Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

378 results about "Algorithmic efficiency" patented technology

In computer science, algorithmic efficiency is a property of an algorithm which relates to the number of computational resources used by the algorithm. An algorithm must be analyzed to determine its resource usage, and the efficiency of an algorithm can be measured based on usage of different resources. Algorithmic efficiency can be thought of as analogous to engineering productivity for a repeating or continuous process.

Electric fence monitoring method for unmanned aerial vehicle plant protecting operations

InactiveCN106406189AReliable out-of-bounds determinationEfficient cross-border judgmentProgramme controlComputer controlInformation processingFlight direction
The invention belongs to the technological field of agricultural plant protecting information processing, and discloses an electric fence monitoring method for unmanned aerial vehicle plant protecting operations. An agricultural plant protecting operation plot has boundaries and to ensure the security and efficiency of a plant protection unmanned aerial vehicle in executing the operations of plant protecting, the plant protection unmanned aerial vehicle should not trespass the boundaries. Therefore, it is necessary to monitor the electric fence for the unmanned aerial vehicle plant protecting operations. The method in doing so comprises the following steps: 1) generating in a dynamic manner a security boundary; 2) establishing a dual link communication system based on an unmanned aerial vehicle radio station and a 4G module; and 3) determining the boundary trespassing and the tendency of trespassing of the unmanned aerial vehicle so as to raise the detection efficiency of the boundary trespassing of the unmanned aerial vehicle. According to the invention, it is possible to make pre-warnings when there is tendency for the unmanned aerial vehicle to trespass the boundary so that the user of the unmanned aerial vehicle is able to change the flight direction instantly and that high efficiency unmanned aerial vehicle boundary trespassing can be detected. Therefore, the computational complexity is reduced greatly and the algorithmic efficiency is increased.
Owner:CHINA AGRI UNIV

Mobile robot path planning method in complex environment

The invention provides a mobile robot path planning method in a complex environment. The method is characterized in that 1. information of environment in which a robot is positioned is acquired, and obstacles in the environmental space are indicated by using rectangular enclosing boxes after processing and displayed on a human-computer interaction module; 2. the initial position of the robot is confirmed and recorded as an initial point; a target position expected to be reached by the robot is confirmed and recorded as a target point; 3. the initial point, the target point and the vertexes of all the obstacle enclosing boxes meeting the condition are connected by using line segments, wherein the requirement indicates that the connecting line of any two points does not penetrate through the enclosing boxes, based on which a visual graph is constructed; 4. the optimal path is planned in the visual graph via an artificial immune algorithm, and key nodes in the optimal path are stored; and 5. The entity robot is controlled to start from the initial point, pass the key nodes in the optimal path one by one and finally reach the target point. Algorithm efficiency and convergence rate can be effectively enhanced under the premise of guaranteeing solution of the optimal path.
Owner:SHENYANG POLYTECHNIC UNIV

Chinese-sensible code recognition device and Chinese-sensible code recognition method under complicated background

The invention belongs to the field of two-dimensional code recognition, relates to applications of image processing and character recognition technology and discloses a Chinese-sensible code recognition device and a Chinese-sensible code recognition method under a complicated background. The method comprises the following steps of: collecting a Chinese-sensible code image with a complicated background; preprocessing the collected image; carrying out secondary positioning on a Chinese-sensible code in the image to obtain the accurate position of the Chinese-sensible code; carrying out slant correction on the Chinese-sensible code obtained by positioning, thus obtaining the corrected Chinese-sensible code; partitioning the Chinese-sensible code by using an edge detection and projection algorithm to obtain a single-line Chinese-sensible code, and then carrying out single-character recognition; decoding to obtain Chinese-sensible code information; and displaying the Chinese-sensible code information on a display screen. According to the method disclosed by the invention, the location accuracy is improved, the efficiency of algorithm is high, the rate is fast, the anti-interference property is strong, the robustness is good, single-character bar codes can be recognized rapidly and effectively, the bar codes can be recognized accurately, and the efficiency of Chinese-sensible code recognition is greatly improved.
Owner:HOHAI UNIV CHANGZHOU

Gradient dot matrix structure design method based on topological optimization

The invention discloses a topological optimization-based gradient lattice structure design method, which comprises the following steps of: 1, establishing a geometric model of an initial structure, and determining a design domain and a non-design domain; 2, setting topological optimization parameters, and determining an optimal force transmission path and relative density distribution informationof the initial structure; 3, extracting relative density information of the finite element unit, a Mizeasts stress value and coordinate information of the finite element unit; 4, selecting a proper cell to fill the structural design domain, and deleting repeated support columns in the lattice structure; 5, establishing a mathematical model of additive manufacturing process constraint; 6, establishing a mapping function relationship among the unit stress value, the relative density value and the lattice cell pillar size, and determining the pillar size; And 7, outputting a final geometric modelof the lattice structure. The distribution reasonability of the structural material can be ensured; The repetition of a topological optimization process is avoided, and the algorithm efficiency is high; The method can be suitable for the lattice design of complex geometric configurations; And a lattice structure with gradient change of the pillar size can be established.
Owner:BEIHANG UNIV

Method for estimating city expressway traffic states based on mobile detection of smartphones

The invention discloses a method for estimating city expressway traffic states based on mobile detection of smartphones, wherein a city expressway cell transmission model is built firstly, a observing network is built by adopting a smartphone to rapidly detect parameters, then a state space model based on a lighthill-whitham-richards (LWR) traffic flow model is designed, a traffic state and a boundary flux are synchronously estimated by utilizing three-step type recursive filters algorithm, then are coalesced with upstream and downstream subsection boundary flux by adopting a weighted average algorithm, and traffic parameter estimation is upgraded, thereby achieving real-time distributed estimation of city expressway network traffic state. The method for estimating the city expressway traffic states based on the mobile detection of the smartphones can collect average speed information of vehicles on any time and space positions of a loop, enables traffic estimation not to be restrained by the position of a detector, can achieve synchronization estimation of traffic density and boundary flux by designing a state-space model and a three-step recursive filter, and achieves the problem of large range expressway network traffic estimation by being coalesced with subsection boundary flux, reduces model order, and improves efficiency of algorithm.
Owner:中国冶金科技成果转化有限公司

Intelligent monitoring and identification method for vehicles exhausting black smoke based on image processing technology

The invention discloses an intelligent monitoring and identification method for vehicles exhausting black smoke based on an image processing technology. The method comprises the following steps: S1, using a video capture card to collect a high-definition real-time video data stream of a traffic checkpoint; adjusting the time of interval sampling according to the degree of pavement change by use of a variable-interval background mean sampling technology, and extracting payment background information by use of a multi-frame image mean algorithm; S3, according to the collected video stream, removing small vehicles and non-motorized vehicles from each frame of image in real time by use of a small vehicle filtering algorithm, so as to reduce the amount of data of image processing and improve the efficiency of the algorithm; S4, positioning tail flue gas of large vehicles in each frame of image; and S5, comparing the data of a positioning area image and the data of a background area image of exhaust gas emission to judge whether the vehicles are vehicles exhausting black smoke. The intelligent monitoring and identification method for vehicles exhausting black smoke disclosed by the invention can improve the detection efficiency. Whether a vehicle exhausts black smoke is judged by use of the computer technology.
Owner:XIANGTAN UNIV

Periodic associated rule discovery algorithm based on time sequence vector diverse sequence method clustering

The utility model relates to a discovering algorithm with clustered cycling associated rule, based on a differing sequence method of time series vector. Firstly, in view of the drawback of the current discovering algorithm with cycling associated rule on the problem of dividing a plurality of time domains, an algorithm called CMDSA is proposed. The algorithm selects a time series vector which comprises a item supporting degree as the data character in time area to cluster; meanwhile, the clustering number is controlled by a DB principle to reach the best clustering result, so that each time area under the cycling associated rule can be identified more accurately and more useful cycling associated rules can be found compared with the current algorithm. Aiming at the fact that all the current algorithm of cycling associated rule are based on the Apriori algorithm and the efficiency is low, an algorithm of CFP-tree based on Fp tree is proposed. The algorithm of CFP-tree adopts cycling tailoring technique based on the condition FP tree to enhance the algorithm efficiency. Thus, the adoption of the discovering algorithm with cycling associated rule of CFP-tree is far better than the prior algorithm based on Apriori in the time and space efficiency.
Owner:杭州龙衍信息工程有限公司

High efficiency accurate license plate identification method

The invention discloses a high efficiency accurate license plate identification method comprising the following steps: carrying out license plate compactification treatment on an input license plate image so as to obtain a compactification license plate image; using a pre-trained all convolution nerve network model to carry out license plate integral identification, thus obtaining prediction results of each pixel point character class in the compactification license plate image, and forming a label score matrix; parsing the label score matrix so as to obtain the final license plate string information. The method needs no character segmentation, thus solving the problems that an existing method is poor in character segmentation robustness; in addition, the method uses the all convolution nerve network model to carry out license plate integral identification, only one identification process is needed, so the algorithm efficiency is high; the complete context information of the license plate can be combined in the identification process, thus greatly improving the identification accuracy and robustness; finally, in label matrix analysis, the method can carry out difference treatments on different license plate and characters, thus further improving the algorithmic robustness and applicability.
Owner:UNIV OF SCI & TECH OF CHINA

Association rule mining method for alarm event

The invention relates to the technical field of network management and discloses an association rule mining method for an alarm event. Based on a branch screening optimization policy and an Apriori algorithm, the method comprises the steps of sequentially reading each event item in a database, and generating a support degree calculation support array corresponding to each event item; on the basis of the Apriori algorithm, executing the branch screening optimization policy, and generating a frequent item set; on the basis of the frequent item set and the support degree calculation support array, calculating the confidence of an association rule to obtain an effective association rule under the restraint of minimum confidence. By constructing the support degree calculation support array, the calculation of a support degree is simplified, the reading frequency of the database is greatly reduced, and the algorithm efficiency is improved; by constructing an adjacent dictionary chain table, a binomial frequent set which meets the requirements on the support degree can be dynamically found, and the execution basis of the branch screening optimization policy is provided; ineffective branches are dynamically deleted, the binomial frequent set is quickly generated, and the algorithm efficiency is improved.
Owner:STATE GRID CORP OF CHINA +3

Improved local anomaly factor algorithm-based power grid topology identification method

The invention provides an improved local anomaly factor algorithm-based topology identification method. The method comprises the steps of firstly, based on the statistical theory, acquiring the operating state change information of a to-be-predicted device object, such as a switch, a disconnecting link or the like; secondly, according to the acquired data, modeling a to-be-identified data object, and respectively establishing an object set for each device object, wherein the object set represents the operating state change condition of the device object within a certain period of time; thirdly, based on the grid reduction theory in the GDLOF algorithm, reducing data objects in the object set to reduce identification objects and improve the efficiency of the algorithm; fourthly, for non-excluded data objects, subjecting each attribute of each object to weighted treatment by adopting a relative entropy in considering different influences of the telemetry and remote signaling information on topology error identification. In this way, the reliability and the execution efficiency of the algorithm are improved, and the identification topology error of a local anomaly factor is finally confirmed. According to the technical scheme of the invention, the density-based anomaly detection algorithm is applied to the topology error identification of the power grid, so that the application field of the anomaly detection algorithm is expanded. Meanwhile, the topology error problem of the power grid and the identification problem of telemetry bad data in the prior art are solved at the same time.
Owner:SHANGHAI MUNICIPAL ELECTRIC POWER CO +3

Data flow abnormality detection method based on parallel Kalman algorithm

The invention discloses a data flow abnormality detection method based on a parallel Kalman algorithm. The data flow abnormality detection method comprises the following steps that 1, measurement data of a sensor in a period of time is acquired; 2, the measurement data is compared with a measurement value in a previous period of time, once a change is generated, an estimation value is calculated through the Kalman algorithm according to the measurement value, an absolute value of a difference between the estimation value and the measurement value is compared with a specified threshold value, and if the absolute value is not smaller than the threshold value, the absolute value is judged to be an abnormal value, and the next step is conducted; 3, the generation reasons of the abnormal value are judged by considering a time influence factor, a space influence factor and other factors such as the flood period, the weather and the human factors which influence abnormality detection and recorded, and information is stored in a database. According to the data flow abnormality detection method, the time influence factor, the space influence factor and the other provenance information influence factor are taken into account; an algorithm task is decomposed and processed in parallel in order to improve the algorithm efficiency, and the detection precision is improved.
Owner:HOHAI UNIV

Multi-defect positioning method based on search algorithm

The invention discloses a multi-defect positioning method based on a search algorithm. The method includes the steps that 1, the search algorithm at a first stage is executed, wherein the following processing that firstly, a population with multi-defect distribution is initialized through a greedy algorithm, then a selection operator, a crossover operator and a mutation operator are executed to generate a new individual, the new individual is re-inserted into the original population, a next-generation population is formed, and when a terminal condition of the search algorithm is met, a second stage is executed is specially included; 2, multi-defect positioning at a second stage is executed, wherein a final defect distribution combined population is obtained, an executable entity rank is obtained according to candidate defect distribution populations, the executable entity sequence is mapped to a real position of a program, a rank of equivocation coefficients of corresponding program entities is obtained according to multi-defect distribution in the optimal candidate defect distribution population, and the algorithm is completed. The effect of an adopted GAMFal algorithm on the multi (single) defect positioning problem is superior to that of an existing SFL method; only little artificial participation is needed; the efficiency of the algorithm is feasible.
Owner:TIANJIN UNIV

Integer ciphertext arithmetic operation method based on homomorphic encryption

The invention provides an integer ciphertext arithmetic operation method based on homomorphic encryption, which comprises complement homomorphic calculation, addition subtraction homomorphic calculation, multiplication homomorphic calculation and division homomorphic calculation. This invention refers to the rules of complement, addition, subtraction, multiplication and division of binary integersin computer, and transforms this rule into Boolean polynomials containing only logical AND and XOR operations. In multiplication and division, different calculations are made according to the information of special bits to correct the final calculation results. So we modify the form of Boolean polynomials to represent different computational results, that is, Boolean polynomials include all the inputs and mutually exclusive computational branches of this layer. Then Boolean polynomials are transformed into homomorphic polynomials which can be used in ciphertext computation, and the security of homomorphic polynomials is proved, which meets the requirement of semantic security. The multi-bit parallel operation of integer homomorphic arithmetic operation is realized, the algorithm efficiency of homomorphic operation is improved, the frequency of noise reduction operation is reduced, and the operation efficiency is improved.
Owner:SHENYANG AEROSPACE UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products