Patent classifications
G06F18/22
System monitor and method of system monitoring to predict a future state of a system
System monitors and methods of monitoring a system are disclosed. In one arrangement a system monitor predicts a future state of a system. A data receiving unit receives system data representing a set of one or more measurements performed on the system. A first statistical model is fitted to the system data. The first statistical model is compared to each of a plurality of dictionary entries in a database. Each dictionary entry comprises a second statistical model. The second statistical model is of the same general class as the first statistical model and obtained by fitting the second statistical model to data representing a set of one or more previous measurements performed on a system of the same type as the system being monitored and having a known subsequent state. A prediction of a future state of the system being monitored is output based on the comparison. The first statistical model and the second statistical model are each a stochastic process or approximation to a stochastic process.
Method for processing image, electronic device, and storage medium
An image processing method for identifying text on production line components obtains an image to be recognized and a standard image for reference and extracts a first text area of the image to be recognized. A second text area of the standard image is obtained, and a text window is extracted based on the second text area. The method further obtains a target text area of the image to be recognized based on the first text area and the text window, and obtains a first set of first text sub-areas, and obtains a second set of second text sub-areas, by dividing the second text area into sub-windows of the text window. The method further marks the image to be recognized as a qualifying image when each first text sub-area of the first set is the same as a corresponding second text sub-area of the second set.
Generating approximations of cardiograms from different source configurations
Systems are provided for generating data representing electromagnetic states of a heart for medical, scientific, research, and/or engineering purposes. The systems generate the data based on source configurations such as dimensions of, and scar or fibrosis or pro-arrhythmic substrate location within, a heart and a computational model of the electromagnetic output of the heart. The systems may dynamically generate the source configurations to provide representative source configurations that may be found in a population. For each source configuration of the electromagnetic source, the systems run a simulation of the functioning of the heart to generate modeled electromagnetic output (e.g., an electromagnetic mesh for each simulation step with a voltage at each point of the electromagnetic mesh) for that source configuration. The systems may generate a cardiogram for each source configuration from the modeled electromagnetic output of that source configuration for use in predicting the source location of an arrhythmia.
Method and apparatus for authenticating a user of a computing device
A system for authenticating a user attempting to access a computing device or a software application executing thereon. A data storage device stores one or more digital images or frames of video of face(s) of authorized user(s) of the device. The system subsequently receives from a first video camera one or more digital images or frames of video of a face of the user attempting to access the device and compares the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device. To ensure the received video of the face of the user attempting to access the device is a real-time video of that user, and not a forgery, the system further receives a first photoplethysmogram (PPG) obtained from a first body part (e.g., a face) of the user attempting to access the device, receives a second PPG obtained from a second body part (e.g., a fingertip) of the user attempting to access the device, and compares the first PPG with the second PPG. The system authenticates the user attempting to access the device based on a successful comparison of (e.g., correlation between, consistency of) the first PPG and the second PPG and based on a successful comparison of the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device.
Split chain of trust for secure device boot
The secure chain of trust steps to boot-up a computing device are split between the shutdown procedure of the computing device and the boot-up procedure of the computing device to reduce the time required for the computing device to boot-up. The main image associated with a central processing unit of the computing device is validated during the shutdown procedure of the computing device such that the operating system for the central processing unit is available when the computing device receives an action to power on. The boot-up time for the computing device is reduced, which allows the computing device to boot-up within an established time frame.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
System and method for iterative classification using neurophysiological signals
A method of training an image classification neural network comprises: presenting a first plurality of images to an observer as a visual stimulus, while collecting neurophysiological signals from a brain of the observer; processing the neurophysiological signals to identify a neurophysiological event indicative of a detection of a target by the observer in at least one image of the first plurality of images; training the image classification neural network to identify the target in the image, based on the identification of the neurophysiological event; and storing the trained image classification neural network in a computer-readable storage medium.
System-on-a-chip incorporating artificial neural network and general-purpose processor circuitry
A circuit system and a method of analyzing audio or video input data that is capable of detecting, classifying, and post-processing patterns in an input data stream. The circuit system may consist of one or more digital processors, one or more configurable spiking neural network circuits, and digital logic for the selection of two-dimensional input data. The system may use the neural network circuits for detecting and classifying patterns and one or more the digital processors to perform further detailed analyses on the input data and for signaling the result of an analysis to outputs of the system.
Method, apparatus, device, and storage medium for intention recommendation
The present application discloses a method, an apparatus, a device, and a storage medium for intention recommendation, which relates to the field of big data, artificial intelligence, intelligent search, information flow and deep learning technologies in the field of computer technologies. A specific implementation scheme includes: receiving an intention query request carrying an intention keyword and a user identification, determining a first recommendation list according to the intention keyword and a pre-configured intention repository, where the intention repository includes at least one tree-shaped intention set, and each tree-shaped intention set includes at least one graded intention, processing intentions in the first recommendation list by using intention strategy information corresponding to the user identification to obtain a target recommendation list and output it.
Ontology matching based on weak supervision
A method is for matching a set of first classes assigned to a first data set with a set of second classes assigned to a second data set. The method includes constructing, via a set of pre-processing functions, a plurality of alignment profiles such that at least one alignment profile is assigned to each of the first classes and each of the second classes. The method includes generating a comparison matrix for each group of the alignment profiles, such that each group includes at least one of the first classes and at least one of the second classes. The method includes training a first machine learning model, through supervised training, based on the generated comparison matrices and based on probabilistic labels generated by a second machine learning model.