CN112750244B - Method and system for identifying entrance guard sleeve card based on Hadoop technology - Google Patents

Method and system for identifying entrance guard sleeve card based on Hadoop technology Download PDF

Info

Publication number
CN112750244B
CN112750244B CN202011627279.8A CN202011627279A CN112750244B CN 112750244 B CN112750244 B CN 112750244B CN 202011627279 A CN202011627279 A CN 202011627279A CN 112750244 B CN112750244 B CN 112750244B
Authority
CN
China
Prior art keywords
card
visitor
entrance guard
move
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011627279.8A
Other languages
Chinese (zh)
Other versions
CN112750244A (en
Inventor
黄林彬
汪劲松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Cirrus Sci Tech Dev Co ltd
Original Assignee
Guangdong Cirrus Sci Tech Dev Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Cirrus Sci Tech Dev Co ltd filed Critical Guangdong Cirrus Sci Tech Dev Co ltd
Priority to CN202011627279.8A priority Critical patent/CN112750244B/en
Publication of CN112750244A publication Critical patent/CN112750244A/en
Application granted granted Critical
Publication of CN112750244B publication Critical patent/CN112750244B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0013Methods or arrangements for sensing record carriers, e.g. for reading patterns by galvanic contacts, e.g. card connectors for ISO-7816 compliant smart cards or memory cards, e.g. SD card readers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention discloses a method and a system for recognizing entrance guard card nesting based on Hadoop technology, wherein the method comprises the steps of preprocessing and summarizing information of past visitors acquired by each entrance guard system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed file system) and performing distributed storage; information data of past visitors are segmented and processed through a MapReduce method and transmitted to each HDFS distributed computing node; each computing node performs big data analysis on the received information data to judge whether the access control card corresponding to the information of each visitor is a copy card; the access control card determined as the copy card only reserves the access control authority used at the highest frequency or freezes the access control card, so that copying and tampering can be effectively reduced, the recognition rate of the copy card is high, the reliability of the IC card is improved, and potential safety hazards are reduced; the invention is applied to the technical field of access control systems.

Description

Method and system for identifying entrance guard sleeve card based on Hadoop technology
Technical Field
The invention belongs to the technical field of big data and entrance guard Internet of things, and particularly relates to a method and a system for identifying entrance guard sleeve cards based on Hadoop technology.
Background
The access control cards are generally IC cards and M1 cards, the replicability of the ID cards and the algorithm of the M1 card are cracked, the access control cards can be copied and tampered at low cost, and equipment for copying the cards is easily obtained, so that the copying cost is extremely low and the safety is low; therefore, the entrance guard card trapping phenomenon is generated, namely, one entrance guard card is written into the authorities or passwords of a plurality of entrance guard systems at the same time, and unauthorized persons can use the copied card to randomly use in various elevators, entrance guards and gates which are copied and tampered by the copied IC, so that the entrance guard card trapping phenomenon has serious potential safety hazards.
Disclosure of Invention
The invention aims to provide a method and a system for identifying an entrance guard sleeve card based on a Hadoop technology, which are used for solving one or more technical problems in the prior art and at least provide a beneficial selection or creation condition.
In order to achieve the above object, according to an aspect of the present invention, there is provided a method for identifying an entrance guard sleeve card based on a Hadoop technique, the method comprising the steps of:
step 1, preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed File System) and performing distributed storage;
step 2, information data of the past visitors are segmented and processed through a MapReduce method and are transmitted to each HDFS distributed computing node;
step 3, each computing node performs big data analysis on the received information data to judge whether the access control card corresponding to the information of each visitor is a copy card;
and 4, only reserving the access control authority with the most use times or freezing the access control card determined as the copy card.
Further, in step 1, the HDFS distributed file system is a distributed file system on general-purpose hardware, and includes a plurality of computing nodes, and the purpose of streaming reading file system data is achieved through POSIX constraint, and each file is stored as a series of data blocks, except for the last one, all the data blocks are the same size; for fault tolerance, all data blocks of a file have copies, the data block size and copy coefficient of each file are configurable, an application program can specify the copy number of a certain file, the copy coefficient can be specified when the file is created or changed later, the file in the HDFS is all writable once, and only one writer is strictly required at any time.
Further, in step 3, the method for analyzing big data of the data stream to determine whether the access card corresponding to the information of each visitor is a copy card includes the following steps:
s301, analyzing the track of the visitor according to the visiting time, the visiting entrance guard number and the entrance guard card number data in the visitor information and according to the fact that the visitor passes through each entrance guard, and positioning the moving area of the visitor;
s302, when the same visitor passes through the entrance guard with the distance greater than the distance threshold value within 10 minutes, judging the adjacent entrance guard of the two entrance guard by the statistical analysis of the track of the visitor through the position information of each entrance guard, and then continuously judging the adjacent entrance guard of the adjacent entrance guard to form the moving path of the visitor so as to position the moving area of the suspicious visitor; the distance threshold value is [100,800] m;
s303, calculating the average value of the distances between every two door controls and the two door controls with the largest distance in the activity area every 24 hours in the latest 240 hours in the activity area of each visitor according to the information of the visitors collected in the latest 240 hours, wherein the average value of the distances between every two door controls in the activity area every 24 hours in the latest 240 hours is MoveMeanThe distance between the two gate inhibition with the largest distance is MoveMax
S304, judging the average value Move and Move of the distance between every two gate inhibition passed by each visitor on the same day in real timeMean、MoveMaxWhen Move occursMean≤Move≤MoveMaxIf the visitor is in the abnormal card, marking the access control card of the visitor as the abnormal card;
s305, continuously monitoring the abnormal card, and generating Move through the average value Move of the distances between every two gate controls on the day>MoveMaxAnd if the card is the copy card, judging and marking the abnormal card as the copy card.
Further, in step 3, the access control device at least comprises: an IC card reader.
The invention also provides an entrance guard sleeve card identification system based on the Hadoop technology, which comprises the following steps: a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor executing the computer program to run in the units of the following system:
the information preprocessing unit is used for preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed file system) and performing distributed storage;
the information division processing unit is used for dividing and processing information data of the past visitor by a MapReduce method and transmitting the information data to each HDFS distributed computing node;
the system comprises a copying card identification unit, a data analysis unit and a data analysis unit, wherein the copying card identification unit is used for analyzing big data of received information data by each computing node and judging whether an access control card corresponding to the information of each visitor is a copying card or not;
and the copy card processing unit is used for only reserving the access control authority with the maximum use times or freezing the access control card determined as the copy card.
The beneficial effects of the invention are as follows: the invention provides a method and a system for identifying entrance guard sleeve cards based on a Hadoop technology, which can effectively reduce copying and tampering, have high identification rate of copied cards, improve the reliability of IC cards and reduce potential safety hazards.
Drawings
The above and other features of the invention will be more apparent from the detailed description of the embodiments shown in the accompanying drawings in which like reference characters designate the same or similar elements, and it will be apparent that the drawings in the following description are merely exemplary of the invention and that other drawings may be derived by those skilled in the art without inventive effort, wherein:
FIG. 1 is a flow chart of a method for identifying an entrance guard sleeve card based on Hadoop technology;
fig. 2 is a structural diagram of an entrance guard card system based on Hadoop technology identification.
Detailed Description
The conception, the specific structure and the technical effects produced by the present invention will be clearly and completely described in conjunction with the embodiments and the attached drawings, so as to fully understand the objects, the schemes and the effects of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a flowchart illustrating a method for identifying a card trap of an access control based on a Hadoop technology according to the present invention, and fig. 1 is combined to explain the method for identifying the card trap of the access control based on the Hadoop technology according to an embodiment of the present invention.
The invention provides a method for identifying entrance guard sleeve cards based on a Hadoop technology, which specifically comprises the following steps:
step 1, preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed File System) and performing distributed storage;
step 2, information data of the past visitors are segmented and processed through a MapReduce method and are transmitted to each HDFS distributed computing node;
step 3, each computing node performs big data analysis on the received information data to judge whether the access control card corresponding to the information of each visitor is a copy card;
and 4, only reserving the access control authority with the most use times or freezing the access control card determined as the copy card.
Further, in step 1, the HDFS distributed file system is a distributed file system on general-purpose hardware, and includes a plurality of computing nodes, and the purpose of streaming reading file system data is achieved through POSIX constraint, and each file is stored as a series of data blocks, except for the last one, all the data blocks are the same size; for fault tolerance, all data blocks of a file have copies, the data block size and copy coefficient of each file are configurable, an application program can specify the copy number of a certain file, the copy coefficient can be specified when the file is created or changed later, the file in the HDFS is all writable once, and only one writer is strictly required at any time.
Further, in step 3, the method for analyzing the big data of the data stream to determine whether the access card corresponding to the information of each visitor is a copy card comprises the following steps:
s301, analyzing the track of the visitor according to the visiting time, the visiting entrance guard number and the entrance guard card number data in the visitor information and according to the fact that the visitor passes through each entrance guard, and positioning the moving area of the visitor;
s302, when the same visitor passes through the entrance guard with the distance greater than the distance threshold value within 10 minutes, judging the adjacent entrance guard of the two entrance guard by the statistical analysis of the track of the visitor through the position information of each entrance guard, and then continuously judging the adjacent entrance guard of the adjacent entrance guard to form the moving path of the visitor so as to position the moving area of the suspicious visitor; the distance threshold value is [100,800] m;
s303, calculating the average value of the distances between all the two door guards in the activity area every 24 hours and the two door guards with the largest distance in the activity area every 24 hours in the last 240 hours according to the information of the visitors collected in the last 240 hours, wherein the average value of the distances between all the two door guards in the activity area every 24 hours in the last 240 hours is MoveMeanThe distance between the two gate inhibition with the largest distance is MoveMax
S304, judging the average value Move and Move of the distance between every two gate inhibition passed by each visitor on the same day in real timeMean、MoveMaxWhen Move occursMean≤Move≤MoveMaxIf the visitor is in the abnormal card, marking the access control card of the visitor as the abnormal card;
s305, continuously monitoring the abnormal card, and generating Move through the average value Move of the distances between every two gate controls on the day>MoveMaxAnd if so, judging and marking the abnormal card as a copy card.
Further, in step 3, the access control device at least comprises: an IC card reader.
An embodiment of the present invention provides an entrance guard sleeve card system based on Hadoop technology recognition, as shown in fig. 2, which is a structure diagram of the entrance guard sleeve card system based on Hadoop technology recognition, and the entrance guard sleeve card system based on Hadoop technology recognition of the embodiment includes: the system comprises a processor, a memory and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the steps in the embodiment of the system for identifying the entrance guard sleeve card based on the Hadoop technology.
The system comprises: a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor executing the computer program to run in the units of the following system:
the information preprocessing unit is used for preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed File System) and performing distributed storage;
the information segmentation processing unit is used for segmenting and processing information data of the past visitor by a MapReduce method and transmitting the information data to each HDFS distributed computing node;
the system comprises a copying card identification unit, a data analysis unit and a data analysis unit, wherein the copying card identification unit is used for analyzing big data of received information data by each computing node and judging whether an access control card corresponding to the information of each visitor is a copying card or not;
and the copy card processing unit is used for only reserving the access control authority with the maximum use times or freezing the access control card determined as the copy card.
The entrance guard card sleeving identification system based on the Hadoop technology can operate in computing equipment such as desktop computers, notebooks, palmtop computers and cloud servers. The system for identifying the entrance guard sleeve card based on the Hadoop technology can be operated by comprising a processor and a memory. It will be understood by those skilled in the art that the example is merely an example of a system for identifying a card cover based on Hadoop technology, and does not constitute a limitation of a system for identifying a card cover based on Hadoop technology, and may include more or less components than the system, or some components in combination, or different components, for example, the system for identifying a card cover based on Hadoop technology may further include input and output devices, network access devices, buses, and the like.
The Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. The general processor can be a microprocessor or the processor can also be any conventional processor and the like, the processor is the control center for identifying the running system of the entrance guard sleeve card system based on the Hadoop technology, and various interfaces and lines are utilized to connect all parts of the whole running system for identifying the running system of the entrance guard sleeve card system based on the Hadoop technology.
The memory can be used for storing the computer programs and/or modules, and the processor realizes various functions of the identification access control card sleeving system based on the Hadoop technology by running or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
While the present invention has been described in considerable detail and with particular reference to several of these embodiments, it is not intended to be limited to any such details or embodiments or any particular embodiment, but rather it is to be construed as effectively covering the intended scope of the invention by providing a broad, potential interpretation of such claims in view of the prior art with reference to the appended claims. Furthermore, the foregoing describes the invention in terms of embodiments foreseen by the inventor for which an enabling description was available, notwithstanding that insubstantial modifications of the invention, not presently foreseen, may nonetheless represent equivalents thereto.

Claims (4)

1. A method for identifying entrance guard sleeve cards based on a Hadoop technology is characterized by comprising the following steps:
step 1, preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed File System) and performing distributed storage;
step 2, information data of past visitors are segmented and processed through a MapReduce method and are transmitted to each HDFS distributed computing node;
step 3, each computing node performs big data analysis on the received information data to judge whether the access control card corresponding to the information of each visitor is a copy card;
step 4, only reserving the access control authority with the largest number of use times or freezing the access control card for the access control card determined as the copy card;
in step 3, the method for analyzing the big data of the data stream to judge whether the access control card corresponding to the information of each visitor is a copy card comprises the following steps:
s301, analyzing the track of the visitor according to the visiting time, the visiting entrance guard number and the entrance guard card number data in the visitor information and according to the fact that the visitor passes through each entrance guard, and positioning the moving area of the visitor;
s302, when the same visitor passes through the entrance guard with the distance greater than the distance threshold value within 10 minutes, judging the adjacent entrance guard of the two entrance guard by the statistical analysis of the track of the visitor through the position information of each entrance guard, and then continuously judging the adjacent entrance guard of the adjacent entrance guard to form the moving path of the visitor so as to position the moving area of the suspicious visitor; the distance threshold value is [100,800] m;
s303, calculating the average value of the distances between every two door controls and the two door controls with the largest distance in the activity area every 24 hours in the latest 240 hours in the activity area of each visitor according to the information of the visitors collected in the latest 240 hours, wherein the average value of the distances between every two door controls in the activity area every 24 hours in the latest 240 hours is MoveMeanThe distance between the two gate inhibition with the largest distance is MoveMax
S304, judging the average value Move and Move of the distance between every two gate inhibition of each visitor passing through on the same day in real timeMean、MoveMaxWhen Move occursMean≤Move≤MoveMaxIf the visitor is in the abnormal card, marking the access control card of the visitor as the abnormal card;
s305, continuously monitoring the abnormal cards, and passing all the abnormal cards on the same dayMove appears in the average value Move of the distance between every two gate inhibition devices>MoveMaxAnd if the card is the copy card, judging and marking the abnormal card as the copy card.
2. The method for identifying the entrance guard card nesting based on the Hadoop technology is characterized in that in the step 1, an HDFS distributed file system is a distributed file system on general hardware and comprises a plurality of computing nodes, the purpose of reading the data of the file system in a streaming way is realized through POSIX constraint, each file is stored into a series of data blocks, and all the data blocks except the last one are the same in size; for fault tolerance, all data blocks of a file have copies, the data block size and copy coefficient of each file are configurable, an application program can specify the copy number of a certain file, the copy coefficient can be specified when the file is created or changed later, the file in the HDFS is all writable once, and only one writer is strictly required at any time.
3. The method for identifying the entrance guard card cover based on the Hadoop technology as claimed in claim 1, wherein in step 3, the entrance guard at least comprises: an IC card reader.
4. The utility model provides an entrance guard sleeve card system based on Hadoop technique discernment which characterized in that, the system includes: a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor executing the computer program to run in the units of the system:
the information preprocessing unit is used for preprocessing and summarizing the information of the past visitors acquired by each access control system, managing data stored on each computing node by adopting an HDFS (Hadoop distributed file system) and performing distributed storage;
the information segmentation processing unit is used for segmenting and processing information data of the past visitor by a MapReduce method and transmitting the information data to each HDFS distributed computing node;
the system comprises a copy card identification unit, a data acquisition unit, a data analysis unit and a data analysis unit, wherein the copy card identification unit is used for analyzing big data of received information data by each computing node and judging whether an access control card corresponding to the information of each visitor is a copy card or not;
the system comprises a copy card processing unit, a copy card processing unit and a copy card processing unit, wherein the copy card processing unit is used for only reserving the access right with the most use times or freezing the access card which is determined as the copy card;
the method for analyzing the big data of the data stream to judge whether the access control card corresponding to the information of each visitor is a copy card comprises the following steps:
s301, analyzing the track of the visitor according to the visiting time, the visiting entrance guard number and the entrance guard card number data in the visitor information and according to the fact that the visitor passes through each entrance guard, and positioning the moving area of the visitor;
s302, when the same visitor passes through the entrance guard with the distance greater than the distance threshold value within 10 minutes, judging the adjacent entrance guard of the two entrance guard by the statistical analysis of the track of the visitor through the position information of each entrance guard, and then continuously judging the adjacent entrance guard of the adjacent entrance guard to form the moving path of the visitor so as to position the moving area of the suspicious visitor; the distance threshold value is [100,800] m;
s303, calculating the average value of the distances between every two door controls and the two door controls with the largest distance in the activity area every 24 hours in the latest 240 hours in the activity area of each visitor according to the information of the visitors collected in the latest 240 hours, wherein the average value of the distances between every two door controls in the activity area every 24 hours in the latest 240 hours is MoveMeanThe distance between the two gate inhibition with the largest distance is MoveMax
S304, judging the average value Move and Move of the distance between every two gate inhibition of each visitor passing through on the same day in real timeMean、MoveMaxWhen Move occursMean≤Move≤MoveMaxIf the visitor is in the abnormal card, marking the access control card of the visitor as the abnormal card;
s305, continuously monitoring the abnormal card, and generating Move through the average value Move of the distances between every two access controls on the same day>MoveMaxAnd if the card is the copy card, judging and marking the abnormal card as the copy card.
CN202011627279.8A 2020-12-30 2020-12-30 Method and system for identifying entrance guard sleeve card based on Hadoop technology Active CN112750244B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011627279.8A CN112750244B (en) 2020-12-30 2020-12-30 Method and system for identifying entrance guard sleeve card based on Hadoop technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011627279.8A CN112750244B (en) 2020-12-30 2020-12-30 Method and system for identifying entrance guard sleeve card based on Hadoop technology

Publications (2)

Publication Number Publication Date
CN112750244A CN112750244A (en) 2021-05-04
CN112750244B true CN112750244B (en) 2022-07-22

Family

ID=75650596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011627279.8A Active CN112750244B (en) 2020-12-30 2020-12-30 Method and system for identifying entrance guard sleeve card based on Hadoop technology

Country Status (1)

Country Link
CN (1) CN112750244B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114613048B (en) * 2022-01-30 2024-05-31 云知声智能科技股份有限公司 Closed cell visitor card issuing processing system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3181142A (en) * 1959-07-31 1965-04-27 Int Standard Electric Corp Air radio navigation control systems
US3601928A (en) * 1969-10-01 1971-08-31 Ibm Accurately positionable high speed machine tool
CN208207950U (en) * 2018-06-06 2018-12-07 贵州朗盛科技股份有限公司 A kind of access control system
CN109711370A (en) * 2018-12-29 2019-05-03 北京博睿视科技有限责任公司 A kind of data anastomosing algorithm based on WIFI detection and face cluster
CN111145406A (en) * 2020-01-03 2020-05-12 贺楚龙 Control method for building talkback stranger access terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3181142A (en) * 1959-07-31 1965-04-27 Int Standard Electric Corp Air radio navigation control systems
US3601928A (en) * 1969-10-01 1971-08-31 Ibm Accurately positionable high speed machine tool
CN208207950U (en) * 2018-06-06 2018-12-07 贵州朗盛科技股份有限公司 A kind of access control system
CN109711370A (en) * 2018-12-29 2019-05-03 北京博睿视科技有限责任公司 A kind of data anastomosing algorithm based on WIFI detection and face cluster
CN111145406A (en) * 2020-01-03 2020-05-12 贺楚龙 Control method for building talkback stranger access terminal

Also Published As

Publication number Publication date
CN112750244A (en) 2021-05-04

Similar Documents

Publication Publication Date Title
US11188789B2 (en) Detecting poisoning attacks on neural networks by activation clustering
US10217226B2 (en) Video analysis methods and apparatus
Li et al. Deep unsupervised anomaly detection
CN111652290B (en) Method and device for detecting countermeasure sample
Fadl et al. Exposing video inter-frame forgery via histogram of oriented gradients and motion energy image
CN114359564A (en) Image recognition method, image recognition device, computer equipment, storage medium and product
CN112750244B (en) Method and system for identifying entrance guard sleeve card based on Hadoop technology
EP2383990A1 (en) Time segment representative feature vector generation device
KR101384317B1 (en) Apparatus and method for blocking the objectionable multimedia based on multimodal and multiscale features
CN107329947B (en) The determination method, device and equipment of Similar Text
CN113627179B (en) Threat information early warning text analysis method and system based on big data
CN112633281B (en) Vehicle identity authentication method and system based on Hash algorithm
CN111738042A (en) Identification method, device and storage medium
CN117115718B (en) Government affair video data processing method, system and computer readable storage medium
CN111538614B (en) Time sequence abnormal operation behavior detection method of operating system
Schwee et al. Evaluating practical privacy attacks for building data anonymized by standard methods
Akhtar et al. Revealing the traces of histogram equalisation in digital images
CN114743157B (en) Pedestrian monitoring method, device, equipment and medium based on video
US20210012472A1 (en) Adaptive video subsampling for energy efficient object detection
CN110990810B (en) User operation data processing method, device, equipment and storage medium
CN110647858B (en) Video occlusion judgment method and device and computer storage medium
CN113111350A (en) Malicious PDF file detection method and device and electronic equipment
Modaghegh et al. A new fast and efficient active steganalysis based on combined geometrical blind source separation
CN110674497B (en) Malicious program similarity calculation method and device
US20220012535A1 (en) Augmenting Training Data Sets for ML Classifiers Using Classification Metadata

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant