Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1016results about How to "Reduce false negative rate" patented technology

Mobile phone telephone and message anti-disturbance and private communication method and system

InactiveCN101184264AImprove filtering effectOptimize the effect of anti-harassmentRadio/inductive link selection arrangementsSubstation equipmentPrivate communicationSocial statistics
The invention relates to a processing method and the system of anti-harassment of mobile phone calls and messages and private communication, which is as follow: when grouping the contacts in the mobile phone address list according to different classes, a private group of private communicating contacts is added, and different scene modes of the user are set; when receiving a mobile phone call or a message (text message, multimedia message), depending on the grouping sort of the contact of the incoming call or the message or the multimedia message, and the current scene of the user, together with the behavior characteristics of the harassing call and the spam message with the database information of the public harassing message issued by the authoritative institution or obtained from social statistics, the corresponding process to the call, the message and the multimedia message of the mobile phone is executed to reduce harassment; meanwhile the communication records of incoming, dialed calls and message, multimedia message with the contacts in the private grouping are encrypted and preserved to protect the personal privacy of the user. The invention has the advantages of adopting the operating steps of uniform process, and resolving synthetically the harassment of calls, messages and multimedia messages for the mobile phone and the private protection.
Owner:BEIJING NETQIN TECH

Leakage detecting and locating method based on pressure and sound wave information amalgamation

A leakage detection location method based on pressure and sound information integration is provided, which belongs to the technology field of an oil (gas) pipeline fault diagnosis, and is characterized by leakage detection and leakage location based on information integration. The former comprises: separately acquiring the measurement data of the pressure on the upperstream end and downstream end of the pipeline and a sound wave sensor, sending the data to a computer and gaining final detection results through three levels processing including data filtering, characteristic level integration and decision level integration. If the detection result shows leakage, starting leakage location process based on information integration. The process first carries out leakage location by separately adopting the signals of two kinds of sensors and a plurality of different leakage location algorithms and finally gains the location results via integration of the location results based on the same sensor and different location methods and two levels processing based on the integration of the location results of two kinds of different sensors. The method can effectively reduce the false positive rate and false negative rate and improve the location precision.
Owner:TSINGHUA UNIV

Full-distributed optical fiber strain and vibration sensor based on coherent heterodyne detection

The invention relates to a full-distributed optical fiber strain and vibration sensor based on coherent heterodyne detection, which comprises a laser (1), a coupler, a pulse modulation module, a programming gain amplifier (4), an optical amplifier, a circulator (6), a sensing fiber (7), a polarization-preserving fiber (8), the coupler, a balancing photoelectric detector (10), a reversal switch, a mixer, a microwave source, a band-pass filter, and a signal processing unit, wherein the continuous light output by the laser (1) is divided into two paths after passing through the coupler (2); an output end of the balancing photoelectric detector is connected to the reversal switch; the reversal switch is switched to a channel 1 and a channel 2; when the channel 1 is switched on, the system utilizes the Brillouin optical fiber time domain reflection to measure; and when the programming gain amplifier (4) is closed and the channel 2 is switched on, the system utilizes the polarization optical time-domain reflection to measure. By using the full-distributed optical fiber strain and vibration sensor provided by the invention, the full-distributed measurement for strain as well as the weak vibration and the full-distributed measurement for vibration can be performed on a single optical fiber.
Owner:NANJING UNIV

Method for judging refrigerant leakage of air-conditioner

The invention discloses a method for judging the refrigerant leakage of an air-conditioner, comprising following steps of: a. recording the temperature T of an indoor pipe coil before starting a compressor; b. judging whether the compressor is started or not, if so, conducting the next step, if not, returning to the step a; c. judging whether the compressor keeps running for x minutes, if so, conducting the next step, if not, returning to the step b; d. recording the temperature T' of the indoor pipe coil when the compressor keeps running for x minutes and recording indoor temperature Tr simultaneously; e. calculating temperature difference between the temperature T' of the indoor pipe coil when the compressor keeps running for x minutes and the temperature T of the indoor pipe coil before starting the compressor, calculating the temperature difference between the temperature T' of the indoor pipe coil when the compressor keeps running for x minutes and the indoor temperature Tr recorded simultaneously, to see whether the two temperature differences are less than y, if so, conducting step f, if not, then clearing the running time of the compressor and returning to the step b; and f. shutting down to report faults. The method for judging refrigerant leakage in the air-conditioner has high accuracy.
Owner:NINGBO AUX ELECTRIC

Abnormal condition identification method for tire pressure of goods wagon

InactiveCN102107591AReduce the probability of false positives and false negativesImprove accuracyTyre measurementsEngineeringData processing
An abnormal condition identification method for the tire pressure of a goods wagon belongs to the technical field of secure state detection of an automobile. The abnormal condition identification method comprises the steps as follows: a tire state data base comprising tire models, the relation between load and initial inflation pressure, real-time tire pressure, load, vehicle speed and external environmental temperature is created; frequency is acquired on the basis of set data so as to measure tire state parameters which are then input to the tire state data base in an industrial computer; the prewarning threshold value of the abnormal condition identification of the tire pressure is confirmed on the basis of a test on the relation between the rolling tire pressure and influence factors thereof; in addition, data processing programs of the abnormal condition identification of the tire pressure are written, and the tire pressure states of start-up, parking and driving of the automobile can be monitored and prewarned respectively. The abnormal condition identification method effectively solves the difficult problem that the prewarning threshold value of the rolling tire pressure varies with the changes of working conditions, can greatly reduce the probability of misinformation and omission, improves the prewarning accuracy of the abnormal condition of the tire pressure, and canprovide the theory basis for the setting of prewarning regulations of a tire pressure monitoring prewarning system at the same time.
Owner:JILIN UNIV

Pedestrian detection method based on infrared image

The invention discloses a pedestrian detection method based on an infrared image. The method comprises the steps that a pedestrian standard data set and a non-pedestrian standard data set of the infrared image are established; sample image characteristics of an HOG are extracted; sample image characteristics of an HOI are extracted; the pedestrian classification features and the characteristics of an HOGI are designed; the sample image HOGI characteristics are extracted, and a pedestrian classifier is trained; the searching detection is carried out on the infrared image based on the multi-scale sliding window method; multi-window classification results can be combined to determine the pedestrian position. The pedestrian detecting characteristics special for the infrared image are provided on the basis of studying the present pedestrian detecting characteristics. The advantages of the HOG characteristics and the advantages of the HOI characteristics are combined, and the HOGI characteristics suitable for infrared image pedestrian detection are obtained through an SVM. According to the pedestrian detection method, pedestrians walking at night are detected, and the pedestrian detection method has the advantages of being high in detection ratio, low in false drop rate, good in environmental adaptability and the like.
Owner:ZHEJIANG UNIV

Network theft behavior detecting method based on HTTP flow analysis

The invention relates to a network theft behavior detecting method based on HTTP flow analysis. The method comprises the steps of establishing a C&C server blacklist database, acquiring DNS and HTTP protocol flow in a random time segment and performing analysis restoring, performing abnormal data elimination on HTTP traffic data generated in accessing a normal server, performing statistics, determining a to-be-determined abnormal behavior item and a detecting use threshold, detecting whether an abnormal behavior of a computer device in a network of an organization, if yes, performing alarming, storing a data packet in a database, and performing risk analysis and processing on alarming. According to the network theft behavior detecting method, network behavior characteristic analysis is performed on a tool and malicious software which transmit sensitive data based on an HTTP protocol, thereby determining an abnormal behavior characteristic. A threshold value is determined through performing statistics on the HTTP traffic at the network entrance of the organization, thereby identifying a sensitive data transmission behavior by a trojan horse on the attacked computer device. The network theft behavior detecting method has advantages of low alarm error rate, low alarm omission rate, high accuracy and high feasibility. The network theft behavior detecting method is suitable for organizations, individuals and large-scale high-speed network.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Intrusion detection method and intrusion detection system for industrial control system based on communication model

The invention provides an intrusion detection method and an intrusion detection system for an industrial control system based on a communication model. The accuracy of intrusion detection is improved to the maximum degree while the practicability is guaranteed. The intrusion detection method comprises the steps of firstly establishing a communication model and communication rules of the industrial control system, wherein the communication model comprises node information and communication connection information; generating a legal communication rule set on the basis of the communication model after the communication model of the industrial control system is established, learning in an installation and debugging stage and a stage before an attack happens of the industrial control system, and establishing a communication model and a communication rule set; then deploying detectors in an industrial control network, capturing a datagram, analyzing and extracting the communication connection information through the datagram, comparing the communication connection information with the generated legal communication rule set, and giving out an alarm when communication connection which violates the legal communication rule set exists; and calling a system response module to adopt corresponding response strategies if intrusion is discovered, and carrying out analysis and learning again if actual detection is wrong.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Batch process failure monitoring method based on AR-PCA (Autoregressive Principal Component Analysis)

The invention discloses a batch process failure monitoring method based on AR-PCA (Autoregressive Principal Component Analysis). Through the batch process failure monitoring method, the batch process with strong dynamics can be monitored online; when monitoring the bath process, a conventional MPCA (Multiway Principal Component Analysis) does not take corresponding self-correlation and mutual correlation of variables due to the existence of various random noises and interferences into account, so that a large quantity of false alarm is generated in the online monitoring process. The batch process failure monitoring method comprises the following steps: firstly, building a multi-variable autoregressive (AR) model according to measurement variables, recognizing a model coefficient matrix by using a PLS (Partial Least Squares) method and recognizing a model order by using an AIC (Akaike Information Criterion); and then building a PCA model for a residual error of the AR model. Meanwhile, training data is introduced when a new bath of data is monitored online through the algorithm, so that the monitoring effect of the algorithm is improved. Through the batch process failure monitoring method, the defect of a large quantity of false alarm of the conventional MPCA method during the process of monitoring the batch process with strong dynamics can be made up; and the batch process failure monitoring method is of great significance to monitoring of an actual bath production process.
Owner:BEIJING UNIV OF TECH

Neural network and fuzzy control fused electrical fire intelligent alarm method

The invention discloses a neural network and fuzzy control fused electrical fire intelligent alarm method. The method comprises the following steps of: 1, acquiring a leakage current signal, current and voltage signals, an arc light signal, a temperature signal and a field electromagnetic environment parameter signal by using a sensor on site, and pre-processing signals acquired by the sensor by using a velocity detection algorithm; 2, transmitting processed data to a three-layer feedforward error counterpropagation neural network and processing, wherein the neural network is subjected to supervised learning and establishes a weight matrix in advance; and 3, transmitting electrical circuit undamage probability, electrical circuit damage probability, and electrical circuit fire probability output by the neural network to a fuzzy inference module and performing fuzzy inference to acquire a forecast result of electrical fire. In the method, the probability of the electrical fire is accurately forecast by using the advantages of advanced theories, such as neural network, fuzzy control and the like, and without depending on deep knowledge of an object, the electrical fire forecasting accuracy is obviously improved and the damage of the electrical fire can be effectively prevented and reduced.
Owner:彭浩明

Lightning early warning method and system based on lightning monitoring devices arranged in distributed mode

InactiveCN104574833AReduce false positive and false negative ratesImprove accuracyElectromagentic field characteristicsAlarmsData transmissionMonitoring data
The invention discloses a lightning early warning system based on lightning monitoring devices arranged in a distributed mode. The lightning early warning system comprises a background server or a cloud server, the lightening monitoring devices and a communication module, wherein the lightning monitoring devices are arranged in a region in the distributed mode, and each lightning monitoring device transmits lightning monitoring data to the background server or the cloud server through the communication module. The background server or the cloud server stores and analyzes the lightning monitoring data and generates lightning early warning information. The invention further discloses a lightning early warning method based on the lightning monitoring devices arranged in the distributed mode. By means of the lightning early warning method and system, accurate forecasting can be achieved for the local thunder cloud expected direction and the possible thunderstorm occurrence time, the rate of false forecast and the rate of missing forecast are effectively decreased, the background server or the cloud server of the early warning system can be further checked and modified, and furthermore, the lightning early warning and forecasting accuracy is unceasingly perfected and improved.
Owner:CHINA PETROLEUM & CHEM CORP QINGDAO RES INST OF SAFETY ENG +1

Machine-learning-based flow identification technology

The invention relates to a machine-learning-based flow identification technology. An identified object is an encrypted malicious flow. The provided machine-learning-based flow identification technology is not only mainly applied to the flow identification filed but also applied to the field of network attack detection in an assisted manner. The machine-learning-based flow identification technologyis characterized by establishing malicious encrypted flow identification model by using a machine learning algorithm and identifying a new flow by the model. The working flow of the novel technologyis as follows: lots of known attribute flow data are read; statistical characteristics of the flow are extracted and the extracted characteristics are used as attributes; a model is established by using a random forest algorithm; and then a newly inputted flow is identified by using the model. The identification process of the newly inputted flow is as follows: extracting statistical characteristics of the flow, inputting the statistical characteristics into the model for identification, and acquiring an identification result. According to the invention, the technology is oriented at the encrypted and coded flows and data participating in modeling are formed by normal encrypted flow and the malicious encrypted flow. At present, the existing non-encrypted flow identification technology is mature but the encrypted or coded flow identification can not be carried out easily; however, the invention provides a novel solution method for identification of the encrypted flow.
Owner:SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products