Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

72results about How to "To achieve effective identification" patented technology

Crack seismic attribute judging system and crack seismic attribute judging method

ActiveCN106610508AIntelligently distinguish the advantages and disadvantages of seismic attributesQuick and effective identificationSeismic signal processingSeismology for water-loggingAnalysis dataLogging
The application provides a crack seismic attribute judging system and a crack seismic attribute judging method. The method comprises the following steps: identifying and calculating out crack information of single-well crack density according to acquired imaging logging data and core analysis data, and generating a single-well crack model; extracting seismic attribute data of a specified type from acquired seismic data, and selecting an optimal seismic attribute of which the correlation with the reservoir meets a preset requirement; building a training model by taking the single-well crack model as an input signal and the optimal seismic attribute as an output signal; using an artificial intelligence nonlinear neural network to train the training model; and when the optimal seismic attribute in the training model meets a set screening condition, outputting the optimal seismic attribute meeting the set screening condition. According to the embodiments of the application, the advantages and disadvantages of numerous seismic attributes can be identified intelligently, quickly and accurately, well detection cracks can be identified effectively based on seismic attributes, and the effect and efficiency of actual operation are improved greatly.
Owner:PETROCHINA CO LTD

Vehicle identification code detection method and device and computer device

The invention relates to a vehicle identification code detection method and device, and a computer device. The method comprises the steps of obtaining a to-be-detected image of a vehicle identification code and a reference character string of the vehicle identification code; detecting whether a vehicle identification code area image exists in the to-be-detected image or not through a target detection model, and if yes, extracting the vehicle identification code area image from the to-be-detected image; performing identification segmentation on the vehicle identification code area image througha character instance segmentation model, and generating a character string corresponding to the vehicle identification code area image according to an identification segmentation result of the vehicle identification code area image; comparing a character string corresponding to the vehicle identification code area image with a reference character string of the vehicle identification code; according to the comparison result, recording the first detection result of the vehicle identification code. The technical problem that the vehicle identification code cannot be accurately detected in the prior art is solved, and the accuracy of vehicle identification code detection is improved.
Owner:上海眼控科技股份有限公司

Recognition method and device for micro-scale damage point in damage threshold measurement

The invention relates to a recognition method and device for a micro-scale damage point in damage threshold measurement. The recognition method comprises the following steps of: photographing a tested sample by an on-line microscope before radiation of a pumping laser to obtain a picture a by using dark field illumination; processing the picture a by a computer, and recognizing all defect points of which the gray levels are higher than thresholds T high and T low in the picture a to obtain deflect point data D0 high and D0 low respectively; photographing the tested sample after radiation by the on-line microscope to obtain a picture b, and recognizing all defect points of which the gray levels are higher than the T high in the picture b by the computer to obtain defect point data D1 high; comparing each defect point in the D1 high with all defect points in D0 high and D0 low one by one; and recognizing whether the sample is damaged according to the comparison result and a judgment rule by the computer,. The recognition device comprises the pumping laser, an electric translation table, a lighting source, the on-line microscope and the computer. Compared with the prior art, the recognition method and the recognition device have the advantages of capability of effectively recognizing the micro-scale damage points, high recognition accuracy and the like.
Owner:TONGJI UNIV

Landslide identification method and system based on attention mechanism and multi-modal representation learning

PendingCN114170533ASolve the problem of missing multimodal high-level semantic featuresImproving the Accuracy of Landslide IdentificationCharacter and pattern recognitionNeural architecturesEngineeringNetwork model
The invention discloses a landslide identification method and system based on an attention mechanism and multi-modal representation learning. The method comprises the following steps: dividing a positive sample containing a landslide and a negative sample containing a non-landslide into a training set, a verification set and a test set; carrying out data enhancement on the training set, adjusting the image sizes of the verification set, the test set and the training set after data enhancement, and normalizing the pixel value of each channel of the image; constructing a multi-channel convolutional neural network based on an attention mechanism and multi-modal representation learning; using a cross entropy loss function to train the multi-channel convolutional neural network based on the attention mechanism and the multi-modal representation learning; using the normalized training set to train the trained attention mechanism and the multi-modal representation learning multi-path convolutional neural network, using the normalized verification set to verify, and storing the network model with the best performance on the verification set; and testing on the stored network model by using the normalized test set to obtain a landslide identification result, thereby reducing the consumption of computing resources.
Owner:XIDIAN UNIV

Interference alarm recognition method based on alarm duration feature

The invention belongs to the field of process industry production process monitoring, in particular to an interference alarm recognition method based on an alarm duration feature. The method comprisesthe following steps that: step S1, an acquired monitoring process signal is compared with an alarm threshold value thereof to generate an alarm signal; step S2, an alarm duration set is defined; stepS3, if C<k> is not satisfied C<k> > RC, there is no interference alarm, and an algorithm is ended; if C<k> > RC, a sample probability distribution and an estimated geometric distribution of the alarm duration set are calculated; and step S4, degree of fitting R<2> between the sample probability distribution and the estimated geometric distribution is calculated; if the degree of fitting R<2> >= 0.95, alarms corresponding to elements in the alarm duration set are all interference alarms, and the entire algorithm is ended; if the degree of fitting R<2> < 0.95, a new alarm duration set is formed after a largest element in the alarm duration set is removed; and the method is skipped to step S3 to continue the calculation. The interference alarm recognition method based on the alarm duration feature provided by the invention provides an effective technical means for eliminating the interference alarm and realizing performance optimization of an alarm system.
Owner:SHANDONG UNIV OF SCI & TECH

Multi-core processor directory cache replacement method

The invention discloses a multi-core processor directory cache replacement method, and belongs to the technical field of computer storage. The multi-core processor directory cache replacement method comprises the following concrete steps that a multi-core processor adopts a two-stage caching structure, each processor core is combined into an L1 Cache, and all processor cores share an L2 Cache; the data consistency is maintained between the L1 Caches through a directory cache, and the number of no-message replacement times generated by a certain buffer group of the L1 Cache corresponding to each processor core is determined according to interactive messages of the directory cache and the L1 Caches; no-message replacement counting vector group of each L1 Cache group is additionally added for the directory cache, and the number of no-message replacement times generated by each L1 Cache in the cache group is stored, so that cache blocks to be replaced are determined. The multi-core processor directory cache replacement method has the advantages that invalid terms in the directory cache are effectively recognized, limited replacement is carried out, the effective capacity of the directory cache is improved, and the integral performance of the multi-core processor is improved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

A point cloud splicing method for flat parts based on invariant features in multi-dimensional space

The invention discloses a method for splicing point cloud of flat plate type parts based on multidimensional space invariant features. The nearest neighbor iterative algorithm is used to compute the rotation matrix of point cloud and multiple sampling radii. According to different sampling radii, the covariance matrices of each point at different scales are computed by using the features of pointcloud texture and point cloud density, and the covariance descriptors are constructed. A multiscale flow distance between two covariance descriptors is defined; The matching point pairs in the two point clouds are determined according to the distance of the flow pattern and the rough registration is performed to obtain the translation matrix. Then the nearest neighbor iterative algorithm is used to obtain the rotation matrix. The final transformation matrix is obtained and the splicing is completed. By defining covariance descriptors for each point in the point cloud, the invention realizes automatic splicing of the point cloud of a flat plate type part by utilizing density features and texture features with space invariant characteristics at a certain point, and is suitable for splicing of the point cloud of a plate type part with hole features.
Owner:ZHEJIANG UNIV

Shared riding system and method for unmanned vehicles

The invention provides a shared riding system and method for unmanned vehicles, and belongs to the technical field of unmanned driving. The shared riding system comprises a user APP, a vehicle operation background and a vehicle controller, and the user APP is used for sending riding request information to the vehicle operation background, receiving station arrival reminding information of an unmanned vehicle and paying for the unmanned vehicle after a passenger gets on the vehicle; the vehicle operation background is used for receiving the riding request information sent by the user APP, determining a corresponding unmanned vehicle according to the received riding request information, and sending reminding information of arrival of the unmanned vehicle to the user APP when the corresponding unmanned vehicle arrives at the riding station; and the vehicle controller is used for counting the number of passengers getting on the bus at the riding station and the number of paid passengers, and when the two numbers are inconsistent, the vehicle controller controls the vehicle not to be started. According to the invention, the problem that the existing unmanned shared vehicle cannot identify that passengers get on the vehicle without payment is solved.
Owner:ZHENGZHOU YUTONG BUS CO LTD

Incoming traffic flow-considered trunk motorcade judgment method

The invention discloses an incoming traffic flow-considered trunk motorcade judgment method. In order to overcome the defect that the influence of the traffic flow of a branch on the discrete characteristics of the traffic flow of a trunk is not taken into consideration for an existing motorcade judgment model in the prior art, the invention provides the above method. The incoming traffic flow-considered trunk motorcade judgment method comprises the following steps of 1, determining a critical head time interval; 2, calculating the relation among the traffic flow of the branch, the length of atrunk road section and the critical head time interval; 3, calculating the relation among the traffic flow of the branch, the position of the branch and the critical head time interval; 4 calculatingthe relation among the traffic flow of the branch, the traffic flow of the trunk and the critical head time interval; 5, establishing a motorcade judgment index model: 1) calculating the relation between the critical head time interval and each influence factor; 2) determining a motorcade judgment model: (img file = 'DDA 0001425314000011.TIF 'wi = '1166 'he = '135 ') in the formula, HK is the critical head distance with the unit thereof to be s; q0 is the traffic flow of the trunk with the unit thereof to be veh/h; q1 is the traffic flow of the branch with the unit thereof to be veh/h; a, b,c, d and e are undetermined parameters and are obtained through the prameter calibration according to actual data; 6) determining a motorcade.
Owner:JILIN UNIV

Secure bank card comprehensive prevention and control system on basis of big data application technology

The invention relates to a secure bank card comprehensive prevention and control system on the basis of a big data application technology. The system comprises an ATM, a bank counter depositing and withdrawing system, a cloud risk prevention and control database for integrating big data information, an intelligent image recognition system for integrating image recognition functions and a card reading system which contains bank card physical characteristic scanning and recognition. Latest data of multiple organizations are integrated by the risk prevention and control database and comprises data of head portrait, fingerprints and irises and bank card physical characteristic data reserved by a bank; by means of the system, through a comprehensive detection means, a rule-breaking operator ora cloned bank card can be eliminated, and the suspect is locked in an operating chamber, so that the suspect operational process saving and evidence solidification are synchronously conducted. According to the system, through software and hardware upgrading and function extension, recognition of the cloned bank card and the card holder is achieved, and operation of withdrawing and transferring ofthe suspect is prevented in time, so that property loss of a large cheated population is avoided, the measure efficiency is extremely high, and criminal activities of bank card fraud and money laundering are effectively struck and frightened.
Owner:贵州千寻科技有限责任公司

License authentication method and device, electronic equipment and storage medium

The embodiment of the invention provides a license authentication method and device, electronic equipment and a storage medium, and the method comprises the steps: obtaining an authentication instruction input by an authentication user, wherein the authentication instruction comprises a copy license, an identifier of an original license and an authentication type, and the authentication type comprises content authentication and file authentication; Determining an original certificate and an authentication type according to the authentication instruction; When the authentication type is contentauthentication, determining first authentication information in a copy certificate corresponding to the content authentication; When it is judged that the authentication user is allowed to check theoriginal certificate corresponding to the identifier of the original certificate, determining first authentication information of the original certificate corresponding to the content authentication in the regional block chain network by utilizing a preset smart contract; Comparing whether the first authentication information in the copy certificate is consistent with the first authentication information in the original certificate or not; And if yes, determining that the copy certificate and the original certificate are certificates with the same content. According to the invention, the certificate is authenticated according to the authentication instruction of the authentication user.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Power service message attack identification method and system based on service logic

The invention discloses a power service message attack identification method and system based on service logic. The method comprises the following steps: determining a current state sequence of a power service; respectively determining a dangerous state sequence set and a safe state sequence set corresponding to the current state sequence according to the multi-point signal address sequence of thecurrent state sequence; determining the threat degree of the current state sequence according to the current state sequence, the dangerous state sequence set and the safe state sequence set; and whenthe threat degree of the current state sequence is greater than or equal to a preset security risk threshold, determining that the power grid is attacked by the power service message. According to the invention, a dangerous state sequence set and a safe state sequence set of power business logic are defined; according to the method, misuse detection and anomaly detection methods are combined, thethreat degree of the power service is evaluated, and whether the power grid is attacked by the power service message is determined according to the threat degree, so that the power service message attack is effectively identified, and the safe and reliable operation of a power industrial control system is guaranteed.
Owner:CHINA ELECTRIC POWER RES INST +3

Electronic medical record medication structural processing system based on multiple models

ActiveCN112309519AReliable data baseEnsure that the model achieves effective identificationDrug and medicationsNatural language data processingMedical recordNerve network
The present invention relates to an electronic medical record medication structural processing system based on multiple models. The system comprises: a plurality of medical record input devices, wherein each medical record input device is used for inputting each piece of electronic medical record information of a medical group/doctor corresponding to the medical record input device, and each pieceof electronic medical record information comprises a course paragraph; and a cloud service network element set which is used for selecting a corresponding deep neural network model according to the received source medical group/doctor of each piece of electronic medical record information so as to execute deep neural network identification processing on the disease course paragraph and obtain a patient medication structured file taking a medication name as a main index word. The electronic medical record medication structural processing system based on multiple models is intelligent in operation and timely in response. On the basis that a computer adopts a deep neural network model to read electronic medical record data mainly including texts, medical record writing habits of different medical groups/different doctors in the same medical institution are recognized, and effective structured medical basic data are provided for a scientific research data platform of the medical institution.
Owner:ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products