Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

120 results about "Wormhole" patented technology

A wormhole (or Einstein–Rosen bridge) is a speculative structure linking disparate points in spacetime, and is based on a special solution of the Einstein field equations solved using a Jacobian matrix and determinant. A wormhole can be visualized as a tunnel with two ends, each at separate points in spacetime (i.e., different locations and/or different points of time). More precisely it is a transcendental bijection of the spacetime continuum, an asymptotic projection of the Calabi–Yau manifold manifesting itself in Anti-de Sitter space.

Scaleable low-latency switch for usage in an interconnect structure

A scalable low-latency switch extends the functionality of a multiple level minimum logic interconnect structure for usage in computers of all types, networks and communication systems. The multiple level minimum logic interconnect structure employs a data flow technique based on timing and positioning of messages moving through the structure. The scalable low-latency switch is distributed throughout multiple nodes in the structure so that a supervisory controller providing a global control function and complex logic structures are avoided while the interconnect structure operates as a "deflection" or "hot potato" system in which processing and storage overhead at each node is reduced. The interconnect structure using the scalable low-latency switch employs a method of achieving wormhole routing through an integrated circuit chip by a novel procedure for inserting messages into the chip. Rather than simultaneously inserting a message into each unblocked node on the outer cylinder at every angle, messages are inserted simultaneously into two columns A and B only if an entire message fits between A and B. Messages are inserted into column 0 at time 0. Messages are inserted into column 1 at time t0+tC, where time tCis the time for a first bit of a message to move from column 0 to column 1 on the top level. Messages are inserted into column 2 at time t0+2tC, and so forth. The strategy prevents the first bit of one message from colliding with an interior bit of another message already in the switch. Contention between entire messages is addressed by resolving the contention between the first bit only so that messages wormhole through many cells.
Owner:HEWLETT PACKARD CO +1

Computer vision-based bamboo strip surface defect detection method

The invention relates to a computer vision-based bamboo strip surface defect detection method. The method comprises the following steps: shooting the image of a bamboo strip, normalizing, filtering, and carrying out wavelet transformation treatment; segmenting the threshold of the image by using an OTSU technology, carrying out closed operation to fill holes of the bamboo strip image, carrying out corrosion operation to remove negative influences of the closed operation, segmenting the wormhole and/or mildew spot defect in the bamboo strip image through a difference image technology, and considering no mildew spot or wormhole defect exists and entering crack detection if the connected domain area of the defect is smaller than the defect domain area threshold A; calculating the defect connected domain image gray average Gm if the connected domain area of the defect is not smaller than the defect domain area threshold A, and considering mildew spot or wormhole exists and judging the bamboo strip as a defected bamboo strip if a difference between the Gm and a bamboo strip image scale average G0 is greater than a threshold G; and detecting edges and cracks if the difference is not greater than the threshold G, removing the bamboo strip edges of the image, determining crack defects exist if the total number of nonzero pixel points or a maximum connected domain length is greater than a corresponding threshold and the crack scale average is greater than G0, and determining the bamboo strip is qualified if not. The method has the advantages of high detection efficiency, strong noise resistance and high stability, and allows the correct recognition rate to reach 95% or above.
Owner:GUANGXI NORMAL UNIV

Highly reliable network server system on chip and design method thereof

The invention discloses an on-chip network router system with high reliability and a design method thereof, wherein, the design method of the on-chip network router system with high reliability comprises the steps that: a router soft core based on a wormhole routing swap mode and a rotation routing selection mode is designed; a corresponding SCAC coding circuit, an SCAC decoding circuit and an SCAC error correction circuit are designed for data with a specified width; and the SCAC error correction circuit is added into the router; the SCAC coding circuit and the SCAC decoding circuit are connected with the router so as to from a framework of the router system; an SCAC-TMR fault tolerance proposal is designed for the framework of the router system and the on-chip network router system with high reliability is realized; the functions of the on-chip network router system with high reliability are tested and verified and the performance of the on-chip network router system with high reliability is evaluated. The on-chip network router system with high reliability of the invention can reduce the area, the energy consumption and the expenses of the on-chip network, ensure the reliable data transmission of the on-chip network and prevent a signal jumping with a relatively long time delay from appearing on the channel, thus being more applicable to the design of fault-tolerant and multi-core processors in the future.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Method to Control Driving Fluid Breakthrough During Production of Hydrocarbons from a Subterranean Reservoir

InactiveUS20110024115A1Reduce flow communicationReduce communicationFluid removalDrilling compositionSlurryEngineering
The invention is directed to a method for controlling driving fluid breakthrough caused by zones of pressure communication, i.e., a matrix bypass event (“MBE”) or a wormhole, having a void space and possibly areas of enhanced permeability (a halo region) associated with the void space, within a subterranean formation arising from use of a driving fluid in reservoirs where heavy/viscous oil is being produced. In particular, the method is directed to remediation of pressure communication between injection and production wells used to produce heavy/viscous oil by way of a waterflood operation combined with a cold production method. Direct or rapid communication of water between the injector and producer wells makes the waterflood recovery process virtually ineffective and limits the production of oil from the reservoir. The invention comprises in embodiments a method wherein a slurry of a cementitious material is injected into the zone, which upon setting, provides a cement plug in the void space that reduces the pressure communication and flow of driving fluid within the zone. Another step is used to inject a gel precursor within the zone, which upon setting, produces a gel plug that also reduces pressure communication and driving fluid flow through the halo region of the zone.
Owner:BP CORP NORTH AMERICA INC

Traffic Signal String SuperMode Control Method

The invention relates to a traffic signal mode field, discloses a method for a supermode of traffic signal control: String Supermode, its main steps includes: 1)get String Supermode instruction; 2)set the basic parameters of String Supermode: subareas of a roadnet, period-redistribution; 3)set 2D greenwave mode in the relative subareas according to a String Supermode structure; 4)calculate the 2D greenwave time-offsets and their interim-period in each subarea; 5)run new mode after the above interim-period run out. The present invention realizes the effectiveness of signals equilibrium, high effieciency, multi-purpose, universe, easy to use: vehicles entering Wormhole-area from any direction and going to any position of the diagonal far-corner area, need 4.5 times of red lights on average, no matter how large a Wormhole-class controlled area and how big the number of intersections in the area are, multiple-class-change based on Wormhole-class presents the functions of the fast inhalation of vehicle flow from omni-direction, :the fast spitting out of vehicle flow to omni-direction, the relieving jammed vehicle flow during spitting out to omni-direction, the relieving jammed vehicle flow during inhalation from omni-direction, the coordinating artery roads to quickly shunting vehicle flow, and also, the vehicles' going through an area by only 1 red light of Pulsar-class; this String Supermodes are determined by only about 20 of parameters, can switch rapidly with no redundance, provide an area-type traffic control, analysis, operation basic mode.
Owner:MENG WEIPING

Wormhole attack defense method based on multipath routing and trust mechanism in Ad hoc network

The invention relates to a wormhole attack defense method based on multipath routing and a trust mechanism in an Ad hoc network, belonging to the technical field of information safety. The wormhole attack defense method comprises three steps: step 1, establishing multiple paths to destination nodes; step 2, calculating the trust value of each neighbor node of the nodes; and step 3, selecting routing according to the probability of the magnitude of the trust values. The safety problem is the key factor influencing the application and popularization of the Ad hoc network, and because the wormhole attack defense method does not need additional equipment such as a directional antenna, a global positioning system (GPS), special radio-frequency, an ultrasonic device and the like, does not need precise time information and nodal position information, and does not need overstrict assumption such as that a special guard node and an attack node have to lose packets and the like, the wormhole attack defense method has superior universality; and because a punishment mechanism is adopted for packet loss, the method also can resist black hole attack and grey hole attack. The wormhole attack defense method has better practical value and wide application prospects in the technical field of information safety.
Owner:BEIHANG UNIV

Full three-dimensional simulation method for acidification flow experiment

The invention discloses a full three-dimensional simulation method for an acidification flow experiment. According to the method, a differential method is utilized to discrete a fluid seepage continuity equation and an acid-liquid mass diffusion reaction equation, and an H+ local equilibrium equation, a porosity change equation, a permeability change equation and a pore throat radius change equation are established at the same time; initial conditions and boundary conditions are substituted into the simulation equations; a simulation program is compiled by utilizing the equations, the initialconditions and the boundary conditions; 6, reservoir cores are scanned to obtain three-dimensional spatial distribution parameters of porosity; a three-dimensional spatial distribution model of the porosity is established, and the compiled program is utilized to achieve full three-dimensional numerical simulation of the acidification flow experiment on the basis of the established three-dimensional spatial distribution model of the porosity. According to the method, full three-dimensional numerical calculation is adopted, the calculation precision is effectively improved, and meanwhile the influence laws of each parameter on the development of wormholes are conveniently, quickly and accurately studied.
Owner:CHENGDU NORTH OIL EXPLORATION DEV TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products