Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

213 results about "Genetic Sequence Databases" patented technology

Records in sequence databases are deposited from a wide range of sources, from individual researchers to large genome sequencing centers. As a result, the sequences themselves, and especially the biological annotations attached to these sequences, may vary in quality.

API use action discovering and malice deciding method after confusion of multi-tier synergism

InactiveCN101359352ASolve the problem that it is difficult to find the behavior of API function callsEasy to understandPlatform integrity maintainanceProgram controlSequence databaseConfusion
The invention relates to a stratification synergic detection and judgment method for detecting the confused API call behavior and judging the maliciousness of the call behavior; the detection and judgment method includes three steps: firstly, the binary code for being analyzed is disassembled to establish the control flow graph (CFG) of the program; the known unconventional instruction or data sequence provided with the API function call capability and stored in the database DB1 is adopted to recognize the unconventional call behavior of the API function; secondly, the generation operation of the API sequence called by the target program is finished; the API function is recognized and recovered in the aspects of direct call and indirect call; finally, the extraction of the API sequence and the maliciousness judgment operation are finished; the extraction of the sequence is finished and based on the control flow graph (CFG) of the program; then the obtained sequence is normalized according to the format stored in the suspected API sequence database; the invention provides a stratification synergic detection and judgment method for detecting the confused API call behavior and judging the maliciousness of the call behavior, which has the advantages of wide recognition range, accurate recognition and high efficiency.
Owner:THE PLA INFORMATION ENG UNIV

Digital image encryption method based on chaotic system and nucleotide sequence database

The invention provides a digital image encryption method based on a chaotic system and a nucleotide sequence database. The method comprises the following steps: image pixel positions are scrambled by chaotic mapping index sequence; an image pixel value undergoes DNA coding, and the DNA-coded image pixel value and a DNA sequence in a nucleotide sequence database undergo base operation; and the DNA-coded pixel undergoes base replacement according to a quanternary hyperchaos sequence generated by a hyperchaos Chen system, and confusion and diffusion properties are further enhanced by iteration of a ciphertext feedback and chaotic system. By means of sensibility and pseudo-randomness of chaotic mapping to initial conditions, by combining inherent spatial configuration and unique information processing capability of DNA molecules and through transformation and operation between two chaotic sequences, a DNA sequence database and pixel gray value, the purpose of confusion and diffusion is achieved so as to realize encryption of digital images. It shows through experimental results that the method has a large keyspace, has strong sensitivity to a secret key and can effectively defense attack operations such as statistical analysis, exhaustion analysis and the like.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Biological sequence data-base searching multilayered accelerating method based on flow process

The invention discloses a multi-level acceleration method of flow-based biological sequence database search, which is to accelerate the search speed of a biological sequence database on the premise of ensuring search accuracy and relatively low cost. The technical proposal is that a cluster system composed of a plurality of personal computers shall be created firstly, and a master control node machine is assigned; the master control node machine distributes the database sequence and stores into each node machine in the cluster system, so as to fill and rearrange an inquiry sequence, and distribute the inquiry sequence to all the node machines in the cluster system; each node machine executes the search task in parallel, so as to be responsible for the completion of search tasks of the inquiry sequence in a local database sequence; the master control node machine collects, summarizes and outputs the results of parallel search tasks on all the node machines. The invention makes the search tasks be executed in parallel between the n node machines of the cluster, each node machine distributes the comparative calculation task of two sequences to p hardware calculation clusters to be conducted in parallel, thereby realizing the multi-level acceleration objective in parallel of three layers including a cluster node layer, a flow-level calculation layer, as well as a flow inner core command layer.
Owner:NAT UNIV OF DEFENSE TECH

Detection method for abnormal behaviors based on user access sequence

The invention discloses a detection method for abnormal behaviors based on a user access sequence. The detection method comprises the following steps: 1) capturing data from a local network, preprocessing the data, and performing serializing treatment on the acquired data; 2) storing a sequence formed in the step 1 into a sequence database, and generating a behavior sequence of each user on the basis of time; and 3) calculating the behavior similarity and the correlation coefficient between users according to the behavior sequence of each user, comparing the correlation coefficient for detecting the abnormal behaviors, and searching for the abnormal behaviors of the user. According to the method, on the basis of sequence pattern excavation, factors, such as, time and user behavior characteristics, are fully considered, an improved more accurate user behavior similarity algorithm is utilized to calculate, and the sequence rule of the user access is effectively extracted, so that an analysis result is more accurate and the defects of other analysis methods are overcome. Besides, on the basis of the user behavior similarity algorithm, the method has obvious advantages in noise interference, the used resources are few, and the running efficiency is high.
Owner:STATE GRID CORP OF CHINA +3

Network water army behavior detection method and system based on mixed Dirichlet process

The invention relates to a network water army behavior detection method and a network water army behavior detection system based on a mixed Dirichlet process. The network water army behavior detection method includes: collecting original data comprising user behavior features and content features, performing quantization representation on the original data of each dimensionality so as to form history behavior vectors of a user, and forming a user data set to be clustered; clustering the history behavior vectors in the user data set to be clustered so as to obtain at least one classification user behavior set; converting data in the at least one classification user behavior set, and merging data with the same user identification in the data after being converted so as to obtain a sequence database; performing sequence pattern excavation on the sequence database through a pattern excavation module so as to obtain at least one affair sequence pattern corresponding to each classification user behavior set; judging out the classification user behavior set which is a water army username by comparing each affair sequence pattern through a water army judging module. The network water army behavior detection method and the network water army behavior detection system based on the mixed Dirichlet process can easily recognize which category belongs to the water army username.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Method for analyzing characteristic of software vulnerability sequence based on cluster

The invention discloses a method for analyzing the characteristic of a software vulnerability sequence based on a cluster, which belongs to the technical field of information security. The method comprises the following steps: firstly, establishing a software vulnerability sequence database by using the conventional software vulnerability sequence; secondly, analyzing the software vulnerability sequence in the database by using clustering technology so as to generate a plurality of software vulnerability sequence clustering clusters; thirdly, finding the software vulnerability sequence clustering cluster which is most similar to a doubtful vulnerability sequence of software to be tested through similarity computation; fourthly, comparing the doubtful vulnerability sequence of the software to be tested with all software vulnerability sequences in the most similar software vulnerability sequence clustering cluster through a sequence comparison method, and further finding the software vulnerability sequence which is most similar to the doubtful vulnerability sequence of the software to be tested from the software vulnerability clustering cluster; and finally, outputting related vulnerability information, in the software vulnerability sequence database, corresponding to the most similar software vulnerability sequence as a security report. The method improves the analysis efficiency of the software vulnerability sequence.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products