Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

207 results about "Self-organizing map" patented technology

A self-organizing map (SOM) or self-organizing feature map (SOFM) is a type of artificial neural network (ANN) that is trained using unsupervised learning to produce a low-dimensional (typically two-dimensional), discretized representation of the input space of the training samples, called a map, and is therefore a method to do dimensionality reduction. Self-organizing maps differ from other artificial neural networks as they apply competitive learning as opposed to error-correction learning (such as backpropagation with gradient descent), and in the sense that they use a neighborhood function to preserve the topological properties of the input space.

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYST INC

Method and system for probabilistically quantifying and visualizing relevance between two or more citationally or contextually related data objects

In one embodiment the present invention provides a novel method for probabilistically quantifying a degree of relevance between two or more citationally or contextually related data objects, such as patent documents, non-patent documents, web pages, personal and corporate contacts information, product information, consumer behavior, technical or scientific information, address information, and the like. In another embodiment the present invention provides a novel method for visualizing and displaying relevance between two or more citationally or contextually related data objects. In another embodiment the present invention provides a novel search input / output interface that utilizes an iterative self-organizing mapping (“SOM”) technique to automatically generate a visual map of relevant patents and / or other related documents desired to be explored, searched or analyzed. In another embodiment the present invention provides a novel search input / output interface that displays and / or communicates search input criteria and corresponding search results in a way that facilitates intuitive understanding and visualization of the logical relationships between two or more related concepts being searched.
Owner:PATENTRATINGS

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:BLUE COAT SYSTEMS

Dynamically reconfigurable multi-stage parallel single instruction multiple data array processing system

The invention discloses a dynamically reconfigurable multi-stage parallel single instruction multiple data array processing system, which comprises a pixel level parallel processing element (PE) array and a row parallel row processor (RP) array, wherein the PE array is mainly used for finishing a linear operation part suitable for the parallel execution of all pixels in low-level and intermediate-level image processing; the RP array is used for operation suitable to be finished in a row parallel way or complex nonlinear operation in the low-level and intermediate-level processing; and particularly, the PE array can also be dynamically reconfigured into a two-dimensional self-organizing map (SOM) neural network with extremely low performance and area overhead, and the neural network can realize advanced image processing functions of high-speed parallel online training, feature recognition and the like with the coordination of RPs. The shortcoming that advanced image processing cannot be used for pixel level parallel RP arrays in the conventional programmable vision chip and the conventional parallel vision processor is completely overcome, and the implementation of a fully-functional, low-cost, low-power consumption, intelligent and portable high-speed real-time visual image system on chip is facilitated.
Owner:INST OF SEMICONDUCTORS - CHINESE ACAD OF SCI

Systems and methods for processing data flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC

Use of machine learning for classification of magneto cardiograms

The use of machine learning for pattern recognition in magnetocardiography (MCG) that measures magnetic fields emitted by the electrophysiological activity of the heart is disclosed herein. Direct kernel methods are used to separate abnormal MCG heart patterns from normal ones. For unsupervised learning, Direct Kernel based Self-Organizing Maps are introduced. For supervised learning Direct Kernel Partial Least Squares and (Direct) Kernel Ridge Regression are used. These results are then compared with classical Support Vector Machines and Kernel Partial Least Squares. The hyper-parameters for these methods are tuned on a validation subset of the training data before testing. Also investigated is the most effective pre-processing, using local, vertical, horizontal and two-dimensional (global) Mahanalobis scaling, wavelet transforms, and variable selection by filtering. The results, similar for all three methods, were encouraging, exceeding the quality of classification achieved by the trained experts. Thus, a device and associated method for classifying cardiography data is disclosed, comprising applying a kernel transform to sensed data acquired from sensors sensing electromagnetic heart activity, resulting in transformed data, prior to classifying the transformed data using machine learning.
Owner:CARDIOMAG IMAGING

Cloud cluster extraction method of network information

The invention provides a cloud cluster extraction method of network information. The cloud cluster extraction method comprises the following steps of: performing file writing, data storage and access to network information by a distributed file system; performing seamless combination on calculation models Map/Reduce of SOM (Self-Organizing Maps), a Kmeans clustering algorithm and cloud calculation to obtain a Map/Reduce SOM and Kmeans clustering algorithm based on the cloud calculation; performing control on the whole Map/Reduce by JobTracker, and distributing Map tasks or Reduce tasks by free TaskTracker; executing an instruction sent from the JobTracker and processing movement of data between Map and Reduce phases at the same time by the TaskTracker; periodically reporting finished work and state updating by each TaskTracker node; and if one TaskTracker node keeps silent for longer than a pre-set time interval, recording that the state of the node is dead and sending data distributed to the node to the other nodes by the JobTracker. The cloud cluster extraction method of the network information has good characteristic extracting performance and overcomes the disadvantage of too strong subjectivity in the existing network flow time sequence analyzing and predicating algorithm.
Owner:BEIJING NORMAL UNIV ZHUHAI

Clustering method and system of parallelized self-organizing mapping neural network based on graphic processing unit

The invention relates to a clustering method and system of a parallelized self-organizing mapping neural network based on a graphic processing unit. Compared with the traditional serialized clustering method, the invention can realize large-scale data clustering in a faster manner by parallelization of an algorithm and a parallel processing system of the graphic processing unit. The invention mainly relates to two aspects of contents: (1) firstly, designing the clustering method of the parallelized self-organizing mapping neural network according to the characteristic of high parallelized calculating capability of the graphic processing unit, wherein the method comprises the following steps of obtaining a word-frequency matrix by carrying out parallelized statistics on the word frequency of keywords in a document, calculating feature vectors of a text by parallelization to generate a feature matrix of data sets, and obtaining a cluster structure of massive data objects by the parallelized self-organizing mapping neural network; and (2) secondly, designing a parallelized text clustering system based on a CPU / GPU cooperation framework by utilizing the complementarity of the calculating capability between the graphic processing unit (GPU) and the central processing unit (CPU).
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Coarse-to-fine self-organizing map for automatic electrofacies ordering

A method for ordering electrofacies to assist in identification of mineral deposits is disclosed. Automated ordering of electrofacies allows geologists to draw inferences about the geological settings in which sediment deposit occurred without directly examining core samples or outcrops. The electrofacies order is determined by (a) training a one-dimensional linear self-organizing map to form an initial neural network that includes a plurality of neurons. The number of neurons is small in comparison to the number of electrofacies kernels (i.e., not greater than one-third the number of electrofacies kernels). (b1) A neuron is selected from the initial neural network. In the next step (b2), the processor determines if more than one electrofacies kernel is attached to the neuron. (b3) If more than one electrofacies kernel is attached to the neuron, then the neuron is split into the number of electrofacies kernels attached to the neuron. (c) Steps (b1)-(b3) are repeated until all neurons in the initial neural network have been processed. In the next step, (d) a self-organizing map is trained to form a final neural network using the split neurons in the initial neural network as initial state. (e) Steps (b1)-(d) are repeated if more than one electrofacies kernel is attached to a neuron with the initial neural network equal to the final neural network. In the last step (f), each electrofacies kernel corresponding to a neuron in the final neural network is correlated to an order number.
Owner:HALLIBURTON ENERGY SERVICES INC +1

Fault detection, diagnosis and performance evaluation method for redundant aileron actuator

The invention discloses a fault detection, diagnosis and performance evaluation method for a redundant aileron actuator. According to the method, fault detection, diagnosis, evaluation and real-time detection of the actuator are performed by means of an input order signal, an output displacement signal, a force motor current signal and aerodynamic loading data of the actuator; the fault detection is realized by a two-stage neural network, a first neural network is used as a system observer and is matched with actual output to acquire a residual error, and a second neural network outputs a self-adaptive threshold value synchronously; the fault detection is realized by the system observer and a force motor current observer; a time domain feature is extracted from a residual error signal and output to a self-organizing mapping neural network, and a minimum quantization error is acquired and normalized to a health degree, so that the actuator performance is evaluated; and on the basis of fault detection, the aerodynamic loading data is introduced, by means of a specific input order spectrum, the system observer and the neural network with the self-adaptive threshold value are trained, and the real-time fault detection is realized.
Owner:北京恒兴易康科技有限公司

Method for fusing and diagnosing fault information of circuit of electric meter on basis of SOM (self-organized mapping) and D-S (Dempster-Shafer) theories

A method for fusing and diagnosing fault information of a circuit of an electric meter on the basis of SOM (self-organized mapping) and D-S (Dempster-Shafer) theories includes firstly, creating a fault mode set for the faulty circuit according to circuit analysis of the faulty circuit of the electric energy meter and fault modes specified by GJB299C; secondly, selecting to-be-observed fault signal points corresponding to fault modes in the set according to the fault mode set created in the first step and using the to-be-observed fault signal points as test points for functions and states of the circuit; thirdly, preprocessing fault signals acquired at the fault signal points selected in the second step; fourthly, fusing fault information by the aid of the SOM theory, outputting fault conclusions, selecting 70% of data for training and selecting 30% of the data for testing; and fifthly, fusing the fault conclusions by the aid of the D-S theory and making a decision for faults. By the aid of the method, confidence degree of a fault diagnostic result is further increased, integral uncertainty caused by errors is reduced, accuracy of fault diagnosis is greatly improved, and the method is an extremely important means in the field of information fusion.
Owner:苏州航大科创发展有限公司

Systems and Methods for Processing Data Flows

A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
Owner:CA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products