Patent classifications
G06F17/00
Continuous machine learning for extracting description of visual content
Aspects of the present disclosure relate to machine learning techniques for continuous implementation and training of a machine learning system for identifying the natural language meaning of visual content. A computer vision model or other suitable machine learning model can predict whether a given descriptor is associated with the visual content. A set of such models can be used to determine whether particular ones of a set of descriptors are associated with the visual content, with the determined descriptors representing a meaning of the visual content. This meaning can be refined based on a multi-armed bandit tracking and analyzing interactions between the visual content and users associated with certain personas related to the determined descriptors.
Group electronic game or poll using beverage sensors
A system includes a beverage sensor to distinguish one or more beverage states and to communicate the distinguished one or more beverage states to a processor as gameplay control inputs to the game.
Digital image analysis for robotic installation of surgical implants
Computer-implemented digital image analysis methods, apparatuses, and systems for robotic installation of surgical implants are disclosed. A disclosed apparatus plans a route within an anatomy of a patient from an incision site to a surgical implant site for robotic installation of a surgical implant. The apparatus uses digital imaging data to identify less-invasive installation paths and determine the dimensions of the surgical implant components being used. The apparatus segments the surgical implant into surgical implant subcomponents and modifies the surgical implant subcomponents, such that they can be inserted using the identified less-invasive installation paths.
Identifying virtual private network servers for user devices
A VPN servers request is transmitted from a user device to a central server. A first VPN server is received from the central server at the user device. Responsive to the user device failing to establish a first encrypted tunnel with the first VPN server, a request for another VPN server is transmitted from the user device to the central server. A second VPN server is received from the central server. A second encrypted tunnel is established with the second VPN server. An encrypted communication is obtained by encrypting a communication directed to a network server. The encrypted communication is transmitted from the user device to the VPN second server.
REQUEST AUTHORIZATION
A computer implemented method for generating a dispatch datagram is disclosed. The computer implemented method includes receiving, at a dispatcher, a request from a client. The method further includes generating an authorization header based on the received request. The authorization header includes one or more rules for handling the request. The method further includes wrapping the received request and the generated authorization header together to generate a dispatch datagram.
SYSTEMS AND METHODS FOR USING SPI TO DISCOVER A NETWORK GRAPH OF NODES BEHIND NAT
Systems and methods for determining network topology by implementing the security parameter index (“SPI”) to map network nodes that are behind a network address translation (“NAT”) address are disclosed.
Autonomous vehicle system configured to respond to temporary speed limit signs
Aspects of the disclosure provide for a method for identifying speed limit signs and controlling an autonomous vehicle in response to detected speed limit signs. The autonomous vehicle's computing devices identifies a speed limit sign in a vehicle's environment and a location and orientation corresponding to the speed limit sign. Then, the and orientation location of the speed limit sign is determined to not correspond to a pre-stored location and a pre-stored orientation of a speed limit sign that is pre-stored in map information. An effect zone of the speed limit sign is determined based on the location and orientation of the speed limit sign and characteristics of surrounding areas or other detected object before or after the speed limit sign. The autonomous vehicle's computing devices determines a response of the vehicle based on the determined effect zone, and controls the autonomous vehicle based on the determined response.
Dashboard loading from a cloud-based data warehouse cache
Dashboard loading from a cloud-based data warehouse cache, including determining that a result for a first query is stored in a cache of a cloud-based data warehouse; sending, in response to the result being stored in the cache, to the cloud-based data warehouse, a request for the result from the cache; and providing, based on the result for the first query, one or more dashboard visualizations.
Systems and methods for hybrid analog and digital processing of a computational problem using mean fields
A hybrid computing system for solving a computational problem includes a digital processor, a quantum processor having qubits and coupling devices that together define a working graph of the quantum processor, and at least one nontransitory processor-readable medium communicatively coupleable to the digital processor which stores at least one of processor-executable instructions or data. The digital processor receives a computational problem, and programs the quantum processor with a first set of bias fields and a first set of coupling strengths. The quantum processor generates samples as potential solutions to an approximation of the problem. The digital processor updates the approximation by determining a second set of bias fields based at least in part on the first set of bias fields and a first set of mean fields that are based at least in part on the first set of samples and coupling strengths of one or more virtual coupling devices.
Systems and methods for hybrid analog and digital processing of a computational problem using mean fields
A hybrid computing system for solving a computational problem includes a digital processor, a quantum processor having qubits and coupling devices that together define a working graph of the quantum processor, and at least one nontransitory processor-readable medium communicatively coupleable to the digital processor which stores at least one of processor-executable instructions or data. The digital processor receives a computational problem, and programs the quantum processor with a first set of bias fields and a first set of coupling strengths. The quantum processor generates samples as potential solutions to an approximation of the problem. The digital processor updates the approximation by determining a second set of bias fields based at least in part on the first set of bias fields and a first set of mean fields that are based at least in part on the first set of samples and coupling strengths of one or more virtual coupling devices.