Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

130 results about "Project group" patented technology

Method and system for allocation of resources in a project portfolio

ActiveUS7991632B1Low costFacilitates potential early cancellationMarket predictionsResourcesACROSS ProjectResource information
Described are methods and apparatuses, including computer program products, for optimizing allocation of resources across projects in a project portfolio. The method includes receiving, at a computing device, (i) resource information, (ii) a portfolio of project definitions and (iii) one or more portfolio-level optimization criteria. The resource information representing a plurality of resources available for allocation to the projects, and each project definition includes a unique identifier and one or more project-level constraints. The method also includes generating, using the computing device, a plurality of project portfolio allocation scenarios and determining one or more optimized project portfolio allocation scenarios from the plurality of project portfolio allocation scenarios. Each project portfolio allocation scenario satisfies the one or more project-level constraints associated with each project definition. Each optimized project portfolio allocation scenario optimizes a sequence of the projects to satisfy the one or more portfolio-level optimization criteria.
Owner:FMR CORP

System and methods for management of external dependencies associated with a project portfolio

InactiveUS20110046992A1Rapid and broad adjustmentResourcesSpecial data processing applicationsProject groupVertex (graph theory)
The present invention applies concepts from the graph theory in mathematics and computer science to the management of external dependencies associated with a project portfolio. By viewing components of a project portfolio as nodes (vertices) of a graph, which may also include activities that are external to the project portfolio but depend or impose dependencies on it, a significant and unique business value can be realized. An exemplary embodiment of these concepts is described, demonstrating comprehensive, generic, and flexible system and methods.
Owner:ERHARD ITAY M

Combined type tasking time-driven chronic disease preventing control and health managing method

The invention relates to a combined type tasking time-driven chronic disease preventing control and health managing method. The method is designed for a health managing project for a chronic disease preventing control and health managing service, planning an execution time rhythm of the health managing project in different managing stages for the chronic disease risk and risk grade, establishing a time-driven tasking health managing project group, and assembling, combining and forming a productized chronic disease preventing control and health managing service. According to the requirement of chronic disease management, the health managing service is matched and started for a managed object; the health information is collected and analyzed; the health state is assessed; PDCA cycle operation is performed in a time-driven health managing task sequence on the basis of health standard according to an energy balancing and psychological stress managing principle; a health managing technology is applied in a systematic, standard and processed form; a managing scheme is made; a health managing target is refined; the track is approached step by step; the intervening execution is enhanced; the health state is improved; the risk factor is controlled; and the purpose of chronic disease preventing control and health managing is achieved.
Owner:冯力新 +1

Recommendation method and system based on a generative adversarial network and double clustering

The invention discloses a recommendation method and system based on a generative adversarial network and double clustering, and belongs to the technical field of computer application. The method comprises the following steps: firstly, reading the incomplete evaluation data set of a user-project establishing an incomplete evaluation data set of a project, then constructing a generative adversarialnetwork consisting of a generative network and a discriminant network, then predicting and filling missing evaluation values by utilizing the trained generative network, finally carrying out double clustering, and carrying out corresponding project group recommendation on different user groups according to sub-clusters obtained by the double clustering. According to the recommendation method and system, the trained generation network is used for filling the missing evaluation value, and the defects that a traditional method for filling the missing evaluation value such as the mean value (or the number of people) and linear interpolation is low in precision and large in error are overcome; And the filled complete evaluation data is clustered by using the double-clustering integration algorithm, so that the clustering result is more effective than that of a single double-clustering algorithm, the pertinence of a project group recommended to a specific user group is stronger, and the recommendation effect is improved.
Owner:HEFEI UNIV +1

Ic Card for Encryption or Decryption Process and Encrypted Communication System and Encrypted Communication Method Using the Same

It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff α and a staff β belonging to the same project group, α of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). β of the reception side writes the variable code V(1) received from a in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.
Owner:DAI NIPPON PRINTING CO LTD

Method and system for driving a research and development task based on a flow

The invention discloses a method and system for driving research and development task based on flow. The method comprises a research and development activity generation module and a research and development task allocation module. The research and development activity generation module is used for driving all research and development activities involved in a software research and development flow according to flow data customized by a project; and the research and development task allocation module is used for realizing detailing of the research and development activities into research and development tasks and distributing the research and development tasks to corresponding project group members. According to the method and system disclosed by the invention, the research and development tasks can be generated automatically according to the software research and development flow, so that the task distribution efficiency and precision can be improved.
Owner:上海爱韦讯信息技术股份有限公司

Recommendation system attack detection method based on time series data

The invention discloses a recommendation system attack detection method based on time series data. The method includes the steps that a user-project preference degree data set and a frequent item set excavation technology are utilized to acquire user groups and project groups; group preference degree value proportional characteristics are calculated for the pairs of user sets and the pairs of project sets; all preference degrees of projects in the project groups form time series preference degree data according to operating time; group preference degree time interval characteristics are calculated for the pairs of user sets and the project sets; group average entropy characteristics are calculated for the user groups; for the user groups, maximum group preference degree value proportional characteristics corresponding to the user groups and maximum group preference degree time interval characteristics corresponding to the user groups are selected, and the user groups are sequentially ranked through the three characteristics, and then three ordered user group sequences are acquired; the three ordered user group sequences are integrated to acquire a wholly ordered user group sequence, and the most probably attack user groups are acquired; the most probably target project groups are acquired through the group preference degree value proportional characteristics.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Landslide hazard monitoring and early warning earth surface clinometer threshold value judgment method

The invention discloses a landslide hazard monitoring and early warning earth surface clinometer threshold value judgment method, and relates to a rainfall-induced landslide critical value early warning method. Monitoring data and in-situ experiment and model experiment examples during destruction of a large number of slopes are adopted as the basis, by means of the rock-soil body creep (rheology) theory, a landslide creep deformation process model is built, the relation between the rainfall landslide creep (rheology) three-stage and the slope earth surface inclination angle is analyzed, three-stage early warning critical reference values of a rainfall landslide earth surface clinometer are obtained, inspection is performed through a numerical simulation method and a field landslide remote monitoring and early warning system built by a project group, the requirement for four-stage deformation standards and early warning is met, and the scientific basis is provided for geological hazard monitoring comprehensive early warning technology decision making.
Owner:INST OF MOUNTAIN HAZARDS & ENVIRONMENT CHINESE ACADEMY OF SCI

Three-layer risk assessment-based drought disaster risk coping method

InactiveCN105930954AGradual reduction of regional drought riskShould applyClimate change adaptationResourcesEngineeringDrought risk
The invention discloses a three-layer risk assessment drought disaster risk coping method. The method includes the following steps that: regulatable feature and regulation approach analysis is performed on drought disaster risk factors from the four aspects of dangerousness, exposure degree, vulnerability and disaster prevention and mitigation capability involved in a drought formation process; a drought disaster one-layer risk assessment system is established; a drought disaster two-layer risk assessment system is established; a drought disaster three-layer risk assessment system is established; and drought risk coping strategies are put forward. Based on historical evolution rules and future evolution trends of drought disasters, the drought disaster risk coping method is established according to drought disaster risk region division and risk prediction results from aspects such as urban population size, regional water resource carrying capacity, industrial structure adjustment, water conservancy project group optimized layout, disaster prevention and mitigation capacity construction, soil and water resource regulation and risk prevention and control management. With the method adopted, regional drought risks can be lowered level by level.
Owner:CHINA INST OF WATER RESOURCES & HYDROPOWER RES

Automatic power flow check file generation method for power grid planning project

The invention discloses an automatic power flow check file generation method for a power grid planning project. The automatic power flow check file generation method for the power grid planning project includes steps that 1, inputting power grid BPA initial power flow data files of two years; step 2, pre-processing data of the power grid BPA initial power flow data files of the two years, and using a maximum common sub-graph algorithm to automatically compare the data to identify BPA check data cards corresponding to the planning project; step 3, judging the topological connection relations between the BPA check data cards, and generating a plurality of planning project groups according to the topological relevance; step 4, automatically generating a BPA power flow check data file of a net rack to be evaluated. The automatic power flow check file generation method for the power grid planning project can be used for the planning and design institute to optimize planning schemes in the design process and can also be used for the power grid planning management department to objectively evaluate the power grid planning schemes of the planning and design institute.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Project management method and device, electronic equipment, storage medium and product

The embodiment of the invention provides a project management method and device, electronic equipment, a storage medium and a product, and the method comprises the steps of responding to a management request for a target project group, and determining the project query information of the target project group, where the project query information comprises a project group name and employee information of project employees; querying project execution information of the project employee on the target project group based on the project query information; according to the project execution information, analyzing the execution condition of the project employee in the target project group to obtain an analysis result; determining a plurality of associated users having output association with the target project group; according to the position information of the associated users, forming result prompt information of the associated users in combination with the analysis result, so that respective result prompt information of the multiple associated users is obtained; and respectively outputting corresponding result prompt information for the plurality of associated users. The problem of low project management efficiency is solved.
Owner:上海豪承信息技术有限公司

Wechat based pastry food security tracing service platform

InactiveCN104599142AShow online fast serviceCommerceInformation functionLogistics management
The invention discloses a Wechat based pastry food security tracing service platform. The platform is characterized in that a news channel module comprises a latest news sub-module, a latest notification sub-module and a contact-us sub-module which are respectively used for providing news information function, related notification function and function of merchants contacting the project group in private; a query channel module comprises a merchant list sub-module and a food parameter sub-module which are used for respectively providing the function of querying the basic information of the merchants and querying the parameters of the online pastry foods; a food parameter sub-module is equipped with a security tracing information query channel access for viewing the product security tracing information; an order channel module comprises an individual order sub-module and a group order sub-module. According to the Wechat based pastry food security tracing service platform, the Wechat is used as the platform to provide the functions of comprehensively querying raw materials, production processing, logistics and sales information of the online pastry foods; the order services at different levels can be provided according to different order quantity; therefore, the online fast service for pastry food production and sales are shown.
Owner:ZHEJIANG FORESTRY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products