摘要:
An apparatus includes a tester to detect a biological signature of a biological sample, a processor, and a memory operably coupled to the processor. The memory stores instructions to cause the processor to receive an indication of the biological signature from the tester, and to generate, using a smart contract and through communication with a distributed ledger, a cryptographic token including a digital identifier based on the biological signature. The cryptographic token is transmitted to a remote processor for verification of the biological sample, in response to receiving the cryptographic token. The tester can detect the biological signature within a predetermined test duration that is less than a DNA sequencing duration associated with the biological sample, and the biological signature has a data precision sufficient to uniquely identify the biological sample from a plurality of biological samples.
摘要:
An object-extraction method includes generating multiple partition objects based on an electronic document, and receiving a first user selection of a data element via a user interface of a compute device. In response to the first user selection, and using a machine learning model, a first subset of partition objects from the multiple partition objects is detected and displayed via the user interface. A user interaction, via the user interface, with one of the partition objects is detected, and in response, a weight of the machine learning model is modified, to produce a modified machine learning model. A second user selection of the data element is received via the user interface, and in response and using the modified machine learning model, a second subset of partition objects from the multiple partition objects is detected and displayed via the user interface, the second subset different from the first subset.
摘要:
A method of more efficient, phased, iterative processing of very large collections of electronic data for the purposes of electronic discovery and related applications is disclosed. The processing minimally includes: text extraction, and the creation of a keyword search index, but may include many additional stages of processing as well. The method further includes: definition of an initial set of characteristics that correspond to “interesting” data, followed by the iterative completion of processing of this data based on a combination of user feedback on the overall relevance of the documents being processed and the system's assessment of whether or not the data it has recently selected to promote in the processing completion queue has the desired quality and quantity of relevant data. The process continues until all identified data has either been fully processed, or discarded at some intermediate stage of processing as being likely irrelevant. This has the result of effectively finishing the processing much earlier, as the later documents in the processing queue will be increasingly irrelevant.
摘要:
A multi-label ranking method includes receiving, at a processor and from a first set of artificial neural networks (ANNs), multiple signals representing a first set of ANN output pairs for a first label. A signal representing a second set of ANN output pairs for a second label different from the first label is received at the processor from a second set of ANNs different from the first set of ANNs, substantially concurrently with the first set of ANN output pairs. A first activation function is solved based on the first set of ANN output pairs, and a second activation function is solved based on the second set of ANN output pairs. Loss values are calculated based on the solved activations, and a mask is generated based on at least one ground truth label. A signal, including a representation of the mask, is sent from the processor to each of the sets of ANNs.
摘要:
A multi-label ranking method includes receiving, at a processor and from a first set of artificial neural networks (ANNs), multiple signals representing a first set of ANN output pairs for a first label. A signal representing a second set of ANN output pairs for a second label different from the first label is received at the processor from a second set of ANNs different from the first set of ANNs, substantially concurrently with the first set of ANN output pairs. A first activation function is solved based on the first set of ANN output pairs, and a second activation function is solved based on the second set of ANN output pairs. Loss values are calculated based on the solved activations, and a mask is generated based on at least one ground truth label. A signal, including a representation of the mask, is sent from the processor to each of the sets of ANNs.
摘要:
A method includes receiving a dataset that includes a plurality of input texts. Each input text from the plurality of texts is associated with a content category from a plurality of content categories based on a comparison between that input text and an intended meaning that is common for each comparison. For each model in a plurality of models, and for each content category from the plurality of content categories, that model is executed on each input text from the plurality of input texts to generate an average similarity/dissimilarity score for that content category. At least one model from the plurality of models is selected, based on the average similarity score for each content category from the plurality of content categories for each model in the plurality of models, to determine whether an input text is similar/dissimilar to the intended meaning.
摘要:
A processor-implemented method for the ownership transfer and tracking of tangible assets using a blockchain is described. In an embodiment, the method includes generating a root node associated with a tangible asset via a processor. The root node has a first hash value that represents a storage location of the root node, data associated with a tangible asset, and a second hash value that represents a storage location of the subsidiary node. The method also includes storing a hierarchical hash-linked tree structure in a non-transitory, processor-readable memory. The hierarchical hash-linked tree structure can include multiple nodes. The multiple nodes include the root node and the subsidiary node. The subsidiary node has the second hash value, and data associated with a tangible sub-asset of the tangible asset.
摘要:
An object-extraction method includes generating multiple partition objects based on an electronic document, and receiving a first user selection of a data element via a user interface of a compute device. In response to the first user selection, and using a machine learning model, a first subset of partition objects from the multiple partition objects is detected and displayed via the user interface. A user interaction, via the user interface, with one of the partition objects is detected, and in response, a weight of the machine learning model is modified, to produce a modified machine learning model. A second user selection of the data element is received via the user interface, and in response and using the modified machine learning model, a second subset of partition objects from the multiple partition objects is detected and displayed via the user interface, the second subset different from the first subset.
摘要:
Access to certain application programs and/or media content items at or from an online storefront are granted or denied for a requesting computing device based on whether a subject computing device is present at or within a threshold proximity to a reference computing device or a reference location. The requesting computing device may include the reference computing device or another computing device.
摘要:
A method is provided for directing calls placed to a telephone number associated with a user according to a reservation identifying the user, a workspace, and a start time. The method includes acts of receiving a first message from a telephone device located at the workspace in response to a first input at the telephone device on or after the start time, retrieving the reservation from a reservation database in response to receiving the first message, sending a second message to the telephone device based at least in part on a portion of the reservation identifying the user, receiving a third message sent in response to a second input at the telephone device, the third message including an identifier of the telephone device, retrieving the telephone number associated with the user from a user database, and directing calls placed to the telephone number associated with the user to the telephone device.