G06F18/21355

Systems and Methods Employing Cooperative Optimization-Based Dimensionality Reduction

Dimensionality reduction systems and methods facilitate visualization, understanding, and interpretation of high-dimensionality data sets, so long as the essential information of the data set is preserved during the dimensionality reduction process. In some of the disclosed embodiments, dimensionality reduction is accomplished using clustering, evolutionary computation of low-dimensionality coordinates for cluster kernels, particle swarm optimization of kernel positions, and training of neural networks based on the kernel mapping. The fitness function chosen for the evolutionary computation and particle swarm optimization is designed to preserve kernel distances and any other information deemed useful to the current application of the disclosed techniques, such as linear correlation with a variable that is to be predicted from future measurements. Various error measures are suitable and can be used.

Machine-Learned Models for User Interface Prediction, Generation, and Interaction Understanding

Generally, the present disclosure is directed to user interface understanding. More particularly, the present disclosure relates to training and utilization of machine-learned models for user interface prediction and/or generation. A machine-learned interface prediction model can be pre-trained using a variety of pre-training tasks for eventual downstream task training and utilization (e.g., interface prediction, interface generation, etc.).

Systems and methods for privacy-enabled biometric processing
12299101 · 2025-05-13 · ·

In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (DNN) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption. This improves security over conventional approaches. Searching biometrics in the clear on any system, represents a significant security vulnerability. In various examples described herein, only the one-way encrypted biometric data is available on a given device. Various embodiments restrict execution to occur on encrypted biometrics for any matching or searching.

Method and system of retrieving multimodal assets

A system and method and for retrieving one or more one or more multimodal assets includes receiving a search query for searching for one or more multimodal assets from among a plurality of candidate multimodal assets, encoding the search query into one or more query embedding representations via a trained query representation machine-learning (ML) model, comparing, via a matching unit, the one or more query embedding representations to a plurality of multimodal tensor representations, each of the plurality of multimodal tensor representations being a representation of one of the plurality of candidate multimodal assets, and identifying, based on the comparison, at least one of the plurality of the candidate multimodal assets as a search result for the search query, and providing the at least one of the plurality of the candidate multimodal assets for display as the search result.

Artificial intelligence (AI) models to improve image processing related to pre and post item deliveries

Techniques for improving image processing related to item deliveries are described. In an example, a computer system receives an image showing a drop-off of an item, the item associated with a delivery to a delivery location. The computer system inputs the image to a first artificial intelligence (AI) model. The computer system receives first data comprising an indication of whether the drop-off is correct from the first AI model. The computer system causes a presentation of the indication at a device associated with the delivery of the item to the delivery location.

CLUSTER INTENSITY VARIATION CORRECTION AND BASE CALLING

The technology disclosed corrects inter-cluster intensity profile variation for improved base calling on a cluster-by-cluster basis. The technology disclosed accesses current intensity data and historic intensity data of a target cluster, where the current intensity data is for a current sequencing cycle and the historic intensity data is for one or more preceding sequencing cycles. A first accumulated intensity correction parameter is determined by accumulating distribution intensities measured for the target cluster at the current and preceding sequencing cycles. A second accumulated intensity correction parameter is determined by accumulating intensity errors measured for the target cluster at the current and preceding sequencing cycles. Based on the first and second accumulated intensity correction parameters, next intensity data for a next sequencing cycle is corrected to generate corrected next intensity data, which is used to base call the target cluster at the next sequencing cycle.

DOWNSTREAM PROCESSING OF EMBEDDING INFORMATION ITEMS
20250278459 · 2025-09-04 · ·

A method for downstream processing of embedding information items, the method includes (i) receiving multiple evaluated element embedding information items that represent multiple evaluated elements within an environment of a vehicle; (ii) identifying that the multiple evaluated element embedding information items are classified into an insufficient confidence level; and (iii) for each one of the multiple evaluated embedding information items identified as an being classified into the insufficient confidence level, automatically routing evaluated element information to a corresponding embedding information item-based classification unit that is trained to classify elements represented by the evaluated element embedding information item associated with the corresponding population of embedding information items.

Resilience determination and damage recovery in neural networks

Disclosed herein include systems, devices, computer readable media, and methods for resilience determination and damage recovery in neural networks using a weight space and a metric that together form a manifold (such as a pseudo-Riemannian manifold or a Riemannian manifold).

Image based localization system

Systems and methods for determining a location based on image data are provided. A method can include receiving, by a computing system, a query image depicting a surrounding environment of a vehicle. The query image can be input into a machine-learned image embedding model and a machine-learned feature extraction model to obtain a query embedding and a query feature representation, respectively. The method can include identifying a subset of candidate embeddings that have embeddings similar to the query embedding. The method can include obtaining a respective feature representation for each image associated with the subset of candidate embeddings. The method can include determining a set of relative displacements between each image associated with the subset of candidate embeddings and the query image and determining a localized state of a vehicle based at least in part on the set of relative displacements.

Topology processing for waypoint-based navigation maps
12461531 · 2025-11-04 · ·

The operations of a computer-implemented method include obtaining a topological map of an environment including a series of waypoints and a series of edges. Each edge topologically connects a corresponding pair of adjacent waypoints. The edges represent traversable routes for a robot. The operations include determining, using the topological map and sensor data captured by the robot, one or more candidate alternate edges. Each candidate alternate edge potentially connects a corresponding pair of waypoints that are not connected by one of the edges. For each respective candidate alternate edge, the operations include determining, using the sensor data, whether the robot can traverse the respective candidate alternate edge without colliding with an obstacle and, when the robot can traverse the respective candidate alternate edge, confirming the respective candidate alternate edge as a respective alternate edge. The operations include updating, using nonlinear optimization and the confirmed alternate edges, the topological map.