Patent classifications
G06F18/2148
Transaction management of machine learning algorithm updates
Computer-implemented techniques for managing transactions of machine learning algorithm updates are described. In one embodiment, a computer-implemented is provided that comprises receiving, by a system operatively coupled to a processor, a request for an update to a machine learning model associated with a software program, wherein the request is received in accordance with a defined blockchain protocol, and wherein the request comprises model development data used in association with optimization of an instance of the machine learning model. The method further comprises, employing, by the system, a blockchain network to facilitate managing fulfillment of the request.
Machine-learning training service for synthetic data
Various embodiments, methods and systems for implementing a distributed computing system machine-learning training service are provided. Initially a machine learning model is accessed. A plurality of synthetic data assets are accessed, where a synthetic data asset is associated with asset-variation parameters that are programmable for machine-learning. The machine learning model is retrained using the plurality of synthetic data assets. The machine-learning training service is further configured for executing real-time calls to generate an on-the-fly-generated synthetic data asset such that the on-the-fly-generated synthetic data asset is rendered in real-time to preclude pre-rendering and storing the on-the-fly-generated synthetic data asset. The machine-learning training service further supports hybrid-based machine learning training, where the machine learning model is trained based on a combination of the plurality of synthetic data assets, a plurality of non-synthetic data assets, and synthetic data asset metadata associated with the plurality of synthetic data assets.
Automated honeypot creation within a network
Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.
Classification using cascaded spatial voting grids
A method can include identifying a first key value of a first cell of a first grid of grids of cells to which a first feature maps, embedding the first grid into each cell of a second grid, identifying a second key value of a second cell of the second grid to which a second feature maps, the second key value representative of the first and second key values, comparing the identified key value to the key values of a memory, in response to determining the identified key value is in the memory, and providing data indicating a class associated with the identified key value in the memory.
Artificial intelligence based fraud detection system
Embodiments detect fraud of risk targets that include both customer accounts and cashiers. Embodiments receive historical point of sale (“POS”) data and divide the POS data into store groupings. Embodiments create a first aggregation of the POS data corresponding to the customer accounts and a second aggregation of the POS data corresponding to the cashiers. Embodiments calculate first features corresponding to the customer accounts and second features corresponding to the cashiers. Embodiments filter the risk targets based on rules and separate the filtered risk targets into a plurality of data ranges. For each combination of store groupings and data ranges, embodiments train an unsupervised machine learning model. Embodiments then apply the unsupervised machine learning models after the training to generate first anomaly scores for each of the customer accounts and cashiers.
Learning data collection device, learning data collection system, and learning data collection method
In collection of training data for image recognition, in order to support a reduction in collection of improper images which are not suitable as training data, a learning data collection device includes a processor which is configured to acquire a captured image from an image capturing device, determine whether or not the captured image is suitable as training data, and when the captured image is determined to be not suitable as training data, perform a notification operation to prompt an image capturing person to reshoot a new image for the captured image.
Context-aware query suggestions
Methods are presented for providing dynamic search filter suggestions that are updated and ranked based on the user filter selections. One method includes detecting a query received in a user interface (UI), calculating, by a search-candidate model, first search results, and calculating, by a suggestions model, first filter suggestions for filter categories to filter responses to the query. The suggestions model is obtained by training a machine-learning algorithm utilizing pairwise learning-to-rank modeling. The first search results and the first filter suggestions are presented in the UI. When a selection in the UI of a filter suggestion is detected, the search-candidate model calculates second search results for the filter categories based on the query and the selected filter suggestion, and the suggestions model calculates second first filter suggestions based on the query and the selected filter suggestion. The second search results and the second filter suggestions are presented in the UI.
Transaction-enabled systems and methods for royalty apportionment and stacking
Transaction-enabled systems and methods for royalty apportionment and stacking are disclosed. An example system may include a plurality of royalty generating elements (a royalty stack) each related to a corresponding one or more of a plurality of intellectual property (IP) assets (an aggregate stack of IP). The system may further include a royalty apportionment wrapper to interpret IP licensing terms and apportion royalties to a plurality of owning entities corresponding to the aggregate stack of IP in response to the IP licensing terms and a smart contract wrapper. The smart contract wrapper is configured to access a distributed ledger, interpret an IP description value and IP addition request, to add an IP asset to the aggregate stack of IP, and to adjust the royalty stack.
Systems and Methods for Enhancing Trainable Optical Character Recognition (OCR) Performance
Systems and methods for enhancing trainable optical character recognition (OCR) performance are disclosed herein. An example method includes receiving, at an application executing on a user computing device communicatively coupled to a machine vision camera, an image captured by the machine vision camera, the image including an indicia encoding a payload and a character string. The example method also includes identifying the indicia and the character string; decoding the indicia to determine the payload; and applying an optical character recognition (OCR) algorithm to the image to interpret the character string and identify an unrecognized character within the character string. The example method also includes comparing the payload to the character string to validate the unrecognized character as corresponding to a known character included within the payload; and responsive to validating the unrecognized character, adding the unrecognized character to a font library referenced by the OCR algorithm.
Principal Component Analysis
A method for principal component analysis includes receiving a principal component analysis (PCA) request from a user requesting data processing hardware to perform PCA on a dataset, the dataset including a plurality of input features. The method further includes training a PCA model on the plurality of input features of the dataset. The method includes determining, using the trained PCA model, one or more principal components of the dataset. The method also includes generating, based on the plurality of input features and the one or more principal components, one or more embedded features of the dataset. The method includes returning the one or more embedded features to the user.