Security check method and device, computer equipment and storage medium
1. A security inspection method, comprising:
identifying and tracking passengers and articles entering a security check area to obtain a tracking result;
acquiring a face image and an article image;
performing association of the face and the object according to the tracking result, the face image and the object image to obtain an association result;
obtaining a security inspection result;
judging whether the security inspection result is that a suspicious article appears;
if the security inspection result shows suspicious articles, confirming face information corresponding to the suspicious articles according to the association result;
and generating alarm information according to the face information, and sending the alarm information to a terminal.
2. A security screening method according to claim 1, wherein said identifying and tracking passengers and articles entering the security screening area to obtain tracking results comprises:
acquiring a video combining passengers and articles entering a security inspection area;
and identifying and tracking the passengers and the articles according to the video to obtain a tracking result.
3. The security inspection method according to claim 1, wherein the acquiring of the face image and the object image comprises:
shooting the face image through a camera;
and acquiring an article image shot by the article inspection machine.
4. The security inspection method according to claim 1, wherein the associating the face and the article according to the tracking result, the face image and the article image to obtain an association result comprises:
determining the binding relationship between the face and the object in the tracking result;
and associating the face image with the object image according to the binding relationship to obtain an association result.
5. A security inspection method according to claim 1, wherein the security inspection result is the shape of the article photographed by the object inspection machine.
6. The security inspection method according to claim 5, wherein said determining whether the security inspection result is the presence of a suspicious item comprises:
inputting the security inspection result into a shape analysis model for item category analysis to obtain an analysis result;
judging whether the analysis result is a dangerous article;
if the analysis result is a dangerous article, determining that the security inspection result shows a suspicious article;
and if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
7. A security device, comprising:
the tracking unit is used for identifying and tracking passengers and articles entering the security check area to obtain a tracking result;
the image acquisition unit is used for acquiring a face image and an article image;
the association unit is used for associating the face with the object according to the tracking result, the face image and the object image to obtain an association result;
the key result acquisition unit is used for acquiring a security check result;
the judging unit is used for judging whether the security inspection result is that the suspicious object appears;
the information confirmation unit is used for confirming the face information corresponding to the suspicious object according to the association result if the suspicious object appears in the security check result;
and the warning information generating unit is used for generating warning information according to the face information and sending the warning information to a terminal.
8. A security device in accordance with claim 7, wherein said tracking unit comprises:
the video acquisition subunit is used for acquiring a video of the combination of the passenger and the article entering the security check area;
and the identification tracking subunit is used for identifying and tracking the passenger and the article according to the video so as to obtain a tracking result.
9. A computer device, characterized in that the computer device comprises a memory, on which a computer program is stored, and a processor, which when executing the computer program implements the method according to any of claims 1 to 6.
10. A storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 6.
Background
In places such as subways and stations, security inspection equipment is generally arranged and operates independently, particularly an object inspection machine and a people inspection machine are arranged separately and operate independently.
The current process in a security inspection environment is basically as follows: separating passengers and bags, enabling the bags to enter the physical examination machine, and enabling the passengers to wait beside; the luggage enters the inside of the object inspection machine for object irradiation inspection through the transmission crawler of the object inspection machine; if the article inspection is suspicious, carrying out manual reinspection; after the luggage article inspection is finished, the passenger takes the luggage article and then enters a manual inspection machine for metal detection and the like; the passenger enters the region range of the people inspection machine, and the people inspection machine carries out metal detection and the like on the passenger; and the passenger can leave the security check area after secondary security check.
The physical examination machine is used for examining luggage bags and the like of passengers, the luggage bags are irradiated by X-rays in the physical examination machine to display articles in the luggage bags, when suspicious articles appear, security personnel are required to perform manual recheck once, and the recheck process is as follows: the security personnel need to stare at the display screen of the object checking machine with eyes for a long time, and need to manually judge according to the displayed shape, for example: the shapes of knifes and guns, the shapes of metal pipes, the shapes of assembled liquid and other dangerous objects need the working attitude of security personnel with long time, uninterrupted and high tension, and once suspicious objects appear, the security personnel need to guess which passenger the suspicious luggage belongs to according to the judgment of the security personnel, sometimes the situation that the suspicious luggage belongs to which passenger the object is unknown can also appear, and the efficiency is low.
Therefore, it is necessary to design a new method to improve security efficiency and record the association relationship between the object and the passenger in real time.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a security inspection method, a security inspection device, computer equipment and a storage medium.
In order to achieve the purpose, the invention adopts the following technical scheme: a security inspection method, comprising:
identifying and tracking passengers and articles entering a security check area to obtain a tracking result;
acquiring a face image and an article image;
performing association of the face and the object according to the tracking result, the face image and the object image to obtain an association result;
obtaining a security inspection result;
judging whether the security inspection result is that a suspicious article appears;
if the security inspection result shows suspicious articles, confirming face information corresponding to the suspicious articles according to the association result;
and generating alarm information according to the face information, and sending the alarm information to a terminal.
The further technical scheme is as follows: the identification tracking of passengers and articles entering a security check area to obtain a tracking result comprises the following steps:
acquiring a video combining passengers and articles entering a security inspection area;
and identifying and tracking the passengers and the articles according to the video to obtain a tracking result.
The further technical scheme is as follows: the acquiring of the face image and the article image includes:
shooting the face image through a camera;
and acquiring an article image shot by the article inspection machine.
The further technical scheme is as follows: the associating the face and the object according to the tracking result, the face image and the object image to obtain an association result, comprising:
determining the binding relationship between the face and the object in the tracking result;
and associating the face image with the object image according to the binding relationship to obtain an association result.
The further technical scheme is as follows: the security inspection result is the shape of the article photographed by the article inspection machine.
The further technical scheme is as follows: the judging whether the security inspection result is that the suspicious object appears includes:
inputting the security inspection result into a shape analysis model for item category analysis to obtain an analysis result;
judging whether the analysis result is a dangerous article;
if the analysis result is a dangerous article, determining that the security inspection result shows a suspicious article;
and if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
The invention also provides a security inspection device, comprising:
the tracking unit is used for identifying and tracking passengers and articles entering the security check area to obtain a tracking result;
the image acquisition unit is used for acquiring a face image and an article image;
the association unit is used for associating the face with the object according to the tracking result, the face image and the object image to obtain an association result;
the key result acquisition unit is used for acquiring a security check result;
the judging unit is used for judging whether the security inspection result is that the suspicious object appears;
the information confirmation unit is used for confirming the face information corresponding to the suspicious object according to the association result if the suspicious object appears in the security check result;
and the warning information generating unit is used for generating warning information according to the face information and sending the warning information to a terminal.
The further technical scheme is as follows: the tracking unit includes:
the video acquisition subunit is used for acquiring a video of the combination of the passenger and the article entering the security check area;
and the identification tracking subunit is used for identifying and tracking the passenger and the article according to the video so as to obtain a tracking result.
The invention also provides computer equipment which comprises a memory and a processor, wherein the memory is stored with a computer program, and the processor realizes the method when executing the computer program.
The invention also provides a storage medium storing a computer program which, when executed by a processor, is operable to carry out the method as described above.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, the passengers and the articles entering the security inspection area are identified and tracked, the face image and the article image are correlated according to the obtained face image and the article image, the security inspection result is obtained during article security inspection, and when suspicious articles appear in the security inspection result, the corresponding passengers can be quickly positioned according to the correlation result, so that the security inspection efficiency is improved, and the correlation relationship between the articles and the passengers can be recorded in real time.
The invention is further described below with reference to the accompanying drawings and specific embodiments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a security inspection method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a security inspection method according to an embodiment of the present invention;
fig. 3 is a schematic sub-flow diagram of a security inspection method according to an embodiment of the present invention;
fig. 4 is a schematic sub-flow chart of a security inspection method according to an embodiment of the present invention;
fig. 5 is a schematic sub-flow chart of a security inspection method according to an embodiment of the present invention;
fig. 6 is a schematic sub-flow chart of a security inspection method according to an embodiment of the present invention;
fig. 7 is a schematic block diagram of a security inspection apparatus according to an embodiment of the present invention;
fig. 8 is a schematic block diagram of a tracking unit of a security inspection apparatus according to an embodiment of the present invention;
fig. 9 is a schematic block diagram of an image acquiring unit of a security inspection apparatus according to an embodiment of the present invention;
fig. 10 is a schematic block diagram of an association unit of a security inspection apparatus according to an embodiment of the present invention;
fig. 11 is a schematic block diagram of a determination unit of a security inspection apparatus according to an embodiment of the present invention;
FIG. 12 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view of an application scenario of a security inspection method according to an embodiment of the present invention. Fig. 2 is a schematic flow chart of a security inspection method according to an embodiment of the present invention. The security inspection method is applied to the server. The server performs data interaction with the camera, the object inspection machine and the terminal, the server performs tracking identification after images of passengers and objects entering a security inspection area are acquired from the camera, the server acquires face images from the camera, the object inspection machine acquires object images from the object inspection machine, the passenger images and the object images are associated according to tracking identification results, face information can be quickly positioned when the object inspection machine detects suspicious objects, and alarm information is generated.
Fig. 2 is a schematic flow chart of a security inspection method according to an embodiment of the present invention. As shown in fig. 2, the method includes the following steps S110 to S170.
And S110, identifying and tracking the passengers and the articles entering the security check area to obtain a tracking result.
In this embodiment, the tracking result refers to the specific tracks of the passengers and the items.
In an embodiment, referring to fig. 2, the step S110 may include steps S111 to S112.
And S111, acquiring a video combining the passenger entering the security check area and the goods.
In this embodiment, corresponding videos are recorded together for passengers entering the security check area and articles carried by the passengers, so that the association relationship between the passengers and the articles can be obtained.
And S112, identifying and tracking the passengers and the articles according to the video to obtain a tracking result.
In this embodiment, a target tracking algorithm may be used to identify and track the passenger and the article to obtain a corresponding track, and the relationship between the passenger and the article may be identified from the image and corresponding to the track.
And S120, acquiring a face image and an article image.
In this embodiment, the face image is a photograph of a face taken by a camera, and the object image is a photograph of an object taken by an object inspection machine through X-ray irradiation.
In an embodiment, referring to fig. 3, the step S120 may include steps S121 to S122.
S121, shooting the face image through a camera;
and S122, acquiring an article image shot by the article inspection machine.
S130, associating the face and the object according to the tracking result, the face image and the object image to obtain an association result.
In this embodiment, the association result refers to a one-to-one correspondence relationship between the face image and the object image.
In an embodiment, referring to fig. 4, the step S130 may include steps S131 to S132.
S131, determining the binding relationship between the face and the article in the tracking result.
In this embodiment, the tracking result includes the trajectories of the passengers and the articles, the initial relationship between the passengers and the articles can be obtained from the trajectories of the passengers and the articles, and the trajectories in the tracking result can determine which face is bound to which article.
And S132, associating the face image with the article image according to the binding relationship to obtain an association result.
In this embodiment, when it is known which face is bound to which article, the face image can be associated with the article image, and multiple paths of videos can be collected in one computing unit, i.e., an edge computing box, so as to realize the identification association between the face and the article.
In other embodiments, the association between the face image and the object image can be realized by labeling.
And S140, obtaining a security inspection result.
In this embodiment, the security inspection result is the shape of the article photographed by the article inspection machine.
S150, judging whether the security inspection result is that a suspicious article appears;
in an embodiment, referring to fig. 6, the step S150 may include steps S151 to S154.
And S151, inputting the security inspection result into the shape analysis model to perform item type analysis so as to obtain an analysis result.
In the present embodiment, the shape analysis model is obtained by training a neural network using the shapes of several dangerous objects as a sample set.
The shape of the dangerous goods comprises a knife gun shape, a metal tube shape, an assembled liquid shape and other dangerous goods shapes.
S152, judging whether the analysis result is a dangerous article;
s153, if the analysis result is a dangerous article, determining that the security inspection result is a suspicious article;
s154, if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
And S160, if the security inspection result shows suspicious articles, confirming the face information corresponding to the suspicious articles according to the association result.
In this embodiment, when an article is detected, a face image can be identified according to the initially determined association result, thereby obtaining face information.
And S170, generating alarm information according to the face information, and sending the alarm information to a terminal.
If the security inspection result does not show suspicious articles, the step S110 is executed.
In this embodiment, the warning information refers to information including a face image and an object image.
When the application platform of the terminal receives the alarm information, the security force around the security inspection area is planned according to the related security rules, the alarm information is pushed in the first time, and the passenger clothing information, the face snapshot picture, the suspicious object case and bag and the suspicious object picture are sent to the handheld terminal of the security personnel; after the security personnel acquire the alarm information, the security personnel can quickly locate the specific person according to the information pushed by the application platform; the efficiency of security is improved.
The embodiment realizes the separation of people and objects, the camera records the actions of people and objects, and the relation between people and objects is automatically identified by combining multiple videos; checking the article and carrying out AI identification on the article; the articles are intelligently judged to find out suspicious articles; automatically alarming, prompting and recording personnel to which the article belongs; the method of the embodiment can be applied to security inspection links of public rail transit, generally including security inspection at subway entrance, security inspection at high-speed rail station, security inspection at bus station, security inspection channel entering airport and the like, and is mainly used for security inspection of personnel and carried articles.
According to the security inspection method, the passengers and the articles entering the security inspection area are identified and tracked, the face images and the article images are associated according to the obtained face images and the obtained article images, the security inspection result is obtained during article security inspection, and when suspicious articles appear in the security inspection result, the corresponding passengers can be quickly positioned according to the association result, so that the security inspection efficiency is improved, and the association relation between the articles and the passengers can be recorded in real time.
Fig. 7 is a schematic block diagram of a security inspection apparatus 300 according to an embodiment of the present invention. As shown in fig. 7, the present invention further provides a security inspection apparatus 300 corresponding to the above security inspection method. The security inspection apparatus 300 includes a unit for performing one of the above security inspection methods, and the apparatus may be configured in a server. Specifically, referring to fig. 7, the security inspection apparatus 300 includes a tracking unit 301, an image obtaining unit 302, an association unit 303, a key result obtaining unit 304, a determination unit 305, an information confirmation unit 306, and an alarm information generating unit 307.
The tracking unit 301 is used for identifying and tracking passengers and articles entering a security check area to obtain a tracking result; an image acquisition unit 302 for acquiring a face image and an article image; an association unit 303, configured to perform association between a human face and an article according to the tracking result, the human face image, and the article image to obtain an association result; a key result obtaining unit 304, configured to obtain a security check result; a judging unit 305, configured to judge whether the security inspection result is that a suspicious item is present; the information confirming unit 306 is configured to confirm, according to the association result, face information corresponding to the suspicious object if the security inspection result shows the suspicious object; and an alarm information generating unit 307, configured to generate alarm information according to the face information, and send the alarm information to a terminal.
In one embodiment, as shown in fig. 8, the tracking unit 301 includes a video acquisition sub-unit 3011 and an identification tracking sub-unit 3012.
A video acquiring subunit 3011, configured to acquire a video of a combination of a passenger and an article entering a security check area; and the identification tracking subunit 3012 is configured to perform identification tracking on the passenger and the item according to the video to obtain a tracking result.
In one embodiment, as shown in fig. 9, the image acquiring unit 302 includes a face image acquiring subunit 3021 and an article image acquiring subunit 3022.
A face image acquiring subunit 3021, configured to capture the face image through a camera; and an article image acquiring subunit 3022, configured to acquire an article image captured by the article inspection machine.
In one embodiment, as shown in fig. 10, the association unit 303 includes a relationship determination subunit 3031 and a relationship association subunit 3032.
A relationship determination subunit 3031, configured to determine a binding relationship between the human face and the article in the tracking result; and a relationship association subunit 3032, configured to associate the face image and the article image according to the binding relationship, so as to obtain an association result.
In one embodiment, as shown in fig. 11, the determining unit 305 includes an analyzing subunit 3051 and a result determining subunit 3052.
The analysis subunit 3051, configured to input the security inspection result into a shape analysis model for performing item category analysis, so as to obtain an analysis result; a result judgment subunit 3052, configured to judge whether the analysis result is a dangerous article; if the analysis result is a dangerous article, determining that the security inspection result shows a suspicious article; and if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
It should be noted that, as can be clearly understood by those skilled in the art, the specific implementation processes of the security inspection apparatus 300 and each unit may refer to the corresponding descriptions in the foregoing method embodiments, and for convenience and brevity of description, no further description is provided herein.
A security device 300 of the type described above may be implemented in the form of a computer program that can be run on a computer apparatus as shown in fig. 12.
Referring to fig. 12, fig. 12 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 500 may be a server, wherein the server may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 12, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer programs 5032 include program instructions that, when executed, cause the processor 502 to perform a security method.
The processor 502 is used to provide computing and control capabilities to support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the execution of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be enabled to execute a security check method.
The network interface 505 is used for network communication with other devices. Those skilled in the art will appreciate that the configuration shown in fig. 12 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation of the computer device 500 to which the present application may be applied, and that a particular computer device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502 is configured to run the computer program 5032 stored in the memory to implement the following steps:
identifying and tracking passengers and articles entering a security check area to obtain a tracking result; acquiring a face image and an article image; performing association of the face and the object according to the tracking result, the face image and the object image to obtain an association result; obtaining a security inspection result; judging whether the security inspection result is that a suspicious article appears; if the security inspection result shows suspicious articles, confirming face information corresponding to the suspicious articles according to the association result; and generating alarm information according to the face information, and sending the alarm information to a terminal.
Determining the binding relationship between the face and the article in the tracking result;
and associating the face image with the object image according to the binding relationship to obtain an association result.
In one embodiment, when the processor 502 performs the step of identifying and tracking the passengers and the articles entering the security check area to obtain the tracking result, the following steps are specifically performed:
acquiring a video combining passengers and articles entering a security inspection area; and identifying and tracking the passengers and the articles according to the video to obtain a tracking result.
In an embodiment, when the processor 502 implements the steps of acquiring the face image and the object image, the following steps are specifically implemented:
shooting the face image through a camera; and acquiring an article image shot by the article inspection machine.
In an embodiment, when the processor 502 implements the step of associating the face and the article according to the tracking result, the face image, and the article image to obtain the association result, the following steps are specifically implemented:
determining the binding relationship between the face and the object in the tracking result; and associating the face image with the object image according to the binding relationship to obtain an association result.
In an embodiment, when the step of determining whether the security inspection result is a suspicious item occurs is implemented by the processor 502, the following steps are specifically implemented:
inputting the security inspection result into a shape analysis model for item category analysis to obtain an analysis result; judging whether the analysis result is a dangerous article; if the analysis result is a dangerous article, determining that the security inspection result shows a suspicious article; and if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
It should be understood that in the embodiment of the present Application, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will be understood by those skilled in the art that all or part of the flow of the method implementing the above embodiments may be implemented by a computer program instructing associated hardware. The computer program includes program instructions, and the computer program may be stored in a storage medium, which is a computer-readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present invention also provides a storage medium. The storage medium may be a computer-readable storage medium. The storage medium stores a computer program, wherein the computer program, when executed by a processor, causes the processor to perform the steps of:
identifying and tracking passengers and articles entering a security check area to obtain a tracking result; acquiring a face image and an article image; performing association of the face and the object according to the tracking result, the face image and the object image to obtain an association result; obtaining a security inspection result; judging whether the security inspection result is that a suspicious article appears; if the security inspection result shows suspicious articles, confirming face information corresponding to the suspicious articles according to the association result; and generating alarm information according to the face information, and sending the alarm information to a terminal.
Wherein, the security inspection result is the shape of the article shot by the article inspection machine.
In one embodiment, when the processor executes the computer program to perform the step of identifying and tracking the passengers and the articles entering the security check area to obtain the tracking result, the processor specifically performs the following steps:
acquiring a video combining passengers and articles entering a security inspection area; and identifying and tracking the passengers and the articles according to the video to obtain a tracking result.
In an embodiment, when the processor executes the computer program to implement the step of acquiring the face image and the object image, the following steps are specifically implemented:
shooting the face image through a camera; and acquiring an article image shot by the article inspection machine.
In an embodiment, when the processor executes the computer program to implement the step of performing association between a face and an article according to the tracking result, the face image and the article image to obtain an association result, the following steps are specifically implemented:
determining the binding relationship between the face and the object in the tracking result; and associating the face image with the object image according to the binding relationship to obtain an association result.
In an embodiment, when the processor executes the computer program to implement the step of determining whether the security inspection result is the suspicious item, the following steps are specifically implemented:
inputting the security inspection result into a shape analysis model for item category analysis to obtain an analysis result; judging whether the analysis result is a dangerous article; if the analysis result is a dangerous article, determining that the security inspection result shows a suspicious article; and if the analysis result is not a dangerous article, determining that the security inspection result does not show suspicious articles.
The storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, which can store various computer readable storage media.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
- 上一篇:石墨接头机器人自动装卡簧、装栓机
- 下一篇:一种视线追踪方法及系统