Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 14. Отображено 14.
25-06-2008 дата публикации

Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field

Номер: CN0101207480A
Принадлежит:

The invention discloses a cross-domain multi network keeper end-to-end session key negotiation method, which dynamically negotiates a best key negotiation method in the end-to-end communication through signaling execution flows of ARQ/ACF and LRQ/LCF based on whether D-H key exchange algorithm and security strategy are supported by endpoints and the network keepers. The method comprises the following steps: a called network keeper generates a sharing secret, a calling network keeper and a calling endpoint obtain a session key according to the sharing secret, and the calling endpoint and the called network keeper generate the session key by using the D-H key exchange algorithm, thereby the generation and the exchange of the sharing secret or session key are carried out among each endpoint, thus the limits of low efficiency and bad interconnection and interoperability, which are caused by the fact that the key negotiation method is based on pre-configuration, are overcome under the prior ...

Подробнее
05-11-2014 дата публикации

Micro blog topic source tracing method based on topic influence

Номер: CN104133897A
Принадлежит:

The invention belongs to the field of data mining of a semantic social network of the source tracing category and particularly relates to a micro blog topic source tracing method based on the topic influence. The micro blog topic source tracing method based on the topic influence comprises the steps that according to a latent semantic query expansion method of the field of information retrieval, semantic expansion is conducted on an input topic word group tp, and first k topics relevant to the given topic are obtained; a user relation and the information propagation law in the micro blog network are determined, and the topic influence TIN is determined; according to an influence computational formula, the influence of the topic is worked out with one hour as one time step, the variation trend, generated as time passes by, of the influence of the topic is obtained, the intensity of the influence gradually increases in the initial stage of the topic and then increases sharply, finally, the ...

Подробнее
23-06-2023 дата публикации

Method for constructing aspect-level sentiment analysis model based on graph attention network

Номер: CN116304054A
Автор: ZHANG ZEBAO, GE SONGTAO
Принадлежит:

The invention provides a method for constructing an aspect-level sentiment analysis model based on a graph attention network. According to the method, modeling is carried out on syntactic features of a text, an effective syntactic dependency relationship between aspect words and viewpoint words is obtained, and then more appropriate representation used for aspect-level sentiment analysis is obtained. According to the method, the original syntactic dependency tree is pruned, so that the negative influence of redundant information on emotion polarity judgment in the target aspect is avoided. Irregular syntactic structure information is processed in combination with a graph attention network, and syntactic information in a long-distance range can be better captured without purely using an attention mechanism and a model of a convolutional neural network.

Подробнее
14-07-2010 дата публикации

Method for key agreement of guard end-to-end conversation in cross-domain multi-network

Номер: CN0101207478B
Принадлежит:

The invention discloses a cross-domain multi network keeper end-to-end session key negotiation method, which dynamically negotiates a best key negotiation method in the end-to-end communication through signaling execution flows of ARQ/ACF and LRQ/LCF based on that whether D-H key exchange algorithm and security strategy are supported by endpoints and the network keepers. The method comprises the following steps: a called network keeper generates the a sharing secret, a calling network keeper and a calling endpoint obtain the a session key according to the sharing secret, the calling network keeper and the called network keeper generate the session key by using the D-H key exchange algorithm, and the calling endpoint and the called network keeper generate the session key by using the D-H key exchange algorithm, thereby the generation and the exchange of the sharing secret or the session key are carried out among each endpoint, thus the limits of low efficiency and bad interconnection and ...

Подробнее
22-08-2023 дата публикации

Vehicle electric drive efficiency calculation method and device, vehicle and storage medium

Номер: CN116628984A
Принадлежит:

The invention relates to a vehicle electric drive efficiency calculation method and device, a vehicle and a storage medium, and the method comprises the steps: reading the electric drive rotating speed, torque and energy data of a target vehicle under a preset working condition, and recognizing a corresponding extreme value according to the electric drive rotating speed, torque and energy data, so as to establish an extreme value working condition point matrix; dividing the extreme value working condition point matrix into a plurality of working condition point sub-matrixes, and counting the number of working condition points included in each working condition point sub-matrix so as to generate a bench test working condition according to a statistical result; and calculating the working condition point efficiency and the equivalent energy ratio thereof in the bench test working condition to obtain the electric driving efficiency of the target vehicle. According to the embodiment of the ...

Подробнее
24-09-2008 дата публикации

Self-starting method and device of mobile terminal when connecting with computer

Номер: CN0101272559A
Принадлежит:

The invention discloses a self-starting method which is used when a mobile terminal is connected with a computer, including: the mobile terminal reports a self-virtual disk which is made by the mobile terminal to the connected computer; a computer operating system reads the content of the virtual disk and starts the installation procedure of PC side management software; the mobile terminal is informed after the installation is finished; the mobile terminal re-enumerates equipment after receiving the notice and is mutually interacted with the computer according to the re-enumerated equipment. The invention also discloses a self-starting device which is used when the mobile terminal is connected with the computer, including an equipment enumeration module and a reset module which are arranged at the side of the mobile terminal and a reading installation module for software which is arranged at the side of the computer. By using the method of the invention, the computer can automatically arrange ...

Подробнее
05-08-2009 дата публикации

E-mail gateway type systematic mail account maintaining method

Номер: CN0101499981A
Принадлежит:

The invention provides a method for maintaining the e-mail accounts in systems such as an e-mail gateway and the like. The method detects the mail account information by using a POP3 protocol and an SMTP protocol, then stores the valid account information in a dynamic hash table, and maintains the validity of the information by a time sliding window, therefore, when mail delivery fails, the mail is discarded from the hash table, and the new accounts are detected after the waiting period of the sliding window. The hash structure is stored in a file system in a fixed period to avoid information loss and realize direct loading from the file system when accidental restart occurs. The advantages of the method includes: 1) the method can help to reduce the load on the gateway and improve the utilization rate of the gateway system by assisting to filter a large amount of invalid mail information; and 2) the method cuts down the deployment costs of the system by supporting the simultaneous management ...

Подробнее
25-06-2008 дата публикации

Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field

Номер: CN0101207478A
Принадлежит:

The invention discloses a cross-domain multi network keeper end-to-end session key negotiation method, which dynamically negotiates a best key negotiation method in the end-to-end communication through signaling execution flows of ARQ/ACF and LRQ/LCF based on that whether D-H key exchange algorithm and security strategy are supported by endpoints and the network keepers. The method comprises the following steps: a called network keeper generates the a sharing secret, a calling network keeper and a calling endpoint obtain the a session key according to the sharing secret, the calling network keeper and the called network keeper generate the session key by using the D-H key exchange algorithm, and the calling endpoint and the called network keeper generate the session key by using the D-H key exchange algorithm, thereby the generation and the exchange of the sharing secret or the session key are carried out among each endpoint, thus the limits of low efficiency and bad interconnection and ...

Подробнее
11-05-2011 дата публикации

Implementation method for concurrent execution of multiple services and mobile terminal using this method

Номер: CN0101127992B
Принадлежит:

The utility model discloses an implementation method for multi-service concurrent execution and the mobile terminal for implementing the method; wherein the mobile terminal is connected with a desktop system via a USB device. The method for realizing multi-service concurrent execution is as follows: the mobile terminal adopts a chip with a plurality of USB ports, the corresponding relationship between each business modules in the mobile terminal and the USB ports is set; whether each USB port receiving the data sent by the desktop system is monitored circularly; if received, then the data is sent to the business module corresponding to the USB port receiving the data; whether each business module reporting the data to the desktop system is monitored circularly, and if reported, the reported data is sent to the USB port corresponding to the business module reporting data for sending.

Подробнее
20-02-2008 дата публикации

Lightweight individualized search engine and its searching method

Номер: CN0101127043A
Принадлежит:

The utility model provides a lightweight personalized search engine and a search method of the search engine, which comprises an information grasp module, an information retrieval module and a user personality analysis module though connection with each other; wherein, the information grasp module comprises a grasp program and an index program; the Internet information resource and the Web database can be accessed into the information grasp module; the user personality analysis module is connected with the output of the information grasp module; the record of user interest and keywords query are input into the information retrieval module which is combined with the user personality analysis module to provide personalized retrieval service. The utility model has a server without increased memory cost, making full use of the resources of the client to fulfill personalized search. The utility model provides a personalized search engine proposal to satisfy the interest of users according to ...

Подробнее
26-08-2009 дата публикации

Bluetooth technology-based method for information sharing among terminals

Номер: CN0101515812A
Принадлежит:

The invention discloses a Bluetooth technology-based method for the information sharing among terminals, and aims to easily realize the Bluetooth technology-supported information sharing among the terminals. The method comprises the following steps that: a sender is successfully matched with a receiver through Bluetooth technology, packs the information to be shared into an information packet in a certain format and sends the information packet to the receiver; and after the receiver receives the information packet, the receiver unpacks the information packet, extracts and stores the shared information. The method realizes sharing the information in a non-common file format among the terminals supported by the Bluetooth technology.

Подробнее
25-06-2008 дата публикации

Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field

Номер: CN0101207477A
Принадлежит:

The invention discloses a cross-domain multi network keeper end-to-end session key negotiation method, which dynamically negotiates a best key negotiation method in the end-to-end communication through signaling execution flows of ARQ/ACF and LRQ/LCF based on that whether D-H key exchange algorithm and security strategy are supported by the network keepers. The method comprises the following steps: a called network keeper generates a sharing secret, a calling network keeper and a calling endpoint obtain the session key according to the sharing secret, and the calling network keeper and the called network keeper generate the session key by using the D-H key exchange algorithm, thereby the generation and the exchange of the sharing secret or the session key are carried out among each endpoint, thus the limits of low efficiency and bad interconnection and interoperability, which are caused by the fact that the key negotiation method is based on pre-configuration, are overcome under the prior ...

Подробнее
20-02-2008 дата публикации

Implementation method for concurrent execution of multiple services and mobile terminal using this method

Номер: CN0101127992A
Принадлежит:

The utility model discloses an implementation method for multi-service concurrent execution and the mobile terminal for implementing the method; wherein the mobile terminal is connected with a desktop system via a USB device. The method for realizing multi-service concurrent execution is as follows: the mobile terminal adopts a chip with a plurality of USB ports, the corresponding relationship between each business modules in the mobile terminal and the USB ports is set; whether each USB port receiving the data sent by the desktop system is monitored circularly; if received, then the data is sent to the business module corresponding to the USB port receiving the data; whether each business module reporting the data to the desktop system is monitored circularly, and if reported, the reported data is sent to the USB port corresponding to the business module reporting data for sending.

Подробнее