Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

210results about How to "Reduce storage burden" patented technology

Linear array SAR (synthetic aperture radar) three-dimensional imaging method based on compressed sensing

The invention provides a linear array SAR (synthetic aperture radar) imaging algorithm based on compressed sensing. Aiming at the characteristic that the scattering targets are sparse in an actual linear array SAR three-dimensional scene space, the method comprises the following steps of: only selecting less linear array antenna array elements to work in stead of adopting full array elements to receive an echoed signal; performing two-dimensional compression on the distance direction and along-track direction of the linear array SAR echoed data by utilizing a matched filtering technology; establishing a linear measuring matrix of a cross track direction signal and a sparse target scattering coefficient by adopting a compressed sensing technology; and finally, reconfiguring a cross track direction target through solving an optimization problem to realize sparse target imaging processing in a three-dimensional space. By using the method, the defect of the existing linear array SAR matched filtering imaging algorithm can be overcome, the linear array antenna array element quantity and system data acquiring and storage burden are greatly reduced, and the cross track direction imaging precision of the linear array SAR is improved.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Method and system for placing resources replication in CDN-P2P (Content Distribution Network-Peer-to-Peer) network

ActiveCN101841556AImprove storage space utilization efficiencyImprove distribution efficiencyData switching networksClient-sideContent distribution
The invention relates to a method and a system for placing resources replications in a CDN-P2P(Content Distribution Network-Peer-to-Peer) network. In the method, firstly, a CDN server collects the information of resources downloaded by a client in a corresponding P2P network, the information of resources required to be downloaded by the client and the communication performance index of the clientby the CDN server; secondly, the CDN server calculates the satisfiable number of requests of resources according to the information of resources downloaded and the communication performance index by the CDN server and calculates the number of download requests of resources according to the information of resources required to be downloaded; thirdly, the CDN server calculates the scarcity coefficient according to the number of download requests of resources in the corresponding P2P network and the satisfiable number of requests of resources in the P2P network; and fourthly, the CDN server selects the resources in a hierarchy of the resources from greater to smaller scarcity coefficients in the P2P network by the CDN server and downloads the replications of selected resources to the CDN server. The invention can improve the utilization ratio of the storage space of the CDN server.
Owner:INST OF COMPUTING TECHNOLOGY - CHINESE ACAD OF SCI

Water-turbine generator set virtual assembly modeling method and system based on tree graph model

The invention discloses a water-turbine generator set virtual assembly modeling method based on a tree graph model, and is used for simulation of water-turbine generator set virtual assembly. According to the method, the hierarchical structure of a water-turbine generator set and a semantic relation among parts are represented by adopting a mode that an assembly tree and a semantic relational graph are independent; a hierarchical assembly tree is constructed according to a designed structure of the water-turbine generator set in the form of a binary tree, so that structure hierarchicalization for the parts is realized; and a semantic relational graph is constructed according to a semantic constraint relation of the parts in the form of the binary tree. The invention also discloses a semantic identification and calculation method for guiding user interaction based on the molding method and a final water-turbine generator set virtual assembly simulation system. Compared with the prior art, the method and the system have the advantages of lightweight of an assembly model, interaction intellectualization and high interaction efficiency and are applicable to implementation of simulation of virtual assembly of various types of water-turbine generator sets.
Owner:HOHAI UNIV

Integrity verification method for data in cloud storage

The invention discloses an integrity verification method for data in cloud storage. The method is mainly used for solving problems in the prior art that data privacy is leaked and the storage load of trusty third parties is too high. The technical scheme of the invention is as follows: the method comprises the steps: (1) a user generates secret keys for data encryption, secret keys for data labeling and secret keys for a verification process; (2) data to be uploaded to a cloud server are subjected to blocking processing and encryption, a data label corresponding to each encrypted data block is calculated, and the encrypted data blocks and the data labels are uploaded to the cloud server; (3) a trusty third-party cloud server requests a data integrity verification request; (4) the cloud server generates a corresponding response certification by using user uploaded encrypted data and data labels according to the verification request; (5) a trusty third party verifies the received response certification. According to the method, the privacy safety of the data uploaded to the cloud server by users is ensured, the storage load of the trusty third parties is reduced, the utilization ratio of the cloud server is increased, and thus the method can be applied to the safe outsourcing storage of the data.
Owner:XIDIAN UNIV

Outsourcing data deduplication cloud storage method supporting privacy and integrity protection

The invention discloses an outsourcing data deduplication cloud storage method supporting privacy and integrity protection. Firstly, client deduplication and security authentication label deduplication of a data file are realized, so that the communication overhead and the storage burden of a cloud server are greatly reduced; and secondly, by adopting the extractor technology, the ciphertext of the outsourcing storage data does not depend on an encipher and an encryption algorithm, but depends on the data, so that ciphertext data deduplication is realized, and the privacy of the data is ensured in the deduplication process and the integrity auditing process. And finally, the RS erasure code technology is adopted to improve the fault-tolerant capability of deduplication cloud storage; a cloud service provider is also supported to spontaneously and regularly delegate a third-party auditor to carry out batch public cloud auditing on the data stored in the cloud server so as to ensure theintegrity of the data; meanwhile, a data owner is also supported to initiate public cloud auditing on the integrity of the file anytime and anywhere, so that the privacy of the data can be always protected in auditing and deduplication processes. The method provided by the invention is effective in the aspect of deduplication and efficient in the aspect of integrity cloud auditing.
Owner:中科柏诚科技(北京)股份有限公司

Power distribution method and power distribution device for downlink of low-earth-orbit satellite

ActiveCN111867104ASolve the problem of low capacityAccelerating the Convergence Speed ​​of Reinforcement LearningTransmission path divisionCriteria allocationFrequency spectrumSpectral efficiency
The invention provides a power distribution method for the downlink of a low-orbit satellite. The method comprises the steps of: initializing the low-orbit satellite, and building a Markov decision process; observing the current state St; randomly selecting an action or selecting an optimal action according to the probability of an exploration factor; obtaining a new state St+1 and the instant reward rt of the current state St according to an action at, and storing the (st, at, rt, st+1) tetrad into an experience pool; under the condition that a cycle period is greater than a training number,training a current network; under the condition that the current time slot is integer multiples of the updating frequency of a target network, updating parameters of the target network; adding 1 to the current time slot; repeating the above steps until the current time slot is greater than a time slot counter, setting the current time slot to be 1 and adding 1 to the count of the cycle period; andrepeating the steps until the cycle period is greater than the training network period number. According to the distribution method, a deep reinforcement learning algorithm is adopted to dynamicallydistribute the subcarrier power of the multi-beam low-orbit satellite, so that the capacity of the low-orbit satellite is maximized, and the spectral efficiency is improved.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Double-layer path planning method for overcoming limitations ofcalculation and storage capacity of UAV (unmanned aerial vehicle)

The invention relates to a double-layer path planning method for overcoming limitations ofcalculation and storage capacity of a UAV (unmanned aerial vehicle). For overcoming limitations of the calculation and storage capacity of the UAV, the method comprises the following steps: firstly, an initial reference track isgenerated on the basis of existing map information and limitations of dynamic performance of the UAV; secondly, environmental information of theUAV and surrounding obstaclesis acquired by an airborne sensor, and whether obstacles pose a threat to the UAVis judged with a three-dimensional collision cone technology; thirdly, a local obstacle avoidance path is generated with a forward search method based on Markov process in case of the threat, and the UAV flies in accordance withthe local planned path, otherwise, theUAVcontinues to fly along the reference path; fourthly,the UAV continues to fly untilthe desired point of the reference track is reached after obstacle avoidance. The method has the advantages of high convergence speed, low data storage burden, high safety and the like, can be used by the UAV for avoiding obstacles safely and rapidly, and can also be popularized to autonomous obstacle avoidance of unmanned vehicles and the UAV.
Owner:BEIHANG UNIV

kNN (k-nearest neighbor) fault detection method for online upgrading master sample model

The invention discloses a kNN (k-nearest neighbor) fault detection method for an online upgrading master sample model and relates to a fault detection method for a batch process. The kNN fault detection method for the online upgrading master sample model comprises the following steps of performing modeling and fault detection by utilizing the kNN fault detection method by taking data of a master sample space as a training set of modeling data, finding out k nearest neighbors of each sample from the master sample space, calculating the quadratic sum of distances of the k nearest neighbors on each sample, permuting the quadratic sums of the k nearest neighbors of all samples in sequence to determine a threshold value of fault detection; finding out k nearest neighbors of a sample x from the master sample space for the new to-be-detected sample x, calculating the quadratic sum of the distances of the k nearest neighbors of the sample x and comparing the quadratic sum of the distances of the k nearest neighbors of the sample x with the threshold value, judging that the sample x is normal if the quadratic sum of the distances of the k nearest neighbors of the sample x is smaller than the threshold value, otherwise, judging that the sample x is faulted. By the selection of the master sample model, data structures of all working conditions are optimized, and the accuracy of a fault detection model is improved.
Owner:SHENYANG INSTITUTE OF CHEMICAL TECHNOLOGY

Data acquisition system, data analysis system and monitoring analysis system based on intelligent terminal

The invention discloses a data acquisition system based on an intelligent terminal, a data analysis system based on an intelligent terminal, and a monitoring analysis system comprising the data acquisition system and the data analysis system. The data acquisition system is installed on a terminal, and is used for monitoring an operation system of the terminal, acquiring data of service execution condition of the terminal and transmitting the data to a data server. The data analysis system comprises a data server and a client, wherein the client is used for receiving operation commands and displaying graphs. The data acquisition system, the data analysis system and the monitoring analysis system aim to monitor user's perception condition of a mobile network, and have the advantages of judging event occurrence situation based on user behavior and recording data, being capable of acquiring and analyzing networks of various systems, being suitable for various kinds of terminals, being capable of distinguishing actual operation service types of the user, effectively monitoring user's perceptibility of the mobile network, providing data basis for improving perceptibility, judging whether to acquire data according to a wireless environment where the terminal is positioned and data service opening situation, and being capable of reducing data volume acquired by the terminal without consuming flow of the user.
Owner:POTEVIO INFORMATION ENG DESIGN SERVICE CO LTD

Data security verification and updating method supporting third-party administrator (TPA) in mobile cloud computing

The invention provides a data security verification and updating method supporting a third-party administrator (TPA) in mobile cloud computing. The method adopts the technical scheme that based on the BLS short signature algorithm and the hash tree algorithm, a key is generated through the key generation algorithm in mobile cloud, and a signature is generated through the signature generation algorithm in mobile cloud, so that challenge information is created, verification information is generated, and data verification is finally carried out. The method provided by the invention has the advantages that a verification process can be outsourced, so that computing and storage burdens on a mobile terminal are reduced; no status information is saved during the verification process, and a cloud service provider only needs to construct corresponding verification data according to a challenge request sent by a verifier and returns the verification data; and the verification does not involve source file blocks, and a verification terminal operates file blocks which have been processed through mapping functions during the whole verification process, so that file information can be prevented from being disclosed to the TPA.
Owner:SICHUAN YONGLIAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products