Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

44results about How to "Full excavation" patented technology

Monitoring method based on image features and LLTSA algorithm for tool wear state

ActiveCN107378641ARealization of wear status monitoringFully automatedMeasurement/indication equipmentsTime–frequency analysisTool wear
The invention relates to a monitoring method based on image features and an LLTSA algorithm for a tool wear state. According to the method, an image texture feature extraction technology is introduced into the field of tool wear fault diagnosis, and monitoring for the tool wear state is realized in combination with three flows of ' signal denoising', 'feature extraction and optimization' and 'mode recognition'. The method comprises the steps of firstly, acquiring an acoustic emission signal in a tool cutting process through an acoustic emission sensor, and carrying out signal denoising processing through an EEMD diagnosis; secondly, carrying out time-frequency analysis on a denoising signal through S transformation, converting a time-frequency image to a contour gray-level map, extracting image texture features through a gray-level co-occurrence matrix diagnosis, and then further carrying out dimensionality reduction and optimization on an extracted feature vector through a scatter matrix and the LLTSA algorithm to obtain a fusion feature vector; and finally training a discrete hidden Markov model of the tool wear state through the fusion feature vector, and establishing a classifier, thereby realizing automatic monitoring and recognition for the tool wear state.
Owner:NORTHEAST DIANLI UNIVERSITY

Social recommendation method based on multi-feature heterogeneous graph neural network

The invention discloses a social recommendation method based on a multi-feature heterogeneous graph neural network. The method comprises the following steps: extracting various attribute information of social network users and topics for coding; processing the user coding information and the topic coding information through a multi-layer perceptron to obtain initial feature vector representation of each user and topic; establishing a heterogeneous graph by taking users and topics as nodes, inputting the heterogeneous graph into a heterogeneous graph neural network, performing information transmission in the graph in combination with an attention mechanism, and updating feature vector representation; and performing similarity calculation on the user feature vectors, and selecting top-k users and top-k topics with the highest similarity with the user vectors for recommendation. Various types of attribute information of the users and the topics is extracted at the same time, the users and the topics serve as nodes at the same time to establish the heterogeneous graph, social information can be mined more comprehensively, information transmission and aggregation are carried out through the heterogeneous graph neural network, features of the users and interested topics of the users are deeply fused, and recommendation accuracy and user experience are improved.
Owner:JINAN UNIVERSITY

Security vulnerability assessment method, system and device for cigarette industry control system

ActiveCN106920022ALow costReal excavationResourcesComputer networkData stream
The invention provides a security vulnerability assessment method for a cigarette industry control system. The method comprises the steps of identifying data streams, and tagging data stream paths and stream directions of the data streams; classifying the data streams according to attributes of the data streams; analyzing an attack surface; judging whether the data streams have technical control measures corresponding to the data streams in the cigarette industry control system or not; if yes, judging whether equipment nodes on the data stream paths have security management measures corresponding to the equipment nodes or not; if yes, performing security vulnerability testing and analysis on key nodes on the data stream paths, performing statistics on security vulnerability points on the key nodes on the data stream paths, and compiling the security vulnerability points existent in the cigarette industry control system in a predetermined document format; and if the equipment nodes on the data stream paths do not have the security management measures corresponding to the equipment nodes, configuring the security management measures corresponding to the equipment nodes for the equipment nodes on the data stream paths, and if the data streams do not have the technical control measures corresponding to the data streams in the cigarette industry control system, configuring the technical control measures corresponding to the data streams for the data streams. According to the security vulnerability assessment method, the security vulnerability of the cigarette industry control system can be assessed more comprehensively and more accurately.
Owner:SHANGHAI TOBACCO GRP CO LTD

Physiological parameter measuring method based on multi-scale fusion network

The invention provides a physiological parameter measuring method based on a multi-scale fusion network. The method comprises the following steps of sampling physiological signals and generating a one-dimensional physiological signal data sequence; performing noise filtering on data fragments meeting the signal quality requirement through data fragment division and signal quality evaluation; performing mathematical transformation on the data fragments to generate a multi-dimensional input data tensor; extracting potential features from input data by utilizing the multi-scale fusion network to obtain estimated values of physiological parameters; by identifying a measurement mode identifier, taking a mean value of all the estimated values as a physiological parameter measurement value in a static mode; and taking a one-dimensional continuous data sequence formed by all the estimated values as a physiological parameter continuous measurement value in a dynamic mode. According to the method, complementary information of different scales in the signals can be fully extracted, accurate measurement of the physiological parameters is achieved, the application range of the method covers the measurement of all the physiological parameters, and the method has certain application value in the fields of cardiovascular disease research and signal processing research.
Owner:FUDAN UNIV

Combined cutterhead of rectangular top pipe heading machine

PendingCN109026047AIncrease area and strengthReduce resistanceTunnelsEngineeringFront edge
The invention discloses a combined cutterhead of a rectangular top pipe heading machine. The combined cutterhead comprises a rectangular cylinder. The outer edge of an excavation surface of the rectangular cylinder is provided with a peripheral guardrail which is arranged in a rectangular manner. Peripheral cutters are equidistantly welded at the front edge position of the peripheral guardrail. One circle of the excavation surface of the rectangular cylinder is provided with reinforcing blocks which are equidistantly welded on one circle of the excavation surface of the rectangular cylinder and are integrally formed with the inner wall of the peripheral guardrail. The middle part of the excavation surface and four hanging corners of the rectangular cylinder are respectively provided with amain installing hole and auxiliary installing holes. Through the combined design of the main cutterhead assembly and the auxiliary cutterhead assembly, an excavation area and excavation strength canbe enlarged; a main cutterhead assembly and an auxiliary cutterhead assembly have the same structure and respectively comprise a wheel hub and outer protecting ring; the axial position of the wheel hub is provided with a fish tail cutterhead; and through the fish tail cutterhead which projects in an axial direction, preliminary fragmentation excavation in a tunneling process of a pipe pushing jackcan be realized; and a pressure which is generated in a tunneling process can be shared through arranging a plurality of web plates.
Owner:淮南中泰矿山装备制造有限公司

Rolling bearing degradation index extraction method based on time-frequency feature separation

ActiveCN113567127ANon-stationaryEfficiently characterize degradation processesMachine part testingComplex mathematical operationsTime domainFrequency spectrum
The invention discloses a rolling bearing degradation index extraction method based on time-frequency feature separation. The method comprises the steps of firstly calculating a time-frequency spectrum of a bearing original signal, secondly, determining the number of maximum value points at the same moment and the number of maximum value points at the same frequency in the time-frequency matrix, determining the harmonic distribution position and range in combination with the line accumulation result of the time-frequency matrix, retaining a harmonic distribution area, filtering other areas, and performing inverse short-time Fourier transform on the processed time-frequency matrix to a time domain so as to realize extraction of harmonic components, after subtracting the harmonic component from the original signal, extracting the fault impact component through threshold noise reduction, and finally calculating the relative root-mean-square value of the extracted fault impact component to serve as a rolling bearing degradation index. According to the method, the prominent harmonic components in the time-frequency spectrum are filtered in advance based on the time-frequency characteristics so as to enhance the fault impact components, serious distortion generated when the impact components are extracted through threshold noise reduction is avoided, the rolling bearing degradation index is calculated for the extracted fault impact components, and the index can effectively represent the bearing degradation process.
Owner:XI AN JIAOTONG UNIV +1

Hidden community attribute acquisition method and system based on attention graph neural network

PendingCN113807978AFully retain the characteristics of community attributesExcavate accuratelyData processing applicationsNatural language data processingSocial mediaGraph neural networks
The invention discloses a hidden community attribute acquisition method based on an attention graph neural network. The method comprises the following steps: learning all vocabularies in a user social media data vocabulary library through a word vector model Word2vec network to obtain embedded representation vectors of all the vocabularies; performing normalization weighting on embedding representation vectors of user social media data vocabularies, and obtaining embedding representation of a target user based on a target embedding layer of a forward full-connection network; based on the user social network and the social activity information, generating embedded representations of neighbor users of the target user, and calculating a weight social matrix according to the embedded representations of the neighbor users; and training a social popularity weighted attention graph neural network according to the weight social matrix, and generating a hidden community attribute classification result of the target user by using the attention graph neural network and the embedded representation of the target user. The invention also provides a corresponding hidden community attribute acquisition system based on the attention graph neural network.
Owner:NO 709 RES INST OF CHINA SHIPBUILDING IND CORP

Intrusion detection method based on traceability graph

The invention discloses an intrusion detection method based on a traceability graph, and belongs to the field of computer system security, and the method comprises the steps: obtaining a traceability graph of a to-be-detected behavior, and calculating the node importance; rapid judgment and accurate judgment are carried out. In the rapid judgment stage, N1 nodes with high importance and corresponding K1 neighborhood nodes are selected, the traceability graph is converted into a first neighborhood matrix through a mapping rule, so that main body features of the traceability graph are rapidly extracted, if the difference m1 between the features and normal rule behaviors is larger than a threshold ThH during detection, intrusion behaviors are judged, and if the difference m1lt is larger than a threshold ThH, the traceability graph is judged to be intrusive behaviors; if so, judging that the behavior is normal; if yes, judging whether TLt; tilt; Tilt; if yes, entering a precise judgment stage: expanding a central node N2 (N2gt; n1) and a neighborhood node K2 (K2gt; (K1) scale, deeply mining the traceability graph, constructing a second neighborhood matrix and extracting features, if the difference between the features and normal rule behaviors is m < 2lt >; if Th, determining the behavior as a normal behavior, otherwise, determining the behavior as an abnormal behavior. According to the invention, intrusion detection can be efficiently and accurately realized.
Owner:HUAZHONG UNIV OF SCI & TECH

A Rolling Bearing Degradation Index Extraction Method Based on Time-Frequency Feature Separation

ActiveCN113567127BNon-stationaryEfficiently characterize degradation processesMachine part testingComplex mathematical operationsFrequency spectrumTime spectrum
A rolling bearing degradation index extraction method based on time-frequency feature separation. Firstly, the time-frequency spectrum of the bearing original signal is calculated; secondly, by determining the number of maximum points at the same time and maximum points at the same frequency in the time-frequency matrix, Determine the position and range of harmonic distribution based on the row accumulation results of the time-frequency matrix, retain the harmonic distribution area, filter out other areas, and inverse short-time Fourier transform the processed time-frequency matrix to the time domain to realize the extraction of harmonic components ; After subtracting the harmonic components from the original signal, the threshold value noise reduction is carried out to extract the fault impact components, and finally the relative root mean square value is calculated for the extracted fault impact components as the rolling bearing degradation index; the present invention pre-filters based on time-frequency characteristics The prominent harmonic components in the time spectrum are removed to enhance the fault impact components, avoiding serious distortion when threshold noise reduction is used to extract the impact components, and the rolling bearing degradation index is calculated for the extracted fault impact components, which can effectively characterize the bearing degradation process.
Owner:XI AN JIAOTONG UNIV +1

Perceptual Big Data Hierarchical Perception Compression Coding Method

The invention discloses a sensing big data hierarchical sensing compressed coding method. The sensing big data hierarchical sensing compressed coding method comprises steps that a sensing node is usedfor compressing and sampling of original data, and is used to transmit the data to a cluster head node; the cluster head node is used for the compressing and coding of the compressed and sampled datareceived from a lower layer and the data received from other cluster head nodes, and is used to transmit the data to a processing node by using a probability p; the processing node is used to code the data received from the lower layer and the data received from other processing nodes, and is used to transmit the coded data to an aggregation node by using the probability p; the aggregation node is used for decoding operation, and approximate original data is acquired. By combining with the network coding, the compressing sensing, and the hierarchical sensing theories, the space-time correlation of the sensing big data is fully excavated, especially the space-time correlation of the inter-cluster data is fully excavated, and therefore multi-resolution data service is provided for user of different types, and at the same time, an ideal hypothesis of sharing an observation matrix in advance is eliminated.
Owner:NANJING UNIV OF POSTS & TELECOMM

Security vulnerability assessment method, system and equipment for cigarette industrial control system

ActiveCN106920022BLow costReal excavationResourcesDocument formatData mining
The invention provides a security vulnerability assessment method for a cigarette industry control system. The method comprises the steps of identifying data streams, and tagging data stream paths and stream directions of the data streams; classifying the data streams according to attributes of the data streams; analyzing an attack surface; judging whether the data streams have technical control measures corresponding to the data streams in the cigarette industry control system or not; if yes, judging whether equipment nodes on the data stream paths have security management measures corresponding to the equipment nodes or not; if yes, performing security vulnerability testing and analysis on key nodes on the data stream paths, performing statistics on security vulnerability points on the key nodes on the data stream paths, and compiling the security vulnerability points existent in the cigarette industry control system in a predetermined document format; and if the equipment nodes on the data stream paths do not have the security management measures corresponding to the equipment nodes, configuring the security management measures corresponding to the equipment nodes for the equipment nodes on the data stream paths, and if the data streams do not have the technical control measures corresponding to the data streams in the cigarette industry control system, configuring the technical control measures corresponding to the data streams for the data streams. According to the security vulnerability assessment method, the security vulnerability of the cigarette industry control system can be assessed more comprehensively and more accurately.
Owner:SHANGHAI TOBACCO GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products