Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

176 results about "Stochastic algorithms" patented technology

Stochastic Algorithms are primarily global optimization algorithms. A stochastic process is one whose behavior is non-deterministic. The system’s subsequent state is determined both by the process’ predictable actions and by a random element.

Byzantine-fault-tolerant consensus method applied to block chain

The invention discloses a byzantine-fault-tolerant consensus method applied to a block chain. The method comprises the steps of specifying a certain number of right and interest accounts and initial consensus accounts in an initiated block of the block chain; after a consensus process is started, for the height h of a current block, selecting a consensus account to initiate a proposal of a new block according to a fixed random algorithm in a consensus account list; receiving the proposal and voting a block with the height of h by other consensus nodes; within a period of time, if the number of votes exceeds eta 1, representing that a consensus is formed, and starting the consensus of a block with the height of h+1 in the next round; if the number of votes does not exceed eta 1 but exceeds eta 2, representing that the consensus is possibly formed, broadcasting a voting request of the block in the previous round, and continuing to wait for a period of time; and if the number of votes does not exceed eta 2, cancelling the proposal in the round and re-performing the proposal of the new block. Therefore, computing resources can be saved; a large amount of blocks can be continuously generated; and computing power competition is avoided.
Owner:HANGZHOU YUNXIANG NETWORK TECH

System and method for designing effective business policies via business rules analysis

Methods and systems are provided for analyzing the business rules, business metrics, and decision parameters for a firm or organization, processing a subset of such data to form output, and offering access to selective views of such output including evaluation and comparative data regarding execution of such business rules, information on corresponding business metrics or sets of business metrics, information on corresponding decision parameters or sets of decision parameters or scenarios, and other useful analytic information which can help a firm or organization evaluate and modify business policies based on said rules, metrics, and parameters. In addition to said rules, metrics and/or parameters, the data for the business rule analysis can include conventional historical data or hypothetical data based on simulations which the current system and method provide based on prescribed random and non-random algorithms. The simulated or hypothetical data enables users to conduct rule analysis based on historical data, simulated data, or hybrid models. In this manner, the methods and systems described in this invention provide for both an evaluation of a firm's current policies as well as an evaluation of policy modifications not actually executed but for which hypothetical data can be provided and analyzed.
Owner:SAP AG

Internet of Things service low-delay load distribution method and device based on edge computing

The embodiment of the invention provides an Internet of Things service low-delay load distribution method and device based on edge computing. The Internet of Things service low-delay load distributionmethod comprises the steps: acquiring a task request of each application in each terminal and the computing capacity of each edge node; and inputting the task request of each application in each terminal and the computing capacity of each edge node into a preset optimization problem model, and outputting a resource allocation matrix and a task allocation matrix, wherein the preset optimization problem model comprises a particle swarm algorithm model improved through an ant colony algorithm and a semi-definite relaxation algorithm model improved through a Gaussian random algorithm. The Internet of Things service low-delay load distribution method and device based on edge computing improve particle swarm optimization by applying the ant colony algorithm, reduce the convergence time of the algorithm, improve the performance of the resource allocation result, solve the rank 1 constraint in the semi-definite relaxation problem by applying the Gaussian random variable, improve the performance of the task allocation result, and finally reduce the service delay.
Owner:BEIJING UNIV OF POSTS & TELECOMM +2

Stochastic method to determine, in silico, the drug like character of molecules

A stochastic algorithm has been developed for predicting the drug-likeness of molecules. It is based on optimization of ranges for a set of descriptors. Lipinski's “rule-of-5”, which takes into account molecular weight, logP, and the number of hydrogen bond donor and acceptor groups for determining bioavailability, was previously unable to distinguish between drugs and non-drugs with its original set of ranges. The present invention demonstrates the predictive power of the stochastic approach to differentiate between drugs and non-drugs using only the same four descriptors of Lipinski, but modifying their ranges. However, there are better sets of 4 descriptors to differentiate between drugs and non-drugs, as many other sets of descriptors were obtained by the stochastic algorithm with more predictive power to differentiate between databases (drugs and non-drugs). A set of optimized ranges constitutes a “filter”. In addition to the “best” filter, additional filters (composed of different sets of descriptors) are used that allow a new definition of “drug-like” character by combining them into a “drug like index” or DLI. In addition to producing a DLI (drug-like index), which permits discrimination between populations of drug-like and non-drug-like molecules, the present invention may be extended to be combined with other known drug screening or optimizing methods, including but not limited to, high-throughput screening, combinatorial chemistry, scaffold prioritization and docking.
Owner:YISSUM RES DEV CO OF THE HEBREWUNIVERSITY OF JERUSALEM LTD

Sensor-network-based low-energy-consumption ecological environment monitoring node deploying method

The invention discloses a sensor-network-based low-energy-consumption ecological environment monitoring node deploying method and relates to the Internet of Things. The method comprises the following steps: firstly determining factors to be monitored and key points with relative factors; building an optimal mathematic monitoring model according to the monitored factors and the key points; then solving the mathematic model and finding a key point with most attributes and taking the key point as a pre-selection point; invoking an attribute optimizing method for selecting the key points with all the attributes which are close to an attribute mean value if the number of the pre-selection points is greater than 1; invoking a crop growth factor weighing method for determining monitoring points if more than two pre-selection points exist after the treatment; randomly determining that the pre-selection points processed by the crop growth factor weighing method are taken as the monitoring points by using a random algorithm; finally processing a matrix T formed by the key points and the attributes by using a matrix optimizing method of the key points and the attributes to obtain the number of the final monitoring nodes and the distribution positions of the monitoring nodes.
Owner:XIAMEN UNIV

Consensus method of alliance block chain network

The invention discloses a consensus method of an alliance block chain network. The alliance block chain network is composed of peer nodes; a leader node is selected from the peer nodes; then the leader node selects 13 packers from the peer nodes; and one packer election chain records the election information of the packer. The leader node is selected from the peer nodes, and used for collecting the peer node information to build a peer information table, selecting the packers from the peer nodes in the block chain network by using a random algorithm, collecting and verifying transaction information sent by a client, adding transactions passing the verification into a transaction pool, sending transaction data to the packer nodes after the untreated transactions in the transaction pool reach a certain amount, and deleting the transactions from the transaction pool after the transaction information is successfully added into the block chain. The packers are selected by the leader from the peer information table by using a random number matching method, for receiving and verifying the transactions sent by the leader, and packaging the transactions passing the verification into a block. The invention is the consensus method that is random, fair, flexible, reliable and capable of tolerating Byzantium errors.
Owner:崔晓晖

Load balancing method and system for cluster

The invention discloses a load balancing method and system for a cluster. The method comprises the following steps: updating the load information of each node in the cluster at a preset interval, and selecting a scheduling set including a plurality of light load nodes in a current period; resolving an access request, and determining that the access request is a dynamic request or a static request; if the access request is the dynamic request, selecting a node from the scheduling set of the period in which the access request is positioned through a random algorithm for serving as a processing node of the access request; and if the access request is the static request, inquiring a URL (Uniform Resource Locator) mapping table, taking a node corresponding to the mapping record of a URL corresponding to the access request as the processing node of the access request if the mapping record exists in the URL mapping table, and selecting a node through a random algorithm if the mapping record of the URL corresponding to the access request does not exist in the URL mapping table for serving as the processing node of the access request. Through adoption of the load balancing method and system, load balancing is ensured. Meanwhile, the load of the cluster is adjusted periodically, so that node overload is prevented.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Finite element modeling method of random microstructure of heterogeneous material

The invention provides a finite element modeling method of a random microstructure of a heterogeneous material, and particularly relates to a method of establishing a finite element network model of the random microstructure of the heterogeneous material based on microstructure probability distribution information and a random algorithm. The method comprises the following steps of: determining a microstructure probability distribution function by using a real or dummy heterogeneous material component phase physical distribution form; converting a probability distribution function into a discrete space of the model on the basis of establishing the finite element network topological model of the material; and determining material attributes of each unit in the definite element model by using random real numbers generated by a pseudo random number generator and consistently distributed in an interval [0, 1], thereby establishing the random microstructure model of the heterogeneous material. The method is suitable for the heterogeneous materials in different modes; the established definite network model can be directly used for analyzing relation among microscopic property, microscopic structure, macroscopic performance of the heterogeneous material; and basis is provided for development and preparation of a new material.
Owner:XI AN JIAOTONG UNIV

Mass transmission method and device based on elliptic curve

ActiveCN112055021ATransmission Content Length ExtensionMeet the needs of actual scenariosKey distribution for secure communicationPublic key for secure communicationAlgorithmCiphertext
The invention relates to a mass transmission method and device based on an elliptic curve, and the method comprises the steps that S1, a receiver generates a private key d through employing a random algorithm, and generates a public key Q based on an SM2 elliptic curve; S2, a sender constructs multiple pieces of selection information, each piece of selection information comprises an identifier andinformation content, and only an identifier list of the multiple pieces of selection information is sent to the receiver; S3, the receiver selects an identifier from the identifier list, gives an identifier value to the selected identifier, encrypts the selected identifier and the identifier value by using an elliptic curve algorithm to generate an encryption parameter, and sends the encryption parameter to the sender; S4, the sender encrypts all the selection information by using the encryption parameter and the public key Q, and sends the encrypted ciphertext to the receiver; and S5, the receiver decrypts the ciphertext transmitted by the sender by using an elliptic curve algorithm to obtain the information content corresponding to the selected identifier. According to the method, the problems of privacy data protection and the like involved in a blockchain project scene can be solved.
Owner:梧桐链数字科技研究院(苏州)有限公司

Node transmission sequence optimization competitive channel underwater acoustic network parallel communication method

ActiveCN106656356AOptimize sending orderOptimize sending timeError prevention/detection by using return channelStochastic algorithmsConflict free
The invention discloses a node transmission sequence optimization competitive channel underwater acoustic network parallel communication method. According to the invention, each source node uses the same non-random algorithm to calculate the sequence and time of data transmission of the node in the transmission cycle; data are transmitted to a corresponding destination node after timing is up to the time; after the data of all source nodes are transmitted, each destination node uses the same non-random algorithm to calculate the sequence and time of ACK or NACK signaling transmission of the node in this transmission cycle; and after timing is up to the time, the destination node with correct received data transmits ACK signaling to the corresponding source node, and the destination node with wrong received data transmits NACK signaling to the corresponding source node. According to the method, the time required for one transmission cycle is effectively reduced and the channel utilization efficiency is improved under the premise of conflict-free parallel node data transmission. The method can be widely used in various underwater acoustic communication networks based on competition agreement, an underwater acoustic sensor network and other occasions.
Owner:SOUTH CHINA UNIV OF TECH

Vehicle stability evaluation method based on stochastic time delay

ActiveCN109131351AThe data transfer process is close to realitySimulator controlControl devicesCyclic processTime delays
The invention relates to a vehicle stability evaluation method based on stochastic time delay, belonging to the control technical field. The purpose of the invention is to apply a stochastic algorithmto select a stochastic time delay parameter to simulate the lag phenomenon occurring in the actual vehicle running process, and to judge the vehicle running stability under a fixed working conditionbased on a stochastic time delay vehicle stability evaluation method. The method comprises the following steps: a random algorithm selects a random time delay, a one-dimensional random number algorithm, two uniformly distributed random number generators are combined to obtain two-dimensional random vectors which are subject to two-dimensional uniform distribution, three-dimensional random vectorsobtained by the same principle are subject to three-dimensional uniform distribution, and the three-dimensional random number is normalized and scaled. As that random algorithm is added in the invention, a large number of experiment are not required to be repeated independently, and the comparison is recorded, the method can automatically enter a circulating process, and the delay parameters are randomly selected, so that the data transmission process is closer to reality, the simulation is more realistic, the results are recorded in the circulating process, and the time and labor are saved.
Owner:JILIN UNIV

Underwater acoustic network communication method for joint optimization of node sending time and power

The invention discloses an underwater acoustic network communication method for joint optimization of node sending time and power. The method comprises the following steps: when a channel is idle and at least one node needs to transmit the data, the network enters a handshake phase; each source node adopts the same non-random algorithm to calculate the connection relation of each node of the network when all the source nodes transmit the data at the minimum transmitting power that is required for successfully transmitting the data to the corresponding destination node, divides the whole network to sub-networks which are not communicated with each other, calculates the time that the node can transmit the data to the corresponding destination node without conflicts in the local sub-network, and transmits the data to the corresponding destination node at the minimum transmitting power after timing to the moment; and when all the source nodes complete the data transmission, the network enters an end phase. According to the underwater acoustic network communication method disclosed by the invention, the fully-communicated network is converted to multiple sub-networks which are not communicated with each other during the data transmission phase, the time required for a transmission cycle can be effectively reduced, the utilization efficiency of the channel can be increased, and the energy consumption can be reduced.
Owner:SOUTH CHINA UNIV OF TECH

Method and a system for generating character adversarial verification code based on frequency domain noise addition

The invention discloses a method for generating a character adversarial verification code based on frequency domain noise addition. The method comprises the following steps of generating a string of character sequences by a random algorithm, and respectively converting characters in the character sequences into a character image containing the single corresponding character in sequence; convertingthe character image from a spatial domain to a frequency domain, adding adversarial noise to the character image of the frequency domain according to an adversarial learning method, and converting the character image added with the adversarial noise of the frequency domain from the frequency domain to the spatial domain; and splicing the character images added with the adversarial noise togetheraccording to the sequence of verification code answers in order to form the character adversarial verification code. The invention further discloses a system for generating the character adversarial verification code based on the frequency domain noise addition. On the basis of the adversarial learning method, the adversarial noise is added to the character images at the frequency domain, and thegenerated character adversarial verification code can effectively avoid or reduce the image preprocessing adopted by an attacker, so that the safety of the character verification code is improved.
Owner:ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products