Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

164 results about "Arithmetic computation" patented technology

Computation | arithmetic |. is that computation is the act or process of ; calculation; reckoning while arithmetic is the mathematics of numbers (integers, rational numbers, real numbers, or complex numbers) under the operations of addition, subtraction, multiplication, and division.

Circulant matrix transformation based and ciphertext computation supportive encryption method

The invention discloses a circulant matrix transformation based and ciphertext computation supportive encryption method. The method includes the steps: firstly, encrypting original data by means of converting the original data into vectors, then converting the vectors into a circulant matrix and encrypting through a key matrix to obtain an encrypted outsourcing matrix; secondly, encrypting computational parameters by means of converting the computational parameters into vectors, then converting the vectors into a circulant matrix and encrypting through a key matrix to obtain an encrypted computational parameter matrix; thirdly, performing arithmetic operation of an encrypting matrix to obtain an encrypted operation result; fourthly, decrypting the encrypted operation result through the key matrix to obtain a circulant matrix, and then selecting one line / column of the circulant matrix to be added to obtain a plaintext of the operation result. The method is particularly suitable for outsourcing storage and computation of confidential data in a cloud computing environment, and can be used for protecting the confidential data of persons or enterprises; the method is supportive to four-rule hybrid operation of infinite addition, subtraction, multiplication and division of encrypted numerical data.
Owner:XI AN JIAOTONG UNIV

A quantization circuit and a quantization method of a convolution neural network

A quantization circuit and a quantization method of a convolution neural network are disclosed, The invention belongs to the technical field of artificial intelligence data processing, and comprises an original parameter pool, a comparator array, a quantization parameter calculation unit and an arithmetic operation unit. The original parameter pool is used for storing the original parameter data required for calculation of each layer of a convolution neural network, and comprises data of all channels and offset data of all convolution cores of each layer. The comparator array is used for performing statistical operation on the data in the original parameter pool, and iteratively comparing to obtain the maximum value and the minimum value of the parameters of each layer of the convolution neural network; The quantization parameter calculation unit is used for performing arithmetic operation on the maximum value and the minimum value to obtain each parameter used for model quantization;The arithmetic operation unit is used for quantifying the model, and the obtained results are expressed in an integer format of an unsigned bit specified number of bits. The invention can reduce the system power consumption through quantization, so that the deployment and operation of the convolution neural network on the terminal are more reliably guaranteed.
Owner:INSPUR GROUP CO LTD

Method and apparatus for low complexity spectral analysis of bio-signals

A method and device for reducing the computational complexity of a processing algorithm, of a discrete signal, in particular of the spectral estimation and analysis of bio-signals, with minimum or no quality loss, which comprises steps of (a) choosing a domain, such that transforming the signal to the chosen domain results to an approximately sparse representation, wherein at least part of the output data vector has zero or low magnitude elements; (b) converting the original signal in the domain chosen in step (a) through a mathematical transform consisting of arithmetic operations resulting in a vector of output data; (c) reformulating the processing algorithm of the original signal in the original domain into a modified algorithm consisting of equivalent arithmetic operations in the domain chosen in step (a) to yield the expected result with the expected quality quantified in terms of a suitable application metric; (d) combining the mathematical transform of step (b) and the equivalent mathematical operations introduced in step (c) for obtaining the expected result within the original domain with the expected quality; (e) selecting a threshold value based on the difference in the mean magnitude value of the elements of the output data vector of the transform said in step (b) and the preferred complexity reduction and degree of output quality loss that can be tolerated in the expected result within the target application; (f) pruning a number of elements the magnitude of which is less than the threshold value selected in step (e); and/or eliminating arithmetic operations associated with the pruned elements of step (f) either in the mathematical transform of step (b) and/or in the equivalent algorithm of step (c).
Owner:ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE (EPFL)

Trust management system based trusted reconstructing method of IP routing protocol

InactiveCN101888328AFusion of trust valueData switching networksPacket lossNetwork topology
The invention discloses a trust management system based trusted reconstructing method of an Open Shortest Path First (OSPF) routing protocol, which comprises the following steps of: (1) before each router is added into a network, registering to the trust management system, and sending corresponding trust certificates to the routers by the trust management system, the trust certificates including comprehensive trust values of the routers and each being calculated according to safe parameters and configuration parameters of the routers and all the subjective trust value of the neighbor router to the routers by the trust management system; (2) transferring the trust certificates among the routers through hello information, wherein an adjacency relation is not established for the router without the trust certificate, all the routers in the network are ensured to have own trust certificates; (3) each router calculating the subjective trust value of the neighbor router based on network real time parameters including link flow, packet loss probability, retardation, transmission rate of the packet and reliability of the packet, during an interactive work with the neighbor router, calculating a total trust value of the neighbor router by using the comprehensive trust value and the subjective trust value of the neighbor router, and modifying a metric field of a link-state announcement Router_LSA packet as the total trust value and synchronizing a link-state data base;(4) modifying a Dijkstra algorithm, using a reciprocal of the total trust value between the routers as the parameter for the arithmetic computation, selecting the router with higher trust value to generate a shortest path tree, and forming a trust routing list; (5) periodically reporting the subjective trust value of the neighbor routers to the trust management system by each router, simultaneously obtaining the parameter required for computing the subjective trust value, updating the trust certificate of each router at fixed time, and eliminating the router with the overdue trust certificate out of the network to maintain the topological structure of the whole network.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Integer ciphertext arithmetic operation method based on homomorphic encryption

The invention provides an integer ciphertext arithmetic operation method based on homomorphic encryption, which comprises complement homomorphic calculation, addition subtraction homomorphic calculation, multiplication homomorphic calculation and division homomorphic calculation. This invention refers to the rules of complement, addition, subtraction, multiplication and division of binary integersin computer, and transforms this rule into Boolean polynomials containing only logical AND and XOR operations. In multiplication and division, different calculations are made according to the information of special bits to correct the final calculation results. So we modify the form of Boolean polynomials to represent different computational results, that is, Boolean polynomials include all the inputs and mutually exclusive computational branches of this layer. Then Boolean polynomials are transformed into homomorphic polynomials which can be used in ciphertext computation, and the security of homomorphic polynomials is proved, which meets the requirement of semantic security. The multi-bit parallel operation of integer homomorphic arithmetic operation is realized, the algorithm efficiency of homomorphic operation is improved, the frequency of noise reduction operation is reduced, and the operation efficiency is improved.
Owner:SHENYANG AEROSPACE UNIVERSITY

Method and apparatus for generating specification data

When a source program written in Java or the like and using methods of BigDecimal class, a priority conforming to a predetermined arithmetic rule is identified for an arithmetic operational method included in an arithmetic operation statement, and the arithmetic operational method and the identified priority are registered into a storage device. Then, in a case where it is judged based on data stored in the storage device that a plurality of arithmetic operational methods are included in an arithmetic operational statement, and an arithmetic operational method with low priority is defined as an instance of an arithmetic operational method with high priority, following processing is carried out to generate specification data, that is, the arithmetic operational method with low priority and an instance and argument of the arithmetic operational method with low priority are converted into a first subexpression using an arithmetic operational sign in accordance with a predetermined rule. Then, parentheses representing that the arithmetic operation are carried out with priority is added to the first subexpression. In addition, the arithmetic operational method with high priority and an argument of the arithmetic operational method with high priority are converted into a second subexpression using an arithmetic operational sign in accordance with the predetermined rule. Finally, the second subexpression is linked with the first subexpression.
Owner:FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products