
and setting the terminal equipment as target terminal equipment.
4. The mining intrinsic safety type remote control method according to claim 1, wherein the determining the target terminal device according to the remote control content specifically comprises:
acquiring first remote control content, wherein the first remote control content is signal scram content and/or operation scram content;
determining that the target terminal equipment is a signal lamp and/or a car operating device according to the signal scram content and/or the car operating scram content;
the sending a control instruction to the target terminal device specifically includes:
transmitting the signal scram instruction to the signal lamp, so that the signal lamp executes signal scram operation, and/or,
and sending the operation emergency stop instruction to the operation vehicle so that the operation vehicle executes the operation vehicle emergency stop operation.
5. The mining intrinsically-safe remote control of claim 1, further including:
receiving a monitoring image sent by monitoring equipment and aiming at the terminal equipment;
analyzing the monitoring image by adopting a preset analysis model to obtain an analysis result;
if the analysis result indicates that the terminal equipment is abnormal, generating alarm data;
and displaying the alarm data.
6. The mining intrinsic safety type remote control method according to claim 5, wherein the preset analysis model is trained before the monitoring image is analyzed by the preset analysis model to obtain an analysis result; the training of the preset analysis model specifically comprises the following steps:
acquiring training information, wherein the training information comprises a monitoring image and an analysis result;
inputting the training information into a self-adaptive feature fusion network for training to obtain a first training result;
superposing and standardizing the first training result and the training information to obtain a second training result;
inputting the second training result into the self-adaptive feature fusion network for processing to obtain a third training result;
and superposing and standardizing the third training result and the second training result until the training information similarity matrix is output, wherein the training information similarity matrix meets a preset logistic regression condition.
7. The mining intrinsic safety type remote control method according to claim 5, wherein the analyzing the monitoring image by using a preset analysis model to obtain an analysis result specifically comprises:
Inputting the monitoring image into the preset analysis model to obtain an output result;
acquiring a historical operation image of the terminal equipment, wherein the historical operation image comprises an abnormal phenomenon set, and the abnormal phenomenon set comprises signal lamp abnormal phenomena, vehicle operation abnormal phenomena and hydraulic station load abnormal phenomena;
identifying the output result, and determining a target abnormal phenomenon, wherein the target abnormal phenomenon is at least one of signal lamp abnormal phenomenon, car operating abnormal phenomenon and hydraulic station load abnormal phenomenon, and is used for indicating the terminal equipment to be abnormal;
and obtaining the analysis result according to the target abnormal phenomenon.
8. The mining intrinsic safety type remote control device is characterized in that the mining intrinsic safety type remote control device is a wireless remote control, the wireless remote control comprises an acquisition module (21) and a processing module (22), wherein,
-said acquisition module (21) for responding to a remote control request entered by a user;
the processing module (22) is used for analyzing the remote control request and determining remote control content corresponding to the remote control request;
the processing module (22) is further used for determining target terminal equipment according to the remote control content;
The processing module (22) is further configured to send a control instruction to the target terminal device, so that the target terminal device executes a corresponding operation according to the control instruction, where the control instruction includes a signal scram instruction, an operating scram instruction, and a hydraulic station unloading instruction.
9. An electronic device, characterized in that the electronic device comprises a processor (31), a memory (35), a user interface (33) and a network interface (34), the memory (35) being adapted to store instructions, the user interface (33) and the network interface (34) being adapted to communicate to other devices, the processor (31) being adapted to execute the instructions stored in the memory (35) to cause the electronic device to perform the method according to any one of claims 1 to 7.
10. A computer readable storage medium storing instructions which, when executed, perform the method of any one of claims 1 to 7.
CN202311835698.4A 2023-12-28 2023-12-28 Mining intrinsic safety type remote control method and device and electronic equipment Pending CN117542184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311835698.4A CN117542184A (en) 2023-12-28 2023-12-28 Mining intrinsic safety type remote control method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311835698.4A CN117542184A (en) 2023-12-28 2023-12-28 Mining intrinsic safety type remote control method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN117542184A true CN117542184A (en) 2024-02-09

Family

ID=89792219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311835698.4A Pending CN117542184A (en) 2023-12-28 2023-12-28 Mining intrinsic safety type remote control method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN117542184A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003330483A (en) * 2002-05-09 2003-11-19 Matsushita Electric Ind Co Ltd Voice input device, equipment to be controlled, and voice control system
CN106057203A (en) * 2016-05-24 2016-10-26 深圳市敢为软件技术有限公司 Precise voice control method and device
CN106792031A (en) * 2017-01-06 2017-05-31 深圳创维-Rgb电子有限公司 A kind of method and apparatus for controlling peripheral equipment of television
KR20190016260A (en) * 2017-08-08 2019-02-18 엘지전자 주식회사 System for controlling domestic applicances and Method for controlling the same
CN111856962A (en) * 2020-08-13 2020-10-30 郑州智利信信息技术有限公司 Intelligent home control system based on cloud computing
CN113240896A (en) * 2021-06-10 2021-08-10 天地上海采掘装备科技有限公司 Intrinsic safety type wireless charging remote controller for coal mine
CN115016336A (en) * 2022-05-09 2022-09-06 华中科技大学 Intelligent control system and method for fully mechanized coal mining face
CN117149569A (en) * 2023-09-01 2023-12-01 深圳市倍联德实业有限公司 Board running state early warning method and device and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003330483A (en) * 2002-05-09 2003-11-19 Matsushita Electric Ind Co Ltd Voice input device, equipment to be controlled, and voice control system
CN106057203A (en) * 2016-05-24 2016-10-26 深圳市敢为软件技术有限公司 Precise voice control method and device
CN106792031A (en) * 2017-01-06 2017-05-31 深圳创维-Rgb电子有限公司 A kind of method and apparatus for controlling peripheral equipment of television
KR20190016260A (en) * 2017-08-08 2019-02-18 엘지전자 주식회사 System for controlling domestic applicances and Method for controlling the same
CN111856962A (en) * 2020-08-13 2020-10-30 郑州智利信信息技术有限公司 Intelligent home control system based on cloud computing
CN113240896A (en) * 2021-06-10 2021-08-10 天地上海采掘装备科技有限公司 Intrinsic safety type wireless charging remote controller for coal mine
CN115016336A (en) * 2022-05-09 2022-09-06 华中科技大学 Intelligent control system and method for fully mechanized coal mining face
CN117149569A (en) * 2023-09-01 2023-12-01 深圳市倍联德实业有限公司 Board running state early warning method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN108391086B (en) Industrial video linkage analysis method and system integrating event perception and position sensing
US20200074769A1 (en) Vehicle Fault Handling Method, Apparatus, Device and Storage Medium
US8949015B2 (en) Apparatus and method for preventing collision between vessels
CN105574683A (en) Omni-directional transformer station inspection system and method
CN107318039B (en) Intelligent popup window monitoring and warning system
CN112698618A (en) Server alarm recognition system based on machine vision technology
KR20190108960A (en) Industrial Site Safety Management System
CN112991669A (en) Dangerous operation early warning method, system, storage medium and processing terminal
CN113902233A (en) Vehicle safety early warning method, big data platform device, vehicle-mounted terminal and vehicle
KR102219809B1 (en) Safety Work Management System by Image Analysis
CN110790137A (en) Monitoring system and monitoring method for crane operation
CN116859800A (en) Production workshop safety monitoring system and method based on complex event stream
KR102635902B1 (en) Situational awareness and safety management system for each work process at construction sites using AI robots
CN115766401B (en) Industrial alarm information analysis method and device, electronic equipment and computer medium
CN117542184A (en) Mining intrinsic safety type remote control method and device and electronic equipment
CN117149569A (en) Board running state early warning method and device and electronic equipment
KR20190091757A (en) Monitoring system and method for fire disaster prevention
CN112151195A (en) Method and device for checking potential safety hazards of power distribution equipment
CN116644962A (en) Risk assessment method and device for building construction supervision based on artificial intelligence
JP2017013578A (en) Train operation management system and train operation management method
KR101879943B1 (en) Tunnel traffic safety prevent disasters integrated management apparatus and method
CN116310521A (en) Abnormality detection method, abnormality detection device, abnormality detection storage medium, abnormality detection electronic device, abnormality detection system, abnormality detection program, and recording medium
CN114493196A (en) Data analysis method, system, electronic equipment and storage medium
CN113852915A (en) Subway station equipment control method and device, electronic equipment and storage medium
CN117579788B (en) Oil discharge monitoring method, system and storage medium for AI-based gas station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination