Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3935 results about "Correlation analysis" patented technology

Correlation analysis is a method of statistical evaluation used to study the strength of a relationship between two, numerically measured, continuous variables (e.g. height and weight). This particular type of analysis is useful when a researcher wants to establish if there are possible connections between variables.

Robust, efficient, localization system

Replica correlation processing, and associated representative signal-data reduction and reconstruction techniques, are used to detect signals of interest and obtain robust measures of received-signal parameters, such as time differences of signal arrival and directional angles of arrival, that can be used to estimate the location of a cellularized-communications signal source. The new use in the present invention of signal-correlation processing for locating communications transmitters. This enables accurate and efficient extraction of parameters for a particular signal even in a frequency band that contains multiple received transmissions, such as occurs with code-division-multiple-access (CDMA) communications. Correlation processing as disclosed herein further enables extended processing integration times to facilitate the effective detection of desired communications-signal effects and replication measurement of their location-related parameters, even for the communications signals modulated to convey voice conversations or those weakened through propagation effects. Using prior, constructed, signal replicas in the correlation processing enables elimination of the inter-site communications of the signal representations that support the correlation analyses. Reduced-data representations of the modulated signals for voiced conversation, or for the variable components of data communications, are used to significantly reduce the inter-site communications that support the correlation analyses.
Owner:TRUE POSITION INC

High-interaction honeypot based network security system and implementation method thereof

The invention discloses a high-interaction honeypot based network security system and an implementation method thereof. The system comprises a honeypot monitoring module, a website correlation analysis module, a summarizing analysis/display module, wherein the honeypot monitoring module is used for carrying out classified acquisition on the attack incidents network behavior logs and host behavior logs; the website correlation analysis module is used for carrying out summarization and automatic correlation analysis on the attack incidents network behavior logs and the host behavior logs, and filtering invalid network alarms, capturing known attack incidents, automatically finding out unknown attack incidents, and extracting concealed Internet malicious resource information according to the automatic correlation analysis results; and the summarizing analysis/display module is used for summarizing and accounting known attack incidents and/or unknown attack incidents captured on all honeypot websites, displaying and reducing selected attack incidents for users, and carrying out automatic detection on concealed Internet malicious resources according to the concealed Internet malicious resource information.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT

Network attack scene generating method based on multi-source alarm logs

InactiveCN104539626AReflects security threat statusShow intentData switching networksCorrelation analysisNetwork attack
The invention relates to a network attack scene generating method based on multi-source alarm logs. The network attack scene generating method includes the steps that firstly, the alarm logs generated by multiple network security protection devices are collected, effective alarm log data are extracted through preprocessing, and noise, redundancy or ineffective logs are removed; for the effective alarm logs acquired by one device, log format differences of different devices are shielded through single-source log aggregation and mapping, and attack event information is analyzed and extracted; attack events extracted from different sources are fused and analyzed, and network attack events with high credibility are generated; then through correlation analysis of the attack events, a network attack scene graph is generated, and the whole attack process of one attack operation is analyzed. Due to the fact that the multi-source logs are fused, the analyzed attack event information can more completely and more reliably depict attacks to which a network is subject, attack scenes are acquired through correlation analysis of the attack events, the intentions of attackers can be more clearly shown, and the security threat state of the network can be more clearly reflected.
Owner:THE PLA INFORMATION ENG UNIV

Robust, Efficient, Localization System

Replica correlation processing, and associated representative signal-data reduction and reconstruction techniques, are used to detect signals of interest and obtain robust measures of received-signal parameters, such as time differences of signal arrival and directional angles of arrival, that can be used to estimate the location of a cellularized-communications signal source. The new use in the present invention of signal-correlation processing for locating communications transmitters. This enables accurate and efficient extraction of parameters for a particular signal even in a frequency band that contains multiple received transmissions, such as occurs with code-division-multiple-access (CDMA) communications. Correlation processing as disclosed herein further enables extended processing integration times to facilitate the effective detection of desired communications-signal effects and replication measurement of their location-related parameters, even for the communications signals modulated to convey voice conversations or those weakened through propagation effects. Using prior, constructed, signal replicas in the correlation processing enables elimination of the inter-site communications of the signal representations that support the correlation analyses. Reduced-data representations of the modulated signals for voiced conversation, or for the variable components of data communications, are used to significantly reduce the inter-site communications that support the correlation analyses.
Owner:TRUE POSITION INC

Low current neutral grounding system fault route selecting method by wavelet package decompose and correlation analysis

InactiveCN101162838ARealize correct line selectionStrong anti-arc grounding abilityEmergency protective circuit arrangementsFault locationElectric power systemDecomposition
The present invention relates to a small current grounding system fault line selecting method by wavelet package decomposition and relevant analysis, belonging to the power system relay protection technical field. The method comprises: starting the fault line selecting device and recording wave to acquire transient zero-order current on each of the feeder lines when bus zero-order voltage transient value exceeds limit; calculating energy on each of frequency bands of the transient zero-order current after wavelet package decomposition, summing the energy of transient zero-order current on all the lines according to frequency bands and selecting the frequency bands with the maximum and secondary value of energy and values as the characteristic frequency bands, applying relevant analysis method to line transient zero-order current on the selected characteristic frequency bands in order; and finally determining fault point integrating the relevant analysis results of two frequency bands. The method uses wavelet package decomposition and relevant analysis, thereby effectively using information (amplitude and phase) contained in fault transient process and reflecting differences between fault line and non-fault line to maximum degree. Principle analysis and simulations demonstrate that the method has precise and reliable line selection.
Owner:KUNMING UNIV OF SCI & TECH

Multiple-template matching identity recognition method based on ECG (Electrocardiogram) under electrocardiogram abnormality state

The invention relates to a multiple-template matching identity recognition method based on an ECG (Electrocardiogram) under an electrocardiogram abnormality state, and belongs to the technical field of biological characteristic identity recognition. The ECG data of a user to be recognized is compared with the data of a registered user in a template library to obtain an identity recognition result. The key technology of the method comprises the following steps: carrying out electrocardiosignal preprocessing for eliminating noise interference; carrying out electrocardiosignal decomposition to separate an electrocardiogram waveform of each period; carrying out standardized processing for independently achieving standardization on time and amplitude scales; carrying out characteristic extraction: in the step, characteristics are extracted by wavelet transform, and clustering analysis is carried out by an ISODATA (Iterative Self-organizing Data Analysis Techniques Algorithm) so as to construct an ECC template library; and carrying out correlation analysis: in the step, correlation between ECG test data and each template is calculated, an optimal matching template is selected, and finally, an identity recognition result is obtained. The multiple-template matching identity recognition method provided by the invention utilizes the intrinsic electrocardiosignal of a human body to recognize an identity, and the ECG data under the abnormality state is considered.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Method for scanning, analyzing and handling various kinds of digital information content

Computer-implemented methods are described for, first, characterizing a specific category of information content—pornography, for example—and then accurately identifying instances of that category of content within a real-time media stream, such as a web page, e-mail or other digital dataset. This content-recognition technology enables a new class of highly scalable applications to manage such content, including filtering, classifying, prioritizing, tracking, etc. An illustrative application of the invention is a software product for use in conjunction with web-browser client software for screening access to web pages that contain pornography or other potentially harmful or offensive content. A target attribute set of regular expression, such as natural language words and/or phrases, is formed by statistical analysis of a number of samples of datasets characterized as “containing,” and another set of samples characterized as “not containing,” the selected category of information content. This list of expressions is refined by applying correlation analysis to the samples or “training data.” Neural-network feed-forward techniques are then applied, again using a substantial training dataset, for adaptively assigning relative weights to each of the expressions in the target attribute set, thereby forming an awaited list that is highly predictive of the information content category of interest.
Owner:MICROSOFT TECH LICENSING LLC

Method for remain useful life prognostic of lithium ion battery with model active updating strategy

InactiveCN103778280AEasy Adaptive AcquisitionFlexible inferenceElectrical testingSpecial data processing applicationsHealth indexEngineering
The invention relates to a method for remain useful life prognostic of a lithium ion battery with a model active updating strategy. According to a time series obtained through a voltage range of a discharge curve, conversion is conducted so that an equivalent discharge difference series obtained by discharge circulation at each time can be obtained, and therefore a health index time series of the ion battery is obtained; according to correspondence of a discharge voltage series and a time series, prognostic is conducted on the health index series to determine the remain useful life of the battery. Sampling entropy characteristic extraction and modeling are conducted on a charge voltage curve so that a relationship between a complete and accurate charge / discharge process and a battery performance index can be provided. On the basis of a performance index model, a short-term time series prognostic result is continuously updated to a known performance index data series and correlation analysis is conducted. According to the difference of the correlation degrees, retraining is conducted in the mode of training set expansion. The method is different from an existing iteration updating draining method, the prognostic model is updated dynamically, and therefore the prognostic precision is improved.
Owner:SHANGHAI JIAO TONG UNIV

Movement space-time trajectory analysis method in sense network environment

The invention relates to the technical field of movement behavioral analysis and prediction in a sense network environment, and specifically to a movement space-time trajectory analysis method in the sense network environment. The movement space-time trajectory analysis method in the sense network environment comprises data reception of receiving trajectory movement position data generated by a positioning device and resolving the data format into a data format applicable to data treatment; semantic treatment of performing clustering operation on the semantic trajectory data; space-time correlation of performing characteristic analysis and statistics on clustered semantic trajectory data in a time domain and a space domain, and performing time-space correlation analysis in combination with the time domain and the space domain; correlation similarity analysis of calculating space-time correlation similarity of the semantic trajectory and performing analysis and calculation on the correlation among different space domains and different movement objects; outputting a result. The movement space-time trajectory analysis method in the sense network environment solves the problem of continuous treatment and mutual correlation of time and space dimensions in a traditional transactional database, and meets the need from a sense network application service to real-time analysis of trajectory movement data.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Combination forecast modeling method of wind farm power by using gray correlation analysis

ActiveCN102663513AAvoiding the quadratic programming problemFast solutionForecastingNeural learning methodsPredictive modellingPrediction algorithms
The invention discloses a combination forecast modeling method of wind farm power by using gray correlation analysis, belonging to the technical field of wind power generation modeling. In particular, the invention is related to a weighted combination forecast method of wind power based on a least square support vector machine and an error back propagation neural network. The forecast method comprises that forecasted values of wind speed and wind direction are acquired in advance from meteorological departments while real-time output power is acquired from a wind farm data acquiring system; that the forecasted values of wind speed and wind direction and the real-time output power are inputted into a data processing module for data analyzing extraction and data normalization, and then normalized data is loaded to a database server; processed data in the database server is extracted by a combination forecast algorithm server to carry out model training and power forecast, and the wind farm sends running data to the data processing module in real time to realize rolling forecasting. The method of the invention achieves the goal of combination forecast of wind farm output in a short time. The method not only maximally utilizes advantages of two algorithms but also increases forecast efficiency by saving computing resources and shortening computing time.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Bayesian network-based multi-step attack security situation assessment method

The invention relates to a network security situation assessment method, in particular, a Bayesian network-based multi-step attack security situation assessment method. The method includes the following steps that: multi-step attack generating patterns are mined through association analysis, so that an attack graph can be constructed; a Bayesian network is established according to the multi-step attack graph, attack wills, probability of success of attacks and the accuracy of event monitoring are defined as the probability attributes of the Bayesian network; based on the event monitoring, a multi-step attack risk is calculated according to the posterior reasoning and cumulative probability of the Bayesian network; and the security situations of a host and the whole network are quantitatively assessed according to a hierarchical quantitative assessment method. With the method of the invention adopted, the problem of lack of correlation analysis in a network security situation assessment process can be solved. According to the method of the invention, monitoring events are taken into risk assessment, and a network security situation assessment model is accurately established, and therefore, the effectiveness and real-time performance of the method of the invention can be enhanced.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Transformer state evaluation method based on correlation analysis and variable weight coefficients

InactiveCN102621421AQuickly judge the running statusEasy programmingElectrical testingTransformerWeight coefficient
The invention relates to a transformer state evaluation method based on correlation analysis and variable weight coefficients, which includes collecting data of transformer states; classifying and processing the collected data as a basis of the transformer state evaluating; evaluating the transformer states; applying a correlation analysis method to establish a comprehensive state quantity evaluation system of the transformer; utilizing a single state quantity score calculating method and a transformer overall score calculating method to grade the transformer states; extracting constant weight coefficients of each of single state quantities and comprehensive state quantities; calculating constant weight coefficients of each of the comprehensive state quantities; calculating an overall score of the transformer states based on scores of each of the comprehensive state quantities and the constant weight coefficients; and determining a transformer operation state based on the overall score of the transformer states. The transformer state evaluation method has the advantages that evaluation models are simple and easy to program, no abundant state evaluation samples are needed, operation states of transformers can be determined rapidly, and operation states and conditions of transformers are truly reflected.
Owner:GUIYANG POWER SUPPLY BUREAU OF GUIZHOU POWER GRID CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products