期刊文献+

全域智能框架下的智慧警务建设 被引量:3

Intelligent Police Work Construction Under The Framework Of Full Domain Intelligence
下载PDF
导出
摘要 随着视频技术的推陈出新,业务应用模式的不断增加,视频应用已不再是简单的查阅和检索,而是渗透到公安打击、防控、管理、控制、服务全领域,城市公共安全面临的严峻挑战对视频在全感知、全智能、全计算、融合实战等方面均提出了更高要求。着重阐述了基于深度学习的视频分析处理技术与视频监控系统融合,以提取视频中人、车、行为等结构化数据为核心,结合物联网、云计算等技术,通过构建前端智能,云端赋能,算力按需随业务场景动态调配的全域智能服务框架,实现“快速还原城市活动轨迹”的目标。将从采集、分析、处理、挖掘各个环节出发探讨海量视频资源的深度应用以及基于此基础上的“智慧警务”建设方案。 With the development of video technology,The business application mode is also increasing.Video application is no longer a simple search and retrieval,but penetrates into the whole field of public security attack,prevention and control,management and service.The severe challenges facing urban public security put forward higher requirements for video in the aspects of full perception,full intelligence,full computing and integration of actual combat.This paper focuses on the video image recognition technology,and has extracted structured data such as people,vehicle and behavior in video which as the core,Combine IoT,cloud computing and other technologies,Through the construction of front-end intelligence,cloud empowerment,and a full domain intelligent service framework that dynamically allocates computing power according to business scenarios on demand,the goal of"Quickly restore the track of city activities"is achieved.This article will discuss the"Intelligent Police Work"construction plan based on the in-depth application of massive video resources from all aspects of collection,analysis,processing,and mining.
作者 郑辉 来春丽 马立新 ZHENG Hui;LAI Chunli;Ma Lixin(Jin hua Police Department,Jinhua 321000,China;Global New Space-time(Beijing)Institute of Information Technology,Beijing 100036,China;National Engineering Laboratory For Integrated Command And Dispatch Technology,Beijing 100192,China)
出处 《数字通信世界》 2020年第11期52-55,共4页 Digital Communication World
关键词 大数据 智慧警务 全域智能 视频图像分析 视频结构化 big data intelligent police work global intelligence video image analysis structured data
  • 相关文献

参考文献2

二级参考文献179

  • 1屈志毅,苏文洲,赵玲.一种基于信息分散算法的分布式数据存储方案[J].计算机应用,2006,26(5):1102-1105. 被引量:13
  • 2存储部落.深度剖析云存储[EB/OL].(2008-09-17).[2010-08-15].http://www.sansky.net/article/2008-09-17-depth-analysis-of-storage.html.
  • 3STEVE M.Danger in the clouds[J].Network Security,2008,2008(12):9-11.
  • 4RABIN M O.Efficient dispersal of information for security,load balancing,and fault tolerance[J].Journal of the ACM,1989,1(38):335-348.
  • 5HAMAN M,HIEROUS R M.An overview of program slicing[J].Software Focus,2001,2(3):85-92.
  • 6PIANK J S,XU Lihao.Optimizing Cauchy ReedSolomon codes for fault-tolerant storage applications[C] //Proceedings of the 5th IEEE International Symposium on Network Computing and Applications.Piscataway,NJ,USA:IEEE,2006:173-180.
  • 7中国计算机用户协会.云计算中国峰会2010[EB/OL].(2010-03-25)[2010-08-10].http://www.cloudcomputingchina.org/cn/.
  • 8BOWERS K D,JUELS A,OPREA A.HAIL:a highavailability and integrity layer for cloud storage[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM,2009:489-501.
  • 9CACHIN C,KEIDAR I,SHRAER A.Trusting the cloud[J].ACM SIGACT News,2009,40 (2):455-461.
  • 10WEATHERSPOOS H,EATON P,UBIATOWlZ J.Antiquity:exploiting a secure log for wide-area distributed storage[C] // Proceedings of the Second ACM European Conference on Computer Systems.New York,USA:ACM,2007:75-89.

共引文献2438

同被引文献10

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部