Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

136 results about "Treatment error" patented technology

Error treatment (linguistics) In second language acquisition, error treatment refers to the way teachers respond to learners' linguistic errors made in the course of learning a second language. Many error treatment studies seek to address issues like when, how, and by whom such errors should be corrected.

Noise-enhanced convolutional neural networks

A learning computer system may include a data processing system and a hardware processor and may estimate parameters and states of a stochastic or uncertain system. The system may receive data from a user or other source; process the received data through layers of processing units, thereby generating processed data; apply masks or filters to the processed data using convolutional processing; process the masked or filtered data to produce one or more intermediate and output signals; compare the output signals with reference signals to generate error signals; send and process the error signals back through the layers of processing units; generate random, chaotic, fuzzy, or other numerical perturbations of the received data, the processed data, or the output signals; estimate the parameters and states of the stochastic or uncertain system using the received data, the numerical perturbations, and previous parameters and states of the stochastic or uncertain system; determine whether the generated numerical perturbations satisfy a condition; and, if the numerical perturbations satisfy the condition, inject the numerical perturbations into the estimated parameters or states, the received data, the processed data, the masked or filtered data, or the processing units.
Owner:UNIV OF SOUTHERN CALIFORNIA

Website security monitoring and alarming system based on log analysis and firewall security matrixes

The invention relates to a website security monitoring and alarming system based on log analysis and firewall security matrixes. The website security monitoring and alarming system aims at finding and stopping various security attacks on the website in time and is based on two work items which a website security administrator mostly depends on during actual security operation and maintenance. Log monitoring is characterized in that the known and unknown attacks are automatically found by conducting keyword/regular expression filtering on access of Apache/Tomcat/IIS or error logs or other environment logs, and meanwhile service processing errors caused by the hacker attacks in the early period are found in time through log customization in website service codes. The website security monitoring and alarming system is characterized in that the firewall security matrixes are defined, then the effectiveness of the firewall security matrixes is verified with the direct or indirect network connectivity detecting technology, and alarming is triggered once the firewall security matrixes are damaged. The website security monitoring and alarming system provides a simple and effective customization mode for the administrator, and sensing capacity for any attack or any suspicious action can be continuously improved.
Owner:朱烨 +1

Intelligent self-healing monitoring method of extra high voltage power network

ActiveCN101944777ASecurity and Stability Additional ControlSolve self-healing problemsCircuit arrangementsSelf-healingFault coverage
The invention discloses an intelligent self-healing monitoring method of extra high voltage power network, belonging to the field of electric transformer and distribution. The invention uses the self-healing monitoring method that the power network control center collects the fault information, estimates the fault point according to the action information, judges the fault point according to the visualization technology, and starts the automatic recovery project. The method solves the self-healing problem of extra high voltage power network, performs the prevention and correction control, andmakes the dispose strategy based on the information quickly, thereby avoiding the cascade trip caused by load transfer, realizing the safe and stable addition control of the power network from the entire network perspective, and replenishing the disadvantages of area and in situ emergency control measure. Aiming at the specific characteristics in the aspects of running, dispatching and managing of the extra high voltage power network, the method can collect and use the information more comprehensive, and make the dispose strategy quickly to earn the time for the avoiding of cascade trip caused by load transfer, thereby avoiding the further enlargement of fault coverage due to wrong dispose, and solving the self-healing problem of the extra high voltage power network.
Owner:SHANGHAI MUNICIPAL ELECTRIC POWER CO +1

Semi-transparent time division multiplexer/demultiplexer

A semi-transparent time division multiplexer/demultiplexer that transmits low rate tributaries from one location to another using a high rate aggregate connection, while preserving substantially all of the TOH and payload for each tributary signal. Transparency of the tributary TOH is accomplished by interleaving both the TOH and the Payload of each tributary into the high rate aggregate signal. Some TOH bytes may be tunneled or re-mapped into unused/undefined TOH locations in the aggregate signal to allow transparency of the TOH without corrupting the aggregate. Errors may be handled by tunneling BIP bytes into unused/undefined aggregate locations and updating the tunneled bytes with error masks calculated at each network elements. Alternatively errors may be forwarded by using an error mask generated from the tributary BIP locations and inserting the mask into the associated aggregate BIP locations. The mask in the aggregate BIP is updated with error masks calculated at each network elements. Re-timing of TOH to a synchronized clock in the tributary framer circuits can be accomplished using controlled slips of overhead frames, whereby an entire frame is dropped or added depending on the relationship of the received clock and the synchronized clock. DCC bytes may be re-timed by adding or deleting flag bytes occurring between respective DCC packets. Re-timing of the aggregate TOH to a transmit clock may be accomplished in a similar manner.
Owner:CIENA

Handling of errors in a data processing apparatus having a cache storage and a replicated address storage

A data processing apparatus and method are provided for handling errors. The data processing apparatus comprises processing circuitry for performing data processing operations, a cache storage having a plurality of cache records for storing data values for access by the processing circuitry when performing the data processing operations, and a replicated address storage having a plurality of entries, each entry having a predetermined associated cache record within the cache storage and being arranged to replicate the address indication stored in the associated cache record. On detecting a cache record error when accessing a cache record of the cache storage, a record of a cache location avoid storage is allocated to store a cache record identifier for the accessed cache record. On detection of an entry error when accessing an entry of the replicated address storage, use of the address indication currently stored in that accessed entry of the replicated address storage is prevented, and a command is issued to the cache location avoid storage. In response to the command, a record of the cache location avoid storage is allocated to store the cache record identifier for the cache record of the cache storage associated with the accessed entry of the replicated address storage. Any cache record whose cache record identifier is stored in the cache location avoid storage is logically excluded from the plurality of cache records of the cache storage for the purposes of subsequent operation of the cache storage. Such an approach enables errors to be correctly handled, prevents errors from spreading in a system, and minimises communication necessary on detection of an error in a data processing apparatus having both a cache storage and a replicated address storage.
Owner:ARM LTD

Exception prompting method, device and system for big data product, equipment and medium

The invention relates to the technical field of big data of financial science and technology, and discloses an exception prompting method for a big data product, which comprises the following steps of: when it is detected that the big data product is exceptional, obtaining error information corresponding to the exception; calling an error code client SDK, and requesting an exception and error codemapping relation table corresponding to the big data product from an error code server through the error code client SDK; when the exception and error code mapping relation table is requested successfully, instantiating an error code processor through an error code client SDK according to the exception and error code mapping relation table; and processing the error information through an error code processor to obtain an error code and an error description matched with the error information, and outputting the error code and the error description. The invention further discloses an exceptionprompting device, system and equipment for the big data product and a medium. Error information of big data products is converted into error codes and error descriptions, so that operation and maintenance personnel can check the error codes and the error descriptions conveniently, and the efficiency is improved.
Owner:WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products