Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

91results about How to "Achieve correctness" patented technology

Hospital decision-making aiding method based on symptom similarity analysis

The invention provides a hospital decision-making aiding method based on symptom similarity analysis, belonging to the field of information analysis and decision-making aid. The method comprises the following steps: establishing a disease database, a symptom database, a department database and a correlating relationship; establishing a patient model for symptoms input by users, and calculating the similarity between the patient model and a disease model; and searching one department with corresponding suspected diseases in the department model to serve as hospital reference. The method has the advantages that an error interrupted result is weakened under a condition that a user takes an error symptom as a reasoning condition; a correct symptom participates in the reasoning operation by combining the correlating relationship between the error symptom and the convention symptoms according to the error symptom condition so as to realize the correctness and interruption resistance of reasoning; and a hospital department list is obtained by utilizing the mapping relationship between the disease and the department. The method can be used in electronic reception or health consulting systems, as well as in medical training or clinical reference.
Owner:中国医学科学院医学信息研究所

Multifunctional station line loss management system

The invention discloses a multifunctional station line loss management system, and belongs to the field of power generation, power transformation or power distribution. The system comprises an existing transformer area digitalization management system, wherein the transformer area digitalization management system reads power supply and sale quantity information of each outgoing line or each user of a transformer substation to compute line loss; a list of line loss rates of the users in a previous month is exported from the transformer area digitalization management system; a line loss distinguishing data model is established to screen high line loss rate transformer areas; line loss data exception transformer areas are locked; the users in the line loss data exception transformer areas are counted according to power quantity differences of the users during flat and peak load periods; and exceptional power utilization periods are automatically distinguished by comparing the power quantity differences during the flat and peak load periods. The system can increase a distinguishing success rate of transformer area/station line loss factors, can progressively improve an integral line loss control level of transformer areas/stations by virtue of a spiral rising working mode, can gradually reduce an integral line loss rate of a regional power supply network, and can be widely applied to the field of operation analysis and power utilization management of power systems.
Owner:SHANGHAI MUNICIPAL ELECTRIC POWER CO

Operation system specification formal verification and test method

The invention discloses an operation system specification formal verification and test method. The method comprises the steps of firstly extracting constraints of pre-conditions and post-conditions about system service execution in operation system specifications; according to the extracted constraint specifications, building a formal semantic model; verifying the formal semantic model and an operation system application, and if the verification is not passed, correcting the formal semantic model or the operation system application, until the formal semantic model and the operation system application meet the specifications; automatically generating a test case realized by an operation system kernel from the correct formal semantic model by using a model check method; testing the correctness of operation system kernel implementation; and executing the verified application in the formal semantic model and the operation system kernel implementation, extracting two executive tracks, comparing the consistency of the two executive tracks by applying a mutual simulation method, and if the two executive tracks are inconsistent, correcting the operation system kernel implementation until the operation system kernel implementation is correct. The method is applied to formal verification of the operation system specifications and test of the operation system kernel implementation, thereby improving the security and reliability of an operation system.
Owner:EAST CHINA NORMAL UNIVERSITY

Automatic verification platform and method for on-chip memory management unit fault-tolerant structure

The invention provides an automatic verification platform and method for an on-chip memory management unit fault-tolerant structure. The automatic verification platform and method can conduct random fault injection verification on the fault-tolerant structure and are high in verification coverage rate. The platform comprises a debugging host and a to-be-tested host connected through a serial port. The debugging host is used for flow control verification, encoding result checking, fault injection, decoding result checking in the verification process, and monitoring and debugging of a processor. The on-chip memory stack fault-tolerant structure is integrated in the to-be-tested host and used for generation of check codes, decoding verification after decoding logic and fault injection and loading of an automatic verification program for the memory stack fault-tolerant structure. The memory stack fault-tolerant structure comprises a memorizer control module, a fault-tolerant module, a selector and a memory stack. The memorizer control module and the fault-tolerant module conduct read-write control over the memory stack through the selector to control the working mode and the failure mode of the on-chip memory stack fault-tolerant structure.
Owner:NO 771 INST OF NO 9 RES INST CHINA AEROSPACE SCI & TECH

Electric connector

The invention discloses an electric connector which comprises a male plug and a female socket, wherein the male plug comprises a battery cell bar, a battery cell bar protective casing, a pressure-resistant housing, first reset springs, a battery cell bar positioning sleeve and a housing connector; the female socket comprises an electric socket, an electric socket filling bar, a pressure-resistant housing, a sleeve, a sleeve connector, a pressing block, second reset springs, springs and a housing connector; the battery cell bar comprises a first framework, first conducting rings and first cable cores; and the electric socket comprises a second framework, second conducting rings and second cable cores. According to the electric connector, mechanical connection is realized through matching of a drill tool male connector and a drill tool female connector, information channel connection is realized through contacted matching of the first conducting rings and the second conducting rings, and connection of short sections of downhole tools is completed in a working site, so that the electric connector is fast, convenient and reliable in connection, and can prevent the first reset springs and the second reset springs from interfering cables during compression and reset; and meanwhile, rigidity compensation is achieved through third springs, so that the battery cell bar and the electric socket of the electric connector are protected from being damaged.
Owner:SICHUAN HONGHUA PETROLEUM EQUIP

Construction method of division protocol based on cryptology in distributed computation

The invention discloses a construction method of a division protocol based on cryptology in distributed computation, belonging to the field of information safety. The formation method is characterized in that (1) each member who participates in the computation dependently selects a random number and sends the shared value of the random number to all parties for local hybrid operation so as to obtain a public random shared value; (2) each member randomizes the sharing of an input secret value b by using the public random shared value and reconstructs the randomizing value of the secret value btogether; (3) each member inspects whether a randomizing result of the secret value b is inverse or not, if so, the member solves an inverse element of the randomizing value of the secret value b andthen de-randomizes the inverse element to obtain the inverse sharing of the secret value b by utilizing the public random shared value; (4) each member utilizes the obtained inverse sharing of the secret value b and a sharing executive multiplication protocol of a secret value a to obtain the sharing of the a/b; and (5) each member reconstructs a real computing result by mutually exchanging the obtained sharing of the a/b. The invention has the characteristics of high efficiency, fault tolerance and safety.
Owner:PEKING UNIV

Secure bidirectional heterogeneous digital signature method between PKI and IBC

ActiveCN111342973AManagement issues do not existImplement digital signatureUser identity/authority verificationInternet privacyDigital signature
The invention discloses a secure bidirectional heterogeneous digital signature method between a PKI and an IBC. System parameters are generated through a private key generation center, and the systemparameters are disclosed; the user in the public key infrastructure environment and the user based on the identity encryption environment generate a public key and a private key respectively; whereinthe user in the public key infrastructure environment is a signer, the user based on the identity encryption environment is a verifier, the signer generates a signature and sends the signature to theverifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message; wherein the user based on identity encryption is a signer,the user in the public key infrastructure environment is a verifier, the signer generates a signature and sends the signature to the verifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message. According to the invention, the safety, correctness, non-repudiation and unforgeability of communication between the publickey infrastructure and the user based on the identity encryption environment are protected, and the safety and privacy requirements are met.
Owner:SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES

Migration data verification method for power dispatching automation system

The invention discloses a migration data verification method for a power dispatching automation system. The migration data verification method comprises the steps of selecting a new master station and an old master station corresponding to service migration of the power dispatching automation system, selecting some to-be-verified substation in the old master station, disconnecting a normal communication channel of the to-be-verified substation and the old master station and establishing a corresponding analog substation, enabling remote control points to be selected in the new master station and the old master station for the analog substation and serve as current remote control points, sequentially issuing a remote control selection command, a remote control execution command or a remote control revocation command according to the current remote control points, collecting original data of issued commands of the current new master station and the current old master station through the analog substation, checking and comparing the original data to finish data verification of every remote control point, and finally restoring the normal communication channel of the to-be-verified substation and the old master station. The migration data verification method can guarantee migration of the power dispatching automation system between the new master station and the old master station, and has the advantages of being quick in verification speed, high in verification efficiency, good in verification accuracy, and simple and practical.
Owner:STATE GRID CORP OF CHINA +1

Method for designing internal interface of real-time emulator of active power distribution network based on multi-FPGA (field programmable gate array)

A method for designing an internal interface of a real-time emulator of an active power distribution network based on multi-FPGA (field programmable gate array) comprises the following steps: 1) downloading information of each subsystem into the corresponding FPGA and initializing parameters of the internal interface; 2) setting emulation time t to be equal to 0 and starting emulation; 3) propelling the emulation time forwards by one step length, wherein t is equal to t plus delta t; 4) performing emulation calculation on each FPGA; 5) after performing serialization and channel distribution on to-be-transmitted data of each FPGA, converting the data into high-speed serial data by a high-speed transceiver and transmitting to the target FPGA; 6) receiving the high-speed serial data and converting into parallel data by the high-speed transceiver to further complete data splicing and deserialization; and 7) judging whether the emulation time reaches emulation ending time or not, ending emulation if the emulation time reaches the emulation ending time, otherwise, returning to the step 3). By the method, correctness and high efficiency of data communication in the emulator are realized while stability and universality of the internal interface of the emulator are guaranteed, and foundation is laid for real-time emulation of the active power distribution network based on multi-FPGA.
Owner:TIANJIN UNIV

Information search sequencing method based on index association relation

InactiveCN102163222AAchieving correctness and noise immunityWeaken errors interfere with resultsSpecial data processing applicationsPaper documentDocument preparation
The invention discloses an information search sequencing method based on an index association relation, which belongs to the field of information analysis and aid decision making. The method comprises the following steps of: creating a document database and an index library, and creating the association between the document database and the index library; taking related search terms of each document as the indexes of the document to form a document model of the document; before searching, forming a search model with the set of all the search terms, namely the indexes, provided by users; and calculating the similarity between the search model and the document model of each document in the document database, sequencing the documents in a descending order, and providing the sequenced documents for the users as the final search result. The information search sequencing method based on the index association relation has the benefit that the interference of the errors on the result can be weakened under the circumstance of taking the mistaken indexes as reasoning conditions, by integrating the prior association relation between the indexes, the correct indexes can participate in the reasoning operation according to the wrong index conditions, and consequently, the correctness and the interference immunity of the reasoning can be implemented.
Owner:中国医学科学院医学信息研究所

Entity word recognition result evaluation method, device and equipment and entity word extraction system

The embodiment of the invention provides an entity word recognition result evaluation method, device and equipment and an entity word extraction system. The method comprises: acquiring an entity wordrecognition result of a to-be-recognized document set, wherein the entity word recognition result is an entity word recognition result corresponding to any determined entity word recognition method byconducting entity word recognition on the to-be-recognized document set on the basis of at least one entity word recognition method; Determining a first weight of any to-be-evaluated entity word in the entity word recognition result corresponding to the at least one entity word recognition method in the to-be-recognized document set; And determining a second weight of any entity word to be evaluated based on the first weight of any entity word to be evaluated, the accuracy of the at least one entity word recognition method and the penalty coefficient of the at least one entity word recognition method, the second weight being used for evaluating any entity word to be evaluated. According to the scheme of the embodiment, the correctness of the entity word recognition result is judged through the second weight, and the entity word recognition effect is effectively improved.
Owner:XINHUANET CO LTD

Wireless communication-based distributed type automobile battery power supply control system and method

The invention discloses a wireless communication-based distributed type automobile battery power supply control system and method. The wireless communication-based distributed type automobile batterypower supply control system comprises a vehicle-mounted ECU (electronic control unit) which is connected in a wireless mode with an enterprise monitoring server, and the enterprise monitoring server is connected with a wireless mode with a national monitoring server and connected with a database; the vehicle-mounted ECU is connected with a BMS (battery management system) master controller; the BMSmaster controller is used for establishing wireless connection with a quick-change battery pack according to the frequency point data of the database and acquiring the battery pack data of the quick-change battery pack, and the battery pack data is transmitted to the national monitoring server through the vehicle-mounted ECU and the enterprise monitoring serer. The wireless communication-based distributed type automobile battery power supply control system achieves real-time uploading of the battery pack data to the enterprise monitoring server and the national monitoring server and further achieves battery pack data monitoring. The quick-change battery pack is high in power storage capacity, good in portability and reliable and safe in electric connection, and through random frequency divided connection, achieves communication independence and small interference.
Owner:力帆科技(集团)股份有限公司

Internet protocol version 6 (IPv6) based open shortest path first (OSPF) network routing information passive collection method and system

InactiveCN105306362AGuaranteed real-timeGuarantee the independence of message informationData switching networksIp addressWeb environment
The invention relates to the technical field of network measurement, and more particularly to an internet protocol version 6 (IPv6) based open shortest path first (OSPF) network routing information passive collection method and system. The method comprises steps that an adjacency relation between routers in an IPv6 network is established, only a Hello message is sent between the routers so as to maintain a necessary adjacency relation, when a certain router receives link state advertisement information, the router directly sends the link state advertisement information to an adjacent router; and if the OSPF network in the IPv6 network is a multi-autonomous domain OSPF network, a full adjacency relation is established between a collection device and the router in each autonomous domain, and a tag is arranged at the head of a collected message, wherein the tag identifies the IP address of a sender of the collected message, and an autonomous system (AS) number, in which the collected message is, is determined according to the correspondence between the IP address and the AS number. According to the method, the OSPF routing information of the ASs of a plurality of autonomous domains is collected; and the method can collect information in a passive manner, does not affect the network environment, and can collect information in real time.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products