Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

186 results about "Behavioral modeling" patented technology

The behavioral approach to systems theory and control theory was initiated in the late-1970s by J. C. Willems as a result of resolving inconsistencies present in classical approaches based on state-space, transfer function, and convolution representations. This approach is also motivated by the aim of obtaining a general framework for system analysis and control that respects the underlying physics.

A System and Method for Modelling System Behaviour

A method of modelling system behaviour of a physical system, the method including, in one or more electronic processing devices obtaining quantified system data measured for the physical system, the quantified system data being at least partially indicative of the system behaviour for at least a time period, forming at least one population of model units, each model unit including model parameters and at least part of a model, the model parameters being at least partially based on the quantified system data, each model including one or more mathematical equations for modelling system behaviour, for each model unit calculating at least one solution trajectory for at least part of the at least one time period; determining a fitness value based at least in part on the at least one solution trajectory; and, selecting a combination of model units using the fitness values of each model unit, the combination of model units representing a collective model that models the system behaviour.
Owner:EVOLVING MACHINE INTELLIGENCE

Circuit and method for modeling I/O

A behavioral modeling technique that captures driver delay. The output characteristics of a typical driver are represented by two basic element types: switching and non-switching. Switching elements are functions of both time-varying and non-time-varying parameters, and non-switching elements are functions of non-time-varying parameters only. The outputs of these elements are characterized and tabulated by applying a DC voltage on the output of the driver and measuring the current through each element. The time-varying switching element are represent by time-controlled resistors. The invention provides a methodology to account for variations in input transition rate, supply voltage(s) or temperature.
Owner:IBM CORP

System and method for securing computer system against unauthorized access

ActiveUS20050097364A1Defeat computer security breachSecurity breachMemory loss protectionDigital data processing detailsComputer usersIdentity theft
The present invention described secures a computer account against unauthorized access caused as a result of identity-theft, and insider-espionage using artificial intelligence and behavioral modeling methods. The present invention has the ability to detect intruders or impersonators by observing “suspicious” activity under a computer account. When it sees such suspicious behavior, it uses artificial intelligence to authenticate the suspect by interrogation. The present invention asks the suspect questions that only the legitimate computer account owner can verify correctly. If the suspect fails the interrogation, that proves that he / she is an impersonator and therefore further access to the computer account is denied immediately. On the other hand if the suspect passes, access to the computer account is restored. The present invention uses a Programmable Artificial Intelligence Engine (PAIE) to interact with computer users in human natural language. The PAIE can also be programmed to suit other applications where natural language interaction with humans is helpful.
Owner:EDEKI OMON AYODELE +2

Method and system for calculating user influence in social network

The invention relates to the field of a social network and is applied to a network system with social elements. The invention discloses a method and a system for calculating user influence in a social network, and in the method, the behaviors of users are analyzed so that a model of the behavior of influence spread among users is established and the mold is used for identifying the most influential people in the social network. The system records user access logs in real time. The method comprises the following steps that: (1) an influence behavior extracting module filters the interactive behaviors in the logs; (2) an influence spread calculating module determines the influence of the current behavior spread according to the type and the actor of the behavior and the emotion tendentiousness analysis of the relative content; (3) an influence updating module mergers the data generated through the increment; (4) a user ranking module incrementally calculates the most influential people; and (5) a service module appoints a target user range and sequences the target users according to the influence. The method and the system can dynamically reflect the change condition of the user influence according to the interactive behaviors of the users in the social network.
Owner:聚友空间网络技术有限公司 +1

Lens heating compensation systems and methods

Methods for calibrating a photolithographic system are disclosed. A cold lens contour for a reticle design and at least one hot lens contour for the reticle design are generated from which a process window is defined. Aberrations induced by a lens manipulator are characterized in a manipulator model and the process window is optimized using the manipulator model. Aberrations are characterized by identifying variations in critical dimensions caused by lens manipulation for a plurality of manipulator settings and by modeling behavior of the manipulator as a relationship between manipulator settings and aberrations. The process window may be optimized by minimizing a cost function for a set of critical locations.
Owner:ASML NETHERLANDS BV

Detection of anomalies in an aircraft engine

A method and system for detecting anomalies in an aeroengine. The method and system define a behavior model of a controller of the aeroengine using a time regression modeling the behavior of the controller as a function of a data set relating to the controller and including measurements of past behaviors and command and state measurements of the controller; continuously recalculate the behavior model for each new data set; and monitor statistical variation of the behavior model to detect a behavior anomaly of the controller representing an operating anomaly of the engine.
Owner:SN DETUDE & DE CONSTR DE MOTEURS DAVIATION S N E C M A

System and method for securing computer system against unauthorized access

The present invention described secures a computer account against unauthorized access caused as a result of identity-theft, and insider-espionage using artificial intelligence and behavioral modeling methods. The present invention has the ability to detect intruders or impersonators by observing “suspicious” activity under a computer account. When it sees such suspicious behavior, it uses artificial intelligence to authenticate the suspect by interrogation. The present invention asks the suspect questions that only the legitimate computer account owner can verify correctly. If the suspect fails the interrogation, that proves that he / she is an impersonator and therefore further access to the computer account is denied immediately. On the other hand if the suspect passes, access to the computer account is restored. The present invention uses a Programmable Artificial Intelligence Engine (PAIE) to interact with computer users in human natural language. The PAIE can also be programmed to suit other applications where natural language interaction with humans is helpful.
Owner:EDEKI OMON AYODELE +2

Human body behavioral modeling identification method based on priori knowledge cluster in computer system

The invention relates to a human body behavioral modeling identification method based on a priori knowledge cluster in a computer system. The method comprises the steps of human body behavioral modeling processing and human body behavioral identification processing. By the adoption of human body behavioral modeling identification method based on the priori knowledge cluster in the computer system, a constructed modeling system has a self-learning capacity and can continuously perfect a classifier along with the classification of observed samples. In cluster distribution obtained in the process of human body behavioral modeling, if outliers exist, the outliers serve as an abnormal behavioral model. When the system is designed, precaution is given as required, the method has great realistic meanings, important influence of priori knowledge on a human body behavioral identification result is considered, an improved cluster method is adopted to model and identify the human body, and foundation can be laid for identifying abnormal behaviors. The method is simple and efficient, can accurately identify different behavioral modes, and has good expandability. Working performance is reliable and stable, and the application range is wide.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Multi-agent-based virtual miner safety behavior modeling and emergency simulation system

The invention discloses a multi-agent-based virtual miner safety behavior modeling and emergency simulation system. The system is characterized by comprising a monitoring layer, an analysis layer, a simulation layer, a decision enforcement layer and a database layer, wherein a communication agent is responsible for communication between every two layers; the monitoring layer consists of various detection agents; the analysis layer consists of a database management module; the simulation layer comprises an ordinary simulation module, a self-defined simulation module and an agent generation module; the decision enforcement layer comprises a commanding module, an enforcement module and an evaluation module; the database layer comprises an integrated database, a model base and a knowledge base. According to the system, an evolution trend during the occurrence of various disasters in a mine and evacuation behaviors of underground miners under a real condition can be simulated in a simulation environment, the system can be extended according to different environments of different mines in a self-defined way, a guiding basis is provided for the underground emergency evacuation of the mines in the real condition, and the safety production efficiency and the scientific management level of a mine environment are greatly improved.
Owner:ANHUI UNIV OF SCI & TECH

Apparatus for improving concurrent behavior modeling with emulation

A hardware design emulation system that includes one or more emulators and one or more associated run-time assist units (RTAUs). The emulator logic is a combination of user model logic, reflecting the hardware design, and non-user model logic. A handshaking controller produces a domain step signal and a model step signal. The domain step signal indicates that the emulator is entering a state for executing the next step of the logic with which it is programmed, be it user model logic or non-user model logic. The model step signal indicates that the emulator is entering a state for advancing the user model defined by the user model logic. This dual handshaking protocol enhances versatility by enabling a wide variety of RTAUs to be used, particularly in combination with one another. Also, a RTAU can, in accordance with its programming, "skip steps" (either model steps or domain steps) to enhance efficiency if there is a known relationship between cycles of the emulator logic and cycles of the user model. In addition, system stoppage logic efficiently alerts other RTAUs when one RTAU has caused the emulation to stop. Furthermore, the emulation system can be scaled to accommodate a greater number of RTAUs by cascading the master panels to which they are connected.
Owner:CADENCE DESIGN SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products