SlideShare a Scribd company logo
1 of 4
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
1
Deep Learning for Internet of Things (IoT) Insights from Patents
Alex G. Lee (alexglee@techipm.com)
https://www.linkedin.com/today/author/2853055
Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human
brain’s reasoning process.The layers correspond to distinct levels of concepts where higher-level concepts are
derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts).
US20150294422 illustrates the deep learning application for dynamic risk management in the IoT connected cars.
The deep learning correlates the driver's usage patterns, driving styles, weather conditions, traffic or interaction
with the vehicle based on a priori knowledge of how normalized driver data sets behave to predict potential driving
risk dynamically. Real time data are provided using the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V)
communications. US20150166072 illustrates another deep learning application for dynamic risk management in
the IoT connected cars. The deep learning correlates multiple vehicles behavior as a function of their environment
(e.g., road conditions pertain to an individual vehicle) in order to predict vehicle behavior in future environments.
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
2
Evaluation of a living environment such as an interior spacehighly influences residents and users of the space, the
spaceitself, and uses and purposes ofthe space. US20140241627 illustrates the deep learning application for
evaluating the effect of the lighting on human feelings in the IoT smart home. The deep learning correlates the
brightness of the overall space and human feelings toward images to classify the human feeling categories. The
classification can be used to provide a better smart home lighting system. US20150286638 illustrates another
deep learning application for recognizing the scene type from a set of images in the IoT smart home. The deep
learning correlates the set of images to learn new features. The scene recognizing system can be used to provide
the context-aware smart home services.
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
3
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
4
Distributed power generation refers to a mode of power generation in which electricity is generated by energy
sources at locations distributed across the power grid. US20140340236 illustrates the deep learning application for
securing the distributed power distribution networks in the IoT smart grids. The basic process in the security
surrounding the power distribution networks involves the notion of discriminating between normal operations and
anomalous operations. The deep learning can be used to discriminate between a signature considered normal, and
one that is abnormal, or as well as sub-classes of abnormality due to malicious or non-malicious perturbations of
the networks. The deep learning is trained on a training set of timing of communication input labeled as "normal."
Sets of abnormal input can be labeled and used to train the deep learning to discriminate particular classes of
abnormal signatures.
US20150142466 illustrates the deep learning application for providing remote medical diagnosis and therapy of the
IoT connected healthcare. The deep learning predicts a risk of mortality and/or morbidity based on the statistical
modeling of health outcomes from historic and real-time health data.

More Related Content

What's hot

What's hot (19)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
IOT in electrical engineering
IOT in electrical engineeringIOT in electrical engineering
IOT in electrical engineering
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
 
2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 

Viewers also liked

Servicio F
Servicio FServicio F
Servicio F
formacio
 
커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라
Alex G. Lee, Ph.D. Esq. CLP
 
Presentación HMES.
Presentación HMES.Presentación HMES.
Presentación HMES.
guesta04b80
 
Scala Bot for Small Business
Scala Bot for Small BusinessScala Bot for Small Business
Scala Bot for Small Business
Yung-Luen Lan
 
Financial Services in India
Financial Services in IndiaFinancial Services in India
Financial Services in India
Alok Bhageria
 

Viewers also liked (20)

What Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial IntelligenceWhat Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial Intelligence
 
Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)
 
Com navegar pel blog
Com navegar pel blogCom navegar pel blog
Com navegar pel blog
 
Partner Busines
Partner BusinesPartner Busines
Partner Busines
 
Servicio F
Servicio FServicio F
Servicio F
 
microsoft
microsoftmicrosoft
microsoft
 
Buckingham Palace
Buckingham PalaceBuckingham Palace
Buckingham Palace
 
Bonsai
BonsaiBonsai
Bonsai
 
Hotseat: 2012 Games for Health Conference
Hotseat: 2012 Games for Health ConferenceHotseat: 2012 Games for Health Conference
Hotseat: 2012 Games for Health Conference
 
커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라
 
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for SmartphonesLenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for Smartphones
 
BiLogica - BI services
BiLogica - BI servicesBiLogica - BI services
BiLogica - BI services
 
Presentación HMES.
Presentación HMES.Presentación HMES.
Presentación HMES.
 
IoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents AssessmentIoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents Assessment
 
Scala Bot for Small Business
Scala Bot for Small BusinessScala Bot for Small Business
Scala Bot for Small Business
 
Internet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value CreationInternet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value Creation
 
IoT Business Reality & Patent Development
IoT Business Reality & Patent DevelopmentIoT Business Reality & Patent Development
IoT Business Reality & Patent Development
 
Financial Services in India
Financial Services in IndiaFinancial Services in India
Financial Services in India
 
UCSD Career Boost Career Revolution
UCSD Career Boost Career RevolutionUCSD Career Boost Career Revolution
UCSD Career Boost Career Revolution
 
Future Apple iPhone Insights from Patents
Future Apple iPhone Insights from PatentsFuture Apple iPhone Insights from Patents
Future Apple iPhone Insights from Patents
 

Similar to Deep Learning for Internet of Things (IoT) Insights from Patents

Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
info751436
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
todd521
 
A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...
IJECEIAES
 

Similar to Deep Learning for Internet of Things (IoT) Insights from Patents (20)

IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from Patents
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
Rough set method-cloud internet of things: a two-degree verification scheme ...
Rough set method-cloud internet of things: a two-degree  verification scheme ...Rough set method-cloud internet of things: a two-degree  verification scheme ...
Rough set method-cloud internet of things: a two-degree verification scheme ...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Smart Home services-CS.pdf
Smart Home services-CS.pdfSmart Home services-CS.pdf
Smart Home services-CS.pdf
 
Nireeksha
NireekshaNireeksha
Nireeksha
 
Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...
 
TTP_EV
TTP_EVTTP_EV
TTP_EV
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
 
A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...A review on machine learning based intrusion detection system for internet of...
A review on machine learning based intrusion detection system for internet of...
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 

More from Alex G. Lee, Ph.D. Esq. CLP

Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
Alex G. Lee, Ph.D. Esq. CLP
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
Alex G. Lee, Ph.D. Esq. CLP
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
Alex G. Lee, Ph.D. Esq. CLP
 
NFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders RoundtableNFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders Roundtable
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse Fashion Overview
Metaverse Fashion OverviewMetaverse Fashion Overview
Metaverse Fashion Overview
Alex G. Lee, Ph.D. Esq. CLP
 
Global Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators RoadshowGlobal Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators Roadshow
Alex G. Lee, Ph.D. Esq. CLP
 
NFT Financialization Overview
NFT Financialization OverviewNFT Financialization Overview
NFT Financialization Overview
Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
Alex G. Lee, Ph.D. Esq. CLP
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
Alex G. Lee, Ph.D. Esq. CLP
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
Alex G. Lee, Ph.D. Esq. CLP
 
FAME Universe Introduction
FAME Universe IntroductionFAME Universe Introduction
FAME Universe Introduction
Alex G. Lee, Ph.D. Esq. CLP
 

More from Alex G. Lee, Ph.D. Esq. CLP (20)

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing Patents
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi Integration
 
Metaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability OverviewMetaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability Overview
 
AI for Metaverse x Web3 Overview
AI for Metaverse x Web3 OverviewAI for Metaverse x Web3 Overview
AI for Metaverse x Web3 Overview
 
NFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders RoundtableNFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders Roundtable
 
Fame Universe Introduction
Fame Universe IntroductionFame Universe Introduction
Fame Universe Introduction
 
Metaverse Fashion Overview
Metaverse Fashion OverviewMetaverse Fashion Overview
Metaverse Fashion Overview
 
Global Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators RoadshowGlobal Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators Roadshow
 
NFT Financialization Overview
NFT Financialization OverviewNFT Financialization Overview
NFT Financialization Overview
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
 
NFT Monetization Innovation Webinar
NFT Monetization Innovation WebinarNFT Monetization Innovation Webinar
NFT Monetization Innovation Webinar
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
 
FAME Universe Introduction
FAME Universe IntroductionFAME Universe Introduction
FAME Universe Introduction
 

Recently uploaded

%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 

Recently uploaded (20)

Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 

Deep Learning for Internet of Things (IoT) Insights from Patents

  • 1. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 1 Deep Learning for Internet of Things (IoT) Insights from Patents Alex G. Lee (alexglee@techipm.com) https://www.linkedin.com/today/author/2853055 Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human brain’s reasoning process.The layers correspond to distinct levels of concepts where higher-level concepts are derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts). US20150294422 illustrates the deep learning application for dynamic risk management in the IoT connected cars. The deep learning correlates the driver's usage patterns, driving styles, weather conditions, traffic or interaction with the vehicle based on a priori knowledge of how normalized driver data sets behave to predict potential driving risk dynamically. Real time data are provided using the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communications. US20150166072 illustrates another deep learning application for dynamic risk management in the IoT connected cars. The deep learning correlates multiple vehicles behavior as a function of their environment (e.g., road conditions pertain to an individual vehicle) in order to predict vehicle behavior in future environments.
  • 2. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 2 Evaluation of a living environment such as an interior spacehighly influences residents and users of the space, the spaceitself, and uses and purposes ofthe space. US20140241627 illustrates the deep learning application for evaluating the effect of the lighting on human feelings in the IoT smart home. The deep learning correlates the brightness of the overall space and human feelings toward images to classify the human feeling categories. The classification can be used to provide a better smart home lighting system. US20150286638 illustrates another deep learning application for recognizing the scene type from a set of images in the IoT smart home. The deep learning correlates the set of images to learn new features. The scene recognizing system can be used to provide the context-aware smart home services.
  • 3. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 3
  • 4. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 4 Distributed power generation refers to a mode of power generation in which electricity is generated by energy sources at locations distributed across the power grid. US20140340236 illustrates the deep learning application for securing the distributed power distribution networks in the IoT smart grids. The basic process in the security surrounding the power distribution networks involves the notion of discriminating between normal operations and anomalous operations. The deep learning can be used to discriminate between a signature considered normal, and one that is abnormal, or as well as sub-classes of abnormality due to malicious or non-malicious perturbations of the networks. The deep learning is trained on a training set of timing of communication input labeled as "normal." Sets of abnormal input can be labeled and used to train the deep learning to discriminate particular classes of abnormal signatures. US20150142466 illustrates the deep learning application for providing remote medical diagnosis and therapy of the IoT connected healthcare. The deep learning predicts a risk of mortality and/or morbidity based on the statistical modeling of health outcomes from historic and real-time health data.