CN118316748A - Paperless conference control system - Google Patents

Paperless conference control system Download PDF

Info

Publication number
CN118316748A
CN118316748A CN202311820861.XA CN202311820861A CN118316748A CN 118316748 A CN118316748 A CN 118316748A CN 202311820861 A CN202311820861 A CN 202311820861A CN 118316748 A CN118316748 A CN 118316748A
Authority
CN
China
Prior art keywords
participants
time
voting
conference
option
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311820861.XA
Other languages
Chinese (zh)
Inventor
陈圆园
沈玉阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Tingshan Cultural And Tourism Technology Group Co ltd
Original Assignee
Jiangsu Tingshan Cultural And Tourism Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tingshan Cultural And Tourism Technology Group Co ltd filed Critical Jiangsu Tingshan Cultural And Tourism Technology Group Co ltd
Priority to CN202311820861.XA priority Critical patent/CN118316748A/en
Publication of CN118316748A publication Critical patent/CN118316748A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a paperless conference control system, which particularly relates to the technical field of wireless networks, wherein before a conference starts, participants fill in identity information and carry out identity verification, after entering a conference place, participants carry out sign-in operation in a two-dimensional code scanning mode, administrators carry out different authority settings according to the identities of the participants, a firewall is arranged at a network entrance after the conference starts, abnormal behaviors and attacks are timely found out by monitoring the state and flow of a conference communication link in real time, in the conference process, the participants select language preference as a target language, data cleaning is carried out on the voice before the voice is converted into a text, speech of the participants is converted into a text form by using a voice recognition technology, and discussion contents of the conference are translated in real time, voting is carried out after the conference is finished, and decision and opinion collection are carried out on each option by the participants according to real-time voting and statistical results.

Description

Paperless conference control system
Technical Field
The invention relates to the technical field of wireless networks, in particular to a paperless conference control system.
Background
Traditional paper meeting participants need to manually arrange and distribute files, record meeting contents and the like, which are time-consuming and error-prone, and also need to print and copy in large quantities, thus causing a large amount of paper waste and environmental pollution. Meanwhile, the traditional paper files are easy to lose, leak or be stolen, and information security risks exist. Especially for sensitive business and confidential documents, the transfer and storage in paper form may lead to a risk of data leakage. The paperless conference control system can reduce the use of paper, reduce the consumption of natural resources, and meet the environmental protection and sustainable development requirements of modern enterprises.
Disclosure of Invention
In order to overcome the above-mentioned drawbacks of the prior art, an embodiment of the present invention provides a paperless conference control system, in which a firewall is disposed at a network entry after a conference starts, and malicious traffic and attacks are filtered, so as to solve the problems set forth in the above-mentioned background art.
In order to achieve the above purpose, the invention provides a paperless conference control system, which comprises a participant management module, a data protection module, a real-time translation module and an interactive voting module;
the consultant management module: before a meeting starts, meeting participants fill in identity information to carry out identity verification, after entering a meeting place, the meeting participants carry out sign-in operation in a mode of scanning two-dimensional codes so as to prove that the meeting participants arrive at the place and are qualified to participate in the meeting, and an administrator carries out different authority settings on the meeting participants according to the identities of the meeting participants;
And a data protection module: a firewall is arranged at a network entrance after the meeting starts, malicious traffic and attacks are filtered, and abnormal behaviors and attacks are found out in time by monitoring the state and traffic of a meeting communication link in real time;
And a real-time translation module: in the conference process, the participants select language preference as target language, data cleaning is carried out on the voice before the voice is converted into text, speech of the participants is converted from a voice form to a text form by using a voice recognition technology, and conference discussion contents are translated in real time;
and the interactive voting module is used for: after the conference is finished, voting is conducted, voting results are displayed to participants in a histogram mode, and the participants make decisions and collect opinions of each option according to real-time voting and statistics results.
In a preferred embodiment, before the meeting starts, the meeting participants fill in identity information and perform identity verification, after entering the meeting place, the meeting participants check in by scanning a two-dimensional code to prove that the meeting participants arrive and are eligible to participate in the meeting, and the manager performs different permission settings on the meeting participants according to the identities of the meeting participants, which comprises the following specific steps:
step A1, identity verification: before the meeting starts, the meeting participants fill in the identity information and verify the identity information, wherein the verification is double verification by pre-registering and sending a confirmation mail mode, and the method further comprises the following steps:
Step A101, pre-registration: the consultants register in advance through websites, in the registering process, personal information including names, company roles, mails and contact ways is filled in, a scanning piece of effective certificates and personal photos are uploaded, and the filled registering information is integrated with a company database for storage;
step A102, sending a confirmation mail: after the pre-registration is completed, the website automatically sends a confirmation mail to the participants, wherein the confirmation mail comprises confirmation link information and is used for finally confirming the validity of the identities of the participants;
Step A2, sign in: after entering a meeting place, the participants check in to prove that the participants arrive at the place and are qualified to participate in the meeting, and in the paperless meeting control system, check in is performed by scanning a two-dimensional code mode to replace a traditional paper check-in table, and after the check in is successful, the arrival time and identity information of the participants are automatically recorded;
step A3, setting the participation authority: the administrator sets up different authorities according to the identity of the participants, and can check the check-in time and the participant record information of each participant, and record and count the same, the authority sets up the participants into different roles according to the identity and responsibilities of the participants, sets up corresponding authority levels according to the roles of the different participants, and further comprises the following steps:
Step A301, authority grading: according to the identities and responsibilities of the participants, the administrators divide the participants into different authority levels, including common participants, principals and management layers;
Step A302, authority configuration: for different permission levels, the administrator sets corresponding permission configurations including whether to have the floor, file uploading permission and meeting record viewing permission.
In a preferred embodiment, the data protection module sets a firewall at a network entrance after the meeting starts, filters malicious traffic and attacks, timely discovers abnormal behaviors and attacks by monitoring the state and traffic of a communication link of the meeting in real time, and prevents data from being eavesdropped, and specifically comprises the following steps:
step S1, setting a firewall at a network entrance of a conference, limiting the flow entering and leaving the conference network, starting a log function of the firewall, and recording all the flow entering and leaving the conference network and the connection information;
Step S2, continuously monitoring the conference network by using a network security monitoring tool, applying all the flow and connection information recorded by the firewall to the conference network, and predicting and detecting abnormal changes of the network flow, wherein the abnormal behaviors and attacks are found out according to the specific calculation formula:
Wherein ARIMA represents an autoregressive moving average, The observations at time t, p, d, q represent the order of autoregressive, differential, moving average, respectively,AndRepresenting the autoregressive and moving average coefficients,The term of the constant is represented by a term,Representing an error term;
And S3, predicting the network flow of the next time period by using the fitted ARIMA model, comparing the predicted network flow with the network flow, detecting abnormal behavior, judging that the abnormal behavior exists when the actual network flow exceeds the upper limit and is lower than the lower limit of the predicted value, disconnecting the connection with an attack source, updating the firewall rule and protecting data.
In a preferred embodiment, the real-time translation module selects language preference as target language during the conference, performs data cleaning on the voice before converting the voice into text, converts the speech of the participant from voice form to text form using voice recognition technology, and translates the conference discussion in real time, specifically comprising the following steps:
Step B1, data cleaning: before converting speech to text, data cleaning the speech to eliminate noise, reduce echo effects, improve speech recognition accuracy, and reduce errors in subsequent translation stages, the data cleaning computing noise spectrum estimates by spectral subtraction and subtracting from the original signal spectrum to enhance the speech signal, further comprising the steps of:
step B101, calculating a noise estimation value by adopting short-time Fourier transform: representing the time frequency of an observed signal containing speech signal and noise as The time frequency of the voice signal is expressed asThe time frequency of the noise is expressed asWhere n is a time index and k is a frequency index, and the specific calculation formula is as follows:
wherein, Representing the time-frequency of the observed signal,Representing the time frequency of the noise spectrum estimated in the spectral subtraction,A time-frequency estimate representing the noise spectrum at a previous time instant in the spectral subtraction is used to update the noise estimate at the current time instant, n is the time index, k is the frequency index,Is an update speed parameter with a value range of;
Wherein,Representing the spectrum of the enhanced speech,Representing the time-frequency of the observed signal,Representing the time frequency of the noise spectrum estimated in the spectral subtraction,Is a parameter controlling the intensity of the enhancement,Representing taking a larger function of two numbers, n being the time index and k being the frequency index;
step B103, obtaining an enhanced voice signal through inverse short-time Fourier transform, wherein the specific calculation formula is as follows:
wherein, Representing the enhanced speech signal obtained by the inverse short time fourier transform,The representation is made of a combination of a first and a second color,Representing the enhanced speech spectrum, n being the time index and k being the frequency index;
Step B2, voice recognition: the speech of the participants is converted from a speech form to a text form by using a speech recognition technology, the speech is converted into the text, and then the text is translated into a selected target language by using a machine translation service;
step B3, translation transmission: the translation results are generated into text format using a text translation tool and the file is sent to participants, who can view the translation content by opening the file on the device.
In a preferred embodiment, the interactive voting module performs a voting activity after the conference is ended, and presents the voting result to the participants in a form of a bar graph, and according to the real-time voting and statistics result, the participants collect the opinion of each option to make a decision and collect the opinion, which specifically comprises the following steps:
Step C1, voting in real time: after the conference is finished, voting options are provided for the participants, the voting options of each participant are recorded in a database, and the voting options comprise fields such as option names, participant information, voting time and the like, so that the recording is accurate;
step C2, counting results: according to the voting records of participants, the vote count and the vote proportion of each option are calculated in real time, and the specific calculation formula is as follows:
wherein N represents the number of times each option is selected, T represents the total number of times all options are selected, and P represents the ticket obtaining ratio;
Step C3, result display: the voting results are displayed to the participants in a column diagram form, the ticket obtaining condition of each option is intuitively known, the ticket obtaining number of each option is represented by a column diagram, the height of each column represents the proportion of the ticket obtaining number of the option, and different options are distinguished through colors, so that the participants can quickly identify the ticket obtaining condition of each option;
Step C4, decision and opinion collection: making a decision according to the voting result, and collecting opinions of participants for each option so as to more fully understand different views, wherein the decision according to the voting result further comprises the following steps:
Step D1, analyzing voting results: for each option, analyzing the ticket number and the ticket ratio of the options, and knowing the selection condition of the participants for different options;
Step D2, decision making scheme: according to the voting result, making a decision scheme, wherein the option is supported by the maximum number of people and is directly adopted as the decision scheme; when no option is supported by the maximum number of people, a specific decision scheme is formed on the basis of the consensus of the participants;
the collecting the comments of the participants for each option further comprises the following steps:
Step E1, providing opinion collection channels: during the voting process, collecting the opinion of the participants through an email;
e2, sorting opinion contents: for each option, sorting the comments of the participants about the option, including the reasons for supporting and countering the option and the content of the improvement suggestion;
Step E3, analyzing opinion collection results: analyzing opinion content of participants for each option, and supplementing information of voting results.
The beneficial effects of the invention are as follows: before a meeting starts, the meeting participants fill in identity information and carry out identity verification, after entering a meeting place, the meeting participants carry out signing operation in a mode of scanning two-dimension codes, an administrator carries out different authority settings according to the identities of the meeting participants, a firewall is arranged at a network entrance after the meeting starts, abnormal behaviors and attacks are timely found through monitoring states and flows of a meeting communication link in real time, in the process of the meeting, the meeting participants select language preference as target language, before voice is converted into text, data cleaning is carried out on the voice, speech of the meeting participants is converted from a voice form into a text form by using a voice recognition technology, meeting discussion contents are translated in real time, voting is carried out after the meeting is finished, decision and opinion collection are carried out on the comments of the meeting participants for each option according to real-time voting and statistical results.
Drawings
Fig. 1 is a block diagram of the structure of the present invention.
Description of the embodiments
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present application, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more of the described features. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the description of the present application, the term "for example" is used to mean "serving as an example, instance, or illustration. Any embodiment described as "for example" in this disclosure is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the application. In the following description, details are set forth for purposes of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known structures and processes have not been described in detail so as not to obscure the description of the application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
Examples
The embodiment provides a paperless conference control system as shown in fig. 1, which specifically comprises a participant management module, a data protection module, a real-time translation module and an interactive voting module;
the consultant management module: before a meeting starts, meeting participants fill in identity information to carry out identity verification, after entering a meeting place, the meeting participants carry out sign-in operation in a mode of scanning two-dimensional codes so as to prove that the meeting participants arrive at the place and are qualified to participate in the meeting, and an administrator carries out different authority settings on the meeting participants according to the identities of the meeting participants;
And a data protection module: a firewall is arranged at a network entrance after the meeting starts, malicious traffic and attacks are filtered, and abnormal behaviors and attacks are found out in time by monitoring the state and traffic of a meeting communication link in real time;
And a real-time translation module: in the conference process, the participants select language preference as target language, data cleaning is carried out on the voice before the voice is converted into text, speech of the participants is converted from a voice form to a text form by using a voice recognition technology, and conference discussion contents are translated in real time;
and the interactive voting module is used for: after the conference is finished, voting is conducted, voting results are displayed to participants in a histogram mode, and the participants make decisions and collect opinions of each option according to real-time voting and statistics results.
In this embodiment, a specific explanation is a participant management module, where before a meeting starts, a participant fills in identity information and performs identity verification, after entering a meeting place, the participant performs sign-in operation by scanning a two-dimensional code mode to prove that the participant is already present and is qualified to participate in the meeting, and an administrator performs different authority settings on the participant according to the identity of the participant, which specifically includes the following steps:
step A1, identity verification: before the meeting starts, the meeting participants fill in the identity information and verify the identity information, wherein the verification is double verification by pre-registering and sending a confirmation mail mode, and the method further comprises the following steps:
Step A101, pre-registration: the consultants register in advance through websites, in the registering process, personal information including names, company roles, mails and contact ways is filled in, a scanning piece of effective certificates and personal photos are uploaded, and the filled registering information is integrated with a company database for storage;
step A102, sending a confirmation mail: after the pre-registration is completed, the website automatically sends a confirmation mail to the participants, wherein the confirmation mail comprises confirmation link information and is used for finally confirming the validity of the identities of the participants;
Step A2, sign in: after entering a meeting place, the participants check in to prove that the participants arrive at the place and are qualified to participate in the meeting, and in the paperless meeting control system, check in is performed by scanning a two-dimensional code mode to replace a traditional paper check-in table, and after the check in is successful, the arrival time and identity information of the participants are automatically recorded;
step A3, setting the participation authority: the administrator sets up different authorities according to the identity of the participants, and can check the check-in time and the participant record information of each participant, and record and count the same, the authority sets up the participants into different roles according to the identity and responsibilities of the participants, sets up corresponding authority levels according to the roles of the different participants, and further comprises the following steps:
Step A301, authority grading: according to the identities and responsibilities of the participants, the administrators divide the participants into different authority levels, including common participants, principals and management layers;
Step A302, authority configuration: for different permission levels, the administrator sets corresponding permission configurations including whether to have the floor, file uploading permission and meeting record viewing permission.
In this embodiment, a specific description is provided of a data protection module, where the data protection module sets a firewall at a network entry after a meeting starts, filters malicious traffic and attacks, and timely discovers abnormal behaviors and attacks by monitoring the state and traffic of a meeting communication link in real time, so as to prevent data from being eavesdropped, and specifically includes the following steps:
step S1, setting a firewall at a network entrance of a conference, limiting the flow entering and leaving the conference network, starting a log function of the firewall, and recording all the flow entering and leaving the conference network and the connection information;
Step S2, continuously monitoring the conference network by using a network security monitoring tool, applying all the flow and connection information recorded by the firewall to the conference network, and predicting and detecting abnormal changes of the network flow, wherein the abnormal behaviors and attacks are found out according to the specific calculation formula:
Wherein ARIMA represents an autoregressive moving average, The observations at time t, p, d, q represent the order of autoregressive, differential, moving average, respectively,AndRepresenting autoregressive and moving average coefficients, c representing constant terms,Representing an error term;
And S3, predicting the network flow of the next time period by using the fitted ARIMA model, comparing the predicted network flow with the network flow, detecting abnormal behavior, judging that the abnormal behavior exists when the actual network flow exceeds the upper limit and is lower than the lower limit of the predicted value, disconnecting the connection with an attack source, updating the firewall rule and protecting data.
In this embodiment, a specific description is provided of a real-time translation module, where in a conference process, a participant selects a language preference as a target language, and performs data cleaning on the voice before converting the voice into text, and uses a voice recognition technology to convert the speech of the participant from a voice form to a text form, and translate the conference discussion content in real time, and the specific steps are as follows:
Step B1, data cleaning: before converting speech to text, data cleaning the speech to eliminate noise, reduce echo effects, improve speech recognition accuracy, and reduce errors in subsequent translation stages, the data cleaning computing noise spectrum estimates by spectral subtraction and subtracting from the original signal spectrum to enhance the speech signal, further comprising the steps of:
step B101, calculating a noise estimation value by adopting short-time Fourier transform: representing the time frequency of an observed signal containing speech signal and noise as The time frequency of the voice signal is expressed asThe time frequency of the noise is expressed asWhere n is a time index and k is a frequency index, and the specific calculation formula is as follows:
wherein, Representing the time-frequency of the observed signal,Representing the time frequency of the noise spectrum estimated in the spectral subtraction,A time-frequency estimate representing the noise spectrum at a previous time instant in the spectral subtraction is used to update the noise estimate at the current time instant, n is the time index, k is the frequency index,Is an update speed parameter with a value range of
Step B102, calculating an enhanced voice spectrum: taking a difference value between an original signal spectrum and a noise estimated value, and taking zero when the difference value is smaller than zero, wherein the specific calculation formula is as follows:
wherein, Representing the spectrum of the enhanced speech,Representing the time-frequency of the observed signal,Representing the time frequency of the noise spectrum estimated in the spectral subtraction,Is a parameter controlling the intensity of the enhancement,Representing taking a larger function of two numbers, n being the time index and k being the frequency index;
step B103, obtaining an enhanced voice signal through inverse short-time Fourier transform, wherein the specific calculation formula is as follows:
wherein, Representing the enhanced speech signal obtained by the inverse short time fourier transform,The representation is made of a combination of a first and a second color,Representing the enhanced speech spectrum, n being the time index and k being the frequency index;
Step B2, voice recognition: the speech of the participants is converted from a speech form to a text form by using a speech recognition technology, the speech is converted into the text, and then the text is translated into a selected target language by using a machine translation service;
step B3, translation transmission: the translation results are generated into text format using a text translation tool and the file is sent to participants, who can view the translation content by opening the file on the device.
In this embodiment, an interactive voting module is specifically needed to be described, and the interactive voting module performs a voting activity after the conference is ended, and presents the voting result to the participants in a histogram form, and according to the real-time voting and statistics result, collects the comments of the participants for each option to make a decision and collect the comments, and the specific steps are as follows:
Step C1, voting in real time: after the conference is finished, voting options are provided for the participants, the voting options of each participant are recorded in a database, and the voting options comprise fields such as option names, participant information, voting time and the like, so that the recording is accurate;
step C2, counting results: according to the voting records of participants, the vote count and the vote proportion of each option are calculated in real time, and the specific calculation formula is as follows:
wherein N represents the number of times each option is selected, T represents the total number of times all options are selected, and P represents the ticket obtaining ratio;
Step C3, result display: the voting results are displayed to the participants in a column diagram form, the ticket obtaining condition of each option is intuitively known, the ticket obtaining number of each option is represented by a column diagram, the height of each column represents the proportion of the ticket obtaining number of the option, and different options are distinguished through colors, so that the participants can quickly identify the ticket obtaining condition of each option;
Step C4, decision and opinion collection: making a decision according to the voting result, and collecting opinions of participants for each option so as to more fully understand different views, wherein the decision according to the voting result further comprises the following steps:
Step D1, analyzing voting results: for each option, analyzing the ticket number and the ticket ratio of the options, and knowing the selection condition of the participants for different options;
Step D2, decision making scheme: according to the voting result, making a decision scheme, wherein the option is supported by the maximum number of people and is directly adopted as the decision scheme; when no option is supported by the maximum number of people, a specific decision scheme is formed on the basis of the consensus of the participants;
the collecting the comments of the participants for each option further comprises the following steps:
Step E1, providing opinion collection channels: during the voting process, collecting the opinion of the participants through an email;
e2, sorting opinion contents: for each option, sorting the comments of the participants about the option, including the reasons for supporting and countering the option and the content of the improvement suggestion;
Step E3, analyzing opinion collection results: analyzing opinion content of participants for each option, and supplementing information of voting results.
In the foregoing embodiments, the descriptions of the embodiments are focused on, and for those portions of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. A paperless conference control system, characterized by: the system comprises a participant management module, a data protection module, a real-time translation module and an interactive voting module;
the consultant management module: before a meeting starts, meeting participants fill in identity information to carry out identity verification, after entering a meeting place, the meeting participants carry out sign-in operation in a mode of scanning two-dimensional codes so as to prove that the meeting participants arrive at the place and are qualified to participate in the meeting, and an administrator carries out different authority settings on the meeting participants according to the identities of the meeting participants;
And a data protection module: a firewall is arranged at a network entrance after the meeting starts, malicious traffic and attacks are filtered, and abnormal behaviors and attacks are found out in time by monitoring the state and traffic of a meeting communication link in real time;
And a real-time translation module: in the conference process, the participants select language preference as target language, data cleaning is carried out on the voice before the voice is converted into text, speech of the participants is converted from a voice form to a text form by using a voice recognition technology, and conference discussion contents are translated in real time;
and the interactive voting module is used for: after the conference is finished, voting is conducted, voting results are displayed to participants in a histogram mode, and the participants make decisions and collect opinions of each option according to real-time voting and statistics results.
2. A paperless conference control system as claimed in claim 1, wherein: the consultant management module is used for managing information of the consultants, and comprises the following specific steps of identity verification, sign-in and parameter authority setting:
Step A1, identity verification: before the meeting starts, the meeting participants fill in the identity information and verify the identity information, wherein the verification is double verification by means of pre-registering and sending a confirmation mail;
Step A2, sign in: after entering a meeting place, the participants check in to prove that the participants arrive at the place and are qualified to participate in the meeting, and in the paperless meeting control system, check in is performed by scanning a two-dimensional code mode to replace a traditional paper check-in table, and after the check in is successful, the arrival time and identity information of the participants are automatically recorded;
Step A3, setting the participation authority: the administrator sets different authorities for the participants according to the identities of the participants, and can check the check-in time and the participant record information of each participant, and record and count the same.
3. A paperless conference control system as claimed in claim 2, wherein: the verification is double verification by pre-registering and sending a confirmation mail mode, and the method further comprises the following steps:
Step A101, pre-registration: the consultants register in advance through websites, in the registering process, personal information including names, company roles, mails and contact ways is filled in, a scanning piece of effective certificates and personal photos are uploaded, and the filled registering information is integrated with a company database for storage;
Step A102, sending a confirmation mail: after the pre-registration is completed, the website automatically sends a confirmation mail to the participants, including confirmation link information, for finally confirming the validity of the participant identity.
4. A paperless conference control system as claimed in claim 2, wherein: the authority setting divides the participants into different roles according to the identities and responsibilities of the participants, sets corresponding authority levels for the different participants, and further comprises the following steps:
Step A301, authority grading: according to the identities and responsibilities of the participants, the administrators divide the participants into different authority levels, including common participants, principals and management layers;
Step A302, authority configuration: for different permission levels, the administrator sets corresponding permission configurations including whether to have the floor, file uploading permission and meeting record viewing permission.
5. A paperless conference control system as claimed in claim 1, wherein: the data protection module is provided with a firewall at a network entrance after the meeting starts, filters malicious traffic and attacks, and timely discovers abnormal behaviors and attacks by monitoring the state and traffic of a meeting communication link in real time, and comprises the following specific steps:
step S1, setting a firewall at a network entrance of a conference, limiting the flow entering and leaving the conference network, starting a log function of the firewall, and recording all the flow entering and leaving the conference network and the connection information;
Step S2, continuously monitoring the conference network by using a network security monitoring tool, applying all the flow and connection information recorded by the firewall to the conference network, and predicting and detecting abnormal changes of the network flow, wherein the abnormal behaviors and attacks are found out according to the specific calculation formula:
ARIMA(p,s,q):Y(t)=c+∑(φ(i)×Y(t-i))+∑(θ(i)×ε(t-i))
Wherein ARIMA represents autoregressive moving average, Y (t) represents observed value with time t, p, d and q represent the orders of autoregressive, differential and moving average respectively, phi (i) and theta (i) represent autoregressive and moving average coefficients, c represents constant term, epsilon (t) represents error term;
And S3, predicting the network flow of the next time period by using the fitted ARIMA model, comparing the predicted network flow with the network flow, detecting abnormal behavior, judging that the abnormal behavior exists when the actual network flow exceeds the upper limit and is lower than the lower limit of the predicted value, disconnecting the connection with an attack source, updating the firewall rule and protecting data.
6. A paperless conference control system as claimed in claim 1, wherein: the real-time translation module selects language preference as target language in the conference process, performs data cleaning on the voice before converting the voice into text, converts the speech of the participant from the voice form into the text form by using a voice recognition technology, and translates the conference discussion content in real time, wherein the method comprises the following specific steps:
step B1, data cleaning: before converting the voice into text, cleaning the voice data, eliminating noise, reducing echo influence and reducing errors in the subsequent translation stage;
Step B2, voice recognition: the speech of the participants is converted from a speech form to a text form by using a speech recognition technology, the speech is converted into the text, and then the text is translated into a selected target language by using a machine translation service;
step B3, translation transmission: the translation results are generated into text format using a text translation tool and the file is sent to participants, who can view the translation content by opening the file on the device.
7. A paperless conference control system as claimed in claim 6, wherein: the data cleaning is to calculate a noise spectrum estimation value through spectrum subtraction and subtract the noise spectrum estimation value from the original signal spectrum, and further comprises the following steps:
Step B101, calculating a noise estimation value by adopting short-time Fourier transform: the time frequency of the observation signal containing the voice signal and the noise is expressed as X (N, k), the time frequency of the voice signal is expressed as S (N, k), the time frequency of the noise is expressed as N (N, k), wherein N is a time index, and k is a frequency index, and the specific calculation formula is as follows:
N'(n,k)=α·N'(n-1,k)+(1-α)·|X(n,k)|
wherein X (N, k) represents the time frequency of the observed signal, N '(N, k) represents the time frequency of the noise spectrum estimated in the spectral subtraction, N' (N-1, k) represents the time frequency estimated value of the noise spectrum at the previous time in the spectral subtraction, for updating the noise estimation at the current time, N is the time index, k is the frequency index, alpha is the update speed parameter, and the value range is [0,1];
Step B102, calculating an enhanced voice spectrum: taking a difference value between an original signal spectrum and a noise estimated value, and taking zero when the difference value is smaller than zero, wherein the specific calculation formula is as follows:
Y(n,k)=max(|X(n,k)|-β·|N'(n,k)|)
Wherein Y (N, k) represents the enhanced speech spectrum, X (N, k) represents the time frequency of the observed signal, N' (N, k) represents the time frequency of the noise spectrum estimated in the spectral subtraction, β is a parameter controlling the enhancement intensity, max represents a function taking a larger value of two numbers, N is a time index, and k is a frequency index;
step B103, obtaining an enhanced voice signal through inverse short-time Fourier transform, wherein the specific calculation formula is as follows:
y(n)=ISTFT-Y(n,k)
Where Y (n) represents an enhanced speech signal obtained by inverse short time fourier transform, ISTFT represents, Y (n, k) represents an enhanced speech spectrum, n is a time index, and k is a frequency index.
8. A paperless conference control system as claimed in claim 1, wherein: the interactive voting module performs voting after the conference is finished, presents voting results to participants in a histogram form, and collects the comments of the participants for decision making and comment collection of each option according to real-time voting and statistical results, wherein the concrete steps are as follows:
Step C1, voting in real time: after the conference is finished, voting options are provided for the participants, the voting options of each participant are recorded in a database, and the voting options comprise fields such as option names, participant information, voting time and the like, so that the recording is accurate;
step C2, counting results: according to the voting records of participants, the vote count and the vote proportion of each option are calculated in real time, and the specific calculation formula is as follows:
wherein N represents the number of times each option is selected, T represents the total number of times all options are selected, and P represents the ticket obtaining ratio;
Step C3, result display: the voting results are displayed to the participants in a column diagram form, the ticket obtaining condition of each option is intuitively known, the ticket obtaining number of each option is represented by a column diagram, the height of each column represents the proportion of the ticket obtaining number of the option, and different options are distinguished through colors, so that the participants can quickly identify the ticket obtaining condition of each option;
Step C4, decision and opinion collection: decision making is carried out according to voting results, opinions of participants for each option are collected, and different views are more comprehensively known.
9. A paperless conference control system as claimed in claim 8, wherein: the decision making according to the voting result further comprises the following steps:
Step D1, analyzing voting results: for each option, analyzing the ticket number and the ticket ratio of the options, and knowing the selection condition of the participants for different options;
Step D2, decision making scheme: according to the voting result, making a decision scheme, wherein the option is supported by the maximum number of people and is directly adopted as the decision scheme; when no option is supported by the maximum number of people, a specific decision scheme is formed on the basis of the consensus of the participants.
10. A paperless conference control system as claimed in claim 8, wherein: the collecting the comments of the participants for each option further comprises the following steps:
Step E1, providing opinion collection channels: during the voting process, collecting the opinion of the participants through an email;
e2, sorting opinion contents: for each option, sorting the comments of the participants about the option, including the reasons for supporting and countering the option and the content of the improvement suggestion;
Step E3, analyzing opinion collection results: analyzing opinion content of participants for each option, and supplementing information of voting results.
CN202311820861.XA 2023-12-27 2023-12-27 Paperless conference control system Pending CN118316748A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311820861.XA CN118316748A (en) 2023-12-27 2023-12-27 Paperless conference control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311820861.XA CN118316748A (en) 2023-12-27 2023-12-27 Paperless conference control system

Publications (1)

Publication Number Publication Date
CN118316748A true CN118316748A (en) 2024-07-09

Family

ID=91730967

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311820861.XA Pending CN118316748A (en) 2023-12-27 2023-12-27 Paperless conference control system

Country Status (1)

Country Link
CN (1) CN118316748A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742927A (en) * 1993-02-12 1998-04-21 British Telecommunications Public Limited Company Noise reduction apparatus using spectral subtraction or scaling and signal attenuation between formant regions
US20050034079A1 (en) * 2003-08-05 2005-02-10 Duraisamy Gunasekar Method and system for providing conferencing services
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN112992131A (en) * 2021-02-04 2021-06-18 南京邮电大学 Method for extracting ping-pong command of target voice in complex scene
CN113157473A (en) * 2021-03-25 2021-07-23 清华大学 Method and device for positioning fault root cause of multi-dimensional log
CN113347384A (en) * 2021-08-06 2021-09-03 北京电信易通信息技术股份有限公司 Video conference flow prediction method and system based on time sequence representation learning
CN116545790A (en) * 2023-06-14 2023-08-04 深圳市翰视科技有限公司 Intelligent conference system based on Internet of things

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742927A (en) * 1993-02-12 1998-04-21 British Telecommunications Public Limited Company Noise reduction apparatus using spectral subtraction or scaling and signal attenuation between formant regions
US20050034079A1 (en) * 2003-08-05 2005-02-10 Duraisamy Gunasekar Method and system for providing conferencing services
CN102083087A (en) * 2011-01-25 2011-06-01 南京金思科技有限公司 Telephone traffic abnormality detection method combining subjective mode and objective mode
CN112992131A (en) * 2021-02-04 2021-06-18 南京邮电大学 Method for extracting ping-pong command of target voice in complex scene
CN113157473A (en) * 2021-03-25 2021-07-23 清华大学 Method and device for positioning fault root cause of multi-dimensional log
CN113347384A (en) * 2021-08-06 2021-09-03 北京电信易通信息技术股份有限公司 Video conference flow prediction method and system based on time sequence representation learning
CN116545790A (en) * 2023-06-14 2023-08-04 深圳市翰视科技有限公司 Intelligent conference system based on Internet of things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐晓思: "无纸化触控多媒体会议系统的设计与实现", 《全国优秀硕士论文全文库》, 15 September 2019 (2019-09-15), pages 1 *

Similar Documents

Publication Publication Date Title
Dahal et al. Topic modeling and sentiment analysis of global climate change tweets
Nahmias et al. The oversight of content moderation by AI: impact assessments and their limitations
CN116342259A (en) Automatic user credit rating method and device, electronic equipment and medium
DE202013102441U1 (en) System for checking digital certificates
Gobeo et al. GDPR and Cyber Security for Business Information Systems
CN107196844A (en) Exception mail recognition methods and device
CA3073714A1 (en) Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system
Starbird et al. Influence and improvisation: Participatory disinformation during the 2020 US election
Büchi et al. Digital inequalities in online privacy protection: effects of age, education and gender
Gan et al. Privacy enhancing technologies implementation: An Investigation of its impact on work processes and employee perception
Balla et al. Responding to mass, computer-generated, and malattributed comments
CN113033995A (en) Bidding evaluation expert selection and management platform based on 'internet +', and bidding evaluation method
Tang et al. Parsing the effect of the internet on regime support in China
CN113177851B (en) Method and device for storing certificate of online insurance transaction, electronic equipment and storage medium
Eutsler et al. Accounting for partisanship and politicization: Employing Benford's Law to examine misreporting of COVID-19 infection cases and deaths in the United States
CN111582722B (en) Risk identification method and device, electronic equipment and readable storage medium
CN118316748A (en) Paperless conference control system
CA3131340A1 (en) System and method for ethical collection of data
Balla et al. Mass, computer-generated, and fraudulent comments
Basedow et al. Trading votes: what drives MEP support for trade liberalisation?
CN107808339A (en) A kind of data acquisition and analysis system
Papp et al. The AI is now in session–The impact of digitalisation on courts
RU2683190C1 (en) Method and system for calculating index of risk of unlawful actions from candidates for employment and acting staff
CN114819764B (en) False litigation behavior risk prediction method based on desensitization data
CN115292272B (en) Enterprise-level authority management method, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination