Patent application number | Description | Published |
20090327181 | BEHAVIOR BASED METHOD AND SYSTEM FOR FILTERING OUT UNFAIR RATINGS FOR TRUST MODELS - Disclosed is a behavior-based method which uses each rater's rating behaviors as the criterion to judge unfair ratings. A behavior refers to the action that a rater gives certain rating under specific context. The behavior-based method regards the rating given by a rater with abnormal behavior as an unfair rating, where abnormal behavior is recognized by comparing a rater's current behavior with his behavior history. | 12-31-2009 |
20090328138 | SYSTEM FOR CONTROLLING ACCESS TO HOSPITAL INFORMATION AND METHOD FOR CONTROLLING THE SAME - A method and system for implementing activity-oriented access control (AOAC) to hospital information is disclosed. An access request device sends user credentials attaching user attributes to an AOAC server, which in turn searches activity rules that are assigned to user attributes from an activity server and a current work situation of the user from an activity recognition server. The AOAC server transmits an access request list corresponding to the activity rules and the current work situation of the user to the access request device so that it can select a desired access request among the list. | 12-31-2009 |
20090328148 | METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS - The present invention relates to Group-based trust management scheme (GTMS) of wireless sensor networks. GTMS evaluates the trust of a group of sensor nodes in contrast to traditional trust management schemes that always focused on trust values of individual nodes. This approach gives us the benefit of requiring less memory to store trust records at each sensor node in the network. It uses the clustering attributes of wireless sensor networks that drastically reduce the cost associated with trust evaluation of distant nodes. Uniquely it provides not only a mechanism to detect malicious or faulty nodes, but also provides some degree of a prevention mechanism. | 12-31-2009 |
20110055553 | Method for controlling user access in sensor networks - A method for implement an energy-efficient user access control to wireless sensor networks is disclosed. A user creates a secret key and sending it to a sensor. The sensor builds a first MAC value by the secret key and sends it to the Key Distribution Center which builds a second MAC value and sending it to the sensor. The sensor decrypts the second MAC value to get a random number, and builds a third MAC value by the random number. The third MAC value is used by the user to authenticate the sensor. | 03-03-2011 |
20130124438 | METHOD OF RECOGNIZING PATTERNS BASED ON MARKOV CHAIN HIDDEN CONDITIONAL RANDOM FIELD MODEL - Provided is a method of recognizing patterns based on a hidden conditional random fields model to which full-Gaussian covariance has been applied. The method includes dividing a training input signal and outputting a frame sequence, extracting a feature vector from the frame sequence, calculating a parameter through a conditional random fields model to which Gaussian covariance has been applied using the feature vector, receiving, by the hidden conditional random fields model to which the parameter has been applied, a feature vector extracted from a test input signal measured for an actual pattern to infer a label indicating the actual pattern, and proposing a method of calculating gradient values for a conditional probability vector, a transition probability vector, a Gaussian mixture weight, a mean of Gaussian distributions, and covariance of the Gaussian distributions, as an analysis method. | 05-16-2013 |
Patent application number | Description | Published |
20090046678 | Method for predicting the mobility in mobile ad hoc networks - Disclosed are methods for determining the neighborhood local view of a mobile node in time which can facilitate the forwarding decision in the design of network protocols. In conventional mobile ad hoc networks nodes set up local topology view based on periodical received “Hello” messages. The conventional method is replaced with proactive and adaptive methods of predicting locations of nodes based on preserved historical information extracted from received “Hello” messages and constructing neighborhood view by aggregating predicted locations. This method is useful for providing updated and consistent topology local view that a network communication employs to determine optimal forward decisions and improve communication performance. | 02-19-2009 |
20090046910 | Method for enhancing blood vessels in angiography images - Disclosed is a method for enhancing blood vessels in angiography images. The method incorporates the use of linear directional features present in an image, extracted by a Directional Filter Bank, to obtain more precise Hessian analysis in noisy environment and thus can correctly reveal small and thin vessels. Also, the directional image decomposition helps to avoid junction suppression, which in turn, yields continuous vessel tree. | 02-19-2009 |
20090125474 | USER PREFERENCE-BASED DATA ADAPTATION SERVICE SYSTEM AND METHOD - The present invention relates to a user preference-based data adaptation service system and method. More particularly, the present invention relates to a user preference-based data adaptation service system and method capable of providing a data adaptation service that appropriately converts a file in consideration of a difference between the platforms of different kinds of devices in order to share the file, and reflecting an exact user preference in consideration of the surrounding environments, such as, the performance of the device and a network. | 05-14-2009 |