Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

187 results about "Function definition" patented technology

Method of decrypting and analyzing encrypted malicious scripts

Disclosed herein is a method of analyzing and decrypting encrypted malicious scripts. The method of the present invention comprises the steps of classifying a malicious script encryption method into a case where a decryption function exists in malicious scripts and is an independent function that is not dependent on external codes such as run time library, a case where a decryption function exists and is a dependent function that is dependent on external codes, and a case where a decryption function does not exist; and if the decryption function exists in malicious scripts and is the independent function that is not dependent on the external codes, extracting a call expression and a function definition for the independent function, executing or emulating the extracted call expression and function definition for the independent function, and obtaining a decrypted script by putting a result value based on the execution or emulation into an original script at which an original call expression is located. According to the present invention, unknown malicious codes can be promptly and easily decrypted through only a single decryption algorithm without any additional data. In addition to the decryption of encrypted codes, complexity of later code analysis can also be reduced by substituting constants for all values that can be set as constants in a relevant script.
Owner:AJOU UNIV IND ACADEMIC COOP FOUND

Static analysis based source code multi-versionfunction call relation difference identification method

The invention relates to a static analysis based source code multi-versionfunction call relation difference identification method. Firstly, information defined in a source code, like a function list and a static call relation between functions, is acquired through a source code static analysis technique; then source codes of two versions are chosen to carry out Diff, then the function definition list and the call relation that are acquired through static analysis are combined to identify the changed difference part, the state of the changed part is carefully analyzed, the change status, the new addition status and the deletion status defined and called by a function are respectively identified and put in storage, and finally, the call relation betweena single version and the call relation difference view of more versions are displayed in combination with the user need and the status data stored in a database. The internal call relation of single version is analyzed and displayed, and the call relation difference of more versions is also analyzed and displayed, so that an efficient auxiliary method is provided for the analysis, development, uploading and maintenance of open source software.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Method for implementing event call-back based on component interface in computer software system

The invention relates to a method of realizing event callback based on a component interface in a computer software system, which comprises that: a definition information of a callback interface and an event method in the callback interface of target component class is generated at service end, a callback function definition information corresponding to the event method in the callback interface of the component class is generated at client end, an object example of the target component class is established at service end, a correlation registration processing operation is carried through between the callback event of the object example of the target class at service end and the callback function at client end, the backcall event is excitated and the callback function registered in correlation with the callback event is called according to the operation of the object example of the target component class. By adopting the method of realizing event callback based on the component interface in the computer software system, the invention has simple and convenient realization, flexible operation, powerful function, stable and reliable performance and relatively wide application scope, as well as establishes a steady basis to the further development of the computer component software system.
Owner:上海科泰华捷科技有限公司

Automatic detection and correction method for array out-of-bound errors

The invention provides an automatic detection and correction method for array out-of-bound errors. The automatic detection and correction method comprises the following steps of selecting source codes to be transformed; utilizing a compiler to generate a symbol table and an abstract syntax tree of the source codes; traversing the abstract syntax tree, constructing a pointer dependence graph and carrying out transformation calculation on the source codes; carrying out replacement on partial source codes needing to be replaced in the source codes; writing into initial parts of the transformed source codes according to function definition generated by an array out-of-bound detection strategy and an array out-of-bound correction strategy; using the original compiler to compile the transformed source codes; deploying generated executable files to a target system for operation, automatically detecting and correcting the array out-of-bound errors, and accurately reporting the positions of the source codes corresponding to the errors. The automatic detection and correction method provided by the invention has the advantages that the error positioning function is more accurate, the efficiency and the performance in operation are better, and the error correction function in operation is more automated.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Fabric operation controller

The invention relates to a fabric operation controller, which is characterized by comprising a fabric operation and control interface and a control circuit, wherein the fabric operation and control interface comprises a function definition layer, an upper conductive fabric layer, an isolated barrier layer, a lower conductive fabric layer and a protective layer from up to down, the upper conductive fabric adopts the conductive fabric whose surface resistance is lower than 100omega, the lower conductive fabric layer adopts the conductive fabric whose surface resistance is 100omega to 50000omega, the isolation barrier layer adopts the isolation fabric with gate holes, the protective layer adopts a waterproof insulation textile material, the control circuit comprises an interface circuit, a data processing circuit and an output interface control circuit of the fabric operation and control interface, the control circuit and the electrodes on the upper and lower conductive fabric layers are electrically connected via fine wires. The invention uses pure fabric to form the man-machine operation control interface, to provide enough operation area in use and the fabric operation and control interface in idle can be folded freely to reduce volume effectively.
Owner:THE QUARTERMASTER EQUIPMENT RESEARCH INSTITUTE OF THE GENERAL LOGISITIC DEPARTME

Intelligent electricity terminal plug and play method based on self recognition

The invention discloses an intelligent electricity terminal plug and play method based on self recognition. The intelligent electricity terminal plug and play method based on the self recognition includes: connecting an intelligent electricity terminal into an intelligent electricity utilization automatic system; using a monitor master station of the intelligent electricity utilization automatic system to judge whether to follow an IEC61850 modeling standard, if yes, not acting, or if no, performing functional decomposition according to the IEC61850 modeling standard so as to obtain a logic device, a logic node and a data object according to function definition of the intelligent electricity terminal; building an IED information model; performing configuration through an IED configuration tool and a system configuration tool according to the IED information model so a to obtain ICD, CID and SCD configuration files, and then completing the configuration for IED; using wed service for mapping, and using an HTTP (hyper text transport protocol) to achieve communications. Accordingly, the intelligent electricity utilization automatic system can obtain login information of the intelligent electricity terminal, and a plug and play function of the intelligent electricity terminal and information interaction between the intelligent electricity terminal and the intelligent electricity utilization automatic system are achieved.
Owner:STATE GRID CORP OF CHINA +2

Interactive image segmentation method of android system

The invention provides an interactive image segmentation method of an android system. The interactive image segmentation method is a new method for extracting image foreground objects and includes the steps that an energy function definition of a traditional image segmentation algorithm is improved, a region item is canceled, and a boundary item is enhanced, so that the influence on a segmentation result by boundary item parameters is eliminated, and the improved method is realized on an android platform; on the android platform, the setting of iterations with the highest cost performance is obtained aiming at the influence on the segmentation accuracy by the iterations of the interactive image segmentation algorithm; by means of the iteration interactive image segmentation algorithm, aiming at certain conditions of inaccurate segmentation, an interactive correction link is added to ensure the accuracy of image segmentation, and extracted scenery bodies are integrated into other background images. Due to the improvement of the interactive image segmentation algorithm, the region item of an original energy function is eliminated, so that the calculation efficiency of the algorithm is improved, the improved algorithm is applied to the android platform, and a user can segment images on android equipment easily.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method for identifying number and size of wood veneer knots based on image processing

A method for identifying the number and size of wood veneer knots based on image processing comprises the steps that (a) images are collected; (b) the images are converted to gray images; (c) a gray valve corresponding to the one-dimensional maximum entropy is obtained according to an entropy function definition formula and is set to be a threshold value; (d) the images are subjected to binarization processing according to the threshold value, only the black color and white color are displayed, N primarily-selected knots are separated from a background, and N is larger than or equal to zero; (e) a morphological closed operation is used for eliminating insolated points outside the knots and peripheral interference features; (f) all primarily-selected knots are processed respectively, wherein the step (f) further comprises the steps that (1) contour points are searched for and judged if having communication areas, if not, the contours are filtered out, and if yes, a fitting ellipse is obtained and the next step can be executed; (2) the lengths of a major axis and a minor axis of the fitting ellipse and the ratio of the lengths are calculated, if the ratio is smaller than 0.5 or the ratio is larger than 2.0, the contour point is filtered out, and if the ratio is larger than 0.5 and smaller than 2.0, the next step is executed; (3) interference factors are filtered out according to the matching degree of all points of the communication area and the obtained fitting ellipse; (g) the number of the knots is counted, and the area of the largest knob is calculated.
Owner:INST OF WOOD INDUDTRY CHINESE ACAD OF FORESTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products