Core technology

Core technology


BAS Intelligent Technology Framework

Genenkosy's unique BAS technology system, composed of the "ShiDun Brain" (Brain), the Low-Altitude Security Vertical Domain Large Model (AI), and Multi-Scenario Solutions (Solution), forms a trinity low-altitude security technical framework, providing strong technical support for achieving efficient, stable, and scientific integrated low-altitude security solutions.

B
Shidun Brain

"B" (brain) refers to the ShiDun Brain, highlighting its "universal" characteristics. It is self-developed, featuring modular design, interactivity, rapid development and deployment, elasticity, and expansion capabilities. Through data technology, it achieves a data management solution that collects, calculates, stores, cleans, and processes massive data, unifies standards and calibers, enables data interoperability between systems, eliminates silos, constructs layered data warehouse modeling, shares data resources, strengthens data quality management, manages data lineage, and ensures data security, preventing data leakage and abuse.

SHIDUN Central Brain

A
Low-Altitude Safety AI Model

A domestic pioneer, self-developed over 2 years and launched in March 2025. Based on industry data accumulated since the company's founding and ongoing accumulation, deeply integrates low-altitude vertical domain knowledge, optimizes computational efficiency, continuously learns dynamically, and achieves multiple functions such as multi-modal data fusion, intelligent trajectory prediction, flight intent computation, intelligent auxiliary decision-making, and edge intelligence collaboration, enhancing the deep adaptability and return on investment (ROI) of the solutions.

Wu Qiong

S
Solution

Integrated Low-Altitude Surveillance Solution

Starting from the unit's actual geography, meteorology, spatio-temporal conditions, and special security needs, creates sufficient low-altitude defense depth, customizes "integrated software-hardware" low-altitude security protection solutions, deploys detection-countermeasure equipment chains, and synchronously links with security forces to form a "perception-defense-action" closed loop. Provides "one-stop" operation and maintenance services and 7×24-hour cloud hosting services. Already applied in over 300 partner units in industries such as civil airports, military airports, petrochemical, water conservancy and power, border defense, etc.

City-Level (Large Area) Low-Altitude Security Solution

This solution integrates front-end sensing and early warning, mid-end decision support, and end-stage response measures into a closed-loop system covering “monitoring–analysis–decision–execution.” It features area-wide detection, regional alerts, and point-specific interventions, creating a new model of intelligent urban governance: “One Screen for the Whole Domain, One Network for the Whole City.” The first city-level low-altitude security platform in China was established in Hangzhou, covering over 4,000 square kilometers.

Comprehensive Low-Altitude Security Support for Major Events

Provides customized services such as rapid deployment and dynamic gap filling according to the low-altitude defense needs of large-scale event security. Integrates technologies like continuous tracking of suspicious targets and multi-method fused electronic identity recognition, combined with the edge collaboration capability of lightweight AI chips, to build an "integrated air-space-ground" security system achieving millisecond-level emergency response. Provided technical support for "zero incident" low-altitude security at the Hangzhou Asian Games and Harbin Asian Winter Games.

Key Unit Low-Altitude Security One-Stop Solution

Starting from the unit's actual geography, meteorology, spatio-temporal conditions, and special security needs, creates sufficient low-altitude defense depth, customizes "integrated software-hardware" low-altitude security protection solutions, deploys detection-countermeasure equipment chains, and synchronously links with security forces to form a "perception-defense-action" closed loop. Provides "one-stop" operation and maintenance services and 7×24-hour cloud hosting services. Already applied in over 300 partner units in industries such as civil airports, military airports, petrochemical, water conservancy and power, border defense, etc.

N
Key

Capabilities


Picture Name

Multi-Source Fusion Perception Algorithm

Uses radio frequency and motion characteristics captured by multiple sensors, synthesizing a unique and reliable output through intelligent analysis to improve the accuracy and efficiency of the monitoring system.

Picture Name

Blind Source Signal Estimation Algorithm

Separates UAV communication signals from mixed signals under unknown signal sources and propagation characteristics, improving the detection system's accuracy and anti-jamming capability.

Picture Name

City-Level TDOA Distributed Computing Technology

Uses deep learning to analyze the spectral and electronic characteristics of UAV transmission signals, forming unique "fingerprints" to identify and classify different UAV signals, enhancing UAV supervision and security protection capabilities.

Picture Name

AI-Based Multi-Intelligence Early Warning Model

An intelligent analysis system integrating multiple data sources (such as meteorology, electromagnetic, aviation, obstacles, etc.). Uses artificial intelligence technology to comprehensively analyze collected information, predict potential risks, and issue early warnings in advance to improve security prevention and emergency response capabilities.

Picture Name

TDOA Weak Signal Recognition Algorithm

Detects and identifies weak UAV video transmission signals in complex signal environments, improving the sensitivity and accuracy of the UAV detection system, thereby enhancing the detection capability for low-power UAV signals.

Picture Name

Multi-Modal Signal Processing Algorithm

Capable of identifying, classifying, and interpreting signal features from different modalities (such as visual, acoustic, electromagnetic, etc.), and fusing them to improve the accuracy and robustness of signal processing.

Picture Name

TDOA Optimal Site Scheduling Algorithm

Automatically selects the best TDOA base stations to perform signal acquisition tasks by evaluating signal coverage and quality, conducting spectrum analysis to improve the accuracy and efficiency of radio frequency定位 (positioning).

Picture Name

Threat Assessment Model Based on Convolutional Neural Networks

Comprehensively analyzes the radio frequency and motion characteristics of UAVs, uses deep learning technology for image and signal processing, intelligently identifies and assesses UAV attack threats, providing accurate early warning information for security defense.

Picture Name

Unscented Kalman Filter-Based Trajectory Prediction Model

Provides accurate trajectory prediction by simulating and analyzing the dynamic process of object motion, even under nonlinear influences.

Picture Name

An anomaly detection model based on Generative Adversarial Networks

Provides precise trajectory predictions by simulating and analyzing the dynamic processes of object motion, even under nonlinear influences.

Picture Name

Multi-Model Adaptive Estimation-Based Pilot Location Prediction Model

Improves the accuracy of pilot location prediction adaptively by analyzing historical data, employing multiple prediction algorithms, and dynamically adjusting their weights, enhancing the efficiency and accuracy of UAV supervision.

Picture Name

Suspicious Target Continuous Tracking Technology

Utilizes various detection means such as radar and EO/IR, achieves continuous monitoring and precise tracking of targets through data fusion and intelligent analysis, enhancing the response capability of the monitoring system and the accuracy of target identification.

Picture Name

High-Performance Streaming Media Distribution Technology

Uses advanced network transmission and encoding technologies to ensure video and audio content can be transmitted quickly, stably, and efficiently from the source to the client, providing a low-latency, high-definition viewing experience.

Picture Name

City-Level Radio Interference Source Location Technology

Technology that uses advanced signal processing and machine learning algorithms to quickly identify and locate radio interference sources in complex urban environments. It helps maintain the stability and security of radio communications by analyzing signal characteristics, propagation paths, and interference patterns.

Picture Name

Radio Electronic Fingerprint Deep Learning Technology

Uses deep learning to analyze the spectral and electronic characteristics of UAV transmission signals, forming unique "fingerprints" to identify and classify different UAV signals, enhancing UAV supervision and security protection capabilities.

Picture Name

Trajectory Prediction and Correction Algorithm

Uses radio frequency detection technology to predict and analyze the flight trend of UAVs, and automatically corrects the course when a significant deviation in the flight trajectory is detected.

Picture Name

Digital Twin-Based Radio Blind Zone Simulation Technology

Creates a virtual model of the radio environment to simulate signal propagation, predict signal coverage blind zones, and assist in wireless network optimization.

Picture Name

Multi-Method Fused Electronic Identity Recognition Technology

Achieves precise positioning and identity verification of devices or individuals within the whitelist through technologies such as 4G/5G, BDS, GPS, and national standard messaging.