Patents Assigned to Service
-
Publication number: 20240169255Abstract: Methods and systems for generating, storing, and modifying data for feature engineering purposes. In particular, methods and systems for automatically generating feature engineering pipelines by chaining multiple transformers (models and/or function trained to transform data in specific ways) and estimators (e.g., algorithms trained with input data to generate transformers) in a sequential order based on feature attributes. To determine the specific transformers and estimators, the system may access a shared knowledge database, graph engine, and pipeline engine.Type: ApplicationFiled: November 17, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Muralikumar VENKATASUBRAMANIAM, Enwang ZHOU, Fei TONG
-
Publication number: 20240171410Abstract: A method is disclosed. The method comprises receiving, from a server computer, a challenge, and displaying objects from an object list to a user. The method includes determining that a user has visually selected an object from the object list and moving the selected object on a display according to screen coordinates. A client computer captures a biometric of the user, and compares the biometric to another biometric stored in the client computer to provide a first comparison output, and compares a derivative of the selected object to a derivative of an object stored in the client computer to produce a second comparison output. The client computer signs the challenge with a private key and sends the signed challenge to the server computer, and the server computer verifies the signed challenge.Type: ApplicationFiled: May 10, 2022Publication date: May 23, 2024Applicant: Visa International Service AssociationInventors: Sunpreet Singh Arora, William Leddy, Shengfei Gu, Minghua Xu
-
Publication number: 20240164434Abstract: An apparatus for enrobing a product portion can include at least one polymer spray head adapted to create at least one flow of polymeric fibers to produce at least one polymer enrobing zone and a conveyor system adapted to move at least one product portion from at least one position below at least one polymer enrobing zone and to at least one position above at least one polymer enrobing zone to drop each product portion through one or more polymer enrobing zones a plurality times at different orientations to enrobe each product portion with polymeric fibers.Type: ApplicationFiled: January 30, 2024Publication date: May 23, 2024Applicant: Altria Client Services LLCInventors: Andrew Nathan CARROLL, Shannon Maxwell BLACK, Yan Helen SUN, William J. BURKE, Robert SMITH
-
Publication number: 20240166249Abstract: A system includes one or more processors and memory storing processor-executable instructions that cause the one or more processors to perform operations. The operations include generating a driving strategy for a traveling route of a train comprising at least one battery-electric locomotive (BEL) based on saved data in the system for optimizing one or more aspects for the train over the traveling route; operating the train according to the driving strategy; receiving update data associated with a current location of the train; revising the driving strategy based on the saved data and the update data for optimizing energy consumption efficiency for a segment of the traveling route by identifying active powered components of the train that are non-essential for traversing the segment and turning off power to one or more of the identified active powered components for a duration of traversing the segment.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Applicant: Progress Rail Services CorporationInventors: Sammy Akif, Sidarta Fornari Beltramin, Evan P Sevel, John William Brand
-
Publication number: 20240167713Abstract: Use of Physics Informed Neural networks (PINNs) to control building systems is non-trivial, as basic formalism of PINNs is not readily amenable to control problems. Specifically, exogenous inputs (e.g., ambient temperature) and control decisions (e.g., mass flow rates) need to be specified as functional inputs to the neural network, which may not be known a priori. The input feature space could be very high dimensional depending upon the duration (monthly, yearly, etc.) and the (min-max) range of the inputs. The disclosure herein generally relates to Heating, Ventilation, and Air-Conditioning (HVAC) equipment, and, more particularly, to method and system for physics aware control of HVAC equipment. The system generates a neural network model based on a plurality of exogeneous variables from the HVAC. The generated neural network model is then used to generate the one or more control signal recommendations, which are further used to control operation of the HVAC.Type: ApplicationFiled: October 31, 2023Publication date: May 23, 2024Applicant: Tata Consultancy Services LimitedInventors: SRINARAYANA NAGARATHINAM, YASHOVARDHAN SUSHIL CHATI, ARUNCHANDAR VASAN, MALINI POONI VENKAT
-
Publication number: 20240169329Abstract: A method for machine-learning based action generation, and more specifically, using machine-learning to dynamically adjust financial account payments and fees. The method may comprise: receiving user data; determining whether a trigger condition has been met; upon determining that a trigger condition has been met, generating, using a trained machine-learning model, one or more actions based on the user data associated with the user, wherein the trained machine-learning model has been trained based on (i) training user data and (ii) training action data, to learn relationships between the training user data and the training actions data, such that the trained machine-learning model is configured to use the learned relationships to generate one or more actions in response to input of the user data associated with the user; selecting a first action of the one or more actions; and automatically executing the first action.Type: ApplicationFiled: November 22, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Jennifer KWOK, Tania Cruz MORALES, Sara Rose BRODSKY, Abhay DONTHI, Joshua EDWARDS, Jason ZWIERZYNSKI
-
Publication number: 20240164429Abstract: A tobacco tablet that includes a solid solution of soluble fiber and one or more sugar alcohols, the solid solution having a glass transition temperature of less than 40° C., and tobacco dispersed in the solid solution such that the tobacco is released from the tablet when the tablet is chewed or dissolved within an oral cavity.Type: ApplicationFiled: December 27, 2023Publication date: May 23, 2024Applicant: Altria Client Services LLCInventors: Feng GAO, Diane L. GEE, Phillip M. HULAN, Shuzhong ZHUANG, William J. BURKE
-
Publication number: 20240170108Abstract: Traditional drug discovery methods are target-based, time- and resource-intensive, and require a lot of resources for the initial hit molecule identification. Phenotype-based drug screening requires differential gene expression data of a large number of molecules for different combinations of cell-line, time point and dosage. Experimentally obtaining gene expression data for all these combinations is again a heavily resource-intensive process. The technical challenge in conventional methods that use prediction models is that they depend largely on the data processing and representation. The disclosure herein generally relates to drug-like molecule screening, and, more particularly, to a method and system for gene expression and machine learning-based drug screening. The embodiment, thus, provides a mechanism of a small molecule-induced gene expression prediction based on machine learning models.Type: ApplicationFiled: October 19, 2023Publication date: May 23, 2024Applicant: Tata Consultancy Services LimitedInventors: Broto CHAKRABARTY, Siladitya PADHI, Riya Dilipbhai SADRANI, Rajgopal SRINIVASAN, Arijit ROY
-
Publication number: 20240169216Abstract: A method includes generating dataset using topics associated with historical records, the dataset including pairs of data that are formed based on the topics, each of the pairs of data including an antecedent topic associated with a historical record corresponding to a preceding event and a consequent topic associated with a historical record corresponding to an event that occurred after the preceding event, the antecedent topic and the consequent topic forming a transitive relation for each of the pairs of data; inputting, into ML model, the pairs of data and input topic associated with a record of a user; generating, by the ML model, a prediction of a next record topic for a next record corresponding to the user, based on the consequent topic included in each of the pairs of data that include the antecedent topic corresponding to the input topic; and outputting the prediction.Type: ApplicationFiled: November 17, 2022Publication date: May 23, 2024Applicant: Oracle Financial Services Software LimitedInventors: Utkarsh Hemant Kumar Sharma, Rahul Yadav, Veresh Jain, Sharoon Saxena
-
Publication number: 20240171474Abstract: In some aspects, a computing system may use machine learning to determine whether a control is faulty or generate recommendations to make a modification to a control. may identify a portion of problematic computer code that implements the faulty control through the use of machine learning. A computing system may use machine learning to generate embeddings that map incident data and control data (e.g., computer-readable code of a control) to the same vector space. Further, a computing system may use a weighting mechanism that may be used to weight each sample used to train a machine learning model, which may allow a model to train more efficiently.Type: ApplicationFiled: November 18, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Jennifer KWOK, Albert HERGENROEDER, Tyler MAIMAN, Sarah Jane CUNNINGHAM
-
Publication number: 20240168870Abstract: Disclosed are methods, systems, and non-transitory computer-readable medium for mobile browser code testing. For instance, the method may include monitoring, using a mobile application, a user interaction with the mobile application to detect a mobile browser being launched; responsive to detecting the mobile browser being launched, launching, using the mobile application, a browser user interface within the mobile application and monitoring a mobile browser session to detect a user accessing a website from a plurality of websites; responsive to detecting the user accessing the website, injecting, using the mobile application, a script into a current web page of the website in the mobile browser; testing, using the mobile browser, codes using the script in the current web page; and updating, using the mobile application, the browser user interface with a result of testing.Type: ApplicationFiled: January 30, 2024Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Gregory HERREN, Joseph GIARDINA, Kevin JURKOWSKI
-
Publication number: 20240164431Abstract: A capsule for an aerosol-generating device may include a first heater, a second heater, and a frame sandwiched between the first heater and the second heater. The frame may define open spaces therein and have a rigidity that is adequate to support the first heater and the second heater. The open spaces within the frame may be interconnected and sized for aerosol-permeability and capillary action. A nicotine-containing material, such as tobacco, may be disposed within the capsule.Type: ApplicationFiled: January 30, 2024Publication date: May 23, 2024Applicant: Altria Client Services LLCInventors: Gregory GRISCIK, Raymond W. LAU, Eric HAWES
-
Publication number: 20240168472Abstract: In some aspects, a computing system may use machine learning to determine whether a control is faulty or generate recommendations to make a modification to a control. may identify a portion of problematic computer code that implements the faulty control through the use of machine learning. A computing system may use machine learning to generate embeddings that map incident data and control data (e.g., computer-readable code of a control) to the same vector space. Further, a computing system may use a weighting mechanism that may be used to weight each sample used to train a machine learning model, which may allow a model to train more efficiently.Type: ApplicationFiled: November 18, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Jennifer KWOK, Albert HERGENROEDER, Tyler MAIMAN, Sarah Jane CUNNINGHAM
-
Publication number: 20240167368Abstract: Various well-perforating systems and methods are disclosed incorporating a self-shunting detonator. The detonator may include an electrically-conductive detonator body. A resistor initiator inside the detonator body includes first and second leads. A grounding element inside the detonator body couples the detonator body to the first lead. An electrically-conductive clip coupled to the second lead includes an arm biased to electrical contact with an external surface of the detonator body to shunt the detonator. The arm is moveable away from the detonator body to un-shunt the detonator, such as automatically in response to insertion into a detonator housing.Type: ApplicationFiled: November 17, 2022Publication date: May 23, 2024Applicant: Halliburton Energy Services, Inc.Inventors: Kevin C. Cook, Matthew Craig Mlcak, Joseph Todd MacGillivray, Stuart Michael Wood
-
Publication number: 20240166637Abstract: The present invention is related to the development of novel compounds and methods for the treatment and/or prevention of malaria. The compounds prevent the formation by the malaria parasite of the plasmodium surface anion channel (PSAC) on the surface of the host cell. The compounds and methods described herein are effective against infection by a wide variety of Plasmodia strains known as the causative agent of malaria.Type: ApplicationFiled: January 21, 2022Publication date: May 23, 2024Applicants: Microbiotix, Inc., The United States Of America As Represented By The Secretary, Department of Health and Human ServiceInventors: Samanthi L. Waidyarachchi, Son T. Nguyen, Xiaoyuan Ding, Sharmila Adhikari, John D. Williams, Norton P. Peet, Zachary D. Aron, Sanjay A. Desai, Michelle M. Butler
-
Publication number: 20240170984Abstract: A computing device may comprise: a housing that defines an interior of the computing device, and a wireless charger that is selectively moveable from a first position to a second position, wherein in the first position, a charging region of the wireless charger within the interior of the housing, and in the second position, the charging region of the wireless charger is outside of the housing and is configured to receive a device for charging.Type: ApplicationFiled: November 23, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventor: Gurjot SINGH
-
Publication number: 20240167372Abstract: A system for electric-motor driven transportation mechanism for fracturing operations is disclosed. The system includes at least one transportation mechanism to transport blender components for a blender fluid from a first tub that may be a proppant hopper to a second tub that may be a blender tub and that may be associated with a fracturing blender; an electric motor and a control unit associated with the at least one transportation mechanism; and at least one variable frequency drive (VFD) associated with the electric motors for real time control of a speed associated with the at least one transportation mechanism.Type: ApplicationFiled: January 26, 2024Publication date: May 23, 2024Applicant: U.S. Well Services, LLCInventors: Alexander Christinzio, Brandon Hinderliter, Lon Robinson, Jared Oehring
-
Publication number: 20240171399Abstract: Methods and systems are described herein for a transfer authorization system that may monitor for transfer requests for secondary cryptographic addresses maintained for one or more primary cryptographic addresses. When a transfer request is received, the transfer authorization system may determine that the transfer request is for a secondary cryptographic address. Based on that determination, the transfer authorization system may determine that the source cryptographic address of the request is authorized to receive control of cryptographic tokens from the secondary cryptographic address and that the request is associated with the source cryptographic address. The transfer authorization system may then transfer control of one or more cryptographic tokens from an associated primary cryptographic address to the secondary cryptographic address, and upon the successful transfer, may also transfer control of the one or more tokens to the requestor.Type: ApplicationFiled: November 21, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Anoop GOPI, Lesley NEWTON, Christina SONG
-
Publication number: 20240169437Abstract: Methods and systems are disclosed for determining valuation and risk analysis of municipal debt instruments on an after-tax basis. In one embodiment, bond terms, yield curve and interest rate volatility data are received for a set of bonds. Additionally, IRS treatment data and applicable tax rates for the set of bonds and a purchaser of the bonds are also received. Theoretical tax-neutral values of the bonds are calculated using a buy-and-hold methodology, wherein the tax-neutral value comprises the price of the at least one municipal debt offering such that its discounted after-tax value equals the price. A theoretical maximum after-tax values of the bonds are also calculated using a recursive valuation path-dependent methodology. Optimal bond management is determined using the calculated theoretical tax-neutral values and maximum after-tax values of the bonds.Type: ApplicationFiled: February 1, 2024Publication date: May 23, 2024Applicant: ICE Data Services, Inc.Inventor: Andrew J. Kalotay
-
Publication number: 20240171582Abstract: Methods and systems are described herein for moving access tokens for validating network operations between user accounts to prevent malicious or nonaligned usage. The system may determine that a user is associated with a first user account and a second user account, retrieve parameters associated with the first and second user accounts, determine that an access token is available for migration, update a binding associated with the access token from the first to the second user account, and, in response to receiving a network operation request, may process the request using the second user account.Type: ApplicationFiled: November 17, 2022Publication date: May 23, 2024Applicant: Capital One Services, LLCInventors: Joshua EDWARDS, Om Prakash TRIPATHI, Jesse EMERY