Facial recognition technology escorts G20 people's securities to build a credit monitoring system
The pin mill consist of hopper,fixed discs,rotating discs,motor,dust collector (optional),control box and other related parts.It makes use of the high speed relative movement of the movable fixed disc and the rotating disc to crush the materials through the comprehensive effect of striking and friction of the fluted disc as well as the mutual striking of the materials. the crushed
material can be discharged directly from the grinding chamber of the machine and the desired granule size can be obtained by installing screens with different apertures. Besides, the whole machine is made of stainless steel. The inner surface of the enclosure becomes smooth through processing,thus changing the powder residual phenomenon due to the coarse inner surface of the previous models. As a result, the production of medicine, food and chemical products can better conform to the national standard and the GMP requirement.
Universal Pulverizer,Pulverizer Machine,Pulveriser Machine,Plastic Pulverizer Machine XINXIANG CHENWEI MACHINERY CO.,LTD , https://www.sieves.nl
The construction of a social security prevention and control system is a huge project involving multiple prevention and control elements and all aspects of society. Especially during large-scale activities, the sudden increase in passenger flow and traffic flow has brought a great challenge to security work. Hangzhou authorities at various levels have closely deployed security requirements for the ministries and departments, combined with smart security and innovative technologies, and strive to establish a three-dimensional public security prevention and control system, firmly guarding the "one meter" line of defense at the summit security work.
Face recognition advantages meet G20 summit technical requirements
In order to fully escort the G20 summit, during the preparation and holding of the conference, Hangzhou will increase the supervision of the city and the floating population, and will use face recognition technology to assist or replace staff to complete the stay of personnel in multiple security bays. Identity verification work. In recent years, with the advancement of the safe city strategy and the rapid development of technology, face recognition is no longer a secret new technology. This technology has been applied in many industries such as Internet applications, finance, transportation, and real estate.
Face recognition based on non-contact, friendly and intuitive and precise and fast features has attracted more and more attention in security applications. The working principle of face recognition technology in a human-certified application scenario: "First through front-end camera acquisition To face images or video streams, the system can automatically detect and track people's faces in images or dynamic videos, and perform face location and quality detection on the collected images through a series of related technologies. Extract identity document information for cross-checking to ensure consistency and legitimacy between the certificate holder and the certificate."
The escort G20 has invested a huge security team, but for manual auditing, long-term and single-certification work can easily put security personnel into fatigue and even relax their vigilance. The authentication and authentication system based on face recognition technology can be used for consecutive days. Work will not affect efficiency. Compared with traditional authentication methods, the outstanding advantages of face recognition are that they can fundamentally eliminate falsification and theft, have higher reliability, security and availability, and face recognition technology can be applied to multiple scenarios flexibly. In combination with different product forms to meet different security needs. It can be seen that the means of face recognition technology defense can not only reduce the pressure on the air defense, but also ensure that security work does not leave dead spots and blind spots, and make positive contributions to the smooth convening of the summit.
Train station, subway station or primary monitoring target
The unveiling of the G20 Summit will undoubtedly bring unprecedented pressure on the transportation hubs in Hangzhou. Stations, subway stations and passenger stations will become areas of potential safety hazards. The reporter learned that China has already had a number of railway stations, passenger stations and even airports that have introduced face recognition security equipment. For instance, not long ago, Tongxiang Bus Terminal combined face recognition technology with the ticket checking system to ensure the realization of passengers, cards, and passengers. Ticket "three in one" security inspection work.
“It is not difficult to integrate human-certification systems into face recognition channel gates, but it is indeed a challenge for ordinary face recognition products in the market to respond to such large-scale flow of people and complex crowd attributes. For high security requirements, security systems need to consider each other's data accumulation and algorithm capabilities when adopting face recognition technology, said the person in charge of the product.
Hotel witnesses on line at check-in-one system brush face <br> <br> has been * hotel security problems are the focus of management, hotels and guesthouses are also entrusted with assisting the flow of personnel department * compulsory registration of any country The accommodation needs to verify the real identity of the passengers. During the preparation and holding of the summit, the hotel security will undoubtedly become one of the G20 security top ten projects.
Checking the identity at check-in is a major problem in the management of the hotel industry service process. “In the past, when registering at the time of check-in, the front-line staff could only register the ID card presented by the passengers. The accuracy of verification of the identity of the holder could not be guaranteed. Frequent occurrences of fraudulent ID cards or fraudulent use of other’s documents were not only The damage to the personal properties of other residents has also been created, which has also created obstacles in the pursuit of the work in the process of handling the case. Therefore, it is imperative to popularize some sophisticated technical means as the industry standard.†said the manager responsible for the internal work of Hangzhou law and order.
It is reported that from the beginning of July, more than 1,000 hotels in various urban areas of Hangzhou have fully adopted the authentication and verification system for human identification and authentication, and implemented a regional registration system in Gongshu District, Hangzhou City, which covers 100% of medium and high-end hotels in Hangzhou. Including Hyatt, City Shangri-La, Wang Hu Hotel, National University Radisson Hotel, JW Marriott, Sheraton Blue and other star hotel, the system is a soft and hard integrated intelligent terminal. When the passenger enters the front desk of the hall to check in, the system will automatically collect the portrait information from the registration personnel through the HD camera at the scene, and identify the identities of the registrant by comparing with the photos of the ID provided by the passenger to ensure the fast and efficient completion of the check-in certification. Work, at the same time, it can also permanently save the registration information and identification results, to facilitate the department to check the registration information at any time to understand the status of personnel access.
Face recognition Social security identity verification is widely used
In addition to the above-mentioned key security management and control scenarios, the system for face recognition and verification has a wide range of applications. For example, real-name management of Internet cafes and security management in examination examination rooms all draw reference. It is understood that the above-mentioned system of people-to-people cooperation is also used in more than 100 Internet cafes in Hangzhou; currently, the human resources, judicial examinations, and even college entrance examinations in many places have used the technology of face recognition, identification, and identification as the main means of examinee identification. , In the entrance of the test center, set the candidate's identification channel, scan the candidate's valid resident ID card, and take pictures on the spot to perform face recognition and comparison, and then enter the examination room through the rear.
In addition, in order to alleviate the pressure of the temporary population in the city, many online travel platforms and travel agencies launched the G20 special line in July to encourage citizens to travel to other provinces and cities in China or the surrounding urban areas during the G20 period. The face recognition technology can also help tourist attractions to ease the pressure of ticket checking. The face recognition access control is set at the entrance and exit point of the scenic spot, the face recognition access control system is docked with the ticketing system, the face information registration is completed at the time of ticket purchase, and the visitor's access time is set to ensure that the visitors are unified when entering and exiting the scenic spot. Convenient for tourists to play more relaxed arrangements, but also can effectively prevent cattle dumping.
The G20 summit was the highest-standard international conference organized by Zhejiang Province since the founding of the People's Republic of China. Hangzhou, as the card of traditional Chinese culture and the new Silicon Valley of the modern Internet economy, are the only ones that can pick this heavy responsibility. The joining of face recognition technology has provided powerful protection for the security work of the summit, and has also demonstrated to the world the latest scientific and technological achievements of modern security in China. With the advancement of technology industrialization, face recognition will provide radiation intelligence command, public security prevention and control, and society. Various business systems such as management, law enforcement supervision, and comprehensive services help the system to achieve greater effectiveness. (Source: Phoenix Information)