Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

48 results about "Instance selection" patented technology

Instance selection (or dataset reduction, or dataset condensation) is an important data pre-processing step that can be applied in many machine learning (or data mining) tasks. Approaches for instance selection can be applied for reducing the original dataset to a manageable volume, leading to a reduction of the computational resources that are necessary for performing the learning process. Algorithms of instance selection can also be applied for removing noisy instances, before applying learning algorithms. This step can improve the accuracy in classification problems.

Configuration Model for Configuring an Adapter Software Component to Selectively Access Software Objects and Object Editor Using Instance of Same

An object editor capable of displaying a set of application software objects, which may include objects with a dynamic reflection capability (“reflective objects”), includes an object oriented configuration model instance (CMI), a generic adapter, and a UI framework. The CMI is particular to the set of application objects to be edited and defines a particular view of these objects to be provided by the editor. The CMI is external to the generic adapter and includes settings that control which application objects will be accessed and the manner of access, and in particular, which application objects will be visible, which of the visible objects' attributes will be displayed, the arrangement of displayed application objects and attributes, and the appearance of the displayed objects and attributes. The CMI is stored as a serialized XML file. The generic adapter reads the de-serialized CMI's current settings, selectively accesses the set of application objects to be edited and their attributes as dictated by the CMI settings, and passes the accessed information to the UI framework for display. The adapter uses reflection to access the attributes and associations of reflective objects. The CMI settings may be changed between editor invocations to cause objects or their attributes to be accessed and displayed differently, or not at all. The editor may be configured to edit a new set of software objects by substituting a new CMI corresponding to that set of objects. A CMI and generic adapter may be used in conjunction with applications other than an object editor, in which case the CMI settings define a manner of selectively accessing the application objects and may affect the operation of the application.
Owner:IBM CORP

5G network slice instance dynamic switching method and function

The invention provides a 5G network slice instance dynamic switching method and function. The method comprises the following steps: collecting network state information of a to-be-protected network, wherein the network state information comprises security threat information and connection state information between user equipment and an access network slice instance; judging whether the user equipment meets a set network slice instance switching condition or not according to the security threat information and the connection state information; if yes, initiating a network slice instance switching request to a network slice selection function, wherein the request comprises user equipment information, original network slice instance information and a new network slice instance selection standard; and forwarding the received response message to the network management function, so that the network management function notifies the original network slice instance and the new network slice instance to switch the network slice instance. The dynamic switching function comprises a network state information collection module, a security perception module, a timer module and a switching requestmodule. According to the invention, active defense can be realized, and the communication security of the UE is ensured.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Horror video identification method based on discriminant instance selection and multi-instance learning

The invention discloses a horror video identification method based on discriminant instance selection and multi-instance learning. The method comprises the steps of extracting the video shot of each video in a training video set and selecting an emotional representative frame and an emotional mutation frame for each video shot to show the shot, extracting the audio and video characteristics of the shots as video instances to form a video instance set, selecting a discriminant video instance from the video instance set, calculating the similarity distances between the video instances and the discriminant video instance in the training video set to obtain a characteristic vector set, carrying out sparse reconstruction on the characteristic vector of the video to be identified and the characteristic vector set corresponding to the training video set, and identifying the class of the video according to reconstruction errors. The novel horror video identification method based on the discriminant instance selection and the multi-instance learning is applied to horror film scene identification, is of great academic significance and social significance and has wide application prospects.
Owner:人民中科(北京)智能技术有限公司

Fine-grained resource response system based on load balancing algorithm of container cluster

A fine-grained resource response system based on a load balancing algorithm of a container cluster comprises a request processing module, a data support module, an analysis and decision module, a service instance selection module and a request-service instance matcher, wherein the request processing module calls the data support module and the analysis and decision module to analyze and classify requests and sends a request classification result to the request-service instance matcher; the request-service instance matcher initiates a selection request to the service instance selection module, and the service instance selection module calls the data support module and the analysis and decision module for analyzing and selecting service instances and sends a service instance selection result to the request-service instance matcher; the request-service instance matcher calls the analysis and decision module to perform group matching and individual matching sequentially according to the request classification result and the service instance selection result, and issues the requests to the corresponding service instances according to a matching result, and resource response is realized. The system has a better resource utilization rate.
Owner:SHANGHAI LANDFUN INFORMATION TECH CO LTD

Cross-project defect prediction method based on feature distribution alignment and neighborhood instance selection

A cross-project defect prediction method based on feature distribution alignment and neighborhood instance selection specifically comprises the following steps: selecting source projects from a software defect data set, combining all the source projects to form a source project set, and selecting a target project; calculating a covariance matrix of the source item set and a covariance matrix of the target item; eliminating the correlation between the features of the source item set, filling the feature correlation of the target item into the source item set, and selecting instances with high similarity with instances in the target item from the source item set data after feature alignment to form a training instance set TS; and training a Logistic model by using the training instance set TS, and performing defect prediction classification on each instance in the target project by using the Logistic model. According to the cross-project software defect prediction method, the selection of the training data required by the model is achieved by adopting the feature distribution alignment method and the neighborhood instance selection method, the difference between projects and instances in the cross-project software defect prediction method is effectively solved, and the defect prediction performance is improved.
Owner:XUZHOU NORMAL UNIVERSITY

Object extraction method and device

The embodiment of the invention provides an object extraction method and device, and the method comprises the steps: inputting a first picture comprising at least one object into a semantic segmentation feature network, so as to enable the semantic segmentation feature network to output a first feature map. The first feature graph is processed according to the semantic segmentation classification network, a semantic segmentation result graph is obtained, and the semantic segmentation result graph comprises a graph layer of the object mask graph and a graph layer of the background mask graph. And processing the layers of the first feature graph and the object mask graph according to the interest point generation network to obtain at least one interest point. And processing the first feature map and the at least one interest point according to the interest point control network and the instance selection network to obtain a target mask map corresponding to the at least one interest point. And respectively determining the position of each object in the first picture according to the target mask graph corresponding to the at least one interest point so as to extract at least one object. According to the embodiment of the invention, the effect and accuracy of extracting the rod-shaped object are effectively ensured.
Owner:NAVINFO

Network element discovery method for 4G/5G fusion networking and NRF device

The invention discloses a network element discovery method for 4G / 5G fusion networking and an NRF device used in the 4G / 5G fusion networking, the device is used for realizing the method, the method comprises the following steps that an EPC sends a registration request message to the NRF, wherein the registration request message comprises configuration parameters of the EPC; the NF sends a registration request message to the NRF, wherein the registration request message comprises the NF configuration parameters; a conversion module of the NRF converts the configuration parameters of the EPC into corresponding NF configuration parameter according to the parameter attributes and writes the NF configuration parameter into a cache list of an NF / NF service configuration file; the NRF writes the NF configuration parameter in the NF registration request message into the cache list of an NF / NF service configuration file; the NRF receives a network element service discovery request and / or a subscription request, and retrieves the cache list of the NF / NF service configuration file to determine whether to authorize service discovery; and if it is determined that the service discovery is authorized, the NRF returns a request response message to perform target network element instance selection according to the request response message. According to the invention, multi-network element management of 4G / 5G fusion networking is realized, and the user experience is improved.
Owner:IPLOOK NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products