Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

56 results about "First-order logic" patented technology

First-order logic—also known as predicate logic, quantificational logic, and first-order predicate calculus—is a collection of formal systems used in mathematics, philosophy, linguistics, and computer science. First-order logic uses quantified variables over non-logical objects and allows the use of sentences that contain variables, so that rather than propositions such as Socrates is a man one can have expressions in the form "there exists x such that x is Socrates and x is a man" and there exists is a quantifier while x is a variable. This distinguishes it from propositional logic, which does not use quantifiers or relations; in this sense, propositional logic is the foundation of first-order logic.

Data race detection and evidence generation method based on multithreaded program constraint building

The invention provides a data race detection and evidence generation method based on multithreaded program constraint building. The data race detection problem is converted into a constraint solving problem by building a constraint expression according to the multithreaded program semanteme, a constraint solver is used for detecting possible data races and program execution paths triggering the data races are generated; the data race detection and evidence generation method comprises the steps of firstly, carrying out the instrumentation of the detected program, executing the program and obtaining an execution path, secondly, converting the execution path into a quantifier-free first-order logic expression covering all feasible thread interleaving according to the multithreaded program execution semanteme, thirdly, building a data race candidate set according to the sequential relationship of statements when a data race happens and generating candidate conditions for races, and finally, traversing the candidate set to determine whether the data race exists, and if so, generating a corresponding evidence sequence. The method is capable of finding out all data races in once operation without misinformation; for each data race, the evidence sequence indicating the trigger process of the data race is generated.
Owner:XI AN JIAOTONG UNIV

Extraction, expression and modeling method and system of text semantics aimed at elementary mathematical questions

The invention belongs to the technical field of natural language processing for mathematics, in particular to an extraction, expression and modeling method of text semantics aimed at elementary mathematical questions and a corresponding question meaning analysis system of elementary mathematics. The method includes the following steps: as for an inputted mathematical question, using a combination of a word segmentation lexicon and a regular expression to segment words, as for the result after segmenting the words, conducting word conversion and word group combination, and conducting object replacement of reference words through anaphora resolution; then using the information obtained after processing to extract and translate mathematical formulas by virtue of a first-order logic, obtaining a mathematical question expression based on the first-order logic; finally, using deep neural networks to conduct semantic modeling and semantic fusion to the natural language and formulas of the question. The effective expression and modeling method of elementary mathematical questions proposed by the extraction, expression and modeling method and system of text semantics aimed at elementary mathematical questions can convert the mathematical question to a semantic representation which can be processed by a computer and conduct a more precise semantic modeling of mathematical questions.
Owner:FUDAN UNIV

Multithreaded program output uniqueness detection and evidence generation method based on program constraint building

The invention provides a multithreaded program output uniqueness detection and evidence generation method based on program constraint building. The output uniqueness verification problem is converted into a constraint solving problem by building a constraint expression according to the multithreaded program semanteme, a constraint solver is used for detecting whether different outputs are present and counter-example execution paths explaining different outputs are generated; the multithreaded program output uniqueness detection and evidence generation method comprises the steps of firstly, carrying out the instrumentation of the detected program, executing the program and obtaining an execution path, secondly, converting the execution path into a quantifier-free first-order logic expression covering all feasible thread interleaving according to the multithreaded program execution semanteme, thirdly, building a uniqueness verification condition aiming at the output result of once operation, and finally, verifying whether one path is present so that the output value is inconsistent with the operation result by use of the constraint solver. The method is capable of detecting whether the output of the multithreaded program is unique under given input; in case of non-uniqueness of the outputs, a counter-example sequence is shown to explain the trigger process of the non-uniqueness.
Owner:XI AN JIAOTONG UNIV

Fault root cause inference positioning method and device based on artificial intelligence

The embodiment of the invention provides a fault root cause inference positioning method and device based on artificial intelligence. The method comprises the steps of determining an existing fault set through a preset logic analysis statement, wherein the fault set comprises all existing faults; obtaining a fault knowledge graph, wherein the fault knowledge graph comprises an association relationship between each fault and the corresponding fault root cause; determining a fault root cause corresponding to each fault in the fault set according to the root cause topological graph correspondingto the fault knowledge graph; and according to the fault root cause and a preset algorithm, determining a key node corresponding to the fault so as to carry out fault processing in time according to the key node. A derivation relation between faults is established through carding based on the knowledge graph and applying a preset artificial intelligence first-order logic algorithm. According to the method, rules are defined for the fault, the root cause is searched for according to the rules and the currently sampled data, and finally the fault root cause is visually displayed through the topological graph of the software, so that the fault root cause can be rapidly, timely and accurately positioned to facilitate the technicians to process in time.
Owner:广州云岫信息科技有限公司

Network configuration management by model finding

Complex, end-to-end network services are set up via the configuration method: each component has a finite number of configuration parameters each of which is set to definite values. End-to-end network service requirements can be on connectivity, security, performance and fault-tolerance. A number of subsidiary requirements are created that constrain, for example, the protocols to be used, and the logical structures and associated policies to be set up at different protocol layers. By performing different types of reasoning with these requirements, different configuration tasks are accomplished. These include configuration synthesis, configuration error diagnosis, configuration error fixing, reconfiguration as requirements or components are added and deleted, and requirement verification. A method of performing network configuration management by model finding formalizes and automates such reasoning using a logical system called Alloy. Given a first-order logic formula and a domain of interpretation, Alloy tries to find whether the formula is satisfiable in that domain, i.e., whether it has a model. Alloy is used to build a Requirement Solver that takes as input a set of network components and requirements upon their configurations and determines component configurations satisfying those requirements. This Requirement Solver is used in different ways to accomplish the above reasoning tasks.
Owner:TT GOVERNMENT SOLUTIONS

Complex network link prediction method and system based on logical reasoning and graph convolution

The invention discloses a complex network link prediction method and system based on logical reasoning and graph convolution. The method comprises the following steps: constructing a knowledge graph corresponding to a complex network, and obtaining a training set; performing relation reasoning on each entity pair in the training set through a first-order logical reasoning network with default, and obtaining a relation confidence coefficient matrix through mapping; based on the relation confidence coefficient matrix, performing iterative training on a graph convolutional neural network based on iterative attention through a centralized training decentralized execution mechanism and a local relation attention mechanism to obtain first probability distribution; calculating second probability distribution according to a relation weight matrix and a relation confidence coefficient matrix output by network iteration; obtaining a Wasserstein distance between the first probability distribution and the second probability distribution according to a joint evaluation function; iteratively updating the two networks according to a Wasserstein distance to obtain a link prediction model; and complementing the knowledge graph according to the link prediction model. The link prediction efficiency is high.
Owner:NAT UNIV OF DEFENSE TECH

Knowledge verification model construction and analysis method based on probability soft logic

The invention belongs to the technical field of information extraction, and particularly relates to a knowledge verification model construction and analysis method based on probability soft logic, which comprises the following steps of: a, forming a candidate knowledge set by knowledge extracted from webpage web texts of a plurality of data sources by an information extraction system; b, carryingout credibility calculation on the candidate knowledge set; c, performing logic predicate representation on each entity in the candidate knowledge set; d, constructing a first-order logic rule of theknowledge verification model based on the entity analysis and the ontology constraint, generating the first-order logic rule in the probability soft logic model through the constructed logic rule, andachieving entity relationship and entity label verification in the candidate knowledge set; and e, setting probability distribution of the knowledge verification model, and calculating and selectingcorresponding knowledge to be updated through an inference algorithm. According to the method, the candidate knowledge set is verified, so that the accuracy of the candidate knowledge set is greatly improved.
Owner:INST OF ELECTRONICS & INFORMATION ENG OF UESTC IN GUANGDONG

Unified user malicious behavior detecting method and system in social network

The invention discloses a unified user malicious behavior detecting method and system in a social network. The method comprises the steps of: establishing predicates and functions according to characteristics of multiple OSNs, collecting relation graph G and activity traces S, and constructing structural closed atoms and active closed atoms, then extracting the structural closed atoms, and mergingto form a training database; obtaining the first-order logic detecting and judging the malicious behavior; learn the weight of the first-order logic rule based on detecting results and the training database and establishing an MLN model; collecting a relationship diagram and activity traces of to-be-detected OSN and constructing structural closed atoms and active closed atoms, forming a to-be-detected database, and using the MLN model for detection. The unified user malicious behavior detecting method and system in the social network combines the OSN malicious behavior detection methods through the MLN model, realizes the joint detection of multiple malicious behaviors at the same time, and achieves higher detection accuracy. The unified user malicious behavior detecting method and systemin the social network can be widely applied in the field of information security.
Owner:王欣明

Weak supervision relation extraction method based on multi-source semantic representation fusion

ActiveCN111737497AFlexible writingFacilitate adoptionSemantic analysisNeural architecturesSemantic vectorSemantic feature
The invention provides a weak supervision relation extraction method based on multi-source semantic representation fusion. Firstly, distributed word vectors are adopted to initialize context semanticfeatures of text statements, a natural language processing tool is adopted to analyze mass discretized symbol features describing the text features, and a universal first-order logic rule between statement instances and features in a relation extraction task is designed; then, a logic rule is combined with the factor graph to establish a relationship between the text characteristics and the statement instances, modeling is performed from the perspective of human perception through joint statistical reasoning, and a low-dimensional relationship semantic vector for describing the text characteristics is learned; and the semantic information of the statement content encoded by the bidirectional gating loop unit is used as a context content semantic vector. And finally, text characteristic semantic vectors are finely adjusted in the neural network, vector representations of two different characteristic sources are fused to obtain text semantic characteristic representations with higher robustness, and weak supervision relationship extraction work is guided together with entity pair embedded representations.
Owner:DALIAN UNIV OF TECH

Data race detection and evidence generation method based on multithreaded program constraint building

The invention provides a data race detection and evidence generation method based on multithreaded program constraint building. The data race detection problem is converted into a constraint solving problem by building a constraint expression according to the multithreaded program semanteme, a constraint solver is used for detecting possible data races and program execution paths triggering the data races are generated; the data race detection and evidence generation method comprises the steps of firstly, carrying out the instrumentation of the detected program, executing the program and obtaining an execution path, secondly, converting the execution path into a quantifier-free first-order logic expression covering all feasible thread interleaving according to the multithreaded program execution semanteme, thirdly, building a data race candidate set according to the sequential relationship of statements when a data race happens and generating candidate conditions for races, and finally, traversing the candidate set to determine whether the data race exists, and if so, generating a corresponding evidence sequence. The method is capable of finding out all data races in once operation without misinformation; for each data race, the evidence sequence indicating the trigger process of the data race is generated.
Owner:XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products