CN117152808A - Public security multimedia security monitoring system and method - Google Patents
Public security multimedia security monitoring system and method Download PDFInfo
- Publication number
- CN117152808A CN117152808A CN202310995833.5A CN202310995833A CN117152808A CN 117152808 A CN117152808 A CN 117152808A CN 202310995833 A CN202310995833 A CN 202310995833A CN 117152808 A CN117152808 A CN 117152808A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- verification
- user identification
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 35
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012795 verification Methods 0.000 claims abstract description 66
- 230000005856 abnormality Effects 0.000 claims abstract description 10
- 238000012545 processing Methods 0.000 claims description 9
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 238000012806 monitoring device Methods 0.000 claims description 6
- 238000013500 data storage Methods 0.000 claims description 5
- 238000012216 screening Methods 0.000 claims description 3
- 238000012163 sequencing technique Methods 0.000 claims 2
- 238000006243 chemical reaction Methods 0.000 claims 1
- 238000004891 communication Methods 0.000 description 3
- 230000015572 biosynthetic process Effects 0.000 description 2
- 210000004709 eyebrow Anatomy 0.000 description 2
- 210000003128 head Anatomy 0.000 description 2
- 210000000216 zygoma Anatomy 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/74—Image or video pattern matching; Proximity measures in feature spaces
- G06V10/75—Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/70—Multimodal biometrics, e.g. combining information from different biometric modalities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Collating Specific Patterns (AREA)
Abstract
The application discloses a public security multimedia security monitoring system and method, comprising an information acquisition unit, an information identification unit, an information verification unit, an abnormality analysis unit and an information output unit.
Description
Technical Field
The application relates to the technical field of security monitoring, in particular to a public security multimedia security monitoring system and a public security multimedia security monitoring method.
Background
At present, the digital video monitoring technology is increasingly popularized in the construction of security monitoring systems in various places throughout the country, and the digital processing is performed in all links of transmission, control, storage and the like of the system. The mode based on the digital network video server and the monitoring platform has incomparable superiority in the aspects of networking flexibility and expandability in intelligent application.
According to the patent display of application number CN201910400388.7, the application comprises a monitoring processing center, a first monitoring system, a second monitoring system and a reverse monitoring system, wherein the monitoring processing center transmits signals to a wireless communication module, the wireless communication module transmits signals to a main control module, the main control module simultaneously transmits signals to a positioning module, a timer, the reverse monitoring system and a public security special receiving module, the main control module transmits signals to a positioning tracking module and a secondary encryption module, the positioning tracking module transmits signals to the secondary encryption module through a primary encryption module, the secondary encryption module then transmits signals to the main control module for encryption, the positioning tracking module transmits signals to the monitoring processing center through the main control module and the wireless communication module for reverse tracking, and the public security special receiving module transmits signals to an alarm system.
For the personnel going out to patrol the work, the portable camera and microphone can record a single action in the patrol process, but when some existing portable equipment is used, due to single function, only real-time recording can be performed, and the information of the inquiring user can not be mastered in time when special conditions occur, and further the condition of the inquiring user can not be known, so that information delay and an incorrect processing mode can be caused.
Disclosure of Invention
Aiming at the defects of the prior art, the application provides a public security multimedia security monitoring system and a public security multimedia security monitoring method, which solve the problem that acquired information cannot be checked in time, so that the real-time grasping degree of the information is reduced.
In order to achieve the above purpose, the application is realized by the following technical scheme: a police multimedia security monitoring system comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face images and voice contents, and transmitting basic information of a target object to an information recognition unit;
the information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, and transmitting the user identification information to the information verification unit;
the information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit at the same time, and the verification error signal is transmitted to the abnormality analysis unit;
the anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, what needs to be described here is: the history record is expressed as information of the suspected person, and the verification error signal is analyzed by combining the history record and analysis information is generated, wherein the analysis information comprises: an abnormality signal and a warning signal, and transmitting the generated analysis information to an information output unit;
the anomaly analysis unit is used for analyzing the generated anomaly signals and carrying out secondary verification on the user identity card number information to be analyzed.
As a further aspect of the application: the specific way of the information identifying unit generating the user identifying information is as follows:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images and selecting one group of images as a standard face image, wherein the following needs to be described: the standard face image is expressed as a face image when inquiring that the head and the shoulder of the user form a right angle;
s2: then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, and marking characteristic points of the standard face model as i, wherein the following needs to be described: the characteristic points are expressed as eyebrow, two cheekbones and chin points of a human face, and the characteristic points i are matched with information stored in a database to generate user identification information, and the user identification information is required to be described here as follows: the information stored in the database protects the user's name, photograph, age, identification card number, etc.
As a further aspect of the application: the specific mode of the information verification unit for generating verification results is as follows:
p1: the method comprises the steps of acquiring voice of an inquiring user, converting Chinese characters, extracting characteristic data of converted contents, and describing: the feature data is represented as information data included in the user identification information, the feature data is extracted and marked as feature data, and when the name is identified by voice, the user is required to be queried to disassemble the name and perform word formation explanation, so that the error of identification caused by polyphones is avoided, the overall identification is influenced, the feature data is ordered according to the sequence in the user identification information to generate feature data ordering information, and the method is required to be explained: the sequential order in the user identification information is expressed as ordering according to the display order of name, gender, age, identification card number, etc.;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates verification error signals at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates verification correct signals at the same time, wherein the following needs to be described: when the characteristic data and the content in the user identification information are different, and if the characteristic data and the content in the user identification information are the same, the characteristic data and the content in the user identification information are identical.
As a further aspect of the application: the specific way of generating analysis information by the abnormality analysis unit is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
As a further aspect of the application: the specific mode of the abnormality analysis unit for carrying out secondary verification on the abnormality signal is as follows: the user to be analyzed writes the identification card number, and the written result is photographed and identified, and what needs to be explained here is: by identifying the written characters, then matching the written characters with user identification information according to the identification result, and generating a corresponding matching result, wherein the matching result comprises the following steps: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
As a further aspect of the application: the data storage unit is used for storing the history record and transmitting the history record to the anomaly analysis unit, and the information output unit is used for acquiring the transmitted analysis information and the matching result and displaying the analysis information and the matching result to an operator through the display equipment.
A monitoring method of a public security multimedia security monitoring system comprises the following steps:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through a display device
Advantageous effects
The application provides a public security multimedia security monitoring system and a public security multimedia security monitoring method. Compared with the prior art, the method has the following beneficial effects:
the method and the device identify and verify the acquired user information, judge the correctness of the user information by comparing the acquired information in the database with the real-time information, verify the user with error information again, grasp the real-time information of the user by the identity card number and the image information, thereby avoiding the condition that the user has information falsification, improving the security of work, directly generating warning signals for abnormal users, displaying the warning signals to operators in time, and enhancing the security consciousness of the operators.
Drawings
FIG. 1 is a block diagram of a system according to the present application
FIG. 2 is a flow chart of the method of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Referring to fig. 1, the present application provides a public security multimedia security monitoring system, comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face image and voice content, and transmits target object basic information to an information recognition unit.
The information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, transmitting the user identification information to the information verification unit, and generating the user identification information in the following specific modes:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images and selecting one group of images as a standard face image, wherein the following needs to be described: the standard face image is expressed as a face image when inquiring that the head and the shoulder of the user form a right angle;
s2: then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, and marking characteristic points of the standard face model as i, wherein the following needs to be described: the characteristic points are expressed as eyebrow, two cheekbones and chin points of a human face, and the characteristic points i are matched with information stored in a database to generate user identification information, and the user identification information is required to be described here as follows: the information stored in the database protects the user's name, photograph, age, identification card number, etc.
The information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit, and the verification error signal is transmitted to the anomaly analysis unit, so that the verification result is generated in the following specific modes:
p1: the method comprises the steps of acquiring voice of an inquiring user, converting Chinese characters, extracting characteristic data of converted contents, and describing: the feature data is represented as information data included in the user identification information, the feature data is extracted and marked as feature data, and when the name is identified by voice, the user is required to be queried to disassemble the name and perform word formation explanation, so that the error of identification caused by polyphones is avoided, the overall identification is influenced, the feature data is ordered according to the sequence in the user identification information to generate feature data ordering information, and the method is required to be explained: the sequential order in the user identification information is expressed as ordering according to the display order of name, gender, age, identification card number, etc.;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates verification error signals at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates verification correct signals at the same time, wherein the following needs to be described: when the characteristic data and the content in the user identification information are different, and if the characteristic data and the content in the user identification information are the same, the characteristic data and the content in the user identification information are identical.
The anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, what needs to be described here is: the history record is expressed as information of the suspected person, and the verification error signal is analyzed by combining the history record and analysis information is generated, wherein the analysis information comprises: the abnormal signal and the warning signal, and transmits the generated analysis information to the information output unit, the specific way of generating the analysis information is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
The analysis is carried out in combination with the actual application scene, firstly, verification is carried out on the identity card number information of the inquiring user, but the identity card number is falsified, so that further picture comparison processing is needed for the situation of different identity cards, and whether the situation of falsification of information exists or not is judged through secondary confirmation, thereby ensuring the accuracy of the result.
And the information output unit is used for acquiring the transmitted analysis information and displaying the analysis information to an operator through the display equipment.
In the second embodiment, the difference from the first embodiment is that the abnormality analysis unit analyzes the generated abnormality signal.
The anomaly analysis unit is used for analyzing the generated anomaly signals, and the user identity card number information to be analyzed is subjected to secondary verification by the following specific modes: the user to be analyzed writes the identification card number, and the written result is photographed and identified, and what needs to be explained here is: by identifying the written characters, then matching the written characters with user identification information according to the identification result, and generating a corresponding matching result, wherein the matching result comprises the following steps: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
And the information output unit is used for acquiring the transmitted matching result and displaying the matching result to an operator through the display equipment.
Embodiment III as embodiment III of the present application, the emphasis is on combining the implementation procedures of embodiment I and embodiment II.
In a fourth embodiment, referring to fig. 2, the present application provides a monitoring method of a public security multimedia security monitoring system, which specifically includes the following steps:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through display equipment.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present application and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present application may be modified or substituted without departing from the spirit and scope of the technical method of the present application.
Claims (8)
1. A public security multimedia security monitoring system, comprising:
an information acquisition unit configured to acquire target object basic information, where the target object includes: querying the user, and querying the user base information includes: face images and voice contents, and transmitting basic information of a target object to an information recognition unit;
the information identification unit is used for acquiring the transmitted basic information of the target object, identifying the basic information of the inquiring user to generate user identification information, and transmitting the user identification information to the information verification unit;
the information verification unit is used for acquiring the transmitted user identification information and the voice content of the inquiring user, and verifying the user identification information by combining the voice content of the inquiring user to generate a corresponding verification result, wherein the verification result comprises the following steps: the verification correct signal and the verification error signal are transmitted to the information output unit at the same time, and the verification error signal is transmitted to the abnormality analysis unit;
the anomaly analysis unit is used for acquiring and analyzing the transmitted verification error signal and simultaneously acquiring a history record stored in the data storage unit, wherein the history record comprises: name, identification card number and image, and analyze the verification error signal in combination with the history record and generate analysis information, wherein the analysis information comprises: an abnormality signal and a warning signal, and transmitting the generated analysis information to an information output unit;
the anomaly analysis unit is used for analyzing the generated anomaly signals and carrying out secondary verification on the user identity card number information to be analyzed.
2. The public security multimedia security monitoring system according to claim 1, wherein the specific manner of generating the user identification information by the information identification unit is as follows:
s1: firstly, acquiring face images of an inquiring user by using a monitoring device, acquiring a plurality of groups of face images, screening the plurality of groups of face images, and selecting one group of images as a standard face image;
s2: and then, recognizing the standard face image, generating a standard face model through three-dimensional modeling, marking and marking characteristic points of the standard face model as i, and matching with information stored in a database according to the characteristic points i to generate user identification information.
3. The public security multimedia security monitoring system according to claim 1, wherein the specific mode of generating the verification result by the information verification unit is as follows:
p1: acquiring voice of an inquiring user, performing Chinese character conversion on the voice, extracting characteristic data of the converted content, and sequencing the characteristic data according to the sequence in the user identification information to generate characteristic data sequencing information;
p2: then the characteristic data ordering information is matched with the user identification information, and the specific matching mode is as follows: when the feature data ordering information is different from the user identification information, the system displays errors and generates a verification error signal at the same time, and when the feature data ordering information is the same as the user identification information, the system displays correctly and generates a verification correct signal at the same time.
4. The public security multimedia security monitoring system according to claim 1, wherein the specific way of generating the analysis information by the anomaly analysis unit is as follows:
m1: acquiring identity card number information in a history record, matching the identity card number information with characteristic data ordering information in a verification error signal, generating a matching signal if the identity card number information is the same, generating a warning signal at the same time, generating a non-matching signal if the identity card number information is different, and marking the user as a user to be analyzed;
m2: and then analyzing the user to be analyzed to obtain the face portrait information of the user to be analyzed, simultaneously obtaining the image information in the history record, and matching the face portrait information with the image information, if the face portrait information is matched with the image information, generating a warning signal, otherwise, if the face portrait information is not matched with the image information, generating an abnormal signal.
5. The public security multimedia security monitoring system according to claim 1, wherein the specific way for the anomaly analysis unit to perform the secondary verification on the anomaly signal is as follows: the user to be analyzed writes the identification card number, and carries out shooting identification on the written result, then matches the identification card number with the user identification information according to the identification result, and generates a corresponding matching result, wherein the matching result comprises: a correct signal and an error signal, and simultaneously transmitting the matching result to the information output unit.
6. The police multimedia security monitoring system of claim 1, wherein the data storage unit is configured to store a history record and transmit the history record to the anomaly analysis unit.
7. The public security multimedia security monitoring system according to claim 1, wherein the information output unit is configured to obtain the transmitted analysis information and the matching result, and display the analysis information and the matching result to an operator through a display device.
8. A monitoring method for executing a public security multimedia security monitoring system according to any one of claims 1-7, characterized in that the method comprises the steps of:
step one: the acquisition end acquires the basic information of the target object, identifies the basic information of the target object according to the real-time information acquired by the monitoring device to generate user identification information, and simultaneously transmits the user identification information to the processing end;
step two: the processing end acquires the user identification information, performs verification on the user identification information by combining the target object basic information to generate a verification result, and then analyzes a verification error signal in the verification result;
step three: acquiring a verification error signal and analyzing the verification error signal by combining a history record to generate analysis information, wherein the analysis information comprises an abnormal signal and a warning signal, and the analysis information cannot be transmitted to an output end;
step four: the output end obtains the transmitted analysis information and displays the analysis information to an operator through display equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310995833.5A CN117152808A (en) | 2023-08-09 | 2023-08-09 | Public security multimedia security monitoring system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310995833.5A CN117152808A (en) | 2023-08-09 | 2023-08-09 | Public security multimedia security monitoring system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117152808A true CN117152808A (en) | 2023-12-01 |
Family
ID=88897790
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310995833.5A Pending CN117152808A (en) | 2023-08-09 | 2023-08-09 | Public security multimedia security monitoring system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117152808A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117772617A (en) * | 2024-02-27 | 2024-03-29 | 河南聚能合众特种材料有限公司 | Logistics sorting and conveying method and system based on Internet of things |
-
2023
- 2023-08-09 CN CN202310995833.5A patent/CN117152808A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117772617A (en) * | 2024-02-27 | 2024-03-29 | 河南聚能合众特种材料有限公司 | Logistics sorting and conveying method and system based on Internet of things |
CN117772617B (en) * | 2024-02-27 | 2024-05-10 | 河南聚能合众特种材料有限公司 | Logistics sorting and conveying method and system based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11321583B2 (en) | Image annotating method and electronic device | |
CN104268684B (en) | intelligent inspection system based on intelligent terminal | |
CN111460889A (en) | Abnormal behavior identification method, device and equipment based on voice and image characteristics | |
CN107679504A (en) | Face identification method, device, equipment and storage medium based on camera scene | |
US20200234036A1 (en) | Multi-Camera Multi-Face Video Splicing Acquisition Device and Method Thereof | |
CN105590097B (en) | Dual camera collaboration real-time face identification security system and method under the conditions of noctovision | |
CN115828112B (en) | Fault event response method and device, electronic equipment and storage medium | |
CN101976356A (en) | Face identification method for surfing identification policy, and identification system thereof | |
WO2020006964A1 (en) | Image detection method and device | |
CN112101123B (en) | Attention detection method and device | |
CN117152808A (en) | Public security multimedia security monitoring system and method | |
CN107241572A (en) | Student's real training video frequency tracking evaluation system | |
CN112560989B (en) | Artificial intelligence anti-counterfeiting image identification method and system based on big data | |
CN107133611A (en) | A kind of classroom student nod rate identification with statistical method and device | |
CN111416960B (en) | Video monitoring system based on cloud service | |
CN112365618A (en) | Attendance system and method based on face recognition and two-dimensional code temperature measurement | |
CN112906441B (en) | Image recognition system and method for exploration and maintenance in communication industry | |
CN111738199A (en) | Image information verification method, image information verification device, image information verification computing device and medium | |
CN111881740A (en) | Face recognition method, face recognition device, electronic equipment and medium | |
CN114333005A (en) | Object recognition method, system and storage medium | |
CN115984968A (en) | Student time-space action recognition method and device, terminal equipment and medium | |
CN206948499U (en) | The monitoring of student's real training video frequency tracking, evaluation system | |
CN115438725A (en) | State detection method, device, equipment and storage medium | |
CN113947789A (en) | Scene face recognition technology for events | |
CN106846302A (en) | The detection method and the examination platform based on the method for a kind of correct pickup of instrument |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |