Public security big data management method

A big data and public security technology, applied in the field of data processing, can solve the problems of data integrity and timeliness, which are difficult to meet intelligent applications, and achieve the effect of continuous optimization of data ecology

Active Publication Date: 2019-07-30
ZHUHAI XINDEHUI INFORMATION TECH
View PDF13 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through the summary of the current situation and problems of public security informatization and social informatization, it can be seen that the integrity, timeliness and quality of data are difficult to meet the needs of intelligent applications, and there is no effective channel to improve or solve question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below in conjunction with specific embodiments.

[0020] The key technical route adopted when carrying out data closed-loop construction in the present invention is:

[0021] 1. Flexible construction of logically integrated resource pools: gradually integrate original databases, resource databases, theme databases, knowledge databases, business databases and external data to form a unified data resource metadata center, fully supporting the public security big data governance capabilities, and targeting some The system data realizes physical decentralized storage, logical centralized management, and provides a unified data view through the ministerial-level information resource directory.

[0022] 2. Support continuous optimization of data models: Adopt data standardization strategy to comprehensively standardize the original library, resource library and theme library. On the one hand, it can adapt to changes in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a public security big data management method. The method specifically comprises the steps of data standardization processing, data classification, data cataloguing, data processing, database construction and data operation monitoring. By constructing the closed-loop data management method and through closed-loop data management and a closed-loop data application feedback mechanism, continuous optimization and perfection of data ecology are guaranteed. Through automatic, self-service and intelligent big data management, data finding, supplying, using and treating can beachieved, and therefore various problems of traditional data management in the big data era are solved in a one-stop mode, a data management system is built, data are rapidly recognized, a data management system is built, problems are monitored and rapidly found, a data application system is built, and data are shared and efficiently used.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a management method related to public security data. Background technique [0002] The public security comprehensive information management system is based on component software technology, adopts advanced system design ideas, realizes the perfect combination of Internet technology, geographic information technology and public security business, and effectively meets the management needs of public security system information collection, query, statistics, analysis and decision-making , It provides an ideal tool for the provincial, municipal, county and grassroots public security units to realize the strategic task of strengthening the police with science and technology. However, in the process of using the current public security comprehensive information management system, there are shortcomings such as system independence and data security cannot be guaranteed. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/215G06Q50/26
CPCG06Q50/26Y02P90/30
Inventor 翟永强杨刚阮崇鹤霍伟波蔡纤
Owner ZHUHAI XINDEHUI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products