Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

150 results about "String Data." patented technology

A string is generally considered a data type and is often implemented as an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. String may also denote more general arrays or other sequence (or list) data types and structures.

Method and system for creating profiling indices

A database engine and optimizer framework support creation of a series of profiling indices over a column having character string data, such as a traditional “varchar” data type. The profiling indices result in a reduction of the number of records that are searched when searching for a sub-string match within that column. In some embodiments, the series of indices are created over a column that is typically searched using the LIKE predicate or some similar technique; these indices indicate for each record whether certain sub-strings may exist in that record's value in the column. Thus, the indices are used to find the rows that may match one or more portions of the particular term being queried or, in other words, eliminate those records that do not have at least a portion of the term to be matched. The number of records actually retrieved and searched for the query sub-string is thereby reduced.
Owner:IBM CORP

A method of identifying the brand and model of a projector

ActiveCN109190623AImprove recognition accuracy and speedAccurate automatic identificationCharacter recognitionData miningAlgorithm
The invention relates to a method for identifying the brand and model of a projector, comprising the steps of: S1, acquiring an image of an area where the brand and the model of the projector are located; S2: preprocessing the collected image to extract candidate target area; S3, screening the candidate target area by adopting a target area screen strategy to obtain a target area; S4: according tothe obtained target area, recognizing the character in the target area by using the OCR technology, and obtaining the character string of the target area; S5, matching the recognized target area string with the string data in the brand and model database to obtain a matching result of the brand and model. The invention can accurately and automatically identify the brand and model text informationon the surface of the projector fuselage shell.
Owner:MINJIANG UNIV

Method and device for assessing application data security risk

The invention provides a method and device for assessing the application data security risk. The method includes the following steps: acquiring first word string data in an input application; generating a sensitive data feature library according to the first word string data; acquiring first file list information generating file modification during operation of an application; generating a local storage word string library according to the first file list information; and matching the sensitive data feature library and the local storage word string library to obtain risk items of input data and risk values corresponding to the risk items. Through the method and the device, generation of the sensitive data feature library, collection of storage contents, and matching can be automatically performed, a mass of repeated manual works can be replaced, and the cost of application data security assessment can be reduced.
Owner:CHINA MOBILE COMM GRP CO LTD

Device for verifying individual, and method for verifying individual

For received fingerprint data, there are generated a large number of fingerprint data which are varied by estimating a frequency of appearance of errors due to offset of a finger and inverting predetermined bits. A one-way function is applied to data, which combines a received password and each of the large number of fingerprint data, so as to convert into data of 128 bits for example. Each of the large number of 128-bit data is converted into a character string of 32 characters for example. The large number of character string data are classified by using first two characters thereof, and are registered in an HDD as verification templates corresponding to a user name. By using these verification templates, it is possible to prevent surreptitious use of biological information in a device for verifying an individual by biological information.
Owner:GUNMA UNIVERSITY

Intelligent three-dimensional geological modeling method based on drilling data

The invention discloses an intelligent three-dimensional geological modeling method based on drilling data. Firstly, drilling group data are integrated, an adjacency relation matrix of a drilling group is determined according to a Voronoi algorithm, drilling geological disclosure information is converted into character string data, and a character string similarity algorithm is applied to identifya common subsequence of adjacent drilling character strings. And determining the growth path of the plane domain of the borehole group according to the Voronoi diagram, and solving the distribution form of each geosome in the projection area of the geodetic plane; introducing a new control point to the non-continuous through body in the adjacent drilling interval, connecting the continuous through geologic body and the control point, creating geological sections of the adjacent drilling interval, converting all the geological sections into a three-dimensional space to generate a three-dimensional geological skeleton network, and finally assembling to form a three-dimensional geological model. According to the method, automatic three-dimensional geological modeling can be directly carriedout on the complex geologic body based on the drilling data, the three-dimensional topological relation of the drilling group is comprehensively considered, the data utilization rate and the model precision are improved, and the method can be applied to BIM development and smart city construction.
Owner:CCCC GUANGZHOU DREDGING

Method for converting three-dimensional house model into two-dimensional vector plane with height attributes

The invention discloses a method for converting a three-dimensional house model into a two-dimensional vector surface with a height attribute. The method comprises the steps of obtaining vector slicedata content; extracting three-dimensional building information according to the vector slice data content; obtaining the number of three-dimensional building vertexes and coordinate element positionsof the three-dimensional building vertexes based on the three-dimensional building information, and calculating the height of the three-dimensional building by utilizing the number of the three-dimensional building vertexes and the coordinate element positions of the three-dimensional building vertexes; calculating polygonal contour edges in the three-dimensional building, and extracting coordinate values of the polygonal contour edges; performing polygon contour edge coordinate conversion according to the polygon contour edge coordinate values to obtain a coordinate string data set; and storing the three-dimensional building height and coordinate string data set to the shp object. In this way, the two-dimensional vector surface data corresponding to the three-dimensional building of theinternet map can be obtained, the building height can be extracted, and the timeliness of the data is consistent with the latest data updated by the internet map.
Owner:北京臻观尚璞文化产业有限公司

Character string encryption and decryption method and device, storage medium and processor

The invention discloses a character string encryption and decryption method and device, a storage medium and a processor. The method comprises the following steps: acquiring original character stringdata and actual encryption environment information; performing length extension on the original character string data to obtain first character string data; grouping and recombining each character ofthe first character string data to obtain second character string data; and performing operation on each character in the second character string data by taking the actual encryption environment information as a scrambling code to obtain an encrypted character string. According to the invention, the security problem that the ciphertext password is easy to crack under the condition that the plaintext password is encrypted through the ciphertext password without using an encryption function library or encryption hardware is solved.
Owner:国铁吉讯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products