Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

76 results about "Node deletion" patented technology

Node deletion is the procedure of removing a node from a network, where the node is either chosen randomly or directly. Node deletion is used to test the robustness and the attack tolerance of networks. Understanding how a network changes in response to node deletion is critical in many empirical networks. Application varies across many fields, including the breakdown of the World Wide Web via router removal, elimination of epidemics or fighting against criminal organizations.

Processing system and processing method for nodes in family tree

The invention discloses a processing system and a processing method for nodes in a family tree. The processing system for the nodes in the family tree comprises an interface module, a database and a family tree maintenance module, wherein the interface module is used for providing an input interface and an output interface for users; the database is used for storing the data information of the family tree; the family tree maintenance module is used for maintaining the nodes in the family tree and a connection relation among the nodes according to the operation of the users and comprises a node addition submodule, a node deletion submodule and a node merging submodule; the node addition submodule is used for adding the nodes and the connection relation among the nodes; the node deletion submodule is used for deleting the nodes and the connection relation relevant to the nodes according to a preset deletion rule; and the node merging submodule is used for merging relevance nodes according to a preset merging rule, wherein the relevance nodes comprise common nodes in different family trees and relevant nodes in one family tree. By the processing system and the processing method, the blood relationships of various complex families in the actual world can be expressed accurately and integrally to the greatest extent, the openness of maintaining the family trees is ensured, and the user experience is improved.
Owner:唐凌遥

Complex network node importance assessment method and system thereof

ActiveCN107453919ATrue importance assessmentMateriality assessment scienceData switching networksCascading failureLoad capacity
The invention discloses a complex network node importance assessment method and a system thereof. The method comprises the following steps of S1, initializing an actual load of each node in a complex network and calculating an initial total load of the complex network; S2, successively carrying out failure investigation on each node of the complex network and carrying out cascade failure simulation; during a cascade failure simulation process, after a failure node is deleted, adjusting and updating an actual load of a neighbor node, updating a load capacity of each complex network node, according to the updated load and the updated load capacity, carrying out a new round of failure determination on the complex network till that the complex network is stable, and calculating a residual total load of the complex network; and S3, according to the initial total load and the residual total load, assessing importance of each node. The method and the system possess a dynamic deepening characteristic of fully considering the complex network cascade failure, an inherent property of an important node can be prompted, and node importance in the complex network can be really and accurately assessed.
Owner:NAT UNIV OF DEFENSE TECH

Blackspot-prediction farmland time-varying heterogeneous network node deployment and interactive dispatching method

The invention discloses a blackspot-prediction farmland time-varying heterogeneous network node deployment and interactive dispatching method. The node deployment includes acquiring attribute of nodes according to path loss, node sensing probability, effective node sensing area and surplus node energy in the process of signal transmission; acquiring significance of the nodes according to the attribute and the node degree of the nodes; deploying the nodes by a constraint tightening method according to the significance of the nodes. The node interactive-dispatching includes determining a redundant node set according to the surplus node energy and the network coverage rate; according to a farmland time-varying heterogeneous network node set, determining a triangulation graph corresponding to the node set; according to the redundant node set, deleting non-redundant nodes and relevant sides in the triangulation graph to obtain a subdivision graph; determining dormant nodes in the redundant node set to obtain a dormant node set according to the redundant node set; deleting the nodes in the dormant node set in the farmland time-varying heterogeneous network node set to obtain a communication coverage set.
Owner:BEIJING RES CENT FOR INFORMATION TECH & AGRI

Implementation method of barrel type linked list structure

The invention provides an implementation method of a barrel type linked list structure. The method is characterized in that a linked list uses barrel type structures as unit organization nodes, the positions of the previous node and the next node are pointed out by digital indexes among the nodes, and the linked list can be serially connected by multiple barrel type structures; during node adding, the idle positions in the barrel type structure are searched, and if the barrel type structure is full, another barrel type structure is created and data is saved into the barrel type structure; during node deletion, the corresponding positions of the barrel type structure is set to be idle. Compared with traditional linked list structure, the barrel type linked list has the advantages that the barrel type linked list can be managed by using the barrel type structure as unit, bidirectional connection in a pointer manner is avoided, node adding and deleting are quite fast and convenient, and during linked lift node traversing, internal memory cache hit ratio is increased while the operation efficiency of the a software system is increased evidently due to the fact that the nodes are internal memory continuous.
Owner:HANGZHOU ELECTRONICS SOUL NETWORK TECH

Personal file permission chain management system and method based on improved multi-layer PBFT

The invention provides a personal file permission chain management system and method based on improved multi-layer PBFT, belongs to the technical field of block chains, and comprises a node managementmodule, a hierarchical division module and a consensus module which are connected in sequence. The node management module is used for performing node creation, grade allocation and node deletion management on participated nodes by utilizing a personal file permission chain; the hierarchical division module is used for carrying out hierarchical division on all the nodes according to the levels ofthe nodes and carrying out user-defined hierarchical processing through the node levels and the slave node ID list; and the consensus module is used for realizing optimization in combination with a PBFT consensus algorithm, the multi-layer nodes and an excitation mechanism. Through the design, the problems that a license chain system is poor in node expansibility, high in inter-node communicationcomplexity, low in system efficiency after the number of nodes is increased and the like are solved, the total single consensus communication duration of the license chain management system is effectively shortened, and the single consensus communication frequency is greatly reduced.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA +1

Automatic networking and data forwarding method utilizing MAC address in Android mobile terminal

The invention provides an automatic networking and data forwarding method utilizing an MAC address in an Android mobile terminal, and belongs to the technical field of data transmission, network formation and MAC address acquisition. The method comprises the following steps: step 1, a networking module establishes a local area network of wireless mobile; step 2, a new node adding module adds a new mode; step 3, a node deletion module deletes the node; step 4, a packet sending environment establishment module establishes a packet sending environment; and step 5, a data forwarding module forwards data. According to the automatic networking and data forwarding method, no additional algorithm or cost is needed to maintain and ensure the address uniqueness of each mobile device in the network; the broadcast storm caused by copy and forwarding of broadcast data packets in the loop is avoided; and no high level transmission protocol is depended on, so that the transmitted data packet has a simpler structure, and the used protocol is simpler, and the transmission overhead is reduced.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Network intercommunication method and device for realizing Kubernetes cluster, equipment and storage medium

ActiveCN110808857AImplement configuration operationsImprove the efficiency of adding, deleting and modifying operationsData switching networksNode deletionComputer equipment
The embodiment of the invention discloses a network intercommunication method and device for realizing a Kubernetes cluster, computer equipment and a storage medium. The method comprises the followingsteps: monitoring node information of the Kubernetes cluster in real time; if a node operation instruction of a user for the Kubernetes cluster is received, sending the Kubernetes cluster to the server; determining a target node in a user operation Kubernetes cluster according to the node operation instruction, and judging a node operation type of the user operation target node, the node operation type comprising a node addition operation, a node deletion operation and a node modification operation; and executing a preset node operation strategy according to the judged node operation type soas to realize network intercommunication of the Kubernetes cluster. According to the method, internal and external network intercommunication of the Kubernetes cluster can be realized, network intercommunication can be realized for private clouds and public clouds, and network intercommunication can also be realized under the condition of mixing the private clouds and the public clouds.
Owner:SHENZHEN QIANHAI HUANRONG LIANYI INFORMATION TECH SERVICES CO LTD

Multi-thread linked list processing method and device and computer readable storage medium

The invention provides a multi-thread linked list processing method and device and a computer readable storage medium. The multi-thread linked list processing method comprises the steps: building a main thread and a plurality of sub-threads, enabling a linked list to be loaded into the main thread, and enabling state information to comprise a processed identification and an unprocessed identification; after the sub-thread is started, obtaining a target node with an unprocessed identifier from the linked list, carrying out data processing on the data of the target node, if the processing succeeds, updating the state information of the target node into a processed identifier in the linked list, and obtaining the next node from the linked list again; and traversing each node in the updated linked list by the main thread, and deleting the node of which the state information is the processed identifier in the traversing process. According to the multi-thread linked list processing method, the main thread and the plurality of sub-threads are adopted to process the data together, and the state information of the nodes is added into the data of the linked list, and the plurality of sub-threads process the data of the nodes in the linked list in parallel, and the influence on other sub-threads does not need to be considered, and the data processing efficiency is improved, and the linkedlist is not easy to damage.
Owner:GUILIN CHANGHAI DEV

M2M node deletion and registration methods and M2M node

The invention discloses M2M node deletion and registration methods and an M2M node. The deletion method comprises a receiving step of receiving a node deletion request from a first M2M node; and a response step of responding to the node deletion request, deleting node resources of the first M2M node, and reserving entity resources corresponding to the first M2M node, wherein the entity resources comprise at least one of application entity (AE) resources and common service entity (CSE) resources.
Owner:ZTE CORP

Node importance identification method based on complex network dependent seepage model

The invention provides a node importance identification method based on a complex network dependent seepage model, and aims to determine the influence of nodes in a network according to seepage characteristics and a cascade dynamic process when the network fails. The method comprises an edge-dependent network modeling module and a real network verification module, and the edge-dependent network modeling module comprises the following steps: (1) constructing a network model based on an edge-dependent mechanism, and introducing a weak-dependent seepage model to adjust the dependence intensity between connected edges in the network model; (2) performing failure investigation on the nodes in the network model in the step (1), setting adjustable parameters to control the dependency strength among the nodes, performing a new round of failure judgment according to whether a new dependency edge failure exists in the network model or not, and obtaining a final value of the maximum communicationcomponent of the network model until the network model is stable; (3) evaluating the importance of the node according to the edge dependence intensity critical value and the maximum communication component causing the network crash when the node is deleted.
Owner:HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products