Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

44 results about "Number form" patented technology

A number form is a mental map of numbers, which automatically and involuntarily appears whenever someone who experiences number-forms thinks of numbers. Numbers are mapped into distinct spatial locations and the mapping may be different across individuals. Number forms were first documented and named by Sir Francis Galton in his The Visions of Sane Persons (Galton 1881a). Later research has identified them as a type of synesthesia (Seron, Pesenti & Noël 1992; Sagiv et al. 2006).

A differential protection method for negative sequence current of large power transformer

ActiveCN1964149AHigh protection sensitivityClearly distinguish internal and external asymmetrical faultsEmergency protective circuit arrangementsPhase correctionSecondary loop
The disclosed protection method for internal fault of large power transformer comprises: the protector samples the secondary current of current transformers on power transformer sides to obtain current instantaneous value and calculate complex number form of electric values by Fourier algorithm, corrects phase of connection form, and balances amplitude of transformation ratio; then, it calculates the complex number form of negative sequence current according to three-phase ac complex form, and computes negative sequence differential current and break current as the negative sequence differential protection principle to decide asymmetric inside and outside fault and drop out all breakers. This invention also contains exactly the negative sequence differential rate breaking feature and protection criterion, the adjusting means for protection values, the positive sequence current breaking criterion, and the block function for error action protection.
Owner:BEIJING SIFANG JIBAO AUTOMATION +1

Compression and uncompression method of integral data and device thereof

This invention provides one integral data compression method and device, which comprises the following steps: getting needed compressed data; judging whether data is less than 2 4X-1, if the data X is got by preset compressed data; if yes, converting the data into two bit and storing the number form into X / 2 bit; if not, converting the data into two bit and storing the bit by negative form; remaining part is stored in back bit.
Owner:KINGDEE SOFTWARE(CHINA) CO LTD

Huffman decoding method suitable for JPEG code stream

This invention provides one Holman decoding method for JPEG codes flow, which comprises the following steps: a, according to the flow number list to establish minimum code sub list; b, according to the code number forming minimum code address list; c, adopting 0 to 16 bit comparer to get the Holman code relative RUN / SIZE list; d, according to SIZE value to restore codes front data. Comparing with current technique, this method forms different codes length minimum codes list and address list to lower the register array materials occupancy.
Owner:上海广电集成电路有限公司

Authentication method adopting complex cryptographic technique

The invention provides a method for utilizing the duplex type cryptographic technique to authenticate. The method comprises the following steps that: a plurality of subcodes are appointed for a user using a password, different subcodes correspond to different sequence numbers, and all the subcodes and the sequence numbers form a duplex type password; when the authentication process is performed, the sequence of all the sequence numbers is disrupted, the disrupted sequence numbers are indicated to the user; according to the indicated sequence numbers, the user inputs the subcodes corresponding to the sequence numbers in sequence to finish the input of the password; according to the passwords inputted by the user, the identity of the user is authenticated. In the process of authenticating the password of the user, the method can realize simple operation of the user and high security.
Owner:丁洪涛

Modulating method for Chirp ultra wide band communication system

The invention provides a modulator approach with 4-ary bi-orthogonal keying (4BOK), which aims at increasing data transmission efficiency and guaranteeing simple realization simultaneously. The modulator approach groups binary data streams to be modulated according to the form that one group comprises two bits (namely, a quaternary number expressed by a binary number), the value collection of each quaternary number is D=[11,10,01,00], and then each signal which is in quaternary number form can be converted to a collection S=[s<1>, s<2>,s<3>,s<4>] by a conversion circuit according to one-to-one correspondence. The modulator approach can provide much higher rate of data transmission capacity and reduces complexity simultaneously.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Kernel extreme learning machine-based virtual extension method for leaked gas monitoring concentration data

The invention discloses a kernel extreme learning machine-based virtual extension method for leaked gas monitoring concentration data, and relates to the technical field of dangerous chemicals. The extension method comprises the steps of firstly selecting position point coordinates Xs and Ys and concentration data of a monitored space region S1 as a training sample set, wherein coordinate values are input values of a network, and the concentration data serves as an output value of the network, so that the network is constructed and trained; and secondly determining coordinates (XPn, YPn) according to space positions S2-S1 of virtual monitoring points needed to be extrapolated or interpolated, wherein n is a predicted point number, the predicted point number forms input values in a predicted sample set together with the coordinates in the training sample set and is input to the trained network, the output value of the network is a to-be-predicted target value, namely, gas concentration data of all monitoring points of a virtually extended space S2, and data on an initial monitoring surface S1 is kept unchanged. According to the method, the source characteristic inverse computation precision is effectively improved without adding the monitoring points; and moreover, the workload is reduced and the working efficiency is improved.
Owner:HARBIN UNIV OF SCI & TECH

Generator for producing photon number state

An apparatus for generating a specified number of photons whose generating time is known, and further an apparatus for generating a specified number of photons in the known schedule are provided. The particularly important specified number is 1 and it is able to be applied to quantum cryptographic communication. The apparatus comprises a photon pair source for generating a photon pair that comprises a signal photon and an idler photon and correlates with the generating time, photon number detectors for detecting the photon number of idler photons, a controller for controlling the gate device in conformity with the information on the photon number form the photon number detector, and a gate device for controlling the emission of the signal photon.
Owner:MITSUBISHI ELECTRIC CORP

Cloud service trust evaluation method based on multi-parameter interval number multi-attribute decision-making

The invention discloses a cloud service trust evaluation method based on multi-parameter interval number multi-attribute decision-making. The method comprises the following steps: first collecting QoS index data in a multi-parameter interval number form, and listing a decision-making matrix, converting an index value in the multi-parameter interval number form into a binary connection number, and then normalizing the decision-making matrix according to the cost type and the benefit type to obtain a normalized decision-making matrix; secondly, determining the QoS index weight based on the unknown weight setting of the attribute weight of the connection number; and finally performing the cloud service trust evaluation by use of a principle value model based on the normalized decision-making matrix and the QoS index weight. By use of the evaluation method disclosed by the invention, the QoS index data is collected in the multi-parameter interval number form and then normalized so as to guarantee the reality and the objectivity of the data; the index weight is determined based on the unknown interval number multi-attribute decision-making method of the attribute weight of the connection number, thereby improving the objectivity of the decision-making; the cloud service trust evaluation is performed according to the principle value model, the time complexity of the evaluation method is lowered. The evaluation method disclosed by the invention has strong objectivity and practicability.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Method for automatically identifying code numbers of industry bills in process of printing

The invention relates to a method for automatically identifying code numbers of industry bills in the process of printing. The method is characterized by comprising the following steps that 1, a set of one-dimensional code number is set on each bill; 2, all one-dimensional code numbers form reference data according to the printing sequence of the bills to be stored in a background system; 3, a one-dimensional scanning head is integrated at a bill outlet of a bill printing terminal and used for identifying and reading the one-dimensional code number of each bill in the process of printing of the bill, and sending the one-dimensional code numbers to the background system; 4, the background system receives the one-dimensional code numbers sent by the step 3, the one-dimensional code numbers are compared with the reference data, if the one-dimensional code numbers and the reference data are matched, no action is carried out, and if the one-dimensional code numbers and the reference data are not matched, an alarm is given. The method achieves monitoring of the bill printing, and avoids the problem that the bills do not correspond to the actual reference code numbers.
Owner:FUJIAN SHIDA COMP EQUIP

Chinese character digital coding input method

The invention discloses a Chinese character digital coding input method. Five basic starting strokes, that is, horizontal stroke, vertical stroke, left falling stroke, dot stroke and turning stroke are normalized into four strokes, that is, the horizontal stroke, the vertical stroke, the left falling stroke and the right falling stroke (dot stroke), and two of the four basic stroke codes are combined to form 16 starting two-stroke combined stroke codes which are represented by English letters, number of ones places of the 'horizontal stroke' of the four strokes of the Chinese characters is represented by Arabic numerals 0-9, and tens place is represented by W; number of the ones place of the 'vertical stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by E; number of the ones place of the 'left falling stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by I; number of the ones place of the 'right falling stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by 0; the numbers of the stroke number form a group of Arabic numerals codes in the order of the horizontal stroke, the vertical stroke, the left falling stroke and the right falling stroke from the right to the left, when the Chinese characters are inputted through a computer, the memory is small, the method is easy to be learned and used, the input rate is high, and the coincident code rate is low. The method is also applicable to Chinese character computer input all over the world, and also applicable to computer input of traditional Chinese characters.
Owner:欧诗淼

Method for generating mutual random graphic group among communication equipment and application system

The invention relates to a method for generating mutual random graphic groups among communication equipment and an application system. Graphics are coded into word groups, ninety thousand of word groups are formed through indexing, one byte and one byte index are required only to translate the word groups into character groups and a database with ninety thousand of groups of characters can be circulated. Firstly, numbers formed by 0 to 9 are downloaded, then three hundred of graphics corresponding to graphic codes are formed and finally ninety thousand of word groups are formed through graphic coding. Therefore, only numbers are downloaded and the downloading operation is rapid and convenient. Then, the numbers are translated into three hundred of graphic codes and the like. Finally, characters, programs and the like are formed through indexing. The method can be used for realizing the triple guarantees of security data such as programs, article confidentiality, passwords and the like, wherein the triple guarantees comprise that: 1) original numbers can guarantee that no original graphic code groups are imported incorrectly and cannot be translated; 2) the list of ninety thousand of word groups cannot be converted into the character groups when indexes do not exist; and 3) each character group consists of two characters, every two character groups are different combinations, the decoding of one graphic code is insignificant and the decoding is enabled to be more difficult by introducing multiple indexes. Since a graphic code group decoder is installed, in combination with original code bars and indexes, the downloading efficiency and the character translation efficiency are improved.
Owner:徐文呈

Number association implementation method and system

The invention provides a number association implementation method and system. The method comprises the following steps of: acquiring number information of a user through a P-CSCF (proxy-call session control function); and analyzing and saving the number information through the P-CSCF to realize number association. According to the method provided by the invention, the number information of the user is acquired through the P-CSCF, and the number information is analyzed and saved for realizing number association, wherein the number form can be of SIP (session initiation protocol) format or TEL (telephone) format, thus the processing of optimizing business can be simplified, the efficiency can be improved and the implementation cost can be reduced.
Owner:ZTE CORP

Medical image segmentation algorithm used in CT room

The present invention discloses a medical image segmentation algorithm used in a CT room. The segmentation steps of the algorithm are that: firstly, a CT image is segmented into different small areas via a watershed algorithm, then an average gray value of the small areas is mapped to a high dimension characteristic space according to a KFCM algorithm and by utilizing a Mercer kernel, so that the original characteristics which are not displayed in a watershed algorithm segmentation image are displayed. The algorithm comprises the following steps of (1) pre-processing an image, and carrying out the median filtering; (2) carrying out the watershed segmentation on the pre-processed image, and storing the label k of each small area; (3) calculating the average gray value x<k> of each area, wherein the average gray value x<k> represents a sample set of an input space, k =1, 2, ..., n, n is the area number formed after the image watershed segmentation; (4) selecting a classification number C, a threshold value epsilon and a fuzzy exponent m; (5) calculating a clustering center and a weighting matrix. The medical image segmentation algorithm used in the CT room utilizes the advantages of the watershed algorithm and the weighted kernel clustering, also greatly overcomes the disadvantages of the two algorithms.
Owner:孙燕新

Intelligent visitor system based on two-dimensional code reservation

The invention discloses an intelligent visitor system based on two-dimensional code reservation, includes an information transmission unit and an information acquisition unit, a CPU is arranged at theoutput end of the information transmission unit, the CPU output end is provided with a memory, the memory output end is provided with a control unit, the CPU input end is provided with a two-dimensional code scanning unit, the information transmission unit comprises a video link, a micro-message and a telephone service, the telephone service output end is provided with an information recording unit, and the information recording unit output end is provided with a storage hard disk. The invention utilizes the storage hard disk to store the specific information of the internal staff of the company, including looks, the timbre, fingerprint and the specific data information of the ID card number form a separate personal data record to form a separate two-dimensional code. The staff member approaches the required two-dimensional code to the entrance guard. After the CPU checks the information with the internal information of the memory, and after the manual operation checks the contrasteddata with the internal data of the memory, the entrance guard is opened after confirming that the contrasted data is correct.
Owner:珠海数图信息技术有限公司

Chinese character digital coding input method

The invention discloses a Chinese character digital coding input method. Five basic starting strokes, that is, horizontal stroke, vertical stroke, left falling stroke, dot stroke and turning stroke are normalized into four strokes, that is, the horizontal stroke, the vertical stroke, the left falling stroke and the right falling stroke (dot stroke), and two of the four basic stroke codes are combined to form 16 starting two-stroke combined stroke codes which are represented by English letters, number of ones places of the 'horizontal stroke' of the four strokes of the Chinese characters is represented by Arabic numerals 0-9, and tens place is represented by W; number of the ones place of the 'vertical stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by E; number of the ones place of the 'left falling stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by I; number of the ones place of the 'right falling stroke' is represented by the Arabic numerals 0-9, and the tens place is represented by 0; the numbers of the stroke number form a group of Arabic numerals codes in the order of the horizontal stroke, the verticalstroke, the left falling stroke and the right falling stroke from the right to the left, when the Chinese characters are inputted through a computer, the memory is small, the method is easy to be learned and used, the input rate is high, and the coincident code rate is low. The method is also applicable to Chinese character computer input all over the world, and also applicable to computer input of traditional Chinese characters.
Owner:欧诗淼
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products