Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

730 results about "Probit" patented technology

In probability theory and statistics, the probit function is the quantile function associated with the standard normal distribution, which is commonly denoted as N(0,1). Mathematically, it is the inverse of the cumulative distribution function of the standard normal distribution, which is denoted as Φ(z), so the probit is denoted as Φ⁻¹(p). It has applications in exploratory statistical graphics and specialized regression modeling of binary response variables.

Auxiliary disease judgment method based on diagnostic element data association

InactiveCN102110192ASuitable for randomnessSuitable for complexitySpecial data processing applicationsDiseaseInformation analysis
The invention discloses an auxiliary disease judgment method based on diagnostic element data association, belonging to the field of information analysis and aid decision making. The auxiliary disease judgment method comprises the following steps: establishing a disease library according to clinical experience and expert data; establishing a symptom library by taking symptoms to which each disease model relates in the disease library to serve as the constitution elements of the symptom library; according to the symptom information of a patient, selecting the symptoms in the symptom library to serve as the symptom set of the patient; according to the selected symptoms, finding all diseases with the symptoms from the preset disease library; and listing as a disease list according to the decreasing correlation degree or suspected probability. In the method, limited known information can be furthest utilized based on the practical requirement on diagnosis and treatment on patients by doctors according to the step of diagnosing patients for doctors in the practical work, and the information can be added and revised to furthest simulate the real situation. The obtained information (contents, such as symptoms and the like) is fully simulated by utilizing a self-forming rule, thus the method is suitable for the complex situation of the randomness and dynamics of the information resource of the disease.
Owner:中国医学科学院医学信息研究所

Probability hypothesis density multi-target tracking method based on variational Bayesian approximation technology

ActiveCN103345577AEfficient estimation of true measurement noiseAchieve goal trackingSpecial data processing applicationsInformation processingHypothesis
The invention discloses a probability hypothesis density multi-target tracking method based on a variational Bayesian approximation technology, and belongs to the technical field of guidance and intelligent information processing. The probability hypothesis density multi-target tracking method based on the variational Bayesian approximation technology mainly solves the problem that an existing random set filtering method can not achieved varied number multi-target tracking under an unknown quantity measurement noise environment. According to the method, the variational Bayesian approximation technology is introduced, posterior probability hypothesis density of target states and measurement noise covariance is estimated in a combination mode, a Gaussian mixture inverse gamma distribution recurrence closed solution is adopted, and thus the varied number multi-target tracking under the unknown quantity measurement noise environment is achieved. The probability hypothesis density multi-target tracking method based on the variational Bayesian has a good tracking effect and robustness, is capable of meeting the design demands on practical engineering systems and has good engineering application value.
Owner:江苏华文医疗器械有限公司

Using stochastic models to diagnose and predict complex system problems

A plurality of stochastic models is built that predict the probabilities of state transitions for components in a complex system. The models are trained using output observations from the system at runtime. The overall state and health of the system can be determined at runtime by analyzing the distribution of current component states among the possible states. Subsequent to a low level component failure, the state transition probability stochastic model for the failed component can be analyzed by uncovering the previous states at N time intervals prior to the failure. The resulting state transition path for the component can be analyzed for the causes of the failure. Additionally, component failures resulting from the failure, or worsening state transition, in other components can be diagnosed by uncovering the previous states at the N times prior to the failure for multiple components in the system and then analyzing the state transition paths for correlations to the failed component. Additionally, transitions to worsening states can be predicted using an action matrix. The action matrix is created beforehand using state information and transition probabilities derived from a component's stochastic model. The action matrix is populated probabilities of state transitions at a current state for given actions. At runtime, when an action is requested of a component, the probability of the component transitioning to a worsening state by performing the action can be assessed from the action matrix by using the current state of the component (available from the stochastic model).
Owner:IBM CORP

Multi-class image semi-supervised classifying method and system

The invention discloses a multi-class image semi-supervised classifying method and system. The method comprises the steps that firstly, similarity learning is conducted on image samples with tags and image samples without tags in a training set, and similar neighbor images and normalized weights are constructed and used for representing sample similarities; secondly, a class tag matrix is initialized, L2,1-norm regularization is introduced to effectively reduce the influence of mixed signals in prediction tags F of flexible class tags on results, constrains which are not negative and are one in column sum are applied to F at the same time, and thus it is ensured that estimated flexible tags meet the probability definition and non-negativity; finally, parameters are used for balancing the influences of similarity measurement, initial class tags and L2,1-norm regularization on classification, semi-supervised learning modeling is completed, the maximum value of similarity probabilities is taken to be used for image class identification, and classification results are obtained. Due to the fact that the L2,1-norm regularization is introduced, the influence of the mixed signals on the classification is reduced, and thus the classification accuracy is improved. In addition, data outside the training set can be effectively classified, and the expansibility is good.
Owner:SUZHOU UNIV

Dynamic spectrum access method based on policy planning constrain Q study

The invention provides a dynamic spectrum access method on the basis that the policy planning restricts Q learning, which comprises the following steps: cognitive users can divide the frequency spectrum state space, and select out the reasonable and legal state space; the state space can be ranked and modularized; each ranked module can finish the Q form initialization operation before finishing the Q learning; each module can individually execute the Q learning algorithm; the algorithm can be selected according to the learning rule and actions; the actions finally adopted by the cognitive users can be obtained by making the strategic decisions by comprehensively considering all the learning modules; whether the selected access frequency spectrum is in conflict with the authorized users is determined; if so, the collision probability is worked out; otherwise, the next step is executed; whether an environmental policy planning knowledge base is changed is determined; if so, the environmental policy planning knowledge base is updated, and the learning Q value is adjusted; the above part steps are repeatedly executed till the learning convergence. The method can improve the whole system performance, and overcome the learning blindness of the intelligent body, enhance the learning efficiency, and speed up the convergence speed.
Owner:COMM ENG COLLEGE SCI & ENGINEEIRNG UNIV PLA

Semi-supervised intrusion detection method based on depth generation model

The invention discloses a semi-supervised intrusion detection method based on a depth generation model. The method comprises the steps of: 1, preprocessing data: converting symbol attributes in a dataset into numerical attributes, and then normalizing all the numerical attributes; 2, converting high-dimensional feature representations of labeled and unlabeled data into low-dimensional representations of a new feature space by using the variational self-encoding technology in the generation model, adding a constraint to low-dimensional feature vectors to obey Gaussian positive distribution soas to obtain a hidden variable z, and training a classifier by using the hidden variable z in combination with a labeled sample; 3, reconstructing labeled sample data: jointly generating a new labeledsample by using the hidden variable z in combination with label class information; 4, reconstructing an unlabeled sample: predicting the probability of each class of an unlabeled sample by using thehidden variable z, and then generating a new unlabeled sample in combination with the hidden variable z; and 5, calculating a reconstruction error of the model with the newly generated labeled and unlabeled samples, and training and optimizing model parameters in combination with a classification error till convergence.
Owner:CIVIL AVIATION UNIV OF CHINA

Complex object automatic recognition method based on multi-category primitive self-learning

The invention relates to a complex object automatic recognition method based on multi-category primitive self-learning, which comprises the steps of: a) establishing a representational set of multi-category object images; b) preprocessing images in a training set and respectively extracting point, linear and planar primitives; c) conducting concentrated matching calculation, screening and merging to the obtained numerous primitives in a confirmation image set, and respectively constructing point, linear and planar primitive dictionaries; and d) selecting a certain quantity of primitives from the dictionaries, using the primitives as a weak classifier after the primitives are mated and combined, and respectively training the strong classifiers of the three categories of primitives through self-learning; and e) combining the strong classifiers of the three categories of primitives in a probabilistic polling space to realize the accurate positioning, contour extraction and categorical recognition of multi-category complex objects. The method provided by the invention has the advantages that the intelligent level is high and the demands for the recognition and image interpretation of multi-category complex objects can be met.
Owner:济钢防务技术有限公司

Source node loophole detection method based on integrated neural network

InactiveCN104809069AAccurate and effective vulnerability detectionGuaranteed propertyBiological neural network modelsSoftware testing/debuggingSmall sampleAlgorithm
The invention provides a source node loophole detection method based on an integrated neural network. Source nodes are processed with an N-Gram algorithm, and a represented by an N-Gram set; implicit characteristics are mined from the N-Gram set with a probability statistics method, so that the attribute of code content is ensured, and the sequence correlation property among the codes is kept; characteristic selection is performed with a ReliefF algorithm to calculate a characteristic weight; specific to the aim of solving extreme imbalance of sample data, the functions of small type samples need to be fully considered during calculation, and different neighbor values are set for different types so that the characteristics of the small sample data can play certain roles in calculation; a multilayer feed-forward network is trained with a BP algorithm in the neural network for serving as individual networks, the trust scope of each individual network is learned through a series of parameter learning of identification rate, reject rate and the like with a DS evidence theory, and a final detection result is summarized according to different trust values of each network, so that accurate and effective source node loophole detection is realized.
Owner:CHINA ELECTRIC POWER RES INST +3

Relevance vector machine-based multi-class data classifying method

InactiveCN102254193AAvoid Category OverlapAvoid approximationCharacter and pattern recognitionValue setData set
The invention provides a relevance vector machine-based multi-class data classifying method, which mainly solves the problem that the traditional multi-class data classifying method cannot integrally solve classifying face parameters and needs proximate calculation. The relevance vector machine-based multi-class data classifying method comprises a realizing process comprising the following steps of: partitioning a plurality of multi-class data sets and carrying out a normalizing pretreatment; determining a kernel function type and kernel parameters; setting basic parameters; calculating the classifying face parameters; calculating lower bounds of logarithms and solving variant values of the lower bounds of the logarithms and adding 1 to an iterative number; if the variant values of the lower bounds of the logarithms are converged or the iterative number reaches iterating times, finishing updating the classifying face parameters, and otherwise, continuing to updating; and obtaining a prediction probability matrix according to the updated classifying face parameters, wherein column numbers corresponding to a maximum value of each row of the matrix compose classifying classes for testing the data sets, and samples which have the prediction probability less than a false-alarm probability and the detection probability corresponding to a false-alarm probability value set in a curve are rejected. The relevance vector machine-based multi-class data classifying method has the advantages of obtaining classification which is comparable to that of an SVM (Support Vector Machine) by using less relevant vectors and rejecting performance and can be used for target recognition.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products