Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

44 results about "Sequence alignment algorithm" patented technology

Method of application classification in Tor anonymous communication flow

ActiveCN104135385AReduce loadImplement application classificationData switching networksTraffic capacitySequence alignment algorithm
The invention discloses a method of application classification in Tor anonymous communication flow, which mainly solves the problem of acquisition of upper-layer application type information in the Tor anonymous communication flow and relates to the correlation technique, such as feature selection, sampling preprocessing and flow modeling. The method comprises the following steps of: firstly, defining a concept of a flow burst section by utilizing a data packet scheduling mechanism of Tor, and serving a volume value and a direction of the flow burst section as classification features; secondly, preprocessing a data sample based on a K-means clustering algorithm and a multiple sequence alignment algorithm, and solving the problems of over-fitting and inconsistent length of the data sample through the manners of value symbolization and gap insertion; and lastly, respectively modeling uplink Tor anonymous communication flow and downlink Tor anonymous communication flow of different applications by utilizing a Profile hidden Markov model, providing a heuristic algorithm to establish the Profile hidden Markov model quickly, during specific classification, substituting features of network flow to be classified into the Profile hidden Markov models of different applications, respectively figuring up probabilities corresponding to an uplink flow model and a downlink flow model, and deciding the upper-layer application type included by the Tor anonymous communication flow to be classified through a maximum joint probability value.
Owner:南京市公安局

Ransomware variation detection method based on sequence alignment algorithm

The invention provides a ransomware variation detection method based on a sequence alignment algorithm. The method comprises the specific steps of inputting a ransomware sample, extracting a sample feature sequence, processing the sample feature sequence into a gene sequence, and detecting a ransomware variation. The step of variation detection specifically comprises the sub-steps of clustering each gene sequence in a sample set, extracting clustering result information to acquire various ransomware families; using the sequence alignment algorithm Needleman-Wunsch to compute similarity betweena sample to be detected and a class cluster center sample of various ransomware families, screening out clusters with the similarity more than a preset threshold, and using the screened clusters to form a new ransomware training sample set; determining the ransomware family class to which the sample to be detected belongs b using the newly screened training sample set in combination with the sequence alignment algorithm and a KNN classification algorithm to achieve variation detection. According to the method, the purpose of quickly achieving ransomware variation detection is achieved by combining the sequence alignment algorithm with the existing classification algorithm.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY +1

Social network association searching method based on graphics processing unit (GPU) multiple sequence alignment algorithm

The invention discloses a social network association searching method based on a graphics processing unit (GPU) multiple sequence alignment algorithm. The method comprises the following steps that: a central processing unit (CPU) performs web crawler on an individual webpage so as to extract an individual characteristic vector from a social network; the CPU filters redundant characteristic information from the individual characteristic vector so as to generate a uniform individual characteristic information vector base; a GPU calculates an individual distance matrix and a correction distance matrix of the social network according to the uniform individual characteristic information vector base; the GPU establishes a social network association route guidance tree according to the correction distance matrix; and the GPU traverses the social network association route guidance tree so as to perform the optimal association route searching. By utilizing the advantage that the GPU is suitable for processing a large amount of dense data, associated searching problems which are solved by the the multiple sequence alignment algorithm are parallelized, complex and time-consuming operations, such as formation and traversing of the matrixes and the association route guidance tree, are finished by the GPU, and the problem of long time caused by a large amount of social network data and operation complexity is solved.
Owner:HUAZHONG UNIV OF SCI & TECH

Gesture identity authentication system and method based on sensor on mobile phone

The invention provides a gesture identity authentication system and method based on a sensor on a mobile phone, and relates to the field of identity authentication based on sensors on mobile phones. The gesture identity authentication system comprises an acceleration sensor used for recording real-time acceleration information of a user gesture in a moving process; a direction sensor used for recording azimuth angle information of the user gesture in the moving process; a preprocessing module used for carrying out filtering denoising and equal frequency sampling on the information recorded in the acceleration sensor and the direction sensor; a calculation module used for respectively calculating matching scores of the acceleration information and the azimuth angle information via a global sequence alignment algorithm, calculating a threshold through the matching scores and gesture information made by the user again, and then comparing the user gesture information input at each time with the threshold; and a template base module used for storing original samples of all user gestures and storing the matching scores and the threshold calculated by the calculation module. The gesture identity authentication system provided by the invention adopts no additional device to serve as support, is scarcely influenced by environmental factors and is safe and convenient to carry out identity authentication of the user on the mobile phone.
Owner:WUHAN UNIV OF TECH +1

Industrial control protocol reverse analysis method based on active learning

The invention discloses an industrial control protocol reverse analysis method based on active learning. The method comprises the steps of importing, preliminary analysis, variation, matching and merging. According to the method, an industrial control protocol pcap message sample is subjected to preliminary analysis; a partial message format and a state machine of an industrial control protocol are mastered;and then, interactive active learning is carried out with the industrial personal computer by utilizing the result to continuouslyobtain new messages, so that protocol individual lexical methods and grammars can be deduced more accurately and completely; a Needleman-Wunsch sequence alignment algorithm is adopted when reverse analysis is carried out on the protocol; according to the algorithm, a format and a state machine of a protocol are deduced through similarity scoring and optimal backtracking steps; the method is advantaged in that accuracy of the analysis result is effectivelyguaranteed, through combination with the active learning process, the response message is matched with the protocol formats in the preliminary analysis result, whether the message is matched with theprotocol formats is determined, repeated matching is carried out according to demands, and reverse accuracy and coverage of the industrial control protocol are substantially improved.
Owner:NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1

Method for extracting information from error OCR result

The invention is applicable to the technical field of image text processing, and provides a method for extracting information from an error OCR result, which comprises the following steps of: obtaining a result of extracting an image text through OCR; carrying out post-processing on the OCR results, and merging the OCR results into rows; defining an extraction template according to an information extraction target; carrying out fuzzy matching on a template and all OCR lines by utilizing an optimized global sequence alignment algorithm; optimizing a matching alignment result by utilizing a character library with a similar shape; extracting target information according to a matching alignment result. Meanwhile, the invention further provides a method for generating the similar character library through the neural network recognition model, by means of the similar character library, information provided by wrong characters in OCR recognition can be more effectively utilized, and the information extraction precision is improved. Compared with the prior art, the information extraction method provided by the invention has the advantages that the problem of OCR result error can be effectively solved, and the information extraction effect under the conditions of missing characters, multiple characters and wrong characters is greatly improved.
Owner:上海兑观信息科技技术有限公司

High-concurrency sequence alignment calculation acceleration method based on CPU + GPU isomerism

The invention discloses a high-concurrency sequence alignment calculation acceleration method based on CPU + GPU isomerism. The method comprises the following steps: reconstructing BWA-MEM algorithm codes; performing task concurrent processing on the CPU: completing division of a sequence set, and forming a plurality of concurrent tasks for the first time; running the BWA-MEM algorithm after code reconstruction, and completing concurrent processing of data on the GPU; and task concurrent processing on the GPU: for seed sets and chains generated in the sequence data comparison process, dividing the seed sets with the same or adjacent length, position and quantity into the same data block and chain, and performing the same processing, thereby completing the division of the seed sets and the chains, and forming a plurality of concurrent tasks for the second time. According to the method, the characteristics of the BWA-MEM algorithm and the characteristics of GPU acceleration equipment are closely combined by designing a task parallel and data parallel mode, the strong concurrent operation capability of the GPU is fully utilized, excellent performance is provided for a sequence alignment algorithm, and the efficiency of high-concurrent processing is higher.
Owner:GUANGZHOU JIAJIAN MEDICAL TESTING CO LTD

Method and system for optimizing multiple sequence alignment algorithms, and storage medium

The invention relates to a method and a system for optimizing multiple sequence alignment algorithms, and a storage medium. The method comprises the steps of selecting a core sequence from multiple sequences; performing pairwise alignment on the core sequence and other sequences in the multiple sequences, and obtaining the number of common fragments of the sequences; constructing a first guiding tree according to the number of common fragments of the pairwise sequences; performing a progressive algorithm on the first guiding tree for obtaining a first result through alignment of multiple sequences; calculating the distance between the pairwise sequences according to the first result, and obtaining a distance matrix; constructing a second guiding tree according to the distance matrix, comparing the first guiding tree with the second guiding tree, performing re-alignment on the sequences which correspond with the changing part for obtaining a second result, and repeating processes of constructing the second guiding tree and comparing the first guiding tree with the second guiding tree until the number of comparison times exceeds a threshold, thereby shortening time consumption in sequence comparison, increasing processing process and reducing resource consumption.
Owner:INST OF SPECIAL ANIMAL & PLANT SCI OF CAAS

Sequence alignment Seed processing method, system and device and readable storage medium

The invention discloses a sequence alignment Seed processing method, system and device and a computer readable storage medium. The method comprises the steps: according to the to-be-compared sequenceposition of the Seeds on a to-be-compared sequence and the candidate comparison position of the Seeds on the reference sequence, determining the linear Seeds with the consistent relative relationshipbetween the two positions of the Seeds; splicing the linear Seeds to obtain a new spliced Seed; screening out the longest Seed covering the longest base of the same base fragment of the to-be-comparedsequence from a Seed set comprising the spliced Seeds and nonlinear Seeds; further screening out the Seed which covers the target basic group fragment in each target basic group fragment on the to-be-compared sequence and of which the termination position is greater than the invalid Seed from the Seed set; synthesizing the target Seed of each target base fragment to obtain a target Seed set, wherein the target Seed set does not include Seeds in the longest Seed set, and the number of Seeds used when a subsequent sequence alignment algorithm is expanded is comprehensively reduced, so the calculated amount of an alignment system is reduced, and the matching precision and the processing performance of gene sequence alignment are improved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

A Method for Classifying Tor Anonymous Communication Traffic Applications

The invention discloses a method of application classification in Tor anonymous communication flow, which mainly solves the problem of acquisition of upper-layer application type information in the Tor anonymous communication flow and relates to the correlation technique, such as feature selection, sampling preprocessing and flow modeling. The method comprises the following steps of: firstly, defining a concept of a flow burst section by utilizing a data packet scheduling mechanism of Tor, and serving a volume value and a direction of the flow burst section as classification features; secondly, preprocessing a data sample based on a K-means clustering algorithm and a multiple sequence alignment algorithm, and solving the problems of over-fitting and inconsistent length of the data sample through the manners of value symbolization and gap insertion; and lastly, respectively modeling uplink Tor anonymous communication flow and downlink Tor anonymous communication flow of different applications by utilizing a Profile hidden Markov model, providing a heuristic algorithm to establish the Profile hidden Markov model quickly, during specific classification, substituting features of network flow to be classified into the Profile hidden Markov models of different applications, respectively figuring up probabilities corresponding to an uplink flow model and a downlink flow model, and deciding the upper-layer application type included by the Tor anonymous communication flow to be classified through a maximum joint probability value.
Owner:南京市公安局
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products