CN113724478A - Intelligent security inspection system based on edge calculation - Google Patents

Intelligent security inspection system based on edge calculation Download PDF

Info

Publication number
CN113724478A
CN113724478A CN202111014937.0A CN202111014937A CN113724478A CN 113724478 A CN113724478 A CN 113724478A CN 202111014937 A CN202111014937 A CN 202111014937A CN 113724478 A CN113724478 A CN 113724478A
Authority
CN
China
Prior art keywords
contraband
security inspection
edge computing
intelligent
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111014937.0A
Other languages
Chinese (zh)
Inventor
王翠翠
汤斐
李继承
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhongtongji Network Technology Co Ltd
Original Assignee
Shanghai Zhongtongji Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhongtongji Network Technology Co Ltd filed Critical Shanghai Zhongtongji Network Technology Co Ltd
Priority to CN202111014937.0A priority Critical patent/CN113724478A/en
Publication of CN113724478A publication Critical patent/CN113724478A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/502Proximity

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Analysing Materials By The Use Of Radiation (AREA)

Abstract

The invention relates to an intelligent security inspection system based on edge calculation, which belongs to the technical field of contraband detection and comprises the following components: the system comprises acquisition equipment, edge computing equipment, a security check identification cloud platform and an intelligent monitoring service system, so that online management is performed after an X-ray picture is acquired, the security check efficiency of logistics is improved, and the labor cost is greatly reduced; meanwhile, the security check picture is stored, so that the remote operation of a professional is realized, and the cheapness of security check identification is improved; and the pictures of the contraband are stored, so that the sharing learning of the contraband pictures is realized.

Description

Intelligent security inspection system based on edge calculation
Technical Field
The invention belongs to the technical field of contraband detection, and particularly relates to an intelligent security inspection system based on edge calculation.
Background
In the field of logistics, there is a need to ensure that express packages are free of contraband. In the prior art, the forbidden articles are detected by locally arranging a traditional X-ray security check machine device.
After the X-ray picture is taken, a professional security check worker is often required to manually check the X-ray picture locally, which has a high requirement on the checking level of the security check worker, and for example, the security check worker is required to be familiar with X-ray imaging of objects made of different materials such as a control cutter, powder, liquid, an electronic product, a battery, a pressure tank and the like. Meanwhile, after the security inspector judges the material classification of the X-ray, the security inspector further judges the outline and the imaging effect of the article to finally confirm whether the article in the package belongs to contraband or not.
The whole process of shooting and identification needs to be carried out in a local environment, the accumulated experience of the current security inspector in X-ray imaging article judgment is completely relied on, and a team master needs to conduct oral-oral mutual teaching by relying on the experience before a new security inspector goes on duty, so that the time consumption is long, and the experience sharing is poor.
Disclosure of Invention
The invention provides an intelligent security inspection system based on edge calculation, which aims to solve the technical problems of poor experience sharing, high labor consumption and long time consumption for contraband identification in the prior art.
The technical scheme provided by the invention is as follows:
on one hand, the intelligent security inspection system based on edge computing comprises acquisition equipment, edge computing equipment, a security inspection identification cloud platform and an intelligent monitoring service system; the acquisition equipment is connected with the edge computing equipment, the security inspection identification cloud platform is connected with the edge detection equipment, and the intelligent monitoring service system is connected with the security inspection identification cloud platform;
the acquisition equipment is used for acquiring an original X-ray picture and respectively transmitting the original X-ray picture to the security check machine and the edge computing equipment;
the edge computing equipment is used for processing the received original X-ray picture through a deep learning algorithm model and outputting structured information data and video streams for local viewing or remote viewing;
the security inspection identification cloud platform is used for acquiring a video stream consisting of X-ray images through the edge computing equipment, inputting the X-ray images into a contraband identification model and identifying whether the X-ray images contain contraband or not;
and the intelligent monitoring service system is used for storing pictures and package information corresponding to the contraband after the contraband is identified, and triggering corresponding warning equipment to give an alarm.
Optionally, the security inspection identification cloud platform is further configured to obtain a contraband sample picture; carrying out segmentation contour labeling on the contraband picture, and determining an initial contraband identification model; and training the initial contraband recognition model according to a preset segmentation network to obtain the contraband recognition model.
Optionally, the initial contraband identification model is yolactt + + model.
Optionally, the case identification cloud platform is further configured to update the contraband identification model through a stored new contraband picture.
Optionally, the method further includes: the alarm device is connected with the edge computing device through a reserved IO driving port;
and the alarm equipment is used for giving an alarm prompt after the video stream contains contraband.
Optionally, the method further includes: an intercept arm coupled to the edge computing device;
the intercepting arm is used for intercepting the corresponding package after the contraband is detected.
The invention has the beneficial effects that:
the intelligent security inspection system based on edge calculation provided by the embodiment of the invention comprises: the system comprises acquisition equipment, edge computing equipment, a security check identification cloud platform and an intelligent monitoring service system, so that online management is performed after an X-ray picture is acquired, the security check efficiency of logistics is improved, and the labor cost is greatly reduced; meanwhile, the security check picture is stored, so that the remote operation of a professional is realized, and the cheapness of security check identification is improved; and the pictures of the contraband are stored, so that the sharing learning of the contraband pictures is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an intelligent security inspection system based on edge computing according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
In order to at least solve the technical problem provided by the present invention, an embodiment of the present invention provides an intelligent security inspection system based on edge calculation.
Fig. 1 is a schematic structural diagram of an intelligent security inspection system based on edge computing according to an embodiment of the present invention.
Referring to fig. 1, the intelligent security inspection system based on edge computing provided in the embodiment of the present invention may include an acquisition device 1, an edge computing device 2, a security inspection identification cloud platform 3, and an intelligent monitoring service system 4; the acquisition equipment 1 is connected with the edge computing equipment 2, the security inspection identification cloud platform 3 is connected with the edge detection equipment 2, and the intelligent monitoring service system is connected with the security inspection identification cloud platform.
The acquisition equipment is used for acquiring original X-ray pictures and respectively transmitting the original X-ray pictures to the security check machine and the edge computing equipment. And the edge computing equipment is used for processing the received original X-ray picture through the deep learning algorithm model and outputting the structured information data and the video stream for local viewing or remote viewing. And the security inspection identification cloud platform is used for acquiring a video stream consisting of X-ray images through the edge computing equipment, inputting the X-ray images into the contraband identification model and identifying whether the X-ray images contain contraband or not. And the intelligent monitoring service system is used for storing pictures and package information corresponding to the contraband after the contraband is identified, and triggering corresponding warning equipment to give an alarm.
For example, the acquisition device may be a nano desktop operation display system, the nano desktop operation display system adopts a pipeline flow technology of video streams, and the GStreamer-based plug-in development performs split-screen processing on the output of the display by using a traditional X-ray security inspection machine, wherein one path is displayed by an original security inspection machine, and the other path is accessed to an existing edge computing box, so that seamless video access to the traditional security inspection machine is realized.
The edge computing device belongs to computing devices, structured information data can be output after processing of a deep learning algorithm model, meanwhile, a video stream of rtsp _ out is output, and display of rtsp output can be accessed locally (real-time processing results can be viewed locally) or rtsp output can be accessed at a far end (real-time processing results can be viewed remotely, and remote operation is achieved).
Optionally, the security inspection identification cloud platform is further configured to obtain a contraband sample picture; carrying out segmentation contour labeling on the contraband picture, and determining an initial contraband identification model; and training an initial forbidden identification model according to a preset segmentation network to obtain the forbidden identification model.
Optionally, the initial violation identification model is yolactt + + model.
Optionally, the case identification cloud platform is further configured to update the contraband identification model through the stored new contraband picture.
For example, video data acquired by the acquisition device can be transmitted to a cloud platform to serve as a data warehouse, and in addition, manually identified data (pictures) can also serve as a labeled sample set and serve as data storage of an algorithm. The data storage with strong integration inclusion can be directly connected with the labeling platform to obtain labeled sample data, and the algorithm can directly use the sample data and output the result calculated by the algorithm. The output result is in butt joint with the intelligent monitoring service system, and related workers feed back the error result through the system to be used as a basis for optimizing and improving the algorithm, so that a closed loop system is formed. Thus, data transfer storage is a precondition for the entire hierarchy.
For example, various core algorithms can be integrated on a case identification cloud platform, so that the case identification cloud platform serves the whole intelligent security check system, and the case identification cloud platform can comprise data input, calculation and output; the case recognition cloud platform can be responsible for algorithms, the algorithms in the case recognition cloud platform can be added, deleted, changed and checked, the fact that the iteration can be updated at any time along with the diversity of the changing scenes can be guaranteed, efficiency is high, and cost is low. The method comprises the steps that a contraband identification model can be built, when the model is built, edge computing equipment can be adopted to collect X-ray images of a security inspection machine, samples of contraband are obtained, the X-ray images are labeled by using labelme to segment outlines, and an initial contraband identification model is determined; and training an initial forbidden identification model according to a preset segmentation network to obtain the forbidden identification model.
The method can adopt a segmentation network training forbidden identification model and a deep learning model yolact + + for model training, and because a large amount of samples of prohibited articles are difficult to collect, a small amount of models can be used for realizing rapid convergence by adopting the yolact + + model. The model adopts a one-stage method, leads the MaskRcnn of the two-stage on the reasoning speed, and simultaneously provides a new NMS algorithm called Fast-NMS, which has only slight precision loss compared with the traditional NMS algorithm but greatly improves the segmentation speed. The yloct + + introduces variable convolution in the backhaul, and uses free-form sampling to replace rigid grid sampling used in the traditional CNN, so that the precision of each detection segmentation model is completely refreshed.
In the application, a trained yolac + + model can be converted into onx and then subjected to Tensorrt acceleration, the separation pretreatment, the Tensorrt part and the post-treatment part are carried out, then the plugin of Gstreamer is developed and integrated into the whole pipeline, the real-time identification of contraband is carried out, the video stream of rtsp is output at the same time, the real-time playing of a web browser end is supported, and the remote sharing of a working screen of security supervision is realized. And based on the realized algorithm, completing the work of software interface and the like, constructing a dangerous goods image library based on the X-ray machine image on the basis of the realization of the traditional algorithm, and completing the marking of the dangerous goods image. Therefore, a dangerous goods identification system based on the deep neural network can be realized on the basis of the library, and the identification accuracy is further improved.
In the application, the intelligent security inspection system based on the edge calculation improves the intelligent identification capability of a contraband machine by learning a large number of contraband X-ray samples manually identified by security inspectors through a deep learning model, and the deep learning model is deployed to an ARM chip edge GPU calculation power box after being accelerated through branch subtraction to solve the problem that the experience of the traditional security inspectors cannot be shared.
Optionally, the method further includes: the alarm device is connected with the edge computing device through the reserved IO driving port; the alarm device is used for giving an alarm prompt after the video stream contains contraband.
Optionally, the method further includes: an intercept arm connected to the edge computing device; the interception arm is used for intercepting the corresponding package after detecting the contraband.
For example, the alarm device includes a voice prompt and an interception arm, the signal input source of the interception arm is accessed through a reserved IO driver port of the edge computing device, and when the video stream detects contraband, the voice prompt drives the interception arm to intercept the contraband to the dangerous goods area.
For example, in the application, web multi-client continuous and stable video stream playing can be supported according to video stream protocol conversion. The original video collected from the security inspection machine camera comprises H264 and H265 codes, and rtsp video streaming service is provided through NVR equipment. In the application, a server and a client can be designed. The server side reads rtsp video stream data, transcodes the rtsp video stream data into h264 video coding in an flv format in a unified mode, outputs each frame of video data by using stream api provided by nodejs, and transmits the video data to the web side through websocket. The client side, namely a web browser side, creates a video label in the browser by using MSE (media Source extensions) characteristics of the browser, uses the media Source as a data Source thereof, starts decoding the flv format when receiving data transmitted from the websocket, and can realize real-time playing by adding the decoded data into a Buffer of the media Source.
In the application, the video is in an flv format, and no common fMP4 packaging is adopted, the flv packaging has the advantages of small size and simplicity in coding and decoding, is suitable for network transmission, and has the characteristic of low delay by adopting websocket transmission.
The intelligent monitoring service system can be provided for relevant personnel to carry out work processing. And (4) concentrating the hardware equipment of the security check machine of the whole network and the monitoring data of the whole network into a unified system, and managing the security check process. For example, the method can be used for butt-jointing each business system of a logistics enterprise to obtain the bill information, the appearance picture and the X-ray picture of the express, and if contraband is detected, the contraband identification picture is synchronously stored, so that real-time updating and after-the-fact tracing are facilitated. For example, the monitoring picture of the security check machine can be checked and played, the security check personnel can remotely and simultaneously monitor a plurality of security check machines, if abnormal dangerous articles occur, the system can synchronously perform early warning except for local early warning of the security check machines, and the security check personnel judge whether violation occurs or contact field personnel to perform related processing by checking pictures in early warning information. For example, the security check machine and other related devices related to the system can be used for inputting basic information, operation conditions and the like of the devices into the system for unified management, so that the efficiency is improved, and the personnel cost is reduced.
The intelligent security check system based on the edge calculation can be connected with an intelligent security check machine in a butt joint mode, overcomes the defects that the intelligent security check machine cannot share data with the traditional security check machine and cannot form overall management, manages the operation condition of the security check machine by storing and fusing the data of the intelligent security check machine, and improves the identification accuracy and the management efficiency by complementing the algorithm of the intelligent security check machine.
According to the intelligent security inspection system based on edge computing, provided by the embodiment of the invention, the traditional security inspection machine and the advanced intelligent security inspection machine are integrated through hardware equipment, edge computing equipment, a security inspection identification cloud platform, an intelligent monitoring service system and the like, so that overall management is realized, the waste of resources is avoided, the security inspection management efficiency of enterprises, particularly logistics enterprises, is improved, and the labor cost is greatly reduced.
The intelligent security inspection system based on the edge calculation, provided by the embodiment of the invention, preprocesses the image in the distribution center through the edge calculation equipment, can perform on-site early warning in real time while reducing the pressure transmitted to the headquarter for processing, can perform related processing on site according to the early warning, and stores early warning and processing records by the system, so that the remote operation of professional security inspection personnel is realized, and the processing process of no security inspection personnel on site is realized.
The intelligent security inspection system based on edge calculation provided by the embodiment of the invention realizes the construction and scraping of samples. Which may be understood as the storage and processing of data. Taking the Zhongtong as an example, the whole network has 20000 security check machines, the average daily total processing unit amount is 5000w-6000w units, each security check machine cannot store the processed data, and the abnormal data cannot be stored as a sample, so that the method is extremely resource-wasting. This application carries out the mark of sample with the data of anomaly through hardware equipment, data platform with the data storage of whole net, as the sample set of study for 20000 platform safety inspection machine can share sample resource in step, gets the strong point and makes up the weak point, and the degree of accuracy is higher.
The algorithm has strong pertinence and high plasticity. The application aims at the security inspection operation of logistics enterprises, various dangerous goods are identified through the algorithm platform, the existing algorithm of the intelligent security inspection machine can be fused, the complementation of the algorithm is formed, the inclusion is stronger, and the plasticity is higher.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (6)

1. An intelligent security inspection system based on edge calculation, comprising: the system comprises acquisition equipment, edge computing equipment, a security inspection identification cloud platform and an intelligent monitoring service system; the acquisition equipment is connected with the edge computing equipment, the security inspection identification cloud platform is connected with the edge detection equipment, and the intelligent monitoring service system is connected with the security inspection identification cloud platform;
the acquisition equipment is used for acquiring an original X-ray picture and respectively transmitting the original X-ray picture to the security check machine and the edge computing equipment;
the edge computing equipment is used for processing the received original X-ray picture through a deep learning algorithm model and outputting structured information data and video streams for local viewing or remote viewing;
the security inspection identification cloud platform is used for acquiring a video stream consisting of X-ray images through the edge computing equipment, inputting the X-ray images into a contraband identification model and identifying whether the X-ray images contain contraband or not;
and the intelligent monitoring service system is used for storing pictures and package information corresponding to the contraband after the contraband is identified, and triggering corresponding warning equipment to give an alarm.
2. The intelligent security inspection system of claim 1, wherein the security inspection identification cloud platform is further configured to obtain a sample picture of contraband; carrying out segmentation contour labeling on the contraband picture, and determining an initial contraband identification model; and training the initial contraband recognition model according to a preset segmentation network to obtain the contraband recognition model.
3. The intelligent security inspection system of claim 2, wherein the initial contraband identification model is yolactt + + model.
4. The intelligent security inspection system of claim 1, wherein the security inspection recognition cloud platform is further configured to update the contraband recognition model with the stored new contraband picture.
5. The intelligent security check system of claim 1, further comprising: the alarm device is connected with the edge computing device through a reserved IO driving port;
and the alarm equipment is used for giving an alarm prompt after the video stream contains contraband.
6. The intelligent security check system of claim 5, further comprising: an intercept arm coupled to the edge computing device;
the intercepting arm is used for intercepting the corresponding package after the contraband is detected.
CN202111014937.0A 2021-08-31 2021-08-31 Intelligent security inspection system based on edge calculation Pending CN113724478A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111014937.0A CN113724478A (en) 2021-08-31 2021-08-31 Intelligent security inspection system based on edge calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111014937.0A CN113724478A (en) 2021-08-31 2021-08-31 Intelligent security inspection system based on edge calculation

Publications (1)

Publication Number Publication Date
CN113724478A true CN113724478A (en) 2021-11-30

Family

ID=78680091

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111014937.0A Pending CN113724478A (en) 2021-08-31 2021-08-31 Intelligent security inspection system based on edge calculation

Country Status (1)

Country Link
CN (1) CN113724478A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114200273A (en) * 2022-02-21 2022-03-18 东营市沃格艾迪石油技术有限公司 Fault prediction system for online insulation monitoring of electric submersible pump
CN114727062A (en) * 2022-03-28 2022-07-08 慧之安信息技术股份有限公司 Penetration detection method and device based on common security video monitoring
CN115563396A (en) * 2022-12-06 2023-01-03 成都智元汇信息技术股份有限公司 Degradable centralized intelligent pushing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110543857A (en) * 2019-09-05 2019-12-06 安徽启新明智科技有限公司 Contraband identification method, device and system based on image analysis and storage medium
CN110889329A (en) * 2019-10-25 2020-03-17 浙江大华技术股份有限公司 Security check machine, security check machine inspection system, video stream processing method and storage medium
CN210691345U (en) * 2019-11-01 2020-06-05 武汉星形线科技有限公司 Cloud intelligence safety inspection auxiliary system based on degree of depth learning
US20210142636A1 (en) * 2017-03-01 2021-05-13 Panasonic Intellectual Property Management Co., Ltd. Three-dimensional intrusion detection system and three-dimensional intrusion detection method
CN112967289A (en) * 2021-02-08 2021-06-15 上海西井信息科技有限公司 Security check package matching method, system, equipment and storage medium
CN213954809U (en) * 2020-12-15 2021-08-13 杭州亿圣信息技术有限公司 Security check system composed of camera, edge computing terminal and local server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210142636A1 (en) * 2017-03-01 2021-05-13 Panasonic Intellectual Property Management Co., Ltd. Three-dimensional intrusion detection system and three-dimensional intrusion detection method
CN110543857A (en) * 2019-09-05 2019-12-06 安徽启新明智科技有限公司 Contraband identification method, device and system based on image analysis and storage medium
CN110889329A (en) * 2019-10-25 2020-03-17 浙江大华技术股份有限公司 Security check machine, security check machine inspection system, video stream processing method and storage medium
CN210691345U (en) * 2019-11-01 2020-06-05 武汉星形线科技有限公司 Cloud intelligence safety inspection auxiliary system based on degree of depth learning
CN213954809U (en) * 2020-12-15 2021-08-13 杭州亿圣信息技术有限公司 Security check system composed of camera, edge computing terminal and local server
CN112967289A (en) * 2021-02-08 2021-06-15 上海西井信息科技有限公司 Security check package matching method, system, equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114200273A (en) * 2022-02-21 2022-03-18 东营市沃格艾迪石油技术有限公司 Fault prediction system for online insulation monitoring of electric submersible pump
CN114200273B (en) * 2022-02-21 2022-05-03 东营市沃格艾迪石油技术有限公司 Fault prediction system for online insulation monitoring of electric submersible pump
CN114727062A (en) * 2022-03-28 2022-07-08 慧之安信息技术股份有限公司 Penetration detection method and device based on common security video monitoring
CN115563396A (en) * 2022-12-06 2023-01-03 成都智元汇信息技术股份有限公司 Degradable centralized intelligent pushing method and device

Similar Documents

Publication Publication Date Title
CN113724478A (en) Intelligent security inspection system based on edge calculation
WO2019137196A1 (en) Image annotation information processing method and device, server and system
CN110516529A (en) It is a kind of that detection method and system are fed based on deep learning image procossing
CN104333736A (en) Intelligent recognition monitoring system and method for unmanned substation
CN107145821A (en) A kind of crowd density detection method and system based on deep learning
CN112434880A (en) Patrol route planning and patrol personnel management system based on deep learning
CN111798572A (en) Machine room virtual inspection method and system
JP2022000776A (en) Test method, device and apparatus for traffic flow monitoring measurement system
CN114419556A (en) Abnormal drainage image identification method and system for drainage pipe network drainage port
CN111353436A (en) Super store operation analysis method and device based on image deep learning algorithm
CN114071232B (en) Audio and video quality visualization method and device, equipment, medium and product thereof
CN113094325B (en) Device deployment method, device, computer system and computer readable storage medium
CN109074300A (en) Bottleneck in detection and prediction complication system
CN211184122U (en) Intelligent video analysis system for linkage of railway operation safety prevention and control and large passenger flow early warning
CN111951258A (en) Goods shelf out-of-stock early warning analysis system and method based on edge calculation
CN113516102A (en) Deep learning parabolic behavior detection method based on video
CN107643730A (en) Production safety management device based on technology of Internet of things
CN115019008B (en) Intelligent 3D model design analysis service management platform
CN102984503A (en) Network video storage server system
KR20220004606A (en) Signal lamp recognition method, device, apparatus, and storage medium and computer program
CN111709928A (en) Video-based near-shore wave height real-time detection system
CN114419502A (en) Data analysis method and device and storage medium
CN102355575A (en) Distributed video monitoring device with pre-warning function
CN117037059A (en) Equipment management method and device based on inspection monitoring and electronic equipment
CN112333434A (en) Intelligent video analysis system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211130