Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

725 results about "Network overhead" patented technology

Network overhead is the header data that is required to route and transport data over network, whereas fork overhead is the additional time and memory cost of creating and managing new processes within operating system. overhead. An overhead throw. overhead(Noun) An overhead projector.

Trusted transactional set-top box

A set top box (STB) includes a trusted transactional cache and associated transactional protocol and enables e-commerce transactions to be securely committed to a remote server extremely quickly and with little network overhead. The invention does away with the user concern of whether the transaction was successful. The STB operates equally well on robust private networks as on unpredictable Internet or wireless networks, and avoids upsetting users who would otherwise have to wait in front of a display screen for confirmation of completion of the transaction after a temporary communication failure with the central site. The method may advantageously be used to provide cost-effective micro-payments solutions. The STB may include a dual headed display capability in which data and video maybe be directed to separate displays. The STB may feature an embedded ticket printer, as well as an embedded barcode scanner. This enables non computer literate users to more conveniently track transactions committed via the STB, or to take advantage of promotional coupons. The STB features an embedded hardware true Random Number Generator to produce maximum entropy encryption keys, therefore providing maximum secure and fool-proof means to protect private data using government authorized encryption schemes.
Owner:MUDALLA TECH INC THOITS LOVE HERSHBERGER & MCLEAN

Network access method for intelligent device, intelligent device and mobile terminal

The invention provides a network access method for an intelligent device, the intelligent device and a mobile terminal. The network access method for the intelligent device comprises the steps that after a sniffer monitoring mode of the intelligent device starts, a pioneer service set identifier (SSID) in a first Probe Request frame is analyzed when the first Probe Request frame is received, when the analysis result meets preset conditions, a second Probe Request frame which is afterwards sent out by the same source is locked, an SSID, with wireless router information, in the received second Probe Request frame is analyzed, the wireless router information contained in the second Probe Request frame is obtained, and the intelligent device has access to a wireless network according to the wireless router information. According to the network access method for the intelligent device, the intelligent device which is in the sniffer monitoring mode can obtain the wireless router information rapidly, conveniently and safely so as to have access to the network, the network access method is wide in applicability, the quantity of information which can be carried in a single communication process is large, and the network expense is saved.
Owner:QINGDAO HAIER INTELLIGENT HOME TECH CO LTD

Model parameter training method and device, server and storage medium

The invention discloses a model parameter training method and device, a server and a storage medium, which belongs to the technical field of information. The method comprises the steps that an initialparameter value and a sample set of a model parameter of a target model are acquired; the first gradient of the model parameter is calculated according to the initial parameter value and the sample set; iterative quantization processing is carried out on the first gradient to acquire a quantized second gradient, wherein the iterative quantization processing is quantization processing carried outbased on an error cumulative value corresponding to the t-1-th iteration round in the t-th iteration round, and the error cumulative value is a quantization error cumulative value calculated based ona preset time attenuation coefficient; and the quantized second gradient is transmitted to a primary computing node, wherein the quantized second gradient is used to instruct the primary computing node to update the initial parameter value according to the quantized second gradient to acquire an updated parameter value. According to the embodiment of the invention, a quantization error correctionmethod is used to quantize and compress the first gradient of the model parameter, which reduces the communication cost and network overhead of gradient transmission.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Internet of vehicles malicious node detection system and method for integrated block chain consensus mechanism

The invention discloses an Internet of vehicles malicious node detection system and method for an integrated block chain consensus mechanism. Messages sent by a vehicle sending node Vi and identity information of a vehicle sending node Vi are packaged into a request authentication data packet to be sent to RSU via any vehicle receiving node Vj; after receiving the data packet, the RSU performs mutual identity authentication with the Vj; if the mutual identity authentication is passed, the RSU forwards the received data packet sent by the Vj to a TA; according to the traceability of a databaserecorded by a block chain, digital signature and information authentication are performed by using a RSA algorithm; the consensus mechanism is used for detecting whether the vehicle node is a malicious node through combining with the current state of the vehicle node. According to the method, the characteristic that the data recorded by the block chain is not easy to tamper is used, the maliciousvehicle in the Internet of vehicles can be efficiently and accurately detected, meanwhile, the problems of decentralized management and privacy protection of the Internet of vehicles also can be solved, and thus the problem that in the Internet of vehicles, the detection accuracy of the malicious node is low is solved, and the network overhead is effectively reduced.
Owner:CHANGAN UNIV

SD-RAN-based whole network collaborative content caching management system and method

ActiveCN105491156AImprove experienceAvoid calling repeatedlyTransmissionCurrent cellControl layer
The invention discloses an SD-RAN (software defined radio access network)-based whole network cooperative caching management system and method. According to the SD-RAN (software defined radio access network)-based whole network cooperative caching management system and method, a content-popularity mapping table and a wait caching/replacement list are generated through detection and content popularity statistics, and a caching decision is made according to the wait caching/replacement list, and is issued to a caching node, so that caching and update can be carried out; a real-time global caching mapping table is obtained through monitoring the caching decision; and the caching node responds to a content request and delivers corresponding content according to the content request of a user of a current cell; characteristics of limitation of content acquisition delay and the change of the popularity of different content with time and places are fully considered, and a global network view in a control layer of a software defined network is fully utilized, and therefore, the detection range of the popularity of content can be expanded; and based on whole network cooperative caching optimized content arrangement, a situation that content is repeatedly called from a remote-end content server can be avoided, and network overhead can be reduced, and user experience can be improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for setting measuring configuration during base station and user equipment (UE) switching

ActiveCN101964994AReduce the increase in overheadWireless communicationLow speedComputer terminal
The invention provides a method for setting measuring configuration during base station and user equipment (UE) switching. The method for setting the measuring configuration comprises the following steps of: receiving a switching request message, wherein the switching request message comprises resident cell information which reflects the displacement situation of a wireless terminal; determining a parameter value for representing the movement speed of the wireless terminal according to the resident cell information; setting the measuring configuration according to the parameter value, determining the measuring configuration as periodic measurement when the parameter value is more than or equal to a first threshold value and determining the measuring configuration as event triggering measurement when the parameter value is less than or equal to a second threshold value; and sending a switching response message so as to allow a source base station to set the measuring configuration of the wireless terminal according to the switching response message, wherein the switching response message comprises the measuring configuration. In the embodiment of the invention, appropriate measuring configuration is set according to the movement situation of the wireless terminal, so that the situations of communication interruption during high-speed movement of the wireless terminal and the increase of network overhead during low-speed movement are reduced.
Owner:WUHAN HONGXIN TELECOMM TECH CO LTD

Cross-layer cognitive radio network user access method based on frequency hopping

The invention provides a cross-layer cognitive radio network user access method based on frequency hopping, and belongs to the field of application of radio networks. According to the method, cognitive users in primary user network is divided into a plurality of clusters according to the cognitive base station service range; each cluster comprises a cognitive base station (cluster head) and a plurality of cognitive users (cluster nodes); the cognitive base station is connected with a primary user base station and is managed by the user base station; however, the communications of cognitive users are controlled and managed by the cognitive base station. Based on the fact that corresponding idle spectrum information is obtained through monitoring a primary user on the network physical layer and sensing the spectrum, a plurality of frequency hopping patterns are generated by using a frequency hopping technology, and the cognitive users are made to carry out hopping communications between a plurality of signal channels as per certain frequency hopping pattern within different frequency ranges at different time on the MAC (Media Access Control) layer, so that the cognitive user dynamic access is achieved. The invention has the excellent effects of small network expense, high utilization ratio of spectrum, small interference and flexible and efficient user access manner.
Owner:KUNMING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products