Patent classifications
G06N5/00
Delivering a chemical compound based on a measure of trust dynamics
Techniques regarding autonomously controlling the delivery of one or more chemical compounds are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a compound component can identify a chemical compound mixture to be distributed to an entity based on a trust disposition value. The trust disposition value can be determined using machine learning technology and is indicative of an expected effectiveness of the chemical compound mixture with regards to the entity.
Delivering a chemical compound based on a measure of trust dynamics
Techniques regarding autonomously controlling the delivery of one or more chemical compounds are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a compound component can identify a chemical compound mixture to be distributed to an entity based on a trust disposition value. The trust disposition value can be determined using machine learning technology and is indicative of an expected effectiveness of the chemical compound mixture with regards to the entity.
System answering of user inputs
Techniques for structuring knowledge bases specific to a user or group of users and techniques for using the knowledge bases to answer user inputs are described. A knowledge base may be populated with information provided by users associated with the knowledge base. Users associated with a knowledge base may be proactive in providing content to the knowledge base and/or a system may solicit an answer to a user input from users associated with a particular knowledge base. When the system receives an answer, the system may populate the knowledge base with the answer and may output the answer to the user that originated the user input. The system may output user inputs to be answered using messages or by establishing two-way communication sessions.
System answering of user inputs
Techniques for structuring knowledge bases specific to a user or group of users and techniques for using the knowledge bases to answer user inputs are described. A knowledge base may be populated with information provided by users associated with the knowledge base. Users associated with a knowledge base may be proactive in providing content to the knowledge base and/or a system may solicit an answer to a user input from users associated with a particular knowledge base. When the system receives an answer, the system may populate the knowledge base with the answer and may output the answer to the user that originated the user input. The system may output user inputs to be answered using messages or by establishing two-way communication sessions.
METHOD FOR CATEGORIZING A ROCK ON THE BASIS OF AT LEAST ONE IMAGE
The present invention relates to a rock classification method wherein at least one image (IMA) of the rock to be classified is acquired, and wherein a decision tree (ARB) classifying the rocks according to several descriptors is used, as well as a machine learning method (APP) from a rock image database (BIR). Machine learning is applied for each descriptor considered.
Machine-learning based approach for malware sample clustering
Systems and methods for a machine learning based approach for identification of malware using static analysis and a machine-learning based automatic clustering of malware are provided. According to various embodiments of the present disclosure, a processing resource of a computer system receives a potential malware sample. A plurality of feature vectors is extracted from the potential malware sample and is converted into an input vector. A byte sequence is generated by walking a plurality of decision trees based on the input vector. Further, a hash value for the byte sequence is calculated and a determination is made regarding whether the hash value matches a malware hash value of a plurality of malware hash values corresponding to a known malware sample. Upon said determination being affirmative, the potential malware sample is classified as malware and is associated with a malware family of the known malware sample.
Dynamic education planning methods and systems
A computing system for generating a dynamic path for a fellow, includes a processor and a memory storing instructions that when executed by the processor cause the computing system to receive the fellow's skill graph, receive a target skill, receive a calendar object and generate the dynamic path including a task and/or a session. A non-transitory computer readable medium includes program instructions that when executed, cause a computer to receive the fellow's skill graph, receive a target skill, receive a calendar object and generate the dynamic path including a task and/or a session. A method for generating a dynamic path for a fellow includes receiving the fellow's skill graph, receiving a target skill, receiving a calendar object and generating the dynamic path including a task and/or a session.
Hot reloading a running application with an unsaved source code change
Hot reloading a running application with an unsaved source code change. A code change to a source code of a running software application that is associated with a project type is identified. The code change is stored within an in-memory editor buffer, and is uncommitted to any source code file. It is determined that the code change can be applied to the running software application using hot reload. Hot reload agent(s) associated with the project type are identified. Using the hot reload agent(s), the code change is communicated to an application runtime associated with the running software application. At least one process of the running software application invokes a new compiled code entity corresponding to the code change.
MICROMOTION AND STRAY FIELD COMPENSATION OF A TRAPPED ION CHAIN
Techniques to address the problem of having micromotion and stray fields affect trapped ions and the operation of QIP systems based on trapped ions are described. For example, one technique or approach may involve collecting scattered photons off the ions using a resonant or near-resonant oscillating electric field (e.g., a laser beam or a microwave source) with some projection in the axis or direction of micromotion that one wishes to reduce. Another technique or approach may include raising and lowering the trapping potentials to see how the ion position changes. The information collected from these techniques may be used to provide appropriate adjustments. Accordingly, the present disclosure describes methods, scripts, or techniques that minimize the effects of micromotion.
Visualization of high-dimensional data
A system is configured to detect a small, but meaningful, anomaly within one or more metrics associated with a platform. The system displays visuals of the metrics so that a user monitoring the platform can effectively notice a problem associated with the anomaly and take appropriate action to remediate the problem. A first visual includes a radar-based visual that renders an object representing data for a set of metrics being monitored. A second visual includes a tree map visual that includes sections where each section is associated with an attribute used to compose the set of metrics. Via the display of the visuals, the techniques provide an improved way of representing a large number of metrics (e.g., hundreds, thousands, etc.) being monitored for a platform. Moreover, the techniques are configured to expose useful information associated with the platform in a manner that can be effectively interpreted by a user.