Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

71results about How to "Reduce memory pressure" patented technology

Method and system for multi-ONU (optical network unit) automatic upgrading in GPON (gigabit-capable passive optical network) access system

The invention discloses a method and a system for multi-ONU (optical network unit) automatic upgrading in a GPON (gigabit-capable passive optical network) access system. The method comprises the following steps: A10, a plurality of upgraded files are sorted to form an upgraded file list; A20, after a master control panel receives an automatic upgrade enabling instruction which is sent by a web master, the master control panel inquires in turn authorized and on-line OUN on each line card, and all on-line ONU hardware and software inversions are obtained; A30, the master control panel downloads a corresponding upgraded file into a memory according to the sequence of the upgraded file list, and sends batch upgrading orders and sends the upgraded files to a or a plurality of corresponding line cards according to the type of the ONU corresponding by the upgraded files, and the corresponding line cards control all ONU which take down from the line cards and are corresponding with the upgrading files to realize upgrading; A40, the master control plane releases the space which stores the upgraded files in the memory. According to the invention, the master control plane only downloads one upgraded file into the memory each time, and the pressure of the system memory is relieved greatly.
Owner:FENGHUO COMM SCI & TECH CO LTD

Automatic tracking and positioning jet flow extinguishing method

InactiveCN105080023ARealize precise fire extinguishingThe positioning method is accurateFire rescueJet flowSurveillance camera
The invention discloses an automatic tracking and positioning jet flow extinguishing method. A camera is used for collecting on-site video images, the water falling point position is corrected through human assistance, and remote quick positioning of a fire point is achieved on a monitoring platform of an upper computer. The method comprises the steps that a fire source signal is detected through a jet flow extinguishing device, and the center position of a fire source region is determined preliminarily and sent to the upper computer so as to control the extinguishing device to spray water for extinguishing; according to on-site real-time monitoring videos collected by the monitoring camera, whether outflow water falls in an effective range of the center position of the fire source is judged, and if yes, adjustment is not needed; if the outflow water is out of range, human-assisted positioning adjustment is conducted on the water falling point position, and the water falling point is made to be in the effective range of the center position of the fire source. By the adoption of the extinguishing method, the positioning precision of an extinguishing system is improved to a great extent, the possibility of software misjudgment is reduced, and a guarantee is provided for quick, efficient and reliable operation of the fire-fighting extinguishing system.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

System and method for synchronizing master-slave databases

The invention provides a system and method for synchronizing master-slave databases. The system comprises a cache creating module, an interceptor module and a database access module. The method comprises the steps: acquiring data sheets frequently used in a master database, and writing the data sheets in a cache chain table; creating an interceptor which is used for achieving identification and judgment on a database source to be accessed before achieving a business logic service method, wherein the service method comprises an adding, deleting and revising method and a querying method; if the service method carries out adding, deleting and revising operations, writing data in the cache chain table while writing the data in the master database, and synchronizing the data of the master database to a slave database; if the service method carries out a querying operation, judging whether data required exist in the cache chain table or not, reading the data directly from the cache chain table if the data required exist in the cache chain table, or reading the data from the slave database if the data required do not exist in the cache chain table. According to the system and the method, the problem that the databases are out of sync is solved, latest data are read in real time, and meanwhile, the access efficiency is increased.
Owner:RETURNSTAR INTERACTIVE TECH GRP

Method and device for establishing fast forwarding table

The embodiment of the invention provides a method and a device for establishing a fast forwarding table, and belongs to the technical field of communication. The method comprises the following steps: when a communication message is received, according to a service matching rule set according to a message processing strategy, determining a target service matched with the communication message, if the fast forwarding table corresponding to the communication message is not stored locally, obtaining a preset target priority of the target service, according to a corresponding relation between a preset priority and a resource utilization rate threshold value, obtaining a resource utilization rate; and determining a target resource utilization rate threshold value corresponding to the target priority, judging whether the current resource utilization rate exceeds the target resource utilization rate threshold value, and if the current resource utilization rate does not exceed the target resource utilization rate threshold value, establishing a fast forwarding table corresponding to the communication message. By adopting the method and the device, the memory pressure of the network equipment can be reduced, and the network equipment is prevented from being suspended or restarted.
Owner:NEW H3C SECURITY TECH CO LTD

Method and system for positioning within IP (internet protocol) range based on binary finding method

The invention relates to a method and a system for positioning within IP (internet protocol) range based on a binary finding method. The method comprises the following steps of S1, according to to-be-found IP, utilizing the binary finding method to find the maximum initial IP which is smaller than the to-be-found IP from an initial IP set which is sequentially stored in a database; S2, according to the found initial IP, finding the IP field information corresponding to an IP field information set of the database, and finding the corresponding final IP of the IP field information; S3, judging whether the final IP is greater than the to-be-found IP or not; when the final IP is greater than the to-be-found IP, outputting the IP field information; when the final IP is not greater than the to-be-found IP, outputting the prompting information that the to-be-found IP does not exist in the database. The method has the advantages that the corresponding IP field information of the to-be-positioned IP is positioned from massive IP bases by the binary finding method; compared with the traditional finding method, the finding efficiency is improved, and the memory stress on the database in which the IP is stored is reduced.
Owner:北京思特奇信息技术股份有限公司

Webpage browser memory optimization method and system, equipment and storage medium

The embodiment of the invention discloses a web browser memory optimization method and system. equipment and a storage medium. According to the technical scheme provided by the embodiment of the invention, the URL address correspondingly configured when the Web server creates the container page content is received, the WebView container page is correspondingly created according to the URL address,the container page content is pulled from the Web server through the URL address on the basis of the WebView container page, and the content of each sub-page in the container page content is loaded and displayed in turn on the basis of the container page content. By adopting the technical means, the content of the container page is pulled and the content of each sub-page is alternately loaded anddisplayed, so that the creation of a WebView control can be reduced, and the content of a plurality of web pages is displayed through one WebView container page, thereby reducing the memory pressureof the system, avoiding system memory shortage caused by excessive creation of the WebView control and excessive creation of a rendering process. And the running stability of the application is improved under the condition that the application is forcibly closed.
Owner:BIGO TECH PTE LTD

Security policy configuration method and device, electronic equipment and storage medium

The invention provides a security policy configuration method and device, electronic equipment and a storage medium, and relates to the technical field of network security. The method comprises the steps of determining a flow communication topology corresponding to a virtual firewall based on flow information in the virtual firewall; based on the traffic communication topology, a circulation information table between the virtual firewall and the virtual machine is obtained, and the circulation information table comprises circulation information of the multiple pieces of traffic information when the multiple pieces of traffic information circulate between the virtual firewall and the virtual machine; and configuring the plurality of security policies based on the circulation information table so as to send each security policy to the corresponding virtual firewall. According to the method and the device, the flow communication topology of the virtual firewall is drawn, and the circulation information table between the virtual firewall and the virtual machine is obtained on the basis of the flow communication topology, so that a plurality of security policies can be configured according to the circulation information table, and each security policy can be sent to the corresponding virtual firewall; and the configuration efficiency and execution efficiency of the security policy are effectively improved.
Owner:BEIJING TOPSEC NETWORK SECURITY TECH +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products