Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

269 results about "Identifier scheme" patented technology

In metadata, an identification scheme is used to identify unique records in a set. If a data element is used to identify a record within a data set, the data element uses the Identifier representation term. An identification scheme should be contrasted with a classification scheme.

Content Metadata Directory Services

The content metadata directory system connects consumers of identified content to managed metadata databases and other digital resources. The system manages links between identifiers in content objects and metadata sources. It supports a variety of different type of content identifiers and allows for overlap among different content identification schemes. One method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers and provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source.
Owner:DIGIMARC CORP

Using interrupted through-silicon-vias in integrated circuits adapted for stacking

In an integrated circuit (IC) adapted for use in a stack of interconnected ICs, interrupted through-silicon-vias (TSVs) are provided in addition to uninterrupted TSVs. The interrupted TSVs provide signal paths other than common parallel paths between the ICs of the stack. This permits IC identification schemes and other functionalities to be implemented using TSVs, without requiring angular rotation of alternate ICs of the stack.
Owner:MOSAID TECH

Automatic identification system and method for commodities based on image feature matching

The embodiment of the invention discloses an automatic identification system and method for commodities based on image feature matching, which are used in the field of information systems and are used for overcoming the defect of the traditional bar code process for commodity feature identification in a commodity sales system so as to provide an accurate real-time commodity feature identification scheme. The system comprises an image processing unit and a commodity information system, wherein the image processing unit is used for collecting the image data of the current commodity in real time and processing the image data of the current commodity to extract image feature information; the commodity information system is used for storing the image feature information of the commodity, and looking up and matching the image feature of the current commodity according to the image feature information of the commodity, which is collected in real time, and the current commodity is identified. In the automatic identification system, the image processing unit is used for collecting commodity images, processing and communicating, the commodity price is synchronously identified by the image identification process, and thus the automatic identification system has the advantages of high identification speed, high precision and favorable popularization and application values.
Owner:SHANGHAI DIANJI UNIV

System and method for immutably cataloging electronic assets in a large-scale computer system

Systems and / or methods for storing and / or retrieving assets in connection with an extremely large scale computer storage system are provided. An asset catalog may comprise a plurality of asset catalog entries stored according to at least one schema and corresponding to a plurality of assets. A storage architecture may be capable of storing the plurality of assets, with the storage architecture comprising a storage locator and a federator. An item identification scheme may be capable of providing identifiers to reference, locate, and / or access said assets and / or said asset catalog entries stored in the asset catalog in the storage architecture. The computer storage system may be scalable essentially without limitation while maintaining asset storage and retrieval flexibility and substantially obsolescence-proof survivability of assets.
Owner:LOCKHEED MARTIN CORP +1

Method and device for judging type of webpage

The invention discloses a method and a device for judging the type of a webpage. The method comprises the following steps: carrying out rule matching in a prestored rule table on the basis of the URL of a webpage to be judged, wherein the rule list comprises a plurality of rule records for judging the type of the webpage; if the rule matching is successful, obtaining the type of the webpage to be judged according to the successfully matched rules; if the rule matching is unsuccessful, extracting predetermined features from the URL and / or HTML source codes of the webpage to be judged, and utilizing a classifier to classify the type of the webpage to be judged so as to obtain the type of the webpage to be judged on the basis of a feature vector composed of features selected from the extracted predetermined features. In the scheme of the invention, the invention can combines the advantages of a rule recognition scheme and a recognition scheme based on statistical learning, and can realize to judge the types of various webpage such as blogs, forums, news and the like.
Owner:FUJITSU LTD

Method and system for identifying transient process of non-intrusive load

The invention belongs to the field of load power use monitoring and energy management, and particularly relates to a method and system for identifying transient process of a non-intrusive load. The method comprises the following steps: by virtue of transient power waveform characteristics of multiple types, measuring similarity of a transient power waveform characteristic parameter sample sequence of an unfixed length and a template sequence by using a dynamic time warping algorithm within a time domain, on the basis, establishing a load transient process classification identification scheme based on a nearest neighbor classification strategy, and confirming power use equipment with the load transient process, thereby achieving artificial working state identification on the non-intrusive type power use equipment. The method and the system have the beneficial effects that accuracy and robustness of power load transient process identification can be improved, the cost of a monitoring system can be effectively controlled, and the practicability of the monitoring system can be effectively improved, therefore, practical popularization of an NILM (Non-Intrusive Load monitoring) technique can be greatly improved.
Owner:TIANJIN TRANSENERGY TECH

Cooperative target designing and locating method for unmanned aerial vehicle autonomous landing

The invention belongs to the filed of visual navigation, and discloses a cooperative target designing and locating method for unmanned aerial vehicle autonomous landing. The method is based on the principle of being simple in structure and convenient to identify, having direction guidance, and facilitating accurate locating under the affine transformation condition, the shape, size, color, position arrangement and radiation band and power of the cooperative target are designed, and then an identification scheme of the cooperative target is designed. The identification scheme comprises 5000-meter far distance naval vessel position detection, 1000-meter middle distance runway plane locating and 500-meter near distance vessel landing position locating. By means of the cooperative target designing and locating method, safety and success rate of unmanned aerial vehicle autonomous landing can be improved, and the designed cooperative target is convenient to identify and locate and high in robustness. By means of computer view, the cooperative target can be fast identified, and unmanned aerial vehicle autonomous landing is achieved.
Owner:北京北航天宇长鹰无人机科技有限公司

Neutral point non-effective earthing system single-phase earthing fault identification method

ActiveCN102955098AEfficiently reflects mutationsGuaranteed reliabilityFault locationThree-phaseEngineering
The invention discloses a neutral point non-effective earthing system single-phase earthing fault identification method which includes the steps that a zero sequence voltage instantaneous value and a instantaneous saltation value are taken as the startup criteria of an identification scheme; when any of the above values is out of the limit, an identification process is started, a saltation moment is determined according to a signal saltation point, and the effective values of the zero sequence voltages and the three-phase voltages in cycles before and after the signal saltation point and the variations of the effective values are calculated; and a single-phase earthing fault is judged to have happened only when the variation of the zero sequence voltage and the variations of all phases of voltage all satisfy all the criteria. The method takes voltage variation for identification, and the saltation of the state of the system can be reflected; a low threshold value scheme is adopted in the method, so the system can be started sensitively under a high impedance fault; and the multiple criteria scheme of zero sequence voltage and three-phase voltage are adopted, so the method has high reliability. The method is simple and easy to realize.
Owner:ZIYANG POWER SUPPLY COMPANY STATE GRID SICHUAN ELECTRIC POWER +2

Identification analysis system implementation method based on blockchain technology and identification coding technology

The invention discloses an identification analysis system implementation method based on a blockchain technology and an identification coding technology. The method comprises the following steps: A, establishing a consensus node mechanism; B, carrying out on-chain deployment by utilizing an intelligent contract technology so as to guarantee an identification rule; cC generating a data tree management mode for producing a full link based on a distributed account book technology; D, establishing a component model; E, querying the component model; if a result is inquired, directly entering the step G, otherwise, entering the step F; F, performing intercommunication analysis of the identification system; and G, outputting identification information. According to the method, the management efficiency of the identification data can be effectively enhanced, identification codes are unified, the method is unified with the construction of a national identification analysis system, the identification information management of all elements and all links of an industrial internet identification analysis ecosphere is realized, and an interconnected and intercommunicated data ecological chain isformed between the method and other identification systems.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

A pedestrian abnormal behavior identification method based on 3D convolution

The invention discloses a pedestrian abnormal behavior identification method based on 3D convolution. The pedestrian abnormal behavior identification method comprises the steps of S1, creating a dataset containing abnormal behaviors such as fighting, dog walking and falling; S2, in combination with the latest video behavior identification scheme, constructing a 3D convolutional neural network considering both precision and speed; S3, preprocessing the images in the data set, and sending the preprocessed images into a 3D convolutional neural network to obtain a video abnormal behavior recognition model; And S4, inputting a tested pedestrian monitoring video, and outputting an abnormal behavior type. According to the identification method provided by the invention, the lightweight 2D convolutional network MobileNet idea is migrated to the 3D network, so that the calculation cost can be reduced on the basis of maintaining the identification performance; Meanwhile, a self-adaptive poolinglayer and a sparse time sampling strategy are adopted, so that a large amount of redundant information and fuzzy noise contained in continuous frames can be reduced.
Owner:HANGZHOU DIANZI UNIV

System and method for an immutable identification scheme in a large-scale computer system

Systems and / or methods for storing and / or retrieving assets in connection with an extremely large scale computer storage system are provided. An asset catalog may comprise a plurality of asset catalog entries stored according to at least one schema and corresponding to a plurality of assets. A storage architecture may be capable of storing the plurality of assets, with the storage architecture comprising a storage locator and a federator. An item identification scheme may be capable of providing identifiers to reference, locate, and / or access said assets and / or said asset catalog entries stored in the asset catalog in the storage architecture. The computer storage system may be scalable essentially without limitation while maintaining asset storage and retrieval flexibility and substantially obsolescence-proof survivability of assets.
Owner:LOCKHEED MARTIN CORP +1

Off-line hand writing Chinese character segmentation method with compromised geomotric cast and sematic discrimination cost

The geometric cost-semantic identification cost amalgamated off-line hand-written Chinese character segmentation method belongs to the field of character identification technology. Said method includes the following steps: firstly, analyzing row image of inputted off-line hand-written Chinese character, extracting stroke segment, combining stroke segments into subcharacter block, at the same time giving out subcharacter blocks combined geometric cost, utilizing these geometric costs to generate several possible candidate segmentation methods, evaluating every method by using binary syntactic model of language to obtain semantic-identification cost of every segmentation method, finally integrating geometric and semantic identification costs to obtain optimum segmentation identification scheme.
Owner:TSINGHUA UNIV

System and method for immutably storing electronic assets in a large-scale computer system

Systems and / or methods for storing and / or retrieving assets in connection with an extremely large scale computer storage system are provided. An asset catalog may comprise a plurality of asset catalog entries stored according to at least one schema and corresponding to a plurality of assets. A storage architecture may be capable of storing the plurality of assets, with the storage architecture comprising a storage locator and a federator. An item identification scheme may be capable of providing identifiers to reference, locate, and / or access said assets and / or said asset catalog entries stored in the asset catalog in the storage architecture. The computer storage system may be scalable essentially without limitation while maintaining asset storage and retrieval flexibility and substantially obsolescence-proof survivability of assets.
Owner:LEIDOS INNOVATIONS TECH INC +1

Computer vision system and method employing hierarchical object classification scheme

A method and apparatus are disclosed for classifying objects using a hierarchical object classification scheme. The hierarchical object classification scheme provides candidate classes with an increasing degree of specificity as the hierarchy is traversed from the root node to the leaf nodes. Each node in the hierarchy has an associated classifier, such as a Radial Basis Function classifier, that determines a probability that an object is a member of the class associated with the node. The nodes of the hierarchical tree are individually trained by any learning technique, such as the exemplary Radial Basis Function Network, that uses appearance-based information of the objects under consideration to classify objects. A disclosed recognition scheme uses a decision criterion based upon recognition error to classify objects.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Virtual machine identification dodging method and device

The invention discloses a virtual machine identification dodging method and device. The method comprises obtaining characteristic parameters of a virtual machine, wherein the characteristic parameters of the virtual machine are used for identifying the parameters of the virtual machine; and modifying the characteristic parameters of the virtual machine. The technical scheme is that identification of the virtual machine of malicious software through the characteristic parameters of the virtual machine can be dodged by modifying the characteristic parameters of the virtual machine, an effective virtual machine identification dodging scheme is provided, and accordingly monitoring and capturing effectiveness of the malicious software is increased.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Identification method and device of certificate characters

The invention relates to an identification method and device of certificate characters. The method comprises steps of acquiring a to-be-identified certificate picture; using a character region detection model to detect the to-be-identified certificate picture so as to obtain a character region of the to-be-identified certificate picture; using a character identification model to identify the character region of the to-be-identified certificate picture so as to obtain identified characters, wherein the character identification model and the character region detection model are obtained throughthe pre-training based on training samples in a database; when receiving the instruction of character identification errors after the identification confirmation of a user, receiving correct characters input by the user, using the correct characters as output results, adding a to-be-identified certificate picture into the training samples of the database by taking the correct characters as true marks, and updating the database; and based on the updated database, re-training the character region detection model and the character identification model.
Owner:杭州创匠信息科技有限公司

A joint learning method and system based on a public block chain and an encrypted neural network

The invention discloses a joint learning method and system based on a public block chain and an encrypted neural network. The method comprises the following steps of: enabling the terminal to downloada universal neural network model pre-constructed on the server; performing Training using local data, obtaining gradient updating data and encrypting the gradient updating data; acquiring encrypted data and a first identification code, sending the encrypted data to a server; calculating a hash value of the first identification code and uploading the hash value to the block chain; enabling a server to decrypte encrypted data, obtaining the sum of the second identification code and the gradient updating data, calculating the hash value of the second identification code, then verifying whether the hash value of the first identification code is consistent with the hash value of the second identification code or not, if yes, updating the universal neural network model by using the sum of the gradient updating data, otherwise, not updating, and repeating the above steps until the model meets a preset convergence condition. In the process of completing deep network training, user informationcan be prevented from being leaked, and it is guaranteed that transmission data are not leaked or tampered.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Certificate information identification method, device and equipment

The invention belongs to the field of artificial intelligence, and discloses a certificate information identification method, device and equipment, and the method comprises the steps: obtaining to-be-identified image information of a to-be-identified certificate of a user through a camera; determining the certificate type of the to-be-identified certificate; when the certificate type of the to-be-identified certificate is in the mature database, calling a mature certificate identification scheme corresponding to the certificate type of the to-be-identified certificate from the mature database,and identifying the to-be-identified image information; when the certificate type is not in the mature database, calling a certificate identification prediction model corresponding to the certificatetype of the to-be-identified certificate from the immature database, and identifying the to-be-identified image information; And adding the identified certificate information to the information dataof the corresponding user. The certificate type identified by the scheme is relatively comprehensive, manual participation is not needed in the identification process, the certificate identification time is saved, and the certificate identification efficiency is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Network speech recognition method in English oral language machine examination system

The invention relates to a scheme of realizing network speech recognition in an English oral language machine examination system. According to the scheme, traditional spectral subtraction (SS) noise reduction technology and cepstral mean normalization (CMN) noise reduction technology are improved, combined with a probability scale DP identification method of a continuous state hidden Markov model(HMM), the invention provides a network speech recognition scheme of unspecified people in an English network examination system, and by utilizing the scheme, a network speech recognition apparatus in a physical environment is realized. By employing the above method, an SS method with input amplitude spectrum self-adapting and a CMN method based on progressive adaptive mode MAP algorithm are combined, and influence of ambient noise on an identification system is substantially reduced. Simultaneously, according to the scheme, based on a traditional DP method, by utilizing a DP algorithm of probability scale, recognition is carried out, thus a DSP speech recognition apparatus can be applied to speech recognition of unspecified people of different outdoor occasions, and a recognition system scope and recognition precision are raised.
Owner:SOUTHEAST UNIV

Handheld option pack identification scheme

An insertion and identification scheme between the main unit of a Personal Digital Assistant (PDA) or handheld device and an option pack. Upon insertion, the hardware interface invokes a device manager on the main unit that interrogates the option pack on its features without significantly impacting battery life. The interrogation includes data on drivers, applications, configuration and miscellaneous requirements of the option pack. This identification process allows the option pack to store information, drivers and applications on the option pack, so the main unit does not have to use its memory to store information on a large number of option packs. Further, the insertion scheme provides a means of checking the power availability in the main unit before allowing the option pack to fully power-on.
Owner:QUALCOMM INC

Road traffic sign recognition method and device

The embodiment of the invention discloses a road traffic sign recognition method and device. The method includes the steps of obtaining a to-be-identified image which is pre-marked with the type information which is to-be-identified road traffic sign type information, determining a to-be-identified area in the to-be-identified image according to the type information; identifying the to-be-identified area, and determining the road traffic signs contained in the to-be-identified area. The to-be-identified image pre-marked with the type information is acquired, so that the automatic identification of the road traffic signs can be realized, and the identification speed is higher. The updating period of the road traffic sign information is shortened, and the updating efficiency is improved. Different types of signs are marked on to-be-identified images in advance, and different recognition schemes can be used for identifying the road traffic signs according to different types of to-be-identified images. The road traffic signs are recognized through different channels, and the recognition efficiency of different road traffic signs is effectively improved.
Owner:ALIBABA (CHINA) CO LTD

Driver driving type identification method and device, storage medium and terminal equipment

The invention discloses a driver driving type identification method and device, a storage medium and a terminal device. The method comprises: obtaining initial data of driving type identification of adriver; obtaining an initial driving type recognition result of the driver according to at least two of a preset first recognition scheme, a second recognition scheme, a third recognition scheme anda fourth recognition scheme, wherein the first identification scheme is to identify the driving type according to the dynamic information of the vehicle, the second identification scheme is used for identifying the driving type according to the operation information of the driver under the preset working condition, the third identification scheme is used for identifying the driving type accordingto a pre-trained machine learning network, and the fourth identification scheme is used for identifying the driving type according to a pre-trained deep learning network; and obtaining a current driving type of the driver according to the initial data and the initial driving type identification result. According to the invention, the accuracy and real-time performance of driver driving type identification can be improved.
Owner:GUANGZHOU AUTOMOBILE GROUP CO LTD

Dangerous goods recognition system and method thereof

InactiveCN107480660AReduced characteristicsNarrow the gap between the true valuesCharacter and pattern recognitionOffline learningDangerous goods
The invention discloses a dangerous goods recognition system and method thereof. According to the system, firstly, goods needing to be recognized is obtained through a camera on an intelligent terminal, and transmits image information to a goods recognition server, a server management module sends the image information to an inference module for image recognition, the inference module performs goods recognition on learned data through an offline training module, when it is read that the goods are dangerous, the inference module transmits the information to an alarm for risk prompts, and when it is read that the goods are not dangerous, the inference module transmits the information to the intelligent terminal for goods information display. The recognition scheme is offline learning, an offline training model is built, a user does not depend on the network, according to the requirement of the user, secondary development can be performed, the period is short, debugging and optimizing are performed according to the application scenarios, and the effect is better.
Owner:SHENZHEN REEMAN INTELLIGENT EQUIP CO LTD

Identification method and device of cheating application program

The invention provides an identification method and a device of a cheating application program. The method comprises obtaining current behavior characteristic information produced by the cheating application program to be identified during operation, and identifying the cheating application program according to the current behavior characteristic information, wherein the type of the current behavior characteristic information corresponds to the type of the cheating application program. By adopting the technical scheme, the problems that cheating application program identification schemes have difficulty in identifying cheating application programs and are likely to make erroneous judgment in relevant technologies are solved, so that precise identification of cheating application programs is realized.
Owner:BEIJING CHEETAH MOBILE TECH CO LTD +4

Identification method and device for protocol type

The invention relates to an identification method and device for a protocol type. The method comprises the steps of obtaining a data message transmitted through the connection built between a user terminal and a server; searching a multi-dimensional user information table for multi-dimensional user information corresponding to the user terminal, wherein the multifunctional user information is used for showing information of all connections currently built by the user terminal; if the multi-dimensional user information corresponding to the user terminal is found, conducting protocol type identification based on the multi-dimensional user information on the connection where the data message exists according to the information of all the connections currently built by the user terminal, wherein the information is identified by the obtained multi-dimensional user information; if the multi-dimensional user information corresponding to the user terminal is not found, conducting protocol type identification based on a data flow on the connection where the data message exists according to message features of the data message. According to the identification method and device for the protocol type, protocol identification based on the multi-dimensional user information is achieved, and then service control based on the user is achieved.
Owner:HUAWEI TECH CO LTD

High-speed ramp speed limit identification method and device and electronic equipment

The invention provides a high-speed ramp speed limit identification method and device and electronic equipment, which relates to the technical field of vehicle navigation. The high-speed ramp speed limit identification method comprises the following steps that firstly, road information collected by a navigation device is acquired, wherein the road information comprises a road type, and the road type is a high-speed road or a non-high-speed road; the speed limit mark information recognized by camera shooting equipment from the acquired road image is obtained, and the camera shooting speed limitvalue corresponding to the speed limit mark information is determined; the effective speed limit of the current vehicle can be determined and prompted according to the road information and the camerashooting speed limit value. According to the embodiment of the invention, a speed limit filling value based on the road type does not need to be adopted, and the requirement for the real-time performance of the road type sent by the navigation equipment is reduced, and the correct recognition rate of the ramp speed limit recognition scheme is improved, so that the risk of missing alarming and alarming by mistake can be reduced, and the driving experience of a driver can be improved.
Owner:GEELY AUTOMOBILE INST NINGBO CO LTD +1

Identification method, identification system, and filter system of spam mail

The invention, which relates to the field of the anti-spam mail technology, discloses a user communication behavior-based identification method, identification system, and filter system of a spam mail. The method comprises the following steps that: e-mail addresses of an addresser and an addressee of a received e-mail are extracted; according to the e-mail addresses of the addresser and the addressee, whether a user communication coefficient of the addresser relatively to the addressee exists is searched in a user communication coefficient database, wherein the user communication coefficient is constructed based on the user communication behavior and expresses a connection degree between the addresser and the addressee; if the corresponding user communication coefficient exists, whether the e-mail is a spam mail for the addressee is determined according to the user communication coefficient. According to the user communication behavior-based spam mail identification scheme, the easy avoidance can be prevented; the individual communication relation of the user is fully considered; and the accuracy of identification and filtering of the spam mail is improved.
Owner:CHINA TELECOM CORP LTD

Multi-robot synergistic system static stiffness real-time performance evaluation method

The invention provides a multi-robot synergistic system static stiffness real-time performance evaluation method without additional devices. The method comprises the steps that based on a robot kinematics transfer matrix and a robot end operation stiffness matrix, a robot joint stiffness identification scheme is established and implemented, and accurate robot practical joint stiffness is acquired; by employing robot system software to feed back real-time joint angles, a robot jacobian matrix is established, and a multi-robot synergistic system overall stiffness matrix is formed through the robot jacobian matrix and joint stiffness parameters identified by a robot; robot real-time stiffness is subjected to visual characterization through robot stiffness matrix ellipsoids, and the maximum value of system stiffness matrix characteristic values is selected as an evaluation index for carrying out robot stiffness evaluation; finally, through a GUI design interface, a stiffness performance evaluation visual interface is designed based on a double-KUKA KR-16 robot synergistic system.
Owner:SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products