17th week of 2022 patent applcation highlights part 47 |
Patent application number | Title | Published |
20220129567 | INFORMATION PROCESSING APPARATUS, SECURE COMPUTATION METHOD, AND PROGRAM - There is provided an information processing apparatus that executes efficient type conversion processing in four-party computation using 2-out-of-4 replicated secret sharing. The information processing apparatus comprises a basic operation seed storage part, a reshare value computation part, and a share construction part. The basic operation seed storage part stores a seed for generating a random number used when computation is performed on a share. The reshare value computation part generates a random number using the seed, computes a share reshare value using the generated random number, and transmits data regarding the generated random number to other apparatuses. The share construction part constructs a share for type conversion using the data regarding the generated random number and the share reshare value received from other apparatuses. | 2022-04-28 |
20220129568 | SECURE ELEMENT AND METHOD - The present description discloses a secure element and a communication method, configured to implement at least one first application, and including a circuit configured to record routing data and a list and parameters of communication protocols compatible with the first application, verify the compatibility of a first communication protocol used by first messages intended for the first application with the protocols of the list, convert the first messages into second messages by using a second communication protocol in response to the first protocol not being compatible with at least one of the protocols of the list, and direct the second messages to the first application by using the routing data of the first application. | 2022-04-28 |
20220129569 | METHOD AND SYSTEM FOR VERIFYING AUTHENTICITY OF A DOCUMENT - A system and a method for verifying authenticity of a physical copy and a digital copy of a document are disclosed. The method comprises registering a document in a repository by storing details related to the document in a location of the repository. A symbology for the document is generated. The symbology is an identifier of the location of the repository comprising the document. The symbology is associated with either a physical or a digital copy of the document. The digital copy of the document is printed to generate a printed copy. The printed copy or the physical copy of the document is scanned to generate a scanned image. The document and the details related to the document present at the location of the repository are accessed. The scanned image is compared with the document stored in the repository to determine the authenticity of either the physical copy or the digital copy of the document. | 2022-04-28 |
20220129570 | LOGIC CIRCUITRY - In an example, a method comprises, by logic circuitry associated with a replaceable print apparatus component, responding to a first validation request sent via an I2C bus to a first address associated with the logic circuitry with a first validation response; and responding to a second validation request sent via the I2C bus to a second address associated with the logic circuitry with a second validation response. | 2022-04-28 |
20220129571 | DEVICE ACCESS CONTROL SYSTEM - A device access control system includes a computing system having a device access controller subsystem coupled to devices and a central processing subsystem. A device access control manager subsystem is coupled to the device access controller subsystem and operates, during initialization operations for the computing system, to identify application(s) that are configured to be provided by the central processing subsystem, and identify a first subset of the devices that satisfy application provisioning requirements for the application(s). The device access control management subsystem then configures the device access controller subsystem to provide the central processing subsystem access to the first subset of the devices in order to allow the central processing subsystem to provide the application(s), and disable access for the central processing subsystem to a second subset of the devices in order to prevent the central processing subsystem from using the second subset of the devices to provide the application(s). | 2022-04-28 |
20220129572 | INFORMATION PROCESSING DEVICE AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing device includes: a processor configured to: receive creation of one or more attributes associated with a file, the creation having been made by a user; acquire an access level indicating a strength of a right to change an attribute of the file, the right being owned by the user; store, for the created one or more attributes, an access level corresponding to the user who has made the creation together with a received creation content; and when an access level corresponding to a user who attempts to change an attribute of the file is equal to or higher than the access level currently stored for the attribute to be changed, reflect a received change content in the attribute. | 2022-04-28 |
20220129573 | UNIVERSAL FILE ACCESS CONTROL SYSTEM AND METHOD - System and method for universal file access control in which a processor determines whether or not a user or process requesting access to a file has been granted an access privilege to the file by reading an access control list associated with the user or process or with a group to which the user is a member; if the user or process is determined to have been granted access privilege, retrieve stored directory descriptor information associated with the requested file; obtain a unique file handle associated with the user or process and the requested file; determine if the unique file handle has been used before by comparing the obtained unique file handle with a plurality of stored prior-used file handles; and if the unique file handle has not been used before, retrieve the requested file according to a local access protocol. | 2022-04-28 |
20220129574 | METHOD FOR SETTING UP A SECURE HIERARCHICAL REFERENCING SYSTEM - A performance-optimized secure hierarchical referencing system, for example to implement a cryptographic file system (CFS) in which files or other data are stored in a cryptographic tree structure on a untrusted environment. The system operates by using adaptive cryptographic access control (ACAC) whereby the data on the client (user) side is encrypted using keys. All said keys (with the exception of an entry key) are not stored but are calculated, and a dedicated symmetric key is used for each element in the referencing system (e.g. files, records, comments) to ensure that read/write permissions can be distributed to selected third parties at element level and actively revoked where required (sharing/revocation). | 2022-04-28 |
20220129575 | System and Method for Safely Supporting Customer Security Policies in a Third-Party-as-a-Service Solution - The present disclosure describes an architecture and design of Unauthorized-Blocking-Role (UAB). UAB is a mechanism which prevents higher privileged users of cloud-hosted software from performing unauthorized activities on protected objects, such as management objects. UAB works by periodically monitoring the permissions of customer users on key management objects in an object hierarchy in management software. If a customer user is detected to have privileges higher than the user should have on those objects, UAB applies restrictive role-based access controls (RBACs) on the user. Similarly, UAB also monitors protected principals and protected roles to ensure that their privileges are not modified by a customer user. | 2022-04-28 |
20220129576 | Article Management System - An article management system collects articles from different sources, processes each article to extract information about the article (such as the topics covered in the article), and stores the information in one or more knowledge graphs. The system also maintains user profiles for each of its users. Each user profile includes a user genome representing the user's interests and preferences. The information in the knowledge graphs can be used to select articles to be displayed to users of the article management system. Articles can be displayed as part of the search results for an associated topic or concept, as part of a personalized feed that is generated based on the data in a user's profile, or as part of a feature that displays multiple articles that cover a given topic from multiple different viewpoints. The system can also provide a platform for users to create and publish research collections. | 2022-04-28 |
20220129577 | AUTOMATED TIERED SECURITY FOR CONFIDENTIAL INFORMATION AND CONFIDENTIAL INFORMATION SHARING AND METHODS THEREOF - Systems and methods of the present disclosure enable automated sharing of confidential information according to tiers of security by receiving an electronic information request from an automated form production application of a computing device associated with a third-party entity. A request security tier associated with the electronic information request is determined according to a security tier of the user-related secure data. At least one authentication requirement associated with the request is determined according to authentication settings of the security tier. An authentication request is generated enabling the user to provide an authentication response to approve the computing device for access to the user-related secure data. The user authentication response is received, the user is authenticated based on the user authentication response and the computing device is allowed to access the user-related secure data to auto-populate each field of an electronic form with associated items of the user-related secure data. | 2022-04-28 |
20220129578 | ELECTRONIC DEVICE FOR MANAGING PERSONAL INFORMATION AND METHOD THEREFOR - An electronic device and method are disclosed. The electronic device includes a communication module, a processor, and a memory storing instructions. The processor executes the instructions to implement the method, including: receiving a request to update first user information from an external electronic device through the communication module, identifying a processing order of the update of the first user information for the plurality of service servers, based on the stored relationship information, and transmit the request for processing the first user information to at least a first service server from among the plurality of service servers through the communication module, based on the identified processing order. | 2022-04-28 |
20220129579 | METHOD AND APPARATUS FOR PROVIDING METERING INFORMATION THAT PROVIDES SECURITY FOR PERSONAL INFORMATION - Disclosed is a method and apparatus for providing metering information that may provide a security for personal information. A metering information providing method collects metering information about a variety of energy, such as electricity, gas, heating, cooling, and hot water of an apartment house, provides the collected metering information to a utility provider and an energy information provider, and provides a systematic security function of personal information required to operate a new business model. | 2022-04-28 |
20220129580 | METHODS, APPARATUSES, AND SYSTEMS FOR UPDATING SERVICE MODEL BASED ON PRIVACY PROTECTION - A computer-implemented method, medium, and system are disclosed. One example method includes determining multiple model bases by multiple service parties. A respective local service model is constructed by each service party. Respective local training samples are processed by each service party using the respective local service model to determine respective gradient data corresponding to each model basis. The respective gradient data is sent to a server. In response to determining that the first model basis satisfies a gradient update condition, corresponding gradient data of the first model basis received from each service party are combined to obtain global gradient data corresponding to the first model basis. The global gradient data is sent to each service party. Reference parameters in local model basis corresponding to the first model basis are updated by each service party using the global gradient data to train the respective local service model. | 2022-04-28 |
20220129581 | DATA PROCESSING SYSTEMS AND METHODS FOR AUTOMATIC DISCOVERY AND ASSESSMENT OF MOBILE SOFTWARE DEVELOPMENT KITS - A mobile application privacy analysis system is described, where the system scans a mobile device to identify files associated with a particular SDK and generates a tokenized name for the SDK. The tokenized name includes tokens representing the SDK vendor and one or more functions of the SDK. Using the tokenized name, the system then determines corresponding categories for each functionality token and score for each such category. Based on the scores, the system determines the most significant category and assigns that category to the SDK for use in privacy analysis. The system may also, or instead, determine a vendor category using the vendor token and assign that category to the SDK. Weighting factors may be applied to the scores for the categories associated with the functionality tokens and vendor tokens. | 2022-04-28 |
20220129582 | DATA ANONYMIZATION FOR DATA LABELING AND DEVELOPMENT PURPOSES - A method and system are disclosed for anonymizing data for labeling and development purposes. A data storage backend has a database of non-anonymous data that is received from a data source. An anonymization engine of the data storage backend generates anonymized data by removing personally identifiable information from the non-anonymous data. These anonymized data are made available to human labelers who manually provide labels based on the anonymized data using a data labeling tool. These labels are then stored in association with the corresponding non-anonymous data, which can then be used for training one or more machine learning models. In this way, non-anonymous data having personally identifiable information can be manually labelled for development purposes without exposing the personally identifiable information to any human labelers. | 2022-04-28 |
20220129583 | DATA PROTECTION AS A SERVICE - Embodiments of the present disclosure provide methods, apparatus, systems, computing devices, and computing entities for predictive data protection using a data protection policy determination machine learning model. In one embodiment, a method is provided comprising: processing a historical data corpus using the data protection policy determination machine learning model to generate a dynamic data protection policy update describing inferred data protection instructions; determining an attestation subset of the inferred data protection instructions by comparing the instructions and prior data protection instructions described by an existing data protection policy; for each inferred data protection instruction in the attestation subset, determining a per-instruction attestation determination based on end-user feedback; generating an updated data protection policy by updating the existing policy in accordance with each inferred instruction in the attestation subset whose per-instruction attestation determination describes an affirmative attestation determination; and performing the predictive data protection using the updated data protection policy. | 2022-04-28 |
20220129584 | METHODS AND SYSTEMS FOR MONITORING A RISK OF RE-IDENTIFICATION IN A DE-IDENTIFIED DATABASE - Methods and systems for monitoring a risk of re-identification for a dataset de-identified from a source database containing information identifiable to individuals are described. A first aspect of the disclosure relates to a method comprising: providing a graphical user interface (GUI) configured to receive as input the dataset and updates to said dataset; providing as input to the GUI the dataset; estimating a risk of re-identification for the dataset or a subset of the database; providing as input to the GUI the updates to said dataset; regularly monitoring whether the risk of re-identification for at least one of the updated dataset, the subset of the database and the updates is below a predetermined dataset risk threshold; and if the risk of re-identification has reached or exceeded the predetermined dataset risk threshold, notifying the user. | 2022-04-28 |
20220129585 | SYSTEMS, METHODS, AND NON-TRANSITORY COMPUTER-READABLE MEDIA FOR SECURE INDIVIDUAL IDENTIFICATION - A privacy-enhancing system, method, and non-transitory computer-readable medium for securely identifying an individual over time without retaining sensitive biometric data. In one embodiment, the system includes a local identity server including an electronic processor, a communication interface, and a memory. The electronic processor is configured to initiate a personalization of a partner-specific identification vehicle that identifies the individual based at least in part on an individual global unique identifier associated with the individual, receive a request for a service from the individual via the communication interface, receive consent and registration information from the individual via the communication interface, generate an identity confirmation that confirms an identity of the individual, and output the identity confirmation via the communication interface. The individual global unique identifier is generated from information derived from the registration information and the individual global unique identifier is not indicative of personally identifiable information (PII) of the individual. | 2022-04-28 |
20220129586 | METHODS AND SYSTEMS FOR PROCESSING AGENCY-INITIATED PRIVACY REQUESTS - Systems and methods for processing privacy requests related to information privacy are described. A server computing system may be configured to receive data related to a privacy request for personal information associated with a person, the data related to the privacy request sent by an agent of the person to a company from a computer system associated with the agent, the agent acting on behalf of the person as related to the information privacy, the personal information stored in one or more databases associated with the server computing system; confirm that the person authorizes the agent to act on behalf of the person as related to the information privacy; and based on successful confirmation that the person authorizes the agent, process the privacy request on behalf of the company. | 2022-04-28 |
20220129587 | DATA PROCESSING SYSTEMS FOR VALIDATING AUTHORIZATION FOR PERSONAL DATA COLLECTION, STORAGE, AND PROCESSING - In particular embodiments, a data processing consent management system may be configured to utilize one or more age verification techniques to at least partially authenticate the data subject's ability to provide valid consent (e.g., under one or more prevailing legal requirements) in order to collect, store, and or process the subject's personal data. For example, according to one or more particular legal or industry requirements, an individual (e.g., data subject) may need to be at least a particular age (e.g., an age of majority, an adult, over 18, over 21, over 13, or any other suitable age) in order to provide valid consent. Data processing systems may generate and store one or more consent records memorializing valid consent for data processing from data subjects in response to confirming that the data subject is old enough to provide such consent. | 2022-04-28 |
20220129588 | Data Protection via Commutative Erasure Coding in a Geographically Diverse Data Storage System - Commutative coding in a geographically diverse data storage system is disclosed. Commutative coding can achieve a same result as more conventional hierarchical erasure coding of data, but can be more efficient. Commutative coding can employ Galois Field (GF) based bit-matrix operations. The bit-matrix operations can employ a reduced GF order in associated with expanding elements of input matrixes. A reduced GF order can perform matrix operations at a lower complexity, e.g., employing AND operations for a GF(2) in contrast to XOR operations for a GF(2 | 2022-04-28 |
20220129589 | EXECUTING CONTAINERS DURING IDLE STATES - Example wood panel assemblies that are disposed on electronic devices are disclosed. In an example, an electronic device includes a palm rest, and a trackpad disposed on the palm rest. In addition, the electronic device includes a wood panel assembly mounted on top of the palm rest and the trackpad. The wood panel assembly includes a wood veneer panel including a top surface and a bottom surface. The bottom surface covers the palm rest and the trackpad. In addition, the wood panel assembly includes a fabric material secured along the bottom surface. | 2022-04-28 |
20220129590 | GENERATING ATTACK GRAPHS IN AGILE SECURITY PLATFORMS - Implementations of the present disclosure include providing a graph representative of a network, a set of nodes representing respective assets, each edge representing one or more lateral paths between assets, the graph data including configurations affecting at least one impact that has an effect on an asset, determining multiple sets of fixes for configurations, each fix having a cost associated therewith, incorporating fix data of the sets of fixes into the graph, defining a set of fixes including one or more fixes from the multiple sets of fixes by defining an optimization problem that identifies one or more impacts that are to be nullified and executing resolving the optimization problem to define the set of fixes, each fix in the set of fixes being associated with a respective configuration in the graph, and scheduling performance of each fix in the set of fixes based on one or more operational constraints. | 2022-04-28 |
20220129591 | PROTECTION OF A SECURED APPLICATION IN A CLUSTER - An information handling system may include at least one processor; and a memory coupled to the at least one processor. The information handling system may be configured to: execute an application on the at least one processor, wherein at least a portion of data of the application is stored encrypted in a secure enclave region of the memory; and securely transfer execution of the application to a second information handling system by: transmitting platform configuration register (PCR) measurement data to the second information handling system; and transmitting the data of the application to the second information handling system; wherein the PCR measurement data is usable by the second information handling system to perform a remote attestation, the remote attestation including verification of the PCR measurement data to confirm that the data of the application has not been changed. | 2022-04-28 |
20220129592 | CARTRIDGE DATA STORAGE WITH INFORMATION-THEORETIC SECURITY - A secure cartridge-based storage system includes a set of read/write control electronics on a shared controller adapted to removably couple with each of a plurality of storage cartridges. Data blocks within primary non-volatile memory of the cartridge-based storage system collectively comprise a main store with information-theoretic security. The shared controller incorporates various controls for providing selective data access to individual data magazines and/or cartridges as well as for partitioning user data and writing the partitioned data according to an information-theoretic security scheme and reading the partitioned data and reconstructing the user data from the partitioned data. | 2022-04-28 |
20220129593 | LIMITED INTROSPECTION FOR TRUSTED EXECUTION ENVIRONMENTS - A system includes a memory, a processor in communication with the memory, a supervisor, and a trusted execution environment (“TEE”). The TEE includes an introspection module and is configured to execute the introspection module on a workload according to an introspection security policy. Additionally, the TEE is configured to generate an introspection result for the workload. The introspection security policy specifies at least one of (i) a portion of the TEE that is exposed to the introspection module and (ii) at least one of an accelerator and a device the introspection module has access to. Additionally, the introspection module is configured to validate the workload. The introspection result is one of a passing result and a failing result. | 2022-04-28 |
20220129594 | DEPLOYABLE SCREEN PROTECTION STRUCTURE - An apparatus for a deployable screen protections structure includes a body and a strap of a wearable device, where a display screen is positioned on a top surface of the body. The body also include a protection structure integrated into the strap of the wearable device, wherein the protection structure is deployable over the top surface of the body. | 2022-04-28 |
20220129595 | DESIGN AND OPTIMIZATION METHOD OF POROUS STRUCTURE FOR 3D HEAT DISSIPATION BASED ON TRIPLY PERIODIC MINIMAL SURFACE (TPMS) - A design and optimization method of a porous structure for 3D heat dissipation based on triply periodic minimal surface (TPMS) belongs to the field of computer-aided design. Firstly, a porous structure is established through implicit function presentation of TPMS. Secondly, a heat dissipation problem is converted into a minimization problem of thermal compliance under given constraints according to a steady-state heat conduction equation. Then, parametric functions are directly computed through a global-local interpolation method. Finally, period optimization and wall-thickness optimization are conducted for a modeling problem to obtain an optimized porous shell structure with smooth period and wall-thickness change. The porous structure of the present invention greatly improves the heat dissipation performance, and efficiency and effectiveness of heat conduction. The porous structure designed by the present invention has the characteristics of smoothness, full connectivity, controllability and quasi-self-supporting. These characteristics ensure the applicability and the manufacturability of this structure. | 2022-04-28 |
20220129596 | A COMPUTERIZED METHOD OF PRODUCING A CUSTOMIZED DIGITAL INSTALLATION GUIDE FOR BUILDING A SEALED INSTALLATION OF ONE OR MORE CABLES, PIPES OR WIRES BY ASSEMBLING ORDERED AND DELIVERED TRANSIT COMPONENTS TO FORM A TRANSIT - A computerized method ( | 2022-04-28 |
20220129597 | METHOD AND SYSTEM FOR EVALUATING DESIGNS FOR A FIRE SUPPRESSANT SYSTEM - A method and system for evaluating designs for a fire suppressant system for a space, the method comprising: receiving system requirements defining constraints of the system; obtaining a model of a design designed to satisfy the system requirements; calculating key performance indicators for the model; and evaluating the design by comparing the key performance indicators with the system requirements. | 2022-04-28 |
20220129598 | SHAPE SYSTEMS AND METHODS - Systems and methods that fundamentally redefine the way shapes are represented, indexed, queried and operated upon. Visual rules (shape rules drawn in a 2D or 3D modeling system) dominate over symbolic rules (instructions defined in some programming language), providing a robust technology for professionals who use drawings and visual models to develop and communicate their ideas. The system structure includes a communication/control layer, a shape rule compiler, a design initializer, a maximal line modeler, shape embedding engine, and a rule application unit. | 2022-04-28 |
20220129599 | Method, System and Software for Selecting an E/E Arrangement - Method and system for selecting an E/E arrangement from a plurality of E/E arrangement variants. An input block receives wiring and component data for a plurality of E/E arrangement variants. For each E/E arrangement variant, a calculation block generates a first data record for a first current path starting with a first wire from a starting component and conducting through one or more intervening components to an end point. An output block generates a first data log of the sequence of wires and intervening components along the first current path and any alternate current paths stemming from the intervening components. The output block further calculates a failure probability value for each E/E arrangement and selects the E/E arrangement from the plurality of E/E arrangement variants based on, in part, their calculated failure probability values. | 2022-04-28 |
20220129600 | SYSTEMS AND METHODS FOR GROWTH-BASED DESIGN - Systems and methods are disclosed for generating designs for mechanical parts in a computer aided design (CAD) context. One method includes generating a model of a mechanical part, the model including one or more cells, wherein each cell is comprised of a plurality of parameterized representations, each of the plurality of parameterized representations representing a material property; determining, for each cell, a cell-specific parameter value for each of the parameterized representations; comparing, for each cell, each of the cell-specific parameter values to a corresponding threshold parameter value associated with each of the representations of the material properties; and generating at least one additional cell or removing at least one of the one or more cells based on the comparison of each cell-specific parameter value to the corresponding threshold parameter value. | 2022-04-28 |
20220129601 | TECHNIQUES FOR GENERATING A CONFIGURATION FOR ELECTRICALLY ISOLATING FAULT DOMAINS IN A DATA CENTER - A computer system may receive a layout of a data center, the layout of the data center identifying physical locations of a plurality of server racks, electrical distribution feeds, and uninterruptible power supplies. The computer system may receive a fault domain configuration for the datacenter, the fault domain configuration identifying virtual locations of a plurality of logical fault domains for distributing one or more instances so that the instances are stored on independent physical hardware devices within a single availability fault domain. The computer system may determine the configuration for the data center by assigning the plurality of fault domains to a plurality of electrical zones, wherein each electrical zone provides a redundant electrical power supply across the plurality of logical fault domains in an event of a failure of one or more electrical distribution feeds. The computer system may display the configuration for the data center on a display. | 2022-04-28 |
20220129602 | CONSTRAINT PROGRAMMING METHODS FOR OPTIMAL DESIGN CONFIGURATIONS OF DISTRIBUTION SYSTEMS - A method for optimizing a layout for a distribution pipe. The method includes: specifying a problem domain of the system and encoding the problem domain into a Constraint Programming “CP” model, producing a constraint program solver and using said solver to explore the space in which the system is to be positioned and identify a problem or problems in said space, finding a solution to said problem or problems, and checking if said solution is valid and wherein if said solution is valid. In some examples described herein, the method further comprises the step of visualising said valid solution by converting the solution into a 3D visual format and outputting the valid solution in said 3D format. | 2022-04-28 |
20220129603 | MOTOR WINDING INSULATION DIAGNOSIS AND PROGNOSIS USING RESISTANCE SIMULATION METHOD - Described herein is a fast and high-fidelity fault model of PMSM which can describe the dynamic performance of motors accurately, using an equivalent resistance simulation method to simulate the number of short turns of stator winding with the help of an established motor model and the given relationship between the value of the resistance and the number of short turns of stator winding, fault diagnosis and prognosis of the experimental motor is conducted based on the Hilbert transform method under a Riemann/Lebesgue sampling framework, which results in low computation and small uncertainty accumulation. | 2022-04-28 |
20220129604 | SENSORY DATA GENERATOR - Certain aspects and features provide generation or simulation of sensory data that would otherwise come from Internet-of-things (IoT) sensors in reproducible and controllable way. Thus, the response of a system to very large numbers of sensors can be tested without acquiring and deploying a very large number of sensors for test and development purposes. In some examples, a processing device coupled to a network interface identifies a stored function of time describing a locally sensed property for a simulated sensor. The locally sensed property corresponds to at least one event taking place in a virtual environment. The processing device can determine values of an input variable produced by the stored function of time. The values can be wrapped in a communication protocol to produce messages that are transmitted over the network interface. | 2022-04-28 |
20220129605 | OPTIMIZATION DEVICE, OPTIMIZATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING OPTIMIZATION PROGRAM - An optimization device of optimizing a shape of an object, the optimization device being configured to perform an optimization processing, the optimization processing including: obtaining an objective function equation based on a contribution to a predetermined characteristic of the object in each element of a plurality of elements, each of the plurality of elements being an element obtained by dividing the object arranged in a design region; and optimizing the shape of the object by determining, for the each element of the object, whether to arrange the each element of the object based on the obtained objective function equation. | 2022-04-28 |
20220129606 | DIGITAL TWIN LUBRICATION SIMULATION - Systems, methods and computer program products leveraging digital twin modeling and cognitive computing to predict lubrication replacement for a physical asset. Predictions of lubrication replacement consider one or more various parameters such as operating conditions, usage parameters, the surrounding environment, overall health and state of repair of the physical asset, lubricant properties and historically collected data from the physical asset (or similarly comparable assets). Timing for optimal lubrication replacement is identified using the collected data of the physical asset, along with historical data, to simulate changes in a state of lubricants and lubricated parts within a physical asset using digital twin modeling to make predictions how one or more actions upon the physical asset impact the health, stability and/or longevity of the lubricant's lifespan. Based on the simulation results, recommended action(s) suitable for increasing and optimizing the overall life of the lubrication are provided and/or implemented. | 2022-04-28 |
20220129607 | COMPUTER-READABLE RECORDING MEDIUM STORING MACHINE LEARNING PROGRAM, INFORMATION PROCESSING APPARATUS, AND MACHINE LEARNING METHOD - The present invention relates to a machine learning program for causing a computer to execute a process. In an example, the process executed by the computer when the program is executed includes: acquiring a current distribution image by an equivalent circuit simulation based on circuit information; acquiring a shape image that indicates a shape of a circuit based on the circuit information; acquiring an EMI value by electromagnetic field analysis based on the circuit information; and generating an EMI prediction model by machine learning based on training data that includes the current distribution image, the shape image, and the EMI value. | 2022-04-28 |
20220129608 | MACHINE-LEARNING-BASED ASSESSMENT FOR ENGINEERED RESIDUAL STRESS PROCESSING - Automated assessment of material-processing operations employs a deep feature-recognition network engine including a multilayer architecture. An input layer includes a plurality of nodes operative to receive measurement data comprising a work-profile data set representing a mechanical response over a displacement to a cold-working material-processing operation effecting the displacement, by a target portion of a workpiece. A plurality of layers are operative to produce activations of nodes based on feature sets derived from the measurement data, and to further produce an output based on the activations. The output represents an assessment of performance of the cold-working material-processing operation. | 2022-04-28 |
20220129609 | HYBRID METHOD FOR RESERVOIR SIMULATION - A method for reservoir simulation is disclosed. The method includes selecting a coarse grid size for a plurality of grid blocks in a reservoir model of a reservoir, computing, by a computer processor and based at least on a fractional flow curve of oil and water, a water saturation at a water front within a grid block of the plurality of grid blocks and an average water saturation of the grid block, and computing, by the computer processor and based at least on the water saturation at the water front within the grid block and the average water saturation of the grid block, a water saturation distribution in the reservoir by solving reservoir simulator equations, wherein solving the reservoir simulator equations comprises computing a single water saturation value for each of the plurality of grid blocks based on the coarse grid size. | 2022-04-28 |
20220129610 | METHOD AND SYSTEM FOR OPTIMISING DESIGN OF A FIRE SUPPRESSANT SYSTEM - A method and system for optimizing design of a fire suppressant system for a space. The method includes: receiving system requirements defining constraints of the system; defining system parameters including required coverage of a fire suppressing agent and required flow rate of the agent based on the system requirements; searching a database of system components and selecting components able to satisfy the system requirements and provide the required coverage and flow rate; optimally combining the selected components into a system layout; representing the system layout as a three dimensional, 3D, model; performing three dimensional computational fluid dynamic, CFD, modelling on the 3D model to evaluate performance of the system layout; and determining, based on the CFD modelling, whether the system layout is an optimal design for the space. | 2022-04-28 |
20220129611 | Method to Compute Timing Yield and Yield Bottleneck using Correlated Sample Generation and Efficient Statistical Simulation - Various embodiments of a method and apparatus for determining parametric timing yield and bottlenecks are disclosed which take into account correlation between electrical circuit paths through common timing arcs of an integrated circuit chip under design. Monte Carlo samples of timing arc delays are generated and used in computing timing yield and identify yield bottlenecks. | 2022-04-28 |
20220129612 | METHODS OF ROUTING CLOCK TREES, INTEGRATED CIRCUITS AND METHODS OF DESIGNING INTEGRATED CIRCUITS - A method of routing a clock tree including a plurality of clock nets of an integrated circuit, where each of the plurality of clock nets includes at least one clock repeater, includes determining a level of a clock net of the plurality of clock nets based on a number of clock gating cells that a clock signal passes through until the clock net receives the clock signal from a clock source and routing a plurality of conductive lines in each of the plurality of clock nets by applying different routing rules to clock nets having different levels based on the determined level. Each of the plurality of clock nets is configured to transfer the clock signal to a plurality of synchronous elements or another clock net. The plurality of synchronous elements operate in synchronization with the clock signal and are included in the integrated circuit. | 2022-04-28 |
20220129613 | IDENTIFYING TEST COVERAGE GAPS FOR INTEGRATED CIRCUIT DESIGNS BASED ON NODE TESTABILITY AND PHYSICAL DESIGN DATA - Test coverage for a circuit design may be determined by obtaining node testability data and physical location data for each node of a plurality of nodes in the circuit design. A determination is made that one or more low test coverage areas within the circuit design include untested nodes based on the node testability data and the physical location data of each node of the plurality of nodes. Test coverage data is generated for the circuit design including at least an identification of the one or more low test coverage areas. | 2022-04-28 |
20220129614 | METHOD AND SYSTEM OF FORMING SEMICONDUCTOR DEVICE - A method of forming a semiconductor device includes: providing a first circuit having a plurality of circuit cells; analyzing a loading capacitance on a first pin cell connecting a first circuit cell and a second circuit cell in the plurality of circuit cells to determine if the loading capacitance of the first pin cell is larger than a first predetermined capacitance; replacing the first pin cell by a second pin cell for generating a second circuit when the loading capacitance is larger than the first predetermined capacitance, wherein the second pin cell is different from the first pin cell; and generating the semiconductor device according to the second circuit. | 2022-04-28 |
20220129615 | ANNOTATION CREATION, STORAGE, AND VISUALIZATION METHODS FOR KNOWLEDGE MANAGEMENT IN EXTERNAL CONTEXTS - The present disclosure relates to methods for creating, transmitting, and retrieving annotations within web documents in web browsers and annotation servers. This patent discusses the rationale for employing these methods with use case and sequence diagrams as well as verbal explanations. This rationale includes sophisticated crowd reputation management, discussion, and concept linking. Methods and rationale for a web browser to transmit annotation highlighted text selections, annotation comments, uniform resource locators (URLs), document object model (DOM) contexts, screenshots with marked annotation highlighted text, and annotation symbols to an annotation server are presented. In addition, methods for the annotation server to retrieve, compile, and transmit annotation objects with various elements to web browsers are also presented. | 2022-04-28 |
20220129616 | WEB BROWSER EXTENSION FOR CREATING ANNOTATIONS REFERENCEABLE FROM EXTERNAL CONTEXTS - The present disclosure relates to a non-transitory computer readable medium for a separate context viewing, organization, and management area for annotations that have been created. The rationale for such computer readable medium is discussed in detail. These annotations can be created on webpages or PDF documents available at a uniform resource locator (URL) anywhere on the World Wide Web. Once these annotations are created, having a system to manage the life cycle of these annotations in various contexts separate from the original web page is beneficial. This annotation life cycle and the rationale for various steps within this life cycle is discussed in detail. The present disclosure also describes some pertinent filtering and display technologies for annotations that have been created. | 2022-04-28 |
20220129617 | CONTROLLING THE DISPLAY OF DIACRITIC MARKS - Disclosed are methods, systems, and computer-readable medium to perform operations including: generating a plurality of character glyphs of a language that uses diacritic marks; generating a plurality of diacritic mark glyphs of the diacritic marks of the language; anchoring the plurality of diacritic mark glyphs to the plurality of character glyphs to create a set of glyphs for the language; creating, based on the set of glyphs, a duplicate set of glyphs comprising a plurality of duplicate character glyphs and a plurality of duplicate diacritic mark glyphs; editing at least one of the plurality of duplicate diacritic mark glyphs to remove visual appearance capability; designating the set of glyphs as a diacritics reveal font and the edited duplicate set of glyphs as a diacritics conceal font; and providing the diacritics reveal font and the diacritics conceal font for output on a graphical user interface (GUI) displayed on a display device. | 2022-04-28 |
20220129618 | TEXT SCRAMBLING/DESCRAMBLING - Disclosed are methods, systems, and computer-readable medium to perform operations including: generating a font that includes a plurality of glyphs for characters of a language; generating a plurality of duplicate glyphs for the characters, wherein each duplicate glyph is associated with: (i) a respective letterform representing one of the characters, and (ii) a respective glyph code; swapping the respective letterforms of the plurality of duplicate glyphs such that the respective letterforms are mismatched with the respective glyph codes; designating the plurality of duplicate glyphs as a scrambling font style of the font; and providing a representation of the font for output on a graphical user interface (GUI) displayed on a display device. | 2022-04-28 |
20220129619 | Systems and Methods for Applying Effects to Design Elements - Described herein is a computer implemented method. The method comprises detecting initiation of a curved text effect in respect of a selected text string of a design; determining a radius; processing the selected text string to split the selected text string into one or more text string elements, each text string element being associated with a glyph; calculating, for each text string element, an element transformation that includes element rotation data and element position data, the element transformation being based on the radius; and rendering each text string element by, for a given text string element, rendering the glyph that the given text string element is associated with based on the element transformation calculated for the given text string element. | 2022-04-28 |
20220129620 | SYSTEMS AND METHODS FOR CO-BROWSING - The present disclosed technology relates to systems and methods for synchronizing the website displayed by two computing devices. Embodiments of the disclosed technology include methods for transmitting the contents of a Document Object Model displayed on a customer device to a customer service device. Embodiments of the disclosed technology further include methods to transmit Shadow DOM elements from a customer device to a customer service device. | 2022-04-28 |
20220129621 | BERT-BASED MACHINE-LEARNING TOOL FOR PREDICTING EMOTIONAL RESPONSE TO TEXT - Certain embodiments involve using machine-learning tools that include Bidirectional Encoder Representations from Transformers (“BERT”) language models for predicting emotional responses to text by, for example, target readers having certain demographics. For instance, a machine-learning model includes, at least, a BERT encoder and a classification module that is trained to predict demographically specific emotional responses. The BERT encoder encodes the input text into an input text vector. The classification module generates, from the input text vector and an input demographics vector representing a demographic profile of the reader, an emotional response score. | 2022-04-28 |
20220129622 | WEB-BASED APPLICATION USER INTERFACE (UI) IN-CONTEXT EDITOR - Systems and methods that may be used to provide in-context editing of a webpage-based user interface (UI). | 2022-04-28 |
20220129623 | PERFORMANCE CHARACTERISTICS OF CARTRIDGE ARTIFACTS OVER TEXT PATTERN CONSTRUCTS - Embodiments of the present invention are directed to evaluating the performance characteristics of annotator configurations against text pattern constructs in unstructured text. In a non-limiting embodiment of the invention, unstructured text is received by a processor. A text pattern construct is identified in the unstructured text and a first performance characteristic of an annotator is determined based on the text pattern construct. The text pattern construct is converted to a natural language text and a second performance characteristic of the annotator is determined based on the natural language text. A delta is determined between the first performance characteristic and the second performance characteristic. An alternative annotator configuration is identified for a portion of the unstructured text comprising the text pattern construct. | 2022-04-28 |
20220129624 | BALLOT DUPLICATION SYSTEM AND METHODS THEREOF - A computer-implemented system for on-screen ballot duplication is disclosed, that may be deployed for generating a revised ballot that satisfies predetermined rules or thresholds for further processing. | 2022-04-28 |
20220129625 | DOMAIN KNOWLEDGE BASED FEATURE EXTRACTION FOR ENHANCED TEXT REPRESENTATION - Provided are a method, system, and computer program product for representing text, in which a text is received and analyzed by utilizing a pre-trained embedding model and a feature vector model, wherein selected words in the text have corresponding weights. Operations whose parameters include weights of a feature vector and an embedding are performed to generate a weighted embedding data structure. A summation is performed of all corresponding columns of a plurality of rows of the weighted embedding data structure to generate a data structure that represents the text. The data structure that represents the text is utilized to generate at least one of a classification metadata for the text and a summarization of the text. | 2022-04-28 |
20220129626 | SYSTEMS AND METHODS FOR MULTI-SCALE PRE-TRAINING WITH DENSELY CONNECTED TRANSFORMER - Embodiments described herein propose a densely connected Transformer architecture in which each Transformer layer takes advantages of all previous layers. Specifically, the input for each Transformer layer comes from the outputs of all its preceding layers; and the output information of each layer will be incorporated in all its subsequent layers. In this way, a L-layer Transformer network will have L(L+1)/2 connections. In this way, the dense connection allows the linguistic information learned by the lower layer to be directly propagated to all upper layers and encourages feature reuse throughout the network. Each layer is thus directly optimized from the loss function in the fashion of implicit deep supervision. | 2022-04-28 |
20220129627 | MULTI-PERSONA SOCIAL AGENT - A system providing a multi-persona social agent includes a computing platform having a hardware processor, a system memory storing a software code, and multiple neural network (NN) based predictive models accessible by the software code. The hardware processor executes the software code to receive input data corresponding to an interaction with a user, determine a generic expression for use in the interaction, and identify one of the character personas as a persona to be assumed by the multi-persona social agent. The software code also generates, using the generic expression and one of the NN based predictive models corresponding to the persona to be assumed by the multi-persona social agent, a sentiment driven personified response for the interaction with the user based on a vocabulary, phrases, and one or more syntax rules idiosyncratic to the persona to be assumed, and renders the sentiment driven personified response using the multi-persona social agent. | 2022-04-28 |
20220129628 | ARTIFICIAL INTELLIGENCE SYSTEM FOR BUSINESS PROCESSES - An artificial intelligence system for business processes comprises an input unit connected to a communication network and configured to receive a conversational input comprising a sentence; a decision-making engine configured to receive at input the sentence and to select an adequate reply from a database of possible replies or, in the case of absence of an adequate reply, to send an absent reply signal; an automatic reply unit configured to receive at input the selected adequate reply and to send the adequate reply to an output unit connected to the communication network; an operator interface unit connected to the output unit and configured to be activated in case of an absent reply signal for the generation of a manual reply by one or more operators in charge or for the manual selection of an adequate reply already present in the database. | 2022-04-28 |
20220129629 | SYSTEMS AND METHODS FOR UNSUPERVISED PARAPHRASE GENERATION - Embodiments described herein provide dynamic blocking, a decoding algorithm which enables large-scale pretrained language models to generate high-quality paraphrases in an un-supervised setting. Specifically, in order to obtain an alternative surface form, when the language model emits a token that is present in the source sequence, the language model is prevented from generating the next token that is the same as the subsequent source token in the source sequence at the next time step. In this way, the language model is forced to generate a paraphrased sequence of the input source sequence, but with mostly different wording. | 2022-04-28 |
20220129630 | Method For Detection Of Malicious Applications - Systems and computerized and computer-implemented methods operate to detect malicious applications (APPs). A method, which is performed on a suitably designed computerized system, comprises: obtaining text associated with an application; inputting a representation of the text into a classifier; and, the classifier processing the representation of the text. The classifier processes the representation of the text by processes including: applying weights to words of the text for which the classifier has provided weights by a words attention process, such that the weighted words of each sentence form a sentence vector; analyzing the sentence vectors by a sentence attention process to obtain a single summary vector for the sentence vectors; and, from the single summary vector, determining a score that the application is malicious. | 2022-04-28 |
20220129631 | RECOMMENDING ACTION(S) BASED ON ENTITY OR ENTITY TYPE - Implementations are described herein for recommending actions based on entity or entity type. In various implementations, a partial free-form natural language input may be received from a user at an input component of a computing device. The partial free-form natural language input may identify an entity without identifying a responsive action and may be directed by the user to an automated assistant that operates at least in part on the computing device. The partial free-form natural language input may be analyzed to identify the entity. Based on the identified entity, a plurality or superset of candidate responsive actions may be identified, filtered, and/or ranked based on one or more signals. The automated assistant may then provide output that recommends one or more of the candidate responsive actions based on the ranking and/or filtering. | 2022-04-28 |
20220129632 | NORMALIZED PROCESSING METHOD AND APPARATUS OF NAMED ENTITY, AND ELECTRONIC DEVICE - A normalized processing method of a named entity includes: obtaining first text data; recognizing a named entity from the first text data; determining whether a first standard named entity exists in a standard named entity database according to the named entity; determining the first standard named entity as a normalized representation of the named entity in response to determining that the first standard named entity exists in the standard named entity database; and obtaining a second standard named entity from the standard named entity database and determining an obtained second standard named entity as the normalized representation of the named entity in response to determining that the first standard named entity does not exist in the standard named entity database. | 2022-04-28 |
20220129633 | MULTI-TASK LEARNING OF QUERY INTENT AND NAMED ENTITIES - Methods and systems for performing multi-task learning of query intent and named entities are provided. One method includes receiving a query comprising query text. The method further includes providing the query text to a neural network model implemented on a computing system, the neural network model having a plurality of layers, wherein at least one layer comprises a plurality of loss functions including a named entity tag learning loss function and an intent classification loss function. The method also includes obtaining, from the neural network model, an identification of a named entity and a query intent derived from the query text. A query response may be formulated based, at least in part, on the named entity and query intent. | 2022-04-28 |
20220129634 | METHOD AND APPARATUS FOR CONSTRUCTING EVENT LIBRARY, ELECTRONIC DEVICE AND COMPUTER READABLE MEDIUM - The present disclosure provides a method and apparatus for constructing an event library, which relate to the technical fields of deep learning, natural language processing, big data, and the like. An implementation includes: acquiring at least one event text data, the at least one event text data being to be assigned to a text library; obtaining an extraction event name based on the event text data; performing a match between the extraction event name and event information in the text library, to obtain a recalled event in the text library; detecting, based on the recalled event, whether the extraction event name meets a unifying condition; and in response to detecting that the extraction event name does not meet the unifying condition, obtaining a new event name in the event library based on the extraction event name, and adding the event text data as a new event into the text library. | 2022-04-28 |
20220129635 | SEMANTIC MODEL INSTANTIATION METHOD, SYSTEM AND APPARATUS - The present invention provides a semantic model instantiation method, system and apparatus, including the following steps: S | 2022-04-28 |
20220129636 | CASCADED FACT-BASED SUMMARIZATION - An embodiment calculates a point of view (POV) value for a subportion of an item of media content, including evaluating user inputs related to an automatically detected POV of the subportion of the item. The embodiment also calculates a non-factual cost for the subportion of the item indicative of an amount of the subportion of the item that lacks support in a fact-based corpora. The embodiment also performs a cascaded summarization process comprising generating a summary of the item using the subportion of the item and a summarization technique, analyzing the summary using a fact-checking algorithm to determine whether the summary satisfies a factual score threshold, and performing a next iteration of the cascaded summarization process while the summary fails to satisfy the factual score threshold. The embodiment also communicates a summary satisfying the factual score threshold to a user device. | 2022-04-28 |
20220129637 | COMPUTERIZED SELECTION OF SEMANTIC FRAME ELEMENTS FROM TEXTUAL TASK DESCRIPTIONS - A computer identifies, within a task description, words that correspond to semantic element labels for the task. The computer receives, from a task source operatively connected with the computer, a textual description of a task. The computer receives semantic element labels, element identification rules, and at least one reference sentence showing natural language semantic element label use. The computer parses the description to generate words for the semantic element label to generate, a Rule Match Values based on the element identification rules for the parsed words. The computer collects words having RMVs above a threshold into sets of associated of candidate words and generates, using a neural network trained on the reference sentence, Match Likelihood Values (MLVs) indicating whether the candidate words represent a semantic element label with which the candidate word is associated. The computer selects to represent the semantic element, the associated candidate word having a highest MLV. | 2022-04-28 |
20220129638 | Systems and Methods for Machine-Learned Prediction of Semantic Similarity Between Documents - Systems and methods of the present disclosure are directed to a method for predicting semantic similarity between documents. The method can include obtaining a first document and a second document. The method can include parsing the first document into a plurality of first textual blocks and the second document into a plurality of second textual blocks. The method can include processing each of the plurality of first textual blocks and the second textual blocks with a machine-learned semantic document encoding model to obtain a first document encoding and a second document encoding. The method can include determining a similarity metric descriptive of a semantic similarity between the first document and the second document based on the first document encoding and the second document encoding. | 2022-04-28 |
20220129639 | CONDITIONAL RESPONSES TO APPLICATION COMMANDS IN A CLIENT-SERVER SYSTEM - A user request is received (e.g., in natural language form) by a client device. In order to facilitate richer natural language understanding, a response-processing server handles interpretation of the request, rather than requiring the client device to interpret it. The response-processing server determines the various possible responses that client devices could make in response to the request based on (for example) the state of the application data, and/or the capabilities of the client devices. The response-processing server accordingly a response package that describes a number of different conditional responses that client devices could have to the request. The client device selects a response from the response package, executes the command (if possible), and provides the user with some representation of the response. | 2022-04-28 |
20220129640 | CREATION OF COMPONENT TEMPLATES BASED ON SEMANTICALLY SIMILAR CONTENT - Systems, methods and products for accessing a set of electronic document templates, identifying instances of common document content such as content items which are semantically similar, and generating component templates containing the common content. Semantically similar content may be identified by analyzing content for factors such as expressed sentiment, included keyphrases, recognizable entities, expressed topics, assigning values to content based on these factors, and determining similarity based on comparisons of the assigned values. Component templates may also be generated based on types of content that include identical text or images, content that has a predefined level of similarity rather than being identical, content that has common rules, scripting logic or variables, metadata, etc. The component templates may be generated automatically, or in response to user instructions. | 2022-04-28 |
20220129641 | UTILIZING MACHINE LEARNING MODELS TO IDENTIFY INSIGHTS IN A DOCUMENT - A device receives document information associated with a document, and receives a request to identify insights in the document information. The device performs, based on the request, natural language processing on the document information to identify words, phrases, and sentences in the document information, and utilizes a first machine learning model with the words, the phrases, and the sentences to identify information indicating abstract insights, concrete insights, and non-insights in the document. The device utilizes a second machine learning model to match the abstract insights with particular concrete insights that are different than the concrete insights, and utilizes a third machine learning model to determine particular insights based on the non-insights. The device generates an insight document that includes the concrete insights, the abstract insights matched with the particular concrete insights, and the particular insights determined based on the non-insights. | 2022-04-28 |
20220129642 | INTELLIGENT CONVERSATIONAL GATEWAY - A method comprises receiving at least one natural language input, and determining an intent of the at least one natural language input. In the method, a virtual assistant of a plurality of virtual assistants is recommended to respond to the at least one natural language input based at least in part on the determined intent, and the at least one natural language input is transmitted to the recommended virtual assistant. The determining and recommending are performed using one or more machine learning models, and the plurality of virtual assistants respectively correspond to a plurality of different functions of an enterprise. | 2022-04-28 |
20220129643 | METHOD OF TRAINING REAL-TIME SIMULTANEOUS INTERPRETATION MODEL BASED ON EXTERNAL ALIGNMENT INFORMATION, AND METHOD AND SYSTEM FOR SIMULTANEOUS INTERPRETATION BASED ON EXTERNAL ALIGNMENT INFORMATION - Provided is a method of training a real-time simultaneous interpretation model based on external alignment information, the method including: receiving a bilingual corpus having a source language sentence as an input text and a target language sentence as an output text; generating alignment information corresponding to words or tokens (hereinafter, words) in the bilingual corpus; determining a second action following a first action in the simultaneous interpretation model on the basis of the alignment information to generate action sequence information; and training the simultaneous interpretation model on the basis of the bilingual corpus and the action sequence information, wherein the first action and the second action represent a read action of reading the word in the input text or a write action of outputting an intermediate interpretation result corresponding to the read action performed up to a present. | 2022-04-28 |
20220129644 | APPARATUS AND METHOD FOR AUGMENTING TEXTUAL DATA - An apparatus for augmenting textual data according to an embodiment includes a data augmenter configured to generate augmented data by augmenting input textual data according to a data augmentation scheme decided based on a type of natural language processing task of the input textual data and a data classifier configured to classify the augmented data into a positive sample or a negative sample by determining whether or not the augmented data maintains label information of the input textual data based on one or more data classification criteria. | 2022-04-28 |
20220129645 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING SAME - An electronic device is provided. The electronic device includes an inputter configured to obtain an input sentence in a first language, a memory, and a processor, and the processor is configured to obtain a feature vector corresponding to the input sentence by inputting the input sentence to an encoder model, obtain a first latent vector by inputting the feature vector and a specific integer to an intermediate network, obtain information on a first output sentence in a second language different from the first language by inputting the first latent vector to a decoder model, obtain a second latent vector by inputting the feature vector and the information on the first output sentence to the intermediate network, and obtain information on a second output sentence in the second language by inputting the second latent vector to the decoder model. | 2022-04-28 |
20220129646 | FOREIGN LANGUAGE MACHINE TRANSLATION OF DOCUMENTS IN A VARIETY OF FORMATS - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for extracting text from an input document to generate one or more inference. Each inference box may be input into a machine learning network trained on training labels. Each training label provides a human-augmented version of output from a separate machine translation engine. A first translation may be generated by machine learning network. The first translation may be displayed in a user interface with respect to display of an original version of the input document and a translated version of a portion of the input document. | 2022-04-28 |
20220129647 | INFORMATION BEARING MEDIUM AND INFORMATION PROCESSING SYSTEM - An information processing system includes an information bearing medium and an information reading unit. The information bearing medium has a two-dimensional array of unit data zones. Marks are provided on some of the unit data zones so as to form a digital code. Mark patterns of any two Y-directional adjacent unit data zone strings based on the arrangement of marks in an X-direction differ from each other. The information reading unit generates a data string on the basis of a unit signal formed from a plurality of signals output from a group of detection units that detect the marks in synchronization and recognizes the digital code of the information bearing medium on the basis of a group of the data strings sequentially obtained from the array of the unit data zones. | 2022-04-28 |
20220129648 | DENDRITIC STRUCTURES AND TAGS - The disclosure features dendritic tags, and methods and systems for fabricating and using such tags. The methods can include obtaining at least one image of a dendritic tag attached to an article, analyzing the at least one image to identify a set of features associated with the dendritic tag, and comparing the set of features to stored information to identify the article. | 2022-04-28 |
20220129649 | Amusement ride and method for operating an amusement ride - The present invention relates to an amusement ride ( | 2022-04-28 |
20220129650 | PORTABLE RFID READER DEVICE INCLUDING CROSS YAGI ANTENNA - A portable RFID reader device includes a cross Yagi antenna having good signal reading characteristics regardless of the position of an RFID tag. In embodiments, a portable RFID reader device may include a reader body implemented as a portable type having a handle, and communicating with an RFID tag in a non-contact manner, and a cross Yagi antenna assembly connected to the reader body, and including a cross Yagi antenna transmitting and receiving an RF signal required for communication to and from the RFID tag in a non-contact manner. The cross Yagi antenna may include a plate-shaped first Yagi antenna disposed at an angle of −45 degrees with respect to a horizontal plane, and a second Yagi antenna disposed at an angle of 45 degrees with respect to the horizontal plane and arranged orthogonally and cross-coupled to the first Yagi antenna. | 2022-04-28 |
20220129651 | SYSTEM AND METHOD FOR ACCURATE BULK SCANNING OF RFID TAGS - A system to accurately and consistently read Radio-Frequency Identification (RFID) information from RFID tags placed upon objects. The system features a moving antenna or antenna array pointed toward a target detection zone. In some embodiments, a portal is constructed having electromagnetic shielding properties and containers carrying RFID tagged objects are loaded through the portal. In other embodiments, multiple antenna arrays are installed within the portal. Movement of antenna arrays may be provided using a non-electronic motor or actuator to suppress potential electromagnetic interference. A method of accurately and consistently reading RFID information from RFID sources by providing the antenna(s) and portal passing objects having RFID tags proximate the antenna(s) and through the portal, and optimizing the angle by which the antennas and/or antenna arrays may best read the RFID signals upon a target detection zone via movement of the antenna(s). | 2022-04-28 |
20220129652 | TECHNOLOGIES FOR PROVIDING MEDIA CONTROL DEVICE QUICK RESPONSE (QR) CODE FUNCTIONALITY - Technologies are disclosed for managing one or more quick response (QR) code-based media control device functions, such as configuring one or more consumer profiles related to the media control device. A QR code may be scanned, for example using a camera in communication with the media control device. The camera device may be integrally mounted with the media control device, or remotely mounted from the media control device. The media control device may interpret information conveyed by the QR code. One or more parameters for one or more consumer profiles for use on the media control device may be ascertained, perhaps for example based, at least in part, on the information. The media control device may configure at least a first consumer profile, perhaps for example using, at least in part, the one or more parameters. The first consumer profile may be implemented on the media control device. | 2022-04-28 |
20220129653 | DYNAMIC TWO-DIMENSIONAL CODE EVALUATION METHOD, DYNAMIC TWO-DIMENSIONAL CODE EVALUATION SYSTEM, AND DYNAMIC TWO-DIMENSIONAL CODE EVALUATION PROGRAM - A receiving unit receives configuration information for analyzing a set of a plurality of dynamically-displayed two-dimensional codes and evaluation information for evaluating the result of analysis, a photographing unit photographs a dynamically-displayed two-dimensional code, an analysis unit analyzes the photographed two-dimensional code based on the configuration information, and an evaluation unit evaluates the result of analysis in the analysis unit based on the evaluation information. | 2022-04-28 |
20220129654 | TWO-DIMENSIONAL BAR CODES THAT ARE BOTH INTENSITY-MODULATED AND ORIENTATION-MODULATED FOR TRANSMITTING SENSITIVE INFORMATION ALONG WITH NON-SENSITIVE INFORMATION - A dual-modulated QR code (DMQR code) is in the format of a conventional QR code but uses elongated markers instead of black squares in the code modules. The positions of the markers within the DMQR code represent a nonconfidential primary message, and the orientations of the markers within the modules of the DMQR code represent a confidential secondary message. | 2022-04-28 |
20220129655 | PROCESSING DEVICE, PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM - The present invention provides a processing apparatus ( | 2022-04-28 |
20220129656 | VEHICLE AND METHOD OF CONTROLLING THE SAME - A vehicle includes a first sensor including a capacitance sensor; a second sensor including an ultrasonic sensor; a storage configured to store ultrasonic pattern images; and a controller electrically connected to the first sensor, the second sensor and the storage and configured to: wake up the second sensor based on a user contiguous to the first sensor, obtain a fingerprint pattern image from the second sensor, according to a difference between an area value of a ridge area of the fingerprint pattern image and an area value of a valley area adjacent to the ridge area being less than a predetermined reference value, obtain result data by assigning a weight to the area value of the valley area, and according to the result data and the ultrasonic pattern image data matching more than a predetermined matching value by comparing the result data and ultrasonic pattern image data, recognize as a fingerprint corresponding to the user. | 2022-04-28 |
20220129657 | FINGERPRINT SENSOR PACKAGE AND SMARTCARD INCLUDING THE SAME - A fingerprint sensor package includes a package substrate including an upper surface in which a sensing region and a peripheral region surrounding the sensing region are defined, and a lower surface facing the upper surface; a plurality of first sensing patterns located are arranged in the sensing region, are apart from each other in a first direction, and extend in a second direction crossing the first direction; a plurality of second sensing patterns that are arranged in the sensing region, are apart from each other in the second direction, and extend in the first direction; a coating member covering the sensing region; an upper ground pattern in the peripheral region and apart from the coating member to surround the coating member in the first and second directions; and a controller chip on the lower surface of the package substrate; and a plurality of capacitors. | 2022-04-28 |
20220129658 | ULTRASONIC SENSOR AND DISPLAY APPARATUS INCLUDING THE SAME - An ultrasonic sensor comprises a substrate, a piezoelectric member disposed at the substrate and an upper electrode disposed on the piezoelectric member. The upper electrode includes a silver paste. | 2022-04-28 |
20220129659 | METHOD FOR PREPARING OPTICAL FINGERPRINT SENSOR, OPTICAL FINGERPRINT SENSOR AND DISPLAY SCREEN - An optical fingerprint sensor is provided. The optical fingerprint sensor includes a backplate structure layer, a pixel defining layer, and an organic photoelectric sensing layer, wherein the pixel defining layer is disposed on a side of the backplate structure layer; and a non-pixel region of the pixel defining layer is provided with a first non-pixel hole, and the organic photoelectric sensing layer is disposed in the first non-pixel hole. | 2022-04-28 |
20220129660 | SYSTEM AND METHOD OF ACQUIRING COORDINATES OF PUPIL CENTER POINT - A system and a method of calculating coordinates of a pupil center point are provided. The system for acquiring the coordinates of the pupil center point includes a first camera, a second camera, a storage and a processor. The first camera is configured to capture a first image including a face and output the first image to the processor, the second camera is configured to capture a second image including a pupil and output the second image to the processor, a resolution of the first camera is smaller than a resolution of the second camera, and the storage is configured to store processing data, and the processor is configured to: acquire the first image and the second image; extract a first eye region corresponding to an eye from the first image; convert the first eye region into the second image, to acquire a second eye region corresponding to the eye in the second image; and detect a pupil in the second eye region and acquire the coordinates of the pupil center point. | 2022-04-28 |
20220129661 | DATA COLLECTION METHOD, UNMANNED AERIAL VEHICLE (UAV) AND STORAGE MEDIUM - The present invention discloses a data collection method, an unmanned aerial vehicle (UAV) and a storage medium. The method is used for a vision chip of the UAV, the vision chip including a main operating system and a real-time operating system, and the method includes: generating, by the real-time operating system, a trigger signal; collecting, by the real-time operating system based on the trigger signal, flight control data of the UAV and controlling an image sensor to collect an image sequence; synchronizing, by the real-time operating system, a time of the main operating system with a time of the real-time operating system; and performing, by the main operating system, visual processing on the flight control data and the image sequence, to ensure that the flight control data and the image sequence are collected synchronously. By using the method, accuracy of data collected during controlling of the UAV can be improved. | 2022-04-28 |
20220129662 | SYSTEM AND METHOD FOR DETERMINING INFORMATION ABOUT OBJECTS USING MULTIPLE SENSORS - Apparatus and methods for determining information about one or more objects in a 3-dimensional (3D) space are disclosed. One aspect of the method includes defining a virtual ground plane within a monitored 3D space. The virtual ground plane is divided into a plurality of bins. Each bin has corresponding counter value. An object is detected in a respective image captured by each of a plurality of sensors. A respective line segment is selected corresponding to a respective light between each of the plurality of image sensors and the detected object. One or more bins of the virtual ground plane are selected onto which a respective projected line segment of each respective line segment overlap. Each counter value for each of the one or more selected bins is increased. A location of the object is determined based on a bin of the one or more bins having a highest counter value. | 2022-04-28 |
20220129663 | SYSTEM AND METHOD OF MONITORING ATTRIBUTES ASSOCIATED WITH USERS OF INFORMATION HANDLING SYSTEMS - In one or more embodiments, one or more systems, one or more methods, and/or one or more processes may determine that a user is in a presence of an information handling system (IHS); determine a digital image of a face of the user; determine an angle of the face of the user with respect to a vertical axis of a camera based at least on the digital image; determine that the face is facing a display associated with the IHS; determine an amount of time, which the user spends looking at the display; determine, via multiple sensors associated with the IHS, a heart rate and a respiratory rate associated with the user; determine that the user should move based at least on the first amount of time, the heart rate, the respiratory rate, and the angle; and display information indicating that the user should move. | 2022-04-28 |
20220129664 | DEEPFAKE VIDEO DETECTION SYSTEM AND METHOD - A deepfake video detection system, including an input data detection module of a video recognition unit for setting a target video; a data pre-processing unit for detecting eye features from the face in the target video; a feature extraction module for extracting eye features and inputting the eye features to a long-term recurrent convolutional neural network (LRCN); and then using a sequence of long-term and short-term memory (LSTM) of a learning module; performing sequence learning; using a state prediction module to predict the output of each neuron, and then using a long and short-term memory model to output the quantized eye state, then connecting to a state quantification module, and comparing the original stored data from the normal video and the quantified eye state information of the target video, and outputting the recognition result by an output data recognition module. | 2022-04-28 |
20220129665 | METHOD FOR TRAINING CONVOLUTIONAL NEURAL NETWORK, AND METHOD FOR FACE RECOGNITION AND DEVICE - The present disclosure provides a method for training a convolutional neural network and a method and device for face recognition. By arranging a first training sample set including a first data set and a second data set, the convolutional neural network is trained and may be applied to the face recognition method, an initial face image frame may be extracted from a face detection image, in the face recognition method, a portion above eyes is cropped from the initial face image frame to serve as a target face detection image, thus according to the target face detection image, predicted identity information corresponding to the target face detection image is determined, and then the target face detection image is compared with a face reference image corresponding to the predicted identity information for face recognition. | 2022-04-28 |
20220129666 | Anomaly Detector for Detecting Anomaly using Complementary Classifiers - Embodiments of the present disclosure disclose an anomaly detector for detecting an anomaly in a sequence of poses of a human performing an activity. The anomaly detector includes an input interface configured to accept input data indicative of a distribution of the sequence of poses, a memory configured to store a discriminative one-class classifier having a pair of complementary classifiers bounding normal distribution of pose sequences in a reproducing kernel Hilbert space (RKHS), a processor configured to embed the input data into an element of the RKHS and classify the embedded data using the discriminative one-class classifier, and an output interface configured to render a classification result. | 2022-04-28 |