Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

200results about How to "Increase aggressiveness" patented technology

Method and apparatus for monitoring drug effects on cardiac electrical signals using an implantable cardiac stimulation device

An implantable cardiac stimulation device, such as a pacemaker or Implantable Cardioverter Defibrillator, is configured to automatically monitor the effects of antiarrhythmic drugs on cardiac electrical signals within a patient to verify the efficacy of the drugs taken. In one example, an analysis of patient cardiac electrical signals is performed by comparing the cardiac electrical signals with values representative of the effects of different classes of antiarrhythmic drugs. If the implantable device determines that the prescribed antiarrhythmic drugs have not been effective, a warning signal is generated. The warning signal is conveyed directly to the patient via a bedside monitor and to the patient's physician via remote connection to an external programmer device so that both are notified of the drug efficacy problems. Additionally, the implantable device may be configured to automatically adjust pacing and defibrillation control parameters in an attempt to compensate for any lack of efficacy in the drugs. For example, the aggressiveness of overdrive pacing may be increased. Alternatively, a drug pump is controlled to adjust the dosage of antiarrhythmic drugs if an initial dosage is found to be ineffective.
Owner:PACESETTER INC

AES (Advanced Encryption Standard)-based encryption method and device

The invention provides an AES (Advanced Encryption Standard)-based encryption method and device. The method comprises the following steps: firstly, acquiring to-be-encrypted data and a preset key of astandard AES algorithm; secondly, generating a digit number r of cyclic shift, converting the to-be-encrypted data into a first plaintext square matrix, and converting the preset key into a first keysquare matrix; thirdly, cyclically shifting the column of the first plaintext square matrix leftwards by r digits to acquire a second plaintext square matrix subjected to cyclic leftward shifting, and cyclically shifting the column of the first key square matrix leftwards by r digits to acquire a second key square matrix subjected to cyclic leftward shifting; fourthly, performing AES encryption on the second plaintext square matrix based on the second key square matrix to acquire a first output square matrix, wherein during the performing of the AES encryption, a differential energy consumption analysis-resistant side channel protection method is combined; and finally, cyclically shifting the first output square matrix rightwards by r columns to acquire a second output square matrix, wherein the second output square matrix is used as an encryption result. The AES-based encryption method achieves a technical effect of enhancing the side channel attack resistance.
Owner:WUHAN UNIV

Image encryption method based on L-F cascade chaos and 3D bit scrambling

The invention discloses an image encryption method based on L-F cascade chaos and 3D bit scrambling. Image encryption is mainly divided into two steps: (1) 3D bit scrambling encryption and (2) diffusion operation. A novel L-F cascade chaos is constructed, the problem that a blank window exists due to uneven distribution of Logistic is solved while the rapidity of the Logistic is guaranteed, the chaos interval and number of parameters are increased, the secret key space is increased, and the exhaustion attack resistance of the system is improved. According to the method, the randomness of scrambled ciphertext is improved by adopting a 3D cyclic shift bit scrambling mode, and the problem that a bit scrambling sequence is insensitive is solved. According to the method, high-order informationcontaining a large amount of plaintext information and low-order information containing a small amount of plaintext information are separately scrambled, so that the noise attack resistance of the system is improved. According to the encryption system, the plaintext SHA-256 is used for carrying out strong association on the chaotic key, so that the plaintext sensitivity and the capability of resisting the attack of the selected plaintext are effectively improved.
Owner:QIQIHAR UNIVERSITY

Security hybrid encryption method based on narrowband Internet of Things

The invention provides a security hybrid encryption method based on narrowband Internet of Things, which comprises the following steps of carrying out lightweight identity authentication on each terminal and a server, and realizing the identity authentication of the terminal and the transmission of an initial key and an initial IV vector by using unidirectional asymmetric encryption in the lightweight identity authentication, and after the identity authentication of the terminal succeeds, performing encryption communication between the terminal and the server by adopting a dynamic symmetric encryption and decryption algorithm, so that the symmetric encryption and decryption algorithm uses different symmetric keys and different structural parameters in each time of encryption communicationof each terminal. Lightweight identity recognition is adopted; on the basis of ensuring the security, the authentication time and the calculation consumption are greatly reduced, a dynamic symmetric encryption and decryption algorithm is adopted, a symmetric key and a set of structural parameters are ensured to be set at a time, the structural parameters of the algorithm are changed in a nonlinearmode under the condition that the large structure is not changed, and the capacity of the algorithm for resisting side channel attacks such as energy analysis is improved.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Invisible aircraft carrier with high combat power and survivability

The invention discloses an invisible aircraft carrier with high combat power and survivability. The invisible aircraft carrier is characterized in that: firstly, width of a flight deck is greatly reduced, the flight deck and the aircraft carrier body below the deck are changed to be more regularly strip-shaped, the surrounding outer surface of the aircraft carrier body is made into a structure that large areas of outward bent and inward bent planes are crossed, and an invisible material is additionally adhered to the outer surface of the aircraft carrier body or an invisible coating is additionally coated on the outer surface of the aircraft carrier body; secondly, an aircraft hangar with width of 40m and length of 200-300m is made on the lower part of the flight deck; or a vertical two-layer aircraft hangar is made below the aircraft carrier surface of a middle rear part so as to greatly increase the number of aircrafts carried by the aircraft hangar; thirdly, 4-5 flight flying and receiving hatchways are formed on the tail part of the flight deck and on two side edges or in the center of the aircraft carrier surface of the middle front part, and the aircraft carrier surfaces on the front parts of the four aircraft flying and receiving hatchways on the side edge of the flight deck are provided with catapults, or the forefront part of the aircraft carrier body is provided with a flying deck; and fourthly, the upper part of the flight deck on the aircraft carrier surface for landing and receiving aircrafts is provided with four or more arrester wires, and the aircraft carrier surface on the ahead part is provided with a barrier net. Thus, the aircraft carrier with high combat power and high invisibility can be made.
Owner:郭宏斌

Imperceptible watermark attack method based on residual learning, storage medium and electronic device

PendingCN113379584AReduce content changesGuaranteed high imperceptibilityImage watermarkingNeural architecturesLearning machineData set
The invention provides an imperceptible watermark attack method based on residual learning, a storage medium and an electronic device. The method comprises the steps: constructing a watermark attack model based on a convolutional neural network, carrying out the end-to-end nonlinear learning between a watermark-containing image and a watermark-free image, mapping the watermark-containing image to the watermark-free image, and carrying out watermark attack; selecting a proper number of feature extraction blocks according to the embedded area of the watermark information to extract a feature map containing the watermark information; introducing a residual learning mechanism to improve the convergence speed and learning ability of a watermark attack model, and improving the imperceptibility of an attacked image by reducing the difference between a residual image and the watermarking-free image; and constructing a data set for training a watermark attack model according to a DIV2K2017 super-resolution data set and a robust color image watermark algorithm based on a quaternion exponential moment. The watermark attack model provided by the invention can attack a robust watermark algorithm at a high bit error rate on the premise of not destroying the visual quality of a watermark-containing image.
Owner:DALIAN MARITIME UNIVERSITY

Toy gyro good in defensiveness

The invention provides a toy gyro good in defensiveness. The toy gyro comprises a spiral cover, a spiral sheet, a spiral base and a hillock point, and is characterized by further comprising an elastic shock absorption piece for buffering impact force when the gyro is impacted. The shock absorption piece is provided with an elastic part used for resisting impact and a connection part fixedly connected with the spiral base. The elastic part is located on the periphery of the spiral base through fixed connection of the connection part and the spiral base, and therefore when the gyro competes with other gyros and the other party impacts on the elastic part, impact force will be reduced due to elastic deformation of the elastic part; thus, the shock absorption effect is achieved to make the gyro rotate stably, anti-impact force is produced and returned to the other party at the same time to interfere the other party, and accordingly the win rate of the gyro is improved. The toy gyro is strong in interestingness, the elastic property of the elastic shock absorption piece can be changed by a player according to judgments so as to achieve a better anti-impact effect, the method to play the toy gyro is novel, the toy gyro can attract more players, and manipulative ability and competitive ability of children can be trained at the same time.
Owner:ALPHA GRP CO LTD +2

ASN (attack security interaction) and implementation method thereof

The invention discloses an ASN (attack security interaction), which belongs to the technical field of network communications and is used for solving the problem that the self-protection capacity of a network service end in the prior art is too weak. The ASN comprises a service end, a client-side and a user host machine, wherein the service end and the client-side are in a mapping relation; the client-side and the user host machine are in a mapping relation; a system management module, an exception handling module, a protocol processing module and a data storage are embedded in the service end; an instruction execution module is embedded in the client-side; the data storage, the exception handling module and the instruction execution module are directly connected with the system management module and controlled by the system management module; and the protocol management module is respectively connected with the exception handling module and the instruction execution module. The invention also provides an implementation method of the ASN. By using the implementation method of the ASN, the active defense and attack of the service end and the client-side is implemented, the network safety is improved, and the practical value is very high.
Owner:成都飞鱼星科技股份有限公司

Air-breathing premixed carbon dioxide pneumatic laser driven by continuous rotary detonation combustion

ActiveCN110718843ADetonation combustion achievedDetonation combustion hasLaser detailsCombustion chamberFlight vehicle
The invention discloses an air-breathing premixed carbon dioxide pneumatic laser driven by continuous rotary detonation combustion. The laser comprises an air-breathing continuous rotary detonation combustion device, a transition section, a CO2 pneumatic laser generation device and an exhaust section. The air-breathing continuous rotary detonation combustion device is used for generating a high-temperature and high-pressure fuel gas heat source serving as total energy for downstream output laser, and comprises a center body and a cylindrical shell. The center body comprises an air inlet cone part, a large cylinder part, a small cylinder part and a tail cone part which are sequentially arranged from front to back. An air inlet channel is formed by a gap between the air inlet conical part and the front-end conical shell, and a rotary detonation combustion chamber is formed by a gap between the small cylindrical part and a rear-end cylindrical shell. The laser is applied to an air-breathing aircraft, and the air-breathing continuous rotary detonation combustion device is adopted as a pumping source; the generated laser is high in efficiency, and energy is saved. The same air-breathingcontinuous rotary detonation combustion device is adopted without increasing the load, so not only can thrust be generated, but also laser can be generated.
Owner:PLA PEOPLES LIBERATION ARMY OF CHINA STRATEGIC SUPPORT FORCE AEROSPACE ENG UNIV

Premixed carbon dioxide pneumatic laser driven by combustion of continuous rotary detonation rocket

ActiveCN110707521AImprove cycle efficiencyRealize burning and producing lightLaser detailsCombustion chamberEngineering
The invention discloses a premixed carbon dioxide pneumatic laser driven by the combustion of a continuous rotary detonation rocket. The premixed carbon dioxide pneumatic laser comprises a continuousrotary detonation combustion device, a transition section, a CO2 pneumatic laser generation device and an exhaust section. The continuous rotary detonation combustion device is used for generating a high-temperature and high-pressure fuel gas heat source as a total energy source of downstream output laser and comprises a shell, a central cone, a rotary detonation combustion chamber and an injection panel, the transition section enables the fuel gas behind the combustion device to adapt to configuration changes, and enables the fuel gas to stably flow to the front of an array spray pipe with the total pressure loss as small as possible, the CO2 pneumatic laser generating device comprises the array spray pipe and an optical cavity, and the exhaust section enables a product gas after light emitting to be rapidly exhausted to the outside. The continuous rotary detonation rocket combustion device is adopted as a pumping source, so that the produced laser is high in efficiency, and the energy is saved. The premixed carbon dioxide pneumatic laser can be used on a rocket or an aircraft boosted by a rocket, and not only can generate thrust, but also can generate laser without increasing theload, and can also be used as a high-power continuous intense laser light source on the ground.
Owner:PLA PEOPLES LIBERATION ARMY OF CHINA STRATEGIC SUPPORT FORCE AEROSPACE ENG UNIV

Mouth-open feed for rearing calves and preparation method for mouth-open feed

The invention discloses mouth-open feed for rearing calves, belongs to the field of livestock feed, and particularly relates to feed for rearing calves in weaning period. The mouth-open feed is prepared by mixing fermented milk, silage and wheat bran, and comprises the following components in percentage by weight: 20 to 50 percent of fermented milk, 30 to 60 percent of silage and 15 to 25 percent of an additive, wherein the additive is one or a mixture of one or more of wheat bran, corn meal and soybean meal. According to the mouth-open feed for rearing the calves, probiotics are directly added into fresh milk for the calves for fermentation, and the fermented milk is added into the mouth-open feed, and milk flavor has high feeding attraction performance for the weaned calves, so that the palatability is high; the fermented milk is supplemented in a preparation process, so that the calves can be easily transitioned from total milk rearing to solid rearing; due to the addition of the probiotics into the mouth-open feed, the probiotic cultivation in the stomach intestines of the calves is enhanced, the digestive absorption function of the gastrointestinal tracts is improved, and trophic diarherra and bacterial diarherra of the calves can be effectively prevented.
Owner:洱源县益新硕庆肉牛养殖有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products