CN117152808A - Public security multimedia security monitoring system and method - Google Patents

Public security multimedia security monitoring system and method Download PDF

Info

Publication number
CN117152808A
CN117152808A CN202310995833.5A CN202310995833A CN117152808A CN 117152808 A CN117152808 A CN 117152808A CN 202310995833 A CN202310995833 A CN 202310995833A CN 117152808 A CN117152808 A CN 117152808A
Authority
CN
China
Prior art keywords
information
user
verification
user identification
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310995833.5A
Other languages
Chinese (zh)
Inventor
林珏
缪余华
李博峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Sushengtian Information Technology Co ltd
Original Assignee
Nanjing Sushengtian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Sushengtian Information Technology Co ltd filed Critical Nanjing Sushengtian Information Technology Co ltd
Priority to CN202310995833.5A priority Critical patent/CN117152808A/en
Publication of CN117152808A publication Critical patent/CN117152808A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/70Multimodal biometrics, e.g. combining information from different biometric modalities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses a public security multimedia security monitoring system and method, comprising an information acquisition unit, an information identification unit, an information verification unit, an abnormality analysis unit and an information output unit.

Description

Public security multimedia security monitoring system and method
Technical Field
The application relates to the technical field of security monitoring, in particular to a public security multimedia security monitoring system and a public security multimedia security monitoring method.
Background
At present, the digital video monitoring technology is increasingly popularized in the construction of security monitoring systems in various places throughout the country, and the digital processing is performed in all links of transmission, control, storage and the like of the system. The mode based on the digital network video server and the monitoring platform has incomparable superiority in the aspects of networking flexibility and expandability in intelligent application.
According to the patent display of application number CN201910400388.7, the application comprises a monitoring processing center, a first monitoring system, a second monitoring system and a reverse monitoring system, wherein the monitoring processing center transmits signals to a wireless communication module, the wireless communication module transmits signals to a main control module, the main control module simultaneously transmits signals to a positioning module, a timer, the reverse monitoring system and a public security special receiving module, the main control module transmits signals to a positioning tracking module and a secondary encryption module, the positioning tracking module transmits signals to the secondary encryption module through a primary encryption module, the secondary encryption module then transmits signals to the main control module for encryption, the positioning tracking module transmits signals to the monitoring processing center through the main control module and the wireless communication module for reverse tracking, and the public security special receiving module transmits signals to an alarm system.
For the personnel going out to patrol the work, the portable camera and microphone can record a single action in the patrol process, but when some existing portable equipment is used, due to single function, only real-time recording can be performed, and the information of the inquiring user can not be mastered in time when special conditions occur, and further the condition of the inquiring user can not be known, so that information delay and an incorrect processing mode can be caused.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides a public security multimedia security monitoring system and a public security multimedia security monitoring method, which solve the problem that acquired information cannot be checked in time, so that the real-time grasping degree of the information is reduced.
In order to achieve the above purpose, the application is realized by the following technical scheme: a police multimedia security monitoring system comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face images and voice contents, and transmitting basic information of a target object to an information recognition unit;
the information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, and transmitting the user identification information to the information verification unit;
the information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit at the same time, and the verification error signal is transmitted to the abnormality analysis unit;
the anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, what needs to be described here is: the history record is expressed as information of the suspected person, and the verification error signal is analyzed by combining the history record and analysis information is generated, wherein the analysis information comprises: an abnormality signal and a warning signal, and transmitting the generated analysis information to an information output unit;
the anomaly analysis unit is used for analyzing the generated anomaly signals and carrying out secondary verification on the user identity card number information to be analyzed.
As a further aspect of the application: the specific way of the information identifying unit generating the user identifying information is as follows:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images and selecting one group of images as a standard face image, wherein the following needs to be described: the standard face image is expressed as a face image when inquiring that the head and the shoulder of the user form a right angle;
s2: then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, and marking characteristic points of the standard face model as i, wherein the following needs to be described: the characteristic points are expressed as eyebrow, two cheekbones and chin points of a human face, and the characteristic points i are matched with information stored in a database to generate user identification information, and the user identification information is required to be described here as follows: the information stored in the database protects the user's name, photograph, age, identification card number, etc.
As a further aspect of the application: the specific mode of the information verification unit for generating verification results is as follows:
p1: the method comprises the steps of acquiring voice of an inquiring user, converting Chinese characters, extracting characteristic data of converted contents, and describing: the feature data is represented as information data included in the user identification information, the feature data is extracted and marked as feature data, and when the name is identified by voice, the user is required to be queried to disassemble the name and perform word formation explanation, so that the error of identification caused by polyphones is avoided, the overall identification is influenced, the feature data is ordered according to the sequence in the user identification information to generate feature data ordering information, and the method is required to be explained: the sequential order in the user identification information is expressed as ordering according to the display order of name, gender, age, identification card number, etc.;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates verification error signals at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates verification correct signals at the same time, wherein the following needs to be described: when the characteristic data and the content in the user identification information are different, and if the characteristic data and the content in the user identification information are the same, the characteristic data and the content in the user identification information are identical.
As a further aspect of the application: the specific way of generating analysis information by the abnormality analysis unit is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
As a further aspect of the application: the specific mode of the abnormality analysis unit for carrying out secondary verification on the abnormality signal is as follows: the user to be analyzed writes the identification card number, and the written result is photographed and identified, and what needs to be explained here is: by identifying the written characters, then matching the written characters with user identification information according to the identification result, and generating a corresponding matching result, wherein the matching result comprises the following steps: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
As a further aspect of the application: the data storage unit is used for storing the history record and transmitting the history record to the anomaly analysis unit, and the information output unit is used for acquiring the transmitted analysis information and the matching result and displaying the analysis information and the matching result to an operator through the display equipment.
A monitoring method of a public security multimedia security monitoring system comprises the following steps:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through a display device
Advantageous effects
The application provides a public security multimedia security monitoring system and a public security multimedia security monitoring method. Compared with the prior art, the method has the following beneficial effects:
the method and the device identify and verify the acquired user information, judge the correctness of the user information by comparing the acquired information in the database with the real-time information, verify the user with error information again, grasp the real-time information of the user by the identity card number and the image information, thereby avoiding the condition that the user has information falsification, improving the security of work, directly generating warning signals for abnormal users, displaying the warning signals to operators in time, and enhancing the security consciousness of the operators.
Drawings
FIG. 1 is a block diagram of a system according to the present application
FIG. 2 is a flow chart of the method of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the present application provides a public security multimedia security monitoring system, comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face image and voice content, and transmits target object basic information to an information recognition unit.
The information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, transmitting the user identification information to the information verification unit, and generating the user identification information in the following specific modes:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images and selecting one group of images as a standard face image, wherein the following needs to be described: the standard face image is expressed as a face image when inquiring that the head and the shoulder of the user form a right angle;
s2: then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, and marking characteristic points of the standard face model as i, wherein the following needs to be described: the characteristic points are expressed as eyebrow, two cheekbones and chin points of a human face, and the characteristic points i are matched with information stored in a database to generate user identification information, and the user identification information is required to be described here as follows: the information stored in the database protects the user's name, photograph, age, identification card number, etc.
The information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit, and the verification error signal is transmitted to the anomaly analysis unit, so that the verification result is generated in the following specific modes:
p1: the method comprises the steps of acquiring voice of an inquiring user, converting Chinese characters, extracting characteristic data of converted contents, and describing: the feature data is represented as information data included in the user identification information, the feature data is extracted and marked as feature data, and when the name is identified by voice, the user is required to be queried to disassemble the name and perform word formation explanation, so that the error of identification caused by polyphones is avoided, the overall identification is influenced, the feature data is ordered according to the sequence in the user identification information to generate feature data ordering information, and the method is required to be explained: the sequential order in the user identification information is expressed as ordering according to the display order of name, gender, age, identification card number, etc.;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates verification error signals at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates verification correct signals at the same time, wherein the following needs to be described: when the characteristic data and the content in the user identification information are different, and if the characteristic data and the content in the user identification information are the same, the characteristic data and the content in the user identification information are identical.
The anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, what needs to be described here is: the history record is expressed as information of the suspected person, and the verification error signal is analyzed by combining the history record and analysis information is generated, wherein the analysis information comprises: the abnormal signal and the warning signal, and transmits the generated analysis information to the information output unit, the specific way of generating the analysis information is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
The analysis is carried out in combination with the actual application scene, firstly, verification is carried out on the identity card number information of the inquiring user, but the identity card number is falsified, so that further picture comparison processing is needed for the situation of different identity cards, and whether the situation of falsification of information exists or not is judged through secondary confirmation, thereby ensuring the accuracy of the result.
And the information output unit is used for acquiring the transmitted analysis information and displaying the analysis information to an operator through the display equipment.
In the second embodiment, the difference from the first embodiment is that the abnormality analysis unit analyzes the generated abnormality signal.
The anomaly analysis unit is used for analyzing the generated anomaly signals, and the user identity card number information to be analyzed is subjected to secondary verification by the following specific modes: the user to be analyzed writes the identification card number, and the written result is photographed and identified, and what needs to be explained here is: by identifying the written characters, then matching the written characters with user identification information according to the identification result, and generating a corresponding matching result, wherein the matching result comprises the following steps: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
And the information output unit is used for acquiring the transmitted matching result and displaying the matching result to an operator through the display equipment.
Embodiment III as embodiment III of the present application, the emphasis is on combining the implementation procedures of embodiment I and embodiment II.
In a fourth embodiment, referring to fig. 2, the present application provides a monitoring method of a public security multimedia security monitoring system, which specifically includes the following steps:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through display equipment.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.

Claims (8)

1. A public security multimedia security monitoring system, comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face images and voice contents, and transmitting basic information of a target object to an information recognition unit;
the information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, and transmitting the user identification information to the information verification unit;
the information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit at the same time, and the verification error signal is transmitted to the abnormality analysis unit;
the anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, and analyze the verification error signal in combination with the history record and generate analysis information, wherein the analysis information comprises: an abnormality signal and a warning signal, and transmitting the generated analysis information to an information output unit;
the anomaly analysis unit is used for analyzing the generated anomaly signals and carrying out secondary verification on the user identity card number information to be analyzed.
2. The public security multimedia security monitoring system according to claim 1, wherein the specific manner of generating the user identification information by the information identification unit is as follows:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images, and selecting one group of images as a standard face image;
s2: and then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, marking and marking characteristic points of the standard face model as i, and matching with information stored in a database according to the characteristic points i to generate user identification information.
3. The public security multimedia security monitoring system according to claim 1, wherein the specific mode of generating the verification result by the information verification unit is as follows:
p1: acquiring voice of an inquiring user, performing Chinese character conversion on the voice, extracting characteristic data of the converted content, and sequencing the characteristic data according to the sequence in the user identification information to generate characteristic data sequencing information;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates a verification error signal at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates a verification correct signal at the same time.
4. The public security multimedia security monitoring system according to claim 1, wherein the specific way of generating the analysis information by the anomaly analysis unit is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
5. The public security multimedia security monitoring system according to claim 1, wherein the specific way for the anomaly analysis unit to perform the secondary verification on the anomaly signal is as follows: the user to be analyzed writes the identification card number, and carries out shooting identification on the written result, then matches the identification card number with the user identification information according to the identification result, and generates a corresponding matching result, wherein the matching result comprises: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
6. The police multimedia security monitoring system of claim 1, wherein the data storage unit is configured to store a history record and transmit the history record to the anomaly analysis unit.
7. The public security multimedia security monitoring system according to claim 1, wherein the information output unit is configured to obtain the transmitted analysis information and the matching result, and display the analysis information and the matching result to an operator through a display device.
8. A monitoring method for executing a public security multimedia security monitoring system according to any one of claims 1-7, characterized in that the method comprises the steps of:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through display equipment.
CN202310995833.5A 2023-08-09 2023-08-09 Public security multimedia security monitoring system and method Pending CN117152808A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310995833.5A CN117152808A (en) 2023-08-09 2023-08-09 Public security multimedia security monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310995833.5A CN117152808A (en) 2023-08-09 2023-08-09 Public security multimedia security monitoring system and method

Publications (1)

Publication Number Publication Date
CN117152808A true CN117152808A (en) 2023-12-01

Family

ID=88897790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310995833.5A Pending CN117152808A (en) 2023-08-09 2023-08-09 Public security multimedia security monitoring system and method

Country Status (1)

Country Link
CN (1) CN117152808A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117772617A (en) * 2024-02-27 2024-03-29 河南聚能合众特种材料有限公司 Logistics sorting and conveying method and system based on Internet of things

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117772617A (en) * 2024-02-27 2024-03-29 河南聚能合众特种材料有限公司 Logistics sorting and conveying method and system based on Internet of things
CN117772617B (en) * 2024-02-27 2024-05-10 河南聚能合众特种材料有限公司 Logistics sorting and conveying method and system based on Internet of things

Similar Documents

Publication Publication Date Title
US11321583B2 (en) Image annotating method and electronic device
CN104268684B (en) intelligent inspection system based on intelligent terminal
CN111460889A (en) Abnormal behavior identification method, device and equipment based on voice and image characteristics
CN107679504A (en) Face identification method, device, equipment and storage medium based on camera scene
US20200234036A1 (en) Multi-Camera Multi-Face Video Splicing Acquisition Device and Method Thereof
CN105590097B (en) Dual camera collaboration real-time face identification security system and method under the conditions of noctovision
CN115828112B (en) Fault event response method and device, electronic equipment and storage medium
CN101976356A (en) Face identification method for surfing identification policy, and identification system thereof
WO2020006964A1 (en) Image detection method and device
CN112101123B (en) Attention detection method and device
CN117152808A (en) Public security multimedia security monitoring system and method
CN107241572A (en) Student's real training video frequency tracking evaluation system
CN112560989B (en) Artificial intelligence anti-counterfeiting image identification method and system based on big data
CN107133611A (en) A kind of classroom student nod rate identification with statistical method and device
CN111416960B (en) Video monitoring system based on cloud service
CN112365618A (en) Attendance system and method based on face recognition and two-dimensional code temperature measurement
CN112906441B (en) Image recognition system and method for exploration and maintenance in communication industry
CN111738199A (en) Image information verification method, image information verification device, image information verification computing device and medium
CN111881740A (en) Face recognition method, face recognition device, electronic equipment and medium
CN114333005A (en) Object recognition method, system and storage medium
CN115984968A (en) Student time-space action recognition method and device, terminal equipment and medium
CN206948499U (en) The monitoring of student's real training video frequency tracking, evaluation system
CN115438725A (en) State detection method, device, equipment and storage medium
CN113947789A (en) Scene face recognition technology for events
CN106846302A (en) The detection method and the examination platform based on the method for a kind of correct pickup of instrument

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination