Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

777 results about "Event monitoring" patented technology

In computer science, event monitoring is the process of collecting, analyzing, and signaling event occurrences to subscribers such as operating system processes, active database rules as well as human operators. These event occurrences may stem from arbitrary sources in both software or hardware such as operating systems, database management systems, application software and processors. Event monitoring may use a time series database.

LED street lamp control system based on electric power carrier communication technology

The invention discloses an LED street lamp control system based on an electric power carrier communication technology, which is in a three-layer network structure comprising a single lamp controller, a centralized controller and a management center, wherein the single lamp controller takes a singlechip as a core to be in charge of controlling a street lamp and collecting street lamp working parameters; the centralized controller adopts embedded system design, operates a power line carrier technology and carries out group or single control on street lamps in areas according to preset illumination strategy and assistant illumination intensity control strategy; the management center is mainly composed of a personal computer PC and street lamp system management software to display lamp street state (luminance, voltage, current and power) information; and a GPRS wireless transmission technology or Internet network is used for realizing the remote management of the street lamp switch and luminance regulation. Thus, by using the system, operations such as scheduling events, data record reading, event monitoring, warning response and the like can be realized, and historical data can be inquired.
Owner:TIANJIN POLYTECHNIC UNIV

Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events

Enhanced monitoring for an event candidate, as performed by a master node in a wireless node network with a server and at least one ID node, generally has the master node detecting a first signal broadcast by the ID node; identifying the event candidate as a first sighting event when detecting the first signal; generating and reporting event data representing the first sighting event (e.g., an ID node identifier, timing, and signal strength information); identifying the event candidate as a sporadic event related to the ID node when (1) there is no identified first benchmark checkpoint event related to the ID node and (2) there is no detected subsequent signal broadcast by the ID node within a gap time period from when the latest signal from the ID node was detected; generating and reporting event data representing the sporadic event (e.g., timing and signal strength information) if the master node identifies the sporadic event; determining a signal strength average value for certain subsequent successive ID node signals including the first signal as long as an elapsed time between each of the subsequent successive signals is less than the gap time; identifying the event candidate as a first benchmark checkpoint event representing the state of the ID node based upon the signal strength average value; and generating and reporting event data representing the benchmark checkpoint event (e.g., timing and signal strength information).
Owner:FEDEX SERVICES

Distributive dynamic load management system and distributive dynamic load management method

InactiveCN103188345AImprove load balancing effectAddressing Load Transfer Volatility IssuesData switching networksCluster systemsManagement system
The invention discloses a distributive dynamic load management system and distributive dynamic load management method. The system consists of distributive processing clusters with dynamic load management function and P2P (Peer to Peer) complete equal frameworks. The processing clusters are not provided with central nodes controlled intensively but are provided with a plurality of processing nodes. Each processing node can independently provide distributive arbitral dynamic load management capacity and the nodes are completely same in right and dynamic load management function but same or different in event processing capacity. Each processing node is a control core of the dynamic load management system, and is provided with four modules, namely an event processing module, an event monitoring module, an event issuing module and a dynamic load management module. According to the system and the method, distributive dynamic load management can be realized under a distributive network environment, so that system load transfer fluctuation caused by change of data processing request hot spots and system load balance during node dynamic change can be effectively solved. The robustness of the system can be effectively ensured when the processing nodes of the distributive cluster system are overloaded under the P2P environment.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Bayesian network-based multi-step attack security situation assessment method

The invention relates to a network security situation assessment method, in particular, a Bayesian network-based multi-step attack security situation assessment method. The method includes the following steps that: multi-step attack generating patterns are mined through association analysis, so that an attack graph can be constructed; a Bayesian network is established according to the multi-step attack graph, attack wills, probability of success of attacks and the accuracy of event monitoring are defined as the probability attributes of the Bayesian network; based on the event monitoring, a multi-step attack risk is calculated according to the posterior reasoning and cumulative probability of the Bayesian network; and the security situations of a host and the whole network are quantitatively assessed according to a hierarchical quantitative assessment method. With the method of the invention adopted, the problem of lack of correlation analysis in a network security situation assessment process can be solved. According to the method of the invention, monitoring events are taken into risk assessment, and a network security situation assessment model is accurately established, and therefore, the effectiveness and real-time performance of the method of the invention can be enhanced.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Systems and methods for simulating a particular user in an interactive computer system

The field of the invention relates to interactive computer systems and more particularly to systems and methods for simulating a particular user's behavior in an interactive computer system. In one embodiment, a computer program product includes a simulator configured to simulate a user interacting with a computer program. The simulator includes a learning mode of operation and a simulation mode of operation. During the learning mode, the simulator is configured to monitor the user's interaction with the computer program for one or more events and analyze one or more current circumstances during the occurrence of the one or more events. The simulator is further configured to record one or more user inputs in response to the occurrence of the one or more events, store the one or more user inputs in one or more data fields, and associate the one or more data fields with the one or more events and the one or more current circumstances. During the simulation mode of operation, the simulator is configured to monitor the computer program for the one or more particular events, retrieve the one or more data fields associated with the one or more particular events, analyze one or more current circumstances upon the occurrence of the one or more particular events, and invoke one or more simulated inputs based on the value of the one or more data fields in response to the occurrence of the one or more events and the one or more current circumstances.
Owner:TAKE TWO INTERACTIVE SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products