Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 42. Отображено 42.
29-04-2009 дата публикации

Self-protection system for sensor network operating system

Номер: CN0101420773A
Принадлежит:

The invention relates to a self-protection system of a sensor network operating system. In the invention, TFAD-901 is combined with MicaZ nodes to form an isomerous wireless sensor network, wherein, TFAD-901 nodes distributed in specific places conduct communications with each other in a wireless manner to form the backbone of the network; one TFAD-901 node is connected with one MicaZ node through a serial port; communications are kept among the rest MicaZ nodes in the wireless manner; the MicaZ nodes acquire environmental data, and transmit the acquired data to the MicaZ node connected with TFAD-901; and the environmental data is transmitted to TFAD-901 through the serial port and then to PC through the backbone network. All rules are subjected to the configuration management of a user so that the resource consumption of the system is reduced. The self-protection system conducts necessary control on the access to a core document on specific application scenes, and prevents an unauthorised ...

Подробнее
19-10-2011 дата публикации

Self-adapting mobile base station system reliability estimation method based on feedback

Номер: CN0101272580B
Принадлежит:

The invention discloses a reliability evaluating method of a self-adaptive mobile base station system based on feedback. At first, real data of a base station system is collected; according to demands the data is preprocessed data for analyzing the failure type, failure time intervals are extracted, and the failure interval data is divided into two groups, wherein, one group is used for method studying and evaluation, and the other group is used for accuracy verification and analysis. Aiming at the first group of data, a plurality of evaluation methods are adopted for evaluating the reliability of the base station system and for pre-estimating the reliability parameters; while aiming at the second group of data, the accuracy of the results evaluated by a plurality of methods are compared,and the evaluation method with high accuracy degree is selected. The two groups of failure time intervals are combined, and the selected evaluation method is adopted for evaluating the reliability parameters ...

Подробнее
28-01-2009 дата публикации

Method for searching buffer based on loose location dependence in wireless self-networking

Номер: CN0101355583A
Принадлежит:

The invention discloses a method for searching a buffer memory based on loose position dependence in a wireless ad-hoc network. The searching process under the mode of loose position dependence comprises the following steps of: 1) generating a request; 2) searching a local buffer memory, and executing step 3) if no result; 3) sending a searching request to a neighbored user who executes the local searching of step 2) and returns a result to the user who submits the request and selects an optimal result, and executing step 4) if no result; and 4) submitting a searching request to a server to return the optimal result. The user can add overhead which can be afforded by the user according to particular conditions when the user submits the searching request, and determines whether buffer data is available or not through comparing effective areas of the buffer data and corresponding restriction values. The method not only improves the hit rate of the buffer memory, but also reduces the energy ...

Подробнее
01-12-2010 дата публикации

Method for locating defects in object-oriented programs, characterized by organizing execution traces by categories

Номер: CN0101901185A
Принадлежит:

The invention discloses a method for rapidly and accurately locating the defects in object-oriented programs, characterized by organizing execution traces by categories. The method comprises the following steps: firstly, carrying out the instrumentation and execution on the codes of the programs to be tested, collecting the execution record of test cases, and grouping the test cases by whether the test cases pass or not according to the execution record; sorting the execution record of the test cases and organizing the execution traces; dividing the execution traces into different sections by categories, and determining the similarity; selecting the test cases aiming at statement blocks according to the similarity of the sections; calculating the suspiciousness of the statement blocks; and finishing the defect location report.

Подробнее
08-12-2010 дата публикации

Construction method of equivalent VoD system based on jump graph

Номер: CN0101540884B
Принадлежит:

The invention discloses an equivalent VoD system based on jump graph and a construction method thereof. The equivalent VoD system mainly comprises a customer buffer memory manager, an overlay topology manager and a VCR flow dispatcher. The customer buffer memory manager maintains a sliding window at each customer node, buffer-memorizes nearly-received video content, and transfers the content to other customer nodes according to the demands. The overlay topology manager organizes all customer nodes watching the same video into a P2P overlay network of CSG by adopting a jump graph technology, each CSG consists of a plurality of mutually uncrossed VN customer clusters, and each VN consists of a plurality of customer nodes with similar playing points. The VCR requires the dispatching based onthe CSG; therefore, the invention realizes the quick positioning and the service redirection of the required content of the VCR based on the customer buffer memory. The invention realizes the quick positioning ...

Подробнее
06-08-2008 дата публикации

Information systems test combination generation method based on coverage density

Номер: CN0101236494A
Принадлежит:

The present invention discloses a composite generation method based on information system testing for coverage density, which adopts a framework (as shown) that: (1) input parameters and parameter values of information system to be tested are described through XML files according to the specification of the tested system; (2) the testing use cases needed to appear and the testing use cases which cannot appear through combination in pairs are assigned; (3) the values of all the input parameters are combined one by one on the basis of coverage density so as to generate a testing use case; (4) the testing use case finally generated is expressed and output in the format of the XML files. The composite generation method can be widely applied to embedded system testing, distributed system testing, web page testing, graphical interface testing, protocol testing, configuration and compatibility testing, etc., is easy to append constraints among the parameters and consider the parameter combinations ...

Подробнее
03-06-2009 дата публикации

Method for supporting large scale parallel distributed computation through functional programming model

Номер: CN0101446898A
Принадлежит:

The invention discloses a method for supporting large scale parallel distributed computation through functional programming model. The method comprises the following steps: firstly, converting realization codes to function formulae based on process; then, eliminating the edge effect of functions; establishing fork and forkout functions; conducting simulated implementation process, in the event of function call, converting the function call to use functions and the parameters thereof as parameters, and introducing pseudo-call function; carrying out call relations of stain acquired functions to function call through adopting the infection characterization of VOLD; producing a series of function implementation sequences when reaching the terminal of the procedure; conducting distributed computation for one time by the implementation sequences and the parameters; and buffering the result and conducting second implementation to the code, in the process, in the event of function call, directly ...

Подробнее
04-02-2009 дата публикации

Method for realizing video requesting system based on protocol cashe

Номер: CN0100459700C
Принадлежит:

Подробнее
06-04-2011 дата публикации

Navigation path selection method with least switching times in wireless network

Номер: CN0102006652A
Принадлежит:

The invention discloses a navigation path selection method with least switching times in a wireless network, comprising the following steps of: firstly, obtaining position information for a mobile node to pre-pass through each AP (Access Point) in an area; secondly, considering an end point D and a starting point S of the mobile node and deciding a continuous AP relating sequence with the least quantity according to the position information of the AP; and finally, selecting corresponding waypoint, thereby deciding the mobile path of the mobile node in the wireless network. By combining with navigation equipment and controlling a relating protocol on the bottom layer of a wireless communication protocol, the invention can realize the corresponding optimization algorithm; the concrete scheme is provided respectively aiming to the situations with overall information and local information; and the result shows that the method can be used for greatly reducing the switching times of the AP in ...

Подробнее
19-10-2011 дата публикации

Remote object switching method based on ATOM protocol

Номер: CN0101383824B
Принадлежит:

The invention discloses a remote object exchanging method based on an ATOM protocol, which utilizes the expansibility and the generality of the ATOM document format to carry out recursive packaging for a general object on the basis of the object packaging mode of the ATOM document format so as to eliminate the heterogeneity in different languages. On this basis, the object exchanging method based on the ATOM publishing protocol is provided, and the method can be realized with the JavaScript language in a web browser.

Подробнее
29-04-2009 дата публикации

Wireless sensor network system and method for processing data

Номер: CN0101420774A
Принадлежит:

The invention discloses a wireless sensor network system and a method thereof for processing data. The wireless sensor network comprises a sensor node, a strong sensor node, a data collection server (sink) interacting with the sensor node in the wireless manner, and a user end interacting with the server through a wired network or a wireless network. The system further comprises a management system which is constructed on the basis of middleware and used for conducting the corresponding calling of various functions of a sensor, and performs the functions of shielding bottom layer implementation and provides a unified interface for the upper layer. The method for processing the data of the system comprises the followings steps: (1) the wireless sensor network is configured and operated; (2) an application program conducts corresponding wireless sensor network operations, including a data task, a software update task, and a power management task, through the management system constructed ...

Подробнее
13-05-2009 дата публикации

High-efficiency data search method based on expanded Tag cloud

Номер: CN0101430713A
Принадлежит:

The invention discloses a method for searching data efficiently based on expending Tag cloud. In the method, an orthogonal list is adopted based on a sparse matrix realization algorithm, as the orthogonal list can only contain data and can not provide functions of retrieving or positioning, the orthogonal list is modified in a mode of combining a hash list and an AVL tree, so that quick positioning of data is supported, and retrieving support is provided. The invention transforms the Tag from a common label to an assignable container. Therefore, the label not only provides the function of classification, but also contains certain information, and provides more particular function of positioning by the information.

Подробнее
15-06-2011 дата публикации

Method for supporting large scale parallel distributed computation through functional programming model

Номер: CN0101446898B
Принадлежит:

The invention discloses a method for supporting large scale parallel distributed computation through functional programming model. The method comprises the following steps: firstly, converting realization codes to function formulae based on process; then, eliminating the edge effect of functions; establishing fork and forkout functions; conducting simulated implementation process, in the event offunction call, converting the function call to use functions and the parameters thereof as parameters, and introducing pseudo-call function; carrying out call relations of stain acquired functions tofunction call through adopting the infection characterization of VOLD; producing a series of function implementation sequences when reaching the terminal of the procedure; conducting distributed computation for one time by the implementation sequences and the parameters; and buffering the result and conducting second implementation to the code, in the process, in the event of function call, directly ...

Подробнее
08-12-2010 дата публикации

Method of implementing least energy consumption routing under time delay limitation in wireless sensor network

Номер: CN0101159697B
Принадлежит:

The invention discloses a method for achieving routing with minimal energy consumption under delay constraints in a wireless sensor network. The method comprises generating, by an improved AMODV multi-path routing algorithm, a plurality of paths from a data generating source node to a collection base station under the node redundancy condition of a sensor network as the candidate set for path searching; and firstly calibrating the paths satisfying the delay requirement in the generated path set, then distributively calculating the path with the minimal energy consumption by using a strategy based on dynamic programming ideal. Based on the experiential fact that the generated path set contains the path with the minimal energy consumption at a very large probability, the routing achieving method substantially provides the path with the minimal power energy satisfying the delay requirement.

Подробнее
22-08-2012 дата публикации

Wireless ultrahigh-frequency radio-frequency identification system and method thereof for resisting invalid quantity statistical attack

Номер: CN0101794402B
Принадлежит:

The invention discloses a wireless ultrahigh-frequency radio-frequency identification system and a method thereof for resisting invalid quantity statistical attack. The system stores a label sequence number TID and a current communication sequence number SID in a reader and an electronic label, the reader expresses validity by using a random number Rn and the current communication sequence numberSID through a cipher text h (Rn, SID) combined by a unidirectional hash function h (x1, x2), and the electronic label only responds to the reader message with accurate cipher text; the reader uses anencrypted communication sequence number as signature when sending commands to the electronic label, and the label verifies the validity of the reader by checking the received signature; and after receiving the search request of the valid reader, the electronic label proves self valid identify by sending the message containing the encrypted label sequence number. The method invalidates the invalidelectronic ...

Подробнее
06-04-2011 дата публикации

Fast switching method based on movement detection in wireless network

Номер: CN0101557625B
Принадлежит:

The invention discloses a fast switching method based on movement detection in a wireless network, comprising the following steps: movement detection: firstly, a distance between a AP and a movable node is estimated by collecting a RSSI value in a movable node data packet, secondly, the position information of the movable node is obtained by using node location so as to predict the move directionand the mode speed of the movable node with the position information; AP selection: proper neighbor AP is selected according to the move direction and the move speed of the movable node so as to be provided to the movable node for switching; and fast switching: the fast switching of the movable node is realized by amending traditional 802.11 protocol. The invention uses the movement detection method to predict the nest switched AP of the movable node by amending the traditional 802.11 protocol, when the movable node needs to be switched, only need to scan a signal path in which the preliminarily ...

Подробнее
01-02-2012 дата публикации

Dynamic detection method for cross-site forged request

Номер: CN0101883024B
Принадлежит:

The invention discloses a dynamic detection method for a cross-site forged request, which comprises the following steps: collecting HTTP request information; analyzing whether a request is a CSRF suspect request or not according to the collected information; generating a test case aiming at the suspect request and finding out all suspect parameters contained by the suspect request; using the suspect parameters to generate a plurality of forged requests and generating a test case for each forged request; when an environment in which the suspect request is generated recurs, executing the forgedrequest corresponding to each test case; detecting CSRF vulnerabilities; and according to the suspect request, the execution information of the suspect request, the forged requests and the execution information of the forged requests, analyzing whether the forged requests find the CSRF vulnerabilities in Web application or not, forming a report and helping a Web application developer to repair the vulnerabilities ...

Подробнее
15-12-2010 дата публикации

Static detection method of incredible variables in PHP (Professional Hypertext Preprocessor) language Web application

Номер: CN0101916340A
Принадлежит:

The invention discloses a static detection method of incredible variables in a PHP (Professional Hypertext Preprocessor) language Web application, which comprises the following steps of: (1) recognizing all entry files of PHP Web application; (2) extracting PHP codes starting from the entry files, avoiding the interference of HTML codes, and integrating all related PHP files and codes by using an iterative method; (3) based on the unit of integrated functional modules, recognizing the incredible variables by using a static analysis method; and (4) summarizing the extraction results of all the modules, generating reports, and recording the PHP files and the specific position of each incredible variable. Compared with the prior art, the static detection method has simple realization, high recognition rate and good expandability; the problem that the incredible variables are difficult to be detected in the Web application programmed in weak type language and typeless language in the prior ...

Подробнее
24-09-2008 дата публикации

Self-adapting mobile base station system reliability estimation method based on feedback

Номер: CN0101272580A
Принадлежит:

The invention discloses a reliability evaluating method of a self-adaptive mobile base station system based on feedback. At first, real data of a base station system is collected; according to demands the data is preprocessed data for analyzing the failure type, failure time intervals are extracted, and the failure interval data is divided into two groups, wherein, one group is used for method studying and evaluation, and the other group is used for accuracy verification and analysis. Aiming at the first group of data, a plurality of evaluation methods are adopted for evaluating the reliability of the base station system and for pre-estimating the reliability parameters; while aiming at the second group of data, the accuracy of the results evaluated by a plurality of methods are compared, and the evaluation method with high accuracy degree is selected. The two groups of failure time intervals are combined, and the selected evaluation method is adopted for evaluating the reliability parameters ...

Подробнее
23-09-2009 дата публикации

Equivalent VoD system based on jump graph and construction method thereof

Номер: CN0101540884A
Принадлежит:

The invention discloses an equivalent VoD system based on jump graph and a construction method thereof. The equivalent VoD system mainly comprises a customer buffer memory manager, an overlay topology manager and a VCR flow dispatcher. The customer buffer memory manager maintains a sliding window at each customer node, buffer-memorizes nearly-received video content, and transfers the content to other customer nodes according to the demands. The overlay topology manager organizes all customer nodes watching the same video into a P2P overlay network of CSG by adopting a jump graph technology, each CSG consists of a plurality of mutually uncrossed VN customer clusters, and each VN consists of a plurality of customer nodes with similar playing points. The VCR requires the dispatching based on the CSG; therefore, the invention realizes the quick positioning and the service redirection of the required content of the VCR based on the customer buffer memory. The invention realizes the quick positioning ...

Подробнее
23-05-2012 дата публикации

Method for searching buffer based on loose location dependence in wireless self-networking

Номер: CN0101355583B
Принадлежит:

The invention discloses a method for searching a buffer memory based on loose position dependence in a wireless ad-hoc network. The searching process under the mode of loose position dependence comprises the following steps of: 1) generating a request; 2) searching a local buffer memory, and executing step 3) if no result; 3) sending a searching request to a neighbored user who executes the localsearching of step 2) and returns a result to the user who submits the request and selects an optimal result, and executing step 4) if no result; and 4) submitting a searching request to a server to return the optimal result. The user can add overhead which can be afforded by the user according to particular conditions when the user submits the searching request, and determines whether buffer datais available or not through comparing effective areas of the buffer data and corresponding restriction values. The method not only improves the hit rate of the buffer memory, but also reduces the energy ...

Подробнее
04-08-2010 дата публикации

Wireless ultrahigh-frequency radio-frequency identification system and method thereof for resisting invalid quantity statistical attack

Номер: CN0101794402A
Принадлежит:

The invention discloses a wireless ultrahigh-frequency radio-frequency identification system and a method thereof for resisting invalid quantity statistical attack. The system stores a label sequence number TID and a current communication sequence number SID in a reader and an electronic label, the reader expresses validity by using a random number Rn and the current communication sequence number SID through a cipher text h (Rn, SID) combined by a unidirectional hash function h (x1, x2), and the electronic label only responds to the reader message with accurate cipher text; the reader uses an encrypted communication sequence number as signature when sending commands to the electronic label, and the label verifies the validity of the reader by checking the received signature; and after receiving the search request of the valid reader, the electronic label proves self valid identify by sending the message containing the encrypted label sequence number. The method invalidates the invalid electronic ...

Подробнее
09-05-2012 дата публикации

Method for prioritizing test cases based on classified excavation and version change

Номер: CN0101908020B
Принадлежит:

The invention discloses a method for prioritizing test cases based on classified excavation and version change. The method comprises the following steps of: firstly, acquiring information on test case execution results under the condition of different versions and module change and converting the information into a test case execution result data matrix and a module change data matrix; secondly, establishing classified excavation training for each test case and forecasting the required training sets; thirdly, selecting two classified excavation models of Bayesian classification HNB and AODE and performing model training by adopting the corresponding training set for each test case; fourthly, forecasting the probability of finding software defects of each test case in a new version according to the trained models; and finally, performing prioritized sequencing on the test cases by combining the time limit executed by a regression test according to the comprehensive result through the model ...

Подробнее
08-12-2010 дата публикации

Method for prioritizing test cases based on classified excavation and version change

Номер: CN0101908020A
Принадлежит:

The invention discloses a method for prioritizing test cases based on classified excavation and version change. The method comprises the following steps of: firstly, acquiring information on test case execution results under the condition of different versions and module change and converting the information into a test case execution result data matrix and a module change data matrix; secondly, establishing classified excavation training for each test case and forecasting the required training sets; thirdly, selecting two classified excavation models of Bayesian classification HNB and AODE and performing model training by adopting the corresponding training set for each test case; fourthly, forecasting the probability of finding software defects of each test case in a new version according to the trained models; and finally, performing prioritized sequencing on the test cases by combining the time limit executed by a regression test according to the comprehensive result through the model ...

Подробнее
30-07-2008 дата публикации

Method for locating software unsoundness base on execution track block semblance

Номер: CN0101231614A
Принадлежит:

The invention discloses a software defect locating method which is based on the lump similarity of execution traces, and the method comprises the following steps that: firstly, the executive information of test cases are collected and arranged, and the execution traces are generated; secondly, a test case set which has defects is positioned according to the lump similarity selection of the execution traces; thirdly, the system comparison is carried out to the execution traces of the selected test cases, and the suspecting rate of the operation part is calculated; fourthly, the suspecting rate of the operation part is mapped to the source program to generate a defect locating report. The invention can be widely applied to the automatic test environment of a large-scale software system, and relates to the stage and the work of an integrated test, a system test, an acceptance test, a user problem report analysis, etc.; the existing test data are fully utilized, and the lump similarity of the ...

Подробнее
01-12-2010 дата публикации

Form feature-based Web security vulnerability dynamic testing method

Номер: CN0101902470A
Принадлежит:

The invention discloses a form feature-based Web security vulnerability dynamic testing method. The method comprises the following steps of: 1) extracting automation features of a page to be tested of Web application, a form and a form domain thereof; and acquiring and storing data; 2) endowing each form domain with a group of test candidate values by taking the form as a testing unit; primarily generating an all-combination test case set; computing a weight value for each test case; and generating a test case set by using a maximal weight selection method; 3) executing the test case set; and4) performing potential security vulnerability analysis aiming at an execution result of each test case, and summarizing and generating a test report. The method endows the form domain with a security vulnerability testing value in a targeted way by using field knowledge by performing feature analysis on the Web form, interacts with a Web server to acquire a server response, and automatically tests ...

Подробнее
02-06-2010 дата публикации

Method for locating software unsoundness based on execution track block semblance

Номер: CN0101231614B
Принадлежит:

The invention discloses a software defect locating method which is based on the lump similarity of execution traces, and the method comprises the following steps that: firstly, the executive information of test cases are collected and arranged, and the execution traces are generated; secondly, a test case set which has defects is positioned according to the lump similarity selection of the execution traces; thirdly, the system comparison is carried out to the execution traces of the selected test cases, and the suspecting rate of the operation part is calculated; fourthly, the suspecting rateof the operation part is mapped to the source program to generate a defect locating report. The invention can be widely applied to the automatic test environment of a large-scale software system, andrelates to the stage and the work of an integrated test, a system test, an acceptance test, a user problem report analysis, etc.; the existing test data are fully utilized, and the lump similarity ofthe ...

Подробнее
22-04-2009 дата публикации

On-line compile method based on vector processor

Номер: CN0101414265A
Принадлежит:

The invention discloses an on-line compilation method based on a vector processor. The method comprises the following steps: firstly, defining a problem as a group of data and a group of processing functions in an list comprehension expression manner by map, filter, zip and range functions of a Python code; compiling the Python code into a code object, acquiring func_code attribute of a function body which is a PyCode object, analyzing the attribute by a dis function in a dis library and translating Python byte code into a corresponding operational character; acquiring and scanning the acquired operational character, and respectively processing two procedures, namely an if branch structure and a cycle structure. By the on-line compilation method, the problem can be described by a Python language and automatically converted into an SIMD code which can run on various SIMDs, thus greatly reducing the application difficulty of the SIMDs.

Подробнее
25-01-2012 дата публикации

Software defect positioning method based on relative redundant test set reduction

Номер: CN0101866316B
Принадлежит:

The invention discloses a software defect positioning method based on relative redundant test intensive reduction, which comprises the following steps: carrying out pitching piles to a source program, executing a test case, and collecting the execution information of the test case; carrying out the reduction to the whole test set according to the covering condition of a source code of the test case; and finally, calculating doubting rate of a statement block and sorting the statement block according to the doubting rate to generate a defect position report. Under the premise of using the samedefect position technology, the defect position effect calculated by a representational set, obtained by the invention, is better than the defect position effect calculated by the representational set, obtained the traditional test set reduction, and the phase differences of scales of representational sets are not more.

Подробнее
09-04-2008 дата публикации

Method of implementing least energy consumption routing under time delay limitation in wireless sensor network

Номер: CN0101159697A
Принадлежит:

The invention discloses a method for achieving routing with minimal energy consumption under delay constraints in a wireless sensor network. The method comprises generating, by an improved AMODV multi-path routing algorithm, a plurality of paths from a data generating source node to a collection base station under the node redundancy condition of a sensor network as the candidate set for path searching; and firstly calibrating the paths satisfying the delay requirement in the generated path set, then distributively calculating the path with the minimal energy consumption by using a strategy based on dynamic programming ideal. Based on the experiential fact that the generated path set contains the path with the minimal energy consumption at a very large probability, the routing achieving method substantially provides the path with the minimal power energy satisfying the delay requirement.

Подробнее
27-05-2009 дата публикации

Gridding system implementing method based on Python language

Номер: CN0101441571A
Принадлежит:

The invention discloses a method for realizing a grid system based on Python language. The invention provides an extended Python NameSpace mechanism, a realization method comprising a method for reloading a Python virtual machine, a transparent Python proxy object, an object transfer mechanism and a code transfer mechanism. The method performs a series of modification on Python realization on the basis of the Python language which is widely popularized and used, so that the Python language is suitable for a grid environment. Simultaneously, the method does not change Python syntax and does not introduce a novel API library on the premise that gridding of the Python language is realized, so that the prior great number of Python codes can be operated in the grid environment without modification and achieve higher execution performance through supporting of the grid environment.

Подробнее
14-10-2009 дата публикации

Fast switching method based on movement detection in wireless network

Номер: CN0101557625A
Принадлежит:

The invention discloses a fast switching method based on movement detection in a wireless network, comprising the following steps: movement detection: firstly, a distance between a AP and a movable node is estimated by collecting a RSSI value in a movable node data packet, secondly, the position information of the movable node is obtained by using node location so as to predict the move direction and the mode speed of the movable node with the position information; AP selection: proper neighbor AP is selected according to the move direction and the move speed of the movable node so as to be provided to the movable node for switching; and fast switching: the fast switching of the movable node is realized by amending traditional 802.11 protocol. The invention uses the movement detection method to predict the nest switched AP of the movable node by amending the traditional 802.11 protocol, when the movable node needs to be switched, only need to scan a signal path in which the preliminarily ...

Подробнее
11-03-2009 дата публикации

Remote object switching method based on ATOM protocol

Номер: CN0101383824A
Принадлежит:

The invention discloses a remote object exchanging method based on an ATOM protocol, which utilizes the expansibility and the generality of the ATOM document format to carry out recursive packaging for a general object on the basis of the object packaging mode of the ATOM document format so as to eliminate the heterogeneity in different languages. On this basis, the object exchanging method based on the ATOM publishing protocol is provided, and the method can be realized with the JavaScript language in a web browser.

Подробнее
27-04-2005 дата публикации

Method for realizing video requesting system based on protocol buffer storage

Номер: CN0001610403A
Принадлежит:

The method of realizing video-on-demand system based on synergistic buffering storage includes the following steps: the user requests data to the system via the network; the access control system decides whether to access the user's request; if so, the buffering storage system decides the buffering storing and realizes the video-on-demand in the idle synergistic buffering storage of the servers inside the local server group; if there is no requested data inside the buffering storage, the buffering storage will request data to background file system; if there is no requested data in the background file system, the data will be provided by the remote server; and the remote server provides the user with the flow media data via synergistic buffering storage. The present invention features the ensured transmission bandwidth between the synergistic buffering storages and no system network bottle neck caused by index information transmission.

Подробнее
02-06-2010 дата публикации

Service-oriented self-adapted power grid communication architecture and its communication method

Номер: CN0101170581B
Принадлежит:

The invention discloses a self-adapting electrical power network communication establishment toward service and the communication method thereof. The invention comprises a communication layer which mainly consists of a selection adaptor, a communication adaptor and a plurality of communication interfaces. The communication layer is used for the selection adaptor which meets the upper layer networkservice communication requirement and is connected with the communication adaptor through each communication interface. The communication adaptor is connected with physical layer through a pluralityof the communication interfaces. The invention acquires different communication protocols by different interfaces. Upper layer business selects adaptive communication protocol according to the certainalgorithm. The design method facilitates electrical power network communication layer to acquire the communication protocol commonly used by the original electrical power monitoring system and SOAP protocol ...

Подробнее
08-12-2010 дата публикации

Regression test case screening method based on partial multi-coverage

Номер: CN0101908017A
Принадлежит:

The invention discloses a regression test case screening method based on partial multi-coverage, comprising the following steps of: firstly establishing a test requirement coverage matrix according to software system characteristics and a test case library; then aiming at a correction assembly, dividing a test requirement set into a concerned set and an independent set; selecting a regression test set by adopting an HATS (Host Access Transformation Service) algorithm; maintaining the test case library by adopting a multi-coverage category based on risk or operational profile definition test requirements; and screening the test case set by adopting an MHATS algorithm according to the given multi-coverage category. In the invention, redundant test cases can be reserved by adopting the multi-coverage category, therefore, the defect detection capacity of the test case library is maintained while the test case library is simplified; and in addition, the regression test case screening method ...

Подробнее
20-10-2010 дата публикации

Software defect positioning method based on relative redundant test set reduction

Номер: CN0101866316A
Принадлежит:

The invention discloses a software defect positioning method based on relative redundant test intensive reduction, which comprises the following steps: carrying out pitching piles to a source program, executing a test case, and collecting the execution information of the test case; carrying out the reduction to the whole test set according to the covering condition of a source code of the test case; and finally, calculating doubting rate of a statement block and sorting the statement block according to the doubting rate to generate a defect position report. Under the premise of using the same defect position technology, the defect position effect calculated by a representational set, obtained by the invention, is better than the defect position effect calculated by the representational set, obtained the traditional test set reduction, and the phase differences of scales of representational sets are not more.

Подробнее
10-11-2010 дата публикации

Dynamic detection method for cross-site forged request

Номер: CN0101883024A
Принадлежит:

The invention discloses a dynamic detection method for a cross-site forged request, which comprises the following steps: collecting HTTP request information; analyzing whether a request is a CSRF suspect request or not according to the collected information; generating a test case aiming at the suspect request and finding out all suspect parameters contained by the suspect request; using the suspect parameters to generate a plurality of forged requests and generating a test case for each forged request; when an environment in which the suspect request is generated recurs, executing the forged request corresponding to each test case; detecting CSRF vulnerabilities; and according to the suspect request, the execution information of the suspect request, the forged requests and the execution information of the forged requests, analyzing whether the forged requests find the CSRF vulnerabilities in Web application or not, forming a report and helping a Web application developer to repair the ...

Подробнее
05-11-2008 дата публикации

Base station system polling path automatization determination method based on shortest cycle

Номер: CN0101299861A
Принадлежит:

The invention discloses a base station system polling path automatization determination method based on shortest cycle station system, including: firstly mapping the base station geographic position information provided by MapInfo onto a base station system network map; determining the polling radius of the base station; adopting the ant algorithm to figure out the shortest cycle of each cluster in order to determine the optimal polling path in the cluster. Based on the mobile communication base station system operation features, the invention adopts a dynamic base station system polling path automatization determination method based on geographical cluster and shortest cycle station system, which can obtain effective and reasonable polling path according to a large number, widely distributed base station system. The method can be widely and conveniently applied to polling and maintenance of equipment in other areas such as electronic police, traffic lights, global eyes, and the like.

Подробнее