Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1187 results about "Network generation" patented technology

Method and apparatus for accessing networks by a mobile device

A method and apparatus for accessing wireless carrier networks by mobile computing devices. An access client hosted by a mobile computing device accesses carrier networks using wireless access points. The access client uses an access point database to identify access points and carrier networks. The access client uses a methods database and a tokens database to access the carrier networks. The access client updates the access point database, the methods database, and the token database using an access server when the access client is operably coupled to a carrier network. The access client transmits user information to the carrier network. The carrier network uses the user information to authenticate the user and to generate session data while the user is accessing the carrier network. The carrier network transmits the session data to the access server. The access server uses the session data to generate billing information for the user. The access client also collects network performance data for individual access points and carrier networks. The access client transmits the network performance data to the access server. The access server aggregates network performance data from a plurality of access clients to generate quality of server reports for both individual access points and carrier networks. The access client further includes access point detection and evaluation features for use by a user in selecting access points available at a single location.
Owner:BOINGO WIRELESS

End-to-end identification method for scene text with random shape

The invention discloses an end-to-end identification method for a scene text with a random shape. The method comprises the steps of extracting a text characteristic through a characteristic pyramid network for generating a candidate text box by an area extracting network; adjusting the position of the candidate text box through quick area classification regression branch for obtaining more accurate position of a text bounding box; inputting the position information of the bounding box into a dividing branch, obtaining a predicated character sequence through a pixel voting algorithm; and finally processing the predicated character sequence through a weighted editing distance algorithm, finding out a most matched word of the predicated character sequence in a given dictionary, thereby obtaining a final text identification result. According to the method of the invention, the scene texts with the random shape can be simultaneously detected and identified, wherein the scene texts comprisehorizontal text, multidirectional text and curved text. Furthermore end-to-end training can be completely performed. Compared with prior art, the identification method according to the invention has advantages of obtaining advantageous effects in accuracy and versatility, and realizing high application value.
Owner:HUAZHONG UNIV OF SCI & TECH

Graphical models for cyber security analysis in enterprise networks

A method of generating graphical models for providing security analysis in computer networks that in one embodiment includes the steps of generating a type abstract graph independent of particular networks that models abstract dependency relationships among attributes and exploits; generating network-specific attack graphs by combining the type abstract graph with specific network information; monitoring an intruder alert; and generating a real-time attack graph by correlating the intruder alert with the network-specific attack graph. The real-time attack graph can be generated using reachability checking, bridging, and exploit prediction based on consequence alerts and may further include the step of calculating the likelihood of queries using a Bayesian network model. The method may also include the steps of inferring unobserved attacks that may have been missed by intrusion detection sensors, and projecting on which hosts and using what exploits additional intruder attacks may occur. The method may further include the step of comparing alternate actions by computation, wherein the alternate actions include the step of patching some vulnerabilities, and wherein the specific network information includes network topology. The specific network information may also include firewall rules.
Owner:INTELLIGENT AUTOMATION LLC

Broadcast tree determination in load balancing switch protocols

A method for generating and maintaining a pruned broadcast tree for a network of switches operating multiple simultaneously active paths between devices with a load balancing family of protocols. The pruned broadcast tree is preferably generated as a by product of cost propagation aspects of the load balancing protocols exchanged among cooperating network switches. The load balance protocols operable within the network switches in association with the present invention permit multiple simultaneously active paths to be utilized among the network devices. The pruned broadcast tree is therefore used to reduce the latency of broadcast messages propagated within the network switches to reach all devices in the network. The broadcast tree defines a minimized set of devices to which a broadcast message need be forward to assure transmission to all network devices. The pruned broadcast tree, once established, is updated only in response to failure of a link and recovery of a failed link. A separate protocol of the present invention enables such pruned broadcast tree modifications and restoration.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Machine translation method and system based on generative adversarial neural network

The invention belongs to the technical field of computers, and discloses a machine translation method and system based on a generative adversarial neural network. The method comprises the following steps that: on the basis of an original machine translation generation network, a discrimination network which generates network countermeasure with the original machine translation generation network is imported; a translation used for judging a target language is from a training parallel corpus and is a network machine translation result of the original machine translation generation network; and the discrimination network adopts a multi-layer sensor feedforward neural network model to realize binary classification. The system comprises the discrimination network, a generation network, a mono-lingual corpus and a parallel corpus. While manually annotated bilingual parallel corpus resources are fully utilized, and mono-lingual corpus resources also can be fully utilized to carry out semi-supervised learning; and the mono-lingual corpus resources are very rich and can be easily obtained, and the problem that required training corpora required by the neural network machine translation model are not sufficient is solved.
Owner:GLOBAL TONE COMM TECH

Method and apparatus for hierarchical management of subscriber link traffic on digital networks

The current invention provides apparatus for relieving congestion associated with interfacing voice-band data, and broad-band data, with a network such as the public switched telephone network (PSTN).A hierarchical system for converting digital transmissions on a network between a first protocol and a second protocol is disclosed. The transmissions are generated by data terminals communicating in a third protocol with the network. The hierarchical system includes: interface units, a local processor, a first remote processor and a first controller. The interface units are each coupled to corresponding ones of the data terminals and each signal a call session with the corresponding data terminal. The interface units convert the transmissions from the data terminal in the third protocol to the second protocol. The local processor is switchably coupled to the interface unit and communicates with the network. The local processor converts digital transmissions from the second protocol to the first protocol. The first remote processor is coupled to each of the interface units and communicates with the network. The first remote processor converts digital transmissions from the second protocol to the first protocol. The first controller detects the signaling from the interface units corresponding to the call session and allocates to an available one of the local processor and the first remote processor a conversion of digital transmissions associated with the call session from the second protocol to the first protocol.In an alternate embodiment of the invention, a hierarchical system includes remote control and processing capability.
Owner:UTSTARCOM INC

Method and device for cloud computing platform system to distribute resources to task

The invention discloses a method and a device for a cloud computing platform system to distribute resources to a task. The method comprises the steps that a task from a task request queue is obtained; the task is analyzed, and the basic resource requiring information of the task is obtained; resource distribution information is generated by a resource distribution strategy according to the basic resource requiring information; the resource distribution strategy is a trained back propagation (BP) neural network; the training is as follows: a historically executed state information is input into a target BP neural network; if the difference between the generated resource distribution information and historical resource distribution information exceeds a preset training error threshold, the target BP neural network is revised, so that the difference between resource distribution information which is output after the training and the historical resource distribution information does not exceed the training error threshold; the resources are distributed to the task according to the resource distribution information. According to the method and the device for the cloud computing platform system to distribute the resources to the task, the system distributes the resources according to the resource distribution information generated by the BP neural network, so that the resource utilization rate of the system is improved, and the number of concurrent tasks and the throughput of the tasks are increased.
Owner:BEIJING SOHU NEW MEDIA INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products