Training Of Hidden Markov Models (hmms) (epo) Patents (Class 704/E15.029)
  • Patent number: 11863575
    Abstract: Systems, devices, media, and methods are presented for determining a level of abusive network behavior suspicion for groups of entities and for identifying suspicious entity groups. A suspiciousness metric is developed and used to evaluate a multi-view graph across multiple views where entities are associated with nodes of the graph and attributes of the entities are associated with levels of the graph.
    Type: Grant
    Filed: April 21, 2022
    Date of Patent: January 2, 2024
    Assignee: Snap Inc.
    Inventors: Neil Shah, Hamed Nilforoshan-Dardashti
  • Patent number: 11797827
    Abstract: Abstracting data that originates from different sensors and transducers using artificial neural networks. A method can include identifying topological patterns of activity in a recurrent artificial neural network and outputting a collection of digits. The topological patterns are responsive to an input, into the recurrent artificial neural network, of first data originating from a first sensor and second data originating from a second sensor. Each topological pattern abstracts a characteristic shared by the first data and the second data. The first and second sensors sense different data. Each digit represents whether one of the topological patterns of activity has been identified in the artificial neural network.
    Type: Grant
    Filed: December 11, 2019
    Date of Patent: October 24, 2023
    Assignee: INAIT SA
    Inventors: Henry Markram, Felix Schürmann, Fabien Jonathan Delalondre, Daniel Milan Lütgehetmann, John Rahmon
  • Patent number: 11630989
    Abstract: A computing device receives a data X and Y, each having N samples. A function f(x,y) is defined to be a trainable neural network based on the data X and the data Y. A permuted version of the data Y is created. A loss mean is computed based on the trainable neural network f(x,y), the permuted version of the sample data Y, and a trainable scalar variable ?. A loss with respect to the scalar variable ? and the trainable neural network is minimized. Upon determining that the loss is at or below the predetermined threshold, estimating a mutual information (MI) between a test data XT and YT. If the estimated MI is above a predetermined threshold, the test data XT and YT is deemed to be dependent. Otherwise, it is deemed to be independent.
    Type: Grant
    Filed: March 9, 2020
    Date of Patent: April 18, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Youssef Mroueh, Pierre L. Dognin, Igor Melnyk, Jarret Ross, Tom D. J. Sercu
  • Patent number: 10579689
    Abstract: Providing knowledge representation of material content being consumed by a user combines the user's current behavioral data and data from external sources such as internet web sites and social media network. Visual representations of entities and their relationships in the content being consumed by the user are created while the user is consuming content, and displayed via a graphical user interface.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: March 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Marco A. S. Netto, Vagner F. D. Santana
  • Patent number: 9922389
    Abstract: A method of detecting tampering in a compressed digital image includes extracting one or more neighboring joint density features from a digital image under scrutiny and extracting one or more neighboring joint density features from an original digital image. The digital image under scrutiny and the original digital image are decompressed into a spatial domain. Tampering in the digital image under scrutiny is detected based on at least one difference in a neighboring joint density feature of the digital image under scrutiny and a neighboring joint density feature of the original image. In some embodiments, detecting tampering in the digital image under scrutiny includes detecting down-recompression of at least a portion of the digital image. In some embodiments, detecting tampering in the digital image includes detecting inpainting forgery in the same quantization.
    Type: Grant
    Filed: June 10, 2015
    Date of Patent: March 20, 2018
    Assignee: Sam Houston State University
    Inventor: Qingzhong Liu
  • Publication number: 20110015925
    Abstract: A speech recognition method, comprising: receiving a speech input in a first noise environment which comprises a sequence of observations; determining the likelihood of a sequence of words arising from the sequence of observations using an acoustic model, comprising: providing an acoustic model for performing speech recognition on a input signal which comprises a sequence of observations, wherein said model has been trained to recognise speech in a second noise environment, said model having a plurality of model parameters relating to the probability distribution of a word or part thereof being related to an observation; adapting the model trained in the second environment to that of the first environment; the speech recognition method further comprising determining the likelihood of a sequence of observations occurring in a given language using a language model; combining the likelihoods determined by the acoustic model and the language model and outputting a sequence of words identified from said spee
    Type: Application
    Filed: March 26, 2010
    Publication date: January 20, 2011
    Applicant: Kabushiki Kaisha Toshiba
    Inventors: Haitian Xu, Mark John Francis Gales
  • Publication number: 20100318354
    Abstract: Technologies are described herein for noise adaptive training to achieve robust automatic speech recognition. Through the use of these technologies, a noise adaptive training (NAT) approach may use both clean and corrupted speech for training. The NAT approach may normalize the environmental distortion as part of the model training. A set of underlying “pseudo-clean” model parameters may be estimated directly. This may be done without point estimation of clean speech features as an intermediate step. The pseudo-clean model parameters learned from the NAT technique may be used with a Vector Taylor Series (VTS) adaptation. Such adaptation may support decoding noisy utterances during the operating phase of a automatic voice recognition system.
    Type: Application
    Filed: June 12, 2009
    Publication date: December 16, 2010
    Applicant: Microsoft Corporation
    Inventors: Michael Lewis Seltzer, James Garnet Droppo, Ozlem Kalinli, Alejandro Acero
  • Publication number: 20100312562
    Abstract: A rope-jumping algorithm is employed in a Hidden Markov Model based text to speech system to determine start and end models and to modify the start and end models by setting small co-variances. Disordered acoustic parameters due to violation of parameter constraints are avoided through the modification and result in stable line frequency spectrum for the generated speech.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 9, 2010
    Applicant: Microsoft Corporation
    Inventors: Wenlin Wang, Guoliang Zhang, Jingyang Xu
  • Publication number: 20100204988
    Abstract: A speech recognition method includes receiving a speech input signal in a first noise environment which includes a sequence of observations, determining the likelihood of a sequence of words arising from the sequence of observations using an acoustic model, adapting the model trained in a second noise environment to that of the first environment, wherein adapting the model trained in the second environment to that of the first environment includes using second order or higher order Taylor expansion coefficients derived for a group of probability distributions and the same expansion coefficient is used for the whole group.
    Type: Application
    Filed: April 20, 2010
    Publication date: August 12, 2010
    Inventors: Haitian XU, Kean Kheong Chin
  • Publication number: 20100191532
    Abstract: An object comparison method comprises: generating a first ordered vector sequence representation of a first object; generating a second ordered vector sequence representation of a second object; representing the first object by a first ordered sequence of model parameters generated by modeling the first ordered vector sequence representation using a semi-continuous hidden Markov model employing a universal basis; representing the second object by a second ordered sequence of model parameters generated by modeling the second ordered vector sequence representation using a semi-continuous hidden Markov model employing the universal basis; and comparing the first and second ordered sequences of model parameters to generate a quantitative comparison measure.
    Type: Application
    Filed: January 28, 2009
    Publication date: July 29, 2010
    Applicant: Xerox Corporation
    Inventors: Jose A. Rodriguez Serrano, Florent C. Perronnin
  • Publication number: 20100121643
    Abstract: The technology disclosed relates to a system and method for fast, accurate and parallelizable speech search, called Crystal Decoder. It is particularly useful for search applications, as opposed to dictation. It can achieve both speed and accuracy, without sacrificing one for the other. It can search different variations of records in the reference database without a significant increase in elapsed processing time. Even the main decoding part can be parallelized as the number of words increase to maintain a fast response time.
    Type: Application
    Filed: November 2, 2009
    Publication date: May 13, 2010
    Applicant: Melodis Corporation
    Inventors: Keyvan Mohajer, Seyed Majid Emami, Jon Grossman, Joe Kyaw Soe Aung, Sina Sohangir