Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

59results about How to "Intelligent recognition" patented technology

Anti-intrusion system for campus

The invention relates to an anti-intrusion system for a campus. The system comprises a monitor mother terminal and a monitor son terminal. The monitor son terminal comprises multiple infrared emission units which are arranged on campus walls, receiving units which are matched with the infrared emission units one-for-one, and human body sensing modules. The monitor son terminal also comprises a trigger switch, a face recognition module, and a wireless communication module; the monitor mother terminal comprises a wireless receiving module, a prompting module, an alarming module, an information processing module, a face information database and a face comparison module; when there is somebody climbs over the campus walls, the person is sensed by the human body sensing module, and a prompt message is sent to the monitor mother terminal by use of the trigger switch. The system has high safety and high intensity work load of monitoring personnel is avoided. By arrangement of the face recognition module, when the face information of the intrusion person does not match with the data in the face information database or matches with ministry of public security wanted person information in the face information database, alarm is given off through the alarm module so that the recognition of intrusion person is more intelligent.
Owner:汤美

Method and system for binding Internet of Things service machine card

The invention relates to a method and a system for binding Internet of Things service machine card. The method comprises the following steps: performing data import on an Internet of Things card and amobile terminal by using a machine-card binding service platform; the mobile terminal puts forward a network access auditing request to an operator CRM system; judging whether the application is a first network access application or not by the machine-card binding service platform; if the application is the first network access application, judging whether the MSISDN of the Internet of Things card and the IMEI of the mobile terminal exist at the same time or not by the machine card binding service platform; and if the IMEI and the IMSI exist at the same time, recording the IMEI and the IMSI as a unique binding relationship by the machine-card binding service platform, generating a service binding order, and submitting a service correctness confirmation result to an operator CRM system, wherein the operator CRM system takes the result as a service voucher allowing network access. According to the method and the system, special customization of a machine card is not needed. The intelligent binding and unbinding functions between the mobile terminal and the network access authentication module SIM can be realized when the Internet of Things accesses the network by adopting a cellulartelecommunication network.
Owner:WATCHDATA SYST +1

Security and protection monitoring method and device and air conditioner with same

The invention provides a security and protection monitoring method and device and an air conditioner with the device. The security and protection monitoring method comprises the image acquiring step for acquiring image information within the monitoring range and an intrusion detection step, wherein in the intrusion detection step, intrusion detection modes are selected according to user settings or system settings, whether the environment within the monitoring range is abnormal or not is judged, and the intrusion detection modes include the ordinary detection mode and / or the stranger detectionmode; in the ordinary detection mode, whether an intruder appears or not within the monitoring range is detected according to the acquired image information, and it is judged that the environment isabnormal under the situation that the intruder appears; and in the stranger detection mode, whether the intruder appears or not within the monitoring range is detected according to the acquired imageinformation, and under the situation that the intruder appears, whether the environment is abnormal or not is judged according to the identity of the intruder. According to the technical scheme, monitoring images can be checked remotely, the reasonable intrusion detection modes can be selected, the intruder can be recognized more intelligently, and the environment safety is guaranteed better.
Owner:GREE ELECTRIC APPLIANCES INC

Jamming optimization method, server, electronic device and computer readable storage medium

The embodiment of the invention discloses a jamming optimization method applied to the communication technology field, the method comprises the following steps of: acquiring the jamming data of threadjamming; determining the function calling behavior of which the first jamming duration conforms to a preset condition as a target behavior; and sending the function calling behavior data of the target behavior and the optimization strategy to the target electronic device, when the thread executes the target behavior and jamming occurs, obtaining a second jamming time length when the target electronic device executes the optimization strategy, and if the second jamming duration corresponding to the same target behavior is smaller than the first jamming duration and reaches the preset value inthe target electronic devices with the number larger than the preset number, generating optimization configuration data corresponding to the target behavior according to an optimization strategy, andsending the optimization configuration data to all the electronic devices. The embodiment of the invention further discloses a server, an electronic device and a computer readable storage medium, thejamming can be reduced, and the applicability of solving the jamming problem is improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Access control system capable of identifying and alarming intelligently

The invention discloses an access control system capable of identifying and alarming intelligently. The access control system capable of identifying and alarming intelligently comprises a monitoring camera, a face identifying device, a comparison database, a signal generating device, a signal receiving device, a signal processing device, an alarming module, an alarming situation centre, an access control switch, a remote monitoring control end, an access control switch, a power supply module and a data storage device; data can be transmitted among the monitoring camera, the face identifying device, the comparison database, the signal generating device, the signal receiving device, the signal processing device, the alarming module, the alarming situation centre, the access control switch, the remote monitoring control end, the access control switch, the power supply module and the data storage device; the monitoring camera is used for acquiring video data in a target area and transmitting the data to the face identifying device; the face identifying device is used for converting the video data which are transmitted by the monitoring camera into pictures and transmitting the pictures into the comparison database; the comparison database is used for comparing the obtained pictures with the pictures which are stored in the database, and transmitting a comparison result to the access control switch and the alarming module; the signal generating device is used for transmitting a signal to the signal receiving device when the signal generating device is at a certain distance from the signal receiving device.
Owner:成都智慧家信息技术有限公司

5G network slice-based power Internet-of-Things security management method and system

The invention discloses a 5G network slice-based power Internet-of-Things security management method and system. The method comprises the steps of: enabling a 5G operator to perform identity and authority authentication based on an authentication request sent by a power distribution automation terminal; according to the identity and authority authentication result, forming a security configuration file based on the relevant parameters and security requirements of the judged slice type and based on the special security service required in the power distribution automation; arranging the security configuration file into a corresponding network slice; and training the acquired security data by using an artificial neural network algorithm, constructing a slice security model to obtain a security control strategy, and adjusting and updating the security configuration file according to the security control strategy to realize security management of the power Internet of Things. According to the invention, the identification of the security threat in the distribution automation slice network is more intelligent, the security deployment is more diversified, and the 5G authentication is safer and more reliable.
Owner:广东电力通信科技有限公司

High-throughput intelligent sorting method and system for recovering waste plastic

The invention discloses a high-throughput intelligent sorting method for recovering waste plastic. The method comprises the following steps that (1) a high-throughput intelligent sorting system is arranged, and screening manipulators are sequentially arranged from top to bottom in a layered manner from a hopper to form a multi-layer infrared screening production line; (2) the recovered mixed waste plastic fragments are conveyed to all infrared screening manipulators for spectrum recognition sorting and sorting; (3) the step (2) is repeated, the recovered mixed waste plastic fragments are sequentially fed into all the infrared screening manipulators to complete a first sorting cycle; (4) subsequent sorting circulation is carried out on the remaining unrecognized mixed waste plastic until all the waste plastic is sorted; and (5) the single-component waste plastic is enabled to be separately used for subsequent regeneration processing. The invention further discloses a high-throughput intelligent sorting system for implementing the method. According to the high-throughput intelligent sorting method and system, equipment and labor investment for recovering and reproducing the waste plastic can be greatly reduced, and the requirements of large scale and low cost are met.
Owner:SHANGHAI UNIV

Passenger ship emergency escape warning indicating system

The invention discloses a passenger ship emergency escape warning indicating system. A system power supply module provides power for the passenger ship emergency escape warning indicating system. An information collecting module acquires the movement speed of the hull of a passenger ship, heeling and pitching angles of the passenger ship, smoke in each compartment and passage, and the degree of congestion in each passage in real time through each information receiving device, and transmits the information to an information analysis module. The information analysis module is mainly composed of a central controller and related circuits thereof. After the central controller extracts the information received from the information collecting module for analysis, the central controller determines the type of each passage according to the safety and the degree of congestion in each passage, and transmits the type to a warning indicating module. The warning indicating module indicates a correct escape route for people in the manners of an LED display and voice prompt through an emergency indicator light. The system can automatically determine the safety and the degree of congestion of each passage on board, and indicates the safe and clear escape route for people on board in the manner of display and voice prompt.
Owner:WUHAN UNIV OF TECH

Coiled material for AGV vehicle-mounted environment and preparation method of material

The invention discloses a coiled material for AGV vehicle-mounted environment and a preparation method of the material. The coiled material has a layered structure and sequentially comprises a stitched felt reinforcing layer, a fiber cloth reinforcing layer, a two-dimensional code printing layer and a transparent surface layer from bottom to top, wherein the stitched felt reinforcing layer is formed by coating a coating material with high permeability on the stitched felt and curing; the fiber cloth reinforcing layer is formed by coating a coating material with high-permeability on the fiber cloth and curing; the fiber cloth reinforcing layer and the stitched felt reinforcing layer are bonded by an adhesive coating material; the two-dimensional code printing layer is formed by printing anadhesive paint on the fiber cloth reinforcing layer and curing; and the transparent surface layer is formed by coating a surface layer coating material on the two-dimensional code printing layer and curing. Through the structural design of the transparent surface layer, the two-dimensional code printing layer and the double-layer reinforcing layer, and the use of the surface coating material, thecoating material with high permeability and the adhesive coating material, the coiled material for the AGV vehicle-mounted environment is obtained; and the coiled material has the characteristics of wear resistance, high skid resistance and high pressure resistance at the same time, and can meet the requirements of AGV vehicles on the ground.
Owner:浙江港流高分子科技股份有限公司

Fault detection device of voice communication system

The invention discloses a fault detection device for a voice communication system, and the device comprises: an electrical detection assembly which is used for detecting a first electrical parameter of target equipment in the voice communication system; a memory which is used for storing a device parameter model set, wherein the equipment parameter model set comprises a normal parameter model and a plurality of fault parameter models corresponding to each piece of equipment; a central control assembly which is used for determining a target equipment parameter model corresponding to the target equipment according to the first electrical parameter, if the target equipment parameter model is a normal parameter model, sending first state information representing that the target equipment is normal to a display component; and if the target equipment parameter model is the fault parameter model, sending second state information representing the fault of the target equipment to the display component, wherein the second state information comprises a fault type, a fault reason and a processing suggestion of the target equipment. The fault detection device can significantly improve the troubleshooting efficiency of the voice communication system.
Owner:BEIJING SHOUGANG AUTOMATION INFORMATION TECH

Live communication terminal capable of automatically carrying out bidirectional communication after unidirectional call, method and tool

The invention discloses a live communication terminal capable of automatically carrying out bidirectional communication after a unidirectional call, a method and a tool installed on a mobile terminal, wherein the live communication terminal capable of automatically carrying out bidirectional communication after the unidirectional call receives a connection request from a credible user; the received connection request from the credible user is responded, and an answer for the connection request is automatically sent, so that IP (Internet Protocol) communication with the credible user is automatically established; the collected video frequency and voice frequency are transmitted to the credible user in the IP communication with the credible user, and the voice frequency from the credible user is at least received. In comparison with the prior art, the connection request of the credible user is automatically responded through the live communication terminal capable of automatically carrying out bidirectional communication after the unidirectional call, so that the interaction of the credible user at a monitoring end and a monitored end is enhanced, thus the communication experience of the user is improved.
Owner:AINEMO

Tunnel connection request distribution method and device

The invention provides a tunnel connection request distribution method which is applied to an NAT (Network Address Translation) gateway to dispatch an L2TP connection request from a user outside the NAT gateway. The method comprises the steps of judging whether an L2TP connection request message from the user requires local authentication according to a preset policy, conducting local processing if required, otherwise returning an authentication failure message to the user, storing session characteristics of the authentication failure message in a session table when the authentication failure message is received, acquiring the session characteristics of a request message when the request message is received subsequently, and searching whether the preposed session table contains a corresponding table entry according to the session characteristics, and forwarding the message to an LNS (Lonworks Network Service) server in the NAT gateway if the table contains the entry, otherwise locally processing the L2TP connection request message. A service network served by the LNS server is different from a local service network. According to the tunnel connection request distribution method, the objective LNS server to which the user is intended to access can be identified intelligently while the existing standard protocol is followed.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

Contact network suspension operating state intelligent detection system

The invention discloses a contact network suspension operating state intelligent detection system. The contact network suspension operating state intelligent detection system comprises a three-dimensional laser scanner and a laser scanning module, and further comprises a data processing module, a data transmission module, a data comparison module, a standard database module, an information output module and a data storage module; the data processing module, the data transmission module, the data comparison module, the standard database module, the information output module, and the data storage module are application software installed in a PC; the laser scanning module is a built-in control system of the three-dimensional laser scanner; and the PC is integrated into an inspection repair vehicle and can also be installed in a power supply section. The contact network suspension operating state intelligent detection system can perform intelligent identification and intelligent judgment, can quickly and accurately identify the operating states of various parts of the system, and can discover the problematic part in advance and process the problematic part in time; therefore, the occurrence of driving safety accidents is avoided, and meanwhile, the labor intensity of the detecting personnel is greatly reduced, the detection efficiency is improved, the accuracy of the detection is improved, and a guarantee for driving safety is provided.
Owner:四川艾德瑞电气有限公司

Conversational natural language processing method and device

The invention discloses a conversational natural language processing method and device. The method comprises the following steps: segmenting chapter-level words into a character string by utilizing symbols, extracting language linear structures and language chunks from the segmented character string, respectively carrying out inverted arrangement on the extracted language linear structures and language chunks, creating sub-indexes of the language linear structures and the language chunks and forming a holistic index; providing a conversational interface and receiving a retrieve input character string of a user on the basis of the conversational interface; extracting the language linear structure and the language chunk of the retrieve input character string from the retrieve input character string and confirming a preset interest word from the extracted language chunk; and retrieving reply message matched with the language linear structure and the language chunk which are extracted from the retrieve input character string of the user according to the holistic index. By applying the method disclosed by the invention, the correlation interpretant of the interest word in the next round of conversation is confirmed through memorizing the trigger operation of a trigger control, so that the natural language processing accuracy is increased.
Owner:陈伯妤
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products