CN109034020A - A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning - Google Patents

A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning Download PDF

Info

Publication number
CN109034020A
CN109034020A CN201810765316.8A CN201810765316A CN109034020A CN 109034020 A CN109034020 A CN 109034020A CN 201810765316 A CN201810765316 A CN 201810765316A CN 109034020 A CN109034020 A CN 109034020A
Authority
CN
China
Prior art keywords
community
risk monitoring
internet
things
deep learning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810765316.8A
Other languages
Chinese (zh)
Inventor
何晓行
陈璐
赵恩迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201810765316.8A priority Critical patent/CN109034020A/en
Publication of CN109034020A publication Critical patent/CN109034020A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/25Fusion techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/46Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]; Salient regional features
    • G06V10/462Salient features, e.g. scale invariant feature transforms [SIFT]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • Psychiatry (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Social Psychology (AREA)
  • Computer Security & Cryptography (AREA)
  • Artificial Intelligence (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning, comprising the following steps: S1: build " cloud-net-end " integrated community's Risk Monitoring and guarding network framework;S2: depth coding is carried out to community's Risk Monitoring big data;S3: the monitored personnel identity based on limit study and face characteristic identifies;S4: cascade timing convolutional neural networks are built and realize monitored human behavior analysis;S5: isomery decision information fusion of the depth under encoding is realized.

Description

A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning
Technical field
The present invention relates to the fields that Internet of Things and neural network manage community policy, more particularly to use " cloud-net-end " The method that integrated network framework is combined with the intelligent cognition technology under deep learning promotes community's Risk Monitoring and prevention energy Power.
Background technique
Currently, with the development of the social economy, the continuous aggravation of urbanization process, urban population largely increase, society at Divide complexity, interpersonal relationships desalination provides crime chance to offender, the criminal case specific gravity of community is caused to increase.Therefore Reinforce Community Police Affairs construction, reinforce community policy prevention, combine punishment and prevention, with emphasis on the latter, combine the efforts of both professionals and the masses, by the comprehensive of the masses Close control policy, construction community's Risk Monitoring with prevention platform be solve the problems, such as community policy, having of maintaining social stability Effect approach.Peaceful community is created, fundamentally improves local security condition, enhances the sense of security, the happiness of the people With reduction area under one's jurisdiction case involving public security, criminal case incidence.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of community's Risk Monitoring based on Internet of Things and deep learning and Prevention method, it is intended to promote community's Risk Monitoring and prevention ability.
In order to achieve the above objectives, the invention provides the following technical scheme:
A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning, comprising the following steps:
S1: " cloud-net-end " integrated community's Risk Monitoring and guarding network framework are built;
S2: depth coding is carried out to community's Risk Monitoring big data;
S3: the monitored personnel identity based on limit study and face characteristic identifies;
S4: cascade timing convolutional neural networks are built and realize monitored human behavior analysis;
S5: isomery decision information fusion of the depth under encoding is realized.
Further, the step S1 specifically: community's Risk Monitoring and guarding network framework include cloud, net and end;
The cloud: referring mainly to fusion police service, government affairs, estate management, comprehensive treatment integration cloud platform, in comprehensive cloud platform Upper collection helps that interconnection Information Sharing Technology, semantic-based community's basic information be integrated and service mechanism, to community's Risk Monitoring The ubiquitous information that Internet of Things obtains carries out Multi-source Information Fusion, provides service for upper layer information shared platform.
The net: being made of networks such as 3G/4G, NB-IoT, WiFi, and the heterogeneous networks at scene are adapted to using borde gateway, It realizes that the interconnection of heterogeneous networks is integrated using IPv6 technology, realizes that the corporate management of heterogeneous network and inter-network are dispatched using SDN.
The end: being made of community's Risk Monitoring facility and Internet of things node, is acquired using Internet of things node and obtains covering People from community, thing, the basic datas of object, feelings.
Further, the step S2 specifically: community's Risk Monitoring big data depth coding includes big data analysis With data encoding;
The big data analysis: it by data pick-up, cleaning, conversion, loads and realizes big data pretreatment.HBase is utilized HDFS is as big data storage system storing data, and wherein HBase is located at structured storage layer, and HDFS is provided for highly reliable Property bottom storage.In HDFS, file is cut into data block, usual each data block 64MB~128MB, then every number It is written into file system according to block, the different data block of same file is not necessarily stored on identical DataNode.It uses Frame of the MapReduce as big data computing engines, wherein MapRduce includes two functions of Map and Reduce, is suitble to use In batch processing, non real-time and data-intensive situation.Using the MLlib of Spark as big data analysis computing engines. Wherein Spark is an open source Computational frame memory-based, can quickly handle the big data problem under several scenes, can be efficiently The value in big data is excavated, to provide decision support for business development.MLlib is that Spark calculates common machine learning The realization library of method, while including relevant test and Data Generator.MLlib supports four kinds of common machine learning to ask at present Topic: binary classification returns, cluster and collaborative filtering, while also including the gradient decline optimization basic algorithm an of bottom.
The data encoding:, bus transfer load capacity limited problem big for multi-modal monitoring data total amount, research Using depth from coding techniques as the data coding mode of core, pass through the equal hierarchical structure of depth self-encoding encoder input and output and close System, training are suitable for the depth of multi-modal sensor from coding structure, extract perception data common feature, as encoded information, By bus transfer to vehicle-mounted data interaction center, the dimension of transmission data is reduced, information traffic load is flat in guarantee bus Weighing apparatus.Depth is from encoding lower data encoding structures, based on multilayer deep neural network structure, by the input of neural network and Output is set to equal data and encodes to intermediate combination, using least square objective function:
Wherein, the corresponding perception input layer of x,It is then the result of perception reduction.W, b respectively correspond the power of the autoencoder network Will set and biasing.The target of the network training is to allow output result to approach perception input results as far as possible, and use a large amount of sounds The initial data such as video, temperature, stochastic gradient descent technology learn network connection, improve the Generalization Capability of weight.Root According to the structure of depth self-encoding encoder, coding result can restore the result of perception by coding reduction zone processing.It is self-editing by this Code device encodes perception data, and the load of the dimension and bus of transmission data can be greatly reduced, promote bus transfer Efficiency.Simultaneously at data interaction center, it is only necessary to first encoding reduction zone is sent to data center, it can be by it to coding As a result reconstruct obtains the result data of perception.
For the monitoring data interaction center problem not strong for coding information data real-time, research is optimized for sparse The neural networks pruning technology of core, by beta pruning depth self-encoding encoder network structure, the lesser connection relationship of weighted value, greatly Width reduces the connection structure of depth self-encoding encoder, and a small amount of perception data is finely adjusted the connection of remaining neural network, drops Low biography encoding error improves the operational efficiency of depth self-encoding encoder.
Reduction is iterated using absolute value of the coordinate descending method to the weight of neural network, and nearly zero parameter carries out Beta pruning, and retrieve connection relationship more sparse network.Identical weight is all used to all layers in neural metwork training Sparse optimization algorithm usesSparse Optimized model optimizes weight connection W, Wherein W' is the weighed combination after rarefaction, and the input that i is each layer, W is to train obtained weight from it is encoded through depth.On The solution for stating sparse Optimized model is a convex optimization problem, optimization | | W'| |1With optimization | | W'| |0Result it is of equal value, therefore can root It is right according to coordinate descent algorithm | | W'| |1The result optimized obtains a W ' and makes | | W ' | |0Solution is wrapped Containing W', i.e. W' the most sparse, nearly zero in W' is carried out to beta pruning in neural network can be obtained updated network knot Structure.
The connection relationship of neural network will be more simple after beta pruning, accelerates the efficiency of operation, reduces noise jamming.Pass through Perception data collection further finely tunes network, extensive from encoding model after can be obtained beta pruning.Sparse optimization beta pruning Model is combined optimization to the result of product and the neural network output of connection relationship and input after beta pruning, to greatest extent Coding restore accuracy and real-time between acquired balance.
Further, the step S3 specifically: monitored personnel identity identifies comprising the design of limit learning algorithm and face Feature identification;
The limit learning algorithm design: limit learning algorithm is extensive Single hidden layer feedforward neural networks, is carrying out people When face identifies, which has invariance to dull grey scale change and angle rotation, has to image change caused by uneven illumination There is insensitivity.In identification process, the human face in target area is fitted with characteristic point, obtains characteristic point label Position.Subgraph is intercepted in each characteristic point contiguous range, obtains human face adjacent features, it is finally that all characteristic points are neighbouring Feature series connection constitutive characteristic point limit learning characteristic.The limit learning characteristic for counting each picture portion respectively is hidden as extensive list The training set of layer feedforward neural network, the multiple extreme learning machines of training, the output of combination feedforward neural network as a result,
The face characteristic identification: it by radial symmetry transform coarse positioning face, is learned using supervision gradient descent method (SDM) Acquistion establishes shaped Offset amount Δ x=x to current point to the optimal iterative vectorized of target point*The feature of-x and current shape xBetween linear regression model (LRM)Then current shape x and deformation vectors Δ x iteration are utilized Obtain desired position vector x:=x+ Δ x.Construct the learning objective of SDM:
Wherein, k is the number of iterations, xkIndicate shape vector when iterating to kth time,Indicate in the shape vector The coordinate of i point.Successive ignition study is carried out, obtains the true deviation of with actual boundary point at i-th point.Then calculus is used Operator:
The organs such as eyes, nose, the mouth in face are accurately positioned, wherein GσIt (r) is smooth function, I (x, y) is image ash Matrix is spent, (a, b) is the center of circle, and r is radius.
Further, the step S4 specifically: be intended to behavioural analysis for the personnel in community intelligent risk monitoring and control field Demand designs the depth level with head and shoulder identification function using non-linear movement pattern study and the more case-based learnings of display model Networking network realizes the human behavior intention analysis of layering association multiple target tracking learning strategy driving.Building has head and shoulder identification Depth cascade network (HsNet), a series of candidates are intercepted according to pre- fixed step size using multi-scale sliding window mouth to every frame image Segment (Patch), forms sample to be identified;These samples are sent into trained head and shoulder/non-head and shoulder identification model HsNet in advance (three-level CNN cascade network) classifies.In specific assorting process, the Patch for being judged as negative sample directly gives up, and remains The next stage that remaining sample goes successively to network carries out tightened up identification classification, so successively carries out three-level CNN network class mirror Not;Head and shoulder frame height degree is extended to original for judging whether image Patch belongs to head and shoulder region by the output result of the network third level 3 times of corresponding sliding window obtain the whole body frame of monitored personnel's detection;For the same monitored personnel, will form multiple Detection block, finally rejects extra detection block with non-maxima suppression strategy, and each position only retains a most probable detection Frame-occupant detection recognition result.
Non-linear movement pattern study and the more examples of display model are introduced in layering association multiple target tracking learning strategy Study forms path segment by carrying out the credible association of bottom to test object;Using non-linear movement pattern on-line study and The more case-based learnings of display model effectively connect path segment, obtain reliable object trajectory.Rail is moved using from object Multiple features are combined as feature and form more advanced semanteme to describe by the parameters such as speed, direction, the distance extracted in mark Object behavior, to judge that monitored human behavior is intended to.
For the robustness for improving behavioral value, the passenger attitude frame being consecutively detected is fused into a complete action row For.Design two posture fusion rules are as follows:
Wherein f (i, j) is fusion function, and 1 indicates to merge, and 0 indicates to merge,For two attitude detection frame registrations, TIoU=0.5 indicates weight Right threshold value, ShisFor Histogram Matching score in two detection blocks, This=35 be Histogram Matching threshold value, TΔ=25 indicate two appearances State time difference threshold value.
Further, the step S5 specifically: assuming that any two groups of multi-modal inputs are respectively x and y, input data dimension Respectively n and j.Input 1, by independent neural network model, mentions input feature vector using full connection type with input 2 Take and then obtain the characteristic information of feature 1 and feature 2.By being pressed to feature 1 and the characteristic information of feature 2 using full connection type According to Dynamic Weights objective making decision Rule decision information.To obtain the information of decision 1 Yu decision 2.Then according to decision 1 with The information of decision 2 uses Weighted Fusion algorithm, fusion decision information obtained after being merged.According to fusion decision information, Decision 1 is carried out respectively to connect recovery entirely with decision 2, then successively hidden layer characteristic information is restored, finally to input Information carries out restoring the output information as the self-encoding encoder.During being updated for this from coding structure, by defeated Enter information as evaluation condition, is carried out using back-propagation algorithm according to output information with the difference of input information corresponding to network Weight is adjusted using gradient descent algorithm, obtains one group of preferable weight data.Then, positive according to depth confidence network The thought of weight fine tuning, successively finely tunes the weight of the network, finally obtains the weight of one group of robust.Pass through this group power Value, calculates different inputs, can be obtained fused value information.The isomery letter of policy-making authority is carried out by this method Breath fusion can reach the policy-making authority effective integration for heterogeneous multi-source, multi-dimensional data, to obtain final decision information.
The beneficial effects of the present invention are: the intelligent cognition skill under depth integration technology of Internet of things of the present invention and deep learning Art effectively promotes community's Risk Monitoring and prevention ability, creation safety in the helpfulness insertion Internet of Things framework of intelligent cognition Community environment.
Detailed description of the invention
Fig. 1 is " cloud-net-end " integrated community's Risk Monitoring and guarding network architecture diagram.
Specific embodiment
In order to keep the purpose of the present invention, technical scheme and beneficial effects clearer, below in conjunction with Fig. 1, to " cloud-net- The integrated community's Risk Monitoring in end " is described in detail with guarding network framework.
1, " cloud-net-end " integrated community's Risk Monitoring and guarding network framework are built, which includes following 3 Step:
(1) " end " is formed by community's Risk Monitoring facility and Internet of things node;
(2) " net " is formed by networks such as 3G/4G, NB-IoT, WiFi;
(3) above-mentioned steps are based on, police service, government affairs, estate management, comprehensive treatment integration information are merged, form cloud platform.
2, depth coding is carried out to community's Risk Monitoring big data, which includes following 5 steps:
(1) community's risk data information is collected using " end " in step 1.
(2) big data processing is carried out to community's risk information.
(3) multilayer deep neural network is built, training obtains depth self-encoding encoder.
(4) by the way that in beta pruning depth self-encoding encoder network structure, depth is greatly reduced certainly in the lesser connection relationship of weighted value The connection structure of encoder improves the operational efficiency of depth self-encoding encoder.
(5) by treated, big data input depth self-encoding encoder is encoded.
3, the personnel identity that is monitored identifies, which includes following 3 steps:
(1) face picture collection is acquired.
(2) the extensive Single hidden layer feedforward neural networks based on extreme learning machine are designed.
(3) using the face pictures training extensive Single hidden layer feedforward neural networks, personnel identity discriminator is obtained.
4, be monitored human behavior analysis, which includes following 3 steps:
(1) pedestrian behavior pictures are acquired.
(2) three-level depth cascade network is built.
(3) using the pedestrian behavior pictures training three-level depth cascade network, human behavior analyzer is obtained.
5, multi-source heterogeneous information fusion and decision, the process include following 3 steps:
(1) multi-source heterogeneous neural network is built, and using the training of multi-source heterogeneous information, obtains information fusion and decision model Type.
(2) using 2,3,4 acquired results information of above-mentioned steps as the input of information fusion and decision model, output is society Area's Risk Results.
The above display describes basic principles and main features and advantages of the present invention of the invention.The technology people of the industry Member is it should be appreciated that the present invention is not limited to the above embodiments, and the above embodiments and description only describe this hairs Bright principle, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these variations It all fall within the protetion scope of the claimed invention with improvement.The claimed scope of the invention is by appended claims and its waits Effect object defines.

Claims (6)

1. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning, comprising the following steps:
S1: " cloud-net-end " integrated community's Risk Monitoring and guarding network framework are built;
S2: depth coding is carried out to community's Risk Monitoring big data;
S3: the monitored personnel identity based on limit study and face characteristic identifies;
S4: cascade timing convolutional neural networks are built and realize monitored human behavior analysis;
S5: isomery decision information fusion of the depth under encoding is realized.
2. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning according to claim 1, It is characterized in that step S1 specifically: community's Risk Monitoring and guarding network framework include cloud, net and end, the cloud: main Refer to fusion police service, government affairs, estate management, comprehensive treatment integration cloud platform, the net: by nets such as 3G/4G, NB-IoT, WiFi Network composition, the end: is made of community's Risk Monitoring facility and Internet of things node.
3. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning according to claim 1, It is characterized in that the step S2 specifically: community's Risk Monitoring big data depth coding includes that big data analysis and data are compiled The big data analysis: code by data pick-up, cleaning, conversion, loads and realizes big data pretreatment.
4. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning according to claim 1, It is characterized in that the step S3 specifically: monitored personnel identity, which identifies, to be known comprising the design of limit learning algorithm with face characteristic Not, the limit learning algorithm design: limit learning algorithm is extensive Single hidden layer feedforward neural networks, and the face characteristic is known It is other: by radial symmetry transform coarse positioning face, current point to be obtained using supervision gradient descent method (SDM) study and arrives target point It is optimal iterative vectorized.
5. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning according to claim 1, It is characterized in that the step S4 is specially to use non-linear movement pattern study and the more case-based learnings of display model, design has head The depth cascade network of shoulder identification function realizes the human behavior intention point of layering association multiple target tracking learning strategy driving Analysis.
6. a kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning according to claim 1, It is characterized in that the step S5 specifically: assuming that any two groups of multi-modal inputs are respectively x and y, input data dimension is respectively n With j.
CN201810765316.8A 2018-07-12 2018-07-12 A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning Pending CN109034020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810765316.8A CN109034020A (en) 2018-07-12 2018-07-12 A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810765316.8A CN109034020A (en) 2018-07-12 2018-07-12 A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning

Publications (1)

Publication Number Publication Date
CN109034020A true CN109034020A (en) 2018-12-18

Family

ID=64641053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810765316.8A Pending CN109034020A (en) 2018-07-12 2018-07-12 A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning

Country Status (1)

Country Link
CN (1) CN109034020A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009539A (en) * 2019-04-12 2019-07-12 烟台工程职业技术学院(烟台市技师学院) A kind of student is in school learning state smart profile system and application method
CN110119779A (en) * 2019-05-10 2019-08-13 北京科技大学 Any dimension fusion method of across a network data and device based on self-encoding encoder
CN110225067A (en) * 2019-07-24 2019-09-10 上海戎磐网络科技有限公司 A kind of Internet of Things safety pre-warning system
CN110459027A (en) * 2019-08-15 2019-11-15 青岛文达通科技股份有限公司 A kind of Community Safety means of defence and system based on multi-source heterogeneous data fusion
CN111126324A (en) * 2019-12-25 2020-05-08 深圳力维智联技术有限公司 Method, device, product and medium for multi-source heterogeneous data fusion
CN111669396A (en) * 2020-06-15 2020-09-15 绍兴文理学院 Self-learning security defense method and system for software-defined Internet of things
CN112507312A (en) * 2020-12-08 2021-03-16 电子科技大学 Digital fingerprint-based verification and tracking method in deep learning system
CN113518114A (en) * 2021-05-12 2021-10-19 江苏力行电力电子科技有限公司 Artificial intelligence control method and system based on multi-mode ad hoc network
CN113919544A (en) * 2021-08-30 2022-01-11 浙江警察学院 Crime early warning method and device, computer equipment and storage medium
CN117725493A (en) * 2023-10-16 2024-03-19 中国矿业大学(北京) Landslide hazard result evaluation method based on improved Stacking fusion model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997921A (en) * 2010-11-22 2011-03-30 青岛龙泰天翔通信科技有限公司 Networking based novel intelligent network application system
CN102891867A (en) * 2011-07-19 2013-01-23 苏州科技学院 Community IoT (Internet of Things) system based on Zigbee and access control system
CN107992904A (en) * 2017-12-22 2018-05-04 重庆邮电大学 Forest Ecology man-machine interaction method based on Multi-source Information Fusion
CN108256307A (en) * 2018-01-12 2018-07-06 重庆邮电大学 A kind of mixing enhancing intelligent cognition method of intelligent business Sojourn house car

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997921A (en) * 2010-11-22 2011-03-30 青岛龙泰天翔通信科技有限公司 Networking based novel intelligent network application system
CN102891867A (en) * 2011-07-19 2013-01-23 苏州科技学院 Community IoT (Internet of Things) system based on Zigbee and access control system
CN107992904A (en) * 2017-12-22 2018-05-04 重庆邮电大学 Forest Ecology man-machine interaction method based on Multi-source Information Fusion
CN108256307A (en) * 2018-01-12 2018-07-06 重庆邮电大学 A kind of mixing enhancing intelligent cognition method of intelligent business Sojourn house car

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
徐大成: "《基于物联网和云计算的智慧园区信息系统的研究与实现》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
王梦来等: "《基于CNN的监控视频事件检测》", 《自动化学报》 *
蔡良辰: "《"互联网+"社区治理研究—以滨湖世纪智慧社区建设为例》", 《中国优秀硕士学位论文全文数据库 社会科技Ⅰ辑》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009539A (en) * 2019-04-12 2019-07-12 烟台工程职业技术学院(烟台市技师学院) A kind of student is in school learning state smart profile system and application method
CN110119779B (en) * 2019-05-10 2022-03-04 北京科技大学 Cross-network data arbitrary dimension fusion method and device based on self-encoder
CN110119779A (en) * 2019-05-10 2019-08-13 北京科技大学 Any dimension fusion method of across a network data and device based on self-encoding encoder
CN110225067A (en) * 2019-07-24 2019-09-10 上海戎磐网络科技有限公司 A kind of Internet of Things safety pre-warning system
CN110225067B (en) * 2019-07-24 2021-08-24 上海戎磐网络科技有限公司 Internet of things safety early warning system
CN110459027A (en) * 2019-08-15 2019-11-15 青岛文达通科技股份有限公司 A kind of Community Safety means of defence and system based on multi-source heterogeneous data fusion
CN111126324A (en) * 2019-12-25 2020-05-08 深圳力维智联技术有限公司 Method, device, product and medium for multi-source heterogeneous data fusion
CN111126324B (en) * 2019-12-25 2023-09-26 深圳力维智联技术有限公司 Method, device, computer equipment and medium for multi-source heterogeneous data fusion
CN111669396A (en) * 2020-06-15 2020-09-15 绍兴文理学院 Self-learning security defense method and system for software-defined Internet of things
CN112507312A (en) * 2020-12-08 2021-03-16 电子科技大学 Digital fingerprint-based verification and tracking method in deep learning system
CN112507312B (en) * 2020-12-08 2022-10-14 电子科技大学 Digital fingerprint-based verification and tracking method in deep learning system
CN113518114A (en) * 2021-05-12 2021-10-19 江苏力行电力电子科技有限公司 Artificial intelligence control method and system based on multi-mode ad hoc network
CN113919544A (en) * 2021-08-30 2022-01-11 浙江警察学院 Crime early warning method and device, computer equipment and storage medium
CN113919544B (en) * 2021-08-30 2022-05-27 浙江警察学院 Crime early warning method and device, computer equipment and storage medium
CN117725493A (en) * 2023-10-16 2024-03-19 中国矿业大学(北京) Landslide hazard result evaluation method based on improved Stacking fusion model

Similar Documents

Publication Publication Date Title
CN109034020A (en) A kind of community's Risk Monitoring and prevention method based on Internet of Things and deep learning
CN112418117B (en) Small target detection method based on unmanned aerial vehicle image
Wang et al. A real-time collision prediction mechanism with deep learning for intelligent transportation system
CN110458844B (en) Semantic segmentation method for low-illumination scene
Kurniawan et al. Traffic congestion detection: learning from CCTV monitoring images using convolutional neural network
CN110781838A (en) Multi-modal trajectory prediction method for pedestrian in complex scene
CN110084151B (en) Video abnormal behavior discrimination method based on non-local network deep learning
CN111079674B (en) Target detection method based on global and local information fusion
CN107133569A (en) The many granularity mask methods of monitor video based on extensive Multi-label learning
CN105354273A (en) Method for fast retrieving high-similarity image of highway fee evasion vehicle
CN106228137A (en) A kind of ATM abnormal human face detection based on key point location
CN109801260A (en) The recognition methods of livestock number and device
CN111476285B (en) Training method of image classification model, image classification method and storage medium
CN106682681A (en) Recognition algorithm automatic improvement method based on relevance feedback
CN112766280A (en) Remote sensing image road extraction method based on graph convolution
CN109376613A (en) Video brainpower watch and control system based on big data and depth learning technology
CN107977683A (en) Joint SAR target identification methods based on convolution feature extraction and machine learning
CN105930792A (en) Human action classification method based on video local feature dictionary
Shen et al. An attention-based digraph convolution network enabled framework for congestion recognition in three-dimensional road networks
Nawaratne et al. A generative latent space approach for real-time road surveillance in smart cities
Gorodnichev et al. Research and Development of a System for Determining Abnormal Human Behavior by Video Image Based on Deepstream Technology
CN114758178A (en) Hub real-time classification and air valve hole positioning method based on deep learning
Wang et al. Vision-based highway traffic accident detection
Vu et al. Traffic incident recognition using empirical deep convolutional neural networks model
Lukic et al. Galaxy classifications with deep learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181218