Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

409results about How to "Taking into account efficiency" patented technology

Resonant compensation topology variable magnetic coupling resonant wireless electric energy transmission device and method

The invention discloses a resonant compensation topology variable magnetic coupling resonant wireless electric energy transmission device and method. The transmission device comprises a rectification module, an emitting end voltage stabilization module, a high-frequency inversion module, an emitting end coupling resonant coil, a receiving end coupling resonant coil, a receiving end resonant circuit capacitor, a receiving end rectification module, a receiving end voltage stabilization module, a variable resonant compensation circuit module and a detection control module, wherein the input end of the variable resonant compensation circuit module is connected with the output end of the high-frequency inversion module; the output end of the variable resonant compensation circuit module is connected with the emitting end coupling resonant coil; the detection control module is used for detecting charging parameter and input parameter information, and driving the on-off of an MOS (metal oxide semiconductor) tube and the on-off of a controllable switch. At a constant current charging stage, the series / series resonant compensation topology is used; at a constant voltage charging stage, the LCC / series resonant compensation topology is used; on the premise of not changing an electric automobile side receiving end device, the unique requirements of electric automobile charging are effectively met; the efficiency and power optimization of a wireless electric energy transmission system is considered.
Owner:SHANDONG UNIV

Infrared and visible light image fusion method based on salient objects

ActiveCN104700381AGuarantee the quality of fusionData volume reductionImage enhancementSalient objectsComputational model
The invention provides an infrared and visible light image fusion method based on salient objects. The infrared and visible light image fusion method based on the salient objects includes following steps: building nonlinear scale space representation for an infrared image and a visible light image which respectively comprise a plurality of objects in a given scene; using a visual attention computational model to compute visual attention salient maps of the infrared image and the visible light image based on the nonlinear scale space representation of the images; using a return inhibition mechanism to select salient object areas from the infrared image and the visible light image based on the visual attention salient maps of the infrared image and the visible light image, and computing all salient object areas in the whole scene; performing rectification operation on the infrared image and the visible light image, using a pixel level fusion algorithm to perform fusion treatment on the salient object areas, and using a feature level fusion algorithm to perform fusion treatment on non-salient object areas; generating a fusion image of the infrared image and the visible light image of the whole scene by synthesizing results.
Owner:THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP

Coat and cap characteristics and attitude detection-based traffic police detection method and system

The invention relates to a coat and cap characteristics and attitude detection-based traffic police detection method and system. The system comprises an offline training construct classifier, an online real-time detection traffic police and an attitude thereof, wherein an offline part extracts a pedestrian hog characteristic, a cap hog characteristic, a fluorescent clothes hog characteristic, a construct pedestrian classifier, a cap classifier and a fluorescent clothes classifier through a lot of collected sample images respectively; and an online part collects an original image in real time and judges whether a pedestrian, namely the traffic police who wears the cap and fluorescent clothes at the same exists in the original image or not by the pedestrian classifier, the cap classifier, the fluorescent clothes classifier and various combinations, then judges the attitude of the traffic police, and prompts a driver to help the driver correctly understand the attitude of the traffic police. The detection method is broadly divided into two processes of accurate matching and fuzzy matching; the two processes can be corroborated by each other; the traffic police and the attitude thereof can be accurately and quickly detected; and the coat and cap characteristics and attitude detection-based traffic police detection method and system have important guiding significance in active driving.
Owner:DALIAN ROILAND SCI & TECH CO LTD

Electronic official document safety transmission method based on Web service

InactiveCN101321057AEnsure safety featuresSolve security issues such as confidentialityPublic key for secure communicationUser identity/authority verificationWeb serviceSOAP
An electronic document secure transmission method based on the Web service is disclosed, comprising: encrypting by the client-end and reading the electronic document information and the related cipher key by the Javascript, performing the encryption by the Java-Applet program; finally constructing the SOAP information, transmitting to the receiver; decrypting the by the client-end, receiving the SOAP information by the Javascript and extracting the electronic document information and the encrypted information, then performing the decrypting process by the Java-Applet program, exhibiting to the user through the HTML form. The encryption of the server end is the same to that of the client-end, with the difference in that, the JAVA program is used in the encrypting process on the electronic document information, rather than the Java-Applet program; the server directly uses the Java program on the server to search the private cipher key information, rather than on the USBKey, and in the decrypting process, the server end uses the Java program to perform the decrypting process rather than the Java-Applet program. According to the invention, the transmission safety between the end to end transmission and the multipoint is ensured.
Owner:BEIHANG UNIV

Peripheral target geographic information acquiring and searching method for position service

The invention relates to the Internet information processing field and particularly relates to a peripheral target geographic information acquiring and searching method for position service. The location position of a user is positioned through a client, the enterprise information within a set user positioning surrounding scope is returned to the user. According to the method, data analysis, integration and display is carried out for enterprises, based on that the full basic enterprise information is established and the latitude/longitude data is stored, the enterprise information near the user is returned to the user through combining a field search function of a positioning and index system of the user, a problem of insufficient enterprise searching existing in position service in the prior art is solved, and technical support is provided for related business application and analysis, moreover, when peripheral enterprise searching is carried out, to-be-displayed enterprises are searched in a largest longitude/latitude deviation scope acquired through preselected distance conversion, actual distances between the enterprises and the user are calculated on the basis of the searched enterprises, the enterprises within a search radius is remained, efficiency and accuracy requirements are satisfied in a pre-screening mode.
Owner:成都数联铭品科技有限公司

Full-automatic material piling operation method

The invention discloses a full-automatic material piling operation method. The method comprises the steps that a material piling machine firstly executes material piling operation on the first line in a block, a path from front to back is adopted to pile materials from a first material piling point on the head portion, and when the height of a material pile reaches a set height H, the material piling machine backs up to a second material piling point to repeat the material piling process, till last material piling point operation on the line is finished; the material piling machine moves to the next line to repeat the material piling process, if the line is an odd number line, the path from front to back is adopted to pile the materials, if the line is an even number line, a path from back to front is adopted to pile the materials, till material piling operation on all the N lines of the block is finished; and after operation of the last material piling point in the current block, the tail end of the material piling machine moves to a first material piling point of a next block along a reverse L-shaped path to repeat the material piling operation process in the block, till material piling of all the blocks is finished. The utilization rate of piling filed space is increased through blocking material piling, and through the designed paths in the blocks and among the blocks, operation safety is guaranteed, and efficiency is combined.
Owner:SHANGHAI ZPMC ELECTRIC +1

Optimization design method for non-API (American petroleum institute) thread sealing face

The invention relates to an optimization design method for a non-API (American petroleum institute) thread sealing face. The method includes: constructing an optimization objective function according to the sealing quantity requirement of a plurality of limited condition loading points; describing the shape of the sealing face of an internal thread and an external thread with non-uniform B-spline curves; using control vertex coordinates of characteristic polygon of the non-uniform B-spline curves as variables of the optimization design; determining constraint conditions of the variables of the optimization design according to diameter parameter range requirements of oil bushing sealing face and upper limit requirements of contact interference of the sealing face; using numerical simulation of finite element to build the objective function of sealing of the sealing face and connection among different shape design variables of the sealing face; constructing test data points used for evaluating response function via numerical simulation; constructing an optimization model; using non-dominated sorting genetic algorithm modifier based on robust design method to implement multi-object optimization; and determining Pareto optimal solution collection. By the method, targeted and precise control of sealing integrity of threaded connectors is achieved.
Owner:BC P INC CHINA NAT PETROLEUM CORP +1

A battery management system and circuit for charging and discharging a battery pack

The embodiment of the invention discloses a battery management system and a circuit for charging and discharging a battery pack. The circuit may include at least one voltage detection module D, a battery management system BMS processor, a current limiting module U3, a current detection module I, and at least one switch S1. The current limiting module U3 is connected in parallel with the switch S1,and is connected in series with the current detecting module I after being connected in parallel; A voltage detection module D, configured to detect a voltage value of the power supply Y1 and the charging battery pack U1; A current detection module I, configured to detect the current value of the loop in which the current detection module I is located; BMS processor, D for control that voltage detection module, Current limiting module U3, The current detection module I and the switch S1 can solve the problem of low charging and discharging efficiency under the condition that the charging of the rechargeable battery does not exceed the current in the related art, realize the improvement of the charging and discharging efficiency of the rechargeable battery under the condition that the charging of the rechargeable battery does not exceed the current, and achieve the beneficial effect that both the safety and the efficiency of the rechargeable battery are taken into account.
Owner:ZTE CORP

Asymmetric split turbine of turbocharger

The invention discloses an asymmetric split turbine of a turbocharger, comprising an engine. The engine is provided with an exhaust tube of the engine, a turbine casing and a turbine rotor, wherein, the turbine casing is provided with a casing high pressure flow channel and a casing low pressure flow channel, the exhaust tube of the engine is provided with a high pressure exhaust manifold and a low pressure exhaust manifold, the high pressure exhaust manifold is connected with the casing high pressure flow channel, the low pressure exhaust manifold is connected with the casing low pressure flow channel, and the A/R value of the casing high pressure flow channel is less than that of the casing low pressure flow channel. By adopting the asymmetric split structure, the two flow channels of the turbine casing have different A/R values and are respectively connected with different exhaust pipelines of the engine, thus effectively lowering the exhaust back pressure of part of engine cylinders and reducing the influence of EGR operation process on the pressurizing unit. The asymmetric split turbine has good succession, simple structure, easy upgrade and switch of products, low cost and easy and fast realization of engineering.
Owner:康跃科技(山东)有限公司

Full-automatic logistical overall delivery service method

The invention provides a full-automatic logistical overall delivery service method. The method comprises the following steps of: obtaining delivery demand information of a plurality of users in an order management database according to car using time, carrying out delivery task distribution according to the delivery demand information of the users so as to generate one or more pieces of receptiontask information, and enabling each logistical car to carry out automatic path planning according to one piece of reception task information, automatic run according to a planned pickup path and arrive at appointed places to receive to-be-delivered expresses before the car using time; generating path planning information according to service addresses of all the loaded expresses, recognizing pickup codes input by recipients and carrying out matching when the car automatically and sequentially arrives at each delivery place according to the delivery path, and after the matching succeeds, generating storage cabinet opening instructions so that the recipients can take away expresses in storage cabinets; and when the fact that all the expressed at the current deliver place is taken away or a preset waiting time expires, automatically running to the next deliver place by the logistical car according to the delivery path.
Owner:BEIJING ZHIXINGZHE TECH CO LTD

Safe screen projection method of cloud mobile phone, mobile terminal and server

The invention relates to the technical field of networks, and relates to a safe screen projection method of a cloud mobile phone, a mobile terminal and a server. The method includes the following steps: generating a public key by using an asymmetric encryption algorithm and sending the public key to the server; receiving feedback from the server, wherein the server firstly uses a symmetric encryption algorithm to generate a unique key, then encrypts the key with the received public key, and then feeds the encrypted key back to the client; decrypting the key by a private key corresponding to the public key, and encrypting verification information by using the key, and sending the verification information to the server for authentication; receiving an authentication result and sending a screen projection request to the server when the authentication result is successful; and using a public network to receive projection content forwarded after being encrypted by the server using the symmetric encryption algorithm and pushed by the cloud mobile phone. The method firstly uses the asymmetric encryption algorithm to realize authentication. After successful authentication, the screen projection is performed and screen projection content transmitted by the private network is not encrypted, while screen projection content transmitted by the public network is encrypted by the symmetric encryption algorithm, so that security is ensured and some links are encrypted with efficiency.
Owner:广州微算互联信息技术有限公司

DoS attack detection method oriented to software defined network

ActiveCN108833376AReal-time accurate detectionAccurately describe the operating statusTransmissionTraffic volumeSoftware-defined networking
The invention relates to the technical field of software defined networks, and especially relates to a DoS attack detection method oriented to a software defined network. The method comprises the following steps: taking Size of a Single Flow SSF, flow Address Growing Speed AGS and ratio of successful matching of flow table RSM as DoS attack detection features of the software defined network, and carrying out feature extraction and calculation on collected historical flow data; performing standardization and normalization processing on the historical flow data after being subjected to the feature extraction and calculation by using a linear function standardized method and a catastrophe progression method; taking the standardized and normalized historical flow data as a training data set, and constructing a DoS attack flow classification model of the software defined network by utilizing a conditional random fields CRF algorithm; and classifying real-time monitoring flow data of the DoSattack of the software defined network by using the generated classification module, and judging whether an abnormality exists. The DoS attack detection method oriented to the software defined network provided by the invention can classify the monitoring flow in real time and judge whether the abnormality exists, thereby performing attack detection.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products