Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

3184results about How to "Reduce redundancy" patented technology

Method and apparatus for storing data with reduced redundancy using data clusters

Method and apparatus for storing data in a reduced redundancy form. Binary Large Objects (BLOBs) are partitioned into subblocks according to a partitioning method, and the subblocks are stored in subblock clusters. Each BLOB is represented as a list of spans of subblocks which identifies a contiguous sequence of subblocks within a cluster. Storage redundancy can be reduced because the spans of two different BLOBs can refer to the same subblocks. An index may be used to map subblock hashes to subblock cluster numbers.
Owner:QUANTUM CORP

Modular system having expandable form factor

A modular system of devices, in which a (master) device can be combined with one or more of other (slave) devices to transform to functional electronic devices having expanded functionalities and features in different form factors and / or platforms. The master device is docked to the slave device via a data / electrical interface, to transform the master device to the larger form factor of the slave device, with the master device maintaining control of the slave device, substantially based on the operating system installed in the master device, with access to the data, application programs, functionalities and features embodied in the master device. An intermediate removable physical interface adaptor (or docking adaptor) is provided to facilitate docking compatibility of the master device to the slave device. An enhanced charging and power management scheme is provided to optimize power management for the master device and the slave device.
Owner:COMPAL ELECTRONICS INC

Systems and methods for risk stratification of patient populations

A statistical processing system includes a server operably configured with program instructions implementing a plurality of statistical models to at least one of (a) predict a health outcome based on questionnaire responses, (b) assist a patient's choice of therapeutic modality based on questionnaire responses, and (c) assess a health risk or status based on questionnaire responses. Also provided is a research agency communicating with the server and contracted to provide the statistical models using a visual interface communicated by the server. The server is configured to analyze requests received from users relating to a plurality of said statistical models to reduce redundancy in requests for patient data.
Owner:TERUMO MEDICAL CORP

Test summarization using relevance measures and latent semantic analysis

Text summarizers using relevance measurement technologies and latent semantic analysis techniques provide accurate and useful summarization of the contents of text documents. Generic text summaries may be produced by ranking and extracting sentences from original documents; broad coverage of document content and decreased redundancy may simultaneously be achieved by constructing summaries from sentences that are highly ranked and different from each other. In one embodiment, conventional Information Retrieval (IR) technologies may be applied in a unique way to perform the summarization; relevance measurement, sentence selection, and term elimination may be repeated in successive iterations. In another embodiment, a singular value decomposition technique may be applied to a terms-by-sentences matrix such that all the sentences from the document may be projected into the singular vector space; a text summarizer may then select sentences having the largest index values with the most important singular vectors as part of the text summary.
Owner:NEC CORP

System and method for automatically analyzing, detecting and classifying malicious program behavior

ActiveCN102930210ACause damageOvercome shortcomings such as inability to perform adequatelyPlatform integrity maintainanceSpecial data processing applicationsDomain nameNetwork behavior
The invention discloses a system and a method for automatically analyzing, detecting and classifying a malicious program behavior. The system comprises a static analysis module, a sandbox dispatching management module, a sandbox monitoring module, a behavior abstraction module and a detection and classification module. Compared with the prior art, the system has the advantages that 1, the system is based on a behavior monitoring technology in an instruction set simulation environment; and 2, a virtual Internet is established in a sandbox through means of environment configuration, server program modification and the like, and a common network service is simulated, so that operations such as domain name server (DNS) resolution, http access, file download, Email login and mailing initiated by a malicious program can be successfully executed, the malicious program is inveigled to generate a malicious network behavior, the network behaviors are prevented from damaging a host machine and a real network, and the defects that the malicious program network behavior cannot be fully expressed during dynamic behavior analysis of a malicious program and the like are overcome.
Owner:JIANGSU JINLING TECH GRP CORP

Intelligence engine

One aspect of the invention is an intelligence engine. The intelligence engine includes a distributor layer operable to communicate with at least one call agent in a telecommunications network. The call agent may receive state-driven information associated with a call between an originator and a termination point. The intelligence engine also includes a telephony management layer. The telephony management layer is operable to receive a plurality of stateless requests from the distributor layer, access a database entry associated with the requests, spawn at least one request to obtain information associated with the originator and the termination point if necessary to route the call, and send the information to the call agent to route the call. In a particular embodiment, the intelligence engine further includes a facility management command and control layer. The facility management command and control layer is operable to receive an indicator signal associated with the call from the network. The call is controlled by the call agent. The facility management command and control layer is also operable to access a database entry associated with the call agent in response to the indicator signal and to reassign control of the call from the call agent to a second call agent.
Owner:RIBBON COMM OPERATING CO INC

Frame format for random access response of wireless communication transmission

A frame format for random access response of wireless communication transmission is provided. The frame format comprises a header segment and a variable length data segment. The header segment includes one or more random access response subheader and 0 to N load control subheader. The variable length data segment including one or more random access response data payload corresponding to the one or more random access response subheader. The one or more random access response subheader includes a status indication field to represent a last random access response subheader, a load control subheader, a random access response data payload with a T-CRNTI field, or a random access response data payload without a T-CRNTI field.
Owner:SUNPLUS MMOBILE

Medical image segmentation method of residual full convolutional neural network based on attention mechanism

ActiveCN110189334ASolve the problem of lack of spatial features of imagesReduce redundancyImage enhancementImage analysisImage segmentationImaging Feature
The invention provides a medical image segmentation method of a residual full convolutional neural network based on an attention mechanism. The medical image segmentation method comprises the steps: preprocessing a to-be-segmented medical image; constructing a residual full convolutional neural network based on the attention mechanism, wherein the residual full convolutional neural network comprises a feature map contraction network, an attention network and a feature map expansion network group; inputting the training set data into a residual error type full convolutional neural network for training to obtain a learned convolutional neural network model; and inputting the test set data into the learned convolutional neural network model, and performing image segmentation to obtain segmented images. According to the medical image segmentation method, an attention network is utilized to effectively transmit image features extracted from a feature map contraction network to a feature mapexpansion network; and the problem of lack of image spatial features in an image deconvolution process is solved while the attention network can also inhibit image regions irrelevant to a segmentation target in a low-layer feature image, so that the redundancy of the image is reduced, and meanwhile, the accuracy of image segmentation is also improved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Method of isomorphic singular manifold projection still/video imagery compression

Methods and apparatuses for still image compression, video compression and automatic target recognition are disclosed. The method of still image compression uses isomorphic singular manifold projection whereby surfaces of objects having singular manifold representations are represented by best match canonical polynomials to arrive at a model representation. The model representation is compared with the original representation to arrive at a difference. If the difference exceeds a predetermined threshold, the difference data are saved and compressed using standard lossy compression. The coefficients from the best match polynomial together with the difference data, if any, are then compressed using lossless compression. The method of motion estimation for enhanced video compression sends I frames on an "as-needed" basis, based on comparing the error between segments of a current frame and a predicted frame. If the error exceeds a predetermined threshold, which can be based on program content, the next frame sent will be an I frame. The method of automatic target recognition (ATR) including tracking, zooming, and image enhancement, uses isomorphic singular manifold projection to separate texture and sculpture portions of an image. Soft ATR is then used on the sculptured portion and hard ATR is used on the texture portion.
Owner:PHYSICAL OPTICS CORP

Event atlas construction system and method based on multi-dimensional feature fusion and dependency syntax

ActiveCN111581396AOvercoming the defects of the impact of the buildImprove the extraction effectSemantic analysisNeural architecturesEvent graphEngineering
The invention discloses an event atlas construction system and method based on multi-dimensional feature fusion and dependency syntax. The event graph construction method based on multi-dimensional feature fusion and dependency syntax is realized through joint learning of event extraction, event correction and alignment based on multi-dimensional feature fusion, relationship extraction based on enhanced structured events, causal relationship extraction based on dependency syntax and graph attention network and an event graph generation module. According to the event graph construction method and device, the event graph is constructed through the quintuple information of the enhanced structured events and the relations between the events in four dimensions, and the defects that in the priorart, event representation is simple and depends on an NLP tool, the event relation is single, and the influence of the relations between the events on event graph construction is not considered at the same time are overcome. According to the event atlas construction method provided by the invention, the relationships among the events in four dimensions can be randomly combined according to different downstream tasks, and the structural characteristics of the event atlas are learned to be associated with potential knowledge, so that downstream application is assisted.
Owner:XI AN JIAOTONG UNIV

Data disaster tolerance system suitable for WAN

InactiveCN101316274ATo achieve the purpose of disaster recoveryReduce data volumeTransmissionRedundant operation error correctionComputer moduleGeolocation
The invention discloses a data disaster tolerant system which is applicable to a wide area network, pertains to the technical filed of computer information storage and solves the problem that the current data disaster tolerant system does not take the effect of data transmission links and the need of lots of redundant data storage space in the wide area network into consideration. The system of the invention comprises M local storage clients connected to the wide area network and N storage servers in different geographical positions; every local storage client consists of a web manager, a snap module, a mapping file redundant array module, a compression module, a decompression module, an encryption module, a decryption module, a backup distribution module and a recovery and integration module; the storage server consists of a failure detection module, a distributed arbitration module, a recovery module, a distributed copy service module, a backup and recovery service module. The system of the invention combines disaster tolerant coding and copying, reduces the amount of redundant data and effectively utilizes storage space. Meanwhile, data to be transmitted is compressed and encrypted, thus improving the safety and reliability of data on network transmission, effectively utilizing network bandwidth and reaching excellent disaster tolerant effect.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products