G06F40/237

PROCESSING APPARATUS, PROCESSING METHOD, AND NON-TRANSITORY STORAGE MEDIUM
20230089965 · 2023-03-23 · ·

To provide a new technique for a teacher to recognize a tackling attitude of a student toward class is provided, the present invention provides a processing apparatus 100 including: an input word acquisition unit 101 that acquires an input word being a word input to each of a plurality of student terminals; a classification unit 102 that classifies the input words into a plurality of categories; and a first output unit 103 that displays a list of at least some of the input words, and also outputs, via an output terminal, a screen indicating a result of the classification of each of the input words displayed in the list.

SYSTEMS AND METHODS FOR GENERATING A FILTERED DATA SET
20220345543 · 2022-10-27 · ·

The present disclosure relates to generating a filtered data set. Data from a plurality of systems of record of a plurality of data source providers may be accessed. A master data set generated using the data accessed from the plurality of systems of record may be maintained. Restriction policies including one or more rules for restricting sharing of data may be maintained. A filtered data set may be generated for a data source provider responsive to an application of restriction policies of other data source providers to the master data set. The filtered data set may be provisioned.

SYSTEMS AND METHODS FOR GENERATING A FILTERED DATA SET
20220345543 · 2022-10-27 · ·

The present disclosure relates to generating a filtered data set. Data from a plurality of systems of record of a plurality of data source providers may be accessed. A master data set generated using the data accessed from the plurality of systems of record may be maintained. Restriction policies including one or more rules for restricting sharing of data may be maintained. A filtered data set may be generated for a data source provider responsive to an application of restriction policies of other data source providers to the master data set. The filtered data set may be provisioned.

SYSTEMS AND METHODS FOR UPDATING RECORD OBJECTS OF A SYSTEM OF RECORD

The present disclosure relates to generating performance profiles of member nodes. A plurality of electronic activities can be accessed. A subset of electronic activities from the plurality of electronic activities can be identified. The subset of electronic activities can be parsed to identify participants of the electronic activities. A second node profile can be accessed for each participant. Participant types can be identified from each second node profiles. A distribution of the subset of electronic activities can be determined. A performance profile can be generated.

SYSTEMS AND METHODS FOR UPDATING RECORD OBJECTS OF A SYSTEM OF RECORD

The present disclosure relates to generating performance profiles of member nodes. A plurality of electronic activities can be accessed. A subset of electronic activities from the plurality of electronic activities can be identified. The subset of electronic activities can be parsed to identify participants of the electronic activities. A second node profile can be accessed for each participant. Participant types can be identified from each second node profiles. A distribution of the subset of electronic activities can be determined. A performance profile can be generated.

COMPUTERIZED SYSTEM AND METHOD FOR AUTOMATIC MODERATION OF ONLINE CONTENT
20230081879 · 2023-03-16 ·

The disclosed systems and methods provide a framework for a proactive prediction of the toxic propensity of an article. Prior to the publication and/or reception of comments to online content, the disclosed framework determines the toxic propensity of the content's context and/or specific words, sentences, sentiments, tone or other messages receivable from consumption of the content. Thus, disclosed framework performs proactive forecasting of the content's toxicity propensity”, which quantifies how likely the content is prone to incur or attract toxic comments. The framework can function and/or be configured to operate in a manner that can perform specifically adherent moderation actions that correspond to the content and control how the content can be interacted with, based on the toxic propensity determination, prior to the content's publication in an effort to thwart, prevent or stop toxic environments surrounding or stemming from the content from coming into existence.

Techniques for ranking content item recommendations

Techniques describes herein include using software tools and feature vector comparisons to analyze and recommend images, text content, and other relevant media content from a content repository. A digital content recommendation tool may communicate with a number of back-end services and content repositories to analyze text and/or visual input, extract keywords or topics from the input, classify and tag the input content, and store the classified/tagged content in one or more content repositories. Input text and/or input images may be converted into vectors within a multi-dimensional vector space, and compared to a plurality of feature vectors within a vector space to identify relevant content items within a content repository. Such comparisons may include exhaustive deep searches and/or efficient tag-based filtered searches. Relevant content items (e.g., images, audio and/or video clips, links to related articles, etc.), may be retrieved and presented to a content author and embedded within original authored content.

TRANSFORMER ASSISTED JOINT ENTITY AND RELATION EXTRACTION
20230076127 · 2023-03-09 ·

Systems and methods are provided for adapting a pretrained language model to perform cybersecurity-specific named entity recognition and relation extraction. The method includes introducing a pretrained language model and a corpus of security text to a model adaptor, and generating a fine-tuned language model through unsupervised training utilizing the security text corpus. The method further includes combining a joint extraction model from a head for joint extraction with the fine-tuned language model to form an adapted joint extraction model that can perform entity and relation label prediction. The method further includes applying distant labels to security text in the corpus of security text to produce security text with distant labels, and performing Distant Supervision Training for joint extraction on the adapted joint extraction model using the security text to transform the adapted joint extraction model into a Security Language Model for name-entity recognition (NER) and relation extraction (RE).

Inference Methods For Word Or Wordpiece Tokenization
20230124402 · 2023-04-20 ·

Systems and methods for performing inference for word or wordpiece tokenization are disclosed using a left-to-right longest-match-first greedy process. In some examples, the vocabulary may be organized into a trie structure in which each node includes a precomputed token or token ID and a fail link, so that the tokenizer can parse the trie in a single pass to generate a list of only those tokens or token IDs that correspond to the longest matching vocabulary entries in the sample string, without the need for backtracking. In some examples, the vocabulary may be organized into a trie in which each node has a fail link, and any node that would share token(s) or token_ID(s) of a preceding node is instead given a prev_match link that points back to a chain of nodes with those token(s) or token_ID(s).

METHODS AND SYSTEMS FOR DETERMINING RELEVANCE OF DOCUMENTS

A method for screening documents. The order of the text in the documents can be changed in order to create additional documents. A vocabulary of words from the text in the documents can be built. The words can be coded as vectors. Vector relationships can be defined. The documents can be classified using the vector relationships.