243
  S 20 140188462A 1  i9) United States  2 ) Patent Application Publication oo) Pub. No.: US 2014/0188462 Al  Zadeh (43 ) Pub. Date: Jul. 3,2014  54) METHODS AND SYSTEMS FOR  APPLICATIONS FOR Z-NUMBERS (7 ) Applicant: Lotfl A. Zadeh, Berkeley, CA (US) (72) Inventor: Lotfl A. Zadeh, Berkeley, CA (US) (2 ) Appl.No.: 14/201,974 (22) Filed: Mar. 10, 2014 Related U.S. Application Data (63) Continuation of application No. 3/953,047, filed on Jul. 29, 20 3, now Pat. No. 8,694,459, which is a continu ation of application No. 3/62 , 35, filed on Sep. 5, 20 2, now Pat. No. 8,5 5,890. Publication Classificat ion  51) Int.C l.  06F17/28  (2006.0 )  06N7/02  (2006.0 )  52) U.S. Cl. CPC . 06F17/28  (20 3.0 ); 06N 7/02  (20 3.0 ) USPC 704/9  57) ABSTRACT Specification covers new algorithms, methods, and systems for artificial intelligence, soft computing, and deep learning/ recognition, e.g., image recognition (e.g., for action, gesture, emotion, expression, biometrics, fingerprint, facial, OCR (text), background, relationship, position, pattern, and object), large number of images (“Big Data”) analytics, machine learning, training schemes, crowd-sourcing (using experts or humans), feature space, clustering, classification, similarity measures, optimization, search engine, ranking, question-answering system, soft (fuzzy or unsharp) bound- aries/impreciseness/ambiguities/fuzziness in language, Natural Language Processing (NLP), Computing-with- Words (CWW), parsing, machine translation, sound and speech recognition, video search and analysis (e.g. tracking), image annotation, geometrical abstraction, image correction, semantic web, context analysis, data reliability (e.g., using Z-number (e.g., “About 45 minutes; Very sure”)), rules engine, control system, autonomous vehicle, self-diagnosis and self-repair robots, system diagnosis, medical diagnosis, biomedicine, data mining, event prediction, financial fore casting, economics, risk assessment, e-mail management, database management, indexing and join operation, memory management, and data compression.

AI novel techniques

Embed Size (px)

DESCRIPTION

computer science patent

Citation preview

  • 5/19/2018 AI novel techniques

    1/243

    S 20140188462A1

    i9) United States

    2) Patent Application Publication oo) Pub. No.: US 2014/0188462 Al

    Zadeh

    (43 )

    Pub. Date:

    Jul. 3,2014

    54) METHODS AND SYSTEMS FOR

    APPLICATIONS FOR Z-NUMBERS

    (7 ) Applicant:

    Lotfl A. Zadeh,

    Berkeley, CA (US)

    (72) Inventor:

    Lotfl A. Zadeh,

    Berkeley, CA (US)

    (2 )

    Appl.No.: 14/201,974

    (22) Filed: Mar. 10, 2014

    Related U.S. Application Data

    (63) Continuation of application No. 3/953,047, filed on

    Jul. 29, 20 3, now Pat. No. 8,694,459, which is a

    continuation of applicat ion No. 3/62 , 35, filed on

    Sep. 5, 20 2, now Pat. No. 8,5 5,890.

    Publication Classification

    51) Int.C l.

    06F17/28

    (2006.0 )

    06N7/02

    (2006.0 )

    52) U.S. Cl.

    CPC .

    06F17/28

    (20 3.0 );

    06N 7/02

    (20 3.0 )

    USPC 704/9

    57) ABSTRACT

    Specification covers new algorithms, methods, and systems

    for artificial intelligence, soft computing, and deep learning/

    recognition, e.g., image recognition (e.g., for action, gesture,

    emotion, expression, biometrics, fingerprint, facial, OCR

    (text), background, relationship, position, pattern, and

    object), large number of images (Big Data) analytics,

    machine learning, training schemes, crowd-sourcing (using

    experts or humans), feature space, clustering, classification,

    similarity measures, optimization, search engine, ranking,

    question-answering system, soft (fuzzy or unsharp) bound-

    aries/impreciseness/ambiguities/fuzziness in language,

    Natural Language Processing (NLP), Computing-with-

    Words (CWW), parsing, machine translation, sound and

    speech recognition, video search and analysis (e.g. tracking),

    image annotation, geometrical abstraction, image correction,

    semantic web, context analysis, data reliability (e.g., using

    Z-number (e.g., About 45 minutes; Very sure)), rules

    engine, control system, autonomous vehicle, self-diagnosis

    and self-repair robots, system diagnosis, medical diagnosis,

    biomedicine, data mining, event prediction, financial fore

    casting, economics, risk assessment, e-mail management,

    database management, indexing and join operation, memory

    management, and data compression.

  • 5/19/2018 AI novel techniques

    2/243

    Patent Appl cat on Publ cat on

    Jul. 3, 2014 Sheet 1 of 178

    US 2014/0188462 A1

    IG 1

  • 5/19/2018 AI novel techniques

    3/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 2 of 178 US 2014/0188462 A1

    IG 2(a)

    IG 2(b)

  • 5/19/2018 AI novel techniques

    4/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 3 of 178 US 2014/0188462 A1

    IG 3

  • 5/19/2018 AI novel techniques

    5/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 4 of 178 US 2014/0188462 A1

    ig. 4

  • 5/19/2018 AI novel techniques

    6/243

    Patent Appl cat on Publ cat on

    Jul. 3, 2014 Sheet 5 of 178

    US 2014/0188462 A1

    robability

    theory

    BL

    Bivalent

    logic

    Tools in

    Current

    use

    Add new

    tools

    ig. 5

  • 5/19/2018 AI novel techniques

    7/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 6 of 178 US 2014/0188462 A1

    p bability

    ig. 6

  • 5/19/2018 AI novel techniques

    8/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 7 of 178 US 2014/0188462 A1

    ig. 7

  • 5/19/2018 AI novel techniques

    9/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 8 of 178 US 2014/0188462 A1

    recisiand of

    (GC( ))

    ig. 8

  • 5/19/2018 AI novel techniques

    10/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 9 of 178 US 2014/0188462 A1

    Human-o iented machine-o iented

    ig. 9

  • 5/19/2018 AI novel techniques

    11/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 10 of 178 US 2014/0188462 A1

    IG 10(a)

    IG 10(b)

    X

  • 5/19/2018 AI novel techniques

    12/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 11 of 178 US 2014/0188462 A1

    IG 10(c)

    IG 10(d)

  • 5/19/2018 AI novel techniques

    13/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 12 of 178 US 2014/0188462 A1

    IG 11(b)

  • 5/19/2018 AI novel techniques

    14/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 13 of 178 US 2014/0188462 A1

    r= 0 5

    IG 11(c)

  • 5/19/2018 AI novel techniques

    15/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 14 of 178 US 2014/0188462 A1

    r = 0.5

    IG 11(d)

  • 5/19/2018 AI novel techniques

    16/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 15 of 178 US 2014/0188462 A1

    r= 0 5

    mx

    IG 11(e)

  • 5/19/2018 AI novel techniques

    17/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 16 of 178 US 2014/0188462 A1

    IG 11(f)

  • 5/19/2018 AI novel techniques

    18/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 17 of 178 US 2014/0188462 A1

    IG 11(g)

  • 5/19/2018 AI novel techniques

    19/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 18 of 178 US 2014/0188462 A1

    r = 0.5

    l (

    )

    = C

    B ) = 0

    )

    i

    \

    15

    \

    .5 1 1.5 2

    mx

    IG 11(h)

  • 5/19/2018 AI novel techniques

    20/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 19 of 178 US 2014/0188462 A1

    x i

    IG 11 (i)

  • 5/19/2018 AI novel techniques

    21/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 20 of 178 US 2014/0188462 A1

    1 2 3

    X

    IG 12(a)

    B

    IG 12(b)

  • 5/19/2018 AI novel techniques

    22/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 21 of 178 US 2014/0188462 A1

    IG 12(c)

    Y

    IG 12(d)

  • 5/19/2018 AI novel techniques

    23/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 22 of 178 US 2014/0188462 A1

    IG 12(e)

  • 5/19/2018 AI novel techniques

    24/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 23 of 178 US 2014/0188462 A1

    IG 12(f)

  • 5/19/2018 AI novel techniques

    25/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 24 of 178 US 2014/0188462 A1

    IG 12(g)

  • 5/19/2018 AI novel techniques

    26/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 25 of 178 US 2014/0188462 A1

    IG 12(h)

  • 5/19/2018 AI novel techniques

    27/243

    Patent Appl cat on Publ cat on

    Jul. 3, 2014 Sheet 26 of 178

    US 2014/0188462 A1

    IG 12(i)

  • 5/19/2018 AI novel techniques

    28/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 27 of 178 US 2014/0188462 A1

    I

    x

    - M-

    bx

    1

    x

    IG 12(j)

  • 5/19/2018 AI novel techniques

    29/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 28 of 178 US 2014/0188462 A1

    m x

    IG 12(k)

  • 5/19/2018 AI novel techniques

    30/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 29 of 178 US 2014/0188462 A1

    = 0 2 0 4 0 6 0 8

    4 8 12 16 2

    m x

    IG 12(1)

  • 5/19/2018 AI novel techniques

    31/243

    M

    B

    p

    b

    n

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 30 of 178 US 2014/0188462 A1

    IG 12(m)

  • 5/19/2018 AI novel techniques

    32/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 31 of 178 US 2014/0188462 A1

    m x

    x

    IG 12(n)

  • 5/19/2018 AI novel techniques

    33/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 32 of 178 US 2014/0188462 A1

    IG 12(o)

  • 5/19/2018 AI novel techniques

    34/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 33 of 178 US 2014/0188462 A1

    Y

    IG 13(a)

  • 5/19/2018 AI novel techniques

    35/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 34 of 178 US 2014/0188462 A1

    m x

    IG 13(b)

  • 5/19/2018 AI novel techniques

    36/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 35 of 178 US 2014/0188462 A1

    = 0 2 0 4 0 6 0 8

    IG 13(c)

  • 5/19/2018 AI novel techniques

    37/243

    M

    B

    p

    b

    n

    Patent Appl cat on Publ cat on

    Jul. 3, 2014 Sheet 36 of 178

    US 2014/0188462 A1

    IG 13(d)

  • 5/19/2018 AI novel techniques

    38/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 37 of 178 US 2014/0188462 A1

    M x B

    IG 13(e)

  • 5/19/2018 AI novel techniques

    39/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 38 of 178 US 2014/0188462 A1

    IG 13(f)

    IG 13(g)

  • 5/19/2018 AI novel techniques

    40/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 39 of 178 US 2014/0188462 A1

    Y

    IG 14(a)

  • 5/19/2018 AI novel techniques

    41/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 40 of 178 US 2014/0188462 A1

    m x

    IG 14(b)

  • 5/19/2018 AI novel techniques

    42/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 41 of 178 US 2014/0188462 A1

    = 0 2 0 4 0 6 0 8

    IG 14(c)

  • 5/19/2018 AI novel techniques

    43/243

    Patent Appl cat on Publ cat on

    Jul. 3, 2014

    Sheet 42 of 178 US 2014/0188462 A1

    ( bin facto = 2)

    I

    -------------------- --------------------1-------------------

    % 25% 5 % 75% 1 %

    IG 14(d)

  • 5/19/2018 AI novel techniques

    44/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 43 of 178 US 2014/0188462 A1

    -B.P1 ( U i )

    Sound

    rocessor

    Signature arameters

    Evaluator Module

    B

    Signature arameters

    Comparison Module

    A U1 L Ui A

    B. Pi (Uj ) \

    1

    1

    1

    '

    B,pj(Uj h

    . . . I

    ' A .Pi(U i)

    A , p j ( U j ) ^ !

    - 0 - -o - -

    Ui

    i

    V .

    tSi

    tSi tSi

    ts

    IG 15(a)

  • 5/19/2018 AI novel techniques

    45/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 44 of 178 US 2014/0188462 A1

    IG 15(b)

  • 5/19/2018 AI novel techniques

    46/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 45 of 178 US 2014/0188462 A1

    45 55 65 75 85 95 1 5 115

    x

    IG 16(a)

    IG 16(b)

  • 5/19/2018 AI novel techniques

    47/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 46 of 178 US 2014/0188462 A1

    Y

    IG 16(d)

  • 5/19/2018 AI novel techniques

    48/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 47 of 178 US 2014/0188462 A1

    IG 16(e)

  • 5/19/2018 AI novel techniques

    49/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 48 of 178 US 2014/0188462 A1

    = 0 8 0 6 0 4 0 2

    IG 16(f)

  • 5/19/2018 AI novel techniques

    50/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 49 of 178 US 2014/0188462 A1

    6 rn x 95

    IG 16(g)

  • 5/19/2018 AI novel techniques

    51/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 50 of 178 US 2014/0188462 A1

    60

    IG 16(h)

  • 5/19/2018 AI novel techniques

    52/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 51 of 178 US 2014/0188462 A1

    = 0 8 0 6 0 4 0 2

    2

    0 0

    x

    IG 16(i)

  • 5/19/2018 AI novel techniques

    53/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 52 of 178 US 2014/0188462 A1

    Max Bx=

    s

    n

    o

    x

    re -

    5

    6

    2.5

    Max Bx = 1

    -4 . 1

    95

    mx

    IG 16(j)

  • 5/19/2018 AI novel techniques

    54/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 53 of 178 US 2014/0188462 A1

    IG 16(k)

  • 5/19/2018 AI novel techniques

    55/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 54 of 178 US 2014/0188462 A1

    Y

    IG 17(a)

  • 5/19/2018 AI novel techniques

    56/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 55 of 178 US 2014/0188462 A1

    IG 17(b)

  • 5/19/2018 AI novel techniques

    57/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 56 of 178 US 2014/0188462 A1

    By

    IG 17(c)

  • 5/19/2018 AI novel techniques

    58/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 57 of 178 US 2014/0188462 A1

    y(u)

    IG 18(a)

  • 5/19/2018 AI novel techniques

    59/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 58 of 178 US 2014/0188462 A1

    Y

    IG 18(b)

    IG 18(c)

  • 5/19/2018 AI novel techniques

    60/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 59 of 178 US 2014/0188462 A1

    Y

    IG 19(a)

    Bv

    IG 19(b)

  • 5/19/2018 AI novel techniques

    61/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 60 of 178 US 2014/0188462 A1

    Y

    IG 20 (a)

    By .5

    0

    % 25% 5 %

    75% 1 %

    IG 20(b)

  • 5/19/2018 AI novel techniques

    62/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 61 of 178 US 2014/0188462 A1

    IG 21(b)

  • 5/19/2018 AI novel techniques

    63/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 62 of 178 US 2014/0188462 A1

    IG 22(a)

    IG 22(b)

  • 5/19/2018 AI novel techniques

    64/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 63 of 178 US 2014/0188462 A1

    A*( >

    o

    IG 23

  • 5/19/2018 AI novel techniques

    65/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 64 of 178 US 2014/0188462 A1

    A()

    C nf dence

    B

    IG 24

  • 5/19/2018 AI novel techniques

    66/243

    A

    u

    e

    y

    N

    S

    m

    e

    w

    h

    A

    u

    e

    C

    o

    d

    S

    e

    C

    o

    d

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 65 of 178 US 2014/0188462 A1

    B

    o,Bi() o,Bi(

    - ( 1--

    ^-W o,B

    0

    i

    'o

    0

    o ,B 2 ()

    j

    'o

    :

    o

    W o , 2

    r*

    :

    Wo,B3

    ^

    o , i )

    o

    o,B

    J l

    0 11

    o

    o,B3

    o

    ,

    +

    0

    o ,B 3 ()

    0 1

    o ,B 3 ()

    o

    J1

    J l o

    0

    IG 25

  • 5/19/2018 AI novel techniques

    67/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 66 of 178 US 2014/0188462 A1

    IG 26(a)

    (A, )

    A * ( X ) r l )

    IG 26(b)

  • 5/19/2018 AI novel techniques

    68/243

    Patent Application Publication Jul. 3, 2014 Sheet 67 of 178 US 2014/0188462 A1

    (A,By)(y. )

    z = f x, y)

    >

    IG 27

  • 5/19/2018 AI novel techniques

    69/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 68 of 178 US 2014/0188462 A1

    IG 28(a)

  • 5/19/2018 AI novel techniques

    70/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 69 of 178 US 2014/0188462 A1

    g

    g

    IG 28(b)

  • 5/19/2018 AI novel techniques

    71/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 70 of 178 US 2014/0188462 A1

    (y\ " )

    = ' "

    / \

    G ul ize G nul ize

    IG 28(c)

  • 5/19/2018 AI novel techniques

    72/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 71 of 178 US 2014/0188462 A1

    IG 29

  • 5/19/2018 AI novel techniques

    73/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 72 of 178 US 2014/0188462 A1

    c , D ) o ,

    A(Xo) c(Xo)

    IG 30

  • 5/19/2018 AI novel techniques

    74/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 73 of 178 US 2014/0188462 A1

    c,D) o> )

    c( )

    IG 31

  • 5/19/2018 AI novel techniques

    75/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 74 of 178 US 2014/0188462 A1

    W ,p(c(Xo).D)

    IG 32

  • 5/19/2018 AI novel techniques

    76/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 75 of 178 US 2014/0188462 A1

    IG 33(a)

    IG 33(b)

  • 5/19/2018 AI novel techniques

    77/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 76 of 178 US 2014/0188462 A1

    IG 34

  • 5/19/2018 AI novel techniques

    78/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 77 of 178 US 2014/0188462 A1

    IG 35(a)

    f m n

    IG 35(b)

  • 5/19/2018 AI novel techniques

    79/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 78 of 178 US 2014/0188462 A1

    IG 35(c)

    max(min)

    IG 35(d)

  • 5/19/2018 AI novel techniques

    80/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 79 of 178 US 2014/0188462 A1

    ig. 36(a)

  • 5/19/2018 AI novel techniques

    81/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 80 of 178 US 2014/0188462 A1

    M(S)

    m deliz ti n

    A

    GC(p)

    ig. 36(b)

  • 5/19/2018 AI novel techniques

    82/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 81 of 178 US 2014/0188462 A1

    X + Y = 2 *

    ig. 37

  • 5/19/2018 AI novel techniques

    83/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 82 of 178 US 2014/0188462 A1

    Object

    space

    Object

    rotoform

    Summary of p space

    F(p)

    ig. 38

  • 5/19/2018 AI novel techniques

    84/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 83 of 178 US 2014/0188462 A1

    Object

    space

    otofo m

    space

    ig. 39

  • 5/19/2018 AI novel techniques

    85/243

    Patent Appl cat on Publ cat on

    Jul. 3, 2014 Sheet 84 of 178

    US 2014/0188462 A1

    ig. 40

  • 5/19/2018 AI novel techniques

    86/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 85 of 178 US 2014/0188462 A1

    Summa ization/

    Abst act (b)

    ig. 41

  • 5/19/2018 AI novel techniques

    87/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 86 of 178 US 2014/0188462 A1

    ossibility

    module

    Search

    module

    DDB

    agent

    robability

    module

    Fuzzy

    Arithmetic

    module

    Fuzzy logic

    Extension

    module rinciple

    module

    ig. 42

  • 5/19/2018 AI novel techniques

    88/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 87 of 178 US 2014/0188462 A1

    ig. 43

  • 5/19/2018 AI novel techniques

    89/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 88 of 178 US 2014/0188462 A1

    ig. 44

  • 5/19/2018 AI novel techniques

    90/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 89 of 178 US 2014/0188462 A1

    w

    ig. 45

  • 5/19/2018 AI novel techniques

    91/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 90 of 178 US 2014/0188462 A1

    ig. 46

  • 5/19/2018 AI novel techniques

    92/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 91 of 178 US 2014/0188462 A1

    ig. 47

  • 5/19/2018 AI novel techniques

    93/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 92 of 178 US 2014/0188462 A1

    ig. 48

  • 5/19/2018 AI novel techniques

    94/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 93 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    95/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 94 of 178 US 2014/0188462 A1

    T

    ig. 50

  • 5/19/2018 AI novel techniques

    96/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 95 of 178 US 2014/0188462 A1

    ig. 51

  • 5/19/2018 AI novel techniques

    97/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 96 of 178 US 2014/0188462 A1

    ig. 52

  • 5/19/2018 AI novel techniques

    98/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 97 of 178 US 2014/0188462 A1

    ig. 53

  • 5/19/2018 AI novel techniques

    99/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 98 of 178 US 2014/0188462 A1

    ig. 54

  • 5/19/2018 AI novel techniques

    100/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 99 of 178 US 2014/0188462 A1

    ig. 55

  • 5/19/2018 AI novel techniques

    101/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 100 of 178 US 2014/0188462 A1

    ig. 56

  • 5/19/2018 AI novel techniques

    102/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 101 of 178 US 2014/0188462 A1

    ig. 57

  • 5/19/2018 AI novel techniques

    103/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 102 of 178 US 2014/0188462 A1

    ig. 58

  • 5/19/2018 AI novel techniques

    104/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 103 of 178 US 2014/0188462 A1

    ig. 59

  • 5/19/2018 AI novel techniques

    105/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 104 of 178 US 2014/0188462 A1

    ig. 60

  • 5/19/2018 AI novel techniques

    106/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 105 of 178 US 2014/0188462 A1

    ig. 61

  • 5/19/2018 AI novel techniques

    107/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 106 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    108/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 107 of 178 US 2014/0188462 A1

    ig. 63

  • 5/19/2018 AI novel techniques

    109/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 108 of 178 US 2014/0188462 A1

    ig. 64

  • 5/19/2018 AI novel techniques

    110/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 109 of 178 US 2014/0188462 A1

    ig. 65

  • 5/19/2018 AI novel techniques

    111/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 110 of 178 US 2014/0188462 A1

    ig. 66

  • 5/19/2018 AI novel techniques

    112/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 111 of 178 US 2014/0188462 A1

    ig. 67

  • 5/19/2018 AI novel techniques

    113/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 112 of 178 US 2014/0188462 A1

    ig. 68

  • 5/19/2018 AI novel techniques

    114/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 113 of 178 US 2014/0188462 A1

    ig. 69

  • 5/19/2018 AI novel techniques

    115/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 114 of 178 US 2014/0188462 A1

    Degree of

    membersh p

    ig. 70

  • 5/19/2018 AI novel techniques

    116/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 115 of 178 US 2014/0188462 A1

    Degree of

    membersh p

    strength

    ig. 71

  • 5/19/2018 AI novel techniques

    117/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 116 of 178 US 2014/0188462 A1

    ig. 72

  • 5/19/2018 AI novel techniques

    118/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 117 of 178 US 2014/0188462 A1

    ig. 73

  • 5/19/2018 AI novel techniques

    119/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 118 of 178 US 2014/0188462 A1

    ig. 74

  • 5/19/2018 AI novel techniques

    120/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 119 of 178 US 2014/0188462 A1

    ig. 75

  • 5/19/2018 AI novel techniques

    121/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 120 of 178 US 2014/0188462 A1

    ig. 76

  • 5/19/2018 AI novel techniques

    122/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 121 of 178 US 2014/0188462 A1

    ig. 77

  • 5/19/2018 AI novel techniques

    123/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 122 of 178 US 2014/0188462 A1

    ig. 78

  • 5/19/2018 AI novel techniques

    124/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 123 of 178 US 2014/0188462 A1

    ig. 79

  • 5/19/2018 AI novel techniques

    125/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 124 of 178 US 2014/0188462 A1

    ig. 80

  • 5/19/2018 AI novel techniques

    126/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 125 of 178 US 2014/0188462 A1

    ig. 81

  • 5/19/2018 AI novel techniques

    127/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 126 of 178 US 2014/0188462 A1

    ig. 82

  • 5/19/2018 AI novel techniques

    128/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 127 of 178 US 2014/0188462 A1

    ig. 83

  • 5/19/2018 AI novel techniques

    129/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 128 of 178 US 2014/0188462 A1

    ig. 84

  • 5/19/2018 AI novel techniques

    130/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 129 of 178 US 2014/0188462 A1

    Image analyze system

    ig. 85

  • 5/19/2018 AI novel techniques

    131/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 130 of 178 US 2014/0188462 A1

    Above (posit ional

    elat ionship)

    ig. 86

  • 5/19/2018 AI novel techniques

    132/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 131 of 178 US 2014/0188462 A1

    ig. 87

  • 5/19/2018 AI novel techniques

    133/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 132 of 178 US 2014/0188462 A1

    ig. 88

  • 5/19/2018 AI novel techniques

    134/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 133 of 178 US 2014/0188462 A1

    ig. 89

  • 5/19/2018 AI novel techniques

    135/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 134 of 178 US 2014/0188462 A1

    John

    signature

    envelope

    ig. 90

  • 5/19/2018 AI novel techniques

    136/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 135 of 178 US 2014/0188462 A1

    Center

    Of mass

    John

    signature

    ig. 91

  • 5/19/2018 AI novel techniques

    137/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 136 of 178 US 2014/0188462 A1

    A basic curve in

    database as alphabet

    ig. 92

  • 5/19/2018 AI novel techniques

    138/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 137 of 178 US 2014/0188462 A1

    ig. 93

  • 5/19/2018 AI novel techniques

    139/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 138 of 178 US 2014/0188462 A1

    ig. 94

  • 5/19/2018 AI novel techniques

    140/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 139 of 178 US 2014/0188462 A1

    ig. 95

  • 5/19/2018 AI novel techniques

    141/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 140 of 178 US 2014/0188462 A1

    ig. 96

  • 5/19/2018 AI novel techniques

    142/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 141 of 178 US 2014/0188462 A1

    ig. 97

  • 5/19/2018 AI novel techniques

    143/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 142 of 178 US 2014/0188462 A1

    ig. 98

  • 5/19/2018 AI novel techniques

    144/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 143 of 178 US 2014/0188462 A1

    ig. 99

  • 5/19/2018 AI novel techniques

    145/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 144 of 178 US 2014/0188462 A1

    ig. 100

  • 5/19/2018 AI novel techniques

    146/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 145 of 178 US 2014/0188462 A1

    ig. 101

  • 5/19/2018 AI novel techniques

    147/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 146 of 178 US 2014/0188462 A1

    ig. 102

  • 5/19/2018 AI novel techniques

    148/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 147 of 178 US 2014/0188462 A1

    ig. 103

  • 5/19/2018 AI novel techniques

    149/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 148 of 178 US 2014/0188462 A1

    ig. 104

  • 5/19/2018 AI novel techniques

    150/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 149 of 178 US 2014/0188462 A1

    ig. 105

  • 5/19/2018 AI novel techniques

    151/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 150 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    152/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 151 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    153/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 152 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    154/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 153 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    155/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 154 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    156/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 155 of 178 US 2014/0188462 A1

    ig. 111

  • 5/19/2018 AI novel techniques

    157/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 156 of 178 US 2014/0188462 A1

    ig. 112

  • 5/19/2018 AI novel techniques

    158/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 157 of 178 US 2014/0188462 A1

    Input module-- for web

    site or database

    Review

    factors

    Determination

    module

    How often to

    update (or)

    frequency of

    search- for web

    site or database

    Apply search engine

    on the web site or

    database, based on

    the determined

    frequency

    topic

    Dynamic factor (e.g. stock

    valuation is very dynamic &

    changes very often)

    Relevancy factor

    Reliability factor

    Size of the web site or data

    Web site traffic & visitor count

    attern of visitors on web site

    ig. 113

  • 5/19/2018 AI novel techniques

    159/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 158 of 178 US 2014/0188462 A1

    ig. 114

  • 5/19/2018 AI novel techniques

    160/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 159 of 178 US 2014/0188462 A1

    ig. 115

  • 5/19/2018 AI novel techniques

    161/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 160 of 178 US 2014/0188462 A1

    Skeleton

    (thining)

    rimitive representation

    ig. 116

    PLUS

    Coding, using Shape units,

    based on String grammar or

    dictionary

  • 5/19/2018 AI novel techniques

    162/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 161 of 178 US 2014/0188462 A1

    ig. 117

  • 5/19/2018 AI novel techniques

    163/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 162 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    164/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 163 of 178 US 2014/0188462 A1

    ig. 119

  • 5/19/2018 AI novel techniques

    165/243

    F

    m

    e

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 164 of 178 US 2014/0188462 A1

    G

    1

    a

  • 5/19/2018 AI novel techniques

    166/243

    F

    m

    e

    Patent Appl cat on Publ cat on

    Jul. 3, 2014

    Sheet 165 of 178 US 2014/0188462 A1

    G

    1

    b

  • 5/19/2018 AI novel techniques

    167/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 166 of 178 US 2014/0188462 A1

    G

    1

    c

  • 5/19/2018 AI novel techniques

    168/243

    F

    m

    e

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 167 of 178 US 2014/0188462 A1

    G

    1

    d

  • 5/19/2018 AI novel techniques

    169/243

    -

    v

    l

    u

    e

    -

    G

    R

    -

    M

    e

    Patent Appl cat on Publ cat on

    Jul. 3, 2014

    Sheet 168 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    170/243

    A

    c

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 169 of 178 US 2014/0188462 A1

    G

    1

  • 5/19/2018 AI novel techniques

    171/243

    M

    T

    w

    n

    e

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 170 of 178 US 2014/0188462 A1

    G

    1

    g

  • 5/19/2018 AI novel techniques

    172/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 171 of 178 US 2014/0188462 A1

  • 5/19/2018 AI novel techniques

    173/243

    Patent Appl cat on Publ cat on Jul. 3, 2014 Sheet 172 of 178 US 2014/0188462 A1

    A ( ) Ai x

    M

    f d y

    = J

    L P x W - y F

    ( x ) ) ( x ) - y J - d x

    (xmx

    - I p(*)-Ax()-d

    [0364] Therefore, ^ ) becomes identical to g x(v) (for

    any candidate p^), when F(X) is monotonic and Ayis deter

    mined via extension principle from Ax and F(X). This result

    does not hold when F(X) is not monotonic, but it may be used

    as first order approximation, in one embodiment. For

    example, for non-monotonic F(X), still assuming Ayis deter

    mined v ia extension principle from Ax and F(X):

    A y ( y ) = supA(x')

    yy

    where

    x' e {so utions of F~l(y)}

    [0365] Suppose in Y domain, there are N piecewise mono

    tonic regions of F(X). Therefore, there are up to N number o f

    x s as solutions to F- (y), denoted by a set {x ; . . . , x . . . ,

    Xjy}. An event occurring in Y domain, may occur at any of

    {x,}, therefore

    U Px i) _ V P ( - V )

    PY y F' x;)- r j

    A abs

    F' x;))

    [0366] where . indicates, as before, whether

    \th

    mono

    tonic region of F(X) is increasing or decreasing.

    [0367] In an embodiment, is determined by:

    = p -Ay

    y/nx

    p(y)-Ar(y)-dy

    \

    - ) supA (x)p x(xi)dx

    l i d Vx

    N rn

    f

    = J m i

    A ( Xi ) p ( X i ) d x

    Ax i) p -d

    [0370] In one embodiment, where, e.g., due to relative sym

    metry in F(X) and AJx), ^ /x ) is the same for Vx'e {x,.}, then

    = v , because (y)=supVx, (x')= (x,) for any x,..

    [037 ] Likewise, in one embodiment, where ^C x) is zero

    or negligible in a region (e.g., for N=2), then = v , as the

    contribution to comes from the dominant mono onic region

    of F(X).

    [0372] In one embodiment, deviation of from v is esti-

    mated/de termined by determining difference between supVx,

    A(x') and various A(x,)s.

    [0373] In one embodiment, where

    Ay(y)

    is provided via a

    proposition (instead of being determined via extension prin

    ciple through F(X) and Ax), A ,y(y)is determined (via exten

    sion principle) and compared to

    Ay(y)

    If there is a match,

    then is estimated using v, e.g., as described above.

    [0374] In one embodiment, as for example depicted in FIG.

    ( ), llaj/w) is determined by a series of mapping, aggrega

    tion and maximization between px,v, and domains.

    [0375] One embodiment, for example, uses the concepts

    above for prediction o f stock market, parameters related to

    economy, or other applications. Consider the following

    example:

    Example

    [0376] We are given this information (for anticipation and

    prediction): There probability that the price o f oil next month

    is significantly over 00 dollars/barrel is not small.

    [0377] Assume that the ticket price for an airline from

    Washington D.C. to New York is in the form of (Y=F(X)

    =a X+a2), where X is the next months estimated price of oil

    (in dollars/barrel) and Y is the ticket price (in dollars). For this

    example, further assume that a = .5 and a2= 50, i.e., Y= .5

    X+ 50. Then, we have the following questions:

    [0378] q j: What is the Price of the Ticket from Washington

    D.C. to New York?

    [0379] X represents (the price of oil the next month), Ax is

    (significantly over 00 dollars/barrel) and Bx is (not small).

    Then, (X, Ax, Bx) is a Z-valuation restricting the probability of

    (X) the price of oil the next month. In this example, as

  • 5/19/2018 AI novel techniques

    194/243

    US 20 4/0 88462 A

    5

    Jul. 3, 20 4

    depicted in FIG. 2(a), significantly over is represented by a

    step-up membership function membership function, Ax,with

    a fuzzy edge from 00 to 30. Also, as depicted in FIG. 2(b),

    not small is represented by a ramp-up membership function

    membership function,

    Bx(v),

    with the ramp edge at v from 0

    to 50%. Note that v is the probability measure of Ax. The

    answer to , also represented in a Z-valuation, is (Y,

    Ay,

    By),

    where Y represents the price of the ticket,

    Ay

    represents a

    fuzzy set in Y, and Byrepresents the certainty o f Z-valuation

    for the answer. Here both

    Ay

    and

    By

    are being sought by q j. In

    one embodiment, an X domain is created from [0, 250], a

    form o f Normal Distribution, N(mx, x), is assumed for p_(u)

    (where u is a value in X domain). A set of candidate

    px

    are

    setup by setting a range for mx, e.g., [40,200], and a range for

    x, e.g., [0, 30]. Note that value of zero for x, signifies delta

    function which is estimated by a very small value, such as

    0.0 (in this case). In one embodiment, the range of (mx, x)

    is chosen so that they cover various categories of distributions

    with respect to ^ , as discussed previously. For example,

    maximum x is determined, in one embodiment, as a factor

    (e.g., between to 3) times the maximum ramp width of ^ x.

    In this example, maximum x is taken as ( times) ramp width

    of

    Ax

    of 30 (= 30- 00). In one embodiment, mx range is

    determined with respect to

    Ax(e.g.,

    beginning o f the ramp, at

    00) and maximum x (e.g., 30). For example, mx range is

    taken to cover a factor of x (e.g., 2 to 3) from ramp (e.g.,

    bottom at 00 and top at 30). In one embodiment, the range

    of X domain is also taken to encompass mx range by a factor

    of x (e.g., 2 to 3) at either extreme (e.g., if valid in the context

    of X). In one embodiment, as shown in FIG. 2(c), X range/

    values are used to find the corresponding Y values based on

    F(X). Given that qj looks for Ayas part of the answer, one

    embodiment uses extension principle determine the member

    ship function of

    Ay

    in Y,

    Ay.

    In one embodiment,

    Ay

    is

    determined by determining the corresponding Y values fo rX

    values which identify

    Ax

    (e.g., X values of ramp location or

    trapezoid corners). In such an embodiment, when F(X) is

    monotonic in the range of X domain, for X=x0, the corre

    sponding y0 are Ayare determined as: y0=F(x0) and Ay(y )

    = x x X o ) .

    In one embodiment, where multiple values of X

    exist for F- (y), xj>(y)=sup (x(x(x')) for all x' in X domain

    where y0=F(x'). In one embodiment, Ay(y)is determined at

    every y corresponding to every x inX domain. In one embodi

    ment, the range o f resulting Y values is determined (e.g., min

    and max of values). For example, the range ofY is [ 50, 525].

    In one embodiment, Ay(y)is determined as an envelope in Y

    domain covering points (F(x'), ^ x(x')) for all x' in X domain.

    The envelope then represents sup ( Ax(x)).In one embodi

    ment, Y domain is divided in bins (for example of equal size).

    For various x values, e.g., Xj an dx 2, where values of F(x) fall

    in the same bin, maximum

    Ax(x)

    for those xs are attributed

    to the bin. In one embodiment, y values signifying the bins are

    used for determining the probability measures o f Ay.

    In one

    embodiment, the original y values corresponding to the set of

    x values used in X domain are used to determine probability

    measures of Ay. In such an embodiment, for example, the

    maximum corresponding Ax attributed to the bin is also

    attributed to such y values. For example, as depicted in FIG.

    12(d), Ayis calculated for corresponding y values.

    [0380] In one embodiment, the probability measure of Ax,

    (i.e., v), is determined by dot product of px and Ax.In one

    embodiment, px is evaluated at x values in X domain (e.g.,

    against a set o f points between xmiandxmax).Similarly, Ax

    is determined at the data set {x,} in X domain (or at signifi

    cant, e.g., corner points of Ax).In one embodiment, the dot

    product is determined by evaluating

    vP= iPj i>x( i)

    [038 ] In one embodiment, v is determined via piecewise

    evaluation (e.g., using exp and erf functions when p^is Gaus

    sian). In one embodiment, v is determined for various candi

    dates for px . For example, taking px, as N(mx, x) as

    described above, v is determined for various (mx, x) combi

    nation, as depicted in FIGS. 2

    (e)-(f).

    The contour maps of v

    versus (mx, x) is depicted in FIGS. 2(g)-(h).As depicted in

    these figures, at low x (delta function limit of p^), v(mx, x)

    becomes ^ n ) . At higher, x smoothing effect takes over

    for intermediate values o f v.

    [0382] Given restriction not small, Bx, in one embodiment,

    the test score for each candidate p^i s evaluated, by evaluating

    the truth value of its corresponding probability measure of Ax,

    v, in Sx(D). In one embodiment, the assignment o f test score

    is used for

    px

    candidates corresponding to a particular set of

    v values (e.g., those used to define Sx(D) such as the ramp

    location or trapezoid comers). In such an embodiment, bins

    are associated with such particular vs to determine px can

    didates with corresponding v values within a bin. Those can

    didates, are for example, identified by those (mx, x) at or near

    particular contour lines of interest (e.g., marked as v ; v2, and

    v3 at v values of 0,0.25 and 0.5, on FIG.

    12(h),indicating the

    beginning, middle, and end of the ramp for Bx as shown in

    FIG.

    12(b)).

    FIG. 2

    (!)

    depicts, for example, the test score for

    a given (mx, x) by evaluating the corresponding v(mx, x)

    against _gx(v). FIG. 2(j) depicts, for example, depicts a

    contour map of Sx(v(mx, x)) on (mx, x) domain. For

    example, ; 2, and 3 at values of 0, 0.5, and marked on

    the contour map correspond to v contours for v ; v2, and v3.

    [0383] In one embodiment, the probability measure of Ay,

    (i.e., ) , is determined by dot product of pr and Ay.In one

    embodiment, p r is determined via application of extension

    principal. In one embodiment, p^s for points in {x,} in X

    domain are attributed to their corresponding points {y,} in Y

    domain. Such an embodiment accommodates having mul

    tiple y, s have the same value (or belong to the same bin in Y

    domain). Alternatively, or additionally, in one embodiment,

    bins are setup in Y domain to determine pr for each bin by

    summing over corresponding p /s (from X domain) where

    F(x,) is within the Y-bin. In such an embodiment, , for

    example, is determined by taking pr and Ay

    dot product in Y

    domain overY bins. However, in one embodiment, pr and Ay

    dot product is essentially determined in X domain, for

    example by:

    [0384] In one embodiment, is determined via piecewise

    evaluation. In one embodiment, is determined for various

    candidates for

    px .

    For example, taking

    px,

    as N(mx, x) as

    described above, is determined for various (mx, x) com

    bination, as depicted in FIGS. 2

    (k)-(l).

    These contour maps

    of are identical to those of v versus (mx, x) (depicted in

    FIGS. 2(e) and (g)),as expected, since F(X), in this example,

    is monotonic (as explained previously).

    [0385] In one embodiment, to obtain the relationship

    between and restriction test scores from Bx, to determine

    By,bins are setup in domain (e.g., between

  • 5/19/2018 AI novel techniques

    195/243

    US 20 4/0 88462 A

    6

    Jul. 3, 20 4

    ( m x, x), is mapped to a bin in domain. In such an embodi

    ment, each (mx, x) becomes associated to a bin (e.g.,

    identified by an ID or index). Multiple (mx, x) may map to

    the same bin. In one embodiment, through this association

    with the same bin, the maximum Sx(v(mx, x)) for (mx,

    x)s associated with the same bin is determined. For

    example, FIG. 2

    m - n

    depict the contour maps of Max

    Sx(v(mx, x)) for various (mx, x). In one embodiment,

    maximum g x(v(mx, x)) is associated to the bin of the

    corresponding (mx, x)s. In one embodiment, unique set of

    bins is determined that are associated with at least one (mx,

    x). Associated maximum Sx(v(mx, x)) is determined per

    value representing the corresponding bin. In one embodi

    ment, this maximum g x(v(mx, x)) per is provided as the

    result for Sj,( ) . For example, FIG. 2(o) depicts _Sj,( ) for

    this example, which very closely resembles Bx v , as

    expected, because F(X) is a monotonic, as explained previ

    ously.

    [0386] Therefore, in this example, assuming that Ay y

    (ramping up from 300 to 345) indicates somewhat higher than

    300, and that Sj,( ) maps to more than medium (i.e., not

    small) (in this context), then the answer to qj becomes: The

    probability of the price o f the ticket being somewhat higher

    than 300 is more than medium.

    [0387] q2: What is the Probability that the Price of the

    Ticket (from Washington D.C. To New York) is not Low?

    [0388] In this question, Y still presents the price of the

    ticket; however,Ayis already specified by^ as not low in this

    context. Parsing the question, Prob(Y is A^) or

    By

    in Z-valu-

    ation of (Y, Ay, By) is the output. In one embodiment, the

    knowledge database is searched to precisiate the meaning of

    not low in the context ofY. In one embodiment, in parsing qj,

    not is recogn ized as the modifier of a fuzzy set low in context

    ofY. In one embodiment, the knowledgebase is used to deter

    mined, for example low is a step down fuzzy set with its ramp

    located between 250 and 300. In one embodiment, the modi

    fiers are used to convert the membership functions per truth

    system(s) used by the module. For example, FIG. 3(a)

    depicts Ay y for not low. In one embodiment, Ayis deter

    mined for every y in {y,} where y,=F(x,). In one embodiment,

    Ayis determined via a piecewise evaluation/lookup from Ay.

    [0389] In one embodiment, the association of (x y,) is used

    to attribute px values to (x y,). Comparing with q ; in one

    embodiment, v and Axare reused or determined similarly.

    For example, FIGS. 2()-(c) and 2e - j are applicable to

    q2, as in this example,

    Ax

    (FIG. 2(a)),

    Bx

    (FIG. 2(6)), and

    F(X) (FIG. 2(c)) are still the same; v determination/calcu-

    lation (FIGS. 2(e)-(/z)) is still applied the same; and Bxis

    applied similarly to v, in o rder to map

    Bx

    to candidate p^s

    (FIGS. 2(/)-(/)) However, given

    Ay

    is provided via by q2

    (instead of, e.g., an extension principle via

    Ax ,

    the corre

    sponding probability measures, , is expected to be different.

    For example, FIGS. 3(6)-(c) depict (as dot product of A

    and pr ) per various candidate distribution, i.e., (mx, x). Com

    pared to in qj (FIGS. 2(&)-(/)), the contours appear to be

    shifted to lower values of mx, because the shift in the fuzzy

    edge of

    Ay

    (from qj to q2) toward lower ticket prices, causes

    similar shift in contours in this example, as F(X) is mono

    tonic and increasing. At any rate, contours o f and v are no

    longer collocated on (mx, x) given Ay was not obtained

    through applicat ion of the extension principle to F (X) and Ax.

    The maximum g x(v(mx, x), for example obtained via appli

    cation of bins, is depicted in FIGS. 3(cf)-(e). In one

    embodiment, through association with bins, the corre

    sponding Byis determined obtaining Sx(v(mx, x)) per , as

    shown for example in FIG. 3(/). One embodiment, varies the

    number/size of bins to compensate the scarcity of distribu

    tion candidate to provide the maximum Sx(v(mx, x)) at a

    particular bin. For example, bin factor of 5 was applied to

    obtain the results depicted in FIGS. 3d - f ,i.e., the number

    of bins was reduced from 0 to 20, while the bin size was

    increased from 0.0 to 0.0526. With bin factor of , the

    result for g x( ) are depicted in FIG. 3(g). In one embodi

    ment, the bin factor is varied within a range (e.g., to 20)

    to reduce the number of quick changes (or high frequency

    content) in the resulting Bymembership function, beyond a

    threshold. In one embodiment, bins are determined for

    which there appear to be inadequate candidate distribution

    (e.g., based on quick drops in the membership function o f B ).

    For such values, a set of probabi lity distributions, i.e., (mx,

    x)s, are determined (e.g., those at or close to the correspond

    ing contours). Then, more finely distributed parameters/

    distributions are used to increase the varied candidates con

    tributing to maximum levels of Sj,( ). In one embodiment,

    an adaptive process is used to select various size bins for

    various values. In one embodiment, an envelope-forming or

    fitting process or module, e.g., with an adjustable smoothing

    parameter or minimum-piece-length parameter, is used to

    determine one or more envelopes (e.g., having a convex

    shape) connecting/covering the maximum points of resulting

    Sj,() , as for example depicted as dotted line in FIG. 3(g).

    [0390] In one embodiment, the resulting _Sj,( ) is provided

    to other modules tha t take membership function as input (e.g.,

    a fuzzy rule engine) or store in a knowledge data store. In one

    embodiment, the resulting Sj,( ) (e.g., in FIG. 3(/)) is com

    pared with templates or knowledge base to determine the

    natural language counterpart fo r B ,. In one embodiment, the

    knowledge base, for example, includes various models of

    membership funct ion (e.g., in [0, ] vs. [0, ] range or a subset

    of it) to find the best fit. In one embodiment, fuzzy logic rules

    (including rules for and, or, not, etc.) are used to generate

    more models. In one embodiment, fuzzy modifiers (e.g., very,

    somewhat, more or less, more than, less than, sort o f slightly,

    etc.) are used to construct modified models. In one embodi

    ment, the best fit is determined by a combination o f models

    from the knowledge base. One embodiment uses adjustable

    parameter to indicate and control the complexity of combi

    nations of models for fitting B ,.

    [039 ] In one embodiment, _Sj,( ) (e.g., in FIG. 3(/)) is

    determined to map to very probable. Therefore, the answer to

    q2 becomes: The price o f the ticket is very probably not low.

    [0392] q3: What is the Probability that the Price of the

    Ticket (from Washington D.C. To New York) is High?

    [0393] As in q2, q3 presents

    Ay

    as high. In one embodiment,

    within the context,

    Ay

    is given, for example, as ramp located

    at 350 (with a width of 50), as depicted in FIG. 4(a). Prob

    ability measure of

    Ay

    (i.e., w) is determined as above. 4(6)-

    (c) depict contour maps, and indicate the shifting of the

    contour lines to higher mx values (in the reverse direction

    compared to the scenario of q2). However, comparing with

    the contour map of Bxin FIG. 2(/), it is evident that at x of

    20 (contour marked as 3), Bxis , while in such a region, all

    potential values of are covered (from 0 to ) as shown in

    4(c). Therefore, all values o f s are definitely possible (i.e.,

    not restricted by application of Ay). The resulting By is

    depicted in 4d ,indicating for all possible values with the

    counterpart natural language term anything. Therefore, in this

  • 5/19/2018 AI novel techniques

    196/243

    US 20 4/0 88462 A

    7

    Jul. 3, 20 4

    example, the answer to q3 is: The probability o f the price of

    the ticket being high can be anything.

    [0394] FIG. 09 is an example of a system described above.

    Fuzzy Control with Z-Number

    [0395] As mentioned previously, an extension of a fuzzy

    control sys tem that uses fuzzy rules can employ Z-numbers a

    either or both antecedent and consequent portion o f IF TFiEN

    fuzzy rule. Regularly, in executing a fuzzy rule, such as (IF X

    is A TFiEN Y is B), the value o f variable X used in antecedent,

    is determined (e.g., from an Input or from defuzzification

    result o f other relevant rules) to be x0. In one embodiment, the

    truth value o f the antecedent is evaluated given the knowledge

    base (e.g., X=x0) as the truth va lue o f how (X is A) is satisfied,

    i.e., ^ (x 0). The truth value o f the antecedent (assuming more

    than a threshold to trigger the consequent) is then applied to

    the truth value o f the consequent, e.g., by clipping or scaling

    the membership function o f B by ^ (x 0). Firing of fuzzy rules

    involving the same variable at the consequent yields a super

    imposed membership function for Y. Then, a crisp value for Y

    is determined by defuzzification ofY s resulting membership

    function, e.g., via taking a center of mass or based on max i

    mum membership value (e.g., in Mamdanis inference

    method), or a defuzzied value for Y is determined by a

    weighted average of the centroids from consequents of the

    fuzzy rules based on their corresponding truth values o f their

    antecedents (e.g., in Sugeno fuzzy inference method).

    [0396] In one embodiment, where the antecedent involves a

    Z-number, e.g., as in the following fuzzy rule:

    [0397] IF (X is Z) THEN (Y is C), where Z=(Ajr, B^) and X

    is a random variable,

    [0398] the truth value of the antecedent (X is Z) is deter

    mined by how well its imposed restriction is satisfied based

    on the knowledge base. For example, if the probability or

    statistical distribution o f X is

    px,

    the antecedent is imposing a

    restriction on this probability distribution as illustrated earlier

    as:

    A u)px u)du

    1 Count

    Px ~K, ' Countj

    [040 ] where u , and Count, are the width and population

    of

    ,h

    bin. This way, a running count of population of bins is

    tracked as more sample data is received.

    [0402] In one embodiment, Z-number appears as the con

    sequent of a fuzzy rule, e.g.,

    [0403] IF (Y is C) THEN (X is Z), where Z={AX,B^) and X

    is a random variable.

    [0404] As other fuzzy rules, when the rule is executed, the

    truth value of the antecedent (i.e., c (y0), where y0 is a value

    for Y, that is input to the rule) is applied to the restriction

    imposed by the consequent. The restriction imposed by the

    consequent is, e.g., on the probability distribution of X, which

    is the variable used in the consequent. Given the antecedents

    truth value ofTant(between 0 and ), in one embodiment, the

    contribution o f the rule on the restriction of p^i s represented

    by

    (J/.ii, u)px u)du)c ipped or sca ed by Tant

    [0405] In one embodiment, Z-number appears in an ante

    cedent of a fuzzy rule, but instead o f the quantity restricted

    (e.g., px),other indirect knowledge base information may be

    available. For example, in the following fuzzy rule:

    [0406] IF (X is Z) THEN (Y is C), where

    Z= AX,

    B^) and X

    is a random variable,

    [0407] suppose from input or other rules, it is given that (X

    is D), where D is a fuzzy set in X domain. In one approach, the

    hidden candidates of px (denoted by index i) are given test

    scores based on the knowledge base, and such test scores are

    used to evaluate the truth value of the antecedent. For

    example, the truth value o f the antecedent is determined by:

    Tant = sup stAs' )

    where

    tst - I u)pt u)du

    [0399] where u is a real value parameter in X domain. In

    one embodiment, the probability distribution of X, px,is used

    to evaluate the truth value of the antecedent, by evaluating

    how well the restriction on the probability distribution is met.

    In one embodiment, an approximation for p^is used to deter

    mine the antecedents truth value. Denoting

    pX

    as an estimate

    or an input probability distribution for X, the antecedent truth

    value is determined as:

    A u)pxi{u)du

    [0400] An embodiment, e.g., in a fuzzy control system or

    module, uses multiple values of u to estimate px. In one

    embodiment, the values of u are discrete or made to be dis

    crete through bins representing ranges o f u, in order to count

    or track the bin population representing the probability dis

    tribution of X. For example, at bin,, p_yis estimated as:

    S j = ,

    A {u)pi{u)du

    [0408] In one embodiment, various model(s) of probability

    distribution is employed (based on default or other knowl

    edge base) to parameterize Vi. For example, a model of nor

    mal distribution may be assumed for

    px

    candidates, and the

    corresponding parameters will be the peak location and width

    of the distribution. Depending on the context, other distribu

    tions (e.g., Poisson distribution) are used. For example, in

    Bus usually arrives about every 0 minutes, where X is bus

    arrival time, Ax is about 0 minutes, and B^ is usually, a

    model o f probability distribution for bus arrival time may be

    taken as a Poisson distribution with parameter :

    P i u ) = - i

  • 5/19/2018 AI novel techniques

    197/243

    US 20 4/0 88462 A

    8

    Jul. 3, 20 4

    [0409] Then, the antecedent truth value is determined by

    Tant = sup st ts )

    [04 0] In one embodiment, the truth value of he antecedent

    in a fuzzy rule with Z-number, e.g.,

    [04 ] IF (X is Z) THEN (Y is C), where

    Z={AX

    B^) andX

    is a random variable,

    [04 2] is determined by imposing the assumption that the

    probability distribution p^ is compatible with the knowledge

    base possibility restriction (e.g., (X is D)). Then, a candidate

    for pjj.may be constructed per D.For example, by taking a

    normalized shape o f possibility distribution:

    candidates of px (denoted by index i) are given test scores

    based on the knowledge base, and such test scores are used to

    evaluate the truth value of the antecedent. For example, in one

    embodiment, the truth value o f the antecedent is determined

    by:

    Tan! = SUp tSjA s'i )

    where

    tS j = I c ( u ) p i ( u ) d u

    t s -= B \ I A{u)pi{u)du

    D{u)

    [04 3] In one embodiment, the compatibil ity assumption is

    used with a model o f distribution (e.g., based on default or

    knowledge base). For example, assuming a model of normal

    distribution is selected, the candidate probability distribution

    is determined as follows:

    (a- D,)2

    P X (U ) = ( 2'r2'Z)width

    S2 -r-D wdth

    [04 4] where

    w

    /

    and Dcentare the width and centroid

    location of (e.g., a trapezoid) fuzzy set D, and r is a constant

    (e.g., /VT20.3) or an adjustable parameter.

    [04 5] In one embodiment, the truth value of he antecedent

    in a fuzzy rule with Z-number, e.g.,

    [04 6] IF (X is Z) THEN (Y is C), where Z=(Ajr, B^) andX

    is a random variable,

    [04 7] is determined by simplifying the Vi examinat ion in

    Tant = sup stAs ' )

    [04 8] by taking a candidate for px based on a model of

    probability distribution which would be compatible with

    fuzzy set B. Then, the antecedent truth value is determined

    based on such compatible probability distribution p0, as

    Tat=ts t s '

    [04 9] In one embodiment, such optimized probability dis

    tribution is determined based on the knowledge base (e.g., X

    is D). For example, when the model distribution is a normal

    distribution, in one embodiment, the center position (param

    eter) of the distribution is set at the centroid position o f the

    fuzzy set D, while the variance of the probability distribution

    is set based on the width o f fuzzy set D.

    [0420] In one embodiment, an input proposition in form of

    Z-valuation, e.g., (X, Ax Br) or (X is Z) whereZ=(AXBr)

    and X is a random variable, is used to evaluate an antecedent

    of a fuzzy rule, e.g.,

    [042 ] IF (X is C) THEN (Y is D), where C and D are fuzzy

    sets in X and Y domains, respectively. In one embodiment,

    Example 2

    [0422] In one embodiment, a fuzzy rules database includes

    these two rules involving Z-valuation (e.g., for a rule-based

    analysis/engine). Rule : If the price of oil is significantly

    over 00 dollars/barrel, the stock of an oil company would

    most likely increase by more than about lOpercent. R ule2: If

    the sales volume is high, the stock of an oil company would

    probably increase a lot. There is also this input information:

    The price of oil is at 20 dollars/barrel; the sales volume is at

    S20B; and the executive incentive bonus is a function of the

    companys stock price. The query or output sought is:

    [0423] q4: What is the Likelihood of High Executive Incen

    tive Bonuses?

    [0424] In one embodiment, the rules engine/module evalu

    ates the truth value of the rules antecedents, e.g., after the

    precisiat ion of meaning for various fuzzy terms. For example,

    the truth value of Rule ls antecedent, the price of oil is

    significantly over 00 dollars/barrel is evaluated by taking the

    membership function evaluation of 20 (per information

    input) in fuzzy set significantly over 00 dollars/barrel (see,

    e.g., FIG. 2(a)). Therefore, this antecedent truth value (E)

    becomes, in this example, 0.67. Similarly, the truth value of

    Rule 2s antecedent, the sales volume is high, is evaluated by

    using (e.g., contextual) membership function Hi hfor value

    S20B. Lets assume the antecedent truth value (t2) is deter

    mined to be 0.8, in this example. In firing the Rules, the truth

    values of antecedents are imposed on those o f consequents.

    Rule l s consequent, is a Z-valuation (X, A ; Bj) where X

    represents the change in stock, represents more than about

    + 0 percent, and B represents most likely. Rule 2s conse

    quent, is a Z-valuation (X, A2, B2) where A2 represents a lot,

    and B represents probably. The consequent terms impose

    restriction on

    px

    therefore, the truth values o f the consequent

    (i.e., restriction on p^) is determined by triggering of the

    Rules. In one embodiment, the restrictions are combined,

    e.g., via correlation minimum and Min/Max inference or

    correlation product and additive inference. In one embodi

    ment, a model of px e.g., N(mx, x), is used to apply the

    restriction on p^to restrictions on parameters o f the distribu

    tions (e.g., (mx, x)). In one embodiment, the range of X

    domain is taken from the knowledge base. In one embodiment

    X domain range(s) is determined from characteristics o f

    A 1

    and/or A2. In one embodiment, a consolidated range(s) is

    determined in X domain. One or more sets o f X values are

    used to evaluate p_(mx, x), A1, an dA2.In one embodiment,

    probability measures v, and v2 forA 1and A2, respectively, are

    determined for candidate py s, e.g., for various (mx, x). The

  • 5/19/2018 AI novel techniques

    198/243

    US 20 4/0 88462 A

    9

    Jul. 3, 20 4

    possibility measures of vj andv 2 inB j an dB 2 are determined

    by evaluating g i /u ) and g 2(v2), e.g., for various (mx, x).

    These possibility measures are test scores imposed on the

    probability distribution candidate for X (e.g., identified by

    (mx, x)) via the consequents of the triggered rules. There

    fore, in one embodiment, the fuzzy rule control system uses

    the restrictions on candidate distributions. For example, in a

    control system employing correlation minimum and Min/

    Max inference, the restriction on p(n x, x) is determined as

    follows, e.g., for various (mx, x):

    P x (m x , crx)= max(min( B j ( j ( m x , crx)), tj))

    [0425] where j is an index for triggered fuzzy rule (in this

    example, from to 2).

    [0426] As an example, in a control system employing cor

    relation product and additive inference, the restriction on

    Px(n x, x) is determined as follows, e.g., forvarious (mx, x):

    pJm x, crx) = i^ ^ Bj(Vj(mx,

  • 5/19/2018 AI novel techniques

    199/243

    US 20 4/0 88462 A

    20

    Jul. 3, 20 4

    mined by minim um o f individual ts,s. In one embodiment, ts

    is determined via averaging, or weighted (w,) averaging:

    2 W ;

    ts = ave tSi) or

    V

    wk

    [0435] In one embodiment, where not all signature param

    eters are used, relevant, or available for A, then a subset of

    those signature parameters that are used, relevant, or available

    for A is used to determine ts, e.g., by limiting taking minimum

    or averaging operations based on those signature parameters.

    For example,

    ts= min (to;)

    Subject to P; {re evant signature parameters to A}

    [0436] In such an embodiment, the relevant signature

    parameters for A are identified, for example, v ia a query in the

    model or knowledge database.

    [0437] In one embodiment, for example, when minimum of

    ts,s are used to determine ts, the irrelevancy of a signature

    parameter with respect to A may be expressed as a truth

    membership function of forall possibilities. Forexample, as

    depicted in FIG. 5(a), Aj>A is flat (= ) for all u^.s, and

    therefore, ts . is (assuming maximum of Bj>jis at some u2).

    Thus, in this case, the contribution of ts^. in ts effectively

    disappears.

    [0438] In one embodiment,

    AyP ,

    is determined through

    empirical methods, user settings, or training sets. For

    example, in one embodiment, N training set engine sounds

    (denoted as

    Tk

    with k from to N) are used to determine

    Aj>r

    In one embodiment, the truth values for the training element

    Tk

    with respect to signature parameters are determined (e.g.,

    as a crisp number, range, or a fuzzy set). For example, as

    depicted in FIG. 5(6), the truth value of the training element

    Tkin signature parameter P,., is determined (denoted asvk ),

    for example through an expert assignment, rule evaluation, or

    functional/analytical assessment. In one embodiment, the

    membership value of Tj. in A is (denoted as mk A determined,

    e.g., by user/expert, expert system, or via analytical methods.

    mky

    may have crisp or fuzzy value. In one embodiment, the

    contribution of Tkto is determined similar to the execu

    tion o f the consequent of a fuzzy rule, e.g., the contribution of

    vk

    is scaled or clipped by

    mky

    as depicted in FIG. 5(6). For

    example, as depicted, the tru th value o f Tj in P,. is a crisp value

    Vj , and the truth value of Tj in A is n q^ . Thus, the contri

    bution of Tj to

    AyP

    appears as a dot at (vj , m ^ ). Another

    example is the contribution of T2 to A^ where the truth value

    of T2 in P, is a fuzzy value v2 and the tru th value o f T2 in A

    is m2^. Thus, the contribution of T2 to J > appears as a

    clipped or scaled membership function as depicted in FIG.

    5(6). In one embodiment, is determined as the envelope

    (e.g., convex) covering the contributions of T^s to AyP ,for

    example as depicted in FIG. 5(6). In one example, truth

    value bins are set up in u,. to determined the maximum con

    tribution from various T^s for a given u, (bin) to determined

    1

    lAJ>i

    [0439] In one embodiment, user/expert assigns verity

    membership values for Tkin A.

    [0440] In one embodiment, a module is used to determine

    correlation between the various type sounds and the corre

    sponding engine diagnosis (by for example experts). In one

    embodiment, the correlation is m ade between the signature

    parameters of he sound and the diagnosis (e.g., in for of fuzzy

    graphs or fuzzy rules). In one embodiment, a typical and

    highly frequent type of sound may be identified as the signa

    ture parameter (e.g., RattlingSlapping may be taken as a

    signature parameter itself). Therefore, in one embodiment,

    the creation of new signature parameters may be governed by

    fuzzy rules (e.g., involving configurable fuzzy concepts as

    typical for similarity and frequent). In one embodiment,

    the reliability and consistency of the rules are enhanced by

    allowing the training or feedback adjust A ..

    [044 ] In one embodiment, such diagnosis is used an

    autonomous system, e.g., in self-healing or self-repair, or

    through other systems/subsystems/components.

    [0442] In one embodiment provides music recognition via

    similar analysis of its signature parameters and comparison

    against those from a music library/database. In one em bodi

    ment, the categories o f music (e.g., classic, rock, etc) may be

    used as fuzzy concept A in this example.

    [0443] q5: What is the Probability of Loose Timing Chain,

    when the Engine Sound is a Loud Tick, Tick, Tack, Tack

    and it Gets Worse when Revving the Engine?

    [0444] In one embodiment, as shown by q5, the specifica

    tion o f an input to the system is not in form o f the actual sound

    engine (e.g., wave form or digitized audio), but a fuzzy

    description of the sound. A conversion process evaluates the

    fuzzy description to find or construct a sound/attributes (e.g.,

    in the data store) which may be further processed by the rules.

    For example, in one embodiment, within the context, the

    module interprets fuzzy descriptions Tick and Tack as a

    tonal variation of abrupt sound. In one embodiment, the

    sequence of such descriptions is interpreted as the pattern o f

    such sounds. With these attributes, in one embodiment, sig

    nature parameters are determined, and as described above, the

    test score related to whether Tick, Tick, Tack, Tack is Rat

    tlingSlapping is determined. The evaluation of the fuzzy rule

    predicate provides the test score for the limiting truth score

    for the consequent, wh ich is a restriction on the probability of

    loose timing chain.

    [0445] In one embodiment, e.g., in music recognition, simi

    lar fuzzy description of music is used to determine/search/

    find the candidates from the music library (or metadata) with

    best match(es) and/or rankings. When such a description

    accompanies other proposition(s), e.g., a user input that the

    music is classical, it would place further restrictions to nar

    row down the candidates, e.g., by automatic combinations of

    the fuzzy restrictions, as mentioned in this disclosure or via

    evaluation o f fuzzy rules in a rules engine.

    Example 4

    [0446] In this example, suppose these input propositions to

    system: p the weather is seldom cold or mild. p2: Statisti

    cally, the number o f people showing up for an ou tdoor swim

    ming pool event is given by function having a peak of 00 at

    90 F., where X is the weather temperature:

    Y= F X) = max{/O x|/ - abs^25 f ) )

    [0447] q6: Flow Many People Will Show Up at the Swim

    ming Event?

    [0448] In one embodiment, the precisiation of input propo

    sition is in Z-valuation (X, Ax, Bx), where Ax is cold or mild

    and Bx is seldom. For example, as depicted in FIG. 6(a),

    Ay

  • 5/19/2018 AI novel techniques

    200/243

    US 20 4/0 88462 A

    2

    Jul. 3, 20 4

    is depicted as a step-down membership function with ramp

    from 70 F. to 85 F., representing the fuzzy edge of mild on

    the high side, and as depicted in FIG. 6(6), Ayis depicted as

    a step-down membership function with ramp from 0% to

    30%, representing seldom.

    [0449] In one embodiment, the parsing of q6 results in an

    answer in form of Z-valuation, (Y,

    Ay,

    By) form, where Y is

    the number o f people showing up for an outdoor swimming

    pool event. In one embodiment, as described in this disclo

    sure, a candidate

    A

    is determined using F(X) and via

    extension principle. For example, as depicted in FIG. 6(c),

    Ay(without taking maximum possibility) is determined for X

    ranging from 45 F. to 20 F. Given non-monotonic nature of

    F(X) in this example, same Y (or bin) maps to multiple Xs

    with different membership function values, as depicted in

    FIG. 6(c). The resulting Ay,by maximizing membership

    functio ninaY (bin) is depicted in FIG. (d).Forexample, in

    one embodiment, this

    Ay

    maps to quite significantly less than

    80, based on the knowledge database, context, and models. In

    one embodiment, for example, a probability Gaussian distri

    bution is selected for

    px,

    N(mx, x), with mx selected in [60,

    95] and x selected in (0, 5]. In one embodiment, the corre

    sponding probability measure o f Ax (denoted asp) is deter

    mined for various candidate pys. For example, FIGS. 6(e)-

    (f)showy (and its contours) fo r various (mx, x). As described

    in this disclosure, the test score based on Bxfor various (mx,

    x) is determined as depicted in FIG. 6(g). As described in

    this disclosure, the probability measure o fAy(denoted as )

    is determined for various vs or p^s. Forexample, as depicted

    in FIGS. (h)-(), contours are shown for various values of

    (mx, x). As described in this disclosure, the maximum

    Bx

    per

    (bin)is determined, for example as depicted in FIG. 6(/).

    In one embodiment,

    By

    is determined as described in this

    disclosure, and is depicted in FIG. 6(6). In one embodiment,

    comparison o f the resulting Byto the model database indi

    cates that

    By

    maps to more or less seldom. In one embodi

    ment, the answer to q6 is provided as: More or less seldom, the

    number o f people showing up for an outdoor swimming pool

    event, is quite significantly less than 80.

    [0450] q7 : What are the Odds that the Weather is Hot?

    [045 ] In one embodiment, the answer is in a Z-valuation Y,

    Ay,By) form, where Y is temperature (same as X, i.e., Y=F

    (X)=X). q6 provides Ayas hot, as for example depicted in FIG.

    7(a). As described in this disclosure, in one embodiment, the

    probability measure ofAj, is determined (e.g., see FIG. (b)),

    and

    By

    is determined (e.g., see FIG. 7(c)). In one embodi

    ment, this

    By

    is mapped to usually (or anti-seldom), and the

    answer is determined as: the weather temperature is usually

    hot.

    [0452] q8: What are the Odds that More than about 50

    People Show Up?

    [0453] In one embodiment, the answer is in a Z-valuation Y,

    Ay,By) form, where Y is again the number o f people showing

    up for an outdoor swimming pool event, and

    Ay

    is more than

    about 50. In one embodiment,

    Ay

    is determined from q8, e.g.,

    by using the model database and fuzzy logic rules for mod i

    fiers within the context and domain of Y, for example, as

    depicted in FIG. 8(a). In one embodiment, Ayis determined

    to be a step-up membership function with a ramp from 40 to

    50 (delta= 0), as depicted from FIG. 8(6). Similar to above,

    Byis determined, as for example depicted in FIG. 8(c). Then,

    in one embodiment, the answer becomes: Almost certainly,

    the number o f people showing up for an outdoor swimming

    pool event, is more than about 50. Or the odds o f the number

    of people showing up for an outdoor swimming pool event,

    being more than about 50 is more than about 95%.

    [0454] q9: What are the Odds that More than about 65

    People Show Up?

    [0455] In one embodiment, similarly to above,

    Ay

    is deter

    mined to be a step up membership function with a ramp from

    55 to 65, as depicted in FIG. 9(a). Similarly,

    By

    is deter

    mined, as for example depicted in FIG. 9(6). Then, in one

    embodiment, the answer becomes: Usually, the number of

    people showing up for an outdoor swimming pool event, is

    more than about 65. Or the odds of the number of people

    showing up for an outdoor swimming pool event, being more

    than about 65 is more than about 85%.

    [0456] qlO: What are the Odds that about 30 People Show

    Up?

    [0457] In one embodiment, similarly to above, A is deter

    mined to be a triangular membership function with a base

    from ramp from 20 to 40, as depicted in FIG. 20(a). Similarly,

    Byis determined, as forexample depicted in FIG. 20(6). Then,

    in one embodiment, the answer becomes: The number of

    people showing up for an outdoor swimming pool event, is

    almost never about 30.

    Confidence Approach on Membership Function

    [0458] As mentioned earlier, in the Z-valuation (X, A, B), a

    restriction on X (e.g., assuming X is a random variable), in

    one embodiment, is imposed via a restriction on its probabil

    ity distribution px,to the degree that the probability measure

    of A, defined as p=Jj}.r(u)P.(u)du, satisfies the restriction

    that (Prob(X is A) is B). In such a case, pxis the underlying

    (hidden) probability density of X. In one embodiment, this

    approach takes a view that such Z-valuation is based on an

    obj ective evaluation against the probability distribution px.In

    the following, we consider the view that B does not necessar

    ily impose a restriction on

    px,

    but on A itself. For example, B

    can be viewed as the confidence level on the speaker of the

    proposition. For example, while there may be absolutely no

    confidence on the propositions generated out of a random

    fortune teller machine, some o f the propositions themselves

    may in fact be true or highly probable. In such a case, the

    confidence level imposed on the propositions have more to do

    with confidence in the source of the propositions rather than

    restriction on the probability distributions related to the ran

    dom variables associated with the content o f the propositions.

    In another example, take the proposition Freds height is

    medium height, but I am not too sure (because I dont recall

    too well). In one embodiment, we take such proposition (as

    a matter of degree) to allow Freds height to be medium-high

    or medium low. In essence, the restriction from B, in this

    approach, is imposed not necessarily on

    px,

    but on impreci

    sion of A itself. In one embodiment, this approach provides a

    method to deal with seemingly conflicting propositions, for

    example by discounting the confidence levels on such propo

    sitions (or, for example, on the speakers of those proposi

    tions), as opposed to imposing conflicting restrictions on

    px.

    [0459] As shown in FIG. 2 (a), (X is A) is graphically

    depicted by possibility d istribution xl(x). (A, B) in this con

    text allows for possibilities o f other membership functions,

    such as A' or A", as depicted in FIG. 2 (6), to various degrees,

    depending on the confidence level imposed by B. The fuzzy

    set of such membership functions are denoted as A*. In

    another words, whereas in (X is A) the membership degree of

    x is denoted by xl(x), in (A, B), the value o f membership

    function of x is not a singleton, but a fuzzy value itself. The

  • 5/19/2018 AI novel techniques

    201/243

    US 20 4/0 88462 A

    22

    Jul. 3, 20 4

    possibility of such membership value is denoted by ^*( x, ) .

    This would indicate the possibility degree that the value of

    membership function of x be . In this approach, a single

    crisp trace indicating membership function of X in FIG. 2 (a)

    turns into a two dimensional fuzzy map in FIG. 2

    (b),

    where

    a point in (x, ) plane is associated with a membership func-

    tion ^* (x ,). A n example o f such map can be visualized in

    one embodiment, as color (or grayscale graduation) mapping

    in which high possibili ty (for membership values) areas (e.g.,

    a pixel or range in (x,) plane), are associated with (for

    example) darker color, and low possibility (for membership

    values) areas are associated with (for example) lighter color.

    In one extreme where there is no im precision associated with

    the proposition (X is A), such map results in a crisp trace, as

    for example shown in FIG. 2 (a).

    [0460] In one embodiment, as depicted for example in FIG.

    22(a), the effect of B in (A, B) is to fuzzy the shape of

    membership function o f X in A, primarily by m aking the sides

    of the membership function fuzzy (for example, compared to

    flat high/low portions). For example, such fuzziness is prima -

    rily performed laterally in (x ,) plane. In one embodiment, as

    for example depicted in FIG. (b),(A, B) is presented with

    a fuzzy map primarily carried out vertically in (x ,) plane. In

    one embodiment, the map may contain bands o f similar color

    (s) (orgrayscale) indicating regions having similarpossibility

    of membership functions o f x.

    [046 ] In one embodiment, the possibility map of member-

    ship function of x associated with A* may be determined by

    superimposing all possible membership functions of x with

    their corresponding membership degree (or test score) in A*

    on (x, ) plane, for example, by taking the supreme test score

    (or membership degree in A*) o f such potential membership

    functions for each point in (x, ) plane.

    [0462] As depicted in FIG. 23, the cross sections of the

    fuzzy map in (x, ) plane, for example, at various X values Xj ,

    X2, X3, and X4, show a membership func tion for for each

    cross section. In general, the shape of membership function of

    for each X value, depends on X and B (affecting the degree

    of fuzziness and imprecision), i.e., the membership function

    of for a given X (e.g., X0) takes the value of ^* (X 0, ) .

    [0463] In one embodiment, as for example depicted in FIG.

    24, the membership function of , ^*(X 0, ) , for X value of

    X0, revolves around 0, which is the value of membership

    function of X in A at X0 (i.e., 0=^ (X 0)). In one embodiment,

    the shape of ^*(X 0, ) depends on B and X0. In one embodi-

    ment, the shape of ^*(X 0, ) depends on B an d 0. In such an

    embodiment, for two values of X, e.g., Xj and X4 (for

    example, as depicted in FIG. 23), where ^(X) is the same for

    both values, ^*( X l5 ) and A*(X , ) also have the same

    shape. In such an embodiment, ^* (X 0, ) may be expressed

    as 0j s( ), indicating its dependence on B and 0.

    [0464] In one embodiment, as depicted for example in FIG.

    25, 0 s ( ) is depicted for various Bs an d 0. For example,

    at high confidence levels (e.g., Absolute Confidence, B J, the

    membership function of , 0j s () , is narrow (W0j s l )

    precise function with membership value of at 0. In such a

    case, 4*(X, ) would resemble the crisp trace of 4(X) (as

    depicted in FIG. 2 (a)). At a medium confidence level (e.g.,

    Somewhat Sure, B2), , ^ s ( ) is a membership function of

    revolving around 0. In one embodiment, the imprecision

    measure of 0 S () , (e.g., W0S 2), is increased by reduction

    in level of confidence B. For example, when B represent very

    little or no confidence at all (e.g., Absolutely No Confi-

    dence, B3), there is no confidence on the membership func-

    tion o f X (e.g., at X0), and such membership function value ,

    may take any value (from 0 to ), yielding flat profile for 0j

    s ( ). In one embodiment, this flat profile has value of . In one

    embodiment, this flat profile is independent of 0. In one

    embodiment, reduction in confidence level in B, works to

    increase the imprecision measure of 0 s () , (e.g, W0 B3),

    to encompass whole range of . In such a case, the color (or

    grayscale) map 4*(X, ) would become a block of all (or

    mostly) black areas, indicating that any membership value is

    possible for a given values o f X. Then in such an embodiment,

    X is A, with absolutely no confidence will put no restriction

    on X.

    [0465] In one embodiment, as depicted in FIG. 26(a), X is

    C is evaluated against (A, B). Membership function of X in

    C is depicted as thick line (denoted as c(X)). In one embodi-

    ment, the degree in which C is consistent with (or satisfies

    restriction due) A* is determined by coverage of 4*(X, )

    mapping on C. As an example, at X=X0, the membership

    function of X in C has the value of c(X0). As depicted in FIG.

    (b),

    the possibility of such value in 4*(X, ) map is evalu-

    ated as ^*(X 0, c(X0)). In one embodiment, this is the

    degree in which C satisfies or is consistent with A* at X0.

    [0466] In one embodiment, as depicted in FIG.

    (b),

    ^*

    (X0, c(X0)) is determined by determining the membership

    function of for a given X (i.e., X0). In one embodiment, the

    membership function of , i.e., ^*( X0, ) , is determined

    based on 4(X0) and B (as for example shown in FIGS. 24 and

    25).

    [0467] In one embodiment, the consistency of X is C

    against (A, B) is evaluated based on the degree in which C

    satisfies or is consistent with A* at various values of X. In one

    embodiment, the lowest value of such degree i