Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

132results about How to "High false positive rate" patented technology

Method for web application layer attack detection and defense based on behavior characteristic matching and analysis

A method for web application layer attack detection and defense based on behavior characteristic matching and analysis includes presetting a defense rule base, the defense rule base including a plurality of defense rules; acquiring a record that access request data matches the defense rule base in a web application protection system and taking the record as sample data; learning the sample data to establish an analysis model; establishing a user reputation database and setting a blacklist module in the user reputation database; learning the user's access behavior through the analysis model and updating and correcting the defense rules in the defense rule base; establishing an exception defense rule base; and setting a defense method and intercepting the user's access behavior according to the defense method. By intelligently learning the user's behavior, threat behavior can be identified and intercepted quickly to ensure the security of the web server.
Owner:MOLBASE SHANGHAI BIOTECH CO LTD

Synthetic aperture radar (SAR) image change detection difference chart generation method based on contourlet transform

The invention discloses a synthetic aperture radar (SAR) image change detection difference chart generation method based on contourlet transform. A realization process mainly comprises the following steps of: firstly, constructing a logarithmic ratio image and a mean ratio image on two SAR images which are preprocessed and obtained at different time and in a same region; generating corresponding Contourlet coefficients by Contourlet transform processing; respectively calculating the coefficients of the two images in a high-frequency mode and a low-frequency mode according to different fusion rules; performing inverse Contourlet transform on the fused Contourlet coefficients to generate a change difference chart. The different characteristics of high frequency and low frequency are respectively extracted by the mean ratio image and the logarithmic ratio image, and complementation information of the source images is fully utilized by the image fusion based on the Contourlet transform, so that the SAR image change detection can have a better result, the detection error ratio is low, the image noise is inhibited, and the analysis precision is improved. Compared with other difference chart generation methods, the method disclosed by the invention is high in noise inhibition and good in edge maintenance, and can reserve change information to the maximum extent.
Owner:XIDIAN UNIV

Steel ball surface defect detection sorting equipment

The invention discloses steel ball surface defect detection sorting equipment. The steel ball surface defect detection sorting equipment comprises a steel ball size screening device, a steel ball surface cleaning device, a steel ball surface unfolding device, a camera, a sorting device and a control module, wherein the steel ball size screening device comprises two parallel rolling shafts; the steel ball surface cleaning device comprises a trapezoid rotary table and a rotary sleeve covering the rotary table; the steel ball surface unfolding device comprises at least two rolling bars, wherein a containing groove is formed between two adjacent rolling bars, and at least one rotatable rolling bar in the two adjacent rolling bars can be used for driving steel balls to roll in the containing groove in synchronism with the rolling bars. The equipment disclosed by the invention can screen out the out-of-size steel balls and can clean the surfaces of the steel balls so as to prevent the false detection caused by blots on the surfaces of the steel balls; in combination with the specific steel ball surface unfolding device, the steel ball surface defect detection storing equipment can rapidly and accurately sort the steel ball sizes and the steel ball surface defects, and the steel ball sorting efficiency is greatly promoted.
Owner:NINGBO BAIJIABAI MEASUREMENT & CONTROL EQUIP

Forest fire detection device

The invention discloses a forest fire detection device. The forest fire detection device comprises a base, a pillar arranged at the bottom end of the base, a solar cell panel arranged at the top end of the pillar, and a forest fire detection box arranged on the pillar; a forest fire detection system is arranged in the forest fire detection box; the forest fire detection system comprises an ARM (Advanced RISC Machine) microcontroller module, a storage battery, a DSP (Digital Signal Processor) module, a data storage module, a GPRS (General Packet Radio Service) wireless communication module, and a signal conditioning circuit module; an amplification circuit, a filter circuit and an A / D (Analog-to-Digital) converting circuit are connected with one another sequentially so as to form the signal conditioning circuit module; input ends of the amplification circuit are connected with a temperature sensor, a humidity sensor and a smoke sensor; an input end of the DSP module is connected with an infrared camera; and output ends of the ARM microcontroller module are connected with a sound-light alarm circuit module and a solar controller. The forest fire detection device of the invention has the advantages of high intelligence, capacity for realizing 24-hour uninterrupted effective monitoring, and excellent energy-saving effect.
Owner:XIAN ZHONGZHI HUIZE PHOTOELECTRIC TECH

Vulnerability scanning method and related device

ActiveCN110704847AAvoid false negatives and false positivesLow false negative and false positive ratesPlatform integrity maintainanceTransmissionComputer securityVulnerability scanning
The embodiment of the invention relates to the technical field of computer security, and provides a vulnerability scanning method and a related device. The vulnerability scanning method comprises: obtaining an access request message for accessing a tested system and a response message fed back by the tested system for the access request message when a test device runs a test case; and performing active vulnerability scanning on the tested system according to the access request message, the response message and a pre-stored rule base to generate an active vulnerability scanning result, whereinrules in the rule base are acquired from a preset vulnerability information platform in advance and stored locally. Active vulnerability scanning is performed on a tested system based on an access request message and a response message which are actually generated when a test case is operated in a CI environment, and meanwhile, a richer rule base and a containerized operation mode are adopted, sothat the missing report rate and the false alarm rate are greatly reduced.
Owner:重庆紫光华山智安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products