Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1108 results about "Similarity matching" patented technology

Similarity matching. a technique for identify conceptual categories. Users are given a set of topics, and they are asked to rate the similarity of pairs of topics (on some scale, e.g. 1 to 10).

Surveillance video character identity identification system and method thereof fusing facial multi-angle feature

The invention discloses a surveillance video character identity identification system and a surveillance video character identity identification method fusing facial multi-angle features. The surveillance video character identity identification system comprises a target detection module, a multi-angle face identification module and an identity matching module, wherein the target detection module is used for converting a section of surveillance video into a keyframe set containing people; the multi-angle face identification module is used for converting the keyframe set containing people into a face image sequence with angle value tags; and the identity matching module is used for completing feature vector similarity matching of the face image sequence with the angle value tags and an image sequence in an identity library, and finding out proximate identity output as an identification result. The surveillance video character identity identification system and the surveillance video character identity identification method can integrate multi-angle feature information of a face in the surveillance video, thereby improving precision of identity identification when character attitudes in the surveillance video are of great randomness.
Owner:山东心法科技有限公司

Pedestrian re-identification method and device based on unsupervised learning and medium

InactiveCN110263697AClose to realizationRealization of re-identificationBiometric pattern recognitionNeural architecturesData setSpeed learning
The invention discloses a pedestrian re-identification method and device based on unsupervised learning and a medium, and the method comprises the steps: obtaining a target image and a comparison image, and identifying whether a pedestrian exists in the target image in the comparison image through a pedestrian re-identification model based on unsupervised learning; outputting a recognition result; establishing a pedestrian re-identification model: carrying out initial training on the visual classifier according to the labeled source data set to obtain a visual classifier; learning the label-free target data set by using the vision classifier after initial training to obtain a matching probability and space-time information; obtaining a Bayesian fusion model according to the matching probability and the space-time information; carrying out similarity matching on pedestrian images in the unlabeled target data set by the Bayesian fusion model according to the comparison target pedestrian images to obtain a similarity score; sorting the similarity scores according to a preset threshold value to obtain a sorting result; when it is detected that the current model training optimization frequency is smaller than or equal to a preset optimization threshold value, performing parameter updating on the visual classifier.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Precaution method for Android malicious application program based on code behavior similarity matching

The invention discloses a precaution method for an Android malicious application program based on code behavior similarity matching. The method comprises the following steps: establishing an application information knowledge base; detecting a repacked malicious program by comparing the characteristics of a homonymic program in the application information knowledge base by a difference verifying module; performing high coverage analysis on an application code by a static analysis module and extracting the permission related to privacy information and API calling information; simulating the program running in a sandbox by a dynamic analysis module, detecting the system calling and the LKM parameter related to the calling, and tracking the specific behavior of recording application; to constructing a multi-dimensional feature vector by utilizing log information through a clustering judging module, performing similarity matching on each feature vector of the malicious application and judging the attribution of the application. According to the method, The light client and heavy server system design is adopted, the client is responsible for lightweight information extraction, the server is responsible for heavy data analysis, and the method can effectively adapt to the reality of resource shortage of electric quantity, operation, storage and the like of the intelligent terminal.
Owner:NANJING UNIV OF POSTS & TELECOMM

Media program interaction method and system

InactiveCN103402118AThe identification method is accurateQuick feedbackSelective content distributionInteraction systemsApplication areas
The invention provides a media program interaction method and system and is applicable to the field of multimedia application. The media program interaction method comprises the following steps: establishing an audio feature library by a server in real time; storing audio feature values and program interactive information of all media programs; recording an audio of a currently-played media program through a mobile device; extracting the audio feature values of the audio of the media program, and sending the extracted audio feature value to the server; carrying out similarity matching on the received audio feature value and the audio feature values of all the media programs in the audio feature library by the server, so as to identify the currently-played media program; and judging the type information of the currently-played media program by the server, and pushing the corresponding program interactive information to the mobile device according to the type information of the currently-played media program. With the adoption of the media program interaction method and the media program interaction system provided by the invention, the media program interactive information watched by a user can be accurately and rapidly fed back to the user. The media program interaction method and the media program interaction system provided by the invention have the advantages of large amount of the interactive information, various types and better user experience; and the various demands of the user can be met.
Owner:TCL CORPORATION

User credibility authentication system and method based on user behaviors

The invention discloses a user credibility authentication system and method based on user behaviors. The system comprises a user identity and behavior model determination module, a user behavior collection module, a user behavior mining module, a user behavior sequence matching and credibility authentication module and a local security policy module. The method comprises the steps as follows: the user behavior mining module performs behavior mining on user behavior logs; a personal user behavior characteristic sequence is established; the user behavior sequence matching and credibility authentication module performs sequence similarity calculation on the personal user behavior characteristic sequence and a to-be-matched sequence, so that a user credibility grade is obtained, and a corresponding security policy is started using. According to the invention, a sequence pattern mining manner is adopted to collect real-time user behaviors so as to establish the to-be-matched sequence, the similarity matching of the behavior sequence is performed, accordingly, the real-time user behaviors are subjected to credibility authentication, the accurate rate of authentication is improved, and enterprise and personal property safety is guaranteed.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Secure image retrieval method based on homomorphic encryption

The invention relates to a secure image retrieval method based on homomorphic encryption. The secure image retrieval method includes: firstly, extracting features, such as colors, textures, shapes and the like and reducing dimensions of the image features by a LPP method; secondly, protecting the image features by a Paillier homomorphic encryption algorithm; thirdly, conducting similarity matching of the image features which are encrypted and sending back retrieval results of K images with highest similarity to users. The secure image retrieval method is based on a CBIR structure and adopts a homomorphic encryption technology, so decryption is not needed and direct similarity measurement of the image features which are encrypted can be realized by using by using the homomorphic features of the Paillier encryption algorithm. Accordingly, the problem that the direct retrieval of the image features which are encrypted cannot be realized by the prior retrieval method can be solved. Experiment results prove that the retrieval results of the secure image retrieval method is consistent with the retrieval results of a plaintext CBIR method in the prior art under the condition of ensuring the security of image information, so that the encryption cannot influence the image retrieval performance.
Owner:数安信(北京)科技有限公司

Method for capturing human motion by aid of fused depth images and three-dimensional models

InactiveCN104268138ALarge range of activitiesNot many performance venues are requiredImage analysisCharacter and pattern recognitionHuman bodyHuman motion
The invention relates to a method for capturing human motion by the aid of fused depth images and three-dimensional models. By the aid of the method, problems of adhesion requirement on mark points, inconvenience in interaction and easiness in confusing and shielding the mark points of a method for optically capturing motion can be solved. The method includes acquiring depth information of human actions; removing backgrounds of motion objects; acquiring complete depth information of the human actions; converting the complete depth information of the human actions into three-dimensional point-cloud information of human bodies; acquiring three-dimensional human action models; establishing databases; enabling the databases to be in one-to-one correspondence with data of human action skeleton databases; extracting depth information of to-be-identified human actions to build the three-dimensional models; then matching the similarity of the three-dimensional models with the similarity of human actions in the databases of the three-dimensional models; outputting human action skeletons according to similarity sequences. The human action skeletons are motion capturing results. The method has the advantages that sensors or added mark points can be omitted on the human bodies, the method is easy to implement, motion sequences are matched with one another by the aid of a regular time wrapping process, the matching precision of each two sequences can be improved, the matching time can be greatly shortened, and the motion capturing speed and the motion capturing precision can be guaranteed.
Owner:XIAN TECH UNIV

A pedestrian searching method and device based on structural perception self-attention and online instance aggregation matching

The invention discloses a pedestrian searching method and device based on structural perception self-attention and online instance aggregation matching, and belongs to the technical field of computervision technology processing. The method comprises the following steps: firstly, in a training phase, combining a convolutional neural network with a non-local layer; carrying out feature extraction on an input whole scene image to obtain feature representation of the scene image, designing structure-perceived anchor points for a special object of a pedestrian, improving the performance of a detection framework, framing the detected pedestrian into the same size, then sending the pedestrian into a pedestrian re-identification network, and carrying out training, storage, optimization and updating of pedestrian features with tags. In the model testing stage, the trained non-local convolutional neural network is used for carrying out pedestrian detection on an input scene image, and after a pedestrian frame is detected, a target pedestrian image is used for carrying out special similarity matching sorting and retrieval. Pedestrian detection and re-identification can be carried out on large-scale real scene images at the same time, and the method plays an important role in the security and protection fields of urban monitoring and the like.
Owner:CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products