Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

121results about How to "Accurate interception" patented technology

Longitudinal minimal-invasion bone cutter for tubular bones

InactiveCN102860860AFor lateral tractionFacilitates longitudinal osteotomySurgeryTraction TreatmentPeriosteum
A longitudinal minimal-invasion bone cutter for tubular bones comprises a bone cutting end bone cutting device and far end positioning devices. The bone cutting end bone cutting device is slidingly sleeved on a positioning adjusting guide rail which is in a long-strip shape, a sliding groove is arranged in the middle of the positioning adjusting guide rail along the length direction, and scales of the positioning adjusting guide rail are arranged along the sliding groove. The far end positioning devices are symmetrically sleeved at two ends of the positioning adjusting guide rail slidingly. By means of the longitudinal minimal-invasion bone cutter, medical workers can perform longitudinal bone cutting operations on the tubular bones according to treatment needs, and the longitudinal minimal-invasion bone cutter is convenient to operate. When the operations are performed, the longitudinal minimal-invasion bone cutter provides convenience for transverse traction of bone blocks and meets needs of angiitis treatment. The bone cutting operations performed by the aid of the longitudinal minimal-invasion bone cutter belong to minimal-invasion operations, do not damage nerves, blood vessels, soft tissues and periostea, have small invasion, facilitate reconstruction and union of bones, and meet needs of longitudinal traction treatment of the tubular bones. By means of the longitudinal minimal-invasion bone cutter, safety and accuracy of the longitudinal bone cutting operations of the tubular bones are improved, medical workers can conveniently perform the operations, and the operation effect is guaranteed.
Owner:JIANGSU GUANGJI MEDICAL TECH

Vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system

A vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system comprises a searching cradle head, an early warning detector, a launch canister and bullet ammunition, wherein the early warning detector and the launch canister are arranged on the searching cradle head, and the bullet ammunition is arranged in the launch canister. According to the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system, the technical problem that an interception method provided by the prior art only applies to propeller-type unmanned aerial vehicles made from metal, is difficult to apply to high-speed maneuverable unmanned aerial vehicle targets and is prone to causing secondary damage to ground surface personnel or other targets are solved. According to the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system, unmanned aerial vehicle distance and speed information is obtained through a millimeter wave one-emitting-and-double-receiving early warning frequency-modulated radar, the unmanned aerial vehicles are searched, traced and automatically targeted through the searching cradle head, and a net bullet is launched; the net bullet is equipped with a close sensing fuse, timely ignition is conducted with the miss distance serving as the base point, small rockets are launched so as to enable the net bullet to obtain best cooperating of the net setting speed and the flight speed, and the time for approaching the targets are shortened to the greatest extent; and interception and capturing efficiency of the net bullet interception system are improved, and the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system is suitable for accurate interception and capturing of the high-speed maneuverable unmanned aerial vehicles.
Owner:芜湖博高光电科技股份有限公司

Longitudinal minimal-invasion bone cutter for tubular bones

InactiveCN102860860BFor lateral tractionFacilitates longitudinal osteotomySurgeryLess invasive surgeryEngineering
A longitudinal minimal-invasion bone cutter for tubular bones comprises a bone cutting end bone cutting device and far end positioning devices. The bone cutting end bone cutting device is slidingly sleeved on a positioning adjusting guide rail which is in a long-strip shape, a sliding groove is arranged in the middle of the positioning adjusting guide rail along the length direction, and scales of the positioning adjusting guide rail are arranged along the sliding groove. The far end positioning devices are symmetrically sleeved at two ends of the positioning adjusting guide rail slidingly. By means of the longitudinal minimal-invasion bone cutter, medical workers can perform longitudinal bone cutting operations on the tubular bones according to treatment needs, and the longitudinal minimal-invasion bone cutter is convenient to operate. When the operations are performed, the longitudinal minimal-invasion bone cutter provides convenience for transverse traction of bone blocks and meets needs of angiitis treatment. The bone cutting operations performed by the aid of the longitudinal minimal-invasion bone cutter belong to minimal-invasion operations, do not damage nerves, blood vessels, soft tissues and periostea, have small invasion, facilitate reconstruction and union of bones, and meet needs of longitudinal traction treatment of the tubular bones. By means of the longitudinal minimal-invasion bone cutter, safety and accuracy of the longitudinal bone cutting operations of the tubular bones are improved, medical workers can conveniently perform the operations, and the operation effect is guaranteed.
Owner:JIANGSU GUANGJI MEDICAL TECH

Device and method for data interception and time sequence drifting detection of interface of synchronous dynamic random access memory

InactiveCN101989466AAccurate interceptionSolve the problem that the correct data cannot be interceptedDigital storageDifferential signalingSynchronous dynamic random-access memory
The invention discloses a device and a method for the data interception and the time sequence drifting detection of an interface of a synchronous dynamic random access memory. The device comprises a differential signal to single-ended signal converting circuit, a first phase delay circuit and a data interception circuit, wherein the differential signal to single-ended signal converting circuit isconnected to a synchronous transmission interface to receive a differential data interception signal transmitted by the synchronous transmission interface and convert the differential data interception signal into a single-ended data interception signal; the first phase delay circuit is connected to the differential signal to single-ended signal converting circuit and regulates the phase of the single-ended data interception signal to generate a single-ended data interception signal subjected to phase delay; and the data interception circuit is connected to the first phase delay circuit to intercept synchronous data transmitted by the synchronous transmission interface according to the single-ended data interception signal subjected to the phase delay.
Owner:SUNPLUS TECH CO LTD

Method and system for realizing filtering of malicious calls through real-time algorithm

ActiveCN106506769ARelieve the stress of analyzing interceptsHigh efficiency in filtering malicious callsSubstation equipmentAutomatic exchangesReal time algorithmReal time analysis
The invention belongs to the technical field of mobile telephone communication, and particularly relates to a method for realizing filtering of malicious calls through a real-time algorithm. The method comprises the following steps that: a calling number initiates a call to a called number already applying for malicious call protection; the calling number and the called number are transmitted to a real-time malicious call analyzing and filtering platform; the real-time malicious call analyzing and filtering platform matches the calling number and the called number with a number library, and judges whether to intercept the calling number or not by using the real-time algorithm; and if the calling number is not intercepted, the calling number is put through. The invention also discloses a malicious call filtering system. The malicious call filtering system comprises a malicious call intercepting assembly module, a support platform module, an algorithm model module and an external connection interface module. In the method, the malicious call protection is applied through the called number, the calling number and the called number are transmitted to the real-time malicious call analyzing and filtering platform, the calling number and the called number are matched with the number library for interception, and whether to intercept the non-intercepted calling number or not is judged by the real-time algorithm, so that filtering of the malicious calls is realized, and the trouble of a called user is avoided.
Owner:ZHEJIANG PONSHINE INFORMATION TECH CO LTD

Sizing intercepting rock core drilling tool

The invention discloses a sizing intercepting rock core drilling tool, which belongs to the field of drilling, boring and manufacturing circular stone pillars. An inner core screw thread of a drilling tool key slot is connected with a screw thread at the upper part of a drill bit; a drilling tool upper sleeve screw thread is connected with a long core tube; a small section of long core tube is equivalently added in drilling; and the drilling tool is lifted within a set size, an embedded tool bit is enabled to act through the conversion of the resistance force, the friction force and the elastic force so as to transversely cut a rock core so as to extract the rock core. The drilling tool can be made into an independent part, a key slot inner core is connected with an upper sleeve spline, the lower plane of the upper sleeve is overlapped with the upper plane of the drill bit, and the drilling pressure and the torsion are transferred to implement the drilling. A retainer ring and the upper sleeve screw thread are connected with each other to lock a longitudinal gap, top cutter bodies are overlapped and rotated inside an insert, and the transverse cutting depth of the tool bit can be controlled. The drill bit is lifted, and precipitated sand and stone resist the drill bit, so that the spline slides, the insert and the top cutter bodies slide, two overlapped oblique surfaces are staggered so as to push the tool bit to transversely cut the rock core, and when the tool bit is continuously lifted, the broken rock core is lifted out of the ground.
Owner:禹畅

Bearing fault diagnosis and residual life prediction method based on Johnson transformation and particle filter algorithm

Provided is a bearing fault diagnosis and residual life prediction method based on Johnson transformation and a particle filter algorithm. The method comprises the followings steps of: 1) acquiring a bearing full-life-cycle vibration signal; 2) computing K-S distance by using the vibration signal, and constructing an index reflecting a bearing health state based on the K-S distance; 3) performing Johnson transformation on non-Gaussian distribution health index data in healthy operation based on the constructed index in order to transform the health index data into Gaussian distribution data, and determining an associated abnormal threshold range by using the attribute of the Gaussian distribution; and 4) performing fitting analysis on health index data in a loss cycle, constructing a state space model representing the bearing degeneration process, updating model parameters by using currently observed health index data and the particle filter algorithm, and predicting the residual life of the bearing. The method diagnoses early bearing fault so as to accurately derive the performance degeneration data of the bearing in the loss cycle, and is fast in computation speed and high in residual life prediction precision.
Owner:ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products