Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

80results about How to "Solve the robustness problem" patented technology

Global positioning system satellite searching and scheduling method

The invention relates to the field of global satellite positioning and navigation, in particular to a satellite searching and dispatching method for a global positioning system (GPS); the method comprises three parts: a classifying satellite possibility dispatching method which comprises the steps as follows: the state of the satellite is judged by the obtained satellite information; each satellite is classified by the satellite state, thus presuming the searching scene further; according to the satellite classes and the searching scenes, different searching weights are arranged for each satellite so as to carry out the searching; a maintaining re-catching method for continuously searching the blocked satellites and a self-adaptive sensitiveness catching method which uses the catching methods of different sensitiveness by aiming at the satellites of different signal-noise-ratio. When the three methods are smartly used, the successful possibility of searching satellite is greatly improved, the time used for searching the satellite is reduced, the starting and positioning speed and the re-catching positioning precision are greatly improved, the power dissipation is reduced, and the problems of robustness and reliability in the satellite dispatching arithmetic are solved, thus improving the feasibility of the receiving machines in the urban forests where the blocking is severe, and greatly improving the experience of the user.
Owner:北京中科微知识产权服务有限公司

HoloLens-based battlefield situation construction and interaction implementation method

The invention discloses a HoloLens-based battlefield situation construction and interaction implementation method. The method sequentially comprises the following steps of 1, firstly, sequentially constructing a terrain model, a three-dimensional object model and a three-dimensional military standard, and then adopting the mode of combining geometric characteristic optimization and grain optimization for performing model optimization; 2, sequentially achieving the purposes of battlefield situation dynamic showing fluency and authenticity and the purpose of three-dimensional virtual-real fusion; 3, performing user interaction. The method can achieve construction and interaction according to user identity roles, operation habits, interaction action tendencies and other natural human-machine interaction holographic battlefield situation electronic sand table information, the situation awareness fidelity and immersion can be enhanced, the method can intelligently and efficiently provide the imaginable and visual battlefield situation and visualized information interaction interface for commanders and the staff, and the method is used for supporting construction of intelligent information service systems of future advanced command posts with different fight persons and different operation patterns.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Image automatic cutting method

The invention relates to an image automatic cutting method. The method comprises the following steps: extracting an aesthetic response graph and a gradient energy graph of an image to be cut; intensively extracting candidate cutting images from the image to be cut; based on the aesthetic response graph, screening the candidate cutting images; and based on the aesthetic response graph and the gradient energy graph, estimating composition fractions of screened candidate cutting images and determining that a candidate cutting image with the highest score is a cutting image. According to the scheme, an aesthetic influence area of a picture is studied by use of the aesthetic response graph, an aesthetic reservation portion is determined by use of the aesthetic response graph, high aesthetic quality of the cutting image is better reserved to be greatest extent, at the same time, a gradient distribution rule is analyzed by use of the gradient energy graph, and the composition fraction of the cutting image is evaluated based on the aesthetic response graph and the gradient energy graph. The image automatic cutting method provided by the embodiment of the invention makes up for the defect of image composition expression and solves the problem of how to improve the robustness and precision of image automatic cutting.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Course control system and method for unmanned surface vehicle

The invention relates to the field of unmanned control methods, in particular to a course control system and method for an unmanned surface vehicle. The control system comprises an upper computer, a transmission station and a lower computer. The control method includes the set steps that an expected course is input in a human-computer interaction interface of an upper computer operating deck and transmitted to the lower computer through the transmission station; information is acquired and transmitted, wherein unmanned surface vehicle comprehensive information acquired by the lower computer is transmitted into the upper computer through the transmission station; and control is conducted, wherein the upper computer conducts calculation and processing according to the received unmanned surface vehicle comprehensive information, a rudder angle delta is output and transmitted to the lower computer, and the rudder direction is automatically changed through a course control device, so that the course of the unmanned surface vehicle is adjusted. The system and method have the beneficial effects that maneuverability is high, robustness is strong, a stepping motor and a bevel gear wheel are simultaneously adopted for driving the steering course control device, the control accuracy is higher, steering is more accurate, and the application prospect is good.
Owner:WUHAN NIWEI INTELLIGENT TECH CO LTD

Method for three-dimensional reconstruction of straight-line optical flow field based on intelligent optimization algorithm

The invention relates to a method for the three-dimensional reconstruction of a straight-line optical flow field based on an intelligent optimization algorithm, which is characterized by comprising the following steps of: shooting at least three continuous frames of images of an object in a scene by a fixed camera to form an image sequence, extracting the straight-line profile of the object in the scene and taking a straight line as a characteristic; under a perspective projection model, eliciting a relationship between the motion parameter of the straight-line profile of a moving rigid object in a 3D space and a two-dimensional straight-line optical field on a projection image of the moving rigid object, expressing the relationship by a straight-line optical flow equation group and constructing a physical model and a mathematical model of a three-dimensional reconstruction algorithm. The invention has the advantages of realizing the three-dimensional reconstruction and the moving target division of an object with a straight-line profile in a scene quickly, solving the problems of robustness of the three-dimensional reconstruction algorithm and reconstruction of a shielding boundary of the scene effectively and enhancing the accuracy of three-dimensional reconstruction effectively.
Owner:NANCHANG HANGKONG UNIVERSITY

Hyper-heuristic algorithm-based multi-satellite earth observation task planning and scheduling method

ActiveCN106529826ASolve difficult-to-solve problems at different scalesImprove distribution efficiencyResourcesEarth observationAlgorithm
The present invention discloses a hyper-heuristic algorithm-based multi-satellite earth observation task planning and scheduling method. The method comprises the steps of 1, conducting the initialization setting; 2, generating the initial solution of a problem and adopting the initial solution as a current solution; 3, calculating the evaluation value of each algorithm in an underlying algorithm set; 4, selecting one algorithm maximum in evaluation value out of all algorithms in the underlying algorithm set as an elite algorithm; 5, applying the elite algorithm to optimize the current solution of the multi-satellite cooperative earth observation task planning problem so as to obtain a novel solution and the running time of the elite algorithm; 6, calculating the fitness value of an optimized target and adopting the new solution as a current solution; 7, modifying the e1(h1), e2 (hk, hi) function; 8, modifying an algorithm running efficacy evaluation factor and an algorithm selection evaluation factor; 9, judging whether the running time of the hyper-heuristic algorithm reaches a preset maximum running time or not; if not, jumping to the step 3; otherwise, adopting the current solution as the planning optimum solution of the multi-satellite synergistic earth observation task. The method is applied to examples of different scales for solving the multi-satellite task planning and scheduling problem. Based on the method, the better problem solving efficiency and the better problem solving effect are realized.
Owner:NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP +1

DWT-DCT (Discrete Wavelet Transform-Discrete Cosine Transform) and Logistic Map-based medical image robust watermarking method

InactiveCN102945543AStrong resistance to conventional attacksStrong ability to resist geometric attacksImage data processing detailsThird partyFeature vector
The invention relates to a DWT-DCT (Discrete Wavelet Transform-Discrete Cosine Transform) and Logistic Map-based medical image robust watermarking method, which belongs to the field of multimedia signal processing. The method comprises preprocessing of a watermark and embedding of the watermark, wherein the preprocessing of the watermark and embedding of the watermark comprise the following steps of: (1) obtaining an encryption matrix by using a Logistic Map; (2) obtaining an encrypted watermark; (3) performing DWT on an original image, performing DCT on an approximation sub-image and extracting the vector of a characteristic; (4) obtaining a corresponding two-valued logic sequence by using the characteristic vector and chaotically encrypted watermark, storing the two-valued sequence at a third party, and then extracting and reducing the watermark, wherein the extraction and the reduction of the watermark comprise the following steps of: (5) performing operation similar to the step (3) on an image to be tested to solve one characteristic vector; (6) extracting the encrypted watermark; (7) generating a two-valued encryption matrix by using the Logistic Map; and (8) solving the reduced watermark. According to the method, the secrecy of information of a patient can be protected.
Owner:HAINAN UNIVERSITY

RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition

The invention relates to an RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition. The method comprises a zero watermark generation part and a zero watermark detection part. An authentication zero watermark of a three-dimensional image is constructed by utilizing the double-viewpoint characteristic of the three-dimensional image and utilizing the sizerelation between absolute values of elements at the upper left corners in respective coefficient sub-blocks after paired random image blocks are decomposed in low-frequency sub-bands after fast finiteshear wave transformation (FFST) of the left viewpoint image and the right viewpoint image, and the method is simple, novel and high in robustness. Meanwhile, a fractional order Arnodo chaotic systemis adopted to generate a random sequence, and encryption of an original binary watermark image is achieved. Before watermark extraction, geometric attack correction is carried out on a to-be-authenticated three-dimensional image by using an image matching method based on Fourier-Merlin transform. Experimental results show that the method provided by the invention has good robustness for resistingvarious common image processing attacks such as noise addition, filtering, JPEG compression, shearing, rotation, zooming, translation (RST) attacks and the like.
Owner:CIVIL AVIATION UNIV OF CHINA

Construction method of image tracking classifier and face tracking method applying same

The present invention discloses a construction method of an image tracking classifier and a face tracking method applying the same. The construction method of the image tracking classifier comprises the following steps: obtaining a first sample set for training; constructing a convolution neural network model; after performing target frame marking of each image in the first sample set, performing preprocessing to obtain a first target area image and a second target area image, wherein the first target area image is obtained through image expansion according to a target frame, and the second target area image is obtained through transformation of the first target area image and a corresponding target frame marking image; and employing all the first image areas and all the second image areas to perform training of the convolution neural network model to obtain a target regression model. Through adoption of features extracted by the convolution neural network method based on deep learning, the construction method of the image tracking classifier and the face tracking method applying the same effectively solve the problem of balance of robustness and accuracy, have higher robustness in the rapid movement and illumination fuzzy changing, are small in calculation and improve the tracking speed.
Owner:北京飞搜科技有限公司

Stereo image zero-watermarking method based on NSCT and SIFT

The invention provides a stereo image zero-watermarking method based on NSCT and SIFT, and belongs to the technical field of image encryption and image processing. The stereo image zero-watermarking method based on NSCT and SIFT includes the steps: extracting the low frequency sub-band images of the left and right view point image NSCT transformation domains of a stereo image, taking the parallax image between the low frequency sub-band images as the carrier for extracting the watermarking, performing singular value decomposition on the carrier image, making rules for zero-watermarking extracting, performing XOR on the extracted two-value zero-watermarking image and the copyright sign watermarking image to obtain an authorized zero-watermarking image, and enabling the stereo image to be under protection of the watermarking technique after saving the zero-watermarking image at a registration center. The stereo image zero-watermarking method based on NSCT and SIFT can preferably resist conventional attack, such as various noises, filtering and compression, and especially improves the capability of resisting geometrical attack, so that zero-watermarking embedding cannot change the original image and the quality of image can be guaranteed. Besides, during the watermarking extracting process, the original image is not demanded, so that the stereo image zero-watermarking method based on NSCT and SIFT provides convenience for practical application and can effectively protect the copyright of the stereo image.
Owner:JILIN UNIV

Robust watermarking method for medical images on basis of Arnold scrambling transformation and DWT (discrete wavelet transform)-DFT (discrete Fourier transform)

InactiveCN102938133ASolve the quickness problemImplement secondary encryptionImage data processing detailsThird partyFeature vector
The invention discloses a robust watermarking technology for medical images on the basis of Arnold scrambling transformation and DWT (discrete wavelet transform)-DFT (discrete Fourier transform), and belongs to the field of multimedia signal processing. The robust watermarking technology includes embedding watermarks and then extracting the watermarks, and particularly includes steps of (1), performing Arnold transformation for watermarks to be embedded; (2), performing DWT for a medical image, performing DFT for approximation sub-images of the medical image, and extracting vectors of a feature; (3), generating a binary logic sequence via a Hash function by the vectors of the feature and the preprocessed watermarks so as to complete the process for embedding the watermarks; (4), performing DWT for a medical image to be measured, performing DFT for approximation sub-images of the medical image to be measured and extracting vectors of a feature; (5), extracting watermarks by the aid of the Hash function and a binary logic sequence stored in a third party; and (6), obtaining the original watermarks via Arnold inverse transformation so as to complete the process for extracting the watermarks. The robot watermarking technology has an important significance in protecting information of patients during remote medical treatment.
Owner:HAINAN UNIVERSITY

Adversarial example defense method based on two-stage adversarial knowledge migration

The invention belongs to the technical field of artificial intelligence safety, and discloses an adversarial example defense method based on two-stage adversarial knowledge migration. The method comprises the steps: firstly migrating adversarial knowledge from data to a large-scale complex DNN (deep neural network) through heterogeneous multi-source adversarial training, and completing the first-stage adversarial knowledge migration; then, a soft label of an adversarial sample is adopted, an adversarial extraction technology is provided, adversarial knowledge is migrated from a complex DNN toa simple DNN, and adversarial knowledge migration in the second stage is achieved. According to the two-stage adversarial knowledge migration method provided by the invention, the simple neural network on the edge equipment can obtain robustness close to that of a large complex network, and the problem of robustness of the simple network which cannot be solved by pure adversarial training is better solved. The adversarial extraction proposed by the invention has good algorithm convergence, can stably improve the performance and robustness of a simple network model and accelerate convergence, and well solves the problem of instability of the model performance and robustness in integrated adversarial training.
Owner:ZHEJIANG UNIVERSITY OF SCIENCE AND TECHNOLOGY +1

Zero watermark generation method and system and zero watermark extraction method and system

The invention discloses a zero watermark generation method and system and an extraction method and system. The zero watermark generation method comprises the following steps: obtaining a carrier imageand a watermark identification image; Carrying out primary blocking on the carrier image to obtain a plurality of small blocks; Performing curvelet transformation and discrete wavelet transformationon each small block in sequence to obtain a plurality of wavelet transformation images; Performing secondary partitioning on each wavelet transform image to obtain a plurality of sub-blocks; Performing singular value decomposition on the plurality of sub-blocks corresponding to each wavelet transform image to obtain a singular value matrix of each sub-block; Obtaining a binary feature matrix corresponding to the wavelet transform image according to the singular value matrix; Constructing set mapping of watermark identification images; Extracting watermark information of the watermark identification image according to the set mapping; And generating a zero watermark according to the binary feature matrix and the watermark information. The copyright protection of the carrier information canbe realized under the condition that the copyright identifier is not embedded, and the robustness and the stability of the zero watermark can be improved.
Owner:YANSHAN UNIV

Metabolin MS/MS mass spectra computer simulation method

InactiveCN104834832AReduced prior knowledge requirementsAvoiding Design Methods That Are Not OptimalSystems biologySpecial data processing applicationsMemetic algorithmMass spectrometry
The invention discloses a metabolin MS/MS (mass spectra) computer simulation method. According to the method, optimization design is conducted on a fragmentation rule through an efficient Memetic algorithm, and the molecule mass spectra specificity serves as the fitness function value of an optimizing individual, so that the formed simulation method has the theoretically global optimum mass spectra distinguishing ability, and the accuracy of the metabolin identification can bee improved effectively. In the optimizing process, a sparse fitness function value is added to be used for guiding the optimizing individual, and it can be guaranteed that the formed fragmentation operation tree can be provided with the minimum redundancy. Accordingly, in the less molecule operation steps, the identification mass spectra with higher specificity is obtained, and robustness brought by the complex analysis process in an existing algorithm is avoided effectively. Finally, the method is not dependent on the real mass spectra and molecule data input particularly, and the formed simulation mass spectra data have the generality and can be used for establishing a general metabolin identification data base.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL +4
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products