CN109522860A - A kind of Internet of Things applied analysis system and method based on multiple track - Google Patents
A kind of Internet of Things applied analysis system and method based on multiple track Download PDFInfo
- Publication number
- CN109522860A CN109522860A CN201811422106.5A CN201811422106A CN109522860A CN 109522860 A CN109522860 A CN 109522860A CN 201811422106 A CN201811422106 A CN 201811422106A CN 109522860 A CN109522860 A CN 109522860A
- Authority
- CN
- China
- Prior art keywords
- data
- portrait
- mac address
- module
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F16/00 and subgroups
- G06F2216/03—Data mining
Landscapes
- Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The Internet of Things applied analysis system and method based on multiple track that the invention discloses a kind of are related to WIFI acquisition and portrait identity-acquiring technology.This system is: MAC Address acquisition module (100), mac address filter module (101) and data preprocessing module (300) successively interact;Portrait identity-acquiring module (200), portrait compare crash module (201) and data preprocessing module (300) successively interacts;Data preprocessing module (300);Data analysis center module (400) and data correlation center module (500) successively interact.The present invention has following advantages and good effect: it is 1. advanced, the interrelated of MAC Address and portrait data may be implemented;2. data have reliability, the collision of frequent long-time data precipitating and result set;3. practicability;4. scalability, can effective protection have investment.
Description
Technical field
The present invention relates to WIFI acquisition and portrait identity-acquiring technology more particularly to a kind of objects based on multiple track
Working application analysis system and its method carry out large-scale data operation using big data analysis to confirm MAC Address and people
As the system and method for the data mining of video identity corresponding relationship.
Background technique
As the communication technology and development of Mobile Internet technology develop rapidly, the network application mode upper web form single by the past
Rich and varied service application is evolved into, anyone life style can not all be completely disengaged with internet, no matter from most basic
Clothing, food, lodging and transportion -- basic necessities of life or even work and study etc., it is all closely bound up with internet.China is used as netizen's quantity big country, in face of numerous and complicated multiple
Miscellaneous internet world, unlike hidden shoals and dangerous reefs, flying sands and howling wind can be seen in reality clearly.With the swift and violent hair of wireless local area network technology
Exhibition, WiFi wide coverage, access threshold are low, these features make WiFi become preferred network connection mode.During online
A large amount of user information can be generated, such as end message, location information, the communication information, shopping at network information, user's online track letter
Breath and user authentication information etc..In the framework of TCP/IP, MAC Address plays very important role.In the communications, by
The host network card of MAC Address mark, the hardware address as host identities.After every piece of network interface card is produced, can all there be one
Globally unique number will not repeat, this number is exactly MAC Address, that is, the physical address of network interface card to identify oneself.
However virtual identity information of the MAC Address as network, but can not mutually it be closed according to MAC Address with real data
Connection, effective acquisition to virtual data may be implemented by modes such as WIFI acquisition systems, but face can not by virtual identity with
Truthful data is mutually related problem.As it can be seen that traditional WIFI acquisition system has some limitations, there is improved necessity.
Figure acquisition system can use acquisition data in real time and collision be compared with the identity information of real world, will
After real time video data is converted into true identity data, crash analysis is carried out with collected virtual identity MAC, by virtual identity
It is interrelated with true identity.Portrait identity-acquiring system needs oriented acquisition since acquisition radius is small, and deployment range is small
The defects of, there are biggish acquisition dead angles.The two is be combined with each other, while utilizing big data digging technology, undergoes multiple data
It compares Virtual MAC data conversion after precipitating into truthful data, the two strong point can be played simultaneously, can obtain many in virtual network
More identity informations play comprehensive WIFI control deployment, wide coverage, acquire the features such as virtual identity information is numerous, and can benefit
Real character's information is obtained with portrait identification system, the two be combined with each other can effective solution data silo problem.
Summary of the invention
The shortcomings that it is an object of the invention to overcome available data WIFI acquisition system and deficiency provide a kind of based on multiple
The framework and implementation method of the Internet of Things applied analysis system of track.It is realized using the present invention to mobile phone physical address and portrait body
Personage's true identity of part system acquisition is associated, by the mobile phone physical address and portrait in the real world in virtual network
The interrelated analysis of true identity information, avoids information island.
Realizing the object of the invention technical solution is:
Present invention is generally directed to the mobile phone MAC Address in WIFI acquisition to be closed with the portrait identity video data in true environment
Connection analysis realizes that data are interrelated by unique design algorithm using big data digging technology.It is excavated with big data analysis
Technology, by the portrait identity data that acquires around when acquiring MAC Address by comparative analysis be converted into it is in the real world really
Identity data records the portrait identity around when each MAC Address occurs, and utilizes the MAC Address and portrait that appearance is repeated several times
Identity data records carry out system marking, and frequency of occurrence is more, and score value is higher, is used as height suspicious data collection after reaching threshold value
Close storage.The present invention is to be wirelessly transferred in cluster server data based on WIFI magnanimity front-end collection big data by security protocol
Heart analysis process system.Current internet development is grown, and for the big problem of data volume, can be acquired big data and be carried out unified point
Analysis becomes an important project.Big data processing is based on cluster server, and business and data are realized in terms of supporting
Decoupling, guarantees the flexibility of the consistency, agility and architectural framework of business.By to data, computing capability, analysis model etc.
The serviceization of resource encapsulates, and realizes the whole network interconnection, also realizes business and data resource sharing, to expand for business linkage, business
Exhibition and business innovation provide a strong guarantee.Multitype database mixed intermediate storage policy design data is used in resource center's design,
Distributed Storage scheme based on hbase is used for mass data, the resource data of extraction is used based on memory
The mongodb of database stores TB rank data, can quickly retrieve to data, for systems management data and faces
When data use and be based on oracle relevant database, can better designing system operation flow.Data center's computing architecture
It is stored using hadoop/hbase distributed mass data, there is property extending transversely and data reliability, PB grades of data can be handled,
Have big data analysis real-time computing and more iterative data operations using spark technology simultaneously, with the map/ of hadoop
Reduce technology can offline batch processing calculating task, the streaming mould in the treatment process of data flow based on storm/spark
Type handles data, allows more loose coupling between processing module, and the dynamic configuration and optimization to workflow, data resource may be implemented
Extensive and complex type data integrated treatment is realized based on cloud platform design in center, answers for upper layer analysis mining and prediction class
With the effective technical support of offer.
One, a kind of Internet of Things applied analysis system (abbreviation system) based on multiple track
Crash module, number are compared including MAC Address acquisition module, mac address filter module, portrait identity-acquiring module, portrait
Data preprocess module;Data analysis center module and data correlation center module;
Its interactive relation is:
MAC Address acquisition module, mac address filter module and data preprocessing module successively interact, and MAC Address is adopted in realization
The filtering of collection and real MAC address;
Portrait identity-acquiring module, portrait compare crash module and data preprocessing module successively interacts, and realizes to portrait identity
The acquisition of data and the comparison of portrait data;
Data preprocessing module, data analysis center and data correlation center successively interact, and realize to MAC Address in time zone
Data are interrelated with portrait identity data.
Two, a kind of Internet of Things application analysis method (abbreviation method) based on multiple track
1. MAC Address acquisition module acquires the wireless WIFI physical address of mobile phone, according to WIFI air protocol to WIFI number of eating dishes without rice or wine
Factually show crawl, the protocol analysis of data;
2. the MAC Address data progress virtual mac address filtering that mac address filter module acquires MAC Address acquisition module,
The cleaning of data is realized in MAC Address CRC check and filtering, and the data after cleaning are sent to data prediction using Transmission Control Protocol
Module;
3. portrait identity-acquiring module acquires portrait video data, the decomposition of data is completed according to expected data format, will be decomposed
Structural data afterwards is sent to portrait and compares crash module (201) progress true identity collision;
4. portrait compares crash module and collides the video portrait data of practical existing net acquisition with true portrait library data, will
It collides result and data preprocessing module is sent to Transmission Control Protocol structured data format;
5. data preprocessing module (300) receives mac address filter module and portrait compares what crash module (201) was sent
MAC Address data and portrait compare after structural data, realize that the cleaning of data validity and storage store, for follow-up data
Analysis center carries out big data crash analysis and excavates;
6. data analysis center is searched according to collected MAC Address is adapted to portrait identity track simultaneously in a certain range
In each associated region under the conditions of certain time front and back X minute MAC Address record and portrait identity record, excavate a certain MAC
The possible corresponding portrait identity information in address, counts the total degree that MAC Address and portrait identity occur in all associated regions, presses
According to descending sort, pairs of frequency of occurrence is more, and similarity is higher, by system multiple similar data mining and analysis, as a result
Collection carries out the marking of similarity comprehensive analysis after being accumulated to threshold value;
7. data correlation center periodically stores the result of studying and judging of data analysis center, it is up to the data record of threshold value
Result set deposit linked database is stored into, shows and analyzes for follow-up system.
The present invention has following advantages and good effect:
1. it is advanced, the interrelated of MAC Address and portrait data may be implemented;
2. data have reliability, the collision of through a long time data precipitating and result set;
3. practicability;
4. scalability, can effective protection have investment.
Detailed description of the invention
Fig. 1 is the structural block diagram of this system;
Wherein:
100-MAC Address acquisition modules;
101-mac address filter modules;
200-portrait identity-acquiring modules;
201-portraits compare crash module;
300-data preprocessing modules;
400-data analysis center modules;
500-data correlation center modules;
Specific embodiment:
One, system
1, overall
Such as Fig. 1, this system includes MAC Address acquisition module 100, mac address filter module 101, portrait identity-acquiring module
200, portrait compares crash module 201, data preprocessing module 300;Data analysis center module 400 and data correlation center die
Block 500;
Its interactive relation is:
MAC Address acquisition module 100, mac address filter module 101 and data preprocessing module 300 successively interact, realization pair
The acquisition of MAC Address and the filtering of real MAC address;
Portrait identity-acquiring module 200, portrait compare crash module 201 and data preprocessing module 300 successively interacts, realization pair
The acquisition of portrait identity data and the comparison of portrait data;
Data preprocessing module 300;Data analysis center module 400 and data correlation center module 500 successively interact, realization pair
MAC Address data and portrait identity data is interrelated in time zone.
2, functional module
1) MAC Address acquisition module 100 is responsible for acquiring the WIFI data in eating dishes without rice or wine, that is, acquires the physical MAC address of mobile phone;
2) mac address filter module 101 is responsible for carrying out data cleansing to the MAC Address of acquisition and is sent data in a manner of TCP
To data preprocessing module 300;
3) portrait identity-acquiring module 200 is responsible for acquisition portrait real time data;
4) portrait compares the responsible completion portrait of crash module 201 and portrait database data compares collision, by portrait data conversion
At true identity, the true portrait identity information after conversion is sent to data preprocessing module 300 with structured format;
5) data preprocessing module 300 is responsible for completing MAC Address data and the storage of portrait structure data stores;
6) data analysis center 400 is looked into according to collected MAC Address is adapted to portrait identity track simultaneously in a certain range
Look in each associated region the X minute MAC Address in front and back record and portrait identity record, excavation under the conditions of certain time a certain
MAC Address may corresponding portrait identity information;Count MAC Address and portrait identity occur in all associated regions total time
Number, according to descending sort, pairs of frequency of occurrence is more, and similarity is higher.By system repeatedly similar data mining and analysis,
The marking of similarity comprehensive analysis is carried out after result set is accumulated to threshold value;
7) data correlation center 500 periodically stores the result of studying and judging of data analysis center 400, is up to the number of threshold value
It is stored in linked database at result set according to record storage, shows and analyzes for follow-up system.
Two, method
1, step is 4.
The data analysis center 400 searches true portrait identity within the selected period, according to specific MAC Address
Information, including following workflow:
A, the track for searching the MAC Address using segmented mode between the MAC Address added-time for the MAC Address, finds corresponding association
The X minutes portrait data records in front and back in each associated region equipment are searched, to all devices people under the region in region/time
As identity frequency of occurrence is summarized, according to descending it is cumulative after sort;
B, after obtaining following ranking results, system carries out similarity comprehensive assessment according to frequency of occurrence;
| --- portrait 1n1 times appearance, similarity 90%
| --- portrait 2n2 times appearance, similarity 85%
MAC Address m times appearance --- | --- portrait 3n3 times appearance, similarity 70%
| --- portrait 4n4 times appearance, similarity 60%
| --- portrait.
Similarity is arranged according to descending, and value is higher to be more likely to be true portrait data.
Claims (4)
1. a kind of Internet of Things applied analysis system based on multiple track, it is characterised in that:
Including MAC Address acquisition module (100), mac address filter module (101), portrait identity-acquiring module (200), portrait
Compare crash module (201), data preprocessing module (300);Data analysis center module (400) and data correlation center module
(500);
Its interactive relation is:
MAC Address acquisition module (100), mac address filter module (101) and data preprocessing module (300) successively interact, real
Now to the filtering of the acquisition of MAC Address and real MAC address;
Portrait identity-acquiring module (200), portrait compare crash module (201) and data preprocessing module (300) successively interacts,
Realize the acquisition to portrait identity data and the comparison of portrait data;
Data preprocessing module (300), data analysis center (400) and data correlation center 500 successively interact, and realize to the time
MAC Address data and portrait identity data is interrelated in region.
2. a kind of Internet of Things applied analysis system based on multiple track according to claim 1, it is characterised in that:
The MAC Address acquisition module (100) is responsible for acquiring the WIFI data in eating dishes without rice or wine, that is, with acquiring the physics MAC of mobile phone
Location;
The mac address filter module (101) is responsible for carrying out data cleansing and by data to the MAC Address of acquisition with the side TCP
Formula is sent to data preprocessing module (300);
The portrait identity-acquiring module (200) is responsible for acquisition portrait real time data;
The portrait compares crash module (201) responsible completion portrait and portrait database data compares collision, by portrait number
According to true identity is converted into, the true portrait identity information after conversion is sent to data preprocessing module with structured format
(300);
The data preprocessing module (300) is responsible for completing MAC Address data and the storage of portrait structure data stores;
The data analysis center (400) is according to collected MAC Address and portrait identity track simultaneously in a certain range
Adaptation searches the X minutes MAC Address in front and back record and portrait identity record, digging under the conditions of certain time in each associated region
Digging a certain MAC Address may corresponding portrait identity information;Count what MAC Address and portrait identity in all associated regions occurred
Total degree, according to descending sort, pairs of frequency of occurrence is more, and similarity is higher, by system repeatedly similar data mining with
Analysis carries out the marking of similarity comprehensive analysis after result set is accumulated to threshold value;
The data correlation center (500) periodically stores the result of studying and judging of data analysis center (400), is up to door
The data record storage of limit value is stored in linked database at result set, shows and analyzes for follow-up system.
3. being based on systematic difference analysis method claimed in claims 1-2, it is characterised in that:
1. MAC Address acquisition module (100) acquires the wireless WIFI physical address of mobile phone, according to WIFI air protocol to eating dishes without rice or wine
WIFI data realize the crawl of data, protocol analysis;
2. the MAC Address data that mac address filter module (101) acquires MAC Address acquisition module (100) carry out Virtual MAC
Address filtering, MAC Address CRC check and filtering, realize the cleaning of data, and the data after cleaning are sent to using Transmission Control Protocol
Data preprocessing module (300);
3. portrait identity-acquiring module (200) acquires portrait video data, the decomposition of data is completed according to expected data format, it will
Structural data after decomposition is sent to portrait and compares crash module (201) progress true identity collision;
4. portrait compares crash module (201) and touches the video portrait data of practical existing net acquisition with true portrait library data
It hits, collision result is sent to data preprocessing module (300) with Transmission Control Protocol structured data format;
5. data preprocessing module (300) receives mac address filter module (101) and portrait compares crash module (201) transmission
The MAC Address data that come over and portrait compare after structural data, realize that the cleaning of data validity and storage store, for after
Continuous data analysis center module (400) carry out big data crash analysis and excavate;
6. collected MAC Address is adapted to data analysis center (400) basis with portrait identity track simultaneously in a certain range,
It is a certain to search in each associated region the X minute MAC Address in front and back record and portrait identity record, excavation under the conditions of certain time
The possible corresponding portrait identity information of MAC Address, counts MAC Address and portrait identity occur in all associated regions total time
Number, according to descending sort, pairs of frequency of occurrence is more, and similarity is higher, by system repeatedly similar data mining and analysis,
Result set carries out the marking of similarity comprehensive analysis after being accumulated to threshold value;
7. data correlation center (500) periodically store the result of studying and judging of data analysis center (400), it is up to threshold value
Data record storage at result set be stored in linked database, for follow-up system show and analyze.
4. application analysis method according to claim 3, it is characterised in that the step 4.:
A, the track for searching the MAC Address using segmented mode between the MAC Address added-time for the MAC Address, finds corresponding association
The X minutes portrait data records in front and back in each associated region equipment are searched, to all devices people under the region in region/time
As identity frequency of occurrence is summarized, according to descending it is cumulative after sort;
B, after obtaining following ranking results, system carries out similarity comprehensive assessment according to frequency of occurrence;
| --- portrait 1n1 times appearance, similarity 90%
| --- portrait 2n2 times appearance, similarity 85%
MAC Address m times appearance --- | --- portrait 3n3 times appearance, similarity 70%
| --- portrait 4n4 times appearance, similarity 60%
| --- portrait
Similarity is arranged according to descending, and value is higher to be more likely to be true portrait data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811422106.5A CN109522860B (en) | 2018-11-27 | 2018-11-27 | Internet of things application analysis system and method based on multiple tracks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811422106.5A CN109522860B (en) | 2018-11-27 | 2018-11-27 | Internet of things application analysis system and method based on multiple tracks |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109522860A true CN109522860A (en) | 2019-03-26 |
CN109522860B CN109522860B (en) | 2021-07-13 |
Family
ID=65794579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811422106.5A Active CN109522860B (en) | 2018-11-27 | 2018-11-27 | Internet of things application analysis system and method based on multiple tracks |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109522860B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727671A (en) * | 2019-10-11 | 2020-01-24 | 北京明略软件系统有限公司 | Case data processing method and device |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060173985A1 (en) * | 2005-02-01 | 2006-08-03 | Moore James F | Enhanced syndication |
CN103886658A (en) * | 2014-01-28 | 2014-06-25 | 北京中科虹霸科技有限公司 | Multi-modal biometric recognition-based distributed internet-of-things lock equipment and unlocking method thereof |
US20150334474A1 (en) * | 2010-10-19 | 2015-11-19 | Welch Allyn, Inc. | Platform for patient monitoring |
CN105790955A (en) * | 2016-04-06 | 2016-07-20 | 深圳市博康智能信息技术有限公司 | Method and system for associating MAC addresses with face information |
US20160364689A1 (en) * | 2015-06-10 | 2016-12-15 | Smart Catch LLC | Load Distribution and Consolidation Tracking System |
CN106649298A (en) * | 2015-07-22 | 2017-05-10 | 中国科学院微电子研究所 | Cross-domain association establishment method and system based on Internet of things |
CN106874347A (en) * | 2016-12-26 | 2017-06-20 | 深圳市深网视界科技有限公司 | A kind of method and system for matching characteristics of human body and MAC Address |
CN107590439A (en) * | 2017-08-18 | 2018-01-16 | 湖南文理学院 | Target person identification method for tracing and device based on monitor video |
CN107623754A (en) * | 2017-09-28 | 2018-01-23 | 武汉虹旭信息技术有限责任公司 | WiFi acquisition systems and its method based on true and false MAC identifications |
CN108280339A (en) * | 2018-01-16 | 2018-07-13 | 合肥工业大学 | A kind of passenger's personal identification method based on Multi-source Information Fusion |
US10058290B1 (en) * | 2013-06-21 | 2018-08-28 | Fitbit, Inc. | Monitoring device with voice interaction |
CN108536749A (en) * | 2018-03-12 | 2018-09-14 | 南京甄视智能科技有限公司 | The method for building personnel's Track View based on collision detection method |
-
2018
- 2018-11-27 CN CN201811422106.5A patent/CN109522860B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060173985A1 (en) * | 2005-02-01 | 2006-08-03 | Moore James F | Enhanced syndication |
US20150334474A1 (en) * | 2010-10-19 | 2015-11-19 | Welch Allyn, Inc. | Platform for patient monitoring |
US10058290B1 (en) * | 2013-06-21 | 2018-08-28 | Fitbit, Inc. | Monitoring device with voice interaction |
CN103886658A (en) * | 2014-01-28 | 2014-06-25 | 北京中科虹霸科技有限公司 | Multi-modal biometric recognition-based distributed internet-of-things lock equipment and unlocking method thereof |
US20160364689A1 (en) * | 2015-06-10 | 2016-12-15 | Smart Catch LLC | Load Distribution and Consolidation Tracking System |
CN106649298A (en) * | 2015-07-22 | 2017-05-10 | 中国科学院微电子研究所 | Cross-domain association establishment method and system based on Internet of things |
CN105790955A (en) * | 2016-04-06 | 2016-07-20 | 深圳市博康智能信息技术有限公司 | Method and system for associating MAC addresses with face information |
CN106874347A (en) * | 2016-12-26 | 2017-06-20 | 深圳市深网视界科技有限公司 | A kind of method and system for matching characteristics of human body and MAC Address |
CN107590439A (en) * | 2017-08-18 | 2018-01-16 | 湖南文理学院 | Target person identification method for tracing and device based on monitor video |
CN107623754A (en) * | 2017-09-28 | 2018-01-23 | 武汉虹旭信息技术有限责任公司 | WiFi acquisition systems and its method based on true and false MAC identifications |
CN108280339A (en) * | 2018-01-16 | 2018-07-13 | 合肥工业大学 | A kind of passenger's personal identification method based on Multi-source Information Fusion |
CN108536749A (en) * | 2018-03-12 | 2018-09-14 | 南京甄视智能科技有限公司 | The method for building personnel's Track View based on collision detection method |
Non-Patent Citations (2)
Title |
---|
YUXIA WANG: "Robust object tracking via online Principal Component–Canonical Correlation Analysis (P3CA)", 《ORIGINAL PAPER》 * |
宋宇航: "基于SPARK技术的网络虚拟身份数据挖掘", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110727671A (en) * | 2019-10-11 | 2020-01-24 | 北京明略软件系统有限公司 | Case data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109522860B (en) | 2021-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tong et al. | A survey on algorithms for intelligent computing and smart city applications | |
Scellato et al. | Socio-spatial properties of online location-based social networks | |
Yan et al. | A hybrid model and computing platform for spatio-semantic trajectories | |
CN101990003B (en) | User action monitoring system and method based on IP address attribute | |
CN110413707A (en) | The excavation of clique's relationship is cheated in internet and checks method and its system | |
CN103812872B (en) | A kind of network navy behavioral value method and system based on mixing Di Li Cray process | |
CN111930868A (en) | Big data behavior trajectory analysis method based on multi-dimensional data acquisition | |
CN106790468A (en) | A kind of distributed implementation method for analyzing user's WiFi event trace rules | |
CN106682212A (en) | Social relations classification method based on user movement behavior and device | |
CN105307121B (en) | A kind of information processing method and device | |
CN110321424B (en) | AIDS (acquired immune deficiency syndrome) personnel behavior analysis method based on deep learning | |
CN111241305A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN110162588A (en) | A kind of track fusion method of multidimensional related information | |
CN107529135A (en) | User Activity type identification method based on smart machine data | |
CN110009416A (en) | A kind of system based on big data cleaning and AI precision marketing | |
CN109635149A (en) | People search method, apparatus and electronic equipment | |
CN112732781A (en) | Network situation dynamic drawing system and method fusing data quality multi-dimensional evaluation | |
CN110377752A (en) | A kind of knowledge base system applied to the operation of government affairs hall | |
CN110245196A (en) | A kind of data relation analysis method determining public safety environment based on timing and characteristic value | |
Lauw et al. | Stevent: Spatio-temporal event model for social network discovery | |
CN109522860A (en) | A kind of Internet of Things applied analysis system and method based on multiple track | |
Liao et al. | A semantic-enhanced trajectory visual analytics for digital forensic | |
CN103268332B (en) | A kind of believable method for service selection based on community structure | |
CN112541134A (en) | Sequence position recommendation method based on geographical perception | |
Zhengqiao et al. | Research on clustering algorithm for massive data based on Hadoop platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhu Jiaojiao Inventor after: Shu Wenbing Inventor after: Dai Changjiang Inventor before: Shu Wenbing Inventor before: Dai Changjiang |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |