G06N3/09

CONTROLLABLE NEURAL NETWORKS OR OTHER CONTROLLABLE MACHINE LEARNING MODELS
20230040176 · 2023-02-09 ·

A method includes obtaining (such as accessing, receiving, acquiring, etc.), using at least one processor of an electronic device, a machine learning model trained to process input data and generate output data over at least one range of values associated with one or more control variables. The method also includes providing, using the at least one processor, specified input data to the machine learning model and providing, using the at least one processor, one or more specified values of the one or more control variables to the machine learning model. The one or more specified values of the one or more control variables are within the at least one range of values. The method further includes performing inferencing using the machine learning model to process the specified input data and generate specified output data. The inferencing is controlled based on the one or more specified values of the control variable(s).

TRANSFER/FEDERATED LEARNING APPROACHES TO MITIGATE BLOCKAGE IN MILLIMETER WAVE SYSTEMS
20230039254 · 2023-02-09 ·

A UE may train a NN, based on a blockage of a beam transmission, to indicate one or more beam weights in association with the blockage of the beam transmission. The UE may store, in an ML database, information indicative of at least one of the trained NN or the one or more beam weights indicated via the trained NN, such that the UE may communicate, to an ML server, the information via the trained NN. The ML server may train the NN, based on a TL/FL procedure for the one or more beam weights associated with the at least one blockage, to indicate one or more TL/FL beam weights in association with the at least one blockage, and communicate, to at least one UE, information indicative of at least one of the trained NN or the one or more TL/FL beam weights indicated via the trained NN.

Method and an apparatus for predicting a future state of a biological system, a system and a computer program
20230011970 · 2023-01-12 ·

An embodiment of a method 100 for predicting a future state of a biological system is provided. The method 100 comprises receiving 101a microscope image depicting the biological system at an associated time and receiving 102 metadata corresponding to the microscope image. The method 100 further comprises extracting 103 features from the microscope image having information on a state of the biological system and using 104 the features and the metadata to predict the future state of the biological system.

Method and apparatus for refining an automated coding model

A method, apparatus and computer program product refine an automated coding model, such as for a medical chart. For each respective candidate code from a set of candidate codes, the method predicts a probability of the respective code being contained in a medical chart. The method also selects one of the candidate codes as being contained in the medical chart based upon the probability and removes the selected candidate code from the set of candidate codes. The method then repeatedly predicts the probability of a respective code being contained in the medical chart, selects one of the candidate codes based upon the predicted probability and removes the selected candidate code from the set of candidate codes. The method further determines a categorical crossentropy loss as to permit adjustment of one or more parameters of the automated coding model.

DETECTING AN IN-FIELD EVENT
20230010941 · 2023-01-12 ·

Examples are disclosed that relate to methods, computing devices, and systems for detecting an in-field event. One example provides a method comprising, during a training phase, receiving one or more training data streams. The training data stream(s) include an audio input comprising a semantic indicator. The audio input is processed to recognize the semantic indicator. A subset of data is selected and used to train a machine learning model to detect the in-field event, and the method further comprises outputting the trained machine learning model. During a run-time phase, the method comprises receiving one or more run-time input data streams. The trained machine learning model is used to detect a second instance of the in-field event in the one or more run-time input data streams. The method further comprises outputting an indication of the second instance of the in-field event.

IDENTIFYING TRANSACTION PROCESSING RETRY ATTEMPTS BASED ON MACHINE LEARNING MODELS FOR TRANSACTION SUCCESS

There are provided systems and methods for identifying transaction processing retry attempts based on machine learning models for transaction success. A service provider, such as an electronic transaction processor for digital transactions, may detect a failure of data processing for a transaction when processed with a separate data processing system, such as a card processing system for payment cards. In order to minimize cost and wasted resources for retrying transactions that are likely to further fail, a machine learning model may be implements that generates a predictive score for whether a failed transaction is likely to be successful if retried with the data processing system. The predictive score may be used to predict a probability of success, which may then be used with a cost function to determine a cost to retry the failed transaction and a cost to stop a retry of the failed transaction.

Natural Language Processing (NLP)-based Cross Format Pre-Compiler for Test Automation
20230008037 · 2023-01-12 ·

Various aspects of the disclosure relate to test automation systems with pre-compilers to validate various steps associated with a test script. An artificial intelligence (AI)-based pre-compiler may use natural language processing (NLP) to validate various steps associated with a test script associated with an application. Other aspects of this disclosure relate to automated encryption and mocking of test input data associated with test scripts.

System, device, and method of classifying encrypted network communications

Systems, devices, and methods of classifying encrypted network communications. A Traffic Monitoring Unit operates to monitor network traffic, and to capture HTTPS-encrypted packets that are exchanged over an HTTPS connection between an end-user device and a web server. An HTTPS Traffic Classification Unit operates to detect discrete HTTPS-encrypted objects within that HTTPS connection, and to classify those discrete HTTPS-encrypted objects based on at least one of: a first Analysis Model that classifies HTTPS-encrypted objects based on a type of content that is represented in the HTTPS-encrypted object; a second Analysis Model that classifies HTTPS-encrypted objects based on a type of server-side application that is associated with the HTTPS-encrypted object. Each Analysis Model utilizes Machine Learning (ML), Deep Learning (DL), Artificial Intelligence (AI), or Statistical and Mathematical Analysis (SMA).

System, method, and program product for generating and providing simulated user absorption information
11551803 · 2023-01-10 · ·

The present disclosure relates to a computer-implemented process for generating and providing simulated user absorption information pertaining to users and based on target profiles and target situations, thereby providing user targeted and situationally targeted content recommendations. It is an object of the present disclosure to provide a technological solution to the long felt need in small scale content recommendation systems caused by the technical problem of generating situationally targeted and user profile targeted content recommendations for users of an interactive electronic system.

DETERMINING DATA SUITABILITY FOR TRAINING MACHINE LEARNING MODELS
20230008628 · 2023-01-12 · ·

Technologies are provided for determining a suitability of data payloads for training a machine learning model. A schema can be generated based on sample data payloads that have different data formats. The sample data payloads (and/or additional data payloads) can be converted to a format that conforms to the schema. Feature vectors can then be generated based on the converted data payloads, and used to determine a suitability of the data payloads for training a machine learning model. If the data payloads are sufficiently suitable, the converted data payloads can be used to train the machine learning mode. Otherwise, the schema may be annotated and new converted payloads may be generated based on the annotated schema. The feature vector generation and suitability analysis can then be repeated.