Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-source and multi-target password resource scheduling method

A resource scheduling, multi-objective technology, applied in the field of cryptographic resource scheduling, can solve problems such as load imbalance and particle concentration, and achieve the effect of load balance, good global optimization of search ability and learning ability

Pending Publication Date: 2022-08-09
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem we want to solve is that when multiple cryptographic task nodes need cryptographic resources, the scheduling and layout of multiple cryptographic resource nodes must find the position of multiple points, not the position of a single point
At the same time, the original particle swarm optimization algorithm may have the problem of too concentrated particles near a certain location, and when it is applied to cloud resource scheduling, the load may be unbalanced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-source and multi-target password resource scheduling method
  • Multi-source and multi-target password resource scheduling method
  • Multi-source and multi-target password resource scheduling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work are protected by the present invention. scope.

[0088] In order to better understand the present invention, some terms involved are explained as follows:

[0089] 1. Cryptographic algorithm: The cryptographic algorithm is a specific rule for realizing the transformation of "clear" and "secret" information. Different cryptographic algorithms correspond to different transformation rules.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of password resource scheduling, and particularly relates to a multi-source and multi-target password resource scheduling method, which comprises the following steps of: initializing relevant parameters of password resource nodes and password task nodes; determining whether each password resource node is a focusing node or a peripheral node, and determining a gathering domain of the focusing node; for each password task node, calculating a single node guarantee capability, and for each focusing node, calculating a focusing weight; the speed of each password resource node is updated according to the single-node guarantee capability and the focusing weight, each password resource node updates the position of the password resource node through the calculated speed, and the optimal position and the optimal overall layout of each password resource node are finally obtained through repeated iteration. According to the method, when the password task node has the password resource demand, under the condition that the overall guarantee capability meets the requirement, the password resource can be deployed to the password task node as short as possible, and meanwhile, the condition that a plurality of password resource nodes are excessively gathered is avoided.

Description

technical field [0001] The invention belongs to the technical field of cipher resource scheduling, and in particular relates to a multi-source and multi-target cipher resource scheduling method. Background technique [0002] Cloud computing technology is becoming more and more mature, and it is widely used in various information systems such as government affairs, finance and industry. In order to improve service quality, it is necessary to study the management and scheduling of cloud resources, and scheduling algorithms are not developed, mainly including traditional scheduling algorithms. , prediction-based scheduling algorithm, heuristic intelligent scheduling algorithm. [0003] Traditional scheduling algorithms include first-come, first-served scheduling algorithms, high-priority scheduling algorithms, and round-robin scheduling algorithms. A first-come, first-served scheduling algorithm allocates resources to tasks based on the order in which they arrive. The high-pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/48G06F9/50G06N3/00
CPCG06F9/4881G06F9/5038G06F9/5083G06N3/006
Inventor 李福林包宇欢崔安康张玉臣董书琴周洪伟冀会芳
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More