Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

42 results about "Randomized algorithm" patented technology

A randomized algorithm is an algorithm that employs a degree of randomness as part of its logic. The algorithm typically uses uniformly random bits as an auxiliary input to guide its behavior, in the hope of achieving good performance in the "average case" over all possible choices of random bits. Formally, the algorithm's performance will be a random variable determined by the random bits; thus either the running time, or the output (or both) are random variables.

Random screen unlocking system and method of mobile terminal equipment

The invention discloses a random screen unlocking system of mobile terminal equipment. The random screen unlocking system comprises a configuration module, a screen monitoring module, a screen locking module, a touch event handling module and a touch release event handling module. A random screen unlocking method based on the random screen unlocking system comprises the following steps of: when a screen is turned off, computing a position set of each key and each lock, namely a starting point and an ending point of an unlocking path, by using a randomization algorithm, and generating a screen locking interface according to the set; when the screen is turned on, displaying an unlocking icon, and monitoring the touch of a user; when the user touches the key on the screen, namely the starting point of the unlocking path, generating a dynamic icon which moves along with a movement track of a finger of the user; when the user releases the key on the lock, judging whether the user puts the correct key on the correct lock; and if so, successfully unlocking the screen. By the invention, the paths of unlocking operation at each time are different, screen loss caused by long-term sliding is reduced, the probability of misoperation is reduced, the quantity of matched combinations is increased, and the safety of screen locking is ensured.
Owner:TSINGHUA UNIV

Ensemble classification method based on randomized greedy feature selection

The invention discloses an ensemble classification method based on randomized greedy feature selection, and belongs to the field of bioinformatics and data mining. The method is used for classifying gene expression data related to plant stress response. The method includes the following steps that 1, randomness is introduced into a traditional greedy algorithm to conduct feature selection; 2, a weighting local modular function serving as a community discovery evaluation index in a complex network is used as heuristic information of the randomized greedy algorithm; 3, base classifiers are trained in each feature subset with a support vector machine algorithm; 4, clustering partition is conducted on the base classifiers with an affinity propagation clustering algorithm; 5, base classifiers serving as class representative points in the cluster are used for conducting integration, and an ensemble classification model is formed with a simple majority voting method. By means of the method, whether plant samples are stressed or not can be recognized according to gene expression data, and the microarray data classification precision is greatly improved; besides, the algorithm is high in generalization capability and has very high stability.
Owner:DALIAN UNIV OF TECH

Reflective vulnerability detection method based on static and dynamic combination

The invention provides a reflective vulnerability detection method based on static and dynamic combination, which is a reflective XSS vulnerability detection method combining static stain propagationand dynamic Fuzzing test. Existing vulnerability detection is based on detection methods such as a single stain analysis or a genetic algorithm, and the stain analysis often uses a method combined with HTTP request packet interception analysis processing to track user's sensitive information and private data to prevent a malicious program code from being sent to a third party, which causes the leakage of user data. While the traditional genetic algorithm only contains the basic genetic operations of selection, crossover and mutation, only an approximate global optimal solution can be found dueto the inherent defects of the genetic algorithm in practice, but the global optimal solution cannot be guaranteed to be converged. The method simultaneously uses a randomization algorithm and a fuzzy test method to automatically detect the vulnerability while utilizing a static analysis source code and a stain propagation method to narrow the search range of the reflective XSS vulnerability, sothat the detection efficiency is high, and the method is highly feasible.
Owner:NANJING UNIV OF POSTS & TELECOMM

Multicast transmission combined access control and precoding computing method in cognitive wireless network

The invention provides a multicast transmission combined access control and precoding computing method in a cognitive wireless network. The method comprises the steps that resource information of a cognitive base station and user information of a multicast service expected to be received are collected so as to build a problem model of multi-antenna multi-description-coding multicast service access control and precoding matrixes in the cognitive scene; the precoding matrixes in the problem model are fixed so as to compute a target transmission user set in each multicast set; the problem model is modified to obtain a modified model, the target transmission rate in the modified model is fixed, and the modified model is solved through positive semidefinite relaxation and a precoding matrix randomized algorithm based on power factor scaling, so that the precoding matrixes are computed; the modified model is solved in an iteration mode through the computed precoding matrixes, so that iterated precoding matrixes and the iterated target transmission rate are obtained. According to the multicast transmission combined access control and precoding computing method in the cognitive wireless network, cognitive wireless network acquirable benefits are maximized, and mathematical modeling and algorithm design for problems are completed.
Owner:BEIJING UNIV OF POSTS & TELECOMM

CPU for realizing randomization of dynamic instruction sets

The invention relates to a CPU for realizing randomization of dynamic instruction sets, and belongs to the technical field of embedded system safety. The CPU is implemented through the following steps of: generating a random number by utilizing a random number generation circuit; sending the generated random number into a register; randomizing an instruction by utilizing a randomization algorithm and the random number; and adding an instruction translation circuit between an instruction fetching stage and a decoding stage, wherein the circuit comprises a selector, the selector responds to a selection signal so as to determine to send a first path of signal or a second path of signal into a decoder, the first path of signal is an instruction in an instruction pipeline in the instruction fetching stage, and the second path of signal is an instruction obtained by the first path of signal according to the random number stored in the register and an anti-randomization algorithm. Under the support of CPU software randomization, the CPU is capable of realizing the randomization and dynamization of kernels and has good defense effect for code injection type attacks; and compared with the instruction randomization realized by using virtual machines or binary systems, the CPU is capable of reducing the operation loss.
Owner:THE PLA INFORMATION ENG UNIV

Multi-party collaborative model updating method, device and system for realizing privacy protection

The embodiment of the invention provides a multi-party collaborative model updating method and device for realizing privacy protection. In the collaborative model updating method, each participant i determines a corresponding local gradient vector according to a local sample set and a current model parameter, by using a randomization algorithm satisfying differential privacy, random binarization processing is carried out on each element in the local gradient vector to obtain a disturbance gradient vector. Each participant i sends the disturbance gradient vector determined by the participant i to the server. And the server aggregates the n perturbation gradient vectors, and performs binarization representation on each element according to the sign of each element in the current aggregation result to obtain a target gradient vector. And each participant i receives the target gradient vector from the server, and updates the current model parameter according to the target gradient vector for the next round of iteration. And after multiple rounds of iteration, each participant i takes the obtained current model parameter as a business prediction model cooperatively updated with other participants.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

An Ensemble Classification Method Based on Randomized Greedy Feature Selection

The invention discloses an ensemble classification method based on randomized greedy feature selection, and belongs to the field of bioinformatics and data mining. The method is used for classifying gene expression data related to plant stress response. The method includes the following steps that 1, randomness is introduced into a traditional greedy algorithm to conduct feature selection; 2, a weighting local modular function serving as a community discovery evaluation index in a complex network is used as heuristic information of the randomized greedy algorithm; 3, base classifiers are trained in each feature subset with a support vector machine algorithm; 4, clustering partition is conducted on the base classifiers with an affinity propagation clustering algorithm; 5, base classifiers serving as class representative points in the cluster are used for conducting integration, and an ensemble classification model is formed with a simple majority voting method. By means of the method, whether plant samples are stressed or not can be recognized according to gene expression data, and the microarray data classification precision is greatly improved; besides, the algorithm is high in generalization capability and has very high stability.
Owner:DALIAN UNIV OF TECH

A Reflection Vulnerability Detection Method Based on the Combination of Static and Dynamic

The invention provides a reflective leak detection method based on the combination of static and dynamic. The method is a reflective XSS leak detection method combined with static stain propagation and dynamic Fuzzing test. Existing vulnerability detection is based on a single detection method such as taint analysis or genetic algorithm. Stain analysis is often a method combined with HTTP request packet interception, analysis and processing to track sensitive information and private data of users and prevent malicious program codes from being sent to Third parties, resulting in the leakage of user data. The traditional genetic algorithm only includes the basic genetic operations of selection, crossover, and mutation. In practical applications, due to its own defects, the genetic algorithm can only find a solution close to the global optimal solution, but cannot guarantee to converge to the global optimal solution. The present invention narrows the search scope of reflective XSS loopholes by means of static analysis of source codes and stain propagation methods, and at the same time uses a combination of randomization algorithm and fuzzy testing method to automatically detect loopholes, with high detection efficiency and high feasibility of the method.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products