CN116127116A - Three-dimensional visual security management method and system - Google Patents

Three-dimensional visual security management method and system Download PDF

Info

Publication number
CN116127116A
CN116127116A CN202310138463.3A CN202310138463A CN116127116A CN 116127116 A CN116127116 A CN 116127116A CN 202310138463 A CN202310138463 A CN 202310138463A CN 116127116 A CN116127116 A CN 116127116A
Authority
CN
China
Prior art keywords
security
model
management
regional
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310138463.3A
Other languages
Chinese (zh)
Inventor
吴文逍
范志臣
王悦
刘健伟
赵奇虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Boviss Technology Co ltd
Original Assignee
Beijing Boviss Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Boviss Technology Co ltd filed Critical Beijing Boviss Technology Co ltd
Priority to CN202310138463.3A priority Critical patent/CN116127116A/en
Publication of CN116127116A publication Critical patent/CN116127116A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/54Browsing; Visualisation therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Graphics (AREA)
  • Geometry (AREA)
  • Software Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The application relates to a three-dimensional visual security management method and system, which belong to the technical field of security, wherein the three-dimensional visual security management method comprises the following steps: acquiring an area three-dimensional model of a security area and security equipment information; correlating the regional three-dimensional model with security equipment information to obtain a regional security model; based on preset security management rules, constructing a security management model according to the regional security model; and acquiring a security data stream, and generating security management information according to the security data stream and the security management model. The application has the effect of improving security accident handling efficiency.

Description

Three-dimensional visual security management method and system
Technical Field
The application relates to the technical field of security protection, in particular to a three-dimensional visual security protection management method and system.
Background
The security system is a security system, which is an intrusion alarm system, a video security monitoring system, an entrance control system, an explosion-proof security inspection system and the like which are formed by using security products and other related products, or an electronic system or network which is formed by combining or integrating subsystems by the systems. With the continuous improvement of the environmental quality requirements of people in areas such as living, working and the like. Intelligent security systems are becoming more popular.
At present, although a security system can monitor a designated area, the security system can only acquire a camera video stream of the designated area, and because the camera video stream is limited in information quantity, under the condition that security accidents occur in the designated area, condition confirmation is often needed to be carried out manually to the site so as to carry out next processing, so that the security accidents cannot be processed in time, and the processing efficiency of the security accidents is low.
Disclosure of Invention
The application provides a three-dimensional visual security management method and system, which have the characteristic of improving security accident handling efficiency.
The application aims at providing a three-dimensional visual security management method.
The first object of the present application is achieved by the following technical solutions:
a three-dimensional visual security management method comprises the following steps:
acquiring an area three-dimensional model of a security area and security equipment information;
correlating the regional three-dimensional model with security equipment information to obtain a regional security model;
based on preset security management rules, constructing a security management model according to the regional security model;
and acquiring a security data stream, and generating security management information according to the security data stream and the security management model.
Through adopting above-mentioned technical scheme, combine security protection equipment and security protection management regulation, establish security protection management model, then according to security protection management model, analyze security protection data, produce security protection management information, the staff in time knows security protection accident location, type and processing mode etc. through security protection management information to improve security protection accident's treatment effeciency.
The present application may be further configured in a preferred example to: the step of associating the regional three-dimensional model with security equipment information to obtain a regional security model comprises the following steps:
adding security marks at corresponding positions of the three-dimensional model of the area according to the position information of the security equipment, and carrying out signal correlation on the security marks and the corresponding security equipment;
according to the security equipment type information, carrying out type distinction on the security marks;
according to the security equipment application information, taking the security mark as a base point, and carrying out module division on the area three-dimensional model; the security equipment application information refers to the functional radiation range of the security equipment.
The present application may be further configured in a preferred example to: the method for correlating the regional three-dimensional model with the security equipment information to obtain the regional security model further comprises the following steps:
according to the security equipment type information, performing type association on security marks of the same type;
based on the space structure of the security area, the security marks of the same space structure are subjected to module association according to the security equipment position information and the security equipment application information.
The present application may be further configured in a preferred example to: the security management rule based on the preset is used for constructing a security management model according to the regional security model, and the security management model comprises the following steps:
according to security daily management regulations, corresponding security marks in the regional security model are linked with a security daily task list and a daily task sub-model; the daily task sub-model refers to a behavior image database and a device state database of a preset security daily task;
according to security maintenance management regulations, corresponding security marks in the interval security model are linked with a security maintenance task table and a maintenance task sub-model; the maintenance task sub-model refers to a behavior image database and an equipment state database of a preset security maintenance task;
according to security treatment management regulations, linking treatment management sub-models in the corresponding security marks in the regional security model; the processing management sub-model refers to a preset behavior image database and a preset equipment state database for processing foreseeable conventional security incidents;
and according to security specific management regulations, linking the specific management sub-model with the corresponding security mark in the interval security model.
The present application may be further configured in a preferred example to: according to security specific management rules, linking specific management sub-models corresponding to security marks in the interval security model comprises:
for a security forbidden area, linking a fixed image database with a corresponding security mark in the security model of the area;
and for the behavior forbidden region, linking a behavior image database and a device state database of the corresponding forbidden behavior in the corresponding security mark in the region security model.
The present application may be further configured in a preferred example to: the obtaining the security data stream and generating security management information according to the security data stream and the security management model comprises the following steps:
based on the security management rule, comparing the security data stream with a database linked with a corresponding security mark, and analyzing whether a security accident exists or not;
if yes, generating a security accident report, and associating the security accident report with a corresponding security mark;
and generating an accident handling report according to the security accident report, and associating the accident handling report with a corresponding security mark.
The present application may be further configured in a preferred example to: based on the preset security management rule, before the security management model is built according to the regional security model, the method further comprises the following steps: analyzing whether the construction of security equipment in the regional security model accords with the design rule; if the sections do not accord with the section, marking the sections which do not accord with the section on the regional security model.
The second purpose of the application is to provide a three-dimensional visual security management system.
The second object of the present application is achieved by the following technical solutions:
a three-dimensional visual security management system, comprising:
the first acquisition module is used for acquiring a regional three-dimensional model of the security area and security equipment information;
the association module is used for associating the regional three-dimensional model with the security equipment information to obtain a regional security model;
the building module is used for building a security management model according to the regional security model based on a preset security management rule;
the second acquisition module is used for acquiring security data streams;
the generation module is used for generating security management information according to the security data stream and the security management model.
In summary, the present application includes at least one of the following beneficial technical effects:
1. by combining security equipment and security management regulations, a security management model is built, security data is analyzed according to the security management model, security management information is generated, and workers timely know security accident places, types, processing modes and the like through the security management information, so that the processing efficiency of security accidents is improved;
2. through a plurality of sub-models linked by the security management model, various security accidents violating security management regulations are automatically identified, the workload of workers for checking data such as monitoring videos is reduced, the discovery rate and timeliness of the security accidents are improved, and the processing efficiency of the security accidents is further improved.
Drawings
Fig. 1 is a schematic flow chart of a three-dimensional visual security management method in an embodiment of the application.
Fig. 2 is a schematic structural diagram of a three-dimensional visual security management system in an embodiment of the application.
Reference numerals illustrate: 1. a first acquisition module; 2. an association module; 3. constructing a module; 4. a second acquisition module; 5. and generating a module.
Detailed Description
The present embodiment is merely illustrative of the present application and is not intended to be limiting, and modifications may be made to the embodiment by those skilled in the art without creative contribution as needed after reading the present specification, but are protected by patent laws within the scope of the claims of the present application.
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Embodiments of the present application are described in further detail below with reference to the drawings attached hereto.
The application provides a three-dimensional visual security management method, and the main flow of the method is described as follows.
As shown in fig. 1:
step S101: and acquiring an area three-dimensional model of the security area and security equipment information.
In the embodiment of the application, firstly, three-dimensional modeling is carried out on a security area, and an area three-dimensional model of the security area is obtained; the security area refers to an application area of the three-dimensional visual security management method in the application, such as a factory area, a residential district or an office building; when three-dimensional modeling is performed, model building is required to be performed on a security area including an inner and outer structure of a building, a building decoration structure, a water, electricity and gas supply system, a greening system, a traffic system, an air conditioning and ventilation system and the like, and production equipment is required to be performed on the modeling of a factory area so as to completely display information of the security area; the more complete the established regional three-dimensional model is, the more beneficial is to the creation of the subsequent three-dimensional visual security management method.
Then, information acquisition is carried out on the installation position, the equipment type and the functional radiation range of the security equipment in the security area, so as to obtain security equipment information; the security equipment comprises an access control device, a monitoring camera, monitoring alarm equipment and security protection equipment; the monitoring alarm equipment is equipment for monitoring a certain dimension and carrying out abnormal alarm, and comprises a smoke monitoring alarm, an anti-theft monitoring alarm, a gas monitoring alarm and other alarm devices which need to be manually started; the safety protection equipment refers to fire-fighting and fire-proof equipment, flood-preventing equipment and the like.
Specifically, the security equipment information comprises installation position information, equipment type information and functional radiation range information; the installation position information is the installation position of the security equipment in the security area; the equipment type information, namely classifying security equipment according to functions; functional radiation range information refers to the range in which the function of the security device can cover the security area, for example: the functional radiation range of the entrance guard device at the gate of the district is the inside of the district, the functional radiation range of the entrance guard device at the gate of the unit building is the inside of the unit building, and the functional radiation range of the monitoring camera is the monitoring range of the camera; it can be understood that when the security equipment is installed at different positions, the corresponding functional radiation ranges are also different, and when the functional radiation range information of the security equipment is acquired, the functional radiation range of the security equipment needs to be accurately measured and calculated in a specific use environment.
Step S102: and correlating the regional three-dimensional model with security equipment information to obtain a regional security model.
After the regional three-dimensional model and the security equipment information are obtained through the step S101, firstly, security marks are added at corresponding positions of the regional three-dimensional model according to the installation position information of the security equipment, and the security marks are in signal association with the corresponding security equipment, namely, the data of the security equipment are associated with the corresponding security marks, and a worker can call the data of the corresponding security equipment through the security marks; for some security equipment that needs staff to hand-carry and detect at fixed position to detect fixed position is the interpolation point of security mark, and based on the time interval that detects, intermittent type nature carries out security equipment and security mark's signal connection, and when signal connection cuts off at every turn, security mark fixes last data, as the security data in this time of signal connection cuts off, the staff of being convenient for looks over relevant data.
Then, according to the equipment type information of the security equipment, classifying the security marks, and associating the security marks of the same type; the security equipment of each class corresponds to a security mark, and through the type association of the security mark, staff can directly call the data of all security equipment corresponding to any class in the security area, and a comprehensive and visual data understanding is formed for the working dimension of the corresponding security equipment.
Meanwhile, according to the functional radiation range information of the security equipment, the security mark is taken as a base point, the module division is carried out on the three-dimensional model of the area, and the modules corresponding to different security equipment can be overlapped; for example, for a cell gate inhibition device, the whole cell is in its functional radiation range, so the whole cell is a corresponding module; for the entrance guard equipment of the unit building, the functional radiation range is arranged in the unit building, and the corresponding module is arranged in the unit building; it can be understood that some buildings, trees and the like in the security area have a certain influence on the functional radiation range of some security devices (such as the monitoring camera), so in the embodiment of the application, when module division is performed, the operation is performed by combining the functional radiation range of the security devices with the area three-dimensional model.
Then, based on the space structure of the security area, performing module association on security marks of the same space structure according to the security equipment installation position information and the functional radiation range information; for example, the corresponding security marks of a hall of a hotel, a building security channel or a factory building can be associated as required, so that workers can directly call security equipment data of the corresponding space according to the space structure of the security area.
Through the steps, the regional three-dimensional model and the security equipment information are associated, and finally the regional security model is obtained; it can be understood that, for any security mark, both can carry out the kind and distinguish, can carry out the module again, when the staff need call a certain module, the security mark of a certain kind corresponds data, can call corresponding module earlier and call corresponding kind's data in corresponding module again, also can call corresponding kind earlier and call corresponding module's data in corresponding kind again.
In the embodiment of the application, after the regional security model is obtained, whether the security equipment construction in the regional security model meets the design specification can be analyzed according to the preset security construction design specification; if the area is not matched with the area, marking a non-matched area on the area security model; for example, if the regional security model is provided with a monitoring blind area of the monitoring camera, the blind area is marked, so that a worker is reminded to add the monitoring camera, and security equipment construction is perfected.
Step S103: based on preset security management regulations, a security management model is built according to the regional security model.
In the embodiment of the application, the preset security management rule comprises four aspects of daily management, maintenance management, processing management and specific management, and from the four aspects, a security management model is built according to the regional security model.
According to the first aspect, according to security daily management regulations, corresponding security marks in a regional security model are linked with a security daily task list and a daily task sub-model; daily management refers to daily tasks including inspection, cleaning, equipment on-off (such as on-off of factory processing equipment) and the like, and a daily task sub-model refers to a behavior image database and an equipment state database of preset security daily tasks.
According to the second aspect, according to security maintenance management regulations, corresponding security marks in the interval security model are linked with a security maintenance task table and a maintenance task sub-model; the maintenance management refers to maintenance tasks including equipment maintenance, building maintenance, greening maintenance and the like, and the maintenance task sub-model refers to a behavior image database and an equipment state database of a preset security maintenance task.
According to the third aspect, according to security treatment management regulations, corresponding security marks in the regional security model are linked with a treatment management sub-model; the processing management sub-model refers to a preset behavior image database and a preset equipment state database for processing foreseeable conventional security accidents, wherein the foreseeable conventional security accidents refer to security accidents which are known by all people, have simpler processing methods and have less influence on results, such as smoking in public places, stealing access control devices, burning single articles and the like.
According to the fourth aspect, according to security specific management regulations, corresponding security marks in the interval security model are linked with specific management sub-models; specific:
for a security forbidden area, linking a fixed image database with corresponding security marks in an area security model;
and for the behavior forbidden region, linking a behavior image database and a device state database of the corresponding forbidden behavior in the corresponding security mark in the region security model.
Step S104: and acquiring a security data stream, and generating security management information according to the security data stream and the security management model.
Based on security management regulations, comparing security data streams with databases linked with corresponding security marks, and analyzing whether security accidents exist or not; for example, no personnel are performing the patrol or maintenance task, or the patrol or maintenance task is performed without following the relevant prescription, applying a derivative, or a smoke alarm is generated in a certain area; if so, generating a security accident report, correlating the security accident report with the corresponding security mark, and displaying the corresponding security mark as an abnormal state, wherein the security mark is green in a normal state and red in an abnormal state; the security accident report comprises information such as time, place, accident type, accident degree and the like.
Generating an accident handling report according to the security accident report, and associating the accident handling report with a corresponding security mark; for example, if regional smoke alarm occurs, regional fire is marked to be most likely to occur in the region, and information such as personnel evacuation channels, fire-fighting equipment starting suggestions, staff arrival route suggestions and the like is generated according to the security management model.
Through the steps, workers can easily know where security accidents occur, and timely know the specific situation and treatment mode of the accidents through security accident reports and accident treatment reports, so that the treatment efficiency of the security accidents is improved; it can be understood that the security accident report and the accident handling report can be sent to personal terminal equipment of staff to timely inform processing suggestions such as accident places, accident types, arrival paths and the like, so that the accident handling efficiency is further improved.
The application also provides a three-dimensional visual security management system, as shown in fig. 2, the visual security management system includes: the first acquisition module 1 is used for acquiring an area three-dimensional model of a security area and security equipment information; the association module 2 is used for associating the regional three-dimensional model with the security equipment information to obtain a regional security model; the construction module 3 is used for constructing a security management model according to the regional security model based on a preset security management rule; the second acquisition module 4 is used for acquiring the security data stream; the generating module 5 is configured to generate security management information according to the security data stream and the security management model.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the disclosure. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.

Claims (8)

1. The three-dimensional visual security management method is characterized by comprising the following steps of:
acquiring an area three-dimensional model of a security area and security equipment information;
correlating the regional three-dimensional model with security equipment information to obtain a regional security model;
based on preset security management rules, constructing a security management model according to the regional security model;
and acquiring a security data stream, and generating security management information according to the security data stream and the security management model.
2. The three-dimensional visualized security management method according to claim 1, wherein the associating the regional three-dimensional model with security equipment information to obtain a regional security model comprises:
adding security marks at corresponding positions of the three-dimensional model of the area according to the position information of the security equipment, and carrying out signal correlation on the security marks and the corresponding security equipment;
according to the security equipment type information, carrying out type distinction on the security marks;
according to the security equipment application information, taking the security mark as a base point, and carrying out module division on the area three-dimensional model; the security equipment application information refers to the functional radiation range of the security equipment.
3. The three-dimensional visualized security management method according to claim 2, wherein the associating the regional three-dimensional model with security equipment information to obtain a regional security model further comprises:
according to the security equipment type information, performing type association on security marks of the same type;
based on the space structure of the security area, the security marks of the same space structure are subjected to module association according to the security equipment position information and the security equipment application information.
4. The three-dimensional visualized security management method according to claim 2, wherein the constructing a security management model based on the preset security management rule according to the regional security model comprises:
according to security daily management regulations, corresponding security marks in the regional security model are linked with a security daily task list and a daily task sub-model; the daily task sub-model refers to a behavior image database and a device state database of a preset security daily task;
according to security maintenance management regulations, corresponding security marks in the interval security model are linked with a security maintenance task table and a maintenance task sub-model; the maintenance task sub-model refers to a behavior image database and an equipment state database of a preset security maintenance task;
according to security treatment management regulations, linking treatment management sub-models in the corresponding security marks in the regional security model; the processing management sub-model refers to a preset behavior image database and a preset equipment state database for processing foreseeable conventional security incidents;
and according to security specific management regulations, linking the specific management sub-model with the corresponding security mark in the interval security model.
5. The three-dimensional visual security management method according to claim 4, wherein the linking the specific management sub-model according to the security specific management rule to the corresponding security mark in the interval security model comprises:
for a security forbidden area, linking a fixed image database with a corresponding security mark in the security model of the area;
and for the behavior forbidden region, linking a behavior image database and a device state database of the corresponding forbidden behavior in the corresponding security mark in the region security model.
6. The method of three-dimensional visual security management according to claim 4, wherein the obtaining the security data stream and generating security management information according to the security data stream and the security management model comprises:
based on the security management rule, comparing the security data stream with a database linked with a corresponding security mark, and analyzing whether a security accident exists or not;
if yes, generating a security accident report, and associating the security accident report with a corresponding security mark;
and generating an accident handling report according to the security accident report, and associating the accident handling report with a corresponding security mark.
7. The three-dimensional visualized security management method according to claim 1, wherein the method further comprises, before constructing a security management model according to the regional security model based on a preset security management rule: analyzing whether the construction of security equipment in the regional security model accords with the design rule; if the sections do not accord with the section, marking the sections which do not accord with the section on the regional security model.
8. A three-dimensional visual security management system, comprising:
the first acquisition module (1) is used for acquiring an area three-dimensional model of a security area and security equipment information;
the association module (2) is used for associating the regional three-dimensional model with security equipment information to obtain a regional security model;
the building module (3) is used for building a security management model according to the regional security model based on a preset security management rule;
the second acquisition module (4) is used for acquiring security data streams;
the generation module (5) is used for generating security management information according to the security data flow and the security management model.
CN202310138463.3A 2023-02-14 2023-02-14 Three-dimensional visual security management method and system Pending CN116127116A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310138463.3A CN116127116A (en) 2023-02-14 2023-02-14 Three-dimensional visual security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310138463.3A CN116127116A (en) 2023-02-14 2023-02-14 Three-dimensional visual security management method and system

Publications (1)

Publication Number Publication Date
CN116127116A true CN116127116A (en) 2023-05-16

Family

ID=86311604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310138463.3A Pending CN116127116A (en) 2023-02-14 2023-02-14 Three-dimensional visual security management method and system

Country Status (1)

Country Link
CN (1) CN116127116A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117218294A (en) * 2023-09-18 2023-12-12 东莞市东智创新科技有限公司 Park security equipment distribution management method based on three-dimensional modeling

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113642995A (en) * 2021-08-13 2021-11-12 山东中图软件技术有限公司 Management method and equipment based on intelligent park
CN113947220A (en) * 2021-09-27 2022-01-18 长江勘测规划设计研究有限责任公司 BIM + GIS-based intelligent operation and maintenance system for regional energy station and implementation method thereof
CN114697615A (en) * 2022-03-05 2022-07-01 青岛国真智慧科技有限公司 Industry garden security protection management and control system
CN115496640A (en) * 2022-08-04 2022-12-20 华能秦煤瑞金发电有限责任公司 Intelligent safety system of thermal power plant

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113642995A (en) * 2021-08-13 2021-11-12 山东中图软件技术有限公司 Management method and equipment based on intelligent park
CN113947220A (en) * 2021-09-27 2022-01-18 长江勘测规划设计研究有限责任公司 BIM + GIS-based intelligent operation and maintenance system for regional energy station and implementation method thereof
CN114697615A (en) * 2022-03-05 2022-07-01 青岛国真智慧科技有限公司 Industry garden security protection management and control system
CN115496640A (en) * 2022-08-04 2022-12-20 华能秦煤瑞金发电有限责任公司 Intelligent safety system of thermal power plant

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117218294A (en) * 2023-09-18 2023-12-12 东莞市东智创新科技有限公司 Park security equipment distribution management method based on three-dimensional modeling
CN117218294B (en) * 2023-09-18 2024-04-12 东莞市东智创新科技有限公司 Park security equipment distribution management method based on three-dimensional modeling

Similar Documents

Publication Publication Date Title
CN106097642B (en) A kind of city integrated piping lane intelligent monitoring and warning device
CN110021132A (en) A kind of Internet of Things fire prevention big data platform
CN113706355A (en) Method for building intelligent emergency system of chemical industry park
CN104329120A (en) Tunnel construction safety monitoring and management system and tunnel construction safety monitoring and management method
CN110652684A (en) Electric fire safety integrated management system
CN105320093A (en) Intelligent building monitoring system and method
CN213690892U (en) Utility tunnel intelligent monitoring and operation and maintenance system
CN111935219B (en) Community Internet of things management system
CN116127116A (en) Three-dimensional visual security management method and system
CN112994230A (en) Environment monitoring system for intelligent substation auxiliary system and use method thereof
CN112817261A (en) Multi-linkage personnel evacuation system and method in tunnel and storage medium
CN112634579A (en) Transformer substation security early warning linkage system
CN112288320A (en) Subway operation risk monitoring and management system
CN205121321U (en) Intelligent building monitored control system
KR20220071880A (en) Digital twin disaster management system customized for underground public areas
CN115100813B (en) Intelligent community system based on digital twins
CN115940408A (en) Transformer substation operation safety management and control system and method based on indoor and outdoor fusion positioning
CN113656872B (en) FM intelligent construction site operation and maintenance management and control system and method based on BIM
CN116958900A (en) Visual fire data monitoring system and monitoring method thereof
CN112163765A (en) Building site integrated management system
CN111145487A (en) Diesel power station cable and equipment fireproof monitoring system and method
CN116437054A (en) Video monitoring management system based on intelligent terminal
CN116449679A (en) Intelligent hospital security linkage control method and system based on digital twinning
CN114662951A (en) Fire-fighting engineering evaluation system based on cycle quality
CN206441230U (en) Self-help bank's equipment complex control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20230516

RJ01 Rejection of invention patent application after publication