Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

64results about How to "Troubleshoot deployment issues" patented technology

Container-based block chain deployment method

The invention discloses a container-based block chain deployment method. The method comprises the following steps: 1) establishing a kubernetes container cluster; 2) manufacturing a Docker mirror image comprising an operating system, a block chain installation package, a daemon process and a startup script; 3) creating a container arrangement file, and defining the number of container instances, aused mirror image ID, a running port, an NAT gateway ID and an elastic IP; 4) calling a Kubectl command line tool, connecting the container cluster created in the step 1), loading the docker image produced in the step 2) by using the container arrangement file created in the step 3), and creating a blockchain container application; 5) communicating with a daemon process in the container through the GRPC, calling a command for starting the block chain, transmitting a starting parameter, and starting the block chain; And calling a command for checking the block chain state, checking whether theblock chain is successfully started or not, and completing the deployment of the block chain. According to the invention, the container-based block chain deployment method is realized, and the problems of complex operation and low speed of block chain deployment are solved.
Owner:HANGZHOU QULIAN TECH CO LTD

Virtual device generating and deploying method

ActiveCN103793259ASolve the problem that the volume is too large and the distribution is difficultResolve commitProgram loading/initiatingSoftware simulation/interpretation/emulationApplication softwareVirtual computing
The invention belongs to the technical field of virtual computer environments and particularly relates to a virtual device generating and deploying method. Automatic virtual device generating and deploying are achieved by disintegrating the complete virtual machine image used by a virtual device into a basic substrate and a business device. The method includes the steps of firstly, deploying a virtual computing environment, deploying a physical host, and deploying a management server; secondly, under the support of the virtual computing environment, realizing virtual device generating and deploying through virtual device modules, and respectively setting virtual device modules including a universal template database, a device library, a device generating container, a device assembling container and an executing unit; thirdly, using a front-end user interface to create and generating the virtual device; fourthly, when the virtual device saved in the virtual device library is applied in the virtual computing environment, deploying the virtual device through the front-end user interface. The method has the advantages that the problems that application software submitting, deploying and configuring are difficult and time consuming are solved, the problem that the virtual device in the existing commercial technology is excessively large in size and difficult in issuing, and centralized application issuing, zero configuration deploying and fast issuing can be achieved.
Owner:INST OF CHINA ELECTRONICS SYST ENG CO +1

5G network multistage attack mitigation method based on software defined network (SDN) and network function virtualization (NFV)

The invention provides a 5G network multistage attack mitigation method based on SDN and FNV. The 5G network multistage attack mitigation method comprises the following steps of a first step, expanding an SDN-MN architecture; a second step, according to the expanded SDN-MN architecture, obtaining a proof driving security evaluation mechanism in which a software defined network-mobile network (SDN-MN) based on NFV detection; a third step, measuring the security level of a static network through the proof driving security evaluation mechanism and a generated new-probability proof driving attack graph; a fourth step, calculating a state node probability, an action node probability and a posterior probability in the attack graph through a security evaluation algorithm in the proof driving security evaluation mechanism; and a fifth step, disposing an attack mitigation mechanism by means of SDN control and NFV, and disposing a corresponding attack mitigation plan through a security level which is obtained from the proof driving attack graph. The 5G network multistage attack mitigation method can be directly used in a 5G network and can perform strategy decision according to a current network environment and settles an attack mitigation strategy disposition problem.
Owner:SHANGHAI JIAO TONG UNIV

Wireless sensor network gateway optimization deployment method

A wireless sensor network gateway optimization deployment method relates to a gateway optimization deployment method. In order to solve a wireless sensor network gateway deployment problem under a geometry K center, a covering radius is reduced and network service quality is increased. The method comprises the following steps of carrying out gateway position vector initialization, gateway position vector variation operation, interlace operation and selection operation; repeating the above steps till that iterations reach the following equation: P=500; in a 500th generation group, calculating an adaptation value corresponding to each target vector (img file=' DDA0000724768830000011. TIF' wi=' 369' he=' 74' / ) respectively, wherein the target vector corresponding to a minimum adaptation value is an optimal deployment position coordinate of the gateway in the wireless sensor network. An experiment result shows that through using a differential evolution algorithm to solve the deployment position of the gateway in the wireless sensor network, a convergence speed is increased by about 50% and the covering radius is decreased by 20% compared to the convergence speed generated by using an existing algorithm based on a particle swarm. Therefore, through using the method, the network service quality can be obviously increased.
Owner:HARBIN INST OF TECH

System and method for constructing sponge city based on Internet and microcirculation systems

ActiveCN106971352AReduce drainage loadDrain load noData processing applicationsSewerage structuresThe InternetStormwater
One aspect of the invention discloses a system for constructing a sponge city based on the Internet and microcirculation systems. The system comprises a drainage pipeline monitoring module which is used for monitoring the operation state of the drainage pipelines of a sponge city, a rainwater scheduling management module which is used for receiving and processing weather forecast information, drainage pipeline operation information and microcirculation system information to get a regional drainage plan and a rainwater scheduling plan, multiple regional management modules which are used for decomposing the plans to get a microcirculation drainage plan and a microcirculation scheduling plan, and multiple microcirculation systems which are used for recycling rainwater, draining water according to the microcirculation drainage plan and the microcirculation scheduling plan, and sending water shortage state information. The invention further discloses a method for constructing a sponge city based on the Internet and microcirculation systems. Weather information is received via the Internet, and a water-logging prevention plan is made. Thus, water drainage can be pre-planned. The drainage load of the pipe network can be reduced during rainstorm. The problem that the pipeline capacity is limited in the process of sponge city construction is solved.
Owner:HENGSHUI YITONG PIPE IND CO LTD +1

Railway shunting signal lamp detection method and system based on binary convolutional neural network

PendingCN110633668AAccurate detectionSolve the problem of manual identification of shunting lightsCharacter and pattern recognitionNeural architecturesData setAlgorithm
The invention provides a railway shunting signal lamp detection method and system based on a binary convolutional neural network, and the method comprises the following steps: S1, data set preparation: collecting a train head front video obtained during the running of a train, cutting the video into pictures with a set size, and manually screening pictures containing a target, thereby obtaining atarget picture; dividing the target picture into a training set and a test set according to a set proportion of a blue lamp and a white lamp; S2, network construction: constructing a binary convolutional neural network framework by utilizing the training set; S3, network training: training a binarized convolutional neural network by using a binarizing method through the test set to obtain a targetnetwork; and S4, performing network operation, and performing real-time target detection on the railway shunting signal lamp by using the target network. Binaryzation is carried out on the neural network weight to accelerate neural network operation and reduce memory consumption of the weight. The invention is high in accuracy, high in reliability and capable of accurately detecting the signal lamp in front of the train.
Owner:HEFEI LOCOMOTIVE DEPOT SHANGHAI RAILWAY BUREAU +1

Heterogeneous wireless network resource allocating method for processing emergency businesses

The invention belongs to the technical field of wireless networks, and particularly relates to a heterogeneous wireless network resource allocating method for processing emergency businesses. The method includes that in the process of distributing bandwidth resources, services different in quality are provided for different businesses, especially for emergency business needs for access to wireless networks, requirements are met preferably, and access services are provided; in the process of allocating bandwidth resources, if the emergency businesses are CBR (constant bit rate) businesses, fixed bandwidth need values must be distributed to the CBR businesses; if the emergency businesses are VBR (variable bit rate) businesses, bandwidth resources distributed to the VBR businesses need to be within a bandwidth need range. On the premise that emergency business needs are guaranteed, corresponding guarantee mechanisms are adopted for bandwidth resource allocating of common businesses. By using the method, the emergency businesses are ensured to acquire bandwidth resource allocating preferably, and more common business bandwidth requests can be contained, so that a heterogeneous wireless network system realizes maximum efficiency.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Software-defined Internet of Things self-learning security defense method and system

The invention discloses a software-defined Internet of Things self-learning security defense method and system. The method comprises the following steps: (1) sniffing and obain a data packet which issent by a software-defined Internet of Things node and is contained between a medium access control layer and a network layer; (2) performing network security feature extraction and encoding; (3) clustering the codes of the network security feature values; (4) comparing each category with elements in a known security network security feature code set and elements in a known risk network security feature value code set, automatically performing judging and updating; and (5) identifying and updating unknown network security feature codes by network security expert group members. The system comprises a sniffing module, an analysis module, a detection defense module and a knowledge base; according to the invention, the Internet of Things node configuration management work of an Internet of Things administrator is effectively reduced, the software-defined Internet of Things security defense system is automatically updated, and the self-adaption to the dynamic change of the software-definedInternet of Things network environment is realized.
Owner:SHAOXING UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products