Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

132results about How to "Optimize topology" patented technology

Lithium ion storage battery charging method based on sequential shunt switching regulation (S3R)

ActiveCN102324583AOptimize topologyRealize constant current and constant voltage charging controlSecondary cells charging/dischargingLithiumCharge current
The invention discloses a lithium ion storage battery charging method based on sequential shunt switching regulation (S3R). Based on an original S3R system battery charging control regulator (BCR) constant current charging, the lithium ion storage battery charging method based on S3R improves a constant-pressure charging standard, and can introduce directly a part of solar battery arrays for charging of a storage battery in order to solve the problem of heavy-current charging. When heavy-current charging is needed, the directly introduced solar battery arrays and a BCR are combined to form a heavy and constant-current charging mode, wherein the BCR is utilized for accurate adjustment of charging current intensity. When charging develops to a constant voltage stage, a BEA replaces D/A control to convert the BCR to constant voltage control so that a charging current decreases gradually. When heavy-current charging is not needed, a rapid charging array is switched off by a BEA control signal. When a detection result shows that a solar cell array current is surplus and a charging current is less than a certain value, the storage battery is full and D/A output is stopped so that charging is finished. The lithium ion storage battery charging method based on S3R can satisfy the requirements of heavy-current, constant-current and constant-voltage charging control of Leo satellite lithium ion storage batteries.
Owner:AEROSPACE DONGFANGHONG SATELLITE

Security check method for running way of power communication network

The invention discloses a security check method for the running way of a power communication network. The method comprises the following steps: (1) performing basic data verification: inputting basic data related to the running way, and verifying the uniqueness, rationality and integrity of the basic data; (2) performing service security check: analyzing whether an entire service and each section of route through which the service passes meets an N-1 requirement or not on the basis of a communication service route, and judging whether the service is safe or not during service clearing to make a service security check conclusion; (3) performing system security check to make a security check conclusion of a system; and (4) outputting a check result. According to the method, a relevant service circuit basic encoding rule is put forward on the basis of service N-1 analysis and system security check, and analysis of the service security and system security of the power communication network is realized on the basis of the encoding in combination with N-1 service influence analysis and an effective outlet analysis algorithm, so that a reliable and stable running way security check system can be realized by adopting the design, and online and real-time analysis of the running way of the communication network is realized.
Owner:STATE GRID CORP OF CHINA +2

Unmanned aerial vehicle formation consistency control method, system and device under time-varying channel based on topological optimization and storage medium

The invention provides an unmanned aerial vehicle formation consistency control method, system and device under a time-varying channel based on topological optimization, and a storage medium. The method comprises the steps: performing distributed data transmission by unmanned aerial vehicles in a formation to obtain a formation topology; selecting a point with the maximum in-degree in the formation topology as a central point of the formation, and calculating an algebraic characteristic value of a topological Laplace matrix by combining the central point with global formation topology information; estimating the maximum convergence time of prediction consistency control according to the relationship between the algebraic characteristic value and the formation consistency control rate; carrying out topology reconstruction and optimization on the formation; and performing consistency control according to the optimized formation topology. The invention has the beneficial effects that thetopological structure can be effectively improved, the formation control under a deteriorated multipath channel is enhanced, the control precision within limited convergence time can be ensured, and avery good technical effect is achieved.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

A prototype modeling method of network security attack based on industrial control

The invention discloses an industrial control network security method based on industrial network attack prototype modeling, which comprises the following steps: S1, industrial network security modeling and algorithm design; S2, designing an industrial control network security attack prototype; S3, taking an attack model of an attacker in an algorithm of the attack prototype in S1 as an attack source, and converting the network vulnerability information obtained in S4 into an attack set of an attacker according to attack rules to form an attack prototype; S4: Designing penetration test schemebased on attack prototype; 5, establishing a Sniffer network monitoring system; 6, optimizing and filtering that data through the external interface of the target industrial control network; 7, optimizing that topology structure of the intranet of the target industrial control network; S8: Establishing vulnerability risk assessment and modeling; S9: Forming an industrial network security defense solution. The network optimization and safety solution provided by the invention will effectively solve the safety problem of the industrial control of the enterprise, can timely carry out the risk assessment on the system, reduce the risk factors to the maximum extent, and improve the network operation efficiency and the safety reliability of the production management.
Owner:SUZHOU CHIEN SHIUNG INST OF TECH

Mine surrounding rock monitoring system based on wireless sensor network

The invention discloses a mine surrounding rock monitoring system based on a wireless sensor network. The system comprises a data monitoring module, a data transmission module and a ground monitoring center. The data monitoring module is used for collecting characteristic changes resulting from surrounding rock stress change in an underground coal mining process, wherein the collection comprises temperature collection, pressure collection and slight vibration signal collection. The data transmission module is used for transmitting collected temperature, pressure and slight vibration signals to the ground monitoring center through adoption of a wireless sensor network technology. The ground monitoring center is used for analyzing geological condition according to the change of received monitoring data when underground mining is carried out and carrying out alarm when an abnormity occurs in the monitoring data. The system has the beneficial effects that through adoption of the wireless sensor technology, the security monitoring of mine surrounding rocks is realized; in the wireless sensor network, a cluster head in the network is selected through adoption of an improved LEACH algorithm; a cluster head competition condition is optimized; and the problem that cluster head nodes are not distributed uniformly is overcome.
Owner:潘金文

Raster-vector geographic data reversible decryption method based on trigonometric function

The invention provides a raster-vector geographic data reversible decryption method based on a trigonometric function. The method comprises the steps of building a trigonometric function model, calculating trigonometric function model parameters and building a decryption model according to original raster-vector geographic data, adopting the decryption model for performing decryption on the raster-vector geographic data, building a recovery model according to decryption model parameters, and adopting the recovery model for recovering the decrypted raster-vector geographic data. On the premise that the vector data topological relation is maintained unchanged, the excellent function characteristics of the trigonometric function are sufficiently utilized, and a decryption error is controlled by adjusting the amplitude; by keeping the model periodicity, and it is ensured that decryption data changes uniformly and the topology is kept good; by maintaining that an arbitrary order is derivable, the decryption effect is smooth and advanced gradually; the model attack resistance is improved, it is ensured that the decrypted data has the high safety, and has the advantages of being reversible and efficient in decryption, and technical supports can be provided for security, secrecy and sharing using of raster-vector geographic data.
Owner:NANJING NORMAL UNIVERSITY

Modular multilevel DC solid state transformer and charging control method thereof

The invention discloses a modular multilevel DC solid state transformer and a charging control method thereof. The transformer comprises two groups of MMCs, a high-frequency transformer, a resistor and a switch, wherein one group of MMCs is connected with the primary side of the high-frequency transformer and the other group of MMCs is connected with the secondary side of the high-frequency transformer; the MMCs at the primary side are connected with a DC power supply through a parallel structure of the resistor and the switch; and the MMCs at the secondary side are connected with a load. In the method, all 2N sub modules in each phase of the MMCs at the primary side of the DC transformer are inputted; then, through comparing the primary current value and a limited current value, the inputted number of the primary MMC sub modules is reduced; and finally, the inputted sub modules in each phase are distributed again in an upper bridge arm and a lower bridge arm, a phase-shift angle is combined to determine triggering pulses of the primary MMCs, and soft charging of the DC transformer is realized. the primary DC of the DC transformer and the AC of the high-frequency transformer are reduced, and power sub modules and the high-frequency transformer are protected during the DC transformer charging process.
Owner:NANJING UNIV OF SCI & TECH

Satellite information system topological structure optimization method based on core-degree product

The invention discloses a satellite information system topological structure optimization method based on a core-degree product. The method comprises the following steps: firstly, abstracting a satellite information system to obtain a corresponding directed graph; secondly, introducing a concept of generalized degree and calculating the generalized degree of each node in the directed graph; thirdly, calculating the node core-degree product of each node in the directed graph and the importance of links; and lastly, comparing the node core-degree products of all nodes in the directed graph with a set node core-degree product threshold value as well as the importance of all shortest links between two nodes in the directed graph with a set link importance threshold value in sequence to obtain nodes to be optimized in a topological structure, and optimizing the nodes to be optimized. Compared with the prior art, the method has the advantages that the importance of each node is distinguished through introduction of the generalized degrees, and the degree or betweenness of each node as well as the importance of the nodes and links in the topological structure are considered, so that the whole topological structure can be optimized more accurately and comprehensively.
Owner:BEIJING INST OF SPACECRAFT SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products