One or more unmanned aerial vehicles (UAVs) having a ground map stored therein are employed to assist an aircraft in landing at an airfield. A determination is made that the aircraft requires assistance landing at the airfield. Instructions are sent to the one or more UAVs to synchronize a flight path with the aircraft. The one or more UAVs receive sensor data regarding conditions surrounding the aircraft and the airfield. The aircraft is controlled by the one or more based upon the ground map, the flight characteristic profile, and the group map. The controlling of the aircraft by the one or more UAVs is discontinued upon the aircraft landing at the airfield.
Evaluating localized atmospheric conditions for selected cloud seeding to enhance localized electrical power generation from wind turbines by receiving, at a computer, wind farm data related to a plurality of wind turbines for generating electrical power at a location. The wind farm data collected from sensors at the location. An atmospheric condition in the atmosphere at the location is assessed by the computer, using the wind farm data and the data of the atmospheric conditions. The computer generates a prediction of an impact of the atmospheric condition on the atmospheric wind speed resulting in a wind turbine power output reduction. A determination is made when to initiate cloud seeding to generate rain at the location and reduce the atmospheric condition. Generating a communication to a control system which includes a recommendation to initiate the cloud seeding based on the prediction.
G01W 1/04 - Instruments for indicating weather conditions by measuring two or more variables, e.g. humidity, pressure, temperature, cloud cover or wind speed giving only separate indications of the variables measured
A01G 15/00 - Devices or methods for influencing weather conditions
F03D 17/00 - Monitoring or testing of wind motors, e.g. diagnostics
G01W 1/10 - Devices for predicting weather conditions
3.
ENCRYPTED END-TO-END MESSAGING USING NEAR-FIELD COMMUNICATION (NFC) TAGS
A computer-implemented method, according to one embodiment, includes using a first symmetric key to encrypt a first private key of a first asymmetric key pair, and storing the encrypted first private key on a predetermined near-field communication (NFC) tag. The method further includes storing a first public key of the first asymmetric key pair and the first symmetric key on a predetermined central repository, and obtaining an encrypted first message and an encrypted first group key from the central repository. The encrypted first message was encrypted using the first group key, and the encrypted first group key is the first group key encrypted using the first public key. The method further includes using the encrypted first private key stored on the predetermined NFC tag to decrypt the encrypted first message.
A digital model is generated of a debris location where the digital model includes an augmented reality overlay of the debris location. Digital data from sensors at a debris field is received at a computer, and the digital data depicts debris in the debris field. Materials in the debris field are detected and identified based on the detected materials in the debris field. Layers of materials in the debris field are identified. A digital model is generated of the materials in the debris field including in the layers. Using the computer and an augmented reality (AR) device, an augmented reality overlay is generated based on the digital model of the materials in the debris fields. The augmented reality overlay is superimposed over the digital model of the materials in the debris field to indicate the materials in the debris field and the materials in the layers of the debris field.
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
5.
CONDITIONING PROMPTS FOR GENERATIVE ARTIFICIAL INTELLIGENCE SYSTEMS FOR PRODUCTION OF STRUCTURED OUTPUT
Conditioning prompts for generative artificial intelligence (AI) systems includes receiving a user prompt via a user interface. The user prompt is for a generative artificial intelligence system and is specified as natural language. A selected prompt class is chosen from a plurality of prompt classes by matching a natural language processing analysis of the user prompt to a prompt template of the selected prompt class. A well-structured prompt is created by transforming the user prompt based on the prompt template of the selected prompt class. A conditioned prompt is generated by combining a set of one or more conditioning instructions from the selected prompt class with the well-structured prompt. The conditioned prompt is submitted to the generative artificial intelligence system. The conditioned prompt is configured to evoke a response including a structured output from the generative artificial intelligence system.
A package structure comprises a first quantum bit chip and a second quantum bit chip mounted on a carrier substrate. The carrier substrate comprises an inter-chip coupling network which is configured to provide non-galvanic and differential coupling of the first quantum bit chip and the second quantum bit chip.
A semiconductor integrated circuit (IC) device that includes an angled gate cut region, a first transistor associated with a first gate, and a second transistor associated with a second gate. The angled gate cut region may be angled such that its top surface area is nearest a boundary of the first transistor and its bottom surface area is nearest a boundary of the second transistor. The angled gate cut region may separate the first gate from the second gate and may further separate the source/drain regions of the first transistor from the source/drain regions of the second transistor. The angled gate cut region may provide for adequate frontside surface area of the first gate to which a frontside gate contact may connect and may further provide for adequate backside surface area of the second gate to which a backside gate contact may connect.
H01L 21/28 - Manufacture of electrodes on semiconductor bodies using processes or apparatus not provided for in groups
H01L 21/8238 - Complementary field-effect transistors, e.g. CMOS
H01L 27/092 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including only semiconductor components of a single kind including field-effect components only the components being field-effect transistors with insulated gate complementary MIS field-effect transistors
H01L 29/06 - Semiconductor bodies characterised by the shapes, relative sizes, or dispositions of the semiconductor regions
H01L 29/417 - Electrodes characterised by their shape, relative sizes or dispositions carrying the current to be rectified, amplified or switched
H01L 29/423 - Electrodes characterised by their shape, relative sizes or dispositions not carrying the current to be rectified, amplified or switched
Embodiments of present invention provide a semiconductor structure. The structure includes a first cell unit including a first set of field-effect-transistors (FETs), a first cell boundary made of a first gate cut region, and a second cell boundary made of a second gate cut region; a second cell unit including a second set of FETs, a third cell boundary made of a third gate cut region, and a fourth cell boundary made of the first gate cut region; and a third cell unit including a third set of FETs, a fifth cell boundary made of the second gate cut region, and a sixth cell boundary made of a fourth gate cut region, where the first and third gate cut regions have a first width and the second and fourth gate cut region has a second width larger than the first width. A method of forming the same is also provided.
H01L 27/088 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including only semiconductor components of a single kind including field-effect components only the components being field-effect transistors with insulated gate
An embodiment configures a plurality of parameters, the parameters being usable to generate artificial data from original data, the configuring adjusting a level of privacy in the artificial data. An embodiment fits a distribution type to a variable of the original data. An embodiment adjusts, using a desired level of privacy and the distribution type, a level of noise, wherein the level of noise corresponds to the desired level of privacy. An embodiment generates, using the distribution type and the level of noise, the artificial data, the artificial data achieving the desired level of privacy by including noise data corresponding to the level of noise.
Mechanisms are provided for customizing an avatar in a virtual environment. A user that is interacting with the virtual environment, and to whom the avatar is to be rendered in the virtual environment, is identified and classified with regard to a plurality of affinity groups specifying levels of affinity between the first user and an operator of the avatar. A user security and privacy policy (USPP) data structure, associated with the operator, is retrieved that specifying security and privacy policies for each affinity group in the plurality of affinity groups. Based on the user classification and the security and privacy policy, an anonymization operation is applied to static and/or dynamic characteristics data for the operator which are used to render the avatar, to thereby generate anonymized characteristic data. The anonymized characteristic data is output for rendering the avatar in the virtual environment.
Setpoint control processing is provided which includes generating, for a current state of a process, an artificial intelligence recommended control setpoint for the process, and obtaining, by one or more processors, historical process state instances, and associated control setpoints, related to the current state of the process. The artificial intelligence recommended control setpoint for the process is compared, by the one or more processors, to the associated control setpoints of the historical process state instances related to current state of the process. Based on a result of the comparing, a control system setpoint for the process is updated for optimal control of the process for a current process optimization objective, and the process is operated using the updated control system setpoint to optimally control the process for the current process optimization objective.
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
In an approach to managing access changes to enterprise resources, one or more computer processors detect a status change of an employment of a user in an enterprise. One or more computer processors retrieve an access level of the user associated with one or more enterprise resources. Based on the status change, one or more computer processors determine the access level of the user associated with at least one of the one or more enterprise resources needs to change. One or more computer processors determine whether the user is an owner of the at least one resource. In response to determining the user is an owner of the at least one resource, one or more computer processors retrieve an employee hierarchy. Based on the employee hierarchy, one or more computer processors assign temporary ownership of the at least one resource to a first employee of the enterprise.
Revising data management indices by defining a plurality of data entity buckets, assigning bucket hash values to each data record according to the plurality of data entity buckets, generating a record index including data record bucket membership data, determining a combined record score for each data record according to the bucket membership data, revising data record relationship indices of a data management system according to the combined record score of a data record, and responding to a user query according to the record index including the revised record relationships.
Provided are a computer program product, system, and method for verifying translations of text in a source language to target text in a target language. A source similarity score is calculated indicating a similarity between a first text and second text in a source language. A target similarity score is calculated between translated first text, comprising a translation of the first text in a target language, and translated second text, comprising a translation of the second text in the target language. A determination is made whether the translation of the first text to the translated first text is of an inappropriate translation quality based on the source similarity score and the target similarity score. Indication is made of indicating the inappropriate translation quality in response to determining the inappropriate translation quality.
Disclosed are techniques of a computer implemented method for resizing a captured image. One embodiment may comprise receiving a desired size and a subject of the captured image as input from a user, automatically resizing the captured image using a generative adversarial network (GAN) to about the desired size, where the resizing enhances a prominence of the subject of the captured as compared to the captured image, and storing the automatically resized image on a computer readable storage medium.
G06T 3/40 - Scaling of whole images or parts thereof, e.g. expanding or contracting
G06V 10/26 - Segmentation of patterns in the image fieldCutting or merging of image elements to establish the pattern region, e.g. clustering-based techniquesDetection of occlusion
G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
G06V 10/94 - Hardware or software architectures specially adapted for image or video understanding
H04N 5/262 - Studio circuits, e.g. for mixing, switching-over, change of character of image, other special effects
16.
OPTIMIZING ENERGY PRODUCTION BY A WIND TURBINE HAVING SHADOW ENERGY GENERATOR
Computer-implemented methods for optimizing energy production by a wind turbine having shadow energy generator are provided. Aspects include obtaining a geographic location of the wind turbine and a weather forecast for the geographic location. Aspects also include calculating an estimated wind energy production for each of a plurality of configurations of the wind turbine based on the weather forecast, calculating an estimated shadow energy generator energy production for each of the plurality of configurations of the wind turbine based on the weather forecast, and identifying one of the plurality of configurations of the wind turbines based on a combination of the estimated wind energy production and the estimated shadow energy generator energy production. Aspects further include reconfiguring the wind turbine into a first configurations, where the first configurations is identified as the configuration with a largest sum of estimated wind energy production and estimated shadow energy generator energy production.
F03D 17/00 - Monitoring or testing of wind motors, e.g. diagnostics
F03D 9/00 - Adaptations of wind motors for special useCombinations of wind motors with apparatus driven therebyWind motors specially adapted for installation in particular locations
G06F 30/20 - Design optimisation, verification or simulation
17.
Intelligent Data Movement for Data Residency Restrictions
A computer implemented method for managing data in a mobile computing device. A number of processor units determine a geographic location of a mobile computing device. The number of processor units predict a predicted data residency issue with meeting data residency requirements for data stored in the mobile computing device based on the geographic location of the mobile computing device and a set of movement patterns for the mobile computing device. The number of processor units identify a number of recipient devices that meet the data residency requirements for moving the data from the mobile computing device to the number of recipient devices in response to predicting the predicted data residency issue. The number of processor units move the data to the number of recipient devices from the mobile computing device in response to identifying the number of recipient devices.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
18.
CONTACT PLACEHOLDER FORMATION FOR DIFFERENT DEVICE TYPES
A semiconductor structure comprises at least one first nanosheet transistor and at least one second nanosheet transistor disposed on a dielectric layer. The first nanosheet transistor comprises at least one first source/drain region disposed on a side of the first nanosheet transistor. The second nanosheet transistor comprises at least one second source/drain region disposed on a side of the second nanosheet transistor. The second source/drain region has a larger dimension along a given direction than a dimension of the first source/drain region along the given direction. One of a dielectric fill layer and an air gap is disposed in the dielectric layer and under the second source/drain region. A semiconductor layer is disposed under the second source/drain region, in the dielectric layer and around the one of the dielectric fill layer and the air gap.
H01L 27/12 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being other than a semiconductor body, e.g. an insulating body
19.
INFERENCE BY TREE-BASED ENSEMBLE MODELS ON ENCRYPTED DATA
Techniques are provided for inference by tree-based ensemble models on encrypted data. One method includes identifying a plurality of nodes included in a plurality of decision trees of a tree-based ensemble model, and determining, from the plurality of nodes, a first set of nodes where each node represents a unique combination of a feature and a threshold. The method further includes assigning distinct identifiers to the nodes of the first set, identifying a second set of paths included in the plurality of decision trees, and generating an optimized model, where each path of the second set is represented using the distinct identifiers that correspond to the respective nodes along the path, and branch directions taken from the respective nodes.
In an approach, a processor performs document layout analysis on a document generating a plurality of textual regions; extracts characteristics from each of the plurality of textual regions and associates the respective characteristics to the respective textual region as metadata; classifies each of the plurality of textual regions as an optical character recognition (OCR) region, non-OCR valuable region, or non-OCR non-valuable region using a classifier; performs OCR on each OCR region generating an OCR output; identifies associated constant OCR data from a constant OCR data repository for each non-OCR valuable region; merges the associated constant OCR data with the OCR output generating a complete OCR data for the received document; performs data extraction on the complete OCR data to identify data fields and key-value pairs generating extracted data; and determines whether the extracted data is valid based on a set of rules.
Computer implemented methods, systems, and computer program products include program code executing on a processor(s) that obtains a user query. The program code selects just in time (JIT) statistics relevant for use by a cost optimizer to generate a plan file for executing the user query by determining, based on JIT metadata in a JIT statistics cache, if JIT statistics generated responsive to an earlier event are these JIT statistics, and based on determining that the JIT statistics generated responsive to the earlier event are these JIT statistics, selects these JIT statistics to generate the plan file. The program code utilizes the cost optimizer to generate the plan file based on these JIT statistics. The program code executes the user query in the target database based on the plan file.
Computer implemented methods, systems, and computer program products include program code executing on a processor(s) that obtain a query comprising a JOIN statement that references two or more tables in the one or more remote databases. The program code determines, for each table of the two or more tables, whether executing the JOIN statement utilizes system resources above a pre-defined allotment. Based on determining, for at least one table the program code generates a filter for the at least one table based on an intersection between predicates in the query. The program code applies the filer to the at least one table to fetch results for the query and exclude unrelated data from the fetching.
A hierarchical integrated circuit design includes at least an upper hierarchy level, an intermediate hierarchy level, and a lower hierarchy level. The lower hierarchy level includes a design entity including an antenna diode. Processing circuitry of a data processing system performs placement for integrated circuitry bounded by the design entity. Performing placement for the integrated circuitry includes determining whether or not an antenna cell containing the antenna diode has any proximate cell containing an antenna diode or other diffusion region connected to a chip package pin and, based on a determination that the antenna cell has an adjoining cell containing a diffusion region connected to a chip package pin, automatically padding the antenna cell with sufficient padding to satisfy a minimum antenna cell spacing rule and assigning the antenna cell location within a floorplan of the integrated circuit design such that electrostatic discharge events occurring on chip package pins will not damage the chip.
A method, system, and computer program product for optimizing development of a quantum circuit or a quantum model on a development quantum system for later use on a production quantum system. Operational and performance data are obtained from the development quantum system and the production quantum system. A noise fingerprint for the development quantum system and a noise fingerprint for the production quantum system are then generated based on the obtained operational and performance data. A noise fingerprint refers to the main features of the quantum noise sources affecting a quantum device, such as a quantum system. Parameters of the development quantum system may then be continually adjusted until the difference between the noise fingerprint for the development quantum system and the noise fingerprint for the production quantum system is below a threshold value.
A computer-implemented method for anomaly detection for a time series data is provided. Aspects include receiving a time series data including a plurality of sequential data points, calculating an expected next value for the time series data based on the plurality of sequential data points, and receiving an actual next value corresponding to the time series data. Aspects also include calculating an anomaly strength estimate based on the expected next value and the actual next value, identifying one of a plurality of anomaly detection pipelines based on the anomaly strength estimate and a portrait associated with each of the plurality of anomaly detection pipelines, and obtaining an anomaly prediction by inputting the time series data and the actual next value into the one of the plurality of anomaly detection pipelines.
Embodiments are related to metaverse collaborative environment monitoring. An aspect includes providing a virtual room in a virtual environment, a content in the virtual room initially being excluded from monitoring. An aspect includes monitoring a context associated with the virtual room and determining that the context of the virtual room meets at least one condition. An aspect includes deploying at least one virtual camera for monitoring the content in the virtual room, in response to determining that the context of the virtual room meets the at least one condition. Participants are alerted in the virtual room that monitoring is occurring in the virtual room.
According to one embodiment, a method, computer system, and computer program product for human recognition through use of text entry is provided. The embodiment may include tracking user inputs. The embodiment may also include tracking time intervals between user inputs. The embodiment may further include storing input-interval sets, each input-interval set containing at least one input from the user inputs and at least one time interval from the time intervals between user inputs, wherein the at least one input corresponds to the at least one time interval. The embodiment may also include pretraining a foundation model based on the stored input-interval sets. The embodiment may further include training the foundation model for a particular task.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
A method includes forming a first stage of a multi-stage via in a semiconductor structure utilizing processing from a first side of the semiconductor structure, the first stage of the multi-stage via having a first surface and a second surface opposite the first surface. The method also includes forming a second stage of the multi-stage via utilizing processing from a second side of the semiconductor structure, the first stage of the multi-stage via having a first surface and a second surface opposite the first surface. The first surface of the first stage of the multi-stage via is proximate the first side of the semiconductor structure, the first surface of the second stage of the multi-stage via is proximate the second side of the semiconductor structure, and the second surface of the first stage of the multi- stage via abuts the second surface of the second stage of the multi-stage via.
H01L 21/768 - Applying interconnections to be used for carrying current between separate components within a device
H01L 21/822 - Manufacture or treatment of devices consisting of a plurality of solid state components or integrated circuits formed in, or on, a common substrate with subsequent division of the substrate into plural individual devices to produce devices, e.g. integrated circuits, each consisting of a plurality of components the substrate being a semiconductor, using silicon technology
H01L 21/8238 - Complementary field-effect transistors, e.g. CMOS
H01L 23/48 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements
H01L 23/528 - Layout of the interconnection structure
H01L 27/06 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including a plurality of individual components in a non-repetitive configuration
H01L 29/78 - Field-effect transistors with field effect produced by an insulated gate
Embodiments of present invention provide a semiconductor structure. The structure includes a first cell unit including a first set of field-effect-transistors (FETs), a first cell boundary made of a first gate cut region, and a second cell boundary made of a second gate cut region; a second cell unit including a second set of FETs, a third cell boundary made of a third gate cut region, and a fourth cell boundary made of the first gate cut region; and a third cell unit including a third set of FETs, a fifth cell boundary made of the second gate cut region, and a sixth cell boundary made of a fourth gate cut region, where the first and third gate cut regions have a first width and the second and fourth gate cut region has a second width larger than the first width. A method of forming the same is also provided.
H01L 29/06 - Semiconductor bodies characterised by the shapes, relative sizes, or dispositions of the semiconductor regions
H01L 21/822 - Manufacture or treatment of devices consisting of a plurality of solid state components or integrated circuits formed in, or on, a common substrate with subsequent division of the substrate into plural individual devices to produce devices, e.g. integrated circuits, each consisting of a plurality of components the substrate being a semiconductor, using silicon technology
H01L 27/02 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier
H01L 27/06 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including a plurality of individual components in a non-repetitive configuration
H01L 27/088 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including only semiconductor components of a single kind including field-effect components only the components being field-effect transistors with insulated gate
H01L 29/775 - Field-effect transistors with one-dimensional charge carrier gas channel, e.g. quantum wire FET
Embodiments herein describe techniques for a host to provide TX packets to a shared adapter that then uses a NIC to forward the TX packet to a network. In one embodiment, the host creates or fills in one or more TX storage block page entries (SBPE) for the TX packet and stores an index of the TX SBPE in host memory. The host memory can also store an initiative state that tracks whether the shared adapter is currently processing TX packets. If not, the host can issue an interrupt to the shared adapter, along with the index associated with the TX SBPE. The shared adapter can then fetch the TX SBPE from host memory and program the NIC to transmit the TX packet.
A back-end-of-the-line (BEOL) interconnect structure is provided that includes a top via structure located on a metal line. An air gap is located adjacent to, and around, the metal line and top via structure. This air gap includes a lower portion adjacent to the metal line and an upper portion adjacent to the top via structure. Such an air gap can extend BEOL interconnect scaling for 2 nm technology node and below. Methods of forming such an BEOL interconnect structure are also provided.
H01L 21/768 - Applying interconnections to be used for carrying current between separate components within a device
H01L 23/522 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body
H01L 23/532 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body characterised by the materials
32.
ARTIFICIAL DATA GENERATION FOR DIFFERENTIAL PRIVACY
An embodiment configures a plurality of parameters, the parameters being usable to generate artificial data from original data, the configuring adjusting a level of privacy in the artificial data. An embodiment fits a distribution type to a variable of the original data. An embodiment adjusts, using a desired level of privacy and the distribution type, a level of noise, wherein the level of noise corresponds to the desired level of privacy. An embodiment generates, using the distribution type and the level of noise, the artificial data, the artificial data achieving the desired level of privacy by including noise data corresponding to the level of noise.
Techniques regarding modifying a forecasting model are provided. For example, one or more embodiments described herein can comprise a modeling system, which can comprise a memory that can store computer executable components. The modeling system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can include an identifying component that can identify qualitative information related to a forecasting model of an operation of a system, wherein the forecasting model was generated through data obtained from the operation of the system. The computer executable components can include a modifying component that can modify the forecasting model based on intervention information generated based on the qualitative information, wherein the intervention information is associated with a prediction of the forecasting model.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
A method, computer system, and a computer program product are provided for providing multi-cloud collaboration. In one embodiment, the technique comprises obtaining registration information for a plurality of participants. The participants are devices located on a plurality of computer networks. A measurement query request is received from a query requester. The query requester is one of the plurality of participants. Contributions measurements is also received from a subset of the plurality of participants and measurement data is then updated based on the contributions received from the subset of participants. Measurement data is the provided in response to said measurement query. The amount of data provided depends on a set of policies regarding measurement contributions made by the query requester.
Described are techniques for software test reliability characterization. The techniques include receiving a test failure for a software under development in an Integrated Development Environment (IDE). The techniques further include identifying, from a software testing repository communicatively coupled to the IDE, a similar failed software test. The techniques further include applying a reliability index of the similar failed software test to the test failure. The techniques further include displaying, on a graphical user interface communicatively coupled to the IDE, a graphical illustration indicating the reliability index associated with the test failure.
Embodiments herein describe techniques for identifying excess antennas (or antenna diodes) in a IC design using computer software tools. An IC design can be changed for any number of reasons, which can change the number of antennas that are required to sufficiently protect the IC from damage during the fabrication process. Currently, a chip designer would use a ratio to determine whether a portion of the IC (e.g., a macro) has too many or too few antennas. The embodiments herein describe techniques where computer software tools identify excess antennas for the designer. The designer can then decide whether to remove these antennas. In another embodiment, the computer software tools may automatically remove some or all of the identified excess antennas, without input from the chip designer.
An embodiment registers a node and a data object on a blockchain. The embodiment schedules by a Scheduler an object task associated with the data object in a Data Controller, generating a task execution token by the Data Controller on the blockchain where the task execution token is associated with the object task. The embodiment senses the task execution token by the node received from the Data Controller; responsive to the sensed task execution token executes the object task on the node and generating a node energy consumption metric and an energy consumption token of the object task on the blockchain. The embodiment also sends the energy consumption token to the Data Controller from the node causing a smart contract to compute a task energy consumption metric based on the node energy consumption metric where the data object on the blockchain is updated with the task energy consumption metric.
A method, computer system, and a computer program product are provided for backup and restoration of data. Data is obtained from a plurality of resources during a plurality of tasks. The resources are located in one or more computing networks. A plurality of parameters are extracted from obtained data. A table is generated and stored that includes the parameters extracted and an associated related task. A predict time is calculated based on the table for recovery of data when any of the resources become unavailable. A task priority is established based on calculated predict time and the table to optimize and improve the predict recovery time. A restoration model is generated based on updated restoration recommendation. The restoration model is to be used during resource unavailability or failure of one or more of the resources.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
A computer-implemented method, according to one approach, includes: receiving a new work item, and extracting topics from the new work item. A trained machine learning model is used to determine a first set of values representing correlation strengths between the new work item and the topics. Moreover, the first set of values are compared to a second set of values, where the second set of values represents correlation strengths between the topics and multiple files. A third set of values representing correlation strengths between the new work item and the multiple files is also generated, and output.
Provided is a method, system, and computer program product for automatically identifying and preparing assets needed for a virtual meeting using artificial intelligence. A processor may receive a set of communications associated with an upcoming virtual meeting. The processor may analyze, using natural language processing, the set of communications to identify one or more assets to be loaded for the upcoming virtual meeting. The processor may load the one or more assets on a computing device that will be presenting the one or more assets during the upcoming virtual meeting.
A pulse limiter circuit of a phase-locked loop (PLL) receives, from a phase frequency detector of the PLL, first second input pulses, where pulse widths of the first and second input pulses indicate whether a reference clock signal leads or lags a feedback clock signal. The pulse limiter circuit determines whether a pulse width of the first or second input pulse is greater than a selected duration indicative of transient phase jitter. Based on determining the pulse width of the first or second input pulse is greater than the selected duration, the pulse limiter circuit sets a pulse width of a first output pulse equal to a pulse width of a second output pulse width and outputs the first and second output pulses to a charge pump of the PLL, such that no phase adjustment to the feedback clock signal is made based on the first and second input pulses.
H03L 7/089 - Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal the phase or frequency detector generating up-down pulses
42.
Synergy Aware Path Creation in a Network Computing Environment
A computer implemented method for computing device collaboration. A number of processor units identify computing device groupings for collaboration in processing data based on synergy levels between the computing device groupings. The computing device groupings process a set of common data types. The number of processor units instruct the computing device groupings to share the data for the set of common data types. The number of processor units deploy a number of relay devices to facilitate communications between the computing device groupings in response to the computing device groupings not being in communication with each other.
A semiconductor device includes a device wafer having a first side and a second side, a bus located on the second side of the device wafer, and a top wafer having a first side and a second side. A plurality of qubits are located on the first side of the device wafer, and a first plurality of bump bonds located on the first side of the top wafer bond the top wafer with the second side of the device wafer.
H01L 23/50 - Arrangements for conducting electric current to or from the solid state body in operation, e.g. leads or terminal arrangements for integrated circuit devices
H01L 23/60 - Protection against electrostatic charges or discharges, e.g. Faraday shields
H01L 25/16 - Assemblies consisting of a plurality of individual semiconductor or other solid-state devices the devices being of types provided for in two or more different subclasses of , , , , or , e.g. forming hybrid circuits
44.
REMOTE ENTANGLEMENT OF SUPERCONDUCTING QUANTUM BITS USING DOUBLE OPTICAL HERALDING
Techniques are provided for performing an optically heralded entanglement process to entangle states of a first data quantum bit and a second data quantum bit into an entangled state of computational basis states comprising a ground state and a first excited state. An optically heralded entanglement process comprises performing a first optically heralded entanglement process to determine whether the entangled state of the first data quantum bit and the second data quantum bit excludes a state in which both the first data quantum bit and the second data quantum bit can be in the ground state, and performing a second optically heralded entanglement process to determine whether the entangled state of the first data quantum bit and the second data quantum bit excludes a state in which both the first data quantum bit and the second data quantum bit can be in the first excited state.
Provided are techniques for optimizing and generating a personalized content item for display during web page load time. The web page load time is predicted, and a list of personalized content items with corresponding ranks is received. In response to determining that a top ranked personalized content item of the list of personalized content items does not run within the web page load time, the web page load time is split into a split generation time and a split run time. In response to determining that the split generation time is less than a threshold, a new personalized content item is generated that runs within the split run time and displayed. In response to determining that the split generation time is equal to or greater than the threshold, an existing personalized content item is summarized to run within the split run time and displayed.
Iowa State University Research Foundation, Inc. (USA)
International Business Machines Corporation (USA)
Inventor
Khan, Muhammad Rizwan
Huang, Cheng
Zhang, Xin
Abstract
A power converter is disclosed having an input switch coupled between a supply terminal and a switching input node, a capacitor coupled between the switching input node and a switching multiple output node, a discharge switch coupled between the switching input node and ground, an inductor coupled between the switching multiple output node and ground, a plurality of output switches coupled between the switching multiple output node and a corresponding one of a plurality of output terminals. A converter controller has a plurality of switch control outputs coupled to corresponding ones of an input switching control terminal, a discharge switching control terminal, and an output switching control terminal of each of the plurality of output switches. The converter controller generates switching signals for the input switch, the discharge switch, and the plurality of output switches to generate individual output voltages at corresponding ones of the plurality of output terminals.
H02M 3/158 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators including plural semiconductor devices as final control devices for a single load
According to one embodiment, a method, computer system, and computer program product for personalized artificial intelligence (AI) break scheduling is provided. The embodiment may include monitoring a calendar associated with a user and input data from the user during a block of one or more meetings. The embodiment may also include generating a fatigue array based on the calendar and input data. The embodiment may further include comparing the fatigue array to a user profile associated with the user. The embodiment may also include performing an action based on a correlation between the calendar or fatigue array and user profile exceeding a threshold. The embodiment may also include updating the user profile to include the fatigue array.
Embodiments are disclosed for a latch assembly apparatus. The latch assembly apparatus includes an effort arm, latch housing, a fulcrum, and a torsion spring. The latch housing includes a resistance arm having a claw portion, and an ejection arm. The torsion spring is configured to provide a rotational force around the fulcrum, and on the resistance arm, resulting from a tensioning of the torsion spring between a first end of the torsion spring fixed to the effort arm, and a second end of the torsion spring fixed to a predetermined preload hole disposed on the latch housing. Further, when the latch assembly apparatus is mounted to a removable element, and the removable element is placed in a connection with a drawer element by the latch assembly apparatus, the resistance arm applies a preload to the connection.
F16B 2/18 - Clamps, i.e. with gripping action effected by positive means other than the inherent resistance to deformation of the material of the fastening using cams, levers, eccentrics, or toggles
H05K 7/14 - Mounting supporting structure in casing or on frame or rack
49.
Multiple Level Caching of User Level Thread Stacks for User Level Threads
Multiple level stack caching is provided. A user level thread of a multithreaded application is unmounted from a carrier thread of an operating system. An analysis of a level 1 cache corresponding to the carrier thread in memory is performed to determine whether the level 1 cache is full. An analysis of a level 2 cache in memory is performed to determine whether the level 2 cache is full in response to determining that the level 1 cache corresponding to the carrier thread in memory is full. A user level thread stack corresponding to the user level thread is stored in the level 2 cache in memory in response to determining that the level 2 cache in memory is not full.
A method, computer system, and a computer program product for sustainable power harvesting is provided. The present invention may include constructing a knowledge corpus using data received from a plurality of sources regarding electrical power harvesting from smart materials. The present invention may include determining one or more objects to be utilized for generating electrical power, wherein the one or more objects are comprised of at least one or more smart materials. The present invention may include generating printing instructions for the one or more objects to be executed by a three-dimensional (3D) printer. The present invention may include monitoring a performance of the one or more objects within an environment.
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
51.
Quantum Control System Architecture with Low-Latency Unstructured Control Flow
Systems, computer program products and/or computer-implemented methods described herein relate to a quantum control system architecture with low-latency unstructured control-flow, e.g., including gapless waveform playback through remote invocation of control subsequences. A system can include a memory that stores computer executable components and a processor that executes the computer executable components, which can include an orchestration component that determines selected real-time control sequences for synchronized execution by qubit controllers and a synchronization component that communicates a control message to the qubit controllers, where the control message causes the qubit controllers to wait until a common action time and to execute the selected real-time control sequences at the common action time.
One or more systems, devices, computer program products and/or computer-implemented methods of use provided herein relate to identifying a decoupling location for a space vehicle using reinforcement learning. The computer-implemented system can comprise a memory that can store computer executable components. The computer-implemented system can further comprise a processor that can execute the computer executable components stored in the memory, wherein the computer executable components can comprise a decoupling component that can use an input from a reinforcement learning model to identify a first location that can be in space, for decoupling a space vehicle from an in-space manufacturing unit, such that the space vehicle can land at a second location that can be on a planetary surface.
Devices and/or computer-implemented methods facilitating suppression of spectator effects between qubits are provided. In an embodiment, a device can comprise a tunable-coupler qubit (TCQ), wherein a middle pad of the TCQ is coupled to a first capacitively-shunted flux qubit (CSFQ) coupler and wherein outer pads of the TCQ are coupled to a second CSFQ coupler; a first superconducting qubit coupled to the first CSFQ coupler; and a second superconducting qubit coupled to the second CSFQ coupler.
According to one embodiment of the present disclosure, a circuit board includes a substrate including a slot, electronic components connected to the substrate, a board connector connected to the substrate and communicatively connected to the electronic components, and an installation tool including a lug and a pedestal. The pedestal is positioned through the slot and the lug is positioned in the slot to slidably connect the installation tool to the substrate, and the installation tool extends beyond an end of the substrate.
Techniques regarding modifying a forecasting model are provided. For example, one or more embodiments described herein can comprise a modeling system, which can comprise a memory that can store computer executable components. The modeling system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can include an identifying component that can identify qualitative information related to a forecasting model of an operation of a system, wherein the forecasting model was generated through data obtained from the operation of the system. The computer executable components can include a modifying component that can modify the forecasting model based on intervention information generated based on the qualitative information, wherein the intervention information is associated with a prediction of the forecasting model.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
56.
COFLOWS FOR GEO-DISTRIBUTED COMPUTER SITES THAT COMMUNICATE VIA WIDE AREA NETWORK
A coflow is mapped to a plurality of geo-distributed computer sites that can communicate via wide area network (WAN), where the mapping is subject to one or more location-dependent constraints. Multiple candidate data paths are identified for each of a plurality of source-destination pairs of the plurality of geo-distributed computer sites. A mathematical optimization is performed to find a set of paths from the candidate data paths based on total flow completion time and at least one additional objective of the coflow.
A memory device and formation thereof. The memory device includes a stack of memory dies. Each memory die in the stack of memory dies includes two or more layers of memory devices.
H01L 25/065 - Assemblies consisting of a plurality of individual semiconductor or other solid-state devices all the devices being of a type provided for in a single subclass of subclasses , , , , or , e.g. assemblies of rectifier diodes the devices not having separate containers the devices being of a type provided for in group
H01L 21/768 - Applying interconnections to be used for carrying current between separate components within a device
H01L 23/522 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body
H01L 23/528 - Layout of the interconnection structure
H10B 12/00 - Dynamic random access memory [DRAM] devices
Methods, systems, and products for preventing airflow blockage under a raised floor includes: receiving sensor measurements from a plurality of sensors positioned under a raised floor of a data center, determining, based on the sensor measurements, a mapping of under-floor cabling, and identifying, based on the sensor measurements and the mapping of the under-floor cabling, an airflow blockage under the raised floor.
A method for robotically providing first aid treatment to an affected worker, wherein the affected worker is wearing a robotic suit that further comprises an exoskeleton and one or more secondary detachable robots. The method includes receiving biometric and visual parameters of the affected worker and identifying, by the one or more secondary detachable robots, a context and type of injury to the affected worker. The method further includes determining a first aid treatment plan for the affected worker, based on the identified context and type of injury. The method further includes activating the one or more secondary detachable robots on the robotic suit, based on the determined first aid treatment plan and providing the determined first aid treatment plan to the affected worker, by the activated one or more secondary detachable robots.
G16H 20/40 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to mechanical, radiation or invasive therapies, e.g. surgery, laser therapy, dialysis or acupuncture
An embodiment trains, using a database of tasks, a classifier model to classify an input task into a task category. An embodiment generates a plurality of prompts. An embodiment applies a first prompt in the plurality of prompts to a trained model, the trained model producing a first model output in response to the first prompt. An embodiment classifies, using the trained classifier model, the first model output into a first task category. An embodiment determines that the first task category is an undesired task category. An embodiment adjusts, responsive to determining the first task category is the undesired task category, the trained model, the adjusting altering a capability of the trained model to perform a task in the first task category.
A method for testing and debugging interaction of collaborative mixed reality objects is disclosed. In one embodiment, such a method includes receiving inputs including a first mixed reality object expressed by a first set of attributes, a second mixed reality object expressed by a second set of attributes, a first individual test case associated with the first mixed reality object, and a second individual test case associated with the second mixed reality object. The method automatically generates, from the inputs, a collaborative mixed reality test case to evaluate interaction of the first mixed reality object with the second mixed reality object within a collaborative mixed reality environment. In certain embodiments, a generative-AI-based encoder-decoder architecture is used to generate the collaborative mixed reality test case from the inputs. A corresponding system and computer program product are also disclosed.
Embodiments of the invention include a semiconductor structure having nanosheets separated by inner spacers, the inner spacers having a curved portion in a dimension. The semiconductor structure includes source/drain regions formed adjacent to the nanosheets and gate material formed on the nanosheets.
A computer-implemented method for context aware edge computing and progressive depletion of content is provided. The computer-implemented method includes receiving, at an edge server, a request for a media file sourced from a main server and having media file data temporarily stored on the edge server, determining, from the request, a probability value that a similar request will be received at the edge server, comparing the probability value with a predefined probability threshold value, identifying a portion of the media file data to be deleted from results of the comparing and from a capability of a model stored on the edge server to regenerate the media file data that has been deleted and deleting the portion of the media file data in accordance with results of the identifying.
A method, computer system, and a computer program product are provided for providing multi-cloud collaboration. In one embodiment, the technique comprises obtaining registration information for a plurality of participants. The participants are devices located on a plurality of computer networks. A measurement query request is received from a query requester. The query requester is one of the plurality of participants. Contributions measurements is also received from a subset of the plurality of participants and measurement data is then updated based on the contributions received from the subset of participants. Measurement data is the provided in response to said measurement query. The amount of data provided depends on a set of policies regarding measurement contributions made by the query requester.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
65.
CLEAR PREFETCH STREAM ON DETECTION OF PIPELINE FLUSH
According to one embodiment, a method, computer system, and computer program product for managing access to data is provided. The embodiment may include identifying one or more prefetch streams. The embodiment may also include saving a memory access instruction that created or advanced a selected prefetch stream from the one or more prefetch streams. The embodiment may further include detecting a pipeline flush prior to the saved memory access instruction. The embodiment may also include stopping the portion of the selected prefetch stream that follows the saved memory access instruction based on a type of the saved memory access instruction.
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
66.
CASCADE APPROACH TO FEW-SHOT SEMANTIC SEGMENTATION
A computer-implemented method for semantic segmentation includes constructing a co-occurrence table that includes co-occurrences of predictions of a pre-trained model for base classes and labels for novel classes from the pre-trained model for base classes and from training data with novel classes. Classifiers are trained that associated with a base class and that classify an input into the base class and one of the novel classes that have co-occurrences with the base class according to the co-occurrence. A prediction is fused from the pre-trained model and the trained classifiers to obtain a final prediction result as a fully labeled image.
G06V 10/26 - Segmentation of patterns in the image fieldCutting or merging of image elements to establish the pattern region, e.g. clustering-based techniquesDetection of occlusion
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 10/80 - Fusion, i.e. combining data from various sources at the sensor level, preprocessing level, feature extraction level or classification level
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
67.
CLEAR PREFETCH STREAM ON DETECTION OF PIPELINE FLUSH
According to one embodiment, a method, computer system, and computer program product for managing access to data is provided. The embodiment may include identifying one or more prefetch streams. The embodiment may also include saving a memory access instruction that created or advanced a selected prefetch stream from the one or more prefetch streams. The embodiment may further include detecting a pipeline flush prior to the saved memory access instruction. The embodiment may also include stopping the portion of the selected prefetch stream that follows the saved memory access instruction based on a type of the saved memory access instruction.
G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
G06F 9/38 - Concurrent instruction execution, e.g. pipeline or look ahead
(1) Computers; quantum computers; computer hardware; computers for use in data management; downloadable computer software for computer system and application development, deployment and management; downloadable computer software for developing, managing and connecting application programming interfaces (APIs) of others; downloadable cloud-computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform; downloadable computer software using artificial intelligence for use in software development, machine learning, speech recognition, natural language processing and digital audio, digital image, digital text and digital video generation; downloadable computer software for managing cryptocurrency transactions using blockchain technology and for blockchain-based inventory management; computer servers; computer storage devices, namely, high-speed storage subsystems for storage and backup of electronic data either locally or via a telecommunications network; downloadable computer operating system software and computer operating programs; downloadable computer programs for searching remotely for content on computers and computer networks; downloadable computer e-commerce software to allow users to perform electronic business transactions via a global computer network; downloadable computer software for administration of computer networks; downloadable software for use in database management, document management and supply chain management; downloadable computer programs for connecting remotely to computers and computer networks; downloadable computer software for collecting, analyzing and organizing business data and market data in the field of artificial intelligence and machine learning; downloadable electronic publications, namely, manuals, guides, blog posts, articles, brochures and newsletters in the field of computers, computer software, computer hardware, artificial intelligence, cloud computing, cybersecurity, blockchain technology and quantum computing; (1) Advertising and business management consultancy; advice in the field of business management and marketing; advisory services relating to business administration, business analysis, business operations and business planning; business information management; human resources consultancy; supply chain management services; document reproduction in the nature of digitization of documents; computerized database management; business strategy development services; business organization consultancy services; business research services; analysis of market research data and statistics; statistical analysis and reporting services for business purposes; data processing services in the field of invoice management, payroll, transportation, financial investment services and customer management; data processing services for compilation, analysis, curation and management of business data for use in the field of artificial intelligence, cloud computing, cybersecurity, blockchain technology and quantum computing; arranging and conducting trade show exhibitions in the field of computers, computer software, computer hardware, artificial intelligence, cloud computing, cybersecurity, blockchain technology and quantum computing; business consultancy in the field of computers, computer software, computer hardware, artificial intelligence, machine learning, cloud computing, cybersecurity, blockchain technology and quantum computing; business consultancy services for digital transformation; systemization, updating and maintenance of data in computer databases; website traffic optimization;
(2) Computer programming and software engineering services; software as a service (SAAS) services featuring software for use in database management, document management and supply chain management; software as a service (SAAS) services featuring software for use in computer system and application development, deployment and management; software as a service (SAAS) services featuring software for use in developing, managing and connecting application programming interfaces (APIs) of others; software as a service (SaaS) provider in the field of human resources management; software as a service (SAAS) services in the nature of hosting cloud-based software of others; cloud computing featuring software for use in database management, electronic storage of data, web hosting, enterprise content management, enterprise content integration and business records management; software as a service (SAAS) services featuring software using artificial intelligence for use in software development, machine learning, speech recognition, natural language processing and digital audio, digital image, digital text and digital video generation; software as a service (SAAS) services featuring software for collecting, verifying, and transmitting data and information for use in blockchain-based smart contracts; providing online, non-downloadable software for managing cryptocurrency transactions using blockchain technology; computer technology consultancy; consultancy and research in the field of artificial intelligence technology, cloud computing, cybersecurity, blockchain technology, quantum computing, software as a service (SAAS) and robotic process automation technology; design, installation, updating and maintenance of computer software; design and development of computer hardware; computer technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; building and maintaining websites; computer systems analysis, design and integration services; monitoring of computer system operation by remote access; electronic data backup services; data migration services; data mining services; data warehousing; database design and development; testing of computers, computer programs, computer hardware and software; computer services, namely, monitoring, testing, analysing and reporting on the performance, availability and errors of computer systems and software applications of others [quality control]; technical consultation in the field of computer hardware and computer software; providing technological information about environmentally conscious and green innovations; rental of computers, computer hardware and computer peripherals; Research and development of new products for others; mechanical engineering; cloud computing services, namely, computing services to enable network integrating computer hardware and software for dynamic provisioning, virtualization, and consumption metering of computer resources; providing virtual computer systems and virtual computer environments through cloud computing; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing applications and IT systems; computer services, namely, cloud hosting provider services and integration of private and public cloud computing environments; technical consulting services in the fields of datacenter architecture; cloud storage services for electronic data; electronic data storage, namely, archiving business documents, personal documents and corporate documents; recovery of computer data; data security consultancy; technical consultancy in the field of cybersecurity; computer security services for protecting data and information from unauthorized access; data encryption and decoding services; data decryption services; debugging computer software for others; design of computer-simulated models; writing of computer code; computer virus protection services;
Autonomously aligning docking bodies is provided. A first-axis surface is identified as a target axis surface corresponding to a desired docking approach vector of a first body to a second body. The first body is maneuvered to align relative to a second-axis surface until a third-axis surface is less than a defined surface detection threshold level. The first body is continued to be maneuvered to align relative to the third-axis surface until the second-axis surface is less than the defined surface detection threshold level. Docking is completed between the first body and the second body in accordance with the desired docking approach vector based on alignment of the first body with the target axis surface.
G05D 1/243 - Means capturing signals occurring naturally from the environment, e.g. ambient optical, acoustic, gravitational or magnetic signals
G05D 1/244 - Arrangements for determining position or orientation using passive navigation aids external to the vehicle, e.g. markers, reflectors or magnetic means
A method for correcting dimensional distortion when viewing a display at an angle is disclosed. In one embodiment, such a method identifies a line of sight of a user relative to a display. The method determines an angle of the line of sight relative to the display and a displacement of the user relative to the display. Using the angle and the displacement, the method determines an adjustment needed to reduce dimensional distortion of content on the display caused by the angle and the displacement. The method applies the adjustment to the content. In certain embodiments, applying the adjustment includes one or more of altering a size of the content on the display, altering proportions of the content on the display, and altering an orientation of the content on the display. A corresponding system and computer program product are also disclosed.
A method, computer program product, and computer system to control an exporting and importing of reactive power by nodes of a network. One node of the network (capable of exporting Q units of reactive power to the network) and N nodes of the network (each capable of importing reactive power from the network) are identified. Initially, Q>0 or Q<0. The N nodes are sorted in ascending order of relative distance between the one node and each of the N nodes. A loop over the sorted N nodes is performed. A next iteration of the loop includes: sending a first and second electromagnetic signal to the first node and a next node, directing the first node and the next node to export an amount Q′ of reactive power and to import an amount of reactive power, respectively; and updating Q via Q=Q−Q′.
A computer-implemented method, according to various approaches, includes causing a predetermined HRL agent to perform, in a controlled environment, execution of a first potentially malicious API call against a predetermined API. Performing execution of the first potentially malicious API call against the predetermined API includes: causing a first sub-agent of a first stage of an architecture of the HRL agent to make a first selection for defining a first portion of a first API call. Performing execution of the first potentially malicious API call against the predetermined API furthermore includes causing a second sub-agent of a second stage of the architecture of the HRL agent to make a second selection for defining a second portion of the first API call, and issuing the first API call to the predetermined API. First reward-based feedback is provided to the first sub-agent and the second sub-agent.
A computer-implemented method, according to one approach, includes: sending a notification to a host regarding a first logical unit number (LUN) in response to receiving an indication that a first node will be taken offline. The first LUN that the notification is sent to has a preferred communication path that extends through the first node. Communication paths extending through the first node are blocked and communication paths extending through a second node are promoted. Moreover, in response to determining that existing I/O operations previously assigned to the first node have been completed, the first node is taken offline. I/O operations are thereby sent to the first LUN through the second node while the first node is offline.
H04L 41/12 - Discovery or management of network topologies
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
A back-end-of-the-line (BEOL) interconnect structure is provided that includes a top via structure located on a metal line. An air gap is located adjacent to, and around, the metal line and top via structure. This air gap includes a lower portion adjacent to the metal line and an upper portion adjacent to the top via structure. Such an air gap can extend BEOL interconnect scaling for 2 nm technology node and below. Methods of forming such an BEOL interconnect structure are also provided.
H01L 21/768 - Applying interconnections to be used for carrying current between separate components within a device
H01L 23/528 - Layout of the interconnection structure
H01L 23/532 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body characterised by the materials
A computer server receives requests from a plurality of devices for digital content for rendering in a virtual computer environment. Based on geographic locations of the plurality of devices, the computer server groups the plurality of devices into at least one group. For a group in the at least one group, the computer server designate a device in the group as a local server, shares information associated with the device designated as the local server with other devices in the group, and transfers the digital content to the device designated as the local server for the device designated as the local server to share the digital content with the other devices in the group.
Embodiments of present invention provide an interconnect structure. The interconnect structure includes a first metal line having a lower portion and an upper portion of different material composition, sidewalls of the lower portion of the first metal line being vertically aligned with sidewalls of the upper portion of the first metal line; a second metal line having a lower portion and an upper portion of different material composition, sidewalls of the lower portion of the second metal line being vertically aligned with sidewalls of the upper portion of the second metal line; a dielectric liner lining sidewalls of the lower and upper portions of the first metal line and sidewalls of the lower and upper portions of the second metal line; and an isolation layer between the first and second metal lines, the isolation layer including an airgap. A method of forming the same is also provided.
H01L 21/768 - Applying interconnections to be used for carrying current between separate components within a device
H01L 23/522 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body
H01L 23/532 - Arrangements for conducting electric current within the device in operation from one component to another including external interconnections consisting of a multilayer structure of conductive and insulating layers inseparably formed on the semiconductor body characterised by the materials
77.
SEAMLESS HOT UPGRADE PROCESS WITH DATABASE SCHEMA CHANGE
A computer-implemented method for executing a hot upgrade process is provided. The computer-implemented method includes receiving a process upgrade request during executions of first and second tasks by an old container, determining that the process upgrade request affects the first task but not the second task, labeling the first task but not the second task and acting on the process upgrade request. The computer-implemented method further includes, based on the labeling, storing the first task by the old container and executing the second task by the old container, deleting the old container and instantiating a new container for transformation and execution of the first task.
Embodiments herein describe a switchable redundant voltage regulator (referred to herein as a redundant phase) that can be attached to multiple different power domains. Instead of providing a redundant phase for every load or voltage domain in a computing system, the embodiments herein describe sharing redundant phases between voltage domains. Thus, if a primary phase serving any one of the phase fails, the switch can be controlled to connect the redundant phase to the corresponding voltage domain. In this manner, the redundant phase is a shared phase for a plurality of voltage domains.
Provided are a method, system, and computer program product in which a cross virtual private cloud (VPC) network connectivity is configured, wherein one or more policies have been defined by entities in the VPC. Policy changes are monitored, and based on the one or more policies, an adding of endpoints or topology information from a source VPC to a target VPC is performed, in response to a policy definition allowing the adding of the endpoints. Operations are performed for removing external endpoints or topology information from an affected VPC, in response to receiving a denial indication.
H04L 69/00 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
A computer-implemented method for generating an artificial data set is provided. Aspects include obtaining an input data set, calculating an association between the plurality of categorical variables of the input data set, and creating, based on the association, a plurality of clusters of categorical variables. Aspects also include identifying a key variable for each of the plurality of clusters of categorical variables, creating a key cluster for each of the plurality of clusters, and creating a cluster contingency table for each of the clusters. Aspects further include generating, based on the cluster contingency table for each of the plurality of clusters and for the key cluster, a data set for each of the plurality of clusters and the key cluster and generating the artificial data set based on a combination of the data set for each of the plurality of clusters and the key cluster.
A computer-implemented method for inserting clock-gating in a register-transfer level (RTL) design is provided. The computer-implemented method includes flattening the RTL design, identifying modules and state elements in the RTL design, computing a clock-gating expression for each of the state elements of the RTL design, selecting terms of the clock-gating expression for each one of the state elements that is traceable to signals in a same one of the modules as the one of the state elements, determining which clock-gating terms are equivalent to those of other state elements in the RTL design, clustering state elements with equivalent clock-gating terms into clusters and inserting clock-gating logic, which equates to the equivalent clock-gating terms, into the RTL design for each cluster.
Techniques are provided for dynamic prediction-based regression optimization. In one embodiment, the techniques involve determining, via a process model, a variable state of the process model, wherein the variable state includes a first input state variable, a first output state variable, and a first control parameter, generating, via a short-term prediction module, a first prediction of a first update of the variable state, generating, via a terminal value prediction module, a second prediction of a second update to the variable state, generating, via a control optimization module, a second control parameter based on the first prediction and the second prediction, and controlling, via a processor, a production process of the process model based on the second control parameter.
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
83.
COMPUTER-BASED PRIVACY FOR A CHAT GROUP IN A VIRTUAL ENVIRONMENT
In an approach to improve the privacy of chat groups within a virtual world, embodiments of the present invention expand a chat area of a chat group to form an experience annulus according to predetermined distance that a voice volume of private-chat-group member can propagate. Responsive to identifying an external user is interested in the chat group, embodiments generate and set a current topic representing a conversation in the chat group as an externally hearable topic that is perceivable by the external user and generate a faux multi-person conversation associated with the externally hearable topic that corresponds to a real conversation made by members in the chat group. Further, embodiments assign the faux utterances to chat group members based on a corresponding speaker index and utilize one or more corresponding avatars of the chat group members to present the faux utterances to the external user.
G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
G10L 17/02 - Preprocessing operations, e.g. segment selectionPattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal componentsFeature selection or extraction
84.
COMPUTER-BASED PRIVACY PROTECTION FOR CHAT GROUPS IN A VIRTUAL ENVIRONMENT
In an approach to improve the privacy of chat groups within a virtual world, in response to identifying a private chat group has been created between two or more users, embodiments collect, by an internet of things (IoT) sensor set, a voice for each user in the private chat group. Further, embodiments analyze, by an analysis module, the collected voice, an intonation associated with the collected voice and an original pronunciation associated with the collected voice, and generate a de-content pronunciation based on the analysis of the collected voice, the intonation, and the original pronunciation. Additionally, embodiments output, by the IoT sensor set, the intonation and the original pronunciation to the two or more users in the private chat group and output, by the IoT sensor set and a client computer, the intonation and the de-content pronunciation to one or more users outside the private chat group.
Embodiments of present invention provide a semiconductor structure. The semiconductor structure includes a first and a second dielectric bar each having a left sidewall and a right sidewall; a first set of nanosheets having a first end and a second end that is directly adjacent to the left sidewall of the first dielectric bar; a first conductive layer surrounding the first set of nanosheets and directly adjacent to the left sidewall of the first dielectric bar; a second set of nanosheets having a first end and a second end that is directly adjacent to the left sidewall of the second dielectric bar; and a second conductive layer surrounding the second set of nanosheets; directly adjacent to the left sidewall of the second dielectric bar; and separating the second set of nanosheets from the right sidewall of the first dielectric bar. A method of forming the same is also provided.
H01L 27/092 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including only semiconductor components of a single kind including field-effect components only the components being field-effect transistors with insulated gate complementary MIS field-effect transistors
H01L 21/8238 - Complementary field-effect transistors, e.g. CMOS
H01L 23/528 - Layout of the interconnection structure
H01L 29/06 - Semiconductor bodies characterised by the shapes, relative sizes, or dispositions of the semiconductor regions
H01L 29/417 - Electrodes characterised by their shape, relative sizes or dispositions carrying the current to be rectified, amplified or switched
H01L 29/423 - Electrodes characterised by their shape, relative sizes or dispositions not carrying the current to be rectified, amplified or switched
Provided are techniques for task adjustment for uniform performance of drives. Arrays are created for different drive types. Performance benchmarks are run for each of the arrays to compute a stage maximum value and a destage maximum value for each of the drive types. At run time, in response to determining that a mode indictor indicates a uniform performance mode, a maximum number of stage Task Control Blocks (TCBs) are set to a stage maximum uniform value and a maximum number of destage TCBs are set to a destage maximum uniform value. The stage of first data is performed using an actual number of stage TCBs that do not exceed the maximum number of stage TCBs. The destage of second data is performed using an actual number of destage TCBs that do not exceed the maximum number of destage TCBs.
Embodiments herein describe techniques for a host to provide TX packets to a shared adapter that then uses a NIC to forward the TX packet to a network. In one embodiment, the host creates or fills in one or more TX storage block page entries (SBPE) for the TX packet and stores an index of the TX SBPE in host memory. The host memory can also store an initiative state that tracks whether the shared adapter is currently processing TX packets. If not, the host can issue an interrupt to the shared adapter, along with the index associated with the TX SBPE. The shared adapter can then fetch the TX SBPE from host memory and program the NIC to transmit the TX packet.
A method for verifying Multi-Cycle Interconnect Synthesis (MCIS) optimization in an automatically generated physical hierarchy chip design, the method includes introducing a logical hierarchy to a Hierarchy Manipulation Tool (HMT) to automatically generate a physical chip design, wherein the physical chip design includes a logical hierarchy an a physical hierarchy, optimizing the physical chip design to develop an optimized physical chip design, processing the optimized physical chip design to account for forward annotation and to generate a modified physical chip design, processing the logical hierarchy to account for backward annotation and to generate a modified logical hierarchy and verifying that the modified logical hierarchy and the modified physical chip design are consistent with each other.
In an integrated circuit design, slack on a signal path of an integrated circuit design can be apportioned in order to accelerate design refinement. According to one method, timing analysis of the signal path of the integrated circuit design is performed. Estimated (as opposed to actual) slack on the signal path is determined through content-based analysis of components of the signal path based on elimination of timing inefficiencies within the components. The estimated slack is then proportionally apportioned among the components of the signal path for use in a subsequent iteration of design refinement.
Systems/techniques that facilitate meta causal learning over multiple directed acyclic graphs (DAG) are provided. In various embodiments, a system can structurally decompose multiple DAGs of different domains into a shared DAG with private DAGs for each respective domain. In various aspects, the system can formulate the DAG causal structure learning as a functional constrained bilevel optimization problem. In various instances, the system can implement a bilevel primal dual method that extracts the shared DAG structure while learning the individual DAG model for personalization.
A computer product and methodology for serving a cloud workload across multiple cloud service providers. A first evaluation is performed for a first configuration in a first cloud service of the plurality of cloud services, and a second evaluation is performed for a second configuration in a second cloud service of the plurality of cloud services. A first result of the first evaluation and a second result of the second evaluation are used to select an unevaluated configuration in one of the first and second cloud services for performing another evaluation.
A method, computer program product, and computer system are provided for prevention of unconsented emotional response data capture by immersive applications. The method includes obtaining identified emotional stimuli in an immersive application that are associated with emotional response data capture. The method determines if there is a recorded user consent to an emotional response data capture for an identified stimulus; and, when there is no recorded user consent, the method provides a notification to the user notifying them of the emotional response data capture. The method records a consent response from the user to consent to or deny emotional response data capture for the identified stimulus and/or the immersive application.
A method, computer program product, and computer system for redacting information in a video stream. The method includes accessing content of an original video stream and classifying sensitive data within the original video stream as classified data components of one or more of multiple permission categories. The method provides sub-streams of the classified data components for one or more permission categories. The method redacts the classified data components in the original video stream and combines the redacted video stream with one or more of the sub-streams to output a combined video stream depending on the access permissions of an endpoint.
H04N 21/2365 - Multiplexing of several video streams
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
94.
CONFIGURATION OF DATA CONNECTIONS BETWEEN A HOST AND A SHARED NETWORK ADAPTER
The embodiments herein describe configuring a data device that enables communication between a host and a shared network adapter. The data device can include data connections between the host and the shared network adapter. The data device can have both control queues in a control plane and data queues in a data plane. The control queues can be activated first in order to issue control commands to configure the data plane in the shared network adapter.
A method, computer program product, and computer system to control an exporting and importing of reactive power by nodes of a network. One node of the network (capable of exporting Q units of reactive power to the network) and N nodes of the network (each capable of importing reactive power from the network) are identified. Initially, Q > 0 or Q < 0. The N nodes are sorted in ascending order of relative distance between the one node and each of the N nodes. A loop over the sorted N nodes is performed. A next iteration of the loop includes: sending a first and second electromagnetic signal to the first node and a next node, directing the first node and the next node to export an amount Qʹ of reactive power and to import an amount of reactive power, respectively; and updating Q via Q = Q - Qʹ.
H02J 3/16 - Circuit arrangements for ac mains or ac distribution networks for adjusting voltage in ac networks by changing a characteristic of the network load by adjustment of reactive power
H02J 3/18 - Arrangements for adjusting, eliminating or compensating reactive power in networks
A SRAM is provided that includes a first pull-up transistor having a first channel length, and a first pull-down transistor located adjacent to the first pull-up transistor and having a second channel length, wherein the second channel length is greater than the first channel length. The structure further includes a first backside contact structure contacting a first n-doped source/drain region of the first pull-down transistor, wherein the first backside contact structure has a first critical dimension that is constant throughout an entirety thereof, and a second backside contact structure having a vertical portion and a base portion. The vertical portion of the second backside contact structure directly contacts a first p-doped source/drain region of the first pull-up transistor and the base portion of the second backside contact structure has a second critical dimension that is greater than the first critical dimension.
Mechanisms are provided to consolidate event data structures in an electronic calendar. An event data structure for an event is received and features are extracted from the event data structure and another having an overlapping temporal location in the electronic calendar. The event data structure is classified as to whether it is duplicative of the other event data structure and the event data structures are rendered based on the classification. This rendering may involve consolidating the event data structures into a consolidated event data structure if they are duplicative, and prioritizing the event data structures relative to each other if they are not duplicative.
A system and method for dynamically visualize and modify user authority and security resource edge based on access behaviors in a cloud computing environment. The method provides a new access control perspective to ensure the credibility of database object usage patterns, build clearer and explicit security data consumption mode for data usage requests, and guide tenants to have a more comprehensive understanding and concise use. Processing components and method are configured to gather data and analytics including collecting data resource and database object usage tagging both resources and users with security level by machine learning and building an access model for each role. The method uses graph modeling with created, trained access patterns for users protected resources and produces in-memory implicit sub-groups for users with similar access requirements and limits their resource accesses according to their history behaviors. Further provided are outlier activities prediction and in-real time access authorization modification.
A method to co-integrate a metal trench cut for aggressively scaled contact tip-to-tip and wrap-around-contact formation is provided. A semiconductor device made from the method is also provided in which a metal trench cut region and wrap-around-contacts are present.
H01L 27/092 - Devices consisting of a plurality of semiconductor or other solid-state components formed in or on a common substrate including integrated passive circuit elements with at least one potential-jump barrier or surface barrier the substrate being a semiconductor body including only semiconductor components of a single kind including field-effect components only the components being field-effect transistors with insulated gate complementary MIS field-effect transistors
H01L 29/06 - Semiconductor bodies characterised by the shapes, relative sizes, or dispositions of the semiconductor regions
H01L 29/08 - Semiconductor bodies characterised by the shapes, relative sizes, or dispositions of the semiconductor regions with semiconductor regions connected to an electrode carrying current to be rectified, amplified, or switched and such electrode being part of a semiconductor device which comprises three or more electrodes
The present disclosure describes an illustrative semiconductor IC device that includes a integrated logic microdevice and a memory microdevice that share the same vertical channel. By utilizing the same vertical channel, the overall footprint area of the integrated logic microdevice and the memory microdevice is relatively reduced and allows for further scaling of the associated semiconductor IC device.
H10B 43/40 - EEPROM devices comprising charge-trapping gate insulators characterised by the peripheral circuit region
H10B 43/27 - EEPROM devices comprising charge-trapping gate insulators characterised by three-dimensional arrangements, e.g. with cells on different height levels with source and drain on different levels, e.g. with sloping channels the channels comprising vertical portions, e.g. U-shaped channels