Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

228 results about "Random parameters" patented technology

The random parameters model is defined in terms of the density of the observed random variable and the structural parameters in the model: where b(i) and c(i) are parameter vectors and x(i,t) is a set of covariates observed at observation t.

Method and device for implementation of picture verification code

The invention discloses a method for implementation of a picture verification code. The method includes: acquiring current verification code parameters including user setup parameters and random parameters; determining the length and content of a character string of the verification code according to the random parameters, and acquiring a corresponding shape numerical matrix of each character in the character string of the verification code from a designated font object library according to font object library route parameters in the user setup parameters; converting each shape numerical matrix into a character picture of a corresponding character shape, and subjecting all character pictures to character special effect processing according to part of the verification code parameters to generate an initial verification code picture; filling the background of the initial verification code picture with a randomly selected background color; and subjecting the initial verification code picture with the background filled to anti-decoding processing according to difficulty parameters in the user setup parameters and picture special effect processing parameters in the random parameters, and then performing color change processing to generate a final verification code picture. The invention further discloses a device for implementation of the picture verification code.
Owner:杭州网易智企科技有限公司

Random convolutional neural network-based high-resolution image scene classification method

The invention discloses a random convolutional neural network-based high-resolution image scene classification method. The method comprises the steps of performing data mean removal, and obtaining a to-be-classified image set and a training image set; randomly initializing a parameter library of model sharing; calculating negative gradient directions of the to-be-classified image set and the training image set; training a basic convolutional neural network model, and training a weight of the basic convolutional neural network model; predicting an updating function, and obtaining an addition model; and when an iteration reaches a maximum training frequency, identifying the to-be-classified image set by utilizing the addition model. According to the method, features are hierarchically learned by using a deep convolutional network, and model aggregation learning is carried out by utilizing a gradient upgrading method, so that the problem that a single model easily falls into a local optimal solution is solved and the network generalization capability is improved; and in a model training process, a random parameter sharing mechanism is added, so that the model training efficiency is improved, the features can be hierarchically learned with reasonable time cost, and the learned features have better robustness in scene identification.
Owner:WUHAN UNIV

Method for determining insulation and lightning impulse withstanding properties of same-tower double-loop power transmission line

The invention provides a method for determining insulation and lightning impulse withstanding properties of a same-tower double-loop power transmission line. The method comprises the following steps: determining the same-tower double-loop power transmission line to be determined, acquiring statistical parameters of lightning activities in an area in which the power transmission line is located and structural parameters of each pole tower and determining a lightning strike calculation cycle number Nl; sampling random parameters during a lightning strike process and determining lightning current amplitude, transient power frequency voltage and determination result that the lightning strike is shielding failure or back striking; judging whether tripping occurs in the pole tower after the certain lightning strike or not and carrying out statistics on the tripping times during the Nl lightning strikes according to the lightning current amplitude, the transient power frequency voltage and the shielding failure or back striking determination result, as well as the structural parameters of the pole tower, and calculating the lightning strike tripping rate; and determining the insulation and the lightning impulse withstanding properties of the power transmission line according to the lightning strike tripping rate and a target value. The determination method provided by the invention is small in error, high in precision and specific; and by adopting the determination method, design, operation and improvement of lightning protection measures of the same-tower double-loop power transmission line of an electric power department can be scientifically guided.
Owner:XINZHOU POWER SUPPLY COMPANY STATE GRID SHANXI ELECTRIC POWER +1

Adaptive prediction method of residual service life of service equipment modeled based on degradation data

InactiveCN104573881AReduce forecast uncertaintyForecastingReal-time dataSimulation
The invention discloses an adaptive prediction method of residual service life of service equipment modeled based on degradation data. Degradation modeling and residual service life prediction of the service equipment are realized by a Bayesian method and an EM algorithm, and the method comprises the following steps of (1) randomly degrading and modeling; (2) updating random model parameters based on the Bayesian method; (3) predicting the residual service life; and (4) establishing model parameters based on the EM algorithm. An adaptive parameter updating mechanism based on the EM algorithm is introduced into a method for establishing a random index degradation model for predicting residual service life of service equipment, so that all parameters of the random index degradation model are continuously updated when the real-time data of the service equipment are accumulated, and thus the actual operation condition of the equipment can be reflected by predicted results, and the purpose of minimizing uncertainty prediction is achieved. According to the adaptive prediction method, historical data of multiple similar equipment are not required to initialize the degradation model, namely model parameters and residual service life distribution can be adaptively updated.
Owner:GUANGDONG UNIV OF PETROCHEMICAL TECH

N400 evoked potential lie detection method based on improved extreme learning machine

The invention provides an N400 evoked potential lie detection method based on an improved extreme learning machine; random parameters of the extreme learning machine are optimized on the basis of an artificial immune algorithm, and the electroencephalogram lie detection method based on an N400 evoked potential and the improved extreme learning machine is proposed; by virtue of the improved extreme learning machine, classification recognition rates of crime group subjects and control group subjects to detection stimulation and unassociated stimulation are calculated, and the classification recognition rates of the two groups of subjects are calculated and analyzed, so that a threshold parameter for distinguishing whether a subject lies or not is found out; and detection stimulation and unassociated stimulation time domain and frequency domain characteristics of 40 channel N400 induced electroencephalogram signals are extracted, so that the extracted electroencephalogram signal characteristics are more comprehensive; therefore, shortcomings in the prior art which conducts lie detection and judgment on the basis of a few of channels and by taking induced potential waveform geometric properties as characteristic parameter are overcome; and the lie detection method disclosed by the invention has the advantage that a stable lie identification right rate is effectively guaranteed.
Owner:SHAANXI NORMAL UNIV

Aero-engine reliability monitoring method based on mixed weibull distribution

InactiveCN103020438ARealize performance degradation value monitoringReal-time dynamic grasp of reliability levelSpecial data processing applicationsAviationLower limit
The invention relates to an aero-engine reliability monitoring method based on mixed weibull distribution, and the method comprises the following steps of extracting state monitoring information and performance degradation information of an aero-engine which is already replaced and repaired; extracting a relation between each monitoring parameter and the performance degradation of the aero-engine by utilizing a support vector method, and realizing the monitoring of the performance degradation value of a wing engine; utilizing a degradation model to describe the accumulated degradation volume of the aero-engine on the basis of the monitoring result of the real-time degradation value of the wing aero-engine; estimating a random parameter in a linear degradation model of the aero-engine, and determining the variation of the random parameter and the upper limit and the lower limit of the accumulated performance degradation volume of the aero-engine; establishing an aero-engine reliability monitoring model based on the dual-parameter mixed weibull distribution; utilizing a maximal likelihood method to give an expression of each parameter in the aero-engine reliability monitoring module; estimating hyper-parameters of the aero-engine reliability monitoring module based on the dual-parameter mixed weibull distribution; and calculating the reliability monitoring value of the aero-engine, and realizing the real-time and precise reliability monitoring of the aero-engine.
Owner:PEOPLES LIBERATION ARMY ORDNANCE ENG COLLEGE

Keyword or multi-keyword based searchable encryption method and system

The invention discloses a keyword or multi-keyword based searchable encryption method and system. The keyword based searchable encryption method comprises the following steps: generating a public key in an encryption process according to a random parameter and a system public coefficient, then encrypting a keyword in a file through the public key and a private key to obtain a keyword ciphertext, and searching the keyword ciphertext according to a keyword input by a user to obtain a ciphertext required by the user. The keyword based searchable encryption method has the advantages of low computing expense, simple algorithm, high speed and suitability for multiple user models. The multi-keyword based searchable encryption method comprises the following steps: storing all keywords of each file through a structural tree, generating the public key according to the random parameter and the system public coefficient, establishing relations between all the keywords in the file and ciphertexts of the keywords through a hidden part of the structural tree according to the public key, and encrypting to obtain all keyword ciphertexts in the file, wherein for a plurality of keywords input by the user, a cloud ciphertext required by the user can be searched only if the ciphertexts of all the keywords are searched. The multi-keyword based searchable encryption method has the advantage of higher safety.
Owner:SOUTH CHINA UNIV OF TECH

Turning machining parameter optimization method considering uncertain parameters,

The invention provides a turning machining parameter optimization method considering uncertain parameters. The method comprises the steps of obtaining a stability limit-state function according to preset initial vibration conditions and stability critical-state information of a turning machining system; adopting an AFOSM to obtain reliability indexes for evaluating the stability of the system; with MRR as preset constraint conditions of an optimization target, ,establishing an optimization model of the reliability of turning process parameters in the system, wherein the constraint conditions comprise reliability constraint conditions and stochastic design variable boundary constraint conditions; optimizing and processing the optimization model, and obtaining a target function value which is optimized and converged and meets the reliability constraint conditions, wherein certainty parameters, stochastic design variables and stochastic parameters which correspond to the target function value serve as output turning machining parameters. According to the method, the reliability can serve as an evaluation index and optimization condition, and the influences of uncertain factors on the turning process are analyzed in order to obtain the best turning machining parameters.
Owner:NORTHEASTERN UNIV

Engineering structure optimization design method used in uncertain environment

InactiveCN106909718AAvoid nested optimization problemsGeometric CADDesign optimisation/simulationInterval propagationStructural reliability
The invention provides an engineering structure optimization design method used in an uncertain environment, and relates to the technical field of engineering structure reliability optimization. According to the method, an uncertain engineering structure optimization design problem is defined first, an engineering structure and uncertain information in the use environment are described as random variables, interval variables or combinations of the random variables and the interval variables according to existing samples, corresponding optimization models are established according to different types of uncertain variables, reliability indexes in the optimization models are calculated on the basis of the point collocation random/interval propagation analysis method, and finally different optimization solvers are selected according to actual problems for outer layer optimization. Reliability indexes of an inner layer failure function are obtained through efficient uncertain propagation analysis, and formation of the nested optimization problem is avoided; hybrid uncertainty models including random parameters and interval parameters in the same problem are considered, and the method has a practical engineering significance in interval parameter optimization problem under random process stimulation.
Owner:SHENYANG AEROSPACE UNIVERSITY +1

Vehicle remote authentication method based on dynamic password and vehicle remote authentication system thereof

InactiveCN105916143AGuaranteed unpredictabilityEnsure safetyNetwork topologiesTransmissionPasswordRandom parameters
The invention discloses a vehicle remote authentication method based on a dynamic password and a vehicle remote authentication system thereof. The method comprises the steps that step A: a vehicle-mounted system obtains a first dynamic password through calculation by adopting a pre-stored vehicle secret key and a dynamic password generation algorithm according to current random parameters; step B: the vehicle-mounted system reports vehicle data to be transmitted, a vehicle identification code and the first dynamic password to a server; and step C: the server verifies the first dynamic password, and the received vehicle data are determined to be effective if verification is passed, or the received vehicle data are determined to be ineffective. According to the vehicle remote authentication method based on the dynamic password and the vehicle remote authentication system thereof, the dynamic password generated each time is different due to difference of the random parameters in each time of authentication. Unpredictability of the password each time is guaranteed by the randomness of the parameters in each time of calculation so that the security of the system is guaranteed in the basic link of password authentication.
Owner:LE SHI ZHI ZIN ELECTRONIC TECHNOLOGY (TIANJIN) LTD

Authentication equipment and working method thereof

The invention relates to the communication field, in particular to authentication equipment and a working method thereof. The method comprises the steps that when the authentication equipment receivesan authentication request command, the authentication equipment acquires a challenge parameter, a first application parameter and a key handle from the authentication request command, acquires a ciphertext key handle and a verification value from the key handle and encrypts the ciphertext key handle by using a pre-stored verification value key to obtain a comparison value; whether or not the verification value and the comparison value are matched is judged; if the verification value and the comparison value are matched, the ciphertext key handle is decrypted by using a pre-stored encryption key to obtain a second application parameter and a random parameter, and whether or not the second application parameter is consistent with the first application parameter is judged; when the second application parameter is consistent with the first application parameter, a user application private key is generated by using the random parameter and a pre-stored private key factor, to-be-signatureddata is generated according to the first application parameter and the challenge parameter and signatured by using the user application private key to obtain a signature value, and the signature valueis returned to an upper computer. The method is small in occupied memory, more safe and more reliable.
Owner:FEITIAN TECHNOLOGIES

A method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption

There is provided a method for realizing identity-based broadcast encryption by ciphertext-policy attribute-based encryption. The steps of the method are as follows: in step 1, a PKG (Private Key Generator) inputs a safety coefficient of a system to output an initialization parameter; in step 2, the PKG runs a random number generation algorithm to choose a random number required for the system; in step 3, the PKG executes operation to obtain a public key and a master secret key; in step 4, an encrypting party chooses the random number and completes operation to output a part of ciphertext; in step 5, the encrypting party executes calculation according to a set of identities of decrypting users to obtain the remaining part of the ciphertext; in step 6, the PKG runs a random number generation algorithm to obtain a random parameter; in step 7, the PKG executes calculation according to the master secret key and the identity of the user to obtain a private key SKID; in step 8, a decrypting party conforming to requirement is able to execute calculation according to the private key and the ciphertext to obtain K; and in step 9, the decrypting user is able to output correct plaintext by executing calculation according to the K. According to the invention, a development cycle and system load are reduced greatly, and chosen ciphertext attack can be resisted, which ensures safety and effectiveness of the scheme.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products