Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

180 results about "Rule of inference" patented technology

In logic, a rule of inference, inference rule or transformation rule is a logical form consisting of a function which takes premises, analyzes their syntax, and returns a conclusion (or conclusions). For example, the rule of inference called modus ponens takes two premises, one in the form "If p then q" and another in the form "p", and returns the conclusion "q". The rule is valid with respect to the semantics of classical logic (as well as the semantics of many other non-classical logics), in the sense that if the premises are true (under an interpretation), then so is the conclusion.

Prediction method and system of litigation outcome

The invention provides a prediction method and system of a litigation outcome. The method comprises the following steps: establishing a knowledge inference library of a predetermined subject, wherein the knowledge inference library is used for storing inference rules, and a plurality of inference steps of the inference rules; constructing a prediction model based on the knowledge inference library of the predetermined subject, wherein a neural network block of each prediction model is corresponding to one inference step, the inference data needed by each inference step is corresponding to one data type, and each data type is corresponding to an input type of the neural network block; processing a judgment document corresponding to the predetermined subject to obtain a training sample data set, training and modifying the prediction model; acquiring to-be-detected data, extracting a data pair with attribute and attribute value based on the predefined feature word library to form a to-be-detected data feature information set; judging a suitable subject of the to-be-detected data based on the to-be-detected data feature information set, and inputting into the prediction model to predict. The method and system provided by the invention can guide the people to predict the outcome of a law case and are strong in practicability.
Owner:点击律(上海)网络科技有限公司

System and method for presenting electronic medical records

The invention provides a system and a method for presenting electronic medical records. The system comprises a standard management module, a template generator, an electronic medical record generating module, a logical inference engine and a display interface. The standard management module generates data element documents; the template generator generates electronic medical record templates, medical knowledge documents and search and inference rules according to the data element documents; the electronic medical record generating module loads the electronic medical record templates to generate electronic medical records; the logical inference engine obtains the electronic medical records according to patient information, calls the medical knowledge documents according to patients diseases and / or chief complaints, calls the search and inference rules according to the patient diseases and / or the chief complaints and specialized categories and / or service types of medical staff, and performs search and formalized inference on information in the electronic medical records by using the search and inference rules and the medical knowledge documents to obtain electronic medical record data subsets; and the display interface displays the electronic medical record data subsets. By means of the system and the method for presenting electronic medical records, the implicit inference and query can be performed on the electronic medical records, so that the interesting electronic medical record information can be presented on account of specific diseases and / or chief complaints and various specialized medical staff.
Owner:NANTONG KANGSHENG MEDICAL EQUIP

Method and device for preventing from computer virus

The invention provides a method for preventing computer virus. The method includes the steps that: before an external file or data are needed to be transferred into an information system, reading the whole content of the file or data first; executing a machine code instruction analysis on the content of the file or data and reorganize the operation logic; executing a simulation run on the result of the machine code instruction analysis and the result of reorganization, and giving a result report generated by the simulation run; inferring and determining the result report generated by the simulation run using the knowledge of the virus knowledge base and the inference rule, and obtaining the result of whether the file has the probability of virus existence or not; according to the result of the probability of virus existence, automatically or manually control whether the external file or data are able to be transferred into the information system or not. The invention also provides a device for realizing the method, and the device comprises a machine code instruction analysis and operation logic reorganization device, a control device, a risk assessment device, and a virus knowledge base device. The invention can effectively prevent the broadcast of computer virus.
Owner:BEIJING PAIRUIGEN SCI & TECH DEV

Multi-business-object-oriented distribution network warning information integrated rational analysis method

ActiveCN104133986ARealize classification integrationMake up for security risksSpecial data processing applicationsPrimary stationSimulation
The invention discloses a multi-business-object-oriented distribution network warning information integrated rational analysis method, which comprises the following steps that: 1, distribution network warning information is classified and sorted on the basis of different business objects; 2, a warning rule is defined according to distribution network business object requirements; 3, an association rule is defined, and the association rule is the logic association among a plurality of pieces of warning information; 4, the warning information with the logic association is integrated into warning events according to the association rule, and an expert rational rule base is built; 5, a power distribution automation system main station collects all warning information of an operating distribution network, compares the expert rational rule base and obtains all warning events generated by all collected warning information; and 6, the warning events are further analyzed, and the reasons, the caused influence and the corresponding solutions of the generated warning events are obtained. The multi-business-object-oriented distribution network warning information integrated rational analysis method provided by the invention realizes the classification and the sorting on the distribution network information, and also realizes the auxiliary fault judgment and handling.
Owner:STATE GRID CORP OF CHINA +1

Transformer substation sequentialization control system with visualization and interactivity

The invention discloses a transformer substation sequentialization control system with visualization and interactivity. The invention proposes that a ticket printing system which is easier to use is provided for sequential control in a way of establishing concrete operation tickets and template operation tickets, a general template ticket data model irrelevant to concrete equipment of a transformer substation is established according to the generality of a primary electric wiring model of the transformer substation, a mapping method from the template operation tickets to common operation tickets is provided, an inference rule in an intelligent ticket printing process is proposed, original manual confirmation is substituted by an intelligent video system access sequentialization control system and an intelligent video system can be in service and out of service, a synchronous switch-on mode is automatically calculated according to multiple factors, i.e. line side voltages, bus side voltages, frequencies, phase angles, and the like, the interactivity of the sequential control system by establishing the communication process of the sequentialization control system and scheduling interaction and proposing the processing mode during a fault and the content of the sequential control is improved by introducing secondary equipment and control operation relevant to protection to the sequentialization control system.
Owner:NARI TECH CO LTD +1

Admission control method and system in heterogeneous wireless network environment

InactiveCN101820665AModeling Abstract RealizationAchieve the purpose of abstractionAssess restrictionGrade of servicePerformance index
The invention discloses an admission control method and an admission control system in a heterogeneous wireless network environment. The method comprises the following steps of: when an access request is received, collecting the multi-domain information of each network and acquiring a target quality of experience (QoE) vector of a user in the access request by using an admission control entity; performing granularity partition on the information of each attribute domain in the multi-domain information according to a predefined performance index to form information granularity vectors of each attribute domain; according to the target QoE vector of a user terminal and a predefined fuzzy membership function, establishing fuzzy membership grade vectors of resource grains in each attribute domain; based on fuzzy evaluation vectors and inference rules of the resource grains in each attribute domain, establishing mapping relationships between the fuzzy evaluation vectors of the resource grains in each attribute domain and a network comprehensive evaluation index so as to acquire a comprehensive evaluation vector; and according to comprehensive evaluation, selecting the network having the highest network grade of service as an access network. Through the method and the system, an effective admission control strategy is designed for the heterogeneous wireless network and the overall performance of the heterogeneous wireless network is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Ontology-based intelligent retrieval system for information security event

InactiveCN105550189AImplement Semantic RetrievalWeb data indexingSemantic analysisSemantic searchData mining
The invention designs and realizes an ontology-based intelligent retrieval system for an information security event, which is a system for performing information retrieval of the information security event based on an ontology, and contains knowledge from the field of information security. The goal of designing the system is to provide knowledge accumulation in the field of information security for a user, and the system has a certain intelligent semantic retrieval function, so that the user can obtain required information security event related knowledge and information. A design concept is that firstly, an initial information security event domain ontology is established based on OWL, then information security event domain related information is acquired, and a relationship between information security event domain concepts is extracted, thereby realizing automatic expansion of the information security event domain ontology; secondly, an inference rule is designed according to a semantic relationship of the information security event ontology, and the information security event ontology is inferred based on Jena; and finally, the query expansion and sorting are carried out based on the information security event ontology and semantic similarity calculation, thereby realizing semantic retrieval of the information security event.
Owner:XUCHANG UNIV

QoS MAC protocol based on application ontologies of wireless sensor network

The invention discloses an application-oriented QoS (Quality of Service) MAC protocol in WSN (Wireless Sensor Network). Basic concepts can be acquired by labeling applications, nodes and QoS parameters to create task ontologies which include the applications, nodes and QoS ontologies. The MAC is separated into four phases which comprise matching tasks, requesting, dispatching and executing. Cluster heads are used for propagating the tasks to be completed. Data packages are classified into three priority levels by cluster nodes according to requirements for quality of service of the tasks to send task requirements. The task requirements are received by a combination of the cluster heads to select the nodes to complete the tasks, and transmission resources are allocated to the nodes according to the QoS status of the nodes. Therefore, a new CSMA/CA approach to identify the priority levels is provided, the transmission priority levels of nodes are controlled by different sizes of contention windows and arbitration interframe space, and a node back-off time selection method based on the residual energy of nodes is provided. Furthermore, separated MAC protocol processes of cluster heads and cluster nodes and the application process of semantic inference rules in MAC are provided.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products