Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

53results about How to "Optimize the total calculation amount" patented technology

Authenticated encryption method and encryption system based on symmetric encryption

The invention discloses an authenticated encryption method and a system, relating to the field of communication security. The restorable signature of a message and the symmetric encryption technologyare combined; a commitment value which only can be calculated by a designated message receiving end is used as a session key encryption message; and the message receiving end validates the validity ofthe message by the restorable signature, thus realizing encryption and authentication in one logical step. A key generation unit of a sending end generates a session key of the sending end; an encryption unit encrypts a message to be sent; the receiving end generates a session key of the receiving end; a decryption unit utilizes the session key of the receiving end to decrypts the encrypted message; and the authentication and confirmation message is generated according to the decrypted message, thus validating the validity of the message. When disputes occur, the message receiving end transforms the authenticated and encrypted message signature into a common signature so as to lead a third party to validate the validity of the signature. The invention has the advantages of high security,low calculated amount and transmission cost, and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Numerical control system-based tool radius compensation vector calculating method

The invention provides a numerical control system-based tool radius compensation vector calculating method which comprises the steps of: judging different switching-over types through analyzing the distribution condition of a vector angle of a tangent line on the switching-over point of a processing segment on a plane coordinate system, and calculating the coordinate point after cutter compensation according to a specific computing method; analyzing the processing segment according to the information of the tool radius, the cutter compensation direction and a workpiece outline coordinate point and the like after collecting and processing the information of a to-be-processed workpiece, calculating vectors of two tangent lines on the switching-over point, and obtaining a switching-over angle of two straight lines according to the vectors of the two tangent lines, drawing the distribution condition of the switching-over angle in the plane coordinate system, and judging the switching-over type of the two straight lines so as to figure out coordinates of the switching-over point by adopting a vector calculating method; and sending information of the coordinates to a numerical control system for next step of interpolation. The numerical control system-based tool radius compensation vector calculating method has the advantages of being simple in calculating method and small in calculating quantity, and being beneficial to the realization of programming especially for the calculation of the switching-over point, thereby increasing the processing efficiency.
Owner:FUJIAN UNIV OF TECH

Parallax estimation method based on improved adaptive weighted summation and belief propagation

The invention discloses a parallax estimation method based on improved adaptive weighted summation and confidence propagation, belonging to the computer stereo visual sense technology field. The invention solves the problems that matching accuracy of the parallax calculated by the current matching algorithm in the shielding area and depth discontinuous area is low, that the high accuracy matching algorithm has heavy calculation quantity, that the implementation is poor, and the refinement method parallax plane estimation based on the segmentation is not accurate. The parallax estimation method comprises steps of computing correlated values among matching pixels by utilizing the weight class changing method, performing matching on shielding pixels afresh through improving the adaptive weight method, using the improved confidence propagation algorithm to perform global optimization on a disparity map, using a refinement module to perform refinement on the disparity map, and utilizing the improved confidence propagation algorithm again and the correlated value and the disparity map to perform global optimization. The invention can be applied in segmentation of the stereo image, encoding of the stereo video, robot vision, target tracking, etc.
Owner:HARBIN NORMAL UNIVERSITY

Wireless transmitter recognition method based on multi-core double-channel network

The invention discloses a wireless transmitter recognition method based on a multi-core double-channel network, and belongs to the field of electromagnetism. The method specifically comprises the following steps: firstly, performing power amplification on a modulation signal through a transmitter, transmitting the modulation signal to a receiver for sampling and receiving, performing statistical characteristic processing on a received signal to obtain a cyclic spectrum, and extracting a high peak density value in the cyclic spectrum as a characteristic; then, inputting all the characteristic values into a fully connected multi-core double-channel network module, learning the characterization characteristics of each transmitter from the cyclic spectrum, and fusing the obtained result unionsets; after a multi-core double-path network model is trained, the fused feature result is tested, and normalized feature vectors corresponding to all test features are obtained; and obtaining a probability value corresponding to each feature through a softmax classifier, and selecting the wireless transmitter with the maximum probability value as the final wireless transmitter to be identified and classified. According to the method, the calculation complexity is simplified, and the situation that the classification effect is not ideal due to noise interference is reduced.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Pre-warning method and system for automobile parking door opening and based on image processing

The invention belongs to the technical field of automobile electronics, and discloses a pre-warning method for automobile parking door opening and based on image processing. The pre-warning method comprises the steps that target identification and classification are conducted on images in a pre-warning area; the moving speed of a target and the moving time of a target needed to collide with an automobile are calculated; and the moving time and the moving speed are compared with the pre-warning calibration time and speed of different categories of targets to determine whether pre-warning is issued or not. The pre-warning method for automobile parking door opening and based on image processing utilizes SIFT feature extraction technology to quickly identify vehicles and pedestrians and the like in the pre-warning area, the calculation speed is high, and stability is high; and the binocular vision ranging technology can be utilized to accurately measure the distance and collision time of the passed vehicles, pedestrians and the like with the automobile, the calculation amount is greatly optimized, environment information of the rear part of the automobile can be processed in real time,almost no delay occurs, and a reliable pre-warning system is provided for parking door opening.
Owner:SHANGHAI UNIV OF ENG SCI

Unmanned aerial vehicle cluster task decomposition and sending method and system

The invention relates to the technical field of unmanned aerial vehicle control and particularly provides an unmanned aerial vehicle cluster task decomposition and sending method and system. The method particularly comprises steps: a master unmanned aerial vehicle determines the number of sub navigation point tasks which need to be decomposed according to a cluster navigation point task; the master unmanned aerial vehicle decomposes the cluster navigation point task to multiple sub navigation point tasks according to a decomposition optimality principle and the number of sub navigation point tasks; and the master unmanned aerial vehicle distributes and sends the sub navigation point tasks to corresponding subordinate unmanned aerial vehicles. In the method, the master unmanned aerial vehicle is in charge of decomposition, distribution and sending of a cluster task, the unmanned aerial vehicles shoulder one part of the work of a central control system, the information processing pressure of the central control system is lessened, a greater degree of freedom is given to the unmanned aerial vehicle cluster, management on mass data of the unmanned aerial vehicles is also facilitated, and the total computation amount of formation task distribution is optimized.
Owner:GUANGZHOU EHANG INTELLIGENT TECH

Method of synchronizing precise timing of DVB-T2 (Digital Video Broadcasting-Terrestrial 2) system

The invention discloses a method of synchronizing precise timing of a DVB-T2 (Digital Video Broadcasting-Terrestrial 2) system. The method comprises the steps: extracting the pilot frequency of a first P2 symbol in the received T2 frame, performing pseudo random sequence correction, and carrying out IFFT (Inverse Fast Fourier Transform) to obtain channel impulse response; according to the average power and envelope of the channel impulse response, separating the effective path in the channel impulse response; making relation with a time domain P2 signal by using the time domain signal of the locally generated P2 pilot frequency according to the position of the effective path in the channel impulse response and the imaging position of the effective path, analyzing and judging the true position of the path in the channel impulse response; judging the characteristic of a channel by judging whether a path exists before a main path of a CIR, thus regulating the window of FFT (Fast Fourier Transform) in time domain by utilizing the minimal intersymbol interference principle. By utilizing the method, the computation amount and locking time can be greatly reduced, the synchronization accuracy of the precise timing can be improved, and the power consumption of the DVT-T2 system can be decreased.
Owner:HUNAN GOKE MICROELECTRONICS

Universal killing area calculation method and universal launching area calculation method

The invention discloses a universal killing area calculation method and a universal launching area calculation method. The method can be well applied to killing area calculation of various tactical types and various target types, so that a killing area is quickly and efficiently modified in different stages of type research and development. The method abstracts various killing area boundary calculation methods and extracts common parts for establishing a universal mathematic model, thereby realizing complete isolation of killing area boundary parameters and an algorithm model. As only the killing area boundary parameters are different for different tactical types, the required killing area can be obtained by only changing initial parameters. The algorithm well solves the problems of an existing killing area in incompatibility among different types, incompatibility among different target types and complex and low-efficiency killing area calculation after change of boundary parameters, has the advantages of quickness, high efficiency, high universality and the like, can effectively reduce research and development expenditures and manpower resource costs, and can meet the requirements of killing area calculation of weapon systems of different tactical types.
Owner:SHANGHAI INST OF ELECTROMECHANICAL ENG

Paper defect detection method based on bit planes

The invention discloses a paper defect detection method based on bit planes. The paper defect detection method comprises the following steps of firstly, obtaining an original image of the tested paper, and converting into a grayscale image; pretreating the grayscale image, so as to eliminate the noise in the image; decomposing the bit plane of the pretreated grayscale image to obtain eight bit planes of the image; using Gray code to enhance the bit planes, so as to obtain eight enhanced bit planes of the grayscale image; finally, selecting the sixth enhanced bit plane, and segmenting the image, so as to obtain the final detection result. The paper defect detection method has the advantages that while the rapidity of algorithm is guaranteed, the defect can be well detected; the anti-interference property and positioning accuracy are better, and the operation is simple.
Owner:SHAANXI UNIV OF SCI & TECH

Circulating fermentation technology for cowpeas

InactiveCN105192645AShort preparation timeGood nutrition retentionFood preparationRaw materialLactic acid
The invention provides a circulating fermentation technology for cowpeas. The circulating fermentation technology comprises the following steps: adding pickling water with lactic acid bacteria powder into cowpeas for cowpea fermentation; when fermented by the 4nth time, performing centrifugation, water removal, supplementation of new pickling water, lactic acid bacteria powder adding, detection and adjustment on the pickling water for fermentation at the 4nth time, and continuously applying the pickling water to cowpea fermentation, wherein the n adopts a continuous positive integer in sequence; the fermentation is hermitically performed for 40-65 hours under the condition that the temperature of 20 to 24 DEG C; the difference between the new pickling water and the pickling water with the lactic acid bacteria powder is that the new pickling water does not contain the lactic acid bacteria powder. The technology adopts an innovate fermentation method; after performing fermentation by certain times, the pickling water is subjected to centrifugation, water removal, supplementation of new pickling water and the like, so that the pickling water can be recycled; the pickling water raw material and the cost of the preparation technology are reduced, the fermentation time of the cowpeas is shortened, and the quality and the taste of the soaked cowpeas are enhanced; the circulating fermentation technology is suitable for large-scale production and has good economical benefit, and the development of the pickling industry is promoted.
Owner:SICHUAN GAOFUJI BIOLOGICAL TECH

Preparation technology of fresh pickled cowpea

The invention provides preparation technology of fresh pickled cowpea. The technology comprises the following steps: step A, preparing pickle liquid I and pickle liquid II for later use, wherein the difference between the pickle liquid I and the pickle liquid II is that Gaofuji Paolemei Lactobacillus Powder is added in the pickle liquid I while no Gaofuji Paolemei Lactobacillus Powder is added in the pickle liquid II; step B, circulation fermentation, namely fermenting vegetable cowpea by the pickle liquid I prepared in step A, so that the fresh pickled cowpea is obtained; when performing the 4n times of fermentation, the pickle liquid after the 4n-time fermentation is used again for fermenting the cowpea after sequential processes such as centrifugation, water-losing and the like, wherein the n is selected from continuous positive integers; and the fermentation is carried on at 20-24 DEG C for 40-65 hours. According to the technology, the pickle liquid preparation and the circulation fermentation control are utilized, especially the addition of the Gaofuji Paolemei Lactobacillus Powder into the pickle liquid and the controls to the parameters and indexes in the circulation fermentation process are performed, so that the preparation time of the fresh pickled vegetables is shortened and the quality and taste of the fresh pickled vegetables are improved; thus, the technology is suitable for large-scale production and promotes development of the pickled-vegetable industry; moreover, the technology is relatively good in economic benefit.
Owner:SICHUAN GAOFUJI BIOLOGICAL TECH

Generation and authentication method of self-certified public key of mobile self-organized network

The invention discloses a management method of self-certified public key of a mobile self-organized network on the basis of ECC, comprising the following steps: a shared key is distributed to n virtual central nodes by threshold cryptology; a user chooses a secret random number to calculate a public parameter, and identity and the public parameter are sent to a nearby virtual central node A1; A1 contacts with other virtual central nodes and sends the user information to the nodes; each publisher Ai chooses a random secret integer and calculates as well as broadcasts a self-certified public key subblock Qi to other publishers according to the secret integers and parameters published by the user; each publisher Ai calculates a self-certified public key Q, a sub-signature xi and an intermediate quantity Ri and sends (r, I, xi and Ri) to a synthesizer; the synthesizer calculates and synthesizes a signature x after all sub-signatures are qualified after authentication and sends Q and x to the user; the user calculates a secret key s according to the x; and the authenticity of the self-certified public key of the user is verified. The invention has no certificate management, no key escrow and no secure channel, so that the invention is suitable for the safe communication of the mobile self-organization network with limited resource.
Owner:XIDIAN UNIV

Intelligent identification method for tangram toys

The invention discloses an intelligent identification method for a tangram toy. Internet equipment, a base, a reflector, a splicing base plate and an application software unit in the Internet equipment are adopted as identification tools; a mobile phone is inserted into a groove of the base, a reflector lens is horizontally installed at the lower end of the shell, and the shell is clamped on the front side of the upper portion of the mobile phone and located on the upper portion of a mobile phone camera. The base plate is positioned at the front end of the base. The application software unit comprises a calibration module, a game process module, an instruction module, an image processing module and a reward module. Identification is divided into eight steps. The method is based on the AI technology, the color of each tangram serves as the judgment basis of the placement position and shape, whether the position and pattern of the single tangram placed in the corresponding area of the base plate are correct or not is directly obtained according to the colors, the calculation amount is reduced, the steps are few, and the probability of image recognition errors is correspondingly reduced; and the method overcomes the defects that an edge matching method adopted in the prior art is large in calculated amount and large in number of steps. Based on the above, the method has a good application prospect.
Owner:上海积跬教育科技有限公司

Three-dimensional target detection method and system based on deep neural network

The invention discloses a three-dimensional target detection method and system based on a deep neural network, and belongs to the technical field of three-dimensional target detection. The three-dimensional target detection method and system based on the deep neural network have the advantages of being accurate in target detection, small in neural network layer number, small in calculated amount,low in hardware requirement, high in universality and real-time performance and the like. The method comprises the steps of obtaining a color image and point cloud information of an environment wherea target object is located; adopting a deep neural network YOLO6D and YOLOv2 to carry out joint detection on the color image, and respectively obtaining a 2D bounding box and a 3D bounding box of thetarget object on the color image; mapping the point cloud information to an image coordinate system of the color image, and obtaining coordinate information of the point cloud information in the colorimage; according to the 2D bounding box and the 3D bounding box of the target object on the image and combining the coordinate information of the point cloud information in the color image, respectively obtaining depth information of the 2D bounding box and the 3D bounding box; and according to the depth information of the 2D bounding box and the 3D bounding box and combining the dimension of thepoint cloud information, obtaining the category, size and pose information of the target object.
Owner:HOHAI UNIV CHANGZHOU

Authentication Encryption Method and Encryption System Based on Symmetric Encryption

The invention requests protection of an authentication and encryption method and system, which relate to the field of communication security. Combining message recoverable signature and symmetric encryption technology, using the commitment value that only the specified message receiving end can calculate as the session key to encrypt the message, the message receiving end verifies the validity of the message through the recoverable signature, so that it can be realized simultaneously in one logical step encryption and authentication. The key generating unit at the sending end generates a session key at the sending end, the encryption unit encrypts the message to be sent, the receiving end generates a session key at the receiving end, and the decryption unit uses the session key at the receiving end to decrypt the encrypted message. The message generates authentication confirmation information to verify the validity of the message. When a dispute occurs, the message receiver can convert the authenticated encrypted message signature into a common signature, allowing a third party to publicly verify the validity of the signature. The invention has the advantages of high security, low calculation amount and transmission cost, and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products