CN107146350A - A kind of utilization mobile client realizes the long-range control method of real-time anti-theft - Google Patents
A kind of utilization mobile client realizes the long-range control method of real-time anti-theft Download PDFInfo
- Publication number
- CN107146350A CN107146350A CN201710339761.3A CN201710339761A CN107146350A CN 107146350 A CN107146350 A CN 107146350A CN 201710339761 A CN201710339761 A CN 201710339761A CN 107146350 A CN107146350 A CN 107146350A
- Authority
- CN
- China
- Prior art keywords
- image
- server
- personnel
- subsequently
- mobile client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/1966—Wireless systems, other than telephone systems, used to communicate with a camera
Abstract
The invention discloses the long-range control method that a kind of utilization mobile client realizes real-time anti-theft, including server controls step, mobile client rate-determining steps, IMAQ terminal control step, IMAQ terminal is the terminal of an Android system, terminal, which contains Wifi modules, to be connected by home wireless router with server, for obtaining the known people list and image of storage from server, and preserve;The equipment can identify face and the facial image with being stored is compared equipped with a small-sized camera with real-time capture image from image, if the picture not matched, and can send the images to server alarm;Server includes face storage system, and for storing known people list and the unknown personnel's image alarm of reception and pushing to mobile client, antitheft, rate of accuracy reached to 100% is realized by IMAQ terminal, server, mobile client;Realize instantaneous transmission, ageing height.
Description
Technical field
The present invention relates to a kind of theft preventing method, specifically, it is related to a kind of utilization mobile client and realizes real-time anti-theft
Long-range control method, belongs to automatic control technology field.
Background technology
Thing stolen to home is often listened to occur in life now, although cell there are security personnel but still is not avoided that.Such as
Fruit embedded technology is combined with development of Mobile Internet technology, realize a kind of introduction people's automatic identification and real time propelling movement to move
The system of client water, it will greatly ensure lares et penates safety.
The content of the invention
Moved in view of the above-mentioned deficiencies in the prior art, the technical problem to be solved by the present invention is that providing a kind of utilize
Client realizes the long-range control method of real-time anti-theft, and its simple in construction, realization is convenient, simple to operate, intelligence degree is high, just
In realization, application value is high.
In order to solve the above technical problems, the technical solution adopted in the present invention is:One kind is realized real using mobile client
When antitheft long-range control method, it is characterised in that including server controls step.
A kind of prioritization scheme, server controls step includes:
Start from S101, in step S102, server, which enters, monitors solicited status, waits and comes IMAQ terminal, mobile client
End and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step
Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database
In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement
Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into
S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name)
Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection
Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
End at step S110.
Another prioritization scheme, mobile client rate-determining steps include:
Start from S201, in step S202, set up length with server and be connected, can be immediately transmitted to move when server has notice
Dynamic client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received
Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt
The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering
Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
End at step S211.
Another prioritization scheme, face collection smart machine rate-determining steps include:
Start from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database,
Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time.Subsequently into step
Rapid S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter
Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair
The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
End at step S311.
Based on above long-range control method, realizing the device of the long-range control method includes IMAQ terminal, service
Device, mobile client.
A kind of prioritization scheme, IMAQ terminal is the terminal of an Android system, and terminal, which contains Wifi modules, to be passed through
Home wireless router is connected with server, for obtaining the known people list and image of storage from server, and is preserved;
The equipment can identify face and with being stored with real-time capture image equipped with small-sized camera from image
Facial image is compared, if the picture not matched, and can send the images to server alarm;
Server includes face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to
Mobile client.
The present invention uses above technical scheme, compared with prior art, with advantages below:By IMAQ terminal,
Server, mobile client realize antitheft, rate of accuracy reached to 100%;Realize instantaneous transmission, ageing height.
The present invention is described in detail with reference to the accompanying drawings and examples.
Brief description of the drawings
Accompanying drawing 1 is the sequence chart of server, IMAQ terminal and mobile client in the embodiment of the present invention;
Accompanying drawing 2 is the flow chart of server controls step in the embodiment of the present invention;
Accompanying drawing 3 is the flow chart of mobile client rate-determining steps in the embodiment of the present invention;
Accompanying drawing 4 is the flow chart of IMAQ terminal control step in the embodiment of the present invention.
Embodiment
Embodiment 1, as shown in figure 1, a kind of utilization mobile client realizes the long-range control method of real-time anti-theft, passes through figure
Realized as acquisition terminal, server, mobile client.
IMAQ terminal is the terminal of an Android system, and terminal contains Wifi modules can be by home wireless router
It is connected, for obtaining the known people list and image of storage from server, and preserves with server;The equipment is equipped with one
Small-sized camera can with real-time capture image, using the OpenCV frameworks increased income, can be identified from image face and with
The facial image stored is compared, if the picture not matched, and can send the images to server alarm;Server is included
Face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to mobile client.
Mobile client is used for receiving unknown personnel's image alarm and identification image name, and the image name of mark will be transmitted
It is known people to server identification.
Installation steps:
IMAQ terminal is loaded on doorway opposite, camera was photographed whole doorway.
Face identification method:
The method of recognition of face be using the OpenCV increased income come the picture to shooting and deposited face picture contrast one by one come reality
It is existing.
As shown in Fig. 2 server controls step:
Flow starts from S101. in step S102, and server, which enters, monitors solicited status, waits and comes IMAQ terminal, movement
Client and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step
Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database
In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement
Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into
S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name)
Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection
Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
Flow ends at step S110.
As shown in figure 3, mobile client rate-determining steps:
Flow starts from S201, in step S202, sets up length with server and is connected, can be sent immediately when server has notice
To mobile client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received
Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt
The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering
Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
Flow ends at step S211.
As shown in figure 4, IMAQ terminal control step:
Flow starts from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database,
Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time.Subsequently into step
Rapid S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter
Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair
The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
Flow ends at step S311.
Experiment, chooses 60 volunteers and takes 20 people as unknown personnel at random, 40 people are tested respectively as known people
Card, accuracy rate 100%.
Tested after the identity of the above persons is exchanged again, accuracy rate still reaches 100%.
Citing described above for best mode for carrying out the invention, wherein the part do not addressed in detail is that this area is common
The common knowledge of technical staff.Protection scope of the present invention is defined by the content of claim, any technology based on the present invention
The equivalent transformation for enlightening and carrying out, also within protection scope of the present invention.
Claims (8)
1. a kind of utilization mobile client realizes the long-range control method of real-time anti-theft, it is characterised in that including server controls
Step.
2. long-range control method as claimed in claim 1, it is characterised in that server controls step includes:
Start from S101, in step S102, server, which enters, monitors solicited status, waits and comes IMAQ terminal, mobile client
End and spontaneous request;
Receive and enter step S103 after request;
In step S103, judge whether request is unknown personnel's alarm request from intelligent acquisition equipment, if entering step
Rapid S104, otherwise into S106;
In step S104, by warning message(Facial image, time, the numbering of image including unknown personnel)It is written to database
In, subsequently into step S105;
In step S105, by warning message(Facial image, time, the numbering of image including unknown personnel)It is sent to movement
Client, subsequently into step S109;
In step s 106, the request from mobile client mark known people image is determined whether, if into
S107, otherwise into S109;
In step s 107, the solicited message submitted according to mobile client(Including picture number, user-defined name)
Image personnel's title in database is changed, then into step S108;
In step S108, identification notification is sent(The corresponding name of personnel in numbering, image including image)To face collection
Smart machine, subsequently into step S109;
In step S109, determine whether to exit service routine, be then to enter step S110, otherwise into step S102;
End at step S110.
3. long-range control method as claimed in claim 1, it is characterised in that including mobile client rate-determining steps.
4. long-range control method as claimed in claim 3, it is characterised in that mobile client rate-determining steps include:
Start from S201, in step S202, set up length with server and be connected, can be immediately transmitted to move when server has notice
Dynamic client;
Subsequently into step S203, in step S203, the instruction that server is sent is monitored;
Receive and enter step S204 after instruction;
In step S204, whether be unknown personnel notify, if into step S205, otherwise entering step if judging the instruction received
Rapid S210;
In step S205, according to the unknown personnel's announcement information received(Including unknown personnel's facial image, picture number, adopt
The collection time), the image and acquisition time of personnel is shown, subsequently into step S206;
In step S206, by user judge display image whether be understanding personnel, if into step S208, otherwise entering
Enter step S207;
In step S208, user inputs the personnel's title shown in picture according to man-machine interface, subsequently into step S209;
In step S209, the title and the numbering of image that user is inputted are uploaded onto the server, subsequently into step S210;
In step S207, user can determine alarm or notifying cell security personnel according to own situation, subsequently into step S210;
In step S210, determine whether to exit service routine, if yes then enter step S211, otherwise return to step S203;
End at step S211.
5. long-range control method as claimed in claim 1, it is characterised in that gather smart machine rate-determining steps including face.
6. long-range control method as claimed in claim 5, it is characterised in that face collection smart machine rate-determining steps include:
Start from step S301;
In step s 302, the known list and facial image of download server record, subsequently into step S303;
In step S303, by the list got and picture record into local database, subsequently into step S304;
In step S304, using camera shooting image, subsequently into step S305;
In step S305, contrasted one by one according to the realtime graphic photographed and the picture that is locally stored, subsequently into step S306;
In step S306, the image of matching is determined whether, if entering step S308, otherwise into step S307;
In step S307, the image of shooting is stored in locally, and one picture number of corresponding generation recorded in database,
Then it is sent to server and sends unknown personnel's alarm, warning message includes picture, picture number, acquisition time;
Subsequently into step S308;
In step S308, judge whether to get personnel's more new command that server is sent, in this way into step S309, otherwise enter
Enter step S310;
In step S309, the information sended over according to server(Including picture number, personnel's name), change local picture pair
The personnel's title answered, subsequently into step S310;
In step S310, determine whether to exit service routine, if into step S311, otherwise return to step S304;
End at step S311.
7. realize the device of the long-range control method as described in claim 1-6, it is characterised in that it is whole that the device includes IMAQ
End, server, mobile client.
8. device as claimed in claim 7, it is characterised in that IMAQ terminal is the terminal of an Android system, terminal
It can be connected containing Wifi modules by home wireless router with server, for obtaining the known people of storage from server
List and image, and preserve;The equipment can be recognized equipped with a small-sized camera with real-time capture image from image
Go out face and the facial image with being stored is compared, if the picture not matched, server alarm can be sent the images to;
Server includes face storage system, for storing known people list and the unknown personnel's image alarm of reception and pushing to
Mobile client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339761.3A CN107146350A (en) | 2017-05-15 | 2017-05-15 | A kind of utilization mobile client realizes the long-range control method of real-time anti-theft |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339761.3A CN107146350A (en) | 2017-05-15 | 2017-05-15 | A kind of utilization mobile client realizes the long-range control method of real-time anti-theft |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107146350A true CN107146350A (en) | 2017-09-08 |
Family
ID=59777048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710339761.3A Pending CN107146350A (en) | 2017-05-15 | 2017-05-15 | A kind of utilization mobile client realizes the long-range control method of real-time anti-theft |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107146350A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977657A (en) * | 2017-12-29 | 2018-05-01 | 佛山市幻云科技有限公司 | Long distance monitoring method, terminal and system |
CN108257344A (en) * | 2018-01-31 | 2018-07-06 | 深圳春沐源控股有限公司 | Method for safety monitoring, device, security facilities and system |
CN112399135A (en) * | 2019-07-30 | 2021-02-23 | 广东工业大学 | Household monitoring device and method based on intelligent trolley |
CN116828029A (en) * | 2023-08-31 | 2023-09-29 | 飞天诚信科技股份有限公司 | Realization method and system supporting screen-warming mode and remote control |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101826226A (en) * | 2010-04-30 | 2010-09-08 | 中山大学 | Intelligent entrance guard control method and device |
CN103714648A (en) * | 2013-12-06 | 2014-04-09 | 乐视致新电子科技(天津)有限公司 | Monitoring and early warning method and device |
CN204650695U (en) * | 2015-04-01 | 2015-09-16 | 黄波 | The removable special toy dog of intelligence and safety defense monitoring system |
CN105607504A (en) * | 2016-03-15 | 2016-05-25 | 美的集团股份有限公司 | Intelligent home system, and intelligent home control apparatus and method |
CN105629940A (en) * | 2016-03-01 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent household system capable of real-time display and access control and realization method thereof |
US9589181B2 (en) * | 2013-02-28 | 2017-03-07 | Hitachi Kokusai Electric Inc. | Person search method and device for searching person staying on platform |
-
2017
- 2017-05-15 CN CN201710339761.3A patent/CN107146350A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101826226A (en) * | 2010-04-30 | 2010-09-08 | 中山大学 | Intelligent entrance guard control method and device |
US9589181B2 (en) * | 2013-02-28 | 2017-03-07 | Hitachi Kokusai Electric Inc. | Person search method and device for searching person staying on platform |
CN103714648A (en) * | 2013-12-06 | 2014-04-09 | 乐视致新电子科技(天津)有限公司 | Monitoring and early warning method and device |
CN204650695U (en) * | 2015-04-01 | 2015-09-16 | 黄波 | The removable special toy dog of intelligence and safety defense monitoring system |
CN105629940A (en) * | 2016-03-01 | 2016-06-01 | 惠州Tcl移动通信有限公司 | Intelligent household system capable of real-time display and access control and realization method thereof |
CN105607504A (en) * | 2016-03-15 | 2016-05-25 | 美的集团股份有限公司 | Intelligent home system, and intelligent home control apparatus and method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107977657A (en) * | 2017-12-29 | 2018-05-01 | 佛山市幻云科技有限公司 | Long distance monitoring method, terminal and system |
CN108257344A (en) * | 2018-01-31 | 2018-07-06 | 深圳春沐源控股有限公司 | Method for safety monitoring, device, security facilities and system |
CN112399135A (en) * | 2019-07-30 | 2021-02-23 | 广东工业大学 | Household monitoring device and method based on intelligent trolley |
CN116828029A (en) * | 2023-08-31 | 2023-09-29 | 飞天诚信科技股份有限公司 | Realization method and system supporting screen-warming mode and remote control |
CN116828029B (en) * | 2023-08-31 | 2023-12-05 | 飞天诚信科技股份有限公司 | Realization method and system supporting screen-warming mode and remote control |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107146350A (en) | A kind of utilization mobile client realizes the long-range control method of real-time anti-theft | |
CN205230242U (en) | Intelligent residential district security protection system | |
CN105905072A (en) | Electric vehicle safety control system capable of self-detecting electric quantity of battery | |
CN101511085A (en) | Method and apparatus for limiting usage of mobile terminal function by using personal identification | |
CN110414699A (en) | A kind of hotel occupancy method and system, computer readable storage medium | |
CN106447873A (en) | 5G base station on-line management system based on Internet of Things | |
CN105282700A (en) | Tracking method, tracking server, and tracking system | |
CN104902119A (en) | Deaf-mute alarm help-seeking system | |
CN204488730U (en) | A kind of anti-theft electric motor car based on face identification system | |
CN105872466A (en) | Alarm method and alarm device based on smart TV | |
CN205264026U (en) | A key alarm system based on mobile intelligent Terminal | |
CN102984411A (en) | Methods for protecting personal safety and property safety by smart mobile device | |
CN112153571A (en) | Electronic equipment and equipment retrieval system thereof | |
CN110969718A (en) | Control method and system of intelligent patrol robot | |
CN207558178U (en) | An a kind of key alarm system based on vehicle-mounted station section board | |
CN111489276B (en) | Personnel management method and related device | |
CN210377737U (en) | Video-based anti-theft alarm system | |
CN111372197B (en) | Early warning method and related device | |
CN105185017A (en) | Family security system based on infrared induction and method thereof | |
CN112202516A (en) | Drowning prevention dissuasion education system | |
CN113012325A (en) | Control method, system, terminal and storage medium of ultrasonic access control | |
CN204990580U (en) | Household security system based on infrared induction | |
CN105577740A (en) | Vehicle state information transmission method and device | |
CN218350998U (en) | Intelligent patrol alarm system | |
CN213844318U (en) | Taxi face recognition security system based on cloud service platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170908 |