Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

143 results about "Cluster state" patented technology

In quantum information and quantum computing, a cluster state is a type of highly entangled state of multiple qubits. Cluster states are generated in lattices of qubits with Ising type interactions. A cluster C is a connected subset of a d-dimensional lattice, and a cluster state is a pure state of the qubits located on C. They are different from other types of entangled states such as GHZ states or W states in that it is more difficult to eliminate quantum entanglement (via projective measurements) in the case of cluster states.

Controlled quantum security direct communication method based on four particle cluster states

The invention discloses a controlled quantum security direct communication method based on four particle cluster states. Alice and Bob respectively serve as a legal information sender and a legal information receiver during a quantum communication process, and Charlie serves as a credible scheme control party; information security is achieved by randomly inserting a single photon to perform measurement-based comparison detection, and communication starts after security detection; Alice uniformly divides the prepared four particle cluster states into two groups, after being subjected to an XOR operation with a pseudorandom sequence, the sent information is encoded on the two particles reserved by Alice via unitary transformation. Alice performs Bell-based measurement on reserved particles, and sends measurement information to Bob, and Bob recovers the original sequence via an initial state sent by Charlie after the measurement information is compared. The four particle cluster states used by the method has good entanglement, connectivity and damage resistance, only the receiver Bob in the method gets the permission of the controller Charlie, Bob can recover the original information, so that the information can be effectively prevented from being attacked during a transmission process, and an implementation process is simple.
Owner:NORTHWEST UNIV

Minimum-cost maximum-flow based large-scale resource scheduling system and minimum-cost maximum-flow based large-scale resource scheduling method

InactiveCN106708625ASolve the problem that it is difficult to apply to various scheduling scenariosReduced solution timeResource allocationCluster stateDistributed computing
The invention relates to a minimum-cost maximum-flow based large-scale resource scheduling system and a minimum-cost maximum-flow based large-scale resource scheduling method. The system comprises a task state table, a cluster state table, a scheduling target table, a minimum-cost maximum-flow constructor, a minimum-cost maximum-flow solver and a task executor. The task state table is used for receiving and storing task states submitted by users, and the task states include task CPU (central processing unit) utilization rate, memory utilization rate, network I/O, magnetic disk I/O and priority. The cluster state table is used for storing cluster state information including cluster CPU utilization rate, memory utilization rate and network and magnetic disk I/O and updating cluster states when the cluster state change. The scheduling target table is used for storing scheduling targets configured by the users, and the scheduling targets include priority, placement constraint and fairness currently. The minimum-cost maximum-flow constructor is used for selecting the scheduling targets from the scheduling target table according to information of the task state table and the cluster state table to construct a minimum-cost maximum-flow graph. The minimum-cost maximum-flow solver is used for solving the minimum-cost maximum-flow graph constructed by the minimum-cost maximum-flow constructor according to an incremental algorithm. The task executor is responsible for specific execution of tasks. The minimum-cost maximum-flow based large-scale resource scheduling system and the minimum-cost maximum-flow based large-scale resource scheduling method meet the requirement on flexibility of practical business scenarios.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Method and device for realizing high availability of cross-node virtual machine cluster

ActiveCN107404522ASolving the cluster split-brain problemAvoid cluster status exceptionsData switching networksNODALNetwork connection
The invention discloses a method and a device for realizing high availability of a cross-node virtual machine cluster. The method comprises the following steps of establishing a cluster through a pacemaker resource management tool; obtaining network connection modes and virtual addresses of virtual machines; obtaining information of a physical network card use for providing a heartbeat link for the virtual machines on a host; obtaining a state of the cluster; and querying whether to carry out fence operation on the virtual machines on an opposite terminal host through calling a fence script on an opposite terminal node, if the number of failures of the fence operation exceeds a preset threshold, determining the physical network card of the host for causing the fissure and removing the virtual machines on the host for causing the fissure from the cluster. According to the method and the device for realizing the high availability of the cross-node virtual machine cluster, a problem of failure of the physical network card of the host or cluster fissure caused by failure of an external switch can be solved, the cluster state exception caused by an external factor is avoided, and the effective external service provision is guaranteed.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Remote teleportation method based on four-bit Cluster state

InactiveCN108900254AImprove transmission efficiencySolving the problem of long-distance long-distance quantum communicationPhotonic quantum communicationAlice and BobNetwork termination
The invention discloses a remote teleportation method based on a four-bit Cluster state. For network terminal users Alice and Bob, through help of an intermediate node, communication between a networkterminal Alice and the other terminal user Bob is completed. The method comprises the four steps that 1, the four-bit most entangled Cluster state is shared by the terminal users Alice, Bob and the intermediate node Li (i=1, 2, 3, ..., p), and a quantum entanglement channel of the terminal users Alice and Bob and the intermediate node Li (i=1, 2, 3, ..., p) is built; 2, modulation and measurementare conducted, wherein CZ operation is conducted on corresponding particles by the terminal user Alice and the intermediate node Li, moreover, Bell measurement is conducted on the particles in handsby the intermediate node, and measurement results are announced; 3, a direct quantum channel between the terminal user Alice/Bob and the other terminal user Bob/Alice is built according to the Bell measurement results of the intermediate node through unitary operation; 4, according to difference of information transferring modes, the terminal users Alice and Bob choose corresponding restoring operation according to the Bell measurement results of each other to achieve intercommunication.
Owner:SUZHOU UNIV

Data access method under hybrid storage architecture

The invention discloses a data access method under hybrid storage architecture, and overcomes the problem that database management and data access exhibit complexity and database system changes and faults lack uniform management under the hybrid storage architecture. The data access method under the hybrid storage architecture comprises the following steps: 1) processing a data request and 2) carrying out software change and fault processing. The step 1) comprises the following steps: (1) verifying the access request of a user: requesting a verification module to inquire the cache of a metadata information item to finish verification, and distributing one partial cache, which aims at a database or cluster state zone bit and the activation bit of an agent module, of one piece of metadata information to the verification module, and utilizing the cache to quicken verification speed; (2) adding the data access request to the access cache; (3) carrying out route processing on the request; (4) processing a transactional agent; (5) executing the request; and (6) generating a result or a report of a uniform format. The step 2) comprises the following steps: (1) carrying out the periodic detection and response of the metadata information; (2) carrying out software change processing; and (3) carrying out fault processing.
Owner:JILIN UNIV

An information physical modeling and control method for aggregating large-scale air conditioner loads

The invention relates to an information physical modeling and control method for aggregating large-scale air conditioner loads, and the method comprises the steps: the air conditioner loads is regarded as an information physical system (CPS) at a load layer, an air conditioner load probability control method based on a semi-Markov process is provided, and the locking time of an air conditioner canbe guaranteed and the diversity of a cluster state is kept; A hybrid system model is utilized to establish a coupling relation between the air conditioner load physical process and the control process, and autonomous control over the air conditioner load is achieved; In an aggregator layer, a coordination control method for aggregating air conditioner loads into virtual peak shaving units is provided based on a market balance mechanism, and the method can effectively protect user data privacy and remarkably reduce the communication cost. Meanwhile, the virtual peak regulation unit can providea quotation curve and regulation capacity similar to a conventional unit for scheduling, so that the virtual peak regulation unit participates in optimal scheduling of a power grid layer. Compared with the prior art, the method has the advantages of remarkably reducing the communication cost, facilitating optimal scheduling and the like.
Owner:SHANGHAI JIAO TONG UNIV

Four-particle cluster state multi-hop stealth transfer method based on non-maximum entanglement cluster state

ActiveCN110572219AImprove transmission efficiencySolving the problem of long-distance long-distance quantum communicationPhotonic quantum communicationAlice and BobInformation transmission
The invention discloses a four-particle cluster state multi-hop stealth transfer method based on a non-maximum entanglement cluster state. A source node Alice and a target node Bob realize long-distance quantum communication between Alice and Bob through the help of an intermediate node. The method mainly comprises four steps that (1) a source node Alice, a target node Bob and an intermediate nodeshare a non-maximum entanglement cluster state, and a quantum entanglement channel is established; (2) Alice and an intermediate node carry out CZ operation on particle pairs in hands of the Alice and the intermediate node, and modulate a channel; (3) the Alice and the intermediate node perform Bell measurement on the particle pairs in their hands and inform the measurement result, and the Aliceestablishes a direct quantum channel with the Bob through unitary operation; and (4) the Alice performs Bell-based measurement on the particle pairs in the hand, and Bob performs a series of unitary operations according to the measurement result of the Alice to obtain a transmitted unknown quantum state. The information transmission efficiency is high, the long-distance remote quantum communication problem can be solved through the help of the intermediate nodes, and the requirement for constructing a complex quantum communication network can be met.
Owner:SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products