Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Demand modeling" patented technology

Demand modeling uses statistical methods and business intelligence inputs to generate accurate demand forecasts and effectively address demand variability. Demand modeling is becoming more important because forecasting and inventory management are being complicated by the increasing number of slow-moving items, the so-called “long-tail” of the product range, many of which have unpredictable demand patterns in which the typical “normal distribution” assumption used by traditional models is totally inadequate. In these scenarios, successfully managing forecasts and inventories requires advanced demand and inventory modeling technologies in order to reliably support high service levels.

Embedded software security automation verification system and verification method thereof

The invention discloses an embedded software security automation verification system and a verification method thereof. According to the technical scheme, double verification of software security is realized in combination with a model checking-based formal verification technology and a model-based software test technology. The automation verification system disclosed by the invention comprises four parts, which are a software demand modeling module, a security verification rule database, a formal verification module, and a security test module respectively. The software demand modeling module comprises two sub-modules, wherein the ICD modeling module describes a software external cross-linking environment, and the formal modeling module describes a software internal behavior. The security verification rule database is constructed and used for storing security verification rules. The formal verification module is constructed and used for performing model verification on a software demand based on the security verification rules and a model detection algorithm. The software detection module comprises two modules, wherein the test case generation module is used for generating an executable security case, and a test case translation module performs format conversion on the generated case.
Owner:CHINA AERO POLYTECH ESTAB

Individualized travel information screening method matching user characteristics

The invention provides an individualized travel information screening method matching user characteristics. The individualized travel information screening method comprises individualized demand modeling and mapping rule modeling. The individualized requirement modeling comprises entity demand modeling and line demand modeling, wherein the entity demand modeling adopts a two-layer granularity classification method to carry out classification processing on entity demand parameters and the line demand modeling adopts a three-layer granularity classification method to carry out classification processing on all line demands. The mapping rule modeling comprises a mapping algorithm and a recommended algorithm. According to the individualized travel information screening method provided by the invention, an individualized algorithm matching the user characteristics is designed to aim at the characteristics that the total user quantity of travel industries is great, the total historical data quantity is abundant, the single user data quantity is small and the like: after a user logs in a system, no parameters are needed to be input; and travel services which are the most needed can be initiatively recommended to the user according to the user characteristics, so that the individualized demands of the user are satisfied and a lot of time of the user is shortened.
Owner:HAINAN UNIVERSITY

Element multi-dimensional frequency correlation calculation-based semantic modeling method for data mapping, information mapping and knowledge mapping frameworks

In order to improve the economic benefit and obtain maximum values of benefit enhancement and strategic investment practice from efficiency enhancement and strategic investment practice, the invention discloses an element multi-dimensional frequency correlation calculation-based semantic modeling method for data mapping, information mapping and knowledge mapping frameworks, and belongs to the technological cross fields of distributed computation and software engineering. According to the method, data observation and collection in software development activity demand analysis are analyzed on the basis of data mappings, and structure frequencies, time frequencies and space frequencies of data are marked. According to the method, information mappings are used for recording the frequencies of interactions between entities, and the problems of incorrect information flow control and information loss in design activities are solved. In demand modeling of detailed design activities, the method disclosed by the invention states the advantage of knowledge mappings relative to UML in the aspect of demand expression, such as integrity and coverage area of semantic expressions in the demands.
Owner:HAINAN UNIVERSITY

An embedded software security automatic verification system and verification method thereof

The invention discloses an embedded software security automation verification system and a verification method thereof. According to the technical scheme, double verification of software security is realized in combination with a model checking-based formal verification technology and a model-based software test technology. The automation verification system disclosed by the invention comprises four parts, which are a software demand modeling module, a security verification rule database, a formal verification module, and a security test module respectively. The software demand modeling module comprises two sub-modules, wherein the ICD modeling module describes a software external cross-linking environment, and the formal modeling module describes a software internal behavior. The security verification rule database is constructed and used for storing security verification rules. The formal verification module is constructed and used for performing model verification on a software demand based on the security verification rules and a model detection algorithm. The software detection module comprises two modules, wherein the test case generation module is used for generating an executable security case, and a test case translation module performs format conversion on the generated case.
Owner:CHINA AERO POLYTECH ESTAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products