Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

138 results about "Logical process" patented technology

Logical Process Modeling. Logical Process Modeling is the representation of a business process, detailing all the activities in the process from gathering the initial data to reaching the desired outcome.

System and method for optimizing project subdivision using data and requirements focuses subject to multidimensional constraints

A computer-implemented method for creating optimized sub-projects for a project. Boundary conditions, input regarding output objects, and input regarding “as-is” data sources are received. The output objects are decomposed into data objects and logical processes used to create the output objects. Value clusters are determined. The data objects are organized into “to be” data structures and the “to be” which are mapped to the “as-is” data sources. Additional processes are determined for moving data from a source to a target. An affinity matrix is created based on the value clusters. Finally, an optimization operation is executed with an optimization engine to produce the optimized sub-projects. The optimization engine takes as inputs the above information.
Owner:IBM CORP

Automatically managing mapping and transform rules when synchronizing systems

A method and associated system for managing rules that synchronize operations of a source system and a target system. A set of linked worksheets is generated as a function of the internal logic of the synchronization rules and of worksheets that represent data models of the source and target systems. These generated worksheets describe and relate data elements of the data models, extrinsic data that is stored externally to the source and target systems, and logical procedures performed by the synchronization rules. When the source data model, the target data model, or a logical procedure is revised, the linked worksheets are updated in response to the revision and these updates automatically propagate across the synchronization rules and across other components of the source system, the target system, and the synchronization mechanism.
Owner:IBM CORP

Smart-phone track chain-cluster identification method considering sequential DBSCAN

ActiveCN105206041AMake up for the lack of recognition of timing featuresHigh precisionRoad vehicles traffic controlSpecial data processing applicationsPoint clusterData acquisition
The invention discloses a smart-phone track chain-cluster identification method considering sequential DBSCAN. The method comprises that data collection and preprocessing are carried out; the sequential angle offset of behavior track points is calculated; the sequential distance offset of the behavior track points is calculated; chains and non-chains are identified and gathered according to rules; and whether a non-chain segment belongs to a point cluster is determined by using DBSCAN, and outputs an analysis result. The logical process of the behavior track identified by the human eyes is integrated with the DBSCAN by providing the two indexes, namely the sequential angle offset and the sequential distance offset, the disadvantage that a traditional algorithm cannot identify sequential features is overcome, and the accuracy of behavior track chain-cluster identification is improved.
Owner:SOUTHEAST UNIV

Remote inversion method of internal action logic of protection device

The invention provides a realization method in which intermediate node information correlated to an internal action logic of a relay protection device is uploaded and a visual logic diagram is combined to invert a protection process of the internal logic when there is a fault at a power grid. The provided method can be applied to a power grid fault information system. And the method comprises the following steps that: when there is a fault at a power grid, internal logic operation information of a relay protection device is processed to generate an intermediate node file that can describe the fault in detail; according to an IEC61850-8-1 protocol, the relay protection device uploads the intermediate node file and a fault wave-recording COMTRADE file to a remote fault information master station; and a visual application module loads the intermediate node file, the protection logic diagram file and the COMTRADE fault wave-recording file to demonstrate a protection logic operation situation in the whole fault process. According to the invention, a visual observation means is provided for inversion of an accident in a power system; and a rapid, accurate, and high efficient informational way is provided for accident localization and a fault analysis; therefore, an action process of a relay protection device is hyalinized and the visibility is realized.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +1

Multi-medium color-image system and method for transmitting multi-medium color image during process of talk

The system comprises: a color image application server used for making service logical process and user's operation process; a color image memory used for saving the color images provided by user and providing download resource; a Web server used for providing Web site and system management site; and an integrated interface message processor used for providing interaction with the peripheral interfaces; wherein, said devices are connected via IP network.
Owner:ZTE CORP

On-chip power supply network verification method for side channel attack

ActiveCN106817215AIntuitive and usable attack defense capability evaluation resultsLow costEncryption apparatus with shift registers/memoriesPlaintextValidation methods
The invention discloses an on-chip power supply network verification method for a side channel attack. The method comprises: logical synthesis and physical design processing is carried out on a register transmission level netlist file of a chip to obtain a transistor level netlist file; according to the obtained transistor level netlist file, a circuit model including a power supply network and a load is established; according to a generated plaintext-ciphertext data pair and a corresponding secret key, a logic process for encryption operation execution on the chip is simulated to obtain a current waveform file of the load; on the basis of the circuit model and the current waveform file of the load, a physical process for encryption operation execution on the chip is simulated to obtain a power consumption curve of the chip; according to the obtained power consumption curve, a side channel attack is carried out on the chip to obtain a guess secret key of the attack; and on the basis of the obtained guess secret key, a side channel attack result is analyzed and an anti-side channel attack capability of the power supply network is verified. The method has advantages of low cost, high accuracy, and reduced design verification period.
Owner:TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products