Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

102results about How to "Suitable for deployment" patented technology

Creating and executing a graphical program with first model of computation that includes a structure supporting second model of computation

System and method for creating and executing a graphical program. A first plurality of graphical program elements (GPEs) having a first model of computation (MoC), e.g., homogenous dataflow, are assembled in a graphical program in response to first input. A structure, including an interior portion, is displayed in the graphical program, indicating use of a second MoC, e.g., multi-rate dataflow, for GPEs within the interior portion. A second plurality of GPEs having the second MoC are assembled within the interior portion of the structure in response to second input. The second plurality of GPEs are converted into a new third plurality of GPEs having the first MoC, e.g., by parsing the second plurality of GPEs to determine multiple primitives according to the second MoC, determining the third plurality of GPEs based on the primitives, and assembling the third plurality of GPEs in the graphical program.
Owner:NATIONAL INSTRUMENTS

Method and apparatus for a high resolution downhole spectrometer

The present invention provides a simple, robust, and versatile high-resolution spectrometer that is suitable for downhole use. The present invention provides a method and apparatus incorporating a spinning, oscillating or stepping optical interference filter to change the angle at which light passes through the filters after passing through a sample under analysis downhole. As each filter is tilted, the color or wavelength of light passed by the filter changes. Black plates are placed between the filters to isolate each filter's photodiode. The spectrometer of the present invention is suitable for use with a wire line formation tester, such as the Baker Atlas Reservation Characterization Instrument to provide supplemental analysis and monitoring of sample clean up. The present invention is also suitable for deployment in a monitoring while drilling environment. The present invention provides a high resolution spectometer which enables quantification of a crude oil's percentage of aromatics, olefins, and saturates to estimate a sample's gas oil ratio (GOR). Gases such as CO2 are also detectable. The percentage of oil-based mud filtrate contamination in a crude oil sample can be estimated with the present invention by using a suitable training set and chemometrics, a neural network, or other type of correlation method.
Owner:BAKER HUGHES INC

Method and apparatus for a high resolution downhole spectrometer

The present invention provides a simple, robust, and versatile high-resolution spectrometer that is suitable for downhole use. The present invention provides a method and apparatus incorporating a spinning, oscillating or stepping optical interference filter to change the angle at which light passes through the filters after passing through a sample under analysis downhole. As each filter is tilted, the color or wavelength of light passed by the filter changes. Black plates are placed between the filters to isolate each filter's photodiode. The spectrometer of the present invention is suitable for use with a wire line formation tester, such as the Baker Atlas Reservation Characterization Instrument to provide supplemental analysis and monitoring of sample clean up. The present invention is also suitable for deployment in a monitoring while drilling environment. The present invention provides a high resolution spectometer which enables quantification of a crude oil's percentage of aromatics, olefins, and saturates to estimate a sample's gas oil ratio (GOR). Gases such as CO2 are also detectable. The percentage of oil-based mud filtrate contamination in a crude oil sample can be estimated with the present invention by using a suitable training set and chemometrics, a neural network, or other type of correlation method.
Owner:BAKER HUGHES INC

Route generating and coupling method and system of SDN

The invention provides a route generating and coupling method and system of an SDN. An SDN controller regularly obtains link state information and a network topology structure of the SDN; the SDN controller uniformly calculates route information and generates a flow table, a primary IP index routing table and a secondary IP index routing table of each SDN switch; and the SDN controller issues the corresponding flow table, the primary IP index routing table and a secondary IP index routing table corresponding to each SDN switch. In the coupling process, the flow table is searched according to a destination IP address and a mask of a message; the primary IP index routing table is searched according to the flow table; and the secondary IP index routing table is searched according to the flow table and the primary IP index routing table to obtain a corresponding interface and gateway. According to the invention, the generation of a route is integrally finished on the SDN controller, the route cost is used as a route selection basis, the method and the system are more suitable for a large-scale network, the network topology structure and the link state are dynamically monitored in real time, and the maintenance cost of the network is reduced.
Owner:湖州帷幄知识产权运营有限公司

Method for preventing campus network from virus attacks

The invention discloses a method for preventing a campus network from virus attacks, which comprises the following steps: (a) dividing a campus network into a plurality of VLANs; (b) bonding user IP address with network card MAC address; (c) adopting a double safety bonding mode of bonding the IP address of the host computer of a user and the MAC address of a network card on a core switch and bonding the MAC address of the network of the computer of the user and a switch port on an edge switch; and (d) making active defense on the basis of the MIB state library of network equipment. In the invention, the attacked terminal can be locked effectively, the attach of ARP on the port is blocked, and the ARP spoofing attack is prevented effectively; and the time of network administrators is saved greatly, the safety of a tested network section is protected by the combination with prevention measurements, and the normal operation of the campus network is protected effectively.
Owner:SUZHOU CHIEN SHIUNG INST OF TECH

Process for producing concentrated sea-buckthorn clear juice

The invention discloses a process for producing concentrated sea-buckthorn clear juice, which comprises the following steps of: crushing and squeezing the mature sea-buckthorn, adding water into the obtained juice, and fully stirring the juice to obtain primary turbid juice; sterilizing the primary turbid juice for 5 minutes at the high temperature of between 100 and 110 DEG C, cooling the sterilized juice to between 65 and 70 DEG C, separating the juice to obtain sea-buckthorn juice by using a centrifugal machine, then adding amylase, pectase and pear juice enzyme into the sea-buckthorn juice, and digesting the mixture at the constant temperature of between 50 and 55 DEG C to obtain secondary turbid juice; separating the supernate from the secondary turbid juice by centrifugation to obtain the sea-buckthorn clear juice; and filtering the sea-buckthorn clear juice to be clear by using a filter membrane, and concentrating the sea-buckthorn clear juice under vacuum to obtain the concentrated sea-buckthorn clear juice. The conditions adopted in the process are mild, pectin and starch which affect the clear juice are removed by combining ordered heating and cooling and enzymolysis, and the conditions of the whole process keep the nutrient components in the sea-buckthorn as much as possible and furthest reserve juice color and flavor.
Owner:合德堂食品工业(泾阳)有限公司

Wireless sensor network route method based on artificial potential field

The invention relates to a wireless sensor network route method based on an artificial potential field. The wireless sensor network route method includes the four steps of initializing, route building, route uploading and data transmitting. The problems that in the prior art, the route cost and the route energy consumption are large, and route selection does not have the load balancing function are solved, the calculation complexity is lowered, a large amount of route cost is avoided, the energy efficiency is improved, and the network load balancing function can be achieved.
Owner:韩小学

Violent earthquake gestation and imminent earthquake sound monitoring probe and circuit module structure

The invention discloses a violent earthquake gestation and imminent earthquake sound monitoring probe and a circuit module structure. The probe structure is directly coupled with a base rock through a taper microphone head and conducts an earthquake sound to a sound transmission rod which is directly connected with the probe structure. A band-shape piezoelectric film sensor which is pasted on a surface of the sound transmission rod converts an earthquake sound signal into an electrical signal. The sound transmission rod, a band-shape piezoelectric film sensor group and a processing circuit are packaged through using a glue, and are fixed and protected. Besides, a probe circuit module structure carries out backup on the captured earthquake sound signal from three hierarchies of a sensor unit, the processing circuit and a transmission process so that reliability of a whole circuit system is increased. The sensor adopts the piezoelectric film sensor. There are the advantages that sensitivity is high; a dynamic scope is large and a frequency response scope is large too. By using the above technical scheme, the probes can be densely arranged in the base rocks which are under 150 meters to 200 meters of an earthquake-prone belt in a large scale so that violent-earthquake imminent earthquake sound monitoring work can be performed reliably for a long time and with low cost.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL

Network security system under mobile Internet environment

InactiveCN106230795AProtects against internal sabotage and external attacksReduce maintenance costsTransmissionSecurity arrangementService systemApplication server
The invention relates to a network security system under a mobile Internet environment, comprising a security isolation gap, an extranet application server, a gap external server, a gap internal server, and an interface server which is connected with a specific application service system and provides interface service. The extranet application server receives an access request of a user, transmits the access request among the gap external server, the gap internal server and the interface server through an inter-gap asynchronization and synchronization function, and gets returned data through the interface server. The returned data is transmitted among the gap internal server, the gap external server and the extranet application server the inter-gap asynchronization and synchronization function, and is returned to the user. The application service system is deployed through the security isolation gap to establish a perfect access control mechanism, and cross-operation-platform, cross-platform and cross-service-platform security access management strategies can be provided.
Owner:北京近颐科技有限公司

Wide field retinal image capture system and method

A method, system or apparatus for generating a wide field retinal image. System embodiments comprise a camera, which may be a smartphone camera and associated optics to capturing a digital video stream of individual retinal images and store the video stream of individual retinal images in a memory associated with the camera. The system or method then implements the steps of processing each retinal image and combining selected retinal images into a panorama in real time, during an ocular examination.
Owner:RSBV LLC

Cross-camera pedestrian tracking system and method based on block chain

The invention relates to a cross-camera pedestrian tracking system and method based on a block chain. The cross-camera pedestrian tracking system comprises the following six modules: an entrance module, a data collection module, a short track generation module, a tracking module, an output module and a block chain sharing module. According to the invention, pedestrian tracking tasks and functionsdeployed at a camera end in a cross-camera scene are mainly completed. A user can utilize the system to complete tracking of pedestrians in a cross-camera monitoring scene, and consistency of pedestrian labels in the cross-camera monitoring scene is kept.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products