Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

240results about How to "Avoid performance loss" patented technology

Intelligent resource optimization method of container cloud platform based on load prediction

The invention discloses an intelligent resource optimization method of a container cloud platform based on load prediction, and belongs to the field of container cloud platforms. The method comprisesthe following steps of: based on a grayscale model, predicting the load condition of the next time window of each container instance according to the historical load of the container instance; judgingwhether the load of a node is too high or too low according to the load prediction value of all containers on each physical node; then executing the corresponding scheduling algorithm, migrating somecontainers on the node with over high load to other nodes, so that the load of the node is in a normal range; migrating all container instances on the node with over low load to other nodes so that the node is empty. According to the invention, aiming at the problem that the resource utilization is not balanced and the resource scheduling is delayed in a prior data center, load forecasting analysis is introduced, the load of the data center is scheduled and optimized in advance, the performance loss caused by the over high load of the node and the low resource utilization rate caused by the over low load are avoided, thereby improving the resource utilization efficiency of the platform.
Owner:杭州谐云科技有限公司

Liquid cooling temperature control and management method of power lithium ion battery

The invention discloses a liquid cooling temperature control and management method of a power lithium ion battery. The liquid cooling temperature control and management method comprises the steps of: 1) acquiring temperature and current; 2) obtaining a highest temperature value, a lowest temperature value, greatest temperature difference and liquid cooling system inlet and outlet temperature difference; 3) judging whether the current is large or not and computing a working state 1; 4) judging whether the temperature of the battery is high or not, computing a working state 2; 5) judging whether temperature difference of the battery is too great or not and computing a working state 3; 6) judging whether the outlet temperature of a battery pack is too high or not and computing a working state 4; 7) judging whether the temperature difference of circulating medium at the inlet and outlet of the battery pack is too great or not and computing a working state 5; and 8) comparing the computed working state 1, the working state 2, the working state 3, the working state 4 and the working state 5 to obtain a working state with the best heat dissipation effect for setting. The liquid cooling temperature control and management method of the power lithium ion battery solves the problems that the temperature of the battery is too high and the local temperature difference is too great, and has the beneficial effects that the performance of the battery is improved and the service life of battery is prolonged.
Owner:SHANGHAI AEROSPACE POWER TECH

Compressed spectrum sensing method based on autocorrelation matrix reconstitution

The invention provides a compressed spectrum sensing method based on autocorrelation matrix reconstitution and mainly solves the problem that an existing sensing algorithm is high in sampling speed and large computation overhead. The compressed spectrum sensing method comprises that a secondary user obtains an observation sequence of a frequency spectrum environment through compressed sensing and obtains an autocorrelation matrix estimated value of Nyquist sampling by utilizing autocorrelation vector quantity of a autocorrelation matrix reconstitution Nyquist sample sequence of the observation sequence; a multi-signal classification MUSIC algorithm is adopted to obtain an estimated value of occupied channel number according to a characteristic value of the autocorrelation matrix estimated value; a characteristic spectrum is constructed according to the characteristic value and the estimated value of the occupied channel number, spectral amplitude values corresponding to characteristics of channels are added to obtain a sum, and mark numbers of the occupied channels are judged. By means of the compressed spectrum sensing method, the sampling speed of a secondary user receiving machine can be reduced, algorithm complexity at the reconstitution end is low, and spectral amplitude occupying situation in a cognitive radio system can be judged quickly.
Owner:XIDIAN UNIV

Transaction execution method and device, computer equipment and storage medium

ActiveCN111159252AImprove transaction execution efficiencyAvoid performance lossDatabase distribution/replicationSpecial data processing applicationsConcurrency control algorithmsConcurrency control
The invention discloses a transaction execution method and device, computer equipment and a storage medium, and belongs to the technical field of databases. According to the invention, node equipmentresponds to the conflict query request of coordination node equipment for the target transaction; whether a conflict transaction of the target transaction exists in the node equipment or not is inquired to obtain query result information, wherein the operation objects of the conflict transaction and the target transaction comprise the same data item; and the query result information is sent to coordination node equipment, responding to a global submission request for the target transaction sent by the coordination node equipment under a target condition, the target transaction is subjected toglobal submission; and the target condition is used for representing that the conflict transaction of the target transaction does not exist in the database system, so that the concurrency control algorithm does not need to depend on distributed deadlock, the performance loss caused by the distributed deadlock is avoided, and the transaction execution efficiency of the database system is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Intelligent charging pile peak-hour-avoiding charging method and intelligent charging pile system

The invention discloses an intelligent charging pile peak-hour-avoiding charging method and an intelligent charging pile system. The intelligent charging pile peak-hour-avoiding charging method comprises the following steps that S1, charging demand information set by a user is received, wherein the charging demand information comprises vehicle use time, target electric quantity and start time; S2,the current remaining electric quantity information of a vehicle is acquired, and the charging time required for charging is calculated to reach the target electric quantity according to the chargingpile power; and segmented electricity price information of the location of the time span from the starting time to the vehicle using time, and the segmented electricity price information is arrangedfrom low to high to obtain corresponding time segments; S3, a charging time period scheme is selected according to the sequence from the lower segment price to the next lower segment price until the total time of the selected charging time period scheme is equal to the required charging time period; and S4, charging operation is implemented according to the selected charging time period scheme. According to the set charging conditions, the intelligent charging pile peak-hour-avoiding charging method automatically plans a peak-hour-avoiding charging time period scheme, the power grid burden ofpeak power consumption is reduced, and the charging cost of the user is reduced.
Owner:SHANGHAI POWERSHARE TECH LTD

Warrantable privacy protection space crowdsourcing task distribution system and method

The invention discloses a warrantable privacy protection space crowdsourcing task distribution system and method, and the system comprises an SC server, an encryption service provider, a space task requester, and workers. The encryption service provider generates a secret key, and employs a Paillier password and ElGamal password system. The space task requester creates a space task, and returns the position of the task to the SC server. The SC server encrypts the position of the task, and each worker calculates the distance between the position of the task and the position of the worker. The speed of each worker is encrypted and transmitted to the SC server, and each worker calculates the travel time of his own, and encrypts the travel time and transmits the encrypted travel time to the SC server. The SC server calculates the winning workers through the encryption service provider, and the encryption service provider enables the winning worker set comprising a plurality of winning workers to be encrypted and returned to the SC server. The SC server encrypts the position of the task, and broadcasts the encrypted position of the task to all workers, and the winning workers arrive at the specified position to execute the task. According to the invention, the system achieves the double-side privacy protection in the space crowdsourcing, greatly reduces the calculation, and can guarantee that the task is accepted at high probability.
Owner:SHENZHEN UNIV

Function execution timeout and deadlock detection method based on dynamic tracking of operating period

ActiveCN104636259ADoes not affect the operating logicPerform tracking work normallySoftware testing/debuggingInformation objectRunning time
The invention relates to the technical fields of computers. A function execution timeout and deadlock detection method based on dynamic tracking of an operating period comprises the following steps: A, a section of tracking code is inserted in operating inlets of to-be-detected functions, the current operating threads of the to-be-detected functions are distinguished, characteristic information of the to-be-detected functions in operation is registered, and reference data of characteristic information objects are returned to the to-be-detected functions for temporarily saving; B, corresponding tracking codes are also inserted in operating outlets of the to-be-detected functions, and according to the access information of the characteristics information objects returned in A, the characteristic information objects of the to-be-detected functions are unregistered from the data structures of the current operating threads; and C, an independent monitor thread is established in the process, wherein the time count of the to-be-detected functions exceeds the first-stage time count threshold, which means that the operating time of the to-be-detected functions is too long, namely timeout, is proved; however, the time count of the to-be-detected functions exceeds the second-stage time count threshold, which means that the operating time of the to-be-detected functions is too long, namely timeout. The method can judge the timeout and deadlock effectively.
Owner:XIAMEN YAXON NETWORKS CO LTD

Arithmetic logic unit using asynchronous circuit to implement

The invention relates to an arithmetic logic unit which is realized by adopting an asynchronous circuit. The arithmetic logic unit includes a functional unit which receives the calculation control command and input data of a transmitting end and implements the arithmetic logic calculation of the input data; a timelag evaluation unit which carries out timelag evaluation according to the type of the calculation control command and the detail input data received by the functional unit; a timelag matching unit which selects a calculation timelag matched with the functional unit; a handshake protocol unit which controls the transmitting end to generate a request signal simultaneously when the transmitting end transmits the input data to lead the input to be synchronous. The handshake protocol unit informs a receiving end to take out the output data of the functional unit after the calculation timelag and controls the receiving end to generate a reply signal to lead the output to be synchronous. The arithmetic logic unit of the invention has the characteristic of high property, overcomes the property loss of a synchronous circuit which can only realize the timelag of the worst situation; has the characteristic of low power consumption and saves the circuit area.
Owner:RESEARCH INSTITUTE OF TSINGHUA UNIVERSITY IN SHENZHEN

Malicious code analysis method and system under Linux platform

ActiveCN104102878AImplement dynamic loadingAccurate and useful monitoring informationPlatform integrity maintainanceVirtual file systemGNU/Linux
The invention provides a malicious code analysis method and system under a Linux platform. According to the method and the system provided by the invention, dynamic loading can be realized by using an LKM (Loadable Kernel Module) technology, a position of intercepting system call is positioned between a VFS (Virtual File system) layer and a detailed file system so as to acquire more information related to file operation and provide more accurate and useful monitoring information. The system call can be intercepted without the need of correcting a system call table, so that the potential safety hazards brought by the traditional method of correcting the system call table are avoided; a shared memory mechanism is adopted to increase the communication speed of a kernel module and a user progress, and the data volume of communication transmission; key files and progresses needing to be monitored are selected by a user so as to improve the usability, the flexibility and the high efficiency of the system, and the demands of the user on malicious code analysis are well met; the selected malicious code progresses and a plurality of important key files are monitored so as to avoid great performance loss of the system and improve the operation speed of the analysis system.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Rate matching method and device

The application discloses a rate matching method. The method comprises the following steps: network equipment determines transmission bit rate R, wherein R is equal to K/M, K relates to the length of an information bit, M relates to the length of a target code, and K and M are positive integers; if the transmission bit rate R is greater than or equal to a first bit rate threshold, the network equipment determines to adopt a shortening mode for a bit sequence of which the length is N, and if the transmission bit rate R is smaller than the first bit rate threshold, the network equipment determines to adopt a punching mode for the bit sequence of which the length is N, N is the length of a mother code and is a positive integer; the network equipment performs Polar coding for the bit sequence of which the length is N by adopting a polar code to obtain a first coded sequence of which the length is N, and the network equipment performs shortening or punching for the first coded sequence to obtain a second coded sequence of which the length is M. The application also provides rate matching equipment corresponding to the method. By adopting the above method and equipment, the punching/shortening mode can be flexibly selected, and the performance loss caused by the punching/shortening process can be overcome.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products