Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

220 results about "Exception analysis" patented technology

Detection and analysis method for abnormal behaviors of user in big data environment

ActiveCN106789885AAbnormal Behavioral IntelligenceAbnormal behavior intelligent detection intelligenceTransmissionSpecial data processing applicationsGranularityAnomalous behavior
The invention relates to a detection and analysis method for the abnormal behaviors of a user in a big data environment. The method is characterized in that the method comprises the following steps: enabling a user abnormal behavior detection system to carry out the abnormality analysis of user access behaviors in an offline mode through machine learning according to the log record of the user in HDFS in one historical statistical period, and building a user behavior model; enabling the user abnormal behavior detection system to carry out the online comparison of real-time behaviors and historical behaviors based on the current real-time user's operation behavior in Storm; transmitting safety early-warning information to Kaffka and displaying the safety early-warning information at a Stream interface if the difference between real-time behaviors and historical behaviors is big, or else judging that the behavior is a legal safe behavior. Compared with the prior art, the method supports the definition of a behavior mode or a user portrait according to the historical use behavior habit of the user at a Hadoop platform through a machine learning algorithm. A training system updates a model each month in a default manner, and the granularity of the model is one minute.
Owner:STATE GRID CORP OF CHINA +2

Turbine set online fault early warning method based on abnormality searching and combination forecasting

The invention discloses a turbine set online fault early warning method based on abnormality searching and combination forecasting, and belongs to the technical field of electric system early warning. The turbine set online fault early warning method includes the steps of carrying out input initializing processing responsible for segmenting an input parameter time sequence in a standardization mode, and extracting a sequence characteristic mode; carrying out abnormality characteristic boundary training: obtaining an abnormality searching reference standard by training normal state parameters; carrying out abnormality searching: determining an abnormality sequence set by searching characteristic boundary crossing; identifying an abnormality change trend through regression analysis to obtain abnormality analysis of an abnormality distribution change rule; building a forecasting model to carry out trend forecasting on abnormal changes; carrying out early warning output according to the forecasting result in cooperation with the corresponding relation between abnormality parameters and fault symptoms. According to the turbine set online fault early warning method, the defect that in traditional monitoring analysis, only a limiting value theory is used, the abnormality can not be completely identified is overcome, the abnormality early warning accuracy and the abnormality early warning depth are improved, and beneficial evidences are provided for unit fault causes and responsibility ascription.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID +1

Weighted convolutional autoencoder-long short-term memory network-based crowd anomaly detection method

The invention discloses a method for performing anomaly detection by a weighted convolutional autoencoder-long short-term memory network (WCAE-LSTM network). The method is devoted to perform anomaly detection and positioning by learning a generation model of a mobile pedestrian, thereby guaranteeing the public safety. The invention provides a novel double-channel framework, which learns generationmodes of an original data channel and a corresponding optical flow channel and reconstructs data by utilizing the WCAE-LSTM network, and performs the anomaly detection on the basis of a reconstruction error. In addition, for the problem of complex background, it is proposed that a sparse foreground and a low-rank background are separated by adopting modular robust principal component analysis decomposition; and a weighted Euclidean loss function is designed according to obtained background information, so that background noises are inhibited. The designed WCAE-LSTM network can not only perform the anomaly detection globally but also roughly locate an abnormal region locally; and through the joint consideration of global-local anomaly analysis and optical flow anomaly analysis results, finally robust and accurate detection of abnormal events is realized.
Owner:CHANGZHOU UNIV

Internal threat detection system based on mining of business process model and detection method thereof

The invention relates to an internal threat detection system based on mining of a business process model and a detection method thereof. The detection system comprises a model mining module, an abnormality detection module and an abnormality analysis model, wherein the model mining module implements model mining according to an event log of each business event in a business system, and thus acquires a business control flow model, a business performance model and an executor behavior model; the abnormality detection module detects logic abnormality, performance abnormality and behavior abnormality of the event log generated during a real-time operation process of a business activity according to the model mining module; and the abnormality analysis model parses a detection result of the abnormality detection module, recognizes execution information about implementation of an internal threat and outputs the information. According to the internal threat detection system based on mining of the business process model established in the invention, the internal threat behavior existing in the business execution process is effectively detected, a powerful support is provided for enterprises and various organizations to prevent the internal threat, and information security of enterprises and organizations is effectively ensured.
Owner:THE PLA INFORMATION ENG UNIV

Remote data acquisition and analysis system for filling production line and abnormity analysis method thereof

The invention discloses a remote data acquisition and analysis system for a filling production line, including a data acquisition terminal for real-time on-line acquisition of production characteristic data, a data center server for transmitting and storing production characteristic data and a remote client of a data collection and analysis system for processing the production characteristic data,wherein the remote client of the data collection and analysis system reads the production characteristic data from the data center server and analyzes the production characteristic data; The remote client of the data acquisition and analysis system comprises a user login and management module, a device parameter real-time monitoring module, an on-line data analysis module, an expert meeting module, a filling scene video monitoring module and a production inquiry module. The remote client comprises a user login and management module, a device parameter real-time monitoring module, an on-line data analysis module, an expert meeting module, a filling scene video monitoring module and a production inquiry module. The system can collect the data of every working link of the filling productionline, monitor the production process of the filling production line in real time and remotely, and analyze the quality of the filling product on-line, which is helpful to improve the qualified rate and quality of the product and save the cost of fault diagnosis.
Owner:SOUTHEAST UNIV +1

Industrial control network security detection system and detection method

The invention relates to the field of industrial control network security vulnerability detection. In order to achieve thorough and comprehensive detection of industrial control network security vulnerabilities, effectively discover unknown security vulnerabilities, and find out a root cause of the industrial control network security vulnerabilities, the invention provides an industrial control network security detection system, wherein a test case module provides test cases for a fuzzy test engine; the fuzzy test engine generates a test data packet and performs security detection on a detection target, and obtains test results including "normal", "other" and "suspected vulnerabilities"; a monitor monitors the state of the detection target in real time; a root cause analysis module drives the fuzzy test engine to perform attack replay, after the vulnerability verification is successful, performs abnormality analysis on an abnormal data packet, and obtains the root cause of the security vulnerabilities; and a report generation engine generates a test report. The industrial control network security detection system provided by the invention is used for carrying out security detection, and the detection is thorough and comprehensive, which can effectively find the unknown security vulnerabilities and obtain the root cause of the security vulnerabilities.
Owner:BEIJING KUANGEN NETWORK TECH

Electricity consumption information acquisition data exception analysis method based on isolated forest algorithm

The invention discloses an electricity consumption information acquisition data exception analysis method based on an isolated forest algorithm, and the method comprises the steps of building a transformer area line loss management index based on an electricity consumption information acquisition system, and formulating a transformer area line loss management method based on the electricity consumption information acquisition system; for the line loss type transformer areas, adopting a cloud storage technology to realize acquisition, classification and processing of the power utilization information data of the line loss type transformer areas; analyzing and summarizing the type of the dirty data, eliminating the noise according to the representation form of the dirty data, and removing the dirty data; converting the cleaned and screened data into a form beneficial to data mining through data conversion; establishing a data analysis model by applying the isolated forest algorithm; andperforming model evaluation by applying the ROC curve and the area AUC under the curve and the cumulative recall ratio curve and the P-R curve of the subject, applying the model to a plurality of lineloss type transformer area power consumption information data sets, performing data mining on the screened data, and screening the power consumption abnormal users. According to the method, the dataabnormal users are effectively mined by adopting the isolated forest algorithm, the line loss reasons are analyzed, and the line loss management of the transformer areas is enhanced.
Owner:CHINA THREE GORGES UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products