Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

312results about How to "Reduce communication load" patented technology

Intelligent water resource control platform based on cloud computing and expert system

InactiveCN103489053AReduce communication load and data processing volumeIncrease the number of accessResourcesCloud computingData transmission systems
The invention discloses an intelligent water resource control platform based on cloud computing and an expert system. The platform comprises a site measurement and control station, an internet of things data transmission system and a cloud computing service platform, and is characterized in that the control platform carries out automatic real-time collection on water resource information of a water supply water source, underground water, a water intake, a boundary control fracture surface and a sewage draining exit and site equipment operating condition information through the site measurement and control station, and real-time data preprocessing is achieved by means of an additionally installed site intelligent controller; internet of things data transmission equipment is adopted in the internet of things data transmission system to sent data of the measurement and control station to the cloud computing platform, and data support is provided for water resource management and advanced applications; the cloud computing service platform achieves real-time monitoring on water resources, monitoring on operating condition and remote on-line maintenance on site monitoring equipment and applications on water resource service, and a water resource decision is utilized to support the expert system to achieve assessment, early warning and emergency commanding of the water resources. The cloud computing and the Internet of things technology are applied to the platform, so measurement and control data are timely and efficiently processed, the intelligent computing technology is applied so that intelligent assessment and early warning of the water resources can be achieved, and safety of the water resources is guaranteed to a great extent.
Owner:湖南云控科技有限公司 +1

Distributed fault-tolerant management method of multi-UAV formation structure

The present invention discloses a distributed fault-tolerant management method of a multi-UAV formation structure. The method is characterized by comprises the following steps that: (1) a ground control center builds an initial formation structure and sends the structure to all UAVs, (2) each of the UAVs autonomously form an initial formation structure together and flies, (3) each of the UAVs judges whether other UAVs is newly damaged or not, and the method returns to the step (3) if not, (4) the remaining UAVs judge whether need to be responsible to calculate the formation structure again or not, and a step (5) is executed if so, whether a new formation structure message is received or not is judged if not, a step (6) is executed if the new formation structure message is received, otherwise the remaining UAVs continue to wait, (5) the new formation structure is reconstructed and sent to other UAVs, and (6) the remaining UAVs autonomously form a new formation structure and fly, and the method returns to the step (3). According to the distributed fault-tolerant management method, the multi-UAV formation structure with multi-level composition can be supported, and the formation structure can be rapidly and autonomously reconstructed when the UAVs are damaged, and the reliability and robustness are high.
Owner:HEFEI UNIV OF TECH

Group signature method with efficient revocation in vehicle networking

ActiveCN104753683AImprove real-time update efficiencyEfficient undoUser identity/authority verificationIn vehicleBroadcasting
The invention discloses a group signature method with efficient revocation in vehicle networking with an aim to mainly solve the problem that revocation of group members affects key pairs of group members without revocation in the prior art. According to the technical scheme, the group signature method includes: 1, initiating a system and generating parameters and public key pairs of a general trusted mechanism, a local trusted mechanism and a road administration unit; 2, vehicle users registering in the local trusted mechanism before access to the networking and receiving blind certificates; 3, the road administration unit establishing groups, the vehicle users in the jurisdictional scope submitting the blind certificates and joining in the groups after identity legitimacy is verified; 4, after the group members join in the groups, subjecting messages to signing and broadcasting, and anybody verifying the messages; 5, when new users join in the groups or in case of revocation of the members, the road administration unit calculating and publishing new public keys. With the method, efficient and safe joint and revocation in the road administration in the vehicle networking and anonymity of the users to the road administration can be realized, and track on user mobile trajectories is avoided.
Owner:XIDIAN UNIV

WSN (Wireless Sensor Network) abnormity detection method and system based on artificial immunization and k-means clustering

The invention discloses a WSN abnormity detection method and system based on artificial immunization and k-means clustering. The method comprises that S1) original monitoring data collected by WSN nodes is obtained to form a time sequence, the time sequence is normalized, compression and dimension reduction are carried out on the normalized sequence, and the mean value and variance of each sequential segments in the compressed sequence are calculated; S2) the Euclidean distance between node data and each cluster head is calculated, and an artificial immunization algorithm is used to search an optimal initial cluster head set for K-means classification; S3) whenever new data is distributed into a corresponding cluster, iterative update is carried out on the cluster head value of the cluster till the amount of all data in the cluster does not change; and S4) the WSN determines abnormity according to the amount of data in the cluster in a K-means clustering result. According to the invention, abnormity information in monitoring data can be discovered accurately, the instantaneity and reliability of abnormity event detection of the WSN are improved, and energy and communication bandwidth of the WSN are greatly reduced.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

Automobile CAN bus encryption method

The invention relates to an automobile CAN bus encryption method. The method includes: firstly enabling a sending node to recombine to-be-sent data in a CAN bus network into a plurality of data blocksaccording to an AES encryption algorithm block byte length requirement; adding a check mechanism to each data block and adding a check bit to the tail of the tail end data block; carrying out bit compensation on the tail end data block by utilizing random data; encrypting each data block by using an AES encryption algorithm to obtain each ciphertext data block; enabling the sending node to perform data segmentation on each ciphertext data block, set a time identifier and an order identifier and send the ciphertext data blocks to the receiving node through the CAN network; enabling the receiving node to receive each ciphertext data block and detect the integrity of each ciphertext data block; according to the detection result, confirming that that it is discarded that this time of receiving is completed or splicing and decryption are conducted after extraction is conducted according to the preset time identifier and the sequence identifier, carrying out verification in combination witha verification mechanism after decryption to confirm the effectiveness of data transmission. The data transmission efficiency is improved, and the safety of data information transmission on an automobile is guaranteed.
Owner:BEIJING HANGSHENG NEW ENERGY TECH CO LTD

Wireless body area network security access method

The invention discloses a wireless body area network security access method. Two interaction modes, namely, the unicast mode and the multicast mode, are set; two launching modes are set, and in other words, a network coordinator launches hand shaking and sensor nodes launch hand shaking; thus, when a certain part is injured and the blood pressure suddenly rises or in other words, the measurement indexes of a certain or some sensor nodes exceed the corresponding index limitations, the corresponding sensor nodes actively launch the hand shaking process, the situations of patients are rapidly fed back to medical staff, and patients are helped in time. According to the method, dynamic negotiation of a user conversation key is achieved through enhanced four-step hand shaking, hand shaking information is reduced, all the information is encrypted, the unicast access mode and the multicast access mode are set, and the remote access problem is solved through a multi-hop method. The method has the advantages that the access efficiency of a large number of sensing nodes is high, security is high, and the energy consumption is low, and the method can be used for the access of the sensing nodes in a wireless body area network and the dynamic negotiation of the user conversation key.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products