Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

422 results about "Reporting rate" patented technology

Uncertainty as to relative under-reporting plagues the comparisons of spontaneous reporting rates as a tool for decision-making in pharmacovigilance. However, it is generally accepted that under-reporting should be reasonably similar for similar drugs sharing the same indication, country and period ...

Deep learning-based vulnerability detection method and system

The invention discloses a deep learning-based vulnerability detection method and system. The method comprises an offline vulnerability classifier training part and an online vulnerability detection part. The offline vulnerability classifier training part comprises the following steps of: calling candidate code sections for a training program extraction library/API function; adding type label for the candidate code sections; converting the candidate code sections into vectors; inputting the vectors into a neural network model to carry out training; and finally outputting a vulnerability classifier. The online vulnerability detection part comprises the following steps of: calling candidate code sections for a target program extraction library/API function; converting the candidate code sections into vectors; classifying the candidate code sections by adoption of the trained vulnerability classifier; and finally outputting the code sections which contain online vulnerabilities in the classification result. According to the method and system, vulnerability features aiming at library/API function calling can be automatically generated, and the operation does not depend on expert knowledges and is not restricted to vulnerability types, so that the false report rate and missing report rate of vulnerability detection in target programs can be remarkably reduced and vulnerability positions can be given.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for performing gas pipeline leakage position by using instant change on-line diagnosis coupling excitation frequency response

The invention provides a method which uses transient online diagnosis coupling frequency response to position the leakage of natural gas pipeline, and relates to a natural gas pipeline failure detection and positioning method which can solve the problems that the existing method for detecting and positioning the leakage of the natural gas pipeline can not detect in real time, has long detection period, low positioning precision and high error report rate; real-time pressure value and real-time flux value are respectively collected at the upstream and downstream of the pipeline; the real-time downstream pressure value and the real-time flux value when the pipeline runs stably are reduced by the practical real-time pressure value and the practical real-time flux value at the downstream; if both of the two differences exceed the valve value, the leakage is considered to occur, otherwise the values are collected again; an excitation pressure wave is generated at the downstream end of the pipeline and the wave speed of the response wave of the excitation pressure wave is gained; according to the wave speed of the excitation pressure response wave and the time difference when the excitation pressure response wave is transmitted to the upstream and the downstream, the position of the leakage point is gained. The measurement and collection of the values are completed by normal equipments and the method can be used both in the built pipeline or pipelines under construction.
Owner:HARBIN INST OF TECH

System and method for detecting routing security

The invention provides a system for detecting routing security. The system for detecting the routing security comprises routing information collecting probes and a routing attack analyzing platform, wherein the routing information collecting probes are used for passively collecting routing information messages in real time and uploading the routing information messages to the routing attack analyzing platform, the routing information collecting probes are also used for receiving instructions of the routing attack analyzing platform to detect whether active IP addresses exist in the domain where the routing information collecting probes are located and feeding back a detection result, the routing attack analyzing platform is used for analyzing the routing information messages reported by the routing information collecting probes to discover abnormal AS domains and sending detection instructions to the routing information collecting probes in the abnormal AS domains, and the routing attack analyzing platform is also used for judging whether routing attack exits according to results fed back by the routing information collecting probes of the abnormal AS domains. The system and method for detecting routing security have the advantages that the missing report rate and false report rate of the routing attack detection can be reduced, real-time monitoring of a large-scale network system is achieved on the premise that cost is quite low, and the routing attack can be found out as early as possible.
Owner:上海星地通讯工程研究所

Artificial intelligence-based unmanned aerial vehicle power transmission line inspection system and method

The invention discloses an artificial intelligence-based unmanned aerial vehicle power transmission line inspection system and a method. The system comprises an unmanned aerial vehicle, a background server and an unmanned aerial vehicle control platform. The unmanned aerial vehicle acquires a target image according to a preset control instruction and transmits the target image to the background server. The background server receives the target image, performs image analysis, and sends the analysis result to the unmanned aerial vehicle control platform. The image analysis comprises the steps ofdefect automatic identification and forest hidden danger analysis. The unmanned aerial vehicle control platform is used for receiving a control instruction of an operator about the unmanned aerial vehicle, and pushing the analysis result to a shortcoming-eliminating team / group according to a confirmation instruction of the analysis result. According to the invention, the automation level of the line inspection and shortcoming-eliminating operation is improved. The false alarm rate and the missing report rate of manual identification and treatment are reduced. The accuracy and the effectiveness of the analysis are improved.
Owner:JINING POWER SUPPLY CO OF STATE GRID SHANDONG ELECTRIC POWER CO +1

Network application flow recognition method and apparatus and network application flow management apparatus

The invention discloses a network application traffic identification method, a network application traffic identification device and network application traffic management equipment. The method comprises the following steps of: associating a characteristic sequence template of known network application and corresponding specific plaintext characteristics; taking a source IP of network session as a key value to record the characteristic sequence template which is identified by DPI and is associated with the specific plaintext characteristics into a first list; and for network session which fails to be identified by the prior art, recording characteristic information of a current message, and adapting the characteristic information to the entire characteristic sequence templates under a corresponding key value when a preset threshold is reached to obtain a network application traffic identification result. The network application traffic identification method and the network application traffic identification device can identify network application traffic which fails to be identified by a DPI identification method, improve identification efficiency at the same time, reduce identification cost, and reduce the false report rate of the identification.
Owner:NEW H3C TECH CO LTD

DNS (Domain Name System) tunnel Trojan detection method based on communication behavior analysis

The invention discloses a DNS (Domain Name System) tunnel Trojan detection method based on communication behavior analysis. The DNS tunnel Trojan detection method mainly comprises four parts, namely,a data packet acquisition and integration module, a DNS session reorganization module, a random forest classification training and learning module and a DNS tunnel Trojan traffic detection module. Thecommunication mode of DNS tunnel Trojan is analyzed from the perspective of DNS session; seven attributes which are different from normal DNS session characteristics are extracted; a classification trainer is constructed with an improved random forest algorithm; and finally, a DNS tunnel Trojan detection model is built. As proved by experimental testing, a DNS tunnel Trojan detection technology based on communication behavior analysis disclosed by the invention can effectively detect high-concealment DNS tunnel Trojans, and has the advantages of low false alarm rate, low missing report rate and a very good detection effect on unknown DNS tunnel Trojans.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Optical fiber disturbance detection method and apparatus

The invention relates to an optical fiber sensor. The invention discloses an optical fiber destabilization detecting method combining based on a phase sensitivity light time domain reflection and a polarization sensitivity light time domain reflection method and distributed optical fiber sensing system thereof to improve the detecting accuracy and reliability of the optical fiber destabilization. The method comprises: a. injecting an optical signal with determined polarization state into the optical fiber; b. receiving the back rayleigh scattering light in the optical fiber; c. diving the rayleigh scattering light into two bundles to perform the Phi-OTDR data acquisition and the POTDR data acquisition; d. determining the destabilization and position thereof based on the distortion points of the Phi-OTDR data and the POTDR data. The invention also discloses an optical fiber destabilization detecting device. The technical scheme of the invention is used for monitoring and protecting the optical cable lines, thereby greatly improving the precision and the sensitivity of the monitoring system and reducing the erroneous judgment rate and the missing report rate.
Owner:OPTICAL SCI & TECH (CHENGDU) LTD

Content-based human body upper part sensitive image identification method and device

The invention discloses a content-based human body upper part sensitive image identification method and a content-based human body upper part sensitive image identification device. The method comprises the following steps of: performing human face identification on static images and removing images which do not contain human face information; identifying a texture image by using neural network identification and finding out related sensitive information positions; generating a human body skin color model of the image by using the color distribution information in a detected human face area and the default skin color information; extracting the human body skin area from the image according to the established human body skin color model; and if the sensitive information image and the human face information image are consistent with a human body upper part shape model, and the skin ratio of the sensitive information image exceeds a threshold, determining the image as the sensitive image. In the invention, human face identification, human body upper part identification and sensitive image identification are used in combination to differentiate sexy photo images from pornographic sensitive images, so that the error report rate of the sexy photo images is effectively reduced.
Owner:XIAMEN MEIYA PICO INFORMATION

Method of monitoring faults in sections for intermittent control system

InactiveCN103279123AThe phase division complies withThe phase division is more in line with the batch process actually in line withElectric testing/monitoringFuzzy clustering analysisPrincipal component analysis
The invention discloses a method of monitoring faults in sections for an intermittent control system and relates to a fault monitoring method. Firstly, a plurality of batches of collected intermittent process data are standardized in a way of expanding variables, and a data matrix on each sampling time is subjected to principal component analysis; secondly, a fuzzy C-means clustering is a fuzzy clustering analysis method which is suitable for soft partition and is generated through combining a fuzzy set theory and a k-means clustering; and thirdly, after segmentation is finished, an improved MPCA (Multiway Principal Component Analysis) model with a time varying principal element covariance on the basis of expanding variables is established on each subphase, then when on-line monitoring is carried out, which phase a new batch of data belongs to is judged, whether the data exceeds the fault monitoring control limit or not is calculated and judged, if so, a fault occurs, and the fault monitoring in sections ends. According to the invention, process multi-phase partition is more accurate, misinformation and missing report rates in monitoring are reduced, and the practical application and operability are strong.
Owner:SHENYANG INSTITUTE OF CHEMICAL TECHNOLOGY

Tunnel fire early-warning controlling method based on multi-sensor data fusion technology and system using the same

ActiveCN103136893ADynamic Fire Threshold Adjustment MethodFlexible Fire Threshold Adjustment MethodBiological neural network modelsFire alarmsEarly warning systemFire - disasters
A tunnel fire early-warning controlling method based on multi-sensor data fusion technology and a system using the tunnel fire early-warning controlling method based on the multi-sensor data fusion technology comprise steps as below: recording of history data of a main sensor group, reading of data of an auxiliary sensor group at a regular time, calculation of a neural network, passing back of a calculation result, execution controlling on site and the like, and the system specially using the tunnel fire early-warning controlling method based on the multi-sensor data fusion technology comprises a site detection device, a data processing device and an alarming displaying device. The tunnel fire early-warning controlling method based on the multi-sensor data fusion technology comprises a dynamic and flexible fire disaster threshold value adjusting method, namely, a method calculating with a neural network to analyze current data of the history data of the main sensor group and the auxiliary sensor group to obtain a fire disaster threshold value of current environment factors, and the original fire disaster threshold value is replaced by the new fire disaster threshold value. The tunnel fire early-warning controlling method based on the multi-sensor data fusion technology can effectively reduce judgment differences of a fire disaster caused by changing of environment of the tunnel, and reduce misstatement rate and missing reporting rate of the funnel fire disaster early-warning system.
Owner:四川九通智路科技有限公司

Touch display panel, driving method thereof and detecting method of induction signals

The invention discloses a touch display panel, a driving method thereof and a detecting method of induction signals, relates to the field of display and solves the problems that the report rate is influenced due to long scanning period and thin film transistors in a visible range are prone to electrical conductivity reduction. A plurality of touch driving electrodes and touch induction electrodes are arranged in a touch area of the touch display panel, and a driving unit is arranged on the edge; the driving unit comprises a first gate driving circuit to an Nth gate driving circuit which are coupled sequentially in a cascading manner, the enable end of the first gate driving circuit is connected with a field synchronizing signal line arranged on the edge of the touch display panel, and the output end of the (N-1)th gate driving circuit is connected to the enable end of the Nth gate driving circuit adjacently connected with the (N-1)th gate driving circuit; the input ends of the first gate driving circuit to the Nth gate driving circuit are connected with a driving signal line respectively, and the output ends of the first gate driving circuit to the Nth gate driving circuit are coupled with the corresponding touch driving electrodes respectively.
Owner:BOE TECH GRP CO LTD +1

Combined type intrusion detecting method on basis of data fusion of improved core vector machine

The invention discloses a combined type intrusion detecting method on the basis of data fusion of an improved core vector machine, which belongs to the technical field of network safety. The method comprises the following steps: extracting characteristic data of all time monitoring points required by misuse intrusion detection and abnormal intrusion detection from a network safety equipment log of a target network; respectively constructing the characteristic data into black and white list data sample subsets; training the black and white list data sample subsets, thereby respectively obtaining a primary misuse intrusion detection model and a primary abnormal intrusion detection model; realizing the data fusion of the primary misuse intrusion detection model and the primary abnormal intrusion detection model through a D-S evidence theory, thereby obtaining a combined intrusion detection model and a combined confidence interval of the combined intrusion detection model; and obtaining a final detecting result. The method provided by the invention has excellent properties at the aspects of increasing the instantaneity of an intrusion detecting system, reducing the missing report rate and false report rate of the intrusion detecting system and increasing the generalization of the intrusion detecting system.
Owner:CHINA ELECTRIC POWER RES INST +2

Intrusion detection method and system based on Nginx proxy server

The invention provides an intrusion detection method based on a Nginx proxy server. The intrusion detection method comprises the capture step, the verification step, the transmitting step, the matching detection step and the isolation step. According to the capture step, data packages from all client ends are captured on the Nginx proxy server. According to the verification step, validity verification is conducted on the captured data packages, and whether the data packages carry legal certificates distributed by a certificate server is verified. According to the transmitting step, the effective information in the passed data packages of the client ends is extracted, packaged and then transmitted. According to the matching detection step, the transmitted effective information is received, matching detection is conducted on the effective information according to weakness codes stored in a weakness library, and whether the effective information contains codes matched with the weakness codes stored in the weakness library is judged. According to the isolation step, the client ends are isolated to prevent the client ends from conducting hostile attack on a network. The intrusion detection method and system can lower the false report rate and the miss report rate due to the fact that the response speed of a detecting system is far smaller than the transmission speed of the network, and the safety of a server end is guaranteed maximally.
Owner:CHINA STANDARD SOFTWARE

Method and system for detecting phishing website based on SEO (search engine optimization)

The invention provides a method for detecting a phishing website based on SEO. The method comprises the steps as follows: the known phishing website is analyzed, and a title of the known phishing website is taken as a keyword and added into a malicious title database; a webpage obtained by saving a webpage crawler, and a webpage index database is built after an obtained webpage abstract and a corresponding URL (uniform resource locator) are filtered and reabsorbed; the webpage abstract in the webpage index database is retrieved by using the keyword in the malicious title database and / or a preset keyword, and a successfully matched webpage is saved as a suspicious webpage; and the suspicious webpage is judged with a judgment strategy, the title of the suspicious webpage which is judged to be the phishing website is added into the malicious title database. The invention further discloses a system for detecting the phishing website based on the SEO. According to the method and the system for detecting the phishing website based on the SEO, the retrieval range is reduced by abstracting the keyword, active crawling and judgment are performed on the website and the database is updated continuously, the false alarm rate is decreased, the obtained phishing website is judged automatically, and the missing report rate is reduced.
Owner:HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products