34th week of 2022 patent applcation highlights part 51 |
Patent application number | Title | Published |
20220269795 | METHODS AND SYSTEMS TO AUTOMATICALLY GENERATE NATURAL LANGUAGE INSIGHTS FOR SOFTWARE COMPONENTS FROM CALCULATED SCORES - Systems and methods for automatically generating natural language insights for software components from calculated scores are provided. An exemplary method includes identifying the software component uniquely, identifying sources to gather information for the software component, accessing information for the software component from the identified sources, and tabulating the retrieved information. Support summary insights are generated based on the trained catalog of the natural language terms and the tabulated information and indicate a quality of support for the software component. Quality summary insights are generated based on the trained catalog of the natural language terms and the tabulated information and indicate about a quality of the software component. Security summary insights are generated based on the trained catalog of the natural language terms and the tabulated information of the software component and indicate how secure the software component is. | 2022-08-25 |
20220269796 | METHOD AND SYSTEM FOR SECURELY DEPLOYING AN ARTIFICIAL INTELLIGENCE MODEL - Methods and systems for securely deploying an artificial intelligence (AI) model. The system can identify one or more deficiencies of the AI model, and protect the AI model from being attacked by external data based upon the identifying. The system can be used for fraud detection based on tabular data, voice authentication, facial recognition, object detection, or a combination thereof. | 2022-08-25 |
20220269797 | SYSTEM AND METHOD FOR SECURE MOVEMENT OF TRUSTED MEMORY REGIONS ACROSS NUMA NODES - An information handling system includes a first memory having a trusted memory region, wherein the trusted memory region is an area of execution that is protected from processes running in the information handling system outside the trusted memory region. A secure cryptographic module may receive a request to create the trusted memory region from a dependent application, and create a mapping of the trusted memory region along with an enhanced page cache address range mapped to a non-uniform memory access (NUMA) node. The module may also detect a NUMA migration event of the dependent application, identify the trusted memory region corresponding to the NUMA migration event, and migrate the trusted memory region from the NUMA node to another NUMA node. | 2022-08-25 |
20220269798 | SECURE COLLABORATIVE PROCESSING OF PRIVATE INPUTS - The described technology is generally directed towards secure collaborative processing of private inputs. A secure execution engine can process encrypted data contributed by multiple parties, without revealing the encrypted data to any of the parties. The encrypted data can be processed according to any program written in a high-level programming language, while the secure execution engine handles cryptographic processing. | 2022-08-25 |
20220269799 | ELECTRONIC DEVICE, AND METHOD AND COMPUTER PROGRAM PRODUCT FOR CONTROLLING THE SAME - A method for controlling an electronic device that is in communication with the server includes: in response to a lost mode activation signal from the server, controlling the electronic device to switch to a lost mode in which the electronic device is controlled to output a message that includes contact information of an owner of the electronic device, and an offer of a monetary compensation associated with recovery of the electronic device by the owner; and in response to determination that an unlock condition has been met, controlling the electronic device to switch to a normal mode. | 2022-08-25 |
20220269800 | PRIVACY PROTECTION METHOD FOR ELECTRONIC DEVICE AND ELECTRONIC DEVICE - A privacy protection method for the electronic device includes: starting face change detection, where the face change detection is continuously detecting, in a current unlocking period, whether a face in front of a display of the electronic device changes; after starting the face change detection, detecting an operation of starting a first private application; and in response to the operation and determining that a result of the face change detection is that the current face does not change, displaying first private content corresponding to the first private application; or in response to the operation and determining that a result of the face change detection is that the current face changes, displaying first non-private content, where the first non-private content does not include first private content. | 2022-08-25 |
20220269801 | REAL-TIME FEATURE ACTIVATION IN DISTRIBUTED ENVIRONMENT - Methods, systems, and devices for data processing are described. According to the techniques described herein, an application server may be used for real-time provisioning for features for a user. The application server may validate requests from the user for feature activation or deactivation and after validation, may communicate with a provisioning server, which may be non-local to the user or the application server, to indicate validation and activation or deactivation of a feature for the user. | 2022-08-25 |
20220269802 | SYSTEM AND METHOD FOR MULTI-USER STATE CHANGE - A system for configuring an information handling system based on a multi-user state change. An intelligent sensor hub communicates with sensors to detect the number of persons in a field of view of the information handling system. When the intelligent sensor hub determines there is a change in the number of persons, the information is sent out-of-band to an embedded controller (EC) independent of a host operating system. The EC makes a change to the configuration of the information handling system if needed. | 2022-08-25 |
20220269803 | VERIFICATION INFORMATION GENERATING SYSTEM, VERIFICATION INFORMATION GENERATING METHOD, AND VERIFICATION INFORMATION GENERATING PROGRAM - A verification information creation apparatus includes an analysis section configured to acquire a file path and a hash value of a file to be checked using the hash value during verification of the file out of files contained in a software package by executing a predetermined command for the software package; and a verification information creation section configured to create verification information for software in the software package, the verification information including the file path and the hash value of the file, the file path and the hash value being acquired by the analysis section. | 2022-08-25 |
20220269804 | ELECTRONIC DEVICE, LIBRARY, AND PROCESSING METHOD - An electronic device includes circuitry and a memory storing computer-executable instructions that cause the circuitry to execute an application operating on a platform of the electronic device. The application includes a library, and the library controls whether to perform a predefined process, based on version information of the platform acquired from the platform. | 2022-08-25 |
20220269805 | BROWSER EXTENSION RECOGNITION SYSTEM - A browser extension recognition system and methods are provided for flagging specified words when they are typed into a web-browser application. A warning dialog box is displayed when a typed word or phrase is determined to match a word or phrase in a saved list of the words to be blocked. The warning dialog box indicates that the word or phrase matches a blocked word or phrase and prompts an end-user to continue or stop typing the block word or phrase. Settings are configured to enable the end-user to add new words and phrases to the list of words and remove existing words and phrases from the list of words. A desired group of words and/or phrases to be blocked can be imported from an external file, and an external file containing a listing of all the words and phrases comprising the list of words can be exported. | 2022-08-25 |
20220269806 | SYSTEM AND METHOD FOR POLICY CONTROL IN DATABASES - Embodiments of the present disclosure relate to generating a high level security policy for a data repository without knowledge of the access control, entitlement, and other models of the data repository. A set of abstractions that define a security policy language may be generated based on data in a data repository collection. The set of abstractions may define a security policy language, which may be provided to a security administrator who can define a security policy with the security policy language. The security policy may be translated into a common physical language to generate a common physical policy. The processing device may then translate the common physical policy into a set of commands for each of one or more data repositories that the data repository collection is comprised of. | 2022-08-25 |
20220269807 | DETECTING UNAUTHORIZED ENCRYPTIONS IN DATA STORAGE SYSTEMS - Detecting unauthorized encryptions in data storage systems is described. At a first time, a system identifies a set of data files which are stored in a part of a data storage system. At a second time, the system identifies each newly encoded data file based on identifying each data file in the set of data files which is encoded and created and/or updated since the first time. The system identifies each compressed data file based on identifying each newly encoded data file which is reduced in size since the first time. The system determines a file compression success rate based on a total count of each compressed data file relative to a total count of each newly encoded data file. If the system determines that the file compression success rate does not satisfy the file compression success rate threshold, the system outputs an alert about an unauthorized encryption. | 2022-08-25 |
20220269808 | DOCUMENT MANAGEMENT SYSTEM - [Problem] To ensure security in document management in small-scale organizations without using expensive servers by establishing peer-to-peer connection of a plurality of PCs, and to enable mutual non-tampering certification among connected organizations. | 2022-08-25 |
20220269809 | LEVERAGING ACCESS CONTROLS TO SECURE BACKUP DATA STORED ON A CLOUD-BASED OBJECT STORAGE - Described is a system that leverages object storage provided access controls to secure backup data stored on a third-party cloud-based object storage. More particularly, the system may implement a mechanism that ensures that a backup system acts as a gateway for accessing the backup data stored on the object storage. For example, the system may prevent object storage administrative accounts that are authorized to access data directly on the storage from maliciously or inadvertently jeopardizing the integrity of the backup data. Moreover, the backup system may encrypt the backup data to prevent such administrative accounts from performing various backup related operations such as data recovery. Accordingly, to perform backup operations and decrypt the backup data, an account must be authorized by the backup system acting as an exclusive gateway to the backup data stored on a third-party storage. | 2022-08-25 |
20220269810 | Using Blockchain Transactions to Provide Off-Chain Functionality - A method of executing transactions of a blockchain network. A first transaction comprises at least a first output comprising a first locking script of a stack-based scripting language, the first locking script comprising a portion of the first locking script to be executed before a first instance of an opcode is executed. A second transaction comprises a first unlocking script that references the first output in the first transaction. Upon executing the first instance of the opcode, execution of the first locking script is terminated whilst not invalidating the first transaction. A first data element is read from at least one stack, wherein the first data element is generated during execution of the first unlocking script and the portion of the first locking script. The first data element as read from the at least one stack is supplied to an off-chain function, wherein the function is configured to generate a result based on at least said first data element. | 2022-08-25 |
20220269811 | AUTOMATED DATABASE PROVISIONING AND METHODS THEREOF - Systems and methods of the present disclosure enable the automated provisioning of security and compliance policies and onboarding to identity governance solutions. The systems and methods include processors to receive a database provisioning request associated with at least one entity and accessing at least one identity data record via an identity management mechanism associated with the at least one entity. The processors automatically access the database via a secured port; automatically cause to generate in the database, at least one privilege account and at least one access credential rule based on the at least one identity data record. The database is configured to utilize the at least one access credential rule to automatically manage access credentials for accessing the database via the at least one privilege account. The processors automatically disconnect from the secured port of the database. | 2022-08-25 |
20220269812 | INLINE DATA LOSS PREVENTION FOR A GROUP-BASED COMMUNICATION SYSTEM - A system, method, and computer-readable media for providing inline data loss prevention (DLP) within a group-based communication system. A DLP engine is included to apply an organization-specific DLP policy to a user input to determine whether the user input should be displayed in a group-based communication channel of the group-based communication system. Multiple organizations sharing a channel may each have their own respective organization-specific DLP policies applied to incoming and outgoing messages for that organization. | 2022-08-25 |
20220269813 | USER CONSENT SERVICE UTILIZING MOBILE DEVICE IDENTIFIERS - A user consent service that collects information on the type of data users have consented to sharing with different service providers (location information, account status, etc.), so that mobile network operators determine whether to approve or deny user information requests. The service receives information from service providers (e.g., websites, cloud services, mobile applications, and other network-accessible resources) which indicates that users have consented to the sharing of certain types of user data with those service providers. In response, the user consent service maintains records cataloging the consent received for the users, including what type of data that the users have consented to sharing with the different service providers (i.e., what pieces of data may or may not be shared with the different server providers). The service generates consent data for mobile network operators, from the records, so the mobile network operators can evaluate requests for user data. | 2022-08-25 |
20220269814 | DISCOVERY OF PERSONAL DATA IN MACHINE LEARNING MODELS - A method, computer system, and a computer program product for personal data discovery is provided. The present invention may include determining at least one feature used to train a target machine learning (ML) model. The present invention may also include mapping the determined at least one feature to at least one location of a data store including at least one personal data associated with the determined at least one feature. The present invention may further include retrieving a data record of the at least one personal data associated with the mapped at least one feature from the at least one location of the data store. The present invention may also include determining that the target ML model includes a trace of the retrieved data record. The present invention may further include marking the target ML model as containing the at least one personal data. | 2022-08-25 |
20220269815 | METHODS AND SYSTEMS FOR PREVENTION OF VENDOR DATA ABUSE - In one aspect, a computerized method for automatically identifying and solving for vendor data abuse in an enterprise network, includes the step of implementing a vendor detection at one or more gateways of the enterprise network. The method includes the step of mapping a set of data along with any associated data attributes of the set of data that are being shared with a vendor via the one or more gateways. The method includes the step of detecting and identifying an access anomaly with respect to the set of data associated with a vendor access. The method includes the step of implementing a specified data minimization process to the access anomaly. | 2022-08-25 |
20220269816 | SYSTEM AND METHOD FOR PRIVACY-PRESERVING USER DATA COLLECTION - A method includes obtaining, by an application executing on a processor of an electronic device, user data of a user, generating a representation of the user data, applying local differential privacy to the representation of the user data, to generate a transform of the representation of the user data, sending the transform of the representation of the user data, to a service provider via a network and receiving, from the service provider, via the network, service data based on the transform of the user data. The service data includes a user-specific output based on the transform of the user data. The application executes outside of a trusted execution environment (TEE) of the electronic device. The transform of the representation of the user data is generated in the TEE of the electronic device. | 2022-08-25 |
20220269817 | METHODS AND APPARATUS TO ORCHESTRATE PERSONAL PROTECTION ACROSS DIGITAL ASSETS - Methods, apparatus, systems, and articles of manufacture for orchestrating personal protection across digital assets are disclosed. An example apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to monitor digital assets associated with a protection threat surface to detect a protection event, determine one or more protection vectors associated with the digital assets in response to detecting the protection event, the one or more protection vectors including one or more values corresponding to an impact of the protection event on an overall protection posture associated with the protection threat surface, and determine protection remediation action for the digital assets based on the one or more protection vectors. | 2022-08-25 |
20220269818 | METHODS AND APPARATUS FOR SECURELY DISPLAYING DIGITAL IMAGES - The invention provides methods and apparatus for securing personalized or sensitive information appearing in digital images. Digital images containing information to be secured is processed and divided into a plurality of image cells. At least one image cell from the plurality of image cells is selected and redacted or altered to render the information to be secured with the selected image cells in decipherable. The invention also provide method and apparatus for transmitting or streaming unredacted image cells alone or in combination with redacted image cell for secured viewing on a user browser or computer. | 2022-08-25 |
20220269819 | APPLICATION PRIVACY SCANNING SYSTEMS AND RELATED METHODS - An application privacy analysis system is described, where the system obtains an application and analyzes it for privacy related data use. The system may determine privacy related activities of the application from established sources of such data and/or may decompile the application and analyze the resulting code to determine the privacy related activities of the application. The system may execute the application and monitor the communications traffic exchanged by the application to determine privacy related activities of the application. The system may store the results of such analyses for future reference. | 2022-08-25 |
20220269820 | ARTIFICIAL INTELLIGENCE BASED DATA REDACTION OF DOCUMENTS - Aspects of the present disclosure provide systems, methods, and computer-readable storage media supporting automated document redaction in compliance with data privacy requirements. To facilitate data redaction, a document template may be subjected to a template expansion process that generates multiple instances of the template, each instance having data fields populated with arbitrary data (e.g., data that is not subject to the data privacy requirements). The populated templates may then be converted to synthetic data that includes information about the location of the data contents within the populated templates, a copy of the data contents, and structural information. A set of content features and structural features may be generated based on the synthetic data and used to train a model to identify data that should be redacted within a document. Once trained, documents may be evaluated using the model to perform data redaction prior to providing access to the documents. | 2022-08-25 |
20220269821 | METHODS AND APPARATUS TO ASSIGN DEMOGRAPHIC INFORMATION TO PANELISTS - Methods and apparatus to assign demographic information to panelists are disclosed. An apparatus includes at least one memory, instructions in the apparatus, and processor circuitry to execute the instructions to at least: generate decoy database proprietor identifiers based on probability density functions; after querying a database proprietor using panelist database proprietor identifiers and the decoy database proprietor identifiers: access (a) demographic information corresponding to the panelist database proprietor identifiers and first ones of the decoy database proprietor identifiers that are associated with subscribers to the database proprietor, and (b) errors indicating that second ones of the decoy database proprietor identifiers are not associated with the subscribers to the database proprietor; and regenerate the probability density functions based on the panelist database proprietor identifiers and the first ones of the decoy database proprietor identifiers that are associated with the subscribers to the database proprietor; and assign the panelist database proprietor identifiers to panelists based on the demographic information obtained from the database proprietor. | 2022-08-25 |
20220269822 | SYSTEMS AND METHODS FOR MULTI-REGION DATA CENTER CONNECTIVITY - Disclosed is a multi-region data center connectivity solution for seamless integration between multi-region data center users and content. The solution supports user pinning (e.g., users and their personal content can be pinned to a particular geographical location/data center); protects personal content (e.g., personal content uploaded by a user is stored in that user's pinned geographical location/data center); and enables data sharing between multi-region data center users in a manner that is seamless and transparent to end users, while respecting user privacy, complying with data sovereignty requirements, and maintaining system anonymity. | 2022-08-25 |
20220269823 | SYSTEM AND METHOD FOR SECURE MANAGEABILITY OF PRIVACY MODE - Managing privacy controls in an information handling system to allow Information Technology Decision Makers (ITDMs) to prevent unwanted disclosure of information while allowing users to work together. A first privacy policy is asserted to protect information. When a user device requests an override to access an I/O device, embodiments analyze device parameters and application parameters to determine whether to authorize the use of the I/O device. If the override request is authorized, the user is able to access the I/O device and a new privacy policy is asserted. If a device parameter changes, embodiments may assess whether the change could result in unwanted disclosure of information and dynamically change the privacy policy to prevent the disclosure. | 2022-08-25 |
20220269824 | PRIVACY-PRESERVING MOTION ANALYSIS - A method, a structure, and a computer system for privacy-preserving motion analysis. Embodiments may include collecting data corresponding to a user with one or more sensors and identifying one or more joints of the user based on the data. Embodiments may additionally include generating one or more 3D representations of the one or more joints of the user and anonymizing the one or more 3D representations by applying thereto a joint-centering and a random shuffling. Embodiments may further include classifying one or more actions of the user based on analysing the one or more 3D representations, and exporting at least one of the data and the one or more actions. | 2022-08-25 |
20220269825 | Undefined Lifecycle State Identifier for Managing Security of an Integrated Circuit Device - This document describes methods and systems that use an undefined lifecycle state identifier to manage security of a system-on-chip (SoC) integrated circuit (IC) device. As part of the described techniques, the SoC IC device may include a first set of logic integrated circuitry that determines that a first combination of bit values fails to correspond to a known lifecycle state identifier. The first set of logic integrated circuitry may then provide, to a second set of logic integrated circuitry, a second combination of bit values that corresponds to the undefined lifecycle state identifier. The second set of logic integrated circuitry may then place the SoC IC device into an undefined lifecycle state. | 2022-08-25 |
20220269826 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A computation procedure change unit ( | 2022-08-25 |
20220269827 | DETECTION OF A NETLIST VERSION IN A SECURITY CHIP - A pattern detector circuit is provided in a security chip, wherein the pattern detector circuit monitors accesses of a plurality of configuration registers, each of the plurality of configuration registers having a corresponding address. In response to receiving from a host a predefined sequence of accesses of the plurality of configuration registers for one or more operations to the plurality of configuration registers, a processor in the pattern detector circuit determines a value indicative of a current version of a netlist for the security chip. The determined value is made available to be obtained by a read operation by the host at a specific configuration register address. | 2022-08-25 |
20220269828 | ENCRYPTED ANALYTICAL VAULT FOR TRUSTED ACCESS - An encrypted analytical vault is provided. The disclosed encrypted analytical vault may implement an entanglement process in data encryption when storing the data, and may include an Elasticsearch plugin for searching the encrypted data. The encrypted analytical vault thus allows the data stored in the vault to be searchable, aggregable, and sortable while the data are still encrypted in the vault. | 2022-08-25 |
20220269829 | AUTOMATIC PATIENT POSITIONING WITHIN A LASER EYE SURGERY SYSTEM - A laser eye surgery system produces a treatment beam that includes a plurality of laser pulses. An optical coherence tomography (OCT) subsystem produces a source beam used to locate one or more structures of an eye. The OCT subsystem is used to sense the distance between a camera objective on the underside of the laser eye surgery system and the patient's eye. Control electronics compare the sensed distance with a pre-determined target distance, and reposition a movable patient support toward or away the camera objective until the sensed distance is at the pre-determined target distance. A subsequent measurement dependent upon the spacing between the camera objective and the patient's eye is performed, such as determining the astigmatic axis by observing the reflection of a plurality of point source LEDs arranged in concentric rings off the eye. | 2022-08-25 |
20220269830 | CONTROLLING A DISPLAY BASED ON A PROXIMITY OF A PORTABLE DEVICE - A method secures a computer display. One or more processors detect whether there is a presence of an authorized portable device proximate to the computer display. Based on what the processor(s) detect, the processor(s) apply a rule, which is based on one or more portable devices being proximate to the computer display, to selectively continue or end a current session on the computer display. | 2022-08-25 |
20220269831 | ELECTRONIC PRIVACY FILTER ACTIVATION - One embodiment provides a method, including: identifying, on an information handling device, a security level associated with an application window displayed on a display screen of the information handling device; capturing, using a sensor associated with the information handling device, an image of an area in front of the display screen; identifying, based upon analysis of the image, that an individual is present in the image; determining, using a processor, whether the individual is authorized to view the application window based upon the security level; and activating, responsive to determining that the individual is not authorized to view the application window, a privacy filter that obscures content in the application window from the individual. Other aspects are described and claimed. | 2022-08-25 |
20220269832 | Processor and Memory System to Selectively Enable Communication - A system including a bus, a processor coupled to the bus, a non-volatile memory coupled to the bus, circuitry for providing a detected condition, and a secure controller. The secure controller is coupled to the circuitry for providing a detected condition and to selectively enable communication of information between the non-volatile memory and the bus in response to the detected condition. | 2022-08-25 |
20220269833 | MAINTENANCE OF ACCESS FOR SECURITY ENABLEMENT ON A HOST SYSTEM - A host port is enabled for security. In response to a determination by the host port that authentication or security association negotiation with a storage port cannot be completed successfully, the host port determines whether an audit mode indicator has been enabled in a login response from the storage port. The host port preserves input/output (I/O) access to the storage port based on determining whether the audit mode indicator has been enabled in the login response from the storage port. | 2022-08-25 |
20220269834 | METHOD FOR IDENTIFYING WET CLUTCH DESIGN REQUIREMENTS BASED ON STOCHASTIC SIMULATIONS - A method of producing a disconnect clutch includes producing a disconnect clutch, configured to selectively connect an engine and an electric machine, such that the disconnect clutch exhibits a clutch transfer function that causes a transmission output shaft torque variability that is less than a predetermined threshold during a simulated starting of the engine using the electric machine. | 2022-08-25 |
20220269835 | RESOURCE PREDICTION SYSTEM FOR EXECUTING MACHINE LEARNING MODELS - A resource prediction system for executing machine learning models and method are provided. The system includes non-transitory memory storing instructions and a processor configured to execute the instructions to obtain input data including a targeted objective and the constraints, select a deployable machine learning model having an evaluation score that meets a predetermined criterion from among candidate machine learning models, virtually execute the deployable machine learning model on each of candidate hardware platforms according to the constraints, generate an assessment report of the virtual performance metrics set of the deployable machine learning model executed on each of the candidate hardware platforms, and select the suggested hardware platform meeting the predetermined criterion from among the candidate hardware platforms. | 2022-08-25 |
20220269836 | AGENT CONVERSIONS IN DRIVING SIMULATIONS - Techniques are discussed herein for executing log-based driving simulations to evaluate the performance and functionalities of vehicle control systems. A simulation system may execute a log-based driving simulation including playback agents whose behavior is based on the log data captured by a vehicle operating in an environment. The simulation system may determine interactions associated with the playback agents, and may convert the playback agents to smart agents during the driving simulation. During a driving simulation, playback agents that have been converted to smart agents may interact with additional playback agents, causing a cascading effect of additional conversions. Converting playback agents to smart agents may include initiating a planning component to control the smart agent, which may be based on determinations of a destination and/or driving attributes based on the playback agent. | 2022-08-25 |
20220269837 | CONVERTER PARAMETERIZED CONSTANT ADMITTANCE MODELING METHOD BASED ON CROSS INITIALIZATION - A converter parameterized constant admittance modeling method based on a cross initialization including the following steps: (1) performing parameterized modeling on a converter, wherein switches are modeled using a parametric historical current source constant admittance model and other components are modeled using a traditional electromagnetic transient simulation integral model in the converter; (2) detecting whether state switching occurs, performing cross initialization correction when occurring; (3) determining model parameters, and establishing an equivalent admittance matrix and an injection current source of a whole grid, to obtain an electromagnetic transient simulation equivalent model; (4) solving a network tide according to a basic solving equation I=YU to obtain an electromagnetic transient model simulation result of the converter at current time; and (5) calculating an equivalent admittance matrix and an injection current source at next time through a current network state quantity, and returning to step (2) until a simulation terminates. | 2022-08-25 |
20220269838 | CONVERSATIONAL DESIGN BOT FOR SYSTEM DESIGN - System and method for conversational dialog in an engineering systems design includes a design bot configured to generate a design dashboard on a graphical user interface that presents a textual representation of system design view information with a rendering of system design view components. A dialog box feature of the dashboard receives a plain text string conveying a user request for a system design view of system elements and properties of the system elements. The design bot translates plain text of the user request to a vectorized contextual user request using context defined for design activity goals with respect to elements of the system design. System design view information is retrieved from a design repository based on the vectorized user request. A plain text string response to the user request conveying system design information relevant to the system design is displayed in the dialog box. | 2022-08-25 |
20220269839 | METHOD AND APPARATU FOR DETERMINING bREAKING SAFETY OF TREE STEMS ASSOCIATED COMPUTER PROGRAM - With a view to a particularly simple and reliable assessment and evaluation of the fracture safety of a defective tree ( | 2022-08-25 |
20220269840 | INVERSE DESIGN MACHINE AND MAKING A DESIGNER IMPACT-MITIGATING ARCHITECTURED ISOTROPIC STRUCTURE - An inverse design machine for making a manufactured article that includes a designer Impact-mitigating architectured isotropic structure includes: an input unit that receives a primary structure; a primary structure analyzer that receives the primary structure from the input unit and determines primary properties of the primary structure; a structure adjuster that receives the primary properties from the primary structure analyzer, receives impact-mitigating properties from a structural property manager, and produces the designer Impact-mitigating architectured isotropic structure from the impact-mitigating properties; and the structural property manager that provides the impact-mitigating properties to the structure adjuster. | 2022-08-25 |
20220269841 | SYSTEM AND METHOD FOR MONITORING AND DIAGNOSIS OF ENGINE HEALTH USING A SNAPSHOT-CEOD BASED APPROACH - A system and method for monitoring and diagnosis of engine health are provided. In one aspect, a system receives continuous operating data (COD) associated with an asset. The COD includes parameter values for one or more parameters over a collection time period. The system generates synthetic snapshot data based at least in part on the COD. The synthetic snapshot data includes one or more synthetic snapshots each containing the parameter values for the one or more parameters for a given timepoint within the collection time period. The system also receives snapshot data associated with the asset. The snapshot data includes one or more snapshots each containing parameter values for the one or more parameters for a given timepoint. The system generates an output indicating a health status of the asset or one or more components thereof based at least in part on the snapshot data and the synthetic snapshot data. | 2022-08-25 |
20220269842 | ESTIMATING EMISSIONS WITH VIRTUAL SENSOR MODELS - A computing device including a processor is provided. For one or more emissions factors, the processor may be configured to receive respective emissions factor data including sensor data received from one or more sensors and user-specified data received at a user interface. The processor may be further configured to receive a plurality of virtual sensor models. Each virtual sensor model may include one or more respective virtual sensor model parameters. At least in part by applying the virtual sensor models to the emissions factor data, the processor may be further configured to compute a plurality of virtual sensor readouts. The processor may be further configured to generate a greenhouse gas emissions estimate from the virtual sensor readouts. The processor may be further configured to convey an indication of the greenhouse gas emissions estimate to the user interface for output on one or more output devices. | 2022-08-25 |
20220269843 | METHOD AND SYSTEM FOR RECORDING INTEGRATED CIRCUIT VERSION - A method and a system for recording an integrated circuit version are provided. The method is adapted to a register in an integrated circuit, which includes the following steps: recording the integrated circuit version with N bits, in which N is an integer greater than 1; and amending only a bit value of at least one bit selected from the N bits that have not been used for denoting any past integrated circuit version each time when the integrated circuit is revised. | 2022-08-25 |
20220269844 | Message Signoffs - A computer design verification system comprising a parsing module configured to receive output messages from a computer design testing tool and to compose from the output messages formatted objects comprising a set of fields having field descriptors and test values; a signoff module holding a plurality of signoff objects, each comprising a plurality of fields having a field descriptor, at least some fields populated with a signoff expression, each signoff object associated with a severity level indicative of the severity of a condition represented by the signoff object. The signoff module is configured compare at least one test value in the formatted objects received from the parsing module with at least one signoff expression in the signoff objects to determine if a signoff object matches the formatted object, and in the case of a match, associating the severity level of the signoff object with the formatted object. | 2022-08-25 |
20220269845 | METHODS AND APPARATUS TO SIMULATE METASTABILITY FOR CIRCUIT DESIGN VERIFICATION - Methods, apparatus, systems and articles of manufacture are disclosed to simulate metastability for circuit design verification. An example apparatus includes an input handler to receive circuit design data indicative of a circuit design, a circuit modeler to generate a simulation model based on the circuit design data, a simulator to simulate operation of the circuit design based on the simulation model, a metastability injector to insert metastability logic into the simulation model during the simulation, and a metastability controller to control the metastability logic during the simulation. | 2022-08-25 |
20220269846 | STRUCTURAL ANALYSIS FOR DETERMINING FAULT TYPES IN SAFETY RELATED LOGIC - A method for determining fault types in a circuit design includes obtaining circuit elements, a first observation point of a first circuit element, and a first diagnostic point of a first safety circuit device. The method further includes determining a first cone of influence including a first subset of the circuit elements based on the first observation point. The first subset of the circuit elements includes the first circuit element. Further, the method includes determining a first safety cone including a second subset of the circuit elements based on the first diagnostic point. The first safety cone includes the first safety circuit device. The method further includes determining a fault type associated with the circuit elements based on an intersection between the first cone of influence and the first safety cone. | 2022-08-25 |
20220269847 | APPARATUS AND METHOD FOR ADVANCED MACRO CLOCK SKEWING - A method and system for generating a clock distribution circuit for each macro circuit in an ASIC design are disclosed herein. In some embodiments, a method for generating a clock distribution circuit receives the ASIC design specified in a hardware description language (HDL), places each macro circuit in allocated locations on a semiconductor substrate, generates a custom clock skew information for each macro circuit based on a macro clock delay model, generates a clock distribution circuit for each macro circuit placed on the semiconductor substrate based on the generated custom clock skew information, modifies the clock distribution circuit if the generated clock distribution circuit does not meet timing requirements of the ASIC design, and outputs a physical layout of the ASIC design for manufacturing under a semiconductor fabrication process. | 2022-08-25 |
20220269848 | DESIGN RULE CHECK METHOD AND APPARATUS, AND STORAGE MEDIUM - The present application provides a design rule check method and apparatus, and a storage medium, which are applied to the field of chip verification. The method includes that: a DRC code file is acquired, multiple segments of DRC codes in the DRC code file are analyzed, the analyzed segments of DRC codes are classified, whether a code conflict exists in the segments of DRC codes is determined, and if the code conflict exists, a code conflict report is generated, the code conflict report being used to indicate a code position of the code conflict. By means of the method, the code error in the DRC code file can be quickly checked and positioned, assisting a tester in modifying a DRM file and the DRC file, so as to improve the execution efficiency of the DRC code, and meanwhile, shorten the time for DRC development. | 2022-08-25 |
20220269849 | MODULAR SYSTEMS AND METHODS FOR SELECTIVELY ENABLING CLOUD-BASED ASSISTIVE TECHNOLOGIES - Methods and systems for manual and programmatic remediation of websites. JavaScript code is accessed by a user device and optionally calls TTS, ASR, and RADAE modules from a remote server to thereby facilitate website navigation by people with diverse abilities. | 2022-08-25 |
20220269850 | METHOD AND DEVICE FOR OBRAINING A RESPONSE TO AN ORAL QUESTION ASKED OF A HUMAN-MACHINE INTERFACE - A method for modifying a voice-signal transcription generated by an automatic speech recognition engine from a voice signal, prior to a generation of a response by a semantic engine equipped with at least one ontology comprising a vocabulary space, from an injection of a question, comprises the following steps: determining the set of all of the words of the transcription not belonging to the space, and for each word of the determined set: a step of word-embedding of the word in the space; determining semantic distances between the embedding and each of the words of the space; a step of selecting at least one word of the space; and modifying the transcription by replacing the word of the transcription with at least one selected word in order to generate a modified signal transcription. | 2022-08-25 |
20220269851 | SYSTEM, METHOD, AND APPARATUS FOR PUBLICATION AND EXTERNAL INTERFACING FOR A UNIFIED DOCUMENT SURFACE - Systems and methods for publication and external interfacing for a unified document surface are disclosed. An example system may include a document serving circuit structured to access a document data, the document data including data for a unified document surface, and to provide at least a portion of the document data to a client serving circuit; the client serving circuit structured to implement a unified document surface interface in response to the at least a portion of the document data; the client serving circuit further structured to implement an extension creation interface, and to provide a pack implementation value to the document serving circuit in response to user interactions with the extension creation interface; and wherein the document serving circuit is further structured to determine a pack definition value in response to the pack implementation value. | 2022-08-25 |
20220269852 | SYSTEMS, METHODS AND DEVICES FOR STRUCTURED DYNAMIC ELECTRONIC FORMS - Computer systems, methods, and devices for structured dynamic electronic forms are provided. The system includes a user device comprising a client form management application and a server comprising a server form management application. The client form management application generates and sends a request for a dynamic electronic form to the server. The server form management application stores the dynamic electronic form comprising separately stored form template data and form data; and merges and sends the form template data and the form data to the user device for rendering. The client form management application sends a request for a form filler package (“FFP”) comprising rules for filling out and rendering the dynamic electronic form. The server form management application sends the FFP to the user device and the client form management application renders the dynamic electronic form using the merged form template data and form data and the FFP. | 2022-08-25 |
20220269853 | DOMAIN-SPECIFIC LANGUAGE INTERPRETER AND INTERACTIVE VISUAL INTERFACE FOR RAPID SCREENING - A domain-specific language interpreter and live updating visual interface for rapid interactive exploration, filtering, and analysis of a dynamic data set. It includes a multi-line editor that allows a user to enter and edit input on any line at any time, and a grid view display. As the user enters an expression in the multi-line editor, it continually parses and executes the expression with respect to the domain-specific language, recognizing data tags and operations. Each data tag is associated with values for identifiers of the data set, and each operation can be applied to the values. The grid view display updates with a live display of identifiers and result values for the input expression according to the current contents of the multi-line editor user input interface. | 2022-08-25 |
20220269854 | METHOD FOR AUTOMATICALLY CREATING USER-CUSTOMIZED DOCUMENT, AND DEVICE AND SERVER FOR SAME - Provided is a method for automatically creating a user-customized document, and the method includes: receiving an automatic document creation target from a user, wherein the automatic document creation object comprises a plurality of data items and a plurality of tags matching the plurality of data items is defined; receiving, from the user, a template file in which a format of the user-customized document is set, wherein the template file comprises at least one tag; and generating the user-customized document by replacing each tag in the template file with a data item matching a corresponding tag in the automatic document creation target. | 2022-08-25 |
20220269855 | INFORMATION GENERATION SYSTEM, WORKFLOW SYSTEM, COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM STORING INFORMATION GENERATION PROGRAM, AND COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM STORING WORKFLOW PROGRAM - In a case where a template associated with a format of an invoice associated with an invoice image is managed in a template database, an information generation system generates information from the invoice image by using the template, and in a case where information is generated from an invoice image by a general-purpose information generation unit, the information generation system generates a template associated with a format of an invoice associated with the invoice image, based on the invoice image, the information, and a template managed in the template database. | 2022-08-25 |
20220269856 | STRUCTURED TEXT PROCESSING LEARNING APPARATUS, STRUCTURED TEXT PROCESSING APPARATUS, STRUCTURED TEXT PROCESSING LEARNING METHOD, STRUCTURED TEXT PROCESSING METHOD AND PROGRAM - A structured text processing learning apparatus includes a memory, and a processor configured to: analyze a structure of structured text, extract, from the structured text, information related to a predetermined structure to be extracted based on the structure, generate a converted document including text data in which each string indicating a structure of the extracted information has been converted, in accordance with the structure related to the extracted information, and train a neural network for executing predetermined processing for the converted document, using, as input, the generated converted document and correct answer information for performing the predetermined processing. Thus, application of a neural network to structured text is facilitated. | 2022-08-25 |
20220269857 | USING DOMAIN SPECIFIC VOCABULARIES TO SPELLCHECK INPUT STRINGS - Provided are a computer program product, system, and method for using domain specific vocabularies to spellcheck input strings. A determination is made of a determining a domain specific vocabulary comprising domain specific tokens for a user. The input strings in the input text from the user are processed to determine whether the input strings match the domain specific tokens in the domain specific vocabulary. Indication is made that input strings that are determined to match the domain specific tokens in the domain specific vocabulary are not to be spellchecked by a global vocabulary available to users across domains. | 2022-08-25 |
20220269858 | Learning Rules and Dictionaries with Neuro-Symbolic Artificial Intelligence - A system, computer program product, and method are provided for jointly learning dictionary based rules and dictionary candidates. Natural language text is received and parsed into subsets, with the subset being subjected to natural language processing to identify one or more verbs within the subset. The identified verbs are evaluated with respect to a dictionary and one or more rules. The evaluation is directed at each predicate in the rules with respect to the identified verbs. A neural network is leveraged to jointly induce modification of the rules and one or more dictionaries responsive to the evaluation. | 2022-08-25 |
20220269859 | SYSTEM AND METHOD TO REPRESENT CONVERSATIONAL FLOWS AS GRAPH EMBEDDINGS AND TO CONDUCT CLASSIFICATION AND CLUSTERING BASED ON SUCH EMBEDDINGS - Systems and methods develop a natural language interface. Conversational data including user utterances is received for a plurality of conversations from a natural language interface. Each of the conversations is classified to determine intents for each user utterance, and for each of the conversations, a control flow diagram showing the intents and sequential flow of the conversation is generated. Each of the control flow diagrams is processed to generate a graph embedding representative of the conversation. A previous conversation that is similar to the current conversation is identified from a previous graph embedding that is nearest to a current graph embedding of a most recent utterance in a current conversation. A previous outcome of the previous conversation is used to predict an outcome of the current conversation, which, when not positive, may control response outputs of the natural language interface to steer the current conversation towards a positive result. | 2022-08-25 |
20220269860 | EVALUATION APPARATUS AND EVALUATION METHOD - An evaluation device includes a first calculation unit configured to calculate feature quantities of respective words, the feature quantities being regarding text data in which a target of any of goals of the SDGs is described and text data in which an outline of one or more first services a contribution of which to the goal is clear is described, the respective words being included in the text data, a generation unit configured to generate a sentence feature matrix based on the feature quantities of the respective words, a second calculation unit configured to calculate, when text data in which an outline of a second service is described is input, feature quantities of respective words, the feature quantities being regarding the text data, the respective words being included in the text data, and an evaluation unit configured to evaluate a degree of a contribution of the second service to the goal based on the feature quantities of the respective words relevant to the second service and the sentence feature matrix. Thus, the evaluation device can evaluate a degree of a contribution to goals of the SDGs. | 2022-08-25 |
20220269861 | ELECTRONIC APPARATUS AND METHOD FOR CONTROLLING THEREOF - An electronic apparatus and a control method thereof are provided. The control method includes acquiring a plurality of words, acquire a plurality of word combinations by combining the plurality of words, and acquiring first scores indicating the sentence completeness of each of the plurality of word combinations by inputting each of the plurality of word combinations to a first a language model for identifying a sentence completeness, based on all the first scores with respect to each of the plurality of word combinations being identified to be less than a predetermined value, acquire second scores for each of the plurality of word combinations by inputting each of the plurality of word combinations to a sentence separation model for identifying an accuracy of a word combination, identifying one word combination among the plurality of word combinations based on the second scores, and providing the identified one word combination to a translation model which performs translation. | 2022-08-25 |
20220269862 | WEAKLY SUPERVISED AND EXPLAINABLE TRAINING OF A MACHINE-LEARNING-BASED NAMED-ENTITY RECOGNITION (NER) MECHANISM - Systems and methods for weakly-supervised training a machine-learning model to perform named-entity recognition. All possible entity candidates and all possible rule candidates are automatically identified in an input data set of unlabeled text. An initial training of the machine-learning model is performed using labels assigned to entity candidates by a set of seeding rules as a first set of training data. The trained machine-learning model is then applied to the unlabeled text and a subset of rules from the rule candidates is identified that produces labels that most accurately match the labels assigned by the trained machine-learning model. The machine-learning model is then retrained using the labels assigned by the identified subset of rules as the second set of training data. This process is iteratively repeated to further refine and improve the performance of the machine-learning model for named-entity recognition. | 2022-08-25 |
20220269863 | Augmenting Textual Data for Sentence Classification Using Weakly-Supervised Multi-Reward Reinforcement Learning - A system and method are disclosed that enable rapid and cost-effective human-in-the-loop synthesis of domain-specific textual training data for a deep learning model. The data augmentation process incorporates a sentence generator, a sentence classifier, and weak-supervision by a domain expert that is ‘in the loop.’ Generally, both the sentence generator and the sentence classifier are implemented as machine learning models. The sentence generator generates new sentences based on manually labeled sentences and the sentence classifier generates labels for the newly generated sentences. The new sentences are corrected or verified by a domain expert and then used to retrain one or both of the sentence generator and the sentence classifier. | 2022-08-25 |
20220269864 | INTERPRETING TEXT CLASSIFIER RESULTS WITH AFFILIATION AND EXEMPLIFICATION - Technologies relating to model interpretation are described herein. A text classifier is provided with input text and assigns a class to the input text from amongst several possible classes. Based upon the class assigned to the input text by the text classifier, a class profile of a centroidal classifier is selected, where the class profile is constructed based upon numerous input texts to which the text classifier has previously assigned the class. Based upon the selection of the class profile, information that is indicative of operation of the text classifier with respect to the text classifier assigning the class to the input text is output, where the information includes an exemplar text sequence. | 2022-08-25 |
20220269865 | SYSTEM FOR KNOWLEDGE ACQUISITION - A system and method that translates sentences of natural language text into sets of axioms of formal logic that are consistent with parses resulting from NLP and acquired constrains as they accumulate. The system and method further present these axioms so as to facilitate further disambiguation of such sentences and produces axioms of formal logic suitable for processing by automated reasoning technologies, such as first-order or description logic suitable for processing by various reasoning algorithms, such as logic programs, inference engines, theorem provers, and rule-based systems. | 2022-08-25 |
20220269866 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING THEREOF - An electronic device and a control method thereof are provided. The electronic device includes a memory storing instructions; and a processor configured to execute the instructions to: based on a text being input, determine semantic roles of sentence components included in the text by inputting information on the text to a first model trained to determine the semantic roles of the sentence components; obtain a risk level of the text by inputting the sentence components with the determined semantic roles of the sentence components to a second model trained to output the risk level of the text based on the semantic roles of the sentence components; and perform an operation corresponding to the obtained risk level of the text. | 2022-08-25 |
20220269867 | METHOD FOR TRAINING IMAGE SEARCH MODEL AND METHOD FOR IMAGE SEARCH - A method for training an image-text retrieval model includes: obtaining a sample text including a first language text and a second language text; and obtaining a target semantic translation network by training a semantic translation network of an image-text retrieval model based on the sample text, and generating a target image-text retrieval model based on the target semantic translation network. | 2022-08-25 |
20220269868 | STRUCTURE SELF-AWARE MODEL FOR DISCOURSE PARSING ON MULTI-PARTY DIALOGUES - A method, computer program, and computer system is provided for parsing multi-party dialogue. Dialogue data having one or more elementary discourse units is received. A local representation and a global representation are determined for each of the elementary discourse units based on performing a pairwise comparison on the elementary discourse units. Relationships between the elementary discourse units are identified based on the determined local and global representations. A contextual link is predicted between non-adjacent elementary discourse units based on the identified relationships. | 2022-08-25 |
20220269869 | HANDWRITING TEXT SUMMARIZATION - The present disclosure relates to a computer-implemented method for handwriting-to-text-summarization, comprising obtaining, via a user interface of a system, a handwriting input representing a handwriting of a user of the system for handwriting-to-text-summarization, recognizing a text in the handwriting input, extracting at least one dynamic feature of the handwriting from the handwriting input, generating a text summary of the text, wherein generating the text summary is based on the text and on the at least one dynamic feature of the handwriting. The present disclosure also relates to a system for handwriting-to-text-summarization, comprising a user interface comprising a capturing subsystem configured to capture a handwriting of a user of the system, and wherein the system is configured to run the method for handwriting-to-text-summarization. | 2022-08-25 |
20220269870 | Readout of Communication Content Comprising Non-Latin or Non-Parsable Content Items for Assistant Systems - In one embodiment, a method includes accessing a communication content including zero or more Latin script text strings and one or more non-Latin script content items, determining a readout of the communication content based on parsing rules, wherein the parsing rules specify formats for the readout based on attributes of the non-Latin script content items, and wherein the readout includes the zero or more Latin script text strings and a description of the non-Latin script content items, and sending instructions for presenting an audio rendering of the readout of the communication content to a client system. | 2022-08-25 |
20220269871 | SHARED CONTROLLER FOR SYSTEM WITH MULTIPLE NFC READERS - This disclosure relates to systems with multiple NFC front ends and at least one shared controller. One disclosed system includes a first discrete device having a first near field communication (NFC) controller, a second discrete device having a second NFC controller, a communicative connection between the first discrete device and the second discrete device, and a system controller located on the first discrete device. The system controller is communicatively connected to the first NFC controller. The system controller is connected to the second NFC controller via the communicative connection. In specific approaches, the second discrete device can include a display which is also controlled by the system controller, and the system controller is NCI compliant and application aware. In specific approaches, the system controller can control the second NFC controller based on the content concurrently being provided to the display. | 2022-08-25 |
20220269872 | RFID AUXILIARY ANTENNA DEVICE - An RFID auxiliary antenna device is provided on an article that is adjacent to an RFID tag to be communicated or accommodates the RFID tag. The RFID auxiliary antenna device includes a conductive pattern that circles the article. A capacitance component generated between conductive patterns and an inductance component of the conductive pattern configure a resonant circuit. A resonant frequency of the resonant circuit is equal to or substantially equal to a communication frequency of the RFID tag, and the RFID auxiliary antenna device is magnetically coupled to each of the RFID tag and a reader/writer. | 2022-08-25 |
20220269873 | READING APPARATUS - Provided is a reading apparatus capable of efficiently reading information from an RFID tag. A reading apparatus ( | 2022-08-25 |
20220269874 | Systems and Approaches for Reducing Power Consumption in Industrial Digital Barcode Scanners - An imaging assembly for capturing at least one object appearing in a field of view (FOV) is provided that includes an image capturing system, a controller operatively coupled to the image capturing system to control operation thereof, and a processor operatively coupled to the controller. The image capturing system is adapted to capture an image having at least one sub-frame and is further adapted to obtain distance information of the object. The processor analyzes the image to determine a brightness value of at least a portion of the image and analyzes the distance information of the object to determine a distance value from the imaging assembly to the object. The processor further determines an illumination characteristic based on the brightness value and the distance value. | 2022-08-25 |
20220269875 | Barcode Reader with Off-Platter Detection - A barcode reader has a housing, weigh platter, and off-platter detection assembly including first and second imaging assemblies in communication with a controller. The first imaging assembly has a first imager configured to capture an image of a first lateral edge of the weigh platter. The second imaging assembly has a second imager configured to capture an image of a second lateral edge of the weigh platter. The controller is configured to: identify and locate the first and second lateral edges; receive first and second images from the imagers; allow the weight of an object to be recorded if determined that a footprint of the object does not extend over the first or second lateral edges; and prevent the weight of the object from being recorded and/or providing an alert to a user if determined that the footprint of the object does extend over the first or second lateral edges. | 2022-08-25 |
20220269876 | Barcode Readers with 3D Camera(s) - Methods and systems include using three-dimensional imaging apparatuses to capture three-dimensional images and analyze resulting three-dimensional image data to enhance captured two-dimensional images for scanning related processes such as object identification, symbology detection, object recognition model training, and identifying improper scan attempts or other actions performed by an operator. Imaging systems such as bi-optic readers, handheld scanners, and machine vision systems are described using three-dimensional imaging apparatuses and described capturing three-dimensional images and using with captured two-dimensional images. | 2022-08-25 |
20220269877 | TWO-DIMENSIONAL SYMBOL AND METHOD FOR READING TWO-DIMENSIONAL SYMBOL - The present invention facilitates, in a two-dimensional symbol in which a region where additional data is recorded is provided in addition to a region where normal data is recorded, identification of colors of the regions where the respective data are recorded. Vertically and horizontally arranged first modules are provided, and by the coloration patterns of the first module, a finder pattern for detecting a symbol position, a timing pattern for specifying the center position of the first module, and a first recording region where first data can be recorded are formed. In at least a partial region, a second module is disposed in a portion that does not overlap the first module and includes an intermediate point between the first modules adjacent to each other, and a second recording region where second data can be recorded is formed by the coloration pattern of the second module. | 2022-08-25 |
20220269878 | SYSTEMS AND METHODS OF DETECTING INCORRECT MASK USAGE - Example aspects include a method, apparatus and computer-readable medium of enforcing a mask wearing policy, comprising monitoring video frames of one or more video feeds. The aspects further include detecting one or more persons in the video frames. Additionally, the aspects further include determining whether the one or more persons are in violation of a mask wearing policy. Additionally, the aspects further include generating an alert in response to determining that the one or more persons are in violation of the mask wearing policy. | 2022-08-25 |
20220269880 | METHOD AND DEVICE FOR GENERATING EMOTICON, AND STORAGE MEDIUM - A method and a device for generating an emoticon are provided. A first expression tag list corresponding to a face image in a portrait is acquired by inputting the face image into an expression recognition model. Additionally, at least one label text corresponding to the face image is determined based on the first expression tag list and a correspondence between a preset text and a second expression tag list. Furthermore, an expression image corresponding to the portrait is determined, where the face image is a part of the expression image. Moreover, an emoticon is generated by labelling the expression image with the at least one label text. | 2022-08-25 |
20220269881 | MICRO-EXPRESSION RECOGNITION METHOD BASED ON MULTI-SCALE SPATIOTEMPORAL FEATURE NEURAL NETWORK - Disclosed is a micro-expression recognition method based on a multi-scale spatiotemporal feature neural network, in which spatial features and temporal features of micro-expression are obtained from micro-expression video frames, and combined together to form more robust micro-expression features, at the same time, since the micro-expression occurs in local areas of a face, active local areas of the face during occurrence of the micro-expression and an overall area of the face are combined together for micro-expression recognition. | 2022-08-25 |
20220269882 | METHOD AND SYSTEM FOR AUTOMATIC SPEAKER FRAMING IN VIDEO APPLICATIONS - For video applications, a method for dynamically switching from a current ROI to a target ROI is disclosed, wherein the target ROI only includes active speakers. Advantageously, if the target ROI crops a non-speaker, then the target ROI is expanded to include said non-speaker. Transitioning from the current ROI to the target ROI may be achieved based on a cutover transition technique, or a smooth transition technique. The cutover transition technique achieves the change from the current arrived to the target ROI in a single interval, whereas the smooth transition technique achieves the change over a number of intervals, wherein a percentage of the total change required is allocated to each interval. A system for implementing the above method is also disclosed. | 2022-08-25 |
20220269883 | METHODS, APPARATUSES, DEVICES AND STORAGE MEDIA FOR PREDICTING CORRELATION BETWEEN OBJECTS INVOLVED IN IMAGE - The present disclosure provides methods, apparatuses, devices and storage media for predicting correlation between objects involved in an image. According to a method, a first object and a second object involved in an acquired image are detected, where the first object and the second object represent different body parts. First weight information of the first object with respect to a target region and second weight information of the second object with respect to the target region are determined. The target region corresponds to a surrounding box for a combination of the first object and the second object. A weighted-processing is performed on the target region respectively based on the first weight information and the second weight information to obtain a first weighted feature and a second weighted feature of the target region. A correlation between the first object and the second object within the target region is predicted based on the first weighted feature and the second weighted feature. | 2022-08-25 |
20220269884 | DOCUMENT LINEAGE MANAGEMENT SYSTEM - In some implementations, a system may obtain document lineage training data associated with a plurality of historical documents and corresponding lineage data of independent historical documents of the plurality of historical documents. The system may train, based on the document lineage training data, a lineage analysis model to determine a lineage of edited sections of a source document. The system may receive a plurality of document files that correspond to a plurality of versions of a document. The system may determine, using a similarity analysis model, that a first section from a first version of the plurality of versions corresponds to a second section from a second version of the plurality of versions. The system may determine, using the lineage analysis model, a lineage of a corresponding section of the document that is associated with the first section and the second section. | 2022-08-25 |
20220269885 | Automated Direction Of Capturing In-Room Information For Use In Usability Assessment Of Buildings - Techniques are described for automated operations related to analyzing visual data from images captured in rooms of a building and optionally additional captured data about the rooms to assess room layout and other usability information for the building's rooms and optionally for the overall building, and to subsequently using the assessed usability information in one or more further automated manners, such as to improve navigation of the building. The automated operations may include identifying one or more objects in each of the rooms to assess and one or more target attributes of each object, and generating and providing instructions to cause the capture of images and optionally additional data about those objects and target attributes for further automated analysis, such as instructions provided to an automated image acquisition device in the room and/or an associated user. Once received, the captured images and other data is then analyzed accordingly. | 2022-08-25 |
20220269886 | IMAGE DATA AUGMENTATION DEVICE AND METHOD - An image data augmentation device includes a memory and a processor. The memory is configured to store multiple commands and multiple images; the processor is connected to the memory to read the multiple images and execute multiple commands to: identify at least one object-related image including at least one object from the multiple images; capture at least one object image from the at least one object related image; and superimpose the at least one object image on multiple arbitrary positions in the multiple images to generate multiple training sample images, and using the multiple training sample images to execute machine learning. In addition, an image data augmentation method is also disclosed here. | 2022-08-25 |
20220269887 | DEVICE AND METHOD FOR AUGMENTING IMAGES OF AN INCIDENT SCENE WITH OBJECT DESCRIPTION - A process of augmenting images of incident scenes with object descriptions retrieved from an audio stream. In operation, an electronic computing device detects an object of interest in an image captured corresponding to an incident scene and identifies an audio stream linked to an incident identifier of an incident that occurred at the incident scene. The electronic computing device then determines whether the audio stream contains an audio description of the detected object of interest. When it is determined that the audio stream contains the audio description of the detected object of interest, the electronic computing device generates a visual or audio prompt corresponding to the audio description of the detected object of interest and plays back the visual or audio prompt via a corresponding display or audio-output component communicatively coupled to the electronic computing device. | 2022-08-25 |
20220269888 | Automated Usability Assessment Of Buildings Using Visual Data Of Captured In-Room Images - Techniques are described for automated operations related to analyzing visual data from images captured in rooms of a building and optionally additional captured data about the rooms to assess room layout and other usability information for the building's rooms and optionally for the overall building, and to subsequently using the assessed usability information in one or more further automated manners, such as to improve navigation of the building. The automated operations may include identifying one or more objects in each of the rooms to assess, evaluating one or more target attributes of each object, assessing usability of each object using its target attributes' evaluations and each room using its objects' assessment and other room information with respect to an indicated purpose, and combining the assessments of multiple rooms in a building and other building information to assess usability of the building with respect to its indicated purpose. | 2022-08-25 |
20220269889 | VISUAL TAG CLASSIFICATION FOR AUGMENTED REALITY DISPLAY - Techniques and systems associate augmented tag data with content data and provide for output of content associated with the content data. An augmented tag data is generated by associating anchor tag data with secondary tag data, the anchor tag data and the secondary tag data being associated with an image. Content data is associated with the augmented tag data and the augmented tag data is output in association with the content data. In another approach, a wearable heads up display (WHUD) or other system captures a live view (LV) image in a line of sight of a user of the WHUD, a match is detected between the augmented tag data and a combination of anchor tag data and secondary tag data associated with the LV image, and the content associated the content data is output via the WHUD. | 2022-08-25 |
20220269890 | METHOD AND SYSTEM FOR VISUAL ANALYSIS AND ASSESSMENT OF CUSTOMER INTERACTION AT A SCENE - A system and a method for visual analysis of customer interaction at a scene are provided herein. The method may include: receiving at least one video sequence comprising a sequence of frames, captured by cameras covering the scene which includes at least one staff person and at least one customer; detecting, using a computer processor, persons in the at least one video sequence; classifying, using the computer processor, the persons to at least one customer; calculating a signature for the at least one person, enabling a recognition of the at least person appearing in other frames of the video sequences; and carrying out a visual analysis, using the computer processor and based on the at least one video sequence of at least one customer interaction which is visible at the scene, to yield an indication of the interaction between the staff person and the at least one customer. | 2022-08-25 |
20220269891 | CONFIGURING A NEURAL NETWORK TO PRODUCE AN ELECTRONIC ROAD MAP THAT HAS INFORMATION TO DISTINGUISH LANES OF A ROAD - A neural network can be configured to produce an electronic road map. The electronic road map can have information to distinguish lanes of a road. A feature in an image can be detected. The image can have been produced at a current time. The image can be of the road. The feature in the image can be determined to correspond to a feature, of a plurality of features, in a feature map. The feature map can have been produced at a prior time from one or more images. A labeled training map can be produced from the feature in the image and the plurality of features in the feature map. The labeled training map can have the information to distinguish the lanes of the road. The neural network can be trained to produce, in response to a receipt of the image and the feature map, the labeled training map. | 2022-08-25 |
20220269892 | REDUCING POWER USAGE IN A VIRTUAL VISOR - A virtual visor in a vehicle includes a screen with various regions that can alternate between being transparent and being opaque. A camera captures an image of the driver's face. A processor performs facial recognition or the like based on the captured images, and determines which region of the screen is transitioned from transparent to opaque to block out the sun from shining directly into the driver's eyes while maintaining visibility through the remainder of the screen. Low power monitors can be independently run on the vehicle, asynchronously with the algorithms and image processing that controls which region of the screen to be opaque. The monitors consume less power than operating the virtual visor continuously. Based on trigger conditions as detected by the monitors, the image processing and thus the alternating between opaque and transparent is ceased to save power until the trigger condition is no longer present. | 2022-08-25 |
20220269893 | SYSTEMS AND METHODS FOR CONSTRUCTING A MODULAR SIAMESE NETWORK FOR FACE VERIFICATION - Performance enhancement of face verification systems is credited due to advancement in deep learning methods. However, these systems fail to provide interpretations for decision makings despite their ability to attain high accuracy. Various post-hoc methods have been proposed due to increased demand of deep learning models for better interpretations. However, face verification systems are still prone to adversarial attacks. Present disclosure provides a face verification system and method which addresses the issue of interpretability by employing modular neural network(s), wherein representations for each individual facial feature such as nose, mouth, eyes, etc., are learned separately and verification of input face images is performed. Through experiments, present disclosure demonstrates that the method described herein is resistant to adversarial attacks, thereby addressing another crucial weakness concerning deep learning models. | 2022-08-25 |
20220269894 | THERMAL IMAGE POSITIONING METHOD AND SYSTEM THEREOF - A thermal image positioning method for determining a heat source location of the thermal image is disclosed. The thermal image positioning method includes obtaining a temperature array corresponding to the thermal image and determining a region of interest (ROI) of the temperature array. The thermal image positioning method further includes determining an ROI center reference point of the ROI, determining a plurality of corner points corresponding to the ROI, and determining the heat source location according to at least one of the plurality of corner points. A thermal image positioning system is also disclosed herein. | 2022-08-25 |
20220269895 | LOCALIZING RELEVANT OBJECTS IN MULTI-OBJECT IMAGES - Solutions for localizing relevant objects in multi-object images include receiving a multi-object image; detecting a plurality of detected objects within the multi-object image; generating a primary heatmap for the multi-object image, the primary heatmap having at least one region of interest; determining a relevant detected object corresponding to a region of interest in the primary heatmap; determining an irrelevant detected object not corresponding to a region of interest in the primary heatmap; and indicating the relevant detected object as an output result but not indicating the irrelevant detected object as an output result. Some examples identify a plurality of objects that are visually similar to the relevant object and displaying the visually similar objects to a user, for example as recommendations of alternative catalog items on an e-commerce website. Some examples are able to identify a plurality of relevant objects and display multiple sets of visually similar objects. | 2022-08-25 |