Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1512results about How to "Achieve consistency" patented technology

Three-dimensional enhancing realizing method for multi-viewpoint free stereo display

The invention discloses a three-dimensional enhancing realizing method for multi-viewpoint free stereo display, which comprises the following steps: 1) stereoscopically shooting a natural scene by using a binocular camera; 2) extracting and matching a characteristic point of an image of a main camera, generating a three-dimensional point cloud picture of the natural scene in real time, and calculating a camera parameter; 3) calculating a depth image corresponding to the image of the main camera, drawing a virtual viewpoint image and a depth image thereof, and performing hollow repairing; 4) utilizing three-dimensional making software to draw a three-dimensional virtual model and utilizing a false-true fusing module to realize the false-true fusing of the multi-viewpoint image; 5) suitably combining multiple paths of false-true fused images; and 6) providing multi-viewpoint stereo display by a 3D display device. According to the method provided by the invention, the binocular camera is used for stereoscopically shooting and the characteristic extracting and matching technique with better instantaneity is adopted, so that no mark is required in the natural scene; the false-true fusing module is used for realizing the illumination consistency and seamless fusing of the false-true scenes; and the multi-user multi-angle naked-eye multi-viewpoint stereo display effect is supplied by the 3D display device.
Owner:万维显示科技(深圳)有限公司

Information safety penetration testing method for distribution automation system

ActiveCN104468267AAchieve consistencyImplementations should be consistent withData switching networksThe InternetMaster station
The invention discloses an information safety penetration testing method for a distribution automation system. Penetration testing is carried out on a master station system, a distribution network terminal and a communication channel, the information system vulnerability penetration testing technology is fully used, the safety of the distribution automation system is evaluated by simulating the attack method of a hacker, and the information safety penetration testing method includes the active analysis for any weakness, technical defects or loopholes of the master station system, the communication circuit and the distribution network terminal. The information safety penetration testing method for the distribution automation system can be used for safety risk analysis work before the distribution automation system is connected to the internet, guidance is provided for finishing problem rectification and reformation and retest work of manufacturers with safety risks, and the method is high in pertinence and wide in test range. Compared with a traditional penetration testing method, the test time can be largely shortened, offline repairing events caused by safety problem failures after equipment is on line are reduced, the information safety penetration testing for the distribution automation system is realized, and the information safety penetration testing method can be applied to industrial control systems inside and outside the industry.
Owner:STATE GRID CORP OF CHINA +1

Method for maintaining consistency and performing recovery in a replicated data storage system

A recovery process allows a recovering replica in a replicated data storage system to recover from a current replica the changes to the data that it has missed during a failure while, at the same time, the system is processing new requests issued by the source. Sequence numbers, assigned by the source to write requests and stored by each replica in association with the data item that the write request modifies, are used by the recovery process to determine when a replica has missed one or more write requests and requires recovery. During recovery, the recovering replica ignores all requests directly received from the source, and replaces the contents of a data item with the data received from the current replica only if the newly received data item has a higher sequence number than the corresponding sequence number of the data item already stored in the recovering replica. It also updates data items in response to new write requests that are forwarded to it by the current replica. At the same time, the current replica continues to receive requests from the source, performs those requests, and forwards those write requests to the recovering replica. It also scans its data items and sends to the recovering replica those data items and associated sequence numbers that have a sequence number higher than the sequence number of the last consecutive write request sent by the source that the recovering replica received before missing a write request.
Owner:ALCATEL LUCENT SAS

Visual detection method and device for defects of liquid crystal display screen

The invention relates to a visual detection method and device for defects of a liquid crystal display screen. The method comprises the following steps: adjusting positions of buttons of button disks of a matrix electromagnetic switch according to the arrangement situation of keys of a sample to be detected, so as to enable the positions of the buttons to be fit with the arrangement of the keys of the sample to be detected; collecting a template image of each button in an off-line manner; collecting the image of the liquid crystal display screen in real time by using a CCD (charge coupled device) and a lens which are connected with an embedded processor; catching one frame of an image to be detected, and performing four steps of preprocessing operation of color image graying, binaryzation, median filtering and positioning by a projection method on the image; performing template matching calculation on the preprocessed image and the template images by a sliding template matching method, obtaining a visual detection result of the defects, and performing character recognition on the result without defects. The invention also provides a corresponding system device. The method provided by the invention has the advantages of high speed and high accuracy, overcomes the defects of low manual defect detection efficiency of the liquid crystal display screen, high cost and poor consistency, and meanwhile, realizes integration of detection and recognition.
Owner:XI AN JIAOTONG UNIV

Construction method of intelligent workshop digital twin system

The invention discloses a construction method of an intelligent workshop digital twin system, and belongs to the technical field of intelligent manufacturing. The method comprises the following steps: aiming at physical workshop production elements, constructing a workshop total element multi-level twin model to obtain a digital twin workshop model; constructing a data acquisition system to acquire multi-source heterogeneous data of a physical workshop, preprocessing and standardizing the multi-source heterogeneous data, and storing the preprocessed and standardized multi-source heterogeneous data into a database; by adopting the digital twin workshop model as a client and by combination with a server, achieving interaction between the digital twin workshop client and the database so that bidirectional mapping between the digital twin workshop client and the physical workshop is realized; based on three-dimensional visualization system integration, subjecting the physical workshop model and the digital twin workshop model to deep fusion interaction to finish construction of the intelligent workshop digital twin system. Therefore, the functions of real-time state display, historical state reproduction, remote control, fault alarm, state prediction and the like are achieved, and the problems that existing digital workshop data are monotonous in presentation and poor in interaction and immersion are solved.
Owner:XI AN JIAOTONG UNIV

Twist-off picking paw mechanism and picking method thereof

InactiveCN101878699AAccurate and stable gripGuaranteed stabilityPicking devicesEngineeringDrive wheel
The invention relates to a twist-off picking paw mechanism and a picking method thereof. The mechanism is characterized by comprising a bracket provided with an upper support plate and a lower support plate, a screw transmission device arranged on the upper support plate, a rotation device arranged on the lower support plate, and a paw device connected on the rotation device; the screw transmission device is connected with a screw through a screw motor, and the screw is in threaded connection with a slide block passing through two guide rods; the rotation device is connected with a rotary input shaft through a rotation motor, the rotary input shaft is fixedly connected with a driving wheel which is engaged with a driven wheel on a rotary output shaft, and the rotary output shaft is in rotary connection with the lower support plate and passes through and is fixedly connected with a substrate; and the paw device comprises two fixed plate arranged on the substrate, the other ends of the two fixed plates are hinged with an L-shaped finger driving plate respectively, a V-shaped finger is fixed on the lower parts of the finger driving plates respectively, the upper parts of the finger driving plates are provided with a chute respectively, a push rod is connected in the two chutes together through a connecting pin, and the other end of the push rod passes through the rotary output shaft and is fixedly connected on the slide block.
Owner:CHINA AGRI UNIV

Method for continuously producing large-particle spherical cobalt carbonate

The invention relates to a method for continuously producing large-particle spherical cobalt carbonate. The method comprises the following steps: manufacturing a turbid liquid containing small-particle-size cobalt carbonate seed crystal and manufacturing a turbid liquid containing large-particle spherical cobalt carbonate, stirring the turbid liquid containing the small-particle-size cobalt carbonate seed crystal and the turbid liquid containing large-particle-size cobalt carbonate to form a mixed liquid, carrying out solid-liquid separation, washing and filter pressing to obtain a filter cake as a large-particle cobalt carbonate filter cake, drying the filter cake, and repeatedly operating to obtain the large-particle cobalt carbonate powder. According to the method disclosed by the invention, the small-particle-size cobalt carbonate seed crystal is adopted to control the particle size of the large-particle cobalt carbonate in reaction mother liquor, so that the degree of sphericity of cobalt carbonate produced by continuous production can be ensured to be high, the particle size can be stably controlled within the range of 15+/-0.5 microns, and the consistency and the stability of the particle size of the large-particle spherical cobalt carbonate through large-scale continuous production can be realized; the method is simple in process, easy to operate and low in cost, and can provide the high-quality raw material for producing high-end lithium cobalt oxide; the carbonate is used as a precipitant, so that the environment can be optimized; the production efficiency can be improved, and the wide application prospect can be achieved.
Owner:CHINA ELECTRONIC TECH GRP CORP NO 18 RES INST

Data chain information circulation control system based on block chain as well as method

The invention belongs to the technical field of transmission control procedures such as a data chain stage control procedure and discloses a data chain information circulation control system based ona block chain as well as a method. The system disclosed by the invention is based on a weighted PBFT algorithm, can distribute weights specific to different entity characters of a data chain, fully considers significance of different characters of the data chain as well as influence of the different characters on consistency and has high flexibility; based on an access control scheme of the blockchain, consistency and tampering resistance of the block chain guarantee credibility of a contract self, a smart contract can be automatically executed, characteristics of the block chain are combined, and credibility of an access strategy output by the contract is guaranteed, so that data security is effectively guaranteed; and attribute encryption is combined with symmetrical encryption, data isencrypted by using a symmetrical encryption scheme, and a symmetric key is encrypted by using an attribute encryption algorithm, so that efficient encryption is guaranteed, and flexible access control is supported.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products