Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

135 results about "Procedural modeling" patented technology

Procedural modeling is an umbrella term for a number of techniques in computer graphics to create 3D models and textures from sets of rules. L-Systems, fractals, and generative modeling are procedural modeling techniques since they apply algorithms for producing scenes. The set of rules may either be embedded into the algorithm, configurable by parameters, or the set of rules is separate from the evaluation engine. The output is called procedural content, which can be used in computer games, films, be uploaded to the internet, or the user may edit the content manually. Procedural models often exhibit database amplification, meaning that large scenes can be generated from a much smaller amount of rules. If the employed algorithm produces the same output every time, the output need not be stored. Often, it suffices to start the algorithm with the same random seed to achieve this.

System and methodology and adaptive, linear model predictive control based on rigorous, nonlinear process model

A methodology for process modeling and control and the software system implementation of this methodology, which includes a rigorous, nonlinear process simulation model, the generation of appropriate linear models derived from the rigorous model, and an adaptive, linear model predictive controller (MPC) that utilizes the derived linear models. A state space, multivariable, model predictive controller (MPC) is the preferred choice for the MPC since the nonlinear simulation model is analytically translated into a set of linear state equations and thus simplifies the translation of the linearized simulation equations to the modeling format required by the controller. Various other MPC modeling forms such as transfer functions, impulse response coefficients, and step response coefficients may also be used. The methodology is very general in that any model predictive controller using one of the above modeling forms can be used as the controller. The methodology also includes various modules that improve reliability and performance. For example, there is a data pretreatment module used to pre-process the plant measurements for gross error detection. A data reconciliation and parameter estimation module is then used to correct for instrumentation errors and to adjust model parameters based on current operating conditions. The full-order state space model can be reduced by the order reduction module to obtain fewer states for the controller model. Automated MPC tuning is also provided to improve control performance.
Owner:ABB AUTOMATION INC

Internet of Things data uncertainty measurement, prediction and outlier-removing method based on Gaussian process

The invention relates to an Internet of Things data uncertainty measurement, prediction and outlier-removing method based on the Gaussian process. The method is a dynamical system method of estimating and collecting the standard deviation of Internet of Things perception sensor measurement errors and combining the Gaussian process modeling theory with autoregression model representations; prediction values and uncertainty measurement of observation data effective time sequence data are given, whether the data are missing values or outlier data is judged according to the information, and data supplement is correspondingly carried out. The method is a non-parameterized probability prediction method. Due to the fact that training set learning has the feature of tracing system dynamic states, judgment, early-warning and data supplement can be carried out on data exception and data missing phenomena in time according to the prediction value uncertainty and the sensor calibration standard deviation, the prediction error is small, and the accuracy is high. The Internet of Things data uncertainty measurement, prediction and outlier-removing method is used for controlling the quality of Internet of Things automatic observation data, and can ensure accuracy of collected data.
Owner:SHANDONG AGRICULTURAL UNIVERSITY

AADL based IMA dynamic reconfiguration modeling method

The invention discloses an AADL based IMA dynamic reconfiguration modeling method used for avionics system security modeling. The method comprises: determining dynamic reconfiguration process elements, decomposing a dynamic reconfiguration process into sub-states, and determining trigger and conversion actions required for conversion between each state configuration situation and a state; representing software and hardware constitution of IMA by utilizing ARINC653 accessories, describing the dynamic reconfiguration process by utilizing behavior accessories, describing a trigger behavior by utilizing error model accessories, and representing different configuration situations of the dynamic reconfiguration process by utilizing modes; determining IMA dynamic reconfiguration process model instances; describing a dynamic reconfiguration conversion process by utilizing combination of the AADL behavior accessories and the modes; and realizing and perfecting an established model by utilizing software. According to the method, the complicated dynamic reconfiguration process is modeled, so that the security of the dynamic reconfiguration process can be conveniently analyzed; and a brand-new process modeling method is constructed by combining a mature AADL language with the IMA dynamic reconfiguration process.
Owner:BEIHANG UNIV

Inferential process modelling, quality prediction and fault detection using multi-stage data segregation

A process modelling technique uses a single statistical model, such as a PLS, PRC, MLR, etc. model, developed from historical data for a typical process and uses this model to perform quality prediction or fault detection for various different process states of a process. Training data sets of various states of the process are stored and the training data divided into time slices. Mean and/or standard deviation values are determined for both the time slice parameters and variables and the training data. A set of deviations from the mean are determined for the time slice data and the model generated based on the set of deviations. The modeling technique determines means (and possibly standard deviations) of process parameters for each of a set of product grades, throughputs, etc., preferably compares on-line process parameter measurements to these means and use these comparisons in a single process model to perform quality prediction or fault detection across the various states of the process. Because only the means and standard deviations of the process parameters of the process model are updated, a single process model can be used to perform quality prediction or fault detection while the process is operating in any of the defined process stages or states. Moreover, the sensitivity (robustness) of the process model may be manually or automatically adjust each process parameter to tune or adapt the model over time. An alternative aspect is a method of displaying process alert information using a user interface having multiple screens.
Owner:FISHER-ROSEMOUNT SYST INC

Battle process modeling method for battle simulation and model scheduling method

The invention discloses a battle process modeling method for battle simulation. Battle processes are divided into different levels according to campaign, combat, operation and activity; each level is described through CSDs; battle process modeling in each level adopts CSDs integrating certainty and randomness. The invention further discloses a model scheduling method obtained based on the battle process modeling method. The model scheduling method comprises the following steps: searching an earliest initial module(s) from the set of modules to be run; running the earliest initial module if only one earliest initial module exists, otherwise, judging modules to be run according to module impacting levels, and driving the modules to run according to the running rule; removing a module from the set of modules to be run after the module is run, and searching another earliest initial module(s) again; conducting the steps in sequence circularly till the set of modules to be run is empty. The battle process modeling method and the model scheduling method have the advantages that efficiency models of various certainty and randomness configured to battle activities, so as to solve the problem in calculating efficiency indexes, and support the modularized encapsulation of the efficiency models to facilitate reuse of the models.
Owner:NAT UNIV OF DEFENSE TECH

Method for detecting cryptology misuse of Android application programs

The invention discloses a method for detecting cryptology misuse of Android application programs. The method comprises the following steps of decompiling a to-be-detected program and generating a codebase; then, looking up code segments related with a cryptographic algorithm from the codebase; then, stripping the code segments related with the cryptographic algorithm out of an original program to obtain a complete cryptographic algorithm implementation process code; finally, performing data abstraction and process modeling processing on each cryptographic algorithm implementation process code segment obtained in the step 3; comparing the cryptographic algorithm implementation process code segments item by item through pattern matching and a cryptographic algorithm implementation rule appointed in advance, outputting items which do not meet the implementation rule and summarizing to form a safety analysis result. According to the method disclosed by the invention, through static analysis on an Android application program, a cryptographic algorithm type used in the application program can be automatically judged, and the code segments related with the cryptographic algorithm are automatically extracted; safety analysis is performed on the code segments so as to find out a problem link during a cryptographic algorithm implementation process, and the safety analysis result of the cryptology misuse of the application program is finally obtained.
Owner:SHANGHAI JIAO TONG UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products