Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

55 results about "String analysis" patented technology

Bit Based Formation Evaluation and Drill Bit and Drill String Analysis Using an Acoustic Sensor

A drill bit having a bit body includes one or more acoustic sensors that are configured to detect elastic waves when the drill bit is used for drilling a wellbore. The acoustic sensor may be configured to detect a sonic signature associated with a failure event. In further arrangements, the acoustic sensors may be configured to receive signals from a controlled acoustic source.
Owner:BAKER HUGHES INC

System and method for carrying out searching match on automobile component products by using VIN (Vehicle Identification Number)

The invention discloses a system and a method for carrying out searching match on automobile component products by using a VIN (Vehicle Identification Number). The system comprises a product definition configuration module, a VIN character string division module, a character string analysis module, an information matching module and a fuzzy search module. The product definition configuration module is used for predefining classes and adaptable automobile modes of products in a database; the VIN character string division module is used for intercepting a plurality of character strings from the VIN according to a set rule; the character string analysis module is used for analyzing information corresponding to a vehicle represented by the VIN from the character strings obtained through division; the information matching module is used for carrying out analysis to obtain vehicle information and find out a product matched with the vehicle from a datasheet to be retrieved by virtue of a circular traverse function; and the fuzzy search module is used for finding out the final product needed by a user in combination with keyword fuzzy search specific to the name of the product per se. According to the invention, the specific product needed by the user can be searched quickly and precisely according to search words and the VIN of the vehicle of the user.
Owner:马涛

Json format data analytic method and data receiving end

The present invention relates to the field of software design and discloses a Json format data analytic method and a data receiving end so as to solve the technical problem that in the prior art, a data receiving party cannot correctly receive any data transmitted in a Json format under the condition of not appointing keys. The method comprises: receiving Json format data sent by a data sending end by virtue of the data receiving end ; by character string analysis and a special format character corresponding to a JsonArray, judging whether the Json format data comprises the JsonArray or not; when the Json format data comprises the JsonArray, extracting keys and values of the JsonArray; completing one-to-one correspondence between the keys and the values; the keys and the values are stored into a List and the List is output; completing correspondence between keys and values of a JsonObject; and storing each pair of key and value of the analyzed JsonObject as one element in the List and output the same. The method achieves the technical effect that even though the data receiving party does not know the corresponding relationship between the keys and the values, the data receiving party also can correctly receive and analyze the Json format data.
Owner:WUHAN IRON & STEEL (GROUP) CORP

Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis

Methods and apparatus are provided for detecting unwanted traffic in one or more packet networks utilizing string analysis. Unwanted traffic received by a target victim, such as a malicious attack, is detected by maintaining a rule base identifying one or more string expressions; analyzing one or more error entries in a log file, the log file comprising one or more requests received by the target victim; determining if the one or more requests include a string that matches one or more of the string expressions in the rule base; and sending a denunciation message to a central filter if the one or more requests include a string that matches one or more of the string expressions in the rule base. The string expressions may comprise, for example, a string or a regular expression and can represent one or more resources that an attacker may attempt to access.
Owner:WSOU INVESTMENTS LLC

Classification of code constructs using string analysis

A code construct in a computer-based software application is classified by seeding an analysis of an instruction code set of a computer-based software application with a seed for a seeding variable within the instruction code set, wherein the seed is an abstract value representation, performing the analysis to a fixed point, thereby producing a fixed point solution, selecting an invariant from the fixed point solution, wherein the invariant represents at least one value pointed to by a classification variable in a code construct within the instruction code set, and classifying the code construct with a classification that is applicable to the invariant in accordance with an application criterion.
Owner:IBM CORP

Webpage mailbox identification classifying method and system

ActiveCN101937466AAvoid not being able to get webmail contentAvoid the defect that it is impossible to classify and display web mails according to the content of web mailsSpecial data processing applicationsClassification methodsData mining
The invention constructs a webpage mailbox identification classifying method. The method comprises the following steps: S0, reading the webpage address of the webpage mailbox and a characteristic string of a mail content in the webpage mailbox, and establishing an identifying engine and an analysis engine according to the webpage address and the characteristic string; S1, calling the identifying engine to identify the type of the currently visiting webpage mailbox when a user receives and sends a mail; S2, calling the corresponding analysis engine to extract the mail content corresponding to the characteristic string according to the class of the webpage mailbox; and S3, presenting the mail content in classes. The invention also constructs a webpage mailbox identification classifying system. The webpage mailbox identification classifying method and system are adopted to establish classification by analyzing the characteristic string in the mail content according to the webpage address of the webpage mailbox and the webpage address of the webpage mail, establish the characteristic string analysis engine according to different classifications, and complete differentiation and content extraction by identifying link of the webpage address when the user receives and sends the mail.
Owner:SURFILTER NETWORK TECH

Electronic translation method and system based on engineering

The invention relates to an electronic translation method and a system based on engineering, wherein, the method included the following details: a. a document collection is totally managed in an engineering form; b. keywords in all the documents are automatically extracted according to an expandable rule collection; c. corresponding translation sentences are edited or stored in one edition environment according to different languages; d. a new document collection is generated according to the language appointed by users. The system includes a user interface used for the mutual communication with users; a document parser used for loading various document analysis rules and carrying out string-analysis aiming at various documents; a source databank used for storing all the information required by the engineering and a source engineering management interface used for providing an unified interface for the system so as to lead other parts and courses of the system to operate the source databank. The method of the invention can realize the effective management to a plurality of documents, can expand the keyword extraction rule, can pertinently translate different sentences and store translation results, and also can generate documents corresponding to the appointed language.
Owner:SHENZHEN GONGJIN ELECTRONICS CO LTD

Method and device for extracting keywords in page

The invention discloses a method and a device for extracting keywords in a page. The method comprises the following steps: performing character string analysis on the title content of the page to obtain candidate words, and constructing a candidate word search table by the obtained candidate words; performing page analysis on the page to obtain a character combination, and constructing a short string set by the obtained character combination; performing character string analysis on the short string set to obtain character strings, and constructing an original weight pool by the obtained character strings; performing weighted voting on the candidate words in the candidate word search table through the character strings according to the sequence of the quantities of words included in each character string in the original weight pool, and increasing the weight values of the candidate words if the character strings are consistent with the candidate words in the candidate word search table; sequencing according to the weighted values of the candidate words from large to small, and extracting a preset quantity of candidate words in the front as keywords according to the sequence. By adopting the method and the device, the universality of a keyword extraction technology can be enhanced, and a way for extracting the keywords is more intelligent and efficient.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Screening method of non-invasive gastric cancer saliva biomarker

InactiveCN108152508ANon-invasive detection and evaluation meansSimple detection and evaluation meansBiological testingLymphatic SpreadFreeze-drying
The invention discloses a screening method of a non-invasive gastric cancer saliva biomarker. The screening method specifically comprises the following steps: protein sample preparation, protein quantification, proteolysis and freeze-drying, labeling a sample by iTRAQ, C18 desalting, liquid-phase separation and mass spectrum identification, and data analysis; the GO function enrichment including biology progress, the molecule function and the cell component is performed on the screened differential protein by using the Panther Classification System in the data analysis; and then the protein mutual effect analysis is performed on the differential protein by using the STRING analysis software; and then the KEGG signal path analysis is performed on the differential protein. Through the screening method disclosed by the invention, the specificity protein marker in the gastric cancer can be discovered through a fast and reliable proteomics technical program, thereby establishing a non-invasive, simple and convenient, fast and practical detection evaluation measure for the early diagnosis, the postoperative recurrence, metastasis, and prognosis observation of the gastric cancer.
Owner:SHENZHEN ELDERLY MEDICAL RES INST +1

Access control system and control method thereof

The invention provides an access control system and a control method thereof. The access control system comprises a server, a mobile terminal and an access control device. Multiple encryption is carried out in a secret key or two-dimensional code transmission link, so that the secret key is prevented from being eavesdropped or tampered; propagation and tampering of the two-dimensional code are prevented; security of transmissions is enhanced, and eavesdropping or tampering in a verification information transmission process is prevented; the door opening permission of the user is verified according to the time difference of application time, the secret key, the UUID of the access control device and the user permission information; the security is improved, the character string analysis iscarried out in the server, the generation algorithm of the character string is prevented from being acquired by a third party at a mobile phone terminal, and the secret key is carried out in ae generation algorithm and an encryption algorithm in the server, so that the security is improved.
Owner:三仟(杭州)数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products