Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Potential sudden criminal person identification method based on assumed evaluation and Bayesian learning

A Bayesian learning and person identification technology, applied in neural learning methods, computer systems based on knowledge-based patterns, and kernel methods, etc., can solve problems such as inability to prevent in advance, no analysis and modeling, and difficult identification.

Pending Publication Date: 2022-07-29
浙江网安信创电子技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, it is difficult to identify potential personnel who intend to commit sudden crimes in public service scenarios such as gas stations, schools, power plants, and water plants, especially for those who have no criminal record or do not have a sensitive intranet blacklist in the landing scenario Under the circumstances, it is impossible to use the current technical means to prevent in advance
[0003] The existing technology has the following deficiencies: existing intelligent security products output structured feature data extracted from video stream data, captured images, alarm information, etc. into the data, such as Kafka, ElasticSearch, MySQL, etc. source of data, but this part of high-value data is usually ignored, without further analysis and modeling based on professional business direction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Potential sudden criminal person identification method based on assumed evaluation and Bayesian learning
  • Potential sudden criminal person identification method based on assumed evaluation and Bayesian learning
  • Potential sudden criminal person identification method based on assumed evaluation and Bayesian learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. The accompanying drawings and the embodiments are only used for illustrative description, and should not be construed as a limitation on the present patent. The present invention will be further described below with reference to the accompanying drawings and the embodiments.

[0025] Taking the gas station refueling scene as an example, it is reported that some people (non-vehicle owners) will suddenly pull out the fuel gun that is refueling, and use the lighter they carry with them to ignite the fuel gun, then burn the vehicle and flee the scene. Power departments and gas companies need to know "Is there a way for dangerous elements to preven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a potential sudden criminal person identification method based on assumed evaluation and Bayesian learning, and particularly relates to the technical field of image identification. Comprising the following steps: redefining an original problem, setting a key assumption, initializing a likelihood probability and a prior probability required in a Bayesian learning model, constructing and training the Bayesian learning model, and synchronizing related information to other platforms or components in the system when a posterior probability is greater than a set threshold value. Or synchronizing the data as intelligence information to an internal network, using the data to train, verify and test a supervised learning model, using the constructed supervised learning model as an auxiliary study and judgment model, and using the model constructed according to key assumption evaluation and Bayesian learning at the same time. According to the method, the key assumption evaluation and Bayesian learning are combined to identify potential people intending to suddenly crime, and the method is further combined with a supervised learning model to solve the problems of early warning and research and judgment of such emergencies to a certain extent.

Description

technical field [0001] The present invention relates to the technical field of image recognition, and more particularly, the present invention relates to a method for identifying potential sudden criminals based on hypothesis evaluation and Bayesian learning. Background technique [0002] Sensor devices represented by cameras are widely used in real-time security monitoring scenarios. Thanks to the rapid development of artificial intelligence technology, many researchers in academia and industry have used them in smart cities and smart security scenarios. Cloud computing can extract many features in sensor stream data (such as camera video stream) in real time, and at the same time synchronize alarm information, captured images and extracted features to the background data center according to the business direction. At the same time, it is difficult to identify potential persons who intend to commit crimes in public service scenarios such as gas stations, schools, power plan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06V40/20G06V40/16G06V20/40G06V20/52G06V10/80G06V10/774G06V10/764G06V10/82G06V10/84G06K9/62G06N20/20G06N5/00G06N20/10G06N3/04G06N3/08G06Q10/06G06Q50/26
CPCG06N20/20G06N3/08G06N20/10G06Q10/0635G06Q50/265G06N5/01G06N3/044G06F18/24155G06F18/2411G06F18/2433G06F18/25G06F18/259G06F18/214
Inventor 刘晶唐梓文王淳朱昶
Owner 浙江网安信创电子技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products