Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

103 results about "Identifying goals" patented technology

Rear Camera Backup Assistance With Touchscreen Display

Assistance for a backup maneuver of a motor vehicle in which a first point of interest on the vehicle is moved toward a second point of interest remote from the vehicle. A rear contextual view is displayed on an electronic display obtained from a rearward directed image sensor on the vehicle. A zoom window is manually placed on the electronic display to include the second point of interest. The zoom window is enlarged, and the location of the second point of interest is manually identified within the enlarged zoom window. The identified location of the second point of interest is transformed into target positional coordinates. The rear contextual view redisplayed with a target icon at the target positional coordinates. The location of the first point of interest is manually identified on the rear contextual view and transformed into starting positional coordinates. A start icon is displayed at the starting positional coordinates in the rear contextual view. A target line is determined between the target positional coordinates and the starting positional coordinates. A path line icon is displayed in the rear contextual view corresponding to the determined target line. A bearing line is displayed in the rear contextual view extending from the start icon. The target positional coordinates are re-determined as the rear contextual view shifts during the backup maneuver. The target icon and the path line icon are updated in response to the re-determined target positional coordinates.
Owner:FORD GLOBAL TECH LLC

Real-time tracking method of nonspecific target based on partitioning

The invention relates to a real-time tracking method of a nonspecific target based on partitioning, comprising three steps of classifier updating, target detection and weight updating. In the method, the target region is divided into multiple blocks; a classifier is used for maintaining each block, and updating is conducted frame by frame; the detection result of each classifier is comprehensively considered to determine the position of the target in the new video frame. In the method, an automatic weight updating mechanism is designed, so as to enable the blocks which are relatively stable to have greater decision-making power over the judgment of results, thus reducing the influence of various interferences; and the tracking performance is better than multiple international published algorithms recently. In the method, changes of appearances of objects caused by various interferences can be captured and accurate tracking can be conducted; the method has universality on target objects in various shapes and types; the calculation has low complexity and can be processed at real time. The invention has wide application prospect in various occasions needing tracking techniques, such as video monitoring, automatic driving, man-machine interaction, intelligent traffic, robot, airborne early warning and the like.
Owner:UNIV OF SCI & TECH OF CHINA

Method and device for conducting security identification on information system

InactiveCN101674302ASatisfy the requirements for security identificationInternal/peripheral component protectionTransmissionObjective informationSecurity properties
The embodiment of the invention discloses a method and a device for conducting security identification on an information system. The method includes the following steps: determining a target information system; according to the result of security threat modeling of the target information system, acquiring the security attribute value of each property in the target information system and the quantization value of the corresponding threat category; according to the quantization value of the threat category, calculating the security information value of each property in the target information system; according to the security information value of each property and the weight value of each property in the target information system, obtaining the security information value of the target information system; and according to the security information value of the target information system, searching for a preset security level list and obtaining the corresponding security level of the target information system. By quantizing the property, threat and leak in the information system and comprehensively considering the security risk in the information system, the embodiment meets the requirement of the information system on security identification.
Owner:BEIJING LEADSEC TECH

Online model training method, pushing method, device and equipment

The embodiment of the invention discloses an online model training method. The method comprises the steps of obtaining a training sample from streaming data, determining an objective function of the model according to the training sample, historical model parameters and non-convex regular terms, determining current model parameters enabling the objective function to be minimum, and updating the model according to the current model parameters. In the online training process, since the non-convex regular term is adopted to replace the L1 regular term for feature screening, the penalty deviationcan be reduced, effective features can be screened out, the sparsity is guaranteed, and the generalization performance of the model is improved. The invention further provides an information pushing method. The method comprises: obtaining user feature data and content feature data, based on the pushing model obtained by the online training model method, determining the probability that a target user is interested in target information according to the user feature data, the content feature data and the pushing model, and determining whether pushing is conducted or not according to the probability that the target user is interested in. The invention further provides an online model training device and an information pushing device.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Grabbing position detecting method and device and mechanical arm

ActiveCN108044627AIncrease the chances of a successful crawlImprove accuracyProgramme-controlled manipulatorImage analysisGraphicsComputer vision
The invention is suitable for the technical field of intelligent detection, and provides a grabbing position detecting method and device and a mechanical arm. The method includes the steps that the mechanical arm obtains first image information and second image information of a target object at the first position and the second position correspondingly, and a three-dimensional geometric figure ofthe appearance of the target object is determined; if the three-dimensional geometric figure is a regular geometric figure, the grabbing position of the target object is determined according to the geometric center of the geometric figure; or at least two feature points of an irregular geometric figure are obtained, and the grabbing position of the target object is determined according to the feature points. In the process, according to the image information, obtained at different positions, of the target object, three-dimensional geometric figure of the appearance of the target object is determined, and the accuracy of the detected appearance of the target object is improved; and different methods are adopted for target objects with different appearances for determining the grabbing position, the appropriate grabbing positions are found quickly and accurately according to self features of the target objects, and the successful grabbing rate of the mechanical arm is improved.
Owner:SHENZHEN YUEJIANG TECH CO LTD

Software testing method and software testing system based on distributed testing node cluster

The invention provides a software testing method and a software testing system based on a distributed testing node cluster, and the method comprises: a server receiving a testing request which is sentby a current user through a front end and is used for executing a target testing item for to-be-tested software, and the testing request comprising an identifier of a target resource and demand information of the target testing item; the server judging whether the target resource meets the demand information of the target test item or not; if yes, the server obtaining an identifier of a target test node corresponding to the identifier of the target resource from a corresponding relation between the identifier of the resource stored in the database and the identifier of the test node; througha message-oriented middleware, the server sending a test instruction to the target test node according to the identifier of the target test node, wherein the test instruction comprises the identifierof the target resource, so that the target test node determines the target resource from the resources deployed by the target test node according to the identifier of the target resource, and tests the target test item on the to-be-tested software by adopting the target resource, so that the software test efficiency is improved.
Owner:合肥移瑞通信技术有限公司

Log data processing method, system and device and storage medium

The invention discloses a log data processing method, System, device and storage medium, The method comprises the following steps: a data transmission component determines a target data source and a data type of data in the target data source according to a data acquisition request, calls a preset script according to the data type to perform data acquisition, performs initialization processing onacquired log data and sends the log data to a preset message cluster; The preset message cluster generates a message queue according to the initialization log data and sends the message queue to the data transmission component; The data transmission component determines a consumption sequence according to the message queue; and consuming the log data stored in the preset message cluster accordingto the consumption sequence. According to the log data collecting method and device, the data source log data are collected through the data searching assembly and the consumed data are stored throughthe data searching assembly, and the corresponding scripts are called according to the data types of the data stored in the data source to collect the data source log data, so that the coverage of data collection is increased, and diversified collection of the log data is achieved.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

Identity authentication method and device and mobile terminal

InactiveCN107277053AAuthentication is implemented accuratelyAvoid the risk of being easily stolen and disguisedBiometric pattern recognitionTransmissionComputer terminalIdentifying goals
The invention provides an identity authentication method and device and a mobile terminal. The method comprises the steps that the three-dimensional information of a body part of a user is acquired through structured light; whether the three-dimensional information of the body part matches the pre-stored three-dimensional information of the body part is determined; if the three-dimensional information of the body part matches the pre-stored three-dimensional information of the body part, a variety of identity authentication methods are provided, and the target identity authentication method is determined according to the selection operation of a user; authentication information input by a user for the target identity authentication method is received, and whether the authentication information matches pre-stored authentication information is further determined; and if the authentication information matches the pre-stored authentication information, the user passes identity authentication. According to the identity authentication method provided by the embodiment of the invention, the identity authentication of the user is accurately realized through the combination of three-dimensional authentication of the user identity part and other authentication methods; the risk of being stolen and disguised of authentication through biometric information such as fingerprints, irises and the like is avoided; and the safety is improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Smart mobile law enforcement system and method

The invention provides a smart mobile law enforcement system and method. The smart mobile law enforcement system comprises a front-end acquisition unit for acquiring law enforcement data including video shot for an object of law enforcement, an analyzing and management unit for receiving and storing the law enforcement data, determining target information according to the law enforcement data, and comparing the target information with the information stored in the database in advance. When the target information matches with the information stored in the database in advance, alarm information is determined according to the matched information stored in the database in advance, and the matched information stored in the database in advance and the alarm information are determined to be pushing information and pushed to the front-end acquisition unit. The smart mobile law enforcement system and method improves the mobility and smart level for law enforcement by polices. The whole law enforcement process is recorded through video, and personal information in the video is analyzed and identified. Automatic query of target information is achieved, interrogating and examining time for law enforcement by polices can be shortened, and justice and high effectiveness of mobile law enforcement can be ensured.
Owner:SUZHOU KEDA TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products