Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70 results about "Feature extraction" patented technology

In machine learning, pattern recognition and in image processing, feature extraction starts from an initial set of measured data and builds derived values (features) intended to be informative and non-redundant, facilitating the subsequent learning and generalization steps, and in some cases leading to better human interpretations. Feature extraction is related to dimensionality reduction.

Full-automatic three-dimension characteristic extracting method

InactiveCN102135417AImplement automatic conversionAccurate targetImage analysisUsing optical meansPoint cloudFeature extraction
The invention provides a full-automatic three-dimension characteristic extracting method. The method comprises the steps of firstly converting the three-dimension point clouds of all single view fields obtained by a stereoscopic vision measuring system into depth images of a single view field; splicing the point clouds of the single view fields; carrying out automatic searching and extracting on the corresponding depth images according to the known positioning characteristic of a workpiece to obtain the positioning characteristic of the workpiece, thus automatically converting the spliced three-dimension point clouds into the workpiece coordinate system; subsequently inputting the ideal coordinates of all characteristics to be detected of the workpiece in the workpiece design model; dividing the characteristics into a plurality of types such as aperture, tendon, plane and the like; automatically extracting the depth images respectively and obtaining the two-dimension coordinates of depth images; searching the three-dimension points of two-dimension depth image coordinates under the corresponding workpiece coordinate system; and obtaining the three-dimension information of each characteristic by calculation. The method has the characteristics of full automation, good flexibility and good expandability, and can be used for automatically extracting three-dimension characteristicsof various workpieces with known positioning characteristics.
Owner:BEIHANG UNIV

Electroencephalogram signal feature extraction method combining with public space mode algorithm and EMD

InactiveCN107239142ASolve the problem of lack of frequency domain informationSolve the problem of requiring a large number of input channelsInput/output for user-computer interactionCharacter and pattern recognitionFeature extractionDecomposition
The invention discloses an electroencephalogram signal feature extraction method combining with a public space mode algorithm and an EMD. Firstly, electroencephalogram signals of a subject are selected as a training set and a testing set, and the signals of the single subject in two channels C3 and C4 are pre-processed; then, experience mode decomposition is conducted on the prepressed EEG signals to obtain a series of intrinsic mode functions IMFi, and energy spectrum diagrams of all the intrinsic mode functions are drawn; then, previous three order IMF components of the channels C3 and C4 undergoing a single pass test are merged to form a N * T matrix Xi, wherein N represents IMF number, T represents the number of sampling points undergoing one test, the whole experiment process includes G groups of tests, and G groups of vector matrixes are obtained and are divided into G1 groups of test vector matrixes and G2 groups of training vector matrixes which are respectively subjected to public space mode decomposition. CSP filtering is conducted on the intrinsic mode functions decomposed by utilizing the three channels and the EMD, frequency domain information of the EMD is added on the basis of the CSP, and the problem that the CSP is lack of the frequency domain information is solved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Unmanned aerial vehicle target positioning method and system

InactiveCN106295613AAccurate targetingPrecise positioningStill image data retrievalScene recognitionFeature extractionGeolocation
The invention provides an unmanned aerial vehicle target positioning method and system. The method comprises the steps that an image feature database of a satellite remote sensing image is established; an unmanned aerial vehicle reconnaissance image is acquired and preprocessed; multi-scale image feature extracting is carried out on the preprocessed unmanned aerial vehicle reconnaissance image; an image retrieval similarity measurement model based on granular computing is established, and matching computing is carried out on the extracted image features and image features in the image feature database according to the image retrieval similarity measurement model to acquire a similarity measurement value; and the geographic position corresponding to the satellite remote sensing image with the similarity measurement value satisfying a preset threshold value is determined as the unmanned aerial vehicle target position. The method and system can accurately position an unmanned aerial vehicle target.
Owner:HARBIN UNIV OF SCI & TECH

Abnormality detection method and device based on log graph modeling

The invention provides an abnormality detection method and device based on log graph modeling. The method and the device are applied to a nonsocial network. The method particularly includes: buildinga bipartite graph according to a key field of abnormal data annotated in advance in the nonsocial network, wherein left-side nodes of the bipartite graph correspond to multiple user accounts while right-side nodes of the same correspond to parameter combinations during business interface requesting; extracting features from the bipartite graph, and splicing the extracted features to form a featurevector; performing k-means cluster processing on the basis of the abnormal data and the feature vector to acquire optimal cluster number; according to the optimal cluster number, using a Gaussian mixing model to fit dark industry feature probability distribution; when receiving incoming data, calculating dark industry probability of the data according to feature vector of the incoming data and the Gaussian mixing model, and judging whether the data are abnormal or not according to the dark industry probability and the dark industry feature probability distribution. When the data are judged abnormal, access behaviors of users can be intervened timely, so that network attacks by hackers can be avoided.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Video data fraud detection method and device, computer equipment and storage medium

PendingCN110781916AImprove accuracyIncrease diversitySpeech analysisAcquiring/recognising facial featuresFeature vectorData set
The invention relates to a fraud detection method and device for video data, computer equipment and a storage medium. The method comprises the following steps: acquiring to-be-detected video data; extracting image data of each video frame from the to-be-detected video data, and dividing the image data into a plurality of image data sets according to the time sequence of each video frame, the imagedata sets which comprises image data corresponding to continuous video frames; inputting each image data set into a pre-trained image feature extraction model to obtain an image feature vector; extracting voice data from the to-be-detected video data, and obtaining a voice feature vector of the voice data; performing cascade splicing on the image feature vector and the voice feature vector to obtain a multi-modal feature vector; and inputting the multi-modal feature vector into a pre-trained fraud detection model to obtain a fraud detection result corresponding to the to-be-detected video data output by the fraud detection model. By adopting the method, the characteristic information amount can be increased, the comprehensiveness and diversity of the characteristic information are improved, and the accuracy of video data fraud detection is effectively improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Principal component analysis collaborative filtering method for image multi-direction morphological structure grouping

ActiveCN103208097AKeep the main visual perception partKeep the visual partImage enhancementFeature extractionPrincipal component analysis
The invention discloses a principal component analysis collaborative filtering method for image multi-direction morphological structure grouping. The principal component analysis collaborative filtering method for the image multi-direction morphological structure grouping includes subjecting an image to overlapping partition, and subjecting image blocks to multi-direction morphological structure grouping according to variance, gradient and singular value information of the image blocks to obtain a smooth block group, a random block group, a direction edge block group and a direction texture block group; then subjecting the grouped image blocks to characteristic adaptive principal component analysis, utilizing hard threshold shrink method to subject image block transformation coefficients to filtering and then to grouping reconfiguration; and finally aggregating the grouping reconfiguration blocks into a full-size filtering image. The principal component analysis collaborative filtering method for the image multi-direction morphological structure grouping fully considers the multi-direction morphological structure of image blocks and non local similarity information of the image, has good structure and texture maintaining characteristics in image filtering process, is strong in noise elimination capacity, and is widely applicable to the image characteristic extraction and preprocessing process of target detection.
Owner:NANJING UNIV OF SCI & TECH

Image segmentation method for intelligent flaw detection of cell tail end

InactiveCN103345743AImprove detection efficiencyWon't hurtImage analysisFeature extractionMatch algorithms
The invention discloses an image segmentation method for flaw detection of a cell tail end. Firstly, an initial BGR image at the cell tail end is converted into a gray scale image by considering image characteristics of intelligent flaw detection of the cell tail end, then the gray scale image is subjected to binaryzation processing so as to obtain a binaryzation image, and then coordinates of four key pixel points on the outer contour of the cell tail end are determined on the binaryzation image. The size of an ROI rectangular area where the cell tail end exists is determined according to the coordinates of the four key pixel points on the outer contour of the cell tail end, therefore the ROI rectangular area where the cell end tail exists is marked off in the initial BGR image, and a target area is not damaged. High accuracy in image dividing is ensured, operation is simple, and an early-stage guarantee is provided for accuracy of follow-up processing algorithms (such as the image characteristic extracting and matching algorithm). In addition, the ROI rectangular area is marked off in the initial BGR image, so that the processing of the whole image comprising the background with the follow-up processing algorithms is avoided, detecting efficiency of a cell is improved, and detecting cost is reduced.
Owner:NINGBO CHENGDIAN TAIKE ELECTRONICS INFORMATION TECH DEV

Session intention recognition method and device based on prompt learning and electronic equipment

The invention discloses a prompt learning-based session intention recognition method and device, electronic equipment and a computer readable medium. The method comprises the following steps: performing voice recognition and audio hidden feature extraction on session voice to obtain a session text and audio hidden features corresponding to the session voice; establishing a prompt according to the relevance between the session text and the audio hidden feature; and training a machine learning model by using the session text, the audio hidden feature, the prompt and the corresponding intention of the historical session voice, and processing the session text, the audio hidden feature and the prompt of the new session voice by using the machine learning model to identify the session intention of the new session voice. Due to the fact that prompt learning and self-supervised training based on the pre-training model are adopted, and the audio hidden features of the session voice are introduced into intention recognition, the intention recognition accuracy can be improved.
Owner:BEIHAI QIANG INFORMATION TECH CO LTD

Intelligent malicious code fragment evidence obtaining method and system

The invention belongs to the technical field of digital forensics, and particularly relates to a malicious code fragment intelligent forensics method and system, and the method comprises the steps: constructing a code fragment training set and a code fragment test set for training and testing through extracting the underlying data features of a storage medium; training the set full-connection neural network model by using the data in the code fragment training set, the input being a feature vector, and the output being a normal or malicious prediction result; for the code fragment test set, performing test output by utilizing the trained full-connection neural network model to judge whether model input is a malicious code fragment; and performing feature extraction on the target code snippets, and inputting the target code snippets into a fully-connected neural network model generated through training and testing to obtain an intelligent malicious code recognition result of the targetcode snippets. According to the method, malicious code fragments in storage media such as computers, mobile phones and tablets and evidence containers such as RAW, E01 and AFF can be recognized, and the method has a good application prospect in the field of digital evidence collection such as crime event evidence underlying data automatic analysis.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Equipment residual life prediction method and system based on industrial big data, and medium

ActiveCN113344295AOvercome dependenceOvercoming the pitfalls of machine alarmsForecastingCharacter and pattern recognitionFeature extractionAcquisition apparatus
The invention discloses an industrial big data-based equipment residual life prediction method and system and a medium, and the method comprises the following steps: collecting the real-time operation data of equipment, carrying out the feature extraction and feature selection of the real-time operation data, and obtaining the data features; performing data drift detection according to the data features, and determining the health stage of the equipment; and obtaining a corresponding residual life prediction model according to the health stage, constructing a health factor according to the data features, inputting the health factor into the obtained residual life prediction model, and outputting an equipment residual life prediction result. According to the operation data generated in real time in industrial actual production, the health factor of the equipment is acquired, and the residual service life of the equipment at the current moment is predicted by using the health factor, so that the complete life cycle of the equipment can be more utilized, the service life waste and the time waste caused by sudden shutdown are reduced, the equipment health management is automatically carried out. The method can be widely applied to the field of prediction of the residual life of the equipment.
Owner:SOUTH CHINA UNIV OF TECH

Product packaging defect detection and identification method based on machine vision

PendingCN111968082AImage enhancementImage analysisFeature extractionMachine vision
The invention discloses a product packaging defect detection and recognition method based on machine vision. The method comprises steps that firstly, a product packaging processing image without surface defects is extracted; a defect image template feature database is established; feature extraction, detection and identification of the packaging image of the to-be-detected product are carried out;and finally, the unqualified packaged products are blown into the collecting box, and the qualified packaged products are conveyed by the conveying belt to be output. The method is advantaged in thatproblems that in the prior art, the product packaging defect detection error rate is high, and production efficiency is low are solved.
Owner:SHAANXI UNIV OF SCI & TECH

Identity recognition method based on multi-modal information

ActiveCN110674483ASolve the technical problem of screening out the multi-modal information data that meets the requirementsSolve the problem of not being able to identifyDigital data authenticationMultiple biometrics useFace detectionData set
The invention discloses an identity recognition method based on multi-modal information. The identity recognition method comprises the following steps: 1, making a multi-modal video data set with a label; 2, respectively constructing and training a face detection model and a head detection model; 3, constructing and training a feature extraction model of the face, the head and the sound; 4, performing feature extraction on the face, head and sound information through the trained feature extraction models; 5, constructing and training a classification model to respectively classify the three extracted features; 6, performing result prediction by using the three features through the classification model; 7, performing information fusion on the classification result according to the formulated multi-modal information fusion strategy; 8, arranging the fused result and then outputting an identity recognition result. Based on the identity recognition network model based on multi-modal information provided by the invention, the identity recognition network model has a wide application prospect in the fields of human-computer interaction, information security, security monitoring and the like.
Owner:GUANGDONG UNIV OF TECH

Information pushing method and device based on block chain, computer and storage medium

PendingCN110247974APush accurate and timelyRelieve pressureData switching networksSecuring communicationFeature extractionPrediction probability
The invention relates to an information pushing method and device based on a block chain, computer equipment and a storage medium. The method comprises the steps of obtaining each block of a block chain; analyzing the block chain, and obtaining multi-dimensional characteristics of a user recorded in each block on the block chain and prediction probabilities of a plurality of pieces of to-be-pushed information corresponding to the multi-dimensional characteristics of the user; and pushing the to-be-pushed information to a user according to the prediction probability. Distributed storage of the operation information and the push information probability of the user is realized through the block chain; multi-dimensional features of the user and the probability of to-be-pushed information are extracted according to the multi-dimensional features; calculation of comparative consumed resources such as user preference feature extraction and the like is directly carried out at the user side, distributed tracking storage is realized, decentralization of feature comparison calculation is realized, the pressure of the server side is greatly reduced, accurate pushing and user requirement mining are realized, and information pushing is more accurate and timely.
Owner:DONGGUAN MENGDA INDAL INVESTMENT

Steel coil end face defect distinguishing method and system and electronic device

PendingCN110349144AImprove recognition efficiencyReduce dependenceImage enhancementImage analysisFeature vectorFeature extraction
The invention provides a steel coil end face defect distinguishing method and system and electronic device. The method comprises: obtaining an adversarial network; training the adversarial network byusing a real steel coil end face image without defects; obtaining a steel coil end surface counter-resistance network; equally dividing the end face image of the steel coil to be measured into a plurality of first image blocks, extracting a first feature vector corresponding to each first image block, outputting a plurality of corresponding reconstructed images of each first image block based on the to-be-detected steel coil end face reactance network; performing feature extraction on each reconstructed image; obtaining a second feature vector, sequentially judging whether a first loss value between each first feature vector and the corresponding second feature vector exceeds a first threshold value or not. Therefore, the confrontation network only needs to train a defect-free steel coil end face image, feature extraction is carried out on the reconstructed image, whether the defect exists or not is judged through the loss value of the feature vector, the calculation amount is reduced,and the recognition efficiency is improved.
Owner:创新奇智(广州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products