SlideShare a Scribd company logo
1 of 4
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
1
Deep Learning for Internet of Things (IoT) Insights from Patents
Alex G. Lee (alexglee@techipm.com)
https://www.linkedin.com/today/author/2853055
Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human
brain’s reasoning process.The layers correspond to distinct levels of concepts where higher-level concepts are
derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts).
US20150294422 illustrates the deep learning application for dynamic risk management in the IoT connected cars.
The deep learning correlates the driver's usage patterns, driving styles, weather conditions, traffic or interaction
with the vehicle based on a priori knowledge of how normalized driver data sets behave to predict potential driving
risk dynamically. Real time data are provided using the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V)
communications. US20150166072 illustrates another deep learning application for dynamic risk management in
the IoT connected cars. The deep learning correlates multiple vehicles behavior as a function of their environment
(e.g., road conditions pertain to an individual vehicle) in order to predict vehicle behavior in future environments.
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
2
Evaluation of a living environment such as an interior spacehighly influences residents and users of the space, the
spaceitself, and uses and purposes ofthe space. US20140241627 illustrates the deep learning application for
evaluating the effect of the lighting on human feelings in the IoT smart home. The deep learning correlates the
brightness of the overall space and human feelings toward images to classify the human feeling categories. The
classification can be used to provide a better smart home lighting system. US20150286638 illustrates another
deep learning application for recognizing the scene type from a set of images in the IoT smart home. The deep
learning correlates the set of images to learn new features. The scene recognizing system can be used to provide
the context-aware smart home services.
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
3
©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/
4
Distributed power generation refers to a mode of power generation in which electricity is generated by energy
sources at locations distributed across the power grid. US20140340236 illustrates the deep learning application for
securing the distributed power distribution networks in the IoT smart grids. The basic process in the security
surrounding the power distribution networks involves the notion of discriminating between normal operations and
anomalous operations. The deep learning can be used to discriminate between a signature considered normal, and
one that is abnormal, or as well as sub-classes of abnormality due to malicious or non-malicious perturbations of
the networks. The deep learning is trained on a training set of timing of communication input labeled as "normal."
Sets of abnormal input can be labeled and used to train the deep learning to discriminate particular classes of
abnormal signatures.
US20150142466 illustrates the deep learning application for providing remote medical diagnosis and therapy of the
IoT connected healthcare. The deep learning predicts a risk of mortality and/or morbidity based on the statistical
modeling of health outcomes from historic and real-time health data.

More Related Content

What's hot

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinMassimiliano Masi
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationAreej Qasrawi
 
IOT in electrical engineering
IOT in electrical engineeringIOT in electrical engineering
IOT in electrical engineeringdeepakbagam
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of thingspoovarasu maniandan
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01Partha Sarathi Kar
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02Partha Sarathi Kar
 
2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing exposzhosain
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Fastly
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area NetworkIRJET Journal
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Ahmed Banafa
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computingeSAT Journals
 

What's hot (19)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital TwinEnabling a Zero Trust Architecture in Smart Grids through a Digital Twin
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
IOT in electrical engineering
IOT in electrical engineeringIOT in electrical engineering
IOT in electrical engineering
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 01
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
 
2014-11-19 fog computing expo
2014-11-19 fog computing expo2014-11-19 fog computing expo
2014-11-19 fog computing expo
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
IRJET-  	  Secured Mind Uploading Method in Wireless Body Area NetworkIRJET-  	  Secured Mind Uploading Method in Wireless Body Area Network
IRJET- Secured Mind Uploading Method in Wireless Body Area Network
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 

Viewers also liked

What Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial IntelligenceWhat Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial IntelligenceJonathan Mugan
 
Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)a16z
 
Servicio F
Servicio FServicio F
Servicio Fformacio
 
커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라Alex G. Lee, Ph.D. Esq. CLP
 
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for SmartphonesLenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for SmartphonesAlex G. Lee, Ph.D. Esq. CLP
 
BiLogica - BI services
BiLogica - BI servicesBiLogica - BI services
BiLogica - BI serviceseclectic78
 
Presentación HMES.
Presentación HMES.Presentación HMES.
Presentación HMES.guesta04b80
 
IoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents AssessmentIoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents AssessmentAlex G. Lee, Ph.D. Esq. CLP
 
Scala Bot for Small Business
Scala Bot for Small BusinessScala Bot for Small Business
Scala Bot for Small BusinessYung-Luen Lan
 
Internet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value CreationInternet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value CreationAlex G. Lee, Ph.D. Esq. CLP
 
Financial Services in India
Financial Services in IndiaFinancial Services in India
Financial Services in IndiaAlok Bhageria
 
UCSD Career Boost Career Revolution
UCSD Career Boost Career RevolutionUCSD Career Boost Career Revolution
UCSD Career Boost Career RevolutionUC San Diego
 

Viewers also liked (20)

What Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial IntelligenceWhat Deep Learning Means for Artificial Intelligence
What Deep Learning Means for Artificial Intelligence
 
Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)Mobile Is Eating the World (2015)
Mobile Is Eating the World (2015)
 
Com navegar pel blog
Com navegar pel blogCom navegar pel blog
Com navegar pel blog
 
Partner Busines
Partner BusinesPartner Busines
Partner Busines
 
Servicio F
Servicio FServicio F
Servicio F
 
microsoft
microsoftmicrosoft
microsoft
 
Buckingham Palace
Buckingham PalaceBuckingham Palace
Buckingham Palace
 
Bonsai
BonsaiBonsai
Bonsai
 
Hotseat: 2012 Games for Health Conference
Hotseat: 2012 Games for Health ConferenceHotseat: 2012 Games for Health Conference
Hotseat: 2012 Games for Health Conference
 
커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라커넥티드카 시대 전장부품 특허장벽에 대비하라
커넥티드카 시대 전장부품 특허장벽에 대비하라
 
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for SmartphonesLenovo's Key NEC 3G & & 4G LTE Standard  Essential Patents for Smartphones
Lenovo's Key NEC 3G & & 4G LTE Standard Essential Patents for Smartphones
 
BiLogica - BI services
BiLogica - BI servicesBiLogica - BI services
BiLogica - BI services
 
Presentación HMES.
Presentación HMES.Presentación HMES.
Presentación HMES.
 
IoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents AssessmentIoT Connected Car High Litigation Risk Patents Assessment
IoT Connected Car High Litigation Risk Patents Assessment
 
Scala Bot for Small Business
Scala Bot for Small BusinessScala Bot for Small Business
Scala Bot for Small Business
 
Internet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value CreationInternet of Things (IoT) Strategic Patent R&D for New Value Creation
Internet of Things (IoT) Strategic Patent R&D for New Value Creation
 
IoT Business Reality & Patent Development
IoT Business Reality & Patent DevelopmentIoT Business Reality & Patent Development
IoT Business Reality & Patent Development
 
Financial Services in India
Financial Services in IndiaFinancial Services in India
Financial Services in India
 
UCSD Career Boost Career Revolution
UCSD Career Boost Career RevolutionUCSD Career Boost Career Revolution
UCSD Career Boost Career Revolution
 
Future Apple iPhone Insights from Patents
Future Apple iPhone Insights from PatentsFuture Apple iPhone Insights from Patents
Future Apple iPhone Insights from Patents
 

Similar to Deep Learning for Internet of Things (IoT) Insights from Patents

IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTIJEACS
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfinfo751436
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV IJECEIAES
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 
Rough set method-cloud internet of things: a two-degree verification scheme ...
Rough set method-cloud internet of things: a two-degree  verification scheme ...Rough set method-cloud internet of things: a two-degree  verification scheme ...
Rough set method-cloud internet of things: a two-degree verification scheme ...IJECEIAES
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Smart Home services-CS.pdf
Smart Home services-CS.pdfSmart Home services-CS.pdf
Smart Home services-CS.pdfTHIMMAIAH BC
 
Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...IJECEIAES
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docxtodd521
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 

Similar to Deep Learning for Internet of Things (IoT) Insights from Patents (20)

IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Energy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoTEnergy Management with Disaster Intimation and Control using IoT
Energy Management with Disaster Intimation and Control using IoT
 
Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV A survey on security and privacy issues in IoV
A survey on security and privacy issues in IoV
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
 
Internet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from PatentsInternet of Things (IoT) Security Measures Insights from Patents
Internet of Things (IoT) Security Measures Insights from Patents
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 
Rough set method-cloud internet of things: a two-degree verification scheme ...
Rough set method-cloud internet of things: a two-degree  verification scheme ...Rough set method-cloud internet of things: a two-degree  verification scheme ...
Rough set method-cloud internet of things: a two-degree verification scheme ...
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Smart Home services-CS.pdf
Smart Home services-CS.pdfSmart Home services-CS.pdf
Smart Home services-CS.pdf
 
Nireeksha
NireekshaNireeksha
Nireeksha
 
Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...Low-cost real-time internet of things-based monitoring system for power grid ...
Low-cost real-time internet of things-based monitoring system for power grid ...
 
TTP_EV
TTP_EVTTP_EV
TTP_EV
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 

More from Alex G. Lee, Ph.D. Esq. CLP

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...Alex G. Lee, Ph.D. Esq. CLP
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability ConvergenceAlex G. Lee, Ph.D. Esq. CLP
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsAlex G. Lee, Ph.D. Esq. CLP
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisAlex G. Lee, Ph.D. Esq. CLP
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationAlex G. Lee, Ph.D. Esq. CLP
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강Alex G. Lee, Ph.D. Esq. CLP
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfAlex G. Lee, Ph.D. Esq. CLP
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionAlex G. Lee, Ph.D. Esq. CLP
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book SummaryAlex G. Lee, Ph.D. Esq. CLP
 

More from Alex G. Lee, Ph.D. Esq. CLP (20)

[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
[Presentation] Webinar on Patent Management and Patent Asset STO in the ChatG...
 
Metaverse x AI x Web3 x Sustainability Convergence
Metaverse x AI x  Web3 x Sustainability ConvergenceMetaverse x AI x  Web3 x Sustainability Convergence
Metaverse x AI x Web3 x Sustainability Convergence
 
Tokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World AssetsTokenization, Securitization, Monetization of Real-World Assets
Tokenization, Securitization, Monetization of Real-World Assets
 
Maximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent AnalysisMaximizing Innovation through ChatGPT Powered Patent Analysis
Maximizing Innovation through ChatGPT Powered Patent Analysis
 
Maximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing PatentsMaximizing AI Business Value Creation Utilizing Patents
Maximizing AI Business Value Creation Utilizing Patents
 
Real-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi IntegrationReal-World Assets STO + Institutional DeFi Integration
Real-World Assets STO + Institutional DeFi Integration
 
Metaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability OverviewMetaverse x Web3 Interoperability Overview
Metaverse x Web3 Interoperability Overview
 
AI for Metaverse x Web3 Overview
AI for Metaverse x Web3 OverviewAI for Metaverse x Web3 Overview
AI for Metaverse x Web3 Overview
 
NFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders RoundtableNFT Web3 Metaverse Global Leaders Roundtable
NFT Web3 Metaverse Global Leaders Roundtable
 
Fame Universe Introduction
Fame Universe IntroductionFame Universe Introduction
Fame Universe Introduction
 
Metaverse Fashion Overview
Metaverse Fashion OverviewMetaverse Fashion Overview
Metaverse Fashion Overview
 
Global Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators RoadshowGlobal Metaverse Fashion Innovators Roadshow
Global Metaverse Fashion Innovators Roadshow
 
NFT Financialization Overview
NFT Financialization OverviewNFT Financialization Overview
NFT Financialization Overview
 
Metaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business DevelopmentMetaverse & Web3 Technology Innovation & Business Development
Metaverse & Web3 Technology Innovation & Business Development
 
NFT Monetization Innovation Webinar
NFT Monetization Innovation WebinarNFT Monetization Innovation Webinar
NFT Monetization Innovation Webinar
 
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
웹3.0기반 메타버스 응용을 위한 NFT 가치개발과 가치평가 특강
 
NFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdfNFT for Web3 Based Metaverse Monetization Webinar.pdf
NFT for Web3 Based Metaverse Monetization Webinar.pdf
 
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform IntroductionFAME UNIVERSE Fashion NFT Monetization Platform Introduction
FAME UNIVERSE Fashion NFT Monetization Platform Introduction
 
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
NAVIGATING THE METAVERSE (Wiley)  One Page Book SummaryNAVIGATING THE METAVERSE (Wiley)  One Page Book Summary
NAVIGATING THE METAVERSE (Wiley) One Page Book Summary
 
FAME Universe Introduction
FAME Universe IntroductionFAME Universe Introduction
FAME Universe Introduction
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Deep Learning for Internet of Things (IoT) Insights from Patents

  • 1. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 1 Deep Learning for Internet of Things (IoT) Insights from Patents Alex G. Lee (alexglee@techipm.com) https://www.linkedin.com/today/author/2853055 Deep learning is a machine learning method that attempts to learn layered models of inputs that mimics the human brain’s reasoning process.The layers correspond to distinct levels of concepts where higher-level concepts are derived from lower-level concepts (hierarchy of complex concepts that are constructed out of simpler concepts). US20150294422 illustrates the deep learning application for dynamic risk management in the IoT connected cars. The deep learning correlates the driver's usage patterns, driving styles, weather conditions, traffic or interaction with the vehicle based on a priori knowledge of how normalized driver data sets behave to predict potential driving risk dynamically. Real time data are provided using the vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communications. US20150166072 illustrates another deep learning application for dynamic risk management in the IoT connected cars. The deep learning correlates multiple vehicles behavior as a function of their environment (e.g., road conditions pertain to an individual vehicle) in order to predict vehicle behavior in future environments.
  • 2. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 2 Evaluation of a living environment such as an interior spacehighly influences residents and users of the space, the spaceitself, and uses and purposes ofthe space. US20140241627 illustrates the deep learning application for evaluating the effect of the lighting on human feelings in the IoT smart home. The deep learning correlates the brightness of the overall space and human feelings toward images to classify the human feeling categories. The classification can be used to provide a better smart home lighting system. US20150286638 illustrates another deep learning application for recognizing the scene type from a set of images in the IoT smart home. The deep learning correlates the set of images to learn new features. The scene recognizing system can be used to provide the context-aware smart home services.
  • 3. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 3
  • 4. ©2015 TechIPm, LLC All Rights Reserved http://www.techipm.com/ 4 Distributed power generation refers to a mode of power generation in which electricity is generated by energy sources at locations distributed across the power grid. US20140340236 illustrates the deep learning application for securing the distributed power distribution networks in the IoT smart grids. The basic process in the security surrounding the power distribution networks involves the notion of discriminating between normal operations and anomalous operations. The deep learning can be used to discriminate between a signature considered normal, and one that is abnormal, or as well as sub-classes of abnormality due to malicious or non-malicious perturbations of the networks. The deep learning is trained on a training set of timing of communication input labeled as "normal." Sets of abnormal input can be labeled and used to train the deep learning to discriminate particular classes of abnormal signatures. US20150142466 illustrates the deep learning application for providing remote medical diagnosis and therapy of the IoT connected healthcare. The deep learning predicts a risk of mortality and/or morbidity based on the statistical modeling of health outcomes from historic and real-time health data.