Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

105 results about "Action rule" patented technology

Distributed file system with automated file management achieved by decoupling data analysis and movement operations

A computer-driven file management technique is applied to a distributed file system with multiple storage "aggregates" to improve file distribution, user access, server workload, and the like. For a first aggregate, a recognition module analyzes file contents of all aggregates, plans a set of physical data movement operations to configure data stored upon a first one of the aggregates according to certain prescribed "goals," and buffers the planned physical data movement operations. The planned set of physical data movement operations constitute a "virtual" data move. The reviewing, planning, and buffering operations are repeated for all remaining aggregates in the distributed file system. However, each repeated reviewing operation considers the file contents of the aggregates as if all previous virtual data moves had actually been performed. Asynchronously with the storage analysis and reconfiguration planning, the system processes the action buffer. Namely, the system reads buffer contents according to a prescribed order, consults predetermined action "rules," and then carries out the physical data moves in accordance with the action rules. The action rules may specify desirable hours to move data or avoid moving data, for example.
Owner:IBM CORP

System and method for detecting fraudulent transactions in medical insurance outpatient services

The invention discloses a system and method for detecting fraudulent transactions in medical insurance outpatient services. In the invention, a data processing unit, a score calculating unit and a detecting unit are sequentially connected in series; the detecting unit comprises two modules which conform to transaction rules and probability of the fraudulent transactions; the output of a data dictionary is connected with the data processing unit; the input of an algorithm library is connected with the score calculating unit; the output of an action rule library and the output of a transaction rule library are respectively connected with the detecting unit; a rule management unit is connected between the action rule library and the transaction rule library; and the system is connected inside or outside a business processing system of a medical insurance institution for detecting, when the system is connected on the outside, a transaction information extraction module is arranged in front of the data processing unit for carrying out analysis, inquiry and statistics on the history of actions which are detected to be abnormal. By detecting the medical transaction rules in the outpatient services and evaluating the transaction fraudulence unlawful actions, the quantitative basis can be provided for defining the medical fraudulence unlawful actions, and the supervision cost of medical insurance fraudulence and unlawful phenomena can be reduced.
Owner:JIANGSU UNIV

Computer security intrusion detection system for remote, on-demand users

An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events. An intrusion detection system controller is associated with one of the data processing hosts. It is adapted to manage and monitor the intrusion detection system agent(s), process agent reports of intrusion activity, and communicate intrusion-related information to the on-demand user (or security provider). The responses to intrusion events can be implemented by the intrusion detection system controller in combination with the intrusion detection system agents, or by any such entity alone.
Owner:IBM CORP

Reinforcement learning training optimization method and device for multi-agent confrontation

The embodiment of the invention provides a reinforcement learning training optimization method and device for multi-agent confrontation. The method comprises the following steps of a rule coupling algorithm training process including the steps of acquiring an initial first state result set of a red party multi-agent for each training step, if the initial first state result set of the red party multi-agent meets a preset action rule, obtaining a decision-making behavior result set according to the preset action rule, and otherwise, acquiring the decision-making behavior result set according toa preset reinforcement training learning algorithm; and performing reinforcement learning training on the red-party multi-agent by utilizing a training sample formed by the decision-making behavior result set and other preset parameters. The embodiment of the invention provides the reinforcement learning training optimization method and device for multi-agent confrontation. In the whole training process, the preset action rule can guide the multiple agents to act, invalid actions are avoided, the problems that in the training process in the prior art, invalid exploration is much, and the training speed is low are solved, and the training efficiency is remarkably improved.
Owner:NAT INNOVATION INST OF DEFENSE TECH PLA ACAD OF MILITARY SCI

Method and device for calculating chemical mechanical polishing material removal rate

The invention provides a method for calculating chemical mechanical polishing material removal rate. The method comprises the following steps: determining a calculation formula MRR=kPV of the material removal rate; analyzing a factor which affects the material removal rate, and obtaining a function equation of the factor which affects the material removal rate; and substituting the function equation of the factor into the MRR=kPV, obtaining a specific calculation formula of the material removal rate, and calculating the material removal rate MRR according to the specific calculation formula. Besides, the invention further provides a device for calculating the chemical mechanical polishing material removal rate. According to the schemes provided by the invention, the action rule among multiple bodies is deeply revealed by the analyzing of the factor which affects the material removal rate and the comprehensive considering of an interaction relationship among four bodies including wafers, particles, polishing pads and polishing fluids, the actual process of chemical mechanical polishing can be relatively objectively and truly described, and the method for calculating the chemical mechanical polishing material removal rate has active guiding functions on the mechanism analysis and the layout design of the CMP (Chemical Mechanical Polishing), as well as the research and the development of a large production line process.
Owner:INST OF MICROELECTRONICS CHINESE ACAD OF SCI

City comprehensive emergency intelligent simulation system based on case-based reasoning and operation method thereof

InactiveCN103679611ASolve intelligent generationSolve the problem of dynamic evolutionData processing applicationsInference methodsSimulation basedAction rule
The invention relates to the technical field of comprehensive emergency management, in particular to a city comprehensive emergency intelligent simulation system based on case-based reasoning and an operation method of the city comprehensive emergency intelligent simulation system. According to the method, with structured event information as conditions, a case base is searched for similar cases, effective reasoning is carried out based on action rules of all participating entities according to a model, and scenes in the cases are modified to form new simulation exercise scenes to be used by participating units for participation. When city comprehensive emergency simulation exercises are finished, by carrying out evaluation, modification and summarization on the simulation exercises and saving the cases as new cases finally, self-increasing of the case base and self-learning capacity of a simulation exercise system are achieved, and solid foundations are laid for further simulation exercise scene generation. The method solves the problem that simulation exercise scenes are lack of scene exercise analog simulation based on behavior rules of all current participating entities, and can be applied to the city comprehensive emergency intelligent simulation system.
Owner:CLOUD COMPUTING CENT CHINESE ACADEMY OF SCI

Computer Security Intrusion Detection System For Remote, On-Demand Users

An intrusion detection system, and a related method and computer program product, for implementing intrusion detection in a remote, on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over the host(s). Intrusion detection entails monitoring resources defined by the on-demand user (or a third party security provider) for intrusion events that are also defined by the on-demand user (or security provider), and implementing responses according to event-action rules that are further defined by the on-demand user (or security provider). An intrusion detection system agent is associated with each of the data processing hosts, and is adapted to monitor the intrusion events and report intrusion activity. If there are plural intrusion detection system agents, they can be individually programmed to monitor and report on agent-specific sets of the intrusion events. An intrusion detection system controller is associated with one of the data processing hosts. It is adapted to manage and monitor the intrusion detection system agent(s), process agent reports of intrusion activity, and communicate intrusion-related information to the on-demand user (or security provider). The responses to intrusion events can be implemented by the intrusion detection system controller in combination with the intrusion detection system agents, or by any such entity alone.
Owner:INT BUSINESS MASCH CORP

A Network Fault Reconfiguration Method Applicable to Aircraft Distributed Power Distribution System

The invention discloses a network failure reconstruction method suitable for an airplane distributed distribution system. The method comprises the following steps of: setting a corresponding intelligent agent for each distribution element of a power distribution network in a control layer; making an agent action rule and an information interactive coordination strategy according to position distribution of distribution elements in the network; synthesizing and releasing a working condition of the distribution element corresponding to each intelligent agent by using each intelligent agent, informing an adjacent agent of power supply service which can be provided by the intelligent agent, and making a power supply service request by using the adjacent agent; and perceiving a state which is released by the adjacent agent and responding by using each agent, and responding to the power supply service request which is made by the adjacent agent, and generating a control command corresponding to the distribution element according to the certain response action rule and the coordination strategy. The method has the advantages of better solving the problem of the conventional failure reconstruction algorithm, automatically tracking and monitoring the topology and the working condition of a network, and restoring power supply for a loading point in the network as far as possible on the premise that a failure in the network is ensured to be isolated.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

A travel information service strategy and simulation verification system in an Internet of Vehicles environment

PendingCN109670620AImprove effectivenessForecastingTransmissionAmbulatory systemComplex dynamic systems
The invention discloses a travel information service strategy and simulation verification system in an Internet of Vehicles environment, wherein the travel information service strategy research designs a game negotiation mechanism for solving the contradiction conflict between a system optimal travel service strategy proposed by a road network manager and a personalized travel decision of a vehicle driver in an Internet of Vehicles environment. According to the mechanism, a cloud system, a management system and a terminal system in an Internet of Vehicles environment are fully considered, three game negotiation processes are designed, the optimal system and the personality of a driver are fully communicated, and a multi-agent simulation software NetLogo is utilized to establish an Internetof Vehicles travel service strategy simulation system for simulation verification. The simulation verification system is composed of a foreground part and a background part, a foreground interface isa man-machine interaction module, and a background program is responsible for achieving the function of the simulation system, including simulation scene setting, vehicle generation and division, simulation content and simulation data information acquisition of several models, and the simulation content is a core strategy rule for driving a vehicle to run in a road network and comprises a microscopic layer and a macroscopic layer. According to the invention, the optimal path selection provided by the system to drivers with different accepting personalities in the Internet of Vehicles environment, the game negotiation mechanism for path selection by a driver and a road network effect which can be achieved under the action of the mechanism are designed and studied, so that the reflection ofa macroscopic state of the system from each vehicle action rule is realized, and the feasibility and effectiveness are provided for realizing simulation of a complex dynamic system.
Owner:BEIHANG UNIV

Intelligent garbage can and method for door-to-door service of intelligent garbage can

The invention provides an intelligent garbage can which comprises a box body, a power module, a central processing module, a navigating and positioning module, a network module, an action module, an intelligent obstacle analyzing and crossing module and a gravity induction module. A cover body is arranged on the top of the box body. The central processing module is used for transmitting, processing and analyzing data, and alarm action rules are loaded in the central processing module. The network module is used for connecting a client end with a network center and used for transmitting data to the client end and obtaining resource orders on the network center. The action module is used for receiving instructions sent by the central processing module so that the position of the intelligent garbage can can be changed. The intelligent obstacle analyzing and crossing module is connected to the central processing module. Thus, the automatic door-to-door service can be achieved to change the life style of people; and in addition, the invention provides a method for the door-to-door service of the intelligent garbage can, the traditional design concept, the traditional thinking mode and the traditional working mode are broken through due to the service manner of changing the roles of a guest and a host, and the time of people is saved.
Owner:杨小东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products