Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37results about How to "Avoid huge workload" patented technology

Unmanned aerial vehicle UAV control law parameter adjusting method

The invention discloses an unmanned aerial vehicle UAV control law parameter adjusting method, and aims at providing a parameter adjusting method which is large in parameter adjusting freedom degree,capable of effectively improving system design efficiency and capable of saving cost. According to the technical scheme, the method comprises the steps that a Matlab is used as a tool, and a general control console, a pneumatic coefficient module, an engine module, an undercarriage, airplane wheels, a brake model, a pitch angle local controller at the balance point of the unmanned aerial vehicle,a six-degree-of-freedom airplane model and a general module library of a sensor model for building the control law of the unmanned aerial vehicle are generated; a field bus control system FCS selectsa set control mode to calculate a control law, an accelerator position instruction and a rudder deviation instruction according to a control instruction given by the general console, ,,sends the flight state parameters of the unmanned aerial vehicle, and directly fits the obtained controller parameters at the characteristic points to obtain a function of the controller parameters about the heightH and the Mach number M and a parameter adjustment control law of a continuous change law of the controller parameters along with the parameter variables in the whole situation.
Owner:CHENGDU AIRCRAFT INDUSTRY GROUP

Implementation method and system for SM3 algorithm in JAVA environment

The invention relates to the technical field of cryptogram and information safety, and discloses an implementation method and system for an SM3 algorithm in a JAVA environment. The implementation method specifically comprises the following steps that an adaptation layer for achieving algorithm replacement is developed based on a PKCS#11 standard; in the JAVA environment, when an application program calls a secure hash algorithm (SHA()-256 algorithm) in JAVA cryptography extension (JCE) through a programming interface of an encryption framework JCA standard, the adaptation layer directly calls the SM3 algorithm to achieve an application programming interface (API), operations and processing are carried out on data on which a hash algorithm needing to be carried out in a sublayer based on the SM3 algorithm, and thus the operation that the SHA-256 algorithm is replaced by the SM3 algorithm is achieved. The invention further discloses an implementation system for the SM3 algorithm in the JAVA environment. The algorithm ID of the SHA-256 algorithm is used for achieving the SM3 algorithm in the encryption framework JCA, the problem that a new algorithm cannot be added in the implementation of ready-made JCE is solved, and meanwhile the huge amount of workload for achieving new JCE and complex procedures for applying JCE authorized signatures are avoided.
Owner:中电科网络安全科技股份有限公司

Artificial crossing breeding method of water lilies

The invention discloses an artificial crossing breeding method of water lilies. The artificial crossing breeding method of the water lilies, provided by the invention, comprises the following steps: (1) collecting pollen; (2) collecting stigma mucus; (3) germinating the pollen in the stigma mucus; (4) selecting crossing parents; (5) artificially pollinating. According to the artificial crossing breeding method of the water lilies, provided by the invention, the characteristics that the amount of the stigma mucus is great and the stigma mucus can be separated are utilized, and suitable parentsare screened through the culture of the pollen in the stigma mucus at the early period so that the huge amount of work for blindly crossing and pollinating can be avoided; the flowering phase of the water lilies is long and a phenomenon that the flowering phases of male and female parents do not meet is avoided; the male parents are bagged in the field and the pollen is collected on site in a crossing process, so that the problem that the vitality of the pollen is reduced, caused by pollen storage, is avoided. The artificial crossing breeding method of the water lilies, provided by the invention, has important meanings of alleviating the labor intensity of breeding, improving the working efficiency of breeding and accelerating a water lily new variety breeding progress.
Owner:QINGDAO AGRI UNIV

Universal probabilistic safety assessment model conversion system

InactiveCN105678055AAutomatic and efficient identificationAutomatic and efficient processingInformaticsSpecial data processing applicationsDecompositionComputer science
The invention discloses a universal probabilistic safety assessment model conversion system. With respect to the universal probabilistic safety assessment model conversion system, general probabilistic safety assessment automatic modeling methods and rules are combined with decomposition processing of a rich text probabilistic safety assessment model, computer-assisted modeling of the probabilistic safety assessment model can be carried out to a system including common cause failures. The universal probabilistic safety assessment model conversion system mainly comprises three modules: a model processor analyzes and processes the probabilistic safety assessment mode of a given system, model information of the given system is converted and decomposed into a standard model unit; an automatic modeling expert knowledge base stores construction rules of a universal system probabilistic safety assessment model, design and flow information of the given system, and specific probabilistic safety assessment model check rules of the given system and input by the user; and a model checking device analyzes, checks and arranges the standard model unit, changes the error of the standard model unit, and supplements missing probabilistic safety assessment model information, and a perfect system probabilistic safety assessment model is obtained.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI

Automobile bumper full-aspect paint spraying workbench

InactiveCN108940661AAvoid the problem of uneven sprayingAvoid huge workloadSpraying apparatusEngineeringNozzle
The invention relates to an automobile bumper full-aspect paint spraying workbench, and belongs to the technical field of nozzle configuration or installation. The workbench comprises a working table,wherein a transmission mechanism and a paint spraying device are arranged on the working table; the transmission mechanism comprises a first conveying belt, a first conveying chain, a second conveying belt, a second conveying chain and a third conveying belt, wherein the first conveying belt, the second conveying belt and the third conveying belt are horizontally placed, the first conveying chainand the second conveying chain are vertically placed, the first conveying chain is arranged between the first conveying belt and the second conveying belt, and the second conveying chain is arrangedbetween the second conveying belt and the third conveying belt; and the paint spraying device comprises a first spray gun, a second spray gun, a third spray gun, a fourth spray gun, and the first spray gun, the second spray gun, the third spray gun and the fourth spray gun are arranged right above the first conveying belt, the first conveying chain, the second conveying belt and the second conveying chain respectively. According to the technical scheme, the problem that automobile bumpers cannot be painted in batches in the prior art is solved, and the practicability is high.
Owner:宁波高新区意川汽车零部件有限公司

Glass covered wire insulating layer stripping device and method

The invention discloses a glass covered wire insulating layer stripping device and a glass covered wire insulating layer stripping method. The device comprises a dust containing device, wherein first through holes penetrating through two end faces of the dust containing device are formed in the dust containing device; one end of the dust containing device is internally connected with a transmission mechanism and the other end of the dust containing device is externally connected with an annular middle fixed part; the annular middle fixed part is provided with a groove penetrating through a first surface of the annular middle fixed part, and a second through hole penetrating through a second surface of the annular middle fixed part; the groove and the second through hole are coaxially arranged; the second through hole is overlapped with the first through holes; the groove is internally and fixedly provided with a tooth milling tool; the tooth milling tool is provided with three third through holes which penetrate through two relative surfaces of the tooth milling tool and are communicated with one another; and a crescent tool edge is arranged at the engaged part of the two third through holes, and the third through holes are communicated with the second through holes. With the adoption of the glass covered wire insulating layer stripping device, automatic stripping of glass covered wire insulating layers can be carried out by manually controlling the transmission mechanism so that the working efficiency is improved, and the problem that the health of human bodies is influenced by splashed dust is solved.
Owner:WUHAN NARI LIABILITY OF STATE GRID ELECTRIC POWER RES INST

A method and system for realizing sm3 algorithm in java environment

The invention relates to the technical field of cryptogram and information safety, and discloses an implementation method and system for an SM3 algorithm in a JAVA environment. The implementation method specifically comprises the following steps that an adaptation layer for achieving algorithm replacement is developed based on a PKCS#11 standard; in the JAVA environment, when an application program calls a secure hash algorithm (SHA()-256 algorithm) in JAVA cryptography extension (JCE) through a programming interface of an encryption framework JCA standard, the adaptation layer directly calls the SM3 algorithm to achieve an application programming interface (API), operations and processing are carried out on data on which a hash algorithm needing to be carried out in a sublayer based on the SM3 algorithm, and thus the operation that the SHA-256 algorithm is replaced by the SM3 algorithm is achieved. The invention further discloses an implementation system for the SM3 algorithm in the JAVA environment. The algorithm ID of the SHA-256 algorithm is used for achieving the SM3 algorithm in the encryption framework JCA, the problem that a new algorithm cannot be added in the implementation of ready-made JCE is solved, and meanwhile the huge amount of workload for achieving new JCE and complex procedures for applying JCE authorized signatures are avoided.
Owner:中电科网络安全科技股份有限公司

Determination method for optimal thickness of protection layer reserved for retaining piles in deep foundation pit blasting construction

InactiveCN106592604BEnsure safetyAccurately guide the constructionFoundation testingExcavationsElement modelPeak value
The invention discloses a determining method for the optimum thickness of a guard post reserved protection layer in deep foundation pit blasting construction. The number of to-be-optimized thicknesses of the optimum thickness delta of the reserved protection layer (2) is set to be n+1 within the optimal range of the optimum thickness delta of the reserved protection layer (2); then according to a blasthole (3), explosive (4), the n+1 to-be-optimized thicknesses of the optimum thickness delta of the reserved protection layer (2) and a finite element model of a guard post (1), the pressure peak Fci and the tension peak Fti applied to the guard post (1) under the action of the blast load are obtained sequentially; and then the pressure peak Fci is compared with the compression bearing capacity [Fc] of the guard post (1), the tension peak Fti is compared with the tension capacity [Ft] of the guard post (1), and the corresponding i to-be-optimized thickness delta i which first meets the requirements that the pressure peak Fci is smaller than the compression bearing capacity [Fc] and the tension peak Fti is smaller than the tension capacity [Ft] is the optimum thickness delta of the reserved protection layer (2). The determining method can meet the actual bearing requirement and can also ensure the excavation safety of a deep foundation pit, high efficiency and maximum benefit.
Owner:WUHAN UNIV OF SCI & TECH

An on-line monitoring system and monitoring method for the temperature of the intermediate joint of buried cables

The invention relates to an on-line temperature monitoring system and method for power cables, in particular to an on-line temperature monitoring system and method for intermediate joints of a buried cable. The monitoring system is composed of wireless sensor nodes, TEGs, a wireless temperature measurement concentrator and a monitor center, wherein the intermediate joints of the buried cable are located below cable work wells; the wireless sensor nodes and the TEGs are installed on the outer surfaces of the intermediate joints of the buried cable; the wireless temperature measurement concentrator is installed in a switching station or a ring main unit or a cable branch box at a cable terminal or a branch joint; an antenna of the wireless temperature measurement concentrator extends into a cable channel to collect monitor data of the wireless sensor nodes and send the monitor data to the monitor center through a GPRS or an optical fiber. According to the on-line temperature monitoring system and method for the intermediate joints of the buried cable, the TEGs and an energy collector are adopted to convert temperature difference into electric energy to be supplied for a wireless sensor, and at the same time, the monitor data are collected in a wireless mode; the wireless sensor nodes work in a low-power dissipation mode, and therefore the power dissipation of the whole monitoring system is reduced.
Owner:STATE GRID CORP OF CHINA +2

Pre-embedded fixing device and embedding method for single-hole multi-point pore water piezometer

A single-pore multi-point pore water pressure meter embedding fixing device and an embedding method thereof are disclosed. The device comprises a fixing component, a connecting component and a container, wherein the fixing component consists of a plurality of hanging rods; each hanging rod is provided with a vent hole; two ends of each hanging rod are provided with a screw thread and a sleeve; and one side of each hanging rod is provided with a guidance sliding chute. The connecting component consists of a connecting plate and a supporting plate. The supporting plate is provided with a vent hole. One side of the connecting plate is inserted into the guidance sliding chute; the other side is fixed with an annular hoop. A pore water pressure meter is installed inside the annular hoop. The container for containing water to dip the pore water pressure meter is arranged on the supporting plate. A lead wire hole is arranged on the top of the container for containing water. A pulling wire is arranged on the lead wire of the pore water pressure meter. A signal cable of each pore water pressure meter is led outside a monitoring hole upwardly. The single-pore multi-point pore water pressure meter embedding fixing device solves the problem that the pore water pressure meter in the single-hole multi-point manner is easy to deflect; accordingly, with the application range being enlarged, the single-pore multi-point pore water pressure meter embedding fixing device has the advantages of short device embedding time, low construction cost, low construction difficulty, high monitoring precision, reliable long-term monitoring data, or the like.
Owner:NANJING HYDRAULIC RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products