G06N20/20

Database generation from natural language text documents

Some embodiments may perform operations of a process that includes obtaining a natural language text document and use a machine learning model to generate a set of attributes based on a set of machine-learning-model-generated classifications in the document. The process may include performing hierarchical data extraction operations to populate the attributes, where different machine learning models may be used in sequence. The process may include using a pre-trained Bidirectional Encoder Representations from Transformers (BERT) model augmented with a pooling operation to determine a BERT output via a multi-channel transformer model to generate vectors on a per-sentence level or other per-text-section level. The process may include using a finer-grain model to extract quantitative or categorical values of interest, where the context of the per-sentence level may be retained for the finer-grain model.

Methods and systems for generating a descriptor trail using artificial intelligence
11581094 · 2023-02-14 · ·

A system for updating a descriptor trail using artificial intelligence. The system is configured to display on a graphical user interface operating on a processor connected to a memory an element of diagnostic data. The system is configured to receive from a user client device an element of user constitutional data. The system is configured to display on a graphical user interface the element of user constitutional data. The system is configured to prompt an advisor input on a graphical user interface. The system is configured to receive from an advisor client device an advisor input containing an element of advisory data. The system is configured to generate an updated descriptor trail as a function of the advisor input. The system is configured to display the updated descriptor trail on a graphical user interface.

Adaptive co-distillation model
11580453 · 2023-02-14 · ·

A method for use with a computing device is provided. The method may include inputting an input data set into a first private artificial intelligence model generated using a first private data set and a second private artificial intelligence model generated using a second private data set. The method may further include receiving a first result data set from the first private artificial intelligence model and receiving a second result data set from the second private artificial intelligence model. The method may further include training an adaptive co-distillation model with the input data set and the first result data set. The method may further include training the adaptive co-distillation model with the input data set and the second result data set. The adaptive co-distillation model may not be trained on the first private data set or the second private data set.

Systems and methods for identifying unknown protocols associated with industrial control systems

A device may receive a hash table that includes lists of protocol detectors, wherein the hash table is generated based on historical process data identifying potential process variables associated with an industrial control system. The device may receive a packet identifying potential process variables associated with the industrial control system, and may extract, from the packet, packet data identifying a source address, a destination address, a port, and a transport protocol. The device may compare the packet data with data in the hash table to identify a set of lists of protocol detectors, and may process the packet data, with the set of lists of protocol detectors, to determine a matching protocol, no matching protocol, or a potential matching protocol for the packet. The device may perform one or more actions based on determining the matching protocol, no matching protocol, or the potential matching protocol for the packet.

Artificial intelligence based fraud detection system

Embodiments detect fraud of risk targets that include both customer accounts and cashiers. Embodiments receive historical point of sale (“POS”) data and divide the POS data into store groupings. Embodiments create a first aggregation of the POS data corresponding to the customer accounts and a second aggregation of the POS data corresponding to the cashiers. Embodiments calculate first features corresponding to the customer accounts and second features corresponding to the cashiers. Embodiments filter the risk targets based on rules and separate the filtered risk targets into a plurality of data ranges. For each combination of store groupings and data ranges, embodiments train an unsupervised machine learning model. Embodiments then apply the unsupervised machine learning models after the training to generate first anomaly scores for each of the customer accounts and cashiers.

Artificial intelligence based fraud detection system

Embodiments detect fraud of risk targets that include both customer accounts and cashiers. Embodiments receive historical point of sale (“POS”) data and divide the POS data into store groupings. Embodiments create a first aggregation of the POS data corresponding to the customer accounts and a second aggregation of the POS data corresponding to the cashiers. Embodiments calculate first features corresponding to the customer accounts and second features corresponding to the cashiers. Embodiments filter the risk targets based on rules and separate the filtered risk targets into a plurality of data ranges. For each combination of store groupings and data ranges, embodiments train an unsupervised machine learning model. Embodiments then apply the unsupervised machine learning models after the training to generate first anomaly scores for each of the customer accounts and cashiers.

Scalable neutral atom based quantum computing

The present disclosure provides methods and systems for performing non-classical computations. The methods and systems generally use a plurality of spatially distinct optical trapping sites to trap a plurality of atoms, one or more electromagnetic delivery units to apply electromagnetic energy to one or more atoms of the plurality to induce the atoms to adopt one or more superposition states of a first atomic state and a second atomic state, one or more entanglement units to quantum mechanically entangle at least a subset of the one or more atoms in the one or more superposition states with at least another atom of the plurality, and one or more readout optical units to perform measurements of the superposition states to obtain the non-classical computation.

Multivariate nonlinear autoregression for outlier detection

Methods, systems, and computer-readable storage media for receiving a time-series of data values associated with a plurality of sensors, each sensor generating at least a portion of the time-series of a respective data value, providing a plurality of auto-regression models, each auto-regression model being provided based on a respective first sub-set of the time-series of data values used as input, and a respective second sub-set of the time-series of data values used as training data during a training process, receiving respective data values associated with a time from and generated by each of the plurality of sensors, determining respective predicted values for each of the auto-regression models, and selectively indicating that an anomaly is present in the system based on respective predicted values for each of the auto-regression models, and the respective data values associated with a time.

Computer-implemented systems configured for automated electronic calendar item predictions and methods of use thereof

In order to facilitate electronic meeting scheduling and coordination, systems and methods are disclosed including receiving, by a processor, a plurality of electronic meeting requests to schedule a meeting. The processor determines, for each electronic meeting request, meeting room needs. A meeting scheduling machine learning model is utilized to predict parameters of meeting room objects representing the candidate meeting rooms based at least in part on the meeting room needs, schedule information associated with a respective electronic meeting request and location information associated with the respective electronic meeting request. The processor causes an indication of the candidate meeting rooms to display in response to the electronic meeting request on a screen of computing devices associated with the respective attendees based at least in part on the predicted parameters. The processor receives a selection of the respective candidate meeting rooms from the respective attendees, and dynamically secures each candidate meeting room.

METHOD AND SYSTEM FOR GENERATING A PREDICTIVE MODEL

A method for generating a predictive model for quantization parameters of a neural network is described. The method comprises accessing a first vector of data values corresponding to input values to a first layer implemented in a neural network, generating a feature vector of one or more features extracted from the data values of the first vector, accessing a second vector of data values corresponding to the input values of a second layer implemented in the neural network, subsequent to the first layer, generating a target vector of data values comprising one or more quantization parameters for the second layer, from the data values of the second vector, evaluating, on the basis of the feature vector and the target vector, a predictive model for predicting the one or more quantization parameters of the second layer and modifying the predictive model on the basis of the evaluation.