Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

510 results about "Support vector machine algorithm" patented technology

The support vector machine is an algorithm that is primarily focused on detecting and analyzing relationships. This machine learning algorithm works by analyzing data sets through a series of variables. The way that the data respond to the variables can be mapped out.

Method for controlling electric automobile stability direct yawing moment based on high-order slip mold

The invention provides a method for controlling the electric automobile stability direct yawing moment based on a high-order slip mold and relates to the field of control over electric automobile stability. The method includes the steps that the rotation angle of a steering wheel and the longitudinal automobile speed are detected through a signal acquisition and conditioning circuit, so that the ideal yawing angular speed value is obtained; according to the detected yawing accelerated speed at the current moment of an automobile and the actual yawing angular speed, the side slip angle estimated value is obtained through a robust slip mold observer based on active control and self-adaptive estimation; two parameters of the difference of the yawing angular speed and the ideal yawing angular speed and the actual slide slip angle of the automobile serve as input variables, a high-order slip mold control strategy is adopted, and the direct yawing moment meeting the requirement for automobile stability is obtained; and finally, the automobile stability margin serves as an objective function and a constraint condition, and a support vector machine algorithm is used for distributing drive force or brake force. By the adoption of the method, the finite time constriction of an automobile stability direct yawing moment control system is achieved, and the travel stability of the automobile under the limit conditions of the high speed, the severe road and the like is improved.
Owner:BAISHAN POWER SUPPLY COMPANY OF STATE GRID JILIN ELECTRONICS POWER COMPANY

Modeling method for compact sandstone reservoir three-dimensional fracability model

ActiveCN105134156AImproving the effectiveness of volumetric fracturingShorter payback timeFluid removalSpecial data processing applicationsModel methodWell placement
The invention relates to a modeling method for a compact sandstone reservoir three-dimensional fracability model. The method comprises the following steps: S1, establishing a relation formula among an internal friction angle, I type and II type crack fracture toughness and the parameter of sandstone mechanical characteristics; S2, establishing a shale fracability evaluation model which comprehensively considers an elastic parameter, the internal friction angle, the critical strain energy release rate and fracture toughness; S3, adopting a support vector machine algorithm to obtain a cluster analysis mode between the reservoir fracability and the elastic parameter; S4, adopting the cluster analysis mode to obtain a reservoir three-dimensional elastic parameter data body, and establishing the multi-scale compact sandstone reservoir three-dimensional fracability evaluation model based on the core, the borehole and the reservoir of multiple scales. According to the method, the fracability of an arbitrary space position in the compact sandstone reservoir can be obtained, a sweet spot with high fracability can always be drilled when drilling a compact sandstone gas well, blindness of well location selection is avoided, and the fracture modification effect and the yield after fracture are improved.
Owner:SOUTHWEST PETROLEUM UNIV

Human movement identification method through fusion of deep neural network model and binary system Hash

The present invention provides a human movement identification method through fusion of a deep neural network model and binary system Hash, belonging to the technical field of mode identification. Themethod comprises the steps of: performing preprocessing of a movement identification database, dividing the movement identification database into frame sequences, calculating an optical flow graph, employing an attitude estimation algorithm to calculate coordinates of human joint points, and employing result coordinates to extract video area frames; employing a pre-training VGC-16 network model to extract FC (Full-Convolutional) features of RGB flows and optical flows of the videos, selecting key frames from the video frame sequences, and obtaining a difference of the FC features corresponding to the key frames; performing binary processing of the difference; employing a binary-hashing method to obtain uniform feature expression of each video; employing a plurality of normalization methods such as L1 and L2 to obtain feature expressions of the videos after the fusion of the uniform feature expressions and the PCNN features; and finally, employing a support vector machine algorithm totrain a classifiers to identify the human movement videos. The human movement identification method through fusion of the deep neural network model and the binary system Hash has a high movement identification correct rate.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Incremental learning-fused support vector machine multi-class classification method

The invention relates to an incremental learning-fused support vector machine multi-class classification method, and aims to reduce sample training time and improve classification precision and anti-interference performance of a classifier. The technical scheme comprises the following steps of: 1, extracting partial samples from total samples at random to serve as a training sample set D, and using the other part of samples as a testing sample set T; 2, pre-extracting support vectors from the training sample set D; 3, performing support vector machine training on a pre-extracted training sample set PTS by using a cyclic iterative method so as to obtain a multi-class classification model M-SVM; 4, performing binary tree processing on the multi-class classification model M-SVM to obtain a support vector machine multi-class classification model BTMSVM0; 5, performing incremental learning training on the multi-class classification model BTMSVM0 to obtain a model BTMSVM1; and 6, inputting the testing sample set T in the step 1 into the multi-class classification model BTMSVM1 for classification. The incremental learning-fused support vector machine multi-class classification method is used for performing high-efficiency multi-class classification on massive information through incremental learning.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Binary tree-based SVM (support vector machine) classification method

The invention discloses a binary tree-based SVM (support vector machine) classification method. The binary tree-based SVM classification method comprises the following steps: 1, acquiring signals, namely detecting working state information of an object to be detected in N different working states through a state information detection unit, synchronously transmitting the detected signals to a data processor, and acquiring N groups of working state detection information which corresponds to the N different working states; 2, extracting characteristics; 3, acquiring training samples, namely randomly extracting m detections signals to form training sample sets respectively from the N groups of working state detection information which are subjected to the characteristic extraction; 4, determining classification priority; 5, establishing a plurality of classification models; 6 training a plurality of classification models; and 7, acquiring signals in real time and synchronously classifying. The binary tree-based SVM classification method is reasonable in design, easy to operate, convenient to implement, good in use effect and high in practical value; and optimal parameters of an SVM classifier can be chosen, influence on the classification due to noises and isolated points can be reduced, and classification speed and precision are improved.
Owner:XIAN UNIV OF SCI & TECH

Modeling method and modeling device for language identification

The embodiment of the invention provides a modeling method for language identification, which comprises the following steps of: inputting voice data, preprocessing the voice data to obtain a characteristic sequence, mapping a characteristic vector to form a super vector, performing projection compensation on the super vector, and establishing a training language model through an algorithm of a support vector machine; and adopting the steps to obtain a super vector to be measured of the voice to be measured, performing the projection compensation on the super vector to be measured, grading the super vector to be measured by utilizing the language model, and identifying language types of the voice to be measured. The embodiment of the invention also provides a modeling device for the language identification, which comprises a voice preprocessing module, a characteristic extraction module, a multi-coordinate system origin selection module, a characteristic vector mapping module, a subspace extraction module, a subspace projection compensation module, a training module and an identification module. According to the method and the device which are provided by the embodiment of the invention, information which is invalid to the identification in high-dimension statistics is removed, the correction rate of the language identification is improved, and the computational complexity on an integrated circuit is reduced.
Owner:TSINGHUA UNIV

Infrared-based night intelligent vehicle front pedestrian detection method

The invention provides an infrared-based night intelligent vehicle front pedestrian detection method. The method comprises the following steps that de-noising preprocessing is performed on input infrared image sequences by utilizing a smoothing filtering method and a morphological processing technology; pedestrian preselection areas in the input image sequences are captured by a vertical projection method based on pixel gradients, and areas of interest are extracted from the pedestrian preselection areas according to pedestrian geometric features; infrared image multistage binary mode feature description areas of interest are extracted; a pedestrian classifier model is offline trained by utilizing a support vector machine algorithm; and the areas of interest are judged to be target pedestrians or backgrounds online by utilizing the classifier model. Compared with methods in the prior art, robustness of the pedestrian classifier is effectively improved by the method so that the method can detect vertical pedestrians in the still, walking or running and other movement modes and the method is also suitable for detecting human bodies riding bicycles or motorcycles, and a system realized based on the method can be applied to barrier detection for an unmanned intelligent vehicle and a wheeled robot, etc.
Owner:BEIJING UNION UNIVERSITY

Face recognition method for identifying counterfeit photo deception

InactiveCN106650669ANot vulnerable to targeted attacksImprove robustnessSpoof detectionColor imageMirror reflection
The invention discloses a face recognition method for identifying counterfeit photo deception, and belongs to the field of digital image processing and pattern recognition. The recognition method identifies the face counterfeit photo deception by analyzing an imaging difference between real and fake face images, and adopting image color distribution, reflectance ratio and ambiguity features. The method comprises the following steps: firstly, converting a color image to an HSV color space and then extracting color distribution characteristics; secondly, converting the color image to a YUV color space image, and then extracting mirror reflection characteristics; thirdly, using a gray-level co-occurrence matrix to extract ambiguity characteristics; and finally, combining the color distribution characteristics, the mirror reflection characteristics and the ambiguity characteristics as discrimination information of true and false face images, and using a support vector machine algorithm to classify and obtain the judgment of the true and false face images. The face recognition method for identifying the counterfeit photo deception provided by the invention can used as an independent module and integrated into the existing face recognition algorithm, so as to improve the security and reliability of a face recognition system.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method for automatically establishing back-of-book indexes of book based on book contents

The invention discloses a method for automatically establishing back-of-book indexes of a book based on book contents. The method comprises the following steps: first, analyzing text in a digital book; taking a chapter as a unit, and performing part-of-speech tagging on the text by using a natural language processing tool to obtain a part-of-speech array; matching by utilizing a high-frequency part-of-speech rule, and extracting candidate phrases; then, classifying to obtain the phrases to serve as candidate index terms by using a support vector machine algorithm by utilizing semantic and grammatical characteristics; calculating the similarity between the candidate index terms and the field corresponding to the book to serve as termhood; calculating information amounts, term frequency, point mutual information and encyclopedia key values to obtain an index degree; calculating a title offset distance, a candidate index term proportion and interestingness to obtain a context weight value; finally, combining the termhood, the indexing degree and the context weight value to obtain an index score, and obtaining the book index terms through limited sequencing. According to the method, the indexes can be added to the book which does not have the back-of-book terms, and the readability and the searchability of the book are improved.
Owner:ZHEJIANG UNIV

Self-adaptive trojan communication behavior detection method on basis of dynamic feedback

ActiveCN103532949AEliminate redundancyReduce false positive informationTransmissionRelevant informationSimilarity analysis
The invention discloses a self-adaptive trojan communication behavior detection method on the basis of dynamic feedback, which comprises the steps of processing trojan detection alarm information, constructing a sample set for dynamic feedback learning by utilizing the alarm information, and determining updating opportunity of detection by detecting concept drift of a data stream, wherein the step of processing the trojan detection alarm information comprises the sub-steps of carrying out merging and association processing on the alarm information which is subjected to standard description, then establishing an intrusion track event and storing the intrusion track event into an intrusion event table. According to the invention, aiming at the problem of self-adaption of information stealing trojan detection, the information stealing trojan detection alarm information is analyzed, methods of similarity analysis, clustering analysis and the like are combined, related information of a target IP (Internet Protocol) is acquired additionally by driving detection, the sample set for dynamic feedback learning is constructed by the alarm information, an increment support vector machine algorithm is used as an algorithm for dynamic feedback learning, and the updating opportunity of a detection system is determined by detecting the concept drift of the data stream.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Dynamic behavior analysis method for mobile intelligent terminal software based on support vector machine algorithm

The invention discloses a dynamic behavior analysis method for mobile intelligent terminal software based on a support vector machine (SVM) algorithm. The method comprises the steps: the first step, capturing application program interface (API) function called in the software running by the terminal execution software; the second step, analyzing the NativeAPI calling sequence related to five sensitive behaviors, wherein five sensitive behaviors are the privilege behavior, progress behavior, document behavior, network behavior and terminal memory operation behavior, and calculating the calling frequency of the NativeAPI function related to five sensitive behaviors; the third step, using the calling frequency as the dynamic behavior characteristic of the software, sending to the cloud end, modeling by using the SVM algorithm and training the classifier, and finally detecting the malignant software behavior by using the trained classifier. The method uses the dynamic detection technology and cannot be affected by the deformation and packing encryption technology, and the method is capable of analyzing and detecting the self-modifying program, making up the lack that the static behavior cannot detect the variety behavior, and effectively detecting the vicious software behavior.
Owner:CHANGSHU RES INSTITUE OF NANJING UNIV OF SCI & TECH

Analytical method of multi-source spectrum fusion water quality

The invention discloses an analytical method of multi-source spectrum fusion water quality. The method takes an ultraviolet/visible absorption spectrum signal and a multi-dimensional fluorescence emission spectrum signal of a water sample to be tested as input, and respectively adopts independent component pretreatment method to extract characteristic signals, remove interference information and obtain characteristic signals of the spectrums. According to the contribution of the characteristic signals of the spectrums to a water quality analyzing model, and aiming at avoiding information hiding, the combined characteristic signal number of the two types of spectrums is determined, the characteristic signals are combined into a spectrum characteristic signal federated data set, and the optimal spectrum configuration combination is solved. Based on an improved support vector machine algorithm, a Boosting method is adopted for modeling, and the optimal spectrum fusion water quality analyzing model is obtained by combining a plurality of modeling results. Based on the spectrum characteristic signal federated data set, the computation model is adopted to compute the comprehensive organic substance pollution index value of the water sample to be tested. The method has the remarkable advantages of high analyzing accuracy, high analysis speed, no pollution of chemical agent, simple operation and maintenance and the like.
Owner:ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products