Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

2182 results about "Behavioral data" patented technology

Method and system for detecting intrusive anomalous use of a software system using multiple detection algorithms

A method of detecting an intrusion into (or an anomaly in a behavior of) a target software system begins by instrumenting the target software system to generate behavior data representing a current observation or observation aggregate. The method then determines whether the current observation or observation aggregate warrants a second level examination; preferably, this determination is made by processing the current observation or observation aggregate through a first level detection algorithm that provides a first, provisional indication of a possible intrusion. If a result of executing the first level detection algorithm indicates that the current observation or observation aggregate warrants a second level examination, the method continues by processing the current observation or observation aggregate through at least one or more second level detection algorithms to provide a second, more definite, fine grain indication of a possible intrusion. The observation aggregates used by the first and second level detection algorithms may be the same or different. The first and second level detection algorithms may be executed in the same or different systems, machines or processors. The target software system operation may be suspended as the current observation or observation aggregate is processed through the one or more second level detection algorithms. A given action (e.g., sending an alert, logging the event, activating a countermeasure, or the like) may be taken if the result of the second level examination indicates a possible intrusion. Multiple algorithms may be executed together within a single examination level, with the individual results then analyzed to obtain a composite result or output indicative of intrusive or anomalous behavior.
Owner:STRATACLOUD

Method for carrying out personalized recommendation on commodities by fusing knowledge graph

The invention relates to a method for carrying out personalized recommendation on commodities by fusing a knowledge graph. The invention relates to the technical field of machine learning for personalized recommendation of commodities, and the method comprises the steps: obtaining the historical behavior data of a user, and generating a commodity knowledge graph; fusing the historical behavior data of the user with the commodity knowledge graph to construct a collaborative knowledge graph; adopting a representation learning method in machine learning to obtain vector embedding representation of nodes and relationships in the collaborative knowledge graph; embedding vectors of nodes and relations in the collaborative knowledge graph and inputting historical behavior data of the user into agraph convolutional neural network model based on an attention mechanism to form vector embedding representation of new nodes and relations containing neighborhood information; and defining a score function, calculating the probability that the user likes the commodity through the user and commodity vector embedding representation of the fused neighborhood information output by the graph convolutional neural network model, and performing sorting according to a prediction result to obtain a recommendation list.
Owner:HARBIN ENG UNIV

User behavior analysis method and system based on big data

InactiveCN104462213AGain interest in timeEffective and accurate pushWebsite content managementSpecial data processing applicationsEngineeringContext data
The invention discloses a user behavior analysis method and system based on big data. According to the method, user behavior data are collected through a client side in real time, user behaviors and contextual information of a page URL are combined, the real scene that a user browses Web pages is reproduced to the greatest extent, comprehensive user behavior tracks are extracted, and effective data assurance is provided for analyzing the user behaviors; security assurance is provided for the user behavior data through a safety analysis module, and a user behavior data body model is used for modeling the user behaviors, so that behavior information semantic levels are shared and reused, and the interoperability and the reliability of the model are improved; the user behavior and context data are collected in real time for analysis, so that a result is more reliable; body and behavior information is stored through a column storage database, and therefore the foundation of massive data management is laid; the powerful processing capacity and the large-scale data storage capacity of the cloud computing technology, the body and a reasoning and knowledge discovery method of the body are combined, the massive user behavior data are analyzed in real time to obtain user interest in time, and then effective and accurate user push is achieved.
Owner:成都逸动无限网络科技有限公司

Application recommendation method and device and server equipment

The invention discloses an application recommendation method and device and server equipment. The method comprises the steps that according to a behavior data list of application acquisition terminal equipment recently browsed and downloaded by terminal equipment, the list comprises a plurality of first application identifications and nearest behavior time of first applications; according to the degree of association between the first applications and second applications in a preset application bank, multiple corresponding second applications are obtained from the preset application bank to form an alternative application assembly; according to current time, the nearest behavior time of the first applications is unified to obtain initial weighted values of the first applications; according to the degree of association of the second applications, the first application identifications corresponding to the degree of the associations and the initial weighted values of the first applications, an application recommendation list is generated, the application recommendation list is sent to the terminal equipment to allow the terminal equipment to show the application recommendation list. According to the technical scheme, individualized recommendation can be achieved, and recommendation efficiency of the applications is effectively improved.
Owner:BEIJING QIHOO TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products