Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

144 results about "Correctness" patented technology

In theoretical computer science, correctness of an algorithm is asserted when it is said that the algorithm is correct with respect to a specification. Functional correctness refers to the input-output behavior of the algorithm (i.e., for each input it produces the expected output).

Systems and methods for validating objects models

A metadata validation process that allows for deferring object model validation until after the objects are created. The process also allows for multi-threaded processing of the validation rules, thus increasing overall performance. Validation is performed by enforcing a series of validation rules on an appropriate subject. Rules are specified according to the subject that they are validating (i.e., attribute level, association level, object level or collection level). The metadata driven validation process implements several validation types on different validation units. Correctness validation rule types ensure that a validation unit satisfies all semantic rules defined for it. Completeness validation rule types ensure that a validation unit contains all the necessary data and is ready for further use. At design time, only correctness type validation is performed. Thus, the present invention advantageously allows for incomplete objects to be created at design time. The developer, however, in this case may opt to perform completeness validation at any time. In general, a developer may opt to perform completeness and/or correctness validation at any time independent of deployment processing. In another aspect, full validation (e.g., completeness and correctness) is automatically performed on the objects during the process of creating a configuration prior to deployment.
Owner:ORACLE INT CORP

Malicious code detection method and system

The invention relates to a malicious code detection method and system. The method comprises the steps that A, extracting corresponding features from binary data of a single PE file in a training dataset; b, performing dimension reduction processing on the features; c, extracting the features of the binary data as the front half part of the deep learning model through a gated convolutional network; d, combining the features after dimension reduction with the feature vectors obtained in the step C, inputting the combined features into a full-connection neural network serving as the rear half part of the deep learning model, and generating final feature vectors to be classified; e, generating corresponding to-be-classified feature vectors for all PE files; and F, classifying all the to-be-classified feature vectors, comparing the classified feature vectors with known categories in the test data set to verify the correctness of the deep learning model, and obtaining an optimal deep learning model by adjusting parameters. According to the method, the influence of malicious code instruction transformation can be avoided, whether the unknown software contains the malicious code or not can be accurately detected, and the detection efficiency is also improved.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Sample format protection method and device for gray box fuzzy test

The invention discloses a sample format protection method and device for a gray box fuzzy test. The sample format protection method comprises the steps of training a machine learning model to enable the model to recognize the correctness of the format of a testing corpus; when the fuzzy test is conducted on a program, obtaining an initial corpus from a corpus set and mutating the initial corpus toobtain the testing corpus; using the testing corpus to conduct the fuzzy test on the program, and in the process of the fuzzy test, determining whether the format of the testing corpus is correct ornot through the model. When the format of the testing corpus is correct and the testing corpus covers a program code uncovered by an existing testing corpus, the testing corpus is added into the corpus set, and the process is repeated. In this way, the corpuses, with the correct format, determined in each fuzzy test is added into the corpus set, the correctness of the formats of the corpuses in the corpus set is guaranteed to the greatest extent, and the efficiency of the fuzzy test is improved. Moreover, through a position set, the mutation of the initial corpus is guided, an invalid mutationoperation is avoided, and the testing efficiency is further improved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Algorithm verification method and system for federated learning heterogeneous processing system

The embodiment of the invention provides an Algorithm verification method and system for federated learning heterogeneous processing system, which is applied to verifying the correctness of an FPGA heterogeneous computing chip algorithm in the heterogeneous processing system, and comprises the following steps: acquiring configuration information which comprises an algorithm type, each input parameter and the bit width of each input parameter; randomly generating input parameter data according to the bit width configuration information of each input parameter; performing calculation based on astandard operation library according to the input parameter data to obtain a standard value; based on an actual algorithm of an FPGA heterogeneous computing chip, calculating according to the input parameter data to obtain an actual value; and comparing the standard value with the actual value, if the standard value is consistent with the actual value, determining that the algorithm verification is passed, and if the standard value is inconsistent with the actual value, sending error information. According to the scheme, the correctness of algorithm implementation on the heterogeneous computing chip can be automatically verified, and the engineering verification efficiency is improved.
Owner:CLUSTAR TECH LO LTD

Dynamic graph execution method and device for neural network calculation

ActiveCN114461351AMeet the needs of just-in-time debuggingSatisfy the correctness of instant verification algorithmProgram initiation/switchingBiological neural network modelsScheduling instructionsTheoretical computer science
The invention discloses a dynamic graph execution method and device for neural network calculation. The method comprises the following steps: S1, constructing and distributing operators and tensors; s2, deriving an operator execution process by an operator interpreter; s3, the operator interpreter constructs an instruction of the virtual machine during operation; s4, the operator interpreter sends the instruction to the runtime virtual machine; s5, a virtual machine dispatch instruction; and S6, releasing the executed instruction by the virtual machine. According to the dynamic graph execution method and device for neural network calculation provided by the invention, the runtime is abstracted as the virtual machine, and the virtual machine obtains the sub-graph scheduling of each step established by the user through the interpreter in real time and issues and executes each sub-graph, so that the instant debugging requirement of the user is met, local adjustment and optimization can be realized, and the user experience is improved. And obtaining an optimal local model. And the requirements of algorithm researchers for instantly verifying the algorithm correctness and the local performance of the model in the model development process are met.
Owner:ZHEJIANG LAB

Apparatus and Method for Determining Intersections

In a data processing system for determining intersections between geometric objects, the work is split between a CPU and a stream processor. The intersection determination is controlled by the CPU. Data processing intensive parts of intersection algorithms, such as checking possible overlap of objects, checking overlap of normal fields of objects, approximating the extent of an object, approximating the normal fields of an object, or making conjectures for intersection topology and / or geometry between objects, are run on the stream processor. The results of the algorithmic parts run on the stream processor are used by the part of the algorithms run on the CPU. In cases where conjectures for the computational result are processed on the stream processor, the conjectures are checked for correctness by algorithms run on the CPU. If the correctness check shows that the result found is incomplete or wrong, additional parts of the algorithm are run on the CPU and possibly on the stream processor.
Owner:SINVENT AS

Efficient and safe two-party computing system and computing method based on cooperation

The invention discloses an efficient and safe two-party computing system and method based on cooperation, and the system comprises: a function-independent preprocessing module which is used for pre-generating verifiable random bit sharing shares and a label pair set of an input line, which are needed by safe computing, for two communication parties; a function correlation preprocessing module, wherein participants serve as confusion parties respectively, and verifiable confusion circuit sharing shares are generated for the first half circuit and the second half circuit respectively; an input preprocessing module, wherein a calculation side obtains a label set corresponding to a true value masking value form of each input line of the circuit; a circuit analysis module, wherein participants serve as calculation parties in sequence, confusion circuits of a front half circuit and a rear half circuit are recovered and analyzed respectively, and the correctness of circuit calculation is verified; and an output module, wherein the two communication parties obtain the corresponding masking values from the output line labels and recover the output true values. According to the system, circuit calculation correctness and input privacy can be ensured, communication complexity is low, both parties share calculation pressure, safety calculation efficiency is high, and malicious opponents can be resisted.
Owner:BEIHANG UNIV

Processor based on semi-custom register file and fault-tolerant method

The invention discloses a processor based on a semi-custom register file, which comprises a five-stage assembly line, an error detecting-and-correcting module, a crossover network register file and a check code generation module, wherein a processor fault-tolerant method comprises following steps: when an error that can be corrected occurs in datum of the register file, the assembly line is restarted to correct the error and related instructions are re-performed; when an error that can't not be corrected occurs in the datum of the register file, the assembly line is restarted to detect the backup datum of the error datum of the register file; if the backup datum are right, the subsequent processor processing is performed with the backup datum; if an error that can't be corrected also occurs in the backup datum, the processor will enter trap processing program; and the error is recovered by software. By a plurality of rollbacks and restarts of the assembly line, and the scheduling to an operand access address, the error that can be corrected is refreshed and the backup datum are polled correctly; and a data backup in rebundant hardware is dug out, thus the data reliability of the register file is improved.
Owner:NO 771 INST OF NO 9 RES INST CHINA AEROSPACE SCI & TECH

Text style processing method and device, electronic equipment and storage medium

The invention discloses a text style processing method and device, electronic equipment and a storage medium, relates to the computer technology, and particularly relates to the technical field of artificial intelligence such as natural language processing and deep learning, and the method comprises the steps: obtaining a to-be-processed original statement and a target speaker identifier; obtaining a style rewriting rule set and a decision model corresponding to the target speaker identifier; performing style rewriting on the original statement based on the style rewriting rule set to obtain arewriting result corresponding to each rewriting position in the original statement; utilizing the decision model to judge each rewriting result so as to determine the accuracy of each rewriting result; and generating a rewriting statement corresponding to the original statement based on each rewriting result of which the accuracy is greater than a threshold. According to the method, the controllability of the result is guaranteed by utilizing rule rewriting, whether the rewriting result is adopted or not is judged by utilizing the decision model, the long-distance modeling advantage of the model is exerted, the correctness of rewriting is improved, the rewriting effect of the text style is integrally improved, and the text is better matched with the voice library.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Privacy protection and verifiable federated learning method based on zero knowledge proof

The invention relates to a federated learning method for privacy protection and verifiable privacy based on zero knowledge proof, which belongs to the technical field of artificial intelligence machine learning and comprises the steps of training task release, local training, proof generation, training result submission, training process verification and training parameter aggregation. According to the method, the correctness of the training process is proved to the publisher under the condition that the privacy data of the trainer is not leaked by utilizing a zero-knowledge proving technology in the federation learning process. According to the method, a training algorithm used in federated learning is not limited and required, and the proving of any training process is supported, so that the federated learning has the properties of verifiability and privacy protection, and the safety of the federated learning is improved. Meanwhile, a method for converting a decimal machine learning process into an integer machine learning process is adopted, the complex machine learning process is expressed through a series of simple operation combinations related to addition, subtraction, multiplication and division, and the machine learning process and cryptography are organically connected and combined.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Text proofreading method and device, computer readable storage medium and electronic equipment

The invention relates to a text proofreading method and device, a computer readable storage medium and electronic equipment. The method comprises the steps of determining error correction informationof each sentence in a to-be-proofreading text, wherein the error correction information comprises an error word and at least one error correction word corresponding to the error word; for each error word, respectively determining a first co-occurrence frequency and a second co-occurrence frequency of the error word and front and back words of the error word in a preset corpus; for each error correction word corresponding to the error word, obtaining semantic features; and judging whether the error correction word is correct or not at least according to the first co-occurrence frequency, the second co-occurrence frequency and the semantic features. The correctness of the error correction words is judged, and the text proofreading accuracy can be improved. When the correctness of the error correction words is judged, the matching of front and back words and context semantic features are comprehensively considered, so that the accuracy of judging the correctness of the error correction words can be ensured, and the text proofreading accuracy is further improved. Moreover, the calibration work is intelligent and automatic, the pressure of manual calibration is reduced, the working efficiency is improved, and the labor cost is reduced.
Owner:北京百分点科技集团股份有限公司

Viewpoint statement correctness judgment method and device, equipment and storage medium

The invention discloses a viewpoint statement correctness judgment method, thereby solving a technical problem that the judgment result is inaccurate due to the fact that the judgment behavior of judging viewpoint correctness only according to assertion is too one-sided in the prior art. The method comprises the following steps: obtaining a target text; recognizing viewpoint sentences in the target text and entity names, entity values and entity time in the viewpoint sentences, the viewpoint sentences representing that the values of the entity names in the entity time are the entity values; marking viewpoint statements in the target text; inputting the entity time in the viewpoint statement and the marked target text into a tense analysis model to enable the tense analysis model to analyzethe tense of the viewpoint statement; and judging whether the viewpoint statement is correct or not according to the entity name, the entity value, the entity time and the tense of the viewpoint statement. The invention further discloses a viewpoint statement correctness judgment device, computer equipment and a computer readable storage medium. In addition, the invention also relates to a modeltraining and block chain technology in artificial intelligence.
Owner:PING AN ASSET MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products