DIALYSIS EVENT PREDICTION
    61.
    发明申请

    公开(公告)号:US20220019892A1

    公开(公告)日:2022-01-20

    申请号:US17379078

    申请日:2021-07-19

    Abstract: A method for training a predictive model includes training a dual-channel neural network model, which includes a static channel to process static information and a dynamic channel to process temporal information, to generate a probability score that characterizes a likelihood of a health event occurring during a dialysis procedure, based on static profile information and temporal measurement information. An augmented model is trained to generate an importance score associated with the probability score, based on the static profile information and the temporal measurement information.

    Graph-based predictive maintenance
    62.
    发明授权

    公开(公告)号:US11221617B2

    公开(公告)日:2022-01-11

    申请号:US16653033

    申请日:2019-10-15

    Abstract: Systems and methods for predicting system device failure are provided. The method includes performing graph-based predictive maintenance (GBPM) to determine a trained ensemble classification model for detecting maintenance ready components that includes extracted node features and graph features. The method includes constructing, based on testing data and the trained ensemble classification model, an attributed temporal graph and the extracted node features and graph features. The method further includes concatenating the extracted node features and graph features. The method also includes determining, based on the trained ensemble classification model, a list of prediction results of components that are to be scheduled for component maintenance.

    Unsupervised spoofing detection from traffic data in mobile networks

    公开(公告)号:US11171977B2

    公开(公告)日:2021-11-09

    申请号:US16246774

    申请日:2019-01-14

    Abstract: A method for detecting spoofing attacks from network traffic log data is presented. The method includes training a spoofing attack detector with the network traffic log data received from one or more mobile networks by extracting features that are relevant to spoofing attacks for training data, building a first set of vector representations for the network traffic log data, training an anomaly detection model by employing DAGMM, and obtaining learned parameters of DAGMM. The method includes testing the spoofing attack detector with the network traffic log data received from the one or more mobile networks by extracting features that are relevant to spoofing attacks for testing data, building a second set of vector representations for the network traffic log data, obtaining latent representations of the testing data, computing a z-score of the testing data, and creating a spoofing attack alert report listing traffic logs generating z-scores exceeding a predetermined threshold.

    SEMI-SUPERVISED DEEP MODEL FOR TURBULENCE FORECASTING

    公开(公告)号:US20210255363A1

    公开(公告)日:2021-08-19

    申请号:US17165515

    申请日:2021-02-02

    Abstract: A method for employing a unified semi-supervised deep learning (DL) framework for turbulence forecasting is presented. The method includes extracting historical and forecasted weather features of a spatial region, calculating turbulence indexes to fill feature cubes, each feature cube representing a grid-based 3D region, and building an encoder-decoder framework based on convolutional long short-term memory (ConvLSTM) to model spatio-temporal correlations or patterns causing turbulence. The method further includes employing a dual label guessing component to dynamically integrate complementary signals from a turbulence forecasting network and a turbulence detection network to generate pseudo-labels, reweighing the generated pseudo-labels by a heuristic label quality detector based on KL-Divergence, applying a hybrid loss function to predict turbulence conditions, and generating a turbulence dataset including the predicted turbulence conditions.

    ASYMMETRICALLY HIERARCHICAL NETWORKS WITH ATTENTIVE INTERACTIONS FOR INTERPRETABLE REVIEW-BASED RECOMMENDATION

    公开(公告)号:US20210065278A1

    公开(公告)日:2021-03-04

    申请号:US16995052

    申请日:2020-08-17

    Abstract: A method for implementing a recommendation system using an asymmetrically hierarchical network includes, for a user and an item corresponding to a user-item pair, aggregating, using asymmetrically designed sentence aggregators, respective ones of a set of item sentence embeddings and a set of user sentence embeddings to generate a set of item review embeddings based on first item attention weights and a set of user review embeddings based on first user attention weights, respectively, aggregating, using asymmetrically designed review aggregators, respective ones of the set of item review embeddings and the set of user review embeddings to generate an item embedding based on a second item attention weights and a user embedding based on second user attention weights, respectively, and predicting a rating of the user-item pair based on the item embedding and the user embedding.

    MULTI-SCALE MULTI-GRANULARITY SPATIAL-TEMPORAL TRAFFIC VOLUME PREDICTION

    公开(公告)号:US20210064999A1

    公开(公告)日:2021-03-04

    申请号:US17003112

    申请日:2020-08-26

    Abstract: Methods and systems for allocating network resources responsive to network traffic include modeling spatial correlations between fine spatial granularity traffic and coarse spatial granularity traffic for different sites and regions to determine spatial feature vectors for one or more sites in a network. Temporal correlations at a fine spatial granularity are modeled across multiple temporal scales, based on the spatial feature vectors. Temporal correlations at a coarse spatial granularity are modeled across multiple temporal scales, based on the spatial feature vectors. A traffic flow prediction is determined for the one or more sites in the network, based on the temporal correlations at the fine spatial granularity and the temporal correlations at the coarse spatial granularity. Network resources are provisioned at the one or more sites in accordance with the traffic flow prediction.

    DEEP GRAPH DE-NOISE BY DIFFERENTIABLE RANKING

    公开(公告)号:US20210049414A1

    公开(公告)日:2021-02-18

    申请号:US16936600

    申请日:2020-07-23

    Abstract: A method for employing a differentiable ranking based graph sparsification (DRGS) network to use supervision signals from downstream tasks to guide graph sparsification is presented. The method includes, in a training phase, generating node representations by neighborhood aggregation operators, generating sparsified subgraphs by top-k neighbor sampling from a learned neighborhood ranking distribution, feeding the sparsified subgraphs to a task, generating a prediction, and collecting a prediction error to update parameters in the generating and feeding steps to minimize an error, and, in a testing phase, generating node representations by neighborhood aggregation operators related to testing data, generating sparsified subgraphs by top-k neighbor sampling from a learned neighborhood ranking distribution related to the testing data, feeding the sparsified subgraphs related to the testing data to a task, and outputting prediction results to a visualization device.

    System event search based on heterogeneous logs

    公开(公告)号:US10909115B2

    公开(公告)日:2021-02-02

    申请号:US16203008

    申请日:2018-11-28

    Abstract: Systems and methods for system event searching based on heterogeneous logs are provided. A system can include a processor device operatively coupled to a memory device wherein the processor device is configured to mine a variety of log patterns from various of heterogeneous logs to obtain known-event log patterns and unknown-event log patterns, as well as to build a weighted vector representation of the log patterns. The processor device is also configured to evaluate a similarity between the vector representation of the unknown-event and known-event log patterns, identify a known event that is most similar to an unknown event to troubleshoot system faults based on past actions for similar events to improve an operation of a computer system.

    Network endpoint spoofing detection and mitigation

    公开(公告)号:US10887344B2

    公开(公告)日:2021-01-05

    申请号:US16101815

    申请日:2018-08-13

    Abstract: Endpoint security systems and methods include a distance estimation module configured to calculate a travel distance between a source Internet Protocol (IP) address and an IP address for a target network endpoint system from a received packet received by the target network endpoint system based on time-to-live (TTL) information from the received packet. A machine learning model is configured to estimate an expected travel distance between the source IP address and the target network endpoint system IP address based on a sparse set of known source/target distances. A spoof detection module is configured to determine that the received packet has a spoofed source IP address based on a comparison between the calculated travel distance and the expected travel distance. A security module is configured to perform a security action at the target network endpoint system responsive to the determination that the received packet has a spoofed source IP address.

Patent Agency Ranking