CN112188164A - AI vision-based violation real-time monitoring system and method - Google Patents

AI vision-based violation real-time monitoring system and method Download PDF

Info

Publication number
CN112188164A
CN112188164A CN202011048456.7A CN202011048456A CN112188164A CN 112188164 A CN112188164 A CN 112188164A CN 202011048456 A CN202011048456 A CN 202011048456A CN 112188164 A CN112188164 A CN 112188164A
Authority
CN
China
Prior art keywords
monitoring
algorithm
vision
real
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011048456.7A
Other languages
Chinese (zh)
Inventor
曹喜乐
邓海勤
高志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aidong Chaoyue Artificial Intelligence Technology Beijing Co ltd
Original Assignee
Aidong Chaoyue Artificial Intelligence Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aidong Chaoyue Artificial Intelligence Technology Beijing Co ltd filed Critical Aidong Chaoyue Artificial Intelligence Technology Beijing Co ltd
Priority to CN202011048456.7A priority Critical patent/CN112188164A/en
Publication of CN112188164A publication Critical patent/CN112188164A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/44Decoders specially adapted therefor, e.g. video decoders which are asymmetric with respect to the encoder
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/502Proximity

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses an AI vision-based violation real-time monitoring system and method, which comprises a data acquisition terminal, an edge computing unit, a cloud service and a display terminal, wherein the data acquisition terminal acquires images of a monitoring area for AI identification through a camera module; accessing the network camera according to the IP address of the network camera, and monitoring the condition of a target site in real time; the edge computing unit decodes and preprocesses the image, deploys an AI algorithm and performs reasoning through an edge machine; the invention relates to a system and a method for intelligently identifying and tracking irregular behaviors in real time based on an AI visual technology. The cost of manual monitoring is reduced, and meanwhile, the requirement of factory safety production can be met; the invention can effectively reduce manpower, improve production safety, realize monitoring and alarming in real time all weather, and is an ideal illegal behavior detection method; compared with the traditional server, the maintenance cost can be reduced; this is favorable to the flexibility of the exhibition mode various.

Description

AI vision-based violation real-time monitoring system and method
Technical Field
The invention relates to the technical field of computer vision, in particular to an AI vision-based violation real-time monitoring system and method.
Background
The computer vision technology refers to the ability of a machine to sense the environment, and is a technology which mainly utilizes a sensor to convert a photoelectric signal into image data to realize the function of the machine of 'seeing the world'. The AI vision technology is a technology which can learn common characteristics and differential characteristics of images and finally automatically identify target characteristics by processing image data through an artificial intelligence deep learning method on the basis of computer vision. In hazardous production environments, violation monitoring is typically performed in three ways: firstly, through manual monitoring, the method not only consumes time and labor for measurement, but also cannot carry out all-weather monitoring on dangerous areas, and meanwhile, the dangerous environment has certain harm to monitoring people; secondly, video monitoring is carried out through a camera, all-weather real-time monitoring can be realized, but the method belongs to post evidence query and cannot effectively carry out early warning on illegal behaviors; and thirdly, fixed site instrument detection, which is a method of detecting at a specified site and entering a production environment after passing through the site, belongs to advance monitoring, but in the actual production process, due to the complexity of behaviors of people, the violation behaviors still exist in the production after the advance monitoring, so the method cannot effectively identify the violation behaviors in the production process. Therefore, the invention provides a real-time monitoring and warning system and method for illegal behaviors in a dangerous production environment based on an AI vision technology.
Disclosure of Invention
The purpose of the invention can be realized by the following technical scheme: an AI vision-based violation real-time monitoring system comprises a data acquisition terminal, an edge computing unit, a cloud service and a display terminal, wherein the data acquisition terminal acquires images of a monitoring area through a camera module for AI identification; the remote user can use a standard web browser on the PC to access the web camera according to the IP address of the web camera so as to monitor the condition of the target site in real time; the intelligent video streaming system has the main advantages that wireless video streaming transmission can be realized, the image acquisition equipment and the computing unit are separated, and the intelligent computing unit is prevented from being directly exposed in a dangerous environment; the edge computing unit decodes and preprocesses the image, deploys an AI algorithm and performs reasoning through an edge machine; monitoring of a production environment is realized through an AI deep learning algorithm; the cloud service module mainly comprises a W cloud server of a large company such as Aliyun, Huashi cloud and Baidu cloud; compared with the traditional local server, the cloud server is convenient for data storage and service deployment such as web and the like, and has super-strong storage capacity and computing capacity. Meanwhile, compared with the traditional server, the maintenance cost can be reduced; thus being beneficial to the flexibility and the diversity of the display modes; the display terminal can flexibly display the detection result through the cloud service framework, the result can be displayed on the display terminals such as a liquid crystal display, a notebook computer and a mobile phone, and a user can conveniently check the result at any time.
Preferably, the camera module adopts a network camera, the network camera is a new generation product combining a traditional camera and a network video technology, and besides all image capturing functions of a common traditional camera, a digital compression controller and a WEB-based operating system are also arranged in the camera, so that video data are compressed and encrypted and then are sent to a terminal user through a local area network, an internet or a wireless network.
Preferably, the Web service module is mainly divided into a front end and a back end, the back end is responsible for receiving the intelligent recognition result, and the front end is responsible for displaying the result of the back end to the client after the statistical analysis after storage and pretreatment, so that the front end and the back end can be well separated.
A method for monitoring violation behaviors in real time based on AI vision comprises the following steps:
firstly, customizing a regional monitoring region algorithm, monitoring people entering a specified region, and not monitoring people outside the monitoring region;
step two, a human-shaped frame extraction algorithm is mainly used for extracting the position contour of a person in a monitored area and preparing for further identifying the behavior of the person;
step three, a human behavior recognition algorithm is used for further recognizing the extracted human shape frame and recognizing the non-standard behaviors of the human, such as the production activities of not wearing specified helmets, tools, gloves and shoes;
step four, a pedestrian tracking algorithm tracks the identified personnel, avoids the situation that the deviation of the identification result of the same personnel is large due to shielding, can stabilize the identification result, numbers the personnel at near and far positions, and effectively determines the identity of the illegal personnel at multiple angles;
and step five, the comprehensive judgment and uploading algorithm of the recognition result can automatically send out different warnings according to the recognition result.
The invention has the beneficial effects that:
1. the invention is based on AI vision technology, real-time, intelligent identification and track the system and method of the non-standard behavior; the cost of manual monitoring is reduced, and meanwhile, the requirement of factory safety production can be met;
2. the invention can effectively reduce manpower, improve production safety, realize monitoring and alarming in real time all weather, and is an ideal illegal behavior detection method;
3. compared with the traditional server, the maintenance cost can be reduced; thus being beneficial to the flexibility and the diversity of the display modes;
4. the terminal image acquisition equipment acquires image information and uploads the video stream to the edge server through an intelligent gateway or wifi.
5. The edge server decodes and preprocesses the video stream, carries out reasoning through a deployed algorithm, and uploads a reasoning result to a cloud service or a local display terminal through a network.
6. And the cloud server stores and statistically analyzes the results and uploads the processed results to a display end through the deployed web service.
7. The user can flexibly select the display end, access the monitoring result through the web service or the local service and give an alarm for the violation.
Drawings
The invention will be further described with reference to the accompanying drawings.
FIG. 1 is a schematic flow diagram of a monitoring system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: an AI vision-based violation real-time monitoring system comprises a data acquisition terminal, an edge computing unit, a cloud service and a display terminal, wherein the data acquisition terminal acquires images of a monitoring area through a camera module for AI identification; the remote user can use a standard web browser on the PC to access the web camera according to the IP address of the web camera so as to monitor the condition of the target site in real time; the intelligent video streaming system has the main advantages that wireless video streaming transmission can be realized, the image acquisition equipment and the computing unit are separated, and the intelligent computing unit is prevented from being directly exposed in a dangerous environment; the edge computing unit decodes and preprocesses the image, deploys an AI algorithm and performs reasoning through an edge machine; monitoring of a production environment is realized through an AI deep learning algorithm; the cloud service module mainly comprises a W cloud server of a large company such as Aliyun, Huashi cloud and Baidu cloud; compared with the traditional local server, the cloud server is convenient for data storage and service deployment such as web and the like, and has super-strong storage capacity and computing capacity. Meanwhile, compared with the traditional server, the maintenance cost can be reduced; thus being beneficial to the flexibility and the diversity of the display modes; the display terminal can flexibly display the detection result through the cloud service framework, the result can be displayed on the display terminals such as a liquid crystal display, a notebook computer and a mobile phone, and a user can conveniently check the result at any time.
The camera module adopts a network camera which is a new generation product combining a traditional camera and a network video technology, and has all image capturing functions of a common traditional camera, and a digital compression controller and a WEB-based operating system are also arranged in the camera module, so that video data are compressed and encrypted and then are transmitted to a terminal user through a local area network, an internet or a wireless network.
The Web service module is mainly divided into a front end and a rear end, the rear end is responsible for receiving the intelligent recognition result, the intelligent recognition result is stored and preprocessed, statistical analysis is carried out, the front end is responsible for displaying the result of the rear end to a client, and front-end and rear-end separation can be well achieved.
A method for monitoring violation behaviors in real time based on AI vision is characterized by comprising the following steps:
firstly, customizing a regional monitoring region algorithm, monitoring people entering a specified region, and not monitoring people outside the monitoring region;
step two, a human-shaped frame extraction algorithm is mainly used for extracting the position contour of a person in a monitored area and preparing for further identifying the behavior of the person;
step three, a human behavior recognition algorithm is used for further recognizing the extracted human shape frame and recognizing the non-standard behaviors of the human, such as the production activities of not wearing specified helmets, tools, gloves and shoes;
step four, a pedestrian tracking algorithm tracks the identified personnel, avoids the situation that the deviation of the identification result of the same personnel is large due to shielding, can stabilize the identification result, numbers the personnel at near and far positions, and effectively determines the identity of the illegal personnel at multiple angles;
and step five, the comprehensive judgment and uploading algorithm of the recognition result can automatically send out different warnings according to the recognition result.
When the intelligent edge server is used, firstly, terminal image acquisition equipment acquires image information, and a video stream is uploaded to the edge server through an intelligent gateway or wifi; then decoding and preprocessing the video stream through an edge server, reasoning through a deployed algorithm, and uploading a reasoning result to a cloud service or a local display end through a network; in addition, the cloud server stores and statistically analyzes the results, and uploads the processed results to a display end through the deployed web service; the user can flexibly select the display end, access the monitoring result through the web service or the local service and give an alarm for the violation.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

Claims (4)

1. An AI vision-based violation real-time monitoring system comprises a data acquisition terminal, an edge computing unit, a cloud service and a display terminal, and is characterized in that the data acquisition terminal acquires images of a monitoring area through a camera module for AI identification; accessing the network camera according to the IP address of the network camera, and monitoring the condition of a target site in real time; the edge computing unit decodes and preprocesses the image, deploys an AI algorithm and performs reasoning through an edge machine; the cloud service module mainly comprises a W cloud server of a large company such as Aliyun, Huashi cloud and Baidu cloud; the display terminal can flexibly display the detection result through the cloud service architecture.
2. The AI vision-based violation real-time monitoring system of claim 1, wherein said camera module employs a web camera.
3. The AI vision-based violation real-time monitoring system of claim 1, wherein said Web services module is essentially divided into a front-end and a back-end, the back-end is responsible for receiving the intelligent recognition results and for storing, preprocessing, and performing statistical analysis, and the front-end is responsible for displaying the back-end results to the client.
4. A method for monitoring violation behaviors in real time based on AI vision is characterized by comprising the following steps:
firstly, customizing a regional monitoring region algorithm, monitoring people entering a specified region, and not monitoring people outside the monitoring region;
step two, a human-shaped frame extraction algorithm is mainly used for extracting the position contour of a person in a monitored area and preparing for further identifying the behavior of the person;
step three, a human behavior recognition algorithm is used for further recognizing the extracted human shape frame and recognizing the non-standard behavior of the human;
step four, a pedestrian tracking algorithm is used for tracking the identified personnel, so that the situation that the identification result of the same personnel has large deviation due to shielding is avoided, the identification result can be stabilized, and meanwhile, the personnel at the near position and the personnel at the far position are numbered;
and step five, the comprehensive judgment and uploading algorithm of the recognition result can automatically send out different warnings according to the recognition result.
CN202011048456.7A 2020-09-29 2020-09-29 AI vision-based violation real-time monitoring system and method Pending CN112188164A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011048456.7A CN112188164A (en) 2020-09-29 2020-09-29 AI vision-based violation real-time monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011048456.7A CN112188164A (en) 2020-09-29 2020-09-29 AI vision-based violation real-time monitoring system and method

Publications (1)

Publication Number Publication Date
CN112188164A true CN112188164A (en) 2021-01-05

Family

ID=73945904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011048456.7A Pending CN112188164A (en) 2020-09-29 2020-09-29 AI vision-based violation real-time monitoring system and method

Country Status (1)

Country Link
CN (1) CN112188164A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112911218A (en) * 2021-01-15 2021-06-04 广州穗能通能源科技有限责任公司 Monitoring terminal
CN113409661A (en) * 2021-06-18 2021-09-17 北京东方国信科技股份有限公司 Application scene display system based on 5G communication technology
WO2022160414A1 (en) * 2021-01-29 2022-08-04 南方电网调峰调频发电有限公司 System for monitoring power plant
CN114979246A (en) * 2022-05-18 2022-08-30 京东方科技集团股份有限公司 Service management method, system, configuration server and edge computing device
CN115086327A (en) * 2022-08-04 2022-09-20 北京密码云芯科技有限公司 Edge calculation method, device, equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107545224A (en) * 2016-06-29 2018-01-05 珠海优特电力科技股份有限公司 The method and device of transformer station personnel Activity recognition
CN108319926A (en) * 2018-02-12 2018-07-24 安徽金禾软件股份有限公司 A kind of the safety cap wearing detecting system and detection method of building-site
CN109145789A (en) * 2018-08-09 2019-01-04 炜呈智能电力科技(杭州)有限公司 Power supply system safety work support method and system
CN109361902A (en) * 2018-11-19 2019-02-19 河海大学 A kind of intelligent safety helmet wearing monitoring system based on edge calculations
CN110689054A (en) * 2019-09-10 2020-01-14 华中科技大学 Worker violation monitoring method
CN110705482A (en) * 2019-10-08 2020-01-17 中兴飞流信息科技有限公司 Personnel behavior alarm prompt system based on video AI intelligent analysis
CN110889334A (en) * 2019-11-06 2020-03-17 江河瑞通(北京)技术有限公司 Personnel intrusion identification method and device
CN110996058A (en) * 2019-12-03 2020-04-10 中国电子科技集团公司第五十四研究所 Intelligent monitoring system based on edge calculation
CN111263126A (en) * 2020-03-31 2020-06-09 陈小河 Video intelligent identification and information push precaution management system
CN211293956U (en) * 2019-11-14 2020-08-18 北京国电通网络技术有限公司 AI-based identification and alarm system for abnormal agent on construction site
CN211506523U (en) * 2019-12-31 2020-09-15 江苏学蠡信息科技有限公司 Target detection development platform based on deep learning
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof
CN111710122A (en) * 2020-04-30 2020-09-25 国网天津市电力公司 Safe power utilization management system based on ubiquitous power Internet of things

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107545224A (en) * 2016-06-29 2018-01-05 珠海优特电力科技股份有限公司 The method and device of transformer station personnel Activity recognition
CN108319926A (en) * 2018-02-12 2018-07-24 安徽金禾软件股份有限公司 A kind of the safety cap wearing detecting system and detection method of building-site
CN109145789A (en) * 2018-08-09 2019-01-04 炜呈智能电力科技(杭州)有限公司 Power supply system safety work support method and system
CN109361902A (en) * 2018-11-19 2019-02-19 河海大学 A kind of intelligent safety helmet wearing monitoring system based on edge calculations
CN110689054A (en) * 2019-09-10 2020-01-14 华中科技大学 Worker violation monitoring method
CN110705482A (en) * 2019-10-08 2020-01-17 中兴飞流信息科技有限公司 Personnel behavior alarm prompt system based on video AI intelligent analysis
CN110889334A (en) * 2019-11-06 2020-03-17 江河瑞通(北京)技术有限公司 Personnel intrusion identification method and device
CN211293956U (en) * 2019-11-14 2020-08-18 北京国电通网络技术有限公司 AI-based identification and alarm system for abnormal agent on construction site
CN110996058A (en) * 2019-12-03 2020-04-10 中国电子科技集团公司第五十四研究所 Intelligent monitoring system based on edge calculation
CN211506523U (en) * 2019-12-31 2020-09-15 江苏学蠡信息科技有限公司 Target detection development platform based on deep learning
CN111263126A (en) * 2020-03-31 2020-06-09 陈小河 Video intelligent identification and information push precaution management system
CN111710122A (en) * 2020-04-30 2020-09-25 国网天津市电力公司 Safe power utilization management system based on ubiquitous power Internet of things
CN111698470A (en) * 2020-06-03 2020-09-22 河南省民盛安防服务有限公司 Security video monitoring system based on cloud edge cooperative computing and implementation method thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112911218A (en) * 2021-01-15 2021-06-04 广州穗能通能源科技有限责任公司 Monitoring terminal
WO2022160414A1 (en) * 2021-01-29 2022-08-04 南方电网调峰调频发电有限公司 System for monitoring power plant
CN113409661A (en) * 2021-06-18 2021-09-17 北京东方国信科技股份有限公司 Application scene display system based on 5G communication technology
CN114979246A (en) * 2022-05-18 2022-08-30 京东方科技集团股份有限公司 Service management method, system, configuration server and edge computing device
CN115086327A (en) * 2022-08-04 2022-09-20 北京密码云芯科技有限公司 Edge calculation method, device, equipment and storage medium
CN115086327B (en) * 2022-08-04 2023-03-10 北京密码云芯科技有限公司 Edge calculation method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112188164A (en) AI vision-based violation real-time monitoring system and method
US10812761B2 (en) Complex hardware-based system for video surveillance tracking
CN103366565B (en) Method and system of detecting pedestrian running red light based on Kinect
CN111462451B (en) Straw burning detection alarm system based on video information
CN112396658B (en) Indoor personnel positioning method and system based on video
CN112084963B (en) Monitoring early warning method, system and storage medium
CN110769200A (en) AI-based video monitoring system
KR102149832B1 (en) Automated Violence Detecting System based on Deep Learning
CN101959060B (en) Video passenger flow monitoring system and method
CN108200405A (en) A kind of video monitoring system based on recognition of face
CN111401310B (en) Kitchen sanitation safety supervision and management method based on artificial intelligence
CN111047824B (en) Indoor child nursing linkage control early warning method and system
CN103152558B (en) Based on the intrusion detection method of scene Recognition
CN110806714A (en) 5G-based mixed reality motor monitoring system and monitoring method
CN211184122U (en) Intelligent video analysis system for linkage of railway operation safety prevention and control and large passenger flow early warning
CN116416281A (en) Grain depot AI video supervision and analysis method and system
CN105095891A (en) Human face capturing method, device and system
CN114067396A (en) Vision learning-based digital management system and method for live-in project field test
CN201876973U (en) Image smoke detection system for rail transit station fire alarm
CN211207134U (en) Mixed reality motor monitoring system based on 5G
CN109327681A (en) A kind of specific people identifies warning system and its method
CN111277789A (en) Video-based community security method and device, electronic equipment and storage medium
CN112804492B (en) Communication prompting method and device for electronic peepholes
CN115240277A (en) Security check behavior monitoring method and device, electronic equipment and storage medium
CN210667061U (en) Campus infrastructure potential safety hazard detection system based on DSP

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105