Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

202 results about "Value of information" patented technology

Value of information (VOI or VoI) is the amount a decision maker would be willing to pay for information prior to making a decision.

Methods and apparatus for predicting and selectively collecting preferences based on personality diagnosis

A new recommendation technique, referred to as "personality diagnosis", that can be seen as a hybrid between memory-based and model-based collaborative filtering techniques, is described. Using personality diagnosis, all data may be maintained throughout the processes, new data can be added incrementally, and predictions have meaningful probabilistic semantics. Each entity's (e.g., user's) reported attributes (e.g., item ratings or preferences) may be interpreted as a manifestation of their underlying personality type. Personality type may be encoded simply as a vector of the entity's (e.g., user's) "true" values (e.g., ratings) for attributes (e.g., items) in the database. It may be assumed that entities (e.g., users) report values (e.g., ratings) with a distributed (e.g., Gaussian) error. Given an active entity's (e.g., user's) known attribute values (e.g., item ratings), the probability that they have the same personality type as every other entity (e.g., user) may be determined. Then, the probability that they will have a given value (e.g., rating) for a valueless (e.g., unrated) attribute (e.g., item) may then be determined based on the entity's (e.g., user's) personality type. The probabilistic determinations may be used to determine expected value of information. Such an expected value of information could be used in at least two ways. First, an interactive recommender could use expected value of information to favorably order queries for attribute values (e.g., item ratings), thereby mollifying what could otherwise be a tedious and frustrating process. Second, expected value of information could be used to determine which entries of a database to prune or ignore-that is, which entries, which if removed, would have a minimal effect of the accuracy of recommendations.
Owner:MICROSOFT TECH LICENSING LLC

Augmented processing of information objects in a distributed messaging framework in a computer network

Augmenting processing of information objects transferred among processors within a network. Processing is performed by a process, or processor, (called a "robot") at any point in the network where an information object is transferred, or where the object resides. By allowing processing at source, destination and at "interim" points between the source and destination, the ability to add functionality, services, control and management of objects and object transfers is greatly enhanced. The robots, can reside at any point in the system. A robot can be local to an end-user's computer, can reside on a content source server, or can be on another computer, processor, storage location or device on the network. Any type of processing can be performed by the robots. For example, access rights can be maintained so that certain attributes and values of information objects are restricted on a per user, per machine, chronological or other basis. Robots can use conditions which, when satisfied by attribute/value pairs within a specific object, or conditions which are satisfied by other, external, conditions, trigger specific processing. The processing can include one or more objects, other information processing, software or hardware control functions, etc. Information can be appended to objects. Statistics on object use, publication, subscription or transfers can be compiled. Groups of robots can operate in cooperation. Robots can share information.
Owner:EPIPHANY INC

XPath query optimization method and system

ActiveCN102929996AEffective Structural Connection OrderOptimizing Query PlansSpecial data processing applicationsAlgorithmQuery optimization
The invention discloses an XPath query optimization method and system. The method comprises the following steps of: counting structural summary information of an extensive makeup language (XML) document through hierarchical encoding; counting value summary information by using a value-coding histogram and RPST, and performing an optimization algorithm for query optimization on an XPath expression by utilizing the statistical information, wherein the query optimization algorithm comprises the following steps of: 101-102, initializing a data structure and processing a single-step path; 103, judging whether a non-estimated path exists; 104, judging the path type; 105-109, estimating connection with lowest cost in all possible connection of a long path, and updating a cost matrix and a result set matrix by using corresponding data; 110-114, estimating an arrangement sequence with lowest path in a predicate path, updating a cost matrix and a result set matrix by using the corresponding data, and resorting the predicates according to an optimized sequence; and 115, reconstructing a query plan. According to the XPath query optimization method and system, the XPath query sentences can be effectively optimized, and the execution efficiency of the XPath query sentences is greatly improved.
Owner:SOUTH CHINA UNIV OF TECH

Intelligent transformer substation relay protection inspection system

The invention discloses an intelligent transformer substation relay protection inspection system. The system comprises a server connected to an intelligent transformer substation station control layer network. The server is used for executing a method comprising the following steps of reading and analyzing a SCD file and acquiring an IP address list of a full station spacing layer device; starting an IEC61850MMS client and successively establishing MMS communication with the spacing layer device in the full station according to the IP address list; traversing and taking a fixed value of the device in the station, remote metering and a log and carrying out determination, wherein the step includes taking a protection fixed value information list and a soft pressure plate remote communication information list and comparing to the information list input by a user; and outputting an inspection result, wherein the step includes whether an output relay protection fixed value and pressure plate information are normal. In the invention, relay protection fixed value checking is realized; checking efficiency of a relay protection equipment fixed value is increased; a problem of low efficiency is solved and inspection quality is greatly increased.
Owner:STATE GRID CORP OF CHINA +1

Method for realizing information transmission security based on digital envelope technology

The invention discloses a method for realizing information transmission security based on digital envelope technology. The method comprises the following steps: information plaintext of a user A is subjected to data encryption to output information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext and user A public key which are processed by the digitalenvelope technology and then transmitted to a user B through a network; the user B receives inputs encapsulated by the digital envelope technology: information ciphertext, symmetric algorithm key ciphertext, hash value ciphertext of information plaintext and user A public key, and performs decryption to output information plaintext and hash value of information plaintext sent from the user A; andthe received information plaintext is subjected to hash calculation to obtain a hash value, and two hash values are compared to determine whether the information transmission is successful. The invention adopts the digital envelope technology to solve key exchange, synchronization and management problems, in real-time transactions, a large amount of information is encrypted by symmetric algorithm, and only a small number of symmetric encryption algorithm keys are encrypted and decrypted by asymmetric algorithm for exchanging keys and verifying the authenticity of information, which improves the speed of information transmission and reduces the consumption of resources.
Owner:CHINA CONSTRUCTION BANK

Event information mining and warning method

ActiveCN103176981AGuaranteed continuous improvementGuaranteed to be perfectForecastingSpecial data processing applicationsClassified informationWeb site
The invention discloses an event information mining and warning method, and belongs to the technical field of information. The method comprises the following steps: step 1, an event information ontology is built, obtained internet information is filtered, and information corresponding to an event is obtained; step 2, classification is conducted to the filtered information basing on the instance name and attribute in the event information ontology; step 3, clustering is conducted to the classified information according to set features, invents contained in each type of information are obtained; step 4, event feature parameter values of information page number, page views, page forward number, information source area number, information source web site number and the like of each event are calculated at fixed period; and step 5, if a difference value between the feature parameter values of a certain event and the mean value of the period time before exceeds a pre-set threshold value, alarming is conducted to the event. The event information mining and warning method ensures accuracy and comprehensiveness of information discovery and alarming of food safety events, and improves the efficiency of alarming of food safety risks.
Owner:COMP NETWORK INFORMATION CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products