Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

410 results about "Parameter learning" patented technology

Parameter learning. Parameter learning is the process of using data to learn the distributions of a Bayesian network or Dynamic Bayesian network. Bayes Server uses the Expectation Maximization (EM) algorithm to perform maximum likelihood estimation, and supports all of the following: Learning both discrete and continuous distributions.

Image semantic division method based on depth full convolution network and condition random field

The invention provides an image semantic division method based on a depth full convolution network and a condition random field. The image semantic division method comprises the following steps: establishing a depth full convolution semantic division network model; carrying out structured prediction based on a pixel label of a full connection condition random field, and carrying out model training, parameter learning and image semantic division. According to the image semantic division method provided by the invention, expansion convolution and a spatial pyramid pooling module are introduced into the depth full convolution network, and a label predication pattern output by the depth full convolution network is further revised by utilizing the condition random field; the expansion convolution is used for enlarging a receptive field and ensures that the resolution ratio of a feature pattern is not changed; the spatial pyramid pooling module is used for extracting contextual features of different scale regions from a convolution local feature pattern, and a mutual relation between different objects and connection between the objects and features of regions with different scales are provided for the label predication; the full connection condition random field is used for further optimizing the pixel label according to feature similarity of pixel strength and positions, so that a semantic division pattern with a high resolution ratio, an accurate boundary and good space continuity is generated.
Owner:CHONGQING UNIV OF TECH

Visual support and match analysis system for ping-pong match and method for running same

The invention provides a visual support and match analysis system for a ping-pong match. The system comprises the following modules: an image acquiring and ping-pong ball target recognizing and positioning module, a KALMAN filter module, a track data fitter module, a characteristic analyzing module, a kinematic parameter learning machine module, a single path judging module, a three-dimensional virtual scene reappearing module, a match characteristic data storing module and a user interaction module. A set of system with friendly and complete information extraction and storage, user interaction support and capability of performing track recording well and extracting characteristic information on ball hit of an athlete is developed through real-time visual acquisition. The system can process data in real time and filter and record the processed data in ping-pong trainings and matches, automatically extracts ping-pong ball path characteristic, bring convenience to a judge to replay, is applied to automatic judging and television relaying in the ping-pong match, has a complete, effective and overall analyzing function after the match and can automatically extract and store the characteristic information in a match process and intuitively counts and displays ball throwing and ball winning path characteristics of the ping-pong athlete.
Owner:ZHEJIANG UNIV

Deep learning network construction method and system applicable to semantic segmentation

The invention discloses a deep learning network construction method and system applicable to semantic segmentation. According to the invention, based on the deconvolution semantic segmentation, by considering the characteristic that a conditional random field is quite good for edge optimization, the conditional random field is explained to be a recursion network to be fused in a deconvolution network and end to end trainings are performed, so the parameter learning in the convolution network and the recursion network is allowed to act with each other and a better integration network is trained; through combined training of the deconvolution network and the conditional random field, quite accurate detail and shape information is obtained, so a problem of inaccuracy of image edge segmentation is solved; by use of the strategy of combining the multi-scale input and multi-scale pooling, a problem is solve that a big target is excessively segmented or segmentation of a small target is ignored generated by the single receptive field in the semantic segmentation; and by expanding the classic deconvolution network, by use of the united training of the conditional random field and the multi-feature information fusion, accuracy of the semantic segmentation is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for diagnosing fault of transformer on basis of clustering algorithm and neural network

The invention discloses a method for diagnosing a fault of a transformer on the basis of a clustering algorithm and a neural network. The method comprises the following steps that (a) the type of the fault is determined according to an IEC standard and a DL/T722-2000 guideline, and the characteristic quantities of a fault sample set are selected from an original sample set; (b) clustering is carried out on samples by utilizing a K-means clustering method; (c) an RBF neural network is established; (d) parameter learning is carried out to determine the number, the center position, the width and the output weight of hidden layers; (e) optimization training is carried out by adopting PSO to determine the positions of the centers of the hidden layers, and the number, the width and the weight of the hidden layers are determined by utilizing a test method, a minimum distance method and a pseudo-inverse method respectively; (f) training samples are input, the posterior probability is solved, and the type of the fault is judged. According to the method for diagnosing the fault of the transformer on the basis of the clustering algorithm and the neural network, the training samples and the test samples can be evenly divided from the total samples, more complete test on the neural network can be carried out by good test samples, and therefore the neural network can be evaluated correctly and reasonably.
Owner:STATE GRID CORP OF CHINA +1

Source node loophole detection method based on integrated neural network

InactiveCN104809069AAccurate and effective vulnerability detectionGuaranteed propertyBiological neural network modelsSoftware testing/debuggingSmall sampleAlgorithm
The invention provides a source node loophole detection method based on an integrated neural network. Source nodes are processed with an N-Gram algorithm, and a represented by an N-Gram set; implicit characteristics are mined from the N-Gram set with a probability statistics method, so that the attribute of code content is ensured, and the sequence correlation property among the codes is kept; characteristic selection is performed with a ReliefF algorithm to calculate a characteristic weight; specific to the aim of solving extreme imbalance of sample data, the functions of small type samples need to be fully considered during calculation, and different neighbor values are set for different types so that the characteristics of the small sample data can play certain roles in calculation; a multilayer feed-forward network is trained with a BP algorithm in the neural network for serving as individual networks, the trust scope of each individual network is learned through a series of parameter learning of identification rate, reject rate and the like with a DS evidence theory, and a final detection result is summarized according to different trust values of each network, so that accurate and effective source node loophole detection is realized.
Owner:CHINA ELECTRIC POWER RES INST +3

Attack intention recognition method based on Bayesian network inference

The invention provides an attack intention recognition method based on Bayesian network inference. The attack intention recognition method is applied to the attack intention recognition of an intelligence and decision-making oriented system with a parameter learning mechanism in computer network self-organizing operation (CNSOO). The method can enable an intelligence system to recognize the attack intention of an attacker by using IDS (Intrusion Detection System) alarm information according to given host vulnerability information, network topological information and attack knowledge base and supply the attack intention to a decision-making system as a decision-making basis in a CNSOO environment. The attack intention recognition process comprises the following steps of: generating attacking scenes, fusing and matching IDS alarm information, updating conditional probability distribution caused by attacking behaviors, calculating the probability of attack intention nodes by using a clique tree propagation algorithm in the Bayesian network inference, and updating Bayesian network parameters and IDS detection capability. The calculation parameters are updated according to calculation results and historical information, so that the calculation results can be more accurate.
Owner:BEIHANG UNIV

Image retrieval method based on depth learning and semantic segmentation

The invention discloses an image retrieval method based on depth learning and semantic segmentation, which comprises the following steps of: reading an image and preprocessing the image; encoding theimage into a set of characteristic graphs through depth learning by any convolution layer of the depth neural network; carrying out semantic segmentation on the image to obtain a category label of each pixel of the segmented image; carrying out weighting processing on the category labels according to each pixel category label on the characteristic graphs and the set category weight to obtain a setof weighted characteristic graphs; coding the set of weighted characteristic graphs to a feature vector of a fixed length, and carrying out normalization processing, and characterizing the final coded feature vector of the image by using a normalized characteristic vector; carrying out similarity calculation and returning the search result. According to the invention, the semantic segmentation technology is introduced into the feature code of image retrieval, and the retrieval effect is greatly improved. When the weight of each category of the image is acquired, the provided manual design method based on the prior knowledge and parameter learning method of the depth neural network are very effective.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Surrounding vehicle behavior identification method based on V2V communication and HMM-GBDT hybrid model

The invention discloses a surrounding vehicle behavior identification method based on V2V communication and an HMM-GBDT hybrid model and belongs to the intelligent vehicle driving field. The method comprises steps that a, an offline training link, typical surrounding vehicle behaviors are concluded and divided, for each type of typical behaviors, based on real vehicle platform, the driving information of the surrounding vehicles under real traffic scenarios is collected, trajectory characteristic data is extracted, and parameter learning for the HMM-GBDT hybrid model is carried out. And b, anonline detection link, the acquired self driving information of a tracked target vehicle is transmitted to a driver in real time, a new characteristic observation sequence is constructed by the driverin combination with trajectory characteristic data of two vehicles, and the trained HMM-GBDT hybrid model is utilized to identify belonging behavior modes of the tracked vehicles. The method is advantaged in that the historical trajectory characteristics of vehicle are acquired in a passive information reception mode, influence of the traffic status and environmental factors on active detection is avoided, the method is not dependent on a fixed base station in a common vehicle network system, instant information transmission is guaranteed, and the target vehicle behaviors can be accurately identified.
Owner:JIANGSU UNIV

Pedestrian re-identification method of twin generative adversarial network based on attitude guidance pedestrian image generation

The invention discloses a pedestrian re-identification method of a twin generative adversarial network based on attitude guidance pedestrian image generation. According to the implementation scheme, the method includes: carrying out target detection on pedestrian images according to a pedestrian image data set to obtain training samples; constructing a twin generative adversarial network model based on diversity sample generation, and exchanging attitude attribute information of two groups of pedestrian images input after target detection by the model to realize generation of diversity samples; constructing a twin generative adversarial network model based on identity feature maintenance, wherein identity information of a generated pedestrian image is reserved by the model through an identity discriminator, so that the robustness of pedestrian re-identification on the identity of the generated pedestrian image is improved; aiming at the problem that the generative adversarial network is difficult to optimize, constructing a twin generative adversarial network parameter learning method based on multi-objective optimization; in order to verify the effectiveness of the pedestrian re-identification method, carrying out pedestrian re-identification method verification on a data set formed by generated pedestrian images.
Owner:CHINA UNIV OF MINING & TECH

Intelligent control method based on adaptive planning of virtual ship for under-drive unmanned ship formation

ActiveCN108073175AAvoid Overhead ProblemsAchieving formation keepingTransmission systemsNeural learning methodsControl signalSelf adaptive
The invention relates to an intelligent control method based on adaptive planning of a virtual ship for an under-drive unmanned ship formation. The method comprises the following steps of 1, setting aformation and initializing parameters; 2, collecting a position coordinate (xL, yL) and a heading angle psiL of a leader ship, conducting wave filtering, and transmitting the position coordinate andthe heading angle to a following ship; 3, according to the formation, the position coordinate and the heading angle information of the leader ship, obtaining a reference position (xr, yr) and a reference motion posture psir of the following ship in the formation in real time; 4, introducing the virtual ship and conducting real-time adaptive planning to obtain a reference track of the following ship; 5, using a combination strategy of RBF neural networks and a minimum parameter learning algorithm to train learning parameters online to generate intelligent formation control signals, wherein theintelligent formation control signals include the rotating speed nF of a mainframe of the following ship and a rudder angle command signal deltaF. Compared with the prior art, the method has the advantages that the method adapts to curved path tasks, overhead is avoided, leader ship speed information is not needed, and the method is simple, convenient and excellent in real-time performance.
Owner:SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products