Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

60 results about "Collision domain" patented technology

A collision domain is a network segment connected by a shared medium or through repeaters where simultaneous data transmissions collide with one another. The collision domain applies particularly in wireless networks, but also affected early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. Members of a collision domain may be involved in collisions with one another. Devices outside the collision domain do not have collisions with those inside.

Flight vehicle anti-collision algorithm verification testing method and flight vehicle anti-collision algorithm verification testing system

The invention relates to the aviation flight field, and discloses a flight vehicle anti-collision algorithm verification testing method. The flight vehicle anti-collision algorithm verification testing method comprises steps that step1, track data is acquired; step2, simulation scene parameters are set; step3, by adopting a cylindrical security domain establishing method, an evasion domain and a collision domain are established automatically; step 4, a track collision point is calculated, and when the anti-collision evasion conditions of the evasion domain and the collision domain are satisfied, an anti-collision algorithm is started; step5, the anti-collision evasion performance of the anti-collision algorithm is tested; step 6, anti-collision evasion decision data is acquired, and self-adapting of anti-collision evasion decision data is carried out; step7, a display way is selected for the display and the output of the anti-collision evasion decision data; step 8, the evasion track of the anti-collision evasion decision data is evaluated and calculated; step 9, the data of the above mentioned steps 1-8 is stored, and a flight process is displayed in a real-time manner. The anti-collision evasion testing process having advantages of low costs, low risks, and high efficiency is realized. The invention also discloses a flight vehicle anti-collision algorithm verification testing system.
Owner:四川九洲空管科技有限责任公司

Method for optimizing hidden terminal based on physical layer interference information

The invention relates to a communication method for solving problems due to a hidden terminal in a wireless network based on a wireless interference cancellation technique and a node full-duplex mode. Under a wireless local area network physical layer, wireless network nodes are coded into special interference signals by an OFDM (Orthogonal Frequency Division Multiplexing) technology, and overlapped into data signals in the air by means of ''attachment''. The control information and the data information can be transmitted in parallel, thus, the resource consumption on control information can be saved. The nodes for receiving the data information can remove the interference signals by an interference canceling technology in order to obtain the original data. The node for receiving the control information can demodulate the control signal from the mixed signal by an energy detecting technology, so as to obtain the physical address of the node which is transmitting in a collision domain, as well as establishing a relative node list. By inquiring the transmitting state and the receiving state of adjacent nodes, the node can determine whether it is the hidden terminal, so as to avoid transmission of conflict data and increase channel utilization rate.
Owner:GUANGZHOU HKUST FOK YING TUNG RES INST

Network communication quintuple fast matching algorithm based on improved automatic state machine

The invention discloses a network communication quintuple (a source IP, a target IP, a source port, a target port and a protocol number) fast matching algorithm based on an improved automatic state machine. According to the algorithm, a quintuple unit dividing module, a mixture automatic state machine module, an asterisk wildcard mapping module and a matching rule calculating module are adopted, wherein the quintuple unit dividing module is used for establishing a mismatching collision domain, the mixture automatic state machine module is used for achieving uniform matching of point data and section data, the asterisk wildcard mapping module is used for solving the asterisk wildcard matching problem in matching, and the matching rule calculating module is used for reducing redundancy operation caused by asterisk wildcard mapping. The algorithm is characterized in that static parameters in the quintuple are extracted as mush as possible to establish an ordinary automatic state machine, and a larger collision domain is established; for section type parameters, a chain table is added behind the automatic state machine, a mixture automatic state machine structure is formed, and supporting for the section type parameter matching is achieved; the asterisk wildcard matching problem is solved through asterisk wildcard mapping, a replacement rule is precisely matched, and the amount of redundancy calculation is reduced. The algorithm can be widely applied to an intrusion detection system, a network blacklist and whitelist library, a network data analyzing product and other products.
Owner:CHENGDU WANGAN TECH DEV

Power control-based Ad Hoc network MAC (Media Access Control) layer channel allocation method

The invention discloses a power control-based wireless MAC (Media Access Control) layer channel allocation method, which belongs to the field of Ad Hoc networks. In a multi-channel Ad Hoc network, two transceivers are used by a network node, of which one is fixedly arranged in a control channel, and the other one jumps between different data channels. An RTS (Request To Send) frame and a CTS (Clear To Send) frame are transmitted at the control channel by using the maximum power; a DATA frame and an ACK (Acknowledgement) frame are transmitted at the data channels by using the minimum power. The minimum power is calculated according to the minimum receiving power threshold which can be correctly received and decoded by a receiving node. The transmitting powers of all nodes in a same collision domain are divided into different grades, and then a corresponding data channel is selected according to the grade of the minimum power, so that links with larger transmitting power difference are allocated to different channels, the adverse effect of asymmetric links in the same channel can be relieved, and the network throughput and the unit energy consumption throughput are improved. The concrete implementation CAPC (Channel Assignment with Power Control) protocol can be used as an MAC layer protocol of the channel selected by Ad Hoc network node equipment.
Owner:DALIAN UNIV OF TECH

Multi-user anti-interference channel access system and dynamic spectrum collaborative anti-interference method

The invention discloses a multi-user anti-interference channel access system and a dynamic spectrum collaborative anti-interference method. According to the system, a distributed wireless network is considered, a plurality of communication users exist in the network, and the outside of the network is attacked by malicious interference; users in the same conflict domain in the network can judge interference signals at the moment through broadband spectrum sensing, and select communication channels through distributed channel decisions, so that malicious interference is avoided, and same-frequency mutual interference is avoided. The method comprises the following steps: firstly, a communication party observes an interference signal and takes the interference signal as a coordination signal;the own user is guided to select frequency and transmit data according to the coordination signal and the corresponding channel access strategy table; after transmission, a judgment is made whethertransmission succeeds or not according to whether ACK feedback is received or not; and finally, the channel access strategy table is updated according to the transmission condition. The model is complete with clear physical significance and high anti-interference capability so that same-frequency mutual interference is avoided, and the channel transmission efficiency of the distributed wireless network is improved.
Owner:ARMY ENG UNIV OF PLA

Channel switching mode generating and allocating method for multi-channel wireless radio multi-hop network

The invention relates to a channel switching mode generation and distribution method for a multi-channel wireless multi-hop network, which comprises the steps of setting up a channel switching mode generation method to stipulate how to generate a channel switching mode; and distributing a channel switching mode for each node in the network by using a channel switching mode distribution method based on the generation method. The channel switching mode distribution method is carried out on the nodes in a distributive concurrent execution manner, and the nodes in the network are equally distributed into all available channels in each time slot together with the potential competitive nodes thereof by following the distributed channel switching mode. In the synchronous channel switching-based media access control method, the method can be used to ensure that in each time slot, the nodes in the network are equally distributed into all available channels together with the 2-hop neighbor nodes thereof, so that the network can obtain better collision domain division effect and higher degree of concurrent transmission, thereby effectively reducing the channel access time of nodes and message conflict.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Route planning optimization method based on collision detection of hierarchical bounding volume for three-dimensional complex scene

InactiveCN106780762AImprove planning effectivenessImprove stabilityImage data processingCost evaluationAlgorithm
The invention discloses a route planning optimization method based on collision detection of a hierarchical bounding volume for a three-dimensional complex scene. The method comprises the steps that (1) two lists, namely a to-be-selected list L1 and a selected list L2 are defined; (2) the list L1 is traversed sequentially, and a current node c is extracted and put in the list L2 to indicate that non-collision domain expansion points are searched for the current node c; (3) rough probing is performed with the node c being a center, wherein rough probing mainly includes setting the dimensions and partition size of the bounding volume and performing pre-collision detection and fine collision detection along a certain direction; (4) whether rough probing succeeds or not is judged, if yes, a next node in the list L1 is skipped to, and otherwise fine search is performed on the current node c, pre-collision detection and fine collision detection are performed along a set direction, and non-collision domain expansion points N are recorded; (5) the non-collision domain expansion points N are subjected to A* cost evaluation and descending ordering and are interposed into the list L1; and (6) the list L1 is traversed cyclically to find out a minimum value of cost evaluation to serve as a current node, and the steps are repeated to the end. Through the route planning optimization method based on collision detection of the hierarchical bounding volume for the three-dimensional complex scene, the route planning effect and planning efficiency are effectively improved. The technical scheme is adopted to solve technical problems.
Owner:ZHEJIANG UNIV OF TECH

Exposed terminal optimizing method on basis of physical layer interference information

The invention relates to a communication method, which is based on interference elimination technology and used for solving the problems of exposed terminals in the wireless network. An exposed terminal optimizing method is based on the OFDM (orthogonal frequency division multiplexing) modulation technology, encodes wireless network node information into interference signals by communication interference technology from the physical layer of the wireless local area network. Interference signals carrying node information, namely control information, are overlapped into original data signals in an 'accessory' manner and are transmitted with data information synchronously. By the transmission mode, resource consumption of the control information can be saved greatly, raw data receiving nodes acquire raw data by eliminating interference signals by the interference offset technology, and control information receiving nodes demodulate the control information from the interference signals by energy detection so as to acquire transmitting node lists. Whether the nodes are exposed terminals or not can be judged by the nodes according to a neighbor table acquired from a routing layer, the total throughput of the network can be increased by increasing parallel connections in a collision domain, and space multiplexing rate is increased.
Owner:GUANGZHOU HKUST FOK YING TUNG RES INST

Complex part laser cladding interference detection and track correction method

The invention relates to the technical field of laser cladding, in particular to a laser cladding interference detection and track correction method for complex parts. The method comprises the following steps: S1, generating an expected processing point of a damaged area; S2, creating a constraint domain in the tangent plane of the current part machining point di, and obtaining a collision domainphi2 through normal projection; S3, searching an interference laser beam and an interference point position in a collision domain phi2 in combination with a quadtree structure; and S4, correcting theinterference laser beam, and completing track optimization of laser remanufacturing. According to the method, a constraint domain is created in a tangent plane of a current part machining point; projecting along the normal direction is performed to obtain a collision domain; interference laser beams and interference point positions are quickly searched in a collision domain in combination with a quadtree structure; and according to the laser remanufacturing method, posture correction is carried out on the interference laser beam, track optimization of laser remanufacturing is completed, and therefore the phenomenon that the laser beam interferes with other parts is avoided, the parts and laser equipment are protected, the application range of the laser remanufacturing technology is widened, and machining safety is improved.
Owner:XINJIANG UNIVERSITY

Method for enhancing ability of protocol to resist desynchronization attacks

A method for enhancing an ability of a protocol to resist desynchronization attacks comprises the following steps: a reader sends an authentication request message to a label; the label calculates IDSnew and sends the IDSnew to the reader; the reader searches the IDSnew in a background database; if the IDSnew does not exist, the reader waits for the label to transmit IDSold and re-searches the database, and the phenomenon shows that a new key of one party of the label is not updated; if the IDSnew exists, the reader generates two random numbers n1 and n2, calculates A, B and C, and sends messages to the label; after receiving the messages A, B and C, the label extracts the random numbers n1 and n2, calculates local C', judges whether C is equal to C', calculates a D value, and sends the Dvalue to the reader; otherwise, the authentication fails, wherein D is equal to FORMULA (for the detailed formula, please refer to the abstract), and the keys and pseudonyms are finally updated; and after receiving the message D, the reader verifies whether the message D is equal to a local value D', and if yes, the corresponding keys and pseudonyms in the database are updated. According to the method, the correlation between the random numbers can be enhanced, the collision domain of unit values of the random numbers can be reduced, and thus the ability of the protocol to resist the desynchronization attacks can be enhanced, and the security of the protocol can be effectively improved.
Owner:XUZHOU MEDICAL UNIV

Disk selection method and device for distributed storage cluster and readable storage medium

The invention discloses a disk selection method and device for a distributed storage cluster and a computer readable storage medium. The method comprises the steps that a conflict domain used for storing selected object storage equipment and related information of a fault domain where the selected object storage equipment is located is constructed. In the process of sequentially selecting the OSDs downwards from the root node according to the root node information, the fault domain type and the total number of the OSDs to be selected, if the current member is in the conflict domain, selecting other members from the layer where the current member is located; if the current member is not in the conflict domain, the type of the current member is matched with the type of the fault domain, and the object storage device contained in the current member is not selected, member selection is carried out from the next layer of the layer where the current member is located until a target member of the OSD type is selected; and the target member information and the current member information are input into the conflict domain to update the conflict domain, thereby effectively reducing the frequency of invalid disk selection by a data distribution algorithm, improving the disk selection efficiency, and reducing the occupation of CPU resources and the consumption of time.
Owner:SHANDONG YINGXIN COMP TECH CO LTD

Conflict avoidance-based dispatching method for wireless MESH network

The invention provides a conflict avoidance-based dispatching method for a wireless MESH network, which comprises the following steps of: determining the reserved time slot of an MSH-DSCH message and calculating the priority level of the MSH-DSCH message; collecting the transmission moment number of the next transmission of two-hop neighboring nodes in a collision domain range by a node, updating the transmission moment into an unusable resource on a binary bitmap saved by the node and counting the numbers of all neighboring nodes in a two-hop range by the node; determining whether the transmission moment of the node collides with the next transmission moment of the neighboring nodes in the two-hop range or not; and if collision occurs, arranging candidate competition node sets according to node numbers before the transmission moment of the node, searching the binary bitmap, forming free time slot sets, arranging the free time slot sets according to the transmission moment number, mapping the candidate competition node sets and the free time slot sets and selecting to transmit in the reserved time slot or competing the same reserved time slot, wherein in the transmission moment of the node, a control message which comprises the next transmission moment of the node is sent.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products