Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 613-618.doi: 10.11896/jsjkx.201000136

• Interdiscipline & Application • Previous Articles     Next Articles

Design and Implementation of Emergency Command System

NING Yu-hui1, YAO Xi2   

  1. 1 Shandong Command and Security Center for Civil Air Defense,Jinan 250014,China
    2 Shandong Survey and Design Institute of Water Conservancy,Jinan 250013,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:NING Yu-hui,born in 1981,Ph.D,senior engineer.His main research interests include design and application of computer software,command communication and emergency command equipment.
  • Supported by:
    Shandong Civil Air Defense Research Program 2019(2018RF001).

Abstract: At present,emergency events occur from time to time in the society.Emergency command has a certain significance for dealing with emergency events and stabilizing social order.However,the types,time and degree of emergency events are not specific,and the difficulty of emergency command decision-making and implementation is correspondingly increased.How to improve the intelligence of emergency command system has become a research topic.In view of this,this paper presents a design and implementation method of emergency command system.The system application architecture and system functions are designed.The system database structure,command and communication technology based on instant messaging are elaborated in detail.The Petri net is introduced into the system modeling,and adaptive modification is carried out to realize the intelligent emergency plan precipitation,emergency resource scheduling strategy generation.Finally,the experimental environment verifies the effectiveness and superiority of the proposed method.

Key words: Emergency command, Emergency plan, Instant communication, Petri net, Resource scheduling

CLC Number: 

  • TP311
[1] YANG W X,FAN K L,LEUNG L P.The practice and safety profile of endotracheal intubation in an emergency department:A single-center study in Shenzhen,China [J].HongKong Journal of Emergency Medicine,2020,27(6):428-433.
[2] ANTONIO C,SARA N,DEBORA S,et al.Impact of COVID-19 on the Pattern of Access to a Pediatric Emergency Department in the Lombardy Region,Italy [J].Pediatric Emergency Care,2020,36(10):213-225.
[3] WANG X M.Research on mobile model and emergency communication system of post-earthquake emergency rescue [D].DongHua University,2020.
[4] TIAN Y.Design andimplementation of Emergency Mobile Communication Command Platform [D].Tianjin:Tianjin University,2018.
[5] SHAO J W.An emergency command system based on scattering communication [D].Xidian University,2015.
[6] JAMIE M,JANETTE T,RICHARD J,et al.Using machine-learning risk prediction models to triage the acuity of undifferentiated patients entering the emergency care system:a systematic review[J].Diagnostic and Prognostic Research,2020(10):725-734.
[7] GE Y,WANG T,XU Y B.Assessment of emergency management capability based on gray analytic hierarchy process [J].Journal of Safety Science and Technology,2014,10(12):80-86.
[8] SHEN H Z.Emergency sequential group decision-making andsupport system for sudden critical events [M].Beijing:Science Press,2011:79-85.
[9] DU Y Y,JIANG C J,ZHOU M C.A Petri net-based model for verification ofobligations and accountability in cooperative systems [J].IEEE Transactions on Systems,Man,and Cybernetics,Part A:Systems and Humans,2009,39(2):299-308.
[10] HSIEH M C,WANG M Y,LEE W C,et al.Application ofHFACS,fuzzy TOPSIS,and AHP for identifying important human error factors in emergency departments in Taiwan[J].International Journal of Industrial Ergonomics,2018,67:171-179.
[11] OZDEMIRA,TUYSUZ F.An Integrated Fuzzy DEMATEL and Fuzzy ANP Based Balanced Scorecard Approach:Application in Turkish Higher Education Institutions[J].Journal of Multiple-Valued Logic & Soft Computing,2017,28:251-287.
[12] CHEN E Y,YUAN J H,LI Z W.Research on JSON-based sensor source trust evaluation model for Environmental monitoring [J].Journal of the Xi'an University of Technology,2020(7).
[13] DU Y Y,NING Y H,LIANG Q.Reachability analysis of Logic Petri Nets using incidence matrix [J].Enterprise Information Systems,2014,8(6):630-647.
[14] DU Y Y,NING Y H.Property analysis of Logic Petri Nets using reachable marking graphs [J].Frontiers of Computer Science in China,2014,8(4):684-692.
[15] ZHEN S Z,DENG Y F.Evaluation System of Urban Public Emergency Response Capability and its application [J].Journal of the Liaoning Technical University,2006,25(6):943-946.
[16] WANG W,CAO Y.Evaluation of Government Emergency Management Capability based on BP neural network [J].Research on Science and Technology Management,2018(10):117-125.
[18] YUAN S J,LIANG R W.PSO algorithm based emergency logistics vehicle scheduling [J].Logistics Technology,2019(7):339-346.
[19] WANG F.Research on crowd evacuation method and simulation based on BAS algorithm [D].Jinan:Shandong Normal University,2019.
[1] LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301.
[2] TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104.
[3] LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602.
[4] MA Ze-hua, LIU Bo, LIN Wei-wei, LI Jia-wei. Survey of Resource Scheduling for Serverless Platforms [J]. Computer Science, 2021, 48(4): 261-267.
[5] WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180.
[6] ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621.
[7] YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63.
[8] SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77.
[9] SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321.
[10] SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125.
[11] WANG Chen-xin, YANG Jia-hai, ZHUANG Yi, LUO Nian-long. Node Resource Scheduling for Future Network Experimentation Facility [J]. Computer Science, 2019, 46(12): 95-100.
[12] SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340.
[13] ZHAO Hong-wei, TIAN Li-wei. Cloud Computing Resource Scheduling Strategy Based on Improved Bacterial Foraging Algorithm [J]. Computer Science, 2019, 46(11): 309-314.
[14] CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314.
[15] HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!