An event-based analytics tool can obtain, from a data lake, an instance of correlated event data including a first event from a first network device, a second event from a second network device, and data correlating the first event to the second event. The event-based analytics tool can obtain PCAP data from a troubleshooting server via a first application programming interface. The event-based analytics tool can also obtain a log from a searchable log database via a second application programming interface. Based on the correlated event data, the packet capture data, and the log, the event-based analytics tool can generate a prediction model that can be used to predict a cause of a future event.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/069 - Management of faults, events, alarms or notifications using logs of notificationsPost-processing of notifications
Aspects of the subject disclosure may include, for example, fiber optic cable(s) including a sheath having first and second ends and a body therebetween; and one or more first optical fibers passing through the body of the sheath, where the sheath includes one or more first openings along the body, and where a loop portion of the one or more first optical fibers extends through the one or more first openings to be accessible outside of the body of the sheath. Other embodiments are disclosed.
G02B 6/44 - Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
G02B 6/255 - Splicing of light guides, e.g. by fusion or bonding
3.
PAGING AN IDLE SUBSCRIBER IDENTITY MODULE USING A CONNECTED SUBSCRIBER IDENTITY MODULE OPERATING IN A SINGLE RADIO CONFIGURATION FOR 5G OR OTHER NEXT GENERATION WIRELESS NETWORK
Various embodiments disclosed that describe systems to facilitate paging an idle subscriber identity module using a connected subscriber identity module operating in a single radio configuration. According to some embodiments, a system can comprise receiving a paging request that is designated for a first device of a communication device, wherein the communication device comprises the first device and a second device; determining whether the second device is in an active state; and in response to the determining that the second device is in the active state, transmitting a message to second device indicating that the paging message was received for the first device.
Aspects of the subject disclosure may include, for example, receiving environmental data from a plurality of environmental data sources, identifying environmental risks based on the environmental data, obtaining profile information relating to a user or entity, based on the obtaining the profile information and the identifying the environmental risks, generating a recommendation for one or more locations of possible interest, and causing the recommendation to be presented to the user or entity, thereby providing location-based environmental risk information that is customized on a per user or per entity basis. Other embodiments are disclosed.
G06Q 30/0242 - Determining effectiveness of advertisements
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
5.
SYSTEM AND METHOD FOR MODULE AND ANTENNA REPLACEMENT IN CONNECTED VEHICLES AND EQUIPMENT
Aspects of the subject disclosure may include, for example, modifying one or more components of a connected vehicle communication system of a vehicle, the connected vehicle communication system operative to communicate vehicle data with network equipment of a service provider over a mobile network of a mobile network operator, confirming operational connectivity among the one or more components of the connected vehicle communication system, communicating to the network equipment of the service provider, information confirming a successful modification of the one or more components of the connected vehicle communication system. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving artificial intelligence (AI) analytics from a generative AI system, and based on the AI analytics, causing a software defined network (SDN) controller to identify a signaling path over a quantum signaling network, thereby enabling selection of a determined suitable path for quantum entanglement distribution. Other embodiments are disclosed.
In one example, a method includes detecting that a user equipment device has moved to a location in a telecommunications network in which a first network route is available, where the first network route has a higher priority than a second network route with which an application executing on the user equipment device has established a current protocol data unit session, determining that the application should switch the current protocol data unit session to the first network route, and supporting the application in switching the current protocol data unit session from the second network route to the first network route.
An example apparatus may include an optical splitter apparatus that includes a dual mode fiber having a single mode fiber core embedded in a multi-mode fiber core, a plurality of single mode fibers, and a funnel waveguide coupling the dual mode fiber to the single mode fibers. The optical splitter apparatus may be for use in a passive optical network. The single mode fiber core may be for transmitting downstream optical signals, where the funnel waveguide distributes the downstream optical signals to the single mode fibers. In addition, the single mode fibers may transmit upstream optical signals, and the funnel waveguide may direct the upstream optical signals into the multi-mode fiber core. The optical splitter apparatus may have an asymmetric insertion loss ratio between the downstream optical signals received via the single mode fiber core and the upstream optical signals received via the single mode fibers.
G02B 6/028 - Optical fibres with cladding with core or cladding having graded refractive index
G02B 6/12 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type of the integrated circuit kind
The technologies described herein are generally directed to detecting reflective surfaces for use reflecting a signal from access point equipment to destination equipment in advanced networks, e.g., at least a fifth generation (5G) network. For example, a method described herein can include receiving a request, from access point equipment, to establish a communications session between the access point equipment and destination equipment. The method can further include based on a source of surface information, predicting that a transient reflective surface is going to be located at a first geographic location and is going to be usable by the access point equipment to reflect a signal to the destination equipment, resulting in reflected path information corresponding to a reflected path for the communications session. Further, the method can include, in response to the request, communicating to the access point equipment, the reflected path information.
H04W 4/02 - Services making use of location information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
10.
SENSOR DEVICE-BASED DETECTION OF TRAUMA EVENTS AND RESPONSES
A processing system including at least one processor may obtain data associated with a user, the data associated with the user including at least one of: visual data captured via at least one camera associated with the user or audio data captured via at least one microphone associated with the user, detect at least one trauma event of at least one defined trauma event type in at least one of the visual data or the audio data via at least one classification model, determine, responsive to detecting the at least one trauma event, a stress score based upon at least a portion of the data associated with the user in accordance with a stress prediction model, and generate an alert in response to the stress score exceeding a threshold.
An audio generation system is provided to enable coordinated control of multiple IoT devices for audio collection and distribution of one or more audio sources according to location and user preference. The audio generation system enables a location sensitive acoustic control of sound, both as a shaped envelope for a particular source, and as an individualized experience. The audio generation system also facilitates an interactive visual system for visualization and manipulation of the audio environment including via the use of augmented reality and/or virtual reality to depict soundscapes. The audio generation system can also facilitate a system for improving and achieving an audio environment (sound influence zone) and an intuitive way to understand where sounds will be heard.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06T 19/00 - Manipulating 3D models or images for computer graphics
12.
SYSTEM FOR INTELLIGENT TRANSPORT BETWEEN SMART HOMES AND SMART COMMUNITIES
Aspects of the subject disclosure may include, for example, a method in which a processing system determines that performance of a service is required at a first location in a smart community; identifies a robot to be transported, and determines whether physical transport or virtual transport is to be performed for the robot. If physical transport is to be performed, the system initiates communication with a robot transport controller to schedule the physical transport to the first location from a different second location. If virtual transport is to be performed, the processing system initiates communication with a radio access network (RAN) to schedule the virtual transport; the virtual transport includes configuring the robot at the first location. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device, including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving an original audio signal for an interval; creating a time-series graphical image of the original audio signal for the interval; compressing the time-series graphical image, thereby creating a reduced resolution image; recreating a retrieved audio signal from the reduced resolution image; determining whether a comparison of the retrieved audio signal to the original audio signal meets a quality threshold; responsive to meeting the quality threshold, compressing the reduced resolution image further and repeating the recreating and determining steps; and transmitting a last reduced resolution image that meets the quality threshold. Other embodiments are disclosed.
G10L 25/60 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for measuring the quality of voice signals
A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
15.
PERFORMANCE MONITORING DATA INTEGRATED ROUTE PLANNING TOOL FOR RECONFIGURABLE OPTICAL ADD-DROP MULTIPLEXER (ROADM) DENSE WAVELENGTH-DIVISION MULTIPLEXING (DWDM) NETWORKS
Aspects of the subject disclosure may include, for example: receiving traffic pattern data/parameters associated with a reconfigurable optical add-drop multiplexer (ROADM) dense wavelength-division multiplexing (DWDM) network; defining a configuration of the network based upon the traffic pattern data/parameters; outputting the configuration to facilitate physical provisioning and operation of ROADM nodes (and one or more ILA(s), if any) according to the configuration; receiving performance monitoring (PM) data indicative of operation of the network as configured according to the configuration; defining an updated configuration of the network that is based upon the PM data, wherein the updated configuration adds to the network at least one pair of transponders, at least one regenerator, or a combination thereof; and outputting the updated configuration to facilitate physical updating of the network in a manner such that the transponders, the regenerator(s), or the combination thereof is placed into operation. Other embodiments are disclosed.
H04J 14/02 - Wavelength-division multiplex systems
16.
METHODS, SYSTEMS, AND DEVICES TO UTILIZE A MACHINE LEARNING APPLICATION TO IDENTIFY MEETING LOCATIONS BASED ON LOCATIONS OF COMMUNICATION DEVICES PARTICIPATING IN A COMMUNICATION SESSION
Aspects of the subject disclosure may include, for example, determining a group of users are participating in a communication session. Each user of the group of users are participating in the communication session with a communication device resulting in a group of communication devices. Further embodiments include receiving a request for a first meeting location for the group of users to meet, and identifying a device location for each of the group of communication devices resulting in a group of device locations. Additional embodiments can include identifying the first meeting location based on the group of meeting locations, and providing the first meeting location to each communication device of the group of communication devices, each communication device presents the first meeting location during the communication session. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, accessing registration information that includes a criterion for allowing receiving notifications based on location information of a communication device, accessing a location request of equipment of a location requestor that includes a notification location, accessing encrypted information representative of identification information, the location information, and time information of the communication device that has been stored in a database where the time information corresponds to the location information, identifying a positive result for the location request, and causing a notification to be provided to the communication device responsive to the positive result, where the notification is associated with the location requestor, and wherein the notification is provided to the communication device without providing the identification information of the communication device to the equipment of the location requestor. Other embodiments are disclosed.
For example, a method includes obtaining sensor data depicting movements of facial features of a user who is present in a location in which a media item is being presented, calculating, using the sensor data, an alertness score for the user, determining the alertness score falls below a predefined threshold alertness score, starting, in response to determining that the alertness score falls below the predefined threshold alertness score, a timer while continuing to calculate the alertness score for the user using newly obtained sensor data, determining that the alertness score for the user using the newly obtained sensor data has failed to meet the predefined threshold alertness score before an expiration of the timer, and taking, in response to the alertness score for the user using the newly obtained sensor data failing to meet the predefined threshold score before expiration of the timer, an action associated with the media item.
A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.
H04L 41/12 - Discovery or management of network topologies
G06F 18/22 - Matching criteria, e.g. proximity measures
G06F 18/2411 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
A processing system may apply a data set comprising utilization metrics of a cells of a cell sector to a throughput prediction model to obtain a first predicted throughput for the cell sector for a designated future time period and for all cells being in an active state. The processing system may generate a first modified data set simulating a first cell being placed in an inactive state, by distributing utilization metrics of the first cell over at least one additional cell, and may apply the first modified data set to the throughput prediction model to obtain a second predicted throughput. The processing system may then determine that the second predicted throughput meets a threshold throughput that is based on the first predicted throughput, and transmit at least one instruction to place the first cell in the inactive state for the designated future time period in response to the determining.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
The described technology is generally directed towards a short message service (SMS) congestion manager that can evaluate, predict, and mitigate SMS congestion. The SMS congestion manager can be implemented within a short message services function (SMSF) of a fifth generation (5G) or subsequent generation cellular network. The SMS congestion manager can monitor a volume of non-access stratum (NAS) SMS messages in order to detect potential overload conditions wherein the volume of messages exceeds a capability of a network function. In response to detecting potential overload conditions, the SMS congestion manager can inhibit messages directed to the network function in order to prevent overloads from developing. The SMS congestion manager can use machine learning to learn to detect the potential overload conditions as well as to learn actions to take to address the potential overload conditions.
A method includes acquiring a playlist identifying video files and an order in which the video files are to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum value of a streaming parameter for the video streaming session, selecting a subsequent video file that is scheduled for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, for each chunk, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the selecting the variant is based on both the maximum value and a measured value for the streaming parameter, and downloading the plurality of variants to a local buffer of the endpoint device.
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/2387 - Stream processing in response to a playback request from an end-user, e.g. for trick-play
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
23.
DETECTING AND SHARING EVENTS OF INTEREST USING PANOPTIC COMPUTER VISION SYSTEMS
In one example, a method performed by a processing system including at least one processor includes acquiring a plurality of video volumes of an environment from a plurality of cameras, wherein at least two individual video volumes of the plurality of video volumes depict the environment from different viewpoints, generating a panoptic video feed of the environment from the plurality of video volumes, detecting an event of interest occurring in the panoptic video feed, and isolating a video volume of the event of interest to produce a video excerpt.
G06V 20/40 - ScenesScene-specific elements in video content
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
24.
SYSTEM AND METHODS FOR ENSURING SECURITY, TRUST, AND PRIVACY IN GENERATIVE ARTIFICIAL INTELLIGENCE (AI) CONTENT WITH QUANTUM BLOCKCHAINS AND QUANTUM DIGITAL SIGNATURES
A method for providing quantum computation-based security solutions for generative artificial intelligence content includes generating an item of new content based on an input, and using a generative artificial intelligence foundation model that has been trained to generate items of new content having characteristics that mimic characteristics of content included in a set of training data, storing the item of new content in a quantum temporal blockchain, detecting an action performed by the generative artificial intelligence foundation model against the item of new content, and logging the action in the quantum temporal blockchain.
Aspects of the subject disclosure may include, for example, a device comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: receiving from user equipment an indication that a user has been authenticated by the user equipment via a biometric process; responsive to the receiving of the indication, obtaining user profile data associated with the user; responsive to the receiving the user profile data, selecting a first service provider from among a plurality of service providers; and routing communications between the first service provider and the user equipment. Other embodiments are disclosed.
Respective implementations facilitating a mobile core connection router are provided. A method can include establishing, by a system comprising a processor, a connection to a virtualized core network instance, associated with a first computing device, via a mobility tunneling protocol; in response to the establishing of the connection, initializing, by the system, a virtualized router function based on a routing table; and routing, by the system and via the virtualized router function, data traffic between the virtualized core network instance and a second computing device, communicatively coupled to the system and distinct from the first computing device.
Aspects of the subject disclosure may include, for example, identifying a threshold value of a streaming-media key performance indicator (KPI) based on a predetermined target portion of end-user devices that provide an acceptable performance. Performance records are obtained for a content delivery network (CDN) adapted to cache and serve media content requested by the end-user devices. Predicted values of the streaming-media KPI are generated according to the performance records of the CDN and compared to the threshold value of the streaming-media KPI to obtain a comparison. An anomaly is detected according to the comparison, to indicate that a predetermined number of the predicted values of the streaming-media KPI fail to satisfy the threshold value. Other embodiments are disclosed.
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/466 - Learning process for intelligent management, e.g. learning user preferences for recommending movies
Locations and azimuths of cells of a communication network can be estimated, determined, and validated. Cell attribute management component (CAMC) can estimate, determine, and/or validate cell locations based on analysis of timing advance (TA) measurement data and/or location data associated with devices associated with base stations associated with cells. CAMC can estimate azimuth of a cell associated with a base station based on analysis of a validated cell location of the cell and location data associated with devices associated with the cell. CAMC can determine whether a recorded azimuth of the cell is validated based on analysis of the estimated azimuth of the cell and the recorded azimuth of the cell. CAMC can tag the recorded azimuth of the cell as validated if applicable azimuth accuracy criteria is met, inaccurate if applicable azimuth criteria is not met, or omni if the cell is an omni cell.
A processing system may track accessing of a plurality of uniform resource locators among users of a communication network, determine an occurrence of an event of an event type based upon an increased accessing of the plurality of uniform resource locators for at least one time period, identify a first sub-group of the users associated with the event, apply a first action in the communication network to a test group including at least a first portion of the first sub-group, the first action addressing a demand associated with the event of the event type, track at least a first success rate of the first action for the first portion of the first sub-group, and apply the first action to at least a second portion of the first sub-group in response to determining that the first success rate for the first portion of the first sub-group exceeds a threshold success rate.
Aspects of the subject disclosure may include, for example, a process that determines a current location of a mobile device according to a horizontal reference, obtains a corresponding barometric pressure reading at the current location of the mobile device, and determines a current position of the mobile device according to the current location of the mobile device and the corresponding barometric pressure reading. A historical record of positions of the mobile device is updated according to the current position of the mobile device and other positions of the mobile device determined at other times, and a historical record of positions of the mobile device to a map of a facility is updated to obtain a referenced pattern of movement of the mobile device within the facility. Other embodiments are disclosed.
G01C 21/20 - Instruments for performing navigational calculations
G01C 5/06 - Measuring heightMeasuring distances transverse to line of sightLevelling between separated pointsSurveyors' levels by using barometric means
G01S 19/45 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement
31.
ENHANCED FIBER BROADBAND CONNECTION DEPLOYMENT METHOD AND SYSTEM
Aspects of the subject disclosure may include, for example, a base transceiver station having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of registering a wireless optical networking device with a fiber optic central office, wherein the registering uses a public land mobile network identifier that uniquely identifies a fiber optic network; encapsulating fiber signaling data for the wireless optical networking device received from the fiber optic central office; and transmitting the fiber signaling data via a radio bearer over an unlicensed radio spectrum to the wireless optical networking device. Other embodiments are disclosed.
Method, computer-readable media, and apparatuses for applying at least one remedial action within a communication session via at least one network in response to detecting via at least one detection model that the audio content of a first user is off-topic are described. For example, a processing system including at least one processor may establish a communication session between at least a first communication system of a first user and a plurality of communication systems of a plurality of additional users via at least one network. The processing system may then determine at least one topic for the communication session, detect, via at least one topic detection model, an audio content of the first user that is off-topic, and apply at least one remedial action within the communication session in response to the detecting that the audio content of the first user is off-topic.
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
G10L 15/183 - Speech classification or search using natural language modelling using context dependencies, e.g. language models
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
33.
COMMUNICATION NETWORK FIBER OPTIC DATA SERVICE EXPANSION
A processing system may obtain network inventory data, development infrastructure information, and user information to train a prediction model to predict precedence metrics for a new fiber optic data service in geographic areas that do not include a current fiber optic data service of the communication network, the prediction model comprising at least one machine learning model. The processing system may then generate a precedence metric of a geographic area that does not include the current fiber optic data service by applying to the prediction model: current network inventory data, current development infrastructure information, and current user information, where an output of the prediction model comprises the at least one precedence metric. In addition, the processing system may perform a network reconfiguration action in the communication network in response to the at least one precedence metric of the geographic area.
A method for intelligently allocating resource blocks of a radio frequency spectrum band includes detecting a presence of a plurality of user endpoint devices within a cell of a radio access network, wherein the plurality of user endpoint devices includes a first user endpoint device and a second user endpoint device, identifying a plurality of resource blocks of the cell that are available for allocation to the plurality of user endpoint devices, wherein the plurality of resource blocks includes a first resource block and a second resource block that is located closer to an end of a radio frequency spectrum band of the cell than the first resource block, determining that the first user endpoint device is more likely than the second user endpoint device to be negatively impacted by maximum power reduction, and allocating, in response to the determining, the first resource block to the first user endpoint device.
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04L 5/14 - Two-way operation using the same type of signal, i.e. duplex
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04W 72/512 - Allocation or scheduling criteria for wireless resources based on terminal or device properties for low-latency requirements, e.g. URLLC
35.
TRANSFORMING STRUCTURED QUERY LANGUAGE QUERIES TO EXPEDITE QUERY EXECUTION
A method for transforming structured query language queries to expedite query execution includes detecting an explode operator in a structured query language query plan that is designed to execute a structured query language query against a database, identifying a query fragment within the structured query language query plan that starts with the explode operator and ends with a second operator, and replacing the query fragment in the structured query language query plan with an optimized query fragment in which the second operator operates directly on vectors that are a target of the second operator.
A method includes detecting data relating to an event for which emergency services have been requested, wherein the data includes at least one of: voice data, audio data, text data, image data, or video data, identifying a geographic location of the event, wherein the geographic location is within a coverage area of a wireless network, predicting, based on the data, an urgency level associated with the event, identifying a set of minimum conditions of the wireless network that is associated with the urgency level of the event, determining that current conditions of the wireless network at the location do not satisfy the minimum conditions, determining an adjustment to the wireless network that, when deployed, will cause the current conditions of the wireless network at the location to satisfy the minimum conditions, and sending at least one instruction to an element of the wireless network to deploy the adjustment.
Facilitating auto-pilot aerial to surface heterogenous communications in advanced networks is provided herein. Operations of a system include receiving, via a receiver, a wireless signal that originated from a device located above a ground surface, the network equipment is located below the ground surface. The operations can also include transforming, via a converter, the wireless signal into an optical signal that is transmitted via a fiber optic cable below the ground surface, the receiver and the converter are located on a first side of the fiber optic cable. Further, the operations can include using a reflector to transmit light along the fiber optic cable at a defined angle. The reflector can be located at a second side of the fiber optic cable. The first side is closer to the ground surface as compared to the second side. The defined angle can be an angle approaching zero degrees.
Aspects of the subject disclosure may include, for example, obtaining, from a user device, a master-slave agreement and a first network configuration for a federated blockchain network, transmitting to a cloud service provider (CSP) node the first network configuration, generating first credentials, and transmitting the first credentials to the CSP node. The CSP node configures a first group of blockchain nodes according to the first network configuration and the first credentials. Further embodiments include transmitting the first credentials to a public server that sends it to a public blockchain node and an indication to generate a portion of the federated blockchain network. The public blockchain node configures a second group of blockchain nodes according to a second network configuration based on a public blockchain smart contract. The federated blockchain network comprises the first group of blockchain nodes and the second group of blockchain nodes. Other embodiments are disclosed.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
39.
FACILITATION OF DYNAMIC EDGE COMPUTATIONS FOR 6G OR OTHER NEXT GENERATION NETWORK
In 6G, there are multiple radios that can cover the same location at any time, and yet radio failure can occur. However, a mobile edge computing (MEC) platform can increase the footprint of adjacent radios to compensate for a failed radio. To reduce the failure interruption and maintain a quality of experience for a subscriber, the MEC can utilize a virtual session capability to communicate radio change of service characteristics to a service provider. Consequently, the change in service characteristics can comprise an expanded coverage area for adjacent radios such that a mobile device of the subscriber can take advantage of the expanded coverage area without experiencing an interruption in service.
A method performed by a processing system including at least one processor includes monitoring uplink traffic conditions and downlink traffic conditions in a plurality of nodes emitting radio frequency signals in a wireless communications network, determining, based on the monitoring and for each node of the plurality of nodes, an unused uplink capacity and an unused downlink capacity, sorting the plurality of nodes into a plurality of subsets, based on the unused uplink capacity and the unused downlink capacity, and boosting a first subset of the radio frequency signals emitted by a first subset of the plurality of subsets, without boosting a second subset of the radio frequency signals emitted by a second subset of the plurality of subsets.
A method performed by a processing system in a cellular core network includes receiving, from a session management function of the cellular core network, a query for a policy rule associated with a subscriber who has requested a packet data unit session, querying a charging function of the cellular core network for a charging counter associated with the subscriber, receiving, from the charging function, the charging counter, wherein the charging counter contains a value identifying a service package to which the subscriber is subscribed, determining a rating group associated with the service package, and sending, to the session management function, a set of application identifiers associated with the rating group, wherein each application identifier of the set of application identifiers identifies one software application that is included in the service package.
A processing system may obtain, from a requesting system, a request for a network management task associated with at least one managed object in the communication network. The at least one managed object may be of a first vendor of a plurality of vendors. In addition, the processing system may comprise an application programming interface to process network management task requests associated with managed objects of a plurality of different vendors. The processing system may next select a pipeline of functions associated with the network management task, where the pipeline of functions is specific to the first vendor and to the network management task, gather network state information relating to the pipeline of functions, and execute the pipeline of functions based upon the network state information to perform the network management task. The processing system may then report to the requesting system a result of the network management task.
A processing system including at least one processor may obtain network operational data of a communication network, transform the network operational data into a text-based format, and train a generative machine learning model implemented by the processing system using the network operational data in the text-based format. The processing system may then receive a query pertaining to the network operational data, apply the query to the generative machine learning model implemented by the processing system to generate a textual output in response to the query, and present the textual output that is generated in response to the query.
A first integrated circuit of a mobile computing device may detect at least a first condition for enabling a utilization of at least one subscriber identity module credential stored on the first integrated circuit by a second computing device and may select the at least one subscriber identity module credential for transmission based upon the at least the first condition. The first integrated circuit may then establish a communication channel with a second integrated circuit of the second computing device and transmit the at least one subscriber identity module credential to the second integrated circuit via the communication channel to enable the utilization of the at least one subscriber identity module credential by the second computing device.
Concepts and technologies disclosed herein are directed to a notification traffic anomaly detector. The notification traffic anomaly detector can receive, from a notification system, notification traffic data associated with at least one of notification requests or notifications processed by the notification system. The notification traffic anomaly detector can determine, using at least one machine learning model, whether the notification traffic data indicates an anomaly associated with the notification requests and/or the notifications processed by the notification system. In response to determining that the notification traffic data indicates an anomaly associated with the notification requests and/or the notifications processed by the notification system, the notification traffic anomaly detector can generate an anomaly notification and provide the anomaly notification to the notification system while at least one of notification requests or the notifications is being processed by the notification system.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
The disclosed technology is directed towards presenting an avatar in a virtual reality environment in different ways to different users, based on relationship data including a familiarity level and trust level with each other user. The familiarity level data and/or trust level data can be updated with each encounter with another user. The presentations of the same avatar can be different to the other users encountered at the same time, e.g., a lower resolution avatar presented to a less familiar and/or less trusted other user, a higher resolution avatar presented to a more familiar and/or more trusted other user. Audio volume and/or clarity may be similarly modified based on relationship data. A user having an encounter with another user may have a mirror view of the user's own avatar, and can improve or degrade the avatar's appearance (and/or aural output) during the encounter.
The disclosed subject matter relates to techniques for determining an appropriate aggregation level for a control channel resource set (CORESET). In one embodiment, a method is provided that comprises determining, by a first device operatively coupled to a processor, an aggregation level for application by a second device to decode candidate downlink control channels associated with a CORESET. The method further comprises transmitting, by the first device, aggregation level information to the second device indicating the aggregation level. As a result of the transmitting, the second device becomes configured to apply the aggregation level in association with attempting to decode the candidate control downlink control channels. In various embodiments, the aggregation level is determined based one or more criteria, including an aggregation level capability of the second device, a location of the second device relative to the first device, and a geometry associated with the second device.
Aspects of the subject disclosure may include, for example, analyzing data in accordance with at least one algorithm to select one of carrier aggregation or dual connectivity for providing a communication service in respect of a communication device, resulting in a selection, and providing the communication service to the communication device in accordance with the selection. Other embodiments are disclosed.
Unlike smart devices, Internet of things (IoTs), such as meter readers, generate very low revenue per user. Traditional tunnel/bearer based connection-oriented architectures do not scale economically for billions of IoT devices due to the amount of signaling overhead associated with GTP tunnel setup/tear down and the states related to GTP tunnels maintained at various parts of the mobile network. However, the mobility network can efficiently support massive stationary and/or mobile IoTs by reducing the amount of signaling overhead, the state of the IoTs kept in network, and simplifying the data plane when possible.
A processing system including at least one processor may identify a user viewpoint of a user at a first venue, match a viewpoint at a second venue to the user viewpoint of the user at the first venue, detect a trigger condition to provide visual content of the second venue to the user at the first venue, obtain the visual content of the second venue, wherein the visual content of the second venue is obtained from the viewpoint at the second venue, and provide the visual content of the second venue to an augmented reality device of the user at the first venue, where the augmented reality device presents the visual content of the second venue as a visual overlay within a field of view of the user.
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06V 20/40 - ScenesScene-specific elements in video content
Aspects of the subject disclosure may include, for example, a media consumption database that stores data elements describing conditions under which electronic media content is consumed by a user on an electronic device. A search of the media consumption database based on at least a portion of the conditions may result in at least a portion of the electronic media content to be re-presented to an electronic device of the user Other embodiments are disclosed.
Disclosed is managing (creating and maintaining) attendance/participation data describing remote attendance of attendees of an event, or a replay of the event. The event can be a virtual reality event. When a remote user attends an event, subsequent viewers of the event replay can see a digital representation (e.g., an avatar) of the remote user within the replay as having attended the event in-person. Subsequent replays include digital representations of the remote user and the user(s) that viewed previously replay(s) to emulate their attendance. User can manage their own attendance data, including to obtain proof of attendance. A user can delete his or her presence at an event, such that replays after the deletion do not include that user's representation. A user can go anonymous with respect to an event, such that any replays after the anonymity choice include only a generic representation of the attendee.
Aspects of the subject disclosure may include, for example, obtaining first information indicative of one or more historical operating characteristics of a network; obtaining second information indicative of one or more current operating characteristics of the network; comparing, via a first computer-implemented process that requires no manual intervention, the first information to the second information to make a prediction of a potential future network event, resulting in a predicted future network event; classifying, via a second computer-implemented process that requires no manual intervention, the predicted future network event into one of a plurality of classes of network events; and responsive to the classifying, facilitating, via a third computer-implemented process that requires no manual intervention, an action to at least partially avoid an occurrence of the predicted future network event. Other embodiments are disclosed.
Facilitating facilitate enablement of a smart HARQ feedback to support outer loop link adaptation in advanced networks (e.g., 4G, 5G, 6G, and beyond) is provided herein. Operations of a method can comprise sending, by a first device comprising a processor, a data packet to a second device. The method also can comprise receiving, by the first device, negative acknowledgement data from the second device. The negative acknowledgement data can indicate that the second device fails to support a modulation and coding protocol of the data packet.
The disclosed technology is directed towards switching the primary cell in a carrier aggregation scenario to improve performance. Measurement data of a mobile device (user equipment) is evaluated with respect to one or more various criteria such as cell carrier bandwidth, cell carrier load, cell-related capability and other carrier data (e.g., dynamic spectrum sharing versus clean, time division duplex or frequency division duplex), and others. Device conditions such as overheating can be considered as well. The evaluation results in a ranking of primary cell candidates. If a more optimal primary cell (candidate) is available, the primary cell in the carrier aggregation combination is switched to the candidate that is ranked the highest. Switching can be relatively very fast, such as based on already existing layer-1 (L1) and/or layer-2 (L2) measurement data. Layer-3 (L3) measurement data also can be obtained on demand, for example, to use in the evaluation.
The disclosed technology is directed towards detecting improbable speeds of a mobile device, which can indicate fraudulent activity with respect to the mobile device. Radio access network events and call detail records are processed to determine when a mobile device “travel jumps” between locations at improbable speeds. Events corresponding to handovers between adjacent cells are filtered out. For events corresponding to changed cell towers that are non-adjacent, further processing is performed to determine the speed of the mobile device travel between the cells. A first speed threshold is selected based on possible air travel (a cell near an airport) or a second non-air travel speed threshold is selected. If the speed of the mobile device exceeds the selected speed threshold, a travel jump is determined. Exceptions can be made for gaps in connectivity due to topography (known inconsistent reception areas) and for a mobile device shutting down and restarting.
Aspects of the subject disclosure may include, for example, obtaining a selection of at least one network attachment model for instantiating a network service of a network, obtaining a specification of at least one parameter for the network service, generating a design based on the at least one network attachment model and the specification, and instantiating the design in conjunction with at least one resource of the network to facilitate the network service. Other embodiments are disclosed.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
A processing system including at least one processor may obtain utilization data of an air filter in an air filtration system and environmental data for at least one location associated with the air filtration system. The processing system may then determine at least one filter changing action based upon at least the utilization data and the environmental data and transmit at least one instruction to implement the at least one filter changing action.
A processing system may obtain a downscaled version of a reference copy of a video, comprising a plurality of downscaled versions of a plurality of frames of the reference copy of the video, obtain a first recorded frame of a first variant of a plurality of variants associated with the reference copy of the video, where the plurality of variants comprises a plurality of copies of the video encoded at different bitrates, generate a first downscaled version of the first recorded frame, calculate a first plurality of image distances between the first downscaled version of the first recorded frame and the plurality of downscaled versions of the plurality of frames of the reference copy of the video, and determine a first frame index of the first recorded frame in accordance with a first least image distance from among the first plurality of image distances that is calculated.
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
H04N 19/10 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
H04N 19/154 - Measured or subjectively estimated visual quality after decoding, e.g. measurement of distortion
H04N 21/232 - Content retrieval operation within server, e.g. reading video streams from disk arrays
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/236 - Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator ] into a video stream, multiplexing software data into a video streamRemultiplexing of multiplex streamsInsertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rateAssembling of a packetised elementary stream
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
60.
SERVICE AND SECURITY ENHANCEMENT OF COMMUNICATION SERVICES
Authorization for access to an application server and associated communication service can be desirably managed. When a device attempts to access an application server and service, an authorization server generates an encrypted token, comprising device identifier information, and communicates the token to the device. The device communicates the token to the application server. The application server communicates the token to the authorization server. The authorization server determines whether the device is validated to access the application server and service based on the encrypted token, private decryption key, and initialization vector, and based on subscriber-related information. The authorization server does not share the private decryption key or initialization vector with the application server. If validated, the authorization server communicates validation-related information, including a permitted portion of subscriber-related information, to the application server. If not validated, the authorization server communicates not-validated information to the application server.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Aspects of the subject disclosure may include, for example, a device having: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: determining whether a calling number of a call is unallocated; determining whether the calling number is unassigned to a subscriber; validating the calling number as an authentic telephone number; categorizing the calling number as fraud or spam responsive to the calling number being unallocated, allocated and unassigned, or allocated, assigned and invalid; and categorizing the calling number as neutral responsive to the calling number being allocated, assigned and validated. Other embodiments are disclosed.
H04M 3/436 - Arrangements for screening incoming calls
H04M 1/663 - Preventing unauthorised calls to a telephone set
62.
APPARATUSES AND METHODS FOR IDENTIFYING SUSPICIOUS ACTIVITIES IN ONE OR MORE PORTIONS OF A NETWORK OR SYSTEM AND TECHNIQUES FOR ALERTING AND INITIATING ACTIONS FROM SUBSCRIBERS AND OPERATORS
Aspects of the subject disclosure may include, for example, obtaining a request for a communication service from a user equipment, based on the obtaining of the request, assigning a first identifier to the user equipment as part of the communication service, obtaining first data from the user equipment as part of the communication service, analyzing at least the first data in accordance with at least one algorithm to determine that the user equipment is likely misconfigured in an amount that is greater than a threshold, resulting in a determination, based on the determination, mapping the first identifier to a second identifier associated with the user equipment, generating a message based on the mapping, and transmitting the message. Other embodiments are disclosed.
Various methods for a 3GPP defined Charging and Collection Function are employed that may use a microservices approach. The microservice approach may decompose the function of the network elements into component level functions that may be deployed as separate functional elements.
Aspects of the subject disclosure may include, for example, obtaining first user-generated input, the first user-generated input indicates a request for generating an (API, identifying a first group of entities from the request, and determining whether there is a match between the first group of entities and a second group of entities stored in an API database according to API metadata. Further embodiments include identifying an API from the API database resulting in an identified API, presenting the identified API to the user, obtaining second user-generated input, and adjusting the request according to the second user-generated. Additional embodiments can include identifying a third group of entities from the adjusted request, and determining whether there is a match between the third group of entities and a fourth group of entities stored in the API database according to the API metadata. Other embodiments are disclosed.
A processing system including at least one processor of a network access device may detect an installation of the network access device in a wireless communication system of a vehicle. The processing system may next interrogate at least one antenna unit of the wireless communication system of the vehicle and obtain, from the at least one antenna unit in response to the interrogating, a set of antenna capability information. The processing system may then configure the wireless communication system of the vehicle in accordance with at least a portion of the set of the antenna capability information.
A processing system may segregate customers of a communication network into communication network customer segments in accordance with at least one factor, generate predicted customer order weights by customer segment for a first network resource type in accordance with at least a first forecasting model, and calculate inventory demand weights for network resources of the first network resource type in accordance with at least a second forecasting model. The processing system may then obtain a new customer order for the first network resource type from a first customer and configure the communication network to process data traffic of the first customer via one of the network resources of the first network resource type that is selected based upon a customer segment of the first customer and an allocation matching scheme in accordance with the predicted customer order weights by communication network customer segment and the plurality of inventory demand weights.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
67.
SYSTEM AND METHOD FOR DETERMINING AUTOMATED SOFTWARE TESTING USING MACHINE LEARNING
Aspects of the subject disclosure may include, for example, a method that includes receiving, by a processing system including a processor, input data relating to software application in a predetermined format, constructing a first training data set based on a set of features extracted from the input data and a set of labels associated with the set of extracted features, obtaining a classifier trained with the first training data set using supervised machine learning techniques, testing the classifier with a second training data set different from the first training data set, in response to new input data relating to the software application in the predetermined format, determining, by the classifier, an automated test, and providing the automated test to a continuous integration and continuous deployment (CI/CD) pipeline. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a method in which a processing system obtains first cellular traffic data associated with an existing cell site of a communication network, first transportation data associated with a first geographic region including the existing cell site, and first household data regarding households located in the first geographic region; the first household data comprises cellular plan data, broadband plan data, demographic data and/or economic data. The processing system constructs a predictive model for cellular traffic applicable to a candidate cell site in a second geographic region, using the cellular traffic data and the first transportation data and/or the first household data. The processing system predicts second cellular traffic at the candidate cell site, using as inputs to the model second transportation data and second household data associated with the candidate cell site. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a first portion of a communication service via a first signal having a first frequency within a first band of frequencies, subsequent to the obtaining of the first portion of the communication service, obtaining data associated with a plurality of parameters, analyzing at least the data to identify when a scan for a second signal having a second frequency within a second band of frequencies should be performed, wherein the second band of frequencies is different from the first band of frequencies, and scanning for the second signal based on the analyzing. Other embodiments are disclosed.
H04W 72/542 - Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality
H04W 72/566 - Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
70.
SYSTEMS AND METHODS FOR SHARING INFORMATION BETWEEN/AMONG USERS
Aspects of the subject disclosure may include, for example: receiving, from a first mobile communication device of a first user, first information associated with a computer-readable indicia that has been scanned by the first mobile communication device, wherein the computer-readable indicia had been displayed by a second mobile communication device of a second user at a time of being scanned by the first mobile communication device; responsive to receiving of the first information, obtaining from one or more first databases first characterizing data that is descriptive of one or more characteristics of the second user; and sending to the first mobile communication device the first characterizing data, wherein the sending facilitates a presentation by the first mobile communication device of the one or more characteristics of the second user. Other embodiments are disclosed.
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
Switching a device between bandwidth parts of a channel bandwidth can be managed. A bandwidth part (BWP) management component (BWPMC) can determine characteristics relating to communication rate, quality of service (QoS), or device power based on analysis of data relating to operation of the device, including data relating to service type of a service used by the device or traffic type of data communicated by the device. If heavy traffic is detected, BWPMC can determine whether switching from a smaller BWP to a larger BWP can improve communication rate or QoS. If so, BWPMC can initiate a switching timer. If heavy traffic is still detected when timer has ended, BWPMC can switch from smaller BWP to larger BWP, set another timer, and check again when that timer ends. BWPMC can bypass BWP switching for the device when power saving mode is on or low battery power is detected.
Aspects of the subject disclosure may include, for example, an AT command that allows an application service provider to modify suspend/resume (S/R) and/or deactivate/activate (D/A) functionality specified in one or more elementary files of a UICC. The S/R and/or D/A functionality can be influenced by the application service provider without relying on SIM-OTA messages being forwarded by a mobile operator. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a first value corresponding to a constraint pertaining to a number of beams, conveying the first value to at least one communication device, and obtaining, based on the conveying, at least one report from the at least one communication device, wherein an at least a second value corresponding to a number of the beams referenced in the at least one report is less than or equal to the first value. Other embodiments are disclosed.
H04B 7/08 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station
74.
METHODS, SYSTEMS, AND DEVICES TO VALIDATE IP ADDRESSES
Aspects of the subject disclosure may include, for example, obtaining a first group of Internet Protocol (IP) addresses from a group of network devices, and determining a second group of IP addresses from the first group of IP addresses includes possible malicious IP addresses utilizing a machine learning application. Further embodiments can include obtaining a first group of attributes of malicious IP addresses from a first repository, and determining a third group of IP addresses from the second group of IP addresses includes possible malicious IP addresses based on the first group of attributes. Additional embodiments can include receiving user-generated input indicating a fourth group of IP addresses from the third group of IP addresses includes possible malicious IP addresses, and transmitting a notification to a group of communication devices indicating that the fourth group of IP address includes possible malicious IP addresses. Other embodiments are disclosed.
Channel state information (CSI) can be transmitted to a network node incrementally to increase network efficiency. The CSI feedback framework can be enhanced by allowing a user equipment (UE) to report multiple sets of CSI feedback, where each set can comprise a rank indicator (RI), a pre-coder matrix indicator (PMI), and a channel quality indicator (CQI). Since a different set may have a different sub-band, the CSI feedback framework can support the sub-band rank, wherein rank data from a wideband and the sub-band can be used by the network.
H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04L 5/00 - Arrangements affording multiple use of the transmission path
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
A method includes selecting a study group including a first network element and a second network element of a network, selecting a control group including a third network element, identifying times at which a change is deployed at the first network element and the second network element, time-aligning the change at the first element and the change at the second network element to a common time, performing a statistical analysis that compares the performance of the network before the common time to the performance of the network after the common time, detecting an impact of the change on a performance of the network based on the statistical analysis, and initiating a remedial action when the impact comprises a degradation to the performance.
Aspects of the subject disclosure may include, for example, monitoring a first activity undertaken by a communication device during a first communication session, generating, based on the monitoring, first data that indicates an amount of time that is spent on the first activity, comparing, based on the generating, the first data to a threshold, and identifying, based on at least the comparing, an action to take when the amount of time that is spent on the first activity exceeds the threshold. Other embodiments are disclosed.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
78.
MULTIPLEXING CAPABILITY INDICATION FOR INTEGRATED ACCESS AND BACKHAUL
The technology is generally directed towards sending multiplexing capability data between integrated access and backhaul (IAB) nodes, such as for use in coordinating the communications of the nodes, including using multiplexed resources. In addition to different types of multiplexing capabilities, the technology facilitates sending condition data (e.g., measured interference, traffic, beam data and the like) by which a parent node can make determinations with respect to coordinating (e.g., scheduling and/or guard symbol usage) child node communications. Further, the technology provides for sending usage criterion data with the multiplexing capability indication data, such that, for example, any specified usage criterion needs to be satisfied before a particular type of multiplexing can be used.
The technologies described herein are generally directed to detecting reflective surfaces for use reflecting a signal from access point equipment to destination equipment in advanced networks, e.g., at least a fifth generation (5G) network. For example, a method described herein can include receiving from access point equipment, characteristic data representative of a characteristic of a beam of reflected light reflected by a reflective surface and detected by the access point equipment. The method can further include, based on the characteristic and a first geographic location of the access point equipment, mapping a second geographic location of the reflective surface. Further, the method can include, storing location information corresponding to the second geographic location of the reflective surface, resulting in a stored surface location.
A method that incorporates the subject disclosure may include, for example, providing a first digital assistant to engage in a first communication exchange with a user of the first communication device where the first digital assistant has a first digital assistant persona that controls information provided by the first digital assistant during communication exchanges, analyzing user input during the first communication exchange, and adjusting the first digital assistant persona based on one or more of the user persona, user deficiency, or promotional offers. Other embodiments are disclosed.
Architectures and techniques are presented that provide an improved mechanism for a subscriber entity to report to a network provider a network issue that affects the performance of an application that uses a service provided by the network provider. The improved mechanism can enable fine granularity with respect to the network issue by identifying the issue on a per-session basis. In response to feedback data that is reported by the subscriber entity, the network provider can perform self-healing or other upgrade techniques to rapidly remedy the network issue.
H04L 41/0659 - Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
The described technology is generally directed to over-the-air configuration and management of new radio multifrequency smart repeaters. To facilitate data forwarding, a smart repeater is configured via a first frequency to generate a forwarding layer that is logically above a physical layer of a mobile termination function (corresponding to a repeater link) and a physical layer of distributed unit function of the repeater equipment (corresponding to an access link, configured to use a second frequency). Via the forwarding layer, when traffic is received from a parent node, the traffic is forwarded via the access link to user equipment, and when traffic is received from a user equipment, the traffic is forwarded via the access link to a parent node. As one example, control plane signaling can be performed via the sub-six gigahertz band, and data plane signal forwarding can be performed via the millimeter wave band.
H04W 40/22 - Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
83.
ENHANCED 911 LOCATION FOR DENSE CELL NETWORK MESHES
Techniques for Enhanced 911 (E911) location for dense cell network meshes are provided. A method can include obtaining, by a system comprising a processor via a communication network comprising first network cells listed in a neighboring cell list of a user equipment, coverage area information for the first network cells, wherein the coverage area information comprises respective reported positions of the first network cells and respective coverage radii of the first network cells; determining, by the system based on the coverage area information for the first network cells, a first area in which respective coverage areas of the first network cells overlap; and defining, by the system, an estimated position of the user equipment as a selected position within the first area.
G01S 5/02 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations using radio waves
H04W 4/029 - Location-based management or tracking services
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
84.
APPARATUSES AND METHODS FOR FACILITATING A FEDERATION OF IDENTIFIERS FOR REDUCING INVALID COMMUNICATIONS AND IDENTIFYING ATTEMPTS AT SPOOFING
Aspects of the subject disclosure may include, for example, obtaining a first communication request that includes an identifier, determining that the identifier is included in a first plurality of unassigned identifiers, resulting in a first determination, wherein the first plurality of unassigned identifiers is associated with a plurality of networks, and based on the first determination, rejecting the first communication request. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining traffic that is conveyed at least in part within a private cloud network, based on the obtaining, identifying characteristics of the traffic, and based on the identifying of the characteristics of the traffic, causing at least one action to be performed within the private cloud network. Other embodiments are disclosed.
Described is intelligent security based on the detection of the presence of mobile devices within a defined region, determined via accurate mobile device location sensing, e.g., within on the order of one meter. Upon detection of the presence of a mobile device within a defined region via mobile device millimeter wave-based position sensing, an identity associated with the mobile device is obtained. If the identity associated with the mobile device is not a trusted identity, action can be taken based on the presence of the identity within the defined region. The intelligent security can be implemented within an application program of a registered user's mobile device and/or a security system, such as a commercially available security system with alarm monitoring services. Various criteria can determine the action(s) to take, including by which region (if more than one), time of day, identity trust level, duration of presence, and the like.
H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
H04W 4/02 - Services making use of location information
H04W 4/029 - Location-based management or tracking services
H04W 68/00 - User notification, e.g. alerting or paging, for incoming communication, change of service or the like
87.
SYSTEM TO CREATE AND MANAGE IMS FUNCTIONAL RESOURCE PROFILE GROUPS FOR ALIGNMENT WITH 5G SLICES
Aspects of the subject disclosure may include, for example, a device in which a processing system defines service attributes for a function of an internet multimedia subsystem (IMS) core; the function is dedicated for providing a service to a user endpoint (UE) device. The processing system facilitates constructing a resource profile of the IMS core that includes the function; registering the function at a network repository function (NRF) associated with the IMS core; discovering the function from the NRF; obtaining a service requirement of the UE; and matching the service requirement with the service attributes in accordance with matching criteria. Other embodiments are disclosed.
Dynamic frame structure coordination is performed between a parent integrated access and backhaul (IAB) node and child IAB node based on one or more multiplexing options. The parent node sends a dynamic frame structure coordination (DFSC) message to an IAB user equipment function of a child node, indicating that resources are available or released, overriding a semi-statically coordinated and configured downlink/uplink resource pattern. The parent node can make, or the child node can request, the modification. The DFSC message includes multiplexing option(s). The child IAB node's user equipment function communicates the frame structure update to the child node's distributed unit function, which allows the distributed unit function to utilize those resources in accordance with the multiplexing option. Half-duplex, full duplex, frequency division multiplexing and spatial division multiplexing capabilities are considered when selecting the multiplexing option or options for one or more slots identified in the DFSC message.
One example of a method performed by a processing system of a user endpoint device in a communications network includes detecting a network traffic flow to be securely delivered from the user endpoint device to a destination in the communications network, determining that a bearer that the user endpoint device is currently utilizing to connect to the communications network is a cellular bearer, and controlling, in response to the determining, a virtual private network client of the user endpoint device to route the network traffic flow to the destination over existing network interfaces in a manner that bypasses a virtual private network connection of the user endpoint device.
A processing system may obtain a description of a first physical component of a logical composite device comprising at least two distributed physical components to perform a function in a communication network, where the at least two distributed physical components are dedicated to the logical composite device, and where the at least two distributed physical components include the first physical component. The processing system may next obtain a description of a second physical component of the at least two distributed physical components and add a set of one or more inventory objects representing the logical composite device to a communication network inventory database in accordance with the descriptions, where the communication network inventory database is in accordance with a class model having a plurality of classes, the plurality of classes including a logical composite class, the one or more inventory objects in accordance with the logical composite class.
Aspects of the subject disclosure may include, for example, creating network reachability on a layer 3 internet protocol underlay network between a subscriber access point and a first broadband network gateway (BNG) and between the subscriber access point and a second BNG, establishing Ethernet Virtual Private Network Virtual Private Wire Service (EVPN VPWS) Headend (HE) layer 2 termination between the subscriber access point and the first BNG and between the subscriber access point and the second BNG. Embodiments further include receiving a first advertisement of Ethernet Virtual Interface (EVI) reachability from the first BNG, receiving a second advertisement of EVI reachability from the second BNG, selecting the first BNG as a primary path for subscriber Virtual Local Area Network (VLAN) traffic for one or more subscriber devices, mapping a VLAN of the subscriber access point to a first EVPN VPWS tunnel for transport of the subscriber VLAN traffic to the first BNG, and communicating subscriber VLAN data over the first EVPN VPWS tunnel with the first BNG. Other embodiments are disclosed.
A method performed by a processing system including at least one processor includes sending an instruction to an application executing on a mobile device, where the instruction causes the application to configure the mobile device to measure and report a radio frequency of a first wireless communications access network, wherein the mobile device is subscribed to a service provided by a second wireless communications access network, receiving measurements of the radio frequency of the first wireless communications access network from the mobile device, and generating a coverage map illustrating a coverage of the first wireless communications access network, using the measurements.
The described technology is generally directed towards automated generation of network data visualization dashboards. Automation can be achieved through the use of templates and data files. Templates can be combined with any of multiple different data files to produce network data visualization dashboard files. Different combinations of templates and different data files can result in different network data visualization dashboard files. The network data visualization dashboard files can be provided to a data visualization tool, platform, or service, which can generate network data visualization dashboards according to received network data visualization files.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
94.
INTELLIGENT DYNAMIC PERSONALIZED SYSTEM FOR GAMING AND/OR MEDIA CONTENT COMSUMPTION
Aspects of the subject disclosure may include, for example: obtaining first data that is associated with a first user and that is indicative of personality trait(s) of the first user; obtaining second data that is associated with a second user and that is indicative of personality trait(s) of the second user; receiving first usage data that is indicative of viewing by the first user of media content; receiving second usage data that is indicative of viewing by the second user of the media content; determining change(s) to be made to the media content, wherein the change(s) are in accordance with the first and second personality traits, and wherein the change(s) are designed to minimize a stress level of the first user and/or the second user; editing the media content to reflect the change(s); and providing edited media content to the first and second users. Other embodiments are disclosed.
A63F 13/67 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor adaptively or by learning from player actions, e.g. skill level adjustment or by storing successful combat sequences for re-use
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/2668 - Creating a channel for a dedicated end-user group, e.g. by inserting targeted commercials into a video stream based on end-user profiles
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
95.
SYSTEM AND METHOD FOR NEGOTIATION AND PERMANENCE MANAGEMENT OF METAVERSE MASHUPS
Aspects of the subject disclosure may include, for example, receiving first defining information for a first metaverse, receiving second defining information for a second metaverse, automatically identifying conflicts between the first defining information and the second defining information, automatically negotiating resolution of the conflicts between the first defining information and the second defining information to define rules for a merged metaverse, merging the first metaverse and the second metaverse according to the rules for the merged metaverse to define a destination metaverse, and interacting with a plurality of users to create for the plurality of users an immersive experience in the destination metaverse. Other embodiments are disclosed.
G06T 19/20 - Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
The disclosed technology is directed towards presenting promotional content via an avatar representing a first, promoter user to a second, target user experiencing a virtual or other environment. The promotional content may be presented via an alteration of the avatar, audio output and/or an object virtually associated with the avatar. The promotional content may be selected based on matching target user data describing a target user experiencing a virtual reality environment. Different users viewing the same avatar at the same time can be presented with different promotional content. Information may be output to attract a target user to perceive the promotional content. The promoter user can interact to obtain a current promotion status notification, as well as to select from available promotional content offerings to promote.
A method includes receiving profile information for a network. The method also includes determining a network configuration based on at least a constraint associated with at least one of a network session or a hardware capacity of a hardware platform of the network and a number of sessions that the network configured based on the network configuration can support. The method also includes configuring the network based on the network configuration.
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
Aspects of the subject disclosure may include, for example, obtaining information regarding a metaverse object and data regarding network resources, deriving a mapping between the metaverse object and one or more of the network resources based on the information and the data, and providing a hybrid service design and orchestration (H-SDO) system with access to the mapping to facilitate selection of particular network resources for supporting one or more metaverse service requests relating to the metaverse object. Other embodiments are disclosed.
A method for validating service continuity of deployed fiber serving terminals in a passive optical network includes broadcasting, from a central office of a passive optical network, a beacon signal to a plurality of beacon responders, wherein each beacon responder of the plurality of beacon responders is connected to a respective fiber serving terminal of a plurality of fiber serving terminals of the passive optical network, changing a counter in response to each response message that is received from the plurality of beacon responders in response to the beacon signal, and generating a report indicating which fiber serving terminals of the plurality of fiber serving terminals are functioning properly and which fiber serving terminals of the plurality of fiber serving terminals are not functioning properly, based on whether a count of the counter is equal to an expected number of responses, after an expiration of a predefined period of time.
H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
H04B 10/079 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
100.
ULTRA-RELIABLE LOW LATENCY COMMUNICATIONS (URLLC)-AWARE TRIGGERED DYNAMIC GRANT
Aspects of the subject disclosure may include, for example, receiving, from a user equipment (UE) device, a scheduling request for a configured grant operation during performance of an ultra-reliable low latency communications (URLLC) service at the UE device, determining radio channel characteristics of a radio channel of the UE device, and determining an appropriate modulation and coding scheme for a dynamic configured grant for the UE device, wherein the appropriate modulation and coding scheme is selected based on the radio channel characteristics. Aspects of the disclosure further include communicating information about the dynamic configured grant to the UE device, including communicating an assigned modulation and coding scheme to the UE device for use during performance of the URLLC service at the device, and suspending further scheduling requests for additional dynamic configured grants during completion of the URLLC service at the device. Other embodiments are disclosed.