Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

405 results about "Block method" patented technology

The block method is not the only way of writing a comparison and contrast essay. In the point-by-point method, each paragraph gives a point (or idea) and its similarities and contrasts. In the combination method, you combine the point-by-point method with the block method.

Hard rock tunnel non-blasting digging blocking method and construction method

The invention relates to a hard rock tunnel non-blasting digging blocking method and a construction method. According to the method, a hole drilling core taking technology is utilized, mutually engaged cutting peripheral holes are formed along a tunnel digging contour line, so that a hole wall-shaped digging free face is formed on the periphery of a tunnel face; a hydraulic splitting machine splitting technology is used, in addition, the characteristic that the tensile intensity and the shearing-resistant intensity of rock are much smaller than the pressure-resistant intensity is utilized, the tunnel face digging blocking is firstly carried out, in each digging block, the synchronous splitting digging splitting surfaces do not exceed two, in addition, the two splitting surfaces are in large-angle obtuse angle intersection, in addition, at least one digging free face vertical to the tunnel face is included, then, the digging construction sequence from the lower side to the upper side and from the periphery to the middle is adopted, and the smaller splitting force is used for carrying out rock pulling cracking and shearing cutting splitting digging on the tunnel face along the splitting surface. The hard rock tunnel non-blasting digging blocking method has the advantages that the adverse influence of vibration, noise and dust in the hard rock digging construction can be eliminated, and the utilization rate of tunnel hole slag as building stone materials can be improved.
Owner:FUZHOU PLANNING DESIGN & RES INST

Real-time repetition removal and transmission method for data in network file system

The invention relates to a real-time repetition removal and transmission method for data in a network file system, and belongs to the technical field of computer data storage. The method comprises the following steps of: setting a file metadata table, a data block index table and a file composition table in a client and a server respectively, and setting a to-be-transmitted message queue for storing data and updating message in the client; receiving and responding an operating command initiated to the network file system by a client application program through a file system drive by the client, wherein the operating command comprises the operation of creating a new file, writing data into an existing file, reading the data from the existing file and deleting the existing file; and settinga network service interface for uploading and downloading data block contents and receiving and answering client message in the server. The method can delete the repeated data so as to save the storage space, avoid transmitting the existing data of the opposite side between the client and the server and reduce the overhead of network bandwidth; meanwhile, the method supports a file blocking method of fixed length and unfixed length so as to improve the utilization rate of the storage space.
Owner:TSINGHUA UNIV

Alarm and blocking method for illegal external connections

The invention relates to an alarm and blocking method for illegal external connections. The alarm and blocking method comprises that 1), an intranet host client monitors networking behaviors of intranet computers in real time according to a plurality of external connection modes; 2), the intranet host client initiatively sends an encrypted alarm data packet to an external connection alarm monitoring terminal by using a Libnet function library to detect whether the intranet computers have external connection behaviors and gives an alarm for illegal external connection behaviors; 3), the intranet host client performs bottom layer packet capture on alarmed intranet hosts to obtain all data packets passing through network cards of the hosts to judge the illegal external connection behaviors; 4), blocking the network cards of the hosts having the illegal external connection behaviors through judgment. The alarm and blocking method is high in timeliness and good in monitoring performance in the aspect of illegal external connection monitoring. By means of the alarm and blocking method, the safety and the transmission efficiency of the alarm data packets in systems are improved, leaking risks caused by stealing of alarm information are effectively avoided, meanwhile, the safety of software is improved, and the software has anti-shielding and anti-unloading capacities.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Road longitudinal and lateral section obtaining method based on LiDAR point cloud

InactiveCN106887020ASolve the problem that large data cannot be read uniformlyReliable and finer designImage enhancementImage analysisPoint cloudLidar point cloud
The invention discloses a road longitudinal and lateral section obtaining method based on a LiDAR point cloud, and relates to the technical field of measurement. The method comprises the following steps: road data obtaining: generating filtered road surface point cloud data through the steps of field control, data collection, data preprocessing, coordinate conversion and point cloud filtering; data organization blocking: carrying out the block management of point cloud data according to a proper distance grid; TIN network construction through data: carrying out the buffering and constructing a TIN network according to an existing road central axis and a specific distance; section accomplishment calculation: generating a longitudinal and lateral section file according to a mileage file. The method is advantageous in that the method organizes the point cloud data through an engineering file, manages the point cloud data through the engineering file, carries out the automatic call of ground point cloud data in a corresponding range of the central axis of a road, and enables the data to be used for constructing the TIN network after format conversion. The seamless blocking method ingeniously solves a problem that point cloud data cannot be read in a unified manner because the size of the point cloud data is large.
Owner:星际空间(天津)科技发展有限公司

Automatic identification and blocking method of spam cell

InactiveUS20070283006A1Easy to reportEasy and rapid registrationSpecial service for subscribersDigital computer detailsAuditory displayControl system
Disclosed herein is a method of visually or auditorily indicating spam status or a spam class for a calling number through a called terminal. The method includes the steps of the destination switching system requesting service from a spam call blocking server by delivering the calling number and a called number to the spam call blocking server; the spam call blocking server inquiring about spam status or a spam class for the calling number; if the spam status is ‘blocked’, or if the spam status is ‘blocked’ and the spam class is equal to or higher than a predetermined class, the spam call blocking server transmitting the spam status or spam class; the service control system activating caller identification service of a called party; the service control system including information about the spam status or spam class in caller identification information for the caller identification service; the service control system transmitting call connection information and the caller identification information to a destination switching system and, thus, the destination switching system making a call with a called terminal; and the destination switching system delivering the caller identification information to the destination terminal and, thus, providing visual or auditory display through the called terminal.
Owner:UANGEL CORP

Method for carrying out classification detection on network attack behaviors through utilization of machine learning technology

The invention relates to a method for carrying out classification detection on network attack behaviors through utilization of a machine learning technology and belongs to the technical field of information. The method comprises the steps of 1, collecting network data and carrying out preprocessing to obtain training data; 2, establishing and training a multilevel classifier; and carrying out classification detection on test data through utilization of the trained multilevel classifier. Compared with the prior art, the method provided by the invention has the advantages that 1, through utilization of a preprocessing method for the collection data, the data scale can be reduced, moreover, partial unrelated data is removed, and the integrated efficiency is improved; 2, through utilization ofthe multilevel classifier and an integrated learning thought, the problem that a single classifier is low in fitting precision is solved, and the detection precision of the system is greatly improved; and 3, through design of a data blocking method based on an improved random forest algorithm, different types of attach behavior detection can be realized as parallel algorithms, so the integrated detection speed of the system is improved.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Reversible information hiding method based on blocked self-adaptive histogram translation

The invention relates to the field of multimedia information security, in particular relates to a reversible information hiding method based on blocked self-adaptive histogram translation. The method comprises the following steps: (1) blocking a carrier image, and computing a peak value of each sub-block histogram; (2) self-adaptively selecting a sub-block for embedding information according to embedding capacity of each sub-block; (3) adopting a method for self-adaptively selecting histogram translation direction while embedding the information. The invention is a novel histogram translation method which is capable of effectively embedding the information and losslessly extracting the embedded information and recovering an original image; through the adoption of the blocked method, the embedded information is safer and the integral embedding rate is improved, the self-adaptive selected histogram translation direction can effectively improve the peak signal to noise ratio of the image to further improve the image quality, thereby providing help for the medical treatment, military and the like applications. Through the adoption of the method, the higher the precision of the image is, the better the reversible information hiding effect is.
Owner:SUN YAT SEN UNIV

Mechanical pipeline under-pressure blocker and blocking method thereof

The invention provides a mechanical pipeline under-pressure blocker and a blocking method thereof. The blocker mainly comprises a process pipe, an under-pressure pipeline mouth gag and an under-pressure pipeline lower blocker, wherein a mechanical encasing-pipe sealing device consists of an upper body, a lower body, a flexible sealing rubber cushion, a sealing support rubber cushion, an upper antiskid anchor ear and a lower antiskid anchor ear; the upper body consists of an upper body pipe and an upper semicircular encasing-pipe plate; the periphery of the upper semicircular encasing-pipe plate is provided with a turned-over edge, and the middle of the upper semicircular encasing-pipe plate is provided with a hole; the lower end of the upper body pipe is welded with the hole, and the upper end of the upper body pipe is welded with a flange; the upper part of the flange is provided with a mouth rim, and a screw hole is horizontally arranged on the mouth rim; the lower body consists of a slag discharge pipe with an opening on the upper end, and a lower semicircular encasing-pipe plate; the periphery of the lower semicircular encasing-pipe plate is provided with a turned-over edge, the middle of the lower semicircular encasing-pipe plate is provided with a hole, and the upper opening of the slag discharge pipe is welded with the hole; and the turned-over edges on the peripheries of the upper semicircular encasing-pipe plate and the lower semicircular encasing-pipe plate are fixed on an under-pressure pipeline by screw bolts. Compared with the prior art, the blocker can block the cast iron pipeline under pressure during operation so as to shorten the construction period and reduce the construction cost.
Owner:济南市公明新技术开发有限公司

Automatic identification and blocking method of spam cell

Disclosed herein is a method of visually or auditorily indicating spam status or a spam class for a calling number through a called terminal. The method includes the steps of the destination switching system requesting service from a spam call blocking server by delivering the calling number and a called number to the spam call blocking server; the spam call blocking server inquiring about spam status or a spam class for the calling number; if the spam status is ‘blocked’, or if the spam status is ‘blocked’ and the spam class is equal to or higher than a predetermined class, the spam call blocking server transmitting the spam status or spam class; the service control system activating caller identification service of a called party; the service control system including information about the spam status or spam class in caller identification information for the caller identification service; the service control system transmitting call connection information and the caller identification information to a destination switching system and, thus, the destination switching system making a call with a called terminal; and the destination switching system delivering the caller identification information to the destination terminal and, thus, providing visual or auditory display through the called terminal.
Owner:UANGEL CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products