Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

44results about How to "Reduce communication consumption" patented technology

Wireless sensor network local type node managing method

The invention relates to a local type node management method of the wireless sensor network, which comprises the steps that at the current sampling time, a working node in a first node collection can predict that the alternative area where the ideal node combination with the optimum positioning performance at the time of the next sampling is positioned can be provided; each node in the first node collection can broadcast the forecasting information including the alternative area to other nodes in the wireless sensor network; the node which receives the forecasting information judged whether is positioned within the alternative area, and if the node is positioned within the alternative area, the node is added to a second node collection; the alternative nodes in the second node collection can mutually confirm the location and the condition of the other node, and the alternative nodes can come into the working condition at the next sampling time. The invention can effectively avoid the disadvantages that the computing load of the traditional overall type node management method is large, the storage demand is large, the complexity of the system is large, the structure is complex, the expansibility is not strong etc., the invention can rapidly obtain the node combination which can position the object with very high precision, the working complexity of the system can be reduced, and the network service life can be prolonged.
Owner:BEIHANG UNIV

Method for monitoring state of cloud data center

The invention discloses a method for monitoring the state of a cloud data center, and belongs to the technical field of cloud computing. The method comprises the steps that first, the whole threshold values of monitoring objects and the local threshold values of monitoring nodes are preset according to different monitoring objects, and then the tolerable accumulative border crossing amount is set for the monitoring nodes; when state border crossing happens to the monitoring nodes locally, the monitoring nodes accumulate the local border crossing values until the accumulative value reaches the tolerable accumulative border crossing amount, relevant data such as weighted average border crossing strength of local continuous border crossing are sent to an aggregation node; the aggregation node is used for predicating the whole state of a system on the basis of history polling to obtain a system idle value; if the received weighted average border crossing strength exceeds the predicated idle value, global polling is conducted, the system using vale in the future is predicated according to the global polling, and whether an alarm is triggered or nor is determined. According to the method for monitoring the state of the cloud data center, the communication consumption needed by state monitoring can be well lowered, and therefore the resource consumption of the cloud data center is lowered on the whole.
Owner:北京华麒通信科技有限公司

Intelligent electronic label information system and information interaction method thereof

The invention provides an intelligent electronic label information system, which comprises an electronic label and a reader-writer, wherein the electronic label stores an instruction which can be read by the reader-writer; and the reader-writer stores a procedure code corresponding to the instruction and is used for reading the instruction stored by the electronic label and executing the corresponding procedure code. By the intelligent electronic label information system, the equipment manufacturing cost of the electronic label system can be greatly reduced, and the management and running efficiency can be improved; and the implementation range of the electronic label system can be deeply expanded. Furthermore, the storage space of the electronic label is effectively saved, and the transmission consumption and the communication consumption during partial interaction can be reduced. Moreover, a phenomenon that all types of data information are concentratively transmitted to a uniform background server is avoided, the bandwidth consumption and the communication cost of large-scale data transmission in multiple types of application are reduced, the probability that important data information leaks is reduced, and data privacy protection is facilitated.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Cross-cluster asymmetric group key negotiation method in wireless sensor network

The invention provides a cross-cluster asymmetric group key negotiation method in a wireless sensor network. The method comprises steps as follows: an allied and shared key between clusters is established, cluster heads are taken as bridging nodes, and sensor nodes of different nodes have the same group key factor information; an asymmetric computation algorithm is designed in the group key negotiation process, more computation and communication traffic of the sensor nodes are migrated to the cluster head nodes with larger energy, and the lightweight property of computation and communication overhead of the sensor nodes is ensured; self-certification property of keys is realized, additional communication rounds are not required, the sensor nodes can self-certify the correctness in computing the group keys, and the correctness and the safety of the group key negotiation are guaranteed. Group key negotiation of the sensor nodes distributed in different clusters in the wireless sensor network is realized, a safe communication channel is established, the scale of cooperative computation and information sharing of sensor node groups is further expanded, energy consumption of the sensor nodes is reduced, and the service life of the sensor nodes is prolonged.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Frequency spectrum resource management and distribution method based on federated learning

The invention discloses a frequency spectrum resource management and allocation method based on federated learning. The method comprises the steps: enabling the terminal equipment to collect the state information from an environment; if the information change exceeds a threshold value, making a decision of a frequency spectrum, a sub-channel and transmission power of channel transmission; enabling the terminal equipment to collect the state information and reward information at the next moment after the decision, and adopting a gradient descent method to train an actor network and a reviewer network in the main network; when the accumulated gradient of the terminal equipment reaches a preset gradient threshold value, uploading the main network parameters of the terminal equipment to the base station; after the quantity of the main network parameters collected by the base station reaches a threshold value, aggregating the main network parameters according to a preset weight and broadcasting to all the terminal equipment; and enabling the terminal equipment to update the parameters of the main network and the target network after receiving the aggregation parameters. In order to solve the problems of low spectrum utilization rate, easy leakage of user privacy and the like in the prior art, the invention adopts an asynchronous federated learning mode, and has the advantage of low communication consumption while solving the problems.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Wireless sensor network node positioning method based on compressed sensing theory

The invention provides a wireless sensor network node positioning method based on a compressed sensing theory. Firstly, special information sent by beacon nodes is used for obtaining communication information of all nodes to the beacon nodes; and then a sampling matrix is obtained through the communication information obtained by the utilization of the beacon nodes, compressed communication information is obtained through target nodes, and correlation coefficients of the target nodes and all beacon nodes are obtained through a compressed sensing algorithm. Lastly, a weight coefficient of each beacon node to the target nodes is obtained by using the correlation coefficients, and an estimate position of each target node is obtained by the utilization of a centroiding algorithm. According to the wireless sensor network node positioning method based on the compressed sensing theory, the compressed sensing theory is introduced, and the correlation of the target nodes and the beacon nodes on geographic positions is fully dug. Due to the fact that the wireless sensor network node positioning method based on the compressed sensing theory fulfills four conditions, the wireless sensor network node positioning method based on the compressed sensing theory is reliable, effective, general in application, and suitable for node self-positioning of large scale networks.
Owner:HARBIN ENG UNIV

Extensible and secure consensus method and system, storage medium and intelligent terminal

The invention belongs to the technical field of a distributed system consensus mechanism and a block chain public chain, and discloses an extensible and secure consensus method and system, a storage medium and an intelligent terminal, comprising three protocols of node registration, block generation and block synchronization; according to a node registration protocol, a new node generates initial information and initialized right information, generates a node registration transaction by using public information and right information, and then sends the node registration transaction to a consensus network for node registration to become a network node; according to a block generation protocol, a consensus node generates a node right share table and a random number to perform candidate election, then a candidate generates compressed candidate blocks and broadcasts the compressed candidate blocks, and other nodes verify candidate block information and then select the candidate blocks meeting conditions as leaders to generate blocks; according to the block synchronization protocol, an unsynchronized node calculates a current consensus round and verifies the legality of a received chain, and a chain is selected for synchronization by using a chain selection rule. The security attribute of the scheme is improved, and the expandability of the scheme is effectively improved.
Owner:XIDIAN UNIV +1

Heterogeneous cloud-oriented cloud native micro-service platform

The invention relates to a heterogeneous cloud-oriented cloud native micro-service platform, which comprises a micro-service application subsystem, a micro-service application deployed based on a Kubernetes cloud management platform, a Cloud Foundry cloud management platform and an IaaS cloud virtual machine, and a cloud native micro-service adaptation operation of the heterogeneous cloud constructed by combining a micro-service platform basic support subsystem and a ServiceMesh technology, the micro-service platform basic support subsystem interacts with the micro-service application subsystem, receives registration and subscription requests of the micro-service application subsystem, and provides information configuration, information monitoring and service management channels for a management user side; the management user side manages and maintains the micro-service application deployed by the Kubernetes cloud management platform through ServiceMesh, so as to realize the function management of the micro-service basic component; and a service calling party subscribes the total service list information from the registration center, and selects a service provider to send a request according to a load balancing algorithm. Compared with the prior art, the method has the advantages of realizing unified micro-service management of the heterogeneous cloud management platform and the like.
Owner:交通银行股份有限公司太平洋信用卡中心

Hierarchical dynamic group key negotiation method based on privacy protection

The invention provides a hierarchical dynamic group key negotiation method based on privacy protection, which comprises the following steps of: initializing protocol parameters in a group key agreement network domain, generating public/private key pairs of an authentication center and terminal members, performing identity authentication of hidden attributes by the terminal members, and after the authentication is successful, carrying out group key agreement on the terminal members. The terminal member calculates an encryption key and a decryption key according to the attribute weight of the terminal member, verifies the consistency of the keys, and can also apply for attribute change from the authentication center to participate in group key negotiation of a high layer or a low layer. According to the method, the identity authentication technology with hidden attributes is adopted, leakage of personal privacy information can be avoided during identity authentication. Meanwhile, the threshold permission is set according to the attribute weights, group communication is participated in with different confidentialities, the reliability of data communication is improved, and a double-authentication mechanism of identity authentication and attribute weight matching is adopted, so that the reliability of data communication is improved. The safety of the system is improved to a great extent, and the group key negotiation is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Bullet screen data processing method and device, storage medium and electronic equipment

The invention relates to a bullet screen data processing method and device, a storage medium and electronic equipment. The method comprises the following steps: acquiring bullet screen data to be operated from a preset cache space; according to an array data structure, calculating the running state of the bullet screen track, wherein the array data structure is used for recording running information of bullet screen data running currently in each bullet screen track and bullet screen data to be run, and the bullet screen track is used for pushing bullet screen data in the user interface according to a specified moving track; when the operation state of the bullet screen track is an idle state, allocating bullet screen data to be operated in the array data structure to the bullet screen track in the idle state, and updating the array data structure; and sending the bullet screen data currently running in the bullet screen track to the native application to execute animation processing of bullet screen floating. According to the method and the device, the technical problem of relatively high communication consumption between the JS process and the native application caused by relatively low bullet screen data processing performance in the prior art is solved.
Owner:NETEASE (HANGZHOU) NETWORK CO LTD

Construction method, topology analysis method and device of power grid subgraph based on area division

The invention discloses a power grid sub-graph construction method based on region division, a topology analysis method, a power grid sub-graph construction device based on region division, and a topology analysis device. The power grid sub-graph construction method comprises the following steps: acquiring equipment components and attribute information thereof in a power grid system for establishment as vertex data; dividing the vertex data into a plurality of region vertex sets according to a geographic region attribute of the equipment; acquiring a binary relationship between each two vertices in each region vertex set, and constructing a binary relationship set of each region vertex set according to the binary relationship; constructing a first edge set according to the connection relationship of the equipment components in the power grid system; constructing a second edge set corresponding to the region vertex sets according to the correspondence between the binary relationship setand the first edge set; and constructing a region sub-graph of the power grid system according to the region vertex sets and the second edge set. By implementing the invention to effectively divide the power grid data, the divided sub-graphs are relatively balanced in scale, thereby realizing distributed storage and parallel processing of the power grid data, and improving the efficiency of topology analysis.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2

An intelligent electronic label information system and its information interaction method

The invention provides an intelligent electronic label information system, which comprises an electronic label and a reader-writer, wherein the electronic label stores an instruction which can be read by the reader-writer; and the reader-writer stores a procedure code corresponding to the instruction and is used for reading the instruction stored by the electronic label and executing the corresponding procedure code. By the intelligent electronic label information system, the equipment manufacturing cost of the electronic label system can be greatly reduced, and the management and running efficiency can be improved; and the implementation range of the electronic label system can be deeply expanded. Furthermore, the storage space of the electronic label is effectively saved, and the transmission consumption and the communication consumption during partial interaction can be reduced. Moreover, a phenomenon that all types of data information are concentratively transmitted to a uniform background server is avoided, the bandwidth consumption and the communication cost of large-scale data transmission in multiple types of application are reduced, the probability that important data information leaks is reduced, and data privacy protection is facilitated.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Cross-cluster asymmetric group key agreement method in wireless sensor networks

The invention provides a cross-cluster asymmetric group key negotiation method in a wireless sensor network. The method comprises steps as follows: an allied and shared key between clusters is established, cluster heads are taken as bridging nodes, and sensor nodes of different nodes have the same group key factor information; an asymmetric computation algorithm is designed in the group key negotiation process, more computation and communication traffic of the sensor nodes are migrated to the cluster head nodes with larger energy, and the lightweight property of computation and communication overhead of the sensor nodes is ensured; self-certification property of keys is realized, additional communication rounds are not required, the sensor nodes can self-certify the correctness in computing the group keys, and the correctness and the safety of the group key negotiation are guaranteed. Group key negotiation of the sensor nodes distributed in different clusters in the wireless sensor network is realized, a safe communication channel is established, the scale of cooperative computation and information sharing of sensor node groups is further expanded, energy consumption of the sensor nodes is reduced, and the service life of the sensor nodes is prolonged.
Owner:河南招源科技有限公司

Dynamic cluster radius-based non-uniform clustering method for wireless sensor network

The invention discloses a dynamic cluster radius-based non-uniform clustering method for a wireless sensor network. The wireless sensor network comprises a base station and a plurality of sensor nodes, wherein the base station is fixedly located in a network center and can collect data of the whole network sensor through a multi-hop routing transmission method, and the data comprises the collected data and electric quantity information of the base station. The sensor nodes are randomly deployed on the wireless sensor network to monitor the surrounding environment, and data are transmitted among the sensor nodes through routing, so that different nodes have different energy consumption rates. According to the method, the defects in the prior art are overcome, and the cluster radius can be automatically changed along with the operation of the network, namely, the cluster radius of the cluster head with more residual energy is increased, more loads are actively borne, and tasks are shared for other cluster heads; the cluster radius of the cluster head with small residual energy is reduced, and some loads are reduced to save energy, so that the purpose of better uniformizing the energy consumption of the network is achieved.
Owner:NANJING UNIV OF POSTS & TELECOMM

A Method of Spectrum Resource Management and Allocation Based on Federated Learning

The invention discloses a method for managing and allocating frequency spectrum resources based on federated learning. The method includes that the terminal device collects state information from the environment; if the information change exceeds a threshold value, making a decision on the frequency spectrum, sub-channel and transmission power of the channel transmission; the terminal device collects the state information and reward information at the next moment after the decision, And use the gradient descent method to train the actor network and critic network in the main network; when the cumulative gradient of the terminal device reaches the preset gradient threshold, the main network parameters are uploaded to the base station; the main network parameters collected by the base station reach the threshold After the value is set, the main network parameters are aggregated and broadcast to all terminal devices according to the preset weight; the terminal devices update the parameters of their main network and target network after receiving the aggregated parameters. In order to solve the problems of low spectrum utilization rate and easy disclosure of user privacy in the prior art, the present invention adopts an asynchronous federated learning method, and has the advantage of low communication consumption while solving the above problems.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

A Privacy-Preserving Hierarchical Dynamic Group Key Agreement Method

The invention proposes a layered dynamic group key negotiation method based on privacy protection. The steps are: initializing the protocol parameters in the group key negotiation network domain, generating public / private key pairs of the authentication center and terminal members, Terminal members perform identity authentication of hidden attributes. After successful authentication, terminal members calculate encryption keys and decryption keys according to their own attribute weights to verify the consistency of the keys. Terminal members can also apply to the authentication center to change attributes to participate in High-level or low-level group key negotiation. The invention adopts the identity authentication technology of hidden attributes, which can avoid the leakage of personal privacy information while performing identity authentication, and set threshold authority according to the attribute weight value, participate in group communication with different confidentiality, and improve the reliability of data communication. The dual authentication mechanism of identity authentication and attribute weight matching greatly improves the security of the system and makes group key negotiation more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Boundary Node Identification Method for Distributed Wireless Sensor Networks

The invention provides a method for identifying boundary nodes in a distributed wireless sensor network. The method is used for identifying the boundary nodes in the sensor network by utilising a DSCS (Distributed Sector Cover Scanning) technology and is applicable to homogeneous or different non-uniform wireless sensor networks same in function, sensing and communication ranges. The method comprises the following steps that: (1), the nodes independently collect neighbour information in the network; (2), each node establishes a cartesian coordinate system by taking self as the circle centre and calculates an absolute angle of a neighbour node thereof; (3), the neighbour nodes are sorted in an ascending manner according to the absolute angles; and (4), the boundary nodes are identified by utilizing DSCS. According to the invention, the technological problem that the identification precision of the boundary nodes in the traditional wireless sensor network is low can be solved; the identification problem of the boundary nodes in the wireless sensor network is decomposed into the sensing sector edge coverage problem of one node; therefore, the algorithm complexity is effectively reduced; the operation time and the inter-node communication and energy consumption in the boundary node identification process are reduced; and the identification precision is improved.
Owner:ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products