Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

218results about How to "Reduce communication cost" patented technology

Hierarchical federated learning method and device based on asynchronous communication, terminal equipment and storage medium

The invention provides a hierarchical federated learning method and device based on asynchronous communication, terminal equipment and a storage medium, and relates to the technical field of wirelesscommunication networks. The method comprises the following steps: an edge server issues a global model to an intra-cluster client to which the global model belongs; the client updates the model by using the local data and uploads the model to each belonging cluster edge server; the edge server determines to update the clients in the cluster according to the client update uploading time; the received model parameters are averaged by the edge server, and it is selected to asynchronously upload the model parameters to the central server or directly issue the model parameters to the client according to the updating times of the current client; and the central server performs weighted averaging on the parameters uploaded by the edge server, and issues the parameters to the client for training until the local model converges or reaches an expected standard. According to the method, the federated learning task can be efficiently executed, the communication cost required by the parameters of the federated learning model is reduced, the edge server butted with the client is dynamically selected, and the overall training efficiency of the federated learning is improved.
Owner:ANHUI UNIVERSITY OF TECHNOLOGY

Outsourcing encrypted data-orientated verifiable intersection operation method and system

The invention relates to an outsourcing encrypted data-orientated verifiable intersection operation method and system and belongs to the verifiable outsourcing computation field. The method is carried out among a third-party trusted entity, at least two client entities and an outsourcing server side; the client entities are holders of data sets and requesters of data set intersection operation; the third-party entity is mainly responsible for the initialization and distribution of common parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying results and proofs returned by the outsourcing server side and decrypting an ciphertext data set returned by the outsourcing server side; the outsourcing server side is mainly responsible for performing data set intersection operation; and a plaintext data set is not required to be obtained through decryption when the outsourcing server side performs intersection operation, and the outsourcing server performs operation on a ciphertext, and therefore, the privacy of user data can be ensured. The method and system have the advantages of low frequency of interaction among the entities, low communication cost and efficient correctness verification of operation results.
Owner:NORTHEASTERN UNIV

Heuristic optimization method and device for information exchange topology in multi-unmanned-aerial-vehicle coordinated formation

The invention provides a heuristic optimization method and device for information exchange topology in a multi-unmanned-aerial-vehicle coordinated formation. The method comprises: S1, a communicationnetwork topology is obtained according to a three-dimensional persistent formation formed by the multi-unmanned-aerial-vehicle coordinated formation; S2, when a communication failure occurs in the multi-unmanned-aerial-vehicle coordinated formation, a communication failure arc or communication failure node is deleted in the communication network topology based on the type of the communication failure to construct a first reconfigured communication network topology; S3, according to an information exchange topology reconstruction algorithm, a three-dimensional optimal enduring map correspondingto the first reconfigured communication network topology being a first optimal reconstruction information exchange topology is obtained; and S4, according to the first optimal reconstruction information exchange topology, configuration of a plurality of position in the multi-unmanned-aerial-vehicle coordinated formation, and the information exchange topology reconstruction algorithm, a second optimal reconstruction information exchange topology meeting a preset condition is obtained, wherein the second optimal reconstruction information exchange topology is the re-optimization information exchange topology of the multi-unmanned-aerial-vehicle coordinated formation and the preset condition is as follows: n is larger than |V|*(|V|-1)/2. According to the invention, an unmanned-aerial-vehiclecollision accident in the large-scale multi-unmanned-aerial-vehicle coordinated formation in a communication failure occurrence state is avoided and the formation is recovered; and the communicationcost of the formation is kept to be low.
Owner:HEFEI UNIV OF TECH

Method for calculating trust values of wireless Mesh network nodes

The invention discloses a method for calculating the trust values of wireless Mesh network nodes. The method comprises direct trust value calculation, indirect trust value calculation and comprehensive trust value calculation, wherein the direct trust value calculation is carried out for acquiring the interaction times of different time slices among the nodes and establishing a time sequence according to the obtained data at first, and then predicating the interaction times of the next time slice among the nodes by virtue of three times of an exponential smoothing method, and taking the relative errors of the interaction times predicated values and the actual values as the direct trust values of the nodes; the calculation formula of indirect trust values is obtained in a multi-path trust recommendation mode; comprehensive trust values are obtained by virtue of integrated computation for the direct trust values and the indirect trust values. The invention provides a method for calculating the trust values of the nodes, according to the specific condition of a network, adaptive smoothing factor alpha, credibility threshold value Phi, the value of a direct trust value weight beta are selected, the time attenuation characteristic and objectivity of the trust values are guaranteed, the credibility of the nodes is objectively and accurately described, the computation complexity is low, and the method is suitable for a wireless Mesh network.
Owner:LANZHOU JIAOTONG UNIV

Update method of mobile object location based on traffic network and GPS

The utility model discloses an updating method for a moving object based on the road transportation network and GPS, aiming at enabling a central server to trace the former and current position of the moving objects. The utility model is characterized in that the moving object uses GPS to measure the latest running data continuously, through matching with the transportation network, the coordinate of the latitude and the longitude and the direction data are converted into the data format based on the road network, then the current running vector is compared with the running data submitted by the updating on the last position according to the principle of the inertia, and the position updating condition is determined, the current running vector of the moving object is reported to the central server only when the moving object does not keep running as the principle of the inertia. Additionally, the utility model optimizes the updating of the position in the road crossing, only one time position updating of the moving object is performed at most in the road crossing. The utility model has advantages of reducing the communication frequency and improving the data processing efficiency under the premises of securing the processing precision compared with the prior art.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

VoIP safety meeting session key transmission method

The invention discloses a VoIP safety meeting session key transmission method. The VoIP safety meeting session key transmission method includes that 1) a meeting initiator generates communication request information for building a group, encrypts the communication request information through an encryption key of a TLS passage, signs through an RSA signature key of the meeting initiator and sends to the server; the server uses a corresponding RSA signature public key to verify the information and decodes the information through an encryption key of the TLS passage to obtain the communication request information; 2) the server generates a group ID and a group meeting session key, builds the group and sends invitation information to a client to be invited; 3) the client uses an RSA signature public key of the server to verify the invitation information, decodes the invitation information through an encryption key of the TLS passage, uses an SM2 public key of the server to verify the information and uses an SM2 key thereof to decode the cipher-text to obtain the group ID and group meeting session key. The VoIP safety meeting session key transmission method greatly improves the information transmission safety.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Outsourced key generation and decryption property-based system capable of realizing keyword search and decryption method

The invention provides an outsourced key generation and decryption property-based system capable of realizing keyword search. The outsourced key generation and decryption property-based system capable of realizing the keyword search comprises a public parameter setting server, a user private key generation server, an outsourced user private key generation server, a trap door generation server, an encryption server, an outsourced decryption server and a decryption server, wherein the public parameter setting server is in charge of generating a system master key and public parameters; the user private key generation server is in charge of generating a private key pair and a local user private key; the outsourced user private key generation server is in charge of generating an outsourced user private key; the trap door generation server is in charge of assisting a user to generate an inquiry password and a trap door; the encryption server is in charge of encrypting a message and generating corresponding ciphertext and keyword indexes; the outsourced decryption server is in charge of decrypting an outsourced part of the ciphertext according with user right and searching for matching ciphertext by adopting the trap door submitted by the user; and the decryption server decrypts partially decrypted ciphertext, so that the message is restored. The invention provides a method for searching ciphertext matched with keywords.
Owner:HOHAI UNIV

Multiple-target Bernoulli distribution type fusion method based on weighting negative first-order RD (Renyi Divergence)

The invention discloses a multiple-target Bernoulli distribution type fusion method based on weighting negative first-order RD (Renyi Divergence), and belongs to the field of radar signal processing. The same frame of posteriori multiple-target Bernoulli parameters of a plurality of sensors is transmitted to a fusion center, and the posteriori multiple-target Bernoulli parameters of all sensors are fused in the fusion center. The fusion method comprises the following steps: decomposing the multiple-target Bernoulli parameter into a plurality of Bernoulli components; constructing a cost function based on a weighting negative first-order RD sum to find an optimal matching scheme of the Bernoulli parameters of different sensors; fusing a plurality of matched Bernoulli components in parallel by adopting a CI (Covariance Intersection) fusion rule; approximately realizing the fusion of the multiple-target Bernoulli parameters of different sensors; selecting a plurality of most likely targets from a fusion result; and returning the fused result to each sensor. Therefore, the invention has the effects of being high in tracking precision, low in false alarm rate, strong in robustness, high in reliability, small in communication cost and strong in antijamming capability.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Federal learning adaptive gradient quantification method

The invention discloses a federal learning adaptive gradient quantification method, which comprises the following steps of: initializing a training sample and a local model of each working node, training the local model by using the training sample to obtain a local gradient, and quantifying the local gradient according to a quantification level obtained by each working node; uploading the local gradient to a parameter server for gradient aggregation, and transmitting an aggregation result back to each working node; each working node updating local model parameters by using the quantized aggregation gradient; judging whether the number of iterations meets a preset interval time threshold, if so, broadcasting the link state of each working node and timely adjusting the self quantization level, otherwise, entering an iterative training process, and ending training until a preset condition is met. According to the method, the quantized bits of the gradient are adaptively adjusted according to the real-time bandwidth of the node link, the stragler problem is effectively relieved, the bandwidth resource utilization rate is improved on the basis that the communication overhead task is reduced through a traditional quantization method, and more efficient federal learning training is completed.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Heterogeneous federated learning mine electromagnetic radiation trend tracking method based on SVD algorithm

The invention discloses a heterogeneous federated learning mine electromagnetic radiation intensity trend tracking method based on an SVD algorithm, and the method comprises: firstly proposing a heterogeneous model federated learning algorithm for the problem of data imbalance in a federated learning client, and setting a heterogeneous central model in a server for the client to select, so as to improve the precision of a local model; aiming at the problem of uploading communication cost of local model parameters, providing an efficient communication algorithm that an SVD algorithm is firstlyused for decomposing a parameter matrix to obtain a corresponding singular value matrix, and then the singular value matrix is uploaded to a central server for aggregation updating; and finally, usingthe updated local model by each client to extract local data features, and using the features and real data values by each client to train the ESN and then to execute trend tracking. According to theinvention, trend tracking of electromagnetic radiation intensity acquired by multiple sensors can be realized on the premise of protecting data privacy, the trend tracking precision of each client can be improved, and the communication cost required by a framework is reduced.
Owner:CHINA UNIV OF MINING & TECH

Multiple signature generation and verification system and method thereof

The invention discloses a multiple signature generation and verification system and a method thereof. The multiple signature generation and verification system comprises an information releasing unit, a credible center, at least one signature unit, a signature collection unit and a signature verification unit. The information releasing unit generates information to be signed, and a signature unit listing used for signing. The credible center generates system public parameters. At least one signature unit is connected with the information releasing unit and the credible center in a communication mode and is used for generating a public key and a private key and generating corresponding partial signatures. The signature collection unit is connected with the information releasing unit, the signature unit and the signature verification unit in a communication mode. The signature verification unit is connected with the credible center and the signature collection unit in a communication mode and is used for verifying signature files according to the public parameters, the signature unit listing and the information. According to the multiple signature generation and verification system, each signature unit independently generates the partial signatures of the each signature unit, and the system is free from interaction, low in communication cost, and high in signing efficiency. The invention further discloses the multiple signature generation and verification method.
Owner:EAST CHINA NORMAL UNIV +1

Two-tiered wireless sensor network range query method capable of verifying privacy protection

The invention discloses a two-tiered wireless sensor network range query method capable of verifying privacy protection. The two-tiered wireless sensor network range query method capable of verifying privacy protection includes the data collection protocol step and the query execution and verification protocol step. The data collection protocol step includes the procedures that sensor data are periodically collected by sensor nodes and subjected to bucket partitioning, data buckets are encrypted, verification code information of redundant buckets is worked out, corresponding data messages are constructed and uploaded to storage nodes, and the data messages are collected and then stored through the storage nodes. The query execution and verification protocol step includes the procedures that query instructions containing minimum tag sets corresponding to target zones are constructed by a base station and sent to the storage nodes, the storage nodes execute query processing and return corresponding query feedback messages, the base station decrypts the feedback messages and works out final query results, and finally query result consistency is verified. The protocol steps of the method are simple, privacy security of sensitive data can be guaranteed, and the query results can be verified; the in-network communication cost of the sensor nodes is low, and prolonging of the life cycle of a whole network is facilitated.
Owner:NANJING UNIV OF POSTS & TELECOMM

On-line social network mass data storage method based on community division

The invention discloses an on-line social network mass data storage method based on community division. With a graph structure of a social network serving as the starting point, firstly, the social network is divided into a celebrity user layer and a common user layer according to node degrees, and then the community division is conducted on each layer through a modularity optimization method. A small group forming strategy is designed to preprocess an initial network, a supernet is formed, and an edge weight optimization scheme is adopted for merging super nodes step by step so as to improve the modularity. After the community division is completed, common user data are stored preferentially, user data of the same community are stored in the same server node, celebrity user data are preferentially considered to be stored in the server with the most fans, and then the celebrity user data are secondly considered to be stored in the server node where the community of the celebrity user data are located. By the design that the celebrity user data are stored in a multi-replication mode, the load of a single server is reduced; since social network data are stored through the community division method, the locality of access can be improved, and communication expenditure can be reduced.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products