Unlock instant, AI-driven research and patent intelligence for your innovation.

Vehicle security check system based on data analysis and working method thereof

A technology of data analysis and working methods, applied in the field of data analysis, can solve problems such as insufficient use of parking spaces and impact on traffic, so as to reduce the probability of delayed arrival, improve traffic efficiency, and improve the utilization rate of parking spaces.

Active Publication Date: 2020-08-28
济南澎湃信息技术有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increase of car ownership, the parking spaces in the community are increasingly tight, and the number of parking spaces in some early-built communities is less planned, and it is even unable to meet the needs of the community. The owner's parking needs, coupled with the fact that foreign vehicles will also park in the community, makes the parking space even more insufficient. For this reason, the property will prohibit foreign vehicles from entering or register for temporary entry. Visitors need to communicate with the owner, and then enter after verification by the property , requires the cooperation of three parties. During the peak period of vehicle entry and exit, queuing registration will affect the passage of other owners' vehicles, often causing conflicts between owners and visitors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vehicle security check system based on data analysis and working method thereof
  • Vehicle security check system based on data analysis and working method thereof
  • Vehicle security check system based on data analysis and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as figure 1 As shown, the present embodiment provides a working method of a vehicle security inspection system based on data analysis, including the following working steps:

[0073] S101: Send a visitor request to the client of the owner, where the visitor request includes the owner being interviewed, the visitor's license plate, and visitor time;

[0074] S102: Receive the visitor request sent by the visitor and check the information;

[0075] S103: Obtain the second location information of the owner's resident and send the second location information to the security client;

[0076] S104: judging whether the visitor vehicle is in a starting state;

[0077] S105: If yes, acquire the first location information of the visitor's vehicle and send the first location information to the security client;

[0078] S106: Precalculate the first time required to travel from the first location information to the second location information;

[0079] S107: Precalculate the...

Embodiment 2

[0097] Such as figure 2 As shown, S107 also includes:

[0098] Generate a recent driving route between the two places according to the first position information and the second position information and send the driving route to the visitor client;

[0099] judging whether the visitor vehicle is in a state of waiting for a red light according to the driving route and the first location information;

[0100] If so, calculate the first waiting time of the visitor vehicle;

[0101] The second time is changed according to the first waiting time, and the second time in S110 is the changed second time.

[0102] Such as image 3 As shown, if the visitor vehicle is not in the state of waiting for a red light, it is judged whether the visitor vehicle is in a parking state;

[0103] If so, calculate the second waiting time of the visitor vehicle;

[0104] judging whether the second waiting time is greater than a preset time;

[0105] If not, changing the second time according to t...

Embodiment 3

[0111] The temporary parking space and valid time of the visitor vehicle are reserved, and the temporary parking space is displayed in the driving route.

[0112] Such as Figure 4 As shown, the S108 previously also included:

[0113] Determine whether to arrive at the second time;

[0114] If so, determine whether the visitor vehicle has arrived;

[0115] If not, cancel the originally reserved temporary parking space, and reassign the temporary parking space when the visitor's vehicle arrives at the owner's community.

[0116] Specifically, in order to prevent visitor vehicles from occupying other people's parking spaces, temporary parking spaces are reserved for visitors according to the visitor's time. The temporary parking spaces are also related to the second time. The temporary parking spaces can be used by all visitors or owners. If it has not arrived within the second time, the temporary parking space of the visitor will be canceled, and the temporary parking space ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vehicle security check system based on data analysis and a working method thereof, and the system comprises: a first request sending module which is configured to send a visitor request to an owner client; a first position acquisition module which is configured to acquire first position information of a visitor vehicle and send the first position information to a securityclient; a second position obtaining module which is configured to obtain second position information of an owner resident and send the second position information to the security client; a first calculation module configured to pre-calculate a first time required to travel from the first position information to the second position information; a second calculation module which is configured to pre-calculate a second time when the visitor vehicle arrives; a scanning module which is configured to scan the license plate number entering the community; a second judgment module which is configuredto judge whether the license plate number is a visitor license plate or not; a third judgment module which is configured to judge whether the arrival time of the visitor vehicle is within the second time or not; and a passing module which is configured to allow the visitor vehicle to enter the owner community.

Description

technical field [0001] The invention relates to the field of data analysis, in particular to a vehicle security inspection system based on data analysis and a working method thereof. Background technique [0002] With the increase of car ownership, the parking spaces in the community are becoming more and more tense, and the number of parking spaces in some early-constructed communities is less planned, and it is even unable to meet the parking needs of the owners in the community. In addition, foreign vehicles will also park Entering the community makes the parking space even more insufficient. For this reason, the property will prohibit foreign vehicles from entering or registering for temporary entry. Visitors need to communicate with the owner, and then enter after verification by the property. The cooperation of the three parties is required. During the peak period of vehicle entry and exit, queuing registration will be difficult Affecting the passage of other owners' v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/22G07C9/27
CPCG07C9/22G07C9/27
Inventor 金驰
Owner 济南澎湃信息技术有限公司