G06F18/24155

SYSTEMS AND METHODS FOR DETERMINING A USER SPECIFIC MISSION OPERATIONAL PERFORMANCE METRIC, USING MACHINE-LEARNING PROCESSES
20220382661 · 2022-12-01 · ·

Aspects relate to system and methods for determining a user specific mission operational performance, using machine-learning processes. An exemplary system includes a computing device configured to perform operations including receiving user-input structured data from at least a user device, receiving observed structured data related to the user and a mission performance metric, inputting the user-input structured data and the observed structured data to a machine-learning model, generating a user performance metric as a function of the machine-learning model, receiving a deterministic mission operational performance metric, disaggregating a deterministic user performance metric as a function of the deterministic mission operation performance metric and the mission performance metric, inputting training data to a machine-learning algorithm, where the training data includes the user-input structured data and the observed structured data correlated to the deterministic user performance metric, and training the machine-learning model as a function of the machine-learning algorithm and the training data.

Artificial intelligence-based redundancy management framework

Methods, apparatus, and processor-readable storage media for artificial intelligence-based redundancy management are provided herein. An example computer-implemented method includes obtaining telemetry data from one or more client devices within at least one system; predicting one or more hardware component failures in at least a portion of the one or more client devices within the at least one system by processing at least a portion of the telemetry data using a first set of one or more artificial intelligence techniques; determining, using a second set of one or more artificial intelligence techniques, one or more redundant hardware components for implementation in connection with the one or more predicted hardware component failures; and performing at least one automated action based at least in part on the one or more redundant hardware components.

Prior knowledge-based topological feature classification

Techniques regarding topological classification of complex datasets are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a quantum computing component that can encode eigenvalues of a Laplacian matrix into a phase on a quantum state of a quantum circuit. The computer executable components can also comprise a classical computing component that infers a Betti number using a Bayesian learning algorithm by measuring an ancilla state of the quantum circuit.

Devices and methods for accurately identifying objects in a vehicle's environment

Vehicle navigation control systems in autonomous driving rely on accurate predictions of objects within the vicinity of the vehicle to appropriately control the vehicle safely through its surrounding environment. Accordingly this disclosure provides methods and devices which implement mechanisms for obtaining contextual variables of the vehicle's environment for use in determining the accuracy of predictions of objects within the vehicle's environment.

Managing and measuring semantic coverage in knowledge discovery processes
11586826 · 2023-02-21 · ·

Provided are processes of balancing between exploration and optimization with knowledge discovery processes applied to unstructured data with tight interrogation budgets. Natural language texts may be processed, such as into respective vectors, by a natural language processing model. An output vector of (or intermediate vector within) an example NLP model may include over 500 dimensions, and in many cases 700-800 dimensions. A process may manage and measure semantic coverage by defining geometric characteristics, such as size or a relative distance matrix, of a sematic space corresponding to an evaluation during which the natural language texts are obtained based on the vectors of the natural language texts. A system executing the process may generate a visualization of the semantic space, which may be reduced to or is a latent embedding space, by reducing the dimensionality of vectors while preserving their relative distances between the high and reduced dimensionality forms.

System and method of space object tracking and surveillance network control

Various embodiments of the disclosed subject matter provide systems, methods, architectures, mechanisms, apparatus, computer implemented method and/or frameworks configured for tracking Earth orbiting objects and adapting SSN tracking operations to improve tracking accuracy while reducing computational complexity and resource consumption associated with such tracking.

Leveraging smart-phone cameras and image processing techniques to classify mosquito genus and species

Identifying insect species integrates image processing, feature selection, unsupervised clustering, and a support vector machine (SVM) learning algorithm for classification. Results with a total of 101 mosquito specimens spread across nine different vector carrying species demonstrate high accuracy in species identification. When implemented as a smart-phone application, the latency and energy consumption were minimal. The currently manual process of species identification and recording can be sped up, while also minimizing the ensuing cognitive workload of personnel. Citizens at large can use the system in their own homes for self-awareness and share insect identification data with public health agencies.

METHOD AND SYSTEM OF SUDDEN WATER POLLUTANT SOURCE DETECTION BY FORWARD-INVERSE COUPLING
20220358266 · 2022-11-10 ·

The present disclosure refers to a method and a system of sudden water pollutant source detection by forward-inverse coupling, including: building an one-dimensional forward water quality simulation model of a river way according to acquired mechanical parameters and water quality parameters; according to the one-dimensional forward water quality simulation model of the river way, measuring and calculating each monitoring index by using an inverse optimization source-detection model; by constructing the one-dimensional forward water quality simulation model of the river way, using the inverse optimization source-detection model for measurement and calculation; and performing the Bayesian updating, in order to realize multi-information fusion. The present disclosure may reasonably control and use different observation information, and combine the redundancy or complementarity of multi-sourced information in space or in time to obtain consistent interpretation of the measured object, thus overcoming the uncertainty of the water environment, improving the accuracy of water pollutant source detection.

Systems, methods, devices and apparatuses for detecting facial expression

A system, method and apparatus for detecting facial expressions according to EMG signals.

Bayesian-optimization-based query-efficient black-box adversarial attacks

Performing an adversarial attack on a neural network classifier is described. A dataset of input-output pairs is constructed, each input element of the input-output pairs randomly chosen from a search space, each output element of the input-output pairs indicating a prediction output of the neural network classifier for the corresponding input element. A Gaussian process is utilized on the dataset of input-output pairs to optimize an acquisition function to find a best perturbation input element from the dataset. The best perturbation input element is upsampled to generate an upsampled best input element. The upsampled best input element is added to an original input to generate a candidate input. The neural network classifier is queried to determine a classifier prediction for the candidate input. A score for the classifier prediction is computed. The candidate input is accepted as a successful adversarial attack responsive to the classifier prediction being incorrect.