BIAS IDENTIFICATION AND CORRECTION IN TEXT DOCUMENTS

    公开(公告)号:US20220180068A1

    公开(公告)日:2022-06-09

    申请号:US17113137

    申请日:2020-12-07

    IPC分类号: G06F40/30 G06F40/166

    摘要: A method, computer system, and a computer program product for text bias identification and correction are provided. A first text corpus may be received. A designation of a second text corpus may be received. Words of the first text corpus may be embedded as a first word embedding in an embedding model. The first word embedding may be compared to a second word embedding in the embedding model to identify a first biased text in the first text corpus. The second word embedding may be from the second text corpus. A first replacement text portion may be generated as a substitute for the first biased text. The first replacement text portion may include a first unbiased text. The first biased text and the first replacement text portion may be presented.

    SEMANTIC CONSISTENCY OF EXPLANATIONS IN EXPLAINABLE ARTIFICIAL INTELLIGENCE APPLICATIONS

    公开(公告)号:US20210350275A1

    公开(公告)日:2021-11-11

    申请号:US16870202

    申请日:2020-05-08

    IPC分类号: G06N20/00 G06F40/30 G06F17/16

    摘要: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations. If the application's overall inconsistency score exceeds a threshold value, the system forwards information about the explanation, the offending modules, and the input dataset to a downstream machine-learning component that uses this information to train the application to better respond to future input that shares certain characteristics with the current input.

    INDEX MANAGEMENT FOR A DATABASE
    6.
    发明申请

    公开(公告)号:US20200349194A1

    公开(公告)日:2020-11-05

    申请号:US16401277

    申请日:2019-05-02

    摘要: An example operation may include one or more of generating a proposal to perform a ledger operation at a first node, informing one or more second nodes of the proposal, receiving a decision on consensus among the first node and the one or more second nodes for the proposal, and performing the ledger operation at the first node when there is consensus, wherein the ledger operation changes a state database of a ledger of the first node and wherein the state database corresponds to a blockchain stored in the ledger.

    Controlling driving modes of self-driving vehicles

    公开(公告)号:US10543844B2

    公开(公告)日:2020-01-28

    申请号:US15838500

    申请日:2017-12-12

    摘要: A method controls an operational mode of a self-driving vehicle (SDV). One or more physical detectors detect an erratically driven vehicle (EDV) that is being operated in an unsafe manner within a predetermined distance of an SDV that is initially being operated in an evasive autonomous mode. One or more processors retrieve traffic pattern data for other SDVs, and examine the traffic pattern data to 1) determine a first traffic flow of the other SDVs while operating in the evasive autonomous mode, and 2) determine a second traffic flow of the other SDVs while operating in a manual mode. In response to determining that the first traffic flow has a higher accident rate than the second traffic flow, an operational mode device changes the operational mode of the SDV from the evasive autonomous mode to the manual mode.

    Data-centric monitoring of compliance of distributed applications

    公开(公告)号:US10482265B2

    公开(公告)日:2019-11-19

    申请号:US14983873

    申请日:2015-12-30

    IPC分类号: G06F21/57 G06F21/60

    摘要: Log(s) of IT events are accessed in a distributed system that includes a distributed application. The distributed system includes multiple data objects. The distributed application uses, processes, or otherwise accesses one or more of data objects. The IT events concern the distributed application and concern accesses by the distributed application to the data object(s). The IT events are correlated with a selected set of the data objects. Risks are estimated to the selected set of data objects based on the information technology events. Estimating risks uses at least ranks of compliance rules as these rules apply to the data objects in the system, and vulnerability scores of systems corresponding to the set of data objects and information technology events. Information is output that allows a user to determine the estimated risks for the selected set of data objects. Techniques for determining ranks of compliance rules are also disclosed.