Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

58results about How to "Low storage cost" patented technology

Double-cold-source and multi-working-condition water cold storage system

InactiveCN106152341AOvercoming the single problem of cold storage and cold sourceOvercome singleLighting and heating apparatusAir conditioning systemsCooling towerFree cooling
The invention discloses a double-cold-source and multi-working-condition water cold storage system. According to the double-cold-source and multi-working-condition water cold storage system, a cooling tower, a refrigeration host and a cold storage tank arranged are arranged with an end load to form a circulation loop for supplying cold to the end load; the cooling tower and the refrigeration host are arranged with the cold storage tank to form a circulation loop; a cold source is stored in the cold storage tank, cold is supplied to the end load through the cold storage tank; the refrigeration host, the end load and the cold storage tank are arranged in a parallel manner, thus multi-mode cold supply and cold storage are realized as a whole; the cold storage can be carried out through the refrigeration host or natural cooling, thus the problem of a single cold source of cold storage of a traditional water cold storage system is overcome; and moreover, the cold storage is carried out through the natural cold source, thus the cold storage cost is low. The double-cold-source and multi-working-condition water cold storage system disclosed by the invention is suitable for the field of cold supply and cold storage air-conditioning systems.
Owner:GUANGZHOU TOPSUN POWER TECH

Building outer surface wind pressure measurement method

The invention provides a building outer surface wind pressure measurement method. The method includes the steps that a rigid model is manufactured and pressure measurement points are set; a wind tunnel test is conducted on the rigid model in a single round, so that a point wind pressure coefficient independent peak value reserving sequence and a face average wind pressure coefficient independent peak value reserving sequence are acquired; maximum likelihood estimation is conducted on point scale parameters and point position parameters of the point wind pressure coefficient independent peak value reserving sequence and face scale parameters and face position parameters of the face average wind pressure coefficient independent peak value reserving sequence, so that the maximum design value and the minimum design value of point wind pressure coefficients and the maximum design value and the minimum design value of face average wind pressure coefficients are determined, wherein the point scale parameters, the point position parameters, the face scale parameters and the face position parameters submit to extreme value distribution; the most disadvantageous maximum design value and the most disadvantageous minimum design value of the point wind pressure coefficients and the most disadvantageous maximum design value and the most disadvantageous minimum design value of the face average wind pressure coefficients are determined; the wind pressure of the outer surface of a building is determined. The method has the advantages of being low in cost, high in safety and capable of being widely applied to the field of buildings.
Owner:TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Safety verification method, device and system based on non-interactive zero-knowledge

The invention discloses a safety verification method, device and system based on non-interactive zero-knowledge, and relates to the field of electronic safety verification. The method includes the steps of public secret keys and private secret keys of a central node device and other local node devices; sending the identity (ID) and the identity commitment value of any local node device I to the central node device after the local node device I obtains the identity commitment value with the ID of the local node device I as the commitment object; sending certificate information to the local node device I through the central node device according to the private secret key of the central node device, the ID of the local node device I and the identity commitment value of the local node device I; establishing the non-interactive zero-knowledge proof based on the certificate commitment value after the local node device I obtains the certificate commitment value with the certificate information as the commitment object, and conducting signing on key information on service according to the non-interactive zero-knowledge proof, the public secret key of the local node device I and the private secret key of the local node device I; sending the key information on the signed service to a verification device through the local node device I.
Owner:LIAONING MOBILE COMM

Novel on-lattice MA-ABE (Multi-Authority Attribute Based Encryption) method based on LWE

The invention discloses a novel on-lattice MA-ABE (Multi-Authority Attribute Based Encryption) method based on LWE, which comprises four steps of system initialization, secret key generation, encryption and decryption. According to the invention, a plurality of attribute mechanisms manage different attribute sets and respectively distribute secret keys to users in permissions of the attribute mechanisms so as to improve integral efficiency of a system when ensuring security; and meanwhile, a Shamir threshold secret sharing technology is applied, three operations of an access strategy, i.e., anAND operation, an OR operation and a threshold operation, are implemented by adopting an access tree structure, and flexibility is high. Moreover, according to the invention, bilinear pairing is replaced with a lattice principle, a lattice basis delegation algorithm without dimension growth is introduced, encryption and decryption speeds are improved, and storage cost of private keys and ciphertexts of users is reduced. The novel on-lattice MA-ABE method disclosed by the invention is comprehensive in consideration, perfect in function, optimal in system performance and can be better applied to a cloud storage environment.
Owner:HENAN POLYTECHNIC UNIV

Preparation method capable of realizing aspergillus niger spore multiplication through carrier adsorption and producing xerospore powder of aspergillus niger

The invention discloses a preparation method capable of realizing aspergillus niger spore multiplication through carrier adsorption and producing xerospore powder of aspergillus niger. The preparation method comprises steps as follows: corn and bran are mixed in the ratio of 7:3, the corn and bran mixture and water are mixed in the ratio of the total weight of solids to the volume of water being 1:5, then, high-temperature-resistant amylase is added, the mixture is boiled at 100 DEG C for 30 min and filtered, and a culture solution of aspergillus niger spores is obtained. Crushed corncobs in the volume of 1 cm<3> is mixed with the culture solution of aspergillus niger in the weight-to-volume ratio being 1:3.5, and the mixture is put in a solid-state fermentation tank, sterilized at 121 DEG C for 20 min, cooled to 37 DEG C and inoculated with 104-105 CFU/mL aspergillus niger spores on the basis of the volume of the culture solution of aspergillus niger. The solid-state fermentation tank is kept at the temperature of 37 DEG C, the mixture is cultured for 120 h, a compound protectant is added after the aspergillus niger spores are diluted, the volume ratio of a spore suspension to the compound protectant is 2:3, the balancing time lasts for 40 min, vacuum drying is performed, and xerospore powder of aspergillus niger is collected. By means of the preparation method, the survival rate of aspergillus niger spore powder is increased, and the storage period of strains is prolonged. Meanwhile, a compound dryer adding method consumes little energy, and the preparation method adopts a simple process and is low in cost and more suitable for large-scale production.
Owner:TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Message passing method and device in distributed graph calculation process

The invention relates to the technical field of distributed graph calculation, and provides a message transmission method and device in a distributed graph calculation process. The method comprises the steps that when a source vertex generates a message M1, the source vertex generates a to-be-sent message group according to a graph relationship where the corresponding source vertex is located; thesource node sends the to-be-sent message to a corresponding destination node according to the destination node identifier in each to-be-sent message group; after receiving the message sent by the source node, each destination node caches the message according to a message format; and each destination node traverses one or more vertexes stored in the destination node, determines the destination vertex belonging to the same graph relationship with the source vertex V1 in the message, and adjusts the corresponding destination vertex according to the content of the corresponding message M1. According to the invention, the number of messages which need to be transmitted across nodes and stored is irrelevant to the number of destination vertexes and is only positively relevant to the number ofdestination nodes, so that the communication cost of message transmission and the storage cost of message caching are greatly reduced.
Owner:四川蜀天梦图数据科技有限公司 +1

Kernel module compatibility influence domain analysis method and system based on function dependence graph, and medium

The invention discloses a kernel module compatibility influence domain analysis method and system based on a function dependency graph, and a medium. The method comprises the steps of constructing a kernel module dependency directed graph according to a function call relationship between a kernel and a kernel module; after a certain kernel module version is upgraded, comparing function differencesbetween versions before and after kernel upgrading, and determining a changed kernel module interface function set; and radiating kernel interface function changes to a kernel module set related to the kernel interface function changes in the directed graph along the kernel module depending on the directed graph so as to determine a kernel module compatibility influence domain, and sending out acompatibility early warning according to the difficulty degree solved by the compatibility problem. According to the method and the system, version compatibility detection can be realized for the determined influence domains and influence domains among different versions of the kernel modules, and the method and the system can be used for ensuring self-consistency and compatibility early warning among the kernel modules, and have the advantages of low calculation and storage cost and high detection accuracy.
Owner:NAT UNIV OF DEFENSE TECH

Circuit for parallelly encoding quasi-cyclic low-density parity check code

The invention discloses a circuit for parallelly encoding a quasi-cyclic low-density parity check code. The circuit comprises one or more encoding circuit units; each of the encoding circuit units comprises a first register group 1, an AND-gate array 2, an exclusive or (XOR) gate group 3 and a second register group 4; both the first register group and the second register group consist of L registers according to a dimension L of a cyclic permutation matrix; the XOR gate group consists of L XOR gates according to the dimension L of the cyclic permutation matrix; the output end of the first register group is connected with the input end of the AND-gate array; the output end of the AND-gate array is connected with the input end of the XOR gate group; the output end of the XOR gate group is connected with the input end of the second register group; and the output end of the second register group is connected with the input end of the XOR gate group. By the circuit for parallelly encoding the quasi-cyclic low-density parity check code, the parallel encoding of the quasi-cyclic low-density parity check code is realized; the encoding complexity is low and the encoding speed is high; the sequence and the dimension of the cyclic permutation matrix cannot be restrained, so a parallel factor is not restrained; therefore, the circuit has the advantages of high flexibility and small area.
Owner:ZHEJIANG UNIV

Maintenance equipment site selection and inventory method and system under multistage supply chain and inventory warehouse

The invention belongs to the technical field of maintenance equipment inventory data processing, and discloses a maintenance equipment site selection and inventory method under a multi-stage supply chain and an inventory warehouse, and the method comprises the steps of carrying out the optimization and updating of a constructed warehouse site selection and inventory collaborative optimization system of maintenance equipment under the multi-stage supply chain through employing a hybrid fruit fly optimization algorithm; and determining the opening position of the base warehouse, assigning a maintenance point to the base warehouse, and making an inventory control decision, so that the sum of the base warehouse site selection cost, the ordering cost and the storage cost is minimum. According to the invention, the opening position of the base warehouse can be determined, and the sum of the site selection cost, the ordering cost and the storage cost is minimized through the assignment from the maintenance point to the base warehouse and the inventory control decision. According to the invention, the JRD model structure based on the RAND approximation algorithm is derived and arranged again, so that the HFOA algorithm is designed to be very suitable for solving the model, the algorithm is not prone to falling into local optimum and is stable in convergence, and the invention has higher solving efficiency for the large-scale site selection inventory problem.
Owner:XIDIAN UNIV

Track compression method based on moving behavior characteristics

PendingCN112762941AHas linear time complexitySecondary cache lessNavigational calculation instrumentsSimulationComputational physics
The invention provides a track compression method based on moving behavior characteristics. The track compression method comprises the following steps: acquiring an acquisition point of a track; if the current acquisition point is a starting point, regarding the current acquisition point as a feature point and stored, and meanwhile, assigning the previous feature point as the value of the current acquisition point; otherwise, calculating the azimuth angle variation of the current acquisition point relative to the previous acquisition point and the previous characteristic point, and calculating the speed change rate of the current acquisition point; if the larger value of the azimuth angle variable quantity and the speed change rate are both smaller than the corresponding preset threshold values, processing is not carried out; otherwise, regarding the characteristic points as characteristic points and storing the characteristic points, and meanwhile, assigning the previous characteristic point as the value of the current acquisition point; and finally, assigning the previous acquisition point as the value of the current acquisition point, and continuing to execute the above steps on the next acquisition point of the current acquisition point. Compared with the prior art, the method has the advantages that the characteristic points are captured more accurately, and the driving state information under the situations of rapid acceleration, rapid deceleration, rapid steering and the like can be stored.
Owner:JINLING INST OF TECH

Distributed temporal graph reachability query processing method based on Blogel

The invention discloses a distributed temporal graph reachability query processing method based on a Block. According to the method, three tense graph accessibility queries are provided, 1. querying common tense graph accessibility; 2, querying at the shortest time interval; and 3, querying the earliest arrival time. According to the method, based on a Blogel distributed computing framework, tenseinformation and a graph topological structure of a tense graph are effectively organized by utilizing a tense vertex label index TVL; the batch and parallel technologies are utilized to improve the construction efficiency of the TVL index; and an index judgment method and a pruning technology are utilized to reduce the graph search space and improve the query efficiency. The method comprises thefollowing steps of calculating a reachable standard vertex label set Lout and a reachable standard vertex label set Lin for each vertex in a TVL index construction stage; then, in the query stage, thepruning technology is used for effectively reducing the query search space, and the query result is quickly returned according to the index judgment method. According to the method, the accessibilityquery processing efficiency is greatly improved, and the optimal performance is provided.
Owner:ZHEJIANG UNIV +1

Method for protecting digital product based on asymmetric digital fingerprint and system thereof

InactiveCN101556675ACode length shorteningCode length factor shortenedTransmissionCommerceThird partyProduct base
The invention discloses an asymmetric digital fingerprint generation method and a method for protecting a digital product based on the method and a system thereof. The method comprises the following steps: a digital fingerprint center of a third-party credible authority generates a codebook of digital fingerprint codes according to performance requirements of a product releaser; a user provides an authenticated public key to a registration center and applies a registration number for buying digital products and the registration center uses the public key to encrypt the registration number and then sends the encrypted registration number to the user; the user buys the products from the releasers; and the digital fingerprint center inserts digital fingerprint to the products to be released and then releases the digital products to the user; and the digital fingerprint center tracks pirates for the pirated products and the credible authority feeds back the tracked results to the releasers. The invention optimizes code length coefficients of fingerprint codes, reduces the influence to the digital products under the condition of meeting the requirements of the product releasers and reduces storage expenditure of the fingerprint center. The user information is not public to the releasers, thus reducing the possibility for misjudging the pirates.
Owner:北京汉邦欣洲信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products