Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

127 results about "Tree traversal" patented technology

In computer science, tree traversal (also known as tree search) is a form of graph traversal and refers to the process of visiting (checking and/or updating) each node in a tree data structure, exactly once. Such traversals are classified by the order in which the nodes are visited. The following algorithms are described for a binary tree, but they may be generalized to other trees as well.

Tree shaped fast connection establishing method based on multi-Agent cooperation

ActiveCN101488898APrevent false reservationsPrevents errors from being preempted by other requestsStar/tree networksStructure of Management InformationConnection control
The invention relates to the communication field, the invention embodiment discloses a tree-shaped fast connecting establishing method based on multiple-Agent cooperation. The method comprises: an integral establishing process flow of single service tree-shaped signaling; a signaling expanding abstraction logical function in a network with control plane; a topological abstract method of multiple-Agent collaboration signaling forwarding tree; a traversing mode of tree-shaped signaling forwarding tree based on non-balance type binary forwarding tree; a traversing mode of tree-shaped signaling forwarding tree based on non-balance type N-branch forwarding tree; a resource invalidation processing method in the tree-shaped signaling service process flow. According to the method of the invention, the entity logical function can be forwarded by expanding the signaling, the connection control operation can be performed between a plurality of Agents to establish a layered structure for a calling connection controller, the higher grade calling connection controller implements the control function for a first stage calling connection controller to rapidly implement the connection establishment and respectively provide processing flows for different resource invalidation conditions. After considering the queue processing and exterior transmission time delay, the connection can be optimized by a non-standard binary forwarding tree structure. The tree-shaped signaling implementing interface of the multiple-Agent system comprises a GUI interface for taking charge of the transmitting of the control command, the real-time data detection, the data filtering, the center resource database access and the Agent information report and so on operations.
Owner:BEIJING UNIV OF POSTS & TELECOMM +1

HThe invention discloses a human body behavior identification method and system based on attention perception and a tree skeleton point structure

The invention discloses a human body behavior identification method and system based on attention perception and a tree skeleton point structure. The method comprises the following steps: 1) inputtingskeleton point information of all behavior samples in a training set; 2) enabling the number of frames of each sample to be consistent by adding a zero-padding frame; 3) reconstructing disordered skeleton points by using a three-way tree traversal rule; 4) performing normalization processing on the Laplacian matrix of the feature map obtained after reconstruction; 5) constructing an attention perception network and a main body network; T. The behavior recognition method comprises the steps of (1) establishing a behavior recognition network model, (2) establishing a behavior recognition network model, (6) connecting the attention perception network with the main body network in a hierarchical manner, (7) inputting the reconstructed feature map into the main body network and the attention perception network respectively to train the behavior recognition network model, and (8) carrying out behavior recognition by utilizing the trained behavior recognition network model.
Owner:深圳市感动智能科技有限公司 +1

Pulmonary CT image airway three-dimensional skeleton dendritical structure extracting and marking method

The invention provides a pulmonary CT image airway three-dimensional skeleton dendritical structure extracting and marking method. The method comprises the steps that a three-dimensional seed growth method is used to acquire a tracheal tree three-dimensional model in a pulmonary CT image; morphological closed operation is used to preprocess the tracheal tree three-dimensional model; pulmonary tracheal tree skeleton points in the tracheal tree three-dimensional model are extracted through an improved topological refinement method; a pulmonary tracheal tree skeleton dendritical structure is extracted through a multi-fork number extraction method; and grading marking is carried out on the pulmonary tracheal tree skeleton dendritical structure. According to the method provided by the invention, when the pulmonary tracheal tree skeleton of a human body is extracted, the topological refinement method is used and improved on the basis of the method; a corresponding solution is provided according to a special situation in a human pulmonary tracheal tree segmentation image; the algorithm practicality is improved; the idea of multi-fork tree traversal is used to extract the pulmonary tracheal tree dendritical structure of the human body, and at the same time the dendritical structure is graded; and the method laids the foundation for the quantitative analysis of the human pulmonary tracheal tree.
Owner:NORTHEASTERN UNIV LIAONING

Data processing method and system

The invention discloses a data processing method. The method includes the steps that according to analysis of received order form tasks, resource information of resources needed for completing the order form tasks and production constraint conditions are obtained; according to the resource information and the production constraint conditions, feasible production scheduling schemes are generated and put into a preset task feasible solution pond; according to the resource information and a preset optimization objective, the feasible production scheduling schemes are evaluated, and the feasible production scheduling scheme with the highest evaluation value is analyzed and determined as the optimal production scheduling scheme. The invention further discloses a data processing system. With the resources as the leading factor, the feasible production scheduling schemes of the current resources are recursively captured and matched and are evaluated according to the preset optimization objective, finally the feasible production scheduling scheme with the highest evaluation value is determined as the optimal production scheduling scheme, the steps are repeated until resource traversal of all production tasks in the order form tasks is completed, and in this way, the technical problems that as a reasonable production scheduling scheme is selected out, duration is prolonged, and cost is increased are solved.
Owner:SHENZHEN VUV TECH CO LTD

Malicious behavior trigger system and method for android software capable of simulating user behaviors

The invention discloses a malicious behavior trigger system and a malicious behavior trigger method for android software capable of simulating user behaviors. A technology of simulating a real environment change of a mobile phone of a user is added, so that triggering of malicious software behaviors in a dynamic detection technology is more efficient and difficulty is created for malicious software in identification of a simulator environment. The system comprises a user information collection module, a user data mining module and a traversal engine module. The method comprises the specific steps of collecting a user behavior characteristic quantity by a mobile client, storing and analyzing the user behavior characteristic quantity by a server, generating an associated data set of the user behavior characteristic quantity, uploading a to-be-tested APK file by a user, preprocessing the APK file, analyzing an application control by using software, generating a control tree traversal policy, starting control tree traversal by using a traversal engine, judging whether triggering is completed or not, and storing screenshots of different interfaces. The traversal coverage rate is higher, triggering of the malicious behaviors is more comprehensive and the traversal speed is higher.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products