Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

42results about How to "Not easy to attract attention" patented technology

Method for designing forest fire prevention early warning system

The invention discloses a method for designing a forest fire prevention early warning system. The method comprises the following steps that (1) monitoring terminals are distributed at all monitoring points of a forest so as to collect environment information around the monitoring points and then the environment information and position information of the monitoring points are sent to a remote monitoring center in a binding mode; (2) the remote monitoring center is provided with a monitoring data base server and a monitoring software platform and a forest fire alarm model which is set in advance is further stored in the monitoring data base server; (3) the monitoring software platform reads the environment information, newly received by the monitoring data base server, around the monitoring points and conducts data processing, then analysis and comparison are conducted on the forest fire alarm model and the processed environment information, if the forest fire alarm model is matched with the processed environment information, the situation that corresponding forest fire occurs to the monitoring point is judged, an alarming sound is emitted, meanwhile, warning information is generated and a pre-protocoled fire prevention measure scheme is sent to a forest fire prevention center. The method for designing the forest fire prevention early warning system is reasonable in design, low in erection cost, stable in running and reliable in monitoring.
Owner:柳州市宏亿科技有限公司

Carrier-free text steganography method based on character features

The invention discloses a carrier-free text steganography method based on character features. Binary digits are expressed through the character features; secret information is processed into a binaryciphertext string and then is packaged and segmented; mapping between texts and binary ciphertext string segments is established by taking abundant webpage texts in a network big data environment as candidate carriers; corresponding texts are found for the secret information through the mapping relationship; and the texts or the corresponding URLs are sent, thereby finishing secret information interaction. After a receiving end receives the texts, the character features of a first text are analyzed to obtain head information; a binary ciphertext segmentation mode and length are determined; thefollow-up text character features are analyzed to obtain binary ciphertext segments; the segments are recombined to form the complete binary ciphertext string; and decoding or decryption is carried out to obtain the secret information. The method has the advantages of high stealthiness, high expandability and high embedded capacity, and the application and development of a steganography technology in various fields are facilitated.
Owner:QINGDAO UNIV

Concealed protective anti-theft anti-riot casement window without guardrail

The invention discloses a concealed protective anti-theft anti-riot casement window without a guardrail. The concealed protective anti-theft anti-riot casement window without the guardrail is characterized in that an anti-theft frame is arranged at the periphery of a window frame, a protective convex edge is arranged at the inner edge of an outdoor side of the anti-theft frame, and the window frame is embedded in the anti-theft frame and is mutually fastened and connected with the anti-theft frame by using bolts. The concealed protective anti-theft anti-riot casement window with the guardrail has the advantages that the anti-theft frame can be accurately fixed, when in use, firstly the anti-theft frame is arranged in a window of a wall, then the embedded window frame is fixed by the anti-theft frame, and the anti-theft frame and the window frame are sequentially and successfully arranged and do not need to rework, thereby greatly increasing the operating efficiency and installing accuracy; a gap between the anti-theft frame and the window frame is covered by the protective convex edge arranged at the inner edge of the outer side of the anti-theft frame, and therefore, the protective convex edge has the pry-proof effect; the strength and the anti-impact property of the window frame are increased through steel pipes and energy absorption materials in the window frame; a glass film composite layer is used for effectively preventing thieves from breaking up or gashing glass to enter a room and has the functions of anti-theft, temperature preservation and heat insulation; and stoppers and hinges of window sashes are also used for increasing the strength and anti-theft performance.
Owner:高林

A road sign recognition attack defense method based on multi-objective road optimization

The invention discloses a street sign recognition confrontation defense method based on multi-objective road optimization, comprising: (1) constructing a training set, a test set and a confrontation set; (2) constructing a street sign classifier, and using the training set and the test set to compare The classifier is trained to obtain the street sign recognition model; (3) Construct the street sign attack model according to the particle swarm optimization algorithm, and use the street sign attack model to generate confrontation samples; (4) Correct the confrontation samples, apply the confrontation samples to the physical scene, and then collect the confrontation samples. The physical image of the sample; (5) Input the physical image of the adversarial sample into the street sign recognition model, and screen high-quality adversarial samples; (6) Add the high-quality adversarial samples to the training set, and use the training set to retrain the street sign recognition model , to realize the optimization of the adversarial defense of the street sign recognition model; (7) use the street sign recognition model optimized by the adversarial defense to recognize the street sign image, so as to realize the adversarial defense of the street sign recognition.
Owner:ZHEJIANG UNIV OF TECH

Hidden information transmission method and transmission system based on biological sound

The invention discloses a concealed information transmission method and transmission system based on biological sound, and the method comprises the steps: 1, enabling a transmitting end to collect a biological sound pulse signal x(t), and extracting an envelope es(t); 2, acquiring the time range of each biological sound pulse in es(t); 3, when an i-th code element to be sent is B1, embedding an identification signal into an i-th biological sound pulse signal xi(t) in the x(t), and when the i-th code element to be sent is B2, performing no processing on the xi(t) signal; 4, enabling the transmitting end to send out the processed biological sound signal; 5, extracting an enveloper(t) from a received biological sound signal y(t) by the receiving end, and obtaining the time range of each biological sound pulse; 6, judging whether embedded information exists or not for each biological sound pulse yj(t) in the y(t): if the embedded information exists, determining that the j-th code element sent by the sending end is B1. According to the method, the requirement for transmitting the hidden information in a specific occasion can be met, and the probability that the secret information is intercepted and captured is reduced through the hidden communication behavior.
Owner:JIANGSU UNIV OF SCI & TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products