Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1426 results about "Node count" patented technology

Instead of counting nodes on the fly, Term Node Count keeps track of all term's node counts in its own database table and exposes that data to views. This makes displaying node counts for a list of terms much easier and much more efficient. If at any time the data stored by this module is corrupted by outside influences (i.e.

Methods and apparatus for dynamic topology configuration in a daisy-chained communication environment

InactiveUS6055228AImprove effective communication performanceDigital computer detailsNetworks interconnectionFiberCommunications system
A loop isolation circuit (LIC) to enable subdivision of a single daisy-chained communication loop (e.g., FC-AL) into smaller loops and to enable joining of smaller loops into a single larger loop. An LIC comprises essentially two multiplexors configured so as to permit controlled subdivision or joining of two loop portions. In a first selected state, the LIC subdivides a communication loop in which it is inserted into two loops. This configuration sacrifices accessibility among some devices previously on the larger loop for the benefit of enhanced bandwidth and reduced overhead due to node count. Bandwidth is enhanced by enabling simultaneous operation of two (or more) loop portions for establishing and communicating over logical circuit connections. However, when a failure of a redundant loop precludes access to devices, the LIC may be set to a second state to rejoin previously subdivided loops into a larger loop. This configuration restores access among all devices sharing common access to the larger loop. The LIC of the present invention therefore enables communication loop controllers to dynamically reconfigure a daisy-chained loop communication system to enhance performance in normal operation. The LIC of further enables restoration of the larger loop to restore redundant loop configurations. The LIC of the present invention is applicable in many daisy-chained loop communication environments including, but not limited to, Fiber Channel Arbitrated Loop (FC-AL).
Owner:AVAGO TECH WIRELESS IP SINGAPORE PTE

Method and system for detecting large-scale malicious web pages

The invention discloses a method and a system for detecting large-scale malicious web pages by using a three-layer parallel architecture and a layered control guarantee method: in the first layer, a plurality of detection servers interconnected via networks are arranged in parallel, so as to construct a detection server cluster, and a task set to be analyzed is set up on one detection server; in the second layer, a plurality of analysis nodes are arranged in parallel in each detection server, and a node cluster monitoring module is arranged so as to monitor and analyze the operating condition of the nodes; and in the third layer, a sandbox environment is constructed in parallel in each analysis node, so as to achieve the paralleled detection of the task to be analyzed. The architecture of the invention ensures the mutual independence and self-maintenance among the detection servers and among the analysis nodes, the overall operation of the system is free from the dynamic expansion of physical hosts and node numbers, and the overall function thereof is not affected by the invalidity of the single analysis node; and various tasks can be detected in a multi-channel and paralleled manner at the same time in the same node, thereby improving the analysis efficiency of the system.
Owner:PEKING UNIV

Batch processing request-based Microsoft SQL server database cluster

The invention relates to a batch processing request-based Microsoft SQL server database cluster. The cluster consists of two parts, wherein a gateway and backups thereof are arranged at the front end of the cluster, and two or more of database server nodes are arranged at the rear end of the cluster; each node is provided with a structured query language (SQL) Server example and a cluster proxy and is not provided with a shared disk structure; and each node has an independent and consistent data set, and the cluster is only provided with a host. The gateway is used for managing the integral cluster; and for each client link, the gateway opens a database link corresponding to each node simultaneously to receive, analyze and optimize all client requests, wherein the client requests are divided into two classes, namely the read-only query requests and the data updating requests; for the read-only query requests, the gateway sends the requests to any one node to execute the requests according to a set load balancing algorithm so as to realize the real database access load balancing and improve the performance of a system; and the updating requests are sent to the host of the cluster to be executed, and are subjected to synchronous data by the host to other nodes to keep the data set of each node real-time and consistent, eliminate a single-point fault source and realize system fault tolerance. The integral cluster can improve the performance, availability and reliability of the system obviously and solve various problematic issues of the performance, single-point faults, zero data loss and the like in the field of databases, and is a comprehensive database cluster scheme.
Owner:无锡浙潮科技有限公司

Extremum disturbed particle swarm optimization based SDWSN energy-balanced routing algorithm

The invention relates to an extremum disturbed particle swarm optimization based SDWSN energy-balanced routing algorithm and belongs to the technical field of wireless sensor networks. The algorithm comprises the steps of firstly selecting a cluster head by giving consideration to residual energy, position and energy balanced information of nodes and utilizing improved extremum disturbed particleswarm optimization algorithm, and dividing the whole network dynamically into clusters different in size based on a distance from the nodes to the base station, node residual energy and the number ofneighbor nodes; and secondly, saving energy consumption during cluster division by adopting a way of performing global clustering and k local cluster head updating per each period; and finally, building a shortest routing tree based on factors such as link energy consumption, node residual energy and in-cluster node number by adopting a centralized mode by a sensor control server when multi-hop routing is built. The extremum disturbed particle swarm optimization based SDWSN energy-balanced routing algorithm can efficiently save energy and balanced network energy consumption and prolong the life circle of the network.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Redundancy removal file system based on limited binary tree bloom filter and construction method of redundancy removal file system

The invention provides a limited binary tree bloom filter, a redundancy removal file system based on the limited binary tree bloom filter, and a construction method of the redundancy removal file system based on the limited binary tree bloom filter. According to the limited binary tree bloom filter, an upper limit is arranged for the number of nodes of each layer, each node is a two-stage bloom filter, and each two-stage bloom filter comprises a standard bloom filter body and a second portion which contains fingerprints and addresses of data blocks in a stored mode. Firstly, a fingerprint of each data block is searched in the standard bloom filter bodies; when the fingerprint of each data block is not found, a node misses, otherwise, search is continuously carried out in the second portions, the node hits the target when a completely matched fingerprint is found in the second portions, and otherwise the node misses. The redundancy removal file system and the construction method of the redundancy removal file system achieve write-in, reading and deletion of files on the basis of the limited binary tree bloom filter. Misjudgment is reduced through a secondary query, and the limited binary tree bloom filter, the redundancy removal file system based on the limited binary tree bloom filter, and the construction method of the redundancy removal file system based on the limited binary tree bloom filter have the advantages of being low in occupation of the memory, low in usage of a CPU, low in occupation of additional space, high in redundancy removal ratio, and excellent in access performance and extensibility.
Owner:BEIHANG UNIV

Blockchain-based transaction method and a blockchain-based transaction system

The invention belongs to the technical field of block chains, and relates to a block chain-based transaction method and a block chain-based transaction system. The method comprises the following steps: each node signs a block chain identifier and a public key of the node by using a private key of the node and broadcasts the block chain identifier and the public key to a block chain; A certain transaction node initiates a transaction, calculates a Hash value of the transaction by adopting a secret key, signs the transaction message and the primary Hash value by using a private key of the transaction node, and broadcasts the transaction message and the primary Hash value to the block chain; The other nodes calculate the Hash value of the transaction again by adopting the shared session key with the transaction node, verify whether the primary Hash value is the same as the secondary Hash value or not, and broadcast the verification result to the block chain after using the own private keyto sign the verification result; And the accounting node counts whether the verification result is passed or not within a preset time threshold range of the transaction initiated by the transaction node, and establishes a consensus mechanism according to the verification result which is the passed accumulated number. The communication burden of the block chain and the size of the block can be reduced, and the transmission efficiency of the block chain is greatly improved.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Multi-stage nerve network model training method based on genetic algorithm

The invention relates to a multi-stage nerve network model training method based on a genetic algorithm. The multi-stage nerve network model training method is technologically characterized by comprising the steps of preprocessing data for eliminating the physical dimension effect of a field; constructing a multi-input-layer network structure according to the number of nodes in an input layer, the number of nodes in a hidden layer and the number of nodes in an output layer; training an initial weight and a threshold by means of the genetic algorithm; updating the weight by means of an iterative algorithm; determining whether a model termination condition is satisfied according to the number of iteration times and a model error, terminating the model if the model termination condition is satisfied, and otherwise updating the weight again. According to the multi-stage nerve network model training method, a multi-stage nerve network structure is constructed for aiming at a problem that parameters in process control are periodical and deteriorate output. According to a fact that the genetic algorithm has a global searching characteristic, the multi-stage nerve network model training method is used for selecting a group of relatively reasonable initial weight for the network structure, thereby preventing local minimum point in network training, and settling a problem that the nerve network structure with only one input layer cannot settle a problem of product processing speed reduction caused by incapability of settling the parameters in a time sequence in engineering control.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1

Method and device using vector instruction to process file index in parallel mode

The invention discloses a method and a device using a vector instruction to process a file index in a parallel mode. The method comprises the following steps of calculating and sorting index key values of data in a data table, distributing needed storing space of all leaf nodes, using an SIMD (single instruction multiple data) instruction to load a plurality of index key values once, sequentially filling the data in all the leaf nodes, distributing the needed storing space of the internal nodes of the upper layer, building the internal nodes, continuously building the internal nodes of the upper layer until the node number of the upper layer is one, regarding the node as a root node, and finishing the building of an index tree; building a buffer pool in internal storage, using an inquiring queue to temporarily store all received inquiring requests, taking the inquiring requests out of the buffering pool when the length of the inquiring queue reaches a preset threshold value, sorting the inquiring requests, and forming a sorted to-be-inquired queue; sequentially obtaining a to-be-inquired term in the sorted inquiring queues, sequentially searching from the root node of the built index tree, and using the SIMD method to search the to-be-inquired term in a parallel mode inside the internal nodes and the leaf nodes.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Verification based blockchain common recognition method

The invention relates to a verification based blockchain common recognition method. A client sends a request message to a verification initiation node; the verification initiation node organizes a pre-preparation message and broadcasts the message to other verification nodes in the network; the other verification nodes organize signature messages and return the signature messages to the verification initiation node respectively; the verification initiation node counts the signature messages which are received correctly, submission of the present node is executed when the number of the signature messages which are received correctly reaches a given threshold, and a verification message is organized and sent to the other verification nodes; each of the other verification nodes checks digitalsignatures in the message successively, when the number of the digital signature that passing checking reaches a given threshold, submission operation of the present node is executed, and a verification reply message is organized and returned to the verification initiation node; and the verification initiation nodes organizes a response message and back feeds the response message to the client. Compared with a practical Byzantine fault tolerant method, the network communication frequency and communication data bulk are reduced, and the common recognition efficiency is improved.
Owner:NANJING UNIV OF SCI & TECH

Minimum competition window adjusting method based on neighbor node number estimation in vehicle-mounted network

The invention discloses a minimum competition window adjusting method based on a neighbor node number estimation in a vehicle-mounted network, wherein the minimum competition window adjusting method based on the neighbor node number estimation in the vehicle-mounted network aims to solve the problem of radio expandability of a vehicle-mounted Ad hoc network MAC layer with a faster vehicle density change. Under the premise of an aim of minimizing the radio frame collision probability, the minimum competition window adjusting method based on the neighbor node number estimation in the vehicle-mounted network derivates a relationship between a minimum competition window and the number of competition anodes, a minimum competition window value is dynamically adjusted according to a real-time estimation of the number of vehicle neighbor nodes, the change of the minimum competition window value is made to reflect competition conditions in the network, therefore, waste of channel resources is reduced, and radio performance is improved. The minimum competition window adjusting method based on the neighbor node number estimation in the vehicle-mounted network has the aim of minimizing the collision probability, deviates the relationship between a CWmin and the number of active competition nodes, the minimum competition window is adjusted in a self-adjusting mode according to the real-time estimation of the number of the vehicle neighbor nodes, and the vehicle density change is reflected through adjustment of the minimum competition window, and therefore radio expandability of an IEEE802.11p MAC layer is improved.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products