Patent classifications
G06F40/216
Full Attention with Sparse Computation Cost
The present disclosure is directed to machine learning model architectures which provide full attention capability in each attention head while maintaining low computation and memory complexity. Specifically, according to one aspect of the present disclosure, example attention models provided herein can treat the self-attention mechanism as a conditional expectation over embeddings at each location and approximate the conditional distribution with a structured factorization. Each location can attend to all other locations, either via direct attention, or through indirect attention to group representations, which are again conditional expectations of embeddings from corresponding local regions.
ELECTRONIC HEADER RECOMMENDATION AND APPROVAL
Recommendation and approval of a header for a message includes generating a proposed header based on the name and/or brand of the entity and product and/or content of the message, classifying the proposed header using a machine learning model trained based on historical complaints on previously used headers related to the entity name and brand and product and/or content of the message and recommending the proposed header based on the classification. The training of the machine learning model may include learning a threshold wherein headers having a classification greater than the threshold are not recommended as having a high probability of being wrongly associated with the requesting entity and headers having a classification lower than the threshold are recommended as having a high probability of not being wrongly associated with the requesting entity.
METHOD AND APPARATUS FOR CONTRACT ANALYSIS
A method is provided comprising: obtaining a counterparty contract, the counterparty contract including a contract that is being proposed by a counterparty to a user; performing a segmentation of the counterparty contract to identify a plurality of sentence clusters, each of the sentence clusters corresponding to a different provision in the counterparty contract; generating a plurality of counterparty provision vectors based on the counterparty contract, each of the counterparty provision vectors being generated based on a different one of the plurality of sentence clusters; retrieving a user provision vector, the user provision vector corresponding to a user provision; calculating a plurality of similarity scores for the user provision vector; detecting whether the plurality of similarity scores satisfies a condition that is associated with the user provision; and outputting a notification associated with the user provision when the condition is satisfied.
MACHINE-LEARNING-BASED NATURAL LANGUAGE PROCESSING TECHNIQUES FOR LOW-LATENCY DOCUMENT SUMMARIZATION
Various embodiments of the present invention provide methods, apparatuses, systems, computing devices, and/or the like that are configured to effectively and efficiently generate one or more abstractive summaries of one or more multi-section documents. For example, certain embodiments of the present invention provide methods, apparatuses, systems, computing devices, and/or the like that are configured to generate an abstractive summary of a multi-section document comprising one or more sections, by generating one or more section summaries, section input batches for each selected section, model outputs created by one or more text summarization machine learning models through the performance of a batch processing operation sequence, abstractive summaries, and then storing the abstractive summaries.
MEAN TIME BETWEEN FAILURE OF SEMICONDUCTOR-FABRICATION EQUIPMENT USING DATA ANALYTICS WITH NATURAL-LANGUAGE PROCESSING
In one embodiment, a system includes a wafer handling system, processing components, a controller, a virtual assistant, a natural language processing (NLP) engine, and a data-analytics engine. The wafer handling system is configured to hold one or more wafers for processing. The processing components is configured to physically treat the one or more wafers. The controller is configured to operate the processing components. The virtual assistant, in communication with the NLP engine, is configured to receive a user query from a user, understand an intent or context of the user query, and provide a context-specific response to the user query. The data-analytics engine is configured to generate and provide analytical data relating to the user query based on data collected from a plurality of data sources via one or more communication protocols.
SMART TABULAR PASTE FROM A CLIPBOARD BUFFER
Pasting content from a clipboard buffer as structured tabular data. A computer system determines a data type of content within a clipboard buffer. Based on the data type of the content, the computer system identifies a tabular pattern analysis technique to apply to the content. Based on applying the tabular pattern analysis technique to the content, the computer system identifies a portion of tabular content within the content. Using a clipboard application programming interface, the computer system presents the portion of tabular content to an application as paste data that is structured as a set of rows and a set of columns.
Enforcing sensitive data protection in security systems
A security system that monitors requests to a protected resource is configured to determine that a syntactically-invalid language statement in a request is one that should be treated as a “security high risk” statement (SHRS) because it has a probability of containing sensitive data. A machine language that defines the structure and syntax of the language statements used by a client-server application may have multiple SHRSs. SHRSs are identified in advance by syntactical analysis of the language statements that comprise the machine language. The security system stores (or can otherwise obtain) a representation of each of the set of these high risk statements. In response to detecting that a request has a syntactically-invalid language statement, the system determines whether the invalid language statement has a measure of similarity sufficiently close to any of statement in the SHRS set. Upon a positive determination, an appropriate security action is taken to ensure sensitive data is not exposed.
Enforcing sensitive data protection in security systems
A security system that monitors requests to a protected resource is configured to determine that a syntactically-invalid language statement in a request is one that should be treated as a “security high risk” statement (SHRS) because it has a probability of containing sensitive data. A machine language that defines the structure and syntax of the language statements used by a client-server application may have multiple SHRSs. SHRSs are identified in advance by syntactical analysis of the language statements that comprise the machine language. The security system stores (or can otherwise obtain) a representation of each of the set of these high risk statements. In response to detecting that a request has a syntactically-invalid language statement, the system determines whether the invalid language statement has a measure of similarity sufficiently close to any of statement in the SHRS set. Upon a positive determination, an appropriate security action is taken to ensure sensitive data is not exposed.
Detecting programming language deficiencies cognitively
A method and a system for agitation detection and response for a programming language are provided. The method includes collecting software code and activity data pertaining to one or more activities performed by a developer that is using a segment of a programming language. The method also includes evaluating the activity data to generate an agitation level of the developer when using the segment of the programming language. The method can also include generating a developer context by evaluating the software code. The developer context can include insights into the operation of features in the programming language by the developer. The activity and developer context can be provided to a software development provider for independent analysis.
Detecting programming language deficiencies cognitively
A method and a system for agitation detection and response for a programming language are provided. The method includes collecting software code and activity data pertaining to one or more activities performed by a developer that is using a segment of a programming language. The method also includes evaluating the activity data to generate an agitation level of the developer when using the segment of the programming language. The method can also include generating a developer context by evaluating the software code. The developer context can include insights into the operation of features in the programming language by the developer. The activity and developer context can be provided to a software development provider for independent analysis.