CN201741150U - Post-event alarm picture search system - Google Patents

Post-event alarm picture search system Download PDF

Info

Publication number
CN201741150U
CN201741150U CN201020500594XU CN201020500594U CN201741150U CN 201741150 U CN201741150 U CN 201741150U CN 201020500594X U CN201020500594X U CN 201020500594XU CN 201020500594 U CN201020500594 U CN 201020500594U CN 201741150 U CN201741150 U CN 201741150U
Authority
CN
China
Prior art keywords
server
http server
search
user computer
http
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN201020500594XU
Other languages
Chinese (zh)
Inventor
潘今一
金亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI EUTROVISION SYSTEMS Inc
Original Assignee
SHANGHAI EUTROVISION SYSTEMS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI EUTROVISION SYSTEMS Inc filed Critical SHANGHAI EUTROVISION SYSTEMS Inc
Priority to CN201020500594XU priority Critical patent/CN201741150U/en
Application granted granted Critical
Publication of CN201741150U publication Critical patent/CN201741150U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The utility model discloses a post-event alarm picture search system, which comprises a user computer, an HTTP server, a database server and a file storage server, and the user computer, the database server and the file storage server are connected with the HTTP server. After the user computer initiates a request to the HTTP server, the HTTP server starts to search for a result matching search conditions from the database server according to the submitted request conditions, the database server returns the search result to the HTTP server, the HTTP server initiates a file extraction request to the file storage server according to the returned result, the file storage server returns a result to the HTTP server, and the HTTP server returns the integral result to the user computer. The utility model avoids the searching process in all data, thus increasing the efficiency of search.

Description

Afterwards the report to the police search system of picture
Technical field
The utility model relates to a kind of search system, particularly relates to a kind of search system of the picture of afterwards reporting to the police.
Background technology
At present, reviewing incident generation field condition way commonly used is by playing live video and checking the sectional drawing of incident, watch video recording repeatedly by the time shaft that pulls player, from video information, seek Useful Information, perhaps existing sectional drawing is afterwards checked and checked.When checking sectional drawing, need contrast one by one, can not selectively filter, can't search and review the locale situation flexibly according to attributive character.
In case in the time of need retrieving the incident of the clear and definite time of origin of the unknown, traditional way faces the problem of checking a large amount of picture or video one by one with needs, and unpredictable to finding the spent time of result.
The utility model content
Technical problem to be solved in the utility model provides a kind of search system of the picture of afterwards reporting to the police, and it is effectively searched for from partial data, has avoided the process of searching for from total data, has improved the efficient of search.
The utility model solves above-mentioned technical matters by following technical proposals: a kind of search system of the picture of afterwards reporting to the police, it is characterized in that, it comprises user computer, http server, database server and document storage server, user computer, database server, document storage server is connected with http server, user computer is after http server is initiated request, http server is according to the request condition of submitting to, from database server, begin to search for the result who meets search condition, database server returns to http server with Search Results, http server is according to the result who returns, initiate the extraction document request to document storage server, the document storage server return results is given http server, and http server returns to user computer with complete results.
Positive progressive effect of the present utility model is: the utility model does not need a large amount of pictures is checked contrast one by one, searches for according to existing affair character, effectively raises the efficient of checking picture, consuming time controlled to lookup result.
Description of drawings
Fig. 1 is afterwards the report to the police schematic diagram of search system of picture of the utility model.
Fig. 2 is the schematic diagram of data storage in the utility model database server.
Fig. 3 carries out the process flow diagram of searching method for the report to the police search system of picture of the utility model afterwards.
Embodiment
Provide the utility model preferred embodiment below in conjunction with accompanying drawing, to describe the technical solution of the utility model in detail.
As shown in Figure 1, afterwards the report to the police search system of picture of the utility model comprises user computer 1, http server 2, database server 3 and document storage server 4, user computer 1, database server 3, document storage server 4 are connected with http server 2, the client computer that the user initiates searching request is a user computer, and user computer can be any computer in LAN (Local Area Network) or the internet.Http server provides HTTP service, and database server provides the storage of data.When user computer 1 after http server 2 is initiated request, http server 2 begins to search for the result who meets search condition according to the request condition of submitting to from database server 3, database server 3 returns to http server 2 with Search Results.Http server 2 is initiated the extraction document request according to the result who returns to document storage server 4, and document storage server 4 return results are given http server 3, and http server 3 returns to user computer 1 with complete results.
As shown in Figure 2, the quantity of depositing the tables of data 12 of actual alarm data can be one or more.It is processing power and treatment effeciency in order to guarantee individual table that the tables of data 12 of depositing the actual alarm data is divided into purpose that a plurality of tables deposit.The tables of data 12 of depositing the actual alarm data is drawn tables of data 11 by a vang and is managed, each bar recorded and stored in the index data table 11 from date, corresponding each deposit the maximum date and the minimum date of all records in the tables of data 12 of actual alarm data.In the index data table 11 every recorded and stored maximum ID and minimum ID, corresponding each deposit the maximum ID and the minimum ID of all records in the tables of data 12 of actual alarm data.
In the warning message database table, the attribute information of preserving warning comprises rule, alert levels, key word, alarm condition, the picture file name of time, passage, algorithm types, triggering, in retrieval, information such as the time of submitting to according to the user, passage, algorithm types, find satisfactory warning message result, database returns corresponding with it warning message content and filename.
As shown in Figure 3, afterwards the report to the police search system of picture of the utility model is carried out searching method and be may further comprise the steps:
Step 1: submit the literal solicited message of searching for from a user computer to http server, user computer can be any computer that can have access to http server in LAN (Local Area Network) or internet.Submit to the content of the literal solicited message of search to comprise the shape of that very day interval, passage, algorithm types, triggering, the rank of warning message, the state and the key word of warning message.Key word can be handmarking's a label, also can be the Word message that is produced by intelligent algorithm.Submit to the literal solicited message of search to comprise all or part of of above content.
Step 2: http server is judged the legitimacy of the literal solicited message of submitting search to.When the result who detects when http server was illegal, the message of will checking not passing through returned to user computer.If when the result that http server detects is legal, will initiate searching request to database server.
Step 3: after database server receives searching request, search for according to the condition of searching request.Along with the increase of data volume, individual tables of data is difficult to provide the search of efficient stable, and data can be segmented in many tables, and many tables are managed by the index data table.The maximal value and the minimum value of the zero-time separately, flowing water ID of many tables of record number in the index data table are when the time interval of searching request drops in the time interval of index data table.Comprise this table when then searching for, otherwise search does not comprise this table.The purpose of doing like this is data volume when very big, and it is very low that all records are carried out search efficiency.And with a very big tables of data according to the time sequencing break into portions after, in the searching request time interval, comprise again and search in the tables of data of this table time, improved the efficient of search like this.For instance, if the strategy that does not use data to cut apart, one time searching request is searched in 10,000 ten thousand data.And behind the use segmentation strategy, data are divided into 10 parts, every part 1,000,000.By searching the index data table earlier, data may only be distributed in two tables, promptly as long as search in 2,000,000 data.This searches in 1,000 ten thousand data, has improved efficient greatly.
Step 4: database server returns to http server with Search Results.Time, warning passage, algorithm types, the regular shape of triggering, the rank of warning, the state of warning and the picture name of warning etc. that comprise warning in the Search Results.According to the picture name of reporting to the police, http server is initiated request to document storage server.When carrying out people's face picture searching, retrieve according to people's face specimen page picture of submitting to, search identical with similar with it picture, and sort according to similar degree.When carrying out the car plate picture searching, numbering all or part of of input car plate searches out all or part of picture that contains this car plate numbering in the picture.
Step 5: document storage server receives the picture file that begins to search this document name after the request that http server sends, and the picture file of this document name was returned http server.
Step 6: http server has received the Word message of warning and the picture file of warning, and these information are returned to user computer, and user computer obtains needed result.
Though more than described embodiment of the present utility model, but those skilled in the art is to be understood that, these only illustrate, and under the prerequisite that does not deviate from principle of the present utility model and essence, can make numerous variations or modification to these embodiments.Therefore, protection domain of the present utility model is limited by appended claims.

Claims (1)

1. search system of picture of afterwards reporting to the police, it is characterized in that, it comprises user computer, http server, database server and document storage server, user computer, database server, document storage server is connected with http server, user computer is after http server is initiated request, http server is according to the request condition of submitting to, from database server, begin to search for the result who meets search condition, database server returns to http server with Search Results, http server is according to the result who returns, initiate the extraction document request to document storage server, the document storage server return results is given http server, and http server returns to user computer with complete results.
CN201020500594XU 2010-08-20 2010-08-20 Post-event alarm picture search system Expired - Lifetime CN201741150U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201020500594XU CN201741150U (en) 2010-08-20 2010-08-20 Post-event alarm picture search system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201020500594XU CN201741150U (en) 2010-08-20 2010-08-20 Post-event alarm picture search system

Publications (1)

Publication Number Publication Date
CN201741150U true CN201741150U (en) 2011-02-09

Family

ID=43556427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201020500594XU Expired - Lifetime CN201741150U (en) 2010-08-20 2010-08-20 Post-event alarm picture search system

Country Status (1)

Country Link
CN (1) CN201741150U (en)

Similar Documents

Publication Publication Date Title
CN108881194B (en) Method and device for detecting abnormal behaviors of users in enterprise
Becker et al. Identifying content for planned events across social media sites
CN108776671A (en) A kind of network public sentiment monitoring system and method
CN106383887A (en) Environment-friendly news data acquisition and recommendation display method and system
CN101751458A (en) Network public sentiment monitoring system and method
CN105117484A (en) Internet public opinion monitoring method and system
US20150341771A1 (en) Hotspot aggregation method and device
WO2014005657A1 (en) A system and method for automatic generation of information-rich content from multiple microblogs, each microblog containing only sparse information
KR20130009987A (en) Method and system of displaying friend status and computer storage medium for same
Xu et al. Wikipedia‐based topic clustering for microblogs
Hasan et al. TwitterNews: Real time event detection from the Twitter data stream
Lubis et al. A framework of utilizing big data of social media to find out the habits of users using keyword
Zhang et al. Topic modeling for OLAP on multidimensional text databases: topic cube and its applications
CN104462096B (en) Public sentiment method for monitoring and analyzing and device
CN112035534A (en) Real-time big data processing method and device and electronic equipment
CN113360661A (en) Multi-tenant media big data application cloud service platform
Lee et al. An automatic topic ranking approach for event detection on microblogging messages
Zheng et al. Learning‐based topic detection using multiple features
CN115293723A (en) Network public opinion heat analysis system based on big data analysis
CN109947935A (en) The generation method and device of media event
CN111666263A (en) Method for realizing heterogeneous data management in data lake environment
Kim et al. TwitterTrends: a spatio-temporal trend detection and related keywords recommendation scheme
CN114637903A (en) Public opinion data acquisition system for directional target data expansion
CN111782970B (en) Data analysis method and device
CN201741150U (en) Post-event alarm picture search system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Sui Xiaomin

Inventor after: Pan Jinyi

Inventor before: Pan Jinyi

Inventor before: Jin Ya

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: PAN JINYI JIN YA TO: SUI XIAOMIN PAN JINYI

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20110209