The invention relates to a method for generating an optimized sequence of several tasks to control the production of different products on a production line, including receiving input data related to the products to be produced by the production line, selecting at least one criterion in a set of predetermined criteria using the collected input data, generating a combined matrix by calculating the average of weighted criterion matrixes, applying a genetic algorithm to the combined matrix to derive a set of tasks sequences, selecting an optimized tasks sequence among the determined at least one tasks sequence, and control the production line according to the optimized tasks sequence to produce the products.
The invention relates to a method (100) for managing access to a local application located in a computer network, said method (100) comprising an authentication phase (120) comprising the following steps:
authenticating (130) said user by an IDAAS server located outside said computer network;
in the event of successful authentication, generating (132) an authentication message comprising a first list of applications authorized for said user;
transmitting (134) said authentication message to a local authentication server located in said network; and
when said local application is mentioned in said first list, transmitting (142) an authorization data item associated with said user for said application, to a reverse proxy managing the access of said user to said application.
The invention relates to a method (100) for managing access to a local application located in a computer network, said method (100) comprising an authentication phase (120) comprising the following steps:
authenticating (130) said user by an IDAAS server located outside said computer network;
in the event of successful authentication, generating (132) an authentication message comprising a first list of applications authorized for said user;
transmitting (134) said authentication message to a local authentication server located in said network; and
when said local application is mentioned in said first list, transmitting (142) an authorization data item associated with said user for said application, to a reverse proxy managing the access of said user to said application.
The invention further relates to a computer program and a system implementing such a method.
H04L 67/2895 - Traitement intermédiaire fonctionnellement situé à proximité de l'application fournisseur de données, p. ex. intermédiaire de mandataires inverses
The invention relates to a method for managing customer communications, the method being implemented by a customer communication system. The method includes, for each customer communication, generating a composition processing schema that includes attributes of a design process of a customer communication, the attributes including a composition identifier and a composition type, the composition type being chosen amongst a batch type, a real type and an interactive type. The method also includes generating a communication delivery schema that includes attributes of a delivery process of the customer communication, the attributes including a communication identifier and a delivery channel. The method also includes generating a customer schema comprising the composition identifier, the communication identifier and the attributes of a customer for whom the customer communication is destined, the attributes including a customer identifier.
The invention relates to a method (100) for characterizing cellular devices, said method comprising the following steps for each cellular device:
allocating (106) at least one dedicated communication slot each comprising a communication time and a communication frequency; and
receiving (112), by said base station at said at least one allocated communication slot, a signal emitted by said cellular device comprising an identifier of said cellular device;
The invention relates to a method (100) for characterizing cellular devices, said method comprising the following steps for each cellular device:
allocating (106) at least one dedicated communication slot each comprising a communication time and a communication frequency; and
receiving (112), by said base station at said at least one allocated communication slot, a signal emitted by said cellular device comprising an identifier of said cellular device;
said method (100) further comprising a temporal scan of said frequency range according to a scanning plan, by equipment for locating cellular devices; characterized in that it comprises synchronization (104) of said scanning plan and of each communication slot so that the locating equipment is listening for a frequency band comprising the communication frequency of said communication slot at the communication time of said communication slot. It also relates to a system and a base station comprising means configured to implement this method.
H04W 4/02 - Services utilisant des informations de localisation
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p. ex. des données de vitesse
5.
METHOD FOR PERFORMING PRIVACY-PRESERVING FEDERATED LEARNING IN THE FRAMEWORK OF RE-IDENTIFICATION
The invention concerns a method that includes a computation loop including a transmission step for computing, by a central node, an output of a current aggregated model for each image of a central dataset. The method also includes transferring, to each of n local nodes, data representative of the aggregated model; and a set of prototypes. The method also includes a training step including for each local node, training a respective local computer vision model to obtain a respective trained local model; and performing supervised training of the aggregated model, based on the central dataset, thereby obtaining a trained central model. The method also includes an aggregation step including for each local node, transferring, to the central node, corresponding local model data; and updating the aggregated model based on the local model data; and data representative of the trained central model.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
6.
METHOD OF SIMULATING EXECUTION OF A QUANTUM ALGORITHM BY USING A CLUSTER OF NON-QUANTUM COMPUTERS
A method of simulating execution of a quantum algorithm by using a cluster of non-quantum computers (100) comprises adding at least one SWAP gate before at least one remote gate in an initial quantum circuit that corresponds to the quantum algorithm, so that the remote gate becomes local gate. The invention proposes testing several combinations of SWAP gates to be added before a gate sequence portion of the initial quantum circuit, and selecting one of the tested combinations of SWAP gates that maximizes the gate number in the sequence portion. The number of SWAP gates added into the quantum circuit and a run time of the quantum algorithm using the cluster are reduced in this way.
G06N 10/80 - Programmation quantique, p. ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiquesPlate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p. ex. informatique quantique en nuage
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
G06N 10/60 - Algorithmes quantiques, p. ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
7.
DATA PROCESSING METHOD AND APPARATUSES FOR IMPLEMENTING THE SAME
A data processing method for use on a quantum computational device is proposed, which comprises, for a first n-bit element (ai)i=0, . . . , n−1 and a second n-bit element (bi)i=0, . . . , n−1 comprised in input data to be processed, performing a carry computing phase for computing a (n+1)-bit carry element (ci)i=0, . . . , n of carries for computing a sum of the first element (ai)i=0, . . . , n−1 and the second element (bi)i=0, . . . , n−1, which comprises: sequentially applying, for the sequence index i from 0 to n−1, a first Peres gate operation on and to for computing the carry bit ci of the carry element (ci)i=0, . . . , n, wherein is a result of a first controlled-NOT gate operation applied to a i-th bit bi of the second element using a i-th bit ai of the first element as control element, wherein is a result of a second controlled-NOT gate operation applied to a bit ai−1 of the first element using the i-th bit ai of the first element as control element, and wherein a−1 corresponds to c0 and is predefined.
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
8.
DATA GENERATION METHOD, ASSOCIATED COMPUTER PROGRAM AND COMPUTING DEVICE
The invention relates to a method for generating data, wherein the method is implemented by computer. The method includes implementing a 3D engine to produce metadata relating to a reference scene generated using the 3D engine, wherein the reference scene is representative of a predetermined target situation. The method also includes providing, as input to a control model coupled to a generative model, at least part of the metadata produced by the 3D engine; calculating, using the generative model, at least one synthetic image representative of the target situation, from an output of the control model and descriptive data relating to the target situation; and storing, in a data set, at least one calculated synthetic image.
INSTITUT NATIONAL POLYTECHNIQUE DE TOULOUSE (France)
UNIVERSITE de TOULOUSE (France)
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
SORBONNE UNIVERSITE (France)
Inventeur(s)
Beuzeville, Théo
Winckler, Nicolas
Buttari, Alfredo
Gratton, Serge
Mary, Theo
Abrégé
The invention relates to a computer-implemented method for training an artificial intelligence model based on a training dataset. The method includes iteratively performing a training loop for training the artificial intelligence model based on a current subset of the training dataset and on a current condition number of the artificial intelligence model, to update the artificial intelligence model.
The invention concerns a High-Performance Computer that includes a plurality of nodes. Each node waits for a first time period after sending a packet, and retransmits the packet if an acknowledgement for the packet has not been received in the first time period. Each node also periodically sends a heartbeat message to each other node having a pending transaction with the node, waits for a second time period after sending a heartbeat message, and aborts the pending transaction if an acknowledgement for the heartbeat message has not been received in the second period. When receiving a negative acknowledgement after sending a packet, the each node retransmits the packet after a third time period starting from the reception of the negative acknowledgement, waits for a fourth time period and drop a packet if the node is congested during the fourth period, and sends a negative acknowledgement message.
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04L 47/12 - Prévention de la congestionRécupération de la congestion
H04L 67/145 - Interruption ou inactivation de sessions, p. ex. fin de session contrôlée par un événement en évitant la fin de session, p. ex. maintien en vie, battements de cœur, message de reprise ou réveil pour une session inactive ou interrompue
11.
PRIVACY-PRESERVING FEDERATED LEARNING METHOD, ASSOCIATED COMPUTER PROGRAM AND FRAMEWORK
The invention concerns a method for performing privacy-preserving federated learning. The method includes training an object detection model based on a central training dataset to obtain a preliminary model; for each of N local nodes, training a respective copy of the preliminary model based on a respective private training dataset, thereby obtaining a local model; and computing an average model as an average of N intermediate models, each depending on a respective local model. The method also includes generating a central model based on the preliminary model and on an average output of the average model based on a predetermined public dataset as input; or based on the average model and a local output of each local model based on the public dataset as input.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
12.
MANAGEMENT SYSTEM FOR MANAGING DIGITAL BATTERY PASSPORTS
The invention relates to a management system for managing digital battery passports, the management system including a plurality of manufacturer modules and a distribution module. Each manufacturer module is connected to the distribution module via a manufacturer module communication link, wherein each manufacturer module includes a creation submodule that allows a battery manufacturer to create a digital battery passport for each type of electrical energy storage physical battery. The digital battery passport includes a set of information data related to the electrical energy storage physical battery, and the set of information data includes information about the manufacturer of the battery, about the composition of the battery and about the sustainability of the battery.
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
13.
MANUFACTURER MODULE FOR MANAGING DIGITAL BATTERY PASSPORTS
The invention relates to a manufacturer module for managing digital battery passports in a management system, The manufacturer module communicates with at least one battery manufacturer on a manufacturer communication link. The manufacturer module includes a creation submodule that allows a battery manufacturer to create, via the manufacturer communication link, a digital battery passport for each type of electrical energy storage physical battery. The digital battery passport includes a set of information data related to the electrical energy storage physical battery, and the set of information data includes information about a manufacturer of the battery, about a composition of the battery and about a sustainability of the battery. The manufacturer module also includes a manufacturer database said that stores the created digital battery passport.
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
14.
DISTRIBUTION MODULE FOR MANAGING DIGITAL BATTERY PASSPORTS
The invention relates to a distribution module for managing digital battery passports in a management system. The management system includes a plurality of manufacturer modules, each manufacturer module being connected to the distribution module via a manufacturer module communication link. The distribution module includes a user access submodule configured to receive a passport code sent by a user, to retrieve from the manufacturer database of one of the manufacturer modules, on the corresponding manufacturer module communication link, using the passport code, a subset of data of the digital battery passport related to the passport code that is received and to transmit the subset of data that is retrieved to the user.
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
15.
Supervision module for managing digital battery passports
The invention relates to a supervision module for managing digital battery passports in a management system. The management system includes a plurality of manufacturer modules and a distribution module, where each manufacturer module is connected to the distribution module via a manufacturer module communication link. The supervision module includes a performance submodule that generates performance evaluations on information data of the digital battery passports stored in its manufacturer database.
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
16.
CLAMP TOOL FOR INSERTING A CIRCUIT BOARD INTO A SOCKET
The invention relates to a clamp tool for inserting a circuit board into a socket. The clamp tool includes a hollow casing and a clamp mechanism. The hollow casing includes a handle and a base.
H01R 43/26 - Appareils ou procédés spécialement adaptés à la fabrication, l'assemblage, l'entretien ou la réparation de connecteurs de lignes ou de collecteurs de courant ou pour relier les conducteurs électriques pour engager ou séparer les deux pièces d'un dispositif de couplage
17.
METHOD FOR DETERMINING TENSOR PRODUCT DATA AND APPARATUS FOR IMPLEMENTING THE SAME
A computer-implemented method for processing, on a non-quantum computer, quantum data that represent one or more tensor products of a Pauli operator basis n of size n∈, wherein comprises all the possible tensor products of n matrices of the set S={I, X, Y, Z}, wherein I is a 2×2 identity matrix, and X, Y, Z are the following Pauli matrices:
A computer-implemented method for processing, on a non-quantum computer, quantum data that represent one or more tensor products of a Pauli operator basis n of size n∈, wherein comprises all the possible tensor products of n matrices of the set S={I, X, Y, Z}, wherein I is a 2×2 identity matrix, and X, Y, Z are the following Pauli matrices:
X
=
[
0
1
1
0
]
,
Y
=
[
0
-
i
i
0
]
,
and
Z
=
[
1
0
0
-
1
]
,
A computer-implemented method for processing, on a non-quantum computer, quantum data that represent one or more tensor products of a Pauli operator basis n of size n∈, wherein comprises all the possible tensor products of n matrices of the set S={I, X, Y, Z}, wherein I is a 2×2 identity matrix, and X, Y, Z are the following Pauli matrices:
X
=
[
0
1
1
0
]
,
Y
=
[
0
-
i
i
0
]
,
and
Z
=
[
1
0
0
-
1
]
,
is proposed, which comprises: generating a data tree as a data structure that represents the one or more tensor products of the Pauli operator basis n, wherein the one or more tensor products respectively correspond to one or more paths of the data tree each running from a root node of the data tree to a leaf of the data tree, and determining the one or more tensor products of the Pauli operator basis n by performing a tree exploration of the generated data tree.
One aspect of the invention relates to a high-performance computer comprising a plurality of clusters (21, 22) by an IP network (2), each cluster (21, 22) comprising:
At least one Ethernet gateway (215, 225) configured to transmit data between the cluster (21, 22) and the IP network (2) storing at least one first routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of a gateway address (215, 225) with a destination IP address comprised in the cluster (21, 22) comprising the gateway (215, 225).
A plurality of computing and/or storage nodes (N, 211, 212, 221, 222), each node (N, 211, 212, 221, 222):
being configured to run at least one instance of a high-performance computing and/or storage application,
comprising at least one network card (NIC1) implementing an Ethernet-based high-performance interconnection protocol and being configured to implement an address resolution protocol, the network card (NIC1) storing at least one second routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of an address of a gateway (215) of the first cluster (21) with the identifier of the other cluster (22) accessible from the gateway (215) of the first cluster (21).
storing at least one third routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of an identifier of an application instance with an identifier of the cluster comprising the node (N, 211, 212, 221, 222) running the application instance, with a unique network identifier of the application instance, and with an IP address of the network card (NIC1) of the node (N, 211, 212, 221, 222) running the application instance.
One aspect of the invention relates to a high-performance computer comprising a plurality of clusters (21, 22) by an IP network (2), each cluster (21, 22) comprising:
At least one Ethernet gateway (215, 225) configured to transmit data between the cluster (21, 22) and the IP network (2) storing at least one first routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of a gateway address (215, 225) with a destination IP address comprised in the cluster (21, 22) comprising the gateway (215, 225).
A plurality of computing and/or storage nodes (N, 211, 212, 221, 222), each node (N, 211, 212, 221, 222):
being configured to run at least one instance of a high-performance computing and/or storage application,
comprising at least one network card (NIC1) implementing an Ethernet-based high-performance interconnection protocol and being configured to implement an address resolution protocol, the network card (NIC1) storing at least one second routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of an address of a gateway (215) of the first cluster (21) with the identifier of the other cluster (22) accessible from the gateway (215) of the first cluster (21).
storing at least one third routing table comprising at least, for each other cluster of the plurality of clusters (21, 22), an association of an identifier of an application instance with an identifier of the cluster comprising the node (N, 211, 212, 221, 222) running the application instance, with a unique network identifier of the application instance, and with an IP address of the network card (NIC1) of the node (N, 211, 212, 221, 222) running the application instance.
At least one intra-cluster interconnection switch (214, 224) configured to connect each node (N, 211, 212, 221, 222) and the gateway (215, 225).
A computer implemented method for prefetching data related to an application executed by a node of a High-Performance Computing system while said node is running an application. The prefetching is carried out based on a call-stack and corresponding Input/Output request predicted by using a graph.
The invention relates to a method, implemented by a computer, of generating a source code that is read by a master data management application. The method includes converting a master data set into a formatted data set according to a set of conversion rules, and transcribing, according to a set of transcription rules, the formatted data set into the source code that is read by the master data management application.
The invention relates to a data management system including a storing unit and a processing unit. The storing unit includes a dataset memory that stores at least one dataset; a metadata memory that stores, for each dataset stored in the dataset memory, respective metadata; and an annotation memory that stores at least one predetermined annotation value. The processing unit, upon storing of an additional dataset in the dataset memory, determines whether the additional dataset includes dataset annotations descriptive of the data comprised in said additional dataset; performs a mapping of each dataset annotation onto the at least one predetermined annotation value; and writes, in the metadata memory, in relation to the additional dataset, metadata representative of a result of the mapping.
The invention relates to a method for automatically evaluating a candidate using a set of questions implemented by an automatic evaluation system, including a control module, a database, a user interface and a language model module. The method includes a first phase being iterative and includes, at each iteration, selecting a question, sending the selected question to the user interface, receiving a candidate's answer, requesting the language model module for an accuracy score reflecting the accuracy of the candidate's answer relatively to a model answer, and receiving the requested accuracy score. The iterative first phase is carried out until an accuracy score has been received. The method also includes a second phase that includes computing an evaluation score of the candidate using the received accuracy scores.
A method for anomaly detection within a dataset X of N data points is implemented on a quantum annealing device including a plurality M of qubits, with M≥N. A cost function to be minimized is defined as:
A method for anomaly detection within a dataset X of N data points is implemented on a quantum annealing device including a plurality M of qubits, with M≥N. A cost function to be minimized is defined as:
q
(
x
,
α
)
=
-
α
∑
i
=
0
N
-
1
d
i
x
i
±
(
1
-
α
)
∑
i
,
j
=
0
,
i
≠
j
N
-
1
d
i
,
j
x
i
x
j
A method for anomaly detection within a dataset X of N data points is implemented on a quantum annealing device including a plurality M of qubits, with M≥N. A cost function to be minimized is defined as:
q
(
x
,
α
)
=
-
α
∑
i
=
0
N
-
1
d
i
x
i
±
(
1
-
α
)
∑
i
,
j
=
0
,
i
≠
j
N
-
1
d
i
,
j
x
i
x
j
where di is a distance between a point xi∈X and a centroid of the dataset distribution, di,j is a distance between two data points xi, xj∈X with i≠j, α∈ is a weighting parameter, and xi, xj={0, 1}. If a qubit can interact with a maximum determined number of different qubits, applying the cost function q(x, α) to the plurality of qubits comprises limiting a number of quadratic terms for each variable xi to a value k smaller than or equal to the maximum determined number of interactions between qubits within the quantum annealing device. An assignment of binary values to the variables in the dataset that minimizes the cost function is calculated, and the k variables in the dataset associated with qubits of value 1 are detected as anomalies.
G06N 10/70 - Correction, détection ou prévention d’erreur quantique, p. ex. codes de surface ou distillation d’état magique
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
G06N 10/60 - Algorithmes quantiques, p. ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard
24.
METHOD AND SYSTEM FOR AUTHENTICATING A USER TO ACCESS A WEB APPLICATION HOSTED ON AN APPLICATION SERVER
The invention relates to a method (100) for authenticating a user to access a web application, comprising:
reception, by an application server, of an access request;
redirection (114) to an IDAAS authentication server;
authentication (126) of said user with a social authentication server selected from said IDAAS server,
reception (128) by said IDAAS server of said user's personal data,
verification (132) of personal data, and
when the personal data satisfies at least one web application access rule, transmission (136) of a proof of authentication authorizing said user to access said web application.
The invention relates to a method (100) for authenticating a user to access a web application, comprising:
reception, by an application server, of an access request;
redirection (114) to an IDAAS authentication server;
authentication (126) of said user with a social authentication server selected from said IDAAS server,
reception (128) by said IDAAS server of said user's personal data,
verification (132) of personal data, and
when the personal data satisfies at least one web application access rule, transmission (136) of a proof of authentication authorizing said user to access said web application.
It also relates to a computer program and an authentication system implementing such a method.
The invention relates to a data management system that includes a blockchain network, at least one off-chain storage unit and a blockchain orchestrator. The blockchain network stores, for each digital asset, a respective non-fungible token including a corresponding public dataset and, for each corresponding private dataset, a corresponding fingerprint; and for each corresponding private dataset, authorization information indicative of at least one authorized member authorized to access the private dataset. The at least one off-chain storage unit, distinct from the blockchain network, stores at least one respective private dataset. The a blockchain orchestrator, for each digital asset, checks a compliance of each corresponding private dataset stored in each off-chain storage unit with the corresponding fingerprint stored in the respective non-fungible token; and for each member, grants access to the public dataset and/or to at least one private dataset, based on the authorization information stored in the blockchain network.
The invention relates to a method for pooling and analyzing datasets from data providers. The method includes, at the level of each data provider, for each dataset, a first encryption of each variable of the dataset with a first encryption key common to all data providers, and a second encryption of at least each variable of the dataset with a second encryption key specific to the each data provider and shared with an intermediary. The method also includes, at the level of the intermediary, for each encrypted dataset, decryption of the variables with the second encryption key, and a third encryption of each confidential variable with a third encryption key. The method also includes transmission of the datasets encrypted with the third encryption key to an analysis environment for analysis. It also relates to a computer program and a system for implementing such a method.
method for processing a computer job to be executed on a hybrid computer configured with processing resources comprising one or more central processing unit, CPU, processing resources and at least one quantum processing unit, QPU, processing resources, the method comprising, wherein the computer job comprises a quantum computation part to be executed on the at least one QPU processing resources: Processing the computer job by a first scheduler of the hybrid computer, which comprises: Upon receiving a request for quantum processing resources for execution of the computer job, offloading the scheduling of a portion of the computer job comprising the quantum computing part on processing resources of the hybrid computer to a second scheduler of the hybrid computer; and receiving, by the first scheduler, status data regarding execution of the portion of the computer job comprising the quantum computing part.
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
G06N 10/80 - Programmation quantique, p. ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiquesPlate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p. ex. informatique quantique en nuage
28.
PRIVACY-PRESERVING FEDERATED LEARNING METHOD, ASSOCIATED COMPUTER PROGRAM AND FRAMEWORK
The invention relates to a federated learning method including storing, in a central node and in N local nodes, an intermediate model obtained by training an object detection model based on a central training dataset; for each local node, obtaining a local model by training the intermediate model based on a private training dataset; for each image of a public dataset, and for each local model, determining a prediction vector and an attention map; for each image of the public dataset, generating an aggregated set of outputs from the prediction vectors, and an aggregated attention map from the attention maps; and obtaining a central model by modifying parameters of the intermediate model stored in the central node to minimize a difference between the aggregated set of outputs and an output of the intermediate model based on the public dataset as input.
The invention relates to a software-defined radio (200) comprising:
at least one processor (104) producing a digital signal,
a digital-to-analog converter, DAC (106), to convert said digital signal into an analog signal,
a physical interface (110) between the processor (104) and the DAC, and
a radio-frequency power amplifier (108) to amplify the power of said analog signal;
said software-defined radio (200) further comprising, arranged in said physical interface (110), a unit (202) for protecting said power amplifier (108) depending on:
the average power, over a predefined reference period, of the digital signal received by said physical interface (110),
a predefined power threshold not to be exceeded during said period.
The invention relates to a software-defined radio (200) comprising:
at least one processor (104) producing a digital signal,
a digital-to-analog converter, DAC (106), to convert said digital signal into an analog signal,
a physical interface (110) between the processor (104) and the DAC, and
a radio-frequency power amplifier (108) to amplify the power of said analog signal;
said software-defined radio (200) further comprising, arranged in said physical interface (110), a unit (202) for protecting said power amplifier (108) depending on:
the average power, over a predefined reference period, of the digital signal received by said physical interface (110),
a predefined power threshold not to be exceeded during said period.
It also relates to an electronic device comprising such a digital radio and a method of protecting a software-defined radio.
H03F 3/24 - Amplificateurs de puissance, p. ex. amplificateurs de classe B, amplificateur de classe C d'étages transmetteurs de sortie
H04B 1/00 - Détails des systèmes de transmission, non couverts par l'un des groupes Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission
The invention relates to a method for determining an environmental impact of a product, including obtaining a list of components of the product, for each component, requesting a list of materials from a life cycle inventory database, generating a request comprising the list of materials that is obtained for selecting a most suitable material for the product, sending the request to a language model module, receiving a name of the most suitable material for the product, for each name of each material of each component, requesting the life cycle inventory database to send at least one environmental impact value, receiving the at least one environmental impact value for each name of each material of each component, and calculating a total environmental impact of the product using the at least one environmental impact value that is received for each component and their respective mass in the product.
A computer-implemented method for generating a program to be executed using a quantum computer for producing as output a target quantum state based on an initial quantum state used as input is proposed, which comprises: determining an approximated quantum state which is an approximation of the target quantum state; determining a quantum circuit which, based on the initial quantum state received used as input, produces as output an output quantum state that corresponds to the approximated quantum state; and generating the program based on the determined circuit.
The invention relates to a method for allowing at least one virtual reality device to access a data platform of a three-dimensional content system, said method comprising in particular the steps of receiving a cryptographic footprint on a control communication link (CCL), receiving a cryptographic footprint of an application stored on the at least one virtual reality device sent by said at least one virtual reality device on a access communication link (ACL), comparing both received cryptographic footprints, sending a network address of a selected application environment and authentication data to the virtual reality device on the access communication link (ACL), creating, by the at least one virtual reality device, a secured communication between said at least one virtual reality device and the selected application environment.
The invention relates to a method for replacing liquid in a liquid cooling circuit in a supercomputer rack, including a main pump and a reserve pump, using a maintenance unit. The method includes disconnecting the reserve pump, connecting the upstream reservoir to the reserve pump, connecting the downstream reservoir, stopping the main pump, activating the reserve pump, stopping the reserve pump once the upstream reservoir is below a predetermined low threshold, disconnecting the upstream reservoir from the reserve pump, disconnecting the reserve pump from the downstream reservoir, connecting the inlet supply pipe to the reserve pump in order to return said reserve pump to its initial configuration and reactivating the main pump.
The invention relates to an electronic board (200) comprising:
a support (102),
at least one electronic component (104) mounted on said support (102),
a protective layer (110), mounted on said support (102), covering said electronic component (104) at a non-zero distance from said electronic component (104), and
a heat dissipation device for said electronic component (104) comprising a metal thermal connecting part (202) screwed into said protective layer (110), passing through said protective layer (110) and coming into contact with said electronic component (104), so as to create a thermal connection between said electronic component (104) and said protective layer (110).
The invention relates to an electronic board (200) comprising:
a support (102),
at least one electronic component (104) mounted on said support (102),
a protective layer (110), mounted on said support (102), covering said electronic component (104) at a non-zero distance from said electronic component (104), and
a heat dissipation device for said electronic component (104) comprising a metal thermal connecting part (202) screwed into said protective layer (110), passing through said protective layer (110) and coming into contact with said electronic component (104), so as to create a thermal connection between said electronic component (104) and said protective layer (110).
It also relates to an electronic apparatus comprising such an electronic board.
Method for determining a lower bound of a fidelity of an approximated final state, comprising:
receiving an initial state in a matrix product representation;
receiving a quantum circuit comprising gates;
iterating over the gates:
applying a current gate to the initial state;
if the current gate is a two-qubit gate, factorizing a portion of the updated state by SVD into a product of a unitary matrix, a diagonal matrix, and a unitary matrix;
if a bond dimension of the diagonal matrix exceeds a threshold: truncating the diagonal matrix such that the bond dimension does not exceed said threshold, and determining a truncation fidelity;
in a next iteration, using the updated state as the initial state;
determining a lower bound of the fidelity of the approximated final state as a product of the truncation fidelities.
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
METHOD FOR DETERMINING AN APPROXIMATED FINAL QUANTUM STATE SUCH THAT A FIDELITY OF THE APPROXIMATED FINAL QUANTUM STATE IS EQUAL TO OR GREATER THAN A LOWER BOUND
Method for determining an approximated final state having a fidelity above a bound, comprising:
receiving an initial state;
receiving a quantum circuit comprising gates;
defining a lower bound of the fidelity;
iterating over the gates:
applying a current gate to the initial state;
if the current gate is a two-qubit gate, factorizing a portion of the updated state by SVD into a product of a unitary matrix, a diagonal matrix, and a unitary matrix;
truncating the bond dimension of the diagonal matrix to a target bond dimension such that a product of a truncation fidelity of the truncated matrix, truncation fidelities of previously truncated matrices and future target truncation fidelities is greater than the bound;
in a next iteration, using the updated state as initial state;
defining an approximated final state equal to the updated state of a last iteration.
A method for manufacturing a series of parts using a manufacturing machine of a production line and a supervision device configured for controlling in real time the manufacturing machine taking into account quality data, carbon footprint and cost. The method includes receiving real time data from the production line, running a first prediction algorithm to predict quality data on the series of parts in real time, running a second prediction algorithm to predict a carbon footprint of the series of parts in real time, running a third prediction algorithm to predict the cost of the series of parts in real time, determining a set of scenarios based on the predicted carbon footprint and the predicted cost, selecting at least one scenario in the set of scenarios based on the predicted carbon footprint and/or the predicted cost, manufacturing the series of parts according to the selected scenario.
G05B 19/418 - Commande totale d'usine, c.-à-d. commande centralisée de plusieurs machines, p. ex. commande numérique directe ou distribuée [DNC], systèmes d'ateliers flexibles [FMS], systèmes de fabrication intégrés [IMS], productique [CIM]
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
A system that includes an originating node and a receiving node. The originating node includes a client configured to launch a proxy server program on the receiving node and to transmit a command from the SSH client to the proxy server. The receiving node includes a server program between the proxy and the SSH server configured to receive the command transmitted by the client, and to transmit the command to the SSH server. The client and the server program are configured to store data to be exchanged and to detect a loss of connection between the originating node and the receiving node. When detecting a loss of connection, launch, by the client program, a new proxy server on the receiving node configured to connect to the server program using the same session identifier as before.
The invention relates to a method for determining a future health condition of an individual. The method including providing health data of the individual, obtaining a health condition information from the health data of the individual, encoding the health data and the health condition information of the individual in a low-dimensional vector that includes the health data and the health condition information of the individual, obtaining a trained neural network taking as input a low-dimensional vector of the individual and configured to determine a future health condition of the individual, and determining a future health condition of the individual by inputting the health condition information of the individual to the trained neural network. The invention also relates to a system configured to carry out the method.
G16H 15/00 - TIC spécialement adaptées aux rapports médicaux, p. ex. leur création ou leur transmission
G16H 10/20 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des essais ou des questionnaires cliniques électroniques
G16H 10/60 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des données spécifiques de patients, p. ex. pour des dossiers électroniques de patients
G16H 20/00 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients
G16H 40/20 - TIC spécialement adaptées à la gestion ou à l’administration de ressources ou d’établissements de santéTIC spécialement adaptées à la gestion ou au fonctionnement d’équipement ou de dispositifs médicaux pour la gestion ou l’administration de ressources ou d’établissements de soins de santé, p. ex. pour la gestion du personnel hospitalier ou de salles d’opération
G16H 50/30 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le calcul des indices de santéTIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour l’évaluation des risques pour la santé d’une personne
G16H 50/70 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour extraire des données médicales, p. ex. pour analyser les cas antérieurs d’autres patients
40.
Method for transforming a quantum circuit while minimizing the CNOT-cost
The disclosure refers to method for converting an input quantum circuit comprising gates into an output quantum circuit compliant with execution constraints, comprising: determining if a front layer comprises single-qubit gates, and updating the front layer; reiterating the determining step as long as the front layer comprises single-qubit gates; identifying in the front layer a quantum gate that does not satisfy execution constraints; determining a pattern such that the gate satisfies the execution constraints when applying the adjoint pattern to the gate; adding the pattern to the output quantum circuit, and applying the a joint pattern to the gate; and reiterating these steps until each quantum gate in the input quantum circuit satisfies the execution constraints; wherein each pattern is determined in such a way that a number of CNOT-gates comprised by at least one pattern is minimized.
G06N 10/20 - Modèles d’informatique quantique, p. ex. circuits quantiques ou ordinateurs quantiques universels
B82Y 10/00 - Nanotechnologie pour le traitement, le stockage ou la transmission d’informations, p. ex. calcul quantique ou logique à un électron
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p. ex. couplage ou commande de qubit
41.
METHOD FOR COMPILING A PROGRAM FOR QUANTUM COMPUTER
A computer-implemented method for compiling a program to be executed using a quantum computer combines final Clifford stripping and initial Clifford stripping. The method allows reducing a performance cost of the program, in particular reducing a number of entangling gates that are used within the quantum computer. A rate of errors in the execution of the program can thus be reduced. The method can be implemented for calculating an observable value or for sampling a bit string.
G06N 10/80 - Programmation quantique, p. ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiquesPlate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p. ex. informatique quantique en nuage
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
User authentication services using technology for e-commerce
transactions; computer monitoring of personally identifying
information to detect identity theft via the Internet; user
authentication services using single sign-on technology for
online software applications; Access control as a service
(ACaaS).
43.
METHOD AND SYSTEM FOR RELEASING RESOURCES OF HIGH-PERFORMANCE COMPUTATION SYSTEM
A method for releasing resources in a high-performance computer, the high-performance computer including at least one node, wherein each node includes at least one resource and is associated with at least one metric, each metric taking values within a range of values divided into a plurality of sub-ranges of values. The method includes, for each node including a resource allocated to the job, for each metric associated with the node, obtaining a set of samples; and counting, for each sub-range of values the number of samples whose values are comprised within said sub-range of values, in order to obtain a plurality of counted numbers. The method includes, determining, using at least one machine learning model, from the plurality of counted numbers, whether the job is active or inactive. If the job is inactive, emitting a termination command to terminate the job and release each resource allocated to the job.
Centre national de la recherche scientifique (France)
UNIVERSITE PARIS-SACLAY (France)
Inventeur(s)
Mottier, Manon
Pascal, Frédéric
Chardon, Gilles
Abrégé
The invention relates to a computer-implemented method for identifying a radar transmitter from a set of corresponding received pulses, each pulse being associated with a respective time of arrival. The method includes determining an observed signature of the radar transmitter based on a distribution of the time gaps between consecutive times of arrival. For each transmitter class among a plurality of predetermined transmitter classes, each transmitter class being associated with at least one expected signature, the method includes calculating a proximity score between the observed signature and each expected signature associated with said transmitter class. Each expected signature is a function of an expected distribution of the time gaps between consecutive times of transmission for said transmitter class, and for a predetermined pulse loss rate. The method also includes assigning the radar transmitter to the transmitter class associated with the expected signature that provides the best proximity score.
The invention relates to a method (100) for deploying a software as a service, SaaS, application, in particular an authentication as a service, IDaaS, application, said method (100) comprising the following steps:
deploying (104) a load distribution module, provided for receiving the connections to said application, and distributing said connections within a group of application nodes, each executing an instance of said application and being provided to perform at least one connection to said application, and
deploying (106) at least one master application node;
said method (100) further comprising at least one iteration of a step (130; 152) of adjusting, by a master application node, the number of application nodes in said group based on an index, called the load index, representative of the total load of the application nodes of said group.
The invention relates to a method (100) for deploying a software as a service, SaaS, application, in particular an authentication as a service, IDaaS, application, said method (100) comprising the following steps:
deploying (104) a load distribution module, provided for receiving the connections to said application, and distributing said connections within a group of application nodes, each executing an instance of said application and being provided to perform at least one connection to said application, and
deploying (106) at least one master application node;
said method (100) further comprising at least one iteration of a step (130; 152) of adjusting, by a master application node, the number of application nodes in said group based on an index, called the load index, representative of the total load of the application nodes of said group.
The invention also relates to a computer program and a system implementing such a method.
H04L 67/1001 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour accéder à un serveur parmi une pluralité de serveurs répliqués
The invention relates to a computer-implemented surveillance method for surveilling an area of interest using a set of drones, the surveillance method including monitoring a number of operational drones among the set of drones. If a change in the number of operational drones is detected, performing a segmentation step for segmenting the area of interest into N sub-areas, N being the current number of operational drones; and performing an affectation step for affecting each operational drone to a respective sub-area for surveilling said sub-area.
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
G06V 10/762 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant le regroupement, p. ex. de visages similaires sur les réseaux sociaux
G06V 20/17 - Scènes terrestres transmises par des avions ou des drones
47.
METHOD AND SYSTEM TO MONITOR THE OPERATION OF AN APPLICATION
The invention relates to a method for monitoring the operation of an application, including acquiring data that has a plurality of key performance indicators related to the current operation of the application; determining, based on the acquired data, forecasted data that includes a plurality of key performance indicators related to a future operation of the application; automatically scheduling a monitoring session targeting at least one component of the application corresponding to a group of key performance indicators, the group of key performance indicators including each key performance indicator of the forecasted data having a value moving away from a corresponding predefined value range being associated with a normal operation of the application; obtaining, from a user, using a conversational agent, information related to an anomalous behavior of the application; and modifying the scheduled monitoring session based on the obtained information.
A method for optimizing the detection of target cases in an imbalanced dataset, including generating a series of training datasets wherein the first training dataset includes an equal ratio of non-target cases and target cases and wherein the following training datasets of the series comprise a ratio of non-target to target cases that increases for each consecutive training dataset of the series. The method also includes training the machine learning model using the machine learning algorithm on each generated training datasets of the series of training datasets and recording the obtained performance score at each iteration, determining the maximum performance score among the recorded performance scores, determining the ratio of target to non-target cases for the determined maximum performance score, and training the machine learning model using the machine learning algorithm on a training dataset having the determined ratio of target to non-target cases to obtain an optimized model.
The invention relates to a method for migrating a customer communication document from a first customer communication management platform to a second customer communication management platform. The method automates or at least semi-automates the migration of documents between customer communication management platforms by automating the generation of an intermediate document. The method automatically detects the dynamic information and the static information displayed on a set of documents, which is a crucial point to generate the intermediate documents.
The invention relates to a method for adapting an artificial neural network (ANN) model, previously trained for person re-identification on a source domain, on a target domain. The method includes several iterations of an adaptation phase including constructing a support set, by selecting from images of the source domain similar to images in a new set of images received from the target domain. The method also includes several iterations of a training step including determining a re-id cost on the new set of images; determining a Knowledge Distillation cost, with respect to a teacher model, on a support set constructed during a previous iteration of the adaptation phase, updating the ANN model; and updating the teacher model. The invention further relates to a computer program and a device configured to carry out such a method, and to an artificial neural network trained with such a method.
G06V 10/774 - Génération d'ensembles de motifs de formationTraitement des caractéristiques d’images ou de vidéos dans les espaces de caractéristiquesDispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p. ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]Séparation aveugle de source méthodes de Bootstrap, p. ex. "bagging” ou “boosting”
G06V 10/74 - Appariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques
G06V 10/762 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant le regroupement, p. ex. de visages similaires sur les réseaux sociaux
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 40/10 - Corps d’êtres humains ou d’animaux, p. ex. occupants de véhicules automobiles ou piétonsParties du corps, p. ex. mains
51.
METHOD FOR CARRYING OUT A COMPUTING JOB ON A HIGH PERFORMANCE COMPUTING (HPC) MACHINE AND HPC MACHINE FOR CARRYING OUT SUCH A METHOD
The invention relates to a method for carrying out a computing job for a client on a High Performance Computing (HPC) machine. The method includes selecting, in the HPC machine, the resources for carrying out the computing job, wherein the resources form a compute environment that includes one or several computing nodes. The method also includes performing the computing job in the compute environment; and before performing the computing job, isolating the compute environment from the rest of the HPC machine so that interaction with the compute environment is restricted to the client. It also relates to an HPC machine that carries out the method.
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
User authentication services using technology for e-commerce transactions; Computerised monitoring of personally identifying information to detect identity theft, Via the internet; User authentication services using single sign-on technology for online software applications; Access Control as a Service (ACaaS).
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
User authentication services using technology for e-commerce transactions; computer monitoring of personally identifying information to detect identity theft via the Internet; user authentication services using single sign-on technology for online software applications; Access control as a service (ACaaS) namely, providing non-downloadable software for accessing and using a cloud computing network, for use in computer access control, namely, for imposing access restrictions for authorizing access to cloud computing systems and quantum computing systems, for remote control access of networks and backing up and storing of data, and for enforcing and restricting privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
54.
METHOD FOR COMMUNICATING MESSAGES BETWEEN A PLURALITY OF PIECES OF USER EQUIPMENT
The invention relates to a method for communicating messages between a plurality of pieces of user equipment of a set of user equipment via a communication network. The method includes, when a transmitter determines that a last payload message of a series received by a receiver, for which all payload messages preceding it in the series have also been received, is different from the last payload message of the series, rebroadcasting by the sender of the payload messages of the series following the last payload message received by the receiver.
The invention relates to a method for communicating messages between a plurality of pieces of user equipment of a set of user equipment via a communication network. The method includes, for each receiver having determined a recipient status of a series of payload messages sent, sending to the sender by the receiver, an acknowledgment message including receive information for each payload message of the series received. In the absence of receipt of an acknowledgment message by the recipient or upon receipt of an acknowledgment message that does not include receive information for each payload message of the series, and after receipt of a status message from the recipient indicating its connection to the communication network, the method includes retransmission by the sender of each payload message not received.
H04W 4/06 - Répartition sélective de services de diffusion, p. ex. service de diffusion/multidiffusion multimédiaServices à des groupes d’utilisateursServices d’appel sélectif unidirectionnel
H04L 1/1829 - Dispositions spécialement adaptées au point de réception
56.
ELECTRONIC CIRCUIT AND CORRESPONDING PROTECTION METHOD
The invention relates to an electronic circuit comprising a substrate and at least one electronic component (3, 6),
each electronic component (3, 6) including at least one data port (12) for receiving data,
the electronic circuit (2) further comprising, for each data port (12):
a current injection terminal (8);
a breakable electrical trace (10) located in the thickness of the substrate and extending between the data port (12) and the injection terminal (8),
each breakable electrical trace (10) comprising a fusible segment (20) and being configured to break, by melting of the fusible segment (20), upon the injection, at the injection terminal (8), of an electric current (I) having an intensity greater than a predetermined trace breaking threshold.
The invention relates to a method of predicting a trajectory of a given satellite, including training a machine learning algorithm to predict the trajectory of the given satellite from a data set of given satellite, the algorithm being encoded in a programming language; integrating the trained algorithm, on an integrated circuit, by converting the programming language into a hardware description language; and predicting the trajectory of the given satellite given by the integrated algorithm, from a data set of the given satellite. The training and integrating are performed on the ground on a computer comprising at least one processor and the predicting is performed on board the given satellite embarking the integrated circuit.
Centre national de la recherche scientifique (France)
UNIVERSITE PARIS-SACLAY (France)
Inventeur(s)
Mottier, Manon
Pascal, Frédéric
Chardon, Gilles
Abrégé
A method for deinterleaving radar pulses, implemented by a computer. The method includes implementing a first clustering algorithm for assigning each pulse to a corresponding first class, based on the associated frequency, duration and time of arrival. The method also includes, for each first class, the method includes estimating a respective average frequency and average pulse duration, and implementing a second clustering algorithm to group the first classes into second classes based on the corresponding average frequency and average duration. For each second class, the method includes determining a distribution of the times of arrival of the associated pulses. The method also includes implementing a third clustering algorithm for grouping together the second classes into third classes, based on optimal transport distances between the corresponding determined distributions of the times of arrival.
The invention relates to an access management method comprising, in response to a request to access a local application (23) hosted on a second network (10):
if the second network (10) is connected to a first network (8):
receiving the access request by a master module (4) connected to the first network (8);
determining, by the master module (4), access confirmation or denial data for access to the local application; and
transmitting the determined access confirmation or denial data from the master module to the local application (23)
otherwise:
receiving the access request by a satellite module (6) connected to the second network (10);
determining, by the master module (6), access confirmation or denial data for access to the local application (23); and
transmitting the determined access confirmation or denial data from the satellite module to the local application (23).
Method for controlling data quality assurance after a migration between a source repository, which includes source data associated with a source data structure, and a target repository, which includes target data associated with a target data structure, according to migration rules. The target data is organized as a set of elements. The method includes simulating the migration by applying migration rules to source data so as to output simulated data according to the target data structure, where the simulated data is organized as a set of elements. The method includes merging the simulated data and the target data by excluding identical elements, to form an input vector for a machine learning algorithm. The method includes applying the machine learning algorithm for pairing elements of the input vector according to a similarity score and determining a discrepancies indicator according to the similarity score for each element of the input vector.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
61.
METHOD AND SYSTEM FOR AUTHENTICATING A USER WITH AN AUTHENTICATION SERVER
The invention relates to a method (200) for authenticating a user in a first device comprising the following steps:
sending (212), by an authentication client of said first device or said application, to an authentication server (308), an authentication request,
in response to said authentication request, sending (216) by the authentication server (308) a first message comprising an authentication URL and a transaction identifier,
opening (218) said URL in a web browser running on a second user device (310), previously enrolled with said authentication server (308),
verifying (222) the identity of said user by said second user device (310), and
when said verification is successful, providing (224) by said second user device (310) to said authentication server (308), a proof of enrollment stored in said second device (310) during the enrollment of said second device (310), in order to authenticate said user.
The invention relates to a method (200) for authenticating a user in a first device comprising the following steps:
sending (212), by an authentication client of said first device or said application, to an authentication server (308), an authentication request,
in response to said authentication request, sending (216) by the authentication server (308) a first message comprising an authentication URL and a transaction identifier,
opening (218) said URL in a web browser running on a second user device (310), previously enrolled with said authentication server (308),
verifying (222) the identity of said user by said second user device (310), and
when said verification is successful, providing (224) by said second user device (310) to said authentication server (308), a proof of enrollment stored in said second device (310) during the enrollment of said second device (310), in order to authenticate said user.
The invention also relates to a computer program and a system implementing such a method.
An extension for a supercomputer rack, the extension including a reinforcement frame, defining a rectangular through-opening, and at least one fluidic connection support mounted to the reinforcement frame. The at least one fluidic connection support includes an upstream circuit, configured to convey a refrigerant liquid to a plurality of connectors configured to be each connected via a cold flexible manifold to a cooling circuit of a compute blade of a server, and a downstream circuit, configured to collect the heated refrigerant liquid having passed through a compute blade of a server via a hot flexible manifold and a plurality of collection connectors. The extension is configured to be positioned at a rear end of the rack.
A computer implemented method for managing fuel stocks of at least one gas station including a fuel tank. The method includes, for each gas station, calculating an expected stock-out time, including predicting forecast fuel sales from a current starting date, determining a current net available stock based on a fuel stock in the fuel tank, based on the net available stock and the forecast fuel sales, calculating the expected stock-out time as the date at which the cumulated forecast fuel sales, from the current starting date, exceed the net available stock. The method also includes, for each gas station, predicting a lead duration, as a duration between a generation of a fuel purchase order and a corresponding fuel delivery at said gas station; and, for each gas station, generating a supply instruction based on the calculated expected stock-out time and the corresponding predicted lead duration.
A method for calculating, using a non-quantum computer, a value of an observable sampled out of a quantum state is over-optimized for reducing memory size and calculation time. It may be useful for emulating a quantum circuit that produces the quantum state. The method uses implementations of Pauli rotations and Pauli operators that are simple and cheap, based on coordinate-switching operations.
G06N 10/80 - Programmation quantique, p. ex. interfaces, langages ou boîtes à outils de développement logiciel pour la création ou la manipulation de programmes capables de fonctionner sur des ordinateurs quantiquesPlate-formes pour la simulation ou l’accès aux ordinateurs quantiques, p. ex. informatique quantique en nuage
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
65.
MEMORY MANAGEMENT IN A COMPUTER SYSTEM CONFIGURED FOR GENERATING A SIGNATURE AND APPARATUS FOR IMPLEMENTING THE SAME
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventeur(s)
Marcatel, Etienne
Lebret, Kevin
Elbaz-Vincent, Philippe
Abrégé
A computer-implemented method for memory management in a computer system configured for generating a signature of a binary data message m using a key B of a predetermined lattice-based structure is proposed, which comprises: determining coefficients of a 2×2 signature generation matrix SG, wherein the non-diagonal coefficients of the signature generation matrix SG are complex polynomials with a non-zero imaginary part, and the diagonal coefficients of the signature generation matrix SG are real polynomials; and determining a LDL representation of the signature generation matrix SG according to which SG is represented by a matrix product L.D.L*, wherein L is a 2×2 lower triangular matrix with ones on the diagonal, D is a 2×2 diagonal matrix, and L* is the adjoint of L; wherein the storing in a memory buffer of the computer system of the coefficients of the signature generation matrix SG and the coefficients of the matrices of the LDL representation is managed based on that the signature generation matrix SG has real diagonal coefficients, and the memory buffer is used alternatively to store the coefficients of the signature generation matrix SG or the coefficients of the matrix D of the LDL representation.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
66.
METHOD FOR CREATING A TRUSTED MAP OF VERIFIED SECURE NODES FOR A NETWORK OF NODES IN A QUANTUM INTERNET
Method for providing a ledger of verified nodes for a network of nodes in a quantum internet, comprising:
/a/ sending (101), by a central node (N-CH), first qubits (qb1) to a first node (N-U1) and second qubits (qb2) to a second node (N-U2), wherein each first qubit (qb1) is entangled with a second qubit (qb2);
/b/ sending (102), by the central node (N-CH), digital coins to each first node (N-U1) and each second node (N-U2);
/c/ saving (103) to a ledger: information regarding identities of the first, second and central nodes (N-U1, N-U2, N-CH), and information regarding a comparison of first information determined from the first qubits (qb1) to second information determined from the second qubits (qb2); and
/d/ if the first information corresponds to the second information, sending (105), by the first and second nodes (N-U1, N-U2), said digital coins back to the central node (N-CH).
Le Commissariat à l’énergie atomique et aux énergies alternatives (CEA) (France)
Inventeur(s)
Lamy, Pierre
Berquier, Romain
Abrégé
A liquid-cooled heat sink for a plurality of compute blade connectors, including an elongated shaped body defining on one of its faces a heat collection surface of the plurality of connectors. The heat collection surface includes a plurality of interfacing zones arranged consecutively along the heat collection surface, wherein each interfacing zone is configured to interface with a connector of the plurality of connectors in order to collect the heat, and wherein the heat sink includes at least one stiffener mounted on the body.
Le Commissariat à l’énergie atomique et aux énergies alternatives (CEA) (France)
Inventeur(s)
Raeth, Marc
Demange, Fabien
Abrégé
Cold plate for a supercomputer compute blade, said cold plate delimiting at least one opening configured to receive at least one heat sink configured to cool at least one electronic component, said cold plate comprising a cooling circuit, comprising channels within which is configured to circulate a “cold” heat transfer fluid to supply said at least one heat sink, and a discharge circuit, comprising channels within which a “hot” heat transfer fluid is configured to circulate after heating through the at least one heat sink, said cold plate consists of an assembly of several separate elements, wherein each pair of adjacent elements fluidly connected at a portion of the cooling circuit or of the discharge circuit comprises a sealing member at the interface of said connection.
The invention relates to a method (100) for identifying a profile, in particular a workpiece profile, said method (100) comprising an image acquisition phase (102) for obtaining an RGB image, an infrared, IR image, and a depth image of said profile, said method (100) further comprising a processing phase (110) comprising the following steps:
extracting (120) from said RGB image, respectively from said IR image, of a zone of interest corresponding to said profile and storing said zone of interest as RGB image of interest, respectively as IR image of interest;
constructing (140) a consolidated image from said RGB and IR images of interest;
detecting (160) the contour of said profile in said consolidated image; and
identifying (162) said profile by comparing said contour to a database of profile contours.
The invention relates to a method (100) for identifying a profile, in particular a workpiece profile, said method (100) comprising an image acquisition phase (102) for obtaining an RGB image, an infrared, IR image, and a depth image of said profile, said method (100) further comprising a processing phase (110) comprising the following steps:
extracting (120) from said RGB image, respectively from said IR image, of a zone of interest corresponding to said profile and storing said zone of interest as RGB image of interest, respectively as IR image of interest;
constructing (140) a consolidated image from said RGB and IR images of interest;
detecting (160) the contour of said profile in said consolidated image; and
identifying (162) said profile by comparing said contour to a database of profile contours.
It also relates to a device implementing such a method, and a computer program implementing the processing phase of said method.
G06V 10/46 - Descripteurs pour la forme, descripteurs liés au contour ou aux points, p. ex. transformation de caractéristiques visuelles invariante à l’échelle [SIFT] ou sacs de mots [BoW]Caractéristiques régionales saillantes
G06T 3/40 - Changement d'échelle d’images complètes ou de parties d’image, p. ex. agrandissement ou rétrécissement
G06T 5/20 - Amélioration ou restauration d'image utilisant des opérateurs locaux
G06V 10/24 - Alignement, centrage, détection de l’orientation ou correction de l’image
G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
70.
CONTROL OF ACCESS TO THE EQUIPMENT OF A SITE SECURED BY BIOMETRIC AUTHENTICATION
Some embodiments are related to a system for controlling access of a user to a set of equipment of a secure site, including: a communicating portable device associated with the user and containing an identifier of the latter, a biometric activator allowing the opening of a temporary session for the user by means of a biometric authentication, the user being identified by his communicating portable device, and in which the equipment is adapted so as to be usable only in the event of authorization of access by the user after verification of the opening of the temporary session; the user being identified by the equipment by virtue of his communicating portable device.
The invention relates to a method detecting one or more anomalies regarding logins of a user on an authentication system. The method includes at least one iteration of a monitoring phase that includes collecting a log of successful logins of the user on the authentication system, and calculating, for each monitored parameter, a probability density, in the log, of each predetermined value of the parameter. The method also includes calculating, for each parameter, a weight, as a function of the probability density of each predetermined value of the parameter, calculating an anomaly score for the log as a function of the weights and the probability densities; and comparing the anomaly score to a given threshold in order to determine an anomaly in the daily log for the user. The invention also relates to a computer program product and a device configured to carry out the method.
Le Commissariat à l'énergie atomique et aux énergies alternatives (CEA) (France)
Inventeur(s)
Raeth, Marc
Dallaserra, Luc
Abrégé
An inlet heat sink for a liquid cooling system of an electronic board, including a cold inlet connector, a hot outlet connector, and a cold outlet connector. An upper part of a cooling block being configured to divide a flow of incoming heat transfer fluid by the cold inlet connector into a first flow oriented to collect the heat generated by the electronic board by being routed to the hot outlet connector, and a second flow, oriented directly to the cold outlet connector.
Le Commissariat à l'énergie atomique et aux énergies altervatives (CEA) (France)
Inventeur(s)
Raeth, Marc
Dallaserra, Luc
Abrégé
An outlet heat sink for a liquid cooling system for an electronic board, including a cold inlet connector, a hot inlet connector and a hot outlet connector. An upper part of a cooling block, on the one hand, conveys the flow of heat transfer fluid entering through the cold inlet connector to the lower part of the cooling block so as to collect heat generated by the electronic board by being conveyed to the hot outlet connector, and on the other hand, conveys the flow of heated-up heat transfer fluid received on the hot inlet connector directly to the hot outlet connector.
Le Commissariat à l’énergie atomique et aux énergies alternatives (CEA) (France)
Inventeur(s)
Raeth, Marc
Dallaserra, Luc
Abrégé
An interlayer heat sink for a liquid cooling system for an electronic card, the interlayer heat sink including a cold inlet connector, a hot inlet connector, a hot outlet connector, and a cold outlet connector. An upper part of the cooling block divides the flow of heat transfer fluid entering through the cold inlet connector into a first flow, which is oriented towards the lower part of the cooling block so as to collect heat generated by the electronic card by being conveyed to the hot outlet connector, and a second flow, oriented directly to the cold outlet connector, to convey the flow of heated-up heat transfer fluid received on the hot inlet connector directly to the hot outlet connector where it fuses with the heated-up flow in the lower part of the cooling block.
The invention relates to an edge-based log collecting device for collecting logs from several log sources located in a remote network, called edge-network, and sending the logs to a cloud-based system distant from the edge-network. The device is located in the edge-network, and the device includes several processing nodes for processing logs received from the log sources and sending them to said the system. The device is configured to elect, according to a predetermined election algorithm, one of the processing nodes as a master node configured for receiving the logs from all log sources of the local network, and sharing the logs with the other processing nodes. The invention further relates to a computer program and a device configured to carry out such a method.
The invention relates to a computer-implemented method for programming a checkpoint of at least one application executed on a computing infrastructure. The computing infrastructure includes a plurality of resources allocated to the execution of the application. The method includes determining a date of failure of the application as a function of a prediction of an anomaly of at least one resource of the plurality of resources, and programming the checkpoint as a function of the date of failure.
The invention relates to a method for training an artificial neural network (ANN) for object detection in images. The method includes a training phase of training the ANN with a training database (TDB) that includes training images, and measuring a performance of the trained ANN with a validation database that includes validation images. If the measured performance is not satisfactory, the method further includes an enhancing phase of detecting a mismatch between the validation images and a response of the trained ANN in response to the validation images, correlating the mismatch to a characteristic of the training images that impacts the training of the ANN, modifying the training database according to the characteristic, and training the ANN with the modified training database. The invention further relates to a non-transitory computer program and a device configured to carry out the method, and to an artificial neural network trained with the method.
G06T 7/70 - Détermination de la position ou de l'orientation des objets ou des caméras
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p. ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersectionsAnalyse de connectivité, p. ex. de composantes connectées
G06V 10/74 - Appariement de motifs d’image ou de vidéoMesures de proximité dans les espaces de caractéristiques
G06V 20/70 - Étiquetage du contenu de scène, p. ex. en tirant des représentations syntaxiques ou sémantiques
78.
ACTIONABLE ADVICE FOR THE OPTIMIZATION OF PROCESS SYSTEMS
The present invention relates to a computer implemented method for creating actionable advice for an optimization of a target variable of a process system, the process system comprising dependent and independent variables, the method comprising the steps of : - deriving a target curve of the target variable along a working envelope of the process system, - classifying data points of the target variable into a first and a second class depending on a position of the respective data points with respect to the target curve of the target variable, - training a classifier to distinguish between the first and the second class for the target variable using independent variables, - reading actual sensor data of the independent variables, - selecting at least one independent variable of the variables having the most influence on the target variable, creating a ceteris paribus profile for the at least one selected independent variable to predict if and how the dependent target variable would change if the value of the at least one selected independent variable changed, and - creating actionable advice for a direction of shift of the at least one selected independent variable to optimize the target variable. The present invention also relates to a data processing system comprising means for carrying out the inventive method. Finally, the present invention relates to a computer program product.
An iterative method for monitoring a computing device characterized by metric data to be monitored, including, for each iteration, of collecting metric data over a predetermined interval of time, detecting a seasonality pattern of said metric data over said predetermined interval of time, determining an interval-specific model representing the detected seasonality pattern, calculating modelled data using said determined model and the collected metric data, comparing the calculated modelled data with the collected metric data to calculate a score characterizing the difference between the calculated modelled data and the collected metric data, calculating an anomaly likelihood for each data of the collected metric data using the calculated score, detecting an anomaly on a data when probability that the value of said data is an anomaly is greater than a predetermined threshold.
A method for automatically providing an electronic training plan to each individual of a targeted group of individuals called “irregulars”, the targeted group including individuals who do not perform at least one activity on a periodic basis, the targeted group being a part of a larger group called set of individuals, the set of individuals including another group called “regulars”, disjointed from the group of irregulars and including individuals who do perform at least one activity on a periodic basis, each individual of the set of individuals being characterized by a set of physiological data and a set of medical data.
A63B 24/00 - Commandes électriques ou électroniques pour les appareils d'exercice des groupes
G16H 20/30 - TIC spécialement adaptées aux thérapies ou aux plans d’amélioration de la santé, p. ex. pour manier les prescriptions, orienter la thérapie ou surveiller l’observance par les patients concernant des thérapies ou des activités physiques, p. ex. la physiothérapie, l’acupression ou les exercices
81.
GATEWAY, SYSTEM AND METHOD FOR MANAGING THE CHARGE OF A PLURALITY OF VEHICLES IN AN ELECTRIC NETWORK
A method of managing a charge of a plurality of vehicles on a site, the site including a plurality of charging points and a gateway, the gateway being connected between an electricity grid of an electricity provider, configured to provide electricity to the gateway, and the plurality of charging points, the gateway including a controller and an electrical storage device that stores electrical energy. The method, operated by the controller, includes determining the electricity need of the plurality of charging points at a given time, if the electricity need of the plurality of charging points is greater than zero, determining the electrical consumption of the site, and if the electrical consumption of the site is greater than a predetermined site limit, providing electrical energy to the plurality of charging points using electricity at least partially received from the electrical storage device.
INSTITUT NATIONAL POLYTECHNIQUE DE TOULOUSE (France)
UNIVERSITE TOULOUSE III - PAUL SABATIER (France)
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventeur(s)
Pralet, Stéphane
Beuzeville, Théo
Buttari, Alfredo
Gratton, Serge
Abrégé
The invention relates to a method for quantizing a deep neural network including several layers, previously trained during a training phase determining for each layer a set of weights. The method includes a phase of quantizing the deep neural network including determining a disruption limit value of at least one weight of the weight set of the layer, beyond which the output of the deep neural network is erroneous, determining, for a target inference precision of the neural network, and from the disruption limit value, an adjustment limit value of at least one weight of the set of weights, and decreasing an arithmetic precision of at least one weight of the set of weights as a function of the adjustment limit value. The invention also relates to a computer program, a device implementing such a method, and a deep neural network obtained by such a method.
A method for simulating the combustion of a fluid in a combustion chamber, for the design of said combustion chamber, which includes: discretizing the space of the chamber into a given mesh; training a neural network by means of a learning set associating a graph corresponding to the mesh, the vertices of which have, as a value, progress variables predicted by a computational fluid dynamics simulation with local combustion quantities at these vertices; and an iterative simulation phase, where: the values predicted by the neural network of a local combustion quantity at the vertices of the mesh are provided as input to a solver, in order to obtain a value of a progress variable at each vertex of said mesh, and a graph corresponding to the vertices of the mesh is provided to said neural network, each vertex having a corresponding value of said progress variable, obtained by said solver, in order to obtain predicted values of the local combustion quantity at said vertices.
G06F 30/15 - Conception de véhicules, d’aéronefs ou d’embarcations
G06F 30/28 - Optimisation, vérification ou simulation de l’objet conçu utilisant la dynamique des fluides, p. ex. les équations de Navier-Stokes ou la dynamique des fluides numérique [DFN]
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p. ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
84.
METHOD, COMPUTER PROGRAM, DEVICE, AND SYSTEM FOR TRACKING A TARGET OBJECT
The invention relates to a method (100) for tracking a target object in an image stream captured by a camera, at a capture frequency, Fc, said method (100) comprising several iterations of a tracking phase (110), implemented individually for several images, referred to as processed, of said image stream, and comprising the following steps:
detecting (114) at least one object, and its position, in the processed image, and
identifying (116-124) said target object among the at least one object detected in said processed image;
characterized in that said tracking phase (110) is carried out at a detection frequency, Fs, lower than said capture frequency Fc, so that two images processed during two successive iterations of the tracking phase are separated by at least one non-processed image to which said tracking phase is not applied.
The invention relates to a method (100) for tracking a target object in an image stream captured by a camera, at a capture frequency, Fc, said method (100) comprising several iterations of a tracking phase (110), implemented individually for several images, referred to as processed, of said image stream, and comprising the following steps:
detecting (114) at least one object, and its position, in the processed image, and
identifying (116-124) said target object among the at least one object detected in said processed image;
characterized in that said tracking phase (110) is carried out at a detection frequency, Fs, lower than said capture frequency Fc, so that two images processed during two successive iterations of the tracking phase are separated by at least one non-processed image to which said tracking phase is not applied.
It also relates to a computer program, a device, and a system implementing such a method.
G06T 7/70 - Détermination de la position ou de l'orientation des objets ou des caméras
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
85.
Method for designing a firmware, firmware obtained by such a method and method for modifying such a firmware
The invention relates to a computer implemented method for designing a firmware including writing the firmware version, and providing the firmware version with a version data identifying the firmware version. The method also includes providing the firmware version with a second data, called rollback data, the second data provided to be compared to the version data of other versions of the firmware, and authorizing, and indicating a limit for, older firmware versions to which the firmware may be downgraded. The invention further relates to a firmware obtained by such a method and a method for modifying the version of a firmware installed on a platform and designed by such a method.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
86.
COMPILATION TECHNIQUE FOR SURFACE CODE ARCHITECTURE
Method for implementing a graph (G) comprising a plurality of vertices (V) and links (E) between the vertices, a set (R) being a collection of subsets (Ri) of said a given number of vertices (Rik) comprising:
in said set (R), selecting subsets (Ri, Rj), called pre-selected subsets, such that a tree (Ti, Tj) is associated respectively to said subset (Ri, Rj), said associated trees (Ti, Tj) being pairwise disjoint and constructing (301) each tree (Ti);
associating a weight to each said tree (Ti);
choosing the subset for which the tree (Ti) has the highest weight.
A technique for implementing a quantum circuit is provided, where the quantum circuit includes qubits and operators executed on the qubits. The operators include a sequence of π/4 Pauli rotation gates. A surface code layout includes an arrangement of the quantum circuit on a quantum chip, where the arrangement includes at least a tree with a plurality of subtrees, each rotation gate corresponding to a subtree. The technique includes iteratively generating a directed acyclic graph (DAG) of the quantum circuit, where a front layer of the DAG is a set of rotations that can be effectively implemented at each iteration. The technique includes selecting a subset of the rotations (a “selected subset”) in the front layer in which the subtrees are arranged not to intersect (“non intersecting subsets”).
CENTRE NATIONAL DE LA RECHERCHE SCIENTIFIQUE (France)
Inventeur(s)
Pauletto, Loïc
Amini, Massih-Reza
Abrégé
The invention relates to a method (200) for training a dynamic-architecture convolutional neural network for semantic image segmentation, comprising a phase (102) of auto-annotation of images, to constitute a database (B1), called the first database, of auto-annotated images, comprising the following steps:
applying (104) at least one transformation to at least one source image, and
adding (106), to each transformed image thus obtained, a tag, called the first tag, corresponding to said transformation;
said method (200) comprising at least one iteration of a phase (110) of training said neural network with the first image database (B1), and a second image database (B2) annotated with a tag, called a second tag, relating to the content of said image.
The invention relates to a method (200) for training a dynamic-architecture convolutional neural network for semantic image segmentation, comprising a phase (102) of auto-annotation of images, to constitute a database (B1), called the first database, of auto-annotated images, comprising the following steps:
applying (104) at least one transformation to at least one source image, and
adding (106), to each transformed image thus obtained, a tag, called the first tag, corresponding to said transformation;
said method (200) comprising at least one iteration of a phase (110) of training said neural network with the first image database (B1), and a second image database (B2) annotated with a tag, called a second tag, relating to the content of said image.
It also relates to a computer program and a device implementing such a method, and a deep-learning dynamic-architecture convolutional neural network obtained by such a method.
The invention relates to a method for real-time multi-camera tracking of a target object comprising, for at least one new tracklet captured by at least one camera, calculating at least a first distance between the new tracklet and at least one reference tracklet belonging to the target object. The method also includes, when the smallest calculated first distance is between a first predetermined threshold value, called re-identification threshold, and a second predetermined threshold value, called human threshold, presenting the new tracklet to an operator, for the operator to assign or not assign the new tracklet to the target object, manually. The human threshold is a function of the number of reference tracklets in the reference list. The invention also relates to a computer program, to an object re-identification device and to an object re-identification system implementing such a method.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Quantum computers and computer hardware; components and
parts for quantum computers; computer peripherals adapted
for use with quantum computers; quantum software. Quantum computer services; creation, design, development,
programming, maintenance and implementation of quantum
computers, quantum computer hardware and quantum software;
platform as a service (PaaS) offering computer software
platforms for programming and running quantum software, on
quantum computers; software as a service (SaaS) services
offering quantum software, for use in quantum computers.
09 - Appareils et instruments scientifiques et électriques
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Encryption apparatus; security tokens [encryption devices];
data networks; interactive data transfer apparatus;
computers; process calculators; calculating machines;
supercomputers; computer servers; computer terminals;
display screens; cloud servers; cloud computing server
software; application software for cloud computing services;
computer software packages; encryption software; computer
systems; information processing apparatus; software;
security software; software for computers; utility software,
security software and cryptographic software; software
reliability software; system software; anti-virus software;
computer software; downloadable software; software for cloud
computing; authentication software; spyware protection
software; server software; computer programs [downloadable
software]; software for encryption; computer application
software; speech recognition software; facial recognition
software; artificial intelligence software; Web server
software; data communication software; data processing
software; downloadable cloud software; computer firewall
software; downloadable security software; collaborative
software platforms [software]; server software for
communications; communication processing software; operating
software for main frame computers; apparatus and instruments
for electric and electronic security; apparatus and
instruments for electric and electronic security; target
monitoring apparatus [electronic]; software [recorded
programs]; smartphone software; software for tablet
computers; software for accessing digital content; computer
hardware testing software; software that assists computers
in deploying parallel applications and performing parallel
computations; network access server operating software;
monitors [computer programs]; software for migration between
various computer network operating systems; software for
computer hardware reliability; software for maintenance and
operation of computer system; software for the integration
of artificial intelligence and machine learning in the
megadata domain; downloadable computer software for use as
an application programming interface (API); computer
software for creating databases used for searching for
information and data; software to provide information via
communication networks; computer software allowing to
provide electronic media via communication networks;
downloadable software for remotely accessing and controlling
a computer; application and integration software for
databases; access server control and management software
[applications]; software for the operational management of
portable magnetic and electronic cards; computer software
intended to collect location data; software for detecting
threats against computer networks; utility software for
performing computer system diagnostics; software for
monitoring the operation of audio and video devices;
downloadable software for remote monitoring and analysis;
application software for the web and servers; computer
platforms in the form of recorded or downloadable software;
software for the provision of information via the Internet;
application software intended for portable computer devices;
software to enable the search and retrieval of data;
software for system cleaning and optimization; software for
network security and computer units; software for
authorizing access to databases; calculating devices. Telecommunications; access services for electronic sites;
secure electronic mail services; computer aided transmission
of messages, data and images; providing access to databases;
leasing access time to a computer database; advisory
services concerning communication equipment; communication
services for information transmission; communication
services for the electronic transmission of data;
assistance, information and consulting services in the field
of telecommunications; remote transmission of data via
telecommunications; services for the secure transmission of
data, sound or images. Software as a Service [SaaS]; computer Platform as a Service
[PaaS]; platforms for artificial intelligence as SaaS
[Software as a Service]; programming for computers; software
programming services; design, maintenance, development and
updating of software; design and development of computers;
development of computer platforms; duplication of computer
programs; computer code writing; quantum computing;
consulting services relating to computer systems analysis;
consulting services for analyzing information systems;
computer programming services for data processing; software
engineering services for data processing; consulting
services in the field of computer system integration;
technological advice relating to digital transformation;
outsourced services relating to information technology;
rental of computers and software; rental of computer
hardware and software; technological research; cloud
seeding; cloud computing; cloud hosting provider services;
providing artificial-intelligence computer programs on data
networks; development of computer hardware; Software as a
Service (SaaS) featuring software for machine learning, deep
learning and deep learning networks; digital asset
management; hosting of digital content; electronic data
storage; digital compression of computer data; data
encryption and decoding services; data security services;
consultant services with respect to data security; computer
programming services for data storage; computer services
concerning electronic data storage; development of data
storage systems; technical data analysis services; data
mining; computer programming services for electronic data
security; security services for computer networks, computer
access and computer-based transactions; computer security
services for protection against unauthorized network access;
monitoring of computer systems for the detection of
unauthorized access or data protection breaches; electronic
monitoring of personal identification information for the
detection of identity theft via the Internet; user
authentication services using single sign-on technology for
online software applications; technological advice in
connection with computer programs; Access Control as a
Service (ACaaS); application service provider (ASP);
providing virtual computer systems through cloud computing;
conversion of computer programs and data, other than
physical conversion; recovery of computer data; cloud-stored
data protection services; electronic storage services for
archiving databases, images and other electronic data;
rental of computer software for data stream reading;
consultancy, advisory and information services in relation
to information technology; security, protection and
restoration of information technology; authentication
services for computer security; troubleshooting services for
data communication systems; security consultant services for
telecommunication networks; threat analysis regarding
computer security for data protection; monitoring computer
systems for security purposes; computer services for data
protection; computer system monitoring services; data
recovery services; computer virus protection services;
programming of Internet security programs; consultation with
respect to computer security; information security services
[firewalls]; security technology testing services; advice
regarding artificial intelligence; design and development of
software for evaluation and calculation of data; IT
services, namely software development, programming and
implementation; design and development of number crunchers
and supercomputers.
09 - Appareils et instruments scientifiques et électriques
38 - Services de télécommunications
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Encryption apparatus; security tokens [encryption devices];
data networks; interactive data transfer apparatus;
computers; process calculators; calculating machines;
supercomputers; computer servers; computer terminals;
display screens; cloud servers; cloud computing server
software; application software for cloud computing services;
computer software packages; encryption software; computer
systems; information processing apparatus; software;
security software; software for computers; utility software,
security software and cryptographic software; software
reliability software; system software; anti-virus software;
computer software; downloadable software; software for cloud
computing; authentication software; spyware protection
software; server software; computer programs [downloadable
software]; software for encryption; computer application
software; speech recognition software; facial recognition
software; artificial intelligence software; Web server
software; data communication software; data processing
software; downloadable cloud software; computer firewall
software; downloadable security software; collaborative
software platforms [software]; server software for
communications; communication processing software; operating
software for main frame computers; apparatus and instruments
for electric and electronic security; target monitoring
apparatus [electronic]; software [recorded programs];
smartphone software; software for tablet computers; software
for accessing digital content; computer hardware testing
software; software that assists computers in deploying
parallel applications and performing parallel computations;
network access server operating software; monitors [computer
programs]; software for migration between various computer
network operating systems; software for computer hardware
reliability; software for maintenance and operation of
computer system; software for the integration of artificial
intelligence and machine learning in the megadata domain;
downloadable computer software for use as an application
programming interface (API); computer software for creating
databases used for searching for information and data;
software to provide information via communication networks;
computer software allowing to provide electronic media via
communication networks; downloadable software for remotely
accessing and controlling a computer; application and
integration software for databases; access server control
and management software [applications]; software for the
operational management of portable magnetic and electronic
cards; computer software intended to collect location data;
software for detecting threats against computer networks;
utility software for performing computer system diagnostics;
software for monitoring the operation of audio and video
devices; downloadable software for remote monitoring and
analysis; application software for the web and servers;
computer platforms in the form of recorded or downloadable
software; software for the provision of information via the
Internet; application software intended for portable
computer devices; software to enable the search and
retrieval of data; software for system cleaning and
optimization; software for network security and computer
units; software for authorizing access to databases;
calculating devices. Telecommunications; access services for electronic sites;
secure electronic mail services; computer aided transmission
of messages, data and images; providing access to databases;
leasing access time to a computer database; advisory
services concerning communication equipment; communication
services for information transmission; communication
services for the electronic transmission of data;
assistance, information and consulting services in the field
of telecommunications; remote transmission of data via
telecommunications; services for the secure transmission of
data, sound or images. Software as a Service [SaaS]; computer Platform as a Service
[PaaS]; platforms for artificial intelligence as SaaS
[Software as a Service]; programming for computers; software
programming services; design, maintenance, development and
updating of software; design and development of computers;
development of computer platforms; duplication of computer
programs; computer code writing; quantum computing;
consulting services relating to computer systems analysis;
consulting services for analyzing information systems;
computer programming services for data processing; software
engineering services for data processing; consulting
services in the field of computer system integration;
technological advice relating to digital transformation;
outsourced services relating to information technology;
rental of computers and software; rental of computer
hardware and software; technological research; cloud
seeding; cloud computing; cloud hosting provider services;
providing artificial-intelligence computer programs on data
networks; development of computer hardware; Software as a
Service (SaaS) featuring software for machine learning, deep
learning and deep learning networks; digital asset
management; hosting of digital content; electronic data
storage; digital compression of computer data; data
encryption and decoding services; data security services;
consultant services with respect to data security; computer
programming services for data storage; computer services
concerning electronic data storage; development of data
storage systems; technical data analysis services; data
mining; computer programming services for electronic data
security; security services for computer networks, computer
access and computer-based transactions; computer security
services for protection against unauthorized network access;
monitoring of computer systems for the detection of
unauthorized access or data protection breaches; electronic
monitoring of personal identification information for the
detection of identity theft via the Internet; user
authentication services using single sign-on technology for
online software applications; technological advice in
connection with computer programs; Access Control as a
Service (ACaaS); application service provider (ASP);
providing virtual computer systems through cloud computing;
conversion of computer programs and data, other than
physical conversion; recovery of computer data; cloud-stored
data protection services; electronic storage services for
archiving databases, images and other electronic data;
rental of computer software for data stream reading;
consultancy, advisory and information services in relation
to information technology; security, protection and
restoration of information technology; authentication
services for computer security; troubleshooting services for
data communication systems; security consultant services for
telecommunication networks; threat analysis regarding
computer security for data protection; monitoring computer
systems for security purposes; computer services for data
protection; computer system monitoring services; data
recovery services; computer virus protection services;
programming of Internet security programs; consultation with
respect to computer security; information security services
(firewalls); security technology testing services; advice
regarding artificial intelligence; design and development of
software for evaluation and calculation of data; IT
services, namely software development, programming and
implementation; design and development of number crunchers
and supercomputers.
93.
METHOD FOR CREATING A COMMUNICATION CHANNEL BETWEEN A LOCATION APPLICATION AND AN SAAS APPLICATION, AND METHOD AND SYSTEM FOR COMMUNICATING BETWEEN THE APPLICATIONS
The invention relates to a method for creating a communication channel between a local application executed in a local network and a remote SaaS application. The method includes generating an SSL access point and associating the SSL access point to a communication port with the SaaS application. The method also includes generating, by a proxy, a local IDAAS proxy, located in the local network, and an SSL connection associated with the SSL access point and associated with a port for communicating with the local application in the local network. The invention also relates to a method and a system for communicating between the local application and the SaaS application.
The invention relates to a method of authenticating, with an identity-as-a-service (IDAAS) server, a user of a plurality of users of a computer network. The method includes providing identification data for the user in an authentication web page of the IDAAS server, and validating an authentication request by verifying the identification data. The verifying is performed by another user, called a certifier, that is selected from the plurality of users of the computer network known to the IDAAS server and using the IDAAS server. The invention also relates to a computer program and an IDAAS server implementing such a method.
The invention includes a method for authenticating a user located in a computer network including an internal authentication of the user with an identification server of the computer network with a user identifier and a user device. The method includes transmission of an authentication request by the user device to an IDAAS server external to the computer network. The method includes an external authentication of the user by the IDAAS server, including transmission of a first message that includes an event identifier associated with the user device by the IDAAS server to a web server of the computer network. The external authentication also includes recovery of the user identifier by the web server, and transmission of a second message that includes the user identifier to authenticate the user by the web server to the IDAAS server. The invention also includes a computer program and an authentication system implementing the method.
42 - Services scientifiques, technologiques et industriels, recherche et conception
09 - Appareils et instruments scientifiques et électriques
Produits et services
Quantum computer services, namely, data recovery services in the field of quantum computers; [ design, development, programming, and implementation of quantum computers, quantum computer hardware and quantum software for others; ] platform as a service (PaaS) service featuring computer software platforms for use in programming and running quantum software on quantum computers; software as a service (SaaS) services featuring quantum software for use in performing quantum calculation tasks, data processing, developing and testing algorithms and quantum algorithms for use in quantum computers; none of the foregoing related to software for document capture, management and storage of business forms [ Quantum computers and computer hardware; components and parts for quantum computers; computer peripherals adapted for use with quantum computers; downloadable quantum software for use in performing quantum calculation tasks, data processing, developing and testing algorithms and quantum algorithms; none of the foregoing related to software for document capture, management and storage of business forms ]
97.
Method and system for detecting outliers in processes
A method for detecting outliers in processes running in a group of machines. A clustering stage, carried out at a first frequency, including fetching a list of software contained in all machines, calculating tf-idf value for each installed software and for each machine, performing clustering of the machines by applying a clustering algorithm and using a Jaccardian weighted distance method between machines based on the tf-idf values. A preliminary outliers detection stage, carried out at a second frequency greater than the first frequency, including fetching information of processes running in the machines, for each cluster calculating tf-idf values for each process, wherein if a tf-idf value is greater than a first predetermined threshold, the process is considered as outlier, for all clusters calculating itf-idf value for each process considered as outlier, and if a itf-idf value is lower than a second predetermined threshold, the process is confirmed as outlier.
G06F 18/23213 - Techniques non hiérarchiques en utilisant les statistiques ou l'optimisation des fonctions, p. ex. modélisation des fonctions de densité de probabilité avec un nombre fixe de partitions, p. ex. K-moyennes
98.
Method and apparatus for detecting outliers in a set of runs of software applications
THE FRENCH ALTERNATIVE ENERGIES AND ATOMIC ENERGY COMMISSION (France)
BULL SAS (France)
COMMISSARIAT À L'ENERGIE ATOMIQUE ET AUX ENERGIES ALTERNATIVES (France)
Inventeur(s)
Vincent, Lionel
Pham, Trong-Ton
Mimouni, Salim
Abrégé
A method for detecting outlier behavior in a set of executions of one or several applications on an information processing device, implemented by a computer and comprising steps of
triggering (S1) said set of executions in collaboration with a profiling tool in order to collect, for each execution, at least one time series of measurement points assigning, for each measurement point, a value to a measured parameter;
automatically formatting (S2) the time series obtained for said set, by adjusting, for each time series, its length, its values, and its number of measurement points;
calculating (S3) a metric between two time series among the time series collected for said set of executions;
detecting (S4) an outlier based on said distance.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Quantum computing; Platform as a service (PaaS) featuring computer software platforms for programming and running quantum computer software, on quantum computers; Software as a service (SaaS) featuring quantum computer software, for use on quantum computers.
100.
Method for calibrating an airborne goniometry apparatus for low frequencies
The invention includes a method for calibrating at low frequency and in-flight a goniometry apparatus including an antenna array, on board an air carrier. The method includes for an angular position of reception, calibrating the airborne goniometry apparatus at a given frequency, comprising transmitting, by means of a calibration transmitter, at the given frequency and in the direction of the goniometry apparatus, at least two calibration signals, with polarizations orthogonal to each other. The method also includes measuring a response of the antenna array for each of the signals. The invention also includes a system implementing such a method.
G01S 3/02 - Radiogoniomètres pour déterminer la direction d'où proviennent des ondes infrasonores, sonores, ultrasonores ou électromagnétiques ou des émissions de particules sans caractéristiques de direction utilisant des ondes radio
G01S 3/46 - Systèmes pour déterminer une direction ou une déviation par rapport à une direction prédéterminée en utilisant des antennes espacées et en mesurant la différence de phase ou de temps entre les signaux venant de ces antennes, c.-à-d. systèmes à différence de parcours