dev@symbolsoft.net

JP  /  EN  /  CN
JP / EN / CN
General Introduction
The 5 major features
Feature 1: Human action behavior recognition based on visual AI
Implementing high-precision video and image parsing through AI algorithms and model training

Personnel action behavior recognition is the core feature of our company's visual AI product series. It can achieve automatic monitoring and alarm of personnel behavior by analyzing and identifying the characteristics of their actions, postures, and behaviors in videos. It can help security personnel detect abnormal behavior in a timely manner and take corresponding measures to ensure the safety of personnel and property. Through visual AI analysis, we can obtain various information such as:

Personnel Action Information: (1) Posture recognition: By analyzing and identifying the posture of personnel, it is possible to determine whether they are in an abnormal state, such as whether they have fallen, fallen to the ground, or have abnormally tilted bodies, in order to promptly identify potential safety hazards; (2) Behavioral analysis: By analyzing and identifying personnel behavior, it is possible to determine whether they are in an abnormal state, such as whether they have engaged in abnormal behaviors such as fighting and pushing, and to promptly identify safety hazards of personnel; (3) Action trajectory: By analyzing and tracking the movement trajectory of personnel, it is possible to determine whether their movements are suspicious or if they are in a dangerous area, and promptly detect safety hazards for personnel.

Personnel attribute information: For example: gender, age, skin color, etc

Personnel psychological information: For example: facial expressions, joys and sorrows

Based on the above information, combined with environmental information (smoke, fog, fire, temperature, etc.), identification and analysis can provide timely and accurate monitoring data for security personnel, help them better judge the safety of the current environment, and take corresponding measures in a timely manner, effectively ensuring the safety of personnel and property.

Feature 2: Digital twin
Building digital solutions through 3D virtual scenes

Digital Twin constructs a digital and realistic virtual environment through high-precision 3D modeling of the real world. In this environment, it is possible to simulate the operational status of the real world, monitor and intelligently analyze various facilities, personnel, environment, etc. in real time, in order to improve management efficiency and service quality.

Taking the field of security as an example, digital twins can predict, simulate, and optimize security events through simulation, data collection and processing, providing scientific basis for the operation of security systems. Firstly, digital twins can provide the ability to highly restore the real environment. By obtaining a large amount of real-world data to build models, the operational status of security systems can be comprehensively presented in the virtual world, allowing security personnel to predict, simulate, and optimize security events in the virtual environment. This provides strong support for them to develop scientific and reasonable security strategies.

Feature 3: AI edge gateway
Built in high-precision graphic recognition algorithm library

The edge gateway serves as the intermediate layer between terminal devices (cameras, IoT sensors, etc.) and cloud servers, responsible for collecting data from terminal devices, processing and storing it, and sending processed and encapsulated data to cloud servers. By connecting to terminal devices, edge gateways can achieve real-time control and monitoring of devices, and analyze and make decisions on data. At the same time, edge gateways can also coordinate communication between terminal devices, thereby achieving effective management and control of the entire IoT environment.

The role of edge intelligent gateway:

Local processing: Edge gateways can process data locally, reduce data transmission volume, improve response speed, and reduce transmission costs;

Storage of data: Edge gateways can store data locally, protect data privacy, and improve data security;

Analyzing data: Edge gateways can analyze local data, extract valuable information, and support real-time decision-making;

Device control: Edge gateways can achieve automated control, intelligent management, and more through local control of devices;

Cloud services: Edge gateways can achieve remote control, data sharing, collaborative decision-making, and other functions through cloud services.

Feature 4: Unified visualization platform
Integrated linkage and control based on situational awareness and intelligent decision-making results

The unified visualization platform involves multiple technologies, mainly including: 3D WebGL rendering engine, model center, retrieval rule designer, drag and drop large screen design tool, event map, data fusion center, alarm statistics panel, and so on. The platform is equipped with an alarm protocol interface, which can trigger alarms through various methods such as email, phone, and alarm lights, achieving integrated linkage and control.

Feature 5: Integration of IoT technology
Better collection of environmental information and identification of personnel actions and behaviors

Integrating visual AI technology with the Internet of Things technology to better achieve environmental information collection and human action behavior recognition can provide more precise and widely applicable solutions in certain scenarios.

Scenario 1: By using IoT sensors to perceive environmental information such as smoke, fog, fire, temperature, etc., it provides a basis for more reasonable analysis of personnel behavior and helps security personnel take corresponding measures in a timely manner, effectively ensuring the safety of personnel and property.

Scenario 2: In mines and other factories, it is not possible to achieve 100% positioning through camera data. Therefore, an intelligent work permit scheme is adopted, which equips each on-site operator with a high-precision GPS positioning work permit, and obtains and uploads the location information of each miner in real time to the backend server.

Case studies
×
×