Abstract:
A positioning method includes clustering points in a first point cloud through multi-clustering to obtain a target point cloud, where the target point cloud represents a feature of a target object, and the first point cloud includes the target point cloud and a point cloud that represents a feature of an interfering object; and determining a position of the target object based on the target point cloud.
Abstract:
This disclosure discloses an address translation method, apparatus, and system. The method includes: receiving, by a first address translation unit (ATU), an access request sent by a first virtual machine (VM), where the access request carries a first address and parameter information of the first address, and the parameter information of the first address includes an identifier of a target virtual function (VF); determining, by the first ATU, a matching relationship based on the parameter information of the first address and VF range description information in an address mapping table; and when an identifier of a target VF and the VF range description information are successfully matched, translating, by the first ATU, the first address into a second address based on the address mapping table.
Abstract:
The present invention provides a method and an apparatus for determining an identity identifier of a face in a face image, and a terminal. The method includes: obtaining an original feature vector of a face image; selecting k candidate vectors from a face image database; selecting a matching vector of the original feature vector from the k candidate vectors; and determining, an identity identifier that is of the matching vector. In embodiments of the present invention, a face image database stores a medium-level feature vector formed by means of mutual interaction between a low-level face feature vector and autocorrelation and cross-correlation submatrices in a joint Bayesian probability matrix. The medium-level feature vector includes information about mutual interaction between the face feature vector and the autocorrelation and cross-correlation submatrices in the joint Bayesian probability matrix, so that efficiency and accuracy of facial recognition can be improved.
Abstract:
Embodiments of the disclosure provide a method for keeping a session table alive in a Network Address Translation, NAT, apparatus, including: creating a hello session table by an Access Border Gateway Function, A_BGF, apparatus; creating a hello message by the A_BGF apparatus according to the hello session table; sending the hello message by the A_BGF apparatus to the NAT apparatus; receiving the hello message by the NAT apparatus; and updating a session table corresponding to the hello message by the NAT apparatus. Embodiments of the disclosure also provide a system and apparatus for keeping a session table alive in an NAT apparatus. Application of the embodiments of the disclosure keeps the session table alive in the NAT apparatus of an IP Multimedia Subsystem, IMS, ensures an unblocked registration path, and prevents the user conversation being interrupted due to an aged session table of the NAT apparatus.
Abstract:
An air deflection system includes a cabinet, where an air vent is disposed on a side of the cabinet, the air vent is located in a lower part of the side, an air vent is disposed at the top of the cabinet, and the cabinet is provided with a side for cool air to enter; and further includes at least one air deflection cabinet, where an air vent is disposed at the top of the air deflection cabinet, the air-vent-disposed side of the air deflection cabinet clings to the air-vent-disposed side of the cabinet, and the side air vent of the air deflection cabinet is in communication with the side air vent of the cabinet. By means of the air deflection system, bottom warm air is exhausted from the top, which improves efficiency of warm air processing of an equipment room.
Abstract:
A method and an apparatus for clearing a malicious power-consuming application, and a user terminal are provided. An application whose background working power consumption is not less than a power consumption threshold is determined as a malicious power-consuming application; and a wakelock occupying time of each application if a screen is turned off is periodically calculated, and if a background working application's wakelock occupying time is not less than a set time threshold, the application is determined as a malicious power-consuming application.