Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

372results about How to "Avoid analysis" patented technology

Water turbine blade blank profile measuring and machining allowance analyzing method

The invention relates to a water turbine blade blank profile measuring and machining allowance analyzing method capable of effectively solving the problem of water turbine blade blank profile measurement and machining allowance analysis to ensure the manufacturing quality and precision of the water turbine blades, comprising the following technical solutions: measuring the blade blanks by using a digital close range photogrammetry to obtain the measuring point cloud data shapes of the blank profiles consequently, aligning a measuring coordinate system where the measuring point clouds are located to a design coordinate system where a CAD design model is located, establishing a differential relation of free-form surface parameters with respect to rigid rotation parameters by using an analytic method derived by the multivariate of Newton iteration method to obtain a Jacobian matrix and Hessian matrix which are available for a target equation; then performing the numerical optimization calculation based on the LM method and Newton iteration method, and performing report or graphical output and print on the result. The inventive method is scientific, advanced, stable and reliable, and has high accuracy, thereby ensuring the hydraulic stability, production efficiency and cavitation property, and bringing enormous economic and social benefits.
Owner:郑州辰维科技股份有限公司

Five-axis linkage machine tool rotation shaft geometric error continuous measurement method

The invention discloses a five-axis linkage machine tool rotation shaft geometric error continuous measurement method. The method comprises the steps that a laser displacement sensor is arranged on a spindle of a five-axis linkage machine tool; three non-collinear calibration balls are arranged on the work bench, and the homogeneous coordinate expression of each calibration ball is set; a swing axis A and a rotary axis C are used as calibration axes; the laser displacement sensor is used to measure the position deviation of the center of each calibration ball in X , Y and Z directions when the swing axis A and the rotary axis C in different corners; and according to the position deviation of the center of each calibration ball and the homogeneous coordinate expression of each calibration ball, geometric errors of the swing axis A and the rotary axis C are calculated. According to the invention, an oblique surface is used to establish the mapping relationship among the position deviation of a rigid body to be measured in X, Y and Z directions; translation in X, Y and Z dimensions is mapped to distance change in a single dimension; one-time chucking and continuous sampling are realized at the same time; and the method has the advantages of high measurement efficiency and high precision.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for merging reboot log, method and system for uploading reboot log and readable storage medium

The invention discloses a method for merging reboot log, a method and a system for uploading the reboot log and a readable storage medium. The method for merging the reboot log includes receiving and parsing the reboot log uploaded by mobile terminals to obtain reboot types and reboot reasons of the mobile terminals and merging the reboot types and the reboot reasons to obtain reboot keywords; judging whether the reboot keywords are available in reboot problem databases or not; storing the reboot log as a new reboot reason type when the reboot keywords are not available in the reboot problem databases and adding the reboot keywords into the reboot problem databases so as to associatively store the reboot keywords and the new reboot reason type. The methods, the system and the readable storage medium have the advantages that the reboot types and the reboot reasons are merged with one another to obtain the new reboot keywords, the reboot keywords are added into the reboot problem databases, accordingly, the reboot keywords and the new reboot reason type can be associatively stored, developers can know reasons for system reboot only by means of analyzing elements in the reboot problem databases, analysis on repeated types of reboot log can be omitted, and workload can be relieved.
Owner:NUBIA TECHNOLOGY CO LTD

Clustering algorithm-based exceptional event analysis method for evaluating whole state of electric meter

The invention discloses a clustering algorithm-based exceptional event analysis method for evaluating the whole state of an electric meter. The method comprises the steps of aiming at the abnormal users with overvoltage, overcurrent, wrong clock of the electric meter, undervoltage of the electric meter, overhigh temperature of the electric meter, opened cover of the electric meter, continuous exceeding on the upper limit of a load, voltage reverse phase sequence, current reverse phase sequence, inversed current, imbalanced voltage three phases, imbalanced current three phases and the like, the document information of the users are checked, and the users having documents with problems are filtered; for the users with the abnormity, the whole state of the electric meter is evaluated and analyzed by combining information such as marketing service metering fault, fault meter changing and information lack examining on site through the comprehensive analysis of the clustering algorithm according to multiple dimensions such as the manufacturer, the batch, the region, the type of the metering device, the voltage level, the user class and the line, a technical means and a reference basis are provided for whether an electric power company for on-site inspection needs to be performed and whether a shift plan needs to be made, and the method is accurate and has small errors.
Owner:STATE GRID CORP OF CHINA +1

Mobile device with an obfuscated mobile device user identity

A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier.
Owner:IBM CORP

Method and apparatus for accessing a foreign network with an obfuscated mobile device user identity

A mobile device identifier (such as an MSISDN) that typically accompanies a mobile device request is replaced with an “enriched” identifier that exposes the mobile device user's home operator but obfuscates the mobile device's (and, thus, the device user's) identity. In one embodiment, the identifier comprises a first part, and a second part. The first part comprises a data string that identifies (either directly or through a database lookup) the mobile device user's home operator. The second part, however, is an opaque data string, such as a one-time-use unique identifier (UID) or a value that is otherwise derived as a function of the MSISDN (or the like). The opaque data string encodes the mobile device's identity in a manner that preferably can be recovered only by the user's home operator (or an entity authorized thereby). When the mobile device user roams into a foreign network, that network receives the enriched identifier in lieu of an MSISDN. The foreign network uses the first part to identify the mobile device user's home network, e.g., to determine whether to permit the requested access (or to provide some other value-added service). The foreign network, however, cannot decode the second part; thus, the mobile device's identity (as well as the identity of the mobile device user) remains obscured. This ensures that the user's privacy is maintained, while preventing third parties from building a profile of the device based on the requests that include the MSISDN or similar identifier.
Owner:IBM CORP

Method for detecting trace biomolecule ionizing radiation decomposition reaction based surface enhanced Raman spectrum

ActiveCN102628807AAvoid analysisEffective Radiation Biology ResearchRaman scatteringRadiation reactionIndirect action
The invention discloses a method for detecting trace biomolecule ionizing radiation decomposition reaction based surface enhanced Raman spectrum (SERS). The method comprises three SERS substrates suitable for the biomolecule radiation test and the corresponding test method. The method comprises the following steps: using a micron-sized semisphere consisting of a silver nano sheet as the SERS substrate and quantitatively measuring the radiation damage of a solid biological sample (such as protein) under the direction action of ionizing radiation; using a gold wrapped silicon dioxide submicron sphere as the SERS substrate, connecting DNA and quantitatively measuring the radiation damage of the DNA molecule of a solid biological sample under the direction action of ionizing radiation; and mixing silver colloid particles and a sample from a radiation reaction solution, measuring the product of the radiation decomposition reaction by utilizing SERS effect and researching the radiation damage of the biomolecule under the indirect action of radiation. Due to the method, the radiation decomposition reaction of the trace biomolecule caused by energetic ions can be subjected to on-line, non-destructive and trace detection conveniently.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products