Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

42results about How to "Reduce storage complexity" patented technology

Method and system for coding, decoding and reconstructing video image blocks

The invention discloses a method and a system for coding, decoding and reconstructing video image blocks, wherein the coding method comprises the following steps: selecting a prediction mode, and generating predicted blocks according to the reconstructed pixels around image blocks; calculating the difference between the pixels corresponding to the image blocks and the predicted blocks to obtain residual values, wherein all the residual values constitute a residual block; selecting the arrangement sequence of at least one residual value from a group of rearrangement sequences of the residual values to be selected, and rearranging the residual values in the residual block; transforming the rearranged residual block by selecting a transformation function to obtain the indication of the transformation coefficient of the residual block; and further scanning, quantifying and carrying out entropy-coding on the transformation coefficient. By rearranging the residual sampling values in the residual block in a null field, the characteristics of residual statistics in different modes can be similar or identical, thus achieving the performance similar to the transformation related to the modes by using fewer transformation functions and reducing the storage complexity of a coder and a decoder at the same time.
Owner:PEKING UNIV

Publicly-verifiable cloud data possession checking method

A publicly-verifiable cloud data possession checking method is provided. The method includes the three stages of initialization, user challenge-response verification and TTP arbitration; the three stages comprise the following ten steps that: step 1, data segmentation [F->F'] is performed; step 2, verification tag generation [(SK, F)-> HVT] is performed; step 3, data and tag information upload [(F, HVT)->S] is performed; step 4, secret parameters are recorded to a TTP (trusted third party); step 5, the TTP verifies recorded parameters; step 6, [chal] is initiated by a user, and the chal and the verification information of the chal are handed over to the TTP so as to be record; step 7, a server makes a response; step 8, [(R, sk)->(' success', 'failure')] is verified; step 9, relevant information acquisition is verified; and step 10, the trusted third party performs verification publicly. With the publicly-verifiable cloud data possession checking method of the invention adopted, the user can verify the existence and integrity of data in a cloud storage server. The publicly-verifiable cloud data possessions checking method is advantageous in no limitation on the number of user authentication times as well as small storage capacity and low computational complexity of a client, and has great practical value and broad application prospect.
Owner:BEIHANG UNIV

Development method and system of small sample classification model based on graph convolutional neural network

The invention belongs to the field of computer vision, particularly relates to a development method and system of a small sample classification model based on a graph convolutional neural network, andaims to solve the problems that an existing model is poor in performance and needs a large number of training samples with labels when applied to a new task. The method comprises the steps of extracting a knowledge graph formed by an undirected graph, and obtaining knowledge information related to a task; extracting experience information of the original model in the training process of the old task; fusing the knowledge information and the empirical information to form a new fusion graph; and obtaining a new task-oriented cognitive developed classification model by establishing a relationship between a new task category and an old task category and carrying out model training. According to the method, in the task migration process, a new task can achieve rapid and accurate visual migration without providing a large number of samples with labels, the utilization rate of the model is greatly increased, the cost of training the model is reduced, and the time of training the model is shortened.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Monitorable privacy communication method based on secret sharing scheme

The invention discloses a monitorable privacy communication method based on a secret sharing scheme. The privacy communication method comprises a user side, a service provider, and an monitor side. The user side comprises a sender and a receiver. Point-to-point communication or many-to-many communication between the sender and the receiver is adopted. A key agreement is performed between the sender and the receiver through a DH protocol. After the key agreement is completed, a session key formed is divided according to the number of the sender, the receiver, the service provider, and the monitor side, and the divided key is assigned to the sender, the receiver, the service provider, and the monitor side. Then, a group member encrypts the received divided key. The service provider receivesthe encrypted key and the assigned divided key. The monitor side receives the assigned divided key. According to the monitorable privacy communication method based on a secret sharing scheme, the contradiction between the privacy communication of users and the content monitoring from the service provider in the prior art can be solved; privacy communication of users can be protected to the greatest extent; and point-to-point and many-to-many monitorable privacy communication can be achieved.
Owner:曹鸣佩

Q learning-based medium access control method for underwater acoustic network with variable number of nodes

The invention discloses a node number variable underwater acoustic network medium access control method based on Q learning, and relates to an underwater acoustic network. The method comprises the following steps: dividing a transmission process of collecting data sensed by underwater acoustic sensor nodes by aggregation nodes into a plurality of time slots, applying a Q learning algorithm, combining feedback signals of the aggregation nodes and the quantity change condition of the sensor nodes, reasonably setting an award mechanism, and carrying out integral award sub-matrix design on a whole line (namely, a sub-matrix) of a Q matrix, not updating the Q matrix element by element, and reasonably distributing the time slot to each sensor node, so the data is not influenced by other sensor nodes in the transmission process, and the data collection conflict of the aggregation node is avoided. The method provided by the invention has the characteristics of high learning speed, high throughput, low energy consumption and strong anti-interference capability, can solve the problem of time slot redundancy when nodes are reduced or the problem of insufficient time slot when nodes are increased due to node death or position drift, and ensures the success rate of underwater acoustic data transmission and high throughput of an underwater acoustic network.
Owner:XIAMEN UNIV +1

A publicly verifiable cloud data possession verification method

ActiveCN103414690BImplement presence/integrity verificationImplement remote storage service verification fairnessTransmissionComputation complexityRelevant information
A publicly-verifiable cloud data possession checking method is provided. The method includes the three stages of initialization, user challenge-response verification and TTP arbitration; the three stages comprise the following ten steps that: step 1, data segmentation [F->F'] is performed; step 2, verification tag generation [(SK, F)-> HVT] is performed; step 3, data and tag information upload [(F, HVT)->S] is performed; step 4, secret parameters are recorded to a TTP (trusted third party); step 5, the TTP verifies recorded parameters; step 6, [chal] is initiated by a user, and the chal and the verification information of the chal are handed over to the TTP so as to be record; step 7, a server makes a response; step 8, [(R, sk)->(' success', 'failure')] is verified; step 9, relevant information acquisition is verified; and step 10, the trusted third party performs verification publicly. With the publicly-verifiable cloud data possession checking method of the invention adopted, the user can verify the existence and integrity of data in a cloud storage server. The publicly-verifiable cloud data possessions checking method is advantageous in no limitation on the number of user authentication times as well as small storage capacity and low computational complexity of a client, and has great practical value and broad application prospect.
Owner:BEIHANG UNIV

Local differential number dynamic BP decoding method for LDPC code

The invention provides a local dynamic update decoding method (LILRBP) based on an LDPC code aiming at a dynamic BP decoding algorithm of the LDPC code. According to the method, the local residual based message update is adopted, the BP decoding performance including a small number of iterations under high signal-to-noise ratio can be effectively improved, and other dynamic BP decoding algorithms can be surpassed. Different from the previous dynamic BP decoding methods, the LILRBP method considers that residuals have time validity, and therefore, the LILRBP method only focuses on the recent part of the residuals, sets an iteration times threshold, then filters the local residuals according to the change of likelihood ratio symbols of a correlation variable node below the threshold, and then determines the next message to be updated according to the filtered residual; and above the threshold, the next message to be updated is directly determined based on the local residual. The advantages of the method are as follows: the message update can always be performed by using the latest messages, the role of accelerating the algorithm convergence speed can be played, and the local residuals are re-filtered below the threshold, the algorithm convergence can be further accelerated, the convergence of the algorithm can be influenced by the combination of the two operations, the convergence speed of the BP decoding algorithm can be effectively improved, and the purpose of improving the decoding performance can be achieved.
Owner:GUANGDONG UNIV OF TECH

Construction method for quasi-cyclic low density parity check (LDPC) code check matrix

The invention relates to a construction method for a quasi-cyclic low density parity check (LDPC) code check matrix. The construction method for the quasi-cyclic LDPC code check matrix comprises the following steps of: determining a line parameter J and a column parameter L of a basis matrix of the check matrix to be designed; after the line and column parameters are determined, traversing all columns by the line, and for the given position of the jth line and the lth column of the basis matrix, sequentially obtaining terms of each Hanoi tower array according to the definitions of the Hanoi tower array that f(1)=1 if n is 1 and that f(n+1)=s*f(n)+1 if n is more than 1; obtaining a circulant permutation matrix offset value pj,l according to a formula pj,l=f(j+1)+j, adding a digital value jof a corresponding line to each f(j+1) value obtained by the second step to obtain a circulant permutation matrix offset value pi,j and arranging the pi,j at the position of the jth line and the lth column of the basis matrix to be constructed; and constructing the basis matrix to be designed by using all the pj,l values. By the method, the performance of a quasi-cyclic LDPC code is improved, and simultaneously storage complexity is decreased.
Owner:上海新微科技发展有限公司

A dynamic bp decoding method for local different signs for ldpc codes

The invention provides a local dynamic update decoding method (LILRBP) based on an LDPC code aiming at a dynamic BP decoding algorithm of the LDPC code. According to the method, the local residual based message update is adopted, the BP decoding performance including a small number of iterations under high signal-to-noise ratio can be effectively improved, and other dynamic BP decoding algorithms can be surpassed. Different from the previous dynamic BP decoding methods, the LILRBP method considers that residuals have time validity, and therefore, the LILRBP method only focuses on the recent part of the residuals, sets an iteration times threshold, then filters the local residuals according to the change of likelihood ratio symbols of a correlation variable node below the threshold, and then determines the next message to be updated according to the filtered residual; and above the threshold, the next message to be updated is directly determined based on the local residual. The advantages of the method are as follows: the message update can always be performed by using the latest messages, the role of accelerating the algorithm convergence speed can be played, and the local residuals are re-filtered below the threshold, the algorithm convergence can be further accelerated, the convergence of the algorithm can be influenced by the combination of the two operations, the convergence speed of the BP decoding algorithm can be effectively improved, and the purpose of improving the decoding performance can be achieved.
Owner:GUANGDONG UNIV OF TECH

An anti-counterfeiting method based on RFID and physical unclonable function

The invention relates to the production anti-fake field, in particular to a anti-fake method based on an RFID and a physical unclonable function. Through a anti-fake system which is composed of an RFID label, a card reader and a server, product information, a set of output information of the physical unclonable function and message verification codes are stored in the RFID label, and a secret key is stored in the server. The method includes the steps of enabling the server to obtain information stored in the RFID label through the card reader, enabling the server to generate server side message verification codes according to the obtained information, enabling the server to compare the server side message verification codes with the message verification codes in the RFID label, returning a specific challenge value to the card reader if the server side message verification codes are consistent with the message verification codes in the RFID label, otherwise, returning a fake verification result to the card reader, enabling the server to obtain a response of the physical unclonable function in the RFID label to the specific challenge value through the card reader, completing final verification and returning the final verification result to the card reader. According to the anti-fake method, the product anti-fake check efficiency is high, and the calculation complexity is low.
Owner:SUN YAT SEN UNIV

Medium access control method for underwater acoustic network with variable number of nodes based on q-learning

The invention discloses a Q-learning-based medium access control method for an underwater acoustic network with a variable number of nodes, involving the underwater acoustic network. Divide the transmission process of the sink node collecting the perceived data of the underwater acoustic sensor nodes into several time slots, use the Q learning algorithm, combine the feedback signal of the sink node, the change of the number of sensor nodes, and set the reward mechanism reasonably, aiming at a Q matrix The entire row (that is, the sub-matrix) is designed for the overall reward sub-matrix instead of updating the Q matrix element by element, and the time slots are reasonably allocated to each sensor node, so that the data will not be affected by other sensor nodes during transmission and avoid aggregation Node data collection conflict. The method proposed in the present invention has the characteristics of fast learning speed, high throughput, energy saving, and strong anti-interference ability, and can solve the problem of time slot redundancy when nodes are reduced or time slots when nodes are increased caused by node death or position drift Insufficient problems, to ensure the success rate of underwater acoustic data transmission and high throughput of underwater acoustic network.
Owner:XIAMEN UNIV +1

Improving Accuracy and Reducing Complexity of Sparse Image Reconstruction Using Structural Prior Constraint

A method for improving sparse image reconstruction accuracy and reducing complexity by using structured prior constraints, belonging to the field of remote sensing image compression technology, is characterized in that it is a method of introducing image information on the basis of a multi-observation vector model to improve accuracy and reduce complexity , including the following steps in turn: input observation matrix, matrix composed of multi-observation vectors, number of wavelet transform layers, number of wavelet coefficients in each layer; initialize system model parameters, image wavelet coefficients, maximum number of iterations, precision performance index; use Markov-based The Gibbs sampling of the chain Monte Carlo method reconstructs the wavelet coefficients of the image, and then performs wavelet inverse transform on the reconstructed wavelet coefficient matrix to obtain the reconstructed image. The present invention can apply the required accuracy performance index to the actual reconstructed image, utilize the multi-observation vector model to reduce the complexity, and at the same time adjust the reconstruction accuracy by adjusting the number of wavelet transform layers, so that the quality of the reconstructed image meets the performance index requirements .
Owner:TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products