By utilizing artificial intelligence and pattern rec ognition techniques, we propose an integrated mobile-customer identity recognition approach in this paper, based on cus tomer's behavior characteristics extracted ...By utilizing artificial intelligence and pattern rec ognition techniques, we propose an integrated mobile-customer identity recognition approach in this paper, based on cus tomer's behavior characteristics extracted from the customer information database. To verify the effectiveness of this approach, a test has been run on the dataset consisting of 1 000 customers in 3 consecutive months.The result is compared with the real dataset in the fourth month consisting of 162 customers, which has been set as the customers for recognition. The high correct rate of the test (96.30%), together with 1. 87% of the judge-by-mistake rate and 7.82% of the leaving-out rate, demonstrates the effectiveness of this approach.展开更多
For decades, safety has been a concern for the construction industry. Helmet detection caught the attention of machine learning, but the problem of identity recognition has been ignored in previous studies, which brin...For decades, safety has been a concern for the construction industry. Helmet detection caught the attention of machine learning, but the problem of identity recognition has been ignored in previous studies, which brings trouble to the subsequent safety education of workers. Although, many scholars have devoted themselves to the study of person re-identification which neglected safety detection. The study of this paper mainly proposes a method based on deep learning, which is different from the previous study of helmet detection </span><span style="font-family:Verdana;">and human identity recognition and can carry out helmet detection and</span><span style="font-family:Verdana;"> identity recognition for construction workers. This paper proposes a computer vision-based worker identity recognition and helmet recognition method. We collected 3000 real-name channel images and constructed a neural network based on </span></span><span style="font-family:Verdana;">the </span><span style="font-family:Verdana;">You Only Look Once (YOLO) v3 model to extract the features of the construction worker’s face and helmet, respectively. Experiments show that the method has a high recognition accuracy rate, fast recognition speed, accurate recognition of workers and helmet detection, and solves the problem of poor supervision of real-name channels.展开更多
A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to...A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to an asylum.This paper attempts to analyze Blanche’s identity crisis from identity negotiation theory in cross-cultural communication,including identity security,identity inclusion,and identity predictability.Thereby it figures out that one who suffers hostile gazes from others in a strange environment,is unable to carry out an intimate and effective communication,which will eventually lead to a sense of loss and despair.This paper puts forward the methods to obtain identity recognition:be honest with others,be sure of oneself,and try one’s best to fit in the new environment,aiming to help people avoid identity crisis in interpersonal communication and establish a positive identity.展开更多
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be...A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.展开更多
基金Supported by Guangdong Mobile CommunicationCompany Li mited Key Item(19984001)
文摘By utilizing artificial intelligence and pattern rec ognition techniques, we propose an integrated mobile-customer identity recognition approach in this paper, based on cus tomer's behavior characteristics extracted from the customer information database. To verify the effectiveness of this approach, a test has been run on the dataset consisting of 1 000 customers in 3 consecutive months.The result is compared with the real dataset in the fourth month consisting of 162 customers, which has been set as the customers for recognition. The high correct rate of the test (96.30%), together with 1. 87% of the judge-by-mistake rate and 7.82% of the leaving-out rate, demonstrates the effectiveness of this approach.
文摘For decades, safety has been a concern for the construction industry. Helmet detection caught the attention of machine learning, but the problem of identity recognition has been ignored in previous studies, which brings trouble to the subsequent safety education of workers. Although, many scholars have devoted themselves to the study of person re-identification which neglected safety detection. The study of this paper mainly proposes a method based on deep learning, which is different from the previous study of helmet detection </span><span style="font-family:Verdana;">and human identity recognition and can carry out helmet detection and</span><span style="font-family:Verdana;"> identity recognition for construction workers. This paper proposes a computer vision-based worker identity recognition and helmet recognition method. We collected 3000 real-name channel images and constructed a neural network based on </span></span><span style="font-family:Verdana;">the </span><span style="font-family:Verdana;">You Only Look Once (YOLO) v3 model to extract the features of the construction worker’s face and helmet, respectively. Experiments show that the method has a high recognition accuracy rate, fast recognition speed, accurate recognition of workers and helmet detection, and solves the problem of poor supervision of real-name channels.
文摘A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to an asylum.This paper attempts to analyze Blanche’s identity crisis from identity negotiation theory in cross-cultural communication,including identity security,identity inclusion,and identity predictability.Thereby it figures out that one who suffers hostile gazes from others in a strange environment,is unable to carry out an intimate and effective communication,which will eventually lead to a sense of loss and despair.This paper puts forward the methods to obtain identity recognition:be honest with others,be sure of oneself,and try one’s best to fit in the new environment,aiming to help people avoid identity crisis in interpersonal communication and establish a positive identity.
文摘A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.