A method and system for processing alarm plans based on network algorithms
A plan processing and algorithm technology, applied in the field of alarm plan processing methods and systems based on network algorithms, can solve many problems such as manual operation and the inability of the processing system to quickly generate alarm plans, and achieve the effect of reducing costs and improving maintainability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0018] Please refer to figure 1 , the embodiment of the present invention provides a method for processing an alarm plan based on a network algorithm, the method comprising:
[0019] 110. Obtain the location information of the alarm point and each access control device in the alarm area.
[0020] The execution subject of the method in the embodiment of the present invention is an alarm pre-plan processing system, which can be arranged in an intelligent building, with one floor of the intelligent building as an alarm area, and one room in the floor as a sub-area. The above-mentioned rooms are rooms in a broad sense, for example, office rooms, toilets, corridors, etc. are all regarded as rooms. The entire floor consists of individual rooms. In other embodiments, the system can also be arranged in other buildings, for example, it can be arranged in an exhibition hall, with an exhibition hall as an alarm area, and an exhibition area in the exhibition hall as a sub-area.
[0021...
Embodiment 2
[0044] Please refer to Figure 6 , the embodiment of the present invention also provides a network algorithm-based alarm plan processing system, the system includes:
[0045] Obtaining module 610, used to obtain the location information of alarm points and each access control device in the alarm area;
[0046] The connection module 620 connects the alarm point and each access control device as topological nodes to form a network topological graph;
[0047] Calculation module 630 is used to start from the alarm point and end at the access control equipment at the exit of the alarm area, use network algorithms to calculate the best route from the starting point to the end point, and obtain the best alarm plan.
[0048] Further, the alarm area includes more than two sub-areas, and the access control equipment belongs to each sub-area; the connection module 620 is specifically used to connect the access control equipment in the sub-area where the alarm point is located with the a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
