Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

43results about How to "Extensive sources of data" patented technology

Vehicle running track reconstruction method based on multiple probability matching under sparse sampling

The invention provides a vehicle running track reconstruction method based on multiple probability matching under sparse sampling, which is characterized in that a historical data statistics sparse sampling point tolerance distribution is used, and a search area is determined; then a candidate match object (road section or intersection) is searched in a region of search, and can be divided into various types according to the characteristics of the candidate object, if no match object is in the search area, the sampling point is not considerate, if only one object is in the search area, then the sampling point couples to the only object, if various candidate objects is in the search area, a double layer probability matching model is used for further processing; the double layer probability matching model can calculate the coupling probability of each possible track according to matching probability of the sampling point and the selection probability of the reasonable path, and the track with utmost possible probability can be selected for being taken as a reconstruction track of the sparse sampling point. The vehicle running track reconstruction method can reduce the matching error of the sparse sampling data, and can effectively increase the precision and speed of reconstructed vehicle running track in a complex road net.
Owner:SUN YAT SEN UNIV

Method and device of acquiring information

InactiveCN103136253AImprove experienceMeeting the Need for Integrated Recommended ContentSpecial data processing applicationsData sourceThe Internet
The invention discloses a method and a device of acquiring information and belongs to the field of internet. The method of acquiring the information comprises the following steps: acquiring historical data sources of users from at least two platforms, acquiring categorical data of the users according to the historical data sources of the users, collecting clicking actions of the users, acquiring action data of the users according to the clicking actions of the users, and acquiring first information which is recommended to the users according to the categorical data and the action data of the users. Due to the fact that the historical data sources is acquired from the at least two platforms, the categorical data of the users are obtained. The clicking actions of the users is combined, the action data of the users are obtained, and therefore the first information which is recommended to the users is obtained. Requirements of recommended contents integrated by a plurality of data sources are met. According to user preferences, the fact that a wider range of data sources are provided for the users is achieved. User experience is improved. The problem that due to the fact that recommended data sources are limited in the prior art, search results are not accurate is solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Oil-water distribution recognition method based on well-ground potential method

The invention discloses an oil-water distribution recognition method based on a well-ground potential method. The oil-water distribution recognition method comprises the following steps: firstly, establishing an oil-water two-phase seepage equation; based on a potential and water saturation model, coupling the seepage equation with a potential differential equation to form a well-ground potential model; adopting a finite difference method and solving the pressure of the model by adopting an implicit expression and solving the saturation degree of the model by adopting an explicit expression; establishing a difference potential differential equation by utilizing a relation between the water saturation and conductivity, and solving the potential by adopting the implicit expression; establishing a computer solving model on the basis; carrying out analog computation on a one-dimensional water displacement oil process; simulating the whole water displacement oil process through numerical solution to obtain a correlational relation between potential distribution and resistivity of an underground target layer; after solving the resistivity of the target layer, inversing the water saturation of a reservoir stratum by utilizing an Archie equation. The method can be used for quantitatively describing the water saturation and oil saturation in the reservoir stratum by utilizing the potential determined on the ground, and oil-water distribution can be more rapidly and accurately recognized.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Method for optimizing low-permeability reservoir intermittent mining working system based on model coupling exhaustion method

The invention discloses a method for optimizing a low-permeability reservoir intermittent mining working system based on a model coupling exhaustion method. Aiming at the input and output characteristics of a low-permeability and low-yield well, through the combination of the flow-in dynamic characteristics of the low-permeability reservoir, the liquid level change rule of an intermittent mining well shaft and the pump efficiency analysis, and based on the relation between the stratum liquid supply capacity and the pumping and suction capacity, a stratum flow-in dynamic model and a well shaftoutflow dynamic model are established, a coupling model is established through the coupling parameters of the bottom flow pressure and the pump efficiency, a computer solution model is established onthis basis, and the optimization of the low-permeability reservoir intermittent mining working system determination method is carried out by means of an exhaustion method. The method can accurately describe the low-permeability reservoir seepage law, realizes the real-time dynamic changes of the bottom flow pressure and the pump efficiency during the intermittent mining, and realizes the accuratequantified intermittent mining limit. The exhaustion method has better optimization precision, and the program calculation efficiency is high.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Personal credit assessment method and system based on fusion neural network feature mining

PendingCN112819604AComprehensive coverage of indicatorsComprehensive Indicator CoverageFinanceCharacter and pattern recognitionFeature miningFeature vector
The invention relates to a credit assessment technology, and aims to provide a personal credit assessment method and system based on fusion neural network feature mining. The method comprises the steps that behavior data of an individual user are preprocessed and checked and then subjected to matrix processing, and the obtained data serve as input of an LSTM model and a CNN model at the same time; in the LSTM model, sequentially processing by an embedding layer, a bidirectional long short-term memory neural network and an attention mechanism layer, and outputting a time sequence behavior feature vector extracted from the data; in the convolutional neural network model, processing is carried out through a convolutional layer and a pooling layer in sequence, and local behavior feature vectors extracted from the data are output; and carrying out vector splicing on the two types of feature vectors, taking the spliced feature vectors as input of an XGBoost classifier, and carrying out training to finally obtain a personal credit evaluation result. Compared with the prior art, the method has the characteristics of comprehensive index coverage, wide processing index source, advanced modeling mode, flexible model expansion, complete and effective feature extraction and accurate result.
Owner:浙江农村商业联合银行股份有限公司

Real-time traffic safety index dynamic comprehensive evaluation system and construction method thereof

The invention relates to a real-time traffic safety index dynamic comprehensive evaluation system and a construction method thereof. The construction method is characterized by comprising the following steps: step 1, collecting related data influencing traffic accidents and extracting characteristics of various data; step 2, establishing an accident risk assessment and prediction model by taking the characteristics of the collected related data as independent variables and taking a traffic safety index formed by the number and the grade of historical traffic accidents as dependent variables, and solving model parameters; step 3, according to the accident risk assessment and prediction model obtained in the step 2, calculating expectation of the number of traffic accidents occurring in different areas in combination with real-time road conditions, road structure attributes and driving safety coefficients, and obtaining real-time traffic safety indexes of the different areas through calculation according to a pre-established safety index model; and step 4, establishing a visual display platform for displaying the real-time traffic safety indexes of different areas. The system and method can be widely applied to the field of traffic safety evaluation.
Owner:TSINGHUA UNIV

Untrusted user data processing method, system and related apparatus

The invention discloses an untrusted user data processing method. The method comprises the steps of crawling untrusted data from public untrusted databases or blacklist databases by utilizing a network crawler; according to a recording form of the untrusted data, selecting a corresponding mode for performing keyword information extraction to obtain processed keywords; performing attribution division of corresponding content data on the processed keywords according to users which the processed keywords belong to, thereby obtaining target untrusted data, and establishing an untrusted user information library by utilizing the target untrusted data; and judging whether abnormal content data occurs in the untrusted user information library or not, and if the abnormal content data occurs, correcting the abnormal content data according to a priority sequence of the processed keywords. The related data can be crawled through multiple channels; the data processing mode is more reasonable, moreconvenient and quicker; and the data is compared and processed, so that the untrusted user data quality is higher. Meanwhile, the invention furthermore discloses an untrusted user data processing system and apparatus, and a computer readable storage medium, which have the abovementioned beneficial effects.
Owner:浙江极赢信息技术有限公司

Suspicious threat index active validation method and system based on source-opening information

ActiveCN109194605ALow costAvoid the Problem of Low Intelligence CoverageTransmissionValidation methodsThe Internet
The present invention relates to a suspicious threat index active validation method and system based on source-opening information. The method comprises the following steps of: 1) designing a specialquery statement, wherein the special query statement is combination of suspicious threat indexes and special scenes; 2) collecting and crawling result information obtained through retrieval on the internet according to the special query statement; 3) performing structuring processing of the related source-opening information in the result information to obtain structural data; 4) employing the structural data to fully learn the hidden features and train a corresponding classification model; and 5) employing the classification model to verify the malevolence of the suspicious threat indexes inthe special scenes so as to identify the network threat. The system comprises a query design module, an information collection module, a data processing module, a model training module and an index verification module. The suspicious threat index active validation method and system based on source-opening information can efficiently and accurately complete the verification of the suspicious threatindexes to help users with identification of high-class threat attack so as to ensure network safety.
Owner:INST OF INFORMATION ENG CAS

Emergency linkage system and method, and computer readable storage medium

The invention relates to the technical field of data processing, and discloses an emergency linkage system. The emergency linkage system comprises the following steps that: an Internet of Things equipment gateway receives state information collected by each piece of preset collection equipment, and sends the state information to an emergency linkage server; an application system gateway receives emergency information fed back from each preset third-party emergency system, and sends the emergency information to the emergency linkage server; the emergency linkage server searches corresponding plan information from plan management and storage equipment according to the state information and the emergency information, and a corresponding emergency response is started when a plan information trigger condition is met; and the plan management and storage equipment stores each piece of plan information. By use of the system, the problems in the prior art that an existing emergency linkage system can not accurately perceive field situations due to a data island phenomenon are avoided, and therefore, each type of emergency forms intercommunication to obtain a scientific commanding decision.The invention also provides an emergency linkage method and a computer readable storage medium and also has the above beneficial effects.
Owner:ZHEJIANG UHOPE COMM TECH

Method for evaluating safety drilling probability of ultra-high temperature and high pressure development based on Weibull function

The invention discloses a method for evaluating the safety drilling probability of ultra-high temperature and high pressure development based on a Weibull function. The method comprises the followingsteps: collecting a pore pressure data sample of an ultrahigh-temperature high-pressure stratum and a vertical well fracture pressure data sample; obtaining probability density distribution of the pore pressure of each section and the fracture pressure of a vertical well according to the occurrence frequency of the pore pressure of each section and the fracture pressure of the vertical well; determining a dual-parameter Weibull function expression of pore pressure and vertical well fracture pressure probability density; integrating to obtain a cumulative probability function expression of thepore pressure and the vertical well fracture pressure; determining a cumulative probability expression of the vertical well safety pressure; determining a cumulative probability expression of the safety pressure of a directional well; and calculating a safe drilling probability value of the ultrahigh-temperature and high-pressure directional well. By means of the method, the safe drilling probability can be evaluated before drilling of a development well, high-risk operation is avoided, cost and safety accidents are reduced, and the method has important significance in development of an ultra-high-temperature and high-pressure oil and gas field.
Owner:CHINA NATIONAL OFFSHORE OIL (CHINA) CO LTD +1

A kind of analysis method, analysis device and readable storage medium of job and residence distribution

The present application provides an analysis method, an analysis device and a readable storage medium for the distribution of jobs and residences. By acquiring a plurality of access data of the area to be analyzed within a preset time period from each platform database, the user identity information, the identification information, Access location information and access time information; based on each user ID, aggregate the access location information and access time information to obtain multiple access locations and multiple access locations corresponding to each user ID representing the same user. Access time; match the location points corresponding to each access location to the corresponding geographic grid; based on the preset working time period, rest time period, the matched geographic grid distribution map and corresponding to each user ID The multiple access times of the user IDs in the to-be-analyzed area are determined to determine the jobs and residences of the users corresponding to the user IDs in the to-be-analyzed area. In this way, the diversity and accuracy of the analysis data can be ensured, and the accuracy of the user's job and residence analysis result can be improved.
Owner:恩亿科(北京)数据科技有限公司

User information processing method and system

The invention discloses a user information processing method and system. The user information processing method is based on the user information processing system, the system comprises a plurality of partition clusters and a centralized cluster, the method comprises the steps that: each partition cluster collects network behavior data of a user in the partition, and extracts credit information corresponding to user identity information from the network behavior data according to a preset rule to obtain a first collection result; the centralized cluster trims the first collection results obtained by the partition clusters to obtain a second collection result; and when needing to verify the credit information of the user, data within a preset period are extracted from the second collection result in real time, and the extracted data are evaluated according to a self-defined evaluation rule. According to the user information processing method and system disclosed by the invention, the data source is wide, and the credit information of the user in various fields can be comprehensively associated and are collected in real time to be extracted and verified subsequently, so that the efficiency and accuracy of collecting and verifying the user identity and credit information are improved.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Article alias mining method and system, electronic equipment and readable storage medium

The invention discloses an article alias mining method and system, electronic equipment and a readable storage medium. The article alias mining method comprises the steps of performing reverse association to obtain all retrieval keywords of an accessed article in a preset time period; obtaining the retrieval amount of each retrieval keyword in the preset time period; judging whether the retrievalamount of each retrieval keyword is larger than a preset threshold value, and if so, taking the retrieval keywords larger than the preset threshold value as the candidate words; obtaining comment dataof the article; for each candidate word, obtaining the association degree of the candidate word and the article according to the comment data; and judging whether the association degree is greater than a preset threshold, and if so, taking the candidate words of which the association degree is greater than the preset threshold as another name of the article. According to the article alias miningmethod, the user comments and the user retrieval data are used as mining data sources, and the data cost is low, and the data sources are wide, meanwhile, the data comes from users, and the mining precision is higher, and the user experience is better.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

A method based on model-coupling exhaustive method to realize low-permeability reservoir inter-operating system optimization method

The invention discloses a method for optimizing a low-permeability reservoir intermittent mining working system based on a model coupling exhaustion method. Aiming at the input and output characteristics of a low-permeability and low-yield well, through the combination of the flow-in dynamic characteristics of the low-permeability reservoir, the liquid level change rule of an intermittent mining well shaft and the pump efficiency analysis, and based on the relation between the stratum liquid supply capacity and the pumping and suction capacity, a stratum flow-in dynamic model and a well shaftoutflow dynamic model are established, a coupling model is established through the coupling parameters of the bottom flow pressure and the pump efficiency, a computer solution model is established onthis basis, and the optimization of the low-permeability reservoir intermittent mining working system determination method is carried out by means of an exhaustion method. The method can accurately describe the low-permeability reservoir seepage law, realizes the real-time dynamic changes of the bottom flow pressure and the pump efficiency during the intermittent mining, and realizes the accuratequantified intermittent mining limit. The exhaustion method has better optimization precision, and the program calculation efficiency is high.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products