G06N7/023

Leakage Measurement Error Compensation Method and System Based on Cloud-Edge Collaborative Computing

The present disclosure provides a leakage measurement error compensation method based on cloud-edge collaborative computing, implemented on a communication network formed by interconnection between a leakage current edge monitoring terminal and a power consumption management cloud platform, and including the following steps: monitoring, by the leakage current edge monitoring terminal, leakage current data, and sending the leakage current data to the power consumption management cloud platform; iteratively training, by the power consumption management cloud platform, a pseudo-leakage compensation model by using the received leakage current data, continuously updating pseudo-leakage model parameters, and feeding the pseudo-leakage model parameters back to the leakage current edge monitoring terminal; and processing, by the leakage current edge monitoring terminal, the leakage current data according to the pseudo-leakage compensation model parameters, so as to eliminate the influence of a pseudo-leakage phenomenon in the leakage current data.

MACHINE LEARNING BASED METHODS OF ANALYSING DRUG-LIKE MOLECULES

There is provided a method for a machine learning based method of analysing drug-like molecules by representing the molecular quantum states of each drug-like molecule as a quantum graph, and then feeding that quantum graph as an input to a machine learning system.

Avoidance of obscured roadway obstacles

The systems and methods described herein disclose detecting obstacles in a vehicular environment using host vehicle input and associated trust levels. As described here, measured vehicles, either manual or autonomous, that detect an obstacle in the environment will operate to respond to the obstacle. As such, those movements can be used to determine if an obstacle exists in the environment, even if the obstacle cannot be detected directly. The systems and methods can include a host vehicle receiving prediction data about an evasive behavior from one or more measured vehicles in a vehicular environment. A trust level can then be established for the measured vehicles. An obscured obstacle can be determined using the evasive behavior and the trust level which can then be mapped in the vehicular environment. A guidance input can then be created for the host vehicle using the obscured obstacle and the trust level.

APPARATUS AND METHOD FOR DETECTING VULNERABILITY TO NONVOLATILE MEMORY ATTACK

Disclosed herein are an apparatus and a method for detecting a vulnerability to a nonvolatile memory attack. The apparatus for detecting a vulnerability to a nonvolatile memory attack includes memory for storing at least one program, and a processor for executing the program, wherein the program includes a fuzzer unit for sending a fuzzing message to fuzzing target software, a nonvolatile memory write control unit for, when a request to write data to a nonvolatile memory is received from the fuzzing target software, transferring nonvolatile memory write data to an attack vulnerability detection unit, and the attack vulnerability detection unit for, when the nonvolatile memory write data is received from the nonvolatile memory write control unit, searching for a vulnerability to a nonvolatile memory attack based on a result of determining whether the nonvolatile memory write data is normal based on a model pre-trained in a normal state.

MACHINE LEARNING TECHNIQUES FOR GENERATING STRING-BASED DATABASE MAPPING PREDICTION

Various embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for performing predictive mapping operations with respect to a ground-truth database table. Certain embodiments of the present invention utilize systems, methods, and computer program products that perform predictive mapping operations utilizing a hierarchical string matching machine learning framework using at least one or more of an exact match model, a probabilistic match model, a disjoint match model, and an embedding-based match model.

Privacy ensuring personal health record data sharing

A computer-implemented method that receives at an apparatus a request from a first computing device for access to information related to a first user data set; determines, or receives an indication of a determination, whether the first computing device can access the information based on criteria for sharing information, the criteria based on one or more characteristics of the first user data set and a second user data set accessible by the first computing device; and provide a response based on the determination, the response preserving privacy of a user corresponding to the first user data set.

Model-based control under uncertainty

An apparatus for controlling a system includes a memory to store a model of the system including a motion model of the system subject to process noise and a measurement model of the system subject to measurement noise, such that one or combination of the process noise and the measurement noise forms an uncertainty of the model of the system with unknown probabilistic parameters, wherein the uncertainty of the model of the system causes a state uncertainty of the system with unknown probabilistic parameters. The apparatus also includes a sensor to measure a signal to produce a sequence of measurements indicative of a state of the system, a processor to estimate a Gaussian distribution representing the state uncertainty, and a controller to determine a control input to the system using the model of the system with state uncertainty represented by the Gaussian distribution and control the system according to the control input. The processor is configured to estimate, using at least one or combination of the motion model, the measurement model, and the measurements of the state of the system, a first Student-t distribution representing the uncertainties of the model and a second Student-t distribution representing the state uncertainty of the system, the estimation is performed iteratively until a termination condition is met, and fit a Gaussian distribution representing the state uncertainty into the second Student-t distribution.

GENERATING PLUG-IN APPLICATION RECIPE EXTENSIONS

Techniques for generating plug-in application recipe (PIAR) extensions are disclosed. A PIAR management application discovers a particular data type within one or more data values for a particular field of a plug-in application, where the particular data type is (a) different from a data type of the particular field as reported by the plug-in application and (b) narrower than the data type of the particular field while complying with the data type of the particular field. The PIAR management application identifies one or more mappings between (a) the particular data type and (b) one or more data types for fields accepted by actions of plug-in applications. The PIAR management application presents a user interface including one or more candidate PIAR extensions based on the mapping(s). Based on a user selection of a candidate PAIR extension, the PIAR management application executes a PIAR that includes the selected PIAR extension.

Generation of synthetic high-elevation digital images from temporal sequences of high-elevation digital images

Implementations relate to detecting/replacing transient obstructions from high-elevation digital images, and/or to fusing data from high-elevation digital images having different spatial, temporal, and/or spectral resolutions. In various implementations, first and second temporal sequences of high-elevation digital images capturing a geographic area may be obtained. These temporal sequences may have different spatial, temporal, and/or spectral resolutions (or frequencies). A mapping may be generated of the pixels of the high-elevation digital images of the second temporal sequence to respective sub-pixels of the first temporal sequence. A point in time at which a synthetic high-elevation digital image of the geographic area may be selected. The synthetic high-elevation digital image may be generated for the point in time based on the mapping and other data described herein.

GENERATION OF SYNTHETIC HIGH-ELEVATION DIGITAL IMAGES FROM TEMPORAL SEQUENCES OF HIGH-ELEVATION DIGITAL IMAGES
20230045607 · 2023-02-09 ·

Implementations relate to detecting/replacing transient obstructions from high-elevation digital images, and/or to fusing data from high-elevation digital images having different spatial, temporal, and/or spectral resolutions. In various implementations, first and second temporal sequences of high-elevation digital images capturing a geographic area may be obtained. These temporal sequences may have different spatial, temporal, and/or spectral resolutions (or frequencies). A mapping may be generated of the pixels of the high-elevation digital images of the second temporal sequence to respective sub-pixels of the first temporal sequence. A point in time at which a synthetic high-elevation digital image of the geographic area may be selected. The synthetic high-elevation digital image may be generated for the point in time based on the mapping and other data described herein.