Traffic big data suspect vehicle inspection deployment and control method and device

A technology of suspect vehicles and big data, applied in the field of urban traffic safety, can solve the problem of unrecognizable cloned cars, and achieve the effect of improving the success rate of seizure, avoiding waste, and reducing the number of false alarms.

Inactive Publication Date: 2018-11-06
西安银江智慧城市技术有限公司
View PDF13 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can find different models of decked cars, but vehicle operators or operating individuals in some industries clone many vehicles on the road in order to increase profits, that is, cl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic big data suspect vehicle inspection deployment and control method and device
  • Traffic big data suspect vehicle inspection deployment and control method and device
  • Traffic big data suspect vehicle inspection deployment and control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] This embodiment provides a traffic big data suspect vehicle detection and deployment method based on vehicle characteristics. Through the suspect vehicle discovery method, the suspect vehicle blacklist and the suspect vehicle feature information are determined. When a vehicle with the same license plate as the suspect vehicle appears, according to The basic information and characteristic information of the suspect vehicle determine whether it is a suspect vehicle or a normal vehicle. If it is a suspect vehicle, it will be alarmed and intercepted, and it will be linked with the nearby intelligent traffic signal to prolong the time for the suspect vehicle to pass through the intersection; if it is a normal vehicle, it will not Make an alarm.

[0083] see figure 1 In this embodiment, the suspected vehicle discovery method is to collect the vehicle entry and exit record data of each parking lot and the checkpoint passing record data on the road. The specific information inc...

Embodiment 2

[0129] see Figure 5 This embodiment provides a device for detecting and controlling suspected traffic big data vehicles based on vehicle characteristics that can implement the method for detecting and controlling suspected traffic big data vehicles based on vehicle characteristics described in Embodiment 1. It mainly includes a central platform and The front-end subsystem, the central platform and the front-end subsystem are connected by communication. The central platform mainly includes the central control module, the suspect vehicle discovery module, the alarm module, the communication module, the basic vehicle information database, the vehicle blacklist database and the vehicle characteristic information database. The central control The modules are respectively connected with the suspect vehicle discovery module, the alarm module, and the communication module, and the suspect vehicle discovery module is connected with the vehicle basic information database, vehicle blackl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a traffic big data suspect vehicle inspection deployment and control method and device. The method includes the following steps that: a suspect vehicle blacklist and suspect vehicle characteristic information are determined by means of a suspect vehicle discovery method; when a vehicle of which the license plate number is same as the license plate number of a suspect vehicle appears, and whether the vehicle is a suspect vehicle or normal vehicle is judged according to the basic information and characteristic information of the suspect vehicle, if the vehicle is the suspect vehicle, an alarm is issued, and the suspect vehicle will be inspected and intercepted; an intelligent traffic signal machine near the suspect vehicle can perform coordinated control, so that time for the suspect vehicle to pass through an intersection can be prolonged; and if the vehicle is a normal vehicle, no alarms are issued. With the method and device of the invention adopted, the discovery rate of vehicles with fake license plates and the success rate of the inspection of the vehicles with fake license plates can be improved, and the waste of police resources can be avoided to a greatest extent.

Description

technical field [0001] The invention belongs to the field of urban traffic safety, and relates to a method and device for detecting and controlling suspect vehicles. The purpose is to quickly discover suspect vehicles, realize rapid detection of suspect vehicles, and provide technical support for public security organs to solve cases. Background technique [0002] With the rapid development of the economy and the continuous growth of the number of cars, the phenomena of license plates, accident escapes, vehicle theft, and crimes using cars are becoming more and more serious. The public security organs have brought great pressure to traffic management. [0003] In response to the above problems, the public security organs have established an investigation and control system, built a blacklist database in the system, entered the license plate number information of the suspected vehicle into the blacklist database, and used the checkpoint vehicle recording system built on the ro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08G1/01G08G1/017G08G1/07
CPCG08G1/0137G08G1/0175G08G1/07
Inventor 金仲存田伟朱威徐铮波林博伟张美晶姬淑娟
Owner 西安银江智慧城市技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products