Automatic decomposition of simulation model

    公开(公告)号:US10318668B2

    公开(公告)日:2019-06-11

    申请号:US15182631

    申请日:2016-06-15

    Abstract: Method, system and product for decomposing a simulation model. The method comprising automatically decomposing the simulation model into a predetermined number of co-simulation components, wherein each co-simulation component is allocated to a different simulation platform, wherein said automatically decomposing comprises: defining a target optimization function, wherein the target optimization function computes an estimated run time of the simulation model, wherein the target optimization function is based on a communication time within each co-simulation component and a communication time between each pair of co-simulation components; and determining a decomposition of the simulation model that optimizes a value of the target optimization function. The method further comprises executing the decomposed simulation model by executing in parallel each co-simulation component on a different simulation platform, whereby the simulation model is executed in a distributed manner.

    ARCHITECTURE OPTIMIZATION
    23.
    发明申请
    ARCHITECTURE OPTIMIZATION 审中-公开
    建筑优化

    公开(公告)号:US20140244218A1

    公开(公告)日:2014-08-28

    申请号:US13775272

    申请日:2013-02-25

    CPC classification number: G06F17/504 G06F2217/06 G06F2217/08

    Abstract: A computerized method, system and computer product for automatic architecture generation is disclosed. The computerized method includes receiving a functional description of an architecture of a system, wherein the system architecture includes a plurality of functions and a plurality of functional links between the functions, receiving or defining at least one functional failure case and its maximum allowed failure probability, defining an algebraic function approximating the probability of occurrence of each failure case, automatically generating an optimized architecture using an optimization solver wherein all architecture's one approximated failure probabilities are smaller than the maximum allowed probability for the respective failure cases and outputting the automatically generated architecture.

    Abstract translation: 公开了一种用于自动架构生成的计算机化方法,系统和计算机产品。 计算机化方法包括接收系统的架构的功能描述,其中系统架构包括功能之间的多个功能和多个功能链接,接收或定义至少一个功能故障情况及其最大允许的故障概率, 定义近似每个故障情况发生概率的代数函数,使用优化求解器自动生成优化架构,其中所有架构的一个近似故障概率小于相应故障情况的最大允许概率,并输出自动生成的架构。

    CREATING PLUGGABLE ANALYSIS VIEWPOINTS FOR AN OPTIMIZATION SYSTEM MODEL
    24.
    发明申请
    CREATING PLUGGABLE ANALYSIS VIEWPOINTS FOR AN OPTIMIZATION SYSTEM MODEL 审中-公开
    为优化系统模型创建可插拔分析视图

    公开(公告)号:US20140201706A1

    公开(公告)日:2014-07-17

    申请号:US13740284

    申请日:2013-01-14

    CPC classification number: G06F8/10

    Abstract: A method of creating a system having pluggable analysis viewpoints over a design space model based on templates for analytical representation of different system aspects, comprising: a) Ontologically representing each of a plurality of system viewpoints with a subset of the components and classes using attributes and inter-attribute relationships. b) Automatically creating a unified design space model represented by the design space components according to a plurality of user defined pluggable analysis viewpoints and modeling viewpoints. c) Automatically generating a design space model derived from a plurality of analysis and modeling viewpoints. d) Receiving at least one change marked by a user with respect to a certain one of the plurality of analysis and modeling viewpoints. e) Automatically updating the design space model and the plurality of viewpoint models to reflect the at least one change. f) Outputting the updated design space model and the plurality of viewpoint models.

    Abstract translation: 一种创建具有基于用于不同系统方面的分析表示的模板的设计空间模型的具有可插拔分析视点的系统的方法,包括:a)使用属性使用组件和类的子集在本体上表示多个系统视点中的每一个, 属性间关系。 b)根据多个用户定义的可插拔分析视点和建模视点,自动创建由设计空间组件表示的统一设计空间模型。 c)自动生成从多个分析和建模视点导出的设计空间模型。 d)相对于所述多个分析和建模视点中的某一个接收用户标记的至少一个改变。 e)自动更新设计空间模型和多个视点模型以反映至少一个变化。 f)输出更新的设计空间模型和多个视点模型。

    NEURAL NETWORK TRAINING WITH HOMOMORPHIC ENCRYPTION

    公开(公告)号:US20230297649A1

    公开(公告)日:2023-09-21

    申请号:US17655566

    申请日:2022-03-21

    CPC classification number: G06K9/6257 G06N3/08 G06N3/04 H04L9/008

    Abstract: A method, a neural network, and a computer program product are provided that optimize training of neural networks using homomorphic encrypted elements and dropout algorithms for regularization. The method includes receiving, via an input to the neural network, a training dataset containing samples that are encrypted using homomorphic encryption. The method also includes determining a packing formation and selecting a dropout technique during training of the neural network based on the packing technique. The method further includes starting with a first packing formation from the training dataset, inputting the first packing formation in an iterative or recursive manner into the neural network using the selected dropout technique, with a next packing formation from the training dataset acting as an initial input that is applied to the neural network for a next iteration, until a stopping metric is produced by the neural network.

    PACKING ARBITRARY TENSORS INTO TILES WITH DESCRIPTIVE SHAPES

    公开(公告)号:US20220329407A1

    公开(公告)日:2022-10-13

    申请号:US17229046

    申请日:2021-04-13

    Abstract: An efficient packing method that will optimize use of the homomorphic encryption ciphertext slots, trading-off size, latency, and throughput. Technology for working with tensors (multi-dimensional arrays) in a system that imposes tiles, that is, fixed-size vectors. An example of a system that imposes tiles are homomorphic encryption schemes, where each ciphertext encrypts a vector of some fixed size. The tensors are packed into tiles and then manipulated via operations on those tiles. Also, syntax for notation for describing packing details. This technology interprets the tiles as multi-dimensional arrays, and combines them to cover enough space to hold the tensor. An efficient summation algorithm can then sum over any dimension of this tile tensor construct that exists in the physical or logical addressing space of a computer data memory.

    Method and system for email phishing attempts identification and notification through organizational cognitive solutions

    公开(公告)号:US10834111B2

    公开(公告)日:2020-11-10

    申请号:US15881815

    申请日:2018-01-29

    Abstract: Embodiments of the present invention may detect, identify, and notify of email phishing attacks. For example, a method may comprise constructing at least one behavioral model for an organization based on features extracted from a plurality of email messages and based on information relating to the organization, including analyzing behavioral patterns of emails in the organization, analyzing a plurality of new email messages using the behavioral model to determine non-binary scores representing analysis of features of the messages, including behavioral patterns of the new emails in the organization with regard to the features, determining whether any of the plurality of new email messages are malicious email messages based on the non-binary scores for the new email messages indicating that the new email messages deviate from the behavioral patterns of emails in the organization included in the behavioral model, and transmitting a notification that a message is a malicious email message.

    Identifying security breaches from clustering properties

    公开(公告)号:US10831785B2

    公开(公告)日:2020-11-10

    申请号:US15095177

    申请日:2016-04-11

    Abstract: Embodiments of the present invention may provide the capability to identify security breaches in computer systems from clustering properties of clusters generated based on monitored behavior of users of the computer systems by using techniques that provide improved performance and reduced resource requirements. For example, behavior of users or resources may be monitored and analyzed to generate clusters and train clustering models. Labeling information relating to some user or resource may be received. When users or resources are clustered and when a cluster contains some labeled users/resources then an anomaly score can be determined for a user/resource belonging to the cluster. A user or resource may be detected to be an outlier of at least one cluster to which the user or resource has been assigned, and an alert indicating detection of the outlier may be generated.

Patent Agency Ranking