[go: up one dir, main page]

CN107944344A - Power supply enterprise's construction mobile security supervision platform - Google Patents

Power supply enterprise's construction mobile security supervision platform Download PDF

Info

Publication number
CN107944344A
CN107944344A CN201711032274.9A CN201711032274A CN107944344A CN 107944344 A CN107944344 A CN 107944344A CN 201711032274 A CN201711032274 A CN 201711032274A CN 107944344 A CN107944344 A CN 107944344A
Authority
CN
China
Prior art keywords
msub
mrow
mtd
mtr
mover
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711032274.9A
Other languages
Chinese (zh)
Inventor
张旭阳
章伟林
姚建立
张学军
童国峰
樊建惠
魏春晖
章启鸿
张毅磊
董继明
黄苏
章琦
杨炀
柳怡晨
傅力帅
林泽科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Electric Power Co Ltd
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
State Grid Zhejiang Electric Power Co Ltd
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Electric Power Co Ltd, Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical State Grid Zhejiang Electric Power Co Ltd
Priority to CN201711032274.9A priority Critical patent/CN107944344A/en
Publication of CN107944344A publication Critical patent/CN107944344A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Water Supply & Treatment (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Public Health (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a kind of power supply enterprise's construction mobile security supervision platform, cloud platform including intelligent mobile terminal and with intelligent mobile terminal communication connection, the cloud platform is equipped with the face sample unit of the facial image of storage power supply enterprise on-site personnel and the personnel safety access unit of personnel's access information is sent to intelligent terminal, the intelligent mobile terminal is equipped with face recognition module, the face recognition module is used to identify whether the access facial image sent with personnel safety access unit matches the personnel for entering scene, to determine whether to allow the personnel to enter scene.The present invention further strengthens construction site safety supervision management and control dynamics, standard construction operation, guarantees personal safety using state-of-the-art technologies such as 4G wireless networks, intelligent mobile terminal, cloud computing, recognitions of face.

Description

供电企业施工移动安全监督平台Construction mobile safety supervision platform for power supply enterprises

技术领域technical field

本发明涉及电力施工安全监督技术领域,具体用于对进入施工现场的人员进行人脸识别。The invention relates to the technical field of electric power construction safety supervision, and is specifically used for face recognition of personnel entering a construction site.

背景技术Background technique

近年来,在供电企业日益重视对外协队伍人员身份的管理,以避免外协队伍人员频繁更换所带来的安全风险,主要采用以下几种方式:In recent years, power supply enterprises have paid more and more attention to the management of the identity of the external cooperation team members, in order to avoid the security risks caused by the frequent replacement of the external cooperation team personnel, mainly adopt the following methods:

1、二维码:通过二维码和照片唯一标识外协队伍人员,在检查时,通过扫描二维码进行身份识别,存在效率低,容易伪造等问题。1. QR code: Use QR codes and photos to uniquely identify outsourcing team members. During inspections, scan QR codes for identification, which has problems such as low efficiency and easy forgery.

2、无源RFID技术:通过无源RFID卡来唯一标识外协队伍人员,在检查时,通过手持终端非接触扫描进行身份识别,效率较高,但可能存在人卡不一致的情况,且需要手持终端具有rfid读取功能。2. Passive RFID technology: Passive RFID cards are used to uniquely identify the personnel of the outsourcing team. During the inspection, the identification is carried out through non-contact scanning of the handheld terminal, which is more efficient, but there may be inconsistencies between the people and cards, and it needs to be held The terminal has rfid reading function.

3、有源RFID技术:通过有源RFID来唯一标示外协队伍人员,在检查时,可远距离、批量对身份进行识别,效率高,但有源rfid卡和扫描终端成本较高。3. Active RFID technology: Active RFID is used to uniquely mark the personnel of the outsourcing team. During the inspection, the identity can be identified remotely and in batches, which is efficient, but the cost of active RFID cards and scanning terminals is high.

4、指纹识别技术:基于指纹识别对外协队伍人员进行身份识别,效率高,但需手持终端单独配置指纹识别模块。4. Fingerprint identification technology: It is efficient to identify the personnel of the foreign cooperation team based on fingerprint identification, but the handheld terminal needs to be equipped with a fingerprint identification module separately.

当前,人脸识别产品已广泛应用于金融、司法、军队、公安、边检、政府、航天、电力、工厂、教育、医疗及众多企事业单位等领域。因此,将人脸识别技术推广应用到供电企业,对外协队伍人员身份的管理,具有现实意义。At present, face recognition products have been widely used in finance, justice, military, public security, border inspection, government, aerospace, electric power, factories, education, medical care and many enterprises and institutions. Therefore, it is of practical significance to promote the application of face recognition technology to power supply enterprises and manage the identity of foreign cooperation team members.

人脸识别系统通过识别算法,抽取输入静态或动态图像的人脸,从而确定人的身份,具有广泛的应用前景。典型的人脸自动识别系统(Face RecognitionSystem,FRS)一般由以下几个基本环节组成:预处理环节、人脸检测环节、特征提取环节以及分类识别环节:The face recognition system extracts the face of the input static or dynamic image through the recognition algorithm, so as to determine the identity of the person, and has a wide application prospect. A typical face recognition system (Face Recognition System, FRS) generally consists of the following basic links: preprocessing link, face detection link, feature extraction link and classification recognition link:

1、预处理输入人脸图像。其中预处理方法包括图像滤波、区域分割、灰度和尺度归一化、人脸对齐、直方图均衡化和局部二进制模式等。1. Preprocess the input face image. The preprocessing methods include image filtering, region segmentation, grayscale and scale normalization, face alignment, histogram equalization, and local binary patterns.

2、对预处理化后图像检测是否包括人脸,如果检测到则将人脸从背景分离并确定其数量、位置和大小。根据提取检测特征的方式的不同,可将现有人脸检测方法大致分为三类:基于统计学习的人脸检测方法、基于知识的人脸检测方法和基于模版匹配的人脸检测方法,前者因其适应性和稳定性成为流行的人脸检测方法。2. Detect whether the preprocessed image includes a human face, if detected, separate the human face from the background and determine its number, position and size. According to the different ways of extracting detection features, existing face detection methods can be roughly divided into three categories: face detection methods based on statistical learning, face detection methods based on knowledge, and face detection methods based on template matching. Its adaptability and stability become a popular face detection method.

3、提取待识别人脸图像中表示人脸本质的特征,并要求所提取特征在表情、遮挡、视角和光照等条件下有较好的鲁棒性。人脸特征提取的常用方法主要包括基于几何空间的人脸特征提取方法、基于子空间的人脸特征提取方法、基于神经网络的人脸特征提取方法、基于弹性图匹配的人脸特征提取方法和基于隐性马尔科夫的人脸特征提取方法。3. Extract the features that represent the essence of the face in the face image to be recognized, and require the extracted features to have better robustness under conditions such as expression, occlusion, viewing angle, and illumination. The common methods of face feature extraction mainly include face feature extraction method based on geometric space, face feature extraction method based on subspace, face feature extraction method based on neural network, face feature extraction method based on elastic graph matching and Face feature extraction method based on hidden Markov.

4、将待识别人脸特征与数据库中已知人脸的特征相比较,匹配得出识别结果。常用的分类器有基于最近邻的分类器、基于支持向量机的分类器、基于神经网络的分类器等。4. Compare the features of the face to be recognized with the features of known faces in the database, and match them to obtain the recognition result. Commonly used classifiers are classifiers based on nearest neighbors, classifiers based on support vector machines, and classifiers based on neural networks.

当前人脸识别算法对拍摄环境、角度要求高,识别效率低,应用在现场作业施工管理上存在较大的技术困难。The current face recognition algorithm has high requirements on the shooting environment and angle, and the recognition efficiency is low. There are great technical difficulties in the application of on-site construction management.

发明内容Contents of the invention

本发明所要解决的技术问题是,针对当前人脸识别算法对拍摄环境、角度要求高,识别效率低,提供一种供电企业施工移动安全监督平台,提高复杂环境下人脸识别的准确率和效率。The technical problem to be solved by the present invention is to provide a construction mobile safety supervision platform for power supply enterprises to improve the accuracy and efficiency of face recognition in complex environments in view of the current face recognition algorithm that has high requirements on shooting environment and angle and low recognition efficiency .

为解决上述技术问题,本发明采用如下技术方案:供电企业施工移动安全监督平台,包括智能移动终端以及与智能移动终端通讯连接的云平台,所述云平台设有存储供电企业现场作业人员的人脸图像的人脸样本单元以及向智能终端发送人员准入信息的人员安全准入单元,所述智能移动终端设有人脸识别模块,所述人脸识别模块用于识别进入现场的人员是否与人员安全准入单元发送的准入人脸图像匹配,以判定是否允许该人员进入现场;其中,人脸识别模块进行人脸识别的方法包括如下步骤,In order to solve the above-mentioned technical problems, the present invention adopts the following technical solutions: the construction mobile safety supervision platform of the power supply enterprise includes an intelligent mobile terminal and a cloud platform connected to the intelligent mobile terminal, and the cloud platform is provided with a personal computer for storing the on-site operators of the power supply enterprise. The face sample unit of the face image and the personnel security access unit that sends personnel access information to the intelligent terminal, the intelligent mobile terminal is provided with a face recognition module, and the face recognition module is used to identify whether the personnel entering the scene are compatible with personnel The access face image sent by the security access unit is matched to determine whether the person is allowed to enter the scene; wherein, the method for face recognition by the face recognition module includes the following steps,

步骤一,根据人脸训练样本,构造超完备字典 Step 1: Construct a super-complete dictionary based on face training samples

步骤二,将测试图像按序排成列向量x;Step 2, arrange the test images into a column vector x in sequence;

步骤三,根据超完备字典ψ设计测量矩阵Φ;Step 3, design the measurement matrix Φ according to the over-complete dictionary ψ;

步骤四,在Φ下将x投影得到测量向量y,并求得 Step 4, project x under Φ to obtain the measurement vector y, and obtain

步骤五,将求得的代入式Step five, the obtained Substitution

从而求得输入测试样本的判别结果。In this way, the discriminant result of the input test sample is obtained.

优选的,步骤一中,假设有K类不同的人脸,每幅训练人脸图像按序拉成N×1维的列向量ψ,并分别进行l2范数归一化处理,即ψ∈RN×1且||ψ||2=1,记为一个原子,从每类人脸训练样本中都选择L个不同训练样本按列形成该类人脸样本矩阵i=1,2,…,K,得到选择的训练样本总数n=KL,将这些矩阵按序合并成超完备字典:Preferably, in step 1, assuming that there are K different types of faces, each training face image is sequentially pulled into an N×1-dimensional column vector ψ, and the l2 norm normalization process is performed respectively, that is, ψ∈ R N×1 and ||ψ|| 2 = 1, recorded as an atom, select L different training samples from each type of face training samples to form the face sample matrix of this type i=1,2,...,K, get the total number of selected training samples n=KL, and merge these matrices into a super-complete dictionary in order:

优选的,对任意输入的测试人脸样本,将其按序拉成列向量x∈RN×1,则x在字典Ψ下表示为:Preferably, for any input test face sample, pull it into a column vector x∈R N×1 in order, then x is expressed under the dictionary Ψ as:

x=Ψα+z (4.2)x=Ψα+z (4.2)

其中α∈Rn×1为稀疏表示向量,z∈RN×1是表示误差。Among them, α∈R n×1 is a sparse representation vector, and z∈R N×1 is an error representation.

优选的,基于CS理论,将测试样本x进行压缩投影得到投影向量y∈RM×1(M<N),即Preferably, based on the CS theory, the test sample x is compressed and projected to obtain a projection vector y∈RM ×1 (M<N), namely

y=Φx=ΦΨα+Φz=Dα+e (4.3)y=Φx=ΦΨα+Φz=Dα+e (4.3)

其中Φ∈RM×N为设计好的具有一定性质的测量矩阵,D=ΦΨ∈RM×n表示等效字典,e=Φz∈RM×1为投影域误差,定义对任意i,αi∈RL×1,从而将式(4.3)重新表述为:where Φ∈RM ×N is a designed measurement matrix with certain properties, D=ΦΨ∈RM ×n represents an equivalent dictionary, e=Φz∈RM ×1 is the error in the projection domain, and the definition For any i, α i ∈ R L×1 , so formula (4.3) can be re-expressed as:

y=Φ(ψ1α12α2+…+ψkαk)+e (4.4)。y=Φ(ψ 1 α 12 α 2 + . . . +ψ k α k )+e (4.4).

优选的,对于某一个i,令Di=ΦΨi∈RM×L,式(4.5)代价函数转化为:Preferably, for a certain i, let D i =ΦΨ i ∈ R M×L , the cost function of formula (4.5) is transformed into:

设Di的奇异值分解如下式所示:Let the singular value decomposition of D i be as follows:

其中将式(4.8)代入(4.7),得到in Substituting (4.8) into (4.7), we get

make

其中的尺寸均为式(4.9)展开为:in and The size is Equation (4.9) expands to:

上式等号右边第二项与αi无关,因此当The second term on the right side of the above equation has nothing to do with α i , so when

时,式(4.10)取最小值,此时,式(4.5)的解为:, formula (4.10) takes the minimum value, and at this time, the solution of formula (4.5) is:

其中Vi、∑i分别由测量矩阵、字典及输入测试样本投影值求得,为任意尺寸为的向量。where V i , ∑ i and are obtained from the measurement matrix, dictionary and input test sample projection values respectively, for any size of vectors.

优选的,将i从1遍历至K,求得所有后,通过式(4.6)即可求得测试样本类别 Preferably, traverse i from 1 to K to find all After that, the test sample category can be obtained by formula (4.6)

优选的,根据判别结果重构输入的测试样本从而重排列求得重构图像。Preferably, the input test sample is reconstructed according to the discriminant result Thereby rearranging to obtain the reconstructed image.

优选的,对于需要临时进入现场的人员,所述人员安全准入单元向智能移动终端发送临时准入许可,且设定一年内临时准入次数不应超过2次。Preferably, for personnel who need to temporarily enter the site, the personnel security access unit sends a temporary access permit to the smart mobile terminal, and sets the number of temporary access within a year to no more than 2 times.

优选的,对于需要取消准入资格的人员,所述人员安全准入单元向智能移动终端发送取消准入的信息。Preferably, for a person whose admission qualification needs to be canceled, the personnel security admission unit sends information about canceling admission to the smart mobile terminal.

本发明利用4G无线网络、智能移动终端、云计算、人脸识别等最新技术,进一步加强施工现场安全监督管控力度,规范施工作业,保障人身安全。The present invention utilizes the latest technologies such as 4G wireless network, intelligent mobile terminal, cloud computing, and face recognition to further strengthen the safety supervision and control of construction sites, standardize construction operations, and ensure personal safety.

通过人脸识别技术实现对现场作业施工人员、管理人员的人脸识别,一方面通过测量矩阵投影,使传输和计算的数据减少,提高了计算效率,减少了存储消耗,另一方面,可提高复杂环境下人脸识别的准确率和效率。The face recognition of on-site construction personnel and management personnel is realized through face recognition technology. On the one hand, through the measurement matrix projection, the transmission and calculation data are reduced, the calculation efficiency is improved, and the storage consumption is reduced. On the other hand, it can improve The accuracy and efficiency of face recognition in complex environments.

具体实施方式Detailed ways

本发明解决当前人脸识别算法对拍摄环境、角度要求高,识别效率低的问题,提高复杂环境下人脸识别的准确率和效率,实现对现场作业施工人员、管理人员的人脸识别。从而,防止外协施工人员随意变更,防止存在严重违章历史记录的外协施工人员进行现场作业,职能核查施工人员到岗情况,杜绝“工作负责人、安全员”未到现场的情况发生。The invention solves the problems that the current face recognition algorithm has high requirements on the shooting environment and angle, and the recognition efficiency is low, improves the accuracy and efficiency of face recognition in complex environments, and realizes the face recognition of on-site construction workers and management personnel. Therefore, it prevents outsourced construction personnel from changing at will, prevents outsourced construction personnel with serious violation records from performing on-site operations, and checks the arrival of construction personnel on a functional basis, so as to prevent the occurrence of "work leaders and safety personnel" not arriving on site.

供电企业施工移动安全监督平台,包括智能移动终端以及与智能移动终端通讯连接的云平台,所述云平台设有存储供电企业现场作业人员的人脸图像的人脸样本单元以及向智能终端发送人员准入信息的人员安全准入单元,所述智能移动终端设有人脸识别模块,所述人脸识别模块用于识别进入现场的人员是否与人员安全准入单元发送的准入人脸图像匹配,以判定是否允许该人员进入现场。The construction mobile safety supervision platform of the power supply enterprise includes an intelligent mobile terminal and a cloud platform communicating with the intelligent mobile terminal. The personnel security access unit of the access information, the intelligent mobile terminal is provided with a face recognition module, and the face recognition module is used to identify whether the personnel entering the scene match the admission face image sent by the personnel security access unit, To determine whether to allow the person to enter the scene.

其中,(3)人员安全准入:在所有从事电力生产相关专业工作的生产员工参加安全技能等级评价考试和外包单位关键岗位人员(工作票签发人、工作负责人)安全规程普考后,由项目组织单位将考试合格人员的信息录入系统,并进行人脸采集。Among them, (3) Personnel safety access: After all production employees engaged in electric power production-related professional work have participated in the safety skill level evaluation test and the general examination of safety regulations for personnel in key positions of outsourcing units (work ticket issuers and work leaders), the The project organization unit will enter the information of the qualified personnel into the system and collect the faces.

(4)临时人员准入:需要临时进入公司生产经营区域内施工作业的外包单位,由工程组织单位将外包单位企业信息、工程项目信息录入系统,工程组织单位或设备运维管理单位对其作业人员进行安规考试,考试合格后将关键岗位人员信息临时准入,录入系统,制作临时施工作业证IC卡,同一工作负责人一年内临时准入次数不应超过2次。(4) Temporary personnel access: For outsourcing units that need to temporarily enter the company's production and operation area for construction operations, the engineering organization unit will enter the outsourcing unit's enterprise information and engineering project information into the system, and the engineering organization unit or equipment operation and maintenance management unit will work on it After the personnel pass the safety examination, the personnel information of the key positions will be temporarily admitted into the system, and the temporary construction operation certificate IC card will be made. The number of temporary access for the same person in charge within a year should not exceed 2 times.

(5)人员准入动态调整:结合生产员工、外包单位工作负责人的现场安全情况、日常违章情况等,对其安全技能等级进行调整,甚至取消准入资格。(5) Dynamic adjustment of personnel access: adjust the safety skill level of production employees and the person in charge of the outsourcing unit based on their on-site safety conditions and daily violations, or even cancel their access qualifications.

对于需要临时进入现场的人员,所述人员安全准入单元向智能移动终端发送临时准入许可,且设定一年内临时准入次数不应超过2次。对于需要取消准入资格的人员,所述人员安全准入单元向智能移动终端发送取消准入的信息。For personnel who need to temporarily enter the site, the personnel security access unit sends a temporary access permit to the smart mobile terminal, and sets the number of temporary access within a year to no more than 2 times. For the personnel whose admission qualification needs to be canceled, the personnel security admission unit sends the information of canceling the admission to the smart mobile terminal.

基于压缩感知的人脸识别算法用已经标识好的人脸训练样本来组成超完备字典。假设有K类不同的人脸,每幅训练人脸图像按序拉成N×1维的列向量ψ,并分别进行l2范数归一化处理,即ψ∈RN×1且||ψ||2=1,记为一个原子。从每类人脸训练样本中都选择L个不同训练样本按列形成该类人脸样本矩阵i=1,2,…,K。可以得到选择的训练样本总数n=KL。将这些矩阵按序合并成超完备字典:The face recognition algorithm based on compressed sensing uses the marked face training samples to form an over-complete dictionary. Assuming that there are K different types of faces, each training face image is sequentially pulled into an N×1-dimensional column vector ψ, and the l 2 norm normalization process is performed respectively, that is, ψ∈R N×1 and || ψ|| 2 =1, recorded as an atom. From each type of face training samples, L different training samples are selected to form the face sample matrix of this type by column i=1,2,...,K. The total number of selected training samples n=KL can be obtained. Merge these matrices sequentially into an overcomplete dictionary:

对任意输入的测试人脸样本,将其按序拉成列向量x∈RN×1,则x在字典Ψ下可以表示为:For any input test face sample, pull it into a column vector x∈R N×1 in order, then x can be expressed as:

x=Ψα+z (4.2)x=Ψα+z (4.2)

其中α∈Rn×1为稀疏表示向量,z∈RN×1是表示误差。基于CS理论,将测试样本x进行压缩投影得到投影向量y∈RM×1(M<N),即Among them, α∈R n×1 is a sparse representation vector, and z∈R N×1 is an error representation. Based on the CS theory, the test sample x is compressed and projected to obtain the projection vector y∈RM ×1 (M<N), namely

y=Φx=ΦΨα+Φz=Dα+e (4.3)y=Φx=ΦΨα+Φz=Dα+e (4.3)

其中Φ∈RM×N为设计好的具有一定性质的测量矩阵,D=ΦΨ∈RM×n表示等效字典,e=Φz∈RM×1为投影域误差。定义对任意i,αi∈RL×1,从而将式(4.3)重新表述为:Among them, Φ∈RM ×N is a designed measurement matrix with certain properties, D=ΦΨ∈RM ×n represents an equivalent dictionary, and e=Φz∈RM ×1 is an error in the projection domain. definition For any i, α i ∈ R L×1 , so formula (4.3) can be re-expressed as:

y=Φ(ψ1α12α2+…+ψkαk)+e (4.4)y=Φ(ψ 1 α 12 α 2 +…+ψ k α k )+e (4.4)

依据CS理论,在理想情况下,非零项存在于稀疏表示向量α中某一αi中,而其他项均为零。因此,将求解α转化为:According to the CS theory, ideally, non-zero items exist in a certain α i in the sparse representation vector α, while other items are all zero. Therefore, solving for α is transformed into:

求得{αi}后,将其用于人脸识别分类,形成如下问题:After obtaining {α i }, it is used for face recognition classification to form the following problem:

求得的即输入测试样本x的判别结果。obtained That is, the discriminant result of the input test sample x.

在给定测量矩阵Φ的情况下,上述问题的难点在于如何精确地求解式(4.5)。对于某一个i,令Di=ΦΨi∈RM×L,式(4.5)代价函数转化为:In the case of a given measurement matrix Φ, the difficulty of the above problem lies in how to solve formula (4.5) accurately. For a certain i, let D i =ΦΨ i ∈ R M×L , the cost function of formula (4.5) is transformed into:

设Di的奇异值分解(Singular Value Decomposition,SVD)如下所示:Let the singular value decomposition (Singular Value Decomposition, SVD) of D i be as follows:

其中将式(4.8)代入(4.7),得到in Substituting (4.8) into (4.7), we get

make

其中的尺寸均为式(4.9)可以展开为:in and The size is Formula (4.9) can be expanded as:

可以看出上式等号右边第二项与αi无关,因此当It can be seen that the second term on the right side of the above equation has nothing to do with α i , so when

时式(4.10)取最小值。此时,式(4.5)的解为:Time formula (4.10) takes the minimum value. At this time, the solution of formula (4.5) is:

其中Vi、∑i分别由测量矩阵、字典及输入测试样本投影值求得,为任意尺寸为的向量。where V i , ∑ i and are obtained from the measurement matrix, dictionary and input test sample projection values respectively, for any size of vectors.

将i从1遍历至K,求得所有后,通过式(4.6)即可求得测试样本类别根据需求还可以根据判别结果重构输入的测试样本从而重排列求得重构图像。Traverse i from 1 to K to find all After that, the test sample category can be obtained by formula (4.6) According to requirements, the input test samples can also be reconstructed according to the discrimination results Thereby rearranging to obtain the reconstructed image.

总的说来,基于压缩感知的人脸识别算法,一方面通过测量矩阵投影,使传输和计算的数据减少,提高了计算效率,减少了存储消耗;另一方面,可提高人脸识别的准确率。In general, the face recognition algorithm based on compressed sensing, on the one hand, reduces the data transmitted and calculated by measuring the matrix projection, improves the calculation efficiency, and reduces the storage consumption; on the other hand, it can improve the accuracy of face recognition. Rate.

Claims (9)

1. power supply enterprise's construction mobile security supervision platform, it is characterised in that including intelligent mobile terminal and and intelligent mobile The cloud platform of terminal called connection, the cloud platform are equipped with the face sample of the facial image of storage power supply enterprise on-site personnel This unit and the personnel safety access unit that personnel's access information is sent to intelligent terminal, the intelligent mobile terminal are equipped with people Face identification module, the face recognition module are used to identify what whether the personnel for entering scene sent with personnel safety access unit Access facial image matches, to determine whether to allow the personnel to enter scene;Wherein, face recognition module carries out recognition of face Method includes the following steps,
Step 1, according to face training sample, constructs super complete dictionary
Step 2, by test image sequentially vector x arranged in columns;
Step 3, according to super complete dictionary ψ design calculation matrix Φ;
Step 4, x projects to obtain measure vectorial y under Φ, and tries to achieve
Step 5, by what is tried to achieveSubstitution formula
So as to try to achieve the differentiation result of input test sample.
2. power supply enterprise's construction mobile security supervision platform according to claim 1, it is characterised in that false in step 1 Equipped with the different face of K classes, every width training facial image sequentially pulls into the column vector ψ that N × 1 is tieed up, and carries out l respectively2Norm is returned One change is handled, i.e. ψ ∈ RN×1And | | ψ | |2=1, an atom is denoted as, L different instruction is all selected from every class face training sample Practice sample and form such face sample matrix by rowObtain selection These matrixes are sequentially merged into super complete dictionary by training sample sum n=KL:
3. power supply enterprise's construction mobile security supervision platform according to claim 2, it is characterised in that to what is arbitrarily inputted Face sample is tested, it is sequentially pulled into column vector x ∈ RN×1, then x be expressed as under dictionary Ψ:
X=Ψ α+z (4.2)
Wherein α ∈ Rn×1For rarefaction representation vector, z ∈ RN×1It is to represent error.
4. power supply enterprise's construction mobile security supervision platform according to claim 3, it is characterised in that it is theoretical based on CS, Test sample x is compressed projection and obtains projection vector y ∈ RM×1(M < N), i.e.,
Y=Φ x=Φ Ψ α+Φ z=D α+e (4.3)
Wherein Φ ∈ RM×NFor the designed calculation matrix with certain property, D=Φ Ψ ∈ RM×nRepresent equivalent dictionary, e= Φz∈RM×1For projection domain error, definitionTo any i, αi∈RL×1, so that formula (4.3) is heavy Newly it is expressed as:
Y=Φ (ψ1α12α2+…+ψkαk)+e (4.4)。
5. power supply enterprise according to claim 4 construction mobile security supervision platform, it is characterised in that for some i, Make Di=Φ Ψi∈RM×L, formula (4.5) cost function is converted into:
<mrow> <mo>|</mo> <mo>|</mo> <mi>y</mi> <mo>-</mo> <msub> <mi>D</mi> <mi>i</mi> </msub> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> <mo>|</mo> <msubsup> <mo>|</mo> <mn>2</mn> <mn>2</mn> </msubsup> <mo>=</mo> <mi>&amp;xi;</mi> <mrow> <mo>(</mo> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4.7</mn> <mo>)</mo> </mrow> </mrow>
If DiSingular value decomposition be shown below:
<mrow> <msub> <mi>D</mi> <mi>i</mi> </msub> <mo>=</mo> <msub> <mi>U</mi> <mi>I</mi> </msub> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mi>&amp;Sigma;</mi> <mi>i</mi> </msub> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> <mtr> <mtd> <mn>0</mn> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> </mtable> </mfenced> <msubsup> <mi>V</mi> <mi>i</mi> <mi>T</mi> </msubsup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4.8</mn> <mo>)</mo> </mrow> </mrow>
WhereinFormula (4.8) is substituted into (4.7), is obtained
<mrow> <mtable> <mtr> <mtd> <mrow> <mi>&amp;xi;</mi> <mrow> <mo>(</mo> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mrow> <mo>||</mo> <mrow> <mi>y</mi> <mo>-</mo> <msub> <mi>U</mi> <mi>i</mi> </msub> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mo>&amp;Sigma;</mo> <mi>i</mi> </msub> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> <mtr> <mtd> <mn>0</mn> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> </mtable> </mfenced> <msubsup> <mi>V</mi> <mi>i</mi> <mi>T</mi> </msubsup> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> </mrow> <mo>||</mo> </mrow> <mn>2</mn> <mn>2</mn> </msubsup> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <msubsup> <mrow> <mo>||</mo> <mrow> <msubsup> <mi>U</mi> <mi>i</mi> <mi>T</mi> </msubsup> <mi>y</mi> <mo>-</mo> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mo>&amp;Sigma;</mo> <mi>i</mi> </msub> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> <mtr> <mtd> <mn>0</mn> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> </mtable> </mfenced> <msubsup> <mi>V</mi> <mi>i</mi> <mi>T</mi> </msubsup> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> </mrow> <mo>||</mo> </mrow> <mn>2</mn> <mn>2</mn> </msubsup> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <msubsup> <mrow> <mo>||</mo> <mrow> <mover> <mi>y</mi> <mo>~</mo> </mover> <mo>-</mo> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mo>&amp;Sigma;</mo> <mi>i</mi> </msub> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> <mtr> <mtd> <mn>0</mn> </mtd> <mtd> <mn>0</mn> </mtd> </mtr> </mtable> </mfenced> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> </mrow> <mo>||</mo> </mrow> <mn>2</mn> <mn>2</mn> </msubsup> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4.9</mn> <mo>)</mo> </mrow> </mrow>
Order
<mrow> <mover> <mi>y</mi> <mo>~</mo> </mover> <mo>=</mo> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mn>1</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mn>2</mn> </msub> </mtd> </mtr> </mtable> </mfenced> <mo>,</mo> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> <mo>=</mo> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <msub> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> <mn>1</mn> </msub> </mtd> </mtr> <mtr> <mtd> <msub> <mover> <mi>a</mi> <mo>~</mo> </mover> <mn>2</mn> </msub> </mtd> </mtr> </mtable> </mfenced> </mrow>
WhereinWithSize beFormula (4.9) expands into:
<mrow> <mi>&amp;xi;</mi> <mrow> <mo>(</mo> <msub> <mi>&amp;alpha;</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mo>=</mo> <mo>|</mo> <mo>|</mo> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mi>i</mi> </msub> <mo>-</mo> <msub> <mi>&amp;Sigma;</mi> <mi>i</mi> </msub> <msub> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> <mi>i</mi> </msub> <mo>|</mo> <msubsup> <mo>|</mo> <mn>2</mn> <mn>2</mn> </msubsup> <mo>+</mo> <mo>|</mo> <mo>|</mo> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mn>2</mn> </msub> <mo>|</mo> <msubsup> <mo>|</mo> <mn>2</mn> <mn>2</mn> </msubsup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4.10</mn> <mo>)</mo> </mrow> </mrow>
Section 2 and α on the right of above formula equal signiIt is unrelated, therefore work as
<mrow> <msub> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> <mn>1</mn> </msub> <mo>=</mo> <msubsup> <mi>&amp;Sigma;</mi> <mi>i</mi> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msubsup> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mi>i</mi> </msub> </mrow>
When, formula (4.10) is minimized, and at this time, the solution of formula (4.5) is:
<mrow> <msub> <mover> <mi>&amp;alpha;</mi> <mo>^</mo> </mover> <mi>i</mi> </msub> <mo>=</mo> <msub> <mi>V</mi> <mi>i</mi> </msub> <mfenced open = "|" close = "|"> <mtable> <mtr> <mtd> <mrow> <msubsup> <mo>&amp;Sigma;</mo> <mi>i</mi> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msubsup> <msub> <mover> <mi>y</mi> <mo>~</mo> </mover> <mn>1</mn> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <msub> <mover> <mi>&amp;alpha;</mi> <mo>~</mo> </mover> <mn>2</mn> </msub> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4.11</mn> <mo>)</mo> </mrow> </mrow>
Wherein Vi、∑iWithTried to achieve respectively by calculation matrix, dictionary and input test sample projection value,For arbitrary dimension for (Vector.
6. power supply enterprise according to claim 5 construction mobile security supervision platform, it is characterised in that by i from 1 traversal to K, is tried to achieve allAfterwards, test sample classification can be tried to achieve by formula (4.6)
7. power supply enterprise's construction mobile security supervision platform according to claim 6, it is characterised in that according to differentiation result Reconstruct the test sample of inputSo as to which reconstructed image is tried to achieve in permutatation.
8. power supply enterprise's construction mobile security supervision platform according to claim 1, it is characterised in that interim for needing Into the personnel at scene, the personnel safety access unit sends interim access to intelligent mobile terminal and permits, and sets 1 year Interior interim access number is not to be exceeded 2 times.
9. power supply enterprise's construction mobile security supervision platform according to claim 1, it is characterised in that for needing to cancel The personnel of access qualification, the personnel safety access unit send the information for cancelling access to intelligent mobile terminal.
CN201711032274.9A 2017-10-30 2017-10-30 Power supply enterprise's construction mobile security supervision platform Pending CN107944344A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711032274.9A CN107944344A (en) 2017-10-30 2017-10-30 Power supply enterprise's construction mobile security supervision platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711032274.9A CN107944344A (en) 2017-10-30 2017-10-30 Power supply enterprise's construction mobile security supervision platform

Publications (1)

Publication Number Publication Date
CN107944344A true CN107944344A (en) 2018-04-20

Family

ID=61936641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711032274.9A Pending CN107944344A (en) 2017-10-30 2017-10-30 Power supply enterprise's construction mobile security supervision platform

Country Status (1)

Country Link
CN (1) CN107944344A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274107A (en) * 2018-11-05 2019-01-25 河海大学 Parameter identification model of low frequency oscillation signal considering singular value and its parameter identification method
CN109446890A (en) * 2018-09-11 2019-03-08 浙江大有集团有限公司 Collective-owned enterprise's encased column base site operation personnel's face identification device
CN109636973A (en) * 2018-12-11 2019-04-16 国网河北省电力有限公司保定供电分公司 The engineering site personnel of gate and video interlink pass in and out course management system and method
CN112528693A (en) * 2020-12-09 2021-03-19 浙江水木物联技术有限公司 Movable material checking machine for electric power construction site and checking method thereof
CN113379947A (en) * 2021-05-25 2021-09-10 广州朗国电子科技有限公司 Intelligent door lock based on face recognition
CN114419769A (en) * 2022-01-29 2022-04-29 青岛海信移动通信技术股份有限公司 Door lock management method and device, intelligent operation recorder, medium and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1744494A (en) * 2005-09-30 2006-03-08 广东省电信有限公司研究院 Access authentication system and method by verifying safety of accessing host
US7147246B2 (en) * 1995-06-07 2006-12-12 Automotive Technologies International, Inc. Method for airbag inflation control
CN1983312A (en) * 2005-12-26 2007-06-20 余羡鸣 Urban digital total item supporting system
CN101976352A (en) * 2010-10-29 2011-02-16 上海交通大学 Various illumination face identification method based on small sample emulating and sparse expression
WO2014175082A1 (en) * 2013-04-25 2014-10-30 京セラ株式会社 User terminal, base station, and processor
CN104951756A (en) * 2015-06-08 2015-09-30 浙江科技学院 Face recognition method based on compressed sensing
WO2015151155A1 (en) * 2014-03-31 2015-10-08 株式会社日立国際電気 Personal safety verification system and similarity search method for data encrypted for confidentiality
CN106296925A (en) * 2016-08-16 2017-01-04 成都鼎昊科技有限公司 A kind of video monitoring safety access system
CN106503716A (en) * 2016-09-13 2017-03-15 中国电力科学研究院 A kind of safety cap recognition methods that is extracted based on color and contour feature and system
CN106570464A (en) * 2016-10-31 2017-04-19 华南理工大学 Human face recognition method and device for quickly processing human face shading
US20170309093A1 (en) * 2014-11-11 2017-10-26 Chunkui FENG Vehicle operation monitoring, overseeing, data processing and overload monitoring method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7147246B2 (en) * 1995-06-07 2006-12-12 Automotive Technologies International, Inc. Method for airbag inflation control
CN1744494A (en) * 2005-09-30 2006-03-08 广东省电信有限公司研究院 Access authentication system and method by verifying safety of accessing host
CN1983312A (en) * 2005-12-26 2007-06-20 余羡鸣 Urban digital total item supporting system
CN101976352A (en) * 2010-10-29 2011-02-16 上海交通大学 Various illumination face identification method based on small sample emulating and sparse expression
WO2014175082A1 (en) * 2013-04-25 2014-10-30 京セラ株式会社 User terminal, base station, and processor
WO2015151155A1 (en) * 2014-03-31 2015-10-08 株式会社日立国際電気 Personal safety verification system and similarity search method for data encrypted for confidentiality
US20170309093A1 (en) * 2014-11-11 2017-10-26 Chunkui FENG Vehicle operation monitoring, overseeing, data processing and overload monitoring method and system
CN104951756A (en) * 2015-06-08 2015-09-30 浙江科技学院 Face recognition method based on compressed sensing
CN106296925A (en) * 2016-08-16 2017-01-04 成都鼎昊科技有限公司 A kind of video monitoring safety access system
CN106503716A (en) * 2016-09-13 2017-03-15 中国电力科学研究院 A kind of safety cap recognition methods that is extracted based on color and contour feature and system
CN106570464A (en) * 2016-10-31 2017-04-19 华南理工大学 Human face recognition method and device for quickly processing human face shading

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446890A (en) * 2018-09-11 2019-03-08 浙江大有集团有限公司 Collective-owned enterprise's encased column base site operation personnel's face identification device
CN109274107A (en) * 2018-11-05 2019-01-25 河海大学 Parameter identification model of low frequency oscillation signal considering singular value and its parameter identification method
CN109274107B (en) * 2018-11-05 2022-01-28 河海大学 Low-frequency oscillation signal parameter identification method considering singular values
CN109636973A (en) * 2018-12-11 2019-04-16 国网河北省电力有限公司保定供电分公司 The engineering site personnel of gate and video interlink pass in and out course management system and method
CN112528693A (en) * 2020-12-09 2021-03-19 浙江水木物联技术有限公司 Movable material checking machine for electric power construction site and checking method thereof
CN113379947A (en) * 2021-05-25 2021-09-10 广州朗国电子科技有限公司 Intelligent door lock based on face recognition
CN114419769A (en) * 2022-01-29 2022-04-29 青岛海信移动通信技术股份有限公司 Door lock management method and device, intelligent operation recorder, medium and system

Similar Documents

Publication Publication Date Title
CN107944344A (en) Power supply enterprise&#39;s construction mobile security supervision platform
Arsenovic et al. FaceTime—Deep learning based face recognition attendance system
Perez et al. Methodological improvement on local Gabor face recognition based on feature selection and enhanced Borda count
Shamrat et al. A deep learning approach for face detection using max pooling
Nagaraj et al. Real time face recognition using effective supervised machine learning algorithms
CN107977439A (en) A kind of facial image base construction method
Subhadhira et al. License plate recognition application using extreme learning machines
CN111881822A (en) Access control method, device, equipment and storage medium based on face recognition
Menezes et al. Automatic attendance management system based on deep one-shot learning
CN111950429A (en) Face recognition method based on weighted collaborative representation
Gomathy et al. Face recognition based student detail collection using opencv
Susithra et al. Detection of anomalous behaviour in online exam towards automated proctoring
Ragesh et al. Fast R-CNN based Masked Face Recognition for Access Control System
Kumar et al. Attendance management system using facial recognition
CN107766832A (en) A kind of face identification method for field operation construction management
CN116232761A (en) Method and system for network abnormal traffic detection based on shapelet
Al-sabaeei et al. Smart Attendance System Based On Face Recognition Techniques
Bhat et al. Evaluating active shape models for eye-shape classification
Priya et al. Face-Recognition Based Attendance System using One-Shot Learning
Viswanathan et al. Smart Attendance System using Face Recognition
Charishma et al. Smart Attendance System with and Without Mask using Face Recognition
Villupuram Hybrid of Student Attendance Tracking System Using RFID Device and Fingerprint Sensor
Kazi et al. Deep Learning Based Dynamic Signature Analysis for Multiclass Classification
Suvorov et al. Mathematical model of the biometric iris recognition system
Kaur et al. A Review on Face Recognition Techniques.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180420