Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

4533 results about "Identification technology" patented technology

Method for personalized television voice wake-up by voiceprint and voice identification

The invention discloses a method for personalized television voice wake-up by voiceprint and voice identification, particularly a method for performing identity confirmation on a television user through voiceprint identification and controlling a television to perform personalized voice wake-up through confirmed identity and a voice identification result of user voice, and relates to voiceprint identification and voice identification technologies. A composition system comprises a voice control system (1), an information storage unit (2) and a television main controller (3) which are connected through electric signals. The method has the characteristics of short training time, very high voiceprint and voice identification speed and high identification rate. Voiceprint and voice identification can be finished by only offline training and testing, identification results do not need to be sent to a cloud server, use is convenient, and the safety of family information is guaranteed. The method also can be applied to user-personalized automatic voice channel change of the television, can be transplanted to a common high-speed DSP (digital signal processor) or chip for operation, and can be widely applied to the related fields of smart homes.
Owner:SHANGHAI NORMAL UNIVERSITY

Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic

A biometric access control and time and attendance system comprises an integrated network including one or more remote access devices in electronic communication with a computer database. Each remote access device comprises a silicon chip based system and preferably includes a biometric input device, a liquid crystal display (LCD), computer processing capabilities based on embedded system architecture with configurable system-on-chip (CSOC) technology, and an electrical output for controlling a door lock or the like. The use of CSOC architecture in lieu of conventional personal computer technology (e.g. mother boards, hard drives, video controllers and the like) allows for a more compact and cost efficient design. A plurality of remote access devices is configured for communication with a primary computer database wherein data corresponding to biometric samples for all authorized users is stored. In an embodiment wherein the biometric input devices comprise fingerprint scanners, the devices are configured to facilitate fingerprint identification by incorporating an auto-targeting capability that enables the user to simply place his or her finger on the fingerprint scanner whereafter the system adjusts the scanned image by automatically shifting the scanned image data to a properly targeted position thereby enabling the system compare the scanned print to the biometric samples in the system's data storage memory. Auto-targeting capability eliminates the requirement for manual targeting present in systems of the background art thereby improving system performance and minimizing reliance on human interaction. The present invention contemplates the use of auto-targeting with other biometric systems, such as facial recognition and/or retinal scanning systems, or any other biometric identification technology.
Owner:PROFILE SOLUTIONS

Movement human abnormal behavior identification method based on template matching

The invention relates to a movement human abnormal behavior identification method based on template matching, which mainly comprises the steps of: video image acquisition and behavior characteristic extraction. The movement human abnormal behavior identification method is a mode identification technology based on statistical learning of samples. The movement of a human is analyzed and comprehended by using a computer vision technology, the behavior identification is directly carried out based on geometric calculation of a movement region and recording and alarming are carried out; the Gaussian filtering denoising and the neighborhood denoising are combined for realizing the denoising, thereby improving the independent analysis property and the intelligent monitoring capacity of an intelligent monitoring system, achieving higher identification accuracy for abnormal behaviors, effectively removing the complex background and the noise of a vision acquired image, and improving the efficiency and the robustness of the detection algorithm. The invention has simple modeling, simple algorithm and accurate detection, can be widely applied to occasions of banks, museums and the like, and is also helpful to improve the safety monitoring level of public occasions.
Owner:XIDIAN UNIV

Man-machine interaction system, method and device

The embodiment of the invention provides a man-machine interaction system, which comprises wearing equipment and a mobile terminal, wherein the wearing equipment is used for receiving and recording voice information of users and sending the voice information to the mobile terminal after the communication is built with the mobile terminal, the mobile terminal is used for carrying out voice identification on the voice information for obtaining instructions of users. The embodiment of the invention also provides a man-machine interaction method and a man-machine interaction device. The man-machine interaction system provided by the embodiment of the invention has the advantages that the voice information of users through the wearing equipment is firstly received and recorded, in addition, after the communication is built with the mobile terminal, the voice information is sent to the mobile terminal, and then, the mobile terminal identifies the voice information through the voice identification technology for obtaining the instructions of the users, so the users do not need to take out the mobile terminal for carrying out any operation, the voice identification technology can be applied, the man-machine interaction intelligentization is realized, convenience is provided for the users, and the experience of the users is improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Multiple-template matching identity recognition method based on ECG (Electrocardiogram) under electrocardiogram abnormality state

The invention relates to a multiple-template matching identity recognition method based on an ECG (Electrocardiogram) under an electrocardiogram abnormality state, and belongs to the technical field of biological characteristic identity recognition. The ECG data of a user to be recognized is compared with the data of a registered user in a template library to obtain an identity recognition result. The key technology of the method comprises the following steps: carrying out electrocardiosignal preprocessing for eliminating noise interference; carrying out electrocardiosignal decomposition to separate an electrocardiogram waveform of each period; carrying out standardized processing for independently achieving standardization on time and amplitude scales; carrying out characteristic extraction: in the step, characteristics are extracted by wavelet transform, and clustering analysis is carried out by an ISODATA (Iterative Self-organizing Data Analysis Techniques Algorithm) so as to construct an ECC template library; and carrying out correlation analysis: in the step, correlation between ECG test data and each template is calculated, an optimal matching template is selected, and finally, an identity recognition result is obtained. The multiple-template matching identity recognition method provided by the invention utilizes the intrinsic electrocardiosignal of a human body to recognize an identity, and the ECG data under the abnormality state is considered.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Vehicle multi-target detection and trajectory tracking method based on re-identification

The invention discloses a vehicle multi-target detection and trajectory tracking method based on re-identification, and belongs to the field of computer vision technology and video monitoring. The method comprises the following steps that firstly, a model capable of effectively extracting vehicle visual features on each track is trained by utilizing a vehicle re-identification technology; then, vehicle detection is carried out on each frame of image in the camera; and finally, in combination with the vehicle appearance features extracted by the re-identification model, motion prediction and visual similarity discrimination are fused, and single-camera multi-target tracking is executed, so that the driving trajectories of all matched vehicles are obtained. According to the method, multi-target matching of front and rear frames of images is successfully achieved in the aspect of tracking, the problem of tracking target shielding is effectively solved, and the appearance characteristics of the vehicle images shot by the multi-angle camera are extracted by adopting a re-identification technology aiming at the possible instability of algorithm detection performance caused by multiple visual angles and are fused into a tracking scheme, re-identification which occurs again after the tracking target is lost is achieved, and the track tracking capability is further improved.
Owner:TONGJI UNIV

Laser pen indication and luminescent spot track recognizing method

InactiveCN101251784ATeaching continuity and freedomProduce wear and tearReadingCharacter and pattern recognitionLight spotComputer vision
The present invention discloses a laser pen indicating and light spot trajectory identification method which belongs to the interactive reorganization technical field. Step 1, according to laser pen indicating information, a user obtains video information of a display screen from a video input device; step 2, an embedded device extracts light spots from the acquired video information, and determines the positions of the light spots after a de-noising process; step 3, the position coordinates of the light spots are transmitted to a computer which controls a target screen; step 4, according to the position coordinates of the light spots, the computer which controls the target screen recognizes the light spot trajectory; with the specific light spot information, the trajectory information indicated by the user is obtained; when the recognition is succeeded, step 5 is carried out; step 5, after the trajectory recognition is succeeded, the trajectory of the recognition result of the original trajectory is optimized, so that a new trajectory is obtained; the optimized result is displayed with visually optimized effect on the target screen to replace the indication effect of the step 3. The method can be applied in various interactive recognition display circumstances so as to carry out highly effective light spot analysis and trajectory recognition.
Owner:SHANGHAI JIAO TONG UNIV

Advertisement injecting effect evaluation and intelligent push decision method based on face identification and big data analysis

The invention discloses an advertisement injecting effect evaluation and intelligent push decision method based on face identification and big data analysis. The advertisement injecting effect evaluation and intelligent push decision method comprises a face identification technology is employed to obtain face feature data of the audience group, and the data is introduced into an advertisement injecting effect evaluation module as parameters, and is used for quantifying the advertisement injecting effect; furthermore, historical data is stored in a database, a data analysis system can carry out further analysis, the analysis result can be provided for the advertiser as an injecting decision reference, and can also be provided for the advertising agency who can carry out reasonable bidding and charging on the advertising position. At the same time, an FAEM matching algorithm is employed to match the advertisement played at present with audience face feature data at present, and advertisement push is carried out in dependence on the matching result. According to the invention, accurate evaluation of the advertisement injecting effect can be given out scientifically and objectively, and advertisements can be injected selectively and intelligently in dependence on audiences of the advertisements.
Owner:杨伊迪

Physical education teaching auxiliary system based on motion identification technology and implementation method of physical education teaching auxiliary system

The invention provides a physical education teaching auxiliary system based on a motion identification technology and an implementation method of the physical education teaching auxiliary system. The system is applicable to a personal computer (PC) or an embedded host. The system comprises a movement data collection module, a movement data acquisition module, an identification and training module and a virtual teaching environment module. The device is characterized in that: a micro-inertia measurement unit and an inertia parameter extraction unit are arranged in the movement data collection module; and a movement information resolving unit transmits data which is output by the inertia parameter extraction unit to a multi-sensor data fusion unit for resolving. The movement situation of a target is reflected comprehensively in an inertia tracking mode and an optical tracking mode, so a tracking range is effectively expanded, measurement accuracy is improved, and the problems that the integral information of the target cannot be acquired in the inertia tracking mode, complicated movement identification cannot be performed and sensitivity is poor are solved. A brand new teaching mode is provided for physical education teaching, and a physical education teaching method is digitalized, multi-media and scientifically standardized.
Owner:ANHUI COSWIT INFORMATION TECH

Atmospheric pollution source grading method based on pollutant source identification technology

The invention provides an atmospheric pollution source grading method based on a pollutant source identification technology. The atmospheric pollution source grading method based on a pollutant source identification technology belongs to the technical field of atmospheric environment planning management, and prevention and control of pollution. The atmospheric pollution source grading method based on a pollutant source identification technology comprises the following steps of carrying out high spatio-temporal resolution meteorological simulation of a researched area based on a meteorological model, carrying out grid division of the researched area based on the geographic information system (GIS), arranging concentration contribution evaluation points, collecting pollution source discharge information, building a weather-air quality model coupled system, computing a sensitive factor, identifying sensitive discharge areas, carrying out unitization processing of the sensitive factor, and carrying out grading identification of pollution sources according to pollutant discharge loads and the order of the sensitive discharge areas. The invention aims at providing the atmospheric pollution source grading method based on a pollutant source identification technology so that the evaluation and quantitative grading of sensibility of atmospheric pollution sources are realized and an effective technical support for scientific pollutant-discharge reduction is provided.
Owner:BEIJING UNIV OF TECH

A rolling bearing fault identification method under variable working conditions based on ATT-CNN

The invention discloses a rolling bearing fault identification method under variable working conditions based on ATT-CNN, and relates to a rolling bearing fault identification technology. The problemthat the generalization ability of an existing rolling bearing fault recognition method under variable working conditions is limited to a certain extent for a complex classification problem is solved.The method comprises the following steps: firstly, mapping vibration data to a nonlinear space domain through a convolutional neural network (CNN), and adaptively extracting rolling bearing fault characteristics under variable working conditions by utilizing the characteristic that the CNN has invariance on micro displacement, scaling and other distortion forms of an input signal; Secondly, an attention mechanism (ATT) thought is put forward to be fused into a CNN structure, and the sensitivity of bearing vibration characteristics under variable working conditions is further improved; And meanwhile, more abundant and diverse training samples are obtained through a data enhancement method, so that the network can be learned more fully, and the robustness is improved. The proposed fault diagnosis model based on the attention mechanism CNN (ATT-CNN) can realize multi-state recognition and classification of the rolling bearing under variable working conditions, and compared with other methods, higher accuracy can be obtained.
Owner:HARBIN UNIV OF SCI & TECH

Electric power industry ubiquitous Internet of Things security protection gateway system, method and deployment architecture

The invention discloses an electric power industry ubiquitous Internet of Things security protection gateway system, method and deployment architecture. The method is oriented to a ubiquitous electricpower Internet of Things full-scene safety protection application scene. A terminal identification technology is adopted, fingerprint information of Internet of Things terminal device in a network isidentified in two modes of active detection and flow discovery, asset conditions of Internet of Things terminals in the network are identified through active scanning, visual presentation is realized, and various terminals such as a traditional PC, a dumb terminal and intelligent equipment can be effectively identified. An identity baseline is established for the identified Internet of Things terminal and approval is carried out, so that counterfeit attack protection of the Internet of Things terminal is realized. Security situation evaluation of the Internet of Things terminal can be realized, and protection suggestions and means are effectively given. By performing effective admission control on the identified Internet of Things terminal, the problems of access authentication and security management and control of massive IP devices can be effectively solved, and a user is helped to construct a secure and controllable ubiquitous power Internet of Things.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products