Unlock instant, AI-driven research and patent intelligence for your innovation.

Stranger intrusion detection method based on cloud-edge collaboration

A technology for intrusion detection and strangers, applied in the field of face recognition, to achieve the effect of reducing delay and facilitating contact tracing

Active Publication Date: 2022-07-22
SHANDONG INSPUR SCI RES INST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Finally, huge data storage restricts the development of intelligent computing. Cameras are installed more and more, and devices acquire more data than before, but not all data is valuable. Therefore, it is particularly important to decide how to integrate and store data more effectively.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stranger intrusion detection method based on cloud-edge collaboration
  • Stranger intrusion detection method based on cloud-edge collaboration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0024] A stranger intrusion detection method based on cloud-edge collaboration, which is based on the device side, edge side and cloud. The data from the terminal is analyzed and processed and the results are sent to the cloud. The cloud has the function of model training and can perform big data analysis and optimize and update the model. The updated results are finally output from the edge terminal to the device terminal.

[0025] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a stranger intrusion detection method based on cloud-edge collaboration, which realizes the detection, positioning and tracking functions of non-park staff. It includes the following steps: establishing a face database of park staff; deploying a face detection and face recognition model on the terminal at the entrance of the park to detect and mark non-park staff; terminal data collection and preprocessing, and uploading to the edge server ;The edge server screens the target images from multiple video sources, and records the frame image time and motion trajectory information; integrates target image sequences of different source videos, generates their motion trajectories, and feeds back the results; analyzes and processes the processing results regularly, Feedback on the processing results whose recognition accuracy is lower than the threshold, upload the error data to the cloud, update and train the model in the cloud, and feed back the training parameters to the edge server for update.

Description

technical field [0001] The invention relates to a stranger intrusion detection method based on cloud-edge collaboration, and belongs to the technical field of face recognition. Background technique [0002] Park security upgrade, how to use artificial intelligence technology to realize the monitoring and early warning of the park is a problem that needs to be solved urgently, mainly including identity recognition, stranger intrusion warning, cross-camera recognition and trajectory tracking and other functions. [0003] The main technical difficulty lies in the realization of cross-camera target positioning and real-time analysis combined with pedestrian re-identification technology. Due to the location, angle and other reasons, the cameras in the park cannot always capture the face information of pedestrians. Therefore, it is usually unrealistic to rely on face recognition to find the same pedestrian in multiple cameras. Clothes will not be changed in a short period of time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V10/25G06V10/75G06V10/34G06V10/774G06V20/40G06V40/16G06K9/62G06F9/50
CPCG06F9/5072G06V40/161G06V20/42G06V10/25G06V10/267G06V10/751G06F18/214
Inventor 李雪李锐金长新王芳
Owner SHANDONG INSPUR SCI RES INST CO LTD