Resumen de: US20260040099A1
Aspects of the subject disclosure may include, for example, receiving, from a machine learning model, information about an event causing a service degradation in a cellular network, wherein the event is external to the cellular network, determining one or more event categories associated with the event causing the service degradation, determining, based on the one or more event categories, likely affected customers, the likely affected customers being likely to experience the service degradation, determining, by the machine learning model, proper resources for resolution of the service degradation, wherein the determining proper resources is based on the one or more event categories, and dispatching the proper resources for resolution of the service degradation. Other embodiments are disclosed.
Resumen de: US20260039693A1
Techniques are disclosed relating to generating trained machine learning modules to identify whether user interfaces accessed by a computing device match user interfaces associated with a set of Internet domain names. A server computer system receives a set of Internet domain names and generates screenshots for user interfaces associated with the set of Internet domain names. The server computer system then trains machine learning modules that are customized for the set of Internet domain names using the screenshots. The server then transmits the machine learning modules to the computing device, where the machine learning modules are usable by an application executing on the computing device to identify whether a user interface accessed by the device matches a user interface associated with the set of Internet domain names. Such techniques may advantageously allow servers to identify whether user interfaces are suspicious without introducing latency and increased page load times.
Resumen de: US20260034996A1
An “aggregator” controls the allocation of scarce resources among competing demands within a target machine-control environment. Multiple machine-learning agents are initiated, each with its own initial resource-utilization-optimization model based on a pre-trained model. The machine-learning agents receive resource-utilization information from within the target environment. They then use the received information to modify their models in order to more optimally utilize the scarce resources. Each agent sends a prediction, based on the agent's modified model, to the aggregator. The aggregator uses the predictions it receives to update its own model and uses that updated aggregator model to control, at least to some extent, the allocation of the scarce resources within the target environment.
Resumen de: US20260037890A1
Based on receiving data defining a new data item for a construction project corresponding to a particular category of data items, a computing system (1) automatically: (i) predicts that a change event for the construction project is needed by inputting the new data item into a first machine learning model trained to predict a need for a change event from data items corresponding to certain categories of data items, including the particular category of the new data item, (ii) determines initial recommended data for the predicted change event, and (iii) determines additional data for the predicted change event corresponding to a particular class of additional data by inputting the initial recommended data for the predicted change event into a second machine learning model trained to predict one or more classes of additional data for a change event, and (2) automatically create a data item representing the predicted change event.
Resumen de: US20260037842A1
A Contrastive Forecasting Explanation (CFE) tool and technique provides a model-agnostic approach to forecasting explanation. The CFE tool uses an ML-based surrogate forecaster as a surrogate model. The surrogate forecaster includes a time series preprocessor, a simple concept generator, and an ML forecaster. The subsequent interpretation of the predictions of the time series forecaster is based on the behavior of the surrogate forecaster. The CFE tool interprets time series forecasts by identifying the specific temporal concepts impacting predictions and thus generates clear and reliable explanations regardless of model type. The simple concepts and predictions generated by the surrogate model are input into a perturbation-based explainer to produce feature attributions from the surrogate model. An attribution postprocessor aggregates the attributions into more coherent concepts to present a coherent, concise, and interpretable explanation.
Resumen de: US20260037871A1
A system may access a set of training data and determine a timeframe associated with a positively labeled data item of the training data. A system may generate at least two new positively labeled data items based on the positively labeled data item to generate augmented training data. A system may train a machine learning model by applying the augmented training data as input to a machine learning model, and modifying a weight of the machine learning model.
Resumen de: WO2026030526A1
Quantum-secure, multiparty computation enables the joint evaluation of multivariate functions across distributed users while ensuring the privacy of their local inputs. It uses a linear algebra engine that leverages the quantum nature of light for information-theoretically secure multiparty inference using telecommunication components. This linear algebra engine can perform deep learning inference with rigorous upper bounds on the information leakage of both the deep learning model weights and the client's data, enabling double-blind operations. Applied to the MNIST classification task, it performs with classification accuracies exceeding 95% and a leakage of less than 0.1 bit per weight and data symbols. This leakage is an order of magnitude below the minimum bit precision for accurate deep learning using state-of-the- art quantization techniques. Our quantum-secure, multiparty computation lays the foundation for practical quantum-secure computation and unlocks secure cloud deep learning.
Nº publicación: EP4687049A1 04/02/2026
Solicitante:
SCHNEIDER ELECTRIC USA INC [US]
Schneider Electric USA, Inc
Resumen de: EP4687049A1
Classifying one or more assets in an automated and industrial control system (AIC) according to a classification standard. In a computer monitoring tool, a classification query is received for an asset managed by the AIC. Responsive to this classification query, the computer monitor tool retrieves a listing of candidate ontology classes for the queried asset utilizing information received from a semantic data model of known assets. The computer monitor tool then captures, preferably from a database coupled to the AIC, certain classification attribute variables associated with the queried asset. Additionally, the computer monitor tool receives user information describing certain building information associated with the queried asset. The computer monitor tool then generates a computer query configured for requesting results from a machine learning (ML) algorithm indicative of one or more classification standards for the queried asset.