G06N7/01

DATA RETRIEVAL USING REINFORCED CO-LEARNING FOR SEMI-SUPERVISED RANKING
20230053009 · 2023-02-16 ·

A computer-implement method comprises: training a classifier with labeled data from a dataset; classifying, by the trained classifier, unlabeled data from the dataset; providing, by the classifier to a policy gradient, a reward signal for each data/query pair; transferring, by the classifier to a ranker, learning; training, by the policy gradient, the ranker; ranking data from the dataset based on a query; and retrieving data from the ranked data in response to the query.

Systems for Estimating Terminal Event Likelihood

In implementations of systems for estimating terminal event likelihood, a computing device implements a termination system to receive observed data describing values of a treatment metric and indications of a terminal event. Values of the treatment metric are grouped into groups using a mixture model that represents the treatment metric as a mixture of distributions. Parameters of a distribution are estimated for each of the groups and mixing proportions are also estimated for each of the groups. In response to receiving a user input requesting an estimate of a likelihood of the terminal event for a particular value of the treatment metric, the termination system generates an indication of the estimate of the likelihood of the terminal event for the particular value based on a distribution density at the particular value for each of the groups and a probability of including the particular value in each of the groups.

SYSTEM AND METHOD FOR QUANTUM COMPUTING TO GENERATE JOINT PROBABILITY DISTRIBUTIONS
20230051669 · 2023-02-16 ·

Aspects of the present disclosure relate generally to systems and methods for use in the implementation and/or operation of quantum information processing (QIP) systems, and more particularly, to the computation of joint probability distributions with quantum computers. Improvements in the computation of joint probability distributions are described by designing quantum machine learning algorithms to model copulas. Moreover, any copula is shown to be naturally mapped to a multipartite maximally entangled state. A variational ansatz referred to herein as a “qopula” creates arbitrary correlations between variables while maintaining the copula structure starting from a set of Bell pairs for two variables, or Greenberger-Horne-Zeilinger (GHZ) states for multiple variables. Generative learning algorithms may be demonstrated on quantum computers, and more particularly, in trapped-ion quantum computers. The approach described herein is shown to have advantages over classical models.

DANGEROUS ROAD USER DETECTION AND RESPONSE

Methods and systems are provided for detecting and responding to dangerous road users. In some aspects, a process can include steps for receiving sensor data of a detected object from an autonomous vehicle, determining whether the detected object is exhibiting a dangerous attribute, generating output data based on the determining of whether the detected object is exhibiting the dangerous attribute, and updating a machine learning model based on the output data relating to the dangerous attribute.

METHODS AND COMPUTER SYSTEMS FOR AUTOMATED EVENT DETECTION BASED ON MACHINE LEARNING

A computer system includes a memory configured to store instructions, and one or more processors configured to execute the instructions to cause the computer system to perform a method for event detection. The method includes obtaining a user profile and a persona category associated with the user profile corresponding to a user; receiving first data associated with the user and second data associated with one or more environmental or situational factors; detecting an event based on the first data or the second data; and querying a database in response to the detected event to determine one or more recommended actions for the user based on the user profile and the persona category of the user.

SYSTEMS AND METHODS FOR AUTOMATICALLY BUILDING A MACHINE LEARNING MODEL
20230048301 · 2023-02-16 ·

Systems and methods for automatically building a machine learning model are disclosed. A plurality of variables is displayed via a graphical user interface (GUI). A target variable and a first independent variable are identified from the plurality of variables. A parameter associated with the machine learning model is identified. Collected data is received via the GUI. A first machine learning model is built using as inputs, the parameter and the collected data associated with the first independent variable and the target variable. A change is made to at least a portion of the inputs used to build the first machine learning model. A second machine learning model is built based on the change. A prediction accuracy of the first machine learning model is compared to the prediction accuracy of the second machine learning model. Either the first or second machine learning model is selected based on the prediction accuracy.

CYBER THREAT INFORMATION PROCESSING APPARATUS, CYBER THREAT INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM STORING CYBER THREAT INFORMATION PROCESSING PROGRAM

Provided are a cyber threat information processing apparatus, a method thereof, and a storage medium storing a cyber threat information processing program. It is possible to provide a cybersecurity threat information processing method including disassembling an input executable file to obtain disassembled code, and reconstructing the disassembled code to obtain reconstructed disassembled code, into a hash function, and converting the hash function into N-gram data (N being a natural number), and performing ensemble machine learning on block-unit code of the converted N-gram data to profile the block-unit code by an identifier of an attack technique performed by the block-unit code and an identifier of an attacker generating the block-unit code. It is possible to detect and address a variant of malware, and identify malware, an attack technique, an attacker, and an attack prediction method within a significantly short time even for a variant of malware.

SYSTEMS AND METHODS FOR TRANSFORMING A USER INTERFACE ACCORDING TO PREDICTIVE MODELS

A computerized method for transforming a user interface according to machine learning includes selecting a persona and determining whether a first condition is true for an associated data structure. In response to determining the first condition is true, the method includes determining whether a second condition is true. In response to determining the second condition is not true, the method includes loading a first trained machine learning model, inputting a first set of explanatory variables to generate a first metric, and transforming the user interface according to the first metric. In response to determining the second condition is true, the method includes determining whether a third condition is true. In response to determining the third condition is true, loading a second trained machine learning model, inputting a second set of explanatory variables to generate a second metric, and transforming the user interface according to the second metric.

CARDIOGRAM COLLECTION AND SOURCE LOCATION IDENTIFICATION
20230049769 · 2023-02-16 ·

Systems are provided for generating data representing electromagnetic states of a heart for medical, scientific, research, and/or engineering purposes. The systems generate the data based on source configurations such as dimensions of, and scar or fibrosis or pro-arrhythmic substrate location within, a heart and a computational model of the electromagnetic output of the heart. The systems may dynamically generate the source configurations to provide representative source configurations that may be found in a population. For each source configuration of the electromagnetic source, the systems run a simulation of the functioning of the heart to generate modeled electromagnetic output (e.g., an electromagnetic mesh for each simulation step with a voltage at each point of the electromagnetic mesh) for that source configuration. The systems may generate a cardiogram for each source configuration from the modeled electromagnetic output of that source configuration for use in predicting the source location of an arrhythmia.

METHOD AND SYSTEM TO GENERATE KNOWLEDGE GRAPH AND SUB-GRAPH CLUSTERS TO PERFORM ROOT CAUSE ANALYSIS
20230050889 · 2023-02-16 ·

Present invention discloses method and system for generating knowledge graph and sub-graph clusters to perform a root cause analysis. Method comprising extracting at least one of objects, data entities, links between the objects and the data entities, or relationships between the objects and the data entities from input content. Thereafter, method comprising generating a knowledge graph from the extracted data and sub-graphs from the knowledge graph using an unsupervised ML technique and extracting graph data structure information for each sub-graph. Subsequently, method comprising generating root cause model based on the sub-graphs and the graph data structure information and generating at least one sub-graph cluster and corresponding probabilistic graphical model using the root cause model and the knowledge graph. Generated Knowledge graph, root cause model and at least one sub-graph cluster and corresponding probabilistic graphical model are used to determine a root cause for an issue from an issue content.