CN104572687B - The key user's recognition methods and device that microblogging is propagated - Google Patents

The key user's recognition methods and device that microblogging is propagated Download PDF

Info

Publication number
CN104572687B
CN104572687B CN201310488236.XA CN201310488236A CN104572687B CN 104572687 B CN104572687 B CN 104572687B CN 201310488236 A CN201310488236 A CN 201310488236A CN 104572687 B CN104572687 B CN 104572687B
Authority
CN
China
Prior art keywords
node
microblogging
network architecture
propagated
delete operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310488236.XA
Other languages
Chinese (zh)
Other versions
CN104572687A (en
Inventor
郑妍
赵立永
于晓明
杨建武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New Founder Holdings Development Co ltd
Peking University
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University
Priority to CN201310488236.XA priority Critical patent/CN104572687B/en
Publication of CN104572687A publication Critical patent/CN104572687A/en
Application granted granted Critical
Publication of CN104572687B publication Critical patent/CN104572687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the present invention provides the key user's recognition methods and device that a kind of microblogging is propagated, in the network architecture that microblogging is propagated, multiple delete operation is executed according to the sequence of connecting node number from less to more, destination node from being deleted in the network architecture up to the identical at least one destination node of remaining connecting node number in the network architecture, is finally determined as key user's node of microblogging propagation by each delete operation by the identical node of connecting node number.To improve the accuracy for the key user that determining microblogging is propagated.

Description

The key user's recognition methods and device that microblogging is propagated
Technical field
The key user's recognition methods propagated the present invention relates to information technology field more particularly to a kind of microblogging and device.
Background technology
The propagation platform that microblogging is an acquisition of information based on customer relationship, shares is a kind of current all the fashion Virtual society network system.During the acquisition of hot spot microblogging is shared, using user as node, using the interactive relationship of user as side User node is linked up, a kind of specific social network structure, in this network structure, node location importance are constituted Analysis for hot spot microblogging public sentiment diffusion monitoring provide a particularly significant resolving ideas.
Currently, the method based on improved PAGERANK, according to the quantity and matter of the external linkage of website and internal links The external resource flow direction that user is considered to weigh the value of website and two aspect of resource itself are measured to comment user force Valence, resource refer generally to good friend's quantity.However, key user's accuracy that microblogging determined by this method is propagated is not high.
Invention content
The present invention provides the key user's recognition methods and device that a kind of microblogging is propagated, and is propagated with to improve determining microblogging The accuracy of key user.
On the one hand, the present invention provides a kind of key user's recognition methods that microblogging is propagated, including:
In the network architecture that microblogging is propagated, the node number that each node is connected is determined;
In the network architecture, multiple delete operation is executed according to the sequence of connecting node number from less to more, every time The delete operation is by the identical node of connecting node number from deletion in the network architecture up to being remained in the network architecture The identical at least one destination node of remaining connecting node number;
The destination node is determined as to key user's node of microblogging propagation.
On the other hand, the present invention provides a kind of key user's identification device that microblogging is propagated, including:
Determining module, in the network architecture that microblogging is propagated, determining the node number that each node is connected;
Removing module, in the network architecture, being executed according to the sequence of connecting node number from less to more multiple Delete operation, each delete operation delete the identical node of connecting node number from the network architecture up to described The identical at least one destination node of residue connecting node number in the network architecture;
The determining module is additionally operable to:The destination node is determined as to key user's node of microblogging propagation.
The key user's recognition methods and device that microblogging provided in an embodiment of the present invention is propagated, in the network rack that microblogging is propagated In structure, multiple delete operation is executed according to the sequence of connecting node number from less to more, each delete operation is a by connecting node The identical node of number is from deletion in the network architecture up to the identical at least one target of remaining connecting node number in the network architecture Destination node is finally determined as key user's node of microblogging propagation by node.To improve the key that determining microblogging is propagated The accuracy of user.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to do one simply to introduce, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without having to pay creative labor, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of key user's recognition methods one embodiment that microblogging provided by the invention is propagated;
Fig. 2 is the network architecture schematic diagram that microblogging provided by the invention is propagated;
Fig. 3 is the structural schematic diagram of key user's identification device one embodiment that microblogging provided by the invention is propagated.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 is the flow chart of key user's recognition methods one embodiment that microblogging provided by the invention is propagated, such as Fig. 1 institutes Show, this method includes:
S101, microblogging propagate the network architecture in, determine the node number that each node is connected.
S102, in the network architecture, execute multiple delete operation according to connecting node number sequence from less to more, every time Delete operation is by the identical node of connecting node number from deletion in the network architecture up to remaining connecting node in the network architecture The identical at least one destination node of number.
S103, key user's node that destination node is determined as to microblogging propagation.
Wherein, the network architecture that microblogging is propagated usually is made of several nodes, and each node is considered as a microblogging and uses Family.Therefore, the forwarding of any one microblogging is propagated, could set up a network architecture.Specifically, can determine first The node of microblogging and its interactive relationship with other nodes are forwarded, further can connect forwarding microblogging according to interactive relationship Node with constitute microblogging propagation the network architecture.
Fig. 2 provides a kind of network architecture schematic diagram that microblogging is propagated, and divides as shown in Fig. 2, being obtained in a certain hot spot microblogging During enjoying, node(That is microblog users)Between interactive relationship form the network architecture of upper figure.In the prior art, usually It can be more in view of the resource of node C emphatically(I.e. the node with interactive relationship is more), and in the network architecture of part Node C is given to higher importance in Central Position.And it is only being in overall network structure from node A shown in Fig. 2 The node of core position(Key user's node that i.e. microblogging is propagated, the source that often microblogging is propagated).
In the present invention, it is contemplated that the node in core position is often the source of hot spot microblogging, this node users may not It is leader user, that is, the interactive relationship possessed may not be very much, and the position in the whole network architecture is deep, but by several After Es-region propagations, this often obtains several leader users in the process(Node)Forwarding so that the microblogging is widely recognized.Example Such as:The interactive relationship of Fig. 2 interior joints C is most, but has the reception number that these nodes of interactive relationship are connected with node C But very low, therefore, multiple delete operation can be executed according to the sequence of connecting node number from less to more, such as:Connecting node The node number that the minimum node of number is connected is 1, then can first by connecting node number be 1 node from the network architecture Middle deletion, after the secondary delete operation, the node that script connecting node number is 2 in the network architecture, connecting node number becomes Be 1, then delete operation can delete this part of nodes from the network architecture next time, and so on, until being remained in the network architecture The identical at least one destination node of remaining connecting node number, such as:Only remaining connecting node number is all 2 in the network architecture These destination nodes are then determined as key user's node of microblogging propagation by one or more destination nodes.
In order to make to determine that the process of destination node is simpler, the node that connecting node number is 1 can be determined as the 1st Node is spent, the node that connecting node number is 2 is determined as the 2nd degree of node, and so on, connecting node number is that the node of N is true It is set to nth degree node, N is the integer more than 1.
Then correspondingly, delete operation can be executed according to the sequence from the 1st degree of node to nth degree node, behaviour is deleted every time Work deletes the identical node of the number of degrees from network, until the identical at least one nth degree target of the residue number of degrees in the network architecture Node.
It is specifically described by taking Fig. 2 as an example below:The calculating thinking of method is opened from the 1st degree of minimum node in this example Begin only row delete operation, and after first time deletes, node C only connects a node A and a node D, therefore node becomes 2nd degree of node, similar, node E becomes the 1st degree of node by the 2nd degree of node, therefore is carried out second to the 1st degree of node again Afterwards, node D becomes the 1st degree of node by the 2nd degree of node, then carries out third time deletion to the 1st degree of node, and node C is by the 2nd at this time Degree node becomes the 1st degree of node, then carries out the 4th deletion to the 1st degree of node, then node C disappears from this network architecture, And so on, until there is no the 1st degree of node in the network architecture after cycle progress aforesaid operations, final remaining only the 2nd degree 4 Node A, therefore 4 node A are destination node.
In the above process in the specific implementation, the node total number in the network architecture can be denoted as N, each node assigns one ID, ID value are from 0 to N-1.
Shaping array cores is defined, array, array size N are initialized.Initial value, method are assigned for the element of cores arrays It is:The index meaning of this array is the ID of node, and the number of degrees that element value is node, i.e., which above-mentioned degree node.It counts This array element maximum value is denoted as M.
Shaping array bin is defined, array, array size M+1 are initialized.The index meaning of this array is angle value, is bin The element of array assigns initial value, and calculation process is as follows:
for int i=0to N-1
bin[cores[i]]+=1
int j=0
for int i=0to M
int k=bin[i]
bin[i]=j
j+=k
Shaping array vert and pos are defined, two arrays, array size N are initialized.The index meaning of vert arrays is For node by the sequence of degree, the index meaning of pos arrays is the ID of node, is that the element of vert and pos arrays assigns initial value, calculates stream Journey is as follows:
for int i=0to N-1
pos[i]=bin[cores[i]]
vert[pos[i]]=i
bin[cores[i]]+=1
for int i=M to1
bin[i]=bin[i-1]
bin[0]=0
Above step four array cores, bin, vert, pos required to algorithm have carried out tax initial value.This step is retouched The main calculation process of this method is stated, two layers of FOR loop is mainly passed through, it, can be to cores, bin, vert, pos number every time in cycle Group element value is adjusted, and there are in cores arrays for last marking result.Calculation process is as follows:
for int i=0to N-1
int v=vert[i]
Interim shaping array neis is defined, all neighbor node ID and number S of the node of node ID=v are counted.It is adjacent It is the node for having side to connect with the node of ID=v to occupy node.
for int j=0to S-1
int u=neis[j]
if(cores[u]>cores[v])
int du=cores[u]
int pw=bin[du]
w=vert[pw]
if(u!=w)
int pu=pos[u]
pos[u]=pw
pos[w]=pu
vert[pu]=w
vert[pw]=u
bin[du]+=1
cores[u]-=1
Key user's recognition methods that microblogging provided in this embodiment is propagated, in the network architecture that microblogging is propagated, according to Connecting node number sequence from less to more executes multiple delete operation, and each delete operation is by the identical section of connecting node number Point finally will from being deleted in the network architecture up to the identical at least one destination node of remaining connecting node number in the network architecture Destination node is determined as key user's node of microblogging propagation.To improve the accurate of key user that determining microblogging is propagated Degree.
Fig. 3 is the structural schematic diagram of key user's identification device one embodiment that microblogging provided by the invention is propagated, such as Shown in Fig. 3, which includes:
Determining module 11, in the network architecture that microblogging is propagated, determining the node number that each node is connected;
Removing module 12, in the network architecture, repeatedly being deleted according to the sequence execution of connecting node number from less to more Division operation, each delete operation is by the identical node of connecting node number from deletion in the network architecture up to remaining in the network architecture The identical at least one destination node of connecting node number;
Determining module 11 is additionally operable to:Destination node is determined as to key user's node of microblogging propagation.
Optionally, determining module 11 can be also used for:It determines the node of forwarding microblogging and its is closed with the interaction of other nodes System;The node of forwarding microblogging is connected to constitute the network architecture of microblogging propagation according to interactive relationship.
Optionally, determining module 11 can be also used for:The node that connecting node number is 1 is determined as the 1st degree of node, even It connects the node that node number is N and is determined as nth degree node, N is the integer more than 1.
Optionally, determining module 11 can be specifically used for:It is deleted according to the sequence execution from the 1st degree of node to nth degree node Division operation, each delete operation delete the identical node of the number of degrees from network, until the remaining number of degrees are identical in the network architecture At least one nth degree destination node.
Key user's identification device that microblogging provided in this embodiment is propagated, the key propagated for microblogging provided by the invention The executive device of user identification method, the detailed process for executing method can be found in the associated description in embodiment of the method, herein It repeats no more.
Key user's identification device that microblogging provided in this embodiment is propagated, in the network architecture that microblogging is propagated, in net In network framework, multiple delete operation is executed according to the sequence of connecting node number from less to more, each delete operation saves connection The identical node of point number in the network architecture from deleting until residue connecting node number is identical at least one in the network architecture Destination node is finally determined as key user's node of microblogging propagation by destination node.It is propagated to improve determining microblogging The accuracy of key user.
It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function The division progress of module, can be as needed and by above-mentioned function distribution by different function moulds for example, in practical application Block is completed, i.e., the internal structure of device is divided into different function modules, to complete all or part of work(described above Energy.The specific work process of the system, apparatus, and unit of foregoing description can refer to corresponding in preceding method embodiment Journey, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module or The division of unit, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute Display or the mutual coupling, direct-coupling or communication connection discussed can be by some interfaces, device or unit INDIRECT COUPLING or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment(Can be personal computer, server or the network equipment etc.)Or processor(processor)It is each to execute the application The all or part of step of embodiment the method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory(RAM, Random Access Memory), magnetic disc or CD Etc. the various media that can store program code.
The above, above example are only to illustrate the technical solution of the application, rather than its limitations;Although with reference to before Embodiment is stated the application is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these Modification or replacement, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (4)

1. key user's recognition methods that a kind of microblogging is propagated, which is characterized in that including:
In the network architecture that microblogging is propagated, the node number that each node is connected is determined;
In the network architecture, multiple delete operation is executed according to the sequence of connecting node number from less to more, it is described every time Delete operation connects the identical node of connecting node number from deletion in the network architecture up to remaining in the network architecture Connect the identical at least one destination node of node number;
The destination node is determined as to key user's node of microblogging propagation;
It is described execute multiple delete operation according to connecting node number sequence from less to more before, further include:
The node that connecting node number is 1 is determined as the 1st degree of node, connecting node number is that the node of N is determined as nth degree section Point, the N are the integer more than 1;
Described to execute multiple delete operation according to the sequence of connecting node number from less to more, each delete operation will connect The identical node of node number in the network architecture from deleting until residue connecting node number is identical in the network architecture At least one destination node, specifically include:
Delete operation is executed according to the sequence from the 1st degree of node to nth degree node, each delete operation is identical by the number of degrees Node is deleted from the network, until the identical at least one nth degree destination node of the residue number of degrees in the network architecture.
2. according to the method described in claim 1, it is characterized in that, described in the network architecture that microblogging is propagated, determination is each Before the node number that node is connected, further include:
Determine the node for forwarding the microblogging and its interactive relationship with other nodes;
According to the interactive relationship, connection forwards the node of the microblogging to constitute the network architecture that the microblogging is propagated.
3. key user's identification device that a kind of microblogging is propagated, which is characterized in that including:
Determining module, in the network architecture that microblogging is propagated, determining the node number that each node is connected;
Removing module, in the network architecture, executing according to the sequence of connecting node number from less to more and repeatedly deleting Operation, each delete operation delete the identical node of connecting node number from the network architecture up to the network The identical at least one destination node of residue connecting node number in framework;
The determining module is additionally operable to:The destination node is determined as to key user's node of microblogging propagation;
The determining module is additionally operable to:The node that connecting node number is 1 is determined as the 1st degree of node, connecting node number is N Node be determined as nth degree node, the N is the integer more than 1;
The determining module is specifically used for:Delete operation, each institute are executed according to the sequence from the 1st degree of node to nth degree node It states delete operation to delete the identical node of the number of degrees from the network, until the remaining number of degrees are identical extremely in the network architecture A few nth degree destination node.
4. device according to claim 3, which is characterized in that the determining module is additionally operable to:It determines and forwards the microblogging Node and its interactive relationship with other nodes;According to the interactive relationship, connection forwards the node of the microblogging to constitute The network architecture that the microblogging is propagated.
CN201310488236.XA 2013-10-17 2013-10-17 The key user's recognition methods and device that microblogging is propagated Active CN104572687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310488236.XA CN104572687B (en) 2013-10-17 2013-10-17 The key user's recognition methods and device that microblogging is propagated

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310488236.XA CN104572687B (en) 2013-10-17 2013-10-17 The key user's recognition methods and device that microblogging is propagated

Publications (2)

Publication Number Publication Date
CN104572687A CN104572687A (en) 2015-04-29
CN104572687B true CN104572687B (en) 2018-07-31

Family

ID=53088779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310488236.XA Active CN104572687B (en) 2013-10-17 2013-10-17 The key user's recognition methods and device that microblogging is propagated

Country Status (1)

Country Link
CN (1) CN104572687B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104954236B (en) * 2015-06-19 2018-02-27 百度在线网络技术(北京)有限公司 The method and apparatus of the information of the event that is the theme generation propagation path
CN108733763B (en) * 2018-04-16 2022-05-17 国家计算机网络与信息安全管理中心 Method and device for calculating key nodes based on microblog hot events
CN109471881B (en) * 2018-07-27 2022-04-12 昆明理工大学 Network public opinion early warning monitoring method based on space-time scanning
CN110837608B (en) * 2019-11-07 2024-04-12 中科天玑数据科技股份有限公司 Public opinion topic propagation path analysis system and method based on multi-source data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383748A (en) * 2008-10-24 2009-03-11 北京航空航天大学 Community division method in complex network
US7844634B2 (en) * 2005-11-18 2010-11-30 International Business Machines Corporation Focused community discovery in network
CN103279512A (en) * 2013-05-17 2013-09-04 湖州师范学院 Method for using most influential node in social network to achieve efficient viral marketing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7844634B2 (en) * 2005-11-18 2010-11-30 International Business Machines Corporation Focused community discovery in network
CN101383748A (en) * 2008-10-24 2009-03-11 北京航空航天大学 Community division method in complex network
CN103279512A (en) * 2013-05-17 2013-09-04 湖州师范学院 Method for using most influential node in social network to achieve efficient viral marketing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"兴趣社交网站中意见领袖识别的研究";王娟 等;《图书情报工作》;20130731;第57卷(第14期);第97页右栏第2段、第2.1节、第99页第4.1节第1-2段、第101-102页第5.1节、表3 *
"基于社区的关键节挖掘算法";陆晓野;《计算机系统应用》;20121231;第21卷(第4期);第250-253页 *
"微博用户关系挖掘研究综述";王连喜 等;《情报杂志》;20121231;第31卷(第12期);第91-97页 *

Also Published As

Publication number Publication date
CN104572687A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN108197285A (en) A kind of data recommendation method and device
CN104317970B (en) A kind of data stream type processing method based on data mart modeling center
CN104572687B (en) The key user's recognition methods and device that microblogging is propagated
CN106130899B (en) A kind of method and apparatus generating service path
JP7125358B2 (en) Method of presenting information on basis of prediction results for computer system and input data
CN107918612A (en) The implementation method and device of key assignments memory system data structure
CN104216756B (en) Virtual machine administration device, the method and information processing system for managing virtual machine
CN108572970A (en) A kind of processing method and distributed processing system(DPS) of structural data
KR20140093535A (en) Method for parallel mining of temporal relations in large event file
CN105913235A (en) Client account transfer relation analysis method and system
CN110020866A (en) A kind of training method of identification model, device and electronic equipment
CN103838720B (en) Page file, which is loaded into, executes method and apparatus
CN110262775A (en) Business rule generation method and device
CN106951913A (en) The method for carrying out data exchange, cloud platform and system
CN109117475A (en) A kind of method and relevant device of text rewriting
CN105426392A (en) Collaborative filtering recommendation method and system
US20090006501A1 (en) Zone Control Weights
Shin et al. Deep reinforcement learning-based network routing technology for data recovery in exa-scale cloud distributed clustering systems
CN107992358A (en) A kind of asynchronous IO suitable for the outer figure processing system of core performs method and system
CN108805291A (en) A kind of training method and server of network representation learning model
CN107463555A (en) The mthods, systems and devices of layer data among deleting
CN109684517A (en) A kind of historical data storage method, reading/writing method, storage device and equipment
CN108256694A (en) Based on Fuzzy time sequence forecasting system, the method and device for repeating genetic algorithm
Huebler et al. Constructing semi-directed level-1 phylogenetic networks from quarnets
CN107648855A (en) A kind of data processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220621

Address after: 3007, Hengqin international financial center building, No. 58, Huajin street, Hengqin new area, Zhuhai, Guangdong 519031

Patentee after: New founder holdings development Co.,Ltd.

Patentee after: Peking University

Patentee after: BEIJING FOUNDER ELECTRONICS Co.,Ltd.

Address before: 100871, Beijing, Haidian District, Cheng Fu Road, No. 298, Zhongguancun Fangzheng building, 9 floor

Patentee before: PEKING UNIVERSITY FOUNDER GROUP Co.,Ltd.

Patentee before: Peking University

Patentee before: BEIJING FOUNDER ELECTRONICS Co.,Ltd.

TR01 Transfer of patent right