35th week of 2022 patent applcation highlights part 43 |
Patent application number | Title | Published |
20220277094 | METHOD FOR DYNAMIC PSEUDOFS CREATION AND MANAGEMENT IN A NETWORK FILESYSTEM - One example method includes connecting to a fileserver of a data protection system, initiating, at a client, an operation that is associated with a master pseudofs of the fileserver, creating, at the client, a client-specific pseudofs based upon the master pseudofs, and the client-specific pseudofs includes only those nodes of the master pseudofs that the client is authorized to access, and performing the operation using the client-specific pseudofs. | 2022-09-01 |
20220277095 | Privacy Preserving Data Search - Database entries can be protected by indexing the entries using a plurality of indexes, each associated with a level of access rights. A level of access rights can be determined from a search query, and an index can be selected based on the determined level of access rights. A search key can be generated based on the received query, and the selected index can be searched using the search query. Database entries mapped to the values of the selected index returned in response to the search can be outputted. Each index is associated with a different granularity defining the number and/or ambiguity of search results returned in response to searching an index. | 2022-09-01 |
20220277096 | MULTI-PARTY SECURE INFORMATION INTEGRATION SYSTEM - A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user in a database. A request may be transmitted to a third-party system to access secure third-party information stored by the third party based on third-party authentication information. The host system may receive the secure third-party information and store the secure third-party information in a memory location of the database that is associated with a different memory location including the secure host information. The memory location and the different memory location may be associated in the database based on a common information type. The host system may generate a graphical user interface that positions the secure host information and the secure third-party information in the graphical user interface based on their respective location in the database. | 2022-09-01 |
20220277097 | METHOD OR SYSTEM FOR QUERYING A SENSITIVE DATASET - A computer implemented method is presented for querying a dataset that contains sensitive attributes. The method comprises the steps of receiving a query specification, generating a set of aggregate statistics derived from the sensitive dataset based on the query specification and encoding the set of aggregate statistics using a set of linear equations. The relationships of each sensitive attribute represented in the set of aggregate statistics are also encoded into the set of linear equations. | 2022-09-01 |
20220277098 | METHOD AND SYSTEM FOR SECURELY STORING AND PROGRAMMATICALLY SEARCHING DATA - Systems and methods are disclosed for securely storing and programmatic searching of data files. The invention includes storing datafiles in fixed-sized packets of data that are subjected to fixed shuffle of the data elements (with or without prior fixed padding and with or without prior fixed perturbation), and target search elements are identified by way of the fixed shuffled indices, which are encrypted by conventional methods and decrypted for search by credentialed users. | 2022-09-01 |
20220277099 | ENCRYPTING DATA RECORDS AND PROCESSING ENCRYPTED RECORDS WITHOUT EXPOSING PLAINTEXT - A computer implemented method of applying a unified search for a match of one or more features in a plurality of encrypted records, comprising using one or more processors of a server associated with a database comprising a plurality of encrypted records. The processor(s) is adapted for receiving a query for searching one or more plaintext features in the plurality of encrypted, searching for a match of the one or more plaintext features using a first search methodology and a second search methodology and outputting an indication of matching encrypted records according to the match. Wherein the second search methodology is asymptotically faster than the first search methodology and wherein the first search methodology is used for searching a subset of the plurality of encrypted records selected based on status indication associated with each encrypted record. | 2022-09-01 |
20220277100 | SEARCHABLE ENCRYPTION SYSTEM, SEARCHABLE ENCRYPTION METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - A searchable encryption system includes a registration device including an index generation unit ( | 2022-09-01 |
20220277101 | VISUAL HACKING PREVENTION OF A MOBILE DEVICE - Protecting a mobile device from visual hacking comprises analyzing a displayed window/page containing data fields and parsing the fields to identify when sensitive information is displayed. Data from a gyroscope of the mobile device is used to detect roll and pitch viewing angles of the mobile device, data from a proximity sensor is used to detect a distance between the mobile device and the user, and a camera is used to take an image of the user and detect a number of faces visible in the image. The sensitive information is obscured when any predefined conditions are not met, including: determining that the roll and pitch viewing angles are not within pitch and roll threshold values, or that the detected distance is not within distance threshold values, or that more than a single face is detected in the image. | 2022-09-01 |
20220277102 | Process using one-way hashing function for secure collection, presentation and storage of PII - The present disclosure describes systems and methods for the secure collection, storage and presentation of sensitive personally identifiable information. The method includes a data transformation process centrally administered by a trusted third-party that utilizes a one-way hash function to transform the personally identifiable information into a hash digest—an unintelligible string of random digits and characters—at the point and time of collection for storage and subsequent reference, essentially replacing sensitive personal data with hash digests as representative tokens of the original information without revealing the true values. | 2022-09-01 |
20220277103 | DATA SUBJECT ACCESS REQUEST PROCESSING SYSTEMS AND RELATED METHODS - In particular embodiments, computer-implemented data processing, systems, and method configured to: receive a request to initiate a transaction between an entity and a data subject, generate (i) a consent receipt for the transaction comprising at least a unique subject identifier and a unique consent receipt key and (ii) a unique cookie to identify the data subject's transaction initiated by the data subject, store the consent receipt for the transaction and the unique cookie, receive a data subject access request from the data subject, verify an identity of the data subject based at least in part on the unique cookie process the request, process the request by identifying one or more pieces of personal data associated with the data subject, and taking one or more actions based at least in part on the data subject access request. | 2022-09-01 |
20220277104 | Method for managing privacy of videos and photos recorded through a communication application - A method for managing privacy of videos and photos recorded through a communication application by displaying a secret recording button on touch screens of a user's and contact's mobile devices, recording a video or a photo by the user's mobile device, applying on the recorded video or photo a re-watch mode by using the secret recording button, displaying in the message box of the user and the contact the recorded video or photo. The re-watch mode causes the mobile device to transmit the recorded video or photo to be saved in the server, displaying on the touch screens of the mobile devices a re-watch button, sending to the server a re-watch command by using the re-watch button in both mobile devices, receiving from the server the recorded video or photo to the mobile devices, and posting it in the message box of the user and the contact. | 2022-09-01 |
20220277105 | CHAINING, TRIGGERING, AND ENFORCING ENTITLEMENTS - Embodiments are directed to techniques for chaining, triggering, and/or enforcing entitlements in a constrained environment. A constrained environment may be provided within with shielded assets are required to exist or execute. An entitlement may be granted on a variety of shielded assets, including datasets, computations scripts, data privacy pipelines, and intermediate datasets generated by an intermediate step of a data privacy pipeline. Thus, a beneficiary may use a granted entitlement as an input into other data privacy pipelines, without the need for the grantor to approve each specific downstream operation. The constrained environment may enforce an entitlement by fulfilling applicable constraints upon accessing the entitlement, restricting the output of the entitlement to the constrained environment, and fulfilling applicable policies when executing downstream operations. Data may be exported from the constrained environment when the data consumer seeking to export has sufficient ownership rights or export permission and applicable policies are fulfilled. | 2022-09-01 |
20220277106 | METHOD AND APPARATUS FOR DE-IDENTIFICATION OF PERSONAL INFORMATION - Disclosed are a method and an apparatus for de-identification of personal information. The method for de-identification of personal information comprises the steps of: obtaining, from a database, a raw table including records in which raw data indicating the personal information is recorded; generating generalized data by generalizing the raw data recorded in each of the records included in the raw table; setting a generalized hierarchical model consisting of the raw data and the generalized data; generating a raw lattice including a plurality of candidate nodes on the basis of the generalized hierarchical model; and setting, from among the plurality of candidate nodes included in the raw lattice, a final lattice including at least one candidate node satisfying a predetermined criterion. Thus, it is possible for the personal information to be efficiently de-identified. | 2022-09-01 |
20220277107 | CONFIDENTIAL COMPUTING WORKFLOWS - A method may include obtaining, by a processing device, a workflow object that includes a plurality of workflow entity objects and one or more data objects, and executing a workflow by identifying, from the application objects, an application object that corresponds to a first application, wherein the workflow associates the application with at least one of the data objects, determining, whether the first application has permission to access the data object according to a data policy associated with the data object, wherein the data policy specifies one or more data access criteria, wherein the first application has permission to access the data object in response to one or more of the workflow entity objects that are associated with the data object satisfying the data access criteria, and responsive to determining that the first application has permission to access the data object, executing the first application in a secure enclave. | 2022-09-01 |
20220277108 | Trusted Application Running Method, Information Processing Method, Memory Allocation Method, and Apparatus - A trusted application running method applied to a computer system on which a trusted execution environment (TEE) and a rich execution environment (REE) are deployed, where one or more trusted applications (TAs) run on the TEE operating system. The TEE operating system may start a target TA. Then, the target TA may send, to the TEE operating system, a loading request for a target dynamic library supporting the target service. The TEE operating system may load the target dynamic library to memory space of the target TA in response to the loading request. In this way, before the target TA runs the target service, a program module used to support the target service does not need to be loaded to the memory space of the TA, thereby reducing a waste of the memory space of the TA. | 2022-09-01 |
20220277109 | SYSTEMS AND METHODS FOR AUTHENTICATING PHOTOGRAPHIC IMAGE DATA - The present disclosure provides systems and methods for authenticating photographic data. In one embodiment, a method comprises providing an image authentication application for use on a client device, the application configured to control image capture and transmission; receiving an image data file from the application at the authentication server comprising a photographic image captured by the application and metadata associated therewith; applying a watermark to the photographic image to create a watermarked image; applying date and time information to the tagged image; applying location information to the tagged image; creating a web address associated with the image data file; uploading the photographic image, the tagged image, or both to the web address; and transmitting an authenticated image file to the client device, the authenticated image file comprising one or more of: the watermarked image, the photographic image, the date and time information, geographic information, and the web address. | 2022-09-01 |
20220277110 | SECURE COMPUTATION SYSTEM, SECURE COMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM - A secure computation system comprises a secured cache that stores a result of a computation process using secured data while maintaining the result in secret; a normal cache that stores a result of a computation process using secured data without maintaining the secret processing; and a first confidentiality determination part that determines whether to store the result of the computation process in the secured cache or in the normal cache. | 2022-09-01 |
20220277111 | Obfuscating a Set of Encoded Data Slices - A method includes a computing device of a storage network obfuscating encoded data slices of a first set of encoded data slices of a plurality of sets of encoded data slices using an obfuscating method to produce obfuscated encoded data slices. The method further includes the computing device of the storage network outputting the obfuscated encoded data slices for storage in the storage network. | 2022-09-01 |
20220277112 | STRUCTURAL INTEGRATED DESIGN METHOD FOR CERAMIC MATRIX COMPOSITE BOLT PREFORM - A structural integration design method for a ceramic matrix composite bolt preform is provided, which includes: preform modeling; structure modeling; deformation and failure calculation. The method builds different small composites inside the bolt according to actual mesostructures of the ceramic matrix composites, which can realize structurally macroscopic failures caused by mesoscopic failures inside the small composites. The screw threads that are built by the method can reflect a failure form of thread teeth, and the influence of complex stress conditions of the screw threads on the failure form of the screw fracture is also considered, which improves the prediction accuracy of the strength of the ceramic matrix composite bolt. The method builds a structure integrated model, which has a certain structure, for a ceramic matrix composite preform according to the actual size and shape of the structure. The model can have high accuracy, accurately reflect various components of the material, and give macroscopic and mesoscopic structural parameters, so as to facilitate the machining of preparation personnel. | 2022-09-01 |
20220277113 | Computer-implemented method for changing a model geometry of an object - The invention relates to changing a model geometry of an object by providing a target geometry and a model geometry for the object; using the model geometry to provide an actual geometry of the object; determining whether there is a deviation between the target geometry and the actual geometry; and changing the model geometry into a modified model geometry on the basis of the determined deviation; wherein determining results in a first non-rigid mapping, if there is a deviation, that associates two geometries with each other by using a parameter set and describing the determined at deviation, or at least the changing is carried out by a second non-rigid mapping that associates two geometries with each other by using a parameter set. Thus, correct values are provided in the event of deviations and deformation, and the corrected values reduce the effort in finding a model geometry for producing an object. | 2022-09-01 |
20220277114 | INFORMATION PROCESSING DEVICE, PROGRAM, AND INFORMATION PROCESSING METHOD - An information processing device is configured so as to execute a first division execution step, a physical computation step, and a second division execution step. The target data is mesh data, polygon data, or CAD data for an object or a space, and the regional division is computation for dividing the target data into a plurality of regions. In the first division execution step, first regional division of the target data is executed. In the physical computation step, physical computation is performed on the target data subjected to the first regional division. In the second division execution step, the result of the physical computation is used as a basis to determine a plurality of flow tubes, flow lines, or flow surfaces. In the second division execution step, second regional division is executed on the basis of the flow tubes, the flow lines, or the flow surfaces. | 2022-09-01 |
20220277115 | SIMULATION SYSTEM, SIMULATION PROGRAM, AND SIMULATION METHOD - A plurality of time wheels, in which a plurality of step sizes of time evaluated as subsequent times in discrete time are set as tags and an event is registered in association with the tags, are generated as a hierarchical time wheel to correspond to a start-up time of the event ranging over a plurality of time tiers having different time units; the event is registered in association with the tags of the plurality of time wheels of the hierarchical time wheel; an error generated between the start-up time stored in the event and the start-up time at which the event is actually started is adjusted on the basis of a difference between a first designated position indicating a current time set in advance for a first time wheel corresponding to any of the time tiers of the hierarchical time wheel, and an n-th designated position indicating a current time set in advance for an n-th time wheel corresponding to a lower-order time tier than the first time wheel; and the event associated with the tags is started when the first designated position of the first time wheel and the n-th designated position of the n-th time wheel coincide with the start-up time of the event. | 2022-09-01 |
20220277116 | IDENTIFICATION OF HOT SPOTS OR DEFECTS BY MACHINE LEARNING - Methods of identifying a hot spot from a design layout or of predicting whether a pattern in a design layout is defective, using a machine learning model. An example method disclosed herein includes obtaining sets of one or more characteristics of performance of hot spots, respectively, under a plurality of process conditions, respectively, in a device manufacturing process; determining, for each of the process conditions, for each of the hot spots, based on the one or more characteristics under that process condition, whether that hot spot is defective; obtaining a characteristic of each of the process conditions; obtaining a characteristic of each of the hot spots; and training a machine learning model using a training set including the characteristic of one of the process conditions, the characteristic of one of the hot spots, and whether that hot spot is defective under that process condition. | 2022-09-01 |
20220277117 | RESIN BEHAVIOR ANALYSIS APPARATUS, RESIN BEHAVIOR ANALYSIS METHOD AND RESIN BEHAVIOR ANALYSIS PROGRAM - A resin behavior analysis apparatus configured to analyze behavior of a fiber when molding a sheet material of a fiber reinforced resin including a fiber bundle which is an assembly of a plurality of the fibers. The apparatus includes: a CPU and a memory connected to the CPU. The CPU is configured to perform: generating a sheet model which is a model of the sheet material; generating a fiber bundle model which is a model of the fiber bundle in the sheet model; generating a fiber model which is a model of the fiber in the fiber bundle model; and analyzing behavior of the fiber model based on a condition for molding the sheet material. | 2022-09-01 |
20220277118 | Multi-Component Simulation Method and System - A method includes providing a plurality of simulation components ( | 2022-09-01 |
20220277119 | A System and Method for Generating a Holistic Digital Twin - A system and method for generating a holistic digital twin of an industrial facility that includes a plurality of assets, wherein the said system includes conversion units configured to convert asset related data collected from different tools utilized to plan and/or operate the industrial facility in a tool specific data format and asset related data provided by data sources of the industrial facility in a data source specific data format into a common graphical representation, a matching unit configured to match the common graphical representations of the converted asset related data to provide a mapping between the assets of the industrial facility, and a merging unit configured to merge the mapped assets of the industrial facility into a unified graph to provide the holistic digital twin of the industrial facility. | 2022-09-01 |
20220277120 | SYSTEMS AND METHODS FOR MACHINE LEARNING BASED FAST STATIC THERMAL SOLVER - Machine assisted systems and methods for enhancing the resolution of an IC thermal profile from a system analysis are described. These systems and methods can use a neural network based predictor, that has been trained to determine a temperature rise across an entire IC. The training of the predictor can include generating a representation of two or more templates identifying different portions of an integrated circuit (IC), each template associated with location parameters to position the template in the IC; performing thermal simulations for each respective template of the IC, each thermal simulation determining an output based on a power pattern of tiles of the respective template, the output indicating a change in temperature of a center tile of the respective template relative to a base temperature of the integrated circuit; and training a neural network. The trained predictor can be used to determine a temperature rise and then can be appended to a system level thermal profile of the IC to generate a detailed thermal profile of the IC. | 2022-09-01 |
20220277121 | AUTOMATIC GENERATION OF DISTILLATION MODELS FOR NON-IDEAL BEHAVIOR IN BLENDED FUELS - Apparatus and associated methods relate to generating, from a predetermined distillation profile (DP | 2022-09-01 |
20220277122 | Soft Error-Mitigating Semiconductor Design System and Associated Methods - A soft error-mitigating semiconductor design system and associated methods that tailor circuit design steps to mitigate corruption of data in storage elements (e.g., flip flops) due to Single Events Effects (SEEs). Required storage elements are automatically mapped to triplicated redundant nodes controlled by a voting element that enforces majority-voting logic for fault-free output (i.e., Triple Modular Redundancy (TMR)). Storage elements are also optimally positioned for placement in keeping with SEE-tolerant spacing constraints. Additionally, clock delay insertion (employing either a single global clock or clock triplication) in the TMR specification may introduce useful skew that protects against glitch propagation through the designed device. The resultant layout generated from the TMR configuration may relax constraints imposed on register transfer level (RTL) engineers to make rad-hard designs, as automation introduces TMR storage registers, memory element spacing, and clock delay/triplication with minimal designer input. | 2022-09-01 |
20220277123 | Systems And Methods For Tracking Synthesis Optimizations For Circuit Designs - A method is provided for using an integrated circuit design tool to optimize a circuit design for an integrated circuit. Optimizations that affect first circuits in the circuit design and that are performed during synthesis of the circuit design for the integrated circuit are recorded in first records in a database. Second records are recorded in the database that indicate second circuits in the circuit design that fanin to or fanout from the first circuits and that are affected by the optimizations. A root cause of at least one of the optimizations is determined using the first and the second records in the database. A sequence of the optimizations affecting the first and the second circuits is determined using the first and the second records in the database. | 2022-09-01 |
20220277124 | Livelock Detection in a Hardware Design Using Formal Evaluation Logic - A hardware monitor arranged to detect livelock in a hardware design for an integrated circuit. The hardware monitor includes monitor and detection logic configured to detect when a particular state has occurred in an instantiation of the hardware design; and assertion evaluation logic configured to periodically evaluate one or more assertions that assert a formal property related to reoccurrence of the particular state in the instantiation of the hardware design to detect whether the instantiation of the hardware design is in a livelock comprising the predetermined state. The hardware monitor may be used by a formal verification tool to exhaustively verify that the instantiation of the hardware design cannot enter a livelock comprising the predetermined state. | 2022-09-01 |
20220277125 | INITIALIZING ON-CHIP OPERATIONS - A method of configuring an integrated circuit including multiple hardware tiles, includes: establishing a data forwarding path through the multiple hardware tiles by configuring each hardware tile, except for a last hardware tile, of the multiple hardware tiles to be in a data forwarding state, in which configuring each hardware tile, except for the last hardware tile, to be in a forwarding state includes installing a respective forwarding state counter specifying a corresponding predefined length of time that the hardware tile is in the data forwarding state; supplying, along the data forwarding path, each hardware tile of the plurality of hardware tiles with a respective program data packet comprising program data for the hardware tile; and installing, for each hardware tile of the multiple hardware tiles, the respective program data. | 2022-09-01 |
20220277126 | SYSTEMS AND METHODS FOR OBFUSCATING A CIRCUIT DESIGN - Systems and methods for obfuscating a circuit design are described. One of the methods includes receiving the circuit design from a user computing device. The circuit design includes a plurality of circuit components. The method further includes obfuscating each of the circuit components by transforming layout features associated with the circuit design into a generic layout feature representation. The generic layout feature representation excludes scaled representations of the layout features. The method also includes generating a visual representation of the obfuscated designs. Each of the obfuscated designs has an input port and an output port. The method further includes enabling placement of the obfuscated designs and routing between the input ports and the output ports of the obfuscated designs. The method includes generating an obfuscated integrated circuit design having a master input port, a master output port, the obfuscated designs, and the routing between the obfuscated designs. | 2022-09-01 |
20220277127 | Bonded Semiconductor Device And Method For Forming The Same - A method for wafer bonding includes receiving a layout of a bonding layer with an asymmetric pattern, determining whether an asymmetry level of the layout is within a predetermined range by a design rule checker, modifying the layout to reduce the asymmetry level of the layout if the asymmetry level is beyond the predetermined range. The method also includes outputting the layout in a computer-readable format. | 2022-09-01 |
20220277128 | Integrated Circuit Layouts with Fill Feature Shapes - Various examples of conductor features in integrated circuit layouts are disclosed herein. In an example, a method includes receiving an integrated circuit layout, inserting, into the integrated circuit layout, a design containing a first set of Front-End Of Line (FEOL) shapes of an integrated circuit and a first set of Back-End Of Line (BEOL) shapes of the integrated circuit, inserting, into the integrated circuit layout, a set of cells containing a second set of FEOL shapes of the integrated circuit and a second set of BEOL shapes of the integrated circuit, removing a subset of the second set of BEOL shapes that conflict with the design, and providing the integrated circuit layout that includes the design and the set of cells for fabrication of the integrated circuit. The second set of FEOL shapes includes contact shapes that define contacts of the integrated circuit. | 2022-09-01 |
20220277129 | METHOD, APPARATUS AND DEVICE FOR MEASURING SEMICONDUCTOR STRUCTURE - Embodiments of this application provide a method, an apparatus and a device for measuring a semiconductor structure. Before measurement of a to-be-measured semiconductor structure, a reference semiconductor structure corresponding to the to-be-measured semiconductor structure is set, and a first simulation model corresponding to the to-be-measured semiconductor structure and a second simulation model corresponding to the reference semiconductor structure are established, some structure parameters of the to-be-measured semiconductor structure have parameter values different from those of corresponding structure parameters of the reference semiconductor structure. During measurement of the to-be-measured semiconductor structure, both the to-be-measured semiconductor structure and the reference semiconductor structure are simultaneously measured by using an OCD measurement technology, to find structure parameters that can satisfy both the first simulation model and the second simulation model, and parameter value of each structure parameter finally determined for the first simulation model is used as structure parameter of the to-be-measured semiconductor structure. | 2022-09-01 |
20220277130 | MASK RULE CHECKING FOR CURVILINEAR MASKS FOR ELECTRONIC CIRCUITS - A system performs mask rule checks (MRC) for curvilinear shapes. The width of a curvilinear shape is different along different parts of the shape. A medial axis for a curvilinear shape is determined. The medial axis is trimmed to exclude portions that are within a threshold distance from corners or too far from edges. The trimmed medial axis is used to perform width checks for mask rules. The system generates medial axis between geometric shapes and uses it to determine whether two geometric shapes are at least a threshold distance apart. The system performs acute angle checks for sharp corners. The system determines angles using lines drawn from vertices to end points on the boundary of the shape that are at a threshold distance. These angles are used for checking acute angle mask rule violations. | 2022-09-01 |
20220277131 | ELECTRONIC PUBLISHING PLATFORM - Disclosed herein is a web user experience improvement for digital magazines. A digital magazine viewing platform is integrated with a digital magazine publishing platform including features that leverage the integration including user interface arrangement based on viewing habits and ripped content that is insertable into draft digital magazine documents. In some embodiments, a machine learning model categorizes magazine styles and present publishing features based on those magazines viewed or subscribed to by a given user. | 2022-09-01 |
20220277132 | METHOD, EQUIPMENT, AND MEDIUM FOR DISPLAYING CONTENT - The present disclosure relates to a method, device and terminal for displaying content, and a medium, used for completely displaying content entered by a user when a content including many characters is entered in an input box, so as to avoid tedious operation when the user views the entered content which is not displayed. The method for displaying content of the present disclosure includes: receiving target content entered in a first display region; calculating an occupancy rate based on the target content and the first display region in real time; reducing a font size of the target content in response to that the occupancy rate satisfies a first condition; generating a second display region for displaying the target content in response to that the occupancy rate satisfies a second condition. | 2022-09-01 |
20220277133 | SYSTEM AND METHOD INTEGRATING MACHINE LEARNING ALGORITHMS TO ENRICH DOCUMENTS IN A CONTENT MANAGEMENT SYSTEM - A system and method for integrating machine learning algorithms to enrich documents in a content management system. The content management system includes a content services engine, a transformation engine to execute one or more transformations on documents stored in the content management system, and a machine learning services to apply a machine learning algorithm to the documents based on the one or more transformations. | 2022-09-01 |
20220277134 | DOCUMENT CREATION SUPPORT APPARATUS, METHOD, AND PROGRAM - A document creation support apparatus includes at least one processor, and the processor is configured to display a sentence including at least one content on a display, specify a correction content to be added to the sentence or deleted from the sentence based on input or designation of at least some characters of the correction content, and correct the sentence based on the correction content. | 2022-09-01 |
20220277135 | SYSTEMS AND METHODS FOR QUERY-FOCUSED SUMMARIZATION - Embodiments described herein provide a query-focused summarization model that employs a single or dual encoder model. A two-step approach may be adopted that first extracts parts of the source document and then synthesizes the extracted segments into a final summary. In another embodiment, an end-to-end approach may be adopted that splits the source document into overlapping segments, and then concatenates encodings into a single embedding sequence for the decoder to output a summary. | 2022-09-01 |
20220277136 | TEMPLATE-BASED REDESIGN OF A DOCUMENT BASED ON DOCUMENT CONTENT - Certain embodiments involve a template-based redesign of documents based on the contents of documents. For instance, a computing system selects a template for modifying an input document. To do so, the computing system uses a generative adversarial network to generate an interpolated layout image from an input layout image, which represents the input document, and a template layout image, which represents the selected template. The computing system matches the input element to an interpolated element from the interpolated layout image. The computing system generates an output document by, for example, modifying a layout of the input document to match the interpolated layout image, such as by fitting the input element into a shape of the interpolated element. | 2022-09-01 |
20220277137 | METHOD AND APPARATUS FOR TEMPLATE AUTHORING AND EXECUTION - Various methods, apparatuses/systems, and media for real-time template authoring and execution am provided. A receiver receives a request to create a real-time document template. A processor implements a template authoring work flow process by leveraging native tools to create the real-time document template based on the received request; creates a real-time document based on the real-time document template; triggers an automatic verification process or a manual verification process in response to creating the real-time document; and validates the real-time document for execution after completing the automatic verification process or the manual verification process. | 2022-09-01 |
20220277138 | TRAINING DATA GENERATION DEVICE, TRAINING DATA GENERATION METHOD AND TRAINING DATA GENERATION PROGRAM - In teacher data generation processing for generating teacher data in which a tag is imparted in a document, a calculation unit ( | 2022-09-01 |
20220277139 | COMPUTER-READABLE RECORDING MEDIUM, ENCODING DEVICE, INDEX GENERATING DEVICE, SEARCH DEVICE, ENCODING METHOD, INDEX GENERATING METHOD, AND SEARCH METHOD - An information processing device executes a process includes determining whether or not encoding target data is in an inflective form of a word when the encoding target data included in target sentence data is encoded; and registering the encoding target data and a code assigned to the encoding target data in a dynamic dictionary in association with each other, in a case where the encoding target data is in the inflective form of the word. | 2022-09-01 |
20220277140 | ARTIFICIAL INTELLIGENCE-BASED LEGAL DOCUMENT ANALYSIS SYSTEM AND METHOD - Disclosed are an artificial intelligence-based legal document analysis system and method. The present invention can provide relevant laws and detailed explanation by analyzing the legal risk in a legal document having a structure such as legal clauses, terms and conditions and contracts by automatically comprehending the meaning by means of an artificial intelligence technology, and perceiving omissions and erroneous risk elements in the contract. | 2022-09-01 |
20220277141 | NEURAL NETWORK BASED REPRESENTATION LEARNING FOR NATURAL LANGUAGE PROCESSING - A machine learning based model generates a feature representation of a text sequence, for example, a natural language sentence or phrase. The system trains the machine learning based model by receiving an input text sequence and perturbing the input text sequence by masking a subset of tokens. The machine learning based model is used to predict the masked tokens. A predicted text sequence is generated based on the predictions of the masked tokens. The system processes the predicted text sequence using the machine learning based model to determine whether a token was predicted or an original token. The parameters of the machine learning based model are adjusted to minimize an aggregate loss based on prediction of the correct word for a masked token and a classification of a word as original or replaced. | 2022-09-01 |
20220277142 | METHODS AND APPARATUS FOR NATURAL LANGUAGE UNDERSTANDING IN CONVERSATIONAL SYSTEMS USING MACHINE LEARNING PROCESSES - This application relates to apparatus and methods for natural language understanding in conversational systems using machine learning processes. In some examples, a computing device receives a request that identifies textual data. The computing device applies a natural language model to the textual data to generate first embeddings. In some examples, the natural language model is trained on retail data, such as item descriptions and chat session data. The computing device also applies a dependency based model to the textual data to generate second embeddings. Further, the computing device concatenates the first and second embeddings, and applies an intent and entity classifier to the concatenated embeddings to determine entities, and an intent, for the request. The computing device may generate a response to the request based on the determined intent and entities. | 2022-09-01 |
20220277143 | METHODS AND APPARATUS FOR NATURAL LANGUAGE UNDERSTANDING IN CONVERSATIONAL SYSTEMS USING MACHINE LEARNING PROCESSES - This application relates to apparatus and methods for natural language understanding in conversational systems using machine learning processes. In some examples, a computing device receives a request that identifies textual data. The computing device applies a natural language model to the textual data to generate first embeddings. In some examples, the natural language model is trained on retail data, such as item descriptions and chat session data. The computing device also applies a dependency based model to the textual data to generate second embeddings. Further, the computing device concatenates the first and second embeddings, and applies an intent and entity classifier to the concatenated embeddings to determine entities, and an intent, for the request. The computing device may generate a response to the request based on the determined intent and entities. | 2022-09-01 |
20220277144 | WORD EMBEDDING VECTOR INTEGRATION DEVICE, WORD EMBEDDING VECTOR INTEGRATION METHOD, AND WORD EMBEDDING VECTOR INTEGRATION PROGRAM - To make it possible to efficiently learn word embedding vectors of respective words contained in two corpora. | 2022-09-01 |
20220277145 | Domain Context Ellipsis Recovery for Chatbot - Methods and apparatuses for performing context completion to messages in a session are provided in the present disclosure. A message may be obtained. It may be detected that there exists context ellipsis in the message. It may be determined whether the message is retained in the current domain of the session. In response to determining that the message is retained in the current domain, a complementary text for recovering the context ellipsis may be selected in the current domain. A completed message may be generated based on the message and the complementary text. | 2022-09-01 |
20220277146 | DETERMINING TOPICS AND ACTION ITEMS FROM CONVERSATIONS - Embodiments are directed to organizing conversation information. Two or more machine learning (ML) models and a plurality of sentences provided from a conversation may be employed to generate insight scores for each sentence such that each insight score correlates to a probability that its sentence includes one or more of an action or a question. In response to one or more sentences having insight scores that exceed a threshold value an information score and a definiteness score may be determined for the one or more sentences. And one or more insights associated with the conversation may be generated based on the one or more sentences. A report may be generated that associates the one or more insights with one or more portions of the conversation that include the one or more sentences that are associated with the insights. | 2022-09-01 |
20220277147 | PROFILE-BASED NATURAL LANGUAGE MESSAGE GENERATION AND SELECTION - In some embodiments, text for user consumption may be generated based on an intended user action category and a user profile. In some embodiments, an action category, a plurality of text seeds, and a profile comprising feature values may be obtained. Context values may be generated based on the feature values, and text generation models may be obtained based on the text seeds. In some embodiments, messages may be generated using the text generation models based on the action category and the context values. Weights associated with the messages may be determined, and a first text message of the messages may be sent to an address associated with the profile based on the weights. Based on a reaction value obtained in response to the first message, a first expected allocation value may be updated based on the reaction value. | 2022-09-01 |
20220277148 | MODEL LOCALIZATION FOR DATA ANALYTICS AND BUSINESS INTELLIGENCE - Implementations of the disclosure provide a method, system and computer program product for model localization. In an implementation of the disclosure, a method for model localization includes parsing a model to identify translatable terms, generating a seed file associating each of the translatable terms with a corresponding tag and replacing each translatable term in the model with a corresponding tag and submitting each of the translatable terms to machine translation for a target language to produce a different translation file mapping each tag from the seed file with a translated term in the target language of a corresponding one of the translatable terms. Then, the model may be deployed in a data analytics application using the different translation file to dynamically translate each translatable term into a corresponding translated term within a user interface to the data analytics application. | 2022-09-01 |
20220277149 | STATISTICAL LANGUAGE MODELS FOR SIMULATING COMMUNICATION SESSIONS - A statistical language model may be used to simulate one or more users of a conversation. The statistical language model may be used to train a user to participate in a particular types of conversation by simulating communications by another type of user in the conversation. The communications may be simulated by selecting a simulation context from available simulation contexts and the simulation context may correspond to a difficulty level. Upon receiving a communication from a user, a responsive simulated communication may be generated by processing the received communication and the simulation context with the statistical language model. Upon completion of the simulation, another simulation context may be selected for the next simulation. | 2022-09-01 |
20220277150 | User Equipment, Network Node and Methods in a Communications Network - A method performed by a first network node in a communications network, for handling translations of an ongoing media session between participants is provided. The first network node receives an audio input from a first UE of one of the participants in the ongoing media session, and provides at least a transcript of the audio input to the first UE and a translation of the audio input to a second UE of another participant in the ongoing media session. The first network node further obtains, from the first UE, an indication of an error in the transcript, and thereafter provides, to the second UE of the other participant in the ongoing media session, the indication of the error in the transcript. | 2022-09-01 |
20220277151 | WIRELESS TAG READING APPARATUS AND CONTROL METHOD FOR A WIRELESS TAG READING APPARATUS - In accordance with an embodiment, a wireless tag reading apparatus includes an antenna, first and second power feeding ports, and a controller. The first power feeding port feeds electric power into the antenna so as to emit the first linearly polarized wave from the antenna. The second power feeding port feeds electric power into the antenna so as to emit the second linearly polarized wave from the antenna. The controller sets a ratio of a time of power feeding from the first power feeding port to a time of power feeding from the second power feeding port to take a value according to a ratio of the number of wireless tags existing in the direction of the first linearly polarized wave to the number of wireless tags existing in the direction of the second linearly polarized wave. | 2022-09-01 |
20220277152 | OBJECT LOCATION SYSTEM AND METHOD USING RFID AND GUARD TAGS - A system for locating a RFID tag in a space or area having a physical barrier is disclosed herein. More specifically, the system comprises a plurality of guard tags for use in conjunction with a RFID tag disposed on an item and a RFID reader for locating the same. The system is configured to locate the RFID tag on either side of the physical barrier. The plurality of guard tags may comprise a plurality of negative encoded guard tags and a plurality of positive encoded guard tags, and an algorithm may be used to determine a probability of the RFID tag location within the physical space. A method of locating a RFID tag within a physical space, and a method of virtually shielding the physical space is also disclosed. | 2022-09-01 |
20220277153 | DATA-SECURING CHIP CARD CONSTRUCTION - A card may store data on integrated circuits housed within the card. The card includes two short-range antennas and one long-range antenna that are configured to transmit the data. Antennas of the card may be configured to transmit the data in different directions as a result of a signal-blocking layer embedded within the card that isolates respective antennas from electromagnetic signals originating from a direction on the opposing side of the blocking layer. The long-range antenna may be configured to transmit identification data of the user, while the short-range antennas may be configured to transmit financial data related to the user. A system may be configured to instantiate events for the user of the card with the long-range antenna. Events that are instantiated by the long-range antenna may then be executed using the short-range antennas. | 2022-09-01 |
20220277154 | PERSONAL MONITORING APPARATUS AND METHODS - An apparatus, including: an RFID reader located at an entrance or exit of a venue or located at an entrance or exit of a vehicle; a processor; and a transmitter. The RFID reader detects or reads an RFID tag on or associated with a personal monitoring device, wherein the RFID tag is detected or read by the RFID reader as the RFID tag enters the venue or the vehicle or exits from the venue or the vehicle. The processor generates a message containing information regarding a date and a time when the RFID tag was detected or read by the RFID reader and location information regarding the venue or the vehicle. The transmitter transmits the message to a user communication device and to a central processing computer. Information regarding the message, or the message, is stored in a distributed ledger and Blockchain technology system. | 2022-09-01 |
20220277155 | SYSTEMS AND METHODS FOR DISTRIBUTING INDUCTION OF OBJECTS TO A PLURALITY OF OBJECT PROCESSING SYSTEMS - An induction system is disclosed for filtering the induction of objects to a plurality of object processing systems. The induction system includes an evaluation means for evaluating at least one characteristic of an object, and routing means for routing the object in one of a plurality of directions responsive to the evaluated characteristic, at least one of the plurality of directions leading to a selected one of the plurality of object processing systems. | 2022-09-01 |
20220277156 | METHODS AND SYSTEMS FOR GUIDED LOCK-TAG-TRY PROCESS - Systems and methods for performing a Lock-Tag-Try (LTT) process. A computing device may scan an indicator and request a content item associated with the indicator. The computing device may receive the one or more content items associated with the indicator. The one or more content items are configured to guide a user through the LTT process. A server may be configured to receive the request and transmit the content item to the user device. The server may be further configured to store information related to the LTT process. | 2022-09-01 |
20220277157 | ULTRASONIC FINGERPRINT RECOGNITION CIRCUIT, METHOD FOR DRIVING SAME, AND DISPLAY DEVICE - Disclosed is an ultrasonic fingerprint recognition circuit. In the ultrasonic fingerprint recognition circuit, an ultrasonic sensor generates an AC echo signal based on an echo signal upon the fingerprint detection, and a signal converting unit converts the AC echo signal to a DC signal and transmit the DC signal to the signal output unit to generate a fingerprint recognition signal by a signal output unit. | 2022-09-01 |
20220277158 | SYSTEM AND METHOD FOR EFFICIENT CREATION AND INCREMENTAL UPDATING OF REPRESENTATIONS OF EMAIL CONVERSATIONS - Embodiments as disclosed include document analysis systems that may obtain email data collected or obtained from email servers from one or more source systems and build a graph of the emails, where the nodes of the email graph represent data about an email and the edges in the graph between the nodes of the graph are determined based on metadata associated with the emails or the text content of the emails. These email graphs may be quickly and efficiently updated as new email data is obtained such that the document analysis systems may organize emails into conversations for utilization by users in reviewing these emails in context. | 2022-09-01 |
20220277159 | Object Detection Network with Spatial Uncertainty - A hardware accelerator for an object detection network and a method for detecting an object are provided. The present disclosure provides robust object detection that advantageously augments traditional deterministic bounding box predictions with spatial uncertainties for various computer vision applications, such as, for example, autonomous driving, robotic surgery, etc. | 2022-09-01 |
20220277160 | INFORMATION PROMPT METHOD, APPARATUS, MEDIUM, GLASSES AND PROGRAM PRODUCT - The present application provides an information prompt method, apparatus, medium, glasses, and program product. The information prompt method provided by the present application includes: acquiring a scene video of an external scene, where the scene video includes a behavior feature of a target object; matching prompt information corresponding to the target object according to the behavior feature, where the prompt information is associated with the behavior feature; and displaying the prompt information on lenses of the pair of smart glasses. The information prompt method provided in the present application can enrich the types of information that the spectator can acquire on-site, and at the same time greatly improve the timeliness of acquiring related information by the spectator. | 2022-09-01 |
20220277161 | VIDEO PLAYBACK METHOD, MEDIUM, GLASSES AND PROGRAM PRODUCT - The present application provides a video playback method, a medium, glasses and program product. The video playback method provided by an embodiment of the present application acquires a scene video of an external scene in real time by the smart glasses that are worn, then extracts a target video of a target time period corresponding to key point information from the scene video, and automatically plays back the acquired target video on the smart glasses, so that highlights are automatically played back to a spectator in time during in-person watching, thereby improving the spectator's watching experience greatly. | 2022-09-01 |
20220277162 | OPTICAL PERSON RECOGNITION TECHNIQUES FOR SOCIAL DISTANCING - Methods, systems, and devices for data processing and artificial intelligence (AI) techniques are described. A system may support person detection using an optical camera. For example, the optical camera may detect motion and the system may implement a neural network to determine if the motion corresponds to a person's body. If the system detects a person, the system may assign a tracker identifier (ID) to the person's body and convert the position of the body in the view of the camera to a position in a horizontal plane. Based on the horizontal view, the system may spatially track the person in an environment, including determining if the person interacts with other people within a threshold distance, whether there are any congestion points in the environment, or both. The system may trigger alert procedures based on the interactions, congestion points, temperature readings for one or more people, or any combination thereof. | 2022-09-01 |
20220277163 | PREDICTIVE SHADOWS TO SUPPRESS FALSE POSITIVE LANE MARKING DETECTION - Systems and methods for the detection of road markings affected by shadows are described. At least one object is identified from a database. A shadow position associated with the at least one object is determined. The shadow position estimates a shadow from the at least one objected projected on a road. Road marking detection data for the road may be modified in response to the determined shadow position. A map layer may be generated to indicate where the shadow impacts the road marking detection data. | 2022-09-01 |
20220277164 | TECHNOLOGIES FOR IMAGE SIGNAL PROCESSING AND VIDEO PROCESSING - Systems, methods, and computer-readable media are provided for efficient control and data utilization between processing components of a system. An method can include obtaining image data captured by an image sensor; prior to a first computing component performing a first set of operations on the image data and a second computing component performing a second set of operations on the image data, determining one or more common operations included in the first set of operations and the second set of operations, wherein the first set of operations is different than the second set of operations; performing the one or more common operations on the image data; and generating an output of the one or more operations for use by the first computing component to perform the first set of operations and the second computing component to perform the second set of operations. | 2022-09-01 |
20220277165 | SYSTEM AND METHOD FOR IMPROVING DRIVER SITUATION AWARENESS PREDICTION USING HUMAN VISUAL SENSORY AND MEMORY MECHANISM - A system and method for improving driver situation awareness prediction using human visual sensory and memory mechanism that includes receiving data associated with a driving scene of a vehicle and an eye gaze of a driver of the vehicle. The system and method also include analyzing the data and extracting features associated with objects located within the driving scene and determining a situational awareness score that is associated a situational awareness of the driver with respect to each of the objects located within the driving scene. The system and method further include communicating control signals to electronically control at least one system of the vehicle based on the situational awareness score that is associated with each of the objects located within the driving scene. | 2022-09-01 |
20220277166 | METHODS AND SYSTEMS FOR RENDERING VIRTUAL OBJECTS IN USER-DEFINED SPATIAL BOUNDARY IN EXTENDED REALITY ENVIRONMENT - Methods and systems for rendering a virtual overlay in an extended reality (XR) environment are described. Image data is received, representing a current field of view (FOV) in the XR environment. A spatial boundary is defined in the current FOV, based on user input. An image label representing a region of interest (ROI) within the defined spatial boundary, and one or more object labels representing one or more objects within the defined spatial boundary are generated. At least one relevant virtual object is identified. The virtual object is relevant to a semantic meaning of the ROI based on the image label and/or the one or more object labels. Identification of the at least one relevant virtual object is outputted, to be renderable in the XR environment. | 2022-09-01 |
20220277167 | REAL-TIME DOCUMENTATION VERIFICATION USING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING - A method to verify documentation, such as healthcare documentation, in real-time is described. An image of a first document and demographic information is received from a patient. Optical character recognition (OCR) or QR code, barcode, or machine readable zone (MRZ) reading is performed on the image of the first document and a patient identifier is extracted from the first document. The patient identifier is compared to content in a database to identify a second document related to the first document that shares the patient identifier with the first document. The first document and the second document are verified as being associated with the patient based on the comparison and predefined business rules. OCR errors are identified in the first document and corrected using content from the second document. The method occurs prior to and allows the patient to pay for a healthcare appointment prior to attending the appointment. | 2022-09-01 |
20220277168 | INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM - An information processing apparatus includes a processor configured to: acquire positional information indicating a position of a portion of an article; acquire condition information indicating a condition of the portion of the article; and store the positional information and the condition information in association with each other. | 2022-09-01 |
20220277169 | SYSTEMS AND METHODS INCLUDING A MACHINE-LEARNT MODEL FOR RETRIEVAL - Systems and methods for retrieving a set of items are disclosed. A target string is received and a set of candidate items is selected from a pool of items based on the target string. The set of candidate items is ranked based on a scoring function. The scoring function includes a plurality of simultaneously determined coefficients. The plurality of simultaneously determined coefficients are generated by a trained ranking model. A set of N items selected from the set of candidate items based on the ranking is output. | 2022-09-01 |
20220277170 | METHOD FOR OPTIMIZING DEEP LEARNING OPERATOR, DEVICE AND STORAGE MEDIUM - A method for optimizing a deep learning operator, includes: calling a method of reading an image object to read target data from an L1 cache of an image processor to the processor in response to detecting the target data in the L1 cache, performing a secondary quantization operation on the target data in the processor to obtain an operation result and writing the operation result into a main memory of the image processor. The target data is fixed-point data obtained after performing a quantization operation on data to be quantized in advance and the data to be quantized is one of the following: float-point data of an initial network layer of the neural network model and fixed-point data outputted from a network layer previous to the current network layer. | 2022-09-01 |
20220277171 | USER-GENERATED VISUAL GUIDE FOR THE CLASSIFICATION OF IMAGES - Systems and methods are disclosed herein for creating a visual guide for developing training data for a classification of image, where the training data includes images tagged with labels for the classification of the images. A processor may prompt a user to define a framework for the classification. For an initial set of images within the training data, qualified human classifiers are prompted to locate the images within the framework and to tag the images with labels. The processor determines whether the tagged images have consistent labels, and, if so, the processor adds images to the training data. The processor may add the images by providing a visual guide, the visual guide including tagged images arranged according to their locations within the framework their labels, and prompting human classifiers to tag the additional images with labels for the classification, according to the visual guide. | 2022-09-01 |
20220277172 | METHOD AND SYSTEM FOR TRAINING A NEURAL NETWORK - A method for training a neural network for detecting a plurality of classes of object within a sample comprises providing a training data set comprising a plurality of samples, each annotated according to whether the samples include labelled objects of interest. In a first type of samples, all objects of interest are labelled according to their class and comprise a foreground of said samples, the remainder of the samples comprising background. In a second type of samples, some objects of interest are labelled in a foreground and their background may comprise unlabelled objects. A third type of samples comprise only background comprising no objects of interest. Negative mining is only performed on the results of processing the first and third types of samples. | 2022-09-01 |
20220277173 | FUNCTION TESTING FOR MOVABLE OBJECTS IN SAFETY CRITICAL APPLICATIONS WITH SPATIAL REPRESENTATION LEARNING AND ADVERSARIAL GENERATION - Methods and systems for performing function testing for moveable objects. One system includes an electronic processor configured to access a driving scene including a moveable object. The electronic processor is also configured to perform spatial representation learning on the driving scene. The electronic processor is also configured to generate an adversarial example based on the learned spatial representation. The electronic processor is also configured to retrain the deep learning model using the adversarial example and the driving scene. | 2022-09-01 |
20220277174 | EVALUATION METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, AND INFORMATION PROCESSING DEVICE - An evaluation method performed by a computer, the evaluation method includes generating a plurality of subsets that contain one or more pieces of training data, based on a set of a plurality of pieces of training data that includes pairs of input data and labels for machine learning, generating a trained model configured to estimate the labels from the input data, for each of the subsets, by performing the machine learning that uses the training data contained in the subsets, and performing evaluation related to aggression to the machine learning in the training data contained in the subsets, for each of the subsets, based on estimation accuracy of the trained model generated by using the training data contained in the subsets. | 2022-09-01 |
20220277175 | METHOD AND SYSTEM FOR TRAINING AND DEPLOYING AN ARTIFICIAL INTELLIGENCE MODEL ON PRE-SCAN CONVERTED ULTRASOUND IMAGE DATA - Post-scan ultrasound images are masked and labeled with anatomical features identified in the images. Masks corresponding to the features are transformed into the coordinate system of the pre-scan, raw ultrasound data frames corresponding to the images. The masks and their respective raw ultrasound data frames are used to train an artificial intelligence model. The model is then used to predict the presence of anatomical features of the same type in other pre-scan ultrasound data. Once predicted, the raw data is scan converted for display as segmented ultrasound images that identify the predicted anatomical features. Deployment of the model on pre-scan data avoids the need to account for different levels of processing that may be applied to post-scan images, while the labeling for training the model may be done on the post-scan images. | 2022-09-01 |
20220277176 | LOG CLASSIFICATION USING MACHINE LEARNING - Methods and a system of classifying unrecognized logs in an environment. The method includes inputting a log unrecognized during event collection into a machine learning model and predicting, by the machine learning model, a log source type of the log to allow for normalization of the log. The method also includes producing, by the machine learning model, a confidence score relating to the source type prediction, determining the confidence score exceeds a predetermined threshold, and submitting the log for normalization based on the log source type prediction. The method can also include predicting, by the machine learning model, an event name relating to the log, producing, by the machine learning model, a second confidence score relating to the event name prediction, determining the second confidence score exceeds another predetermined threshold, and submitting the log for normalization based on the identified log source type and the predicted event name. | 2022-09-01 |
20220277177 | Payment card reading system having a protective flap - A transaction card reading system, which includes: a transaction card reader having a slot for inserting a transaction card; and a protective flap movable between two positions: a closed position wherein the flap closes the insertion slot, and an open position wherein the flap is disposed at least partly outside the insertion slot. The protective flap includes a closure element integrally mounted on a one-piece support element, the closure element being shaped and dimensioned to close the insertion slot in the closed position. The one-piece support element includes at least one elastically deformable portion so as to allow switching from the closed position to the open position and vice versa. | 2022-09-01 |
20220277178 | GAME TOKEN MONEY, METHOD OF MANUFACTURING GAME TOKEN MONEY, AND INSPECTION SYSTEM - A game token money includes a plurality of plastic layers laminated through thermocompression bonding including at least a colored layer in the middle to specify a value of the game token money and a pair of pale color layers laminated on both sides of the colored layer. An RFID is embedded in a layer other than the outermost layer of the plurality of plastic layers; and a classification part is filled in at least one of the pale color layers to indicate a classification of the game token money. The classification part is recognizable from a side face and a front face of the game token money. The RFID contains information regarding a value of the game token money and a classification of the game token money indicated by the classification part. | 2022-09-01 |
20220277179 | BARCODE-BASED ENROLLMENT OF DEVICES WITH A MANAGEMENT SERVICE - Various examples for providing an enrollment barcode to a staging client are provided. Enrollment data can be provided to a barcode service, which generates an enrollment barcode. Interpreting the enrollment barcode by a client device causes a management component installed on the client device to authenticate to a management service using a staging credential encrypted or secured in the enrollment barcode, and causes the enrollment of the client device with the management service. | 2022-09-01 |
20220277180 | METHOD OF MANUFACTURING METAL PRODUCT AND METAL PRODUCT - A method of manufacturing a metal product comprise forming a base region on a surface of a metal member by repeatedly scanning along a predetermined first direction while irradiating the surface of the metal member with a base laser beam over a first set of rows. The method further comprises forming a marking by repeatedly scanning along a predetermined second direction while irradiating the surface of the metal member with a marking laser beam over a second set of rows. The second direction is different from the first direction. An identification code having a predetermined pattern comprises a combination of the base region and the marking. | 2022-09-01 |
20220277181 | IOT-BASED CABLE USED IN CABLE MANAGEMENT SYSTEM - A cable comprises: a cable core; and a cable sheath layer formed on the outside of the cable core, wherein the cable sheath layer has, on the outer surface thereof, a pattern corresponding to a binary code. A recognition rate is improved, and a problem of the productivity of the cable being reduced may be prevented by adjusting the widths of the pattern, corresponding to the binary code printed on the cable, in the vertical direction and the horizontal direction, and a plurality of patterns corresponding to the binary code printed on the cable are provided to prevent, even when the cable is buried in the ground or contacts a facility and a pattern corresponding to some binary patterns is not exposed, a pattern corresponding to the other binary patterns from being exposed and unrecognizable. | 2022-09-01 |
20220277182 | DUPLICATION DEVICE FOR KEY FOBS - A key fob duplication device is disclosed. The duplication device may have a housing and a display device attached to the housing. The duplication device may also have a controller enclosed within the housing. The controller may read data stored in the first key fob. The controller may also determine whether the first key fob can be duplicated based on the data. When the data indicates that the first key fob can be duplicated, the controller may write the data of the first key fob and an indicator value on a second key fob. The indicator value may indicate that the second key fob cannot be duplicated. When, however, the data indicates that the first key fob cannot be duplicated, the controller may display a message on the display device, indicating that the first key fob cannot be duplicated. | 2022-09-01 |
20220277183 | Identification Devices - Described examples relate to a radio frequency identification (RFID) device configured to be coupled to a surface of an object. The RFID device may include a housing having a first casing and a second casing. The RFID device may also include an RFID tag disposed between the first casing and the second casing. The RFID tag may comprises an antenna and an integrated circuit coupled to the antenna. Further, the RFID device may include a first break-line defined in the first casing and extending between an inner edge and an outer edge of the first casing. The first casing may be breakable along the first break-line. In addition, the RFID device may include a second break-line defined in the second casing and extending between an inner edge and an outer edge of the second casing. The second casing may be breakable along the second break-line. | 2022-09-01 |
20220277184 | SMALL PITCH RADIO FREQUENCY IDENTIFICATION (RFID) LABEL DETECTION - A printer assembly is described that includes a media hub configured to receive a media roll and supply a media from the media roll along a media path, wherein the media includes a plurality of labels each comprising a Radio Frequency Identification (RFID) inlay. The printer assembly also includes a media guide positioned adjacent to the media path. The media guide includes an RFID antenna, with the RFID antenna communicatively coupled to an RFID control system and configured to transmit signals to encode the RFID inlay on a first label. The media guide also includes at least one shield, wherein the at least one shield is positioned adjacent to the RFID antenna to prevent, during an encoding of the RFID inlay on the first label of the plurality of labels, an encoding of the RFID inlay on a second label of the plurality of labels. | 2022-09-01 |
20220277185 | Passive Micromechanical Counter - A passive micromechanical counter for counting and storing a number of mechanical pulses includes at least one memory cell, the memory cell having a cell input, a latching mechanism and an electromechanical coding unit, the cell input being designed to mechanically transmit the mechanical pulse to the latching mechanism, and the latching mechanism being designed to store the number of mechanical pulses transmitted by means of its discrete latching position. It is provided that an electrical digital signal can be generated by applying an electrical voltage to the electromechanical coding unit, the electrical digital signal representing the discrete latching position of the latching mechanism. | 2022-09-01 |
20220277186 | DIALOG SYSTEM WITH ADAPTIVE RECURRENT HOPPING AND DUAL CONTEXT ENCODING - The present disclosure describes systems and methods for dialog processing and information retrieval. Embodiments of the present disclosure provide a dialog system (e.g., a task-oriented dialog system) with adaptive recurrent hopping and dual context encoding to receive and understand a natural language query from a user, manage dialog based on natural language conversation, and generate natural language responses. For example, a memory network can employ a memory recurrent neural net layer and a decision meta network (e.g., a subnet) to determine an adaptive number of memory hops for obtaining readouts from a knowledge base. Further, in some embodiments, a memory network uses a dual context encoder to encode information from original context and canonical context using parallel encoding layers. | 2022-09-01 |
20220277187 | CONCEPT-BASED ADVERSARIAL GENERATION METHOD WITH STEERABLE AND DIVERSE SEMANTICS - Methods and systems for performing concept-based adversarial generation with steerable and diverse semantics. One system includes an electronic processor configured to access an input image. The electronic processor is also configured to perform concept-based semantic image generation based on the input image. The electronic processor is also configured to perform concept-based semantic adversarial learning using a set of semantic latent spaces generated as part of performing the concept-based semantic image generation. The electronic processor is also configured to generate an adversarial image based on the concept-based semantic adversarial learning. The electronic processor is also configured to test a target model using the adversarial image. | 2022-09-01 |
20220277188 | SYSTEMS AND METHODS FOR CLASSIFYING DATA SETS USING CORRESPONDING NEURAL NETWORKS - The present disclosure relates to systems and methods for classifying data sets using associated functions from neural networks. In one example, a system for classifying data sets by corresponding functions includes at least one processor and at least one non-transitory memory storing instructions that, when executed by the at least one processor cause the system to perform operations including: obtaining a neural network associated with a data set, the neural network being trained to generate synthetic data sets related to the data set; selecting a test set of inputs to the neural network; obtaining a corresponding set of outputs by applying the neural network to the test set of inputs; estimating one or more functions describing the test set of inputs and the corresponding set of outputs; and indexing the estimated one or more functions to the data. | 2022-09-01 |
20220277189 | METHOD FOR SETTING OF SEMICONDUCTOR MANUFACTURING PARAMETER AND COMPUTING DEVICE FOR EXECUTING THE METHOD - A method for setting of a semiconductor manufacturing parameter according to an embodiment is a method performed in a computing device including one or more processors, and a memory for storing one or more programs executed by the one or more processors, the method including an operation of inputting manufacturing parameters for manufacturing a semiconductor to a neural network model and an operation of training the neural network model to predict at least one of power and delay of the semiconductor based on the input manufacturing parameters. | 2022-09-01 |
20220277190 | NEURAL NETWORK ENGINE WITH ASSOCIATED MEMORY ARRAY - A neural network engine configured to perform neural network computations. The neural network engine includes a first memory block configured to provide a first operand; a second memory block configured to provide a second operand; a synapse array configured to produce partial products of the first and second operands, wherein the synapse array is located outside of the first and second memory blocks; and, an accumulator array to perform summation of the partial products produced by the synapse array. | 2022-09-01 |
20220277191 | Synthetic Scaling Applied to Shared Neural Networks - A system processing a stream of input data ordered row by row from a data array has a first integrated circuit (IC) adapted to apply an aperture function to the stream of input data, to produce an output data stream, and a second IC coupled to the first IC, the second IC adapted to manage context from row to row, retaining partial values as computed by the aperture function for each column along a row, and providing the partial values back to the aperture function for subsequent rows as needed to complete output values. | 2022-09-01 |
20220277192 | Visual Analytics System to Assess, Understand, and Improve Deep Neural Networks - A visual analytics workflow and system are disclosed for assessing, understanding, and improving deep neural networks. The visual analytics workflow advantageously enables interpretation and improvement of the performance of a neural network model, for example an image-based objection detection and classification model, with minimal human-in-the-loop interaction. A data representation component extracts semantic features of input image data, such as colors, brightness, background, rotation, etc. of the images or objects in the images. The input image data are passed through the neural network to obtain prediction results, such as object detection and classification results. An interactive visualization component transforms the prediction results and semantic features into interactive and human-friendly visualizations, in which graphical elements encoding the prediction results are visually arranged depending on the extracted semantic features of input image data. | 2022-09-01 |
20220277193 | GROUND TRUTH DATA GENERATION FOR DEEP NEURAL NETWORK PERCEPTION IN AUTONOMOUS DRIVING APPLICATIONS - An annotation pipeline may be used to produce 2D and/or 3D ground truth data for deep neural networks, such as autonomous or semi-autonomous vehicle perception networks. Initially, sensor data may be captured with different types of sensors and synchronized to align frames of sensor data that represent a similar world state. The aligned frames may be sampled and packaged into a sequence of annotation scenes to be annotated. An annotation project may be decomposed into modular tasks and encoded into a labeling tool, which assigns tasks to labelers and arranges the order of inputs using a wizard that steps through the tasks. During the tasks, each type of sensor data in an annotation scene may be simultaneously presented, and information may be projected across sensor modalities to provide useful contextual information. After all annotation tasks have been completed, the resulting ground truth data may be exported in any suitable format. | 2022-09-01 |