Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

795 results about "Operational behavior" patented technology

An operational definition of behavior is a tool for understanding and managing behaviors in a school setting. It is an explicit definition that makes it possible for two or more disinterested observers to identify the same behavior when observed, even when it occurs in very different settings.

System and method for monitoring performance of groupings of network infrastructure and applications using statistical analysis

Systems, methods and computer program products for monitoring performance of groupings of network infrastructure and applications using statistical analysis. A method, system and computer program monitors managed unit groupings of executing software applications and execution infrastructure to detect deviations in performance. Logic acquires time-series data from at least one managed unit grouping of executing software applications and execution infrastructure. Other logic derives a statistical description of expected behavior from an initial set of acquired data. Logic derives a statistical description of operating behavior from acquired data corresponding to a defined moving window of time slots. Logic compares the statistical description of expected behavior with the statistical description of operating behavior; and logic reports predictive triggers, said logic to report being responsive to said logic to compare and said logic to report identifying instances where the statistical description of operating behavior deviates from statistical description of operating behavior to indicates a statistically significant probability that an operating anomaly exists within the at least managed unit grouping corresponding to the acquired time-series data.
Owner:K5 SYST

System and method for monitoring performance of network infrastructure and applications by automatically identifying system variables or components constructed from such variables that dominate variance of performance

Systems, methods and computer program products for monitoring performance of network infrastructure and applications by automatically identifying system variables or combinations constructed from such variables that dominate variance of system performance. A method, system and computer program monitors performance of executing software applications and execution infrastructure components to detect deviations in performance. Logic acquires data from executing software applications and execution infrastructure, said data including descriptive data variables and outcomes data variables. Other logic statistically analyzes said acquired data to identify instances where the statistical description of operating behavior deviates from expected operating behavior and to indicate with a statistically significant probability that an operating anomaly exists within said executing software applications and execution infrastructure; and logic, cooperating with the logic to statistically analyze, filters out non-essential variables in the acquired data from being utilized by the logic to statistically analyze, such that remaining variables and combinations thereof account for a substantial contribution in the variance of performance of the executing software applications and execution infrastructure.
Owner:K5 SYST

Multi-policy commercial product recommending system based on context information

The invention discloses a multi-strategy commodity recommendation system basing on context information. The recommendation system acquires the operation information of a user through an information acquisition part which is operated by the user, analyzes the operation action of the user and establishes the interest description model of the user. During the interaction process between the user and an electronic commerce website, a recommendation strategy fitting the present user and the context information of the system is dynamically selected according to a strategy selection rule. The recommendation strategy describes and generates a personalized commodity recommendation list according with the interest and the requirement of the user according to the interest of the user. Through the selection of the recommendation strategy, the multi-strategy commodity recommendation system basing on context information improves the adaptability of the system to various applications and system dynamic changes. And compared with the existing recommendation system, the multi-strategy commodity recommendation system basing on context information is improved in the recommendation quality, the recommendation scale and the recommendation performance.
Owner:EAST CHINA NORMAL UNIV

Automatic analysis method and system of malicious codes based on API (application program interface) HOOK

The invention provides an automatic analysis method and system of malicious codes based on an API (application program interface) HOOK. An API HOOK technology and a remote thread implantation technology are utilized to monitor samples; influences of the malicious codes on the whole system in an operation process are recorded, and a dynamic analysis report is automatically generated; influences of malicious code samples on a file, a network, and a registry and a key process are recorded, and when the operation of the samples ends, the system recovers the state before the samples are executed; the whole monitoring, recording and reduction process ends automatically without manual intervention; monitoring software can only run a sample each time, the monitoring software is used for monitoring the host process of the samples and process threads created by the host process of the samples, and when the monitoring software finishes the monitoring, the system recovers the state before the samples are operated; behaviors such as creation, deletion, modification and the like of the malicious code samples on the file are detected, operation behaviors of the malicious code samples on the network are detected, behaviors such as addition, deletion, modification and the like of the malicious code samples on the registry are detected, and operation behaviors of the malicious code samples on the create process are detected; and finally the dynamic monitoring report on the malicious code samples is submitted, and when the monitoring is finished, the monitoring software carries out inversion operation to restore the system to the state before the samples are operated according to the operations and influences of the samples on an operating system. The intelligent analysis technology of the malicious codes is suitable for analyzing a great deal of samples without the manual intervention, and is quicker in analysis speed and less in garbage in the analysis report.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Personalized recommendation method and system based on probability model and user behavior analysis

InactiveCN105574216AAccurately characterize acquisition needsSolve overloadSpecial data processing applicationsPersonalizationOriginal data
The invention discloses a personalized recommendation method and system based on a probability model and user behavior analysis. The method includes the steps that article information and article attribute information are extracted, and operation behaviors of users on articles are extracted; interest points are obtained according to the article attribute information and the operation behaviors of the users on the articles; user interest similarity is obtained according to the operation behaviors of the users on the articles, and similar users are obtained; a decay factor is obtained according to the operation behaviors of the users on the articles based on the time dimension, and a user model is set up; interest characteristic information, at all dimensions, of the users is obtained according to the user model; after filtering, a recommendation algorithm is adopted to generate results to be recommended, and algorithm fusion is conducted to obtain personalized recommendation results of the users. After original data is preprocessed, the user model is set up, the interest points of the users and essential information acquisition requirements are depicted accurately to provide accurate personalized recommendation, and therefore the problems of information overload and long-tail articles in the network are solved.
Owner:DATAGRAND TECH INC

Detection and analysis method for abnormal behaviors of user in big data environment

ActiveCN106789885AAbnormal Behavioral IntelligenceAbnormal behavior intelligent detection intelligenceTransmissionSpecial data processing applicationsGranularityAnomalous behavior
The invention relates to a detection and analysis method for the abnormal behaviors of a user in a big data environment. The method is characterized in that the method comprises the following steps: enabling a user abnormal behavior detection system to carry out the abnormality analysis of user access behaviors in an offline mode through machine learning according to the log record of the user in HDFS in one historical statistical period, and building a user behavior model; enabling the user abnormal behavior detection system to carry out the online comparison of real-time behaviors and historical behaviors based on the current real-time user's operation behavior in Storm; transmitting safety early-warning information to Kaffka and displaying the safety early-warning information at a Stream interface if the difference between real-time behaviors and historical behaviors is big, or else judging that the behavior is a legal safe behavior. Compared with the prior art, the method supports the definition of a behavior mode or a user portrait according to the historical use behavior habit of the user at a Hadoop platform through a machine learning algorithm. A training system updates a model each month in a default manner, and the granularity of the model is one minute.
Owner:STATE GRID CORP OF CHINA +2

Unmanned aerial vehicle simulation training system and control method thereof

InactiveCN104111861ACultivate self-learning abilityLess mitigation equipmentData processing applicationsSoftware simulation/interpretation/emulationThree dimensional simulationSimulation
The invention discloses an unmanned aerial vehicle simulation training system and a control method of the unmanned aerial vehicle simulation training system, and relates to the technical field of simulation training. The unmanned aerial vehicle simulation training system comprises human-computer interaction unit, a training unit, a behavior interaction unit, a virtual simulation model unit, a training evaluation data unit and a multimedia source unit. The human-computer interaction unit provides a visual window of a virtual unmanned aerial vehicle three-dimensional simulation model. The training unit provides a system operation manual, and represents a guide unit, an exploration unit and an assessment unit. The behavior interaction unit converts instructions of the human-computer interaction unit into control instructions on the virtual unmanned aerial vehicle three-dimensional simulation model, and drives the corresponding virtual simulation model unit to act. The virtual simulation model unit provides appearance and function states of the virtual unmanned aerial vehicle three-dimensional simulation model. The training evaluation data unit records operation behavior in the evaluation process, judges operation correctness and displays and stores the evaluation result. The multimedia source unit provides multimedia sources of equipment. The unmanned aerial vehicle simulation training system and the control method of the unmanned aerial vehicle simulation training system are high in interactivity and autonomous learning capacity, and training missions are carried out conveniently.
Owner:PEOPLES LIBERATION ARMY ORDNANCE ENG COLLEGE

Database auditing monitoring system and database auditing monitoring method

The invention discloses a database auditing monitoring system and a database auditing monitoring method. The database auditing monitoring system comprises a hardware part and a module part, wherein the hardware part comprises a switchboard, a local area network and a database auditing server, the switchboard is respectively connected into the local area network at the two ends through a duplicated port, and is connected with the database auditing server through a mirror port, the local area network at the two ends is respectively communicated with a database accessing client and a database server, and the module part comprises a WEB management module, a local database module, a data collecting module and a data analysis and processing module. The database auditing monitoring system and the database auditing monitoring method have the advantages that various kinds of operation behaviors on the database server are monitored and recorded through a monitoring module arranged in the data analysis and processing module, through the analysis on network data, various kinds of operation and hostile attack event information on the database server can be analyzed intelligently in real time and is recorded into an auditing database so that inquiry and analysis can be realized in future, and the monitoring and the auditing on the operation of a target database system are realized.
Owner:北京华电天益信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products