G06N5/04

METHOD FOR IMAGE STABILIZATION BASED ON ARTIFICIAL INTELLIGENCE AND CAMERA MODULE THEREFOR
20230050618 · 2023-02-16 · ·

A method for stabilizing an image based on artificial intelligence includes acquiring tremor detection data with respect to the image, the tremor detection data acquired from two or more sensors; outputting stabilization data for compensating for an image shaking, the stabilization data outputted using an artificial neural network (ANN) model trained to output the stabilization data based on the tremor detection data; and compensating for the image shaking using the stabilization data. A camera module includes a lens; an image sensor to output an image captured through the lens; two or more sensors to output tremor detection data with respect to the image; a controller to output stabilization data based on the tremor detection data using an ANN model; and a stabilization unit to compensate for an image shaking using the stabilization data. The ANN model is trained to output the stabilization data based on the tremor detection data.

METHOD AND SYSTEM FOR ANALYZING SPECIFICATION PARAMETER OF ELECTRONIC COMPONENT, COMPUTER PROGRAM PRODUCT WITH STORED PROGRAM, AND COMPUTER READABLE MEDIUM WITH STORED PROGRAM

A method for analyzing a specification parameter of an electronic component includes inputting a package type and at least one engineering drawing image of an electronic component; acquiring a probability value that in each view of the different viewing directions each of the plurality of specification parameter of the electronic component is labeled; taking the view of each of the plurality of specification parameters in the view direction with a highest probability value as a recommended view; performing a box selection on the plurality of specification parameters for at least one engineering drawing image with the same viewing direction as that of the recommended view by an object detection model; and identifying box-selected specification parameters to acquire a size value of identified specification parameters from the at least one engineering drawing image, and converting the size value into a corresponding editable text for output.

METHOD AND SYSTEM FOR ANALYZING SPECIFICATION PARAMETER OF ELECTRONIC COMPONENT, COMPUTER PROGRAM PRODUCT WITH STORED PROGRAM, AND COMPUTER READABLE MEDIUM WITH STORED PROGRAM

A method for analyzing a specification parameter of an electronic component includes inputting a package type and at least one engineering drawing image of an electronic component; acquiring a probability value that in each view of the different viewing directions each of the plurality of specification parameter of the electronic component is labeled; taking the view of each of the plurality of specification parameters in the view direction with a highest probability value as a recommended view; performing a box selection on the plurality of specification parameters for at least one engineering drawing image with the same viewing direction as that of the recommended view by an object detection model; and identifying box-selected specification parameters to acquire a size value of identified specification parameters from the at least one engineering drawing image, and converting the size value into a corresponding editable text for output.

SYSTEM AND METHOD FOR OPTIMIZING A MACHINE LEARNING MODEL

A machine learning system includes a training platform and an inference platform, where the inference platform is coupled to receive the output of the training platform. Based upon an updating of hyperparameters in the training platform, an optimized inference model is configured to be deployed to the inference platform from the training platform. The optimized inference model is further optimized in the inference platform by using an observation difference between a client observation and a prediction response to update the optimized inference model. The updated optimized inference model is used to provide a prediction response to a client.

SYSTEM AND METHOD FOR OPTIMIZING A MACHINE LEARNING MODEL

A machine learning system includes a training platform and an inference platform, where the inference platform is coupled to receive the output of the training platform. Based upon an updating of hyperparameters in the training platform, an optimized inference model is configured to be deployed to the inference platform from the training platform. The optimized inference model is further optimized in the inference platform by using an observation difference between a client observation and a prediction response to update the optimized inference model. The updated optimized inference model is used to provide a prediction response to a client.

SOURCE LOCALIZATION METHOD FOR RUMOR BASED ON FULL-ORDER NEIGHBOR COVERAGE STRATEGY
20230046801 · 2023-02-16 ·

Source localization method for rumor source based on full-order neighbor coverage strategy includes: constructing a network graph according to the user relationship in the actual target area; mapping an actual relationship into the network graph; determining sensors in the network graph, and deploying users corresponding to the sensors as observation users in an actual target area; executing a source inferring strategy when the number of the observation users in the actual target area who have received the rumor reaches an expected scale; calculating source likelihood score of non-sensor nodes in the network graph corresponding to the non-observation users in the actual target area; processing differentially the source likelihood scores; and outputting the non-observation user corresponding to the minimum source likelihood score as the source.

SOURCE LOCALIZATION METHOD FOR RUMOR BASED ON FULL-ORDER NEIGHBOR COVERAGE STRATEGY
20230046801 · 2023-02-16 ·

Source localization method for rumor source based on full-order neighbor coverage strategy includes: constructing a network graph according to the user relationship in the actual target area; mapping an actual relationship into the network graph; determining sensors in the network graph, and deploying users corresponding to the sensors as observation users in an actual target area; executing a source inferring strategy when the number of the observation users in the actual target area who have received the rumor reaches an expected scale; calculating source likelihood score of non-sensor nodes in the network graph corresponding to the non-observation users in the actual target area; processing differentially the source likelihood scores; and outputting the non-observation user corresponding to the minimum source likelihood score as the source.

Validating a machine learning model after deployment

Machine learning models used in medical diagnosis should be validated after being deployed in order to reduce the number of misdiagnoses. Validation processes presented here assess a performance of the machine learning model post-deployment. In post-deployment validation, the validation process monitoring can include: (1) monitoring to ensure a model performs as well as a reference member such as another machine learning model, and (2) monitoring to detect anomalies in data. This post-deployment validation helps identify low-performing models that are already deployed, so that relevant parties can quickly take action to improve either the machine learning model or the input data.

Validating a machine learning model after deployment

Machine learning models used in medical diagnosis should be validated after being deployed in order to reduce the number of misdiagnoses. Validation processes presented here assess a performance of the machine learning model post-deployment. In post-deployment validation, the validation process monitoring can include: (1) monitoring to ensure a model performs as well as a reference member such as another machine learning model, and (2) monitoring to detect anomalies in data. This post-deployment validation helps identify low-performing models that are already deployed, so that relevant parties can quickly take action to improve either the machine learning model or the input data.

Intelligent data protection

A technological approach can be employed to protect data. Datasets from distinct computing environments of an organization can be scanned to identify data elements subject to protection, such as sensitive data. The identified elements can be automatically protected such as by masking, encryption, or tokenization. Data lineage including relationships amongst data and linkages between computing environments can be determined along with data access patterns to facilitate understanding of data. Further, personas and exceptions can be determined and employed as bases for access recommendations.