Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

912results about How to "Efficient identification" patented technology

Device and method for identifying and evaluating emergency hot topic

The invention relates to a device and a method for identifying and evaluating an emergency hot topic. The device is provided with four component parts including a text acquisition unit, a text expression unit, a topic clustering unit and a topic evaluation unit. The device and the method are characterized in that only a title, introduction, relevant features and other information of a text of a news report are extracted and regarded as an effective sample set identified by the hot topic. Compared with the existing full text extraction, the experiment result shows that the result of the existing full text extraction is similar to the result of the partial text extraction, but the operation of the device and the method is greatly simplified. Compared with a classical model, an improved feature weight calculation model is good in execution efficiency and strong in adaptability of text representation capability. The model is used for evaluating the hot value of clustered topics, and the calculated hot topic accords with the expected effect and is adaptive to the features of the emergency news report. In a word, in the process of processing the text of the emergency news report, the device and the method have good performance in aspects of calculation complexity, result accuracy and timeliness.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Apparatus and method for event correlation and problem reporting

An apparatus and method is provided for efficiently determining the source of problems in a complex system based on observable events. By splitting the problem identification process into two separate activities of (1) generating efficient codes for problem identification and (2) decoding the problems at runtime, the efficiency of the problem identification process is significantly increased. Various embodiments of the invention contemplate creating a causality matrix which relates observable symptoms to likely problems in the system, reducing the causality matrix into a minimal codebook by eliminating redundant or unnecessary information, monitoring the observable symptoms, and decoding problems by comparing the observable symptoms against the minimal codebook using various best-fit approaches. The minimal codebook also identifies those observable symptoms for which the greatest benefit will be gained if they were monitored as compared to others.
By defining a distance measure between symptoms and codes in the codebook, the invention can tolerate a loss of symptoms or spurious symptoms without failure. Changing the radius of the codebook allows the ambiguity of problem identification to be adjusted easily. The invention also allows probabilistic and temporal correlations to be monitored. Due to the degree of data reduction prior to runtime, extremely large and complex systems involving many observable events can be efficiently monitored with much smaller computing resources than would otherwise be possible.
Owner:VMWARE INC

System and method for tracking lost articles by means of a global computer network, providing a theft deterrent and advertising

Downloadable identification labels which are downloaded from a world wide computer network to a remote computer and printed on paper using a printer. Each label is printed with the contact information of a central lost and found registry and attached to one or more personal possessions. The labels can also be printed with an identification code, notification that a reward will be paid for a possession which is returned to the owner, sponsor advertising and a warning that the possession has been indelibly marked with identification indicia such as the internet address of the lost and found registry. The central lost and found registry stores, on a database, information about lost possessions and owner contact information as well as information about found possessions and finder's contact information. If a match is found between a lost possession and found possession the registry communicates the contact information of the finder to the owner so that the possession may be recovered by the owner. Owners do not preregister their belongings, codes, or contact information with the central registry. They only register with the registry if a possession should be lost or missing and the owner desires assistance in their recovery.
Owner:WYSSEN HANS

Red light overriding detection system and method based on digital video camera

InactiveCN101123039AJudgment of violations and strong law enforcementLow costDetection of traffic movementClosed circuit television systemsDigital videoSignal light
The invention relates to a digital video camera based red light running detection system and method, wherein a high-definition digital video camera is used for road monitoring. The red light running detection system mainly comprises front end devices and ground devices. A digital video camera (1) among the front end devices is used for collecting crossing images, and the images are transmitted to an industrial control computer (9) through a front end optical terminal (2), optical fiber (6) and a ground optical terminal (10) as one of the ground devices in turn. The industrial control computer is used for identifying behaviors of a vehicle in accordance with the set detection parameters and present signal light status. The computer is also used for extracting information of the red light running vehicle, acquiring information of the vehicle license plate, and storing and managing the image sequence or video flow before and after red light running and the information of the license plate. The invention needs only a high-definition digital video camera for monitoring double lane vehicles in a same direction, and no separate panoramic video camera is needed for photographing the signal light status, so the detection system makes violation identification more powerful.
Owner:TSINGHUA UNIV

Cloud network admission identifying system and admission identifying technology

The invention relates to the technical field of cloud network access admission, and discloses a cloud network admission identifying system and a cloud network admission identifying technology. The system comprises a mobile terminal application module, a cloud system access system and an admission service system. The method comprises the steps that: a mobile terminal applies for registering of terminal equipment; the admission service system allocates a code to a mobile terminal network; the mobile terminal applies for accessing a cloud network; the admission service system generates an authentication parameter sequence through calculation; the mobile terminal verifies the validity of the cloud network; the mobile terminal generates verification feedback result information through calculation; the admission system verifies and determines the validity of mobile terminal access authority; an access server enables a cloud terminal communication secret key; and the mobile terminal enables a terminal communication secret key. According to the related system and method of the invention, the cloud network can effectively identify the validity of the mobile terminal access authority, and the mobile terminal can test and verify the validity of the cloud network in which the mobile terminal is resided.
Owner:王鑫

Preparation method for molecular imprinting material and molecular imprinting material prepared through preparation method

The invention provides a preparation method for a molecular imprinting material and the molecular imprinting material prepared through the preparation method. The preparation method comprises the steps that silicon oxide is coated on the surfaces of magnetic ferroferric oxide nanometer particles, the magnetic ferroferric oxide nanometer particles are modified with gamma-(methacryloyl chloride) amino propyl trimethoxy silane to obtain magnetic ferroferric oxide nanometer particles with propenyl on the surfaces, the magnetic ferroferric oxide nanometer particles with the propenyl on the surfaces serve as carriers, estrogen receptors are simulated, functional monomers are optimized, a surface imprinting technology is adopted, and then the molecular imprinting material which can simultaneously identify seven kinds of environmental endocrine disrupting chemicals is prepared. According to the preparation method, the easy separation of a magnetic nanometer material, the good water solubility of a silicon oxide nanometer material, the specific recognition ability of molecular imprinting polymers and the surface imprinting technology are mutually combined, the preparation technology is simple, the conditions are mild, the prepared molecular imprinting material is large in adsorption capacity, fast to respond, high in magnetism, good in chemical stability and high in repeating utilization rate, and the problems that at present, multiple trace, steroid and phenol environmental endocrine disrupting chemicals are difficult to simultaneously identify, separate and enrich are solved.
Owner:INST OF QUALITY STANDARD & TESTING TECH FOR AGRO PROD OF CAAS

Topological Pattern Matching

Techniques for more efficiently identifying specific topological patterns in microdevice design data, such as layout design data. A user provides a topological pattern matching tool with a pattern template. In response, the topological pattern matching tool will analyze the pattern template to create a set of “design rule check” operations that can be performed to identify topological features of the layout design that will include the set of topological features specified for the template. The topological pattern matching tool also specifies properties that should be determined for each set of topological features identified by a design rule check operation. Once the design rule check operations have been created, the tool applies them to the layout design data being analyzed. The results produced by the design rule check operations will be a group of topological features in the layout design that encompass the topological features specified for the template. The results also will include a set of properties for each of the identified topological features. Next, the pattern matching tool creates a search graph based upon the results of the design rule check operations. Once the search graph is constructed, the pattern matching tool traverses the search graph to identify combinations of nodes connected by graph edges representing feature characteristics that match the constraints specified for the pattern template. For each such identified combination of nodes, the tool will output the arrangement of geometric elements corresponding to the nodes as a topological match to the original template.
Owner:PIKUS FEDOR G +1

Method for realizing identity discrimination of operating users through recognizing keyboard/mouse input habits of operating users

The invention belongs to the field of computers, and discloses a method for realizing the identity discrimination of operating users through recognizing the keyboard/mouse input habits of the operating users. The method comprises the following steps: defining the input habits such as keystroke pressures, pressing intervals, loosening intervals, associated intervals and combined intervals; when carrying out single-key mapping input through a keyboard, inputting word groups through a keyboard, inputting function keys through a keyboard, inputting combination keys through a keyboard, and carrying out mouse keypad entry and mouse pulley key input, and recording related inputs so as to form a quantitative data storage-recognition data model; and because a difference with a certain rule exists between the recognition data models formed by operating the keyboard and the mouse by each user, when the users carry out input operation, recognizing different users through comparing the input information with the recognition data models. By using the method disclosed by the invention, the effective identity discrimination on the operating users can be realized through recognizing the keyboard/mouse input habits of the operating user; and through carrying out quantization processing on the slight differences of input habits, the recognition level as that of fingerprint recognition can be achieved.
Owner:DATCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products