Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

59results about How to "Strong identification ability" patented technology

Communication message security interaction method and device of distribution automation system

The invention provides a communication message security interaction method and a device of a distribution automation system. After completing two-way identity authentication between a distribution master station and a distribution terminal, a main distribution station obtains distribution terminal information from the distribution terminal. The main distribution station judges whether that distribution terminal is the first identity authentication according to the version number of the symmetrical key of the distribution terminal, if not, the message exchange between the distribution terminaland the main distribution station is carried out; otherwise, after the symmetric key of the distribution terminal is updated, message exchange between the distribution terminal and the distribution master station is performed. The scheme makes up for the shortcomings that the distribution master station can not identify the distribution terminal in the distribution automation system security protection system, and the confidentiality and integrity of the communication message can not be guaranteed, and improves the security protection level of the vertical communication between the distribution master station and the distribution terminal in the distribution automation system. At that same time, the problem that the remote control / parameter set message has the hidden trouble of the replayattack and the like are sol.
Owner:CHINA ELECTRIC POWER RES INST +1

Image pedestrian re-identification method and system based on multi-attention joint learning

The invention discloses an image pedestrian re-identification method and system based on multi-attention joint learning, and belongs to the technical field of image processing. Soft attention and high-order attention are introduced into a ResNet50 feature extraction network; by utilizing the complementary effect of two different types of attention on feature extraction, the learning ability of thefeature extraction network on pedestrian features is improved, so that the feature extraction network pays attention to more discriminative features in pedestrian images. In order to obtain more accurate attention features, a multistage attention loss function is provided, the loss function is utilized to guide training and learning of the feature extraction network, and the learning ability of the feature extraction network for pedestrian features is further improved. When pedestrian global features are learned, intermediate features in the feature extraction network are fused, learning of pedestrian local features is enhanced, the ability of the network to learn subtle differences between pedestrian features is improved, and the performance of the network in image pedestrian re-identification is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Two-dimensional code compiling method

The invention discloses a two-dimensional code compiling method. The two-dimensional code compiling method comprises the following steps of: on the basis of a self-adaptive code compiling extended black and white code compiling technology and a code compiling scheme applicable to different multimedia, introducing an interweaving technology into an error-correcting code compiling technology by using a data compression technology with an open structure during compression code compiling; and adopting an advanced morphologic image pre-processing technology based on multi-scale structural analysis. The two-dimensional code compiling method has the advantages that a two-dimensional code is superior to the conventional two-dimensional code standard in terms of information bearing capacity, robustness, safety, reliability and adaptability; and coding and decoding bottom-layer supporting software provides technical support for various types of application of the two-dimensional code to the field of the internet of things in an open interface mode, the market monopoly position of the conventional foreign two-dimensional code standard can be broken, the chaotic situation of the conventional domestic two-dimensional code application is changed, and a firm foundation is laid for the development of the internet-of-things industry.
Owner:江苏圆坤二维码研究院有限公司

SCR denitration system bad data identification method based on Elman neural network

The invention provides a method for predicting, estimating and identifying bad data of a denitration system based on an Elman neural network. The method mainly comprises the following steps: acquiringoriginal data, constructing an Elman neural network, learning the neural network, screening, marking bad samples, removing the bad samples, then reconstructing and training the Elman neural network,and finally inspecting and correcting the bad samples by using the trained neural network. According to the invention, the bad data of the denitration system is predicted, estimated and identified based on the Elman neural network; the influence of bad samples on the network prediction precision is reduced by constructing and training the Elman neural network for many times; the subjectivity of manual selection is avoided by randomly testing an original sample; by optimizing sample construction and training the Elman neural network, the identified bad samples are inspected and corrected, misjudgment of the bad samples is avoided, and the method has the advantages of being suitable for large fluctuation and time-varying characteristics of denitration system data parameters, high in identification precision and accuracy and capable of being widely applied to identification of bad data in the field of flue gas denitration.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Device and method for detecting inside of small-diameter high-pressure water filling pipeline

The invention relates to a device and method for detecting the inside of a small-diameter high-pressure water filling pipeline. The device comprises an aircraft, a cable and a controller; a bow part of the aircraft is of a hemispherical expansion structure, a middle part of the aircraft is of a pressure-resistant cabin, and a tail part of the aircraft is of an ellipsoidal structure; a vertical propeller, horizontal propellers, cameras, lighting lamps, a main control panel and a cable connector are arranged in the aircraft; a signal output end of each camera is correspondingly connected with asignal input end of the main control panel; a signal output end of the main control panel is respectively connected with control signal input ends of the vertical propeller, the horizontal propellers,the cameras and the lighting lamps; the signal input end and the signal output end of the main control panel are connected with the cable connector; and the two ends of the cable are respectively connected with the cable connector and the controller. The method comprises the steps of initializing, acquiring real-time images, carrying out fault diagnosis and image capture, processing the images, carrying out feature extraction, deciding fault categories, storing and displaying results. The device and method for detecting the inside of the small-diameter high-pressure water filling pipeline have the advantages of compact structure, flexible motion, easy control and high identification.
Owner:湖北迈得科技有限公司

Pedestrian re-identification method based on kernelization features and random subspace integration

ActiveCN107122795AImprove performanceOptimizing the process of distance calculationCharacter and pattern recognitionTest sampleCharacteristic space
The invention relates to a pedestrian re-identification method based on kernelization features and random subspace integration. The method comprises the following steps that: S1, the training sample set and test sample set of pedestrian images are obtained, and the kernelization function between of the two sample sets is determined; S2, the original features of the two sample sets are transformed into kernelization features; S3, a plurality of subspaces are randomly selected from the kernelization feature space of the training sample set, the covariance matrixes and the inverse matrixes thereof of the kernelization feature difference values of different pedestrian image pairs and identical pedestrian image pairs are calculated, the distribution function of the kernelization feature difference values of the image pairs is obtained; S4, the probability of a sample pair being the same pedestrian and the probability of a sample pair being different pedestrians under each subspace are calculated, the ratio of the two probabilities is adopted as the distance between the samples; and S5, the distances are integrated, so that final distances between each sample pair are obtained. Compared with the prior art, the method of the invention has the advantages of excellent pedestrian re-identification ability, suitability for a variety of different features and high robustness.
Owner:TONGJI UNIV

Quantum encryption information transmission system

The invention relates to a quantum encryption information transmission system, and the system comprises a first authentication module which is used for a communication server to send request information and authenticate the identity of a CA server; a second authentication module which is used for sending request information and identity authentication of the base station by the communication server; a remote interaction module which is used for generating a digital certificate application file of the CA server before the CA server is in a working state, importing a formal digital certificate stored in the database server into the CA server and executing remote transmission of quantum encryption information; and an updating module which is used for updating the symmetric key of the CA server before the CA server stops information transmission, and importing the test digital certificate stored in the communication server into the CA server. According to the scheme, the management process of the terminal digital certificate and the symmetric key is improved, the security protection loophole of the CA server in the quantum encryption information transmission process is made up, and therefore the security protection level of CA server field application and transmission is improved.
Owner:深圳天通信息科技有限公司

Method for detecting and identifying volatile substances in Maotai-flavor base liquor

The invention discloses a method for detecting and identifying volatile substances in Maotai-flavor base liquor. The method comprises the following steps: determining volatile flavor substances; detecting volatile substances of the Maotai-flavor base liquor; constructing a Maotai-flavor base liquor identification model; verifying the Maotai-flavor base liquor identification model; and determining different substances of the Maotai-flavor base liquor. The invention provides a method for rapidly identifying Maotai-flavor type breakstone base liquor and broken sand base liquor by combining a gas chromatographic method with chemometrics analysis, and key difference substances causing difference are screened from the Maotai-flavor type breakstone base liquor and the broken sand base liquor. According to the method, the identification model of the Maotai-flavor Baijiu and the broken Baijiu is constructed for the first time, the identification ability is good, the subjectivity problem of sensory evaluation identification is solved, the identification model and sensory analysis can be combined to be used for identification of Maotai-flavor Baijiu of different processes, the identification method is more efficient and accurate, and the credibility of the identification result is improved.
Owner:GUIZHOU UNIV

Method for whole monitoring of radix bupleuri oral liquid quality

The invention relates to a method for whole monitoring of radix bupleuri oral liquid quality. The method comprises the steps of firstly, constructing a fingerprint spectrum of a radix bupleuri medicinal material, intermediate extract and a finished radix bupleuri oral liquid product; secondly, detecting the fingerprint spectrum of the radix bupleuri medicinal material, the intermediate extract and the finished radix bupleuri oral liquid product; and thirdly, comparing the fingerprint spectrum of the radix bupleuri medicinal material, the intermediate extract and the finished radix bupleuri oral liquid product to a standard fingerprint spectrum; producing by taking the radix bupleuri medicinal material with integral similarity consistent with requirement as a raw material, turning to a next process when integral similarity of the fingerprint spectrum of the intermediate extract and the standard fingerprint spectrum is consistent with requirement, and delivering the finished radix bupleuri oral liquid product where integral similarity of the fingerprint spectrum therein and the standard fingerprint spectrum is consistent with requirement out of factory. The method can monitor quality from the medicinal material to the intermediate extract and to the finished product, so that the production process is easier to control, and more scientific and reasonable to regulate; and quality of the finished product is stable and consistent.
Owner:LUOYANG SHUNSHI PHARMA

A method and system for image person re-identification based on multi-attention joint learning

The invention discloses an image pedestrian re-identification method and system based on multi-attention joint learning, belonging to the technical field of image processing. The present invention introduces Soft attention and high-order attention into the ResNet50 feature extraction network, uses the complementary effects of two different types of attention on feature extraction, improves the feature extraction network's ability to learn pedestrian features, and makes the feature extraction network Focus on more discriminative features in pedestrian images. In order to obtain more accurate attention features, a multi-level attention loss function is proposed. This loss function is used to guide the training and learning of the feature extraction network, and further improve the learning ability of the feature extraction network for pedestrian features. While learning the global features of pedestrians, the intermediate features in the feature extraction network are fused and the learning of local features of pedestrians is strengthened, which improves the ability of the network to learn the subtle differences between pedestrian features, and improves the performance of the network in image pedestrian re-identification.
Owner:HUAZHONG UNIV OF SCI & TECH

Communication message security interaction method and device for distribution automation system

The invention provides a communication message security interaction method and a device of a distribution automation system. After completing two-way identity authentication between a distribution master station and a distribution terminal, a main distribution station obtains distribution terminal information from the distribution terminal. The main distribution station judges whether that distribution terminal is the first identity authentication according to the version number of the symmetrical key of the distribution terminal, if not, the message exchange between the distribution terminaland the main distribution station is carried out; otherwise, after the symmetric key of the distribution terminal is updated, message exchange between the distribution terminal and the distribution master station is performed. The scheme makes up for the shortcomings that the distribution master station can not identify the distribution terminal in the distribution automation system security protection system, and the confidentiality and integrity of the communication message can not be guaranteed, and improves the security protection level of the vertical communication between the distribution master station and the distribution terminal in the distribution automation system. At that same time, the problem that the remote control / parameter set message has the hidden trouble of the replayattack and the like are sol.
Owner:CHINA ELECTRIC POWER RES INST +1

Service request processing method, Web server, equipment and medium

The invention provides a service request processing method, a Web server, a device and a medium, the server comprises a security software firewall and a network application server, the security software firewall comprises a reverse proxy module, and the reverse proxy module is used for exposing a proxy address and a proxy port of the reverse proxy module to the Internet. The security software firewall obtains a service request and sends the service request to a network application server according to a preset routing information table, and the security software firewall further comprises a dynamic identity recognition module which generates a message secret key during first identity authentication, performs identity authentication of a demand side by using the secret key in subsequent message interaction with the service demand side, and sends the service request to the network application server. According to the method, no entity server is added, the security software firewall is implanted into the existing server to form a three-level network system architecture of the application server, the firewall and the service demand side, so that the security operation of the website server is further protected, the attack risk of the website server is reduced, the identity authentication capability of a communication object is improved, and the security and reliability of the application server are jointly guaranteed.
Owner:CHONGQING CHUANYI AUTOMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products