International Business Machines Corporation patent applications published on September 28th, 2023

From WikiPatents
Revision as of 17:44, 30 September 2023 by Wikipatents (talk | contribs) (Creating a new page)
Jump to navigation Jump to search

EFFICIENT POWER TRANSFER TO ELECTRIC VEHICLES (17702338)

Abstract

An ability of a power transmission device to transfer electric charge in a power-transmission area at a particular point in time is identified. The ability comprises a threshold number of vehicles to which the power-transmission device can transfer electric charge with at least a threshold efficiency. A predicted number of electric vehicles that are likely to be requesting electric charge within the power-transmission area at the particular point in time is calculated. The number of electric vehicles that are likely to be requesting electric charge within the power-transmission area at the particular point in time is adjusted based on a determination that the predicted number of vehicles is not bound by the threshold number of vehicles.

Inventor

Kenichi Takasaki

AIR MEASUREMENT FOR GROUND VEHICLE NAVIGATION (17702922)

Abstract

A navigation instruction of an autonomous vehicle is detected. The autonomous vehicle is in an environment. The autonomous vehicle is communicatively coupled to a plurality of sensors configured to capture environmental information of the environment. An anomalous sensor status of a first sensor of the plurality of sensors is determined based on the plurality of sensors. An air measurement is identified in response to the anomalous sensor status and based on a second sensor of the plurality of sensors. The air measurement is adjacent to the autonomous vehicle. Autonomous movement operation of the autonomous vehicle is directed in response to the movement instruction and based on the air measurement.

Inventor

Shailendra Moyal

SMART AIR CONTROL IN A STORAGE SPACE (17656671)

Abstract

A processor may receive an air dataset associated with a smart environment having one or more storage objects. The processor may simulate the smart environment using the air dataset. The processor may apply an optimization criteria to the simulation of the smart environment. The processor may generate an optimum smart environment design associated with an improved air condition level of the smart environment and the optimization criteria.

Inventor

Venkata Vara Prasad Karri

COLLABORATIVE SOLAR POWER GENERATION (17655809)

Abstract

According to one embodiment, a method, computer system, and computer program product for solar power generation is provided. The embodiment may include identifying relative positions of co-located electric autonomous vehicles (EAVs) within a group. The embodiment may include identifying solar power generation metrics for each EAV. The embodiment may include determining whether at least two EAVs have a same side unexposed to direct sunlight. In response to determining at least two EAVs have a same side unexposed to direct sunlight, the embodiment may include identifying a direction and an angle of solar light impacting the group. Based on the relative positions and the direction and angle of solar light, the embodiment may include instructing a collaborative movement among the group such that solar light is reflected from an exterior surface of at least one EAV to an exterior surface of at least one other EAV which was unexposed to sunlight.

Inventor

Akash U. Dhoot

DYNAMIC CHANGING OF CONVEYOR PROFILE BASED ON RANGE OF ROBOT (17654413)

Abstract

A method, computer system, and a computer program product for robot assistance are provided. A computer identifies a position of a first robot in an environment and a range of movement of an arm of the first robot. The computer generates an alignment plan for moving a first conveyor to be aligned with the first robot so that the first conveyor is engageable with the arm of the first robot within the range of movement of the arm. The first conveyor and the first robot include respective supports that are separate from each other. The computer transmits the alignment plan for execution so that the first conveyor is moved according to the alignment plan.

Inventor

Sarbajit K. Rakshit

MIGRATION OF PRIMARY AND SECONDARY STORAGE SYSTEMS (17655804)

Abstract

Provided is a method for migrating from a first storage system to a second storage system. The method includes receiving a command to migrate from a first storage system to a second storage system, wherein the first storage system comprises a first primary storage and a first secondary storage, and wherein the second storage system comprises a second primary storage and a second secondary storage. The method further includes initiating, in response to receiving the command, data replication between the first primary storage and the second primary storage. The method further includes initiating, in response to receiving the command, data replication between the first primary storage and the second secondary storage. The method further includes migrating from the first storage system to the second storage system.

Inventor

David R. Blea

Automated Knowledge Graph Based Regression Scope Identification (17700905)

Abstract

Mechanisms are provided to automatically identify a regression scope of a requirements specification for at least one functionality of a software product. A first knowledge graph, having function entities, is generated of the requirements specification specifying functional requirements for a software product and a first vector representation is generated for the function entities. Code entities for existing code for the software product are generated that comprise features associated with portions of the existing code, and a second vector representation is generated for these code entities. Code entities are linked to function entities based on a vector similarity analysis between the first vector representation and the second vector representation. A regression scope knowledge graph output is generated, based on the linked code entities and function entities, that depicts relationships between function entities corresponding to the functional requirements with code entities corresponding to portions of existing code for the software product.

Inventor

Yuan Li

VARIABLE REPLACEMENT BY AN ARTIFICIAL INTELLIGENCE ACCELERATOR (17656358)

Abstract

A system for variable replacement in a template artificial intelligence (AI) accelerator code. The system includes: at least one memory; at least one processor communicatively coupled to the at least one memory, and configured for computing at least one table of variables from a template AI accelerator code; and an AI accelerator including a plurality of engines, and communicatively coupled to the at least one processor and the at least one memory. The AI accelerator is configured to create a variable replaced AI accelerator code for the plurality of engines of the AI accelerator from the template AI accelerator code by replacing variables in the template AI accelerator code with actual values from the at least one table of variables.

Inventor

Cedric Lichtenau

DEPLOYMENT OF SOFTWARE PROGRAMS BASED ON SECURITY LEVELS THEREOF (17656237)

Abstract

A solution is proposed for deploying software programs. A corresponding method comprises calculating a program security indicator of each software program according to corresponding component security indicators of software components being used by the software program. A computing system (or more) is selected for deploying the software program according to a comparison between the program security indicator and corresponding system security indicators of a plurality of available computing systems. A computer program and a computer program product for performing the method are also proposed. Moreover, a corresponding system is proposed.

Inventor

Gianluca Volpe

SOFTWARE PACKAGE UPDATE HANDLING (17656245)

Abstract

A method, system, and computer program product for software package update handling are provided. The method installs an initial set of software packages in a virtual environment. A package dependency graph is generated representing independent software packages and dependent software packages of the initial set of software packages. One or more software packages are updated with one or more updated software packages to generate a subsequent set of software packages. A compatibility check is performed on the subsequent set of software packages. The method generates an update prerequisite package based on the compatibility check.

Inventor

Ting Dai

Efficient Data Layout and Alignment for Wide-Vector Accelerator Systems (17701308)

Abstract

Efficient data layout and alignment techniques for effectively executing AI workloads in wide-vector accelerator systems are provided. In one aspect, a method for processing AI workloads includes: logically dividing a data vector into a hierarchy of segments and sub-segments with each of the segments including more than one of the sub-segments, wherein each of the sub-segments includes words, and each of the words includes data-bits; and physically mapping the data-bits such that the words belonging to a same given one of the sub-segments are mapped contiguously across all of the segments. An AI accelerator system is also provided.

Inventor

Shubham Jain

BRANCH PREDICTION USING SPECULATIVE INDEXING AND INTRALINE COUNT (17703063)

Abstract

A method of branch prediction in a processor includes: obtaining, by the processor, a branch instruction for which a direction of a branch is to be predicted; generating, by the processor, an index based on an instruction address, a global path vector (GPV), and a counter; selecting, by the processor, an entry from a data structure using the index; and predicting, by the processor, the direction of the branch using information included in the selected entry. The method may include modifying a tag in the selected entry based at least in part on another GPV.

Inventor

Brian Robert Prasky

REDUCING DOWNTIME CAUSED BY INCOMPATABILITY ISSUES FROM UPGRADING FIRMWARE AND SOFTWARE (17655839)

Abstract

A method and system for estimating upgrade time and mitigating errors when updating a virtualized computing system. Operations of this method include, but are not necessarily limited to the following (and not necessarily in the following order): (i) identify updates needed by a system; (ii) compare the system to be updated to other systems to determine similar systems that already had the similar updates; (iii) project the time to complete the update based on the performance characteristics of the system to be updated, the performance characteristics of the similar systems that have already been updated, and the time taken to update the similar systems; (iv) identify errors that occurred when updating the similar systems and the corresponding error resolutions; and (v) pre-emptively apply configuration changes or other error resolutions to the system to be updated.

Inventor

Anjil Reddy Chinnapatlolla

PROGRAMMING ELEMENTS ONTO A COMPUTATIONAL MEMORY (17656163)

Abstract

Provided is a method, device, and computer program product for programming a set of first elements onto a computational memory. The computational memory allows for performing a computation task from a set of second elements that encode the set of first elements in the computational memory, respectively. The method includes performing the computation task by the computational memory using the set of second elements and adapting at least part of the set of second elements in the computational memory based on a measured result of the computation task, until the measured result of the computation task fulfils an accuracy condition.

Inventor

Manuel Le Gallo-Bourdeau

INTELLIGENT WORKFLOW FOR END-OF-SUPPORT SOLUTION ADVISOR (17656689)

Abstract

In an approach for predicting an optimal system upgrade, a processor detects an upgrade is available for a system of a first user computing device. A processor gathers a set of live data from an environment of the first user computing device using a process mining software. A processor compares the set of live data to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device. Responsive to identifying the second user computing device, a processor performs a pattern recognition to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device. A processor schedules the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.

Inventor

Melanie Dauber

EFFICIENT RECOVERY IN CONTINUOUS DATA PROTECTION ENVIRONMENTS (17656687)

Abstract

A computer-implemented method, a computer system and a computer program product efficiently select restore points in a continuous data protection environment. The method includes receiving log entries that include restore points that correspond to data stored on nodes in the continuous data protection environment. The method also includes identifying an interesting restore point from the log entries. The method further includes grouping the interesting restore point for recovery based on one or more of a confidence score and a restore time. In addition, the method includes loading the group of interesting restore points on available nodes in the continuous data protection environment. The method also includes determining whether the data corresponding to each interesting restore point in the group is valid using a validation function. Lastly, the method includes discarding the interesting restore point when the data corresponding to the interesting restore point is not valid.

Inventor

UMESH DESHPANDE

TASK-SPECIFIC LOGGING IN DIGITAL COMPUTER SYSTEMS (17656222)

Abstract

A technique for logging tasks in a computer system. Tasks are logged into the computer system by executing at least one task at the computer system. A set of log metadata and a set of log levels of log records of the at least one task may be determined from an execution log output of the at least one task. Execution outputs of a further task may be determined according to the determined set of log metadata and associated set of log levels.

Inventor

Felix Beier

DETERMINATION OF A PRIORITIZED SUBSET OF TEST CASES TO RUN AFTER A SOURCE CODE CHANGE (17701542)

Abstract

A computer-implemented method according to one embodiment includes updating code segments of source code to include predetermined code pieces. The updated code segments are configured to output information about associated test cases upon the test cases being run. The method further includes running the test cases, and subsequent to a change being made to the source code, determining a prioritized subset of the test cases. The prioritized subset of the test cases is run. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.

Inventor

Chun Ling Li

FINAL CACHE DIRECTORY STATE INDICATION (17701777)

Abstract

A method for managing designated authority status in a cache line includes identifying an initial designated authority (DA) member cache for a cache line, transferring DA status from the initial DA member cache to a new DA member cache, determining whether the new DA member cache is active, indicating a final state of the initial DA cache responsive to determining that the new DA member cache is active, and overriding a DA state in a cache control structure in a directory. A method for managing cache accesses during a designated authority transfer includes receiving a designated authority (DA) status transfer request, receiving an indication that a first cache will invalidate its copy of the cache line, allowing a second cache to assume DA status for the cache line, and denying access to the first cache’s copy of the cache line until invalidation by the first cache is complete.

Inventor

Jason D. Kohl

COLUMN BASED DATABASE LOCKS (17656068)

Abstract

Disclosed are techniques for relational database locks based on columns. Database transactions may be targeted to specific columns of one or more records, instead of the entire row for those records, using primary keys. Column locks on specific keys are stored separately than column locks on ranges of keys, which are both checked when requesting a new column lock for either a single key or a range of keys. When a threshold number of columns for a given record, or range of records/keys, have been locked, the column locks for that record, or range of records, can be combined into a single row level lock to reduce resource costs for maintaining multiple concurrent locks.

Inventor

Shuo Li

BLOCKCHAIN BASED MULTI VENDOR CHANGE MONITORING SYSTEM (17656010)

Abstract

A method, computer system, and a computer program product for managing a multi-vendor environment is provided. The present invention may include receiving a request to make a change to an aggregate computer system from a participant of the aggregate computer system. The present invention may include creating, in response to the request, a change block. The present invention may include receiving approval for the change block in accordance with an endorsement policy. The present invention may include adding the change block to a distributed ledger. The present invention may include monitoring a performance of the aggregate computer system.

Inventor

ADAM DALE BRAHAM

Automatically Recommending Database Access Patterns for Transactions in Microservices (17655802)

Abstract

Recommending database access patterns for transactions in microservices is provided. A recommendation of a particular database access pattern to improve access by transactions to data in fields of tables in a database corresponding to a microservice is generated based on analysis of field access graphs for the tables accessed by the transactions. The recommendation of the particular database access pattern is output. The particular database access pattern is implemented to improve access by the transactions to the data in the fields of the tables in the database corresponding to the microservice to improve performance of the microservice based on user input and read view implementation guidance.

Inventor

Shivali Agarwal

IDENTIFYING AND REPLACING LOGICALLY NEUTRAL PHRASES IN NATURAL LANGUAGE QUERIES FOR QUERY PROCESSING (17656690)

Abstract

An embodiment for identifying and replacing logically neutral phrases in natural language queries may include receiving a natural language query. The embodiment may also identify one or more logically neutral or non-logically neutral anchors in the natural language query. The embodiment may also identify boundaries containing one or more logically neutral phrases. The embodiment may further include detecting semantic and logical relations between verbal phrases and functional language between and adjacent to the one or more logically neutral and non-logically neutral anchors to reintroduce non-logically neutral language back into a non-logically neutral portion of the natural language query. The embodiment may also include generating a modified natural language query by automatically removing the boundaries and optionally replacing the one or more logically neutral phrases in the natural language query. The embodiment may further include providing the modified natural language query to a query processing system for further processing.

Inventor

Octavian Popescu

DATABASE QUERY PERFORMANCE IMPROVEMENT (17703453)

Abstract

An approach for optimizing statistical query performance. The approach receives a structured query language set. The approach identifies a first set of parameters associated with the statements of the SQL set. The approach creates a merged SQL statement based on one or more matching parameters of SQL statements in the SQL set. The approach binds a second set of parameters associated with the merged SQL statement to the merged SQL statement. The approach generates a SQL statement based on the merged SQL statement. The approach generates a remote SQL statement based on the SQL statement. The approach executes a commit statement on the remote SQL statement.

Inventor

Hai Jun Shen

DESIGNING A FAIR MACHINE LEARNING MODEL THROUGH USER INTERACTION (17655803)

Abstract

A computer-implemented method, a computer program product, and a computer system for designing a fair machine learning model through user interaction. A computer system receives from a user a request for reviewing one or more biased subgroups in a dataset used in training a machine learning model and presents to the user the one or more biased subgroups and respective bias scores thereof. A computer system preprocesses the dataset to mitigate bias, in response to receiving from the user a request for mitigating the bias associated with the one or more biased subgroups. A computer system retrains the machine learning model, using a new dataset obtained from preprocessing the dataset. A computer system presents to the user respective new bias scores of the one or more biased subgroups in the new dataset. The user reviews the respective new bias scores to determine whether the fair machine learning model is built.

Inventor

Oznur Alkan

TECHNOLOGY FOR PROVIDING PASSWORD SECURITY (17656551)

Abstract

Technology for password entry security that monitors a text entry field that is not an appropriate text entry field for password entry, and, on condition that a user enters a first portion of a designated user password into the text entry field, then machine logic deletes and/or obscures at least the first portion of the password from the text entry field so that it cannot be espied or intercepted by unauthorized parties. IN some embodiments, an integer number N is designated to determine how many characters must be in the first portion entered by the user before the password text is deleted or obscured.

Inventor

SALLY L HOWARD

USING TRAP CACHE SEGMENTS TO DETECT MALICIOUS PROCESSES (18325987)

Abstract

Provided are a computer program product, system, and method for using trap cache segments to detect malicious processes. A trap cache segment to the cache for data in the storage and indicated as a trap cache segment. Cache segments are added to the cache having data from the storage that are not indicated as trap cache segments. A memory function call from a process executing in the computer system reads data from a region of a memory device to output the read data to a buffer of the memory device. A determination is made as to whether the region of the memory device includes the trap cache segment. The memory function call is blocked and the process is treated as a potentially malicious process in response to determining that the region includes the trap cache segment.

Inventor

Brian A. Rinaldi

Federated Generative Models for Website Assessment (17655847)

Abstract

A method, computer program, and computer system are provided for predicting and assessing risks on websites. Data corresponding to historical interactions of a user with one or more websites is accessed. A simulation of actions of the user is generated based on the accessed data, and actions of the user are simulated on a pre-defined target website based on the generated simulation of the actions of the user. Risks on the target website are identified based on simulating the actions of the user. The website is updated to mitigate the identified risks.

Inventor

Ambrish Rawat

GENERATING A POWER DELIVERY NETWORK BASED ON THE ROUTING OF SIGNAL WIRES WITHIN A CIRCUIT DESIGN (17656041)

Abstract

Method and apparatus for generating an updated power delivery network. Generating the power delivery network includes determining power characteristics for a power delivery network of a circuit design based on logic cells of the circuit design. The power delivery network includes power wires and power staples connecting pairs of the power wires to each other. Further a first one or more of the power staples is remove from the power delivery network based on the power characteristics. Signal wires for the logic cells are routed after removing the first one or more of the power staples. Routing the signal wires includes routing a first signal wire of the signal wires in a routing track corresponding to the first one or more of the power staples.

Inventor

David WOLPERT

SHORT NET PIN ALIGNMENT FOR ROUTING (17656364)

Abstract

Embodiments are provided for providing enhanced routing in a computing system by a processor. One or more of a plurality of short nets in a cell of an integrated circuit may be aligned for executing a routing operation, wherein a short net is a two-pin net having two gates on adjacent rows having a horizontal distance less than a selected threshold.

Inventor

Hua XIANG

NATURAL LANGUAGE QUESTION ANSWERING USING NON-RELATIONAL TABLES (17656487)

Abstract

A question answering bot that digests non-relational data tables is provided. A processor receives a question regarding a non-relational data table. A processor extracts at least one feature of the question using a natural language processing (NLP) model. A processor extracts at least one similar feature of the non-relational data table to the extracted at least one feature of the question. A processor determines at least one relevant cell in the non-relational data table based on the at least one feature of the question and the at least one similar feature of the non-relational data table. A processor provides an answer to the question, where the answer is based on the at least one relevant cell.

Inventor

Vishwajeet Kumar

GENERATING SEMANTIC VECTOR REPRESENTATION OF NATURAL LANGUAGE DATA (17656418)

Abstract

A computer-implemented method for automatically generating a semantic vector representation of a relation between a specific set of entities in natural language text is provided. The method may include, in response to receiving a text segment comprising a set of entities, automatically parsing the text segment into an abstract meaning representation (AMR) graph comprising nodes representing the set of entities. The method may further include extracting a number of minimum Steiner trees from the AMR graph, and wherein each Steiner tree comprises a minimum amount of edges between the nodes corresponding to a first entity and at least one second entity. The method may further include using a trained graph neural network (GNN) to determine vector embeddings for the minimum Steiner trees. The method may further include aggregating the vector embeddings to generate the semantic vector representation of the relation between the specific set of entities.

Inventor

Thanh Lam Hoang

MINING ASYNCHRONOUS SUPPORT CONVERSATION USING ATTRIBUTED DIRECTLY FOLLOWS GRAPHING (17655875)

Abstract

Provided is a computer-implemented method, system, and computer program product for process mining asynchronous support conversations using attributed directly follows graphing. A processor may collect a plurality of conversation threads from an asynchronous data stream. The processor may label each utterance of a plurality of utterances from the plurality of conversation threads with an event label. The processor may analyze the event label for each utterance of the plurality of utterances. The processor may generate, based on the analyzing of the event label for each utterance, an attributed directly follows graph (DFG).

Inventor

SAMPATH DECHU

IDENTIFY AND AVOID OVERFLOW DURING MACHINE LEARNING (ML) INFERENCE WITH HOMOMORPHIC ENCRYPTION (17656290)

Abstract

Identifying and avoiding an overflow event while performing machine learning inference operations with homomorphic encryption. Prior to a first run of a machine learning inference operation, a first overflow event is created in order to determine the values that are achieved values. These values are compared to a set of user selected homomorphic encryption libraries in order to determine which parameters of the machine learning inference operation must be adjusted in order to avoid future overflow events during subsequent runs of the machine learning inference operation.

Inventor

LEV GREENBERG

MULTI-LEVEL COORDINATED INTERNET OF THINGS ARTIFICIAL INTELLIGENCE (17705873)

Abstract

A first plurality of machine learning operations are performed on Internet of Things (IoT) input data in an IoT ecosystem. The first plurality of machine learning operations are performed using a first machine learning level. One or more first machine learning outputs are received from the first machine learning level. A second plurality of machine learning operations are executed on the one or more first machine learning outputs. The second plurality of machine learning operations are executed using a second machine learning level. One or more second machine learning outputs are obtained from the second machine learning level. A third plurality of machine learning operations run on the one or more second machine learning outputs. The third plurality of machine learning operations run using a third machine learning level. An IoT output is identified from the third machine learning level.

Inventor

Aaron K. Baughman

HARDWARE IMPLEMENTATION OF ACTIVATION FUNCTIONS (17701809)

Abstract

A device comprises activation function circuitry configured to implement a non-linear activation function. The activation function circuitry comprises a comparator circuit, a capacitor, and a ramp voltage generator circuit. The capacitor comprises a terminal coupled to a first input terminal of the comparator circuit, and is configured to receive and store an input voltage which corresponds to an input value to the non-linear activation function. The ramp voltage generator circuit is configured to generate a ramp voltage which is applied to a second input terminal of the comparator circuit. The comparator circuit is configured to compare, during a conversion period, the stored input voltage to the ramp voltage, and generate a voltage pulse based on a result of the comparing. The voltage pulse comprises a pulse duration which encodes an activation output value of the non-linear activation function based on the input value to the non-linear activation function.

Inventor

Stefano Ambrogio

CALIBRATING ANALOG RESISTIVE PROCESSING UNIT SYSTEM (17704515)

Abstract

A system comprises a processor, and a resistive processing unit (RPU) array. The RPU array comprises an array of cells which respectively comprise resistive memory devices that are programable to store weight values. The processor is configured to obtain a matrix comprising target weight values, program cells of the array of cells to store weight values in the RPU array, which correspond to respective target weight values of the matrix, and perform a calibration process to calibrate the RPU array. The calibration process comprises iteratively adjusting the target weight values of the matrix, and reprogramming the stored weight values of the matrix in the RPU array based on the respective adjusted target weight values, to reduce a variation between output lines of the RPU array with respect to multiply-and-accumulate distribution data that is generated and output from respective output lines of the RPU array during the calibration process.

Inventor

Stefano Ambrogio

GENERATING AND MANAGING DEEP TENSOR NEURAL NETWORKS (17938131)

Abstract

Techniques for generating and managing, including simulating and training, deep tensor neural networks are presented. A deep tensor neural network comprises a graph of nodes connected via weighted edges. A network management component (NMC) extracts features from tensor-formatted input data based on tensor-formatted parameters. NMC evolves tensor-formatted input data based on a defined tensor-tensor layer evolution rule, the network generating output data based on evolution of the tensor-formatted input data. The network is activated by non-linear activation functions, wherein the weighted edges and non-linear activation functions operate, based on tensor-tensor functions, to evolve tensor-formatted input data. NMC trains the network based on tensor-formatted training data, comparing output training data output from the network to simulated output data, based on a defined loss function, to determine an update. NMC updates the network, including weight and bias parameters, based on the update, by application of tensor-tensor operations.

Inventor

Lior Horesh

REDUCING COMPUTATIONAL REQUIREMENTS FOR MACHINE LEARNING MODEL EXPLAINABILITY (17701911)

Abstract

A first input transaction is classified into a first input space cluster in a set of input space clusters. It is determined that the first input space cluster maps to a single explainability space cluster in a set of explainability space clusters. Using an interpretable model corresponding to the single explainability space cluster, a first machine learning model prediction is explained, the first machine learning model prediction resulting from processing, by a machine learning model, the first input transaction.

Inventor

Stefan A. G. Van Der Stockt

COGNITIVE USABILITY TEST (17701902)

Abstract

A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include training a cognitive engine and receiving a goal for the cognitive engine. The operations may include recognizing, with the cognitive engine, at least one actionable element and attempting, with the cognitive engine, operations on the at least one actionable element. The operations may include tracking data affiliated with the operations and generating, based on the data, a usability score for a user.

Inventor

Yue Dong

STABLE LOCAL INTERPRETABLE MODEL FOR PREDICTION (17699613)

Abstract

Examples described herein provide a computer-implemented method that includes determining a kernel width for the machine learning model. The method further includes building a local interpretable linear model using the kernel width. The method further includes computing a contribution and confidence for a feature of the local interpretable linear model. The method further includes updating the local interpretable linear model to generate a final model and computing an overall confidence for the final model.

Inventor

Xiao Ming Ma

Computer Technology For Setting And Presenting An Itinerary For A Traveler (17656755)

Abstract

Computer technology for leveraging crowd sourced data to create an experience scoring based itinerary that outputs an itinerary of POI's (points of interest) based on relevancy to the person's interest, scoring experience, weather conditions and other factors relevant to setting the destinations, order and/or scheduling of the traveler's itinerary (for example, a daily schedule for a family on holiday). Also, computer technology for filtration of a set of images unique to a person's profile and taste and stitching these images to suggest a personalized route specific to that person's understanding.

Inventor

Venkata Vara Prasad Karri

ARTIFICIAL INTELLIGENCE-BASED TASK ASSIGNMENT ASSISTANT IN MULTIPARTICIPANT MESSAGE EXCHANGES (17656355)

Abstract

Automatic task assignment in a multiparticipant message exchange includes receiving, by a computer, data snapshots from a collaborative message exchange between one or more participants. Based on the data snapshots, the computer identifies tasks requiring completion, a task leader among participants, and a task criteria. Based on a semantic match between the task criteria and a database of historical task completion, the computer identifies a candidate pool for completing the tasks and determines a likelihood of each candidate completing the tasks. A relevancy score is assigned based on the likelihood and used to generate a list of ranked candidates for completing the tasks. The computer presents the list to the task leader, receives a selection from the task leader including at least one candidate for completing the tasks, automatically notifies the selected candidate of the tasks to be completed, and updates the database of historical task completion.

Inventor

Jonathan Terner

TECHNIQUES FOR DISCOVERING AND SHARING DIGITAL WORKFLOW TASK ASSIGNMENTS (17653500)

Abstract

A method, computer system, and a computer program product for task management is provided. The present invention may include analyzing task requirements for a new task to be performed by a computer. The present invention may include determining when other tasks are to be performed at least partially simultaneously with said new task. The present invention may include determining one or more candidates engageable to perform said new task. The present invention may include generating a workflow for all tasks that are to be performed simultaneously and mapping said tasks with said engageable candidate task performer(s). The present invention may include determining skillset and availability of said one or more engageable candidates for performing said simultaneous tasks, said simultaneous tasks including said new task, and generating a confidence rating for each of said candidate task performers by analyzing said workflow and said candidate’s skillset, and availability for each simultaneous task.

Inventor

Peng Hui Jiang

AUTOMATIC MACHINE ASSEMBLY GUIDANCE (17656229)

Abstract

A processor may receive component data associated with the machine. The component data may be associated one or more machine auxiliary components configured within one or more environments. The processor may generate a digital twin associated with the machine. The digital twin associated with the machine area may be based, at least in part, on the component data. The processor may simulate the digital twin of the machine. The processor may generate, responsive to simulating the digital twin associated with the machine, the optimized assembly plan for the machine.

Inventor

Venkata Vara Prasad Karri

RISK REDUCTION OPTIMIZATION IN A SMART ENVIRONMENT (17656227)

Abstract

A processor may receive worker data associated with a smart environment having one or more workers. The processor may generate a digital twin of the smart environment. The digital twin may be based, at least in part, on the worker data. The processor may simulate the digital twin of the smart environment. The processor may identify, responsive to simulating, a safety score. The safety score may be associated with the one or more workers.

Inventor

Venkata Vara Prasad Karri

DATA CENTER GUIDE CREATION FOR AUGMENTED REALITY HEADSETS (17656309)

Abstract

A method, computer program product and computer system to automatically generate augment reality-based guides for maintenance procedures is provided. A processor retrieves non-structured text instructions to perform a maintenance procedure on a device within a data center. A processor extracts at least one imperative statement from the non-structured text instructions. A processor identifies a named entity in the extracted at least one imperative statement from the non-structured text instructions. A processor generates a mapping of the named entity to be used by an augmented reality device, where the mapping indicates the position of the named entity on the device within a data center. A processor provides to the augmented reality device the extracted at least one imperative statement and the mapping of the named entity, where the augmented reality device displays the extracted imperative statement and the mapping of the named entity to a user of the augmented reality device.

Inventor

Rodolfo Lopez

DOCKET CREDENTIAL INSERTION IN NON-FUNGIBLE TOKENS (17656035)

Abstract

A node in a blockchain network generates a non-fungible token (NFT) and obtain docket information for the NFT comprising transfer conditions for the NFT. The node also generates a docket credential with embedded transfer terms for the NFT from the docket information as part of a signature scheme for the NFT and signs an NFT block on a blockchain network with the docket credential.

Inventor

Nitin Gaur

DIGITAL ARTIFACT MARKETPLACE (17656233)

Abstract

In an approach for storage, search, acquisition, and composition of a digital artifact, a processor obtains the digital artifact in a digital marketplace platform. The digital artifact is a collection of digital data with automatically generated and verifiable provenance and usage data. A processor transforms the digital artifact to define an access privilege. A processor shares the digital artifact in the digital marketplace platform by providing a view of a catalogue including the digital artifact. A processor authorizes a usage request based on the access privilege. A processor rewards a source of the digital artifact based on the usage of the digital artifact.

Inventor

Vasileios Vasileiadis

DIGITAL CREDENTIAL DEPENDENCY MANAGEMENT (17648828)

Abstract

Disclosed are techniques directed to digital credential dependency management. Metadata mappings are maintained between digital credentials, their underlying attributes, and dependent entities which verify and rely upon the digital credentials. When a digital credential is presented for proof to a verification entity, a dependency mapping is generated linking between the verification entity and the attributes that the verification entity requested for presentation. Updates to the digital credentials, or underlying attributes of the digital credentials, can trigger automatic notifications to the verification entities indicated in the dependency mapping. Automatic notifications, as well as their contents, may be defined by user settings to dictate which verification entities receive notifications and what digital credential and underlying attribute information is included in said notifications.

Inventor

Milan Saumil Patel

MITIGATING COMPRESSION INDUCED LOSS OF INFORMATION IN TRANSMITTED IMAGES (17656013)

Abstract

Disclosed are techniques for mitigating loss of information in electronically transmitted images caused by compression operations performed on the images to facilitate transmissions. When an image for electronic transmission is received, a computer vision model extracts various points of data from the image corresponding to information present in the image that is intended for human consumption (for example, in a scan of a handwritten note from a doctor prescribing a medicine for a patient, some of the data points may include the name of the medicine, the dosage value, and when the medicine should be consumed). A test transmission image is then generated by applying the compression operations which are applied in the electronic transmission to a copy of the image, and that copy is also inputted to the computer vision model for data point extraction. Differences in the extracted data points are used to modify the image for transmission.

Inventor

Andrew Jason Lavery

MIXED REALITY BASED CONTEXTUAL EVALUATION OF OBJECT DIMENSIONS (17654421)

Abstract

A processor may analyze a target area. The processor may identify, from the analyzing, one or more objects in the target area. The processor may evaluate each of the one or more objects in the target area. Evaluating each of the one or more objects may include measuring each of the one or more objects and determining a purpose for each of the one or more objects. The processor may generate, based on the evaluating, a placement for each of the one or more objects.

Inventor

SHEFALI BANSAL

MACHINE LEARNING MODELS TRAINED FOR MULTIPLE VISUAL DOMAINS USING CONTRASTIVE SELF-SUPERVISED TRAINING AND BRIDGE DOMAIN (17705597)

Abstract

An example a system includes a processor to receive a model that is a neural network and a number of training images. The processor can train the model using a bridge transform that converts the training images into a set of transformed images within a bridge domain. The model is trained using a contrastive loss to generate representations based on the transformed images.

Inventor

Leonid KARLINSKY

OBJECT-CENTRIC AND RELATION-CENTRIC GRAPH NEURAL NETWORKS FOR PHYSICAL PROPERTY DISCOVERY (17656296)

Abstract

According to one embodiment, a method, computer system, and computer program product for identifying one or more intrinsic physical properties of one or more objects is provided. The present invention may include identifying one or more objects in a video set, extracting observable physical properties of the identified one or more objects from the video set, including one or more trajectories, and inferring, by a property-based graph neural network, intrinsic properties of the one or more objects based on the trajectories.

Inventor

Zhenfang Chen

AUDIO/VIDEO (A/V) FUNCTIONALITY VERIFICATION (17656435)

Abstract

Aspects of the present disclosure relate to audio/video (A/V) stream functionality verification. A stream segment of a video feed prior to transmission over a network as captured by a transmitting device within a web-based conference can be stored. A stream segment of the video feed after transmission over the network as received by a receiving device within the web-based conference can be stored. The stream segment of the video feed prior to transmission over the network can be compared with the stream segment of the video feed after transmission over the network to determine a video feed quality.

Inventor

Yara Rizk

TOPIC CLASSIFIER WITH SENTIMENT ANALYSIS (17656467)

Abstract

A method, system, and computer program product are disclosed. The method includes receiving a set of documents, selecting a topic, and determining that a first document from the set contains a topic label for the topic. The method also includes generating a topic sentiment score for the first document and adding the topic sentiment score to a set of training data. Additionally, the method includes determining that a second document from the set does not contain the topic label, generating an average sentiment score for the second document, and generating a bias factor for the average sentiment score.

Inventor

Takuya Goto

SEARCH BASED ON ABSTRACTED DOCUMENT STRUCTURE IMAGE (17703375)

Abstract

An approach for searching for target documents. The approach receives an abstracted document structure from a user to use as a search source. The approach searches, based on the abstract document structure, a group of search destination documents. The approach creates a pool of target documents based on a portion of the group of search destination documents. The approach displays the pool of target documents to the user, allowing the user to select one or more of the pool of target documents.

Inventor

SHO AYUBA

AUTOMATIC DETERMINATION AND NOTIFICATION OF IRRITANT RELIEF (17656228)

Abstract

A processor may receive irritant data associated with one or more environments and a user. A processor may analyze the irritant data. A processor may identify that one or more irritants associated with the user, are located in the one or more environments. A processor may generate an irritant alert to the user. The irritant alert may indicate at least one irritant of the one or more irritants is associated with the one or more environments.

Inventor

Harini Jagannathan

DYNAMIC PARKING MANAGEMENT SYSTEM (17654081)

Abstract

Computer hardware and/or software configured to determine a plurality of parking spaces on a roadway within a pre-defined geographic location, wherein the plurality of parking spaces are available parking spaces on a side of the roadway, determine a plurality of autonomous vehicles to be parked within the pre-defined geographic location, allocate a selected parking space from the plurality of parking spaces to an autonomous vehicle of the plurality of autonomous vehicles, and transmit parking space information to the autonomous vehicle, wherein the parking space information includes the selected parking space.

Inventor

Yohkichi Sasatani

SYNCHRONIZED MEMORY REPAIR SYSTEM (SRS) (17656017)

Abstract

A system, program product, and method for processing synchronized memory repairs. The method includes identifying a faulty memory row from a plurality of functioning memory rows in a memory array. The method also includes executing memory row repair operations directed toward the faulty memory row and identifying a repair row to operationally replace the faulty memory row. The method also includes creating a multiple hot state within a memory decoder. The memory decoder includes logic circuitry for executing operation of the plurality of functioning memory rows. The method further includes activating a wordline of the identified repair row through the multiple hot state, and executing one or more memory operations on the identified repair row though the memory decoder. Accordingly, the embodiments disclosed herein facilitate synchronization of the repair row and functioning memory rows within the memory array, as well as any associated peripheral signals.

Inventor

Yaron Freiman

COMPUTATION OF A QUALITY OF LIFE METRIC (17656478)

Abstract

A method, computer system, and a computer program for improving a quality of life (QOL) of an individual or a group of individuals is provided. The present invention may include receiving a dataset comprising time-series data pertaining to a QOL factor for the individual or group of individuals. The present invention may then include determining a relative importance of the QOL factor for the individual or group of individuals; computing a QOL metric associated with the individual or group of individuals based on the relative importance of the QOL factor; and determining an intervening measure based on the QOL metric. The present invention may further include requesting an application of the intervening measure based on the QOL metric; and modifying the QOL metric based on a plurality of intervening measure data derived from application of the intervening measure.

Inventor

Pritish Ranjan Parida

STACKED DEVICE WITH BURIED INTERCONNECT (17656174)

Abstract

A stacked field-effect transistors (FETs) layout and a method for fabrication are provided. The stacked FETs include a buried interconnect within the stacked devices which provides power to buried components without requiring a wired connection from a top of the stacked FET to the buried components. The buried interconnect allows for efficient scaling of the stacked devices without extraneous wiring from a top of the device to each epitaxial region/device within the overall device.

Inventor

Ruilong XIE

MULTICHIP INTERCONNECT PACKAGE (17942149)

Abstract

An interconnected semiconductor subassembly structure includes an interconnect structure; a first semiconductor die bonded to a first portion of a top surface of the interconnect structure; a second semiconductor die bonded to a second portion of the top surface of the interconnect structure; and a resin layer located within at least a first portion of a gap between the first semiconductor die and the second semiconductor die, wherein at least one of a top surface and a bottom surface of the resin layer located within the at least first portion of the gap has a concave meniscus shape.

Inventor

Akihiro Horibe

SEMICONDUCTOR DEVICE DESIGN MITIGATING LATCH-UP (17656368)

Abstract

Apparatus for mitigating latch-up within semiconductor devices. A semiconductor device includes a first conductor, a second conductor, and a first gate conductor. The first conductor extends in a first direction, receives a first power supply signal, and is connected to a first electrode. The second conductor extends in the first direction, receives a second power supply signal different from the first power supply signal, and is connected to a second electrode. The first conductor is offset from the second conductor in a second direction perpendicular to the first direction in a top-down view to mitigate formation of parasitic devices within the semiconductor device electrically connecting the first conductor with the second conductor. The first gate conductor is disposed adjacent to the first conductor and the second conductor, is disposed on the first electrode and the second electrode, and receives an input signal.

Inventor

David WOLPERT

MULTICHIP INTERCONNECT PACKAGE FINE JET UNDERFILL (17704061)

Abstract

An interconnected semicondcutor subassembly structure and formation thereof. The interconnected semicondcutor subassembly structure includes an interconnect structure, and first and second semicondcutor dies bonded to respective portions of a top surface of the interconnect structure. The interconnected semicondcutor subassembly structure further includes an underfill layer formed within a first gap located between a bottom surface of the first semiconductor die and the first portion the top surface of the interconnect structure, formed within a second gap located between the bottom surface of the second semiconductor die and the second portion of the top surface of the interconnect structure, and formed within a first portion of a third gap located between the first semicondcutor die and the second semicondcutor die. A top surface of the underfill layer formed within the first portion of the third gap located between the first and second semicondcutor dies has a concave meniscus shape.

Inventor

Akihiro Horibe

BOTTOM CONTACT WITH SELF-ALIGNED SPACER FOR STACKED SEMICONDUCTOR DEVICES (17655807)

Abstract

An approach forming semiconductor structure composed of one or more stacked semiconductor devices that include at least a top semiconductor device, a bottom semiconductor device under the top semiconductor, and contacts to each of the semiconductor devices. The approach provides a stacked semiconductor structure where the bottom semiconductor device is wider than the top semiconductor device. The approach also provides the stacked semiconductor structure where the width of the top semiconductor device is the same as the width of the bottom semiconductor device. The approach includes forming a contact to a side of the bottom semiconductor device when the width of the top semiconductor device is the same as the bottom semiconductor device. The approach includes forming a contact to epitaxy grown on a portion of the top and a side of the bottom semiconductor device when the bottom semiconductor device is larger than the top semiconductor device.

Inventor

GEN TSUTSUI

STACKED FETS INCLUDING DEVICES WITH THICK GATE OXIDE (17656553)

Abstract

A semiconductor device includes a first semiconductor layer and a second semiconductor layer. The first semiconductor layer of the semiconductor device includes a standard-gate field-effect transistor. The second semiconductor layer of the semiconductor device includes an extended-gate field-effect transistor. The first semiconductor layer and the second semiconductor layer are formed on top of one another.

Inventor

Ruilong Xie

STAGGERED STACKED CIRCUITS WITH INCREASED EFFECTIVE WIDTH (17701015)

Abstract

A semiconductor structure including a first logic cell having a first plurality of nanosheet devices along an axis and a second logic cell having a second plurality of nanosheet devices along the axis. Nanosheets of the second plurality of nanosheet devices are wider than nanosheets of the first plurality of nanosheet devices. The first logic cell is a same type as the second logic cell. The first and second logic cells can include inverter circuits or NAND circuits or NOR circuits. When the first logic cell has a height X, a width Y, and an effective width (W) Z, then the second logic cell has a height 2X, a width Y, and W>2.5 Z.

Inventor

Brent A Anderson

BOTTOM DIELECTRIC ISOLATION FOR VERTICALLY STACKED DEVICES (17655797)

Abstract

A first and a second nanosheet stack, a shallow trench isolation region vertically aligned between them, a continuous dielectric layer below the first and second nanosheet stack and above the shallow trench isolation region. The shallow trench isolation region is vertically aligned with a source drain between the first and the second nanosheet stack. A method including forming a first and a second nanosheet stack on a first substrate, the first and the second nanosheet stack each including a lower nanosheet stack vertically aligned above an upper nanosheet stack, the upper nanosheet stack and the lower nanosheet stack each including alternating layers of a sacrificial material and a semiconductor channel material vertically aligned and stacked one on top of another, flipping the first substrate over, bonding an upper surface of the first substrate to an upper surface of a second substrate which includes a shallow trench isolation region.

Inventor

Sanjay C. Mehta

HORIZONTALLY STACKED NANOSHEET GATE ALL AROUND DEVICE STRUCTURE (17701772)

Abstract

A semiconductor structure includes a substrate disposed in a horizontal plane, a gate metal on the substrate, a first spacer and a second spacer on the substrate with the gate metal between the first spacer and the second spacer, and a plurality of horizontally stacked nanosheets extending between the first spacer and the second spacer, with the gate metal encapsulating the plurality of horizontally stacked nanosheets between the first spacer and the second spacer.

Inventor

Shogo Mochizuki

HIGH-DENSITY EMBEDDED BROADSIDE-COUPLED ATTENUATORS (17656678)

Abstract

Systems and techniques that facilitate high-density embedded broadside-coupled attenuators are provided. In various embodiments, an attenuator can comprise an output line. In various aspects, the attenuator can further comprise a reflectively-terminated input line that is broadside coupled to the output line. In various instances, a downstream end of the reflectively-terminated input line can be shorted to ground. In other instances, a downstream end of the reflectively-terminated input line can be open from ground. In various cases, the output line can exhibit a non-looped-back-layout.

Inventor

Nicholas A Masluk

ELECTROPLATED METAL LAYER ON A NIOBIUM-TITANIUM SUBSTRATE (18316060)

Abstract

Devices, systems, and/or methods that can facilitate plating one or more metal layers onto a niobium-titanium substrate are provided. According to an embodiment, a device can comprise a niobium-titanium substrate. The device can further comprise a first metal layer plated on a portion of the niobium-titanium substrate. The device can further comprise a second metal layer plated on the first metal layer. The device can further comprise a third metal layer plated on the second metal layer.

Inventor

Ryan T. Gordon

BACKUP POWER ALLOCATION MANAGEMENT (17656239)

Abstract

A method can include obtaining device data for a set of electronic devices. The device data can indicate power utilized by the set of electronic devices. The method can include obtaining a capacity of a backup power source. The method can include obtaining priority data regarding an allocation of power to the set of electronic devices. The method can include obtaining a set of environmental conditions. The method can include calculating, based at least in part on the set of environmental conditions and the device data, a projected electrical load on the backup power source. The method can include determining that one or more thresholds are exceeded. The determining can comprise identifying that the projected electrical load exceeds the capacity. The method can include modifying, in response to the determining and according to the priority data, power supplied to the set of electronic devices from the backup power source.

Inventor

Marc Henri Coq

REDUCED LOGIC CONVERSION OF BINARY INTEGERS TO BINARY CODED DECIMALS (17704674)

Abstract

Reduced logic conversion of binary integers to binary coded decimals, including: generating, from an input binary integer, an intermediate value comprising all zero digits encoded in an intermediate format; until each bit of the input binary integer has been shifted into the intermediate value: shifting a bit of the input binary integer into the intermediate value; doubling the intermediate value; converting the intermediate value to a binary encoded decimal output; and wherein the intermediate format comprises, for each digit of the intermediate value, a plurality of bits corresponding to a plurality of even weights, a first bit corresponding to a one weight, and a second bit corresponding to an inverse of the one weight.

Inventor

KERSTIN CLAUDIA SCHELM

PAIRING DEVICES FOR ENHANCED SECURITY (17656685)

Abstract

A system and method to tie a removable component to a host device. A first pairing key is stored into a security module on a host device such as a server rack. A removable component is inserted into the server rack for the first time. In response to this first insertion the first pairing key is burned into the removable component using a plurality of physically modifiable internal components. The server rack/security module receives a request form the removable component to operate on the server rack, the request includes a burned in pairing key. The security module compares the received pairing key with the first pairing key and permits operation of the removable component in response to a match between the received pairing key and the first pairing key.

Inventor

Eric J. Campbell

SESSION RESUMPTION WITH DERIVED KEY (17656787)

Abstract

Session resumption for cryptographic communications is provided. Session data and encrypted early data are received from a client. A key is derived using the session data and a one-time pad. The early data is decrypted using the derived key.

Inventor

Mark Duane Seaborn

CREATING NON-FUNGIBLE TOKEN SHARDS (17655872)

Abstract

A node in a blockchain network may send an operation for geometrically fractionalizing an non-fungible token (NFT) into geometric shards to a blockchain network. The geometric fractionalization associates each geometric shard with a specific part of the NFT. The node may also record, on distributed ledger of the blockchain network, the fractionalization of the NFT and the association between each geometric shard with the specific part of the NFT.

Inventor

Luis Angel Bathen

DATA MIGRATION IN APPLICATION PERFORMANCE MONITORING (17654287)

Abstract

In an approach to improve data migration in application performance monitoring, embodiments execute a synthetic transaction to monitor an application, and monitor network traffic during the execution of the synthetic transaction. Further, embodiments extract a plurality of parameters indicative of the synthetic transaction from the network traffic, and generate a script, based on the extracted plurality of parameters and a predetermined template, that generates the synthetic transaction.

Inventor

Laurentiu Gabriel Ghergu

AUTHENTICATING AND AUTHORIZING API CALLS WITH MULTIPLE FACTORS (17701861)

Abstract

A method for authenticating and authorizing a user identifier to access a service is disclosed. The service is activated by a service application programming interface which requires a two-factor authorization to initiate execution of the service for the requesting user identifier. The method receives, by the service API, a service request together with first and second data for a first and a second authentication method, confirming a correctness of the first data as a first identity pass key using the first authentication method, confirming a correctness of the second data as a second identity pass key using the second authentication method and the first identity pass key is input to the second authentication method, and the second authentication method differs from the first authentication method. Having received the confirmed correctness of both the first identity pass key and the second identity pass key, executing the service.

Inventor

Martin Smolny

BEHAVIOR DRIVEN SECURITY FOR IOT DEVICES (17656327)

Abstract

A method, system, and computer program product for behavior-based Internet of Things (IoT) device security are provided. The method detects an action from a set of IoT devices. A context is identified for the action and at least one IoT device of the set of IoT devices. The action and the context are validated for the at least one IoT device. The action is identified as an anomaly based on the validating of the action and the context. A potential state change is identified for the at least one IoT device based on the anomaly. The method determines a responsive action based on the potential state change and the anomaly.

Inventor

Pierpaolo Tommasi

SOUND-BASED PRESENTATION ATTACK DETECTION (17656658)

Abstract

Described are techniques for presentation attack detection including a computer-implemented method of emitting a predetermined frequency pattern using at least one speaker communicatively coupled to a computer implementing a video-conference. The computer-implemented method further comprises collecting, by a camera communicatively coupled to the computer and overlapping with the emitting the predetermined frequency pattern, video data of a user engaged in the video-conference. The computer-implemented method further comprises determining that the video data is inconsistent with an expected response to the predetermined frequency pattern. The computer-implemented method further comprises generating an indication that the user engaged in the video-conference is performing a presentation attack.

Inventor

Mark S. Fredrickson

WORKFLOW PENETRATION TESTING (17656005)

Abstract

Embodiments are disclosed for a method. The method includes receiving a submitted workflow for penetration testing. The submitted workflow includes execution instructions for a multiple penetration testing tools. The method also includes providing the submitted workflow for a workflow runtime manager. Additionally, the method includes generating, by the workflow runtime manager, a first worker container that executes a first penetration testing tool of the penetration testing tools, using a first runtime. The method further includes executing the first penetration testing tool. Also, the method includes generating, by the workflow runtime manager, a second worker container that executes a second penetration testing tool of the penetration testing tools, using a second runtime. Further, the method includes executing the second penetration testing tool.

Inventor

Daniel Alan Pagan

SMART SDN FOR INTRUSION PREVENTION (17655821)

Abstract

A method, computer system, and a computer program product for smart SDN is provided. The present invention may include recording and clustering a pod's behavior to generate a behavior transition model for the pod. The present invention may include watching a behavior of the pod and comparing the behavior to the generated behavior transition model. The present invention may include triggering a network policy change based on determining that the behavior of the pod is a misbehavior.

Inventor

Jeff Hsueh-Chang Kuo

LINE-DRAWING VIDEO CONFERENCING (17656102)

Abstract

A method, computer system, and a computer program product for optimizing web conferencing is provided. The present invention may include receiving data for an organization, the organization being comprised of a plurality of participants. The present invention may include receiving a scheduled web conference. The present invention may include determining a network bandwidth threshold for each of the plurality of participants of the scheduled web conference based on at least the data received for the organization and data associated with the scheduled web conference. The present invention may include monitoring a network bandwidth of the scheduled web conference. The present invention may include determining whether to transmit a line art drawing for one or more participants based on the network bandwidth of the scheduled web conference.

Inventor

Ilse M. Breedvelt-Schouten

DIGITAL TWIN SIMULATION OF INTERACTIVE VOICE RESPONSE SYSTEM CALL (17655997)

Abstract

An embodiment for simulating an interactive voice response system (IVRS) call with a digital twin agent of a user is provided. The embodiment may include receiving data relating to characteristics of the user, activities of the user, and historical data relating to one or more prior IVRS dialogs. The embodiment may also include creating a digital twin agent of the user. The embodiment may further include identifying one or more preferences of the user from the historical data. The embodiment may also include in response to determining the user is occupied, identifying a context of an issue requiring an IVRS call. The embodiment may further include initiating the IVRS call with the digital twin agent representing the user. The embodiment may also include transcribing an IVRS script and interacting with the IVRS in accordance with the IVRS script and the one or more preferences of the user.

Inventor

Partho Ghosh

PROVIDING CONTROLLED ACCESS TO CONTENT ON A CLIENT SYSTEM (17656259)

Abstract

Providing controlled access to content on a client system by providing protected content on a client system where the content is accessible with a token and providing a media file at the client system with the token embedded in association with the media file. The protected content is accessed by releasing the token to the client system when it is determined that an action condition of the media file has been met and using the token to enable access to the protected content on the client system.

Inventor

Alexander Esam

MULTIPLE ENTITY VIDEO CAPTURE COORDINATION (17704719)

Abstract

A capture operation is identified. The capture operation is of a video stream of a subject located in an environment. The capture operation is performed by a first capture device from a first perspective of the subject. A perspective update request of the video stream is received. In response to the perspective update request, one or more candidate capture devices in the environment is detected. A second capture device is selected as a selected capture device, from the one or more candidate capture devices. The second capture device is instructing to perform the capture operation based on the selection. The video stream is transferred from the first capture device to the second capture device. The transferring updates the video stream to a second perspective of the subject.

Inventor

Jana H. Jenkins

MULTIPLE ENTITY VIDEO CAPTURE COORDINATION (17704471)

Abstract

A capture operation is identified. The capture operation is performed by a first capture device. The capture operation is of a video steam of a subject that is located in an environment. The video stream includes a perspective of the subject. A capture limitation of the first capture device, related to capturing the subject, is determined. In response to the capture limitation one or more candidate capture devices in the environment are detected. A second capture device is selected as a selected capture device, from the one or more candidate capture devices. The second capture device is instructed to perform the capture operation. The video stream is transferred from the first capture device to the second capture device; the transfer maintains the perspective.

Inventor

Jana H. Jenkins

DYNAMIC MANAGEMENT OF A SOUND FIELD (17656230)

Abstract

A processor may receive sound data associated with a bounded environment. The sound data may be associated the sound data is associated with a sound field. The processor may analyze the sound data associated with the sound field to identify one or more external sound sources and one or more internal sound sources. The processor may generate one or more simulations of the sound field based, at least in part, on a user preference set. The processor may modify a sound field within the bounded environment. The modified sound field may be based, at least in part, on the one or more simulations of the sound field and the user preference set.

Inventor

Shailendra Moyal

RESOURCE MANAGEMENT AND LOGICAL CHANNEL AGGREGATION FOR 5G NETWORKS (17656655)

Abstract

Resource load balancing for eNodeB includes identifying reduced workload conditions for an underutilized processor (CPU) core and transferring dedicated traffic channel (DTCH) communication to a target CPU core. Upon migrating each DTCH from the selected CPU core, the underutilized CPU core is caused to go into sleep mode, not to receive DTCH request until activated.

Inventor

Grzegorz Piotr Szczepanik

REGISTERED EDGE DEVICE MANAGEMENT (17655842)

Abstract

A method can include obtaining device data for a set of edge devices. The method can further include obtaining a predicted travel path of a focal entity. The method can further include determining, for a first edge device of the set of edge devices and based on the device data, a first proximity of the first edge device to the predicted travel path. The method can further include selecting the first edge device based, at least in part, on the first proximity. The method can further include transmitting, in response to the selecting the first edge device, a workload to the first edge device. The method can further include receiving, in response to the transmitting the workload, first captured data obtained by the first edge device. The method can further include transmitting the first captured data to an electronic user device.

Inventor

Akira Saito

EMBEDDED MAGNETORESISTIVE RANDOM ACCESS MEMORY (17656045)

Abstract

Embodiments are disclosed for a system. The system includes a semiconductor structure. The semiconductor structure includes a wafer, multiple transistors, and a magnetoresistive random access memory (MRAM) cell disposed on the backside of the wafer. The transistors are disposed on a front end of line (FEOL) of the wafer. The MRAM cell is connected to a source-drain of the transistors by a contact disposed on the backside of the wafer. The transistors are in direct electrical contact with the MRAM cell by at least one contact.

Inventor

Heng Wu

HIGH DENSITY MEMORY WITH STACKED NANOSHEET TRANSISTORS (17705320)

Abstract

A high density memory apparatus includes a plurality of transistors vertically stacked on top of each other. The plurality of transistors share a common source structure, but each of the plurality of transistors has its own horizontal nanosheet and gate stack that are separate from respective horizontal channel structures and gate stacks of the others of the plurality of transistors. Ends of the nanosheets distal from the gate stacks are doped to act as drains for the transistors. Each of a plurality of two-terminal memory units is electrically connected to the drain end of a corresponding one of the nanosheets. Some embodiments achieve in excess of 5000 memory bits/square micrometer (μm); in some embodiments, in excess of 6000 bits/μm.

Inventor

Heng Wu

TEMPERATURE INDICATOR POWERED BY THERMOELECTRIC GENERATOR (17656664)

Abstract

Described are systems for electronic heatsink safety including a system comprising a thermoelectric generator integrated into a heatsink, where the thermoelectric generator includes a first portion exposed to ambient temperature and a second portion contacting the heatsink, and where the thermoelectric generator is configured to produce a current based on a temperature difference between the first portion and the second portion. The system further comprises a first Light Emitting Diode (LED) electrically connected to the thermoelectric generator, where the current is configured to activate the first LED.

Inventor

Noah Singer

ADVANCED MRAM DEVICE STRUCTURE (17655795)

Abstract

A MRAM Cell including a dielectric cap and a lower section that includes a bottom electrode, a synthetic anti-ferromagnet layer, and a reference layer, where in the sidewalls of each of the bottom electrode, the synthetic anti-ferromagnet layer, and the reference layer are angled relative to the vertical plane perpendicular to a top surface of the dielectric cap. A first dielectric liner located on the sidewalls of each of the lower section. An upper section that includes a tunnel barrier, a free layer, and a top electrode. A second dielectric liner located on a side section of the tunnel barrier, where the second dielectric liner is comprised of a second material, and where the angled side sections of the tunnel barrier are located on top of the second dielectric liner.

Inventor

Oscar van der Straten

ANTENNA ASSISTED RERAM FORMATION (18205208)

Abstract

A memory structure comprises a ReRAM module embedded in a substrate. An insulative layer is formed on the substrate. A first electrode is located on the insulative layer. The first electrode is proximately connected to a first end of the ReRAM module and comprises a first surface area. A second electrode is located on the insulative layer. The second electrode is proximately connected to a second end of the ReRAM module. The second electrode comprises a second surface area, a plasma-interacting component, and a resistive component. The resistive component is located between the plasma-interacting component and the ReRAM module. A ratio of the first surface area to the second surface area creates a voltage between the first electrode and second electrode when the first surface area and second surfaces area are exposed to an application of plasma. The voltage forms a conductive filament in the ReRAM module.

Inventor

Youngseok Kim

PHASE CHANGE MEMORY CELL WITH OVONIC THRESHOLD SWITCH (18311922)

Abstract

A structure including a bottom electrode, a phase change material layer vertically aligned and an ovonic threshold switching layer vertically aligned above the phase change material layer. A structure including a bottom electrode, a phase change material layer and an ovonic threshold switching layer vertically aligned above the phase change material layer, and a first barrier layer physically separating the ovonic threshold switching layer from a top electrode. A method including forming a structure including a liner vertically aligned above a first barrier layer, the first barrier layer vertically aligned above a phase change material layer, the phase change material layer vertically aligned above a bottom electrode, forming a dielectric surrounding the structure, and forming an ovonic threshold switching layer on the first barrier layer, vertical side surfaces of the first buffer layer are vertically aligned with the first buffer layer, the phase change material layer and the bottom electrode.

Inventor

Nanbo Gong

LATERAL PHASE CHANGE MEMORY CELL (17656430)

Abstract

A structure including an inner electrode and an outer electrode on a substrate and a phase change material layer, the phase change material layer vertically aligned above both the inner electrode and the outer electrode. A structure including an inner electrode and an outer electrode on a substrate and a phase change material layer, the phase change material layer vertically aligned above both the inner electrode and the outer electrode, where the inner electrode and the outer electrode are on the same horizontal plane. A method including forming an inner electrode and an outer electrode simultaneously on a substrate, forming a phase change material layer above both the inner electrode and the outer electrode.

Inventor

Timothy Mathew Philip