Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33 results about "Dependence network" patented technology

Mobile edge computing unloading method based on multi-agent reinforcement learning

The invention discloses a mobile edge computing unloading method based on multi-agent reinforcement learning, belongs to the field of edge computing and wireless networks, and provides an intelligenttask unloading method for a multi-user multi-edge node complex scene. According to the method, a multi-agent reinforcement learning algorithm is adopted, each piece of user equipment establishes an Actor and Critic deep learning network locally, action selection and action scoring are carried out according to states and actions of the user equipment and other equipment, spectrum resources, computing resources and energy resources are comprehensively considered, and an unloading and resource allocation strategy is formulated by taking task delay optimization as a target. The method does not depend on a specific network model, each equipment can autonomously and intelligently make an optimal strategy through a learning process of exploring feedback, and the method can adapt to dynamic changeof a network environment.
Owner:DALIAN UNIV OF TECH

Cross-project defect influence analysis method based on program dependency relationship and symbolic analysis

The invention provides a cross-project defect influence analysis method based on a program dependency relationship and symbolic analysis. The cross-project defect influence analysis method comprises the following steps: 1) acquiring program source codes of different projects and multiple versions in the same software ecosystem; 2) extracting a calling relationship from a program source code of each project basic version, and constructing an ecosystem basic dependence network; 3) obtaining code changes from program source codes of other versions of each project, and constructing a version-sensitive ecosystem dependent network; 4) for a given cross-project defect, under the condition that an upstream error method of the cross-project defect is known, selecting a candidate downstream module;5) for each candidate downstream module, carrying out code preprocessing; 6) performing symbol coding on each preprocessed candidate downstream module; and 7) carrying out constraint solving on each downstream module after symbol coding, and if a solution exists, prompting a developer that the module is possibly influenced by a given cross-project defect. According to the method, the problems thatat present, cross-project defect influence analysis is lacked, and a downstream project affected module cannot be prompted are solved, so that the design of a cross-project defect repair scheme is guided, the quality of defect repair patches is improved, and healthy development of a software ecosystem can be better controlled and managed.
Owner:NANJING UNIV

Self-learning user habit control system and method for intelligent home

The invention relates to a self-learning user habit control system and method for an intelligent home. The system comprises a data receiving module, a data storage module, an algorithm module, an execution triggering module and a logic judging module. The control system is arranged in the home, user data is stored in a local system, and the system can autonomously work and does not depend on network transmission; the system is internally installed with an algorithm system, and the algorithm system can work at regular intervals according to the behavior data of a user so as to learn the habitsof the user and update a logic judging control system of the system, so that a large amount of manual configuration operations of the user are avoided, and the problem that the convenience of an intelligent management and control system cannot be enjoyed because aged people and children may not able to use a manual configuration system or crowds who are not able to operate cannot use the manual configuration system is solved.
Owner:SPORT TOUCH

Failure prediction method for software development

The invention provides a failure prediction method for software development. The failure prediction method comprises the steps that a source code dependence network and a developer social network are set up, and the dependence relationship between source code files and the communication and cooperation relationship between developers are recorded respectively; the source code dependence network and the developer social network are compared, and the difference between the source code dependence network and the developer social network is used as an indication of lack of communication. By the adoption of the failure prediction method for software development, the number of lacked developer communication links associated with each source code file can be detected and used as the indication of inconsistency of file networks, and the developer communication links lacked by the files can be provided; meanwhile, the reason of each lacked link can also be provided; namely, two corresponding source files depend on each other, however the developers of the two source files do not communicate and cooperate with each other. The developers can organize corresponding communication for making up according to the guide of the method, and failures are found and repaired in a targeted mode.
Owner:江苏苏测检测认证有限公司 +1

Invading infection region positioning method based on computer time sequence dependence network

The invention discloses an invading infection region positioning method based on a computer time sequence dependence network. The method includes the steps of constructing the complete object time sequence dependence network according to an access record, collected in a computer system, of all processes to computer objects; pruning the complete time sequence dependence network, and extracting an object time sequence dependence sub-network related to invading; constructing a Bayesian network according to the object time sequence dependence sub-network; carrying out probabilistic reasoning through the Bayesian network, calculating and quantizing the possibility that other unknown objects in the system suffer from invading infection, and obtaining an invading infection region of the computer system. The method has the advantages that the time-information-combined object dependence network is constructed, and the time sequence dependence relation among the objects and the characteristic that the object infection state is changed along with the time change can be more accurately described; a probabilistic reasoning method is provided for positioning the invading infection region.
Owner:XI AN JIAOTONG UNIV

Trusted execution environment activation method and device

The embodiment of the invention provides a trusted execution environment activation method and device, the trusted execution environment is configured in equipment, and the equipment is further configured with a trusted application program running in the trusted execution environment, a rich execution environment and a client program running in the rich execution environment; the method comprisesthe following steps of enabling the trusted execution environment to acquire an activation file which is sent by the client program and is preset in the equipment; enabling the trusted execution environment to verify whether the activation file is legal or not; if the activation file is legal, activating the trusted execution environment and allowing the trusted application program to run normally; and after the trusted execution environment is activated, storing the activation file into a trusted storage space of the equipment. In the embodiment of the invention, the equipment can be activated without depending on a network.
Owner:ALIBABA GRP HLDG LTD

Application service monitoring method and device, electronic equipment and readable storage medium

The invention discloses an application service monitoring method and device, electronic equipment and a readable storage medium. The method comprises the steps of, installing a communication device which interacts with a host machine and does not depend on a network in a cloud host of a cloud platform in advance, deploying a data collection agent in the host machine, and meanwhile integrating a data collection program matched with the data collection agent and data collection templates of various application services in an application service installation package; when it is detected that the target application service is generated, generating a data acquisition configuration file according to the attribute information of the target application service and a target data acquisition template matched with the type of the target application service; and when the target application service is successfully deployed in the cloud host, acquiring the monitoring performance data acquired by the cloud host based on the data acquisition configuration file, thereby safely and efficiently monitoring various types of application services of the cloud platform.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Authentication verification method, system and device

The invention discloses an authentication verification method, system and device. The method comprises the following steps: receiving a target request and a first hash value from a data bearing network, and performing hash operation on a first user identifier and a target key to obtain the first hash value; performing hash operation on the first user identifier and the target key to obtain a second hash value; comparing the first hash value with the second hash value, determining the target request as a legal message under the condition that a comparison result indicates that the first hash value is consistent with the second hash value, and generating a response message of the target request; a response message is returned to the terminal, the response message at least carries an authentication file, and the authentication file is used for marking the identity of the terminal so that the rich media communication suite equipment management system can recognize the terminal. According to the method and the device, the technical problems of complex authentication process and low use efficiency caused by the fact that authentication verification needs to be carried out on a user independently by depending on network side equipment in related technologies are solved.
Owner:CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products