Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

58results about How to "Increase resource consumption" patented technology

Live broadcast assistant audio/video processing method and device for

The invention relates to the technical field of the Internet and discloses a live broadcast assistant audio/video processing method and device. The method comprises the steps of collecting anchor audios, background music and special effect audios through a live broadcast assistant audio/video application, carrying out audio processing and integrating the anchor audios, the background music and the special effect audios into an audio stream; collecting live broadcast images through the live broadcast assistant audio/video application, carrying out image processing to generate a video stream; aligning time stamps of the audio stream and the video stream to generate an audio/video stream data packet; and transmitting the audio/video stream data packet to a live broadcast application through a cross-process communication channel. The audios in the live broadcast process are effectively integrated into the audio stream, the time stamps of the audio stream and the video stream are aligned, the audio stream and the video stream are transmitted to the live broadcast application, various audios in the live broadcast process are prevented from mutual interference, and the fusion effect of the live broadcast application for the audios in the live broadcast process is relatively good.
Owner:广州方硅信息技术有限公司

Internal memory and file system mixing rearrangement method based on HASH algorithm

The invention relates to an implement method based on mixed tautology removal of an HASH algorithm memory and a file system, which adopts the combination of the tautology removal of the memory and the tautology removal of the file system so as to achieve a win-win result of data storage use space and processing efficiency. The implement method has the procedure that tautology removal information in a certain period of time is loaded into the memory and the tautology removal of the memory is adopted, and beyond the time the tautology removal of the document is adopted. The implement method mainly has the following steps: step 1. tautology removal configuration information (record format information, tautology removal types) is loaded into the memory; step 2. the tautology removal information in a certain period of time (configurable) is loaded into a private memory; step 3. the tautology removal of memory is performed, i.e., the tautology is removed according to the filtering information in the memory; and step 4. tautology removal of a file is performed, the tautology is removed according to the historical filtering information in the file. The storage structure of the information of the tautology removal in the memory has two characteristics of HASH lists and time window.
Owner:LINKAGE SYST INTEGRATION

Data synchronization method for double-nucleus library

The invention discloses a binuclear base data synchronization method, which is characterized in that the binuclear base comprises a data bin and a foreground application lib, the binuclear stores the data accessed by a business analysis system user in the data bin and stores a backup in the foreground application lib, when the business analysis system user accesses, the invention uses multilayer mechanism that when the access of the foreground application lib fails, the business analysis system automatically switches to access the data bin, the data between the data bin and the foreground application lib according to self periodicity to realize real-time synchronization via a synchronization system. The invention realizes a plurality of periodicities of synchronization as timed synchronization, circulating synchronization or trigger synchronization, which can be managed according to missions to manage the data demanding synchronization, eliminate the system resource consumption caused by database self-synchronization mechanism and make detection on the synchronization easy. Each synchronization process can be repeated without effect on result. The invention can manually start one synchronization process, besides automatic synchronization operation.
Owner:CHINA MOBILE GROUP SICHUAN

Lorenz chaotic pseudo-random sequence generator based on m sequence

The invention discloses a Lorenz chaotic pseudo-random sequence generator based on an m sequence. The generator comprises an initial value selection module, a Lorenz chaotic iteration module, a quantification module and an m sequence disturbance module, wherein the initial value selection module is used for giving an initial value needed by a Lorenz chaotic equation before Lorenz chaotic iterationis started and giving an output value generated in last iteration to next iteration to serve as an initial value; the Lorenz chaotic iteration module realizes operation of the Lorenz chaotic equationthrough floating point fractional arithmetic and generates a chaotic real value sequence; the quantification module converts the chaotic real value sequence into a pseudo-random sequence through a bit sequence design method; and the m sequence disturbance module generates the m sequence through a linear feedback shift register and uses the m sequence to disturb the chaotic real value sequence, the disturbed chaotic real value sequence is returned to the initial value selection module, and next iterative operation is performed. The generator overcomes the defect of randomness of an existing pseudo-random sequence, and the generator has a large key space, can resist an exhaustive attack and meets the requirements of various application occasions.
Owner:SOUTHEAST UNIV

Device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence

The invention discloses a device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence. The device includes a domain name acquisition module and a timeout monitoring module disposed at a client, and also includes an attack monitoring device and an intelligent scheduling device disposed at a service end. The domain name acquisition module acquires the at least two available domain names from an available domain name pool of a service end intelligent scheduling device at an interval of time T, one thereof is used as a currently used domain name, and the rest is used as an alternate domain name. The timeout monitoring module monitors time when the client issues a request to the service end. The attack monitoring device carries out real-time monitoring, and determines a domain name under an attack. The intelligent scheduling device schedules the domain name under the attack if the attack monitoring device detects the domain name under the attack. The device of using intelligent switching of the multiple domain names for DDoS (Distributed Denial of Service) attack defence can paralyze an attacker in certain time, prolong time after which an attack is initiated thereby again, increase attack resource and cost consumption of the attacker, increase attack difficulty, reduce impacts caused by the attack, and thus achieve the purpose of defence against the DDoS attack.
Owner:成都知道创宇信息技术有限公司

Cache data popularity management method and system for counting access frequency based on probability

The invention provides a cache data popularity management method and system for counting access frequency based on probability. The method comprises the following steps: S1, setting data in a cache tobe stored by taking a data block as a unit, and setting a popularity statistical data structure in the data block, the popularity statistical data structure comprising an access time record bit and an access frequency record bit; s2, when the data block in the cache is accessed, recording the current access time of the data block, counting the access frequency of the data block based on the probability, and updating the access frequency and the access time of the data block in the popularity statistical data structure; s3, when a cache request exists, judging whether the cache residual spacereaches a set threshold value or not; and when the cache space reaches a set threshold value, randomly selecting a set number of data blocks from the cache, carrying out inertia attenuation from the selected data blocks according to respective access frequencies and access time, and deleting the data blocks from the selected data blocks according to an inertia attenuation result until the cache residual space is greater than the set threshold value.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Simultaneous frame and bit combined estimation method for EBPSK (extended binary phase shift keying) communication system

The invention discloses a simultaneous frame and bit combined estimation method for an EBPSK (extended binary phase shift keying) communication system. The method comprises the steps: framing sending data at a transmitting end, and then performing EBPSK modulation; sending a receiving signal into an impact filter at a receiving end, and converting the receiving signal into parasitic amplitude modulation impact at a code element '1'; performing down sampling on output data of the impact filter according to a relative relation with a baseband code element rate; calculating peak values of 13 continuous data points of each group in a data stream subjected to down sampling, marking the moment that the peak values are greater than a certain threshold value, calculating a relevance value to a frame header, and marking the moment, in which four times of the peak value is smaller than the relevance value, in the marked moments; searching the first peak value of the relevance value in the marked moment in the step, wherein the moment corresponding to the first peak value is a synchronous moment. According to the simultaneous frame and bit combined estimation method, frame and bit are simultaneously finished by one step, so that the synchronization efficiency is improved, the synchronization precision is improved, the demodulation performance is high, the synchronization expense is reduced, the transmission efficiency is high, the hardware expenses are reduced, and the receiving machine implementation cost is reduced.
Owner:苏州东奇信息科技股份有限公司

Dynamic configuration method for program memory of computer

The invention relates to a configuration method for a program memory of a computer, and discloses a dynamic configuration method for a system memory of a computer, which aims to overcome shortcomings of inflexibility and inadaptability to change of a system environment of a memory configuration method of the prior art. The technical scheme includes that by the aid of the dynamic configuration method for a program memory of the computer, a service limit value of the memory is adjusted when a program runs by means of periodically detecting changes of an external environment, the dynamic configuration method is adaptable to environmental change at any time, and the problem of improper memory configuration due to changes of the external environment is avoided. Statistics of corresponding relation of environments and program running states is realized during long-term execution of the dynamic configuration method, and the optimal running condition under different environments of the program can be specified. Record and statistic data in a list can be more comprehensive along with extension of running time, and execution strategies based on the statistic list can be more intelligent as time goes on. The dynamic configuration method is used for intelligently configuring the memory of the computer, and running efficiency of the program can be improved.
Owner:CHENGDU YIWO TECH DEV CO LTD

A Joint Estimation Method of Frame Bit Synchronization for EBPSK Communication System

The invention discloses a simultaneous frame and bit combined estimation method for an EBPSK (extended binary phase shift keying) communication system. The method comprises the steps: framing sending data at a transmitting end, and then performing EBPSK modulation; sending a receiving signal into an impact filter at a receiving end, and converting the receiving signal into parasitic amplitude modulation impact at a code element '1'; performing down sampling on output data of the impact filter according to a relative relation with a baseband code element rate; calculating peak values of 13 continuous data points of each group in a data stream subjected to down sampling, marking the moment that the peak values are greater than a certain threshold value, calculating a relevance value to a frame header, and marking the moment, in which four times of the peak value is smaller than the relevance value, in the marked moments; searching the first peak value of the relevance value in the marked moment in the step, wherein the moment corresponding to the first peak value is a synchronous moment. According to the simultaneous frame and bit combined estimation method, frame and bit are simultaneously finished by one step, so that the synchronization efficiency is improved, the synchronization precision is improved, the demodulation performance is high, the synchronization expense is reduced, the transmission efficiency is high, the hardware expenses are reduced, and the receiving machine implementation cost is reduced.
Owner:苏州东奇信息科技股份有限公司

Implementation method for networked system structure of numerical control system

The invention discloses an implementation method for a networked system structure of a numerical control system. The implementation method comprises the following steps of: separating a human-computer interface controller from a numerical control machine to run in an industrial personal computer (PC), and making a task controller, a motion controller and a programmable logical controller (PLC) run in the numerical control machine; implementing real time data processing of the human-computer interface controller through a soft real-time mechanism on the industrial PC; implementing real time data processing of a server and the task controller through a soft real-time mechanism on the numerical control machine, and communicating the task controller with the motion controller by using a mixedinteractive model; and connecting the industrial PC with the numerical control machine through a real-time Ethernet. By using the implementation method, the pressure of a processor can be relieved, the control performance of the numerical control system is improved, the real-time property of data transmission among cross-platform modules is ensured, and a speed of data processing of a user task, the data interactive performance among local modules and the stability of the system are improved.
Owner:SHENYANG GOLDING NC & INTELLIGENCE TECH CO LTD

Static resource tamper-proofing method based on file watermark in CMS system

The invention discloses a static resource tamper-proofing method based on a file watermark in a CMS system, and the method comprises the following steps: S1, file publishing: not carrying out the real file generation operation in a webpage of a website published by a user and a resource file management server, only calculating the watermark file of a to-be-generated file, and transmitting the watermark file to a WEB server, wherein the watermark file generated by the management server only contains basic information of the entity file; s2, file checking: after a browser accesses the website request file, the WEB server reads the watermark file corresponding to the entity file from the watermark file directory according to the path of the requested entity file, when the watermark file does not exist, the file is directly responded to not exist, and when the watermark file exists, whether the entity file exists or not is checked; and S3, file recovery: for the tampered file, the WEB server requests the management server to obtain a correct file. According to the invention, the publishing efficiency of the file and the resource consumption of the WEB server on the tamper-proof module can be improved, and the load of the server is reduced.
Owner:西安博达软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products