Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

101results about How to "Effective identification" patented technology

System for monitoring intrusion on basis of wireless sensor network

The invention, which is applicable to civil security and surveillance and military intrusion detection, relates to a wireless network system for monitoring, identifying and judging the pathway of an intruding target by setting up a plurality of nodes. The intruding target can be located, identified and tracked by carrying out the extraction, analysis and data integration on the signal characteristic quantity of the sensors at each monitoring node, moreover, the function for a user to set sensitive areas is served, so that various alarm signals can be sent according to the closeness of the intruding target to the sensitive areas. Additionally, a monitoring sensor at the monitoring node is used for generating sleeping and waking-up signals on a real-time basis, thus achieving the deep sleeping and waking of the processor and the communication module and achieving the purpose of saving the energy of the monitoring nodes and guaranteeing that the target intruding the monitoring area can be reliably monitored at the same time. The invention has the characteristics of low cost, low power consumption, flexible arrangement and high applicability and overcomes the defects that the conventional video monitoring method for monitoring the intrusion has complex installation, poor concealment, vulnerable circuit and limited monitoring range and requires artificial event discrimination.
Owner:BEIHANG UNIV

Radio frequency channel parallel detecting device and method for unmanned aerial vehicle

The invention discloses a radio frequency channel parallel detecting device and method for an unmanned aerial vehicle. The device comprises a number of radio frequency modules, a number of radio frequency microcomputer modules, a general control microcomputer module and a real time clock module. The device divides the common 2.4GHz communication band of the unmanned aerial vehicle into 42 channels, and then measures the RSSI and time of each channel in parallel. According to the measurement result, the difference between an unmanned aerial vehicle signal and the RSSI of the background noise and the bandwidth characteristic of the unmanned aerial vehicle signal are used to detect the unmanned aerial vehicle, wherein the unmanned aerial vehicle signal mainly comprises an image transmission signal and a remote control signal. In addition, the device can detect the frequency hopping sequence of the remote control signal of the unmanned aerial vehicle, and further identifies the unmanned aerial vehicle model according to the frequency hopping sequence. The radio frequency channel parallel detecting device and method for the unmanned aerial vehicle have the advantages of low cost, high detection precision, simple and convenient deployment of the device structure and the like, can effectively detect and identify the unmanned aerial vehicle, and can be widely used and deployed in various areas where unmanned aerial vehicle detection is needed.
Owner:ZHEJIANG UNIV

Hotspot data identification method and device

The invention discloses a hotspot data identification method and a hotspot data identification device. The method comprises the steps of determining an initial hotspot queue according to the visit times of each storage data block within a first preset time slot; computing the weight of each hotspot data block in the all hotspot data blocks and the association degree between each data block in a data block set associated with the hotspot data blocks and the hotspot data blocks at preset intervals; multiplying the weight of each hotspot data block by the association degree between the hotspot data block and each associated data block, thus acquiring a heat prediction value of each data block; sorting the all data blocks with the heat prediction values according to the heat prediction value, wherein the data block with the plurality of heat prediction value is subject to the own highest heat prediction value; and adding the former preset quantity of data blocks in a sorting result into the initial hotspot queue to acquire the current hotspot queue. According to the method and the device provided by the invention, the hotspot data can be effectively identified, and the situation that the data is upgraded, degraded and migrated repeatedly in short time due to sudden visits can be avoided as much as possible.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Marine target information fusion method based on satellite infrared and visible light images

The invention discloses a marine target information fusion method based on satellite infrared and visible light images, and the method comprises the steps: starting a satellite infrared camera and a visible light camera, carrying out the imaging of a key sea area, and downloading an image to a ground station; and performing ship target detection on the visible light image by using a deep learningalgorithm, and performing ship target detection on the infrared image by using a peak signal-to-noise ratio threshold segmentation algorithm; according to the ship target detection point sets of the visible light image and the infrared image, performing point set matching by using a point mode matching algorithm, screening the point sets, and performing registration of the visible light image andthe infrared image according to the screened point sets; and performing target association by using the interaction ratio of the registered image detection area, integrating target slices, and performing type identification on the ship target by using a deep learning algorithm. According to the marine target information fusion method based on the satellite infrared and visible light images, effective discovery and identification of ship targets can be realized.
Owner:NAT INNOVATION INST OF DEFENSE TECH PLA ACAD OF MILITARY SCI

Fish trajectory tracking method and system based on artificial neural network

The invention relates to a fish trajectory tracking method and system based on an artificial neural network. The method comprises the following steps of S1, acquiring a video or an image of a target fish; S2, obtaining a fish body image with a label as an initial training sample set, inputting the initial training sample set into a Unet convolutional neural network, and carrying out iterative training through a deep learning algorithm to obtain a fish body recognition neural network model; S3, recognizing a fish body in the acquired video or image of the target fish by utilizing a fish body recognition neural network model, segmenting a fish body form, and calculating the position of a preset point in the fish body; and S4, obtaining the motion trail of the target fish by using a target tracking algorithm, and analyzing the motion characteristics of the target fish. The method can accurately perform identification and trajectory tracking on the fish body, and thereby dependence of an experiment on an illumination condition is reduced, influence of mirror reflection and water surface fluctuation of the fish tank are overcome, high calculation efficiency is realized, the method can be applied to a long-time experiment video, and identification and trajectory tracking effects are improved.
Owner:TSINGHUA UNIV

Pirate application detection method, device and system

The embodiment of the invention discloses a pirate application detection method, device and system. The method comprises the following steps: inquiring a relevant application of a current application from a white list database, wherein the relevant application comprises any one same or similar application and an application which is the same with a developer in application characteristic information, and the application characteristic information comprises the name, the package name and the function of the application; storing more than one piece of legal copy application information in the white list database, wherein each piece of legal copy application information comprises the name, the package name, the signature, the version number and the developer information of at least one legal copy application; independently comparing the current application with each relevant application to obtain a similarity between the current application and each relevant application to obtain more than one similarity value; comparing whether a maximum similarity value in the more than one similarity value is greater than a preset minimum similarity threshold value or not; and if the maximum similarity value is greater than the preset minimum similarity threshold value, judging the current application is the legal copy application. The embodiment of the invention can detect the private application.
Owner:BEIJING QIHOO TECH CO LTD

Method for identifying entities named by Cambodian on basis of cross-language resource

The invention relates to a method for identifying entities named by Cambodian on the basis of a cross-language resource, and belongs to the technical field of natural language processing. The method includes the steps of firstly, obtaining an English-Cambodian bilingual parallel text corpus and a Cambodian monolingual text corpus; secondly, using a tool Word2vec to process Cambodian monolingual text to obtain a vector representation of Cambodian words; thirdly, adopting a cosine method to calculate the similarity values among the Cambodian words, and meanwhile using an IBM model to achieve word alignment between the Cambodian words and English words; utilizing a label propagation algorithm in a bilingual image model to process the Cambodian-English bilingual corpus to obtain a corresponding class of the Cambodian words in the text, and then adopting the corresponding class as a cross-language characteristic and applying the cross-language characteristic, word property characteristics,mark characteristics and word characteristics for marking the names of people and the names of locations to a machine learning model; finally, achieving identification of the named entities for the obtained corpora.
Owner:KUNMING UNIV OF SCI & TECH

Well lid theft detection method

The invention discloses a well lid theft detection method. The method comprises the steps of obtaining a video sequence image containing a well lid from a monitoring device; determining an ellipse coinciding with the edge of the well lid through an image processing algorithm; performing calculation according to features in an ellipse range of the video sequence image to obtain a reference feature value; obtaining the video sequence image from the monitoring device at an interval of first preset time, and performing calculation according to the features in the ellipse range of the video sequence image to obtain a comparison feature value; performing comparison to obtain a difference value between the comparison feature value and the reference feature value, if the difference value is greater than a reference error value, adding 1 to an accumulator, and if the difference value is smaller than the reference error value, resetting the accumulator; and if a count of the accumulator exceeds a reference threshold, outputting a theft signal. According to the method, a detection algorithm provided by the invention still can perform effective identification and locating on a deformed well lid image, the detection speed and accuracy is increased and improved, the calculation complexity is lowered, and a calculation mechanism of the accumulator can effectively avoid a false detection phenomenon.
Owner:CHENGDU TOPPLUSVISION TECH CO LTD

Power grid overvoltage identification method by adopting multi-parameter ratio codes

The invention discloses a power grid overvoltage identification method by adopting multi-parameter ratio codes. The method comprises the following steps of: dividing an overvoltage wave form into a value interval of lightning overvoltage characteristic value, a value interval of operation overvoltage characteristic value and a value interval of temporary overvoltage characteristic value; extracting different characteristic amount respectively on the three time intervals, determining the obtained characteristic amount accoriding to the determining rule, and giving codes designed according to a criterion rule for the time interval; and finally acquiring only one string of codes after the same type of overvoltage is extracted and determined by the characteristic value of the three intervals, and distinguishing the overvoltage of different types according to the overvoltage types corresponding to the codes so as to identify the overvoltage. The method can effectively reflect the parameters of the overvoltage intrinsic characteristic through data processing extraction according to the data of overvoltage wave form and the like acquired by a monitoring device, and can identify multiple kinds of overvoltage of a power system according to corresponding criterion rules.
Owner:ELECTRIC POWER SCI RES INST OF GUIZHOU POWER GRID CO LTD +1

Method for monitoring flow meter faults of turbine system

The invention provides a method for monitoring flow meter faults of a turbine system and belongs to the field of online monitoring of a turbine. A data coordination method is adopted by the method so that broken-down flow meters can be monitored and identified. The method specifically comprises the steps that (1) data coordination calculation is conducted through steady-state condition measured data according to the uncertainty of measured values of measured parameters and a system constraint equation; (2) the minimum objective function value of data coordination is compared with a fault detection threshold value, whether the flow meters break down or not is judged; (3) if it is detected that the flow meters break down, fault identification is conducted on the flow meters one by one, the measured parameters corresponding to the flow meters serve as non-measured parameters, and the minimum objective function value of data coordination is calculated again; the new minimum objective function value is compared with the fault detection threshold value, so that the broken-down flow meter is identified. According to the method for monitoring the flow meter faults of the turbine system, redundant flow measurement information in the turbine system can be effectively used for detecting and identifying the flow meter faults and the method has the advantages of being easy to achieve, efficient and low in cost.
Owner:TSINGHUA UNIV

Accident spot map generation method based on electronic map and data acquisition system

InactiveCN103400498AScientific and simple technical meansFast fixationRoad vehicles traffic controlData informationData acquisition
The invention provides an accident spot map generation method based on an electronic map and a data acquisition system and relates to the technical field of traffic accident spot information acquisition and analysis application. The accident spot map generation method requires the following components: a GPS positioning device, a data acquisition system and an operation treatment system, wherein the GPS positioning device is used for acquiring the position information of accident spots; the data acquisition system is used for acquiring the distance information and the angle information between an accident spot measurement site and a data information to-be-detected site, and particularly comprises a distance measuring module and an angle measuring module; the operation treatment system is used for processing the acquired distance information and angle information. Satellite images near the measurement site are acquired through the electronic map, and together with the image processing technology, an equal-proportion traffic accident spot map is created to provide more scientific, simpler and more convenient technical measures for traffic accident field survey and traffic accident spot map drawing.
Owner:THE THIRD AFFILIATED HOSPITAL OF THIRD MILITARY MEDICAL UNIV OF PLA

Server system based on address code of indoor equipment and realization method of server system

The invention discloses a server system based on an address code of indoor equipment, which comprises terminal equipment, a gateway and a cloud server, wherein the terminal equipment is used for transmitting user information and for submitting a search request; the gateway is used for receiving and transmitting data transmitted and submitted by the terminal equipment; the cloud server is used for receiving and storing the user information transmitted by the terminal equipment, recording an address code of a gateway corresponding to the user information transmitted by the terminal equipment, receiving and unpacking an encrypted data packet transmitted by the gateway, then decoding and separating the search request and an address code of the gateway to be respectively transmitted to a characteristic library correlation engine, and transmitting the matched user information to the terminal equipment submitting the search request. The invention also provides a method for realizing the server system based on the address code of the indoor equipment. Due to the adoption of the server system and the method, users in the same community can be effectively identified and added, and moreover, whether the users belong to the same network or not can be verified.
Owner:XIAMEN SEED ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products