Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

90 results about "Probabilistic computing" patented technology

Probabilistic computing is a game changer. With the development of the internet, data availability is often times not a problem – it’s what you do with the data that actually matters.

Bayesian network-based multi-step attack security situation assessment method

The invention relates to a network security situation assessment method, in particular, a Bayesian network-based multi-step attack security situation assessment method. The method includes the following steps that: multi-step attack generating patterns are mined through association analysis, so that an attack graph can be constructed; a Bayesian network is established according to the multi-step attack graph, attack wills, probability of success of attacks and the accuracy of event monitoring are defined as the probability attributes of the Bayesian network; based on the event monitoring, a multi-step attack risk is calculated according to the posterior reasoning and cumulative probability of the Bayesian network; and the security situations of a host and the whole network are quantitatively assessed according to a hierarchical quantitative assessment method. With the method of the invention adopted, the problem of lack of correlation analysis in a network security situation assessment process can be solved. According to the method of the invention, monitoring events are taken into risk assessment, and a network security situation assessment model is accurately established, and therefore, the effectiveness and real-time performance of the method of the invention can be enhanced.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Text feature extraction method based on categorical distribution probability

The invention discloses a text feature extraction method based on categorical distribution probability. The text feature extraction method based on the categorical distribution probability extracts text feature words by means of the manner according to which categorical distribution difference estimation is carried out on words of a text to be categorized. Mean square error values of probability distribution of each word at different categories are worked out by means of category word frequency probability of the words. A certain number of words with high mean square error values are extracted to form a final feature set. The obtained feature set is used as feature words of a text categorizing task to build a vector space model in practical application. A designated categorizer is used for training and obtaining a final category model to categorize the text to be categorized. According to the text feature extraction method based on the categorical distribution probability, category distribution of the words is accurately measured in a probability statistics manner. Category values of the words are estimated in a mean square error manner so as to accurately select features of the text. As far as the text categorizing task is concerned, a text categorizing effect of balanced linguistic data and non-balanced linguistic data is obviously improved.
Owner:EAST CHINA NORMAL UNIV

Self-adaptive bitstream switching method and system based on cache underflow probability estimation

The invention provides a self-adaptive bitstream switching method and system based on cache underflow probability estimation. The method includes the steps of 101) estimating a mean valve of video segment downloading time of each bitstream and a variance of the video segment downloading time of each bitstream at the current network conditions, 102) modeling arrival and departure of video data in a client cache into an Ek/D/1/N queuing model, setting parameters of the queuing model according to the mean values and the variances, and for each bitstream, utilizing the queuing model with the determined parameters to calculate the probability that cache queues are empty so as to obtain the underflow probability of each bitstream, 103) setting the underflow risk gain or loss of the current bitstream and the quality gain of each bitstream, and calculating comprehensive profit values according to the underflow risk gain or loss of the current bitstream, the quality gain of each bitsteam and the underflow probability of each bitstream when switching is performed between the bitstreams, and 104) selecting the bitstream with the highest comprehensive profit value to be switched , wherein video segments are obtained through equal duration division of copies of the bitstreams.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI +1

Network anomaly detection method, system and electronic device

The present application relates to a network anomaly detection method, a system and an electronic device. The method comprises the following steps of: a) drawing a network structure topology diagram according to the network structure of the network node and the communication link under the distributed network; B, establishing a corresponding Bayesian network model according to the network structure topology diagram; C, inputting the pre-classified event into the Bayesian network model, the Bayesian network model adopts a probability calculation formula combining a Bayesian conditional probability formula and a time function T (t) to calculate the conditional probabilities of the pre-classified events belonging to different types of anomalies, and obtains an anomaly type classification result of the pre-classified events according to the maximum conditional probability. The application establishes a Bayesian network model aiming at the topological structure of a real network environment, which can have better flexibility and expansibility, improve the detection accuracy rate, and carry out network anomaly detection combined with a time function, thereby improving the sensitivity ofthe model to the anomaly detection in a certain period of time, and effectively reducing the false alarm rate and the false alarm rate.
Owner:SHENZHEN INST OF ADVANCED TECH

Method of classifying Naive Bayes scanned certificate images based on feature weighting

The invention discloses a method of classifying Naive Bayes scanned certificate images based on feature weighting. The method comprises the steps of carrying out round seal locating, dividing and sizing on certificate images processed, and extracting color feature vectors of an HSV (Hue, Saturation, Value) space of a round seal area and the length-width ratio of the images; building a certificate image database, processing each certificate image in the database according to the above steps, so as to obtain the round seal HSV color feature vector and the length-width ratio of each scanned certificate image in the data base, calculating the probability of different data combinations in the certificate image database according to the obtained feature vectors, and storing the data after the feature weighting; calculating an image category which is most possible to appear according to a Naive Bayes algorithm and the probability of different data combinations in the certificate image database, and judging the classification of the images when the probability meets a set threshold requirement. According to the method, the certificate images can be simply and quickly classified, and the certificate image retrieval efficiency can be improved.
Owner:CENT SOUTH UNIV

Labeling method and device based on multi-label classification, equipment and storage medium

The invention discloses a labeling method and device based on multi-label classification, equipment and a storage medium, and belongs to the technical field of artificial intelligence. The method comprises the steps that a training sample set is acquired and imported into a model, an output result is acquired, the output result at least comprises output probabilities of training corpora under multiple labels, confidence intervals corresponding to the output probabilities are calculated, the training corpora are marked again based on the confidence intervals, the model is iteratively updated, and the output result is obtained, a trained model is obtained, a to-be-labeled corpus is obtained, a classification result of the to-be-labeled corpus is obtained through the trained model, and the to-be-labeled corpus is labeled based on the classification result. In addition, the invention further relates to a block chain technology, and the corpus to be labeled can be stored in the block chain. According to the technical scheme, the accuracy and the stability of the multi-label classification model are improved so that the output of the model obtained by training meets the multi-label classification labeling requirements in most application scenes.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

System and method to calculate the value of a non-tradable option such as an employee stock option, considering characteristics such as term structure in interest rates, volatility and dividends, constraints such as vesting and black-out periods as well as voluntary and involuntary early exercise patterns prescribed as a function of stock price, time or both

InactiveUS20060031152A1FinanceEmployee stock optionBlack out
The current invention is a system and method to calculate the value of a non-tradable option such as an employee stock option, considering characteristics such as term structure in interest rates, volatility and dividends, constraints such as vesting and black-out periods as well as voluntary and involuntary early exercise patterns prescribed as a function of stock price, time or both. The stock price path is simulated using the drivers such as the future expectations of interest rates, volatility and dividends. In each simulation the exercise or expiry event of the option are determined applying explicit constraints such as vesting and black-out periods and voluntary or involuntary early exercise patterns based on stock price, time or both. In each simulation, the option value is calculated as the discounted value of the option at exercise or expiry (if it is in the money), discounted using the term structure of interest rates. The value of the option is calculated as the average of the option values obtained from a large number of such simulations. Similarly, the expected holding period and the probability of exercise in the money are calculated as the average of the time to exercise or expiry and the binary outcome of exercise in a large number of simulations.
Owner:EAPEN GILL R

Electric power data classification method and system based on k-means algorithm

The invention relates to the field of computers, in particular to an electric power data classification method and system based on a naive Bayesian algorithm, and the method comprises the steps: S1, obtaining data from an electric power system of an electric power company, and generating a data set; S2, taking a data subset from the data set, and carrying out incremental training to obtain the data subset; S3, calculating the frequency of each type of Ck in the data subset; S4, dividing the data subset into K sub-data subsets, and calculating the probability that the jth feature Xj is equal toajl; S5, calculating the posterior probability of each category Ck, wherein the category with the maximum probability value is the prediction category of the to-be-predicted sample; S6, removing thecurrent data subset from the data set, judging whether the data set is empty or not, if not, executing the step S2, and if yes, ending classification. According to the method, maximum likelihood estimation is adopted to represent the probabilities of various classifications for various features, and then the category with the maximum probability value is selected as the prediction category of theto-be-predicted sample, so that data classification can be quickly and accurately realized.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO +1

Cloud computing system reliability modeling method capable of considering common cause and virtual machine fault migration

ActiveCN106250251AAddressing ill-conceived failover issuesState space simplificationReliability/availability analysisSoftware simulation/interpretation/emulationFault toleranceState space
The invention discloses a cloud computing system reliability modeling method capable of considering cloud computing common cause faults and virtual machine fault migration, and belongs to the technical field of network reliability. The method comprises the following steps: establishing a cloud computing system, and carrying out resource distribution; carrying out state space division on the cloud computing system, and calculating the existence probability of each state; determining a cloud computing system reliability modeling mode; calculating a probability that the amount of virtual machines which normally work meets a requirement; calculating the migration failure probability of each state according to different states; and calculating the cloud computing system reliability capable of considering common causes and the virtual machine fault migration under a given requirement. The method considers a plurality of virtual machine common cause faults caused by server faults and the fault-tolerance strategy of virtual machine migration, the problem that other models can not thoughtfully consider the common cause fault and the virtual machine fault migration is solved on the basis of the state space model, the state space is simplified, and modeling efficiency is improved.
Owner:BEIHANG UNIV

Social network text sentiment fine-grained classification method based on deep learning

The invention provides a social network text sentiment fine-grained classification method based on deep learning, which relates to the field of sentiment multi-classification, and comprises the following steps of crawling social network text data by using a Scrapy framework, performing data cleaning and word segmentation, and performing word vector conversion by taking a word segmentation result as input of word2vec; carrying out text sentiment 8 classification based on a CNN model; taking a word vector conversion result as the input of a CNN (Convolutional Neural Network) embedding layer, carrying out forward and reverse propagation process training models such as convolution, pooling, probability calculation and the like, realizing transfer learning of network comment emotion classification, carrying out two rounds of sampling on social network texts to realize instance migration, training a classifier, and carrying out emotion prediction on comments; and performing system design onthe above work, performing visual display on an analysis result, designing a display module by utilizing an MVC three-layer architecture, and designing an interface for three aspects of functions of single-text or multi-text emotion fine-grained classification, cross-platform transfer learning text emotion fine-grained classification and a social network popularity map.
Owner:NORTHEASTERN UNIV

D2D probabilistic cache placement method based on user group preference concentration difference

The invention provides a D2D probabilistic cache placement method based on user group preference concentration difference. The method comprises the following steps of: constructing a scene model and adata packet popularity model, and calculating the sharing probability of each data packet; calculating the density of HUEs which cache the data packet and are willing to share the data packet according to the sharing probability of each data packet, and constructing a transmission model; constructing a probabilistic cache placement optimization problem on the basis of considering the request probability of each data packet and the transmission success probability of the transmission model; solving the probabilistic cache placement optimization problem through an iterative grouping optimization algorithm to obtain an optimized cache placement probability; and converting the optimized cache placement probability into a specific cache placement method for the data packet through a probabilistic random scribing method. According to the method, a multi-popularity model of the user data packets is improved, a cache user sharing model based on topic concentration and different user proportions is provided for the sharing preference of the users, and the objective problem that the cache capacity of the users is limited is comprehensively considered.
Owner:SUN YAT SEN UNIV

Vehicle identification method and device based on deep learning, and computer equipment

The invention relates to the technical field of machine vision target recognition, in particular to a vehicle identification method and device based on deep learning and computer equipment. The methodcomprises the following steps: constructing a corresponding label structure tree; extracting features of the sample data by using a deep learning network; respectively calculating the probability corresponding to each node in the label structure tree; and calculating the loss of the sample data according to the probability of the node in each layer, optimizing the loss of the sample data to complete the training of the deep learning network, and classifying the sample data to identify the vehicle. According to the vehicle identification method based on deep learning, by constructing a label structure tree for a data source in advance, the internal relation between the data is utilized, and hierarchical classification is realized in the classification process according to the internal relation, so that when the deep learning neural network obtained through training optimization is used for automatic vehicle model identification, the phenomenon of vehicle brand identification errors isnot liable to occur, and the use effect of vehicle model identification is improved.
Owner:CHINA PING AN PROPERTY INSURANCE CO LTD

Self-encoding document representation method using random walk

The invention relates to a self-encoding document representation method using random walk, belonging to the field of natural language processing and machine learning. The goal is to solve the text topic modeling problem. A self-encoding network is adopted; for a given text set, we first use a sparse self-encoding network to construct sparse topic coding of text; then we construct a text neighbor graph based on text similarity measure, generate a random walk structure by applying low rank constraint to the text neighbor graph, and calculate weighted coefficients of the local neighbor text by aconditional access probability of the random walk structure; finally, the sparse topic encoding of the local neighbor text is utilized to perform weighting and embed an intrinsic geometric structure for characterizing the text manifold, to serve as a regular constraint term to fuse into the training of the self-encoding network, and a parameterized topic coding network is established to perform topic modeling on external text of a sample. The self-encoding document representation method has the advantages of being high in accuracy and operation efficiency and capable of modeling the external topics of the text. The method is suitable for the field of text topic modeling which requires high precision, has a great impetus for the development of text representation, and has a good applicationvalue and promotion value.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products