Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

81results about How to "Reduce network overhead" patented technology

Downhole data transmission system

A system for transmitting data through a string of downhole components. In one aspect, the system includes first and second magnetically conductive, electrically insulating elements at both ends of the component. Each element includes a first U-shaped trough with a bottom, first and second sides and an opening between the two sides. Electrically conducting coils are located in each trough. An electrical conductor connects the coils in each component. In operation, a varying current applied to a first coil in one component generates a varying magnetic field in the first magnetically conductive, electrically insulating element, which varying magnetic field is conducted to and thereby produces a varying magnetic field in the second magnetically conductive, electrically insulating element of a connected component, which magnetic field thereby generates a varying electrical current in the second coil in the connected component.
Owner:INTELLISERV

Method and system for setting routing path considering hidden node and carrier sense interference, and recording medium thereof

Disclosed are a method and a system for setting a routing path in consideration of hidden nodes and carrier sense interference.
The method of setting a routing path for transmitting a packet from a source node to a destination node in a wireless multi-hop network consisting of plural nodes and plural links for connecting two nodes with each other, comprises: calculating carrier sense interference weights representing carrier sense interference related to the respective links and combining the carrier sense interference weights of the links included in at least one specific path connecting the source node with the destination node; calculating hidden node weights representing hidden node problems related to the respective links and accumulating the hidden node weights of the links included in the path; and calculating a metric value for the specific path by combining the carrier sense interference weights and the hidden node weights, and determining the specific path with the least metric value as the routing path.
Accordingly, in the multi-channel multi-radio wireless mesh network, the path with minimized hidden node problem and carrier sense interference can be selected to improve network performance
Owner:KOREA ADVANCED INST OF SCI & TECH

Memory page de-weight method and memory page de-weight device based on virtual machine snapshot

The invention provides a memory page de-weight method and memory page de-weight device based on virtual machine snapshot, which are applied to a virtual machine snapshot system. The method comprises the following steps: a host computer carries out combination processing on memory pages (of the same content) of memory pages corresponding to each virtual machine according to the content of the memory pages corresponding to each virtual machine; and the memory pages (subjected to combination processing) corresponding to each virtual machine are transmitted to a storage system. Problems that snapshot backup data occupy a large quantity of disc space in a virtual machine snapshot technique are modified; and meanwhile the time for backing up the snapshot is reduced.
Owner:BEIHANG UNIV

Information hiding methods and systems and extraction methods and systems based on big data and neural network

The invention discloses information hiding methods and systems and extraction methods and systems based on big data and a neural network. One of the information hiding methods includes: acquiring a location of first data in the big data; acquiring secret information which is in the first data and needs to be hidden; respectively using the first data and the secret information as input and output of the preset neural network to train the preset neural network; inputting the first data into the trained neural network, and using obtained output as first information; using differences between thesecret information and the first information as second information; and sending the location of the first data in the big data, the second information and the trained neural network to the user with secret-information access authority. According to the method, the information can be hidden in the big data, security of the secret information is ensured through training of the neural network, the user with the secret-information access authority can extract the secret information from the big data through synthesis, and network overheads, storage overheads and computational overheads are all extremely low.
Owner:SUPERPOWER INNOVATION INTELLIGENT TECH DONGGUAN CO LTD

Gang migration of virtual machines using cluster-wide deduplication

Datacenter clusters often employ live virtual machine (VM) migration to efficiently utilize cluster-wide resources. Gang migration refers to the simultaneous live migration of multiple VMs from one set of physical machines to another in response to events such as load spikes and imminent failures. Gang migration generates a large volume of network traffic and can overload the core network links and switches in a data center. The present technology reduces the network overhead of gang migration using global deduplication (GMGD). GMGD identifies and eliminates the retransmission of duplicate memory pages among VMs running on multiple physical machines in the cluster. A prototype GMGD reduces the network traffic on core links by up to 51% and the total migration time of VMs by up to 39% when compared to the default migration technique in QEMU / KVM, with reduced adverse performance impact on network-bound applications.
Owner:THE RES FOUND OF STATE UNIV OF NEW YORK

Data aggregation query method and apparatus

The invention is suitable for the technical field of large-scale data processing and particularly relates to a data aggregation query method and apparatus. The method comprises: when receiving a query request for a database cluster, determining a hash table corresponding to the query request, determining a plurality of partition tables corresponding to the hash table, and generating a MapReduce query task; through scheduling nodes in an Hadoop Yarn framework, according to the MapReduce query task, determining a plurality of subtasks, and distributing the subtasks to a plurality of computing nodes; through the computing nodes, performing the subtasks, obtaining a plurality of computing results, and through the computing nodes, feeding the computing results back to the scheduling nodes; and through the scheduling nodes, simplifying the computing results, and obtaining a query result corresponding to the query request. The method and the apparatus realize relational query and statistics of the relevant partition tables in the database cluster, reduce network overhead, and improve data aggregation query efficiency.
Owner:国家超级计算深圳中心(深圳云计算中心) +1

Service communication method, service communication device and service communication system

The invention discloses a service communication method, a service communication device and a service communication system. When needing to communicate with the user equipment, the server sends a trigger request to the target user equipment again in order to trigger temporary IP (Internet Protocol) assignment for the user equipment and the establishment of temporary bearing or other data connection between the user equipment and the server, and thereby can temporarily communicate with the user equipment, and however, within most of the time when the server and the user equipment do not communicate, the user equipment does not have an exclusive IP address, bearing or other data connection, so that the network overhead can be effectively saved.
Owner:HUAWEI TECH CO LTD

Method for capturing computer application diagnostics

InactiveUS7398426B2Enhance applicationAdvantageous performanceSoftware engineeringSoftware testing/debuggingObject ClassApplication software
A diagnostic method in an aspect-oriented data processing environment is provided. The environment comprises a data processing system having an operating system for executing an application, wherein the application comprises an object class. The environment also comprises means for loading the object class at runtime and storage means for storing a diagnostic aspect. An aspect implements concerns (e.g. logging, security) that cross-cut the application. The object class of the application is loaded at runtime and the diagnostic aspect is read from the storage means. The means for loading now combines the object class with the diagnostic aspect, so that for example, diagnostics can be captured and repairs on the application can be carried out.
Owner:IBM CORP

Erasure code updating method and system based on copy data logs

The invention relates to an erasure code updating method based on copy data logsreplica data log-based erasure code updating method, which comprises the following steps of: receiving updated data, and storing the updated data to a replica data log of a data end; when the copy data log is full, obtaining a verification difference value by using the updated data and the data block, updating the corresponding data block by using the verification difference value, and forwarding the verification difference value to a verification end for storing the verification block; and storing the verification difference value to a verification log of the verification end, generating verification data through the verification difference value when the verification log is full, and updating a verification block by using the verification data. According to the erasure code updating method provided by the invention, on the premise that the consistency is ensured, the calculation overhead, the network overhead and the disk channel finding overhead generated in the updating process are reduced, the updating efficiency of the erasure codes is improved, and the performance improvement of one order of magnitude is achieved in some application scenarios compared with other updating methods.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Data storage system, metadatabase synchronization method and data cross-domain calculation method

The invention discloses a data storage system, a metadatabase synchronization method and a data cross-domain calculation method. The data storage system comprises at least two data centers, wherein each data center comprises an access layer, a compiling layer, a computing layer, a storage layer and a bottom container cloud platform; The access layer is used for providing a unified data access interface; The compiling node is used for inquiring the metadatabase according to the received SQL statement, generating a matched execution plan and distributing the job task to the computing node for execution according to the execution plan; The computing nodes are used for acquiring data from data nodes of a data center where the computing nodes are located for computing according to the operationtasks and sending computing results to the computing nodes serving as summarizing nodes; The data node is used for storing data; And the bottom container cloud platform is used for carrying out containerization management on all services of the same data center. According to the technical scheme provided by the embodiment of the invention, the input cost is saved while the cross-domain computingservice is provided with high quality, and the data compliance requirement is met.
Owner:TRANSWARP INFORMATION TECH SHANGHAI

Method of generating and managing connection identifiers for supporting multicast for each group in IPv6-based wireless network and network interface using the method

Provided is a method of generating and managing a connection identifier (CID) for supporting an IPv6 multicast in a wireless network based on IEEE 802.16 and a network interface using the method. Further provided is a network interface included in a node of IPv6-based wireless network, the network interface includes a MAC driver for storing at least one multicast CID and a MAC address of the node which is mapped in the at least one multicast CID, and a control unit for receiving a multicast message which is transmitted from a base station, and transferring the multicast message to an IP layer, when the multicast message includes the multicast CID which is stored in the MAC driver.
Owner:SAMSUNG ELECTRONICS CO LTD

Method and client for realizing network video live broadcast

The invention discloses a method and a client for realizing network video live broadcast, wherein the client determines whether an interruption duration time period in live broadcast playing exceeds a preset threshold; if yes, the client acquires a time shift index file of a video service from a service platform. The acquired time shift index file is used as a local index file for being stored. Content fragment information which corresponds with a live broadcast interruption position is searched from the local index file. A video fragment which corresponds with the content fragment information is acquired from the service platform. The video fragment is played for restoring video playing at a live broadcast interruption position. According to the method and the client, through automatically switching between the live broadcast index file and the time shift index file on the condition of low network quality, user experience in viewing a live broadcast program is improved on the condition of low network quality, and furthermore relatively low network expenditure can be kept.
Owner:CHINA TELECOM CORP LTD

Database access method and device, electronic equipment and medium

The invention provides a database access method. The method is executed by a Java database connection (JDBC) server. The JDBC server and the database are deployed in the same network area; the methodcomprises the following steps: receiving access request data from an application program, wherein the access request data is sent by the JDBC client in response to an access request of an applicationprogram for a database, and the access request data is obtained by encrypting and / or compressing a structured query statement and an access parameter carried in the access request by the JDBC client;in response to the access request data, obtaining access response data corresponding to the access request data from a database; and sending the access response data to the JDBC client, so that the application program realizes access to the database based on the access response data from the JDBC client. The invention further provides a database access device which is applied to the JDBC server, electronic equipment and a computer readable storage medium.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Intelligent equipment control method, control node and intelligent equipment

The invention discloses an intelligent equipment control method, a control node and intelligent equipment. The intelligent equipment control method applied to the control node side comprises the steps of: selecting the controlled intelligent equipment from the discovered intelligent equipment; broadcasting a control request to the discovered intelligent equipment, so that that the controlled intelligent equipment completes control response, wherein the control request carries identity identification information of the controlled intelligent equipment; and receiving control response result information send by the controlled intelligent equipment in a unicast manner. The intelligent equipment control method, the control node and the intelligent equipment realize the unicity of a discovery protocol and a control protocol, reduce software development cost, are low in learning cost, reduce network overhead and enhance the user experience.
Owner:HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products