Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

63 results about "Sequence clustering" patented technology

In bioinformatics, sequence clustering algorithms attempt to group biological sequences that are somehow related. The sequences can be either of genomic, "transcriptomic" (ESTs) or protein origin. For proteins, homologous sequences are typically grouped into families. For EST data, clustering is important to group sequences originating from the same gene before the ESTs are assembled to reconstruct the original mRNA.

Method for analyzing characteristic of software vulnerability sequence based on cluster

The invention discloses a method for analyzing the characteristic of a software vulnerability sequence based on a cluster, which belongs to the technical field of information security. The method comprises the following steps: firstly, establishing a software vulnerability sequence database by using the conventional software vulnerability sequence; secondly, analyzing the software vulnerability sequence in the database by using clustering technology so as to generate a plurality of software vulnerability sequence clustering clusters; thirdly, finding the software vulnerability sequence clustering cluster which is most similar to a doubtful vulnerability sequence of software to be tested through similarity computation; fourthly, comparing the doubtful vulnerability sequence of the software to be tested with all software vulnerability sequences in the most similar software vulnerability sequence clustering cluster through a sequence comparison method, and further finding the software vulnerability sequence which is most similar to the doubtful vulnerability sequence of the software to be tested from the software vulnerability clustering cluster; and finally, outputting related vulnerability information, in the software vulnerability sequence database, corresponding to the most similar software vulnerability sequence as a security report. The method improves the analysis efficiency of the software vulnerability sequence.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Method for diagnosing wind turbine main bearing fault based on temporal sequence clustering

The invention discloses a method for diagnosing a wind turbine main bearing fault based on temporal sequence clustering. The method comprises the following steps that step one, data (power data and main bearing temperature data) are collected, screened and calculated; step two, different power intervals are divided according power clustering, and all the power intervals are subjected to the flowing steps from step three to step seven; step three, fitness is evaluated; step four, good individual groups are selected; step five, a temperature datum line is obtained; step six, a temperature warning line is obtained; and step seven, the data are substituted for detection and early warning. According to the method, the wind turbine main bearing temperature is subjected temporal sequence power clustering and good individual group selection, whether a main bearing has an abnormal operation state or not is distinguished for diagnosis, the diagnosis result is reliable, the early warning capacity of the main bearing can be improved, manual troubleshooting is replaced by the data, targeted maintenance and defect elimination are achieved, the damage rate of the main bearing is decreased, the power generation rate and economic benefits of a wind turbine are increased.
Owner:GUODIAN UNITED POWER TECH

Message sequence clustering method of unknown binary private protocol

ActiveCN109951464AOvercoming the Embedding Representation Problem of Unequal LengthsFully mine semantic informationCharacter and pattern recognitionTransmissionGramDimensionality reduction
The invention discloses a message sequence clustering method of an unknown binary private protocol, and mainly solves the problem that similarity between protocol message sequences cannot be accurately measured in a protocol reverse process in the prior art. The implementation scheme comprises the following steps: 1) collecting an unknown binary private protocol message sequence; 2) preprocessingthe collected message sequence; 3) extracting multi-scale N-gram features of the preprocessed message sequence; 4) carrying out dimension reduction on the multi-scale N-gram features based on varianceselection; 5) according to the multi-scale N-gram features after dimension reduction, obtaining a multi-scale N-after dimension reduction; carrying out embedded representation on the message sequenceby the gram feature; 6) determining the optimal clustering number K according to the embedded representation of the message sequence, and 7) clustering the message sequence according to the optimal clustering number K. According to the method, the potential semantic information of the message sequence is fully mined, the similarity between the message sequences can be accurately measured, the clustering accuracy is improved, and the method can be used for clustering unknown binary private protocols.
Owner:南京赛宁信息技术有限公司

Method and equipment used for obtaining search results

The invention aims at providing a method and equipment used for obtaining search results. Particularly, the method comprises the steps as follows: obtaining one or more synonymous sequence clusters according to a plurality of search logs; creating or updating a synonymous sequence database according to one or more synonymous sequence clusters; obtaining a target query sequence of a user; carrying out match query in the synonymous sequence database according to the target query sequence to obtain a target synonymous sequence cluster corresponding to the target query sequence; and providing a group of optimized search results corresponding to the target synonymous sequence cluster to the user. Compared with the prior art, the synonymous sequence database is created or updated through the synonymous sequence clusters obtained according to the search logs, the match query operation is carried out in the synonymous sequence database according to the target query sequence input by the user to obtain the target synonymous sequence cluster, and the group of optimized search results corresponding to the target synonymous sequence cluster are provided to the user, so that the search demands of the user are met and the information obtaining efficiency of the user is improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Typical court classification method and system based on clustering algorithm

The invention discloses a typical court classification method and system based on a clustering algorithm, and relates to a court line loss classification technology. The method comprises the following steps: performing line loss calculation through the equivalent relationship between root-mean-square current and maximum current, comparing the electric energy loss generated by the maximum current flowing through the line with the electric energy loss generated by the actual load, achieving clustering analysis of the feeder line path of the court through a feeder line clustering method, and performing layer-by-layer resistance equivalence on the distribution line of the court with a complex structure through an equivalent resistance method to obtain a calculation model with a simple structure; obtaining an average load rate according to the calculation model; finding out an optimal cluster number through load rate feature sequence clustering; classifying the input vectors through self-organizing mapping; and providing line loss information for typical court classification of the clustering algorithm, and carrying out court line loss classification according to the line loss information.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +5

Method for mining unknown network protocol hidden behaviors through clustering instruction sequences

The invention discloses an instruction sequence cluster mining method for concealed behavior of an unknown network protocol, which mainly solves the problem that the existing protocol reverse analysis method only analyzes the format of the protocol message, but cannot analyze the protocol behavior, especially the hidden behavior. The implementation steps are: (1) divide and mark all the instructions of the protocol program into three types of genetic instructions; (2) cluster the instruction sequence; (3) calculate the protocol behavior; (4) find the comparison instructions before all potential hidden behaviors , extract the constants involved in the comparison, use these constants to replace the relevant fields in the protocol message, generate new messages with triggering capabilities, and use the new messages to trigger potential hidden behaviors; (5) Calculate the three types of genes between hidden behaviors and known behaviors The absolute difference RS of the instruction distribution rate, if RS>0.3, the protocol operation is not safe, and the protocol has malicious behavior; otherwise, the protocol operation is safe, and the mining is over. The invention improves the speed and accuracy of excavation, and can serve more users and wider application fields.
Owner:XIDIAN UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products