Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

156 results about "Strategy method" patented technology

Dynamic virtual resource management strategy method for performance weighting under cloud platform

InactiveCN104010028AMaximize loadMinimize the number of physical servicesData switching networksUser needsPersonalization
The invention relates to the technical field of cloud computing, in particular to a dynamic virtual resource management strategy method for performance weighting under a cloud platform. According to the method, at first, contrast matrixes of various request resources and performance weighting values are configured, according to the needs of users and real-time monitoring data of the cloud platform, a load performance metric model based on load performance weighting is provided, and then the dynamic virtual resource management strategy method under the cloud platform is provided according to the model. The method comprises a virtual machine deployment strategy and a virtual machine transfer strategy, on the condition of meeting the existing load request, the cloud platform ensures that the load degree of a physical server in each scheduling area to be maximized, and on the basis, the number of the physical servers, needing to be started, of the cloud platform can be minimized. According to the method, the needs of the users are taken into consideration, data of individuation weight setting and cloud platform system real-time performance monitoring are given, the needs of QoS can be met, resources of the cloud platform system are utilized reasonably, and the load performance of the cloud platform is ensured.
Owner:SOUTH CHINA UNIV OF TECH

Method for constructing three-dimensional map by mobile robot in unknown environment

The invention discloses a method for constructing a three-dimensional (3D) map by a mobile robot in an unknown environment, and proposes a multi-exploration strategy method combining information gainguided local exploration strategy and global boundary exploration strategy for a problem of constructing a map of an indoor unknown 3D environment. The method comprises the following steps: firstly, constructing an autonomous exploration and 3D map construction system framework of the mobile robot, which comprises a map construction module and an exploration decision planning control module; secondly, establishing an information gain guided decision model based on a Shannon information theory and designing an information gain objective function calculation applied to multi-step exploration action evaluation; and finally, constructing a local exploration strategy by using an offline local motion trajectory, realizing a multi-strategy exploration method by combining with the information gainguided global boundary exploration strategy, and dynamically switching the two strategies during exploration according to real-time construction situations of the 3D map. Experimental results show that the method provided by the invention ensures integrity of map construction while rapidly constructing the 3D map.
Owner:NANKAI UNIV

Strategic method for process control

A strategic method for process control wherein the method includes, for a predetermined process juncture, the steps of: (A) defining an interconnection cell having associated therewith (i) at least one set of input data or at least one set of process control parameters, and (ii) at least one set of output data; (B) assigning at least one boundary value to at least one set of the sets associated with the defined interconnection cell; (C) using the assigned at least one boundary value, forming a plurality of discrete respective set combinations, and (D) for the interconnection cell, processing data from the plurality of respective formed set combinations into respective corresponding data record clusters.
The strategic method for process control is a continuation-in-part of a Knowledge-Engineering Protocol-Suite, (U.S. patent application Ser. No. 09/588,681 filed on 7 Jun. 2000) incorporated herein by reference, that generally includes methods and systems, apparatus for search-space organizational validation, and appurtenances for use therewith. The protocol-suite includes a search-space organizational validation method for synergistically combining knowledge bases of disparate resolution data-sets, such as by actual or simulated integrating of lower resolution expert-experience based model-like templates to higher resolution empirical data-capture dense quantitative search-spaces. The protocol-suite includes facile algorithmic tools for use with the method.
Owner:ADA ANALYTICS ISRAEL

Low-orbit satellite routing strategy method based on deep reinforcement learning architecture

The invention discloses a low-orbit satellite routing strategy method based on a deep reinforcement learning architecture, and belongs to the field of wireless communication. Firstly, an iridium constellation network is established, and a deep reinforcement learning framework is established in combination with a Markov decision process; and for a certain satellite node A, a HELLO packet is periodically sent to a neighbor node, and an adjacent node communicated with the link state of the current node A is searched, a next hop node of a current node is obtained by inputting a destination node coordinate, a link state of the current node and a link state of a neighbor node into a deep reinforcement learning architecture, and a next hop node is continuously obtained in the same way; and when aspecial routing condition (such as open circuit, loop and congestion) occurs, a link state is repeatedly input into the deep reinforcement learning architecture by adopting a corresponding solution strategy until a destination node is reached, and a path planning process is finished. According to the method, the system complexity and the storage overhead are reduced, the effect of detecting the satellite link state in real time is achieved, and satellite routing is more stable and reliable.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Steel-rail wear measurement device based on machine vision and grinding strategy method thereof

The invention provides a steel-rail wear measurement device based on machine vision, which comprises a main control panel, a power panel, a laser control panel, and a video panel. The power panel is used for providing a stable direct-current voltage for the main control panel, the laser control panel and the video panel. The laser control panel is electrically connected with two high-power lasers. The video panel is electrically connected with two CCD cameras. The main control panel is connected with the power panel, the laser control panel, and the video panel, and used for controlling the on-off and intensities of the two high-power lasers and controlling the shooting actions of the two CCD cameras. The invention also provides a grinding strategy method for steel-rail wear according to the measurement device. According to a planned grinding quantity, a proper grinding speed of a steel-rail grinding car, the grinding power, and the motor distribution of different angles are calculated, and the steel rail is grinded. The steel-rail wear measurement device based on machine vision has the beneficial effects that the planned grinding area of the steel rail on side can be calculated according to different zones, and shortcomings of large amount of labor, poor environment, low efficiency and the like of the measurement mode of manual and mechanical contact can be overcome.
Owner:中国铁路武汉局集团有限公司武汉大型养路机械运用检修段 +1

Counter-attack countermeasure optimal strategy method for multi-unmanned plane cooperative strike task

InactiveCN105278542AImprove coordinated strike capabilityEstimated benefit value is largeAdaptive controlPosition/course control in three dimensionsCountermeasureSimulation
The invention aims to solve the problem of a counter-attack countermeasure optimal strategy for a multi-unmanned plane cooperative strike task and belongs to the technical field of multi-unmanned plane cooperative control. The invention combines a capability function with a multi-unmanned plane cooperative strike counter-attack countermeasure model and provides a counter-attack countermeasure method for the multi-unmanned plane cooperative strike. Firstly, the capability function of an unmanned plane is established; then by means of a jacobian matrix of the capability function, a calculation method for the position of the multi-unmanned plane cooperative strike is created; and the multi-unmanned plane cooperative strike counter-attack countermeasure model is established further, and a solving method for a n-person limited strategy static counter-attack countermeasure model and the pure-strategy nash equilibrium is created. The invention achieves the counter-attack countermeasure optimal strategy for the multi-unmanned plane cooperative strike, obtains great assessment profit value and strike strike efficiency, and improves the multi-unmanned plane cooperative strike capability.
Owner:SHENYANG AEROSPACE UNIVERSITY

Cache strategy method in D2D network based on deep reinforcement learning

ActiveCN109639760AAccurately predict mobilityAccurately Predict PopularityTransmissionNeural learning methodsEcho state networkReinforcement learning algorithm
The invention discloses a cache strategy method in a D2D network based on deep reinforcement learning. The method comprises the steps of acquiring position information of each user at a next moment via an echo state network algorithm by using the historical position information of each user in the cached and enabled D2D network as input data; acquiring content request information of each user at the next moment via the echo state network algorithm according to the position information of each user at the next moment in combination with the context information of each user at a current moment;caching the content request information into a cache space of the corresponding user; and acquiring an optimal strategy for delivering the content request information between the users in the cached and enabled D2D network via a deep reinforcement learning algorithm by minimizing the transmission power of the user transmitting the content request information and minimizing the delay of the user receiving the content request information as targets. According to the method provided by the invention, the problems that in the cached and enabled D2D network, the placement hit rate of the cached content is low and the consumed energy is large and the delay is long during a cache delivery process are solved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Wireless internet access strategy method, system and definition method for mobile terminal

InactiveCN104066088ATo ensure the safety of interestsReduce trafficSubstation equipmentSecurity arrangementTraffic capacityPayment
The invention discloses a wireless internet access strategy method, system and definition method for a mobile terminal. Firstly, the wireless internet access strategy is made for the mobile terminal, when the mobile terminal is connected with the wireless network, a user can select the wireless internet access strategy to serve as the current wireless internet access strategy, can modify the current wireless internet access strategy as well to make a wireless internet access strategy associated with the current wireless network IP. A user can execute different wireless internet access strategies in different wireless networks by setting the wireless internet access strategies, for example, operation of instant messaging software is forbidden in the working environment, and work efficiency can be improved; operation of an internet payment application is forbidden in the market shopping process, and safety of user benefits can be guaranteed; furthermore, the user can add the application which is forbidden from being networked to the wireless internet access strategy forbidding item to forbid the application from being networked, network traffic can be saved for the user, the network traffic consumption due to background operation of some applications can be avoided, applications can also be added to the permitted item, only the applications in the permitted item is allowed to be networked, and the number is prevented from being stolen by Trojan viruses.
Owner:TCL COMM NINGBO

Threat level-based multi-factor identity authentication method

InactiveCN109450959AFlexible authenticationThe certification process is fastTransmissionFlexible MechanismsInterface design
The invention discloses a threat level-based multi-factor identity authentication method, which comprises the following steps: building an identity authentication model; performing service activity threat analysis; generating an authentication strategy; and performing security authentication. The invention provides the threat level-based multi-factor identity authentication method for defects of acurrent identity authentication mode. During application, a corresponding identity authentication strategy method is formulated according to different security threat levels in an application scene;a multi-factor identity authentication model with a flexible mechanism is provided according to the identity authentication strategy; the model adopts a modularized design, and can be flexibly replaced as required; an authentication template method is provided according to parameter weights in the authentication strategy; the method takes a comprehensive consideration of the threat level, the authentication strength, the computing cost, the time, the convenience and other factors to adaptively dynamically select corresponding authentication modules; and multi-factor identity authentication meeting requirements at different security levels is flexibly performed through standard interface design and integration.
Owner:SICHUAN JIUZHOU ELECTRIC GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products