Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

65results about How to "Reduce the need for computing resources" patented technology

Method for encrypting and decrypting streaming document and device thereof

The invention relates to the field of digital publishing, and discloses a method for encrypting and decrypting a streaming document and a device thereof. According to the method, each part of one streaming document is encrypted at different encrypting grades, general contents can be encrypted by adopting a low-security-level rapid encryption algorithm, and important contents are encrypted by adopting a high-security-level safety encryption algorithm, so that the overall encryption speed of the document is increased, the demand on computing resources in a computer system is lowered, and the security of the important contents is ensured. Each part of one streaming document is encrypted by adopting different encrypting grades, and the contents of a low encryption security level can be decrypted rapidly, so that the overall decryption speed of the document is increased. At a lowest encryption security level, encryption is not performed, so that computer resources needed by encryption can be further reduced; parts of contents of the streaming document do not need to be decrypted during use, so that the demand of terminal equipment on computing resources is lowered; the method and the device are particularly suitable for trial reading of parts of chapters.
Owner:JIEFANG DAILY NEWSPAPER GRP

Data processing method and related equipment

The invention relates to the field of artificial intelligence, and discloses a data processing method comprising the steps of acquiring to-be-processed data and a target neural network model, whereinthe target neural network model comprises a first transformer layer, the first transformer layer comprises a first residual error branch and a second residual error branch, the first residual error branch comprises a first attention head, and the second residual error branch comprises a target feedforward layer FFN; performing target task related processing on the to-be-processed data according toa target neural network model to obtain a data processing result, the target neural network model being used for performing target operation on the output of the first attention head and the first weight value to obtain the output of the first residual branch, and/or using the target neural network model for performing target operation on the output of the target FFN and the second weight value to obtain the output of the second residual branch. According to the embodiment of the invention, for different tasks, the weight value for controlling the output of the residual branch is set, so thatthe computing resource requirement of the terminal equipment for operating the target neural network model is reduced.
Owner:HUAWEI TECH CO LTD

Cluster anomaly detection method of combustion gas turbine

The invention provides a cluster anomaly detection method of a combustion gas turbine, which solves the problems of insufficient early warming, simple and limited fault monitoring level and high misjudgment degree, caused by that the conventional combustion gas turbine has the defects of large quantity of data collected by a sensor and excessively large information amount. The cluster anomaly detection method disclosed by the invention has special processes as follows: obtaining monitoring data and input parameters; extracting characteristic quantities for representing characteristics at different moments; establishing an overall distance matrix for measuring similarities among sample points at the different moments; obtaining a cluster center sample which each sample belongs to from G samples; sorting the samples with the same cluster center as one type, so as to obtain sets of clusters; and ordering the quantity of cluster results, so as to obtain a set of abnormal samples. The cluster anomaly detection method disclosed by the invention has a small calculation resource demand, and low time and space costs. The cluster anomaly detection method is used for finally representing abnormal data points by rapidly clustering data based on a linear clustering manner, and has very strong accountability.
Owner:HARBIN INST OF TECH

Embedded platform recognition method for large vocabulary quantity of voice command words

The present invention discloses an embedded platform recognition method for a large vocabulary quantity of voice command words, belonging to the technical field of voice recognition. The method comprises the following steps: preprocessing voice signals, extracting voice recognition parameters, building a voice acoustic model, training the voice model, building a tree-shaped recognition network and applying rapid recognition search algorithm. The voice acoustic model is an inter diphonia subsidiary model based on right context dependent words of initial consonants. The tree-shaped recognition network is made by that a tree-shaped recognition network is built based on the same consonant syllables and merged with the nodes of the same consonant syllables. The rapid recognition search algorithm adopts a state level pruning strategy and a frame-synchronous word level pruning strategy for the dynamic adjustment of window width according to the tree-shaped recognition network based on the same consonant syllables. The method is improved on the traditional embedded voice recognition method. The memory and the central processing unit (CPU) resources are fully utilized, and the speed for recognizing a large vocabulary quantity of voice command words is accelerated.
Owner:TSINGHUA UNIV

Detection method for neighbor abnormities of gas turbine

The invention discloses a detection method for neighbor abnormities of a gas turbine, and belongs to the technical field of state detection of the gas turbine. By adoption of the detection method, the problem that as the existing gas turbine adopts a plurality of sensors to acquire operating state data, the analysis efficiency for the health condition of the gas turbine is low due to more data quantity is solved. The detection method comprises the following steps of: firstly acquiring point measuring records of monitoring data; then extracting monitoring characteristic quantity sets representing different time characteristics; establishing a global distance matrix for measuring the similar distance among sample points at different times; acquiring local reachable density of each sample and a set of neighbourhood sample points from G samples; comparing the local reachable density of all the samples with that of other samples in the neighbourhood and calculating abnormal scores of all the samples; and carrying out sequencing on the number of abnormal score results of the samples, thus obtaining an abnormal sample set. The detection method disclosed by the invention is applicable to detection of neighbor abnormities of the gas turbine.
Owner:HARBIN INST OF TECH

Method for detecting abnormal sequencing of gas turbine engine

The invention relates to a method for detecting abnormal sequencing of a gas turbine engine, and aims to solve the problems that the data information collected by the sensor of the conventional gas turbine engine is large, the data quality is poor, the analysis efficiency of the sensor is low, and the misjudgement possibility is high. The method is as follows: acquiring monitoring data from a monitoring software of the gas turbine engine; arranging n monitoring data with the sampling time interval into Xi; normalizing the Xi into X'I; filtering noise in the X'I, and further obtaining the smooth data Yi; calculating the variation characteristic of Yi and marking the variation characteristic with Zi; performing the discretization of Zi to get Z'i; replacing all the values in the Z'i with letters, and obtaining Fi as the result after the replacement; sequencing the Fi through the BWT alternation algorithm, and recording the result with Gi; acquiring [Pifrq(W)*r]data points in the W section of Gi; finding the corresponding positions in the Xi of the acquired data points in Q, and therefore obtaining the abnormal data point. The invention has low computing resource requirement and lower time and space cost, and the abnormal data point expressed through frequentness is strongly illustrative.
Owner:NANJING POWER HORIZON INFORMATION TECH CO LTD

Cross-dimension coupling analysis method for containment and passive containment air cooling system

ActiveCN113283189AAccelerateReduce computing resource requirementsDesign optimisation/simulationAir cooling systemThermal hydraulics
The invention discloses a cross-dimension coupling analysis method for a containment and a passive containment air cooling system. The method comprises the following steps: 1, initializing the containment and the passive containment air cooling system; 2, utilizing a multi-node containment program to calculate the heat exchange between the compartment and the wall surface of the adjacent containment and the thermal hydraulic state in the compartment in the accident process; 3, judging whether the last compartment is calculated or not, if so, going to the step 5, and otherwise, going to the step 4; 4, calculating the condensate water transfer process of the wall surface of the containment, and performing calculation in the step 2 on the next compartment; 5, calculating flow heat exchange of the passive containment air cooling system by utilizing three-dimensional computational fluid mechanics software; 6, calculating the temperature of the wall surface of the containment; and 7, repeating the steps 1-6 until the appointed calculation time is reached. The flow heat exchange of the passive containment air cooling system and the influence of the flow heat exchange on the thermal hydraulic state of the containment can be quickly and accurately calculated, and the method is of great significance to the integrity analysis of the pressurized water reactor containment.
Owner:XI AN JIAOTONG UNIV

Bidirectional identity authentication method based on lightweight CA, computer program and storage medium

The invention relates to a bidirectional identity authentication method based on lightweight CA, which comprises the following steps: initialization: a CA node and a common node generating a public and private key pair, and the CA node sending a CA node public key to the common node in the domain; intra-domain authentication: the common nodes of the two parties to be communicated respectively applying for respective auxiliary public keys from the CA node and sending the respective auxiliary public keys to the opposite parties, and the two parties receiving the auxiliary public keys of the opposite parties to perform identity authentication and establishing a secure channel to send messages by initiating a negotiation session password process; cross-domain authentication: establishing a trust alliance by mutual signing of alliance public keys among CA nodes of multiple domains, verifying the authenticity of node identities by the CA nodes corresponding to different regions and signing and issuing temporary auxiliary public keys for the CA nodes when the common nodes roam to the different regions, and initiating an authentication request to the common nodes in the different regions through the temporary auxiliary public keys, and if the authentication is passed, initiating a negotiation session password process to establish a secure channel to send a message.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products