Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

282 results about "Black hole" patented technology

A black hole is a region of spacetime exhibiting gravitational acceleration so strong that nothing—no particles or even electromagnetic radiation such as light—can escape from it. The theory of general relativity predicts that a sufficiently compact mass can deform spacetime to form a black hole. The boundary of the region from which no escape is possible is called the event horizon. Although the event horizon has an enormous effect on the fate and circumstances of an object crossing it, no locally detectable features appear to be observed. In many ways, a black hole acts like an ideal black body, as it reflects no light. Moreover, quantum field theory in curved spacetime predicts that event horizons emit Hawking radiation, with the same spectrum as a black body of a temperature inversely proportional to its mass. This temperature is on the order of billionths of a kelvin for black holes of stellar mass, making it essentially impossible to observe.

Dark quenchers for donor-acceptor energy transfer

The present invention provides a family of dark quenchers, termed Black Hole Quenchers (“BHQs”), that are efficient quenchers of excited state energy but which are themselves substantially non-fluorescent. Also provided are methods of using the BHQs, probes incorporating the BHQs and methods of using the probes.
Owner:HSBC TRUSTEE COMPANY UK LIMITED AS SECURITY AGENT

Intelligent illuminating method and device for road tunnel

The invention discloses an intelligent illuminating method and an intelligent illuminating device for road tunnels. The method comprises the following steps that: natural light brightness information outside the tunnel is acquired by a sensor; the acquired information is sent to a central controller; the central controller sends a brightness adjusting instrument to lamps according to the received information; a lamp controller is mounted on each tunnel lamp; illuminating brightness information of the corresponding tunnel road section is acquired by the sensor; and the lamp controller integrates the acquired information with the brightness control instruction sent by the central controller for adjusting the illuminating brightness of each tunnel lamp so that the illuminating brightness can meet the illumination requirements and the illuminating brightness of each illuminating section in the tunnel is adjusted. By the invention, a black-hole effect and a white-hole effect at the exit and entrance of the tunnel are eliminated; the problems of excessive illumination and unavailable illumination of the tunnel lamp in the tunnel are solved; the traffic safety on the pavement is improved; the lamp consumption is reduced; and the operation and maintenance cost of the tunnel is reduced.
Owner:GUIZHOU UNIV

Detection and processing method and system for botnet domain names

ActiveCN103152442AStop Bad Behavior OnlineData switching networksDomain nameName server
The invention relates to a detection and processing method and a system for botnet domain names. The detection and processing system is composed of an input module, an output module, a real-time calibration module and a processing module. The method comprises the step: 1) carrying out log query on a to-be-detected network domain name, and obtaining a log record of domain name query and inputting the log record to a detection port; 2) extracting and obtaining characteristics of the domain name according to the log record of the domain name query, and carrying out machine learning on the characteristics of the domain name; 3) after the machine learning, extracting the botnet domain names in a domain name on an outgoing line and/or a local domain name log; and 4) building a data base of the botnet domain names, carrying out breakdown through a black hole authoritative server, and finishing the processing. According to the detection and processing method and the system for the botnet domain names, while the botnet domain names can be extracted from a domain name server (DNS) to be broken down and separated so as to crack down botnet crimes, the botnet domain names are collected, and a network bad action that a botnet host is connected with a controlling end through the domain names so as to receive vicious commands is effectively prevented.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER

Automatic passenger and driving safety alarm device based on intelligent voice recognition and method thereof

PendingCN108877146AReduce security regulatory black holesReduce crimeAlarmsSpeech recognitionVoice communicationEngineering
The invention discloses an automatic passenger and driving safety alarm device based on intelligent voice recognition. The voice data in a vehicle are collected in real time through a multi-path microphone pickup circuit, the device collects audio data in the vehicle in real time, and the audio is subjected to amplification filtering and voice extraction after preprocessing, and real-time communication is carried out with the cloud background through a wireless communication module. The invention further provides an automatic passenger and driving safety alarm method based on intelligent voicerecognition. The voice data are subjected to preprocessing and then are sent for feature extraction, the voice is transmitted to an acoustic model for comparison. If the voice falls into the alarm preset sensitive words, the alarm text information is output to the background, and the background is fed back to an online ride-hailing platform, so that the abnormal situation can be immediately processed. The safety supervision black hole of current online ride-hailing is reduced. The life and the safety of people in the vehicle can be guaranteed, voice communication can be directly carried out with a party involved, and illegal criminals of online ride-hailing can be effectively reduced.
Owner:深圳市尼欧科技有限公司

System for automatically generating document in software development process

The invention discloses a system for automatically generating a document in the software development process. The system comprises a collection module, wherein the collection module is used for collecting the name of a module, and variables, methods and comments which are used by the module according to a software module. The system is characterized by also comprising a monitoring module and an output module, wherein the monitoring module is used for monitoring the change behavior of the software module; and the output module is used for outputting the name of the module, and the variables, the methods and the comments which are used by the module to form the document, and changing and revising the formed document according to a monitoring result of the monitoring module. By adoption of the system, the black hole phenomenon of projects can be avoided, and the implementation efficiency of the projects is improved; and the projects can be monitored in real time through the document, and a project progress document can be quickly generated.
Owner:FOUNDER INTERNATIONAL CO LTD

Classifying e-mail connections for policy enforcement

A method and system for the policy-based restriction of electronic mail transmissions. A method for classifying electronic mail message transfer requests for policy enforcement can include identifying a source of an incoming electronic message, classifying the source, and applying a message transfer policy associated with the classification for the source. In particular, the identifying step can include identifying a network address for the source. The classifying step by comparison, can include classifying the source as one of a trusted source, a blocked source, and a suspect source. The classifying step also can include classifying the source as one of an authenticated source and an anonymous source. Finally, the classifying step further can include classifying the source as a blocked source where the source appears in a realtime black hole list.
Owner:IBM CORP

Hole blackening solution and preparation thereof

The invention discloses a black hole solution and a preparation method thereof. The black hole solution comprises carbon nanotubes, a surface active agent, an alkaline matter and a proper amount of liquid solvent, wherein the carbon nanotubes are stably dispersed in the black hole solution under the action of a dispersant after being subjected to functionalization processing. The preparation method comprises the following steps: providing a carbon nanotube material; conducting functionalization processing for the carbon nanotube material; mixing the functionalized carbon nanotubes with the alkaline matter; adding the mixture into the liquid solvent to obtain a suspended solution; adding the surface active agent into the suspended solution; and mechanically agitating the suspended solution to obtain the black hole solution.
Owner:TSINGHUA UNIV +1

Method for designing shading transition facility for road tunnel entrance

InactiveCN103334768AImprove accuracyTransitional realizationTunnelsMedium frequencyRoad surface
The invention relates to a method for designing a shading transition facility for a road tunnel entrance. The facility mainly comprises transparent toughened glass plates (2), a plurality of arched steel-structure upright columns (3), cicada-wing-shaped nontransparent shading films (5) and a shading transition retroreflection system, wherein the arched steel-structure upright columns (3) are gradually heightened outwardly from tunnel cave entrance end walls (1), and horn-shaped openings are formed by the arched steel-structure upright columns (3) and the transparent toughened glass plates (2) on the upright columns; the cicada-wing-shaped nontransparent shading films are arranged on inner layers of the transparent toughened glass plates, and contour line planes and side face projections of the shading films are Boltzmann curves, and the two sides of each arched steel structure are triangularly hollowed; the retroreflection system comprises medium-frequency steel-structure upright column contour marks (7), medium-frequency guardrail contour marks (8), high-frequency guardrail facade marks (9), high-frequency pavement marking lines (10) and high-frequency pavement protrusion marks (11). The shading transition facility has the advantages that the intense transition of space, luminance and reference of the tunnel entrance can be improved, and the black-hole effect on the tunnel entrance is relieved.
Owner:WUHAN UNIV OF TECH

Protein complex recognizing method based on multi-source data fusion and multi-target optimization

The invention discloses a protein complex recognizing method based on multi-source data fusion and multi-target optimization, comprising: preprocessing protein interaction network data to obtain adjacent matrixes; primarily clustering protein complexes to obtain an initial protein complex module; further optimizing the initial protein complex module, fusing topological structural features of the protein interaction network data and functional similar features of GO (gene ontology) annotation data during optimizing, and performing optimizing operation in conjunction with an adaptive multi-target blackhole optimization algorithm to obtain a more precise protein complex module; postprocessing to obtain a final optimal protein complex. The method of the invention has the advantages that protein complex recognition speed and precision are increased, the method is applicable to protein interaction networks and extensible to the analysis of other complex community networks, and the method isvery practical in complex network analysis.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

Polysilicon solar battery piece appearance contamination defect detection method

ActiveCN107768269ASuppress interferenceTo achieve the purpose of detection of appearance dirt defectsImage enhancementImage analysisClosed loopEngineering
The invention provides a polysilicon solar battery piece appearance contamination defect detection method. The method mainly comprises two steps, wherein the first step comprises pretreatment of a battery piece and acquisition of an interested region, and the subsequent operations are performed by taking the first step as the foundation; and the second step comprises recognizing and marking of thecontamination regions. Pretreatment comprises the steps of dividing collected three-channel images into R channel images, G channel images and B channel images, and selecting the R channel images with relatively high defect and background comparison degree for performing subsequent treatment; performing smoothening treatment on the selected R channel images, suppressing interference from image noise and high frequency components, next, performing rotary correction operation on the images, enabling the image edges to be parallel to a coordinate system, next, performing fixed threshold value image cutting, setting upper and lower critical values according to the area, and removing interference from a conveyor belt region on the image processing; and next, performing morphology closed-loop operation on the images, removing small sized black holes generated by insufficient threshold value cutting, and finally realizing polysilicon solar battery piece appearance contamination defect detection.
Owner:HEBEI UNIV OF TECH +1

Challenging black hole attack defense method and device

The embodiment of the invention provides a method for defending challenge collapsar attack, which comprises the following steps: whether the WEB page requested by a client is a dynamic page is judged according to obtained data packets; if the WEB page requested by the client is a dynamic page, every client corresponds to a client request distrustful degree; and the dynamic page requests of the client is filtered according to the client request distrustful degree. In addition, the embodiment of the invention also provides a device for defending challenge collapsar attack. With the technical proposal of the embodiment of the invention, the challenge collapsar attack can be accurately identified, and corresponding defending measurements can be dynamically adopted to realize effective protection for a target host.
Owner:CHENGDU HUAWEI TECH

No-distortion integrated imaging three-dimensional displaying method based on Kinect

ActiveCN106920263AHigh image qualityOvercome physical limitationsImage enhancementImage analysisDistortionBlack hole
The invention discloses a no-distortion integrated imaging three-dimensional displaying method based on a Kinect sensor. The method comprises the steps of acquiring a depth image of a three-dimensional scene by means of the Kinect sensor, and performing black hole filling on the depth image obtained by the Kinect according to a rapid stepping method; performing combined bilateral filtering on the depth image after filling according to a corresponding colorful image, and obtaining the depth image with continuous depth change and smooth edge; and finally obtaining a primitive image array of a large-field-depth complex scene by means of an optical field model, thereby realizing no-distortion three-dimensional integrated imaging displaying. According to the primitive image array obtained through the method of the invention, because of an ideal state without influence by scattering and refraction, the image quality is better than that of the primitive image array which is obtained through a microlens array. The no-distortion integrated imaging three-dimensional displaying method can effectively overcome physical restriction of a micro-lens array in recording the large-field-depth scene and furthermore can realize no-distortion three-dimensional integrated imaging displaying for the large-field-depth compliex scene.
Owner:DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products