Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1512results about How to "Reduce computing load" patented technology

Software architecture for high-speed traversal of prescribed routes

Systems, methods, and apparatuses for high-speed navigation. The present invention preferably encompasses systems, methods, and apparatuses that provide for autonomous high-speed navigation of terrain by an un-manned robot. By preferably employing a pre-planned route, path, and speed; extensive sensor-based information collection about the local environment; and information about vehicle pose, the robots of the present invention evaluate the relative cost of various potential paths and thus arrive at a path to traverse the environment. The information collection about the local environment allows the robot to evaluate terrain and to identify any obstacles that may be encountered. The robots of the present invention thus employ map-based data fusion in which sensor information is incorporated into a cost map, which is preferably a rectilinear grid aligned with the world coordinate system and is centered on the vehicle. The cost map is a specific map type that represents the traversability of a particular environmental area using a numeric value. The planned path and route provide information that further allows the robot to orient sensors to preferentially scan the areas of the environment where the robot will likely travel, thereby reducing the computational load placed onto the system. The computational ability of the system is further improved by using map-based syntax between various data processing modules of the present invention. By using a common set of carefully defined data types as syntax for communication, it is possible to identify new features for either path or map processing quickly and efficiently.
Owner:CARNEGIE MELLON UNIV

Data transfer system and data transfer method

A transfer source gives a challenge key, own public key, an ID for identifying the target data, and an encryption key type to a transfer destination that is authenticated by a certificate. In accordance with the given key type, the transfer destination generates a first session key (and a second session key), encrypts the first session key and own public key (or second session key) with the transfer source's public key, encrypts the resulting encrypted data with the challenge key, and transmits the data encrypted with the challenge key to the transfer source. The transfer source encrypts the target data with the second session key (or the transfer destination's public key) that is derived from the received data, encrypts the resulting encrypted data with the first session key, and transmits the data encrypted with the first session key to the transfer destination. The transfer destination decrypts the received data with the first session key, and decrypts the resulting decrypted data with the second session key (or the own public key) to acquire the license.
Owner:WESTERN DIGITAL TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products