CN117579625A - Inspection task pre-distribution method for double prevention mechanism - Google Patents

Inspection task pre-distribution method for double prevention mechanism Download PDF

Info

Publication number
CN117579625A
CN117579625A CN202410067840.3A CN202410067840A CN117579625A CN 117579625 A CN117579625 A CN 117579625A CN 202410067840 A CN202410067840 A CN 202410067840A CN 117579625 A CN117579625 A CN 117579625A
Authority
CN
China
Prior art keywords
task
data
calculation
risk
inspection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410067840.3A
Other languages
Chinese (zh)
Other versions
CN117579625B (en
Inventor
李爽
薛广哲
许锟
鹿乘
韩世锋
黄晨晨
程德强
贺超
梁敏富
刘娇
张祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202410067840.3A priority Critical patent/CN117579625B/en
Publication of CN117579625A publication Critical patent/CN117579625A/en
Application granted granted Critical
Publication of CN117579625B publication Critical patent/CN117579625B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Mining
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/20Checking timed patrols, e.g. of watchman
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention relates to a routing inspection task pre-distribution method for a dual prevention mechanism, which comprises the steps that a remote server configures routing inspection tasks, and the routing inspection tasks acquire calculation results of the routing inspection tasks based on a configured algorithm model. And the edge side server determines input sources configured in the inspection area according to the inspection task and the input of the algorithm model. And the remote server constructs a calculation task containing the risk data according to the historical data acquired by the input source, and the calculation task is executed by the calculation nodes configured at the edge side. The remote server obtains the reliability of the input source data according to the calculation result of the calculation task, determines the input source with the same result of the calculation task and the expected risk attribute of the risk data as the reliable input source, constructs a patrol sequence based on the terminal accessed by the reliable input source, and distributes the patrol sequence based on the load of the terminal. The problem of whether a downhole model is reliable is identified by randomly introducing noise and risk factors.

Description

Inspection task pre-distribution method for double prevention mechanism
Technical Field
The invention relates to a data processing method, in particular to a routing inspection task pre-distribution method for a dual prevention mechanism.
Background
Along with the digital transformation of the national energy industry field and the explosive growth of large data in the industry field and the continuous improvement of demands on mass data acquisition, convergence, excavation, analysis and the like, the data scale is rapidly increased, the data attribute dimension is also increased, the data analysis time is prolonged, and the calculation complexity is also rapidly improved. The multi-dimensional characteristic attribute of the data is mined, the design is reasonable and efficient, the expansibility is strong, the self-adaptive big data intelligent analysis and calculation method and the calculation task scheduling management system are adopted, users do not need to pay attention to details of creation, scheduling and execution links of tasks, whether the calculation resource allocation is reasonable, whether the resource dependence is met or not and the like, various intelligent analysis and calculation methods can be flexibly selected, more efforts are put on data analysis and service mining, and powerful guarantee is provided for the industrial data to exert the value of the industrial data.
At present, safety inspection is involved, multiple types of models are deployed near the edge side of a mine, the reliability of the models has a large influence on risk assessment, the models are considered when risk assessment is carried out to determine the reliability of data or models, however, due to the difference of the models, the problem of determining the reliability of the models also relates to the problem of data sources, and no universal solution exists at present.
Disclosure of Invention
In order to solve the problem of reliability of a supervision end on an edge side and an underground configured model, and to identify whether the underground model is reliable or not by randomly introducing noise and risk factors, the invention provides a routing inspection task pre-distribution method for a dual prevention mechanism.
In a first aspect, the present invention provides a method for pre-distributing inspection tasks for a dual prevention mechanism, including:
the remote server configures a patrol task, and the patrol task obtains a calculation result of the patrol task based on a configured algorithm model;
the edge side server determines input sources configured in the inspection area according to the inspection task and the input of the algorithm model;
the remote server constructs a calculation task containing risk data according to the historical data acquired by the input source, and the calculation task is executed by a calculation node configured at the edge side;
the remote server obtains the reliability of the input source data according to the calculation result of the calculation task, determines the input source with the same result of the calculation task and the expected risk attribute of the risk data as the reliable input source, constructs a patrol sequence based on the terminal accessed by the reliable input source, and distributes the patrol sequence based on the load of the terminal.
In some embodiments, the inspection tasks are performed based on multi-source sensors, and one inspection task is matched with at least two algorithmic models that receive inputs from the multi-source sensors and output risk identification results.
In some embodiments, the edge side server determining input sources configured within the inspection area based on the inspection task and the input of the algorithm model comprises: the underground control terminal acquires a sensor network arranged underground according to the type of the inspection task, determines an underground available history sensor in a designated time period according to the designated history time length of the inspection task, and selects an underground sensor which accords with the input of the algorithm model as an input source according to the input of the algorithm model.
In some embodiments, a computing node is selected on the edge side, and a computing task is offloaded at the computing node, wherein source data of the computing task is configured by a remote server and an edge side server, and the computing node communicates with the remote server through SSL when executing the computing task.
In some embodiments, the obtaining the reliability of the input source data according to the calculation result of the calculation task includes: and acquiring the risk type of the calculation task containing the risk data, and determining the reliability of the calculation model according to the difference between the calculation result and the risk type.
In some embodiments, constructing a computing task containing risk data from historical data collected by an input source comprises: and receiving the historical data collected by the input source, constructing virtual source data according to the input of the algorithm model, and using a dataset containing the historical data and the virtual source data as the input of the algorithm model to obtain a risk identification result corresponding to the dataset.
In some embodiments, computing nodes are selected on the edge side, computing tasks are offloaded at the computing nodes, wherein source data of the computing tasks are configured by a remote server, and the computing nodes communicate with the remote server through SSL when executing the computing tasks.
In some embodiments, the determining whether the computing model is reliable based on the difference in the computing result and the risk type comprises: when the risk types are consistent, the remote server builds a calculation task according to the historical data source and the algorithm model, the remote server executes the calculation task to obtain a calculation result of the risk, and the reliability of the calculation model is determined according to whether the calculation result is consistent with a report result of the mine side.
In some embodiments, when the computing results of the edge side computing model and the remote server side are inconsistent, parameters of the model are collected at the edge side and saved to the server, and a temporary model is placed at the edge side to receive input of the terminal, wherein the temporary model and the computing model parameters of the remote server side are consistent.
In some embodiments, the constructing a patrol sequence based on the terminal accessed by the reliable input source, and distributing the patrol sequence based on the load of the terminal includes: and acquiring inspection data acquired by the reliable input source, forwarding the acquired inspection data to the data gateway through a terminal accessed by the reliable input source, constructing a calculation task by the data gateway, unloading the calculation task to a calculation node, and identifying risks based on an algorithm model configured on the calculation node.
Drawings
The above and other objects, features and advantages of the present invention will become more apparent from the following description of embodiments of the present invention with reference to the accompanying drawings, in which:
fig. 1 is a flowchart of a method for pre-distributing patrol tasks for a dual prevention mechanism according to an embodiment of the present application.
Detailed Description
The disclosure will now be discussed with reference to several exemplary embodiments. It should be understood that these embodiments are discussed only to enable those of ordinary skill in the art to better understand and thus practice the present disclosure, and are not meant to imply any limitation on the scope of the present disclosure.
As used herein, the term "comprising" and variants thereof are to be interpreted as meaning "including but not limited to" open-ended terms. The term "based on" is to be interpreted as "based at least in part on". The terms "one embodiment" and "an embodiment" are to be interpreted as "at least one embodiment. The term "another embodiment" is to be interpreted as "at least one other embodiment".
In order to solve the problem of reliability of a supervision end on an edge side and an underground configured model, and to identify whether the underground model is reliable or not by randomly introducing noise and risk factors, the embodiment discloses a routing inspection task pre-distribution method for a dual prevention mechanism, which can include:
the remote server configures a patrol task, and the patrol task obtains a calculation result of the patrol task based on a configured algorithm model;
the edge side server determines input sources configured in the inspection area according to the inspection task and the input of the algorithm model;
the remote server constructs a calculation task containing risk data according to the historical data acquired by the input source, and the calculation task is executed by a calculation node configured at the edge side;
the remote server obtains the reliability of the input source data according to the calculation result of the calculation task, determines the input source with the same result of the calculation task and the expected risk attribute of the risk data as the reliable input source, constructs a patrol sequence based on the terminal accessed by the reliable input source, and distributes the patrol sequence based on the load of the terminal.
In the invention, the remote server can be a public cloud or private cloud server arranged at the cloud end, or is arranged far away from the mine in space, or is configured at the safety monitoring end.
The inspection tasks may be initiated manually by an operator, or periodically by a scheduler, or aperiodically to determine the safety of the mine. The manner of execution of the initiation may be directly initiated or may be an associated initiation.
The remote server is used for configuring the inspection task and executing the inspection task on the edge side. The edge side is a position close to a data generation source, particularly a position close to a roadway sensor side, and the data can be processed more quickly by arranging the calculation node at the position close to the roadway side. The computing power of the computing nodes near the edge side is generally weaker than that of the remote server, when the computing power is implemented by a plurality of computing nodes at the edge side, for example, by nodes arranged underground, the nodes store and utilize some but not all data for risk assessment due to the limitation of the computing power, and the sharing of the data is realized in a local industrial ring network, which is similar to the structure of fog computing. In the invention, the computing nodes close to the roadway side are servers at the edge side, the servers at the edge side contain computing nodes, the computing nodes receive the unloaded computing tasks and execute the computing tasks to obtain computing results, the computing results are synchronized with data according to rules pre-configured by the computing tasks or are sent to a designated data gateway, and the data gateway processes risk data based on the pre-configured rules.
The remote server and the edge side server are connected through, for example, a passive optical network or the internet, and perform synchronization of data. When the data is synchronized, the server at the edge side stores the locally stored data to the remote server in a periodical updating mode, so that the real-time bandwidth occupation is reduced, and the high storage cost introduced by real-time storage is reduced. The remote server may obtain historical sensor information within the roadway based on information of events, sensor types, locations of sensors, and the like. Through setting up reasonable update cycle, can make the data that the edge side kept in a reasonable scope for the data of edge side satisfies the requirement of risk calculation, makes the historical data of criticality be saved in the high in the clouds simultaneously.
When the logic subnetwork is used for connection, the servers at the edge side are connected through the route of the third layer, and the data are shared in the logic subnetwork. For example, based on the instruction of the remote server, the first node disposed on the edge side may obtain data from the second node, in order to save and monitor the resource information of the computing node on the edge side, for example, the saved resource information or the information of available computing resources, or the information of the computing model, a data gateway is further disposed on the edge side, where classifying the node according to the function of the node in the network on the edge side may include:
and (3) a terminal: one or more input sources connected to receive and forward the data;
computing node: for performing a computing task;
and (3) a control node: scheduling for computing nodes and resources within the edge-side network;
and (3) a data gateway: the node on the edge side, which is specially used for constructing the computing task, is also used for acquiring the historical data (particularly the historical environmental data collected by the sensor) or the stored real-time data which are stored on the edge side, and receiving the data forwarded by the terminal for constructing the computing task.
The above-described partitioning should be understood as a partitioning that is determined for a computing task, rather than being fixed, such as a node that is a common terminal when it receives and forwards data only to a data gateway, but that corresponds to the actual computing node for the other computing task.
In some embodiments, the inspection tasks are performed based on multi-source sensors, and one inspection task is matched with at least two algorithmic models that receive inputs from the multi-source sensors and output risk identification results.
The remote server configures a patrol task for the edge side server and is used for determining whether the environmental parameters in the coal mine tunnel correspond to the risk level. The inspection task is carried out by depending on data sources collected by a sensor network of the mine, wherein the data sources can be a gas sensor, a humidity sensor, a temperature sensor, a wind speed sensor, an image sensor and the like.
Common methods of risk level determination typically rely on input from one or more sensors, for example, the determination of gas risk levels can be made by an algorithmic model as follows:
processing the gas concentration data, wherein the gas concentration data is derived from measuring points, and a plurality of measuring points are selected on each roadway;
calculating to obtain section gas concentration distribution data of the section according to the processed gas concentration data;
obtaining a gas concentration distribution matrix according to the section gas concentration distribution data;
combining the gas concentration distribution matrix with the gas concentration distribution matrix data acquired 2min before the gas concentration matrix data to obtain a gas concentration distribution sequence;
and according to the gas concentration distribution sequence, predicting the gas concentration trend, and determining the risk level based on the predicted gas concentration.
The model used for prediction is an LSTM neural network and comprises an input layer, a hidden layer and an output layer, wherein the input layer inputs training data; the hidden layer iteratively learns the short-range and long-range characteristics of the time series data; the output layer outputs the prediction result. LSTM network parameters include learning rate, iteration number, batch size, etc.
In some embodiments, the edge side server determining input sources configured within the inspection area based on the inspection task and the input of the algorithm model comprises: the underground control terminal acquires a sensor network arranged underground according to the type of the inspection task, determines an underground available history sensor in a designated time period according to the designated history time length of the inspection task, and selects an underground sensor which accords with the input of the algorithm model as an input source according to the input of the algorithm model.
In some embodiments, a computing node is selected on the edge side, and a computing task is offloaded at the computing node, wherein source data of the computing task is configured by a remote server and an edge side server, and the computing node communicates with the remote server through SSL when executing the computing task.
In some embodiments, the obtaining the reliability of the input source data according to the calculation result of the calculation task includes: and acquiring the risk type of the calculation task containing the risk data, and determining the reliability of the calculation model according to the difference between the calculation result and the risk type.
In some embodiments, constructing a computing task containing risk data from historical data collected by an input source comprises: and receiving the historical data collected by the input source, constructing virtual source data according to the input of the algorithm model, and using a dataset containing the historical data and the virtual source data as the input of the algorithm model to obtain a risk identification result corresponding to the dataset.
The risk prediction model with multiple input sources is listed below, specifically as follows:
setting a plurality of measuring points in a roadway;
the real-time temperature T, the real-time CO concentration and the real-time smoke concentration are obtained by each measuring point;
constructing a BP network structure with forward propagation characteristics and backward propagation characteristics, wherein neurons in an input layer receive data and then transmit the data to a first layer of a hidden layer; neurons between each layer in the hidden layer adopt a fully connected form, each layer of neurons acquire information from a neuron layer before the neurons, and then the information is transmitted to a neuron layer after the neurons by using an activation function; when data arrives at the output layer, a predicted risk result is obtained.
The above algorithm model is only a common algorithm model, and it is obvious that there is a clear difference between the two network results, and when image recognition or voiceprint recognition is involved, a neural network such as a convolution layer and a multi-head attention mechanism is also used, so that multiple models and multiple models need to be deployed on the edge side to realize the judgment of the security risk. In the roadway at present, because of different sources of the models and inconsistent structures of the models, the identification results of the models for risks may be different, and the risk results may be changed due to the fact that model parameters may be changed or changed, so that challenges are brought to safety risk investigation and management in a double prevention mechanism.
Therefore, before actual risk identification is carried out, whether the local data are qualified or not and whether the identification of the algorithm model to the risk is accurate or not can be determined by testing the data with risk properties, so that ambiguity is eliminated, and resource waste caused by repeated investment of enterprises is avoided.
In some embodiments, computing nodes are selected on the edge side, computing tasks are offloaded at the computing nodes, wherein source data of the computing tasks are configured by a remote server, and the computing nodes communicate with the remote server through SSL when executing the computing tasks.
In some embodiments, constructing a computing task containing risk data from historical data collected by an input source comprises: and receiving the historical data collected by the input source, constructing virtual source data according to the input of the algorithm model, and using a dataset containing the historical data and the virtual source data as the input of the algorithm model to obtain a risk identification result corresponding to the dataset.
In some embodiments, when the computing results of the edge side computing model and the remote server side are inconsistent, parameters of the model are collected at the edge side and saved to the server, and a temporary model is placed at the edge side to receive input of the terminal, wherein the temporary model and the computing model parameters of the remote server side are consistent.
In some embodiments, the constructing a patrol sequence based on the terminal accessed by the reliable input source, and distributing the patrol sequence based on the load of the terminal includes: and acquiring inspection data acquired by the reliable input source, forwarding the acquired inspection data to the data gateway through a terminal accessed by the reliable input source, constructing a calculation task by the data gateway, unloading the calculation task to a calculation node, and identifying risks based on an algorithm model configured on the calculation node.
The risk identification is still associated with the inspection task, as described above, the inspection task is associated with one or more input sources and is associated with an algorithm model, and before the risk identification is performed, the used data source can be determined according to the configured inspection task, and corresponds to the input source in the roadway inspection area, and the data source is determined to be the input of the corresponding algorithm model; where multiple algorithm models are present, one or more of them may be selected and the configuration of the data sources performed.
And then, carrying out configuration of a calculation task containing risk data, wherein the configuration specifically comprises the steps of combining new data according to historical data and risk data acquired by an input source, determining the risk degree of the data after construction, carrying out risk identification through a calculation node configured on the edge side, and determining whether the input source data is reliable or not and whether an algorithm model is reliable or not according to a risk identification result. The historical data collected by the input source is used instead of other roadway data, so that deviation caused by overlarge difference between training data and actual data is avoided; further, the risk data here is preferably data set based on risk control indicators in the roadway, such as gas overruns, or a human image is drawn at key locations in the image so that the model can be identified as risk on the remote server side and it should be identified as risk on the edge side.
The identification process is preferably performed using multiple algorithm models, which can be used to detect when a single algorithm model fails, and by detecting multiple algorithm models to further provide reliable risk identification information when the multiple algorithm models are all valid.
When selecting different algorithm models, the corresponding input sources may not be consistent, and when constructing the data of the input sources, the data should be matched with the models according to the rules which are valid recently, and the model is matched to be consistent with the data specification required by the models, and the model is valid recently to be used for selecting available sensors, and the reason for selecting the latter is that the characteristics of part of the network determine that selecting the earlier sensors may cause data jitter, and the situation that the sensors fail may exist.
Upon selection of the completed input source, then the dimensions of the corresponding constructable risk property data are also determined, and the actual history data, herein referred to as first input data, may be obtained based on the history data of the input source, for example, obtained remotely by a remote server or locally by a data gateway, and the value or frame adjustment is performed based on the first input data to obtain data identified as a risk at the remote server side. Such as a sequenceIs identified as a normal value, but by means of a preset risk transformation matrix, it can be transformed into +.>The sequence has a risk level, e.g. divided into 3 classes of risk, where control of the rectification is required, but since the risk is not actually occurring, this proves that the model and data are valid. Other data injection methods for risk can also be realized by adjusting the numerical value, such as respectively floating the pre-sequence by 5%, so that the data obtained by monitoring the pre-sequence at the remote server side can possibly have gas concentration overrun within 5 minutes, thereby making the data risky. Other situations also include, for example, adjustment of constituent elements of the sequenceThereby making the whole risk sequence +.>Become a risk sequence. It should be appreciated that the above is merely exemplary in nature and should be adjusted in practice according to the algorithm model on the remote server side; and the data dimensions of the constructed risk properties are not consistent for different models.
When source data exists at both the remote server and the edge side, selection may be made based on traffic and bandwidth, while when partial data exists only at the remote server side, the data is synchronized by the remote server to the edge side for calculation.
The results of the computing task should be communicated with the remote server based on encryption to avoid the presence of information related to production security being compromised, intercepted or otherwise modified.
After the results of the computing task are transmitted to the remote server, the remote server may build a model to detect, where the detection is an identification of a risk level to determine the reliability of the results, rather than simply determining whether it is safe or at risk.
It will be appreciated that if the remote server or edge side is at risk to the outcome of the risk identification, but is actually safe, unless the false positive rate is too high, for example more than 50%, these will be understood to be acceptable as they can be excluded with the aid of other models.
If the remote server identifies a consistent risk result, the remote server can send an instruction to the edge side, determine that the input source is a reliable input source, acquire inspection data acquired by the reliable input source, forward the acquired inspection data to the data gateway through a terminal accessed by the reliable input source, and the data gateway constructs a calculation task and then uninstalls the calculation task to a calculation node, and identifies the risk based on an algorithm model configured on the calculation node. When the inspection data required by the inspection task can be directly accessed to the data gateway, the data gateway can be used for directly acquiring the inspection data, and the real-time data still needs to be acquired by an input source and is transmitted to the data gateway after being acquired by the terminal so as to construct and unload the calculation task. The execution mode of the task can avoid the waste of resources and improve the response speed.
If the remote server identifies inconsistent risk results, the local model is different from the remote server side to a certain extent, a temporary model can be built at the edge by taking the model of the remote server as a reference, then an instruction is sent to the edge side to store key model parameters of the edge side in the server, then an input source is determined to be a reliable input source, inspection data acquired by the reliable input source are acquired, the acquired inspection data are forwarded to a data gateway through a terminal accessed by the input source, the data gateway is unloaded to a computing node after a computing task is built, and risk identification is carried out based on an algorithm model configured on the computing node. When the inspection data required by the inspection task can be directly accessed to the data gateway, the data gateway can be used for directly acquiring the inspection data, and the real-time data still needs to be acquired by an input source and is transmitted to the data gateway after being acquired by the terminal so as to construct and unload the calculation task. The server for storing the key model parameters can be an edge side server or a remote server, and the server is required to be carried out in an isolated container when being deployed, so that unsafe calculation models are prevented from being executed or unexpected attack is prevented; after completion of the computing task, the corresponding resources should be released. In this process, the edge-side model can still identify risks according to its designed algorithm model, since it still processes information according to the planned task.
In both cases, the nodes performing the computing tasks may or may not be identical in performing the verification and in performing the actual risk identification. In particular, after the computing task with verification property is completed, the actual load of the computing node changes, and the node with low load can be selected according to the actual load so as to unload the risk identification computing task. If the waiting time caused by data transmission is longer, the original computing node can still be appointed to execute the computing task.
In the above, risk types and risk results should have different understandings, wherein risk types generally refer to risk or no risk in the present invention, while risk recognition results generally comprise five classes, 1-5 respectively, corresponding to slightly risk, moderately risk, highly risk and huge risk of conventional understanding.
Those of ordinary skill in the art will appreciate that the modules and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the apparatus and device described above may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or modules, which may be in electrical, mechanical, or other forms.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical modules, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the embodiment of the invention.
In addition, each functional module in the embodiment of the present invention may be integrated in one processing module, or each module may exist alone physically, or two or more modules may be integrated in one module.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method for energy saving signal transmission/reception of the various embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the invention referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the invention. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.
It should be understood that, the sequence numbers of the steps in the summary and the embodiments of the present invention do not necessarily mean the order of execution, and the execution order of the processes should be determined by the functions and the internal logic, and should not be construed as limiting the implementation process of the embodiments of the present invention. The foregoing description of implementations of the present disclosure has been presented for purposes of illustration and description. The foregoing description is not intended to be exhaustive or to limit the disclosure to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the disclosure. The embodiments were chosen and described in order to explain the principles of the present disclosure and its practical application to enable one skilled in the art to utilize the present disclosure in various embodiments and with various modifications as are suited to the particular use contemplated.

Claims (10)

1. The routing inspection task pre-distribution method for the double prevention mechanism is characterized by comprising the following steps of:
the remote server configures a patrol task, and the patrol task obtains a calculation result of the patrol task based on a configured algorithm model;
the edge side server determines input sources configured in the inspection area according to the inspection task and the input of the algorithm model;
the remote server constructs a calculation task containing risk data according to the historical data acquired by the input source, and the calculation task is executed by a calculation node configured at the edge side;
the remote server obtains the reliability of the input source data according to the calculation result of the calculation task, determines the input source with the same result of the calculation task and the expected risk attribute of the risk data as the reliable input source, constructs a patrol sequence based on the terminal accessed by the reliable input source, and distributes the patrol sequence based on the load of the terminal.
2. The method for pre-distributing inspection tasks for dual prevention mechanisms of claim 1 wherein said inspection tasks are performed based on multi-source sensors and one inspection task is matched with at least two algorithmic models that receive inputs from the multi-source sensors and output risk identification results.
3. The inspection task pre-distribution method for a dual prevention mechanism according to claim 1, wherein the edge side server determining input sources configured in the inspection area according to the inspection task and the input of the algorithm model comprises: the underground control terminal acquires a sensor network arranged underground according to the type of the inspection task, determines an underground available historical sensor in a designated period according to the designated historical time of the inspection task, and selects an underground sensor conforming to the input of the algorithm model as an input source according to the input of the algorithm model and the underground available historical sensor.
4. The method for pre-distributing inspection tasks for dual prevention mechanism of claim 1 wherein constructing a computing task containing risky data from historical data collected from an input source comprises: and receiving the historical data collected by the input source, constructing virtual source data according to the input of the algorithm model, and using a dataset containing the historical data and the virtual source data as the input of the algorithm model to obtain a risk identification result corresponding to the dataset.
5. The method for pre-distributing patrol tasks for dual prevention mechanism according to claim 4 wherein said edge side configured computing node performing a computing task comprises:
selecting a computing node at the edge side, and unloading the computing task at the computing node, wherein the source data of the computing task is configured by a remote server, and the computing node communicates with the remote server through SSL when executing the computing task.
6. The method for pre-distributing inspection tasks for dual prevention mechanism as recited in claim 4 wherein computing nodes are selected at an edge side and computing tasks are offloaded at the computing nodes, wherein source data of the computing tasks are configured by a remote server and an edge side server, and wherein the computing nodes communicate with the remote server via SSL when executing the computing tasks.
7. The method for pre-distributing inspection tasks for dual prevention mechanism as defined in claim 1 wherein said obtaining the reliability of the input source data based on the calculation result of the calculation task comprises: and acquiring the risk type of the calculation task containing the risk data, and determining the reliability of the calculation model according to the difference between the calculation result and the risk type.
8. The method for pre-distributing inspection tasks for a dual prevention mechanism of claim 7 wherein said determining whether a computational model is reliable based on differences in computational results and risk types comprises: when the risk types are consistent, the remote server builds a calculation task according to the historical data source and the algorithm model, the remote server executes the calculation task to obtain a calculation result of the risk, and the reliability of the calculation model is determined according to whether the calculation result is consistent with a report result of the mine side.
9. The method for pre-distributing inspection tasks for dual preventive mechanism according to claim 7, wherein when the calculation results of the edge side calculation model and the remote server side are not consistent, parameters of the model are collected at the edge side and stored in the server, and a temporary model is stored at the edge side to receive input of the terminal, wherein the temporary model and the calculation model parameters of the remote server side are consistent.
10. The method for pre-distributing patrol tasks for dual prevention mechanism according to claim 7, wherein said constructing a patrol sequence based on a terminal to which a reliable input source is connected, distributing the patrol sequence based on a load of the terminal comprises: and acquiring inspection data acquired by the reliable input source, forwarding the acquired inspection data to the data gateway through a terminal accessed by the reliable input source, constructing a calculation task by the data gateway, unloading the calculation task to a calculation node, and identifying risks based on an algorithm model configured on the calculation node.
CN202410067840.3A 2024-01-17 2024-01-17 Inspection task pre-distribution method for double prevention mechanism Active CN117579625B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410067840.3A CN117579625B (en) 2024-01-17 2024-01-17 Inspection task pre-distribution method for double prevention mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410067840.3A CN117579625B (en) 2024-01-17 2024-01-17 Inspection task pre-distribution method for double prevention mechanism

Publications (2)

Publication Number Publication Date
CN117579625A true CN117579625A (en) 2024-02-20
CN117579625B CN117579625B (en) 2024-04-09

Family

ID=89884902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410067840.3A Active CN117579625B (en) 2024-01-17 2024-01-17 Inspection task pre-distribution method for double prevention mechanism

Country Status (1)

Country Link
CN (1) CN117579625B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN213399929U (en) * 2020-11-26 2021-06-08 兰州理工大学 Landslide monitoring system
CN113282368A (en) * 2021-05-25 2021-08-20 国网湖北省电力有限公司检修公司 Edge computing resource scheduling method for substation inspection
CN114169656A (en) * 2020-09-11 2022-03-11 中国石油化工股份有限公司 Drilling stuck risk early warning method and system based on adjacent well historical data
CN114240101A (en) * 2021-12-02 2022-03-25 支付宝(杭州)信息技术有限公司 Risk identification model verification method, device and equipment
CN114320469A (en) * 2021-12-27 2022-04-12 中国矿业大学 Cloud-edge intelligence-based underground hazard source detection method
CN114373245A (en) * 2021-12-16 2022-04-19 南京南自信息技术有限公司 Intelligent inspection system based on digital power plant
WO2022213565A1 (en) * 2021-04-07 2022-10-13 全球能源互联网研究院有限公司 Review method and apparatus for prediction result of artificial intelligence model
CN115545198A (en) * 2022-11-25 2022-12-30 成都信息工程大学 Edge intelligent collaborative inference method and system based on deep learning model
CN115695541A (en) * 2022-09-28 2023-02-03 上海东普信息科技有限公司 Method, device and equipment for monitoring dot polling based on edge calculation and storage medium
CN116109058A (en) * 2022-11-28 2023-05-12 南方电网电力科技股份有限公司 Substation inspection management method and device based on deep reinforcement learning
CN116310922A (en) * 2021-12-17 2023-06-23 中国石油化工股份有限公司 Petrochemical plant area monitoring video risk identification method, system, electronic equipment and storage medium
CN116486507A (en) * 2023-04-26 2023-07-25 新奥(中国)燃气投资有限公司 Municipal pipe network inspection system
US20230260334A1 (en) * 2020-07-29 2023-08-17 Sony Group Corporation Systems, devices and methods for operating a vehicle with sensors monitoring parameters
CN117294022A (en) * 2023-11-23 2023-12-26 国网山东省电力公司济南供电公司 Substation inspection system and method based on cooperation of multi-source sensors
CN117409527A (en) * 2023-10-26 2024-01-16 深圳微能聚力物联科技有限公司 Fire safety detection system based on edge cloud cooperation

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230260334A1 (en) * 2020-07-29 2023-08-17 Sony Group Corporation Systems, devices and methods for operating a vehicle with sensors monitoring parameters
CN114169656A (en) * 2020-09-11 2022-03-11 中国石油化工股份有限公司 Drilling stuck risk early warning method and system based on adjacent well historical data
CN213399929U (en) * 2020-11-26 2021-06-08 兰州理工大学 Landslide monitoring system
WO2022213565A1 (en) * 2021-04-07 2022-10-13 全球能源互联网研究院有限公司 Review method and apparatus for prediction result of artificial intelligence model
CN113282368A (en) * 2021-05-25 2021-08-20 国网湖北省电力有限公司检修公司 Edge computing resource scheduling method for substation inspection
CN114240101A (en) * 2021-12-02 2022-03-25 支付宝(杭州)信息技术有限公司 Risk identification model verification method, device and equipment
CN114373245A (en) * 2021-12-16 2022-04-19 南京南自信息技术有限公司 Intelligent inspection system based on digital power plant
CN116310922A (en) * 2021-12-17 2023-06-23 中国石油化工股份有限公司 Petrochemical plant area monitoring video risk identification method, system, electronic equipment and storage medium
CN114320469A (en) * 2021-12-27 2022-04-12 中国矿业大学 Cloud-edge intelligence-based underground hazard source detection method
CN115695541A (en) * 2022-09-28 2023-02-03 上海东普信息科技有限公司 Method, device and equipment for monitoring dot polling based on edge calculation and storage medium
CN115545198A (en) * 2022-11-25 2022-12-30 成都信息工程大学 Edge intelligent collaborative inference method and system based on deep learning model
CN116109058A (en) * 2022-11-28 2023-05-12 南方电网电力科技股份有限公司 Substation inspection management method and device based on deep reinforcement learning
CN116486507A (en) * 2023-04-26 2023-07-25 新奥(中国)燃气投资有限公司 Municipal pipe network inspection system
CN117409527A (en) * 2023-10-26 2024-01-16 深圳微能聚力物联科技有限公司 Fire safety detection system based on edge cloud cooperation
CN117294022A (en) * 2023-11-23 2023-12-26 国网山东省电力公司济南供电公司 Substation inspection system and method based on cooperation of multi-source sensors

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李爽 等: ""煤矿智能双重预防机制与智能安全管控平台研究"", 《煤炭科学技术》, 31 January 2023 (2023-01-31), pages 464 - 473 *
毛小付 等: ""瑞垟二级水电站双重预防机制建设技术探索"", 《水电站机电技术》, 30 June 2023 (2023-06-30), pages 139 - 141 *

Also Published As

Publication number Publication date
CN117579625B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
Hanselmann et al. CANet: An unsupervised intrusion detection system for high dimensional CAN bus data
CN107589695B (en) Train set fault prediction and health management system
US7693589B2 (en) Anomaly anti-pattern
BR112021011377A2 (en) SECURITY METHODS AND SYSTEMS
US20210012508A1 (en) Identifying targets within images
CN110345934A (en) Open interface is provided for navigation system
US7756593B2 (en) Anomaly anti-pattern
CN116468186B (en) Flight delay time prediction method, electronic equipment and storage medium
CN114584571B (en) Space calculation technology-based digital twin synchronous communication method for power grid station
US20210365762A1 (en) Detecting behavior patterns utilizing machine learning model trained with multi-modal time series analysis of diagnostic data
Christos et al. Combined multi-layered big data and responsible AI techniques for enhanced decision support in Shipping
CN117579625B (en) Inspection task pre-distribution method for double prevention mechanism
Elsayed et al. AdaptIDS: Adaptive intrusion detection for mission-critical aerospace vehicles
CN112822184B (en) Unsupervised autonomous attack detection method in endogenous security system
CN112307674A (en) Low-altitude target knowledge assisted intelligent electromagnetic sensing method, system and storage medium
WO2023159812A1 (en) Method and apparatus for detecting ami network intrusion, and medium
Balaji et al. CANLite: Anomaly detection in controller area networks with multitask learning
CN115829536A (en) Gradual faults in power networks
EP2909687B1 (en) System testing algorithm and apparatus
Axon et al. Securing Autonomous Air Traffic Management: Blockchain Networks Driven by Explainable AI
CN117725619B (en) Data sharing method, device, computer equipment, chip and readable storage medium
CN117523499B (en) Forest fire prevention monitoring method and system based on Beidou positioning and sensing
Frid et al. Architecture of modular system for assessing security of telemetry information transmission system
CN117216722B (en) Sensor time sequence data-based multi-source heterogeneous data fusion system
US20240037426A1 (en) Automatic dependent surveillance broadcast (ads-b) system providing anomaly detection and related methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant