Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

100results about How to "Avoid data redundancy" patented technology

Method and system for realizing data sharing between power distribution main station system and power distribution GIS (Geographic Information System)

The invention discloses a method for realizing data sharing between a power distribution main station system and a power distribution GIS (Geographic Information System). The method comprises the following steps of: establishing a pattern model: establishing a corresponding model scanning file and a figure scanning file for power equipment belonging to a power distribution grid in the GIS; exporting files: exporting the model scanning file and the figure scanning file into a model information file in the format of xml and a pattern information file in the format of SVG (Video Graphics Array) which follows the IEC 61970/IEC 6196I standard; transmitting files: transmitting the exported model information file and the pattern information file from the GIS to the main station system; and converting files: after the main station system receives the model information file and the pattern information file, converting the files into a model file and a pattern file of private formats of the main station system for saving respectively. The invention further discloses a system for realizing data sharing between a power distribution main station system and a power distribution GIS. By adopting the method and the system, system combination and data sharing inside a power grid information system can be realized effectively, and the investment and maintenance costs are lowered greatly.
Owner:广东电网公司深圳供电局

Verification code input method and device

The invention provides a verification code input method and device, and the method comprises the steps: reading a short message; judging whether the short message is matched with a target application which needs to receive a verification code or not when the short message contains the verification code; enabling the verification code in the short message to be filled in a system paste board when the short message is matched with the target application, and adding privacy authority, wherein the privacy authority is used for shielding other applications different from the target application; and enabling the verification code in the system paste board to be filled in a verification input frame of the target application. In conclusion, the method can automatically analyzes the verification code, matched with the target application which needs to receive the verification code, from the content of the short message, and fills the verification code into the corresponding verification input frame. A user does not need to specially search the verification code from the short message, so the method and device are relatively simple in operation. In addition, the method adds privacy authority to the content of the system paste board, thereby preventing the leakage of the privacy of the user.
Owner:XIAOMI INC

Mobile agent acquisition and storage method suitable for Internet of things

The invention relates to a mobile agent acquisition and storage system suitable for Internet of things, which is an acquisition and storage scheme applied to the Internet of things and is mainly used for solving the problems of large data transmission quantity, complex network task and the like under the environment of the Internet of things. The mobile agent storage and management system suitable for the Internet of things is developed and has the characteristics that: a multimedia node acquires image information in real time and stores the image information in a local storage space module; an interaction agent is generated by nodes, carries the image information identifier and the storage space information of the node, performs interaction on nodes in a traversal cluster and allows an acquisition node to adjust the working state per se according to the storage space information of other nodes; an inquiry agent is generated by user parameters and comprises all inquiry parameter information; after receiving the inquiry agent, a cluster head node generates a return agent traversal node according to task parameters and returns a matched image block to the cluster head node through the acquisition node; and the cluster head node directly returns an identifier-attached image block to a base station server and performs image fusion through a terminal so as to form a complete and clear monitoring area image.
Owner:NANJING UNIV OF POSTS & TELECOMM

Multi-time scale convolutional neural network soft measurement method based on attention mechanism

The invention relates to a multi-time scale convolutional neural network soft measurement method based on an attention mechanism, and belongs to the technical field of soft measurement. The method comprises the following steps: 1, determining an auxiliary variable, carrying out data processing, selecting an easily-measured variable related to a difficult-to-measure parameter as the auxiliary variable of a soft measurement model, and collecting a time sequence of the auxiliary variable and the difficult-to-measure parameter; abnormal value elimination is carried out on the collected time sequence; 2, selecting an attention mechanism and an attention area, and dividing the attention area according to the time delay and the effective time scale of each auxiliary variable relative to the difficult-to-measure parameters; 3, constructing the input of a soft measurement model, forming a matrix by the time sequence of each auxiliary variable, and determining the input of the soft measurement model by combining the attention area of the attention mechanism; 4, establishing a time sequence convolutional neural network soft measurement model; 5, training a time sequence convolutional neural network soft measurement model; and 6, carrying out real-time estimation on unmeasured parameters by utilizing the time sequence convolutional neural network model trained in the step 5.
Owner:YANSHAN UNIV

Data subscription and distribution method applicable to delay-tolerant and disconnection-tolerant network

The invention relates to the field of data distribution, in particular to a data subscription and distribution method applicable to a delay-tolerant and disconnection-tolerant network. The method is achieved through the technical scheme. According to the technical scheme, the data subscription and distribution method applicable to the delay-tolerant and disconnection-tolerant network includes the steps that first, information source nodes perform data packet code issuing; second, relay nodes perform code forwarding; third, an information sink issues a theme subscription packet; fourth, the theme subscription packet is processed by the relay nodes; fifth, the relay nodes perform congestion control processing on a theme data issuing table and a theme information subscription table; sixth, information sink nodes perform data decoding; seventh, ACK data packets are processed by the relay nodes. Through the method, a network code transmission mechanism, a data subscription and distribution mechanism and functions such as a data congestion control function are fused, and the function of data distribution in a delay-tolerant and disconnection-tolerant network environment is achieved.
Owner:湖北交通职业技术学院

Multi-end cooperative bullet screen message blocking method, storage medium, equipment and system

The invention discloses a multi-terminal cooperative bullet screen message blocking method, a storage medium, equipment and a system, and relates to the technical field of internet mobile terminal application development. The method comprises the steps that an anchor end sends sensitive words added by the anchor to a server for storage, and obtains a sensitive word library from the server for storage; a user end obtains a corresponding sensitive word library when the user enters a live broadcast room; when the user is about to send a bullet screen message, the bullet screen message is comparedwith the sensitive word library, and if the bullet screen message contains sensitive words, the user is forbidden from sending the bullet screen message; each time the anchor end receives one bulletscreen message, the bullet screen message is compared with a locally stored sensitive word library, and if the bullet screen message contains sensitive words, the bullet screen message can be blocked.According to the method and device, the blocking process of the sensitive word bullet screen messages can be transmitted to the user end and the anchor end for cooperative processing, so that the pressure of the server is greatly reduced, the service quality of the server is high, and the user experience is good.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Data inquiry method and system

ActiveCN106202361AImprove data transfer efficiencyAvoid data redundancy and transmission channel congestionSpecial data processing applicationsClient-sideData transmission
The invention discloses a data inquiry method and system. The method comprises the following steps: adding an interface module into a database server; setting a static protocol base for storing static inquiry protocols, wherein the static inquiry protocols correspond to data in the database server; sending a first inquiry request to the database server by a client server, wherein the first inquiry request carries a first inquiry protocol; inquiring whether the static inquiry protocol matched with the first inquiry protocol is stored in the static protocol base or not by the interface module; if so, acquiring data corresponding to the static inquiry protocol matched with the first inquiry protocol and transmitting the data to the client server; otherwise, rejecting the first inquiry request. By adopting the data inquiry method and system, the disadvantages in the prior art that data redundancy and blocked transmission channels are caused when a client and a target source server are in interface butt joint are overcome; and an interface model and a customer server are matched and the aim of data slimming by utilizing the static inquiry protocols and dynamic inquiry protocols is realized, so that the data transmission efficiency is improved.
Owner:SHANGHAI CTRIP COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products