Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "IMG" patented technology

IMG, in computing, refers to binary files with the .img filename extension that store raw disk images of floppy disks, hard drives, and optical discs or a vector image – .img.

Using object awareness for a join pruning mechanism

The invention relates to a computer system and a corresponding method and a corresponding computer-readable medium according to the invention. The computer system is suitable for determining the result of a join. The computer system may be distributed system. The computer system comprises: a processing unit; a database coupled to the processing unit, the database comprising: a first table (R), and a second table (S), each of the first and second table being partitioned into at least two partitions, namely a respective first (R1, S1) and a respective second partition (R2, S2), the database being coupled to an application that, in operation, accesses the database according to an access pattern; and a database engine executable by the processor and communicatively coupled to the database, the database engine being configured for determining a join (R R[A]=S[A]S) between the first and the second table by: determining the results for a plurality of subjoins (R1 R[A]=S[A]S1, R2R[A]=S[A]S2, R1 R[A]=S[A]S2, R2 R[A]=S[A]S1); and combining (U) at least those determined results that are not empty(Ø). The database engine is further configured for determining the result of at least one of the plurality of subjoins by inferring from the access pattern of the application that this result is empty (Ø).
Owner:HASSO PLATTNER INSTITUT FUR SOFTWARESYSTTECHN

Decoding method of multi-cell, multi-user and multi-antenna system

The invention relates to a decoding method of multi-cell, multi-user and multi-antenna system. The decoding method includes two steps. The first step is to design a training sequence header: a line (img file='dest_path_image 004.TIF' wi='13' he='16'/) in front of (img file='2014106135712100004 dest_path_image 002.TIF' wi='24' he='24'/) is set as the training sequence header, elements in the first line of (img file=' 53509 dest_path_image 002.TIF' wi='24' he='24'/) are (img file=' dest_path_image 006.TIF' wi='8' he='16'/) respectively, the lines from the second line of (img file=' 908332 dest_path_image 002. TIF' wi='24' he='24'/) to (img file=' 688070 dest_path_image 004.TIF' wi='13' he='16'/) are marked as (img file=' dest_path_image 008.TIF' wi='22' he='24'/), wherein elements in (img file=' 270230 dest_path_image 008.TIF' wi='22' he='24'/) can be (img file=' 22285 dest_path_image 006.TIF' wi='8' he='16'/) or (img file=' dest_path_image 010.TIF' wi='21' he='16'/), and vectors in all rows of (img file=' 844747 dest_path_image 008. TIF' wi='22' he='24'/) are different from each other. The second step is to estimate a sent signal matrix (img file=' dest_path_image 014. TIF' wi='18' he='18'/) through a received signal matrix (img file=' dest_path_image 012. TIF' wi='18' he='18'/) on the basis of a system model. The decoding method achieves estimation of sent signals in the multi-cell, multi-user and multi-antenna system by aid of a few pilot signals on the condition that the receiving party does not know the channel state information.
Owner:HANGZHOU DIANZI UNIV

Threshold cryptosystem, corresponding electronic devices and computer program products

In one embodiment, it is proposed a method for encrypting a plaintext M ∈, where is a DDH-hard group of prime order p. The method is executed by an electronic device, and is remarkable in that it comprises:obtaining a public key PK=(, N, g, h, X, H, G) where N is a RSA module, elements g, h are random elements belonging to said group , X=gxhy ∈, where elements x, y are random values from a ring p, and H, G are hash functions;obtaining two random elements r, s, each element belonging to the ring p;determining a vector being (C0, C1, C2)=(M.Xr, gr, hr);determining a proof π that logg(C1)=logh(C2), said proof comprising two components c, t′, with c=H(C0, C1, C2, gs, hs) and t′=s+c.r mod p;delivering a ciphertext C=(C0, C1, C2, π)=(C0, C1, C2, c, t′) ∈3×p2.
Owner:THOMSON LICENSING SA

System and method for mobile proactive secret sharing

Described is a system for mobile proactive secret sharing. The system utilizes a Secret-Share protocol to share, by server Pj, a secret s among a set of servers , such that a degree of polynomials used to share the secret s is d and a shared secret is denoted as [s]. A GenPoly protocol is used to cause the servers in the set of servers to generate l random polynomials of degree D. A Secret-Redistribute protocol is used to redistribute the shared secret [s] to a set of new servers ′. Finally, a Secret-Open protocol is used to open the shared secret [s].
Owner:HRL LAB

Feedback-based network code TCP (Transmission Control Protocol) decoding method and device

The present invention provides a network coding TCP decoding method and device based on feedback. The method includes: when receiving a TCP data packet sent by the TCP layer, the sending end performs the encoding packet that needs to be sent currently according to the packet loss rate of the current link. The number Sn is updated; according to the feedback information carried in the response message sent by the receiving end received at the current moment, the current number of encoding window locks Ln is determined; if the current number of encoding window locks Ln is not 0, the encoding window is fixed , and the W TCP data packets in the encoding window will be encoded according to the number of packets Perform preset encoding, and encode the encoded packets are sent to the receiver. The present invention can not only generate active compensation according to the network environment, but also make corresponding adjustments based on the feedback to speed up the full rank of the decoding matrix and reduce the decoding waiting time delay.
Owner:INST OF INFORMATION ENG CAS

Method for judging convex figure shape similarity in digital image

The invention provides a method for judging the convex figure shape similarity in a digital image. The method comprises the steps of S1, for any two convex figure shapes omega 1 and omega 2 that are subjected to similarity judgment, respectively figuring out the complex plane feature vectors of the two convex figure shapes based on GCT transformation and recording the complex plane feature vectors thereof as F1 and F2; calculating the intensity sequences and the phase sequences thereof and respectively recording the intensity sequences and the phase sequences as M1, S1, M2 and S2; judging the similarity between the phase sequence S1 and the phase sequence S2; calculating according to img file='DDA0000901986470000011.TIF' wi='131' he='65', img file='DDA0000901986470000012.TIF' wi='1938' he='99', and img file='DDA0000901986470000013.TIF' wi='1123' he='98'; when delta is larger than 0.2, judging that the two convex figure shapes are not similar; S3, judging the similarity between the intensity sequence M1 and the intensity sequence M2; calculating according to img file='DDA0000901986470000014.TIF' wi='918' he='94', img file='DDA0000901986470000015.TIF' wi='1907' he='99', and img file='DDA0000901986470000016.TIF' wi='579' he='97'; when eta is larger than 0.2, judging that the two convex figure shapes are not similar; otherwise, judging that the two convex figure shapes are similar. The method is simple to realize and low in time complexity. The identification accuracy of the method is up to more than 90%.
Owner:珠海金智维信息科技有限公司

Method and apparatus for higher order ambisonics encoding and decoding using singular value decomposition

The encoding and decoding of HOA signals using Singular Value Decomposition includes forming (11) based on sound source direction values and an Ambisonics order corresponding ket vectors (|(Ω5))) of spherical harmonics and an encoder mode matrix (Ξ0χs). From the audio input signal (|χ(Ωs))) a singular threshold value (σε) determined. On the encoder mode matrix a Singular Value Decomposition (13) is carried out in order to get related singular values which are compared with the threshold value, leading to a final encoder mode matrix rank (rfine). Based on direction values (Ωι) of loudspeakers and a decoder Ambisonics order (Nι), corresponding ket vectors (IY(Ωι)) and a decoder mode matrix (Ψ0χL) are formed (18). On the decoder mode matrix a Singular Value Decomposition (19) is carried out, providing a final decoder mode matrix rank (r find). From the final encoder and decoder mode matrix ranks a final mode matrix rank is determined, and from this final mode matrix rank and the encoder side Singular Value Decomposition an adjoint pseudo inverse (Ξ+)† of the encoder mode matrix (Ξ0χs) and an Ambisonics ket vector (Ia′s) are calculated. The number of components of the Ambisonics ket vector is reduced (16) according to the final mode matrix rank so as to provide an adapted Ambisonics ket vector (|a′ι). From the adapted Ambisonics ket vector, the output values of the decoder side Singular Value Decomposition and the final mode matrix rank an adjoint decoder mode matrix (Ψ)† is calculated (15), resulting in a ket vector (|y(Ωι)) of output signals for all loudspeakers.
Owner:DOLBY INT AB

public key encryption and decryption method of a finite field multiplication group with a Meisen prime number

The invention relates to a public key encryption method based on a finite field (shown in the formula in the specification) multiplication group, in particular to a public key encryption method basedon the finite field ( shown in the formula in the specification) multiplication group. wherein p is a prime number, and the formula (1) is shown in the specification, and p is a prime number and is made to be a Mesene number. Finite field isomorphism and polynomial field (img field RE-482803DEST _ PATH _ IMAGE001. TIF) isomorphism and polynomial field (img field RE-637709DEST _ PATH _ IM wherein the structural formula of the polynomial is as shown in the specification, the structural formula of the polynomial is as shown in the specification, and the structural formula of the polynomial is asshown in the specification, wherein the structural formula of the polynomial is as shown in the specification, and the structural formula of the polynomial is as shown in the specification. In the Finite field multiplication group wherein the order of the formula (I) is shown in the specification, the order of the formula (I) is shown in the specification, and the order of the formula (I) is shownin the specification. The order of the formula (II) is shown in the specification. Therefore, the order of the element a of any non-unit element is shown in the specification, wherein the order of the element a of any non-unit element is shown in the specification; the order of the element b of any non-unit element is shown in the specification; The invention discloses a public key cryptosystem.the receiver B discloses a random element a; the primitive polynomial q is used as a system parameter; the k1 is seen as a private key by the random number; A public key g (shown in the specification)is disclosed. An encryption party A generates a random number k2, and the random number k2 is smaller than or equal to 1 and smaller than or equal to 1. carrying out a modular exponentiation operation (shown in the formula in the specification), carrying out a modular exponentiation operation (shown in the formula in the specification), and carrying out a modular exponentiation operation (shown in the formula in the specification), carrying out modular multiplication on the encrypted plaintext m (shown in the formula in the specification), and carrying out modular multiplication on the encrypted plaintext m, The method comprises the following steps that: a decryption party receives a ciphertext, generates a ciphertext according to the ciphertext, and generates the ciphertext according tothe ciphertext. The decryption party receives the ciphertext and generates the ciphertext according to the ciphertext. and decrypting by using the private key k1 to obtain a plaintext m. The method disclosed by the invention can be applied to the aspects of symmetric passwords, public key passwords, digital signatures and the like. The method disclosed by the invention can be applied to the fieldsof the symmetric passwords, the public key passwords, the digital signatures and the like.
Owner:江宝安

Method, system and device for installing virtual machine operating system

The invention discloses a method, system and device for installing a virtual machine operating system. The method comprises the following steps: obtaining a vmlinuz temporary file and an initrd.img temporary file; adding a kickstart configuration file and a configuration script file to an initrd.img temporary file; configuring paths of the vmlinuz temporary file and the initrd.img temporary file to a metadata configuration file of the virtual machine; when the virtual machine is started to enter an installation operation system, configuring a system kernel based on the vmlinuz temporary file in the metadata configuration file of the virtual machine, and configuring corresponding hardware equipment based on the kickstart configuration file and the configuration script file in the initrd.imgtemporary file to complete system installation. Therefore, according to the virtual machine operating system installation mode, a PXE server does not need to be deployed, installation of the virtualmachine operating system can be achieved only through a file configuration mode, and the application range is wide.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

A method and system for resetting passwords based on linux

ActiveCN108984230BReduce memory loadSimplify the process of resetting your passwordDigital data authenticationProgram loading/initiatingPasswordEngineering
The present invention provides a password reset method and system based on Linux, comprising: S1, mounting the drive letter of the mobile device to / mnt; S2, writing grub into the mobile device; S3, resetting the password Write the script into the initramfs.img file to generate a new initramfs.img file; S4, copy the initramfs.img file containing the password reset script into the mobile device. S5. Modify the initramfs boot file of the grub.cfg file in the mobile device to be a newly generated initramfs.img file. In the present invention, a password reset script is built into a mobile device such as a U disk. When the user forgets the system password and needs to reset the password, he or she chooses to boot from the U disk mobile device, and the built-in password reset script automatically runs to complete reset Password. Users do not need to remember the complex operation of repeatedly trying or modifying the grub kernel startup parameters to enter the shell interface to reset the password. They only need to start the reset from the preset U disk mobile device, which reduces the memory burden of the user and simplifies the heavy operation. The process of setting a password is convenient for the user to reset the password.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Method for establishing secure public-key cryptography against quantum computing attacks

The present invention relates to the field of information safety, and discloses a method for establishing public key cryptogram against quantum computing attack. The method comprises the following steps of: (11) a protocol first party selects a braid group Bn with an index n of being not small than 7, and selects a subgroup A generated by employing a1, a2, ..., ak in the Bn and a subgroup B generated by employing b1, b2, ..., bm in the Bn; (12) the protocol first party selects [Theta], wherein Bn maps to {0, 1}k is an Hash function from Bn to plaintext space {0, 1}k collision resistance; (13)the protocol first party selects an element x as a private key, wherein x=x(a1, a2, ..., ak) belonging to A, and selects (Bn, A, B, [Theta], X-1b1x, x-1b2x, ..., x-1bmx) as a public key; (14) a protocol second party selects an element y, wherein y=y(b1, b2, ..., bm) belonging to B, calculates KB=(y< 1>y(x< 1>b1x, x< 1>b2x, ..., x< 1>bmx))< 1>=(y< 1>x< 1>yx)< 1>=x< 1>y< 1>xy, performs encryption calculation of a plaintext p to obtain a ciphertext (img file='DDA0001531187730000011. TIF' wi='286' he='71' / ) and sends t to the protocol first party; and (15) the protocol first party calculates KA=x<1>x(y< 1>a1y,y< 1>a2y, ...,y< 1>aky)=x< 1>y< 1>xy, performs decryption calculation to obtain a plaintext (img file='DDA0001531187730000012. TIF' wi='283' he='70' / )(img file='DDA0001531187730000013. TIF' wi='510' he='63' / ). The method provided by the invention can resist all the known attacks comprising quantum computing attack.
Owner:SHENZHEN UNIV

SPL rollback method and device based on UBOOT, storage medium and terminal

The invention provides an SPL rollback method and device based on UBOOT, a storage medium and a terminal. The SPL rollback method comprises the steps that: an MISC partition of the terminal is read, and OTA upgrading information of the terminal is obtained; the obtained OTA upgrading information is analyzed, and whether OTA upgrading is completed or not is judged; if the judgment result is that the OTA upgrade fails, the data in the SPL main partition is replaced with the data in the SPL standby partition, and the terminal is restarted to complete SPL rollback; and if the judgment result is that OTA upgrading is successful, SPL rollback does not need to be carried out. Whether normal startup can be carried out or not is detected in time after OTA upgrade by using the recognition characteristic of UBOOT on an A/B partition of an MISC partition, and after OTA upgrade failure is detected, the SPL main partition and the SPL standby partition are read and written in time, the data in the SPL main partition is replaced with the data in the SPL standby partition, and a terminal is restarted, so that the purpose of rollback of the SPL is achieved. The situation that the terminal fails to start due to the fact that the SPL main partition and the SPL standby partition are inconsistent is prevented, and then the situation that the terminal cannot be started due to the fact that the IMG is incompatible is prevented.
Owner:XIAMEN UNISOC TECH CO LTD

A Distance Protection Method for Fail-Open Components in Oscillating Blocking

The invention relates to a distance protection method for a fault-opening element in oscillation locking, comprising the following steps: collecting three-phase current and three-phase voltage at the installation place of the protection; judging whether to enter the oscillation locking state; if and Go to the penultimate step, otherwise, go to the next step; if the current asymmetry m≥0.65, open the distance protection; otherwise, go to the next step; if the oscillation center voltage Either one satisfies Delay 200ms to open the distance protection section I, and open the distance protection section II instantaneously; otherwise, go to the next step; if Either one satisfies Delay 200ms to open distance protection stage I, and instantaneously open distance protection stage II; otherwise, block distance protection; if Either one satisfies , open the distance protection with a delay of 150ms; otherwise, go to the next step; if Either one satisfies , delay 150ms to open the distance protection; otherwise, block the distance protection. The method improves the sensitivity of the fault-opening element in the oscillation blocking, so that the distance protection can operate correctly when the fault passes through a relatively large transition resistance.
Owner:STATE GRID CORP OF CHINA +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products