CN110427348B - Big data-based intelligent security system data sharing method - Google Patents

Big data-based intelligent security system data sharing method Download PDF

Info

Publication number
CN110427348B
CN110427348B CN201910704663.4A CN201910704663A CN110427348B CN 110427348 B CN110427348 B CN 110427348B CN 201910704663 A CN201910704663 A CN 201910704663A CN 110427348 B CN110427348 B CN 110427348B
Authority
CN
China
Prior art keywords
data
monitoring
monitoring data
matching
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910704663.4A
Other languages
Chinese (zh)
Other versions
CN110427348A (en
Inventor
钟斌
关振宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Fusion Technology Co ltd
Original Assignee
Jiangxi Fusion Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Fusion Technology Co ltd filed Critical Jiangxi Fusion Technology Co ltd
Priority to CN201910704663.4A priority Critical patent/CN110427348B/en
Publication of CN110427348A publication Critical patent/CN110427348A/en
Application granted granted Critical
Publication of CN110427348B publication Critical patent/CN110427348B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1748De-duplication implemented within the file system, e.g. based on file segments
    • G06F16/1752De-duplication implemented within the file system, e.g. based on file segments based on file chunks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a big data-based intelligent security system data sharing method, which is characterized by comprising the following steps: receiving monitoring data uploaded by each security monitoring device; partitioning the monitoring data into blocks; deleting the repeated data blocks; establishing an index for the deduplicated data blocks; and utilizing the index to provide retrieval service for the monitoring data. The invention creates indexes for the monitoring data through retrieval matching, thereby efficiently providing service for future data retrieval and meeting the dual requirements on performance and precision during data sharing.

Description

Big data-based intelligent security system data sharing method
Technical Field
The application relates to the technical field of the next generation information network industry, in particular to a smart security system data sharing method based on big data.
Background
In recent years, the level of urbanization in China is continuously improved, the scale of urban communities is continuously enlarged, people, vehicles and objects are highly concentrated, the security situation is gradually complicated, and the work of social security management, illegal criminal activities attack and the like is heavily stressed. In a public security case with large human input, the manual investigation is like a sea fishing needle in the face of massive image data, so that the time and labor are wasted, the efficiency is low, and the cost is high. Under the circumstances, how to improve the social security management level and attack the illegal criminal activities by using advanced technological means becomes a problem to be solved urgently at present.
The intelligent security is also called intelligent security. The intelligent security technology mainly comprises an artificial intelligence algorithm, high-performance calculation, distributed calculation and storage, large-scale operation and maintenance and the like. The data sharing of the intelligent security system based on big data is very important for realizing high-performance intelligent security, and the key difficulty is how to meet the dual requirements on performance and precision in data sharing.
Disclosure of Invention
In order to solve the problems in the related art, the application provides a data sharing method of the intelligent security system based on big data.
According to the embodiment of the application, a data sharing method of an intelligent security system based on big data is provided, and the method is characterized by comprising the following steps:
receiving monitoring data uploaded by each security monitoring device;
partitioning the monitoring data into blocks;
deleting the repeated data blocks;
establishing an index for the deduplicated data blocks;
and utilizing the index to provide retrieval service for the monitoring data.
Preferably, the blocking the monitoring data includes:
creating a block flag with a bit operation;
matching the block mark with the monitoring data;
and partitioning the matched position.
Preferably, creating the block flag with the bit operation comprises:
constructing a mark character string S ═ [ b1, b2, b3, … bm ], wherein bi is a binary string of each character in the mark character string, and the number of binary digits is n;
the data fingerprint f (Si) is set to be the combination of the i-th bits of b1, b2, b3, … bm, where i takes the 1-n-th bits of the binary string.
Preferably, matching the block flag with the data comprises:
a division into a jth data block BBj of the monitored data;
step 1: skipping k characters to the right from the Bj-1 end mark;
step 2: aligning the current bit to S left;
and step 3: fetching m characters to the left from the last position of the data aligned with S;
and 4, step 4: taking the ith bit from the m characters to form Xn, and comparing Xn with f (Si) one by one, wherein i is from 1 to n.
Preferably, matching the block flag with the data further comprises:
step 6: if i from 1 to n, all satisfy Xn ═ f (si), the last bit in the data that is currently aligned with S is marked as the end bit of Mj.
Preferably, matching the block flag with the data further comprises:
and 7: if the two characters are different, continuing to skip k characters to the right, and returning to the step 2;
and 8: returning to step 2 for L times, the last bit in the data currently aligned with S is marked as the end bit of Bj.
Preferably, matching the block flag with the monitoring data comprises:
entering the division of the jth data block Bj of the monitoring data;
step 1: skipping k characters to the right from the Bj-1 end mark;
step 2: aligning the current bit to S left;
and step 3: taking r characters from the first position of the data after being aligned with S to the right, wherein r is far smaller than m;
and 4, step 4: taking the ith component Xir from the r characters taken, and then
Step 4.1: shifting the head position of Xir to the right to obtain r positions f (sir), and comparing Xir with f (sir) one by one, wherein i is from 1 to n;
step 4.2: if not, executing SHLf (Sir),1, and then returning to the step 4.1;
step 4.3: if the step 4.1 is returned to m-r times, returning to the step 2;
step 4.3: if i from 1 to n, all satisfy Xir ═ f (sir), then step 5 is entered.
Preferably, matching the block flag with the monitoring data further comprises:
and 5: fetching m characters to the left from the last position of the data aligned with S;
step 6: taking the ith bit from the m characters to form Xi, and comparing Xi with f (Si) one by one, wherein i is from 1 to n.
Preferably, matching the block flag with the monitoring data further comprises:
and 7: if i from 1 to n, all satisfy Xi ═ f (si), the last bit in the data that is currently aligned with S is marked as the end bit of Bj.
Preferably, matching the block flag with the monitoring data further comprises:
and 8: if the two characters are different, continuing to skip k characters to the right, and returning to the step 2;
and step 9: returning to step 2 for L times, the last bit in the data currently aligned with S is marked as the end bit of Bj.
The technical scheme provided by the embodiment of the application can have the following beneficial effects: the invention provides an efficient data sharing method of an intelligent security system based on big data, which is used for creating indexes for monitoring data through retrieval and matching, thereby efficiently providing services for future data retrieval and meeting the dual requirements on performance and precision during data sharing.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating a big data based smart security system data sharing method according to an exemplary embodiment;
fig. 2 is a flowchart illustrating a big data-based smart security system data sharing method according to another exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The following disclosure provides many different embodiments, or examples, for implementing different features of the application. In order to simplify the disclosure of the present application, specific example components and arrangements are described below. Of course, they are merely examples and are not intended to limit the present application. Further, the present application may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. Further, examples of various specific processes and materials are provided herein, but one of ordinary skill in the art may recognize the applicability of other processes and/or the use of other materials. In addition, the structure of a first feature described below as "on" a second feature may include embodiments in which the first and second features are formed in direct contact, and may also include embodiments in which additional features are formed between the first and second features, such that the first and second features may not be in direct contact.
In the description of the present application, it should be noted that, unless otherwise specified and limited, the terms "mounted," "connected," and "connected" are to be interpreted broadly, and may be, for example, a mechanical connection or an electrical connection, a communication between two elements, a direct connection, or an indirect connection via an intermediate medium, and specific meanings of the terms may be understood by those skilled in the art according to specific situations.
Fig. 1 is a flowchart illustrating a data sharing method for a smart security system based on big data according to an exemplary embodiment. Referring to fig. 1, it includes:
step S10, receiving monitoring data uploaded by each security monitoring device;
step S20, establishing an index for the monitoring data;
step S30, providing a search service for the monitoring data.
The embodiment provides an efficient data sharing method of the intelligent security system based on big data, and the index is created for the monitored data, so that the service is efficiently provided for future data retrieval, and the dual requirements on performance and precision during data sharing are met.
Preferably, the indexing of the monitoring data comprises:
determining a background and a target in the monitoring data;
performing background matching on the determined background in a pre-established background library, and performing target matching on the determined target in a pre-established target library;
and creating an index of the monitoring data by using the matching result.
The embodiment notes that the monitoring data has the difference between the background and the target, and divides the monitoring data, thereby remarkably reducing the calculation amount of matching retrieval.
For example, video surveillance is a still picture most of the time except when there is occasional human activity. Preferably, the still image is determined as the background and the moving image is determined as the object by analyzing the still image and the moving image.
For example, in audio monitoring, ambient noise is most of the time, except for the accidental occurrence of human voice or the impact sound of a particular object. Preferably, the ambient noise is determined as the background and the human voice or the specific object collision sound is determined as the target by analyzing the human voice or the specific object collision sound.
In the preferred embodiment, a background library and a target library are also created in advance, so that retrieval and matching of the background and the target after the monitoring data division can be realized. Through the pre-creation of the database and the division into the background library and the target library, the efficiency of searching and matching is remarkably improved. Preferably, for audio monitoring, only the matching target is retrieved, i.e. only the human voice or the specific object collision sound is indexed, and the environmental noise data is discarded, so that the efficiency of retrieving the matching can be further improved.
Preferably, performing background matching comprises:
extracting a characteristic combination X from the determined background;
searching whether a characteristic combination Y with the difference from X smaller than a preset threshold exists from a background library;
if so, determining that Y matches X; if not, a number is created for X and X is added to the background pool.
Preferably, performing the target matching comprises:
extracting a characteristic combination X from the determined target;
searching whether a characteristic combination Y with the difference from X smaller than a preset threshold exists from a target library;
if so, determining that Y matches X; if not, a number is created for X and X is added to the target repository.
Preferably, the extracting the feature combination X includes:
creating
Xi is the ith local feature in the background or object and N is the number of local features.
Preferably, the monitored data is an image,
Xi=(ai,si,ρi,vi);
wherein ai refers to the coordinate of the local feature in the image, si refers to the size of the local feature, ρ i refers to the saliency value of the local feature, and vi refers to the feature vector of the local feature.
Preferably, the searching whether the feature combination Y with the difference from X smaller than the preset threshold exists comprises:
step 1: calculating Ω ═ d (vi (Xi), vi (Yi)), where vi (Xi) refers to the feature vector of Xi, vi (Yi) refers to the feature vector of Yi, and d () refers to the euler distance function;
step 2, judging whether omega is smaller than a preset threshold value G1;
step 3, if the difference value is smaller than the preset threshold value G2, converting Xi according to ai and si of Yi, and judging whether the difference value of rho i of Xi and rho i of Yi is smaller than the preset threshold value G2 after conversion;
and 4, if the value is less than the preset value, considering that the Xi is matched with the Yi.
Preferably, the monitoring data is audio,
Xi=(ti,li,fi,ρi,vi);
wherein ti refers to a time point of the local feature in the audio, li refers to a duration of the local feature, fi refers to a spectrum description of the local feature, ρ i refers to a saliency value of the local feature, and vi refers to a feature vector of the local feature.
Preferably, the searching whether the feature combination Y with the difference from X smaller than the preset threshold exists comprises:
step 1: calculating Ω ═ d (vi (Xi), vi (Yi)), where vi (Xi) refers to the feature vector of Xi, vi (Yi) refers to the feature vector of Yi, and d () refers to the euler distance function;
step 2, judging whether omega is smaller than a preset threshold value G1;
step 3, if the difference value is smaller than the preset threshold value G2, converting Xi according to ti and li of Yi, and judging whether the difference value of rho i of Xi and rho i of Yi is smaller than the preset threshold value G2 after conversion;
step 4, if the fi of the Xi is smaller than the fi of the Yi, judging whether the fi of the Xi is similar to the fi of the Yi;
and 5, if the two are similar, considering that Xi and Yi are matched.
The preferable embodiment provides an original scheme of feature matching, different schemes are designed for images and sound respectively, and the inventor carries out a great deal of practice on the scheme, so that double requirements on performance and precision during data sharing are well met in the data sharing of the intelligent security system based on big data.
Preferably, the creating an index of the monitoring data using the matching result includes:
and if the number of the matches of the Xi and the Yi is larger than a preset threshold value G3, considering that the X and the Y are matched, and representing the background or the target corresponding to the X by the number of the background or the target corresponding to the Y when the index is created for the monitoring data.
Preferably, the background number and the target number should be reserved separately when creating the index.
In practice, when a user provides a picture, for example, an identification card photo of a person, according to the above embodiment, the system determines the portrait in the identification card photo as a target, converts the portrait into a search number, and searches the index established in the system by using the search number (an efficient algorithm may be adopted, and only the target number in the index is matched), so as to find all matched monitoring data.
In practice, when a user provides a picture, for example, a warehouse picture, according to the above embodiment, the system determines the picture as a background, converts the picture into a search number, and searches the index established in the system by using the search number (an efficient algorithm may be adopted, and only the background number in the index is matched), so as to find all matched monitoring data.
The embodiment of the invention adopts a scheme of feature matching to provide efficient data sharing for the intelligent security system, and the following embodiment adopts a scheme of data block matching to provide efficient data sharing for the intelligent security system.
Fig. 2 is a flowchart illustrating a big data-based smart security system data sharing method according to another exemplary embodiment, including:
step S10, receiving monitoring data uploaded by each security monitoring device;
step S20, blocking the monitoring data;
step S30, deleting the repeated data blocks;
step S40, establishing an index for the deduplicated data block;
and step S50, utilizing the index to provide retrieval service for the monitoring data.
The embodiment provides an efficient data sharing method of the intelligent security system based on big data, and the index is created for the monitored data, so that the service is efficiently provided for future data retrieval, and the dual requirements on performance and precision during data sharing are met.
In addition, the intelligent security system is connected with a large number of monitoring devices and needs to collect various audio and video data, so that the data uploaded by each monitoring device in each time period form a file.
In the embodiment, the data uploaded by each monitoring device is stored in a blocking and deduplication manner, so that the same data block of a new file is not saved repeatedly, and only one pointer is reserved to point to the repeated data block. The efficient storage mode also solves the problem that the storage space of the intelligent security system based on big data in the prior art is insufficient.
Preferably, the blocking the monitoring data includes:
creating a block flag with a bit operation;
matching the block mark with the monitoring data;
and partitioning the matched position.
The CPU of the computer is characterized by high bit execution efficiency and low system overhead. The preferred embodiment adopts bit operation to create the block mark, thereby improving the comparison efficiency and being beneficial to processing the monitoring data of the intelligent security system with huge data volume.
Preferably, creating the block flag with the bit operation comprises:
constructing a mark character string S ═ [ b1, b2, b3, … bm ], wherein bi is a binary string of each character in the mark character string, and the number of binary digits is n;
the data fingerprint f (Si) is set to be the combination of the i-th bits of b1, b2, b3, … bm, where i takes the 1-n-th bits of the binary string.
Preferably, matching the block flag with the monitoring data comprises:
entering the division of the jth data block Bj of the monitoring data;
step 1: skipping k characters to the right from the Bj-1 end mark;
step 2: aligning the current bit to S left;
and step 3: fetching m characters to the left from the last position of the data aligned with S;
and 4, step 4: taking the ith bit from the m characters to form Xn, and comparing Xn with f (Si) one by one, wherein i is from 1 to n.
And 5: if i from 1 to n, all satisfy Xn ═ f (si), the last bit in the data that is currently aligned with S is marked as the end bit of Bj.
Step 6: if the two characters are different, continuing to skip k characters to the right, and returning to the step 2;
and 7: returning to step 2 for L times, the last bit in the data currently aligned with S is marked as the end bit of Bj.
In the above comparison method, the comparison based on the flag character string S is realized, the data blocking of the file can be completed very efficiently, and the method is particularly suitable for executing the preferred embodiment by using the CPU.
Preferably, matching the block flag with the monitoring data comprises:
entering the division of the jth data block Bj of the monitoring data;
step 1: skipping k characters to the right from the Bj-1 end mark;
step 2: aligning the current bit to S left;
and step 3: taking r characters from the first position of the data after being aligned with S to the right, wherein r is far smaller than m;
and 4, step 4: taking the ith component Xir from the r characters taken, and then
Step 4.1: shifting the head position of Xir to the right to obtain r positions f (sir), and comparing Xir with f (sir) one by one, wherein i is from 1 to n;
step 4.2: if not, executing SHLf (Sir),1, and then returning to the step 4.1;
step 4.3: if the step 4.1 is returned to m-r times, returning to the step 2;
step 4.3: if i from 1 to n, all satisfy Xir ═ f (sir), then step 5 is entered.
And 5: fetching m characters to the left from the last position of the data aligned with S;
step 6: taking the ith bit from the m characters to form Xi, and comparing Xi with f (Si) one by one, wherein i is from 1 to n.
And 7: if i from 1 to n, all satisfy Xi ═ f (si), the last bit in the data that is currently aligned with S is marked as the end bit of Bj.
And 8: if the two characters are different, continuing to skip k characters to the right, and returning to the step 2;
and step 9: returning to step 2 for L times, the last bit in the data currently aligned with S is marked as the end bit of Bj.
In the comparison method, the characteristic comparison is carried out by taking the data volume of which r is far less than m, so that the comparison volume is further obviously reduced, the data blocking of the file can be completed with high efficiency, and the method is particularly suitable for the extremely huge data volume of the intelligent security system based on big data.
The preferred L-k-210 is the amount of data that applicants set empirically, with a good balance of space and efficiency.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (1)

1. A big data-based intelligent security system data sharing method is characterized by comprising the following steps:
s1: receiving monitoring data uploaded by each security monitoring device;
by creating an index for the monitoring data, creating an index for the monitoring data includes:
determining a background and a target in the monitoring data;
performing background matching on the determined background in a pre-established background library, and performing target matching on the determined target in a pre-established target library;
creating an index of the monitoring data by using the matching result;
during video monitoring, except for the accidental occurrence of human activities, most of the time is still pictures; determining the still image as a background and the moving image as a target by analyzing the still image and the moving image;
during audio monitoring, except for the accidental occurrence of human voice or special object collision sound, the audio monitoring system is mostly environmental noise; determining the environmental noise as a background and determining the human voice or the special object collision sound as a target by analyzing the human voice or the special object collision sound;
a background library and a target library are created in advance, so that retrieval matching of the background and the target after the monitoring data division can be realized; the method comprises the steps of pre-creating a database, and dividing the database into a background library and a target library; for audio monitoring, only matching targets are retrieved, namely, only indexes are built on human sounds or special object collision sounds, and environmental noise data are discarded;
s2: partitioning the monitoring data into blocks;
the monitoring data blocking includes:
s2.1: creating a block flag with a bit operation, comprising:
constructing a mark character string S ═ [ b1, b2, b3, … bm ], wherein b1 to bm are binary strings of each character in the mark character string, and the number of binary digits is n;
setting the data fingerprint f (Si) to be the combination of the ith bits of b1, b2, b3 and … bm;
s2.2: matching the block mark with the monitoring data;
the matching of the block mark and the monitoring data comprises the following steps:
entering the division of the jth data block Bj of the monitoring data;
step 1: skipping k characters to the right from the Bj-1 end mark;
step 2: aligning the current bit to S left;
and step 3: fetching m characters to the left from the last position of the data aligned with S;
and 4, step 4: taking the ith bit from the obtained m characters to form Xi, and comparing Xi with f (Si) one by one, wherein i is from 1 to n;
and 5: if i is from 1 to n, all satisfy Xi ═ f (si), then mark the last bit in the data that is currently aligned with S as the end bit of Bj;
step 6: if the two characters are different, continuing to skip k characters to the right, and returning to the step 2;
and 7: returning to the step 2 for L times, marking the last bit aligned with S currently in the data as the end bit of the Bj;
the step 2 of matching the block mark with the monitoring data further comprises the following steps:
step a: taking r characters from the first position of the data after being aligned with S to the right, wherein r is far smaller than m;
step b: taking the ith component Xir from the r characters taken, and then
Step c: shifting the head position of Xir to the right to obtain r positions f (sir), and comparing Xir with f (sir) one by one, wherein i is from 1 to n;
step d: if not, executing SHLf (Sir),1, and then returning to the step c;
step e: if returning to step c for m-r times, returning to step 2;
step f: if i from 1 to n, all satisfy Xir ═ f (sir), go to step 3;
s2.3: partitioning at the matched position;
s3: deleting the repeated data blocks;
s4: establishing an index for the deduplicated data blocks;
s5: and utilizing the index to provide retrieval service for the monitoring data.
CN201910704663.4A 2019-07-31 2019-07-31 Big data-based intelligent security system data sharing method Active CN110427348B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910704663.4A CN110427348B (en) 2019-07-31 2019-07-31 Big data-based intelligent security system data sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910704663.4A CN110427348B (en) 2019-07-31 2019-07-31 Big data-based intelligent security system data sharing method

Publications (2)

Publication Number Publication Date
CN110427348A CN110427348A (en) 2019-11-08
CN110427348B true CN110427348B (en) 2021-01-12

Family

ID=68413613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910704663.4A Active CN110427348B (en) 2019-07-31 2019-07-31 Big data-based intelligent security system data sharing method

Country Status (1)

Country Link
CN (1) CN110427348B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467571A (en) * 2010-11-17 2012-05-23 英业达股份有限公司 Data block partition method and addition method for data de-duplication
CN102629258B (en) * 2012-02-29 2013-12-18 浪潮(北京)电子信息产业有限公司 Repeating data deleting method and device
CN104142969B (en) * 2013-11-27 2018-04-06 北京星网锐捷网络技术有限公司 The treating method and apparatus of deblocking
CN106648991A (en) * 2016-12-28 2017-05-10 长春理工大学 Duplicated data deletion method in data recovery system

Also Published As

Publication number Publication date
CN110427348A (en) 2019-11-08

Similar Documents

Publication Publication Date Title
CN102549603B (en) Relevance-based image selection
JP4486780B2 (en) Nonlinear quantization and similarity matching method for image information retrieval
CN112395457B (en) Video to-be-retrieved positioning method applied to video copyright protection
CN109783667B (en) Image storage and retrieval method, client and system
US20210099310A1 (en) Image processing method, image matching method, device and storage medium
CN110825968A (en) Information pushing method and device, storage medium and computer equipment
CN114694185B (en) Cross-modal target re-identification method, device, equipment and medium
CN113076465A (en) Universal cross-modal retrieval model based on deep hash
CN112818995B (en) Image classification method, device, electronic equipment and storage medium
CN114973351B (en) Face recognition method, device, equipment and storage medium
CN108763295A (en) A kind of video approximate copy searching algorithm based on deep learning
CN112347223A (en) Document retrieval method, document retrieval equipment and computer-readable storage medium
CN114282059A (en) Video retrieval method, device, equipment and storage medium
CN109241315B (en) Rapid face retrieval method based on deep learning
CN113326363B (en) Searching method and device, prediction model training method and device and electronic equipment
CN109344276B (en) Image fingerprint generation method, image similarity comparison method and storage medium
CN104778272B (en) A kind of picture position method of estimation excavated based on region with space encoding
US11403875B2 (en) Processing method of learning face recognition by artificial intelligence module
CN108090117B (en) A kind of image search method and device, electronic equipment
CN110427348B (en) Big data-based intelligent security system data sharing method
CN116108217B (en) Fee evasion vehicle similar picture retrieval method based on depth hash coding and multitask prediction
CN106886783A (en) A kind of image search method and system based on provincial characteristics
CN107273478A (en) A kind of semi-supervised hashing image searching method based on Group Lasso
CN108595469A (en) A kind of semantic-based agricultural machinery monitor video image section band Transmission system
CN113128461B (en) Pedestrian re-recognition performance improving method based on human body key point mining full-scale features

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhong Bin

Inventor after: Guan Zhenyu

Inventor before: Guan Zhenyu

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201224

Address after: 330096 room 211, business office, 2nd floor, building 1, science and Technology Park, Nanchang University, 589 Gaoxin Avenue, Gaoxin District, Nanchang City, Jiangxi Province

Applicant after: Jiangxi Fusion Technology Co.,Ltd.

Address before: No.18-1, guandianzhuang, Pingxi village, Nanping Town, Suixi County, Huaibei City, Anhui Province 235100

Applicant before: Guan Zhenyu

GR01 Patent grant
GR01 Patent grant