Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

196results about How to "Avoid calling" patented technology

Detection and evaluation method applicable to blood management of perioperative patients

The invention relates to the technical field of medical treatment, and discloses a detection and evaluation method applicable to blood management of perioperative patients. The method comprises the following specific steps: S1, reading admission records, nursing documents, blood routine examination results and blood coagulation and biochemical information of a patient from a MySQL database, and conducting aggregating; and S2, evaluating whether the structured test indexes of the patient meet requirements on preoperative autologous blood collection or not. According to the invention, a doctor in a blood transfusion department can be helped to understand the blood use law of a single disease in each department of the hospital, and the doctor can be helped to formulate an optimal blood transfusion path through optimal postoperative hemoglobin analysis; clinical doctors can know the conditions of anemia and blood coagulation functions of the patient before an operation, and timely and pertinently treat the patient to ensure smooth operation in the operation, and rehabilitation of the patient can be accelerated; a doctor is helped to know an autologous blood collection scheme and intraoperative recovery feasibility in advance, the use probability of allogeneic blood is greatly reduced, and the risk of various adverse reactions is reduced.
Owner:北京和兴创联健康科技有限公司

Traditional Chinese medicine ear diagnosis image processing method and device

ActiveCN110349140AOvercome the problem of inaccurate judgmentImprove user experienceImage enhancementImage analysisImaging processingMedicine
The invention discloses a traditional Chinese medicine ear diagnosis image processing method and device. The traditional Chinese medicine ear diagnosis image processing method comprises the followingsteps: acquiring an ear image of a user; performing three-dimensional reconstruction on the ear image to form an ear three-dimensional model; carrying out fan-shaped segmentation on the ear three-dimensional model by taking the ear middle part of the ear three-dimensional model as a center to obtain an auricular concha region image; determining five-color features of each concha region image according to the pixel information of each concha region image, extracting the five-color features in each concha region image and converting the five-color features into concha features; extracting three-dimensional surface features and converting the three-dimensional surface features into auricle morphological features; and sending the ear color features and the auricle morphological features withinthe preset acquisition frequency to a preset SVM classifier to perform ear diagnosis disease state classification, and outputting the classified data to a preset ear diagnosis database for storage. According to the traditional Chinese medicine ear diagnosis image processing method and device, quantitative reference data can be provided for ear diagnosis, and the ear diagnosis disease state can beautomatically identified.
Owner:WUYI UNIV

Method for predicting indoor movement trajectory data based on HMM model

The invention belongs to the field of indoor movement trajectory management and prediction, and specifically provides a method for predicting indoor movement trajectory data based on an HMM model, which is used for realizing prediction based on HMM trajectory data in an indoor space. The method provided by the invention comprises the following steps: firstly, based on a historical trajectory sequence, taking the minimum Euclidean distance between consecutive non-repetitive points of the historical trajectory sequence as a side length of a mesh unit, performing hierarchical meshing on an indoorspace model to generate a mesh space; based on the mesh space, projecting the historical trajectory data to generate a mesh sequence, and preprocessing the mesh sequence to generate a historical meshtrajectory database; then, performing clustering on the basis of a DBSCAN algorithm to generate a clustering information database, and constructing the HMM model according to an clustering information table; and finally, based on the trained HMM model, using a Viterbi algorithm to perform prediction. The invention provides an indoor trajectory data position prediction method, which effectively improves the accuracy of the predicted trajectory data, and further optimizes the performance of an indoor trajectory data management system.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Method for automatically deploying high-availability cluster of service system based on ansible

ActiveCN112491606AAvoid misuse of interventionImprove deployment success rateData switching networksService systemComputer security
The invention discloses a method for automatically deploying a high-availability cluster of a service system based on ansible, which comprises the following steps: setting all servers of the cluster in a local area network, and setting a deployment IP (Internet Protocol) of each server, so that the server at the rear end accesses a deployment page at the front end through the deployment IPs respectively, and the server comprises four different types of network cards, the system comprises a monitoring network card, a service network card, a storage network card and a management network card, configuration information is input into the deployment page and a page deployment request is generated; the method comprises the steps that a server is selected as a deployment main node, an android script is generated according to a specified server list and corresponding information in configuration information, the deployment main node obtains a page deployment request and executes the deploymentstep of the android script according to the configuration information, and meanwhile an SSH protocol is used for sending execution commands of the same step to other servers in a cluster through a deployment IP. The deployment success rate is improved, maintenance of operation and maintenance personnel is facilitated, and the working efficiency is improved.
Owner:湖南麒麟信安科技股份有限公司

Early-warning analysis method and system of false invoicing of value-added tax invoices

The invention discloses an early-warning analysis method and system of false invoicing of value-added tax invoices. The method mainly includes the following steps: data collection and processing, enterprise industrial/commercial-information analysis, enterprise bank transaction information analysis, enterprise invoicing information analysis and anti-false-invoicing early-warning analysis result display. The system mainly includes a data collection and processing module, an enterprise industrial/commercial-information analysis module, an enterprise bank transaction information analysis module,an enterprise invoicing information analysis module and an analysis result display module. By using the early-warning analysis method and system of false invoicing of the value-added tax invoices of the invention, unobtrusive publicly-related bank account transaction information retrieval can be avoided, a large amount of related data can be comprehensively stored and analyzed by using distributed-storage and distributed-computing capability of a big-data platform, early-warning study and judgment algorithms can also be quickly expanded by scalability, which the same have, when a new clue is discovered, accuracy of analysis results can be improved, and counting analysis time can also be reduced.
Owner:TAIHUA WISDOM IND GRP CO LTD

Dynamic library calling method and device, electronic device and storage medium

PendingCN112434286ALow securityPrevent from being calledDigital data protectionPlatform integrity maintainanceEngineeringCommon key
The invention relates to a dynamic library calling method and device, an electronic device and a storage medium, and the method comprises the steps: searching a dynamic library corresponding to an interface function address according to the interface function address of a first code library, wherein the first code library and a second code library are be pre-compiled into a static library and to be linked to the dynamic library, and the operation of the second code library depends on the interface calling of the first code library; extracting first key data in the dynamic library, and determining a first hash value of the first key data; acquiring a hash signature pre-stored in the dynamic library, and decrypting the hash signature by using a public key corresponding to the hash signatureto obtain a second hash value; and under the condition that the second hash value is the same as the first hash value, executing interface calling corresponding to the interface function address. Through the method and the device, the problem of low security caused by calling of the dynamic library under the unauthorized condition in the related technology is solved, and the technical effect of preventing the dynamic library from being called under the unauthorized condition is achieved.
Owner:ZHEJIANG DAHUA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products