CN102306096A - Regional security state analysis method based on security patrol GPS (global positioning system) - Google Patents

Regional security state analysis method based on security patrol GPS (global positioning system) Download PDF

Info

Publication number
CN102306096A
CN102306096A CN201110223297A CN201110223297A CN102306096A CN 102306096 A CN102306096 A CN 102306096A CN 201110223297 A CN201110223297 A CN 201110223297A CN 201110223297 A CN201110223297 A CN 201110223297A CN 102306096 A CN102306096 A CN 102306096A
Authority
CN
China
Prior art keywords
patrol
point
gps
security
track
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110223297A
Other languages
Chinese (zh)
Inventor
张明月
Original Assignee
刘建勋
金龙
李欢欢
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 刘建勋, 金龙, 李欢欢 filed Critical 刘建勋
Priority to CN201110223297A priority Critical patent/CN102306096A/en
Publication of CN102306096A publication Critical patent/CN102306096A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a regional security state analysis method based on security patrol GPS (global positioning system). The hardware include a GPS track recorder and a computer. The method comprises the following steps of: reading track data which are collected by the GPS track recorder which is a hardware unit; performing data mining on mass data; obtaining the information such as patrol frequency, time interval of patrol process in a patrol region, patrol weak point and patrol strong point, by space-time data correlation analysis, distribution law analysis, statistical analysis and the like; reflecting the security state analysis results of security patrol and check in a vivid and visual manner on the basis of the obtained information by virtue of analysis, treatment and display functions of the GIS (geographic information system) technique, so as to make aid decisions of patrol personnel assignment and task arrangement.

Description

A kind of regional security protection situation analytical approach based on security personnel's patrol GPS track
Affiliated technical field
The present invention relates to GPS (Global Positioning System; GPS), Geographic Information System (Geographic Information System; GIS) and the computer software new technology, be specially a kind of security personnel and go on patrol the security postures analytical approach based on the GPS track.
Background technology
In order to ensure safety of environment such as campus, community, orderly, the generation of prevention and minimizing campus accident is taken measures effectively, actively plans, and precision is disposed, and gives prominence to responsibility, and making every effort to implement is that security personnel go on patrol considerable aspect.How to carry out the accurate key issue that responsibility is positive plan of disposing, give prominence to, its basis source is in the security postures analysis result of current security personnel's patrol.At present; Environmental security situation analysis such as campus, community all is based on the judgement and the rational analysis of empirical value, owing to too depend on user's individual factor of having mixed, and therefore; The security postures analysis result all has subjectivity and prejudice property to a great extent, lacks certain justice.Along with GPS, GIS and fast development of computer technology, it is very necessary and significant proposing to go on patrol the security postures analyzing novel methods based on high-tech security personnel based on the GPS track.
GPS is the abbreviation of English Global Positioning System (GPS).Customer equipment part is that the GPS receiver can position calculating, calculate the longitude and latitude of user geographic location, highly, information such as speed, time.Present various types of receiver volume is more and more littler, and weight is more and more lighter, is convenient to field inspection and uses.The use of GPS equipment can be write down user of service's run trace; Preserve the longitude and latitude of tracing point, highly, preserve through speed and time data and the file that can derive specified format with per 3 or 5 seconds frequency, these complete space-time datas can be used to do the performance appraisal statistical study and excavate more profound information.The function of GPS portability of equipment and low cost and position the record track position makes that becoming acquisition exercises supervision and historical useful tool of patrolling and examining the Data Source of situation statistical study to security personnel's patrol personnel.
GIS is the abbreviation of English Geographic Information System (Geographic Information System); Have the obtaining of spatial data, store, show, functions such as editor, processing, analysis, output and application, be one based on the analysis of data base management system (DBMS) (DBMS) and the infosystem of management spatial object.This technology is to read the GPS track data and it is done the gordian technique that analyzing and processing shows, is easy to efficiently generate intuitively history and patrols and examines the situation map in order to the analysis of security personnel's patrol security postures.
In sum,, objectively and impartially reflect Environmental security situation such as campus, community based on GPS track statistical study security personnel patrol historical situation, for the security personnel's of objective and fair distribution with patrol mission deployment make aid decision making.Therefore, the research of going on patrol the security postures analysis based on the security personnel of GPS track is towards a kind of new method of practical application under the technology trends.
Summary of the invention
Problem in view of the above; The present invention introduces a kind of security personnel based on the GPS track and goes on patrol the security postures analyzing novel methods; Promptly read the track data that this hardware device of GPS track record appearance is collected; And mass data excavated; Through the space-time data association analysis; Regularity of distribution analysis and statistical study etc.; Obtain the patrol number of turns; The time interval of the every circle of beat; Information such as patrol weak tendency point and the surging point of patrol; Use for reference the GIS analysis of technology on this basis; Handle and Presentation Function; Reflecting that visual in imagely security personnel patrol and examine security postures and analyze situation, for the personnel of patrol distribute and task deployment etc. is made aid decision making.
A kind of regional security protection situation analytical approach based on security personnel's patrol GPS track, hardware comprises GPS track record appearance and computer hardware; The realization of method is divided into following five steps:
(1) selects K tracing point in the GPS patrol track at random;
(2) there is a cluster in the institute with the GPS track, from K, selects to divide as the ownership class apart from its nearest point;
(3) in K classification, search central point again, with patrol viewpoint as GPS patrol track;
(4) statistics is through the number of times of each patrol viewpoint;
(5) number of pass times of patrol viewpoint less than mean value be assessed as the weak tendency point, other are surging point.
In K classification, searching central point again, is through the security protection situation analysis based on the K-Means clustering algorithm with the patrol viewpoint as GPS patrol track, and K the definite realization code of patrol viewpoint is:
Figure BSA00000551329400031
Statistics is through the number of times of each patrol viewpoint; With the patrol point is that the center is that radius is drawn circle with 10m; Read GPS tracing point coordinate information successively; If the straight line of adjacent 2 formations passes this circle for once; Get each monitoring point and require the implementation capacity desired value through the number of times minimum value as accomplishing predetermined patrol, code is following:
Figure BSA00000551329400041
Wherein, two-dimensional array arrJCD reads and stores monitoring point information, comprises latitude and longitude value, title and the process number of times of check point, and the intAreaIndex of int type is the index value of check point in array, and the getDistance function obtains the point-to-point transmission fold line distance.
The present invention has following advantage and good effect.
1. the regional security protection situation analytical approach based on security personnel's patrol GPS track is the safeguard protection rank of beat to be realized a kind of innovation of robotization, informationization and high efficiency assessment among the present invention;
2. the inventive method realizes having generated safeguard information form in the selected beat period, statistical study the actual conditions of the regional detailed indication information of safety patrol inspection;
3. the inventive method realizes having generated all patrol personnel (beat) and patrols and examines number of turns contrast histogram in certain period, has showed performance appraisal data and examination actual conditions visually;
4. the inventive method realizes having generated certain single patrol personnel (beat) and patrols and examines number of turns variation broken line graph in certain period, intuitively;
5. the inventive method has realized showing on the map number of times situation of patrolling and examining of patrol viewpoint, has showed the distribution of beat security protection weak tendency point with surging point visual in imagely.
Description of drawings
Fig. 1 GPS tracing point data structure and broken line synoptic diagram.
Fig. 2 beat security protection situation analytic process synoptic diagram of ensuring public security.
Fig. 3 Electronic Patrol Management System software and hardware structure framework synoptic diagram of ensuring public security.
Fig. 4 goes on patrol viewpoint based on the security personnel of K-Means clustering algorithm and patrols and examines number of times leaching process figure.
The selected security personnel of Fig. 5 is certain section time inner region safeguard information form in beat.
All security personnels of Fig. 6 patrol and examine number of turns contrast histogram in certain period in beat.
The single patrol personnel of Fig. 7 patrol and examine number of turns variation broken line graph in certain period in beat.
The selected beat security protection of Fig. 8 situation analysis patrol viewpoint weak tendency point distribution plan.
Embodiment
Relate to two hardware devices among the present invention: GPS track record appearance and computer hardware.The configuration of computer hardware comprises; Processor: the compatible or processor faster of Pentium III-600 megahertz (MHz); Internal memory: 512,000,000 (MB) internal memories or more; Hard-disk capacity: approximately need the 1GB available hard disk space; Display: support 1,024x768 resolution or more high performance video adapter and monitor.Software environment comprises two parts: (1) development environment has Microsoft Visual Studio 2008, ESRI ArcGIS Engine9.3.1Runtime and Developer Kit for Windows and ESRI ArcGIS Desktop SDK for the Microsoft.NET Framework.(2) running environment, operating system: more than Windows2000/Windows XP simplified form of Chinese Character operating system reaches; Support software: Microsoft.NET Framework 3.5.
Text data in the GPS track record appearance is read from serial ports; Read delegation at every turn; Generally speaking; Kind can be received the multirow data in one second, and valid data Yi $GP starts, and Fen Wei $GPGGA 、 $GPGSA 、 $GPGSV 、 $GPRMC...$GPGGA is the general data of GPS location; Obtain essential informations such as longitude, latitude, sea level elevation, time, satellite operating position through resolving it; Wherein use CSV for every, totally ten four commas are exemplified below:
$GPGGA, 064746.000,4925.4895; N, 00103.9255, E; 1,05,2.1;-68.0, M, 47.1; M,, 0000*4F$GPGGA (statement marking head); (064746.000 UTC time), 4925.4895 (latitudes), N (latitude hemisphere); (00103.9255 longitude), E (longitude hemisphere), 1 (alignment quality indication); 05 (use number of satellite), 2.1 (horizontal accuracies) ,-68.0 (sea level elevations); M (height unit), 47.1 (geoidal heights), M (height unit); (differential GPS data time limit), 0000 (difference reference base station label) * 4F (verification) (end mark new line).
Basis of the present invention is the region security situation analytical approach of introducing based on security personnel's patrol GPS track; Promptly generate the general module of beat security postures distribution plan and patrol details form, a kind of new model of analyzing the beat security postures intuitively of brand-new image is provided through analytic statistics GPS track data.The operating process of concrete software and hardware combining is described below: (1) obtains original gps data through the fetch equipment in the application software; Promptly read GPS track record appearance through serial ports of computers; Preserve wherein data for the CSV form in the local computer hardware memory space, the principle of realization is as as described in the epimere; (2) through the interpolation track in the application software csv file of storing on the computer hardware is added in the software; Promptly through browsing local csv file; Read each tracing point in the csv file; The tracing point information content comprises INDEX; TRACK NUM; UTC DATE; UTC TIME; LOCAL DATE; LOCAL TIME; LATITUDE; N/S; LONGITUDE; E/W; Totally 12 of ALTITUDE and SPEED; Represent automatic index value respectively; Track record number; The UTC date; The UTC time; Local date; Local time; Longitude; North/south; Dimension; East/west; Height and speed; Analyze tracing point space time information and velocity information etc. and can obtain the performance appraisal desired value, and each csv file is divided into the sub-trajectory section according to the date.
The parameter value of security postures evaluation has a lot; Such as time interval of patrolling and examining the number of turns, the every circle of beat of beat, patrol weak tendency point with go on patrol surging point, and the scope of patrolling and examining covers the number percent and each beat intersection (overlapping) scope ratio of whole campus or community's scope.Have to each its form of expression of security postures analysis indexes parameter designing: selected patrol personnel (beat) patrol and examine number of turns details form, all patrol personnel (beat) and patrol and examine number of turns contrast histogram, certain single patrol personnel (beat) in certain period and patrol and examine the number of turns in certain period and change broken line graph, patrol viewpoint and patrol and examine number of times information report and patrol weak tendency point and surging and put five kinds of forms such as distribution plan in certain period.The analysis of security personnel patrol security postures is that the security personnel of labor beat patrols and examines situation, checks whether level of security that beat is gone on patrol has or not the capable helper of leak.The supvr can check certain section interior patrol of time of patrol personnel (beat) number of turns details form at any time and go on patrol viewpoint and patrol and examine the number of times information report; Security postures analysis diagram map is the visualize form of form, and all patrol personnel (beat) patrol and examine number of turns contrast histogram, certain single patrol personnel (beat) and patrol and examine in certain period that the number of turns changes broken line graph and patrol weak tendency point and surging to put distribution plan be the visual expression of report data in certain period.Multi-form security postures is analyzed very convenient supvr beat is carried out the security postures analysis, effectively improve the zone by degree of protection and level of security.
More than the realization of security protection situation analysis of five kinds of forms mainly be divided into following five steps: 1) read the GPS track csv file of corresponding certain patrol personnel (beat) certain time, obtain the longitude and latitude, elapsed time of its coordinate points that comprises and through information such as speed; 2) time interval of the number of turns, the every circle of beat is patrolled and examined in extraction such as rudimentary algorithm of excavating through the space clustering algorithm, based on the statistical analysis technique of space-time characteristic and space-time data, the information such as number of pass times of going on patrol viewpoint deposit in the database; 3) receive the patrol personnel (beat) and the time period of submit queries, and generate the record in the table of alternative condition garbled data storehouse; 4) utilize the data of screening, the use in conjunction with controls such as control such as DataGridView data presentation control, ZedGraph picture control and ArcGIS Engine MapControl generates visual in image form, histogram or broken line graph; 5) select csv file to combine the GIS technology on map, to show the information such as number of pass times of making an inspection tour point, construct weak tendency point and surging some distribution plan.
Difference according to the information extraction of security personnel's patrol track; Realizing from the GPS trail file of CSV form, obtaining the time interval of patrolling and examining the number of turns, the every circle of beat, the number of pass times that goes on patrol viewpoint and the evaluation of weak tendency point advantage point etc. with the C# programming is example, and procedure declaration is following:
One, patrols and examines the acquisition methods of number of turns information in security personnel's patrol track
The extraction of patrolling and examining the number of turns mainly obtains based on the spatial-temporal characteristics statistical study of track data.The space-time characteristic constraint condition that needs to satisfy comprises following three: at first, the variation of trajectory direction characteristic, the every circle of beat must occur in greater than under the direction situation of change of 90 degree less than 180 degree; Secondly, get rid of reentry phenomenon, the characteristic of turning back is that short-range twice direction changes; At last, direction variation characteristic origination point needs in starting point and end point just effective, and every direction away from starting point and end point changes to calculate makees patrol one circle.
Two, the acquisition methods of the every circle time interval information of beat in security personnel's patrol track
Obtaining to patrol and examine the number of turns of the time interval of the every circle of beat is the basis.When increasing the beat number of turns, note the time at every turn, so just can confirm the time interval of the every circle of beat.Not only can contrast the special circumstances of judging in the patrol process analysis time at interval, can also analyze security personnel's patrol track quantitatively.
Three, the method for weak tendency point and the evaluation of surging point during security personnel's beat security protection situation is analyzed
K-Means space clustering algorithm is to evaluate weak tendency point and the surging core methed of putting in the analysis of security personnel's beat security protection situation.The realization of this method is divided into following five steps: (1) is selected K tracing point in the GPS patrol track at random; (2) there is a cluster in the institute with the GPS track, from K, selects to divide as the ownership class apart from its nearest point; (3) in K classification, search central point again, with patrol viewpoint as GPS patrol track; (4) statistics is through the number of times of each patrol viewpoint; (5) number of pass times of patrol viewpoint less than mean value be assessed as the weak tendency point, other are surging point.
K definite realization code of patrol viewpoint in analyzing based on the security protection situation of K-Means clustering algorithm:
Figure BSA00000551329400091
The realization that number of times calculates of patrolling and examining of the patrol viewpoint of step 4 is to be that the center is that radius is drawn circle with 10m with the patrol point, reads GPS tracing point coordinate information successively, and explanation through this patrol point once if the straight line of adjacent 2 formations passes this circle.Get each monitoring point and require the implementation capacity desired value as accomplishing predetermined patrol through the number of times minimum value.Code is following:
Figure BSA00000551329400092
Figure BSA00000551329400101
Wherein, Two-dimensional array arrJCD reads and stores monitoring point information; Comprise latitude and longitude value, title and the process number of times etc. of check point, the intAreaIndex of int type is the index value of check point in array, and the getDistance function obtains point-to-point transmission fold line distance (kilometer).
Below in conjunction with accompanying drawing, describe the specific embodiment of the present invention in detail.
GPS equipment whenever has INDEX, TRACKNUMBER, UTC DATE at a distance from the tracing point data item of storage in 3 or 5 seconds; UTC TIME; LOCAL DATE, LOCAL TIME, LATITUDE; N/S; LONGITUDE, E/W, ALTITUDE and SPEED etc.; Read track csv formatted file and on map, be shown as dog leg path figure as shown in Figure 1, this is utilize the track data of GPS equipment records to ensure public security basis that beat security protection situation analyzes.The core of this security personnel's patrol security protection situation analytical approach is to read the statistical study of GPS track data to obtain regional security protection situation influence factor value; As patrol and examine the number of turns, the time interval, the patrol viewpoint of patrolling and examining every collar region patrol and examine number of times and weak tendency point and the surging distribution plan of putting etc.; And then generating form chart and map demonstration, its process synoptic diagram is as shown in Figure 2.Security personnel's Electronic Patrol Management System software and hardware structure framework synoptic diagram utilizes this method to realize the regional security protection situation split process of Fig. 2 under the prerequisite of software and hardware combining as shown in Figure 3.
Letter and the information extraction of summarizing this method is handled framework as shown in Figure 3.At first, read the GPS track csv file of corresponding certain patrol personnel (beat) certain time; Then, changing space-time characterisation according to the direction of K-Means space clustering algorithm and track respectively extracts patrol viewpoint, patrol viewpoint and patrols and examines number of times and patrol and examine the number of turns, patrol and examine the information such as the time interval of regional every circle; The method that weak tendency point and surging point were evaluated during acquisition methods and security personnel's beat security protection situation of going on patrol the every circle time interval information of beat in the acquisition methods of patrolling and examining number of turns information in the track, the security personnel's patrol track as top security personnel was analyzed is said; At last, with the patrol personnel (beat) and the temporal information of input and the regional safeguard information value of the patrol track extraction of should ensuring public security, add in the data-base recording.Wherein, go on patrol viewpoint based on the security personnel of K-Means clustering algorithm and patrol and examine the number of times leaching process as shown in Figure 4, main performing step is seen said method two.
Certain section interior beat safeguard information report generation of time of selected patrol personnel (beat) at first, receives the patrol personnel (beat) and the time period of submit queries as shown in Figure 5; Then, the record that meets alternative condition in the table of garbled data storehouse; At last, in conjunction with DataGridView data presentation control, with qualified patrol and examine the number of turns, monitoring time at interval, patrol and examine number of times and weak tendency and put surging dot position information etc. and be shown as report form.Certain section interior beat of time of all personnel (personnel) is patrolled and examined number of turns contrast histogram and is generated as shown in Figure 6, at first, receives the time period of submit queries; Secondly, the record that meets alternative condition in the table of garbled data storehouse; Once more, record is patrolled and examined averaging of the number of turns according to patrol personnel (beat); At last, in conjunction with ZedGraph picture control, be horizontal ordinate to comprise the date in the time period, be the ordinate display histogram with each patrol personnel's (beat) the number of turns of patrolling and examining.Certain section interior beat of time of certain single patrol personnel (beat) is patrolled and examined the number of turns and is changed the broken line graph generation as shown in Figure 7, on the principle class.
At first, load the map of beat; Secondly, the track csv file name that selection will be checked in the track tabulation; Once more, read the CSV data and add track broken line graph layer; At last, add the patrol viewpoint and patrol and examine information labeling such as number of times etc., be added on and show on the map, the patrol viewpoint patrol and examine number of times and the comparison of on average patrolling and examining number of times, constituted weak tendency point and surging some distribution, weak tendency point distribution situation shown in Figure 8.

Claims (3)

1. regional security protection situation analytical approach based on security personnel patrol GPS track, hardware comprises GPS track record appearance and computing machine; It is characterized in that:
(1) selects K tracing point in the GPS patrol track at random;
(2) there is a cluster in the institute with the GPS track, from K, selects to divide as the ownership class apart from its nearest point;
(3) in K classification, search central point again, with patrol viewpoint as GPS patrol track;
(4) statistics is through the number of times of each patrol viewpoint;
(5) number of pass times of patrol viewpoint less than mean value be assessed as the weak tendency point, other are surging point.
2. a kind of regional security protection situation analytical approach according to claim 1 based on security personnel's patrol GPS track; It is characterized in that: in K classification, search central point again; Patrol viewpoint with as GPS patrol track is through the security protection situation analysis based on the K-Means clustering algorithm, and K the definite realization code of patrol viewpoint is:
Figure FSA00000551329300011
Figure FSA00000551329300021
3. a kind of regional security protection situation analytical approach according to claim 1 based on security personnel's patrol GPS track; It is characterized in that: statistics is through the number of times of each patrol viewpoint; With the patrol point is that the center is that radius is drawn circle with 10m; Read GPS tracing point coordinate information successively; If the straight line of adjacent 2 formations passes this circle for once; Get each monitoring point and require the implementation capacity desired value through the number of times minimum value as accomplishing predetermined patrol, code is following:
Figure FSA00000551329300031
Wherein, two-dimensional array arrJCD reads and stores monitoring point information, comprises latitude and longitude value, title and the process number of times of check point, and the intAreaIndex of int type is the index value of check point in array, and the getDistance function obtains the point-to-point transmission fold line distance.
CN201110223297A 2011-08-05 2011-08-05 Regional security state analysis method based on security patrol GPS (global positioning system) Pending CN102306096A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110223297A CN102306096A (en) 2011-08-05 2011-08-05 Regional security state analysis method based on security patrol GPS (global positioning system)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110223297A CN102306096A (en) 2011-08-05 2011-08-05 Regional security state analysis method based on security patrol GPS (global positioning system)

Publications (1)

Publication Number Publication Date
CN102306096A true CN102306096A (en) 2012-01-04

Family

ID=45379962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110223297A Pending CN102306096A (en) 2011-08-05 2011-08-05 Regional security state analysis method based on security patrol GPS (global positioning system)

Country Status (1)

Country Link
CN (1) CN102306096A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408163A (en) * 2016-08-30 2017-02-15 长威信息科技发展股份有限公司 Patrol resource optimization method and system
CN106817708A (en) * 2016-12-30 2017-06-09 广州市申迪计算机***有限公司 One kind patrols and examines cluster construction method and device
CN107833307A (en) * 2017-11-21 2018-03-23 航天科工智慧产业发展有限公司 Intelligence based on GPS goes on patrol work attendance examination and evaluation method and system in the street
CN107844555A (en) * 2017-10-31 2018-03-27 陈菡 A kind of patrol freezing point based on Police Geographic Information System determines method
CN109085850A (en) * 2018-09-10 2018-12-25 国网电力科学研究院武汉南瑞有限责任公司 The autonomous method for inspecting of unmanned plane based on passway for transmitting electricity three-dimensional thunder total number evidence
CN110245699A (en) * 2019-06-04 2019-09-17 南京天溯自动化控制***有限公司 A kind of intelligent control method and system for indoor inspection service quality

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2081163A1 (en) * 2008-01-21 2009-07-22 Thales Nederland B.V. Multithreat safety and security system and specification method thereof
CN101995244A (en) * 2010-08-30 2011-03-30 中国测绘科学研究院 Method for acquiring object coordinates
CN102044094A (en) * 2009-10-10 2011-05-04 ***通信集团福建有限公司 Line polling management system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2081163A1 (en) * 2008-01-21 2009-07-22 Thales Nederland B.V. Multithreat safety and security system and specification method thereof
CN102044094A (en) * 2009-10-10 2011-05-04 ***通信集团福建有限公司 Line polling management system and method
CN101995244A (en) * 2010-08-30 2011-03-30 中国测绘科学研究院 Method for acquiring object coordinates

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408163A (en) * 2016-08-30 2017-02-15 长威信息科技发展股份有限公司 Patrol resource optimization method and system
CN106817708A (en) * 2016-12-30 2017-06-09 广州市申迪计算机***有限公司 One kind patrols and examines cluster construction method and device
CN106817708B (en) * 2016-12-30 2018-06-05 广州市申迪计算机***有限公司 A kind of inspection cluster construction method and device
CN107844555A (en) * 2017-10-31 2018-03-27 陈菡 A kind of patrol freezing point based on Police Geographic Information System determines method
CN107844555B (en) * 2017-10-31 2020-06-09 北京天耀宏图科技有限公司 Patrol freezing point determination method based on police geographic information system
CN107833307A (en) * 2017-11-21 2018-03-23 航天科工智慧产业发展有限公司 Intelligence based on GPS goes on patrol work attendance examination and evaluation method and system in the street
CN109085850A (en) * 2018-09-10 2018-12-25 国网电力科学研究院武汉南瑞有限责任公司 The autonomous method for inspecting of unmanned plane based on passway for transmitting electricity three-dimensional thunder total number evidence
CN110245699A (en) * 2019-06-04 2019-09-17 南京天溯自动化控制***有限公司 A kind of intelligent control method and system for indoor inspection service quality

Similar Documents

Publication Publication Date Title
US11933774B1 (en) Leak detection event aggregation and ranking systems and methods
CN110689705B (en) Comprehensive application system for mine geological environment management
DeMers Fundamentals of geographic information systems
US10962437B1 (en) Aggregate leak indicator display systems and methods
Comber et al. Spatial interpolation using areal features: A review of methods and opportunities using new forms of data with coded illustrations
Haklay How good is volunteered geographical information? A comparative study of OpenStreetMap and Ordnance Survey datasets
Honoré et al. Predictability of European air quality: Assessment of 3 years of operational forecasts and analyses by the PREV'AIR system
Ferster et al. A review of earth observation using mobile personal communication devices
CN102306096A (en) Regional security state analysis method based on security patrol GPS (global positioning system)
US10746714B2 (en) Air pollution source recognition based on dynamic pairing and comparison
CN104851043B (en) Tax fund checking and monitoring method based on geographic information system technology
Logsdon et al. Probability mapping of land use change: A GIS interface for visualizing transition probabilities
CN102435197A (en) MBR (Master Boot Record)-based GPS (Global Position System) track map matching method
CN102426678A (en) Public security patrol performance appraisal method based on GPS (Global Position System) track
CN106227843A (en) A kind of geological disaster field investigation information acquisition system and method
Cui et al. Top‐down estimate of methane emissions in California using a mesoscale inverse modeling technique: The San Joaquin Valley
Watson‐Parris et al. On the limits of CALIOP for constraining modeled free tropospheric aerosol
Bhattacharjee et al. Prediction of satellite-based column CO 2 concentration by combining emission inventory and LULC information
Senaratne et al. Using reverse viewshed analysis to assess the location correctness of visually generated VGI
Gao et al. Different spatiotemporal patterns in global human population and built‐up land
Prasannakumar et al. Applicability of SRTM data for landform characterisation and geomorphometry: a comparison with contour-derived parameters
Tohidi et al. A review of the machine learning in gis for megacities application
Kanapaka et al. A survey of tools for visualizing geo spatial data
Yamashkin et al. Geoinformation Methods and Technologies in the Study of Natural-Social-Production Systems
Clark Location gathering: An evaluation of smartphone-based geographic mobile field data collection hardware and applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120104