Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

44results about How to "In line with the actual scene" patented technology

Six-axes robot kinetic parameter identification method based on neural network

The invention discloses a six-axes robot kinetic parameter identification method based on a neural network. The six-axes robot kinetic parameter identification method comprises the following steps that firstly, robot kinetic modeling and linearization are conducted; secondly, motivation trajectory optimization is conducted, and specifically a motivation trajectory is optimized through an artificial immune algorithm; thirdly, experiment sampling is conducted, specifically a robot moves along the motivation trajectory, and multiple sets of observation matrices and joint torque are obtained as experiment data; fourthly, data processing is conducted, the data collected in an experiment are preprocessed through a three standard deviation norm and a median average filter method, and the influence brought by data noise is lowered; fifthly, kinetic parameter estimation is conducted, and kinetic parameters are estimated through the neural network; and sixthly, parameter verification is conducted, the robot follows an executable trajectory different from the motivation trajectory, experiment data are sampled again, theoretical joint torque is predicted according to kinetic parameters obtained by identification, and reliability of the identified kinetic parameters is evaluated with the torque residual root.
Owner:ZHEJIANG UNIV

Network service quality monitoring method and device

The invention provides a network service quality monitoring method and device and belongs to the technical field of network operation and maintenance. The method comprises steps as follows: historical monitoring data of to-be-monitored indexes in multiple historical moments are acquired, the historical monitoring data at multiple historical moments are clustered, multiple time frames are obtained, and each time frame comprises historical monitoring data in at least one historical moment; abnormal thresholds of the to-be-monitored indexes at multiple time frames are acquired on the basis of the historical monitoring data in at least one historical moment contained in multiple historical moments; the network service quality is monitored on the basis of abnormal thresholds of the to-be-monitored indexes at multiple time frames. The multiple historical moments are clustered, the multiple time frames are clustered, and the abnormal thresholds of the to-be-monitored indexes at the time frames are determined, so that the abnormal thresholds at the time frames are generated according to historical monitored data, following monitoring of the network service quality according to the abnormal thresholds better accords to the actual scene, misjudgment of the network service quality is avoided, and the monitoring accuracy is higher.
Owner:HUAWEI TECH CO LTD

Efficient quantum privacy comparison method and system

The invention belongs to the technical field of communication networks, and discloses an efficient quantum privacy comparison method and system. In a quantum privacy comparison protocol, only a semi-trusted server needs to be configured with a quantum memory, a Bell-state preparation device and Bell-state joint measuring equipment; in secrete information comparison, both parties only need to configure quantum equipment for measuring and reflecting a |0>,|1> state of a quantum, so that the comparison of secrete information can be realized; in the operation process of the protocol, the semi-trusted server can be provided by a special quantum server provider, and the provider only needs to strictly comply with the requirements of the protocol, even if the provider records data in the protocolcommunication process, the provider cannot obtain the secret information of a user. The application scene of the efficient quantum privacy comparison method provided by the invention is easy to be implemented compared with an existing protocol and accords with an actual scene of a future quantum network application, and the efficient quantum privacy comparison method has a promoting effect on theapplication development of a quantum communication network.
Owner:CHENGDU UNIV OF INFORMATION TECH

Single-channel voice enhancement method and device, storage medium and terminal

The invention discloses a single-channel voice enhancement method and device, a storage medium and a terminal. The method comprises the steps of obtaining a frequency domain amplitude spectrum of a current frame signal based on a received input signal; performing VAD processing on the full band of the current frame signal based on the frequency domain amplitude spectrum of the current frame signalto obtain an initial full band amplitude spectrum gain function of the current frame signal; dividing the whole band into a plurality of sub-bands; performing VAD processing on the plurality of sub-bands of the current signal frame based on the frequency domain amplitude spectrum of the current frame signal and the initial full-band amplitude spectrum gain function, and updating the initial full-band amplitude spectrum gain function according to the VAD processing result of each sub-band to obtain an updated full-band amplitude spectrum gain function of the current frame signal; and calculating according to the frequency domain amplitude spectrum of the current frame signal and the updated full-band amplitude spectrum gain function to obtain a frequency spectrum after speech enhancement.Through the scheme of the invention, non-stationary noise can be effectively suppressed, the voice quality is protected from being lost, and the voice call quality of mobile equipment such as a mobilephone is favorably improved.
Owner:SPREADTRUM COMM (TIANJIN) INC

Temperature monitoring and control method and system in cold-chain commodity transportation process

The invention provides a temperature monitoring and control method and system in a cold-chain commodity transportation process. An AI intelligent calculation module of a monitoring platform obtains atransportation heat preservation packaging scheme of cold-chain commodities; a heat preservation box and matched materials are configured according to the transportation heat preservation packaging scheme, and the heat preservation box is internally provided with a wireless temperature sensor, an irreversible cold charging interface and an electronic lock; before cold-chain transportation, a transportation driver terminal APP matches transportation materials according to the packaging scheme and scans a code of material parameters for verification and boxing; in the transportation process, thewireless temperature sensor transmits temperature data of cold-chain commodities in the box to the driver mobile phone APP in real time and uploads tracks to the monitoring platform in real time forbackground display, and if the temperature obtained by the driver APP is about to exceed the preset cold-chain commodity temperature zone range, the APP constantly gives a sound-light alarm to remindthe transportation driver while the APP starts a vehicle-mounted air conditioner through Bluetooth to realize temperature control; and when the commodities reach a destination at qualified temperature, a consignee user scans the number of the heat preservation box to authenticate unlocking and submit an order.
Owner:管海兵

An endogenous data security interaction method for a double-middle-station double-chain architecture

The invention discloses an endogenous data security interaction method for a double-middle-station double-chain architecture, and the invention employs the double-middle-station architecture and the double-chain architecture, and the double-middle-station architecture comprises a business service, a business system, a business center, a data center, a business foundation and a data foundation; thedouble-chain architecture comprises data information, a data chain, a service chain and a service record. According to the endogenous data security interaction method of the double-middle-station double-chain architecture, the interaction security of endogenous data is improved by importing a block chain technology into a middle station, the credibility of the middle platform data before the middle platform data is linked is ensured, and an improved Shoup threshold endogenous data interaction protocol is constructed to ensure the security of the data before the data is linked. On the basis ofthe above work, an interaction mechanism integrating the under-chain signature and the on-chain signature verification is designed, so that the data interaction efficiency of the double middle stations and the double chains is improved, the service middle stations can extract the related information of the data middle stations more efficiently, and the service processing capability is enhanced.
Owner:SHANGHAI UNIVERSITY OF INTERNATIONAL BUSINESS AND ECONOMICS +1

Base station regulation and control method considering 5G communication base station power network topology distribution

The invention discloses a base station regulation and control method considering 5G communication base station power network topology distribution, comprising the following steps: S1, analyzing geographical distribution and electrical distribution characteristics of 5G macro base stations and micro base stations, and drawing a 5G macro base station and micro base station distribution diagram considering network topology; s2, analyzing power supply and consumption characteristics of the 5G base station, and constructing a base station power consumption model, a user distribution and demand model and a base station energy storage and power supply reliability model; s3, constructing an inner-layer optimization model, considering the requirements of a mobile communication service provider, and taking the minimum total electricity utilization cost of the 5G base station as an optimization target; s4, constructing an outer-layer optimization model, and taking the minimum topological node peak-valley difference as an optimization target by considering the power grid demand; and S5, solving the emission power consumption of the active antenna unit of the 5G base station, the internal energy storage charging and discharging strategy and the mobile user connection scheme by comprehensively considering the requirements of the service provider and the power grid through internal and external nesting iteration by using a heuristic algorithm. Requirements of a communication service provider and a power grid are comprehensively considered, and a base station regulation and control strategy is optimized.
Owner:ECONOMIC TECH RES INST OF STATE GRID HENAN ELECTRIC POWER +1

Remote multi-target efficient detection and identification method

The invention discloses a remote multi-target efficient detection and identification method. The method comprises the following steps that S1, a terminal processes a video stream into a picture set through a current limiting algorithm; S2, original pictures of the picture set are normalized into sample images with fixed sizes; S3, with pixel points of the sample images as nodes, the state of an undirected graph is depicted by using an adjacent matrix of all the nodes; S4, an s latitude feature vector of each node is obtained; S5, a complete vectorized tag dictionary is pre-constructed, and predicted values of tags are obtained from the output feature matrix through the dictionary; S6, the terminal carries out threshold screening on the predicted values of the tags; S7, a server generates a corresponding hash code according to a tag result, and enters different target recognition model channels through the hash code; and S8, the server recognizes all known targets in advance and then stores the recognized targets into a feature vector library, effective pictures enter corresponding model channels and then are analyzed into feature vectors, a result is obtained after the feature vectors are compared with the feature vector library, and the result is fed back to the terminal.
Owner:SOUTH CHINA UNIV OF TECH

Scenario-based bluetooth sign-in method and system

The invention provides a scene-based Bluetooth sign-in method and system. The method comprises the following steps: setting Bluetooth names for all to-be-signed persons according to a preset legal rule to correspondingly obtain a plurality of legal Bluetooth names; carrying out first search by all the o-be-signed persons to obtain a Bluetooth equipment list, and judging to obtain legal Bluetooth names; when the quantity of the legal Bluetooth names reaches a threshold, judging the sign-in to be successful; changing corresponding sign-in states into signed states according to the successfully-signed legal Bluetooth names, researching the Bluetooth equipment list for preset times to generate sign-in results, finishing first sign-in judgment and transmitting the sign-in results to a server; carrying out second sign-in judgment by the scene-based method to obtain a final sign-in result. According to the scene-based Bluetooth sign-in method and system, provided by the invention, a scene-based Bluetooth sign-in mode is adopted, and no extra hardware equipment is needed, so investments are saved; by adopting parallel operation, sign-in time is saved; the mode that all people are in network is not needed, so actual service conditions are better met, and the cheating phenomenon is avoided.
Owner:何雨航 +3

Intelligent seating training method and system based on machine learning and data mining

The invention discloses an intelligent seating training method and system based on machine learning and data mining. The method comprises the following steps: receiving original audio data of a user terminal; extracting user audio data and environment audio data through the original audio data; analyzing and predicting a user environment constraint condition through an audio data analysis model based on the environment audio data; and determining an intelligent seating communication strategy according to the user environment constraint condition and the user audio data. Thus, the intelligent seating communication strategy can be determined according to the user audio data and the environment audio data, analysis of the environment audio data is added when the intelligent seating communication strategy is determined, the accuracy and efficiency during intelligent communication can be improved, and the formulated seating communication strategy better conforms to the actual scene of the user; and the problem that the authenticity of the information acquired according to the audio data cannot be judged due to single dependence on the audio data of the user is avoided, so that computing and communication resources are fully utilized or manual invalid use is reduced.
Owner:BEIJING DEXI TIANDI TECH TRADE CO LTD

Single-channel voice enhancement method and device, storage medium and terminal

A single-channel voice enhancement method and device, storage medium, and terminal, the method comprising: acquiring a frequency domain amplitude spectrum of a current frame signal based on a received input signal; VAD processing is performed on the entire band to obtain the initial full-band amplitude spectrum gain function of the current frame signal; the full-band is divided into multiple sub-bands, and the current frame signal is based on the frequency domain amplitude spectrum of the current frame signal and the initial full-band amplitude spectrum gain function. The multiple sub-bands of the sub-bands are respectively subjected to VAD processing, and the initial full-band amplitude spectrum gain function is updated according to the VAD processing results of each sub-band to obtain the updated full-band amplitude spectrum gain function of the current frame signal; According to the frequency domain amplitude spectrum of the current frame signal And update the full-band amplitude spectrum gain function to calculate the spectrum after speech enhancement. The solution of the invention can effectively suppress non-stationary noise and protect the voice quality from loss, which is beneficial to improve the voice call quality of mobile devices such as mobile phones.
Owner:SPREADTRUM COMM (TIANJIN) INC

Transformer substation inspection method based on end-side cooperation

The invention discloses a transformer substation inspection method based on end-side cooperation, relates to the technical field of electric power Internet of Things, establishes a transformer substation inspection system model based on end-side cooperation, and provides a task unloading and resource management scheme for balancing the average information age of the system and the energy consumption index of wireless equipment. According to the method, the processing of the inspection task data comprises local calculation and unloading calculation, and the end-side equipment cooperates to complete the inspection work of the transformer substation. Compared with an existing method that data analysis is conducted manually after data are collected by equipment, labor input is saved, the data processing efficiency is obviously improved, and the data processing process does not depend on experience of inspection personnel excessively and is more scientific. Compared with an existing method for returning the inspection task data to the cloud center for processing, the method has the advantages that network bandwidth resources are saved, the computing pressure of the cloud center is relieved, and the problem of low data processing timeliness caused by an overlong return link is solved.
Owner:CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products