Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

70results about How to "Reduce transmission cost" patented technology

Authenticated encryption method and encryption system based on symmetric encryption

The invention discloses an authenticated encryption method and a system, relating to the field of communication security. The restorable signature of a message and the symmetric encryption technologyare combined; a commitment value which only can be calculated by a designated message receiving end is used as a session key encryption message; and the message receiving end validates the validity ofthe message by the restorable signature, thus realizing encryption and authentication in one logical step. A key generation unit of a sending end generates a session key of the sending end; an encryption unit encrypts a message to be sent; the receiving end generates a session key of the receiving end; a decryption unit utilizes the session key of the receiving end to decrypts the encrypted message; and the authentication and confirmation message is generated according to the decrypted message, thus validating the validity of the message. When disputes occur, the message receiving end transforms the authenticated and encrypted message signature into a common signature so as to lead a third party to validate the validity of the signature. The invention has the advantages of high security,low calculated amount and transmission cost, and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method for calculating node similarity of chart in distributing manner

The invention discloses a method for calculating node similarity of a chart in a distributing manner and belongs to the field of computer data mining. The method comprises the following steps: a distributed calculating platform is built by adopting a master / slave mode, object data is read by a master computer, a graph model is built and sent to slave computers, tasks are divided by the master computer, slave tasks are assigned to the slave computers, the slave computers calculate task nodes and send the calculating results to the similarity incremental calculation values of the node pairs of the graph model respectively, the master computer calculates a deviation ratio and sends the calculating results to corresponding slave computers, the slave computers amend the similarity incremental calculation values of the nodes of local tasks, sum the similarity incremental calculation values and send the calculating results to the master computer, the master computer integrates the similarities of the nodes of the graph model to obtain the similarity of the nodes of the graph model finally. According to the invention, compared with the traditional SimRank calculating method, the transmission cost is low, the calculating time is short, and the efficiency is obviously improved.
Owner:NORTHEASTERN UNIV

Equipment fault three-level bidirectional early warning method and system based on edge computing

The invention provides an equipment fault three-level bidirectional early warning method and system based on edge computing, and the method comprises the steps: building a first-level bidirectional data sensing prediction model based on an adaptive exponential smoothing algorithm, predicting the data of a collection node, carrying out preliminary screening of a fault signal, uploading the fault signal, and reducing the cost of normal signal transmission; a second-stage bidirectional data perception prediction model of an autoregressive moving average algorithm based on extended Kalman filtering is constructed, and is used for further confirming the accuracy of a fault signal, reducing the false alarm rate and reducing the communication cost between a side end and a cloud end; creating a third-stage bidirectional data perception prediction model based on LSTM and BP neural network combination so that strong computing power is achieved based on edge equipment, he accuracy of data is enhanced, underlying requirements are timely responded, thus reducing time delay of cloud layer transmission. According to the invention, bandwidth and time delay consumed in a data acoustic wave communication transmission process are greatly reduced, and early warning is effectively carried out on a fault signal.
Owner:杭州雪沉科技信息有限公司

Multi-network coverage apparatus and method having network selection function

The present invention relates to a multi-network coverage apparatus and a multi-network coverage method having a network selection function. The multi-network coverage apparatus comprises a core processing module, a wireless communication module and an energy supply module; wherein the core processing module is used for controlling the multi-network coverage apparatus to achieve self-organized networking with other network apparatuses, and selecting a corresponding communication mode for performing data transmission according to attributes of data to be transmitted when there is data needing to be transmitted after the networking; the wireless communication module is used for providing a plurality of wireless communication modes for the core processing module to select during networking and data transmission; and the energy supply module is used for providing energy supply for the multi-network coverage apparatus. The multi-network coverage apparatus and the multi-network coverage method of the present invention improve a survival capability, an expansion capability and reliability of a network in a complex environment, reduce the number of various apparatuses in the network, facilitate management of the network, and reduce investment cost of the apparatuses.
Owner:INST OF INFORMATION ENG CAS

Network coding based weak security multicast transmission topology construction method facing integer transmission rates

The invention discloses a network coding based weak security multicast transmission topology construction method facing integer transmission rates. The method includes the following steps: parametersof the network can be obtained; the network is expressed as a digraph, the digraph consists of nodes and edges, the nodes include source nodes, intermediate nodes and destination nodes, if a communication link exists between two nodes, an edge is connected between the two nodes in the communication link direction, the capacity of each directed edge is equal to the capacity of the corresponding communication link, and the cost of each directed edge is equal to the cost of the corresponding communication link; a mathematical model of the network coding based weak security multicast transmissiontopology of the integer transmission rates can be built according to the digraph; solving can be performed by adopting an integer linear programming solution; and a network coding based weak securitymulticast transmission topology construction plan of the integer transmission rates can be obtained. The construction of transmission topology can be achieved under the condition that the network coding based weak security multicast of the integer transmission rates meets weak security needs, secure transmission throughput in network can be reached to maximum, and at the same time, minimum transmission cost at the maximum throughput can be guaranteed, and efficiency and cost optimization of the network can be achieved.
Owner:SUZHOU UNIV

File repair system and method

The invention relates to a file recovery system. The system comprises a BM-SC and a via network element, wherein, the system is also provided with a file recovery node which is connected with the via network element which controls the file recovery node, and the file recovery node is used for storing corresponding data block in dialog information forwarded by the via network element for realizing file recovery; the via network element which controls the file recovery node also comprises a calculation module which is used for calculating the usable resource information of the file recovery nodes and a report module which is connected with the calculation module and used for reporting the status information of the file recovery node to the BM-SC; the BM-SC also comprises a distribution module which is used for generating the list of the file recovery node. The invention also relates to a file recovery method which comprises the steps of distributing dialog information and the file recovery node list by the BM-SC, storing the corresponding data block by the file recovery node and requesting file recovery from a terminal. The file recovery system reduces communication traffic when data is distributed and downloaded to the file recovery node and avoids the overload of the file recovery node.
Owner:CHINA MOBILE COMM GRP CO LTD

Multi-keyword searchable encryption method and system supporting Boolean access control strategy

The invention discloses a multi-keyword searchable encryption method and system supporting a Boolean access control strategy, and the method comprises the steps of firstly enabling a trusted authorityto generate a system public key, a main key and an IlGamal private key, carrying out the cloud disclosure of the system public key, and transmitting the private key to a data user; then enabling thedata owner to generate an index ciphertext and a data ciphertext for the document and upload the index ciphertext and the data ciphertext to the cloud; uploading the attribute set and the query keyword predicate of the data user to a credible authority to verify whether the identity of the user is legal or not during data user retrieval, and generating a retrieval token and sending the retrieval token to the data user if the identity of the user is legal; enabling the data user to receive the retrieval token and upload the retrieval token to the cloud; after receiving the token, enabling the cloud server to check whether each index ciphertext is matched with the retrieval token or not by using a system public key, and send the matched data ciphertext to a data user; and enabling the data user to recover the data ciphertext into plaintext content by using the private key. According to the invention, fine-grained Boolean access control, Brillouin keyword search and constant-level systemkey length can be realized.
Owner:SOUTH CHINA UNIV OF TECH

Line art picture hiding and recovering method and equipment, and storage medium

The invention belongs to the crossing field of image information security and digital image signal processing, and discloses a line art picture hiding and recovering method and equipment, and a storage medium. A blindage image is converted into a multi-order halftone image, secret information is subjected to multiple backups, a secret information embedding position is positioned according to a user secret key, the secret information and blindage pixels are coded in combination with the thickness of a line graph, and a secret-containing line graph is generated. The secret information is decodedaccording to the key, and the accuracy of secret information recovery is improved through a secret information recovery strategy based on multiple backups. Compared with the existing method, the method according to the invention is advantageous in that the hiding and recovering process strictly depends on a user secret key, the certain attack tolerance capacity and recovering capacity are achieved, the secret embedding capacity is high, the transmission cost is low, the generated secret embedding shelter is a special carrier, an original shelter is not transmitted in a channel, detection of asecret analyzer based on natural image statistical characteristics can be resisted, and high safety is achieved.
Owner:SHAANXI NORMAL UNIV

Multi-sensor multi-frame joint detection algorithm based on posteriori information fusion

The invention discloses a multi-sensor multi-frame joint detection algorithm based on posteriori information fusion. The method comprises steps that S1, system parameters are initialized, including the number M of sensors included in a system, the size Nx*Ny of a sensor echo data plane and the number K of algorithm joint processing cycles, and a variable k=1 is initialized; S2, echo data is received; S3, local posteriori probability density function calculation is performed; S4, a posterior probability density function represents approximate calculation of parameters; S5, information transmission is performed; S6, global posteriori probability density calculation is performed; and S7, target track estimation is performed. The algorithm is advantaged in that advantages of both multi-sensorinformation fusion technology and the multi-frame joint detection technology can be performed, detection and tracking performance of the algorithm for weak targets is further improved, transmission cost of the algorithm is reduced through Gaussian mixture approximation, algorithm implementation efficiency is improved while algorithm performance is guaranteed, and the algorithm can be widely applied to the networking radar, MIMO radar, array sonar and other fields.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Federal learning-based distributed language relationship identification method, system and device

The invention belongs to the field of data identification, particularly relates to a distributed language relationship identification method, system and device based on federated learning, and aims tosolve the problem that a plurality of participants are difficult to perform joint modeling on the basis of not sharing data. The method comprises the steps that each local platform obtains to-be-recognized data and local training data with labels, a local classifier model is trained according to the local training data, the trained classifier models are integrated into a global classifier model,the local classifier model is initialized through the global classifier model, and to-be-identified data is identified by using the initialized local classification model to obtain a language relationship prediction result. According to the method, the local platform is combined with other platforms to perform data use and machine learning modeling on the basis of not sharing data, so that the training collaboration of the natural language recognition model is improved, the problem of data islands is solved, and the total amount and requirements of training data required for training the modelby each platform are reduced.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

A compressed sensing compensation method based on an edge extraction and image fusion technology

InactiveCN104217431ARich image detail displayAccurate image detail displayImage enhancementImage analysisHat matrixEdge extraction
The invention relates to a compressed sensing compensation method based on an edge extraction and image fusion technology. The compressed sensing compensation method based on an edge extraction and image fusion technology comprises the following steps: at a sending end, inputting an original image I to be transmitted, extracting in advance an edge feature of the original image I in two stages, and obtaining a sparse matrix BW1 containing edge information of the original image; executing space-domain random sampling on the original image I by adopting a compressed sensing measurement method, and obtaining a low-dimensional projection matrix BW2 of the original image; integrating element information in the sparse matrix BW1 containing edge information of the original image and in the low-dimensional projection matrix BW2 of the original image, and transmitting the integrated element information; at a receiving end, executing edge decoding on transmission data, and reconstructing the low-dimensional projection matrix of the original image; executing registration on two images obtained, executing fusion on them by using a space-domain fusion principle, and outputting a final result BW3. The compressed sensing compensation method based on an edge extraction and image fusion technology has the advantages of the lower transmission cost and better ability of noise resistance.
Owner:TIANJIN UNIV

Method and server for identification in batches based on biological characteristics

The invention discloses a method and server for identification in batches based on biological characteristics. The method comprises the steps that registration information is sent to the server by a sensor node with identity identification, verification information of the sensor node with the identity identification is generated by the server and stored in a list, and meanwhile corresponding registration response information is generated according to the identity identification and sent back to the sensor node; when user health information is collected by the sensor node, verification request information is generated with combination of the registration response information with the identity identification of the sensor node and sent to the server, calculation and superposition are conducted on verification request information with the same identity identification, identification processing in batches is conducted on the verification information stored in the list, and if verification is successful, the user health information collected by the sensor node is received by the server, uploaded and stored; and if verification is failed, the process of verification is stopped. According to the method and service for identification in batches based on the biological characteristics, the problems that verification cost is high in a personal health management system and a verification token or a password can be lost and forgotten easily are solved.
Owner:BEIJING UNIV OF POSTS & TELECOMM +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products