IDENTIFYING SUBSURFACE MATERIAL LAYER
    11.
    发明申请
    IDENTIFYING SUBSURFACE MATERIAL LAYER 审中-公开
    识别表面材料层

    公开(公告)号:US20150120195A1

    公开(公告)日:2015-04-30

    申请号:US14527272

    申请日:2014-10-29

    CPC classification number: G01V99/00 G01V2210/62 G01V2210/66

    Abstract: In an approach for identifying subsurface material layers, a computer processor: acquires a well log of a location to be explored, the log comprising data corresponding to multiple geophysical parameters, the data of each parameter comprising measurement values of the parameter at different depths underground; matches a reference data of each parameter corresponding to each of multiple layer transition types with the data of that parameter in the well log at depths underground, wherein each layer transition type indicates an upper material layer and a lower material layer, and the reference data is used to represent a variation trend of the parameter in a transitional zone conforming with the layer transition type; and according to the matching result, determines a layer transition type at the location to be explored and a depth of an interface between the upper material layer and the lower indicated by the layer transition type.

    Abstract translation: 在一种用于识别地下物质层的方法中,计算机处理器:获取要探索的位置的测井记录,所述对数包括对应于多个地球物理参数的数据,每个参数的数据包括在地下不同深度的参数的测量值; 将与多层转移类型中的每一个对应的每个参数的参考数据与地下深井中的该对数据中的该参数的数据进行匹配,其中每个层转换类型表示上层材料层和下层材料层,参考数据为 用于表示符合层过渡类型的过渡区域中参数的变化趋势; 并且根据匹配结果确定要探索的位置处的层转变类型以及由层过渡类型指示的上层材料层和下层之间的界面的深度。

    Resource security system using fake connections

    公开(公告)号:US11108823B2

    公开(公告)日:2021-08-31

    申请号:US16050491

    申请日:2018-07-31

    Abstract: A method, an apparatus, a system, and a computer program product for handling security threats in a network data processing system. A computer system determines a connection type for a connection in response to detecting the connection between a target resource in the network data processing system and a requestor. The computer system redirects the connection to a virtual resource in place of the target resource when the connection type is a threat connection, wherein the requestor originating the connection to the target resource is unable to perceive a redirection of the connection to the virtual resource. The computer system records information in the connection redirected to the virtual resource to form recorded information. The computer system adjusts a security policy for handling connections in the network data processing system using the recorded information, wherein the security threats in the network data processing system are decreased using the security policy.

    Tagging geographical areas
    14.
    发明授权

    公开(公告)号:US10136273B2

    公开(公告)日:2018-11-20

    申请号:US15259727

    申请日:2016-09-08

    Abstract: A method of tagging a geographical area includes obtaining, with a processing device, attribute information and mobile tracking data of a plurality of mobile objects, wherein the mobile tracking data comprises sampling time and corresponding sampling point locations of the mobile objects; converting the mobile tracking data of the plurality of mobile objects into new mobile tracking data according to the correspondence relationship between the sampling time and a time slices, wherein the new mobile tracking data include time slices and corresponding sampling point locations; and obtaining a set of attribute information of at least one geographical area with respect to the time slices based on the new mobile tracking data, wherein the at least one geographical area is obtained by clustering the sampling point locations.

    Monitoring interesting subjects
    16.
    发明授权

    公开(公告)号:US09912769B2

    公开(公告)日:2018-03-06

    申请号:US15277088

    申请日:2016-09-27

    Abstract: Methods and systems for monitoring interesting subjects. A method including: selecting, based on a first collection of interesting subjects, a set of critical nodes including at least one critical node which participates in one or more interesting subjects in the first collection; and monitoring contents posted by the one or more critical nodes in the set so as to find a second collection of interesting subjects. The set of critical nodes which participate in one or more interesting subjects in the first collection of interesting subjects is selected based on the first collection, as objects to be monitored, thereby reducing the number of contents posted by the nodes to be monitored as compared with monitoring all the user nodes, so that interesting subjects such as hot news or hot events can be found in real time with high efficiency and low cost.

    METHOD AND APPARATUS FOR EVALUATING PREDICTIVE MODEL

    公开(公告)号:US20170228652A1

    公开(公告)日:2017-08-10

    申请号:US15497658

    申请日:2017-04-26

    CPC classification number: G06N5/04 G06F17/18 G06K9/6262 G06N20/00 G06Q10/06375

    Abstract: An approach for a computer to evaluate a predictive model includes identifying features of training samples in a set of training samples. The approach selects evaluation metrics from a set of evaluation metrics as available metrics using identified features and includes determining recommended metrics using the predictive model, the available metrics, and a predetermined set of user-preferred metrics. The approach applies the predictive model created using the set of training samples to a set of test samples to calculate values of the available metrics. The approach evaluates the predictive model by using the available metrics and the values of the available metrics to evaluate the predictive model by evaluating the predictive model using the recommended metrics and the values of the recommended metrics.

Patent Agency Ranking