Search:
Certifications
Latest News

What is the Role of Smart Home on Life?

With the development of science and technology, intelligent products are being quietly into the home to provide convenience to people's service and hi...

Unattended Convenience Store, New Trends in Retail Industry

7*24 Hours, Unattended and Smart convenience, To open a new time of Convenience Store. December 2016, Amazon Go have presented a new supermarket conce...

License Plate Recognition System will lead the New Trend of Intelligent Traffic Development

With the advent of smart, 21st century will be a road traffic smart century, how to use the technology function of smart traffic, alleviate the growin...

Parking Lot Management System: from Tradition to Unattended Times.

According to the statistics, currently, most of the parking lot use artificial charges, the labor costs of management member are increasing, and perso...

LS VISION Hisilicon / Ingenic Solution CCTV Camera Monitoring Effect Comparison in the Day and Night

Hisilicon / Ingenic Solution Monitoring Effect Comparison in the Daytime: Hisilicon 323 CCTV camera monitoring image is more clearly, the color is mo...

LS VISION, Celebrate the Dragon Boat Festival, Dissemination of National Culture

Celebrate the Dragon Boat Festival, Dissemination of National Culture The Dragon Boat Festival, also often known as the Duanwu Festival,The Dragon Boa...

LS VISION Cctv Cameras Completed Project Installation in Saudi Arabia

On April 2017, LS VISION cctv cameras completed the project installation in Saudi Arabia. Saudi Arabia customer finished installation Fath gas station...

Israel Customer Visited LS VISION

On April 13th 2017, the customer from Israel visited LS VISION. LS VISION CEO Jenny expressed a warm welcome for the customers' arrival. On this day,...
New Products
Hotline: 
+86-13828815727
Email: sales@lishigroup.com
Tel:  86-755-26948719
   (Only for Sales Line)
Fax: 86-755-26969510
Address: 6 Floor,  Blg 10, A Region, Tang Lang Industrial Park, Li Shui Road, Xili Town, Nanshan District, Shenzhen, China
Home > News > Industry News > Security Industry into the Era.....

News

Security Industry into the Era of Artificial Intelligence

  • Author:LS VISION
  • Release on :2016-11-09

Artificial intelligence should be gone through data, technology, products, the three cycles to complete the process loop. To Google "search engine" as an example, the product is a web page search engine, technology is the algorithm to achieve page rankings, data is generated by the user clicks the page rankings. In the field of security, to open science and technology "deep learning engine", for example, if the product is intelligent visual cloud platform, technology is the depth of learning algorithm, the data is marked image data. Then, artificial intelligence platform is a data and technology through the polished out of the product, the product application process has generated new data, iterative and deepening the learning process. That is, products, technologies and data to form a super-artificial intelligence technology closed-loop, the ultimate goal is to form a machine vision functional effects, giving the machine a pair of eye, so that it like people to "see" and "think." So that the machine has the same visual function as a person, in order to achieve a variety of detection, judgment, recognition, measurement and other functions.

1. Commercial applications of face recognition

As the representative technology of artificial intelligence, the ability of product application and commercialization is very important. In the aspect of accuracy and security, the false recognition rate of less than one hundred thousandth of the accuracy rate is achieved by using technology of face recognition technology as a reference, and the passing rate is over 95%. In the security level, higher than the security level of fingerprint recognition, and no special hardware support needs, more easily be promoted.

In the field of technical application of face recognition, it has realized the concrete business function in the commercial building, and helped the merchant to realize the accurate analysis of the passenger flow from "statistics" to "attribute" to "behavior", to obtain more by machine vision analysis. Multi-line data dimension, with large data analysis to guide the precise marketing business, and promote the retail industry from the same products and services to all people, toward the same product, different services to a specific person to change.

At the same time, the use of face recognition technology to enterprises, parks bring more intelligent management experience. Such as through the face recognition technology products, in the face recognition gates, access control, conference attendance and other traditional scenes bring management efficiency and convenience.

2. Application of Face Recognition in Security Industry

Traditional security industry to video surveillance-based, in the massive unstructured video data, the application of structured data have a lot of opportunities. The Kuang technology as a result of artificial intelligence technology to the traditional security industry, let the machine to understand the world rather than the chaotic video stream, so that the traditional industry to activate more value.

The face recognition technology has gone through the stages of laboratory algorithm, software SDK stage, single product stage, solution stage, and integrated platform stage, based on the time axis analysis of face recognition development. At present, many companies are in the software SDK stage and single product stage, this stage is actually a DEMO stage, open science and technology in the single product stage, the solution stage and the integrated platform stage, the current application areas pan-financial, pan-commercial and pan-security. Pan-security applications in which there are two applications during the G20 summit in Hangzhou, one in the hotel front desk, through the household's brush to verify the identity card to match; the other is through the subway line personnel bayonet, identify the prisoners in the crowd And suspicious molecules.

Friend Link