Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

157results about How to "Reduce configuration difficulty" patented technology

Method for achieving automatic synchronization of multi-source heterogeneous data resources

The invention relates to a method for achieving automatic synchronization of multi-source heterogeneous data resources. A metadata service node, a service node and a production node are related in the method, the metadata service node is responsible for storing a data dictionary in a distributed heterogeneous database system, the service node is responsible for analyzing user requests in the distributed heterogeneous database system and carrying out synchronization with a database on the production node periodically, and the production node is responsible for requests such as inquiring and updating in a corresponding production application system, wherein the service node is formed by a configuration recognizer, a blog parser and a data synchronizer, the configuration recognizer is used for analyzing the configuration of a source database on the production node and selecting a feasible synchronizing mode, the blog parser is used for analyzing blogs of different dataset systems and is a component for first-phase preparing work of an increment synchronization mode, and the data synchronizer carries out data synchronization according to the synchronizing mode of the configuration recognizer. The method for achieving the automatic synchronization of the multi-source heterogeneous data resources enables the automatic synchronization of the multi-source heterogeneous data resources to be achieved, and can be used in data resource processing.
Owner:GUANGDONG ELECTRONICS IND INST

RED-based network congestion control algorithm

InactiveCN101958833AEliminate queue cacheEliminate the drop probability parameter termData switching networksPacket lossClassification methods
The invention discloses an RED-based network congestion control algorithm. The algorithm comprises the following steps of: segmentally processing different congestion states by introducing a fifth-order classification method in the statistics, dividing the network congestion states by using five indexes of weak, slight, medium, serious and severe, and dividing the average queue utilization rate into five regions, each of which corresponds to a network congestion state; calculating the discard probability of the average data size of the regions by utilizing a liner function of a data size distribution probability; and discarding data packets in corresponding regions in the probability according to the current congestion state to increase the available space of queues so as to avoid the network congestion. In the algorithm, original ten configuration parameter projects of the conventional algorithm are reduced to two, so that the configuration difficulty is obviously reduced. Under the same network scene, the average queue cache utilization rate is about 25 percent higher than that of an RED derivative algorithm. The algorithm improves the network congestion control effect, can flexibly adjust the packet loss number according to the congestion degree, and effectively inhibit network jitter.
Owner:云南省科学技术情报研究院

Method and system of Web for accessing Docker container

The invention discloses a method and a system of a Web for accessing a Docker container, and belongs to the technical field of cloud computing. The technical problems needing to be solved are that an independent SSH service for remote login and access still needs to be built for the Web to access the Docker container remotely, configuration of parameters such as a user name and a password is needed, and the remote access process is tedious. By adoption of the technical scheme, the method comprises the steps of finding a to-be-accessed Docker container at a Web page and initiating an access request by a user; judging user authority by an access support assembly; if the user has the authority, building a token for Docker container access and returning the token to the user; by the access support assembly, obtaining the ID of the Docker container and the IP address of a host machine where the Docker container is, and generating an URL address of the Docker container interface; verifying the token by a Web access assembly, and building Websocket connection through the URL address of the Docker container interface if the token passes the verification; and opening the Web page containing a console terminal of the Docker container through the Web access assembly. The method and the system of the Web for accessing the Docker container can still realize authority control on Docker container access without enabling an sshd course.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD

Log management system and implementation method

InactiveCN104579777ARealize unified collectionSolve the problem of decentralized managementData switching networksLog managementService control
The invention provides a log management system and an implementation method. The system comprises one or more log pushing units, a log collecting unit, a log calculation and analysis unit and a log service control unit, wherein the log pushing unit pushes logs generated by one or more application operation nodes to the log collecting unit; the log collecting unit is used for collecting received logs, caching the logs, sending the logs to a log storage unit in an event form and monitoring whether the logs have been stored in the log storage unit, and if the logs have been stored in the log storage unit, the cached logs are deleted; the log calculation and analysis unit is used for analyzing and calculating the logs stored in the log storage unit according to analysis and computation rules, having access to the log storage unit after receiving an inquiry request sent by the log service control unit, obtaining a corresponding log and returning the corresponding log to the log service control unit; the log service control unit sends the analysis and computation rules to the log calculation and analysis unit, sends the inquiry request and provides the received logs for users. Problems generated by decentralized management of logs can be solved according to the log management system and the implementation method.
Owner:INSPUR SOFTWARE CO LTD

Smart home configuration method and device, electronic equipment and medium

The embodiment of the invention provides a smart home configuration method and device, electronic equipment and a medium, and relates to the technical field of the Internet of Things. The embodiment of the invention comprises the following steps: obtaining a room template identifier corresponding to the specified room, sending an association request to an Internet of Things server, wherein the association request carries a room template identifier, and is used for requesting to establish an association relationship between a specified room and a room template corresponding to the room templateidentifier; receiving an association response sent by the Internet of Things server, wherein the association response carries a room template corresponding to the room template identifier, and the room template comprises product group information, a plurality of pieces of preset scene information and voice training information; and then performing network access binding on equipment correspondingto each piece of equipment information included in the product group information and the Internet of Things server to enable the room template to take effect. The implementation period of smart homecan be shortened, and the configuration difficulty is reduced.
Owner:BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD

Loose coupling role authorized-type implementation access control method and system thereof

The invention discloses a loose coupling role authorized-type implementation access control method and a system thereof. The method comprises the following steps of: adding a user role incidence relation based on a type implementation access control method; adding a related process type transformation rule definition relating to a user role and a corresponding type transformation decision mechanism; when a system process type is transformed, according to the process type transformation rule, judging whether to perform role related type transformation according to a current role of the user to change a user process execution flow; and entering a specific security domain of the user role. The system comprises a type implementation access control policy module, a policy security configuration module and a policy rule configuration module, wherein the type implementation access control policy module is operated in the kernel of an operating system; the policy security configuration module is operated on the user layer of the operating system; and the policy rule configuration module is positioned in a file system. The method and the system have the advantages of reducing the influence of user role configuration change on a type implementation rule system, reducing the security configuration difficulties, facilitating flexible configuration according to actual service conditions.
Owner:NAT UNIV OF DEFENSE TECH

System for purifying chlorosilane through non-relevant tower differential pressure thermal coupling

The invention discloses a system for purifying chlorosilane through non-relevant tower differential pressure thermal coupling. The system comprises: a first rectifying tower and a second rectifying tower, wherein each of the first rectifying tower and the second rectifying tower has a material inlet, a gas outlet, a liquid outlet, a liquid inlet and a gas inlet; a first reboiler and a second reboiler, wherein each of the first reboiler and the second reboiler has a liquid inlet, a gas outlet, a steam inlet and a condensate liquid outlet; a first reflux pump and a second reflux pump, wherein each of the first reflux pump and the second reflux pump has an inlet and a pump outlet; a first reflux tank and a second reflux tank, wherein each of the first reflux tank and the second reflux tank has a tank inlet and a tank outlet; and a condenser having a gas inlet, a liquid outlet, a cold source inlet and a cold source outlet. Compared with routine serial or parallel differential pressure thermal coupling rectifying towers, the chlorosilane purification system disclosed in the invention can realize the tower differential pressure thermal coupling between/among different tower sets, enlarges the application range of the differential pressure thermal coupling, and solves a problem of high energy consumption of a purifying process of a polysilicon system.
Owner:CHINA ENFI ENGINEERING CORPORATION

Automatic test method, terminal, platform and system

InactiveCN106959921AReduce testing costsEnhance the stability of automated testingSoftware testing/debuggingAutomatic test equipmentSoftware engineering
The invention provides an automatic test method, terminal, platform and system. The method comprises the steps of obtaining test scheme information from the automatic test platform; analyzing the test scheme information to generate a test instruction sequence, wherein the test instruction sequence comprises a plurality of assertions for identifying document object model (dom) elements and the assertions for testing the dom elements; and performing the test instruction sequence to identify and test the dom elements in a user interface (UI) of to-be-tested software, and when the assertions are performed, generating feedback information and sending the feedback information to the automatic test platform, thereby generating a test report. According to the method, the terminal, the platform and the system, through utilization of a feature that the structures of the dom elements in an Android system and an IOS system are completely consistent, only the same set of test scheme is required for an Android version and an IOS version, so the test cost is reduced, the automatic test stability is enhanced, and moreover, the method, the terminal, the platform and the system have the advantages that the platform can adapt to various terminals wirelessly, multithread tests can be carried out at the same time, and the test report is generated automatically.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Closed-loop control method and system for magnetizing state of variable-flux permanent magnet motor

The invention discloses a closed-loop control method and system for the magnetizing state of a variable-flux permanent magnet motor, and belongs to the field of driving control of variable-flux permanent magnet motors. The method comprises the steps of firstly, detecting a d-axis current feedback value, obtaining a d-axis armature flux linkage by utilizing a current flux linkage curve, and calculating the change of the d-axis armature flux linkage in combination with the d-axis armature flux linkage of the previous control period so as to obtain an induced voltage Udi; obtaining a magnetizingstate estimated value [phi]est by utilizing the induced voltage Udi based on a relation curve between the induced voltage and the magnetizing state; and then carrying out error comparison on a magnetizing state instruction [phi]cmd and the magnetizing state estimated value [phi]est, then generating a d-axis current instruction difference value through logic judgment, and then updating a d-axis current instruction Id* for carrying out current closed-loop control. According to the invention, the magnetizing state is estimated based on the induced voltage change generated by the d-axis current inthe magnetizing and demagnetizing process, and a voltage decoupler is introduced, so that the magnetizing state of the motor can be accurately controlled under the static and rotating states of the variable-flux permanent magnet motor.
Owner:HUAZHONG UNIV OF SCI & TECH

Vehicle anti-theft system configuration method, computer readable storage medium and terminal

ActiveCN109624919AAvoid anti-theft matching failureReduce configuration difficultyAnti-theft devicesAnti theftControl objective
The invention provides a vehicle anti-theft system configuration method, a computer readable storage medium and a terminal. A vehicle anti-theft system comprises a vehicle body control module and a power controller. The configuration method comprises the steps that the work mode of a new replaced vehicle body control module of a target vehicle is controlled to be a factory mode; the learning stateof the power controller of the target vehicle is erased; the learning state of the new vehicle body control module and the learning state of the power controller are detected; when the learning states of the new vehicle body control module and the power controller are both unlearning states, anti-theft matching and anti-theft authentication are conducted in sequence; whether the anti-theft matching of the new vehicle body control module and the power controller is successful or not is judged, if yes, the work mode of the new vehicle body control module is transformed into an after-sale mode,and if not, anti-theft matching and anti-theft authentication are conducted again. By means of the method, the situation that due to the problems of the power controller or insufficient early verification, anti-theft matching is failed is effectively avoided, the vehicle anti-theft system configuration difficulty is reduced, and the vehicle anti-theft system configuration efficiency is improved.
Owner:AIWAYS AUTOMOBILE CO LTD

Network flow control equipment and security policy configuration method and device thereof

The present invention relates to a network flow control device, and security strategy configuration method and device thereof, the method comprising: identifying the source, destination and application type of an input data stream; conducting first back tracing based on a predetermined enterprise organizational structure to obtain a first source back trace point and a first destination back trace point; and generating a first security strategy, the source in the matching condition of the first security strategy being configured as the first source back trace point, the destination in the matching condition of the first security strategy being configured as the first destination back trace point, and the application in the matching condition of the first security strategy being configured as the application type of the data stream. The first back tracing is executed via the predetermined enterprise organizational structure to obtain the first source back trace point and the first destination back trace point so as to generate the first security strategy. The security strategy configuration method and device on a network flow control device in an embodiment of the present invention can automatically generate a security strategy, thus reducing the configuration difficulty of the security strategy, and improves the configuration success rate.
Owner:HUAWEI TECH CO LTD

Application software menu configuration method, mobile terminal and computer readable storage medium

The invention discloses an application software menu configuration method, a mobile terminal and a computer readable storage medium. The method is applied to the mobile terminal. The method comprisesthe following steps: a keyword parameter input by a developer is received, wherein the keyword parameter is determined by demand analysis dimension of a user; the database of the application softwareis searched according to the keyword parameters; data matching with the keyword parameters is obtained, and the data is called to generate a menu displayed on the application software client, therebycompleting menu configuration. A keyword search data source generation menu is prepared by the user according to the need, the system realizes that menus can display the operation trajectory of the service from multiple different dimensions, the dynamic display functions such as process link and life cycle can meet the requirements of different customers and different businesses for different datadimensions, and the technical problems of a single fixed menu page function, high configuration difficulty, complex program coding, fixed menu options, and single business information dimension displayed by the user interface of the existing application software are solved.
Owner:康美健康云服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products