Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49 results about "Markov transition" patented technology

A Markov chain is a mathematical system that experiences transitions from one state to another according to certain probabilistic rules. The defining characteristic of a Markov chain is that no matter how the process arrived at its present state, the possible future states are fixed.

Method for classifying encrypted traffic and server, and computer readable storage medium

The invention discloses a method for classifying encrypted traffic and a server, and a computer readable storage medium. The method comprises a training phase and a classification phase, wherein the training phase comprises: obtaining and labeling the encrypted traffic of encrypted applications to obtain a training set; respectively extracting, from the training set, message type sequences of eachencrypted application and converting the sequences into corresponding coding sequences, and calculating the representative length sequence of the applications according to the packet length sequencesof the applications; constructing the Message type Markov transition matrix by using the coding sequences of each application, and constructing the length Markov transition matrix according to the representative length sequence; inputting the coding sequence and the representative length sequence respectively into corresponding transfer matrixes, to generate fingerprints corresponding to the encrypted traffic of the applications; and inputting each fingerprint into the classification model for training to obtain a classification model; and the classification phase comprises: for the data stream to be classified, inputting the fingerprint of the data stream into the trained classification model for classification.
Owner:INST OF INFORMATION ENG CAS

Method and device for extracting characteristic string, network equipment and storage medium

The invention discloses a method and a device for extracting a characteristic string, network equipment and a storage medium. The method comprises the steps of determining a transition probability ofeach two adjacent characters in a candidate characteristic string according to a first-order Markov transition probability matrix for each candidate characteristic string; determining a transition entropy of the candidate characteristic string according to the transition probability of each two adjacent characters and a logarithm of the transition entropy; and recording the candidate characteristic string of which the transition entropy is more than a preset threshold as a first taking characteristic string, and using the effective first taking characteristic string as the extracted target characteristic string. According to the method and the device provided by the embodiment of the invention, according to the first-order Markov transition probability matrix, the transition entropy of thecandidate characteristic string of the data packet can be determined, the candidate characteristic string meeting the transition entropy requirement is recorded as the first taking characteristic string, and the effective first taking characteristic string is used as the extracted target characteristic string. According to the method for extracting the characteristic string provided by the embodiment of the invention, automatic extraction of the characteristic string can be completely achieved without manual intervention.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Method and apparatus for providing predictive maintenance of a device by using markov transition probabilities

A method for providing predictive maintenance of a device, comprises the steps of modeling as a time series of a discretely sampled signal representative of occurrences of a defined event in the operation of the device, the time series being modeled as two-state first order Markov processes with associated transition probabilities, wherein one state applies when the number of the occurrences exceeds a certain threshold, and the other state applies when the number of the occurrences falls below the certain threshold; computing the four transition probabilities the last N states Sn, where N is a predetermined number, conducting a supervised training session utilizing a set of J devices, which have failed due to known causes and considering the two independent probabilities and, the training session comprising computing the two-dimensional feature vectors for the initial M windows of N scans, computing the two-dimensional feature vectors for the final N number of scans, plotting a scatter-diagram of all 2D feature vectors, and deriving a pattern classifier by estimating the optimal linear discriminant which separates the two foregoing sets of vectors; and applying the classifier to monitor the persistence of occurrences of the defined event in the operation of the device.
Owner:SIEMENS CORP

Method and system for detecting illegal data implantation internal attack in smart power grid

ActiveCN104638762AEfficient detectionRealize insider attack behavior analysisCircuit arrangementsTransmissionSmart gridSmart power
The invention discloses a method and a system for detecting illegal data implantation internal attack in a smart power grid. The method adopts a bidirectional channel architecture consisting of gathering, clustering and control centers. The method comprises: (1) a gathering classification module; (2) a system initialization module; (3) a local trust evaluation module; (4) a global trust evaluation module; (5) an internal attach detection module. According to the method and the system, a trust model and a behavior model detection method are focused, and a monitoring and detection system for the illegal data implantation internal attack of the smart power grid is realized by utilizing the intrinsic characteristics of physical coupling and data consistency of the smart power grid on the basis of a graph theory, biotic community, power grid system characteristic vector and characteristic value, markov transition probability matrix theory and technology. The system can resist the internal attack of the smart power grid with high imperceptibility and powerful attack capacity; the implantation attack of illegal data can be high efficiently and accurately detected in the transient stable state process caused by external disturbance or faults.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Public bicycle system regulation and control method based on Markov model

The invention discloses a public bicycle system regulation and control method based on a Markov model. The public bicycle system regulation and control method comprises the steps of: (1) acquiring bicycle lending and returning statistics through a public bicycle information center; (2) dividing the acquired bicycle lending and returning statistics into a prior group and a posterior group, and calculating the statistics of the prior group by using a first-order Markov model parameterize method to obtain prior information used for subsequent inference; (3) combining the prior information with data of the posterior group, and utilizing Bayesian reasoning combined with the Markov model to obtain a Markov transition probability matrix; (4) inferring a public bicycle system OD matrix on the basis of the Markov transition probability matrix; (5) and conducting public bicycle system scheduling by using the OD matrix. The public bicycle system regulation and control method based on the Markov model utilizes the OD matrix statistical inference for conducting public bicycle system scheduling in real time, can obtain data easily, avoids solving the unclosed problem, effectively utilizes the prior information and improves accuracy of the obtained data.
Owner:SOUTHEAST UNIV

Slot-cutting evidence obtaining method based on LBP and extended Markov features

The invention belongs to the technical field of image processing and digital image evidence obtaining, proposes an algorithm for more effective detection of slot-cutting tampering, and solves an insensitive problem when the conventional Markov features are used for detecting the slot-cutting tampering proportion. A slot-cutting evidence obtaining method based on LBP and extended Markov features comprises the steps: respectively calculating Markov transition probability matrixes with the differential two-dimensional JPEG matrix steps q=1 and q=4 in four directions in the LBP domain: horizontaldirection, vertical direction, leading diagonal direction and secondary diagonal direction; carrying out the fusion of the features obtained under the condition q is equal to one and the features obtained under the condition q is equal to 4; extracting 648(324*2)-dimensional features, and carrying out the mathematic modeling of the 648-dimensional features in the obtained transition probability matrixes; taking the model as a feature vector, and carrying out the training and detection of the feature vector through an SVM (support vector machine), so as to detect whether the slot-cutting tampering of the image is carried out or not. The method is mainly used in an image processing occasion.
Owner:TIANJIN UNIV

Markov chain based method for classifying coherent generator groups of wind power plant

The invention relates to a Markov chain method for classifying coherent generator groups of a wind power plant. The method comprises the steps as follows: active data and reactive data of wind turbine generators in the wind power plant are processed to enable the data to have the Markov property; a random process matrix is built, Gaussian weight processing is performed, and a Markov transition matrix is obtained; the Markov transition matrix is subjected to spectral analysis to solve a feature value, a left feature vector and a right feature vector, and the number of the classified coherent generator groups is determined; a transition probability distance between any two wind turbine generators is calculated and compared with a set threshold value to determine whether the two wind turbine generators are classified in the same generator group; and the classification result of the coherent generator groups is corrected comprehensively. The classification method utilizes actual physical data of the wind power plant, the real characteristics of the wind power plant can be reflected better, the foundation is established for completely and accurately analyzing the influence of scale type wind power plant grid connection on grid operation, and the method has positive influence on improvement of grid operation level.
Owner:STATE GRID CORP OF CHINA +1

Regulation method of public bicycle system based on Markov model

The invention discloses a public bicycle system regulation and control method based on a Markov model. The public bicycle system regulation and control method comprises the steps of: (1) acquiring bicycle lending and returning statistics through a public bicycle information center; (2) dividing the acquired bicycle lending and returning statistics into a prior group and a posterior group, and calculating the statistics of the prior group by using a first-order Markov model parameterize method to obtain prior information used for subsequent inference; (3) combining the prior information with data of the posterior group, and utilizing Bayesian reasoning combined with the Markov model to obtain a Markov transition probability matrix; (4) inferring a public bicycle system OD matrix on the basis of the Markov transition probability matrix; (5) and conducting public bicycle system scheduling by using the OD matrix. The public bicycle system regulation and control method based on the Markov model utilizes the OD matrix statistical inference for conducting public bicycle system scheduling in real time, can obtain data easily, avoids solving the unclosed problem, effectively utilizes the prior information and improves accuracy of the obtained data.
Owner:SOUTHEAST UNIV

A method, device, network equipment and storage medium for extracting feature strings

The invention discloses a method, device, network equipment and storage medium for extracting a feature string, including: for each candidate feature string, according to the first-order Markov transition probability matrix, determine every two adjacent characters in the candidate feature string transition probability; according to the transition probability of every two adjacent characters and the logarithm of the transition probability, the transition entropy of the candidate feature string is determined; the candidate feature string whose transfer entropy is greater than the preset threshold is marked as the first feature string to be used , using the effective first feature string as the extracted target feature string. In the embodiment of the present invention, according to the first-order Markov transition probability matrix, the transition entropy of the candidate feature string of the data packet can be determined, and the candidate feature string whose transfer entropy meets the requirements is marked as the first access feature string, and the effective The first feature string is used as the extracted target feature string. The method for extracting a feature string provided by the embodiment of the present invention does not require manual intervention, and can completely realize the automatic extraction of the feature string.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products