Patent classifications
G06N3/092
SYSTEM AND METHOD FOR GENERATING A CONTENTION SCHEME
A system for generating a contention scheme includes a computing device, the computing device configured to obtain a solvency signature as a function of a solvency entity, determine a solvency grouping as a function of the solvency signature, identify a null element as a function of the solvency grouping, wherein identifying the null element further comprises receiving a regulation element as a function of a regulation database, and identifying the null element as a function of the regulation element and the solvency grouping, produce a weighted vector as a function of the null element, and generate a contention scheme as a function of the weighted vector.
SYSTEM AND METHOD FOR THE CONTEXTUALIZATION OF MOLECULES
A system and method that given one or more input molecules, produces a contextualized summary of characteristics of related target molecules, e.g., proteins. Using a knowledge graph which is populated with all known molecules, input molecules are analyzed according to various similarity indexes which relate the input molecules to target proteins or other biological entities. The knowledge graph may also comprise scientific literature, governmental data (FDA clinical phase data), private research endeavors (general assays, etc.), and other related biological data. The summary produced may comprise target proteins that satisfy certain biological properties, general assay results (ADMET characteristics), related diseases, off-target molecule interactions (non-targeted molecules involved in a specific pathway or cascade), market opportunities, patents, experiments, and new hypothesis.
Systems and Methods for Imitation Learning
Systems and methods for imitation learning in accordance with embodiments of the invention are illustrated. One embodiment includes a method for imitation learning. The method includes steps for initializing a Q-function, training the Q-function using a non-adversarial objective based on a set of one or more expert trajectories, and determining a policy based on the trained Q-function.
TRANSFER/FEDERATED LEARNING APPROACHES TO MITIGATE BLOCKAGE IN MILLIMETER WAVE SYSTEMS
A UE may train a NN, based on a blockage of a beam transmission, to indicate one or more beam weights in association with the blockage of the beam transmission. The UE may store, in an ML database, information indicative of at least one of the trained NN or the one or more beam weights indicated via the trained NN, such that the UE may communicate, to an ML server, the information via the trained NN. The ML server may train the NN, based on a TL/FL procedure for the one or more beam weights associated with the at least one blockage, to indicate one or more TL/FL beam weights in association with the at least one blockage, and communicate, to at least one UE, information indicative of at least one of the trained NN or the one or more TL/FL beam weights indicated via the trained NN.
Action selection by reinforcement learning and numerical optimization
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for selecting actions to be performed by an agent interacting with an environment. In one aspect, a method comprises, at each of one or more time steps: generating a respective action score for each action in a set of possible actions, wherein the set of possible actions comprises: (i) a plurality of atomistic actions, and (ii) one or more optimization actions, wherein each optimization action is associated with a respective objective function that measures performance of the agent on a corresponding auxiliary task; selecting an action from the set of possible actions in accordance with the action scores, wherein the selected action is an optimization action; in response to selecting the optimization action, performing a numerical optimization to identify a sequence of one or more atomistic actions that are predicted to optimize the objective function.
Continuous machine learning for extracting description of visual content
Aspects of the present disclosure relate to machine learning techniques for continuous implementation and training of a machine learning system for identifying the natural language meaning of visual content. A computer vision model or other suitable machine learning model can predict whether a given descriptor is associated with the visual content. A set of such models can be used to determine whether particular ones of a set of descriptors are associated with the visual content, with the determined descriptors representing a meaning of the visual content. This meaning can be refined based on a multi-armed bandit tracking and analyzing interactions between the visual content and users associated with certain personas related to the determined descriptors.
Automated design techniques
Systems and methods are described herein for generating potential feature combinations for a new item. A neural network may be utilized to identify positive and/or negative sentiment phrases from textual data. Each sentiment phrase may correspond to particular features of existing items. A machine-learning model may utilize the sentiment phrases and their corresponding features to generate a set of potential feature combinations for a new item. The potential feature combinations may be scored, for example, based on an amount by which a potential feature combination differs from known feature combinations of existing items. One or more potential feature combinations may be provided in a feature recommendation. Feedback (e.g., human feedback, sales data, page views for similar items, and the like) may be obtained and utilized to retrain the machine-learning model to better identify subsequent feature combinations that may be desirable and/or practical to manufacture.
METHOD AND NETWORK APPARATUS FOR GENERATING REAL-TIME RADIO COVERAGE MAP IN WIRELESS NETWORK
Embodiments herein provide a method for generating a real-time radio coverage map in a wireless network by a network apparatus. The method includes: receiving real-time geospatial information from one or more geographical sources in the wireless network; determining handover information of at least one user equipment (UE) in the wireless network from a plurality of base stations based on the real-time geospatial information; and generating the real-time radio coverage map based on the handover information of at least one UE and the real-time geospatial information.
COMBINING MATH-PROGRAMMING AND REINFORCEMENT LEARNING FOR PROBLEMS WITH KNOWN TRANSITION DYNAMICS
A computer implemented method of improving parameters of a critic approximator module includes receiving, by a mixed integer program (MIP) actor, (i) a current state and (ii) a predicted performance of an environment from the critic approximator module. The MIP actor solves a mixed integer mathematical problem based on the received current state and the predicted performance of the environment. The MIP actor selects an action a and applies the action to the environment based on the solved mixed integer mathematical problem. A long-term reward is determined and compared to the predicted performance of the environment by the critic approximator module. The parameters of the critic approximator module are iteratively updated based on an error between the determined long-term reward and the predicted performance.
MONITORING AND ALERTING SYSTEM BACKED BY A MACHINE LEARNING ENGINE
A monitoring and alerting system backed by a machine learning engine for anomaly detection and prediction of time series data indicative of health of an application, a system, an environment, or a person. Using any data of interest that is modeled into a time series known as times and values; comparing input data against learned previous patterns; predicting data; identifying anomalies; generating notifications or an alert identifying the deviation, and communicating the alert to users, applications, or devices, applying the action or health functions logic using the significance of the issue to modify/start/stop components of the system or application. The data is received via a metrics server and is cleaned into a unified format and passed through via streaming or push/pull mechanisms. Planned deviations are configured to prevent false positives. A variety of machine learning methods is used and the system has dual function components and disaster recovery.