CN116740830A - ETC checkout security control method and system - Google Patents

ETC checkout security control method and system Download PDF

Info

Publication number
CN116740830A
CN116740830A CN202310734585.9A CN202310734585A CN116740830A CN 116740830 A CN116740830 A CN 116740830A CN 202310734585 A CN202310734585 A CN 202310734585A CN 116740830 A CN116740830 A CN 116740830A
Authority
CN
China
Prior art keywords
data
vehicle
correction coefficient
security control
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202310734585.9A
Other languages
Chinese (zh)
Inventor
曾满
雷俊芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Puce Technology Co ltd
Original Assignee
Hangzhou Puce Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Puce Technology Co ltd filed Critical Hangzhou Puce Technology Co ltd
Priority to CN202310734585.9A priority Critical patent/CN116740830A/en
Publication of CN116740830A publication Critical patent/CN116740830A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Traffic Control Systems (AREA)

Abstract

The invention provides an ETC checkout security control method and system; wherein the method comprises the following steps: extracting bayonet structure data and vehicle data according to the first vehicle image data; detecting a target vehicle from the bayonet structure data and the vehicle data; and controlling the working state of ETC equipment according to the detection result of the target vehicle. According to the scheme, the target vehicle suspected of being rubbed with the ETC can be obtained based on the analysis of the driving image data, and the working state of the ETC equipment is switched in a targeted mode, so that the purpose of avoiding the rubbing of the ETC equipment is achieved.

Description

ETC checkout security control method and system
Technical Field
The invention relates to the technical field of ETC, in particular to an ETC checkout security control method and system.
Background
The ETC equipment greatly improves the traffic efficiency of the expressway, so that a driver obtains more convenient toll checkout experience, and the traffic condition of the expressway is greatly improved. Meanwhile, the expressway toll station has the behavior of 'rubbing' the ETC of the other vehicle, namely, the ETC of the other vehicle is quickly preempted to pass through the bayonet after being identified by the reader, so that the purpose of escaping the fee by rubbing the ETC is realized, and the behavior is extremely easy to cause traffic accidents. However, the prior art is currently not able to effectively address this behavior.
Disclosure of Invention
In order to solve the technical problems in the background art, the invention provides an ETC checkout security control method, an ETC checkout security control system, electronic equipment and a computer storage medium.
The first aspect of the invention provides an ETC checkout security control method, comprising the following steps:
extracting bayonet structure data and vehicle data according to the first vehicle image data; detecting a target vehicle from the bayonet structure data and the vehicle data; and controlling the working state of ETC equipment according to the detection result of the target vehicle.
Preferably, the method further comprises: comparing the positioning data with the high-precision map, and determining whether the positioning data is about to pass through the gate or not according to the comparison result; if so, acquiring second driving image data, and judging whether the bayonet can be extracted according to the second driving image data; if so, acquiring first driving image data.
Preferably, the first driving image data and/or the second driving image data are obtained by a driving recorder or a vehicle embedded camera.
Preferably, the bayonet structure data comprises lane structure data and inter-lane isolation roadbed structure data; the vehicle data includes vehicle position data and vehicle attitude data; the detecting a target vehicle from the bayonet structure data and the vehicle data includes: inputting the bayonet structure data and the vehicle data into a depth recognition model, wherein the depth recognition model outputs a first suspicion index of each candidate vehicle; and determining the target vehicle according to the first suspicion index.
Preferably, the method further comprises: extracting personnel data associated with the inter-lane isolation roadbed structure data according to the first driving image data; the determining the target vehicle according to the first suspicion index includes: determining a correction coefficient according to the personnel data, and correcting the first suspicion index according to the correction coefficient to obtain a second suspicion index; and judging whether the second suspicion index is larger than or equal to a first threshold value, and if so, determining the candidate vehicle as the target vehicle.
Preferably, the personnel data comprises personnel detection results and clothing characteristics; said determining a correction factor based on said personnel data comprises: if the person detection result is that a person exists, similarity calculation is carried out on the clothing features and preset clothing features; setting the correction coefficient as a first correction coefficient if the similarity is greater than or equal to a second threshold value, otherwise setting the correction coefficient as a second correction coefficient; wherein the first correction coefficient is smaller than 1, and the second correction coefficient is larger than or equal to 1.
Preferably, the method further comprises: directionally acquiring audio data corresponding to the candidate vehicle; then when the person detection result is that no person is present: judging whether the candidate vehicle is whistle or not according to the audio data, if so, setting the correction coefficient as a third correction coefficient, otherwise, setting the correction coefficient as a fourth correction coefficient; wherein the third correction coefficient is smaller than 1, and the fourth correction coefficient is larger than or equal to 1.
The second aspect of the invention provides an ETC checkout security control system, which comprises an acquisition module, a processing module and a storage module, wherein the processing module is connected with the acquisition module and the storage module; wherein the memory module is configured to store executable computer program code; the acquisition module is used for acquiring driving data according to the control instruction of the processing module; the method is characterized in that: the processing module is configured to perform the method as described above by invoking the executable computer program code in the storage module.
A third aspect of the present invention provides an electronic device comprising: a memory storing executable program code; a processor coupled to the memory; the processor invokes the executable program code stored in the memory to perform the method of any one of the preceding claims.
A fourth aspect of the invention provides a computer storage medium having stored thereon a computer program which, when executed by a processor, performs a method as claimed in any one of the preceding claims.
In the scheme of the invention, the bayonet structure data and the vehicle data are extracted according to the first vehicle image data; detecting a target vehicle from the bayonet structure data and the vehicle data; and controlling the working state of ETC equipment according to the detection result of the target vehicle. According to the scheme, the target vehicle suspected of being rubbed with the ETC can be obtained based on the analysis of the driving image data, and the working state of the ETC equipment is switched in a targeted mode, so that the purpose of avoiding the rubbing of the ETC equipment is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an ETC checkout security control method disclosed in an embodiment of the invention;
FIG. 2 is a schematic diagram of an ETC checkout security control system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown, although the exemplary embodiments may be practiced in various specific ways. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, capabilities, effects, or other features described in a particular embodiment may be incorporated in one or more other embodiments in any suitable manner without departing from the spirit of the present invention.
In describing particular embodiments, specific details of construction, performance, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by those skilled in the art. It is not excluded, however, that one skilled in the art may implement the present invention in a particular situation in a solution that does not include the structures, properties, effects, or other characteristics described above.
The flow diagrams in the figures are merely exemplary flow illustrations and do not represent that all of the elements, operations, and steps in the flow diagrams must be included in the aspects of the invention, nor that the steps must be performed in the order shown in the figures. For example, some operations/steps in the flowcharts may be decomposed, some operations/steps may be combined or partially combined, etc., and the order of execution shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus repeated descriptions of the same or similar elements, components or portions may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these terms. That is, these phrases are merely intended to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention. Furthermore, the term "and/or," "and/or" is meant to include all combinations of any one or more of the items listed.
Embodiment one: referring to fig. 1, fig. 1 is a flow chart of an ETC checkout security control method according to an embodiment of the invention. As shown in fig. 1, the ETC checkout security control method according to the embodiment of the invention includes the following steps: extracting bayonet structure data and vehicle data according to the first vehicle image data; detecting a target vehicle from the bayonet structure data and the vehicle data; and controlling the working state of ETC equipment according to the detection result of the target vehicle.
In this step, the ETC devices of the prior art are all in a normally open state, which results in an easy to be rubbed ETC by him, i.e. the technical problems referred to in the foregoing background art. In view of this, the present invention uses the driving image captured by the vehicle-mounted image capturing device to analyze the front gate structure data and the vehicle data, so that it is possible to analyze which vehicles are suspected target vehicles with ETC, and correspondingly switch the working state of the ETC device according to the detection result, for example, when it is analyzed that a certain vehicle in front is suspected, the ETC device may be switched to the off state (the device itself is powered off, or the reading module of the charging card is disconnected). Therefore, the scheme of the invention can obtain the target vehicle with the scratch ETC suspicion based on the analysis of the driving image data, and further pertinently switch the working state of the ETC equipment, thereby achieving the purpose of avoiding the ETC equipment from being scratched.
In addition, the scheme of the invention can be applied to expressway scenes, and other application scenes such as scenic spots, communities, charging bayonets of parks and the like can be easily obtained by a person skilled in the art.
It should be noted that, the scheme of the present invention may be implemented in the ETC device itself, and accordingly, the ETC device has a processing module and a communication module in addition to the original settlement-related module, where the communication module is used to connect with the vehicle-mounted image acquisition device to receive the driving image data. Of course, the communication and processing functions described above may be implemented in the vehicle itself, that is, by a processing terminal of a vehicle computer, for example, provided in the vehicle itself. In addition, the method can also be implemented on various types of in-vehicle mobile terminals, such as mobile phones, computers, tablet computers, wearable devices, virtual reality devices and the like, and detailed description thereof is omitted.
Preferably, the method further comprises: comparing the positioning data with the high-precision map, and determining whether the positioning data is about to pass through the gate or not according to the comparison result; if so, acquiring second driving image data, and judging whether the bayonet can be extracted according to the second driving image data; if so, acquiring first driving image data.
In this step, because ETC charging/checkout is performed at the gate (i.e. the toll gate), the present invention determines whether the front is about to pass the gate by comparing the positioning data of the vehicle with the high-precision map, at this time, the acquisition of the second traffic image data may be triggered, whether the gate is actually present is determined, and the gates that have been removed but the high-precision map has not been updated are excluded, and accordingly, the acquisition of the first traffic image data may be triggered when the gate is identified based on the second traffic image data. By the arrangement, invalid identification of the first driving image data can be avoided, and the data processing amount is reduced.
When the vehicle is detected, the suitable first driving image data acquisition time can be calculated according to the distance between the vehicle and the speed of the vehicle.
Preferably, the first driving image data and/or the second driving image data are obtained by a driving recorder or a vehicle embedded camera.
In this step, the running image data may be acquired by the above-described two kinds of vehicle-mounted image acquisition apparatuses, wherein the vehicle-mounted camera may be a camera equipped at the time of shipment of the vehicle, for example, a camera for running records, driving assistance, and the like.
Preferably, the bayonet structure data comprises lane structure data and inter-lane isolation roadbed structure data; the vehicle data includes vehicle position data and vehicle attitude data; the detecting a target vehicle from the bayonet structure data and the vehicle data includes: inputting the bayonet structure data and the vehicle data into a depth recognition model, wherein the depth recognition model outputs a first suspicion index of each candidate vehicle; and determining the target vehicle according to the first suspicion index.
In this step, a vehicle to be rubbed ETC generally waits in a region in front of the ETC channel, and after the ETC device of the following vehicle is identified, the vehicle quickly drives into the corresponding ETC channel, thereby rubbing ETC. Meanwhile, the behavior characteristics of different vehicles in the process of executing the ETC are different, and the ETC behavior database is difficult to build in an enumeration mode. Therefore, the depth recognition model is built, and the depth recognition model is trained by utilizing the behavior characteristics and the bayonet structure characteristics of the real vehicle rubbing ETC scene obtained through various ways, so that the relation among the vehicle data, the bayonet structure data and the suspicion index of the rubbing ETC can be built.
The depth recognition model may be built by using various algorithms in the prior art, for example, a hybrid network consisting of a recurrent neural network (Recurrent Neural Network, RNN), a convolutional neural network (Convolutional Neural Network, CNN), long-term short-term memory (Long-Short Term Memory, LSTM) and CNN, and the specific building method is not described herein.
Preferably, the method further comprises: extracting personnel data associated with the inter-lane isolation roadbed structure data according to the first driving image data; the determining the target vehicle according to the first suspicion index includes: determining a correction coefficient according to the personnel data, and correcting the first suspicion index according to the correction coefficient to obtain a second suspicion index; and judging whether the second suspicion index is larger than or equal to a first threshold value, and if so, determining the candidate vehicle as the target vehicle.
In this step, the driving behavior of the vehicle in front of the etc. channel may be "abnormal" due to various reasons, for example, the ETC reader or the barrier may fail, so that the candidate vehicle stays in front of the etc. channel, and at this time, the first suspicion index output by the depth recognition model may be too high, which may cause erroneous judgment to the candidate vehicle. In order to solve the problem, the method further obtains personnel data related to the inter-lane isolation roadbed structure data, and corrects the first suspicion index based on the personnel data, so as to obtain a more accurate second suspicion index.
Preferably, the personnel data comprises personnel detection results and clothing characteristics; said determining a correction factor based on said personnel data comprises: if the person detection result is that a person exists, similarity calculation is carried out on the clothing features and preset clothing features; setting the correction coefficient as a first correction coefficient if the similarity is greater than or equal to a second threshold value, otherwise setting the correction coefficient as a second correction coefficient; wherein the first correction coefficient is smaller than 1, and the second correction coefficient is larger than or equal to 1.
In this step, when the ETC reader or the barrier gate fails, the candidate vehicle is retained in front of the ETC channel, and at this time, if a worker wearing a related uniform appears on the lane separation roadbed, the authenticity of the failure condition can be confirmed, and accordingly, the suspicion index of the candidate vehicle should be adjusted down, or otherwise, adjusted up or not.
Preferably, the method further comprises: directionally acquiring audio data corresponding to the candidate vehicle; then when the person detection result is that no person is present: judging whether the candidate vehicle is whistle or not according to the audio data, if so, setting the correction coefficient as a third correction coefficient, otherwise, setting the correction coefficient as a fourth correction coefficient; wherein the third correction coefficient is smaller than 1, and the fourth correction coefficient is larger than or equal to 1.
In this step, when the foregoing malfunction does exist, the candidate vehicle may output a malfunction alert by means of a whistle before the relevant staff member is treated. In view of this phenomenon, when no relevant staff is detected, the invention further judges whether the candidate vehicle is whistling, if so, the authenticity of the fault is judged to be high, and accordingly, the suspicion index of the candidate vehicle is required to be adjusted down, otherwise, the suspicion index of the candidate vehicle is required to be adjusted up or not.
It should be noted that, the presence of the staff member is more reliable than the judgment of the fault authenticity by the whistle, so the third correction coefficient should be set to be larger than the first correction coefficient, and the fourth correction coefficient should be larger than the second correction coefficient.
Embodiment two: referring to fig. 2, fig. 2 is a schematic structural diagram of an ETC checkout security control system according to an embodiment of the invention. As shown in fig. 2, the ETC checkout security control system of the embodiment of the invention comprises an acquisition module (101), a processing module (102) and a storage module (103), wherein the processing module (102) is connected with the acquisition module (101) and the storage module (103); wherein the memory module (103) is adapted to store executable computer program code; the acquisition module (101) is used for acquiring driving data according to the control instruction of the processing module (102); the method is characterized in that: the processing module (102) is configured to execute the method according to embodiment one by invoking the executable computer program code in the storage module (103).
For specific functions of the ETC checkout security control system in this embodiment, reference is made to the first embodiment, and since the system in this embodiment adopts all the technical solutions of the foregoing embodiments, at least the technical solutions of the foregoing embodiments have all the beneficial effects, and will not be described in detail herein.
Embodiment III: referring to fig. 3, an embodiment of the present invention further provides an electronic device, including: a memory storing executable program code; a processor coupled to the memory; the processor invokes the executable program code stored in the memory to perform the method as described in embodiment one.
Embodiment four: the embodiment of the invention also discloses a computer storage medium, and a computer program is stored on the storage medium, and when the computer program is run by a processor, the computer program executes the method in the embodiment one.
The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer readable medium to carry out the above-described method of the present invention, namely: the configuration service management provided by the service end generates a configuration file related to the domain name; when the domain name fault occurs during the service requesting process, the client side updates the configuration file to realize the automatic switching of domain name access.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, comprising several instructions to cause a data processing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the present invention.
The computer readable medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention may be implemented in a method, system, electronic device, or computer readable medium that executes a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP).
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. An ETC checkout security control method is characterized by comprising the following steps: extracting bayonet structure data and vehicle data according to the first vehicle image data; detecting a target vehicle from the bayonet structure data and the vehicle data; and controlling the working state of ETC equipment according to the detection result of the target vehicle.
2. The ETC checkout security control method according to claim 1, wherein: the method further comprises the steps of: comparing the positioning data with the high-precision map, and determining whether the positioning data is about to pass through the gate or not according to the comparison result; if so, acquiring second driving image data, and judging whether the bayonet can be extracted according to the second driving image data; if so, acquiring first driving image data.
3. The ETC checkout security control method according to claim 2, wherein: the first driving image data and/or the second driving image data are obtained through a driving recorder or a vehicle embedded camera.
4. A method of ETC checkout security control according to any of claims 1-3, wherein: the gate structure data comprises lane structure data and inter-lane isolation roadbed structure data; the vehicle data includes vehicle position data and vehicle attitude data; the detecting a target vehicle from the bayonet structure data and the vehicle data includes: inputting the bayonet structure data and the vehicle data into a depth recognition model, wherein the depth recognition model outputs a first suspicion index of each candidate vehicle; and determining the target vehicle according to the first suspicion index.
5. The ETC checkout security control method according to claim 4, wherein: the method further comprises the steps of: extracting personnel data associated with the inter-lane isolation roadbed structure data according to the first driving image data; the determining the target vehicle according to the first suspicion index includes: determining a correction coefficient according to the personnel data, and correcting the first suspicion index according to the correction coefficient to obtain a second suspicion index; and judging whether the second suspicion index is larger than or equal to a first threshold value, and if so, determining the candidate vehicle as the target vehicle.
6. The ETC checkout security control method according to claim 5, wherein: the personnel data comprise personnel detection results and clothing characteristics; said determining a correction factor based on said personnel data comprises: if the person detection result is that a person exists, similarity calculation is carried out on the clothing features and preset clothing features; setting the correction coefficient as a first correction coefficient if the similarity is greater than or equal to a second threshold value, otherwise setting the correction coefficient as a second correction coefficient; wherein the first correction coefficient is smaller than 1, and the second correction coefficient is larger than or equal to 1.
7. The ETC checkout security control method according to claim 6, wherein: the method further comprises the steps of: directionally acquiring audio data corresponding to the candidate vehicle; then when the person detection result is that no person is present: judging whether the candidate vehicle is whistle or not according to the audio data, if so, setting the correction coefficient as a third correction coefficient, otherwise, setting the correction coefficient as a fourth correction coefficient; wherein the third correction coefficient is smaller than 1, and the fourth correction coefficient is larger than or equal to 1.
8. The ETC checkout security control system comprises an acquisition module, a processing module and a storage module, wherein the processing module is connected with the acquisition module and the storage module; wherein the memory module is configured to store executable computer program code; the acquisition module is used for acquiring driving data according to the control instruction of the processing module; the method is characterized in that: the processing module for performing the method of any of claims 1-7 by invoking the executable computer program code in the storage module.
9. An electronic device, comprising: a memory storing executable program code; a processor coupled to the memory; the method is characterized in that: the processor invokes the executable program code stored in the memory to perform the method of any of claims 1-7.
10. A computer storage medium having a computer program stored thereon, characterized in that: the computer program, when executed by a processor, performs the method of any of claims 1-7.
CN202310734585.9A 2023-06-20 2023-06-20 ETC checkout security control method and system Withdrawn CN116740830A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310734585.9A CN116740830A (en) 2023-06-20 2023-06-20 ETC checkout security control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310734585.9A CN116740830A (en) 2023-06-20 2023-06-20 ETC checkout security control method and system

Publications (1)

Publication Number Publication Date
CN116740830A true CN116740830A (en) 2023-09-12

Family

ID=87913040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310734585.9A Withdrawn CN116740830A (en) 2023-06-20 2023-06-20 ETC checkout security control method and system

Country Status (1)

Country Link
CN (1) CN116740830A (en)

Similar Documents

Publication Publication Date Title
CN109343061B (en) Sensor calibration method and device, computer equipment, medium and vehicle
CN109325964B (en) Face tracking method and device and terminal
CN110705405B (en) Target labeling method and device
CN108038176B (en) Method and device for establishing passerby library, electronic equipment and medium
CN111145214A (en) Target tracking method, device, terminal equipment and medium
CN112085952A (en) Vehicle data monitoring method and device, computer equipment and storage medium
CN114155284A (en) Pedestrian tracking method, device, equipment and medium based on multi-target pedestrian scene
CN113780243B (en) Training method, device, equipment and storage medium for pedestrian image recognition model
CN113657299A (en) Traffic accident determination method and electronic equipment
US20180268247A1 (en) System and method for detecting change using ontology based saliency
CN108304852B (en) Method and device for determining road section type, storage medium and electronic device
CN110363193B (en) Vehicle weight recognition method, device, equipment and computer storage medium
WO2024098992A1 (en) Vehicle reversing detection method and apparatus
CN116740830A (en) ETC checkout security control method and system
CN106682611A (en) Image processing method and apparatus
CN110728229A (en) Image processing method, device, equipment and storage medium
CN110659384B (en) Video structured analysis method and device
CN115100419B (en) Target detection method and device, electronic equipment and storage medium
CN114708557B (en) Electric power construction monitoring method and system based on air-ground communication
CN111401224B (en) Target detection method and device and electronic equipment
CN116758775B (en) Parking space state judging method and system
CN114120160B (en) Object space distinguishing method and device based on fast-RCNN, computer equipment and storage medium
CN116959026A (en) Object detection method, device, apparatus, storage medium and computer program product
CN113657298A (en) Pedestrian intrusion identification method, device, equipment and medium based on large displacement tracking
CN112907959A (en) Electronic eye management method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20230912