[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106446941B - Unconventional emergency event dynamic priority method based on Model Matching - Google Patents

Unconventional emergency event dynamic priority method based on Model Matching Download PDF

Info

Publication number
CN106446941B
CN106446941B CN201610826499.0A CN201610826499A CN106446941B CN 106446941 B CN106446941 B CN 106446941B CN 201610826499 A CN201610826499 A CN 201610826499A CN 106446941 B CN106446941 B CN 106446941B
Authority
CN
China
Prior art keywords
key message
weight
data
key
priority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610826499.0A
Other languages
Chinese (zh)
Other versions
CN106446941A (en
Inventor
王慧斌
彭建华
吴学文
赵嘉
赵丽华
张丽丽
李臣明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHU filed Critical Hohai University HHU
Priority to CN201610826499.0A priority Critical patent/CN106446941B/en
Publication of CN106446941A publication Critical patent/CN106446941A/en
Application granted granted Critical
Publication of CN106446941B publication Critical patent/CN106446941B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/211Selection of the most significant subset of features
    • G06F18/2115Selection of the most significant subset of features by evaluating different subsets according to an optimisation criterion, e.g. class separability, forward selection or backward elimination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a kind of unconventional emergency event dynamic priority method based on Model Matching, it include: the set using the various key messages rule of key message model identification key message, real-time processing data stream is matched, filters out the key message for meeting rule by matching;Different types of key message, significance level in systems is different, and different key messages are assigned with different numerical value, and the size by assigning numerical value indicates the significance level of key message in systems;Calculate key message frequency, the number occurred in the key message unit time;That is key message rule is in key message time window, every class key message frequency of occurrences;Key message priority, the arithmetic average of key message frequency and weight product, key message frequency and weight are calculated, determines the significance level of key message in systems.

Description

Unconventional emergency event dynamic priority method based on Model Matching
Technical field
The unconventional emergency event dynamic priority method based on Model Matching that the present invention relates to a kind of, belongs to data processing skill Art field.
Background technique
The Natural Science Fund In The Light committee, China implements " unconventional sudden incidents report research " weight in starting in 2008 Since big project, numerous scholars and scientific worker study unconventional emergency event.
Unconventional emergency event identification and the important link for being the discovery that unconventional emergency event research, scholar and technical work Person obtains many progress in terms of unconventional emergency event identification and discovery by constantly studying.
It is achieved many in terms of unconventional emergency event research by the effort of numerous scholars and scientific worker Achievement.In existing research achievement, the research in terms of unconventional emergency event recognition methods and model has a common trait, The focus point for being exactly these research achievements is algorithm and model itself, how existing research achievement is efficiently applied to believe online Breath processing, corresponding research are also lacked.
Summary of the invention
Goal of the invention: aiming at the problems existing in the prior art, the data of unconventional emergency event are called pass by the present invention Key data, critical data correspond to key message, the knowledge of data flow of the emphasis in the processing of unconventional emergency event online information Not, data weighting, data occur frequency and priority carry out analysis, research, propose it is a kind of based on Model Matching very Emergency event dynamic priority method is advised, using method proposed by the present invention, is applied at online information for unconventional emergency event Reason provides a kind of alternative thinking and scheme.
Technical solution: a kind of unconventional emergency event dynamic priority method based on Model Matching, including critical data are known Not, key message weight calculation, the process that key message frequency calculates and key message priority calculates.
Critical data identification process
Key message model KMODEL: identifying the set of the various key messages rule of key message, to real-time processing number It is matched according to stream, filters out the key message for meeting rule by matching.
KMODEL=M (KRULE)=x | x ∈ KRULE } (4)
Real-time stream is matched by key message model, is calculated and is identified by key message logic rules, mistake Filter out the data acquisition system for meeting key message rule.
Key message model is a dynamic model, and in not homologous ray, the recognition rule of key message is different, is passed through Model configuration file record, description key message rule, construct key message model.
Before identifying critical data, key message model configuration file is loaded and parsed first, is closed Key information model data MS, key message model data are a key message regular collection, a key message rule parsing As a result a key message mark is corresponded to.
Key message weight
Key message weight: different types of key message, significance level in systems is different, to different crucial letters Breath assigns different numerical value, and the size by assigning numerical value indicates the significance level of key message in systems.
Initial data is matched by key message model, identifies that key message, key message are mapped to have The section of different weights.
Key message weight dynamic change, in not homologous ray, different business, the weighted value of key message is different, leads to Cross the relationship of key message weight configuration file record, description key message data weighting and key message.
Before identifying critical data, weight configuration file is loaded, weight configuration file is parsed, calculates weight mark Will obtains weight mark set WS, and WS is put into memory.The specific implementation steps are as follows:
1) weight configuration file is loaded;
2) to weight configuration file into parsing;
3) weight mark is calculated;
4) weight mark is put into memory list.
A kind of corresponding weight mark of weight type, indicates different weight marks by different numerical value (weighted value), leads to Crossing different weighted values indicates the weight type of different key messages, and the relationship of the two corresponds.
Weight mark configuration file is associated with key message configuration file by key message rule flag.
In conjunction with MS and WS, to original data stream, treated, and data flow is identified, recognition result passes through 1,0 two-value table Show, 1 indicates that identification data belong to key message, and 0 indicates that identification data are non-critical informations, if data meet key message rule Then, then identified data are key messages, are not otherwise, algorithm such as (5):
Wherein:
KSnIt is that key message rule starts in recognition cycle into current time, every class key message that system identification goes out Number set, DATA is identified data, and MS is model data.
Key message frequency
Key message frequency: the number occurred in the key message unit time.That is key message rule is in key message Between in window, every class key message frequency of occurrences.Frequency formula such as (6):
Pre=FFrequency (KSn, t) and=KSn/t (6)
Wherein:
KSnThe set for the number that every class key message identifies, t be key message rule recognition cycle start to The time span of current time.
Key message priority
Key message priority: the arithmetic average of key message frequency and weight product, key message frequency and weight, certainly The significance level of key message in systems is determined.
In a time slice, with the variation of time, the continual analysis of mass data, the priority of key message is not It is disconnected to change, dynamic adjustment is carried out by the key message priority to visualization display, real-time, preferential display priority is high Data, be averaged by the product of frequency and weight to key message, mean value is big, and priority is high, and priority data calculates It is a lasting process, priority dynamic adjusts formula such as (7):
Wherein:
Pre is the frequency of key message, is weight initial value, and WS is weight mark.
In real-time analyzer, mass data in real time, continually enter system, Pri value is big, then key message is excellent First grade is higher, and data are more crucial.
Detailed description of the invention
Fig. 1 is key message rule and key message relationship model figure;
Fig. 2 is model, key message rule and key message rule flag;
Fig. 3 is that key message is mapped to weight;
Fig. 4 is that key message identifies memory logic chart;
Fig. 5 is clock memory relational graph;
Fig. 6 is key message priority forming process relationship memory figure;
Fig. 7 is threshold method result figure;
Fig. 8 is key message frequency;
Fig. 9 is key message priority.
Specific embodiment
Combined with specific embodiments below, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate the present invention Rather than limit the scope of the invention, after the present invention has been read, those skilled in the art are to various equivalences of the invention The modification of form falls within the application range as defined in the appended claims.
A kind of unconventional emergency event dynamic priority method based on Model Matching, abbreviation Model Matching dynamic priority algorithm (PMADP), including critical data identification, key message weight calculation, key message frequency calculate and key message priority meter The process of calculation.Wherein critical data identifies link, and existing algorithm and model can be used as data recognition rule applied to this hair Bright method.
Critical data identification process
Key message time window: key message starts to calculate the time interval for being treated as end point to key message, this It is the lifetime of key message, key message is once processed, and (it is each to obtain that data are identified using key message recognition rule Class key message calculates the frequency of every class key message by key message frequency calculation formula, designs every class key message Weight is calculated the priority of every class key message by critical data weight, the frequency of calculating acquisition.) after, the mark of key message Note will reset to original state.
Key message rule KRULE: identifying the logical relation of key message, and logical relation contains number in real-time stream According to calculated relationship, incidence relation, judgment criterion, algorithm and computation model with independent function.Logical relation can be divided into:
Simple logic relationship: the only logical relation of single logical operation relationship.
DATA=data | data ∈ R } (1)
In formula (1), R is a kind of simple relation, and DATA is all data acquisition systems for meeting certain relationship R, and formula (1) indicates full All data acquisition systems of sufficient relationship R.
The production logic of formula (1) may be expressed as:
R—>DATA IF R THEN DATA (2)
Wherein: R is unity logic relationship, and DATA is the data for meeting R relationship.
Compound logic relationship: being passed through by multiple simple logic operation relations or simultaneously, the compositive relation that constitutes such as exclusive or.
In formula (3), R1, R2, R3, R4 are a kind of simple relations, and DATAC is all data acquisition systems for meeting these relationships, Formula (3) indicates all data acquisition systems for meeting the various combinations of relationship R1, R2, R3, R4.
Key message model KMODEL: identifying the set of the various key messages rule of key message, to real-time processing number It is matched according to stream, filters out the key message for meeting rule by matching.
KMODEL=x | x ∈ KRULE } (4)
Key message rule and key message model are a point total relationship, the relationship of key message rule and key message model Such as Fig. 1.Real-time stream is matched by key message model, is calculated and is identified by key message logic rules, filtering Meet the data acquisition system of key message rule out.
Key message model is a dynamic model, and in not homologous ray, the recognition rule of key message is different, is passed through Model configuration file record, description key message rule, construct key message model.
Before identifying critical data, key message model configuration file is loaded and parsed first, is closed Key information model data MS, key message model data are a key message regular collection, a key message rule parsing As a result a key message mark, resolution logic such as Fig. 2 are corresponded to.
Key message model property:
Key message model is key message regular collection, that is, key message model by numerous key message rules with The rule composition of these key message rule association relationships is described;
The corresponding key message rule flag of one key message rule, after the load of model configuration file, rule and mark The one-to-one correspondence of knowledge is indicated in calculator memory.
Key message weight
Key message weight: different types of key message, significance level in systems is different, to different crucial letters Breath assigns different numerical value, and the size by assigning numerical value indicates the significance level of key message in systems.
Initial data is matched by key message model, identifies that key message, key message are mapped to have The section of different weights, such as Fig. 3.
Key message weight dynamic change, in not homologous ray, different business, the weighted value of key message is different, leads to Cross the relationship of key message weight configuration file record, description key message data weighting and key message.
Before identifying critical data, weight configuration file is loaded, weight configuration file is parsed, calculates weight mark Will obtains weight mark set WS, and WS is put into memory.The specific implementation steps are as follows:
1) weight configuration file is loaded;
2) to weight configuration file into parsing;
3) weight mark is calculated;
4) weight mark is put into memory list.
A kind of corresponding weight mark of weight type, indicates different weight marks by different numerical value (weighted value), leads to Crossing different weighted values indicates the weight type of different key messages, and the relationship of the two corresponds.Key message and weight type, power Weight values relationship such as Fig. 4.
Weight mark configuration file is associated with key message configuration file by key message rule flag.
In conjunction with MS and WS, to original data stream, treated, and data flow is identified, recognition result passes through 1,0 two-value table Show, 1 indicates that identification data belong to key message, and 0 indicates that identification data are non-critical informations, if data meet key message rule Then, then identified data are key messages, are not otherwise, algorithm such as (5):
Wherein:
KSnIt is that key message rule starts in recognition cycle into current time, every class key message that system identification goes out Number set, DATA is identified data, and MS is model data.Key message identification memory logic is shown in Fig. 4.
Key message frequency
Key message frequency: the number occurred in the key message unit time.That is key message rule is in key message Between in window, every class key message frequency of occurrences.Frequency formula such as (6):
Pre=KSn/t (6)
Wherein:
KSnThe set for the number that every class key message identifies, t be key message rule recognition cycle start to The time span of current time, clock memory relationship are shown in Fig. 5.
Key message priority
Key message priority: the arithmetic average of key message frequency and weight product, key message frequency and weight, certainly The significance level of key message in systems is determined.
In a time slice, with the variation of time, the continual analysis of mass data, the priority of key message is not It is disconnected to change, dynamic adjustment is carried out by the key message priority to visualization display, real-time, preferential display priority is high Data, be averaged by the product of frequency and weight to key message, mean value is big, and priority is high, and priority data calculates It is a lasting process, priority dynamic adjusts formula such as (7):
Wherein:
Pre is the frequency of key message, is weight initial value, and WS is weight mark, PreiIndicate i-th of key message Frequency.
In real-time analyzer, mass data in real time, continually enter system, Pri value is big, then key message is excellent First grade is higher, and data are more crucial, and key message priority forming process relationship memory is shown in Fig. 6.
Experimental analysis
According to the achievement in Nsfc Major project " unconventional sudden incidents report research " It counts, in 2001 to the 2010 years especially great natural calamities in China, forest fire tops the list.Threshold method is ground in warning system Study carefully, using one of more method, experiment is compared analysis with threshold method to this algorithm using forest fire as references object.
The processing logic such as formula (8) of threshold method
IF R >=X THEN Doing (8)
If R is more than or equal to X, then doing logical process.In formula 8, X is the threshold value of setting, and R is initial data or various calculations The end value that method calculates.
Air humidity, temperature, the hydrocarbonaceous amount in air, wind-force, thunder and lightning are to determine an important factor for forest fire occurs.It is gloomy Cigarette, flame in woods are the direct embodiments of forest fires.
Data configuration situation explanation:
When air humidity: less than 61.6%, it may occur however that fire;
Area and temperature coefficient: R=0.367, P > 0.01, it may occur however that fire;
When hydrocarbonaceous amount in air: greater than 0.2%, Yi Fasheng fire;
When wind-force: less than 2 grade, it may occur however that fire;
When thunder and lightning: greater than 50 kilo-ampere, Yi Yinfa fire;
Cigarette: being fiery point;
Flame: being fiery point.
Area of woods is big, and temperature, humidity, wind-force, gas concentration, cigarette, fiery data change at any time, this just needs sensor Quantity is more, and acquisition time interval is short, therefore contains much information, and effectively to be monitored to forest fire, and application system needs are accomplished:
Alarm interference is few;
The high integration stress of priority, preferential display.
Data type, weight and threshold value relationship are shown in Table 1.
Air humidity, area and temperature coefficient, hydrocarbonaceous amount, wind-force, thunder and lightning, cigarette, fiery data are constructed by analog form.Phase Hope experimental data that can reflect as far as possible the actual data change situation an of long period in 200 minutes time dimensions, because This experimental data has biggish fluctuation.
Fig. 7 is the result of air humidity, area and temperature coefficient, hydrocarbonaceous amount, wind-force, thunder and lightning, cigarette, fiery threshold method.
According to formula 8, using the identical data of Fig. 7, air humidity, area and temperature coefficient, hydrocarbonaceous amount, wind-force, thunder and lightning, Cigarette, fiery frequency are shown in Fig. 8.
According to formula 9, using the identical data of Fig. 7, air humidity, area and temperature coefficient, hydrocarbonaceous amount, wind-force, thunder and lightning, Cigarette, fiery priority are shown in Fig. 9.
As seen in Figure 7, using threshold method, alarm interference is more, and key message emphasis does not protrude.
By Fig. 8,9 as can be seen that using new algorithm, invalid warning information is reduced, the information priorities highest of most critical, It is displayed by priority and pays close attention to.
3.1 data type of table, weight and threshold value relationship

Claims (3)

1. a kind of unconventional emergency event dynamic priority method based on Model Matching, it is characterised in that: know including critical data Not, key message weight calculation, the process that key message frequency calculates and key message priority calculates;
Critical data identification process
Key message model KMODEL: the set of the various key messages rule of key message is identified, to real-time processing data stream It is matched, filters out the key message for meeting rule by matching;
Key message weight
Different types of key message, significance level in systems is different, and different key messages are assigned with different numerical value, Size by assigning numerical value indicates the significance level of key message in systems;
Key message frequency
Key message frequency, the number occurred in the key message unit time;I.e. key message rule is in key message time window It is interior, every class key message frequency of occurrences;
Key message priority
Key message priority, the arithmetic average of key message frequency and weight product, key message frequency and weight, determine The significance level of key message in systems;
Before identifying critical data, key message model configuration file is loaded and parsed first, obtains crucial letter Model data MS is ceased, key message model data is a key message regular collection, a key message rule parsing result A corresponding key message mark;
Initial data is matched by key message model, identifies that key message, key message are mapped to have difference The section of weight;Key message weight dynamic change, in not homologous ray, different business, the weighted value of key message is different, Pass through the relationship of key message weight configuration file record, description key message data weighting and key message;
Before identifying critical data, weight configuration file is loaded, weight configuration file is parsed, calculated weight mark, obtain Weight mark set WS is obtained, and WS is put into memory;The specific implementation steps are as follows:
1) weight configuration file is loaded;
2) to weight configuration file into parsing;
3) weight mark is calculated;
4) weight mark is put into memory list;
A kind of corresponding weight mark of weight type, indicates different weight marks by different numerical value, passes through different weighted values Indicate the weight type of different key messages, the relationship of the two corresponds;
Weight mark configuration file is associated with key message configuration file by key message rule flag;
In conjunction with MS and WS, to original data stream, treated, and data flow is identified, recognition result is indicated by 1,0 two-value, 1 Indicate that identification data belong to key message, 0 indicates that identification data are non-critical informations, if data meet key message rule, Then identified data are key messages, are not otherwise, algorithm such as (5):
Wherein:
KSnIt is that key message rule starts in recognition cycle into current time, the number for every class key message that system identification goes out Set, DATA is identified data, and MS is model data.
2. the unconventional emergency event dynamic priority method based on Model Matching as described in claim 1, it is characterised in that: frequency Rate formula such as (6):
Pre=FFrequency (KSn, t) and=KSn/t (6)
Wherein:
KSnIt is the set for the number that every class key message identifies, t is that key message rule starts in recognition cycle to current The time span of time.
3. the unconventional emergency event dynamic priority method based on Model Matching as claimed in claim 2, it is characterised in that:
In a time slice, as the priority of the variation of time, the continual analysis of mass data, key message is constantly sent out Changing carries out dynamic adjustment, the high number of real-time, preferential display priority by the key message priority to visualization display According to being averaged by the product of frequency and weight to key message, mean value is big, and priority is high, and priority data calculating is one A lasting process, priority dynamic adjustment formula such as (7):
Wherein:
Pre is the frequency of key message, is weight initial value, and WS is weight mark;
In real-time analyzer, mass data in real time, continually enter system, Pri value is big, then key message priority Higher, data are more crucial.
CN201610826499.0A 2016-09-14 2016-09-14 Unconventional emergency event dynamic priority method based on Model Matching Active CN106446941B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610826499.0A CN106446941B (en) 2016-09-14 2016-09-14 Unconventional emergency event dynamic priority method based on Model Matching

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826499.0A CN106446941B (en) 2016-09-14 2016-09-14 Unconventional emergency event dynamic priority method based on Model Matching

Publications (2)

Publication Number Publication Date
CN106446941A CN106446941A (en) 2017-02-22
CN106446941B true CN106446941B (en) 2019-05-24

Family

ID=58169018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826499.0A Active CN106446941B (en) 2016-09-14 2016-09-14 Unconventional emergency event dynamic priority method based on Model Matching

Country Status (1)

Country Link
CN (1) CN106446941B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108574624A (en) * 2017-03-13 2018-09-25 中兴通讯股份有限公司 A kind of processing method of group chatting information, apparatus and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6356664B1 (en) * 1999-02-24 2002-03-12 International Business Machines Corporation Selective reduction of video data using variable sampling rates based on importance within the image
KR20060030993A (en) * 2004-10-07 2006-04-12 한국전자통신연구원 Method for analyzing the security grade of information property
CN101021857A (en) * 2006-10-20 2007-08-22 鲍东山 Video searching system based on content analysis
CN102708168A (en) * 2012-04-27 2012-10-03 北京邮电大学 System and method for sorting search results of teaching resources
CN104125087B (en) * 2013-04-28 2017-10-24 中国移动通信集团设计院有限公司 A kind of alarm information processing method and device
CN103813347B (en) * 2014-02-28 2018-01-26 电信科学技术研究院 A kind of base station frequency resource allocation method and the network equipment

Also Published As

Publication number Publication date
CN106446941A (en) 2017-02-22

Similar Documents

Publication Publication Date Title
CN106022592B (en) Electricity consumption behavior abnormity detection and public security risk early warning method and device
CN106507315B (en) Urban traffic accident prediction technique and system based on network social intercourse media data
CN113379267B (en) Urban fire event processing method, system and storage medium based on risk classification prediction
CN117151478B (en) Chemical enterprise risk early warning method and system based on convolutional neural network
CN107506903A (en) A kind of method for managing security and device
CN109614526A (en) Environmental monitoring data fraud means recognition methods based on higher-dimension abnormality detection model
CN111750935A (en) Working environment monitoring and controlling device
CN110223477B (en) Laboratory fire explosion early warning method and system
CN112783100A (en) Memory, chemical enterprise safety production risk early warning method, equipment and device
CN106205007A (en) A kind of transmission line forest fire method of discrimination based on differentiation bright temperature threshold value
CN107067683A (en) A kind of transmission line forest fire clusters quantitative forecast method and system
CN106446941B (en) Unconventional emergency event dynamic priority method based on Model Matching
CN105894706B (en) A kind of forest fire prediction technique and its system
CN115949890A (en) Urban gas pipe network leakage monitoring grading alarm and disposal method
CN115631547A (en) Intelligent fire-fighting patrol management system and method
CN103606111A (en) Evaluation method for comprehensive voltage qualification rate
CN111582603A (en) Intelligent early warning method for coal and gas outburst based on multi-source information fusion
CN118094531B (en) Safe operation and maintenance real-time early warning integrated system
CN114169797A (en) Energy management system and method
CN112016809B (en) Residential building grading system and method based on intelligent community construction
CN114295162A (en) Environmental monitoring system based on data acquisition
CN212300442U (en) Working environment monitoring and controlling device
CN115829324A (en) Personnel safety risk silent monitoring method
CN114189456A (en) Online state prediction method and device of Internet of things equipment and electronic equipment
CN114090847A (en) Carbon neutralization display system for single building

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant