Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Traffic violation analysis method based on knowledge graph and block chain

A knowledge graph and analysis method technology, applied in special data processing applications, unstructured text data retrieval, electrical components, etc., can solve problems such as inability to obtain driver photos, insufficient monitoring clarity, and reduction of illegal processing efficiency.

Active Publication Date: 2021-06-18
江苏博宇鑫信息科技股份有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the basic data layer of the traditional traffic violation processing system mainly relies on the basic databases established by different government departments such as traffic and public security. Finally, the result of the violation is obtained, and after the violation result is processed, the violating driver needs to go to the designated bank to pay the fine
[0005] Although the road monitoring system is becoming more and more perfect, the monitoring coverage area is gradually expanding, and the image clarity of monitoring equipment is also improving, but it is inevitable that there will be situations that cannot be solved by video monitoring: there will be situations where monitoring or monitoring cannot be installed due to remote or special geographical location. In areas with a small number, the clarity of monitoring may also be insufficient. This will cause the monitoring terminal to only be able to obtain photos of violating vehicles, but cannot obtain photos of the driver corresponding to the violation. When dealing with clear traffic violations, the driver can use the violation Loopholes in the processing process can avoid point deduction by buying and selling driver’s license points, and even escape legal sanctions, and this type of technology can only detect and analyze traffic violations that have occurred, and cannot predict violations. early warning
[0006] Due to the limited channels of data collection and unreliable sources in the traditional traffic violation processing system, the data collection rate of the basic database is low, the database structure is not uniform, and the data is difficult to verify and share with each other. When dealing with violations, various departments need to cooperate with each other, greatly Reduce the efficiency of handling violations; and in the process of data transmission, data is easily leaked or tampered with, and data security is insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic violation analysis method based on knowledge graph and block chain
  • Traffic violation analysis method based on knowledge graph and block chain
  • Traffic violation analysis method based on knowledge graph and block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Example 1: When a violation occurs, 3 drivers A, B, and C are associated from the knowledge map according to the license plate number, and it is the driver D who goes to the traffic control department to receive punishment, not any of the 3 drivers. Then it is directly judged that the driver Ding is suspected of topping the bag, and he will check and confirm with the traffic control department.

Embodiment 2

[0033] Example 2: When a violation occurs, 3 drivers A, B, and C are associated from the knowledge map according to the license plate number. The driver who goes to the traffic control department to receive punishment is driver A. It is an accident-prone area, and the information of drivers A, B, and C is analyzed separately. Driver A has a driving experience of more than 6 years and has run red lights, but the daily driving area is B; while driver B has a shorter driving experience and has just obtained Driver license, often driving near area A, and has repeatedly violated regulations by running red lights; driver C is also relatively short in driving experience, often driving near area C, and rarely violates regulations. Combined with Table 1-4, the above three drivers Suspected top bag calculation through knowledge graph, suspected top bag calculation: A=0.1+0.1+0.5+0.1=0.8, B=0.5+0.1+0.5+0.6=1.7, C=0.5+0.1+0.1+0.1=0.8, Finally, it is judged that driver A is suspected to be...

Embodiment 3

[0034] Example 3: A violation occurs. According to the license plate number, 3 drivers A, B, and C are associated from the knowledge graph. Driver A is the one who goes to the traffic control department to receive punishment. It is not an accident-prone area. After analyzing the driver information separately, it is found that driver A has a driving experience of more than 6 years, and his daily driving area is B, and the most common type of traffic violation is speeding; while driver B has a shorter driving experience and just With a driver's license, he often drives near Area A, and has repeatedly committed violations of running red lights; Driver C is also relatively short in driving experience, often drives near Area A, but rarely commits violations. Combined with Table 1-4, the above The three drivers performed suspected top bag calculations through knowledge graphs.

[0035] Suspected top bag calculation: A=0.1+0.5+0.1+0.1=0.8, B=0.5+0.5+0.5+0.6=2.1, C=0.5+0.5+0.1+0.1=1.2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A traffic violation analysis method based on a knowledge graph and a block chain comprises the following steps: after a violation behavior occurs, obtaining vehicle information according to a license plate of the violation and associating a knowledge graph, and matching a possible driver of the vehicle from the knowledge graph; a violation driver goes to a traffic management department to accept punishment, suspected package pushing behavior judgment is carried out on the violation driver, violation information of the driver and a vehicle is quickly inquired through a knowledge graph, violation occurrence prediction is carried out, and the violation early warning function is achieved; personal knowledge graph information of a driver is stored, sent and received through the block chain technology, data safety is improved, establishment of an information storage center is omitted, the disaster recovery effect is achieved, information in the block chain is made open and transparent, and illegal behaviors such as buying and selling scores and top packages of the driver are reduced.

Description

technical field [0001] The invention belongs to the field of artificial intelligence, and in particular relates to a traffic violation analysis method based on a knowledge map and a block chain. Background technique [0002] With the rapid development of the modern transportation industry, more and more people choose to travel by private car, but this has also led to an increase in vehicle violations. [0003] Today's vehicle violation analysis methods mainly rely on video surveillance technology. Monitoring equipment on the road, vehicle recorders, monitoring equipment in houses near the violation scene, and shooting by witnesses can greatly improve the effectiveness of this type of technology. After the illegal behavior occurs, it is only necessary to conduct forensic analysis on various collected information, and the correct judgment on the illegal behavior can be easily obtained. [0004] However, the basic data layer of the traditional traffic violation processing syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/36H04L29/08
CPCG06F16/367H04L67/1097H04L67/12
Inventor 宣帆周国冬刘世宇刘新成徐璀
Owner 江苏博宇鑫信息科技股份有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More