Intelligent command management method and system based on recognition technology
1. An intelligent command management method based on recognition technology is characterized in that: establishing a plurality of point locations in a monitoring area, identifying and registering the working personnel at the point locations through a personal client, and registering the flowing personnel at the point locations through the personal client;
information data of the staff and the mobile staff are sent to a background management system through a personal client for statistics; the information data of the staff comprises any one or more of the following: identity information, basic information and location information; the information data of the floating personnel comprises any one or more of the following: personnel identity, basic information, registration time, geographic location and travel information;
and the big data platform analyzes and excavates the data counted by the background management system, feeds the result back to the background management system, and sends out early warning to the personal client through the background management system.
2. The intelligent command management method based on the identification technology according to claim 1, wherein the point location is created by an administrator, and the point location is created by the following steps:
an administrator creates point locations through a personal client or a Web end and inputs point location information comprising names, membership, geographic positions and point location attribute information; wherein the geographic location is selected from a map at the personal client or the Web site;
the manager creating the point location is a point location manager, and gives corresponding management authority, the manager can continue to add subordinate branch point locations, and sets a sub-manager for the branch point locations, and the sub-manager can manage the corresponding point location where the sub-manager is located or continue to add the subordinate branch point locations.
3. The intelligent command management method based on the recognition technology according to claim 1, characterized in that: the staff members are divided into fixed duty personnel and patrol duty personnel;
the background management system acquires the geographical position of each interval through the personal client of the fixed duty personnel at one end;
and the background management system acquires the geographical position of the personnel at one interval through the personal client of the mobile duty personnel to generate a patrol track.
4. The intelligent command management method based on the recognition technology according to claim 3, characterized in that: the early warning comprises off-duty early warning, inspection early warning, monitoring early warning and suspicious behavior early warning;
the off-Shift early warning means that: when the geographical position of the fixed duty personnel is obtained to be separated from the point position for a period of time, an off-duty prompt is sent to the personal client of the fixed duty personnel; when no on-duty personnel is fixed in a certain point position within a period of time, off-duty early warning is sent out;
the patrol early warning means that: the patrol duty personnel upload abnormal patrol results through the personal client, and the background management system sends abnormal prompts to other personal clients;
the monitoring and early warning means that: the background management system is connected with a satellite and detection and alarm equipment, emergency events are monitored through the satellite and the detection and alarm equipment, and when the emergency events are detected, event information can be automatically pushed to the background management system; the commander receives the event information through the background management system and issues tasks to the personal client of the staff;
the suspicious behavior early warning means that: and performing big data personnel behavior analysis and user portrait analysis on information, geographic positions and personnel tracks of the flowing personnel entering and exiting registration, judging whether suspicious behaviors exist or not and the probability of the suspicious behaviors after the flowing personnel enter the area, feeding back the analysis result to a background management system, and sending corresponding early warning prompts to the personal client.
5. The intelligent command management method based on the recognition technology according to claim 1, characterized in that: the background management system calculates point location pressure values of all the point locations, when the point location pressure value of a certain point location exceeds a threshold value, the background management system sends scheduling information to nearby on-duty point locations which do not exceed the threshold value, and staff of the personal client receiving the scheduling information serve as scheduling staff to go to the point locations which exceed the threshold value;
the dispatching personnel register the work at the point location exceeding the threshold value, the background management system recalculates the point location pressure value of the point location, and when the point location pressure value is smaller than the threshold value, the background management system stops sending dispatching information;
point location pressure (current value of influence factor/threshold value of influence factor) is the proportion of influence factor.
6. The intelligent command management method based on the recognition technology as claimed in claim 5, wherein: the influencing factors include any of the following: personnel movement, weather conditions, duty complexity, special festivals.
7. The intelligent command management method based on the recognition technology according to claim 1, characterized in that: the big data platform carries out index evaluation and regional safety level evaluation on data counted by the background management system in a staged or annual work mode, and forms a summary report;
knowledge fusion and association are carried out on multi-source heterogeneous data, a knowledge map is constructed, and support is provided for commanding and decision-making from the machine cognition angle in order to effectively predict the occurrence and occurrence probability of events.
8. The utility model provides an intelligent command management system based on recognition technology which characterized in that: the system comprises a daily duty registration module, a supervision and inspection registration module and a personnel access registration module;
the daily on-duty registration module acquires the identity information, the basic information and the position information of the managed person through an identification technology to judge the operation which can be carried out so as to finish automatic attendance checking, automatic registration and automatic reporting;
the checking and registering module is used for checking the attendance information of the point location by the checking team, uploading the checking result and other information to the background, and checking the checking record by the management personnel through the personal client and the background system; when an inspector in an inspection team arrives near a point location, a system acquires a geographical position, automatically displays the point location information closest to the geographical position, and directly performs inspection and registration;
and the personnel access registration module is used for registering access of personnel and vehicles passing through the point location, extracting the contact information and the geographic position information of the user, and storing and registering the information.
9. An intelligent command management system based on recognition technology according to claim 8, characterized in that: the system also comprises a material management and registration module which utilizes the RFID technology to carry out warehouse-out and warehouse-in information management on the equipment.
Background
In order to prevent and solve the social property loss and life safety caused by natural or human influence, an all-around management system is required, and the conditions of personnel employment, event occurrence, access registration and the like in a management area can be mastered in real time to ensure stable operation in the area.
The prior art has corresponding technical means such as: scanning codes for epidemic prevention registration, and acquiring formation information through the travel codes, but the following problems still exist:
scanning the two-dimensional code to carry out epidemic prevention registration, the method is generally applied to each cell at present, personal information is filled in through scanning the two-dimensional code of the community, then the cell is entered, the cell can inquire all registration records at the background, but the mode is more tedious, the two-dimensional code must be posted out, and a user can only scan the code.
The method does not perform electronic registration, and sometimes the inquiry function aims at the mobile phone number registered by the personal identity card number because of the problems of network, data update untimely and mobile phone authority, and if the inquiry function is a unit mobile phone, the inquiry function cannot be inquired without binding the personal identity card number. In addition, the information of the travel code can be inquired only within a certain time range, and for the defects, the registered information is inaccurate, no history record can be traced, and statistical data cannot be generated.
Meanwhile, related patent documents manage the on duty of staff, for example, a prison intelligent inspection on duty management and control system and method disclosed by patent application No. 201910277746.X, the positioning method based on the RFID acquires the position information of the prison in the prison area in real time, automatically judges the on-duty state and the inspection task state of the prison staff, and realizes the all-round management and control of the prison on duty. However, the above invention is not suitable for outdoor inspection and inspection tasks without fixed routes in certain areas. Because the daily routing patrols of patrolmen are different, the cost of all routes within the coverage range of the RFID radio frequency technology is high, and in addition, the routing patrolmen can be interfered by other personnel, and the accuracy cannot be ensured.
Disclosure of Invention
Aiming at the technical problems, the invention provides an intelligent command management method and system based on an identification technology, which can register, analyze and early warn working personnel and mobile personnel.
In order to solve the technical problems, the invention adopts the technical scheme that:
an intelligent command management method based on identification technology comprises the steps that a plurality of point locations are established in a supervision area, workers carry out point location identification through personal clients and carry out work registration, and floating workers carry out point location entry and exit registration through the personal clients;
information data of the staff and the mobile staff are sent to a background management system through a personal client for statistics; the information data of the staff comprises any one or more of the following: identity information, basic information and location information; the information data of the floating personnel comprises any one or more of the following: personnel identity, basic information, registration time, geographic location and travel information;
and the big data platform analyzes and excavates the data counted by the background management system, feeds the result back to the background management system, and sends out early warning to the personal client through the background management system.
The point location is created by management personnel, and the point location is created by the following steps:
an administrator creates point locations through a personal client or a Web end and inputs point location information comprising names, membership, geographic positions and point location attribute information; wherein the geographic location is selected from a map at the personal client or the Web site;
the manager creating the point location is a point location manager, and gives corresponding management authority, the manager can continue to add subordinate branch point locations, and sets a sub-manager for the branch point locations, and the sub-manager can manage the corresponding point location where the sub-manager is located or continue to add the subordinate branch point locations.
The staff members are divided into fixed duty personnel and patrol duty personnel;
the background management system acquires the geographical position of each interval through the personal client of the fixed duty personnel at one end;
and the background management system acquires the geographical position of the personnel at one interval through the personal client of the mobile duty personnel to generate a patrol track.
The early warning comprises off-duty early warning, inspection early warning, monitoring early warning and suspicious behavior early warning;
the off-Shift early warning means that: when the geographical position of the fixed duty personnel is obtained to be separated from the point position for a period of time, an off-duty prompt is sent to the personal client of the fixed duty personnel; when no on-duty personnel is fixed in a certain point position within a period of time, off-duty early warning is sent out;
the patrol early warning means that: the patrol duty personnel upload abnormal patrol results through the personal client, and the background management system sends abnormal prompts to other personal clients;
the monitoring and early warning means that: the background management system is connected with a satellite and detection and alarm equipment, emergency events are monitored through the satellite and the detection and alarm equipment, and when the emergency events are detected, event information can be automatically pushed to the background management system; the commander receives the event information through the background management system and issues tasks to the personal client of the staff;
the suspicious behavior early warning means that: and performing big data personnel behavior analysis and user portrait analysis on information, geographic positions and personnel tracks of the flowing personnel entering and exiting registration, judging whether suspicious behaviors exist or not and the probability of the suspicious behaviors after the flowing personnel enter the area, feeding back the analysis result to a background management system, and sending corresponding early warning prompts to the personal client.
The background management system calculates point location pressure values of all the point locations, when the point location pressure value of a certain point location exceeds a threshold value, the background management system sends scheduling information to nearby on-duty point locations which do not exceed the threshold value, and staff of the personal client receiving the scheduling information serve as scheduling staff to go to the point locations which exceed the threshold value;
the dispatching personnel register the work at the point location exceeding the threshold value, the background management system recalculates the point location pressure value of the point location, and when the point location pressure value is smaller than the threshold value, the background management system stops sending dispatching information;
point location pressure (current value of influence factor/threshold value of influence factor) is the proportion of influence factor.
The influencing factors include any of the following: personnel movement, weather conditions, duty complexity, special festivals.
The big data platform carries out index evaluation and regional safety level evaluation on data counted by the background management system in a staged or annual work mode, and forms a summary report;
knowledge fusion and association are carried out on multi-source heterogeneous data, a knowledge map is constructed, and support is provided for commanding and decision-making from the machine cognition angle in order to effectively predict the occurrence and occurrence probability of events.
An intelligent command management system based on identification technology comprises a daily duty registration module, a supervision and inspection registration module and a personnel access registration module;
the daily on-duty registration module acquires the identity information, the basic information and the position information of the managed person through an identification technology to judge the operation which can be carried out so as to finish automatic attendance checking, automatic registration and automatic reporting;
the checking and registering module is used for checking the attendance information of the point location by the checking team, uploading the checking result and other information to the background, and checking the checking record by the management personnel through the personal client and the background system; when an inspector in an inspection team arrives near a point location, a system acquires a geographical position, automatically displays the point location information closest to the geographical position, and directly performs inspection and registration;
and the personnel access registration module is used for registering access of personnel and vehicles passing through the point location, extracting the contact information and the geographic position information of the user, and storing and registering the information.
The system also comprises a material management and registration module which utilizes the RFID technology to carry out warehouse-out and warehouse-in information management on the equipment.
Compared with the prior art, the invention has the following beneficial effects:
the system can carry out comprehensive management of a unified platform on different management objects including inspectors, duty personnel and registrars through various identification technologies, and fuse, analyze and process various data. All areas needing to be managed are subdivided and sunk to each point position, and the areas can be dispersed to a plurality of areas, so that the method is suitable for communities, forest fire prevention, mountain area management, security company management and the like, and has wider application range.
According to the method, the two-dimensional code does not need to be scanned, only the geographic positions of the registered personnel and the registered points need to be acquired, the user can automatically associate the two-dimensional code after opening the application program and input information for registration, or the identity of the registered personnel is acquired by using other identification technologies, the information is extracted from the system, and the in-out registration is completed.
Administrative management and regional management are combined, point location cross-administrative management is achieved, and actual application scenes are better met;
through data analysis and calculation, duty areas are divided by automatically scheduling on-duty personnel instead of manpower;
through the analysis of personnel track and geographical position information data, automatic early warning is carried out, managers can timely master off-duty and dangerous events, and peripheral organizations can be called and treated;
through processing, modeling and analyzing historical data, a management evaluation or summary report is generated, big data prediction is carried out, the occurrence probability of an event is analyzed, better handling and prevention are achieved, and management is more intelligent.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a connection block diagram of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 and 2, in an intelligent command management method based on an identification technology, a plurality of point locations are created in a supervision area, a worker identifies and registers the point locations through a personal client, and a mobile worker registers the point locations through the personal client;
information data of the staff and the mobile staff are sent to a background management system through a personal client for statistics; the information data of the staff comprises any one or more of the following: identity information, basic information and location information; the information data of the floating personnel comprises any one or more of the following: personnel identity, basic information, registration time, geographic location and travel information;
and the big data platform analyzes and excavates the data counted by the background management system, feeds the result back to the background management system, and sends out early warning to the personal client through the background management system.
Further, the point location is created by a manager, and the point location creation adopts the following steps:
an administrator creates point locations through a personal client or a Web end and inputs point location information comprising names, membership, geographic positions and point location attribute information; wherein the geographic location is selected from a map at the personal client or the Web site;
the manager creating the point location is a point location manager, and gives corresponding management authority, the manager can continue to add subordinate branch point locations, and sets a sub-manager for the branch point locations, and the sub-manager can manage the corresponding point location where the sub-manager is located or continue to add the subordinate branch point locations.
Generating a unique identification code for each point location and the subordinate branch point location, returning the unique identification code to the point location details, and enqueuing personnel by scanning identification or searching for the point location name, wherein the following modes can be specifically adopted:
the method I includes scanning point location identification codes for enqueuing, and the staff scans the point location identification codes through the personal client and returns point location information including id and name for accurate searching.
And secondly, searching for the point location name for enqueuing, searching for the point location name of the queue through a personal client by a worker, preferentially displaying the matched point location in the division by the background management system according to the division where the geographic location of the worker is located, and selecting to apply for joining.
When a user enters a point location range, a background management system uses openfire to immediately push inquiry information of joining point locations to the user, the inquiry information contains basic information of current point locations, the user selects and determines to join the point locations, the user identity is changed to a duty worker, the user does not add the point locations if the user selects and cancels, the identity cannot be changed, meanwhile, the system records the record that the user reaches the point location, and uses the openfire to push the point location management background.
When the point location is added in the mode, the background management system firstly inquires and matches according to the personnel information in the personnel database, returns the matched personnel information, manually fills personal data if no matched information exists, applies for adding the point location, returns the application information to a Web end audit list of a unit to which the point location belongs and a personal client of a point location manager for audit, wherein the audit process is audit step by step, and audit result information is returned to the personal client of an applicant.
Further, the staff members are divided into fixed duty personnel and patrol duty personnel, namely fixed-point duty and mobile duty. The identity information, the basic information and the position information of the managed person can be acquired through an identification technology to judge the operation which can be carried out, and automatic attendance checking, automatic registration, automatic reporting and the like are completed.
Fixed point duty: the staff on duty at the point location can obtain the identity and the geographic position through scanning the point location identification code or through an identification technology for the staff to punch a card, the background management system sets the staff on duty state to be on duty, obtains the geographic position of the staff at intervals under the condition that a user allows and the personal client operates, and judges the off-duty and off-duty conditions of the staff.
Moving on duty: the backstage management system can divide a patrol duty area for patrol duty personnel at the point location, the patrol duty personnel can walk and patrol after checking on duty and checking cards, the backstage acquires the geographical position of the patrol duty personnel at intervals to generate a personnel patrol track, if a condition or an abnormality is found in patrol, a patrol report can be reported through a personal client, the backstage management system automatically acquires the latest geographical position and information reported by the personnel, and telephone and video communication can be carried out on the patrol personnel at the backstage.
Further, the personnel and the vehicles passing through the point location are registered in and out, the personnel can scan the point location two-dimensional code by using the personal client, and the personal client can extract information such as contact information, geographic position and the like of the user under the condition that the user agrees, and stores and registers the information.
Specifically, the method comprises the following steps:
1. when a person opens a personal client, the system acquires the matching of the geographic position and the nearby point location for automatic registration;
2. acquiring personnel identity, basic information, registration time and geographical position thereof through a point location field identification device, and automatically registering;
3. if the personnel perfect the personal information in the client, the vehicle information and the source information are automatically extracted without filling again when the personnel logs in and out, and if the personnel has a registration record passing any point, the system automatically extracts the vehicle information and the source information, and the user can modify the vehicle information and the source information according to the actual situation.
4. And the system is in butt joint with an operator, personnel travel information is acquired, and dangerous travel history is displayed in a personal client of a user.
5. The field information registered and input at different point locations is customized, a special two-dimensional code for point location access registration is generated, and the information acquisition requirements of the point locations in different areas on visitors are met. For example, the body temperature is set as an indispensable item in an epidemic prevention and control area, and the body temperature is set as an optional item in an epidemic low risk area.
Further, a specified team is set as an inspection team, the staff goes to the job-carrying condition of each point location inspection worker, the point location identification code is scanned through the personal client, the staff on duty information of the point location can be checked, information such as an inspection result is uploaded to the background, and the management staff can check the inspection record through the personal client and the background system.
As further optimization, when an inspector arrives near a point location, a personal client side inspection reporting function is started, the system acquires the geographic position, automatically displays the point location information closest to the system, and directly performs inspection and registration.
Furthermore, the RFID technology is utilized to carry out warehouse-out and warehouse-in informatization management on the equipment. The RFID tag is fixedly adhered to each equipment, the RFID tag on the equipment is read by the RFID reader-writer, and the information of the fire-fighting equipment going out of the warehouse is stored according to the attendance serial number in a classified manner, so that the equipment is beneficial to systematic taking, timely inquiry and management are conveniently carried out on the loss and the use condition of the equipment, and the management efficiency of the equipment is improved.
Further, the early warning comprises off duty early warning, patrol early warning, monitoring early warning and suspicious behavior early warning;
and the background manager can check the duty condition of each position person through the Web end and the tablet personal computer, check whether the worker is off duty and has lost duty or not, and count the card punching records of the patrolman within or outside the responsibility area range. The system can check the registration records of the entrance and the exit of each point location personnel, judge whether the personnel are the external personnel or not through personnel identification card information, travel information and historical registration information, and judge whether the personnel are the external vehicles or not through license plate number information. As further optimization, the system provides an early warning function to carry out early warning on personal client sides, Web ends and tablet computers of workers, and comprises the following steps:
off-Shift early warning: the fixed duty personnel acquire the geographical position of the fixed duty personnel at intervals in a duty state, and if the fixed duty personnel are separated from the fixed point position for a period of time, the fixed duty personnel are pushed off duty prompts, and meanwhile, the fixed duty personnel are pushed off duty prompts to a Web end and a tablet computer; when no staff is on duty at a certain point for a period of time, off-Shift point position early warning information is generated at the Web end and the tablet computer.
Patrol early warning: when the patrol duty personnel report abnormal patrol results through the personal client, a patrol abnormal prompt is pushed to the Web end and the tablet computer.
Monitoring and early warning: the system can integrate satellite, detection and alarm devices, when an emergency event is detected, early warning prompt of event information in a Web end and a tablet computer can be automatically pushed, point location information closest to the emergency event is pushed to the Web end and the tablet computer, leaders or background commanders receive the early warning information and issue tasks, and personal clients of workers at nearby point locations go to the occurrence place after receiving the task information.
And (3) suspicious behavior analysis: through basic information, registration information, geographic positions, personnel tracks and the like submitted by people entering and exiting, big data personnel behavior analysis and user portrait analysis are carried out, whether suspicious behaviors exist or not and the probability of the suspicious behaviors after the people enter the area are judged, and the analysis results are returned to the staff and a background to carry out corresponding early warning prompt.
Further, the method is based on a two-dimensional map and a three-dimensional map and is used for displaying, managing and analyzing data by using a geographic information technology, and specifically comprises the following steps:
the distribution condition of all point locations in the jurisdiction range of map display can be displayed by clicking the point locations on the map, and the organization information, the latest position of the point location staff, the check registration and the access registration information can be displayed; the method can display information such as surrounding important targets, environments, population and the like, and directly create point locations on the map by combining the existing point location distribution condition.
And carrying out map display on the latest position and track information of the staff during attendance checking.
On the map, the latest patrol report, the information and the event early warning information can be received in real time, and the event handling and the task issuing can be directly carried out on the map.
Further, the background management system calculates point location pressure values of all the point locations, when the point location pressure value of a certain point location exceeds a threshold value, the background management system sends scheduling information to nearby on-duty point locations which do not exceed the threshold value, and staff of the personal client receiving the scheduling information serve as scheduling staff to go to the point locations which exceed the threshold value;
the dispatching personnel register the work at the point location exceeding the threshold value, the background management system recalculates the point location pressure value of the point location, and when the point location pressure value is smaller than the threshold value, the background management system stops sending dispatching information; specifically, the method comprises the following steps: the system utilizes openfire message pushing technology to push task scheduling information to the personal client of the patrol duty personnel at the point position with relatively small duty point pressure value according to the principle of proximity.
Point location pressure (current value of influence factor/threshold value of influence factor) is the proportion of influence factor.
For example: the normal staff flow threshold value is 3, the current staff flow value is 4, the proportion of the staff flow factors is 0.5, and the duty point pressure value is 3/4 × 0.5 and 0.375
Further, the influencing factor includes any one of: personnel movement, weather conditions, duty complexity, special festivals.
Further, the method is realized by utilizing a mouse monitoring event of a hundred-degree map, when a mouse is pressed down, the mouse pressing down event and the mouse moving event are triggered, the coordinate of each moving time is obtained, each point is recorded two, and the coordinate obtained each time and the coordinate obtained last time are connected into a line by utilizing the principle of 'click-to-line'. When the mouse is lifted, all the connected lines are removed, and the recorded points are used for drawing surfaces (the points are connected end to form a closed loop) to form a custom duty range.
Further, the big data platform performs index evaluation and regional security level evaluation of staged or annual work on the data counted by the background management system, and forms a summary report;
knowledge fusion and association are carried out on multi-source heterogeneous data, a knowledge map is constructed, and support is provided for commanding and decision-making from the machine cognition angle in order to effectively predict the occurrence and occurrence probability of events.
Further, early warning grades are defined and are specifically divided into five grades, namely an I zone (low risk zone), a II zone (low risk zone), a III zone (medium risk zone), an IV zone (high risk zone) and a V zone (high risk zone).
Counting the disaster-causing factors, counting the reasons of possible events through historical event data, and producing the disaster-causing factors, wherein the method specifically comprises the following steps:
1. personnel density: analyzing and calculating personnel density of the area through personnel entry and exit registration data; for example, if a large amount of external people enter a certain area, artificial disasters are easy to occur, so that the early warning level of the area is improved; climate conditions: accessing meteorological data, and performing statistical analysis on the weather of events such as disasters, such as drought, flood, freeze damage, hail, sandstorms and the like which are easy to cause major natural disasters, so that the early warning level of the area is improved;
2. special festival: for example, during Qingming festival, the fire is easily caused by burning paper money; in the spring festival, fire and the like are easy to happen due to the combustion of the firecrackers, so that the early warning level of the area is improved;
3. off-Shift condition: and monitoring the duty condition of each point location worker, and if the point location worker in a certain area has off-duty and off-duty conditions, easily ignoring risk information in the area, thereby improving the early warning level of the area.
An intelligent command management system based on identification technology comprises a daily duty registration module, a supervision and inspection registration module and a personnel access registration module;
the frequent duty registration module comprises fixed point duty and mobile duty. The identity information, the basic information and the position information of the managed person can be acquired through an identification technology to judge the operation which can be carried out, and automatic attendance checking, automatic registration, automatic reporting and the like are completed.
Fixed point duty: the staff on duty at the point location can scan the point location identification code or obtain the identity and the geographic position of the staff through the identification technology to punch the card, the background sets the staff on duty state in duty, and obtains the geographic position of the staff at intervals under the condition that the user allows and the personal client operates, and the off-duty and off-duty conditions of the staff are judged.
Moving on duty: the backstage can divide the patrol responsibility area for the position worker, the worker can walk and patrol after on duty and checking card, the backstage can acquire the geographical position of the worker at intervals to generate a patrol track, if the patrol occurs or an abnormality is found, a patrol report can be reported through the personal client, the system can automatically acquire the latest geographical position and the information reported by the worker, and the patrol worker can be communicated with the telephone and the video at the backstage.
The checking and registering module is used for checking the attendance information of the point location by the checking team, uploading the checking result and other information to the background, and checking the checking record by the management personnel through the personal client and the background system; when an inspector in an inspection team arrives near a point location, a system acquires a geographical position, automatically displays the point location information closest to the geographical position, and directly performs inspection and registration;
and the personnel access registration module is used for registering access of personnel and vehicles passing through the point location, extracting the contact information and the geographic position information of the user, and storing and registering the information.
1. When a person opens a personal client, the system acquires the matching of the geographic position and the nearby point location for automatic registration;
2. acquiring personnel identity, basic information, registration time and geographical position thereof through a point location field identification device, and automatically registering;
3. if the personnel perfect the personal information in the client, the vehicle information and the source information are automatically extracted without filling again when the personnel logs in and out, and if the personnel has a registration record passing any point, the system automatically extracts the vehicle information and the source information, and the user can modify the vehicle information and the source information according to the actual situation.
4. And the system is in butt joint with an operator, personnel travel information is acquired, and dangerous travel history is displayed in a personal client of a user.
The field information registered and input at different point locations is customized, a special two-dimensional code for point location access registration is generated, and the information acquisition requirements of the point locations in different areas on visitors are met. For example, the body temperature is set as an indispensable item in an epidemic prevention and control area, and the body temperature is set as an optional item in an epidemic low risk area.
And the system further comprises a material management and registration module, and the equipment is subjected to warehouse-out and warehouse-in informatization management by utilizing the RFID technology.
The system comprises a supervision server, a monitoring server and a database management server, wherein the supervision server is used for publishing equipment information, storing the warehouse-in and warehouse-out data information of equipment every time, and comparing the warehouse-in and warehouse-out information of the equipment with the published information; the equipment monitoring center is connected with the monitoring server through RS485 signals, and the equipment monitoring center system is used for recording the warehouse-out and warehouse-in information of the equipment and sending the obtained data information to the monitoring server; and the RFID label is in wireless signal connection with the equipment supervision center, and is fixedly adhered to each equipment. And reading the RFID label on the equipment by using an RFID reader-writer, and storing the warehouse-out information of the fire-fighting equipment according to the attendance number in a classified manner.
In each module, task pushing and message notification are carried out on the client side of the staff, an emergency positioning command is sent to the staff by using a command center system, the real-time position of the staff is obtained, and the staff closest to each duty point is calculated by an optimal distance algorithm, wherein the specific implementation mode is as follows:
firstly, emergency positioning is carried out to obtain personnel coordinates and a geohash corresponding to the personnel coordinates, wherein the geohash is an index column, the coordinates of a duty point are input and converted into the geohash, the precision (fuzzy query length) of the geohash is set, then 8 adjacent neighbors of the geohash are obtained, 9 points are obtained in total, the range of the nine points is sequentially queried in a left-like mode, and a target subset of workers is obtained.
The invention comprises a web end, a personal client end and a tablet computer end, wherein data synchronization is carried out between the personal client end and the web end, and the web is connected with the personal client end and the tablet computer end.
Although only the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the above embodiments, and various changes can be made without departing from the spirit of the present invention within the knowledge of those skilled in the art, and all changes are encompassed in the scope of the present invention.