Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

114 results about "Adjacency list" patented technology

In graph theory and computer science, an adjacency list is a collection of unordered lists used to represent a finite graph. Each list describes the set of neighbors of a vertex in the graph. This is one of several commonly used representations of graphs for use in computer programs.

Adaptive self-healing protection method applied to distribution network containing hybrid switches

The invention discloses an adaptive self-healing protection method applied to a distribution network containing hybrid switches. The method comprises the following steps: dividing a region, and converting a regional topology into an adjacency list model; adaptively configuring intelligent terminal parameters in each region respectively according to the regional adjacency list model; performing periodic equipment self-check and communication mutual check; performing fault detection and fault type recognition; positioning and isolating a fault; recovering a non-fault line; recognizing an isolated power loss region and selecting an interconnection switch; recognizing the isolated power loss region and selecting the interconnection switch to be turned on or off according to the set arbitration rule, thereby completing load transfer; and updating the regional topology and the adjacency list thereof. The method can adaptively realize fault type recognition, fault positioning, fault isolation, non-fault regional line recovery and load transfer of the distribution network containing hybrid switches by using peer-to-peer communication and mutual cooperation of intelligent terminals, and has the characteristics of high fault positioning accuracy, high adaptive self-healing response speed and strong practicability.
Owner:HUNAN UNIV

Indoor emergency path navigation method

The invention discloses an indoor emergency path navigation method. The indoor emergency path navigation method comprises the steps of: deploying detecting nodes in an indoor scene corridor, deploying guide nodes at an intersection and an exit part; acquiring indoor scene nodes and path information through the detecting nodes and the guide nodes; acquiring position information of a starting point of a person and a dangerous point through the detecting nodes; building a path network diagram and storing by adopting a adjacency list data structure; determining a transferring target point of the person; limiting a search area within a rectangular area which takes the connecting line of the starting point and the target point as a diagonal to calculate the shortest path; expanding the search area to the minimum ellipse which comprises the rectangular area and takes the starting point and the target point as the two focal points and calculating the shortest path in the minimum ellipse; and according to the results of calculation, obtaining the shortest path. The indoor emergency path navigation method can be used for meeting the needs of emergency evacuation and navigation in emergency in public indoor spaces with large scales, complex spatial distribution and various types of people, such as hospitals, and is capable of reducing the time-space complexity, and improving the efficiency.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN)

Noumenon automatic generating system and method thereof based on thesaurus

The invention discloses a noumenon automatic generating system and a method of the noumenon automatic generating system based on a thesaurus. The noumenon automatic generating system and the method of the noumenon automatic generating system based on the thesaurus can automatically switch from the thesaurus to noumenon papers and comprises eight modules which include an analyzing module, a terminology and relation mapping module, a terminology and relation reconstitution module, a normative self-detection module, a noumenon papers upgrading module, a noumenon analyzing module,a noumenon deducing module and a terminology atlas constructing module. The noumenon automatic generating system provides an automatic ontology base generating system and a method of the.automatic ontology base generating system. A user does not need to manually edit terminology one by one and input faults of the user are reduced and efficiency is improved. Meanwhile, an adjacency list with a bidirectional structure is applied as a mapping list for terminology display for the first time, traditional forward atlas displaying and checking of relations among terms as well as backward atlas display and checking of relations among the terms are achieved on a terminology displaying layer. Checking relations among the terms are convenient for users. A single display manner is avoided and a search function is also supported so as to facilitate searching a term.
Owner:CHINA ACAD OF LAUNCH VEHICLE TECH

Tibetan language thesis copying detection method and Tibetan language thesis copying detection system based on Tibetan language sentence levels

The invention discloses a Tibetan language thesis copying detection method and a Tibetan language thesis copying detection system based on Tibetan language sentence levels. The Tibetan language thesis copying detection method includes: subjecting Tibetan language text characters to code conversion and noise removal preprocessing; segmenting a text into text blocks according to sentences through boundary identification of Tibetan language sentences and establishing a temporary table of segmented text blocks; extracting and computing text features from a sentence-document inverted index table and the temporary table according to the number of the sentences to obtain sentence similarity; establishing an adjacency list in accordance with the sentence similarity, computing text block similarity and detecting copying of two Tibetan language theses according to a text block similarity value. The Tibetan language thesis copying detection system comprises a Tibetan language thesis copying detection device and a database, wherein the Tibetan language thesis copying detection device is connected to a client terminal server through the Internet, and the database is connected to the server and used for storing Tibetan language theses. The Tibetan language thesis copying detection device comprises a preprocessing module for code conversion and noise removal of the text characters, a temporary table module for constructing the segmented text blocks, an extracting module for constructing sentence text features and a copying detection module for detecting whether the theses have similar copied data or not.
Owner:QINGHAI UNIV FOR NATITIES

Topological observability analytical method based on adjacency list with injection measurement boundary nodes

The invention discloses a topological observability analytical method based on an adjacency list with injection measurement boundary nodes, which belongs to the technical field of operation and control of electric systems. The method includes the steps: firstly, forming initial measurement islands, namely using branch power flow measurement to form the initial measurement islands which form an integral electric network, wherein isolated nodes connected with no branch power flow measurement also need to be treated as independent initial measurement islands; secondly, forming the adjacency list with injection measurement boundary nodes, and combining the initial measurement islands through the adjacency list with injection measurement boundary nodes; thirdly, forming networks to be combined, and judging integral observability of the networks to be combined through the adjacency list with injection measurement boundary nodes; fourthly, combining the measurement islands which are integrally unobservable but locally observable in the networks to be combined; and fifthly, generating a pseudo measurement configuration scheme to prepare for state estimation. The topological observability analytical method has the advantages that pseudo measurement configuration is reduced, and precision of state estimation results is improved. Further, the pseudo measurement configuration is low in algorithm complexity and high in efficiency.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Gateway realization method for converting Ethernet data and digital video streaming

The invention provides a gateway realization method for converting Ethernet data and digital video streaming. The method comprises the following steps: format of network data and format of television video streaming data are mutually converted, namely, interconversion between IP packet and MPEG-2 TS streaming; an embedded processor adopts combination of double buffering configuration and single buffering configuration and configures a boot operation script so that the two configurations are converted from one to another; the double buffering configuration evens flow rate at an IP processing layer and processes each buffer area by a plurality of threads; the single buffering configuration adopts a mode of data buffering under a driving procedure state; an upper layer application program of an embedded system adopts a self-adaptive adjacency list method to automatically acquire the adjacency list in respective network segment and send the adjacency list to an opposite terminal to be converted; IP packet packaging thread and TS unlocking thread realize interconversion from IP format to TS format; and TS receiving thread and TS sending thread execute a complete reverse function in the embedded system. The two sides of wireless equipment can use IP address of the same net segment or the different network segments to work and realize long-distance bidirectional transmission or long-distance unidirectional transmission.
Owner:BEIJING UNIV OF CHEM TECH

Flash memory secure deletion method and system based on file-level granularity

ActiveCN107037988AReduce the impact of read and write performanceSecure Delete EfficientInput/output to record carriersFile allocationGranularity
The invention discloses a flash memory secure deletion method based on file-level granularity and belongs to the field of computer storage. According to the method, a globally unique identifier (GUID) is distributed for each file, each GUID is encapsulated to each writing request and each deletion request of the corresponding file, and meanwhile a GUID-page adjacency list is constructed and used for recording invalid physical pages corresponding to each file in real time; and when a user deletes a certain file, equipment can find all the invalid physical pages and all valid physical pages corresponding to the file through a deletion command, and then a physical page overwriting technology is used for overwriting all the physical pages of the file to achieve the purpose of deleting the file securely. The invention furthermore discloses a flash memory secure deletion system based on file-level granularity. Through the technical scheme, the problem that a single file cannot be deleted efficiently and securely through an existing solid-state disk based on a flash memory medium is solved, and influences of secure deletion on read-write performance are reduced on the basis of securely deleting a single file through the solid-state disk.
Owner:HUAZHONG UNIV OF SCI & TECH

Configuration loading method and system

The invention discloses a configuration loading method and system. The method comprises the steps of receiving configuration information input through an interface; generating configuration objects according to the configuration information, allocating unique sequence numbers to the configuration objects and determining a dependency relationship among the configuration objects; storing all the configuration objects and the dependency relationship among the configuration objects in an adjacency list form, and obtaining a first adjacency list; traversing the first adjacency list to obtain a loading sequence of the configuration objects; and loading the configuration objects in sequence according to the loading sequence. Through a universal loading framework, the configuration information is abstracted to the configuration objects, the configuration objects and the dependency relationships among the configuration objects are stored by using the adjacency list, automatic loading of the configuration objects is driven by traversing the adjacency list, and the loading sequence is ensured, so that configuration loading management and loading process structuring and automation are realized, the dependency relationship is describable, and the readability and maintainability are improved; and the framework is separated from a business, so that cross-component universality is realized and the expandability is enhanced.
Owner:CHINANETCENT TECH

Cable network branch diagram manufacturing method based on topological graph automatic layout

The invention provides a cable network branch diagram manufacturing method based on topological graph automatic layout. The method includes the following steps of browsing a cable network model structural tree and reading three-dimensional cable network model information to obtain all cable wire harness information (2) of a cable network model, and browsing all branches for a certain cable to obtain information of two ports of the cable and the length information; thirdly, browsing a connecting relation list, and establishing an adjacency list; fourthly, arranging all vortexes on grid points through the combination of tree-shaped layered layout and mesh layout, and calculating the actual positions of the nodes in the page according to the grid positions of nodes and the size of the page; fifthly, folding up branch diagrams; sixthly, browsing all the nodes on a trunk, doing different movements according to the types of the nodes so that no crossing or overlapping happens to drawing of the branch diagrams; seventhly, marking the length of connecting cords of the branch diagrams; eighthly, sequentially drawing other cable branch diagrams, and outputting the branch diagrams drawn in batches into a file for guiding production.
Owner:CHINA ACADEMY OF SPACE TECHNOLOGY

Method and system for mining risk propagation path based on knowledge graph

The invention belongs to the technical field of financial data risk analysis, and relates to a method and system for mining a risk propagation path based on a knowledge graph. The method comprises thesteps: constructing the knowledge graph; extracting an adjacency matrix under each financial relationship according to the constructed knowledge graph; calculating a risk transfer probability by using a random walk algorithm to obtain a risk transfer probability matrix n, substituting the n financial relationships into a calculation formula of the risk transfer probability matrix n to obtain a risk transfer probability matrix n of the n financial relationships, and summing and averaging the obtained risk transfer probability matrix n to obtain a matrix I; establishing an adjacency list, and directly querying the risk propagation path in the adjacency list. The core concept of the knowledge graph is entities and relations, the relations between the entities are stored in a triple mode, andthe entities of different levels and the relations of different types can be integrated in one system. Through the relationship between entities such as companies and people, the problem is analyzedand solved more comprehensively from the global perspective.
Owner:民生科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products