Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1389 results about "Adjacency matrix" patented technology

In graph theory and computer science, an adjacency matrix is a square matrix used to represent a finite graph. The elements of the matrix indicate whether pairs of vertices are adjacent or not in the graph.

Electroencephalogram feature extracting method based on brain function network adjacent matrix decomposition

InactiveCN102722727AIgnore the relationshipIgnore coordinationCharacter and pattern recognitionMatrix decompositionSingular value decomposition
The invention relates to an electroencephalogram feature extracting method based on brain function network adjacent matrix decomposition. The current motion image electroencephalogram signal feature extraction algorithm mostly focuses on partially activating the qualitative and quantitative analysis of brain areas, and ignores the interrelation of the bran areas and the overall coordination. In light of a brain function network, and on the basis of complex brain network theory based on atlas analysis, the method comprises the steps of: firstly, establishing the brain function network through a multi-channel motion image electroencephalogram signal, secondly, carrying out singular value decomposition on the network adjacent matrix, thirdly, identifying a group of feature parameters based on the singular value obtained by the decomposition for showing the feature vector of the electroencephalogram signal, and fourthly, inputting the feature vector into a classifier of a supporting vector machine to complete the classification and identification of various motion image tasks. The method has a wide application prospect in the identification of a motion image task in the field of brain-machine interfaces.
Owner:启东晟涵医疗科技有限公司

Financial network unusual transaction community finding method based on information entropy

The invention discloses a financial network unusual transaction community finding method based on information entropy. The method includes the specific steps of firstly, analyzing the process and the mode of an unusual transaction, and extracting features of block transactions and suspicious transactions; secondly, storing transaction amounts and traction frequency information of accounts through an adjacent matrix so as to quantize the features; thirdly, defining the information entropy of nodes; fourthly, conducting community division and finding on the financial network nodes according to the financial network unusual transaction community finding method based on the information entropy; fifthly, evaluating the community finding result. Firstly, accuracy of unusual transaction account identification and unusual transaction communication division which are achieved according to the method is calculated, and then the structure of the unusual transaction community is evaluated through the community evaluation index modularity Q. The community finding method based on the information entropy is applied to the anti-money laundering field for the first time, the money laundering accounts can be identified and tracked by finding the unusual transaction community, and unusual transactions can be prevented by analyzing the relations and the transaction laws between money laundering accounts.
Owner:XIAN UNIV OF TECH

Test program control stream path set creation method based on base path

The invention pertains to a path testing in a program testing. The concept of a program control flow base path is defined through bringing in the concept of base in mathematics, a data structure showing a program structure of a source program slice is obtained by using a compiler module first; then through traversing the data structure, a control flow path generating algorithm is utilized to generate a subset compiler module of a program control flow path which is based on a base path to interpret the semanteme on a tested source program, an abstract syntax tree structure showing the structural information of the tested program control flow is output. An adjacency matrix of a control flow graph generates a module ergodicity abstract syntax tree structure, and generates the adjacency matrix representation of a program flow chart. A control flow path subset generating module acquires the control flow information of the tested program through traversing the adjacency matrix, traverses the adjacency matrix by adopting a depth-first multiple backtracking method, and processes sentence nodes, thus a program control flow path subset based on the base path is generated. The method has the outstanding advantages in generating results and flows, and can be widely used in the engineering practice of a path cover testing in a software structure testing.
Owner:SICHUAN UNIV

Network security evaluation device based on attack graph adjacent matrix

The invention provides a network security evaluation device based on an attack graph adjacent matrix. The network security evaluation device comprises an information collection device, an atom attack graph generation device, a matrix calculation device, a network safety analyzing device and a result appearing device, wherein the information collection device is used for collecting all information in a network; the atom attack graph generation device is used for generating an initial atom attack graph between a main engine pair needed for carrying out subsequent analysis on network safety; the matrix calculation device is used for converting the generated atom attack graph into the corresponding adjacent matrix and is also used for calculating a corresponding iteration matrix of the adjacent matrix through setting iteration times; the network safety analyzing device is used for obtaining information including a key main engine, a key path and the like on the basis of the finally-generated iteration matrix; the result appearing device is used for visually appearing the found key main engine and key path and a network vulnerability index. The network security evaluation device disclosed by the invention is high in efficiency and is suitable for large-scale and high-speed networks. The network security evaluation device can improve the instantaneity of evaluating a target network. The evaluation accuracy rate is high, and the key path and the key main engine can be accurately recognized. The visualization degree is high so that the network security evaluation device is convenient for a manager to check, analyze and maintain.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Deep learning model based on multi-scale network and application in brain state monitoring

A deep learning model based on a multi-scale network and application in brain state monitoring are provided. A model establishing method comprises steps of: preprocessing and multi-scale transforming a measured multichannel signal; obtaining a multi-scale weighted recursive network and a cross-recursive rate matrix corresponding to the multi-scale weighted recursive network of the multichannel signal in all scales; extracting the network indexes of the multi-scale weighted recursive network at different scales; at each scale, retaining relatively large elements in the cross recursive rate matrix and obtaining an unweighted adjacent matrix and a multi-scale unweighted recursive network corresponding thereto; for each value of a variable in the set range, obtaining the multi-scale unweighted recursive network and the adjacent matrix corresponding to the multi-scale unweighted recursive network, extracting the network indexes of the multi-scale unweighted recursive network at different scales, calculating the integral of the network indexes when the variable is changed in the set range, and the integral as the final network index of the multi-scale unweighted recursive network under each scale; and training the deep learning model and monitoring a brain state.
Owner:钧晟(天津)科技发展有限公司

Multi-rate opportunistic routing method for wireless mesh network

The invention provides a multi-rate wireless mesh network routing method for opportunistic forwarding based on characteristics of radio broadcasting, which comprises the following steps: after a node transmits data, a plurality of nodes are selected as forwarding nodes; in the early stage of network setup, the nodes acquire a direct link delivery fraction via probe packets and set up an adjacency relation; an adjacency matrix of the total network is set up by using link status packets to switch link information; a node forwarding probability analysis system model is used to deduce a measurement (integrated transmission number) applicable to the presence of arbitrary paths, and a forwarding node selection strategy and a forwarding strategy are established on the basis of the integrated transmission number; the optimal path algorithm is used to select a major path, the nodes closer to the destination node than the source node can be selected into a forwarding list, and the forwarding nodes can be confined to the vicinity of the major path according to a certain screening rule; the forwarding node closest to the destination node is set to have the highest forwarding priority, and the forwarding priority is lowered with the increase of the distance from the destination node; and the destination node transmits an end-to-end response to the source node based on a certain rule to inform the source node of the number of the received packets, and the source node performs adaptive regulation on the transmission rate according to the data.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Software defect prediction method for open source software defect feature deep learning

The invention provides a software defect prediction method for open source software defect feature deep learning, and belongs to the technical field of software engineering. The method comprises the steps of collecting open source software defect information, constructing a software defect database, and generating an abstract syntax tree from source codes; pruning the abstract syntax tree by usinga community detection algorithm to obtain a defect sub-tree, establishing an information corpus of the defect sub-tree in combination with the repair description, the project basic information and the source code, extracting theme words from the information corpus, converting the theme words into vector representation, and taking the vector representation as attributes of nodes in the defect sub-tree; finally, establishing a software defect prediction model of the convolutional neural network based on graph classification, expressing the defect subtree as an adjacent matrix and an attribute matrix to serve as input of the model to train the convolutional neural network, and recognizing whether the source code of the to-be-predicted software module has defect tendency or not. According tothe method, the defect depth features are directly extracted from the structured software codes by using a deep learning method, so that a better defect recognition effect can be achieved.
Owner:BEIHANG UNIV

Reliability evaluation method of urban road network based on data of floating vehicles

InactiveCN104392094AAvoid reliability pitfallsAchieve the purpose of evaluationDetection of traffic movementSpecial data processing applicationsRoad networksTraffic flow
The invention discloses a reliability evaluation method of an urban road network based on data of floating vehicles. The method comprises the following steps of applying the data of the floating vehicles, and combining with a geological information system technique to obtain traffic flow data of the road network; using the traffic flow data as road section weights, and combining with an adjacent matrix of the road network to generate a directed weighting complicated road network file; applying complicated network simulation software to output complicated network feature parameters corresponding to different moments of the road network, and finally building a reliability evaluation model of the directed weighting road network; substituting the outputted complicated network feature parameters to calculate, so as to obtain a final reliability evaluation value. The method has the advantages that the data of the floating vehicles and a complex network theory are combined to evaluate the reliability of the urban road network from a macro perspective, the traffic flow features of dots, lines and planes of the road network are integrally researched, the defect of the reliability evaluation of the road network from a micro dynamics perspective is effectively overcome, and the reliability evaluation of the urban road network is more perfect.
Owner:BEIHANG UNIV

Relation extraction method and system based on attention cycle gated graph convolutional network

The invention relates to a relation extraction method and system based on an attention cycle gated graph convolutional network, and the method comprises the steps of carrying out the semantic dependency analysis of a statement, enabling word embedding to be connected with a position feature, and obtaining a final word embedding representation; constructing a BLSTM network layer, and extracting a word context feature vector; applying an attention mechanism to the dependency tree to obtain a soft adjacency matrix of a fully connected graph with weight information; transmitting the word context feature vector and the soft adjacency matrix into a gated graph convolutional network, and extracting a high-order semantic dependence feature to obtain vector representation of a statement; and extracting vector representations of the two marked entities, splicing the extracted vector representations of the two marked entities with the vector representation of the statement, transmitting the spliced vector representation of the statement into a full connection layer of the gated graph convolutional network, calculating the probability of each relationship type and predicting the relationship type, and finally obtaining the relationship type of the statement. According to the invention, key information loss is avoided, and the relationship extraction performance is improved.
Owner:JIANGNAN UNIV

Social network event detection method and device

The invention provides a social network event detection method and device, and the method comprises the steps: taking a push text and a label extracted from a data set as nodes, and constructing a social network event heterogeneous graph; constructing a semantic view based on text contents of a push text and a label in the heterogeneous graph, and obtaining a feature matrix and a weighted adjacency matrix of the semantic view; constructing a time distribution view based on the push-texts in the heterogeneous graph and the time of the push-texts, and obtaining a feature matrix and a weighted adjacency matrix of the time distribution view; inputting the feature matrix and the weighted adjacency matrix of the semantic view , and the feature matrix and the weighted adjacency matrix of the timedistribution view into the GCN; and in combination with an attention mechanism, guiding feature fusion of the semantic view and the time distribution view by adopting a label, generating an attentiondistribution probability of the text semantic view and the time distribution view under a given label, obtaining a probability that each node in the heterogeneous graph belongs to an event in the data set, and realizing prediction of the nodes. According to the social network event detection method provided by the embodiment of the invention, the detection effect of the social network event is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method for carrying out community detection on heterogeneous social network on basis of clustering algorithm

Provided is a method for carrying out community detection on a heterogeneous social network on the basis of a clustering algorithm. The method comprises the steps that an adjacent matrix is built; the community structure is initialized; the local modularity is calculated; a set of mark numbers of communities participating in fusion is obtained; candidate fusion sets are obtained; differences of the modularity are calculated; whether the first modularity difference and the second modularity difference meet the fusion standard or not, if yes, the mark numbers of the communities participating in fusion and the mark numbers of candidate communities are unified, and if not, the step of calculation of the local modularity is executed again; a new community structure is recorded; if community merging does not exist in the current cycle, the optimal community structure is output. According to the method for carrying out community detection on the heterogeneous social network on the basis of the clustering algorithm, due to the fact that the clustering method, the similarity vector method and the local modularity method are adopted, the methods can be effectively applied to community detection of the heterogeneous social network, and accuracy of the detection result of the heterogeneous network community structure is improved.
Owner:XIDIAN UNIV

Fast generation method for wireless cell coverage distribution

ActiveCN101541013AIgnoring factors that cover less influentialEfficiently obtainedNetwork planningLongitudeAdjacency relation
The invention belongs to a fast generation method for wireless cell coverage distribution in the field of mobile communication. The method is realized through the following steps: collecting effective base-station information; collecting target-boundary information; analyzing and filtering the collected information so as to determine effective base stations and wireless cells; estimating the regional coverage of each wireless cell, finishing and outputting the estimated regional coverage of each wireless cell in a coordinate mode; calculating the coverage adjacency relation between each wireless cell and the surrounding wireless cells thereof according to the estimated regional coverage of each wireless cell, and generating an adjacency matrix of base-station adjacency relation; adopting smoothing algorithm to accurately calculate the coverage boundaries of the wireless cells; and generating a wireless-cell closed coverage boundary with continuous coordinate points taking latitude and longitude as a unit. The method is simple to realize, can fast and effectively generate multilevel actual coverage-distribution fitting graphs of wireless cells, base stations, base-station controllers and mobile switches, and can be widely applied to GIS application analysis, mobile network optimization and other fields.
Owner:CHINA MOBILE COMM CORP TIANJIN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products