What is the mechanism of population mobility? (For example)

The phenomenon of population mobility is actually the embodiment of the law of value in population mobility. The law of value is the basic law of market economy, and one of its functions is to adjust the distribution of labor and means of production in various production departments. This is an objective law that is independent of human will. According to the understanding of this law, the following countermeasures should be taken:

1, reducing the imbalance of economic development,

2. Formulate policies for population mobility that are conducive to the development of the central and western regions.

The development of the central and western regions needs more capital investment.

4. Formulate the emigration policy,

5. Formulate policies and laws that reflect the characteristics of population mobility in China.

6. Formulate preferential policies for floating population,

7. Regulations on family planning work of floating population

Industry case analysis

Xi' Qian An 'an Information Technology Co., Ltd. took into account the differences of different industries when developing the floating population management system, and customized the car rental management system, small hotel passenger management system and unit visitor management system for each industry. Choose car rental and small hotels as two representative industries to make an analysis.

Car rental industry

Demand analysis As long as you show your ID card, driver's license and other valid documents and pay the deposit, you can travel by car and go out to work. As a new industry in recent years, car rental industry is very popular because of its fast and convenient characteristics. However, with the rapid development of this industry, there are more and more security risks. At present, the public security department has no effective safety management measures for the car rental industry, and the state has not issued relevant laws and policies, resulting in many cases of car rental contract fraud. According to The Paper, from June 20 10 to May 2010, the procuratorial organs in Fujian Province prosecuted 98 cases of car rental contract fraud 127 people, involving more than 30 million yuan. Most of the cases were committed by the parties by forging documents and renting vehicles with false identities, and showed outstanding characteristics of cross-regional crime and organized crime. According to reports, criminal suspects often forge motor vehicle driving licenses and motor vehicle registration certificates by providing a copy of the owner's ID card, frame number, etc. to those who manufacture and sell fake certificates, and then fictional lessor is the owner, and then the leased car is sold or pledged as the owner. Loan to others. For example, the defendants Zheng and Zhang successively committed 7 contract crimes by forging resident identity cards and motor vehicle registration certificates, involving a total amount of 6.5438+0.3 million yuan. Looking upward from the stolen money after the vehicle is realized, some are used to pay off debts, some are used for profligacy, some are used for gambling, drug abuse and other illegal crimes, and some are used for usury. For example, the defendants Xue and Huang rented 58 cars for mortgage loans to pay usury. Judging from the inducement of crime, criminal suspects often commit fraud in order to raise gambling funds or repay usury. For example, the People's Procuratorate of Zhao 'an County prosecuted 9 people in 6 cases for the crime of car rental contract fraud, among which 8 people participated in gambling for a long time and implemented fraud to raise gambling funds. In addition, the suspects also used the vulnerability of local people to rent a car, and after renting a car locally, they sold it or pledged it in other provinces and cities. Some cars that have been sold or pledged are pledged again, and some are replaced by many people, which makes it difficult to investigate and collect evidence and recover stolen cars. The prosecutor revealed that some of the cases investigated were committed by gangs with clear division of labor and mutual cooperation. Some are responsible for signing car rental contracts with car rental companies, some are responsible for making false documents, some are responsible for contacting the pledgor for loans, some act as guarantors, and some are responsible for contacting and selling vehicles. According to the analysis of the prosecutor handling the case, the frequent occurrence of car rental contract fraud crimes is mainly related to four factors: car rental companies or individuals can't actually check and check the identity certificates of car rental personnel, can't collect high vehicle deposits, and lack effective property guarantee measures; Vehicle pledge loan procedures are simple. Many motor vehicle owners only deliver their vehicles and motor vehicle driving licenses and registration certificates when handling mortgage loans, and the authenticity of the certificates has not been audited. Some underground banks specialize in providing vehicle pledge loans; There is disorderly competition in the leasing industry, and some relax leasing conditions and simplify leasing procedures to attract customers and give criminals an opportunity; The car trading market is not standardized, which makes it easy to get rid of stolen cars obtained by fraud. From the above analysis, the rampant rent fraud has led to the car rental industry becoming a high-risk industry, and how to reduce the industry risks has become an urgent problem to be solved. Functional Analysis "Car Rental Management System" is a set of solutions to the security problems faced by the car rental industry at present. The main functions are described as follows: (1) the car rental business e-pass collects the photo of the car rental personnel's certificate, the license plate number of the rented vehicle and the rental time; Information transmission wirelessly transmits information such as the photo of the car rental personnel's certificate and the license plate number of the rented vehicle including the rental time to the floating population management background server; After the information comparison information reaches the background server, it automatically analyzes the certificate element information, compares it with the original database, and displays the comparison results in the form of a list on the home page. If you find sensitive personnel such as fugitive suspects, call the police immediately. Blacklist management All bad credit customers who have cheated in the car rental bank will be blacklisted. In the process of renting a car in the future, the leasing company can check whether the current user is on the blacklist through e-link, effectively avoiding repeated deception. Announcement information receives all kinds of announcement information about the car rental industry issued by the public security department, and keeps abreast of the industry safety information.

Passenger management in small hotels

Demand analysis: Small hotels in big cities are the places where migrants stay the most. Most of these small hotels are relatively cheap, with simple facilities and very simplified passenger registration procedures. They just need to provide their ID cards and pay for it. Small hotels also have no security department at all. Therefore, it is easy to gather some unemployed people suspected of running away, and the crowd is very complicated. It is likely to be stolen, or no one will see it without paying enough accommodation. When the case occurs, the hotel owner is often powerless. The Ministry of Public Security requires the management of hotel passengers' check-in situation throughout the country. However, due to the limited manpower and funds of the public security organs, the public security control of these small hotels can only be carried out by regular spot checks or surprise inspections. Due to the lack of necessary computer network equipment in small hotels, when registering hotel accommodation or leasing business, the identity cards presented by tenants or lessees will be identified and registered on the spot. The police station in the jurisdiction collects the register and manually inputs it into the computer network for population management inquiry to identify the floating population. The time delay and the workload of input analysis are also very large, which can not improve the industry technology and timely and effectively prevent and cooperate with the public security management of the public security hotel industry. On the other hand, small hotels shoulder the responsibility of cooperating with the public security department to do a good job in the management statistics of floating population, but many small hotel owners only care about collecting rent and ignore everything else, which will bring unchanged the census and public security management of the public security department in the future, and may also miss the opportunity to arrest wanted criminals, eventually causing losses to the whole society. To sum up, small hotels urgently need to establish an information exchange platform with the public security organs, so that the public security organs can know the basic situation of the people staying in the small hotels in time, and the small hotels can also receive all kinds of notice information issued by the public security organs at the first time. Functional Analysis "Small Hotel Passenger Management System" is a set of solutions to the security risks faced by small hotels and the lack of effective control by public security departments. The main functions are described as follows: (1) passenger registration e-pass collects passenger ID photos and check-in time; Information transmission wirelessly transmits information including check-in time in passenger ID photos to the floating population management background server; After the information comparison information reaches the background server, it automatically analyzes the certificate element information, compares it with the original database, and displays the comparison results in the form of a list on the home page. If you find sensitive personnel such as fugitives or missing persons, call the police immediately. Announcement information receives all kinds of announcement information about the small hotel industry issued by the public security department, and keeps abreast of the industry safety information.

Edit this company profile

Xi Qian An 'an Information Technology Co., Ltd. is a high-tech enterprise approved by Shaanxi Provincial Department of Industry and Information Technology, with a registered capital of 6,543,800 yuan. Since its establishment, all employees of the company, with the strong support of friends from all walks of life, have formed a strategic pattern based on Shaanxi, going deep into the northwest and expanding the whole country through hard work. The core team members of the company have been engaged in the construction of large and medium-sized information projects for a long time, focusing on the safety of various industries, guided by accurate understanding and meeting customer needs, and guided by technological innovation, committed to improving customer efficiency and safety, and extensively carried out various technical cooperation. At present, R&D and production in the fields of medical information construction, safety monitoring, circuit analysis, fault diagnosis, virtual testing and potential path analysis have reached the domestic advanced level. Main business system integration; Technical development, technical consultation, technical service, technology transfer and sales in the field of computer software and hardware products; Production, sales and service of communication and electronic products; Computer network engineering; Electronic communication engineering; At present, the main businesses of network technology service companies include: graphic platform and its derivative products, which are mainly used in electronics, military industry, aerospace, electric power and other industries; Information construction of public security industry and military industry; Xi' Qian 'an' An Information Technology Co., Ltd. has established a good corporate image in the society with strong financial strength, high-quality professionals and high-quality and efficient services, and has been widely trusted and praised by all walks of life and customers. The company's decision-makers' outstanding sense of being ahead of the times, the enterprising spirit of all employees, and the support and love from all walks of life have made remarkable achievements in many fields: in the electric power field, all power supply bureaus and substations in Shaanxi electric power system have been successfully implemented with one map at a time and intelligent two-ticket management system, which has provided strong technical support for a strong power grid; In the field of public security, the standardized information collection system of public security system covering all police stations in Shaanxi Province has been successfully realized, which greatly improves the work efficiency of grassroots public security personnel. In the field of military industry, a graphic circuit quantitative analysis system has been developed, and its simulator system has been successfully applied to all missile weapon models; The MES production management system of XX Industrial Group has been developed and applied, which has been well received by users and is expected to be popularized and applied in the group company this year. In the aerospace field, the potential path analysis system of X-type rocket control system has been completed, which fills the gap in China. Since its establishment one year ago, the company has also made some achievements in intellectual property rights. It mainly includes: in August 20 10, the company was recognized as a software enterprise (Shaanxi R-2065438+00-0029), and in August 2065438+00, the company's ferronickel automatic batching control system V3.0 was registered as a software product (Shaanxi DGY-2065 438+00-0060)2065. Kloc-0/0SR066838) August 2010, brainstorming diagram software V1.0 (2010SR066828) 2011April, graphic circuit quantitative analysis platform software V. Potential Path Patent: Potential Path Automatic Identification Algorithm Potential Path Qualitative Analysis System Second Prize of Aerospace Science and Technology Progress of VLSI Boundary Scan Test System Third Prize of Science and Technology Progress of X-rocket Control System Third Prize of Aerospace Science and Technology Progress Third Prize of Aerospace Science and Technology Progress Third Prize of Electrical System Virtual Test and Potential Problem Analysis and Maintenance Decision Support Platform Third Prize of Aerospace Science and Technology Progress First Prize.