Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

72results about How to "Increase computational overhead" patented technology

Data encryption/decryption checking method and system

The invention discloses a data encryption/decryption checking method and system. The method comprises the following steps that: an encryption device performs Xor operation on each data section in plaintext data at an encryption end to acquire a checking code, combines the plaintext data at the encryption end with the checking code to acquire combined data, encrypts the combined data to acquire a ciphertext and outputs the ciphertext to a decryption end; and a decryption device decrypts the received ciphertext to acquire decrypted data, separates out the plaintext data at the decryption end and the checking code from the decrypted data, and checks the checking code. According to the invention, the checking code is generated through the simple Xor operation, and the data is encrypted by adopting one-time encryption transformation, so that the encryption transformation frequency is reduced, the calculation overhead is prevented from being multiplied, and the encryption/decryption efficiency is improved effectively; and by checking the correctness of the checking code, whether the data is wrong or maliciously changed during encryption or decryption and transmission or storage can be detected; and the confidentiality and correctness of the data are guaranteed at the same time.
Owner:国家超级计算深圳中心(深圳云计算中心)

An outlier detection method based on agricultural big data

The invention relates to the field of agricultural outlier detection, in particular to an outlier detection method based on agricultural big data. The method comprises the following steps: a data collection step of collecting agricultural production data, agricultural soil data and agrometeorological resource data, and integrating the data into a training data set; The step of constructing iTree tree is to select m sample points from the training dataset and continuously randomly select splitting attributes and splitting points until the termination condition is reached; the step of constructing iTree tree is to select m sample points from the training dataset. Constructing an isolated forest algorithm model, initializing the number t of iTree trees in the isolated forest and the set m ofsubsamples taken when constructing the iTree trees, entering the step of constructing the iTree trees in a loop, and constructing mutually independent iTree trees, wherein the set of all iTree trees constitutes the isolated forest algorithm model; An outlier judging step of calculating an outlier score s (x), and judging whether the test data x is an outlier by the outlier score s (x). The invention applies the isolated forest algorithm model to the outlier detection of the agricultural big data, and can effectively improve the detection effect of the outlier of the agricultural big data.
Owner:GUANGDONG KINGPOINT DATA SCI & TECH CO LTD

Inter-satellite networking authentication system and method suitable for double-layer satellite network

The invention belongs to the technical field of information safety, and discloses an inter-satellite networking authentication system and method suitable for a double-layer satellite network. The system comprises a ground authentication server, a high-orbit satellite authentication client and a low-orbit satellite authentication client, wherein the ground authentication server is used for completing initialization of a satellite authentication system, namely generating and distributing identity information, a secret key and track parameters which are needed for authentication between the satellites; the high-orbit satellite authentication client and the low-orbit satellite authentication client are main bodies of inter-satellite networking authentication, and the inter-satellite identity authentication and key negotiation are realized through the interaction of authentication parameters. An authentication precomputation mechanism is designed by utilizing the characteristics that a satellite network clock is highly synchronous and a node operation trajectory can be predicted, so that the authentication efficiency between the satellites is effectively improved. According to the system and the method, safe and efficient identity authentication and secret key negotiation of a high-orbit satellite and a low-orbit satellite in a networking stage can be realized, and the system and the method can be applied to networking authentication between the high-orbit satellite and the low-orbit satellite.
Owner:XIDIAN UNIV +1

Vehicle routing protocol method with stability-based clustering in urban environment

The invention provides a vehicle routing protocol method with stability-based clustering in an urban environment. The method comprises approximate node clustering set formation, cluster head election and cluster maintenance. The approximate node clustering set formation means exchanging state information between adjacent nodes with the same moving direction through Beacon messages, modeling the randomly changing moving speed as a normal distribution model, forming an approximate node clustering set after excluding nodes which are greatly different from the whole in speed, and establishing and updating an approximate node table; the cluster head election means remodeling the speed, locations and adjacent node quantity of nodes in the approximate node table as a normal distribution model, and choosing the optimal cluster head node by calculating competing priorities; and the cluster maintenance means specifically processing joining / separation of nodes into / from clusters and combination of the clusters to guarantee the stability of the clusters. The cluster mechanism of the method owns a smaller cluster head change rate and a longer cluster head maintenance time; and the packet delivery ratio is effectively improved in the urban environment, and the delay is also effectively reduced in the urban environment.
Owner:SUN YAT SEN UNIV

Data privacy protection-oriented machine learning prediction method and system

The invention provides a data privacy protection-oriented machine learning prediction method and system. The method comprises the following steps of obtaining encrypted data; the main server creates acredible area, and decrypts the obtained to-be-predicted data and the prediction model in the credible area; the main server carries out secret sharing on the decrypted to-be-predicted data and the prediction model to obtain a data secret share and a model share respectively, and distributes the data secret share and the model share to an unconspired auxiliary server and the main server; the auxiliary server and the main server respectively perform prediction calculation to obtain a prediction result share; and the main server carries out secret reconstruction on all the prediction result shares, forwards the reconstructed prediction result shares to the trusted area for integration and encryption, and sends the reconstructed prediction result shares to the to-be-predicted data providingterminal, and the data providing terminal decrypts the reconstructed prediction result shares to obtain a prediction result predicted according to the model. Privacy security of the two parties is protected by combining secure multi-party computing and an SGX technology, and the security problem in the prediction service providing process is solved.
Owner:UNIV OF JINAN

Short text-oriented optimization classification method

ActiveCN109960799AQuality improvementEnhanced Semantic Representation CapabilitiesSemantic analysisCharacter and pattern recognitionData setMicroblogging
The invention discloses a short text-oriented optimization classification method. The method comprises the following steps of: 1, obtaining an original data set and preprocessing the original data set; 2, selecting a feature item set from the preprocessed data set; 3, training the collected large-scale corpora by using a word vector tool to obtain a word vector model; 4, performing word vector representation on each feature item in the feature item set by using a word vector model, and performing primary clustering on the word vectors of the feature items to obtain a plurality of primary feature clusters; 5, performing two-stage loose clustering in each preliminary feature cluster to obtain a plurality of similar feature clusters; and 6, replacing the feature words obtained in the step 4 with the similar feature clusters obtained in the step 5, and then carrying out short text classification by using a classifier. Traditional short text classification mostly lacks semantic expression capability and is quite high in demnsion of the feature space; according to the invention, the semantic information of the short text can be expressed better, the dimension of the feature space is reduced, the precision and efficiency of short text classification are improved, and the short text classification method can be applied to short text classification tasks in various fields, such as spamshort message classification and microblog topic classification.
Owner:长沙市智为信息技术有限公司

Convolutional neural network structure simplification and image classification method based on evolutionary strategy

The invention provides a convolutional neural network structure simplification and image classification method based on an evolutionary strategy. The structure between a convolution model feature extraction part and a full connection layer is simplified. The method comprises the following steps: firstly, pre-training a convolution model to fix a model weight, and performing feature extraction on an image data set by using a convolution part; then, randomly generating a plurality of binary sequences to serve as an initial population, wherein each binary sequence corresponds to a structure between a feature extraction part and a full connection layer; then, under each structure of the current population, using the pre-trained weight to classify the feature vectors of the test set, using theclassification accuracy as the fitness of the corresponding structure, obtaining a new-generation structure population through crossover, variation and selection operations, and continuously iteratingto be equal to the number of iterations; and finally, obtaining a structure between the simplified feature extraction part and the full connection layer, and performing fine adjustment on the pre-training weight by applying the structure.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Image segmentation method, device and equipment and storage medium

The invention discloses an image segmentation method, device and equipment and a storage medium. The method comprises the steps of obtaining an original picture; and inputting the original picture into an image segmentation model to obtain an image semantic segmentation image of the original picture, and generating the image segmentation model based on joint training of a superpixel segmentation algorithm and a full convolutional neural network. According to the embodiment of the invention, when image semantic segmentation is carried out on an original image by using an image segmentation model generated by training a super-pixel segmentation algorithm and a full convolutional neural network, the low-level features of the original picture are identified; the generated image semantic segmentation image is accurate in edge positioning and good in space consistency; the super-pixel segmentation algorithm only participates in the training generation process of the image segmentation modelbut not participates in the process of generating the image semantic segmentation graph by adopting the image segmentation model, so that compared with the image segmentation model generated only based on full convolutional neural network training, the prediction precision of the model is improved on the basis of not increasing the calculation overhead.
Owner:GUANGZHOU BAIGUOYUAN INFORMATION TECH CO LTD

Writing and block granularity compressing and combining method and system of key value storage system based on OCSSD

The invention discloses a writing and block granularity compressing and combining method and system of a key value storage system based on an OCSSD, and belongs to the field of computer storage. Through selective compression and combination of data block granularity, read-in and write-back of non-overlapping data blocks are avoided, and the problem of read-write amplification in the LSM-tree compression and combination process can be reduced; the data blocks of the same file are uniformly distributed in all channels of the OCSSD, so that the multi-channel parallel characteristic of the OCSSD can be explicitly utilized, and the throughput of a key value storage system is improved; by directly managing a bottom storage medium at a user layer and bypassing intermediate software layers such asa file system, consumption of host resources is reduced, and semantic features of application software are conveniently transmitted. Generally speaking, the problem of read-write amplification of thekey value storage system based on the LSM-tree can be effectively reduced, semantic isolation between upper-layer application software and bottom-layer storage equipment is eliminated, and the throughput of the whole key value of the system to operation is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Multi-factor-based industrial Internet of Things session key negotiation method

The invention discloses a multi-factor-based industrial Internet of Things session key negotiation method which comprises the following steps that: a user stores personal information by using a smart card, communicates with intelligent equipment deployed in the industrial Internet of Things and Internet of Things nodes by connecting a mobile phone or other intelligent terminal equipment, acquires equipment state information in real time, and performs remote management and monitoring on the equipment. The method is based on the environment of the semi-trusted management center and more accords with reality, meanwhile, the pseudonym of the user is generated by the user and the server together, and the pseudonym of the user can be updated in real time after each key negotiation process, so that it is ensured that identity information of the user cannot be leaked, anonymity of the user is ensured, the non-linkability and the non-traceability are ensured, and the safety is improved. A key pre-distribution method is adopted, and based on a multi-factor authentication mode, namely biological characteristics, passwords and intelligent cards, main encryption operation is bit operation and a hash function, so that the calculation overhead and the communication overhead of a key negotiation scheme are reduced.
Owner:ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products