Mobile terminal intelligent control method
A mobile terminal and intelligent technology, applied in the direction of neural learning methods, neural architecture, biological neural network models, etc., can solve the problems of few sources of big data acquisition and large errors, and achieve high accuracy and practicability of the line. sex assurance effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] An intelligent control method for a mobile terminal, used in conjunction with a server and a mobile terminal, the server communicates with the mobile terminal after passing security scanning and login verification steps, and the server communicates with the mobile terminal through an external network communication mode, including initialization steps, The fault data self-calculation by collecting field data, the neural network training step using the fault data self-calculation result, and the fault intelligent prompting step by using the trained neural network.
[0043] described initialization steps (see attached figure 1 ):
[0044] The server builds a simulation model based on a field device. The server imports the parameters of the field device according to the settings, and at the same time sets the correlation between the field devices. The power system power flow calculation is performed separately in each state, and the server obtains the normal operation stat...
Embodiment 2
[0074] This embodiment is basically the same as Embodiment 1, the difference is that in this embodiment, the mobile terminal may also include a security verification deployment unit and an application unit, and the security verification deployment unit includes a security scanning module, a login verification Module, external network service management module, account management module, the application unit includes a fault monitoring module of the target field equipment, a speech recognition and understanding module, and a learning and training module, and the learning and training module includes a grid technology training module, a mobile examination module, a special Training module, learning material management module and training library.
[0075] The security verification deployment unit performs data transmission interaction by regulating the cloud platform and the ICT security transmission platform, the security scanning module is used to scan the user's login environm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


