Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

39 results about "Kullback–Leibler divergence" patented technology

In mathematical statistics, the Kullback–Leibler divergence (also called relative entropy) is a measure of how one probability distribution is different from a second, reference probability distribution. Applications include characterizing the relative (Shannon) entropy in information systems, randomness in continuous time-series, and information gain when comparing statistical models of inference. In contrast to variation of information, it is a distribution-wise asymmetric measure and thus does not qualify as a statistical metric of spread (it also does not satisfy the triangle inequality). In the simple case, a Kullback–Leibler divergence of 0 indicates that the two distributions in question are identical. In simplified terms, it is a measure of surprise, with diverse applications such as applied statistics, fluid mechanics, neuroscience and machine learning.

Vehicle-mounted CAN bus network abnormity detection method and system

The invention, which belongs to the technical field of vehicle-mounted network, discloses a vehicle-mounted CAN bus network abnormity detection method and system. CAN bus abnormity detection based on a relative entropy is performed on an identifier ID; a sliding window with a fixed message number is employed; messages are paired based on a relationship between a message sensing sequence and a sending number, relative entropies of the paired messages and relative entropies of all IDs and normal distribution are calculated, and whether abnormity occurs is determined based on the two kinds of relative entropies; a replay attack and a denial of service attack are detected; CAN bus network abnormity detection based on a message data domain is performed on a data domain; features, including a constant value feature, a cyclic value feature, and a multi-value feature, of the message data domain are extracted; and a normal message model is established based on the extracted features and the message abnormity is detected. Therefore, the replay attack, the denial of service attack, the tampering attack and the forgery attack can be detected effectively and efficiently; more abnormal information is provided; and thus subsequent protection can be performed well.
Owner:XIDIAN UNIV

Automatic driving system and method based on relative-entropy deep and inverse reinforcement learning

The invention relates to an automatic driving system based on relative-entropy deep and inverse reinforcement learning. The system comprises a client, a driving basic data collection sub-system and astorage module, wherein the client displays a driving strategy; the driving basic data collection sub-system collects road information; the storage module is connected with the client and the drivingbasic data collection sub-system and stores the road information collected by the driving basic data collection sub-system. The driving basic data collection sub-system collects the road information and transmits the road information to the client and the storage module; the storage module receives the road information, stores a piece of continuous road information into a historical route, conducts analysis and calculation according to the historical route so as to simulate the driving strategy, and transmits the driving strategy to the client so that a user can select the driving strategy; the client receives the road information and implements automatic driving according to the selection of the user. In the automatic driving system, the relative-entropy deep and inverse reinforcement learning algorithm is adopted, so that automatic driving under the model-free condition is achieved.
Owner:POLIXIR TECH LTD

Sequential accelerated degradation test optimal design method based on relative entropy

The invention discloses a sequential accelerated degradation test optimal design method based on relative entropy, comprising the specific steps of: step 1, utilizing a Bayesian theory to establish an accelerated degradation test optimal design method based on the relative entropy; step 2, establishing a sequential truncation judging method; and step 3, carrying out sequential accelerated degradation test based on the relative entropy. According to the method disclosed by the invention, a 'sequential design' is introduced to an optimal design of the accelerated degradation test for the first time and the sequential accelerated degradation test optimal design method is provided. With the adoption of the 'sequential design', not only can prior information before the test be sufficiently utilized, but also performance degradation information obtained in the test is gradually utilized, and a test design error caused by that the deviation between the prior information and a product real condition is larger is reduced, so that compared with a partial optimal design and Bayesian optimal design of the accelerated degradation test, the sequential accelerated degradation test optimal design method based on the relative entropy has the greater advantage.
Owner:BEIHANG UNIV

Method and device for defending interest flooding attacks in information centric network

The invention provides a method and device for defending interest flooding attacks in an information centric network and relates to the field of network security. The method includes: statistically counting the entropy of the names of interest packets received by a router in the information centric network after different moments according to a preset window; using a cumulative sum algorithm to process the obtained entropy to obtain the accumulative values of the entropy at different moments; judging whether the accumulative values are smaller than a preset attack detecting threshold or not, if not, judging that interest flooding attacks are detected, and using a prefix determining algorithm based on relative entropy to search the prefix set of the names of the interest packets so as to obtain attack prefixes; generating data packets containing the attack prefixes according to the attack prefixes, and transmitting the data packets to the access router where an attacker is located according to the router information of the interest packets, containing the attack prefixes, recorded in the pending interest table of the router so as to allow the access router to perform corresponding access limitation on the received interest packets according to the attack prefixes in the data packets.
Owner:INST OF INFORMATION ENG CAS

Fault diagnosis method and system for rolling bearing based on relative entropy and k-nearest neighbor algorithm

The invention discloses a fault diagnosis method for a rolling bearing based on a relative entropy and k-nearest neighbor algorithm. The method comprises the following steps: acquiring vibration datagenerated by a bearing running under various fault states and vibration data of the bearing running under a health state; calculating a relative entropy vector sequence between the vibration data generated by running under the health state and vibration signals generated by running under the fault states according to a division result; taking the fault types as training samples to obtain a trainedclassifying model; acquiring a relative entropy vector between vibration data generated by running under an unknown state and the vibration signals generated by running under the fault states; and taking the acquired relative entropy vector as a test sample of the classifying model, and testing the test sample by using the classifying model to continually diagnose the fault of the rolling bearingto obtain the diagnosis result. Through adoption of the method, the difference between the vibration signals generated by the bearings under different states is measured by adopting the relative entropy; different feature indexes do not need to be calculated and optimally combined; and the distribution of an original vibration signal can be utilized directly.
Owner:HANGZHOU ANMAISHENG INTELLIGENT TECH CO LTD

Relative entropy prediction method for relative complexity degree of mine unexploited area structure

The invention discloses a relative entropy prediction method for a relative complexity degree of a mine unexploited area structure. The relative entropy prediction method comprises the steps of: acquiring evaluation index data of an exploited area, wherein the evaluation index data comprises three structural type index data including fold type, fault amount and fault scale; calculating a relative entropy actual value S of a relative complexity degree of the exploited area mainly according to the structural type index data; substituting the relative entropy actual value S of the relative complexity degree of the exploited area and non-structural type index data into a formula S=beta<0>+beta<1>x<1>+...+ beta

x

, so as to calculate a relationship parameter beta

and a relationship constant beta<0>; verifying the relationship parameter beta

, and then substituting the relationship parameter beta

, the relationship constant beta<0> and non-structural type index data X

of a mine well field unexploited area into a formula S'= beta<0>+beta<1>X<1>+...+ beta

X

, so as to calculate relative entropy S' of the relative complexity degree of the mine well field unexploited area; and finally judging a complexity degree level corresponding to the relative entropy S' of the relative complexity degree of the mine well field unexploited area by utilizing a relationship comparison table of structural relative complexity degrees and relative entropy. The relative entropy prediction method is simple in operation, and has good prediction effect.

Owner:XIAN UNIV OF SCI & TECH +1

Detection method for micro faults in chemical process

The invention relates to a detection method for micro faults in a chemical process. The method comprises the following steps: normalization processing is carried out on training data and then an LGPCA (local-global principal component analysis) model is established, a local-global feature is extracted from the training data and serves as a score vector, the mean value and the variance of the score vector of the training data are calculated through a sliding window, a training KLD (Kullback Leibler Divergence) component is obtained on the basis, further, main component space statistics T2 and residual space statistics SPE are calculated based on the training KLD component, and a corresponding control limit is determined; test data is collected, a corresponding main component vector and a residual vector are extracted by utilizing the LGPCA model, the mean value and the variance of the test data score vector are calculated by utilizing the sliding window, an online KLD component is further obtained, the main component space statistics T2 and the residual space statistics SPE are calculated on the basis of the online KLD component, and the control limit is used for monitoring. According to the method in the invention, the KLD is introduced into the traditional LGPCA method, the probability information contained in the chemical process data can be fully utilized, and the micro fault detection rate is improved.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

A method and system for identifying abnormal Weibo users

The invention relates to a method for identifying abnormal microblog users. The method comprises the steps of obtaining a plurality of users' microblog data, storing the microblog data into a database, taking statistical distribution of time intervals of user behaviors as behavior time characteristics of the users according to the microblog data of the users, generating behavior time characteristic vectors and defined parameters, calculating Kullback-Leibler divergence between the behavior time characteristic vectors of the normal users and the behavior time characteristic vectors of the users to be detected, judging the users to be detected with the calculated Kullback-Leibler divergence exceeding the defined parameters as the abnormal users, and extracting and showing keywords of contents of the abnormal users. The invention further provides a system for identifying the abnormal microblog users corresponding to the method. According to the method and system, the keywords of the blog article contents of the abnormal users can be extracted quickly, promulgators of junk information such as marketing and advertisements can be identified accurately, and the method and the system are applicable to detection of multiple microblog service platforms, and has the advantages of high accuracy and efficiency and wide applicability.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Defense method and device for interest packet flooding attack in content-centric network

The invention provides a method and device for defending interest flooding attacks in an information centric network and relates to the field of network security. The method includes: statistically counting the entropy of the names of interest packets received by a router in the information centric network after different moments according to a preset window; using a cumulative sum algorithm to process the obtained entropy to obtain the accumulative values of the entropy at different moments; judging whether the accumulative values are smaller than a preset attack detecting threshold or not, if not, judging that interest flooding attacks are detected, and using a prefix determining algorithm based on relative entropy to search the prefix set of the names of the interest packets so as to obtain attack prefixes; generating data packets containing the attack prefixes according to the attack prefixes, and transmitting the data packets to the access router where an attacker is located according to the router information of the interest packets, containing the attack prefixes, recorded in the pending interest table of the router so as to allow the access router to perform corresponding access limitation on the received interest packets according to the attack prefixes in the data packets.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Online variational Gaussian process method for time series data

*The invention discloses an online variational Gaussian process method for time series data, which comprises the following steps of: S1, determining a data set and an observation value by adopting a regression model of a Gaussian process framework; s2, solving variation free energy to perform single data processing, and calculating distribution of corresponding variation lower limits; s3, aiming at the stream data condition, solving the problem by adopting online variational reasoning; s4, solving the model posterior probability by solving the new relative entropy divergence; s5, converting the new relative entropy divergence into minimum variational free energy, and correspondingly solving factor distribution q * (b); s6, solving a variation lower limit to obtain variation free energy; and S7, according to the variational distribution obtained by solving, calculating prediction distribution and a prediction result at any test point. According to the method, the training complexity and the prediction complexity of a traditional Gaussian process algorithm are reduced, the calculation cost is reduced, and the method has the performance equivalent to that of a traditional sparse Gaussian process approximation method.
Owner:YANGTZE DELTA REGION INST OF UNIV OF ELECTRONICS SCI & TECH OF CHINE HUZHOU +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products