Tooth shape code identification method and device and terminal equipment

An identification method and code name technology, applied in the field of numerical control, can solve the problems of high labor cost, consumption, and low key duplication efficiency, and achieve the effect of reducing labor cost and improving duplication efficiency

Active Publication Date: 2019-11-19
无锡凯扬电子科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a tooth shape code identification method, device, terminal equipment and computer-readable storage medium to solve the problem of the large labor cost required to obtain the tooth shape code in the prior art and the key duplication efficiency. lower question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tooth shape code identification method and device and terminal equipment
  • Tooth shape code identification method and device and terminal equipment
  • Tooth shape code identification method and device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It shows a schematic flow chart of the first tooth shape code identification method provided by the embodiment of the present application, and is described in detail as follows:

[0038] Step S101, acquiring the image profile of the key to be copied.

[0039] Specifically, the step S101 includes: performing a binarization operation on the image of the key to be copied, and the binarization operation includes: setting the gray value of the pixel point of the image of the key to be copied to 0 or 255, using the preset Let the contour detection function obtain the image contour of the key to be copied after the binarization operation.

[0040] Step S102, determine the tooth height of the key to be copied according to the standard distance between the model key tooth and the specified line segment, which is perpendicular to the center line of the key model and passes through the vertex of the key model, and the image outline The line segment, the key model includ...

Embodiment 2

[0054] image 3 It shows a schematic flow chart of the second tooth shape code identification method provided by the embodiment of the present application. Step S303 of this embodiment is the same as step S103 of Embodiment 1, and will not be repeated here:

[0055] Step S301, acquiring the image of the key to be copied.

[0056] Specifically, the data collected by the image collection sensor is obtained, and the image of the key to be copied is obtained according to the data collected by the image collection sensor.

[0057] Step S302, adjusting the relative position between the preset coordinate system and the image of the key to be copied, so that the adjusted relative position between the preset coordinate system and the image of the key to be copied meets the preset position requirements.

[0058] Specifically, adjust the position of the preset coordinate system or / and the position of the image of the key to be copied, so that the adjusted relative position of the preset...

Embodiment 3

[0097] Corresponding to Embodiment 1 and Embodiment 2 above, Figure 9 It shows a schematic structural diagram of a tooth shape code recognition device provided by the embodiment of the present application. For the convenience of description, only the parts related to the embodiment of the present application are shown.

[0098] The tooth shape code identification device includes: a contour acquisition unit 901 , a tooth height determination unit 902 and a tooth shape code determination unit 903 .

[0099] The outline acquisition unit 901 is configured to acquire the image outline of the key to be copied.

[0100] The outline acquisition unit 901 is specifically configured to: perform a binarization operation on the image of the key to be copied, the binarization operation includes: setting the gray value of the pixel point of the image of the key to be copied to 0 or 255, using The preset contour detection function obtains the image contour of the key to be copied after the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of numerical control, and provides a tooth shape code identification method and device, terminal equipment and a computer readable storage medium. The tooth shape code identification method includes the steps that an image contour of a key to be copied is obtained; the tooth height of the key to be copied is determined according to the standard distancebetween model key teeth and a designated line segment and the image contour, the designated line segment is a line segment which is perpendicular to the center line of a key model and passes throughthe most apex of the key model, and the key model includes at least one model key tooth; and according to the tooth height of the key to be copied and the correspondence between the standard tooth height and a tooth shape code, the tooth shape code corresponding to the tooth height of the key to be copied is determined. Through the tooth shape code identification method, the labor cost can be reduced, and the key copying efficiency can be improved.

Description

technical field [0001] The invention belongs to the technical field of numerical control, and in particular relates to a tooth shape code identification method, device, terminal equipment and computer-readable storage medium. Background technique [0002] Key is a kind of unlocking tool commonly used in people's life, in order to facilitate people's use, often needs to copy key. [0003] In the process of duplicating the key, obtaining the tooth shape code by the CNC key machine is a key step. Before the CNC key machine obtains the tooth shape code, it is usually necessary to manually install the probe on the CNC key machine and calibrate the probe. The CNC key machine uses The probe detects the tooth height and other data of the key to be copied, and then obtains the tooth shape code. However, since the probes need to be manually installed on the numerically controlled key machine and calibrated, the probes often need to be maintained, which increases labor costs and reduc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): B23Q3/06G06K9/46
CPCB23Q3/06G06V10/44
Inventor 严武徐海洋
Owner 无锡凯扬电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products