Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Shrink state space" patented technology

Parallelization security hole detecting method based on function call graph

The invention relates to a parallelization security hole detecting method based on a function call graph, which is characterized in that a function set to be detected is determined by analyzing the function call relation in a C language module, instrumentation and assert analysis are performed for the function set by means of the preprocessing technology, and then security holes of a program are detected by the aid of model checking and the parallelization technology. The method mainly includes the steps: generating the function relation call graph, and determining C function information to be detected by analyzing the function relation call graph; extracting attribute information of a buffer area related to C program source codes by the aid of the constraint analysis technology, and inserting corresponding ASSERT statement information in a variable declaration, an assignment and a function call point by means of the attribute information of the buffer area; and performing accessibility judgment for the instrumented codes, and analyzing whether a dangerous point in the program includes an accessible path to discover the security holes in the source codes or not. The method detects the security holes such as buffer area overflow and the like by combining the constraint analysis static detecting technology, model checking and the parallelization technology, and the detecting precision of the method is higher than that of the general static detecting technology.
Owner:BEIHANG UNIV

High-extensibility and high-maintainability source code defect detection method and device

InactiveCN101937388AHighly scalableStrong maintainabilitySoftware testing/debuggingModularityCompiler
The invention provides a high-extensibility and high-maintainability source code defect detection method and a high-extensibility and high-maintainability source code defect detection device. The method comprises the following steps of: (1) converting a source code which is configured by a user and needs to be detected into an abstract syntax tree and a control flow chart and transmitting the abstract syntax tree and the control flow chart into an analytical engine; (2) performing flow-insensitive analysis on the source code according to the abstract syntax tree and the control flow chart, submitting an analysis result to a defect reporting module, and entering a step 3 to perform path-sensitive analysis; (3) performing various types of path-sensitive modeling and analysis on the source code to generate original defect information according to the abstract syntax tree and the control flow chart; and (4) reducing and simplifying a defect path and reporting the defect path to the user according to the original defect information. The device comprises three functional modules, namely a compiler front end, the analytical engine and the defect reporting module. The invention aims to provide the source code defect detection method and the source code defect detection device which have the characteristics of high extensibility, high maintainability, modularization and the like.
Owner:UNKNOWN

High-extensibility and high-maintainability source code defect detection method and device

The invention provides a high-extensibility and high-maintainability source code defect detection method and a high-extensibility and high-maintainability source code defect detection device. The method comprises the following steps of: (1) converting a source code which is configured by a user and needs to be detected into an abstract syntax tree and a control flow chart and transmitting the abstract syntax tree and the control flow chart into an analytical engine; (2) performing flow-insensitive analysis on the source code according to the abstract syntax tree and the control flow chart, submitting an analysis result to a defect reporting module, and entering a step 3 to perform path-sensitive analysis; (3) performing various types of path-sensitive modeling and analysis on the source code to generate original defect information according to the abstract syntax tree and the control flow chart; and (4) reducing and simplifying a defect path and reporting the defect path to the user according to the original defect information. The device comprises three functional modules, namely a compiler front end, the analytical engine and the defect reporting module. The invention aims to provide the source code defect detection method and the source code defect detection device which have the characteristics of high extensibility, high maintainability, modularization and the like.
Owner:UNKNOWN

Adaptive signal control method and system based on reinforcement learning and phase competition

The invention relates to a self-adaptive signal control method and system based on reinforcement learning and phase competition, and the method comprises the steps: obtaining an intersection state through interaction with a simulation environment, obtaining a decision through the output of a strategy network pi theta, collecting rewards and a state at a next moment after the decision, and obtaining a sample simulation track; and training and parameter updating are performed on the PPO network based on the simulation trajectory, and the operation is repeated for a plurality of rounds until convergence. And after convergence, the model can perform signal adjustment and signal control based on the real-time state of the traffic flow. The method can be suitable for different intersections while ensuring the signal control effect. The method can be widely applied to the field of urban traffic signal control.
Owner:TSINGHUA UNIV

Energy-saving fluidized bed type jet mill

The invention relates to the technical field of fluidized bed type jet mill equipment, and provides an energy-saving fluidized bed type jet mill. The mill comprises a base, a plurality of circulating petals and a classifier. A first crushing cavity is formed in the base; the plurality of circulating petals are distributed on the base circumferentially in an array manner with the axis of the base as the rotating axis, and second crushing cavities are formed in the circulating petals; the first crushing cavity is communicated with the second crushing cavities; the classifier is arranged at the axis of the base; a first crushing nozzle assembly which is horizontally arranged is arranged in the first crushing cavity; flow guide islands are arranged in the second crushing cavities, the flow guide islands and the circulating petals form a flow guide channel, and a second crushing nozzle assembly is arranged in an air inlet channel of the flow guide channel; and an air outlet of the flow guide channel faces the working face of the first crushing nozzle assembly. Under the action of the second crushing nozzle assembly, the flow guide channel forms circulating air flow along the air inlet channel, the air outlet and the first crushing cavity; and according to the jet mill, materials can be efficiently crushed, and compared with traditional fluidized bed type airflow crushing equipment, the jet mill has better energy-saving and environment-friendly effects.
Owner:四川瑞驰拓维机械制造有限公司

A Runtime Error Analysis Method Based on Abstract Interpretation and Model Validation

The invention discloses a runtime error analytical method based on abstract interpretation and model verification. The method includes the following steps that on the basis of the abstract interpretation theory, the program numerical variable value range is analyzed by the adoption of a forward iteration method, the variable value range information is obtained when program points are stable, and the iterative computations of loop nodes are achieved by the way that loop unrolling and delay widening are combined; the variable value range information at the relevant program points needing to be detected is converted to be in an assertion or hypothesis mode to be plugged into a program according to a runtime error type to be analyzed; the assertion or hypothesis programs are converted into a Boolean formula, wherein the Boolean formula comprises limiting conditions and attributes; the correctness of the attributes in the Boolean formula is judged through an SAT verifier, if correct, it shows that relevant runtime errors do not exist, if not correct, it shows that the relevant runtime errors exist, and relevant counter example paths are output. By means of the method, an equilibrium point is acquired between runtime error analysis precision and efficiency.
Owner:中国航天系统科学与工程研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products