Patents Assigned to Chongqing University of Posts and Telecommunications
-
Publication number: 20220053405Abstract: The present invention relates to an IPv6 wireless sensor network node mobility management method based on RPL routing protocol. The present invention achieves the following: first, placing an RSSI in an ACK frame so as to detect the mobile state of a node and improve the accuracy of mobile detection; second, on the premise of compatibility with an original RPL routing protocol, improving the options for DIS and DAO in selecting the optimal parent node and updating a routing table; and finally, designing a cache method to prevent messages sent to the mobile node from being lost in the process of moving, and designing a new 6LoWPAN header so as to complete message caching.Type: ApplicationFiled: October 21, 2019Publication date: February 17, 2022Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Ping WANG, Chenggen PU, Yandan YIN, Zhao YANG
-
Publication number: 20220006684Abstract: The present application relates to a CoAP-based OPC UA message transmission method, comprising: packaging and encoding data by using an OPC UA information model; packaging an entire OPC UA data message into a load part of a CoAP message; then, on the basis of a UA-CoAP server, querying whether a CoAP-to-HTTP proxy server is present in a network; if present, transmitting a UA-CoAP data message to the CoAP-to-HTTP proxy server; converting the received data message into HTTP; and transmitting the data message to an OPC UA client. The present application solves the problem wherein data of a limited-resource industrial field device cannot be uniformly described and cannot be uniformly accessed, while the requirement of the industrial field device accessing a web service is satisfied.Type: ApplicationFiled: November 7, 2019Publication date: January 6, 2022Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Chenggen PU, Yi WANG, Ping WANG, Junrui WU
-
Publication number: 20210373537Abstract: Provided is a data security sharing method for multiple edge nodes to operate in a collaboration mode under an industrial cloud environment. The method includes: firstly, edge nodes that need collaborative computing separately applying for a shared key to an authority center; secondly, the authority center generating a shared key and issuing the key to each of the edge nodes applying for participation in the collaborative computing; again, the edge nodes combining industrial characteristics to generate an interference factor set, and adding different interference factors for different types of data; then, the data of the edge nodes is implemented with improved homomorphic encryption and is uploaded to an industrial cloud platform; and finally, the industrial cloud platform performing homomorphic analysis and computing on the data uploaded by each of the edge nodes, and issuing the data back to each of the edge nodes.Type: ApplicationFiled: April 27, 2018Publication date: December 2, 2021Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Min WEI, Jiuchao MAO, Ping WANG
-
Publication number: 20210266748Abstract: The present invention relates to an improved KNN-based 6LoWPAN network intrusion detection method. The present invention selects quantifiable security features which can reflect a self-security state of network elements of a 6LoWPAN network for training, and establishes a 6LoWPAN network feature space. The present invention assigns the weights to the features and transfers zero points, to alleviate the bias caused by large and small impact factors and simplify calculation; realizes construction and update of a state data table of network elements by extracting the feature data of network elements in real time, thus forming a normal contour updated according to the real-time state of the network in the feature space of the 6LoWPAN network based on the clustering effect of a KNN algorithm; and the present invention improves the KNN algorithm and redefines a basis for judging the invasion, to meet the requirements for 6LoWPAN network intrusion detection.Type: ApplicationFiled: June 5, 2019Publication date: August 26, 2021Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Min Wei, Yuan Zhuang, Tao Yang, Ping Wang
-
Patent number: 10964072Abstract: Implementations of the disclosure provide for methods, systems, and media for image reconstruction using metal artifacts reductions techniques. In some embodiments, a method for image reconstruction is provided, the method comprising: receiving a first computed tomography (CT) image and a second CT image; generating, by a processing device, a prior image based on the second CT image; generating a noise image based on the first CT image, wherein the noise image corresponds to metal artifacts in the first CT image; and reconstructing, by the processing device, the first CT image based at least in part on the prior image. In some embodiments, generating the prior image comprises: registering the first CT image and the second CT image to generate a registered image; and reducing noise artifacts in the registered image.Type: GrantFiled: March 16, 2016Date of Patent: March 30, 2021Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventor: Hongxing Qin
-
Publication number: 20210092153Abstract: The present invention relates to a DDoS attack detection and mitigation method for an industrial SDN network, and belongs to the field of network security. According to the method, by means of the cooperation between an east-west interface of an SDN controller in an industrial backhaul network and a system manager of an industrial access network, in conjunction with the features of the industrial backhaul network and an industrial access network data packet, a flow entry matching field of an OpenFlow switch is extended, and a flow table 0 is set to be a “flow table dedicated to DDoS attack mitigation” for defending against an attacking data flow in a timely manner. By using the SDN controller of an industrial backhaul network and a DDoS attack detection and mitigation system, an attacking data flow is identified and a DDoS attack source is found, and the policy of mitigating a DDoS attack is implemented by means of scheduling a system manager of the industrial access network.Type: ApplicationFiled: March 6, 2018Publication date: March 25, 2021Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Min WEI, Tao YANG, Jiuchao MAO, Qiaoyue PANG, Ping WANG
-
Publication number: 20210051050Abstract: The present disclosure provides a multi-carrier time-division multiplexing (MC-TDMA) modulation and demodulation method and system. Before multi-carrier modulation is performed on an input symbol, an interleaving allocation and an FFT may be performed, a time domain symbol may be transformed into a frequency domain symbol signal to perform a MDFT treatment. A sending end may adopt an analyzing filter bank structure, and pre-filtering and an IFFT may be performed on a signal successively. A pre-filter may be positioned between an NM point FFT and an M point IFFT, a PAPR value of the system may be reduced using the symmetry of a coefficient of a filter, and a frequency domain symbol signal may be allocated to different sub-bands for multi-carrier modulation.Type: ApplicationFiled: November 2, 2020Publication date: February 18, 2021Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Guangyu WANG, Qianbin CHEN, Kai SHAO, Ling ZHUANG
-
Publication number: 20200396637Abstract: The present disclosure disclosed a method of determining a buffer status report (BSR). The method comprises obtaining, by a user equipment (UE) from a buffer, data item to be sent; determining, by the UE, a size of the data item to be sent; determining, by the UE, a minimum number of required logical channel groups (LCGs) based on the data item to be sent; and determining, by the UE, at least one BSR with flexible length based on the size of the data item to be sent and the minimum number of the required LCGs. Information of the at least one BSR with flexible length includes the minimum number of the required LCGs, LCG identifiers (LCG IDs) respectively associated with the minimum number of the required LCGs, and at least one buffer area corresponding to the LCG IDs.Type: ApplicationFiled: August 31, 2020Publication date: December 17, 2020Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Ruyan WANG, Yaping CUI, Dapeng WU, Puning ZHANG, Shushan SI
-
Publication number: 20200396655Abstract: The present disclosure relates to systems and methods for a handover. The methods may include establishing a connection between a vehicle terminal and a first macro evolved Node B (MeNB) and a connection between the vehicle terminal and a secondary evolved Node B (SeNB), the vehicle terminal in a dual connectivity mode with the first MeNB and the SeNB; receiving, by the vehicle terminal, a handover command from the first MeNB; and disconnecting, based on the handover command, the vehicle terminal from the first MeNB and establishing synchronization between the vehicle terminal and a second MeNB, wherein the connection between the vehicle terminal and the SeNB is maintained. The SeNB is a secondary vehicle terminal meeting a preset condition or an SeNB installed at a fixed location.Type: ApplicationFiled: August 31, 2020Publication date: December 17, 2020Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Dapeng WU, Yaping CUI, Ruyan WANG, Feng ZHANG
-
Patent number: 10853925Abstract: Implementations of the disclosure provide for methods, systems, and machine-readable media for image processing. In some embodiments, a method for image processing includes: generating, by a processor, a first histogram and a first parameter set for a first image; constructing, by the processor, a model representative of a second histogram of a second image based on an adjustment parameter set and the first parameter set; generating the second histogram based on the model; and generating a second image based on the first image and the second histogram. In some embodiments, the first histogram is a two-dimensional histogram.Type: GrantFiled: August 2, 2018Date of Patent: December 1, 2020Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Bin Xiao, Guoyin Wang, Weisheng Li
-
Patent number: 10826742Abstract: The present disclosure provides a multi-carrier time-division multiplexing (MC-TDMA) modulation and demodulation method and system. Before multi-carrier modulation is performed on an input symbol, an interleaving allocation and an FFT may be performed, a time domain symbol may be transformed into a frequency domain symbol signal to perform a MDFT treatment. A sending end may adopt an analyzing filter bank structure, and pre-filtering and an IFFT may be performed on a signal successively. A pre-filter may be positioned between an NM point FFT and an M point IFFT, a PAPR value of the system may be reduced using the symmetry of a coefficient of a filter, and a frequency domain symbol signal may be allocated to different sub-bands for multi-carrier modulation.Type: GrantFiled: November 14, 2019Date of Patent: November 3, 2020Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Guangyu Wang, Qianbin Chen, Kai Shao, Ling Zhuang
-
Patent number: 10826533Abstract: A method for decoding a cyclic code is disclosed. The method includes: determining a plurality of syndromes for the cyclic code; determining, by a hardware processor, a first coefficient and a second coefficient based on the plurality of syndromes; determining, by the hardware processor, a third coefficient based on the second coefficient; and generating an error-locator polynomial based on the first coefficient, the second coefficient, and the third coefficient.Type: GrantFiled: November 2, 2015Date of Patent: November 3, 2020Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Yong Li, Hsin-Chiu Chang, Qianbin Chen, Trieu-Kien Truong
-
Patent number: 10742236Abstract: A method for decoding a (n, k, d) cyclic code is disclosed. The method includes: receiving a word corresponding to the cyclic code; constructing a look-up table, wherein the look-up table includes k syndrome vectors and k error patterns; computing a syndrome vector of the received word by a hardware processor; comparing the weight of the syndrome vector of the received word with an error-correcting capacity; decoding the received word by adding the received word and the syndrome vector if the weight of the syndrome vector of the received word is not more than the error-correcting capacity; decoding the received word by inverting bits in the message section in sequence and re-compute a syndrome vector of the inverted received word if the weight of the syndrome vector of the received word is more than the error-correcting capacity.Type: GrantFiled: November 2, 2016Date of Patent: August 11, 2020Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Yong Li, Hsin-Chiu Chang, Hongqing Liu, Trieu-Kien Truong
-
Publication number: 20200193578Abstract: A method for image processing, which comprises the following steps: Generating a first histogram from a first image; Calculating a first parameter profile from the first image indicative of the quality of the first image; Adjusting the first parameter profile to generate a second parameter profile; Using the second parameter profile to generate a statistical distribution via a statistical distribution generator, wherein the statistical distribution is characterized by at least three parameters; Using the statistical distribution to perform a histogram specification to the first histogram of the first image to generate a second histogram; Generating a second image based on the first image and the second histogram.Type: ApplicationFiled: February 21, 2020Publication date: June 18, 2020Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Guoyin WANG, Tong ZHAO, Bin XIAO
-
Patent number: 10635892Abstract: Aspects of the disclosure provide a method for display control. The method includes capturing, by a camera in a terminal device that is in use by a user, a first face image and a second face image of the user, extracting a first face fiducial of a characteristic point on a face of the user from the first face image and a second face fiducial of the characteristic point on the face of the user from the second face image, determining a face location offset value based on the first face fiducial and the second face fiducial, determining, based on the face location offset value, a display location offset value of content to be displayed on a display screen of the terminal device, and performing a display control of the content on the display screen according to the display location offset value.Type: GrantFiled: December 26, 2017Date of Patent: April 28, 2020Assignees: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Junwei Ge, Qingling Wang, Zhangqun Fan, Weiwei Zhang, Yuyan Cui
-
Publication number: 20200084078Abstract: The present disclosure provides a multi-carrier time-division multiplexing (MC-TDMA) modulation and demodulation method and system. Before multi-carrier modulation is performed on an input symbol, an interleaving allocation and an FFT may be performed, a time domain symbol may be transformed into a frequency domain symbol signal to perform a MDFT treatment. A sending end may adopt an analyzing filter bank structure, and pre-filtering and an IFFT may be performed on a signal successively. A pre-filter may be positioned between an NM point FFT and an M point IFFT, a PAPR value of the system may be reduced using the symmetry of a coefficient of a filter, and a frequency domain symbol signal may be allocated to different sub-bands for multi-carrier modulation.Type: ApplicationFiled: November 14, 2019Publication date: March 12, 2020Applicant: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Guangyu WANG, Qianbin CHEN, Kai SHAO, Ling ZHUANG
-
Patent number: 10541846Abstract: The present disclosure provides a multi-carrier time-division multiplexing (MC-TDMA) modulation and demodulation method and system. Before multi-carrier modulation is performed on an input symbol, an interleaving allocation and an FFT may be performed, a time domain symbol may be transformed into a frequency domain symbol signal to perform a MDFT treatment. A sending end may adopt an analyzing filter bank structure, and pre-filtering and an IFFT may be performed on a signal successively. A pre-filter may be positioned between an NM point FFT and an M point IFFT, a PAPR value of the system may be reduced using the symmetry of a coefficient of a filter, and a frequency domain symbol signal may be allocated to different sub-bands for multi-carrier modulation.Type: GrantFiled: March 31, 2015Date of Patent: January 21, 2020Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Guangyu Wang, Qianbin Chen, Kai Shao, Ling Zhuang
-
Patent number: 10352719Abstract: A parking space navigation method is provided. The method includes obtaining and displaying a parking space distribution map of a parking lot by using a mobile terminal; querying current existing vacant parking spaces of the parking lot from a server; marking the current existing vacant parking spaces on the parking space distribution map; determining a target vacant parking space from the marked current existing vacant parking spaces; obtaining, from the server, a first position of a terminal node associated with the mobile terminal when the terminal node is placed on a vehicle; and drawing, on the parking space distribution map, a navigation route from the first position to the target vacant parking space.Type: GrantFiled: June 15, 2016Date of Patent: July 16, 2019Assignees: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS, TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Jianjun Lei, Yuan He, Mingwei Xiao, Shengwen Luo, Huaming Wang
-
Patent number: 10306664Abstract: The present invention relates to a deterministic scheduling method oriented to an industrial wireless WIA-PA network, and belongs to the technical field of industrial wireless network communication. According to the deterministic scheduling method, in middle and small scale WIA-PA networks, a scheduling solution can be obtained using an optimal deterministic scheduling method based on a backtracking method by establishing a solution space tree for data stream scheduling after part or all of the solution space tree is searched, and an optimal success rate of the scheduling can be obtained; and in a large scale WIA-PA network, the time margin of each time slot is calculated for each data stream using a suboptimal deterministic scheduling method based on least slack first, the scheduling is prioritized according to the time margin, and a scheduling solution can be obtained in a short time at a higher success rate.Type: GrantFiled: July 1, 2016Date of Patent: May 28, 2019Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Heng Wang, Ping Wang, Peng Fei Chen, Hang Yang
-
Patent number: 10284359Abstract: The present invention claims a clock synchronization frequency offset estimation method adapted to a WIA-PA network, and belongs to the technical field of industrial wireless sensor networks. The method comprises the following steps: A. receiving a beacon frame, broadcast by a time source device, by a child node in the WIA-PA network in each time synchronization period to obtain a sending timestamp and a receiving timestamp, then adjusting a local time by taking a difference value between the two timestamps as a time adjustment quantity, repeating the process above, and after a plurality of synchronization periods, separately estimating a frequency offset with a statistical signal estimation method; and B. when anode is required to report its own time, compensating a node time with the estimated relative frequency offset.Type: GrantFiled: March 29, 2016Date of Patent: May 7, 2019Assignee: CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONSInventors: Ping Wang, Heng Wang, Haiyong Zeng