Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

65 results about "Reliable computing" patented technology

Reliable Computing is devoted to various aspects of interval mathematics and reliable numerical computations giving guaranteed properties of computed results. It includes various items in the fields of theoretical research, computer tools, applications, interdisciplinary research and other relevant areas.

System and method for secure and reliable multi-cloud data replication

A multi-cloud data replication method includes providing a data replication cluster comprising at least a first host node and at least a first online storage cloud. The first host node is connected to the first online storage cloud via a network and comprises a server, a cloud array application and a local cache. The local cache comprises a buffer and a first storage volume comprising data cached in one or more buffer blocks of the local cache's buffer. Next, requesting authorization to perform cache flush of the cached first storage volume data to the first online storage cloud. Upon receiving approval of the authorization, encrypting the cached first storage volume data in each of the one or more buffer blocks with a data private key. Next, assigning metadata comprising at lest a unique identifier to each of the one or more buffer blocks and then encrypting the metadata with a metadata private key. Next, transmitting the one or more buffer blocks with the encrypted first storage volume data to the first online cloud storage. Next, creating a sequence of updates of the metadata, encrypting the sequence with the metadata private key and then transmitting the sequence of metadata updates to the first online storage cloud.
Owner:EMC IP HLDG CO LLC

System and method for secure and reliable multi-cloud data replication

A multi-cloud data replication method includes providing a data replication cluster comprising at least a first host node and at least a first online storage cloud. The first host node is connected to the first online storage cloud via a network and comprises a server, a cloud array application and a local cache. The local cache comprises a buffer and a first storage volume comprising data cached in one or more buffer blocks of the local cache's buffer. Next, requesting authorization to perform cache flush of the cached first storage volume data to the first online storage cloud. Upon receiving approval of the authorization, encrypting the cached first storage volume data in each of the one or more buffer blocks with a data private key. Next, assigning metadata comprising at lest a unique identifier to each of the one or more buffer blocks and then encrypting the metadata with a metadata private key. Next, transmitting the one or more buffer blocks with the encrypted first storage volume data to the first online cloud storage. Next, creating a sequence of updates of the metadata, encrypting the sequence with the metadata private key and then transmitting the sequence of metadata updates to the first online storage cloud.
Owner:EMC IP HLDG CO LLC

Terminal credible security system and method based on credible computing

The invention relates to a terminal credible security system which comprises a user identity credible security module, a terminal device credible security module, a platform credible security module.The user identity credible security module is used for setting lists for storing important documents of users and utilizing a kernel protection mode to ensure that the lists of the important documentscan not be revised by non-authorized users; the terminal device credible security module is used for controlling the writing function of mobile devices of U disks, and the like; and the platform credible security module is used for preventing malicious programs from operating. The invention also relates to a terminal credible security method which comprises a user identity credible security step,a terminal device credible security step and a platform credible security step, wherein the user identity credible security step is used for setting the lists for storing the important documents andensuring that the lists of the important documents can not be revised; the terminal device credible security step is used for controlling the writing function of the mobile devices of U disks, and thelike; and the platform credible security step is used for preventing the malicious programs from operating.
Owner:BEIJING KEXIN HUATAI INFORMATION TECH

Multipoint cooperative working method for reliable communication in wireless Ad hoc network communication system

A multipoint cooperative working method for reliable communication in a wireless Ad hoc network communication system relates to the wireless Ad hoc network technical field. The invention solves the problem that information transmission reliability is poor as only one route is used for information transmission in the existing wireless communication process. The method includes that: a node requesting cooperative distance measurement broadcasts a cooperative distance measurement request; a destination node writes in the address thereof and the address of a downriver node thereof if needing cooperation; after obtaining successful signal interaction with the destination node and the downriver node of the destination node, the node requesting cooperative distance measurement obtains the distance with the destination node and the distance with the downriver node of the destination node by detecting the cooperative distance measurement request message and acknowledgement signal of the destination node and those of the downriver node of the destination node; and if the two distance values meet the requirement of being less than the corresponding reliable transmission domain radius, the node requesting cooperative distance measurement sends an acknowledge message to the destination node. The invention is applicable to emergency response and communication recovery process after disaster.
Owner:HARBIN INST OF TECH

Modeling method of plate spring virtual model for force touch reappearance

InactiveCN101996280AReduce the amount of deformation calculationFast operationSpecial data processing applicationsTouch sensationTouch Senses
The invention discloses a modeling method of a plate spring virtual model for force touch reappearance, which is characterized in that when the collision of a virtual agent to any one point on the surface of a virtual flexible body is detected, a plate spring virtual model is filled inside an interactive local region of the virtual agent and the virtual flexible body under the given virtual contact tension action, signals of force touch sensation information with the feedback reflected on real-time deformation simulation of the virtual flexible body under the pulling force effect and calculated by adopting the plate spring virtual model are output, the overlapping of the sum of all single plate spring deformation quantity in the plate spring virtual model for the force touch sensation reappearance is externally equivalent to the deformation on the surface of the virtual flexible body, and the sum of consumed tensions of all the single plate springs in the stretching process is equivalent to the given virtual contact tension. The modeling method has the advantages of accuracy, reliability, simple and convenient calculation, good practicability and good universality, can really feed back the force touch sensation information to operators, and realistically realizes the deformation simulation on the virtual flexible body at the real time.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Computing method for circumferential stress of absorber annular valve sheet

InactiveCN103116709ACan not meet the requirements of modern CAD designSpecial data processing applicationsReliable computingEngineering
The invention relates to a computing method for circumferential stress of an absorber annular valve sheet, and belongs to the technical field of absorbers. No reliable computing method is put forward for circumferential stress of the absorber annular valve sheet in the prior art. The computing method for circumferential stress of the absorber annular valve sheet is characterized in that the following steps are adopted: 1) each constant term composed of the circumferential stress coefficient of a valve sheet is confirmed; 2) the circumferential stress coefficient G sigma theta r at any position of radius r is computed; 3) the circumferential stress sigma theta r at any position of the radius r of the absorber annular valve sheet is computed. By means of the computing method for circumferential stress of the absorber annular valve sheet, the circumferential stress sigma theta r at any position of the radius and the maximum circumferential stress sigma theta r max at the position of the inner circle radius ra can be accurately computed. The result of the ANSYS emulation proof proves that the computing method for circumferential stress of the absorber annular valve sheet is accurate, so that the reliable circumferential stress computing method is provided for splitting design and stress intensity check of the absorber annular valve sheet.
Owner:SHANDONG UNIV OF TECH

Computing method for circumferential stress of equivalent structure circular sandwich valve plate of absorber

The invention relates to a computing method for circumferential stress of an equivalent structure circular sandwich valve plate of an absorber, and belongs to the absorber technical field. A reliable computing method for the circumferential stress of the equivalent structure circular sandwich valve plate of the absorber does not exist previously, and therefore the requirements of absorber modernized computer aided design (CAD) design and stress intensity calculation can not be met. The computing method for circumferential stress of the equivalent structure circular sandwich valve plate of the absorber comprises the following steps: (1), ensuring equivalent thickness of the equivalent structure circular sandwich valve plate; (2), ensuring thickness proportionality coefficient of the equivalent structure circular sandwich valve plate; (3), calculating circumferential stress coefficient of the equivalent structure circular sandwich valve plate on any radius r; and (4), calculating circumferential stress and maximum circumferential stress of the equivalent structure circular sandwich valve plate on any radius r. The computing method for circumferential stress of the equivalent structure circular sandwich valve plate of the absorber can accurately calculate the circumferential stress and the maximum circumferential stress of the equivalent structure circular sandwich valve plate on any radius position, and provides a reliable computing method for circumferential stress for absorber equivalent structure sandwich valve plate designs and stress intensity calculation.
Owner:SHANDONG UNIV OF TECH

Reliable multi-path aggregation routing algorithm based on energy balance

The invention relates to a reliable multi-path aggregation routing algorithm based on energy balance, and belongs to the technical field of a wireless sensor network. The algorithm comprises the following steps: analyzing a network data transmission feature, and establishing a multi-hop convergence network rate estimation model by combining the density and location information of the node; selecting more AMN and less AMNs at event regions with low energy consumption rate and high energy consumption rate by using a node selection algorithm based on the space relevancy; designing an optimal pathsearch algorithm based on a forwarding node set, and designing the multi-path convergence routing in energy balance by adopting the algorithm, wherein the multi-path convergence routing comprises anoptimal main path for data collection and an optimal convergence path for each AMN node, and all convergence paths are converged on an aggregation node on the main path; monitoring the data to arrivethe aggregation node through the convergence path, and enabling the data to arrive a Sink node through the main path after the aggregation node accomplishes the data aggregation. Through the algorithmdisclosed by the invention, the network energy consumption can be effectively balanced, the network life is prolonged, and the event detection reliability is improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Computing method for equivalent thickness of hydraulic buffer isomorphic annular sandwich valve plates

The invention relates to a computing method for equivalent thickness of hydraulic buffer isomorphic annular sandwich valve plates, and belongs to the technical field of buffers. In the prior art, the reliable computing method for the equivalent thickness of the hydraulic buffer isomorphic annular sandwich valve plates is not available, and thus the actual requirements for design, production and characteristic simulation modeling of the buffer can be not met. With adoption of the method, according to thickness and plate number of the annular sandwich valve plates with same material, equal inner diameter and equal outer diameter, the equivalent thickness h<e> of the sandwich valve plates, equivalent to that of a signal valve plate, can be computed accurately and quickly; through comparison with the ANSYS simulation result, the fact can be confirmed that the computing method for the equivalent thickness of the hydraulic buffer isomorphic annular sandwich valve plates is accurate and reliable, and further, the reliable computing method for the equivalent thickness of the isomorphic annular sandwich valve plates is provided for detachment design and stress intensity check of the buffer sandwich valve plates as well as characteristic simulation modeling of the buffer.
Owner:SHANDONG UNIV OF TECH

Method for extracting rolling bearing fault feature based on EEMD and K-GDE

InactiveCN109883704ACalculation is simple and efficientMachine part testingCharacter and pattern recognitionCorrelation coefficientGDES
The invention discloses a method for extracting a rolling bearing fault feature based on EEMD and K-GDE. The method comprises the following steps: S1, measuring vibration of a rolling bear by using anacceleration sensor and a collector; S2, performing EEMD decomposition on a rolling bearing vibration signal; S3, calculating kurtosis indexes of essential modular functions; S4, calculating correlation coefficients between the essential modular functions and an original signal; S5, selecting an essential modular function with the largest kurtosis index and the largest correlation coefficient from all the essential modular functions to serve as a sensitive single component of next analysis; S6, selecting a value k from a value range, and calculating the envelop amplitude of the sensitive single component based on a k-GDE method; and S7, performing Fourier transform on the envelop amplitude to obtain a k-GDE envelop spectrum, and realizing fault diagnosis by matching a peak frequency and arolling bearing fault feature frequency. The method for extracting the rolling bearing fault feature based on the EEMD and the K-GDE has the effects of accurate and reliable algorithm, as well as simple, convenient and efficient calculation on the aspect of calculation of amplitude envelop.
Owner:LUDONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products