An operating system, or operating system update, management service uses a shared read-only multi-attach volume of a block-based storage service to distribute operating systems or operating system updates to a set of virtualized computing instances. Also, to store launch specific information, that is specific to a given virtualized computing instance, additional writable volumes are used, wherein a write volume is attached to each of the computing instances of the set. This eliminates the need to provide a full copy of an OS volume to each of the computing instances.
Techniques are described for managing access of executing programs to non-local block data storage. In some situations, a block data storage service uses multiple server storage systems to reliably store network-accessible block data storage volumes that may be used by programs executing on other physical computing systems. A group of multiple server block data storage systems that store block data volumes may in some situations be co-located at a data center, and programs that use volumes stored there may execute on other physical computing systems at that data center. If a program using a volume becomes unavailable, another program (e.g., another copy of the same program) may in some situations obtain access to and continue to use the same volume, such as in an automatic manner in some such situations.
G06F 3/06 - Digital input from, or digital output to, record carriers
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
A quantum computing service provides customers containerized software for orchestrating quantum task execution using third-party quantum hardware providers. The quantum computing service also issues tokens to the customers that can be used to gain access to quantum processing units of the third-party quantum hardware providers and tracks token usage to account for customer usage of quantum resources of the third-party quantum hardware providers. In some embodiments, the software containers provided to customers include code for validating quantum tasks, code for translating quantum circuits associated with the quantum tasks to native gate representations, and code for compiling the translated quantum circuits into compiled artifacts that can be submitted, along with an access token, to a third-party quantum hardware provider to have the quantum task executed.
4.
NETWORK-ACCESSIBLE MACHINE LEARNING MODEL TRAINING AND HOSTING SYSTEM
A network-accessible machine learning service is provided herein. For example, the network-accessible machine learning service provider can operate one or more physical computing devices accessible to user devices via a network. These physical computing device(s) can host virtual machine instances that are configured to train machine learning models using training data referenced by a user device. These physical computing device(s) can further host virtual machine instances that are configured to execute trained machine learning models in response to user-provided inputs, generating outputs that are stored and/or transmitted to user devices via the network.
Inductive power transfer across a rotary joint including a motor comprises a first portion with a magnetically permeable power transmit core with a power transmit coil and a second portion comprising a magnetically permeable power receive core with a power receive coil. The core material in the respective cores directs a time-varying electromagnetic field emitted by the power transmit coil toward the power receive coil where the field is contained. As a result, adjacent devices on a side opposite the coil that utilize magnetic fields, such as motor coils, may operate without interference. For example, a brushless direct current motor comprising a stator in the first portion and a rotor in the second portion may operate while power is transferred. Data may be wirelessly transmitted between the first portion and the second portion.
H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
H02K 1/12 - Stationary parts of the magnetic circuit
H02K 3/32 - Windings characterised by the shape, form or construction of the insulation
6.
Bidirectional videoconference-related messaging for public switched telephone network participants
A videoconference among a plurality of participants may be hosted, wherein the plurality of participants comprise Internet Protocol (IP)-connected participants and a Public Switched Telephone Network (PSTN)-connected participant. The IP-connected participants may send and receive audio content and video content of the videoconference via IP-based connections. The PSTN-connected participant may send and receive the audio content of the videoconference via a PSTN connection. Additional content from the videoconference may also be transmitted to the PSTN-connected participant, for example as text messages via the PSTN connection. The additional content may include, for example, images of a videoconference screen share, chat posts, polls, and the like. Images may be transmitted in the additional content based on video status change events, such as switching slides or pages in a screen share. In some examples, bidirectional messaging may allow contents of text messages from the PSTN-connected user to be displayed in the videoconference.
This disclosure describes techniques for operating multiple communication protocols on a single channel. In embodiments, such techniques may involve determining multiple communication activities to be performed using a wireless transceiver, retrieving priority information associated with the multiple communication activities to be performed, and determining, based on the priority information, a priority level for individual communication activities of the multiple communication activities. Once such a priority level has been determined, the techniques may further involve identifying a prioritized communication activity of the multiple communication activities having the highest priority level and establishing a wireless communication session between the electronic device and a station associated with the prioritized communication activity using a communication protocol associated with the prioritized communication activity.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 17/10 - Actuation by presence of smoke or gases
8.
Content delivery using client-side secondary event data instructions
Systems and methods for client-side processing of secondary event data are provided. Client computing device receive and process manifest information provided by a streaming content service in response to a content request. In addition to the identification of the set of encoded content segments, the returned manifest information includes the secondary event instructions that instruct the client computing device on how to further process received encoded content segments with secondary event data. The client computing device may process the secondary event instructions to identify what graphics and audio codes need to be inserted be include; timing information regarding when graphics or codes are needed to be inserted; location or placement information regarding how these graphics or codes are inserted when rendered by the client computing device.
H04N 21/6332 - Control signals issued by server directed to the network components or client directed to client
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video streamElementary client operations, e.g. monitoring of home network or synchronizing decoder's clockClient middleware
H04N 21/437 - Interfacing the upstream path of the transmission network, e.g. for transmitting client requests to a VOD server
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
9.
Testing integrated circuit designs with accelerated replay
A technique to stress test an integrated circuit design under test in a simulation environment may include running a simulation that includes providing bus interface transactions and idle cycles on a bus interface of an integrated circuit design. The technique may further include capturing bus interface activity on the bus interface during the simulation to generate a stimulus file and replaying the simulation by executing a test bench driver that reads the stimulus file and injects the bus interface transactions with modified idle cycles onto the bus interface of the integrated circuit design.
G06F 30/331 - Design verification, e.g. functional simulation or model checking using simulation with hardware acceleration, e.g. by using field programmable gate array [FPGA] or emulation
Data about concentration of one or more types of molecules present within a human body are determined noninvasively using radio frequency signals. These signals at several different frequencies are generated at very low power levels are emitted and acquired using an antenna mounted to a wearable device. Information about changes to the signals, such as phase variances of the signals at different frequencies is indicative of the concentration of one or more types molecules within the user. The antenna includes concentric elements with one or more being used to emit the signal(s) while one or more are used to acquire the signal(s). Concentrations at different depths may be measured by selectively using particular concentric elements. A maximum depth may approximately equal the spacing between the elements being used at a given time. Other sensors may be emplaced or operate through windows located between one or more of the concentric elements.
H01Q 1/27 - Adaptation for use in or on movable bodies
A61B 5/05 - Detecting, measuring or recording for diagnosis by means of electric currents or magnetic fieldsMeasuring using microwaves or radio waves
H01Q 7/00 - Loop antennas with a substantially uniform current distribution around the loop and having a directional radiation pattern in a plane perpendicular to the plane of the loop
H01Q 21/06 - Arrays of individually energised antenna units similarly polarised and spaced apart
H01Q 21/28 - Combinations of substantially independent non-interacting antenna units or systems
A device includes a general purpose input/output (GPIO) pin and a chipset that has a bootloader component, a secure driver component, and a countermeasure handler component. The bootloader component loads an intrusion detection (ID) configuration for detecting intrusion events at the device, authenticates the ID configuration, and initializes the countermeasure handler component. The secure driver component receives, from the GPIO pin, an electrical signal associated with a hardware interrupt at the device and causes a notification to be provided to a user associated with the device. The counter secure driver component also perform at least one countermeasure in response to the intrusion event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Systems and techniques for generation and curation of a professional headshot from a set of image data. The systems and techniques images from the set of image data based on characteristics of the representation of the individual within the image. The systems and techniques further include determining a bounding box to define a headshot, the bounding box determined based on guidelines established by heuristics and/or machine learning algorithms trained using data labeled based on heuristics.
An aerial vehicle equipped with a first range sensor oriented to capture range data above the aerial vehicle and a second range sensor oriented to capture range data below the aerial vehicle is programmed with global map of an indoor space, including an upper global map representing distance data for upper surfaces of the indoor space and a lower global map representing distance data for lower surfaces of the indoor space. An offset to an altitude is calculated based on a comparison between range data captured by the first range sensor and the upper global map, and range data captured by the second range sensor and the lower global map. Additionally, global maps may be updated based on returns captured by the range sensors, where such data indicates the presence of a previously undetected object.
B64U 101/10 - UAVs specially adapted for particular uses or applications for generating power to be supplied to a remote station, e.g. UAVs with solar panels
B64U 101/70 - UAVs specially adapted for particular uses or applications for use inside enclosed spaces, e.g. in buildings or in vehicles
G05D 111/00 - Details of signals used for control of position, course, altitude or attitude of land, water, air or space vehicles
This disclosure describes, in part, techniques to process audio signals to lessen the impact that wind and/or other environmental noise has upon the resulting quality of audio signals output on speaker(s) of wireless earbuds or other headphones. For example, the techniques may determine a level of wind and/or other noise in an environment and may determine how best to process the signals to lessen the impact of the noise, such that one or more users that hear audio based on output of the signals hear higher-quality audio. In some instances, the techniques are able to detect levels of wind in a relatively low-power manner and as part of regular operation of the wireless earbuds or other headphones.
G10K 11/178 - Methods or devices for protecting against, or for damping, noise or other acoustic waves in general using interference effectsMasking sound by electro-acoustically regenerating the original acoustic waves in anti-phase
16.
Compact hosting of database query processors using virtualization snapshots
Compact hosting of database query processors is performed using virtualization snapshots. When a request to access a database is received via a previously established connection from a client for an idle query processor that is not currently executing, a virtualization snapshot may be identified that is associated with the idle query processor. The virtualization snapshot of the query processor may be used to restore the query processor into virtual execution on a host system for the database using an origin snapshot that shares clean pages across multiple query processors on the host system. The request may be performed by the restored query processor in virtual execution on the host system.
Techniques for handling natural language query processing are described. In some examples, entities are recognized during an entity recognition phase and then relations between those entities are determined. Those relations are fed to an entity linker to help the linker link candidate to columns and/or a intent representation generator to help parse multiple values and column pairs of a natural language query.
A tensioning system may be implementable for a rack. A ladder upright may extend upwardly from a central area of a base of the rack and support shelves. First and second straps may extend upwardly from first and second lateral areas of the base and couple with a plate arranged along the ladder upright. The plate can include a set of vertically aligned plate-aligning apertures, and the ladder upright can include a set of vertically arranged receiving apertures. Corresponding aperture pairs can each include one from the set of receiving apertures and one from the set of plate-aligning apertures. The plate-aligning apertures may be distributed differently from the receiving apertures such that the plate is vertically moveable along the receiving apertures to change which of the corresponding aperture pairs is aligned for receiving a fastener to retain the plate in a state in which tension is present in the straps.
A virtual network interface is configured to receive packets of an application at a packet processing service. A first set of fast-path nodes of the service is assigned to execute packet rewriting rules on packets received via the virtual network interface. Based on analysis of metrics obtained from the set of fast-path nodes, a determination is made that a criterion for scaling up fast-path nodes has been met. A second set of fast-path nodes is assigned to execute packet rewriting rules on additional packets received via the interface, with the number of nodes included in the second set based on a statistic (indicated by the metrics) of the size of packets transmitted via the virtual network interface.
A biometric identification system may store biometric data for later assessment. Data storage parameters, such as cryptographic keys used to encrypt and decrypt the biometric data, may be determined based on the biometric data. In one implementation, the biometric data comprises embedding data in an embedding space. During enrollment and storage, the embedding data is assessed to determine nearest anchor data in the embedding space. Cryptographic parameters, such as an encryption key, are determined based on “k” anchor data that are within a threshold distance of the embedding data in the embedding space. During query, query embedding data is similarly processed to determine cryptographic parameters, such as a decryption key. The decryption key may then be used to attempt decryption of the encrypted at-rest biometric data. If successful, the decrypted biometric data may then be compared to the query embedding to assert an identity.
Techniques for using a quantized and/or fused model are described. In some examples, a service is to receive a request to use a trained model, the request including input data; apply a trained model to the input data, the application of the trained model includes fusing one or more matrix multiplication operations with element-wise operations; and output a result from the trained model.
Systems and methods for intelligent defaulting using machine learning are provided. The systems and methods may involve the use of one or more machine learning models that are used to determine a default shipment option to present to a user through a user interface associated with a product checkout page (for example, on a website or through a mobile device application). The determination of the default shipment option may be performed in two phases. A first phase may involve using user-specific historical data (for example, prior selected shipment options, order information, etc.) to determine scores associated with individual potential shipment options. The scores may indicate a probability that the user may select the individual shipment options. The individual shipment options may also be provided associated threshold values. A second phase may involve adjusting the thresholds based on non-user-specific factors, such as delivery driver preference, profits and other financial considerations, and other factors. A final shipment option may be selected by determining the highest probability score that satisfies its associated threshold. The default shipment option may be presented to the user by default when the user reached the checkout page for the product.
Techniques are generally described for an artificial intelligence based interior designer system. In various examples, an image comprising a plurality of items arranged together in a room may be received. A visual representation and a positional representation of each item represented in the image may be determined. An output embedding may be generated based at least in part on the visual representation and the positional representation of each item represented in the image. At least one output item may be determined based at least in part on the output embedding. An image of the at least one output item may be displayed in association with the image comprising the plurality of items arranged together in the room.
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G06T 11/60 - Editing figures and textCombining figures or text
G06F 18/21 - Design or setup of recognition systems or techniquesExtraction of features in feature spaceBlind source separation
G06F 18/214 - Generating training patternsBootstrap methods, e.g. bagging or boosting
G06F 18/22 - Matching criteria, e.g. proximity measures
G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
25.
Content addressable memory with multi-iteration lookup
A Content-Addressable Memory (CAM) is disclosed in which a single lookup request is split into several iterations, with each iteration having a partial lookup. Results of the partial lookups are incrementally accumulated to obtain a final lookup result. The incremental CAM lookup allows for smaller CAM hardware to be used than typically needed for a similar size lookup, which saves area and power over prior approaches. In one embodiment, a memory is used in conjunction with a CAM and the CAM is configured on each partial lookup using a read from the memory. Accumulation logic can then be used to logically combine the results of the partial lookups.
G11C 15/04 - Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores using semiconductor elements
Techniques for an optical lens set and optical combiner are described herein. In an example, an apparatus has a first side and a second side. The apparatus includes an optical combiner and a first optical lens disposed at the first side. The image combiner is configured to output light emitted by a light projector as a virtual image projection within a field of view. At least a first portion of the first optical lens is within the field of view and is characterized by a first optical power that provides a first optical correction. The first optical power compensates for a second optical power of a second optical lens optionally disposable at the second side.
G02B 27/18 - Optical systems or apparatus not provided for by any of the groups , for optical projection, e.g. combination of mirror and condenser and objective
G09G 3/00 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes
27.
Securing a multiplayer deterministic simulation using a partial simulation
Network simulation systems and methods to execute and manage simulations or games are disclosed. The simulations or games are managed so that participants of each team are prevented from having access to information which they are not expected or supposed to have in the context of a fair simulation or game. To do this, a server, in addition to running a complete simulation, runs partial simulations for each particular team based only on information available to each particular team, where the partial simulations match the simulations done locally by clients. The server also generates and transmits correction patches to the clients, and the clients use the correction patches to modify their partial simulations to incorporate information from the complete simulation which is allowed to be accessed by the client.
A63F 13/57 - Simulating properties, behaviour or motion of objects in the game world, e.g. computing tyre load in a car race game
A63F 13/70 - Game security or game management aspects
A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an encoded video stream for transmitting to a mobile phone or a thin client
A63F 13/77 - Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
28.
Active cooling system and method for robot manipulators
A robotic system, a manipulator, and a method for cooling actuators are defined. The robotic system can include an actuator of a manipulator, an end effector (e.g., a suction end effector) operably coupled to the actuator, a supply line configured to supply air to the end effector, and a cooling sleeve coupled to the actuator. The end effector can be actuated by the air. The cooling sleeve can include (i) a heat exchange surface (e.g., made of copper) in contact with the actuator, (ii) an inlet, and (iii) an outlet. The cooling sleeve can be configured to receive the air from the supply line via the inlet, to pass the air over the heat exchange surface, and direct the air out of the cooling sleeve via the outlet.
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
B25J 19/00 - Accessories fitted to manipulators, e.g. for monitoring, for viewingSafety devices combined with or specially adapted for use in connection with manipulators
29.
Container unloading systems for various container types
Systems and methods are disclosed for unloading containers of various container types. In one embodiment, an example container unloading system may include a container support platform configured to rotate a container from an upright position to an angled position, a centering guide configured to guide the container onto the container support platform, a hydraulic device configured to actuate the container support platform, and a controller configured to determine presence of the container on the container support platform, and cause the container support platform to rotate the container via actuation of the side-mounted hydraulic device.
This disclosure is directed to methods, apparatuses, and systems for providing content streams with highly targeted, interactive content in a personalized manner. A content producer can generate a user-generic content stream associated with one or more user-specific content flags, which can describe how the user-specific content can be presented along with the content stream. A content-provider can purchase or otherwise acquire the rights to insert their user-specific content into another content provider's user-generic content. Both the user-specific and user-generic content can be provided to the user by means of a voice-controlled device associated with a cloud-based profile of the user. A user can interact with the personalized content to receive supplemental information.
H04H 20/18 - Arrangements for synchronising broadcast or distribution via plural systems
H04N 21/41 - Structure of clientStructure of client peripherals
H04N 21/435 - Processing of additional data, e.g. decrypting of additional data or reconstructing software from modules extracted from the transport stream
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
In response to receiving a reservation request at a provider network, metadata indicating that a group of network addresses of a subnet is reserved for operations of a particular category is stored. A first request for an operation, requiring assignment of an address of the reserved group is rejected if the operation does not belong to the particular category, even if the address is not in use. In response to a second request for an operation which does belong to the particular category, an address of the reserved group is assigned.
Described are systems and methods for in-facility purchase of items from a single seller when those items are offered for sale by multiple sellers. For example, a materials handling facility may include two or more sellers (Seller A and Seller B) that offer items for sale within the facility. A user may pick items from Seller A and items from Seller B and complete an in-facility purchase of those picked items from one of the sellers, such as Seller B, by payment of the purchase price and applicable taxes to that seller. At a subsequent time, for example when the user exits the facility, Seller B may pay Seller A at least a portion of the purchase price for the Seller A items sold by Seller B as part of the in-facility purchase.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A device includes a first housing and a second housing pivotably coupled to the first housing. The second housing has a first camera disposed on a first side of the first housing and a second camera disposed on a second side of the first housing. The first camera has a first field of view (FoV) that is adjustable via pivoting the second housing, and the second camera has a second FoV that is adjustable via pivoting the second housing. The second FoV is different than the first FoV. A privacy cover is coupled to the second housing and is configured to transition between a first position in which the first camera is unobstructed and a second position in which the first camera is obstructed.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Devices, systems, and methods are provided for voice-based presentation of a user's sentiment. A method may include receiving, by a device, voice data of a person at a time; determining, based on the voice data, an energy level of the person at the time; determining, based on the voice data, a sentiment level of the person at the time; selecting a presentation color indicative of the sentiment level; determining, based on the energy level, a first brightness of the first presentation color; and presenting an indication of the presentation color and the time.
Disclosed are various embodiments for self-service management of network address allocations in a cloud provider network. In one embodiment, a first network address pool is created for a customer of a cloud provider network in response to a first request. A second network address pool is internally reserved for the customer, where the second network address allocation is contiguous to the first network address pool. The first network address pool is expanded to include at least a portion of the second network address pool in response to a second request.
The present disclosure generally relates to systems and methods for utilization of network mitigation techniques in the form of null address routing to mitigate coordinated DDOS attacks. One or more computing devices can install malware code into a network device after exploiting a vulnerability of the network device. A monitoring and mitigation service can monitor network devices and detect malware code installed on the network-based service. The monitoring and mitigation service can identify the internet protocol (IP) address or any routing information regarding the computing devices that sent the malware code. Based on the identified information, the monitoring and mitigation service can identify and implement the network mitigation information in the form of null routing addresses that will cause network communications associated with the identified computing device to be terminated or otherwise not delivered to the intended network-based resources.
Describe herein are techniques for providing cloud-based discovery. For example, a device may be configured to provide device registration and de-registration notifications to a cloud-based discovery service. The cloud-based discovery service may be configured to respond to discovery request by identifying registered devices that meet the criteria of the discovery request. The cloud-based discovery service may also be configured to provide endpoint information associated with registered devices in response to the discovery request, such that a device is able to utilize the endpoint information to connect with one or more of the registered devices.
Devices and techniques are generally described for inference reduction in natural language processing using semantic similarity-based caching. In various examples, first automatic speech recognition (ASR) data representing a first natural language input may be determined. A cache may be searched using the first ASR data. A first skill associated with the first ASR data may be determined from the cache. In some examples, first intent data representing a semantic interpretation of the first natural language input data may be determined by using a first natural language process associated with the first skill.
Various embodiments of transcoding system that includes a pre-filtering system are disclosed. The pre-filtering system includes amorphous sub-filter modules and is configured to automatically configure a sequence of filter modules to be used to filter a given segment of a media object being transcoded based on artifacts resulting from an earlier decoding process. The pre-filtering system does not require prior knowledge of what encoding parameters that were used to encode the media object being transcoded. Also, the filtering system supports a wide variety of encoding formats and can automatically adjust the filtering sequence and/or filtering parameters based on the variability of compression artifacts resulting from the decoding of media objects previously encoded using a plurality of encoding formats and/or encoding parameters.
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
G06V 20/40 - ScenesScene-specific elements in video content
H04N 19/117 - Filters, e.g. for pre-processing or post-processing
H04N 19/136 - Incoming video signal characteristics or properties
H04N 19/167 - Position within a video image, e.g. region of interest [ROI]
H04N 19/172 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a picture, frame or field
H04N 19/23 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video object coding with coding of regions that are present throughout a whole video segment, e.g. sprites, background or mosaic
A codec system dynamically selects a codec from multiple available codecs with a highest level of encoding quality at a computing device based at least in part on the available computing resources at a particular computing device. The codec system can continuously monitor encoding performance and if encoding with the selected codec uses too many computing resources, then the codec system can switch to a codec that uses fewer computing resources.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/418 - External card to be used in combination with the client device, e.g. for conditional access
Embodiments of a content recommendation or selection system are described. The system uses a pipeline of machine learning models to select content for a user. In embodiments, a first user model generates a first score of content categories for the user based on short-term user data. A second user model generates a second score of the categories for the user based on long-term user data. The two scores are combined to select the categories to include on the content user interface. In embodiments, new categories are added to the recommendations based on an exploration-exploitation algorithm. In embodiments, content categories are organized on the user interface in a manner to promote neighborhood diversity. Advantageously, the machine learning pipeline enables independent configurability of various objectives of the content recommendation or selection system and reduces the amount of machine learning resources needed to implement the system.
Contents of client-initiated handshake messages of a security protocol are obtained at a handshake processing offloader configured for an application. The offloader uses a first security artifact (which is inaccessible from a front-end request processor of the application) and the contents of the handshake messages to generate a second security artifact. The second security artifact is transmitted to the front-end request processor, which uses it to perform cryptographic operations for client-server interactions of the application.
Systems and methods are described for facilitating network traffic between serverless function executions and isolated cloud resources within virtualized network environments. Virtualized network environments, by default, may be isolated such that external traffic is not permitted to enter the environment. Permissions for traffic that may enter the environment are often set on the basis of network addresses. In the context of serverless functions, such permissions may be difficult to establish because executions of serverless functions can occur on a dynamically selected environment without a fixed network address. The present disclosure provides for creation of user-defined connectors that facilitate routing of network traffic between executions of serverless functions and user virtualized network environments without requiring that routing occur on the bases of network addresses.
A constellation of satellites provides communication services to user terminals (UTs). Downstream data addressed to a UT is received at a point-of-presence (POP) and tokenized before sending to a satellite serving the UT. Tokens are associated with resource blocks (RBs), each RB indicative of a particular combination of downlink frequency and timeslot. Tokens are then allocated to downstream data. This tokenized downstream data is sent to the satellite. Untokenized downstream data may be buffered for later tokenization or discarded. A satellite may use information in the token to schedule transmission on a downlink to the UT. The supply of tokens may be based on shaper input data such as gateway queue depth, estimated latency from the POP to the satellite, estimated time to empty a buffer onboard the satellite, and so forth. The supply of tokens may be adjusted to minimize data loss during handovers from one satellite to another.
Disclosed herein are methods of scoring predicted immunogenicity of neoantigens from biological samples of a subject. Methods can include the steps of preparing biological samples for nucleic acid sequencing; nucleic acid sequencing; evaluating the initial sequencing results by analyzing (e.g., comparing) sequencing parameters of the results; based on an analysis (e.g., a comparison) of sequencing parameters, combining the initial sequencing results to yield union sequencing results or selecting a representative biological sample; and scoring the predicted immunogenicity of neoantigens in the biological samples based on either the union sequencing results or the sequencing results of the representative sample. Methods can further include the step of comparing sequencing parameters of union sequencing results and the initial sequencing results. Methods can further include the steps of generating a neoantigen vaccine that contains or encodes for a neoantigen scored for predicted immunogenicity and administering the neoantigen vaccine to a subject.
C12Q 1/6886 - Nucleic acid products used in the analysis of nucleic acids, e.g. primers or probes for diseases caused by alterations of genetic material for cancer
47.
SOFTWARE TESTING SERVICE WITH AUTOMATED FAILURE REPRODUCTION AND ROOT CAUSE ANALYSIS
A cloud-based software testing service orchestrates the testing of pieces of software, such as software to be deployed to a vehicle. Also, the cloud-based software testing service, in response to detecting a failure, automatically instantiates multiple virtual machines configured to emulate a testing environment for testing one or more of the pieces of software, with which the detected failure is associated. These virtual machines allow for rapid execution of multiple instances of re-testing to be performed to determine a reproducibility measure for the failure. Based on the reproducibility measure, additional re-testing may be performed. Expanded testing logs generated during the re-testing are provided to a trained machine learning model that automatically determines, for reproducible failures, a root cause of the failure.
Devices and techniques are generally described for LM-based content retrieval. First query data including a first request related to first content may be received. First action data associated with the first query data may be determined. First prompt data including a representation of the first query data and data representing the first action data may be generated. The first prompt data may instructs a first LM to recognize entities in the first query data relevant to the first action data. The first LM may determine a first recognized entity from the first request. The first recognized entity may be associated with the first content. A request to resolve the first recognized entity may be generated. A first resolved entity for the first recognized entity may be determined. The first LM may generate first instructions to perform the first action data using the first resolved entity.
Techniques for using a model to generate a response to a user input, where the response is associated with a personality determined to be relevant to the user input, are described. The system receives a user input and context data associated with the user input. Using the user input data and/or the context data, the system determines a personality (e.g., including a personality type and/or personality characteristics) relevant to the user input. The system generates a prompt instructing a model to generate a response to the user input that corresponds to the personality. The model processes the prompt to generate a response to the user input that corresponds to the personality. In some embodiments, the model generates a request for another component of the system to generate information responsive to the user input. The model may transform the responsive information into the personality-associated response.
A cloud-based software testing service orchestrates the testing of pieces of software, such as software to be deployed to a vehicle. Also, the cloud-based software testing service, in response to detecting a failure, automatically instantiates multiple virtual machines configured to emulate a testing environment for testing one or more of the pieces of software, with which the detected failure is associated. These virtual machines allow for rapid execution of multiple instances of re-testing to be performed to determine a reproducibility measure for the failure. Based on the reproducibility measure, additional re-testing may be performed. Expanded testing logs generated during the re-testing are provided to a trained machine learning model that automatically determines, for reproducible failures, a root cause of the failure.
Devices, systems, and methods for tokenizing search attributes and terms of a search query for an index-based search. A method may include receiving, by a search service of a provider network, a first search query to search a first searchable document set, the first search query including a first search term in a first language; applying a first tokenization rule to identify the first search term in the first search query; determining that the first search term is in the first language; applying a second tokenization rule to tokenize the first search term based on the first search term being in the first language; causing a launch of a search instance by a managed compute service of the provider network, the search instance to execute a search function for a keyword-based text search using the tokenized first search term.
Disclosed herein are methods of treating an individual at risk for incidence or recurrence of cancer in need thereof. Methods can include the steps of identifying an individual at risk for incidence or recurrence of cancer based on a risk stratification parameter; analyzing a biological sample from using a multi-cancer detection (MCD) test to yield an MCD test result; and based on the MCD test result and optionally the risk stratification parameter, administering a neoantigen immunogenic composition to the individual in need thereof. Methods can include the steps of sequencing and analyzing of the biological sample from the individual or a new biological sample from the individual to identify neoantigens to be included in the neoantigen immunogenic composition; and analyzing a second biological sample from the individual at risk for incidence or recurrence of cancer using a second multi-cancer detection (MCD) test to determine efficacy of the neoantigen immunogenic composition.
C12Q 1/6886 - Nucleic acid products used in the analysis of nucleic acids, e.g. primers or probes for diseases caused by alterations of genetic material for cancer
53.
METHODS FOR SELECTION AND COMBINATION OF SEQUENCING RESULTS FROM BIOLOGICAL SAMPLES FOR NEOANTIGEN SCORING
Disclosed herein are methods of scoring predicted immunogenicity of neoantigens from biological samples of a subject. Methods can include the steps of preparing biological samples for nucleic acid sequencing; nucleic acid sequencing; evaluating the initial sequencing results by analyzing (e.g., comparing) sequencing parameters of the results; based on an analysis (e.g., a comparison) of sequencing parameters, combining the initial sequencing results to yield union sequencing results or selecting a representative biological sample; and scoring the predicted immunogenicity of neoantigens in the biological samples based on either the union sequencing results or the sequencing results of the representative sample. Methods can further include the step of comparing sequencing parameters of union sequencing results and the initial sequencing results. Methods can further include the steps of generating a neoantigen vaccine that contains or encodes for a neoantigen scored for predicted immunogenicity and administering the neoantigen vaccine to a subject.
C07K 14/47 - Peptides having more than 20 amino acidsGastrinsSomatostatinsMelanotropinsDerivatives thereof from animalsPeptides having more than 20 amino acidsGastrinsSomatostatinsMelanotropinsDerivatives thereof from humans from vertebrates from mammals
54.
PERFORMANCE OF READOUT AND RESET OF FLUXONIUM QUBITS
Techniques for performing readout and reset of fluxonium qubits are disclosed. When fluxonium hardware components are coupled to a quantum metamaterial through a readout resonator, said components may be dispersively coupled such that a quantum state of the corresponding fluxonium qubit is read out through the quantum metamaterial, and then the state of the fluxonium qubit is subsequently reset in order to proceed with a quantum computation to be performed. Alternatively, when fluxonium hardware components are coupled directly to a quantum metamaterial, a quantum state of a fluxonium qubit is read out using resonance fluorescence, and then may be subsequently reset back to its ground state, also using resonance fluorescence. A width of a passband of the quantum metamaterial, along with frequencies of the control sequences used, may be tuned such that either readout or reset is selectively activated.
A service may generate keywords to produce synthetic documents, while maintaining data privacy for the original documents. A client may extract keyword sequences from locally stored documents, embed the keyword sequences into vectors, and generate a DP-KDE distribution based on the vectors. The DP-KDE distribution preserves data privacy for the original documents. The service receives the DP-KDE distribution, obtains a particular vector from the DP-KDE (e.g., based on a calculated score for the DP-KDE using random Gaussian completions), decodes the particular vector into a sequence of synthetic keywords, and uses the sequence of synthetic keywords to prompt an LLM to produce one or more synthetic documents.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Techniques for using a model to generate a response to a user input, where the response is associated with a personality determined to be relevant to the user input, are described. The system receives a user input and context data associated with the user input. Using the user input data and/or the context data, the system determines a personality (e.g., including a personality type and/or personality characteristics) relevant to the user input. The system generates a prompt instructing a model to generate a response to the user input that corresponds to the personality. The model processes the prompt to generate a response to the user input that corresponds to the personality. In some embodiments, the model generates a request for another component of the system to generate information responsive to the user input. The model may transform the responsive information into the personality-associated response.
Techniques for two-dimensional (2D) image processing to generate a three-dimensional (3D) model and determine a 2D plan are described herein. In an example, a 3D model of a room can be generated by using a video file portion of a video file as a first input to a first machine learning (ML) model. Semantic segmentation of the room can be generated by using the video file portion as a second input to a second ML model. The semantic segmentation may indicate that an object having an object type is shown in a first image frame of the video file portion. A 3D representation of the object in the 3D model can be determined. The 3D model can be corrected by setting a property of the 3D representation to a predefined value. A 2D floor plan of the room can be generated based on the corrected 3D model.
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 10/24 - Aligning, centring, orientation detection or correction of the image
G06V 10/762 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks
H04N 5/74 - Projection arrangements for image reproduction, e.g. using eidophor
58.
DYNAMIC TEXT TOKENIZATION FOR INDEX-BASED SEARCHING OF ANNOTATED DATA ASSETS USING KEYWORD-BASED TEXT SEARCHING
Devices, systems, and methods for tokenizing search attributes and terms of a search query for an index-based search. A method may include receiving, by a search service of a provider network, a first search query to search a first searchable document set, the first search query including a first search term in a first language; applying a first tokenization rule to identify the first search term in the first search query; determining that the first search term is in the first language; applying a second tokenization rule to tokenize the first search term based on the first search term being in the first language; causing a launch of a search instance by a managed compute service of the provider network, the search instance to execute a search function for a keyword-based text search using the tokenized first search term.
Verifying large language model responses involves obtaining a query and its corresponding answer from a large language model. This conversational text is then fed into a second large language model, which translates the answer into first-order logic. The verification process uses an automated theorem prover. It checks the validity of this logic translation by determining the unsatisfiability of two scenarios: one where the negation of the logic translation and domain-specific logic formulas are combined, and another where the logic translation itself is combined with these formulas. Based on this analysis, the theorem prover ascertains whether the translated answer is valid, invalid, or neither. The final step is communicating this verification status through an appropriate output medium, such as a graphical user interface, a database, or a report, providing a structured and methodical approach to assessing the accuracy and reliability of language model responses.
Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.
H04L 67/1029 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
H04L 61/2503 - Translation of Internet protocol [IP] addresses
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 101/668 - Internet protocol [IP] address subnets
61.
MULTI-TENANT RADIO-BASED APPLICATION PIPELINE PROCESSING SYSTEM
Connectivity between a radio-based application pipeline processing server and a control plane of a provider network is verified. Based on requests received at the control plane, a first isolated request handler, a second isolated request handler and an offloading manager are launched at the server. The offloading manager causes a first network function for which a request is received from the first request handler to be executed at a first network function accelerator of the server, and a second network function for which a request is received from the second request handler to be executed at a second network function accelerator of the server.
A storage object and an associated permissions record is stored at a storage server. The permissions record indicates that some storage consumers are not permitted to perform a type of I/O operation on the storage object. In response to detecting that an event of a deletion triggering type with respect to the records, a modified version of the permissions record is stored at the server, indicating that the storage consumers remain prohibited from performing the I/O operations. In response to receiving a command to perform a particular I/O at the server after the modified version has been stored, the modified version is used to process the command.
A system may provide a voice user interface (VUI) for sending a media comment (e.g., brief clips of audio data representing speech) to a media content creator such as a podcaster, talk show, music app, etc. The system can identify a destination for the media comment based on context (e.g., an identifier corresponding to media content currently or recently output by a user device) and/or via voice dialog with the user. Content creators can invite, receive, and play users' media comments on the show, thereby increasing audience engagement. A media comment may include a request for or dedication of a song, a “shout out” to another listener, a story/opinion, a question, a response to a poll, a contest entry, etc.
Techniques for two-dimensional (2D) image processing to generate a three-dimensional (3D) model and determine a 2D plan are described herein. In an example, a 3D model of a room can be generated by using a video file portion of a video file as a first input to a first machine learning (ML) model. Semantic segmentation of the room can be generated by using the video file portion as a second input to a second ML model. The semantic segmentation may indicate that an object having an object type is shown in a first image frame of the video file portion. A 3D representation of the object in the 3D model can be determined. The 3D model can be corrected by setting a property of the 3D representation to a predefined value. A 2D floor plan of the room can be generated based on the corrected 3D model..
A service may generate keywords to produce synthetic documents, while maintaining data privacy for the original documents. A client may extract keyword sequences from locally stored documents, embed the keyword sequences into vectors, and generate a DP-KDE distribution based on the vectors. The DP-KDE distribution preserves data privacy for the original documents. The service receives the DP-KDE distribution, obtains a particular vector from the DP-KDE (e.g., based on a calculated score for the DP-KDE using random Gaussian completions), decodes the particular vector into a sequence of synthetic keywords, and uses the sequence of synthetic keywords to prompt an LLM to produce one or more synthetic documents.
A constellation of satellites provides communication services to user terminals (UTs). Downstream data addressed to a UT is received at a point-of-presence (POP) and tokenized before sending to a satellite serving the UT. Tokens are associated with resource blocks (RBs), each RB indicative of a particular combination of downlink frequency and timeslot. Tokens are then allocated to downstream data. This tokenized downstream data is sent to the satellite. Untokenized downstream data may be buffered for later tokenization or discarded. A satellite may use information in the token to schedule transmission on a downlink to the UT. The supply of tokens may be based on shaper input data such as gateway queue depth, estimated latency from the POP to the satellite, estimated time to empty a buffer onboard the satellite, and so forth. The supply of tokens may be adjusted to minimize data loss during handovers from one satellite to another.
Verifying large language model responses involves obtaining a query and its corresponding answer from a large language model. This conversational text is then fed into a second large language model, which translates the answer into first-order logic. The verification process uses an automated theorem prover. It checks the validity of this logic translation by determining the unsatisfiability of two scenarios: one where the negation of the logic translation and domain-specific logic formulas are combined, and another where the logic translation itself is combined with these formulas. Based on this analysis, the theorem prover ascertains whether the translated answer is valid, invalid, or neither. The final step is communicating this verification status through an appropriate output medium, such as a graphical user interface, a database, or a report, providing a structured and methodical approach to assessing the accuracy and reliability of language model responses.
Embodiments for a standardized machine data interface protocol are described herein. A request for information about a state of a component of a machine may be received where the request is in an agnostic data format. A particular machine and a particular component of the particular machine may be determined based on the agnostic data format. A data structure of the agnostic data format for the particular machine and the particular component may be determined where the data structure is associated with the state. The state may be requested from the particular machine for the particular component using a format of the data structure. The state of the particular component may be received according to the format of the data structure. The state of the particular component may be converted from the format of the data structure to the agnostic data format of the request.
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
A clock selection circuit allows seamless switching between different clock signals in a clock distribution network. The clock selection circuit can be an Integrated Circuit (IC). The clock signals can be analyzed by a processor in communication with the IC to ensure the clock signals are validated. Analysis can include comparing time stamps between received pulses of the clock signals to determine if the clock signals are occurring at regular intervals. The processor can then assign a priority order to the clock signals and select one of the clock signals to use. An identifier associated with the selected clock signal can be programmed into the IC. The IC can then redistribute the selected clock signal to multiple other ICs in a hierarchical clock distribution network. Ultimately, the distributed clock signal can be received by server computers to ensure instances being executed have accurate and synchronized timing.
Respective delegation records indicating that a first access controller and a second access controller have been authorized to grant access to a respective set of cells of a table of a storage management service are stored. In response to receiving an access request of a data accessor, permission records indicating that the access controllers have granted permissions to the data accessor to respective subsets of the table's cells are identified. A collection of cells of the table to which the data accessor has been granted access permission is identified using the permission records, and a response to the access request is generated using the collection.
A federated permission management service provides clients with customized access to a data set using customized authorization metadata. The federated permission management service may define and apply permissions that are defined at a data lake that provides access to many different data sets from many different sources, as well as those permissions that may be defined at the source of the data set, which may be provided when performing a data sharing request. By allowing for permissions to be specified at the data lake in addition to permissions specified at a source of a data set, the permission management service can provide a fine-grained access control to specific objects of the data set, such as specific columns, specific rows, or specific cells of a database to be shared, even for those data sets in the data lake having different sources.
Systems and methods are provided for use of use of fuzzy-match-based translation suggestions to augment machine translation of input sentences or other texts. A machine translation system may use a model trained to translate a source language input to a target language output based on pseudo-randomly selected translation suggestions in the target language, while at inference time the machine translation system may use translation selections associated with source language samples that have a high degree of similarity to the source language input to be translated. To efficiently use the translation suggestions, they may be encoded in context with the source language input to be translated, and the machine translation system may use the encoded translation suggestions with to generate a translation in the target language.
Devices and techniques are generally described for sample size prediction for online activity. In various examples, first data related to a first sample of users interacting with an online service during a first time period may be received. In some cases, first key performance indicator (KPI) data related to the first sample of users' interaction with the online service may be received. A predicted sample size of users that will interact with the online service for a second time period following the first time period may be predicted. A predicted statistical power may be determined using the predicted sample size. In some examples, a minimum amount of time to route traffic to the online service may be determined based at least in part on the predicted statistical power.
Described is a system for counting stacked items using image analysis. In one implementation, an image of an inventory location with stacked items is obtained and processed to determine the number of items stacked at the inventory location. In some instances, the item closest to the camera that obtains the image may be the only item viewable in the image. Using image analysis, such as depth mapping or Histogram of Oriented Gradients (HOG) algorithms, the distance of the item from the camera and the shelf of the inventory location can be determined. Using this information, and known dimension information for the item, a count of the number of items stacked at an inventory location may be determined.
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Techniques are described for detecting a periphery of a surface based on a point set representing the surface. The surface may correspond to a display medium upon which content is projected. A shape model may be matched and aligned to a contour of the point set. A periphery or edge of the surface and corresponding display medium may be determined based on the aligned shape model.
G03B 21/00 - Projectors or projection-type viewersAccessories therefor
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
H04N 9/31 - Projection devices for colour picture display
76.
Liveness detection based on gesture validation, facial expression analysis, and concurrency validation
Techniques for liveness detection based on gesture validation, facial expression analysis, and concurrency validation. The techniques include selecting a color light pattern challenge and sending the color light pattern challenge to a personal computing device for display on a display screen of the personal computing device. A set of target images (video) is received by a liveness detection service in a provider network from the personal computing device as a response to the challenge. The liveness detection service analyzes the set of target images for macro-facial expression and micro-facial expressions. A liveness determination is made by the liveness detection service as to whether the user of the personal computing device is a live genuine user or an impersonated user based on the analysis of the macro and micro-facial expressions detected in the set of target images.
Described are implementations that facilitate group determination and association at entry into a facility so that activities of group members of the group are associated with the group and/or applied to a single account designated for the group. For example, if four individuals enter the facility together, the disclosed implementations determine whether the four individuals are to be associated as a group. If associated as a group, an account, such as an account of one of the individuals, is also determined and associated with the group. Activities, such as an item pick, performed by one of those individuals is associated with the group and if there is a fee or charge associated with the activity it is applied to the associated account.
Systems and methods develop and apply one or more extractive summarization models for locating contact center conversation details in a transcript, extracting pertinent verbiage, and, in a transformation of the communication details, automatically generating summaries at one or more levels of abstraction, the summaries in full sentences, in a manner that a contact center agent understands. The models are trained using machine learning algorithms.
Approaches are generally described for corrupted speech detection in voice-based computer interfaces. First input data including first audio data representing a user utterance may be received. First data representing the first audio data may be generated using a first encoder. First text data representing a transcription of the user utterance may be generated. Second data representing the first text data may be generated using a second encoder different from the first encoder. Third data may be generated by combining the first data and the second data. The third data may be sent to a classifier network trained to predict a relevant corruption state for speech processing inputs. The classifier network may determine that the first input data corresponds to a first corruption state.
Techniques implemented by a network-access analysis system to analyze network access controls for networks, identify traffic flows that are unobserved and unrequired, and determine proposed changes to the network access controls that restrict access from unobserved traffic flows. The system may analyze the network access controls, and determine whether unrequired traffic flows are allowed to be communicated in the network. For instance, the system may analyze network flow logs and identify observed traffic flows that are required by applications in the network, and also identify unobserved traffic flows that are permitted access to, but are not observed in, the network. The system may propose changes to the network access controls to restrict network access by these unobserved traffic flows. A network administrator can receive recommendations from the system regarding the proposed changes, and determine whether they would like to implement the proposed changes to their network access controls.
Conflicts may be detected between a generated access management policy and invoked identity and access management policies. An access management policy to be updated to provide expected results for example requests may be received. Another access management policy that would be invoked to evaluate the example access requests may be identified. A conflict between the expected results for the updates and the invoked access management policy may be determined. An indication of the conflict between the expected results of the example requests may be provided.
A camera system includes a housing and camera modules (e.g., digital cameras) that are aligned with fields of view that extend below the housing. The camera modules are provided about a perimeter of the housing and mounted to a bench within the housing. Two camera modules have axes of orientation extending below and away from a centroid of the camera system. Two camera modules have axes of orientation extending below and toward the centroid of the camera system. The housing includes inlets and outlets that enable air to flow past the camera modules and other components within the housing. Images captured by the camera modules of the camera system may be utilized for any purpose.
H04N 23/90 - Arrangement of cameras or camera modules, e.g. multiple cameras in TV studios or sports stadiums
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 23/52 - Elements optimising image sensor operation, e.g. for electromagnetic interference [EMI] protection or temperature control by heat transfer or cooling elements
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
83.
Detecting and controlling different types of Zigbee devices on different networks and channels
Technologies directed to detecting and controlling different types of ZigBee devices on different ZigBee networks reliably and efficiently. In one method of operating a first device, the method includes detecting first and second Zigbee networks. The method sends a first request to rejoin the first Zigbee network, the first request being encoded with the first network key. While rejoined as part of the first Zigbee network, the method detects a first set of devices part of the first Zigbee network. The method repeats this for a second set of devices part of the second Zigbee network. The method determines, using the device data, a subset of controllable devices located in proximity, and sends a message with the command to each in response to receiving a command. Each message is encoded with a respective network key and a respective link key specified in the device data.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
Rotatable joints may include one or more braking assemblies. The one or more braking assemblies may control a degree of movement of the rotatable joint to provide a range of damping. In some instances, the braking assemblies may include brake band(s) that tighten and loosen around a hub, or other rotatable member of the rotatable joint. The amount of braking, or tautness of the brake band(s), may be variably controlled to arrest the hub by different amounts. In some instances, the tightening of the brake band(s) around the hub may be controlled using linear actuator(s) and/or magnetic element(s). Implementing braking assemblies having controlled actuation may improve control of rotatable joints without adding cost, complexity, weight, or bulk.
B25J 19/00 - Accessories fitted to manipulators, e.g. for monitoring, for viewingSafety devices combined with or specially adapted for use in connection with manipulators
F16D 49/10 - Brakes with a braking member co-operating with the periphery of a drum, wheel-rim, or the like shaped as an encircling band extending over approximately 360° mechanically actuated
F16D 65/06 - Bands, shoes or padsPivots or supporting members therefor for externally-engaging brakes
F16D 65/28 - Actuating mechanisms for brakesMeans for initiating operation at a predetermined position arranged apart from the brake
Dynamic camera image presentation in a vehicle is described herein. In an example, a computer system presents, on a display of a vehicle, first image data generated by a camera of the vehicle. The first image data is based at least in part on a first presentation property. The computer system determines a trigger to change the first presentation property and a second presentation property associated with a type of the trigger. The computer system presents, on the display, second image data generated by the camera. The second image data is presented based at least in part on the second presentation property.
B60R 1/26 - Real-time viewing arrangements for drivers or passengers using optical image capturing systems, e.g. cameras or video systems specially adapted for use in or on vehicles for viewing an area outside the vehicle, e.g. the exterior of the vehicle with a predetermined field of view to the rear of the vehicle
B60K 35/00 - Instruments specially adapted for vehiclesArrangement of instruments in or on vehicles
B60K 35/28 - Output arrangements, i.e. from vehicle to user, associated with vehicle functions or specially adapted therefor characterised by the type of the output information, e.g. video entertainment or vehicle dynamics informationOutput arrangements, i.e. from vehicle to user, associated with vehicle functions or specially adapted therefor characterised by the purpose of the output information, e.g. for attracting the attention of the driver
B60K 35/29 - Instruments characterised by the way in which information is handled, e.g. showing information on plural displays or prioritising information according to driving conditions
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
Described are systems and methods for active weathervaning of a hybrid flight aerial vehicle, such as an unmanned aerial vehicle (UAV). Active weathervaning of the hybrid flight aerial vehicle during can be provided during vertical takeoff and landing (VTOL)/hover flight without the assistance of any low-speed wind sensors and during transitions between VTOL/hover flight and fixed-wing, wing-borne, horizontal flight. Additionally, active weathervaning can be provided during propulsion mechanism failure conditions where the aerial vehicle may be experiencing failure conditions associated with one or more propulsion mechanisms.
B64C 39/02 - Aircraft not otherwise provided for characterised by special use
B64C 29/02 - Aircraft capable of landing or taking-off vertically, e.g. vertical take-off and landing [VTOL] aircraft having its flight directional axis vertical when grounded
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
A device includes a camera and a privacy cover configured to rotate between a first position and a second position. In the first position, the camera is deactivated and the privacy cover obstructs the camera. In the second position, the camera is activated and the camera is unobstructed by the privacy cover. A first indication is visible through a portion of the privacy cover in the first position, the first indication indicating that the camera is deactivated. A second indication is visible through the portion of the privacy cover in the second position, the second indication indicating that the camera is activated.
A particular hyper-parameter combination (HPC) that was recommended for a first task is included in a collection of candidate HPCs evaluated for a second task. Hyper-parameter analysis iterations are conducted for the second task using the collection. In one of the iterations, the second task is executed using a first iteration-specific set of HPCs, including the particular HPC and one or more other members of the collection. One or more of the HPCs of the first iteration-specific set of HPCs are pruned to generate a second iteration-specific set of HPCs for a subsequent iteration. HPCs are selected for pruning based on a comparison of their results with the results obtained from the particular HPC that was recommended for the first task. A recommended HPC for the second task is identified based on results of the analysis iterations.
Systems and methods are described herein for routing data by transferring a physical storage device for at least part of a route between source and destination locations. In one example, a computing resource service provider, may receive a request to transfer data from a customer center to a data center. The service provider may determine a route, which includes one or more of a physical path or a network path, for the data loaded onto a physical storage device to reach the data center from the customer center. Determining the route may include associating respective cost values to individual physical and network paths between physical stations between the customer and end data centers, and selecting one or more of the paths to reduce a total cost of the route. Route information may then be associated with the physical storage device based on the route.
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06Q 10/047 - Optimisation of routes or paths, e.g. travelling salesman problem
G06Q 10/0835 - Relationships between shipper or supplier and carriers
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
G09F 3/20 - Casings, frames, or enclosures for labels for adjustable, removable, or interchangeable labels
This disclosure describes, in part, systems and techniques for secure storage and retrieval of items by users without requiring manual check-in and check-out procedures. The systems and techniques involve tracking locations (anonymously) of users within a facility and associating locations where the user placed items with a unique identifier. The item is secured except for access by the user as gates or panels prevent accessing items or exiting with items other than those associated with the user.
G07C 9/29 - Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G07C 9/10 - Movable barriers with registering means
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
92.
Voice controlled assistant with coaxial speaker and microphone arrangement
A voice controlled assistant has a housing to hold one or more microphones, one or more speakers, and various computing components. The housing has an elongated cylindrical body extending along a center axis between a base end and a top end. The microphone(s) are mounted in the top end and the speaker(s) are mounted proximal to the base end. The microphone(s) and speaker(s) are coaxially aligned along the center axis. The speaker(s) are oriented to output sound directionally toward the base end and opposite to the microphone(s) in the top end. The sound may then be redirected in a radial outward direction from the center axis at the base end so that the sound is output symmetric to, and equidistance from, the microphone(s).
H04R 1/32 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only
H04R 1/34 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by using a single transducer with sound reflecting, diffracting, directing or guiding means
Disclosed are various embodiments for self-service management of network address allocations using hierarchical allocation pools. A first network address pool is created for a customer of a cloud provider network. The first network address pool is divided into a second network address pool for a cloud resource of the customer. A first network address block from the second network address pool is assigned to the cloud resource.
09 - Scientific and electric apparatus and instruments
Goods & Services
(1) Recorded software and computer hardware for recording, storing, analyzing, and sharing enhanced video and images; integrated imaging hardware and software, namely, enhanced video and image systems and related functionality embedded into security and surveillance apparatuses
Changes made to a database table are accumulated, in durable storage, and snapshots of partitions of the table are obtained. For successive snapshots of a partition, the system accesses a previous snapshot, applies changes from the accumulated changes, and stores the updated snapshot to a durable data store. The accumulated changes and the successive partition snapshots are made available to restore the database to any point in time across a continuum between successive snapshots. Although each partition of the table may have a backup snapshot that was generated at a time different from when other partition snapshots were generated, changes from respective change logs may be selectively log-applied to distinct partitions of a table to generate an on-demand backup of the entire table at common point-in-time across partitions. Point-in-time restores of a table may rely upon a similar process to coalesce partition snapshots that are not aligned in time.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
97.
AUGMENTING DATASETS FOR TRAINING AUDIO GENERATION MODELS
A target voice dataset may be augmented using speech prediction. Encoder and decoder models may be trained to encode audio data into encoded speech data and convert it back to audio. The encoded units may include semantic information (e.g., phonemes and/or words) as well as feature data indicating prosody, timbre, speaker identity, speech style, emotion, etc. of speech. An acoustic/semantic language model (ASLM) may be configured to predict encoded speech data in a manner analogous to a language model predicting words; for example, based on preceding encoded speech data. The models may be used to generate synthesized speech samples having voice characteristics (e.g., feature data) similar to those of the target voice dataset. The augmented dataset may be used to train a text-to-speech (TTS) model to reproduce the target voice characteristics, and may improve performance of the TTS model over training with only the original target voice dataset.
G10L 15/02 - Feature extraction for speech recognitionSelection of recognition unit
G10L 15/16 - Speech classification or search using artificial neural networks
G10L 15/18 - Speech classification or search using natural language modelling
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
G10L 25/18 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the type of extracted parameters the extracted parameters being spectral information of each sub-band
98.
EVENT ROUTING AND ENCRYPTION IN A MULTI-TENANT PROVIDER NETWORK
In a multi-tenant network, event routing and encryption techniques involve processing events through an event bus service. When an event is received, it is evaluated against routing rules. If the event matches a rule linking to a resource in another customer account, the event data is encrypted using a key associated with that account. Finally, the encrypted event is delivered to the target resource, ensuring secure communication between different customer accounts within the network.
Techniques for tracking and maintaining queues used for executing pending quantum objects using respective quantum processing units (QPUs) are disclosed. An amount of time to execute a given quantum object depends on many factors, and a non-deterministic nature of quantum computing resources is such that, while knowing an expected wait time in a queue for access to a given QPU is useful, it is difficult to reliably determine. A quantum computing service that manages submission and execution of quantum objects to respective QPUs may apply QPU-specific machine learning models in order to predict expected wait times and provide that information to customers. By generating labeled datasets using ground truth wait times pertaining to already-executed quantum objects, respective machine learning models may be trained using a supervised learning technique, which may be a self-contained and re-occurring process.
G06N 10/80 - Quantum programming, e.g. interfaces, languages or software-development kits for creating or handling programs capable of running on quantum computersPlatforms for simulating or accessing quantum computers, e.g. cloud-based quantum computing
G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
In a multi-tenant network, event routing and encryption techniques involve processing events through an event bus service. When an event is received, it is evaluated against routing rules. If the event matches a rule linking to a resource in another customer account, the event data is encrypted using a key associated with that account. Finally, the encrypted event is delivered to the target resource, ensuring secure communication between different customer accounts within the network.