-
公开(公告)号:US20180081053A1
公开(公告)日:2018-03-22
申请号:US15689656
申请日:2017-08-29
Applicant: NEC Laboratories America, Inc.
Inventor: Iain Melvin , Eric Cosatto , Igor Durdanovic , Hans Peter Graf
CPC classification number: G01S13/931 , B60G2400/823 , B60Q9/008 , B60R1/00 , B60R2300/301 , B60R2300/8093 , B60W30/09 , B60W2420/42 , B60W2420/52 , G01S7/20 , G01S7/2955 , G01S7/417 , G01S13/867 , G01S17/936 , G01S2013/936 , G01S2013/9367 , G01S2013/9375 , G06K9/00805 , G06K9/46 , G06K9/6215 , G06K9/6232 , G06N3/0454 , G06N3/08 , G06N3/084
Abstract: A computer-implemented method and system are provided. The system includes an image capture device configured to capture image data relative to an ambient environment of a user. The system further includes a processor configured to detect and localize objects, in a real-world map space, from the image data using a trainable object localization Convolutional Neural Network (CNN). The CNN is trained to detect and localize the objects from image and radar pairs that include the image data and radar data for different scenes of a natural environment. The processor is further configured to perform a user-perceptible action responsive to a detection and a localization of an object in an intended path of the user.
-
公开(公告)号:US20170337467A1
公开(公告)日:2017-11-23
申请号:US15590666
申请日:2017-05-09
Applicant: NEC Laboratories America, Inc.
Inventor: Asim Kadav , Igor Durdanovic , Hans Peter Graf , Hao Li
CPC classification number: G06N3/082 , G06F17/153 , G06F17/17 , G06K9/00771 , G06K9/4628 , G06K9/6228 , G06K9/627 , G06K9/6296 , G06K9/66 , G06K2009/00738 , G06N3/0427 , G06N3/0454 , G06N3/0481 , G06N5/045 , G08B13/00 , G08B29/186 , H03H2222/04
Abstract: Security systems and methods for detecting intrusion events include one or more sensors configured to monitor an environment. A pruned convolutional neural network (CNN) is configured process information from the one or more sensors to classify events in the monitored environment. CNN filters having the smallest summed weights have been pruned from the pruned CNN. An alert module is configured to detect an intrusion event in the monitored environment based on event classifications. A control module is configured to perform a security action based on the detection of an intrusion event.
-
13.
公开(公告)号:US20240177799A1
公开(公告)日:2024-05-30
申请号:US18414687
申请日:2024-01-17
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Hans Peter Graf , Ziqi Chen
Abstract: A method for implementing deep reinforcement learning with T-cell receptor (TCR) mutation policies to generate binding TCRs recognizing target peptides for immunotherapy is presented. The method includes extracting peptides to identify a virus or tumor cells, collecting a library of TCRs from target patients, predicting, by a deep neural network, interaction scores between the extracted peptides and the TCRs from the target patients, developing a deep reinforcement learning (DRL) framework with TCR mutation policies to generate TCRs with maximum binding scores, defining reward functions based on a reconstruction-based score and a density estimation-based score, randomly sampling batches of TCRs and following a policy network to mutate the TCRs, outputting mutated TCRs, and ranking the outputted TCRs to utilize top-ranked TCR candidates to target the virus or the tumor cells for immunotherapy.
-
公开(公告)号:US20240087673A1
公开(公告)日:2024-03-14
申请号:US18471610
申请日:2023-09-21
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Hans Peter Graf , Ziqi Chen
Abstract: A method for generating binding peptides presented by any given Major Histocompatibility Complex (MHC) protein is presented. The method includes, given a peptide and an MHC protein pair, enabling a Reinforcement Learning (RL) agent to interact with and exploit a peptide mutation environment by repeatedly mutating the peptide and observing an observation score of the peptide, learning to form a mutation policy, via a mutation policy network, to iteratively mutate amino acids of the peptide to obtain desired presentation scores, and generating, based on the desired presentation scores, qualified peptides and binding motifs of MHC Class I proteins.
-
公开(公告)号:US20240071570A1
公开(公告)日:2024-02-29
申请号:US18471630
申请日:2023-09-21
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Hans Peter Graf , Ziqi Chen
Abstract: A system for binding peptide search for immunotherapy is presented. The system includes employing a deep neural network to predict a peptide presentation given Major Histocompatibility Complex allele sequences and peptide sequences, training a Variational Autoencoder (VAE) to reconstruct peptides by converting the peptide sequences into continuous embedding vectors, running a Monte Carlo Tree Search to generate a first set of positive peptide vaccine candidates, running a Bayesian Optimization search with the trained VAE and a Backpropagation search with the trained VAE to generate a second set of positive peptide vaccine candidates, using a sampling from a Position Weight Matrix (sPWM) to generate a third set of positive peptide vaccine candidates, screening and merging the first, second, and third sets of positive peptide vaccine candidates, and outputting qualified peptides for immunotherapy from the screened and merged sets of positive peptide vaccine candidates.
-
公开(公告)号:US11887008B2
公开(公告)日:2024-01-30
申请号:US17114946
申请日:2020-12-08
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Christopher Malon , Hans Peter Graf
IPC: G06N3/08 , G06N3/088 , G06F40/20 , G10L15/06 , G10L15/16 , G10L15/22 , G06N3/086 , G06N3/02 , G06N3/082
CPC classification number: G06N3/088 , G06F40/20 , G06N3/08 , G06N3/086 , G10L15/063 , G10L15/16 , G10L15/22 , G06N3/02 , G06N3/082
Abstract: Methods and systems for disentangled data generation include accessing a dataset including pairs, each formed from a given input text structure and a given style label for the input text structures. An encoder is trained to disentangle a sequential text input into disentangled representations, including a content embedding and a style embedding, based on a subset of the dataset, using an objective function that includes a regularization term that minimizes mutual information between the content embedding and the style embedding. A generator is trained to generate a text output that includes content from the style embedding, expressed in a style other than that represented by the style embedding of the text input.
-
公开(公告)号:US20230083313A1
公开(公告)日:2023-03-16
申请号:US17898662
申请日:2022-08-30
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Hans Peter Graf , Ziqi Chen
Abstract: A system for binding peptide search for immunotherapy is presented. The system includes employing a deep neural network to predict a peptide presentation given Major Histocompatibility Complex allele sequences and peptide sequences, training a Variational Autoencoder (VAE) to reconstruct peptides by converting the peptide sequences into continuous embedding vectors, running a Monte Carlo Tree Search to generate a first set of positive peptide vaccine candidates, running a Bayesian Optimization search with the trained VAE and a Backpropagation search with the trained VAE to generate a second set of positive peptide vaccine candidates, using a sampling from a Position Weight Matrix (sPWM) to generate a third set of positive peptide vaccine candidates, screening and merging the first, second, and third sets of positive peptide vaccine candidates, and outputting qualified peptides for immunotherapy from the screened and merged sets of positive peptide vaccine candidates.
-
公开(公告)号:US11475590B2
公开(公告)日:2022-10-18
申请号:US17016273
申请日:2020-09-09
Applicant: NEC Laboratories America, Inc.
Inventor: Asim Kadav , Farley Lai , Hans Peter Graf , Michael Snower
IPC: G06T7/73
Abstract: Aspects of the present disclosure describe systems, methods and structures for an efficient multi-person posetracking method that advantageously achieves state-of-the-art performance on PoseTrack datasets by only using keypoint information in a tracking step without optical flow or convolution routines. As a consequence, our method has fewer parameters and FLOPs and achieves faster FPS. Our method benefits from our parameter-free tracking method that outperforms commonly used bounding box propagation in top-down methods. Finally, we disclose tokenization and embedding multi-person pose keypoint information in the transformer architecture that can be re-used for other pose tasks such as pose-based action recognition.
-
公开(公告)号:US20220171989A1
公开(公告)日:2022-06-02
申请号:US17529622
申请日:2021-11-18
Applicant: NEC Laboratories America, Inc.
Inventor: Renqiang Min , Asim Kadav , Hans Peter Graf , Ligong Han
Abstract: A computer-implemented method for representation disentanglement is provided. The method includes encoding an input vector into an embedding. The method further includes learning, by a hardware processor, disentangled representations of the input vector including a style embedding and a content embedding by performing sample-based mutual information minimization on the embedding under a Wasserstein distance regularization and a Kullback-Leibler (KL) divergence. The method also includes decoding the style and content embeddings to obtain a reconstructed vector.
-
公开(公告)号:US10885437B2
公开(公告)日:2021-01-05
申请号:US15590666
申请日:2017-05-09
Applicant: NEC Laboratories America, Inc.
Inventor: Asim Kadav , Igor Durdanovic , Hans Peter Graf , Hao Li
IPC: G06N3/04 , G06N3/08 , G06K9/62 , G06K9/00 , G06K9/46 , G08B13/00 , G08B29/18 , G06F17/15 , G06F17/17 , G06K9/66 , G06N5/04
Abstract: Security systems and methods for detecting intrusion events include one or more sensors configured to monitor an environment. A pruned convolutional neural network (CNN) is configured process information from the one or more sensors to classify events in the monitored environment. CNN filters having the smallest summed weights have been pruned from the pruned CNN. An alert module is configured to detect an intrusion event in the monitored environment based on event classifications. A control module is configured to perform a security action based on the detection of an intrusion event.
-
-
-
-
-
-
-
-
-