Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

124results about How to "Save communication bandwidth" patented technology

WSN (Wireless Sensor Network) abnormity detection method and system based on artificial immunization and k-means clustering

The invention discloses a WSN abnormity detection method and system based on artificial immunization and k-means clustering. The method comprises that S1) original monitoring data collected by WSN nodes is obtained to form a time sequence, the time sequence is normalized, compression and dimension reduction are carried out on the normalized sequence, and the mean value and variance of each sequential segments in the compressed sequence are calculated; S2) the Euclidean distance between node data and each cluster head is calculated, and an artificial immunization algorithm is used to search an optimal initial cluster head set for K-means classification; S3) whenever new data is distributed into a corresponding cluster, iterative update is carried out on the cluster head value of the cluster till the amount of all data in the cluster does not change; and S4) the WSN determines abnormity according to the amount of data in the cluster in a K-means clustering result. According to the invention, abnormity information in monitoring data can be discovered accurately, the instantaneity and reliability of abnormity event detection of the WSN are improved, and energy and communication bandwidth of the WSN are greatly reduced.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

Encoding and decoding device for low-code rate video super-resolution reconstruction

The invention discloses a coding device and a decoding device of low code rate video super-resolution reconstruction in the video processing field. In the invention, the coding device part provides auxiliary code stream to improve efficiency and precision of the low code rate video super-resolution reconstruction; the decoding device part uses the very little auxiliary code stream provided by the coding terminal to guide the super-resolution reconstruction of the decoding terminal; the coding device part uses the very little super-resolution constructed by pre-decoding closed loop feedback with super-resolution reconstruction to reconstruct the auxiliary code stream, and uses a human eye interested region analyzing module in the coding module to guide and correct with the emphasis on the super-resolution reconstruction of the human eye interested region, to further improve subjective quality input by video decoding. Compared with common video super-resolution ''blind'' reconstruction, the invention reduces complexity of the super-resolution reconstruction obviously, improves the reconstruction efficiency, meanwhile strengths the adaptive capacity of the super-resolution reconstruction to the high dynamic and diversified video image data, and improves the reconstruction precision.
Owner:SHANGHAI JIAO TONG UNIV

Verifiable ideal on-grid threshold proxy re-encryption method and verifiable ideal on-grid threshold proxy re-encryption system

ActiveCN111342976ADetect dishonesty in timeTimely detection of malicious conversion behaviorKey distribution for secure communicationUser identity/authority verificationHomomorphic signatureAlgorithm
The invention belongs to the technical field of data encryption and privacy protection, and discloses a verifiable ideal on-grid threshold proxy re-encryption method and system, and the method comprises the following steps: generating a first public and private key and a second public and private key through a KeyGen algorithm; encrypting the original message according to the first public key to generate a ciphertext; generating an agent key through a ReKeyGen algorithm according to the first private key and the second public key, dividing the agent key into a plurality of key shares, and signing each key share through a homomorphic signature technology to obtain a plurality of key share signatures; converting the ciphertext into a plurality of ciphertext shares according to the pluralityof key shares, and converting the plurality of key share signatures into a plurality of ciphertext share signatures; verifying the legality of the corresponding ciphertext share according to each ciphertext share signature; combining the legal ciphertext shares into a re-encrypted ciphertext; decrypting the re-encrypted ciphertext according to the second private key to get the original message. According to the invention, the method and system have the advantages of high availability, low trust and strong security, can effectively resist quantum attacks, and is high in encryption efficiency.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Safety communication method suitable for remote control with limited capability at controlled end

The invention discloses a safety communication method suitable for remote control with a limited capability at a controlled end. The method comprises the following steps of: setting password sets at a control end and the controlled end and generating a password set according to an input initialization password by an irreversible method, wherein the password set comprises an index number and the password per se and encryption and decryption are performed by using the password corresponding to the recorded index number in a normal communication process; when the password is asynchronous, transmitting the index number by encrypting to perform password synchronization; and when a password set updating condition is met, negotiating about the update of the password set by transmitting a selected index number. A password set generating device for calculating the password set and communicating with the controlled end only when the password set is needed to be generated is arranged at the controlled end. Various attacks are resisted effectively by using a dynamic password and operation of real-time password calculation needed by the transmission of each data packet is avoided. Simultaneously, the password per se does not need to be transmitted on a communication link in password synchronizing and password set updating processes, so that simpleness and safety are realized.
Owner:SOUTH CHINA UNIV OF TECH

Wireless sensor network abnormal event detection method and system based on secondary mixed compression

The invention discloses a wireless sensor network abnormal event detection method and system based on secondary mixed compression. The method comprises the steps that S1. primary compression is performed on original data sequences by a compression sensing method; and secondary compression is performed on the compressed sequences by a piecewise linear fitting method so that state edge operators are obtained; S2. edge amplitude and edge intensity of each data point in the compressed sequences are calculated, and new edge point sequences are formed by selecting edge points of low interpolation error from edge point sequences; S3. characteristic value sequences are obtained according to edge point sequences; S4. local accessible density and local abnormal factors are calculated; and S5. event detection is performed in corresponding time sequence intervals according to the size of the local abnormal factors after mixed compression. Search efficiency and abnormal data accurate positioning capacity of wireless sensor network nodes can be enhanced so that abnormal events can be more efficiently and rapidly found; and timeliness of abnormity detection can be enhanced so that energy and communication bandwidth can be greatly saved.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

In-vehicle entertainment product and corresponding voice transmission method and system

The embodiment of the invention provides an in-vehicle entertainment product and a corresponding voice transmission method and system, and belongs to the technical field of vehicles. The voice transmission method for the in-vehicle entertainment product comprises the steps: building a data connection between the in-vehicle entertainment product and a mobile terminal when the mobile terminal is located in a vehicle; collecting voice information of a driver; judging whether the frequency and decibel of voice information are respectively within a preset frequency range and a preset decibel rangeor not: filtering the voice information if the frequency and decibel of voice information are not respectively within the preset frequency range and the preset decibel range, or else transmitting thevoice information to the mobile terminal based on the data connection. According to the embodiment of the invention, the method can achieve the filtering of a noise signal collected by the in-vehicleentertainment product, enables the noise signal not to be transmitted to the mobile terminal, thereby saving the communication bandwidth between the in-vehicle entertainment product and the mobile terminal, enabling the in-vehicle entertainment product and the mobile terminal not to carry out the processing of the noise signal, and facilitating the resource allocation of the in-vehicle entertainment product and the mobile terminal.
Owner:FAFA AUTOMOBILE (CHINA) CO LTD

Multi-terminal data synchronization method based on ACK synchronization

The invention provides a multi-terminal data synchronization method based on ACK synchronization. According to the method, a server and all terminals keep respective latest transmission control character sequence numbers; the server is firstly started to read in the latest value of the own transmission control character sequence number, and then all the terminals are started to read in the latest values of the respective transmission control character sequence numbers; when data is newly added to one terminal, the terminal sends the data to the server; the server saves the data, updates the own transmission control character sequence number, and broadcasts the data to all the terminals; after receiving the data broadcasted by the server, any one terminal parses the transmission control character sequence number of the broadcasted data, and judges whether the transmission control character sequence number of the broadcasted data is equal to the value of the local transmission control character sequence number plus one or not; if yes, the terminal updates the broadcasted data to the local end, and updates the value of the local transmission control character sequence number; if no, the terminal discards the broadcasted data, and uploads a synchronization request containing the value of the local transmission control character sequence number to the server; after obtaining the corresponding data, the terminal updates both the local data and the value of the local transmission control character sequence number.
Owner:HUBEI UNIV OF ARTS & SCI

1588 synchronization method, system and device for high-speed TTE cascade network

ActiveCN111800213ASolve the conflict problem of preempting the MAC sending channelImprove applicabilityTime-division multiplexComputer hardwareEngineering
The invention belongs to the technical field of network communication. The invention discloses a 1588 synchronization method, a 1588 synchronization system and a 1588 synchronization device for a high-speed TTE cascade network. The 1588 synchronization method comprises steps of enabling a port to calculate link delay; enabling a switching node to receive data frames, stamping receiving timestamps,analyzing the synchronous frame Sync and extracting the frame content; caching timestamp information, calculating time deviation, correcting a local clock, forwarding a synchronization frame Sync toa sending port, sending arbitration, sending analysis and caching a frame type, performing MAC sending processing, taking a sending timestamp, extracting the cached sending frame type, modifying a Sync frame correction domain, and finishing transparent transmission. According to the invention, the data frame type is analyzed at the data link layer and then MAC sending processing is carried out, sothat timestamp correction can be carried out rapidly when a synchronization frame is about to be transmitted to a high-speed network port; and meanwhile, the switching node is designed to adopt a transparent clock and common slave clock working mode, so that the universality and functional diversity of a synchronization scheme are improved.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products