Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

82 results about "Graph mapping" patented technology

Automatic service generating system and automatic service generating method both of which are based on imaging service scene and field template

The invention discloses an automatic service generating system and an automatic service generating method both of which are based on an imaging service scene and a field template. The automatic service generating system comprises a browser, a server and a database. When customizing software or a service, the user drags a graph tag in a graphic interface of the browser firstly and then establishes an application scenario of the software or the service. The system analyzes the application scenario into two description files including a service procedure and a user demand through a graph mapping library, finds the field template meeting the requirement of the user in a field template library through the analyzing result and carries out dynamic customization or extension on the field template. Through searching and testing, components which are found in a component library and can achieve the setting purpose are added into the field template which is customized and includes the software or the service procedure structure and the service description information of the service procedure structure, and the process of generating the software/the service is achieved. At last, the testing and deployment are carried on the generated software/the service to enable the user to be accessed to or to use the customized software or the service. The automatic service generating system is easy and convenient to operate and maintain, and the user coverage is wide.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Block adaptive type Cartesian grid rapid graph mapping method and system

The invention discloses a block adaptive type Cartesian grid rapid graph mapping method and system, and the method comprises the following steps: S1, after an MPI environment is initialized, importing geometric data of a distributed block adaptive type Cartesian grid into each processor so as to reconstruct a multi-way tree structure, and building a link relation of adjacent hierarchical nodes; S2, sharing node geometric information at a region decomposition boundary across processors, and storing the node geometric information in a corresponding virtual node data container; S3, constructing a local geometric topology of each leaf node on the current processor; S4, normalizing the completely overlapped geometric elements on each processor; S5, based on cross-processor query operation, establishing dynamic communication mapping of docking surface elements at the region decomposition boundary; and S6, exporting the non-structural polyhedron computational grids in parallel on each processor. The problems that in the prior art, a self-adaptive geometric module and a physical field numerical simulator are difficult to fuse, and the dynamic geometric data format conversion efficiency is low are solved.
Owner:CALCULATION AERODYNAMICS INST CHINA AERODYNAMICS RES & DEV CENT

Switch data anomaly detection method based on vector autoregression model

The invention discloses a switch data anomaly detection method based on a vector autoregression model, and relates to the technical field of communication processing. Aiming at the defects of an existing anomaly detection method, the adopted technical scheme comprises the steps of obtaining operation behavior data of a login user in a switch in real time, and storing the operation behavior data ina data set; performing graph mapping on the operation behavior data contained in the data set, and converting the operation behavior data into a symbolic graph; for the symbolic graph, introducing analgorithm with a vector autoregression model to carry out anomaly detection, and carrying out analysis by utilizing a Granger causality; according to an analysis result, identifying abnormal points in the symbolic graph, and determining that the operation of the user belongs to an attack behavior; and locking the user, feeding a locking result back to the switch control part, and enabling the switch control part to cancel the operation authority of the user and take countermeasure. According to the method, improper behaviors of operation can be discovered in advance, wrong identification of normal users is avoided, and security holes in the industrial Internet are filled in a targeted manner.
Owner:SHANDONG INSPUR SCI RES INST CO LTD

PCB image color migration device and method based on clustering analysis

The invention provides a PCB image color migration device and method based on clustering analysis, and the device comprises an image collection module which obtains a source image and a target image;a RGB color image acquisition module which is used for respectively acquiring RGB color images converted from the source image and the target image; a color space conversion module which converts theRGB color image into an LAB color image; a color clustering module which is used for setting and clustering the LAB color images by utilizing the number of color clusters to generate a color cluster category list; a color cluster matching module which performs PCB bipartite graph matching on the list of the source image and the target image to obtain a matching result; a color mapping module whichcalculates a transformation matrix according to a matching result, and maps the LAB color image to a new color according to the matrix; and a color space inverse transformation module which convertsthe mapped color into an image after RGB color migration. According to the device, colors in an image are divided into different categories by clustering, color migration is carried out on the colorsof the different categories respectively, and a good image registration effect is achieved.
Owner:TSINGHUA UNIV

Transaction subgraph network-based Ethereum phishing node detection method and system

An Ethereum phishing node detection method based on a transaction subgraph network comprises the following steps: 1) acquiring data; 2) constructing a network, and constructing a target node self-network according to transaction information of an Ethereum external account; 3) performing graph mapping: processing the self-network according to a novel directed graph mapping method to obtain a mapping graph containing intrinsic implicit information, namely a transaction sub-graph network; 4) performing graph feature extraction and fusion: performing feature extraction on the original self-network and the transaction sub-graph network by using a Graph2vec model, and splicing the features of the original self-network and the transaction sub-graph network; 5) classifying a detection model, taking the network fusion features as input, and training a random forest model to detect the phishing attribute of the target node. The invention further discloses an accurate fishing fraud detection system based on the method. According to the method, the self-network is constructed, the corresponding graph mapping technology is combined, the phishing node detection task is lightly and accurately completed, and the method is different from most researches based on extraction of a large amount of or higher-order neighbor information.
Owner:ZHEJIANG UNIV OF TECH

Unconstrained face recognition method based on weighted tensor sparse graph mapping

ActiveCN111723759ARetain internal structure informationOvercoming the Curse of DimensionalityInternal combustion piston enginesCharacter and pattern recognitionGraph mappingAlgorithm
The invention discloses an unconstrained face recognition method based on weighted tensor sparse graph mapping, and relates to the technical field of face recognition methods. In the sparse graph construction stage, training samples (images) are represented by second-order tensors, a supervised over-complete tensor dictionary is constructed, and similar sparse reconstruction coefficients of the samples are optimized and solved; and a more accurate tensor sparse neighbor graph is constructed in a self-adaptive manner. In a bilateral low-dimensional projection stage, low-dimensional tensor subspace distribution is obtained by utilizing identification information implied in sample global distribution. And low-dimensional mapping yWTSGE = UTyV is performed on the to-be-tested sample y by adopting the optimal WTSGE bilateral projection matrixes U and V, and a classifier is trained by using a low-dimensional training sample DWTSGE = UTXV to realize accurate identity authentication of the non-constrained face. According to the method, the complexity of the non-constrained face image data is fully considered, the neighbor distribution diagram of the high-dimensional tensor data is obtainedin a self-adaptive mode through the sparse representation technology, the low-dimensional manifold essential structure of the highly-distorted non-constrained face data is effectively extracted, andthe accuracy of non-constrained face recognition is greatly improved.
Owner:NANJING INST OF TECH

Shaft three-dimensional visualization method and device

The invention discloses a shaft three-dimensional visualization method and device.The method comprises the steps that engineering parameter information and geological parameter information, collected by a sensor in real time, of all test points are obtained, the engineering parameter information comprises well deviation data, azimuth angle data and vertical depth data, and the geological parameter information comprises resistivity while drilling and azimuth gamma; determining coordinates of each test point in a Cartesian coordinate system according to the engineering parameter information; performing two-dimensional smooth curve fitting according to the coordinate of each test point in the Cartesian coordinate system; according to the fitted two-dimensional smooth curve, establishing a three-dimensional shaft digital twinborn model by adopting a cylinder reduction method; and according to the geological parameter information, mapping a logging imaging graph to the three-dimensional shaft digital twinborn model by adopting a texture mapping method. Three-dimensional visualization of the shaft can be achieved, and important reference is provided for engineering application such as well track monitoring, shaft three-dimensional simulation and well collision prevention.
Owner:BC P INC CHINA NAT PETROLEUM CORP +2

Application system performance bottleneck determination method and device, equipment and medium

The invention discloses an application system performance bottleneck determination method, and relates to the technical field of computer networks, and the method comprises the steps: connecting a server, network equipment and storage equipment based on a preset network connection model, so as to generate a physical topological graph; mapping the physical topological graph into a service topological graph based on a service mapping model; and obtaining target performance data indexes of the server, the network equipment and the storage equipment according to the physical topological graph and the service topological graph, analyzing log information corresponding to the target performance data indexes, and determining the performance bottleneck of the application system according to the log information. According to the invention, the performance bottleneck of the application system is determined through the monitored log information of all performance fault suspicious points, and analysis is carried out according to the performance bottleneck of the server, the network equipment and the storage equipment, so that the performance analysis time is greatly shortened, the fault positioning and solving efficiency is improved, and the user experience is improved. And the maintainability and the stability of the application system are further improved.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Pressure gauge calibration table reliability evaluation method based on Bayesian correction model

The invention discloses a pressure gauge calibration table reliability evaluation method based on a Bayesian correction model. The method comprises the following steps: establishing a fault characteristic index system capable of representing a pressure gauge calibration table; constructing an accident tree model of the pressure gauge calibration console; establishing a BN model graph of the pressure gauge calibration console, and directly mapping the FTA model graph into the BN model graph through a graph mapping method; determining a prior probability of a bottom event and a conditional probability between layers; correcting the Bayesian model according to the actual situation; calculating a failure probability; and calculating the posterior probability of the bottom event, and searchingthe maximum risk bottom event causing failure. Compared with a traditional simplex qualitative and simplex quantitative reliability evaluation method, the method has the advantages that the accuracy is high; fuzzy mathematics and quantitative data analysis are fused, the defects that qualitative analysis lacks data support and pure data analysis is too absolute are overcome, and compared with a traditional Bayesian network model, the variable correction process of the Bayesian network is added, and the obtained evaluation result can be closer to the actual engineering situation.
Owner:NANJING INST OF MEASUREMENT & TESTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products