Systems and methods for conveniently accessing, viewing, and transferring information stored in a variety of locations and associated with a variety of systems, devices, and applications are provided. A method may include receiving user account information; generating a user account using the user account information; receiving content source registration information; associating the user account and a content source using the content source registration information; receiving storage target registration information; associating the user account and a storage target using the storage target registration information; receiving a request to access content information related to the content source; receiving the content information in response to receiving the request to access the content information; and transmitting the content information to the storage target in response to receiving the content information.
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
2.
APPARATUS AND METHOD FOR FINANCIAL FORECASTING AND VERSION LOG CREATION
An apparatus for financial forecasting, wherein the apparatus controls a user interface to be displayed on a display and controls receiving a plurality of financial forecasting data submissions that are submitted using the user interface. The apparatus also controls storing each one of the plurality of financial forecasting data submissions as a different version in a version log. The apparatus also controls receiving and storing at least one of an approval and a rejection, using the user interface, for each one of the stored plurality of financial forecasting data submissions and controls the user interface to display the version log in response to a request input using the user interface.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
G06Q 30/0202 - Market predictions or forecasting for commercial activities
3.
DYNAMIC PLUGIN SYSTEM AND METHOD FOR LOW-CODE APPLICATION BUILDER
A method of implementing plugins in a low-code application, performed by at least one processor, includes receiving, from a user equipment (UE), parameters defining a first plugin, generating a first package defining the first plugin based on the received parameters, and generating the first plugin based on the first package.
Common file attribute processing is used for providing enhanced loading time of Application Programming Interface (API) files. An Extensible Markup Language (XML) file of an API is parsed. XML element objects in XML file are parsed. Whether there is at least one common attribute for the XML element objects is determined. In response to determining there is at least one common attribute for the XML element objects, attribute data for the at least one common attribute is retrieved from storage and the attribute data is added in an API resource object.
G06F 16/17 - Details of further file system functions
G06F 16/80 - Information retrievalDatabase structures thereforFile system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
An apparatus for configuring submission of financial forecasting data. The apparatus includes: a memory storing instructions; a processor configured to execute the stored instructions to implement operations. The operations include: controlling a user interface to be displayed and controlling receiving and storing of submitted financial forecasting data. The operations include controlling receiving and storing of a freeze time, which indicates a time after which financial forecasting data, which was already submitted before the freeze time, cannot be modified by users. The operations include controlling receiving and storing of submission period configuration data, which configures multiple submission periods that will occur before the freeze time, and wherein the submission periods are periods during which financial forecasting data may be submitted and periods outside of which submission of financial forecasting data is restricted. Finally, the operations include controlling generating a financial forecast using the stored submitted financial forecasting data.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 40/06 - Asset managementFinancial planning or analysis
6.
SYSTEM AND METHOD FOR AUTHORIZING AN ACCESS TOKEN USING A DISTRIBUTED CACHE
A method for authorizing a client application to access resources using a distributed cache is provided. The method includes: receiving, from the client application, a login request at an identity management (IDM) tool; providing, by the IDM tool to the distributed cache, a token session state of a first access token and permission information of the first access token; masking the permission information from the first access token and providing an updated access token to the client application with the permission information masked; receiving, at an application programming interface (API) gateway from the client application, a service request comprising the updated access token; validating the updated access token using the distributed cache; and providing a response to the client application based on the validation.
In general, the current subject matter relates to clock selection in a fronthaul network. In some implementations, clock selection in a fronthaul network can include selecting one distributed unit (DU) from among a plurality of DUs communicatively coupled to a radio unit (RU) to serve as a primary clock for a communication system including the plurality of DUs, the RU, and a service management and orchestration (SMO), and transmitting a request to the RU that triggers the RU to select one of the DUs to become the primary clock. The SMO can be communicatively coupled to the RU and the plurality of DUs.
Synchronization of a session state of an access token is provided between elements in a system, such as between an Identity Manager (IDM) and an Application Programming Interface (API) Gateway. The IDM generates an access token that is provided to a client device and stores session state information of the access token at a distributed cache. When the client device logs out from the IDM, the IDM removes the session state information from the distributed storage device. The API Gateway is able to request the session state information from distributed storage device. Based on receiving the session state information, the API Gateway authenticates the access token and grants the client device access to an end service. Before requesting the session state information from the distributed storage device, the API Gateway is able to verify the access token is valid and that the access token has not expired.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 41/042 - Network management architectures or arrangements comprising distributed management centres cooperatively managing the network
H04L 41/06 - Management of faults, events, alarms or notifications
9.
SYSTEMS AND METHODS ENABLING SEAMLESS SIM PROFILE TRANSMISSION AT SUBSCRIPTION MANAGEMENT DATA PREPARATION (SMDP+)
Systems and methods for providing a network profile for an Embedded Universal Integrated Circuit Card (eUICC) include generating a first profile corresponding to a first communication protocol, generating a second profile corresponding to a second communication protocol, associating the first profile and the second profile with a same profile record, and providing either the first profile or the second profile to a user device based on a determined communication protocol, from among the first communication protocol and the second communication protocol, to be used by the user device.
Embodiment herein provides a method for advertising Shared Risk Link Group (SRLG) information between multiple layers of a communication network. The method includes determining, by an optical domain controller (100), SRLG information associated with an optical domain and IP domain to be shared with an IP domain controller (200) and determining, by the optical domain controller (100), layer identifiers to establish a multi-protocol enabled Border Gateway Protocol (BGP) session between the optical domain and the IP domain. The method also includes establishing, by the optical domain controller (100), the multi-protocol enabled BGP session between the optical domain controller (100) and the IP domain controller (200) based on the layer identifiers; and advertising, by the optical domain controller (100), the SRLG information associated with the optical domain and the SRLG information associated with the IP domain to the IP domain controller (200) over the established multi-protocol enabled BGP session.
A method, system, apparatus, and computer-readable medium for trading telecommunications related services on a centralized marketplace network. The method includes: receiving a user request of a first user to access the centralized marketplace; authenticating, based on the received user request, the first user; obtaining product information of a product of the authenticated first user based on a predetermined onboarding policy, the product being a virtualized network service for a telecommunications network; obtaining, based on the predetermined onboarding policy, the product for performing one or more onboarding tests of the product in a test environment of the centralized marketplace; obtaining status information of the one or more onboarding tests; and presenting the product for purchase in the central marketplace based on a result of the one or more onboarding tests.
System, method, device, and program for graph embedding based on graph data and non-graph data are provided. The method and processes may be executed by at least one processor and may include receiving graph data associated with one or more users, and receiving classification data associated with the one or more users, wherein the classification data comprises non-graph data associated with the one or more users. The method and processed may further include generating an accuracy parameter based on the classification data associated with the one or more users, wherein the accuracy parameter indicates an accuracy of neural network-based classification results based on the classification data; and generating numerical node representation using a neural network-based graph embedding model associated with the one or more users based on the graph data, the classification data, and the accuracy parameter.
A method includes receiving node-site planning data from a first-party application; validating the node-site planning data based on one or more parameters of validation; pre-loading at least a portion of the node-site planning data on a second-party application for field-survey data gathering; and receiving field-survey data from the second-party application.
A method for computing a service fee for a rental item, performed by at least one processor, is provided. The method includes receiving usage data corresponding to a customer from a sensor device and base fee information from one of a plurality of service platforms, mapping the usage data to user information from the plurality of service platforms, the user information including previous user ratings of the customer, generating a final score of the customer based on the mapped usage data, and computing a service fee to be charged based on the final score and the base fee information.
A method for planning network sites includes receiving a dataset of a plurality of planned network sites. The method further includes executing a coverage availability microservice to determine coverage availability for each planned network site in the plurality of planned network sites, The method further includes executing one or more microservices to determine geographic conditions for each planned network site in the plurality of network sites. The method further includes executing a priority microservice to assign one or more priority levels to each planned network site of the plurality of planned network sites based on at least the determined coverage availability for each planned network site and the determined geographic conditions for each planned network site. The method further includes executing a report generating microservice to generate a report for each planned network site of the plurality of network sites.
A system for providing converged utilities billing includes a customer relationship management (CRM) module configured to receive information from utilities providers for providing different types of utilities to a customer based on respective utilities plans, the CRM module comprising a database configured to store information associated with the customer; a product catalogue configured to store plan information regarding at least one utilities plan in association with each of the utilities providers; a data collection module configured to receive raw data from a plurality of Internet of Things (IoT) sensors and to process the raw data to form processed data; and a utilities rating and billing module configured to receive the processed data and the information associated with the customer, and to generate a single invoice for the customer based on the received processed data and on the received information.
A system for implementing an open cloud (O-Cloud) optimization policy by an application hosted in a near real-time radio access network Intelligent Controller (nRT-RIC) of a telecommunications network. The system includes a memory storing instructions; and at least one processor configured to implement the nRT-RIC within an open radio access network (O-RAN) architecture, the at least one processor configured to execute the instructions to: receive the O-Cloud optimization policy from a non-real-time radio access network Intelligent Controller (NRT-RIC) within a Service Management and Orchestration (SMO) framework of the telecommunications network; control to implement the O-Cloud optimization policy in the O-Cloud computing environment within the O-RAN.
A system for implementing a reconfiguration of one or more open cloud (O-Cloud) nodes within a O-Cloud infrastructure of a telecommunications network. The system includes a memory storing instructions; and a processor configured to execute the instructions to: obtain, by a federated O-Cloud orchestration and management (FOCOM) within the service management orchestration (SMO) framework, a request to reconfigure a O-Cloud node hosting at least one network function; send, by the FOCOM, a reconfiguration request for the O-Cloud node to the O-Cloud infrastructure via an O2 interface to an infrastructure management services (IMS); receive, by the IMS, the reconfiguration request for the O-Cloud node via the O2 interface, and control to implement the reconfiguration of the O-Cloud node; and upon implementation of the reconfiguration, send, by the IMS, a confirmation of the reconfiguration implementation to the FOCOM within SMO via the O2 interface.
A method includes receiving a request to change a deployable state of an open radio access network (O-RAN) cloud (O-Cloud) node, changing the deployable state of the O-Cloud node in response to receiving the request, and transmitting an indication that the deployable state of the O-Cloud node has been modified in response to changing the deployable state.
Capacity breaches are forecast in a mobile network. A Key Performance Indicators (KPI) database is accessed to obtain KPI data associated capacity of cells in a mobile network. Based on the KPI data, critical cells and non-critical cells are identified, wherein the critical cells exhibit high utilization affecting performance, and the non-critical cells do not exhibit high utilization. For the non-critical cells, a prediction model is applied to identify at least one predetermined forecast time window associated with capacity issues associated with at least one of the non-critical cells. Based on applying the prediction model, a report is generated identifying actions to execute to address capacity issues. An action from the report is executed to configure the mobile network to address the capacity issues of the critical cells, and/or capacity issues of the non-critical cells having forecasted capacity issues within one of the predetermined forecast time windows.
G08B 21/00 - Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
H04W 28/02 - Traffic management, e.g. flow control or congestion control
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
21.
METHOD AND APPARATUS FOR SUPPORT SYSTEM AUTOMATION WORKFLOW
A method performed by at least one processor in user equipment (UE) includes displaying a presentation user interface received from a server, the presentation interface including (i) a symbol display that includes one or more symbols, and (ii) a working area. The method further includes selecting a first symbol from the symbol display and moving the first symbol to the working area. The method further includes selecting a second symbol from the symbol display and moving the second symbol to the working area. The method further includes connecting, in the working area, the first symbol to the second symbol forming a workflow topology. The method further includes transmitting the workflow topology to the server.
A method performed by at least one processor includes detecting an onboarding of an application. The method further includes determining one or more application properties of the application in response to the detecting. The method further includes generating a protection program based on the one or more application properties. The method further includes deploying the protection program. The protection program provides a mitigation action in response to a detection of an attack on the application.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
A system for bulk updating resource data of parameters included in a view is provided. The system includes at least one processor configured to: receive a user request to bulk import data in a file including rows of the data, each row corresponding to a different instance of the view; make an import data API call to bulk import the data into one or more tables to which the data of the parameters is to be saved; make a save data API call to update existing resource data of the parameters, stored in the one or more tables, with the data included in the file; and update, in the one or more tables, the existing resource data of the parameters for the plurality of instances with the data included in the file, wherein the import data save data APIs are generic across a plurality of views and tables.
A computer-implemented method of distributing traffic includes distributing, to a first distributed unit (DU), traffic via a first path, receiving, from the first DU, an indication generated by a first dry contact alarm of the first DU that a state has changed in the first DU, switching, by an optical switch, the traffic from the first path to a second path based on the indication from the first DU, and distributing, to a second DU, the traffic via the second path.
H04B 10/038 - Arrangements for fault recovery using bypasses
H04B 10/80 - Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups , e.g. optical power feeding or optical transmission through water
A system for saving history information of input data to parameters included in a view is provided. The system includes a processor configured to: output an instance of the view; obtain pre-stored view details for the view, including identifiers of the parameters and tables to which input data of the parameters included are to be stored; make a generic API call to save current input data of a parameter to a table, wherein an input to the API call includes the current input data and old data of the parameter; based on the current input data and the old data being different, store the current input data in the table, create history information of the current input data and store the history information in a history table.
An apparatus for performing walk testing of radio network performance is provided. The apparatus includes at least one processor configured to execute to instructions to: based on a first user input to a first location on an area map displayed by the application, determine first coordinates of the first location on the area map and capture RF data of a start point of interest; automatically capture RF data of at least one secondary point of interest; based on a second user input to a second location on the displayed area map, determine second coordinates of the second location and capture RF data of a stop point of interest; determine a number and coordinates of secondary points of interest to be displayed based on a number of automatically captured RF data samples; and allocate the automatically captured RF data samples to the secondary points of interest to be displayed.
This disclosure provides methods, apparatuses, systems, and computer-readable mediums for a unified plug-in micro-service access control for role-based authorization and tenant-based authorization. The method may be executed by a processor and may include receiving an access token in a first format, wherein the access token includes tenant-specific information associated with a user and role-specific information associated with the user, the role-specific information associated with the user and the tenant-specific information associated with the user correspond to a respective shared resource and validating the access token. The method may further include generating a mapping of roles associated with the user based on a common authorization library and setting a security context for the user based on the mapping of roles associated with the user.
To configure an application platform for policy-based automated exception handling, a plurality of policies are established, each defining a requirement for applications. A plurality of exceptions are also established, each defining an expiration time and indicating at least one of the policies. A processor automatically generates a configuration file associating each of the exceptions with each policy indicated in the exception. The processor then automatically configures the application platform according to the configuration file. As a result of this configuration, an admission controller of the platform selectively tests an application designated for deployment to the application platform, based on a determination whether an exception assigned to the application is presently applicable to the policy. The exception is presently applicable based on an association of the exception with the policy in the configuration file, and a comparison of a present time with the exception's expiration time.
A system for bulk exporting resource data of parameters included in a view is provided. The system includes at least one processor configured to execute instructions to: receive a user request to bulk export resource data of the parameters for a plurality of instances of the view, based on the received user request, obtain view details for the view, wherein the view details comprise identifiers of the parameters included in the view and identifiers of one or more tables in which the resource data of the parameters are respectively stored, obtain, from the one or more tables and based on the view details, the resource data of the parameters for each of the plurality of instances of the view, and generate an export file including headers with the identifiers of the parameters, based on the obtained view details, and the obtained resource data of the parameters.
Architectures, and methods and systems for implementation thereof are disclosed. A system for implementing business support system (BSS) architecture comprises a memory; and a processor to execute instructions to implement the architecture, which comprises: a plurality of layers, and real-time event streams transferring data between components of the layers, which comprise: an engagement and core commerce management layer for providing a plurality of user interfaces respectively corresponding to a plurality of use cases; an event based automation and user data platform layer comprising real-time customer data and a plurality of automation workflows for executing the plurality of use cases based on real-time customer data; a core BSS components layer; an intelligent management layer for managing insights, model development and execution of batch models; and a cloud infrastructure management layer configured providing cloud functionality for a Software as a Solution (SaaS) implementation of the BSS architecture.
A method of screen sharing include receiving, by a first server device and from a user device, device information corresponding to the user device, generating, by the first server device, a device identifier (ID) based on the device information, receiving, by the first server device and from the user device, a request for a token, generating, by the first server device, a token based on the device ID, and sending, by the first server device, the token to the user device.
A method performed by at least one processor in a user equipment (UE) includes receiving one or more resources from a base station operating in a non-energy saving mode. The method further includes receiving, from the base station, control information including in a downlink control channel, the control information indicating whether the base station is operating in an energy saving mode. The method further includes determining, based on the control information, whether the base station is operating in the energy saving mode. The method further includes modifying the receiving of the one or more resources in response to a determination the base station is operating in the energy saving mode.
H04W 72/232 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal the control data signalling from the physical layer, e.g. DCI signalling
A method performed by at least one processor in a user equipment (UE) includes monitoring a downlink channel in accordance with one or more parameters associated with an on duration timer and an inactivity timer, the on duration timer specifying a time period in which the UE monitors the downlink channel, the inactivity timer specifying a time period in which the UE remains on after reception of downlink information in the downlink channel. The method includes determining whether a predetermined condition for modifying the monitoring of the downlink channel is satisfied. The method further includes, in response to determining the predetermined condition is satisfied, modifying the monitoring of the downlink channel such that power consumption of the UE is reduced.
Pole management is described for installation of network elements based on latitude and longitude values. Pole data having latitude and longitude values is obtained from a plurality of sources. The pole data from the plurality of sources is stored in a central pole database. Poles associated with at least a portion of the pole data is presented on a map in a graphical user interface based at least on the latitude and longitude values. A first pole is selected on the map for consideration for installing a network element for providing wireless services. A geographic boundary is presented on the map relative to the first pole, the geographic boundary encompassing candidate poles. A pole is selected from the candidate poles within the geographic boundary to install the network element to provide the wireless services.
A method of providing a customized layout in an integrated presentation system. The method includes, outputting a list including a plurality of components in a first region of a layout builder screen, each of the plurality of components corresponding to one of a plurality of applications, based on receiving a component selection input including one or more components, among the plurality of components, from the list, displaying the one or more components in one or more areas in a second region of the layout builder screen, creating the customized layout based on the one or more components in the one or more areas in the second region of the layout builder screen and mapping the customized layout with one or more roles, among a plurality of roles associated with a user of the integrated presentation system.
A system includes a processor, and a storage medium storing executable instructions. The executable instructions, when executed, cause the processor to visually present a first input area for receiving user input of a workflow transition setting for a workflow. The workflow includes a plurality of elements arranged in a sequence. Based on the workflow transition setting, the processor is caused to visually present a workflow transition input area for receiving user input of a transition, among the plurality of elements of the workflow, from a current element to a subsequent element in the sequence. In response to the workflow transition setting having a first value, the workflow transition input area is visually presented in a first format. In response to the workflow transition setting having a second value different from the first value, the workflow transition input area is visually presented in a second format distinctive from the first format.
A method performed by at least one processor of a network node operating in a wireless communication network includes receiving data associated with a plurality of users. The method further includes performing, by a discrete Fourier transform (DFT) coder, a DFT transformation on the data associated with the plurality of users. The method further includes performing, on the output of the DFT coder by a subcarrier mapper, subcarrier mapping that maps the output of the DFT coder to a set of subcarriers. The method further includes performing an inverse DFT (IDFT) on the output of the subcarrier mapper. The method further includes transmitting, over the wireless communication network, the output of the IDFT as a DFT spread optical frequency division multiplexing (DFT-s-OFDM) signal.
A method includes receiving a request to generate an application retrieving a low-code format, generating a low-code package based on the low-code format, and generating the application based on the low-code package. The low-code format is a cross-platform format supported by different application building platforms, and is constructed based on a human-readable universal support format.
A system for storing input data to parameters included in a view using a generic save data API is provided. The system includes at least one processor configured to execute instructions to: make a save data API call for saving the input data to a plurality of tables, wherein an input of the save data API call comprises identifiers of the plurality of tables and the parameters, and the input data; obtain information of a second application from resource information pre-registered in the first application, the resource information mapping applications to tables respectively associated with the applications; send, based on the obtained information of the second application, a request to the second application to store first input data, from among the input data, to at least one table associated with the second application; and store, by the second application, the first input data to the at least one table.
A device and method for new site impact analysis for network improvement. Key Performance Indicator (KPI) data is from a KPI database. A new site impact analysis graphical user interface (GUI) for analyzing an impact of a new site to the network is presented on a display device. A report GUI is presented on the display device for making a selection for generating a report including data associated with the impact of the new site. Based on the KPI data, the report is generated according to the selection made using the report GUI and displaying the report on the display device. At least one of a cluster of neighbor cells and the new site are configured to improve performance of the network based on the generated report. After configuring the at least one of the cluster of neighbor cells and the new site, the new site impact analysis GUI is used to bring the new site on-air.
A method includes receiving a coverage hole mitigation work order (CHMWO) created by a project work order (PWO) administrator; receiving assignment of the CHMWO from the PWO administrator to a PWO requester that is included in a geographic location of the CHMWO; receiving coverage hole optimization for the CHMWO from the PWO requester; and closing the CHMWO in response to the coverage hole optimization being validated.
In order to provide automated configuration of a first computing device intended for deployment and installation as a node of a selected role in a server cluster, a processor acquires a hardware description of the first computing device internally stored by the first computing device. Following validation of the hardware description according to hardware of a second computing device previously configured as a node of the selected role in the server cluster, the processor configures the first computing device by installing an operating system image of the second computing device to the first computing device. The processor then registers the first computing device in the server cluster as a node having the selected role.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
G06F 15/177 - Initialisation or configuration control
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 15/00 - Digital computers in generalData processing equipment in general
A system and method of selecting a cryptography algorithm within a network. The method can include receiving network data from a one or more network interfaces or network elements; analyzing the network data to identify a cryptography algorithm from a plurality of cryptography algorithms; and identifying the cryptography algorithm from the plurality of cryptography algorithms based on at least one of the following parameters: network security level, network criticality, or energy efficiency. In addition, the step of analyzing the network data to identify the cryptography algorithm may further include receiving a plurality of identifiers associated with the network data, wherein the plurality of identifiers are each further associated with a degree of importance in connection with the network security level parameter.
H04L 9/16 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
A system and method provide for automated management of policies in an application platform. A plurality of policy groups are established, each according to a set of included policies and a set of assigned application groups, where each policy defines a requirement and an automated response, and each application group is defined according to a rule to determine whether an application is contained within. A configuration file for each policy group associates each assigned application group with each included policy. An automatic configuration, according to the configuration file for each of the policy groups, configures an admission controller of the application platform to selectively test an application contained within an application group and designated for deployment to the application platform, to determine whether it meets the requirement of each policy associated with the application group, and to selectively execute the automated response based on a failure to fulfill the requirement.
A method is performed by at least one processor for data validation in an electronic spreadsheet displayed in a user interface. The method includes receiving a selection of a set of data that includes a plurality of data cells arranged in at least one row and a plurality of data columns. The method further includes receiving a location in the electronic spreadsheet for insertion of the set of data. The method further includes, after receiving the location in the electronic spreadsheet, validating the set of data based on a master data configuration stored in one or more databases. The method further includes, after validating the set of data, displaying a message in the user interface indicating whether the validating the set of data is successful.
A system includes processing circuitry and a memory connected to the processing circuitry, wherein the memory is configured to store executable instructions that, when executed by the processing circuitry, facilitate performance of operations that include obtain one or more event messages from a data source, wherein each event message is generated by one or more state changes within a network operatively connected to the system; filter each event message based on one or more active event policies; enrich each event message, that is missing predetermined information, from an inventory; evaluate each event message to determine whether an action is to be performed based upon an active policy corresponding to an event message; and execute the action corresponding to the event message.
A method of auditing tracking area code (TAC) assignments includes obtaining one or more tracking area code (TAC) assignments for one or more new evolved Node B (eNB) sites added to a RAN network in a geographic area; verifying a TAC threshold, where the TAC threshold corresponds with a predetermined number of eNBs per TAC; in response a TAC being below the TAC threshold, assigning a TAC ID of a corresponding neighboring TAC to the TAC; and in response to the TAC being above the TAC threshold, splitting the TAC into two or more TACs.
H04W 60/00 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration
H04W 60/04 - Affiliation to network, e.g. registrationTerminating affiliation with the network, e.g. de-registration using triggered events
H04W 8/02 - Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]Transfer of mobility data, e.g. between HLR, VLR or external networks
A method includes receiving inputs that include geo-located data collected over a period for a plurality of cells in a radio access network; mapping the geo-located data to one or more polygons displayed through a GUI on a user interface, the interference polygons being layered above a display of a geo-location; determining a dataset of each cell included in each interference polygon displayed through the GUI; determining a total number of user samples included in each interference polygon; determining a number of user samples for each cell included in each interference polygon; in response to a first cell including less than or equal to a first threshold of the total number of user samples, determining whether the first cell is an over-shooter cell; and in response to the first cell including greater than the first threshold of the total number of user samples, determining whether the first cell is misaligned.
A method of a module management system includes configuring a module corresponding to a parent application, generating at least one permission corresponding to the module, generating a first role based on the at least one permission, and assigning the first role to a user such that the user is granted the at least one permission and is able to utilize the parent application.
In some embodiments, a method includes determining whether a network serving cell serving a building is highly utilized; and determining an amount of users of the network serving cell that are included in the building per twenty-four-hour period. In some embodiments, a capacity check for each corresponding band is performed where IISCs planning module identifies the serving cells, and whether the serving cells are high usage serving cells that require offloading of users/subscribers.
A system for fetching resource data of parameters included in a view using a generic get data application programming interface (API) is provided. The system includes at least one processor configured to execute instructions to: make, from a first application, a get data API call for fetching the resource data, wherein an input of the get data API call includes a view identifier; obtain, in response to the API call, view details for the view, wherein the view details include identifiers of the parameters included in the view and identifiers of one or more tables in which the parameters are respectively included; send a request to a second application for resource data of at least one parameter, among the parameters, stored in at least one table associated with the second application, from among the one or more tables; and receive and display, on the view, the requested resource data.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Embodiment herein provides a method for managing application logs by an system (100). The method includes detecting, by the system (100), event associated with application stored in the system (100) and creating, by the system (100), application log file while the event associated with the application is performed at the system (100). The application log file includes a URL used to call API associated with the application while the event is performed, a response received through the API associated with the application while the event is performed from an application server (1000) and a payload. The method also includes determining, by the system (100), that the event associated with the application is completed; and automatically uploading, by the system (100), the application log file and information associated with the system (100) to an application server (1000) corresponding to the application.
Embodiment herein provides a method for graphically configuring an API on form field to retrieve desired output from UI by an electronic device (100). The method includes displaying, by the electronic device (100), the UI including form fields to configure the API on the form fields and configuring, by the electronic device (100), the API to the form field by inputting building blocks using a graphical configuration field. The method includes mapping, by the electronic device (100), the form field to dependent form field based on the configured API and receiving, by the electronic device (100), attributes in the form field; determining, by the electronic device (100), attributes corresponding to the dependent form field by applying the API with the attributes received in the form field; automatically filling the dependent form fields based on the determined attributes corresponding to the dependent form fields and displaying the filled dependent form fields.
A method for bill management of a business to business (B2B) customer account including one or more billing accounts, performed by at least one processor, is provided. The method includes receiving information on a plurality of virtual accounts linked to a bank account of a service provider, assigning a billing account, of a customer of the service provider, to a virtual account among the plurality of virtual accounts, receiving a notification of a payment made via the virtual account, identifying the billing account, from among the one or more billing accounts, assigned to the virtual account, and crediting the identified billing account for the payment.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
55.
APPARATUS AND METHOD FOR PROVIDING CENTRALIZED POLICY MANAGEMENT IN TELECOMMUNICATIONS SYSTEM
A method, performed by a centralized policy engine within a Service Management and Orchestration (SMO) framework of a telecommunications network, of managing policies for optimizing the telecommunications network is provided. The method includes: receiving, by the centralized policy engine, at least one policy, the at least one policy including a policy created by an application hosted in a radio access network (RAN) Intelligent Controller (RIC); receiving, by the centralized policy engine, data of one or more network functions, the data including at least one of performance data and event data of the one or more network functions; evaluating the at least one policy based on the received data; and controlling to implement one or more of the at least one policy in at least a RAN, based on the evaluating.
H04L 41/5003 - Managing SLAInteraction between SLA and QoS
H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
A computer-implemented method includes receiving, from a user interface, base station configuration criteria including a nominal location, a coverage area, and a search area, uploading base station configuration parameters, identifying, based on the base station configuration criteria and parameters, a set of base station candidates included in the search area, ranking the set of base station candidates, outputting the ranked set of base station candidates to the user interface, and receiving a base station selection from the user interface.
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
H04L 41/122 - Discovery or management of network topologies of virtualised topologies e.g. software-defined networks [SDN] or network function virtualisation [NFV]
A method and system of ordering and provisioning telecommunications related services via a centralized platform. Here, the method and system can include receiving a first service order request from a user to purchase a telecommunications related service, allocating one or more service parameters with respect to first service order, and implementing the telecommunications related service for the user with respect to the received first service order request. The method and system can further include verifying the implementation of the telecommunications related service, tracking the allocation, implementation, or verification of the telecommunications related service, and closing the first service order request.
G06Q 30/06 - Buying, selling or leasing transactions
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
58.
SYSTEM, METHOD, AND COMPUTER PROGRAM FOR ENHANCING SOCIAL PLATFORM INFORMATION PROCESSING
A method, system, apparatus, and computer-readable medium for enhancing social platform information processing is provided. The method, performed by at least one processor, includes receiving a selection from a first user for selecting social platform information extracted from a social platform, wherein the first user makes the selection before a plurality of second users. The method further includes presenting a first GUI to the first user, based on the selection, wherein the first GUI is configured to receive input information to perform an action and receiving a lock instruction from the first user, via the first GUI, and locking information associated with the selection based on the lock instruction. The method may also include disabling use of the locked information from the plurality of second users for a pre-set time period, wherein the first user is permitted to use the locked information during the pre-set time period.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
59.
NETWORK VIEWPORT DATA FETCHING AND VISUALIZATION SYSTEM AND METHOD OF THE SAME
A method of network viewport data fetching includes receiving a request at a mobile device to launch a network visualization application; causing a GUI to display of a viewport corresponding to a first geographic area and over the first geographic area one or more shapes; determining a latitude and longitude of a first and a second endpoint; determining a distance of a diagonal; determining a midpoint of the diagonal; in response to a distance between the midpoint and either the first or second endpoint being less than or equal to a threshold distance, updating to a second geographic area; or in response to the distance between the midpoint and either the first or second endpoint being greater than the threshold distance, updating the display of the viewport corresponding to a third geographic area and updating the one or more shapes that display the indication of network coverage quality.
H04L 12/24 - Arrangements for maintenance or administration
G09G 5/02 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the way in which colour is displayed
60.
SYSTEM AND METHOD FOR PROVIDING USAGE OR BEHAVIOR BASED INSURANCE INFORMATION
A system, performed by at least one processor of a computing device, for providing usage or behavior based insurance information includes a provisioning module that communicates with SIM-based lol sensors to activate or deactivate the sensors; a data processing module that converts raw data received from the sensors into usable or readable information; a customer relationship management (CRM) database module in which user details and sensor data relating to the user are stored; an analytics module that receives information from the data processing module and determines accuracy of the received information; and a reporting module that receives the analyzed information from the analytics module and generates customized reports in real-time or near-real- time based on a request from an associated party and on the received information.
A system and method of determining one or more azimuths for identified cell site locations within a cellular network. The system and method can include receiving a list of one or more first cells with respect to a network and selecting from the list one or more first cells that are geographically oriented towards a second cell. In addition, the method can include arranging the selected one or more first cells based on their network congestion. Further, the method can include calculating a first azimuth between the second cell and at least one of the arranged one or more first cells, and determining that at least one of the one or more first cells is within a first predefined range of the first azimuth.
A system and method for identifying cell site locations within a cellular network. The method includes: receiving a list of one or more first cells with respect to a network, applying a first set of conditions with respect to the first cells; identifying the first cells that meet the first set of conditions, and placing the identified first cells within one or more first grids; designating one or more first network congestion severity identifiers to the first grids. The method can further include determining if a centroid of one or more grids within the first grids fall within a first pre-defined distance, creating one or more first tables or matrices based on the designated first network congestion severity identifiers with respect to the first grids, designating one or more second network congestion severity identifiers to the first tables or matrices.
A method and system for identifying radio transmission links for one or more cells within a network. The method includes receiving location data with respect to a cell within the network, determining if a first line of sight is substantially clear between the cell and a first nearest radio transmitter to the cell, upon determining that the first line of sight is substantially clear between the cell and the first nearest radio transmitter to the cell, determining if the first nearest radio transmitter is a first transmission medium location, and upon determining that the first nearest radio transmitter is the first transmission medium location, creating a radio transmission link between the cell and the first nearest radio transmitter to the cell.
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
64.
METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT WITH GEOFENCING FEATURES
A mobile terminal receives a task to be performed using the mobile terminal, the task associated with a site. The mobile terminal determines whether the mobile terminal is within a predetermined area containing the site. In response to determining that the mobile terminal is not within the predetermined area containing the site, the mobile terminal disables the task from being performed using the mobile terminal. In response to determining that the mobile terminal is within the predetermined area containing the site, the mobile terminal enables the task to be performed using the mobile terminal.
A system and a method for service gap identification is disclosed. The method comprises retrieving data on a network coverage area, dividing the network coverage area into a plurality of data sets, determining a first number of data sets of the plurality of data sets having a first number of poor coverage samples based on the retrieved data, and generating a service gap polygon based on the determined number of data sets having the first number of poor coverage samples.
A method, performed by at least one processor of a computing device, for recommending an event, the method including determining a frequency of execution of the event by a user among a plurality of users; determining an inverse user frequency of execution of the event based on the plurality of users who have executed the event; generating a recommendation factor by modifying the frequency of execution of the event by the user based on the inverse user frequency of execution of the event; and outputting a recommendation for the event based on the recommendation factor.
A centralized budget dashboard and report system (CBDRS) includes a memory having non-transitory instructions stored therein; and processing circuitry coupled to the memory, and being configured to execute the non-transitory instructions, thereby causing the processing circuitry to cause a graphical user interface (GUI) to be output by a user interface (UI), the GUI including a first user input field configured to receive a first user input identifying an authorized user to log in to the CBDRS; in response to a successful log in to the CBDRS, obtain master data from the memory, the master data being associated with the authorized user; and update the GUI output by the UI, the updated GUI including a budget dashboard configured to display budget data associated with the authorized user.
Provided are a method, system, and an Service Management and Orchestration Framework (SMO) and O-Cloud to drain one or more O-Cloud Nodes based on recommendations from an rApp or manually by an O-Cloud Maintainer via the SMO. In particular, the method may include: receiving, by a SMO function, a first request or recommendation to drain at least one O-Cloud Node, the first request or recommendation being received from an rApp of a Non-Real-Time (Non-RT) RAN Intelligent Controller (RIC) or from an O-Cloud Maintainer; transmitting, by the SMO function to an Infrastructure Management Services (IMS) and/or Deployment Management Services (DMS) via an O2 interface, a second request to drain the at least one O-Cloud Node based on the received first request or recommendation; and receiving, from the IMS/DMS, a first notification as to whether the at least one O-Cloud Node has been drained, wherein the SMO function is at least one of a Federated O-Cloud Orchestration and Management (FOCOM) and Network Function Orchestration (NFO).
Provided herein are methods, apparatuses, systems, and computer-readable storage media for generating a report by a workflow management service (WMS) of a business intelligence (BI) platform. In an embodiment, a method includes determining, based on a workflow of the BI platform, that the report is to be generated. The method further includes obtaining a report connector configuration corresponding to the report. The method further includes identifying a report template corresponding to the report connector configuration. The method further includes customizing the report template using the report connector configuration, resulting in a customized report template. The method further includes instructing a first service to generate the report using the customized report template. The method further includes reporting a progress status of the report based on request response information received from the first service.
A method for pre-processing information, performed by at least one processor, is provided. The method includes retrieving information from a social platform based on predetermined keywords defined by a system user, obtaining a blacklist of user accounts, the blacklist including user account information and a blacklist reason for adding the user account information to the blacklist; pre-processing the retrieved information, based on the blacklist, determining a sentiment value associated with the pre-processed information and assigning the pre-processed information to a sentiment category based on the sentiment value, and displaying a first graphical user interface (GUI) for receiving user input information to generate a ticket for the pre-processed information. A list of the retrieved information may be displayed, wherein the user accounts included in the blacklist are distinguishably displayed on the GUI.
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 51/063 - Content adaptation, e.g. replacement of unsuitable content
H04L 51/07 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
71.
APPARATUS AND METHOD FOR DEFINING AREA OF AUTHORITY FOR USER ACCESS RIGHTS
A method for setting access rights to project data in an application by defining an area of authority for a user, includes: determining a plurality of fields of data for a project in the application; determining a topology of one or more fields, from among the determined plurality of fields, for which the area of authority is to be settable; setting an area of authority for a registered user of the application, based on a field of the determined topology; and preventing access by the registered user to data for which a value of the field does not comply with the set area of authority.
A system for collecting discarded alarm includes a non-transitory computer readable medium configured to store instructions thereon. The system further includes a processor connected to the non-transitory computer readable medium. The processor is configured to execute the instructions for receiving alarm data from a device within a telecommunication network. The processor is further configured to execute the instructions for determining whether the alarm data is missing identifying information. The processor is further configured to execute the instructions for subjecting the alarm data to suppression in response to a determination that the alarm data is missing at least one piece of identifying information. The processor is further configured to execute the instructions for generating instructions for addressing an alarm in response to a determination that the alarm data includes all identifying information.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0604 - Management of faults, events, alarms or notifications using filtering, e.g. reduction of information by using priority, element types, position or time
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/06 - Management of faults, events, alarms or notifications
73.
SYSTEM AND METHOD FOR GENERATING CUSTOM FIELDS IN A DATABASE ENTITY
A method, performed by at least one processor, for adding user-defined custom fields to a user interface (UI) view of a previously-developed application, includes: outputting a first screen for creating or editing a UI view of the previously-developed application; receiving a user selection to add a new user input field to the UI view; and storing one or more parameters of the new user input field in association with a reserved field of a reserved database of the previously-developed application, such that values input to the new user input field during execution of the user interface view are saved to the reserved field. The previously-developed application includes a plurality of predefined user input fields predefined during application development, a corresponding plurality of predefined database fields mapped thereto, and the reserved database comprising a predetermined number of reserved fields for mapping to new user input fields added post-development.
G06F 8/71 - Version control Configuration management
G06F 16/21 - Design, administration or maintenance of databases
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
A method, system, apparatus, and computer-readable medium for trading telecommunications related services on a centralized marketplace network. The method includes presenting a first telecommunications related service to a first user, wherein the first telecommunications related service is based on a configuration profile defined by a second user. The method further includes receiving a selection for the first telecommunications related service by the first user, and receiving a purchase order request from the first user with respect to the selected first telecommunications related service. The method may also include receiving input from the first user with respect to customizing or configuring the first telecommunications related service, receiving input from the first user to add the customized or configured first telecommunications related service to the purchase order request, and applying a price modification or reduction to the first telecommunications related service or the purchase order request.
A method for cloud-native centralized fault monitoring in a telecommunication network, the method performed by a processor and comprising receiving one or more raw fault messages associated with one or more respective network devices, wherein the one or more raw fault messages are received using one or more network protocols associated with the one or more respective network devices; identifying fault information from the one or more raw fault messages; enriching the fault information based on continuously processing the fault information and additional contextual information; and storing the enriched fault information in a plurality of databases, wherein a first subset of the enriched fault information is stored in a first database and a second subset of the enriched fault information is stored in a second database.
This disclosure provides methods, apparatuses, and computer-readable mediums for creating or editing a site drawing. In an aspect, a method comprises displaying, on a display of a device, a user interface configured for one or more of creating, accessing, and editing Site Details for a Site; receiving a selection from a user for one from among an elevation and a floor plan; displaying a canvas and one or more components on the user interface; receiving one or more inputs from the user corresponding to the addition of one or more components to the canvas at one or more coordinates; and storing the one or more components and their coordinates in JavaScript Object Notation (JSON).
G06F 30/13 - Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06T 19/20 - Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts
77.
SYSTEM AND METHOD FOR AUTOMATIC TRANSFER OF GLOBAL VARIABLES BETWEEN APPLICATION SCREENS
A method, performed by at least one processor of a computing device, for automatically transferring information from one screen to another, includes: outputting a first screen of a first application opened on a platform; outputting a second screen of a second application opened on the platform, while the first screen is output; determining whether a global variable is included for a user input field of the second screen; based on determining that the global variable is included for the user input field of the second screen, obtaining a value of the global variable from the first screen; and including the obtained value of the global variable in the user input field, of the outputted second screen, corresponding to the global variable.
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
78.
A NETWORK VISUALIZATION SYSTEM AND METHOD OF THE SAME
A method of network visualization that includes receiving key performance indicator (KPI) data inputs collected for nodes included in a Radio Access Network (RAN); filtering the KPI data to remove unreliable KPI data inputs; determining whether the KPI data inputs for a predetermined geographic area exceeds a threshold sample count; causing a graphical user interface (GUI) to be output by a user interface (UI), the GUI including a display of a shape, corresponding to the predetermined geographic area, layered over a map, where the shape represents an indication of network coverage quality, based on the filtered KPI data inputs, for a location corresponding to the shape corresponding to the predetermined geographic area.
A system and method of generating a dynamic self-referential checklist includes: based on a first user input, controlling to output a graphical user interface (GUI) for generating the checklist; receiving a second user input, for creating a section of at least one group including at least one variable field; receiving a third user input, for creating the at least one group in the section; receiving a fourth user input, for creating the at least one variable field; receiving a fifth user input, for creating an additional variable field; receiving a sixth user input, for defining a precondition in relation to a variable field of the at least one variable field; receiving a seventh user input, for selecting that the checklist will not display the additional variable field unless the precondition is satisfied by, and generating the checklist.
A method and a system for personalized customer dunning, performed by at least one processor. The method includes monitoring a status of a plurality of invoices; obtaining a customer score for a customer corresponding to an invoice of the plurality of invoices, based on the status of the invoice, and wherein the customer score is previously determined based on customer data; receiving customer-specific data via a real time data ingestion pipeline from one or more customer data sources; generating a dunning score for the customer based on the received customer-specific data and the customer score; determining one or more dunning actions, based on the dunning score; performing the one or more dunning actions; and notifying the customer of the performed one or more dunning actions via a first engagement channel.
G07F 19/00 - Complete banking systemsCoded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
81.
METHODS AND SYSTEMS FOR COVERAGE AREA DEFICIENCY VISUALIZATIONS
This disclosure provides methods, apparatuses, and computer-readable mediums for visualizing coverage area deficiencies. In an aspect, a method comprises retrieving, from a data storage, network performance data from a plurality of user wireless mobile devices; filtering the network performance data to narrow the dataset to data samples with accurate locations and dates; counting the number of data samples indicating a coverage deficiency in an area; comparing the number of data samples indicating the coverage deficiency in the area with a predefined threshold; rendering a map including the area; and displaying on the map a visual indicator of the coverage deficiency based on the number of data samples indicating the coverage deficiency in the area exceeding the predefined threshold.
An apparatus includes a processor and a memory having non-transitory instructions stored thereon that, when executed by the processor, cause the apparatus to cause a graphic user interface ("GUf') to be output by a display. The GUI includes a checklist configuration view to display a condition menu, the condition menu includes a group of variables, wherein the group of variables are interdependent. The GUI also includes a checklist execution view to display the workflow, the workflow includes a group designation having a task, a parameter, and a tillable data field to receive the data input, wherein the condition is applied to the workflow in response to the data input, which is mapped to the value, being entered into the fillable data field.
This disclosure provides methods, apparatuses, and computer-readable mediums for annotating an image. In an aspect, a method comprises retrieving an input image; displaying a canvas to a user containing said input image and a plurality of Shapes, wherein for each Shape in said plurality of Shapes a Shape class is defined which has its own logic to draw, edit and move the Shape; receiving one or more inputs corresponding to the addition of one or more Shapes at one or more coordinates; storing the one or more Shapes and their coordinates in JavaScript Object Notation (JSON) on a Shape list; and traversing the Shape list to draw on the canvas all stored Shapes on the input image.
A computer-implemented method includes receiving an application manifest file from an application; mapping application manifest file parameters from the application manifest file to an IP manager; determining services available based on the mapped application manifest file parameters; and deploying the application on one or more virtual machines (VMs) or one or more containers.
A budget approval workflow configuration system (BAWCS) includes a graphical user interface (GUI) to be output by a user interface (UI), the GUI including a first user input field configured to receive a first user input identifying a budget administrator; a second user input field configured to receive a second user input identifying a first reviewer to perform first reviewer responsibilities; a third user input field configured to receive a third user input identifying a workflow action based on a first reviewer approval or rejection of a budget; a fourth user input field configured to receive a fourth user input identifying a workflow location for the budget based on the first reviewer approval or rejection of the budget; and a fifth user input field configured to receive a fifth user input identifying email addresses to provide email notification for a corresponding operation within a budget approval process.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
A system for conditional validation in forms includes at least one processor, and at least one memory coupled to the at least one processor and configured to store executable instructions. The executable instructions, when executed by the at least one processor, cause the at least one processor to visually present a plurality of parameters for defining at least one condition for controlling a property of a first field of a form in a configuration mode, generate a condition corresponding to a set of user inputs for the plurality of parameters, and store the generated condition with the form. The condition is based on a second field different from the first field.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 7/10 - Selecting, i.e. obtaining data of one kind from those record carriers which are identifiable by data of a second kind from a mass of ordered or randomly-distributed record carriers
A system for conditional validation in forms includes at least one processor, and at least one memory coupled to the at least one processor and configured to store executable instructions. The executable instructions, when executed by the at least one processor, cause the at least one processor to visually present an expression input area for accepting user input of at least one expression defining at least one condition for controlling a property of a first field of a form in a configuration mode, generate the at least one condition corresponding to the at least one expression, and store the generated at least one condition with the form. The at least one expression comprises at least one of a logic expression or a mathematic expression.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 7/10 - Selecting, i.e. obtaining data of one kind from those record carriers which are identifiable by data of a second kind from a mass of ordered or randomly-distributed record carriers
A method executed by processing circuitry includes causing a first graphical user interface (GUI) to be output by a first user interface (UI) includes a first user input field configured to receive a first user input identifying a person-in-charge (PIC) to log in to a centralized budget approval system (CBAS); in response to a successful log into the CBAS, obtaining master data from a non-transitory computer readable medium, the master data being associated with the PIC; determining, based on the master data, a region associated with the PIC; receiving a request from the PIC to create a departmental budget application associated with the determined region; determining a department budget associated with the departmental budget application; and obtaining information of each departmental budget application associated with the department.
A centralized master data management system (CMDMS) includes a memory having instructions; and processing circuitry coupled to the memory, and being configured to execute the instructions, causing the processing circuitry to cause a graphical user interface (GUI) to be output by a user interface (UI), the GUI includes a first user input field configured to receive a first user input identifying an administrator to log in to the CMDMS; in response to a successful log in to the CMDMS, obtain master data from the memory, the master data being associated with the administrator; update the GUI to include a list of region configuration profiles (RCPs) managed by the administrator; and one or more functional elements, wherein each functional element trigger a respective action in response to being selected by the administrator; and authorize a user, within a predefined region, to be able to create and submit budget applications.
A system for providing real-time services and functions in an Open Radio Access Network (O-RAN) architecture, includes: a first physical configured to execute instructions to implement an O-RAN centralized unit (O-CU); at least one second physical node comprising configured to execute instructions to implement: an O-RAN distributed unit (O-DU), and a real-time (RT) RAN Intelligent Controller (RIC) connected to the O-DU via an interface terminating at the RT RIC and having a latency of less than 10 ms; an O-RAN radio unit (O-RU); at least one third physical node configured to execute instructions to implement a non-real-time (Non-RT) RIC; and at least one fourth physical node configured to execute instructions to implement a near-real-time (Near-RT) RIC wherein the RT RIC is a software platform configured to host applications for controlling at least the O-DU over a real-time control loop with a latency of less than 10 ms.
A method for disoriented cell configuration includes determining a first number of misaligned sectors in a first set of disoriented cells of a first set of cells, generating data of a second set of disoriented cells based on the first set of disoriented cells or the first number of misaligned sectors for in the first set of disoriented cells, determining a first set of cross-feeder cells, a first set of sector swap cells or a first set of cyclic swap cells, and changing a configuration of an antenna of a disoriented cell of the second set of disoriented cells. Changing the configuration of the antenna includes changing a connection of a set of cables of an antenna of a first cross-feeder cell, or changing a deployed azimuth of an antenna of a sector in the first set of sector swap cells or cyclic swap cells.
An Open Radio Access Network (O-RAN) may include an O-RAN Centralized Unit (O-CU), at least one O-RAN Distributed Unit (O-DU), at least O-RAN Radio Unit (O-RU), and a Real-Time (RT) RAN Intelligent Controller (RIC) coupled to the at least O-DU and configured to host at least one application for controlling the at least one O- DU over a real-time control loop with a latency of less than 10 ms. The O-RAN wireless system may include a Non-RT (Non-RT) RIC configured to manage resources and events having a latency of 1 second or greater, and may include a Near-RT RIC configured to manage resources and events having a latency of 10 ms to 1 second. In addition, O-RAN may include a Service Management and Orchestrator (SMO) platform, where the RT RIC is connected to at least one of the SMO, the Non-RT RIC, the Near-RT RIC, RAN network elements and the O-RU.
A system for identifying correlated alarms includes a non-transitory computer readable medium configured to store instructions thereon; and a processor connected to the non-transitory computer readable medium. The processor is configured to execute the instructions for identifying a parent alarm from an alarm log based a plurality of rules, wherein the alarm log comprises a plurality of alarm, and the plurality of alarms contains the identified parent alarm. The processor is configured to execute the instructions for determining whether the plurality of alarms includes a child alarm associated with the identified parent alarm based on the plurality of rules. The processor is configured to execute the instructions for generating an incident in response to a determination that the plurality of alarms includes the child alarm, wherein the incident includes instructions for resolving the parent alarm.
G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
H04L 41/069 - Management of faults, events, alarms or notifications using logs of notificationsPost-processing of notifications
A method for disoriented cell configuration includes collecting user data of a first set of cells, determining a disoriented cell of the first set of cells based on the user data, and changing a configuration of an antenna of the disoriented cell. Changing the configuration of the antenna of the disoriented cell includes changing the deployed azimuth of the antenna to be equal to the planned azimuth of the antenna. The user data includes received signal strength of a first set of users, geolocation data of the first set of users, or a cell identifier of a corresponding cell of the first set of cells. The disoriented cell of the first set of cells includes a node with an antenna with a deployed azimuth. The disoriented cell of the first set of cells corresponds to a filtered first set of qualified geolocation data of a filtered second set of users.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
Centralized privileged access is managed by receiving a request for privileged access to a device connected to a network, the request including a device identifier and a first user identifier, determining a role risk associated with the request based on a requested privilege level included in the request, determining an impact risk associated with the request based on potentially impacted devices other than the device, determining a risk level associated with the request based on the role risk and the impact risk, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.
A method includes determining a set of test locations based on a network parameter; and determining a subset of the test locations that do not have a point test equipment. The method includes determining a drive test route to cover an area serviced by each the subset of the test locations. The method includes receiving a notification from a drive test equipment in response to the drive test equipment arriving at a first test location on the drive test route. The method includes sending test parameters to the drive test equipment; and receiving a drive test result from the drive test equipment. The method includes determining whether the drive test results meet a drive test specification. The method includes requesting the drive test equipment to relocate to a second test location in response to a determination that the drive test results meet the drive test specification.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
A system for identifying recurring alarms includes a non-transitory computer readable medium configured to store instructions; and a processor. The processor is configured to execute the instructions for correlating an alarm log with a rule, the alarm log includes information related to a plurality of faults. The processor is configured to execute the instructions for determining whether any of the plurality of faults satisfy criteria of the rule; and identifying an earliest fault of the plurality of faults that satisfies all of the criteria of the rule in response to a determination that at least one fault of the plurality of faults satisfies all of the criteria of the rule. The processor is configured to execute the instructions for comparing the earliest fault with an incident log; and generating an incident in response to a determination that the earliest fault does not match any open entry in the incident log.
Privileged access is managed by receiving a request for privileged access to a device connected to a network, determining a risk level associated with the request based on a duration of the privileged access, a device identifier, a first user identifier, and a requested privilege level included in the request, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.
This disclosure provides methods, apparatuses, and computer-readable mediums for rendering a dynamic user interface (UI). In an aspect, a method comprises obtaining a plurality of resources of an entity, and presenting the plurality of resources to a user. The method further comprises receiving, from the user, at least one request to include one or more resources of the plurality of resources in a UI view. The method further comprises creating, based on the at least one request from the user, a UI configuration of the UI view. The UI configuration comprises view information, in a JavaScript Object Notation (JSON) format, of the one or more resources of the plurality of resources to be included in the UI view. The method further comprises generating an identifier for the UI view, associating the identifier of the UI view with the entity, and storing the UI configuration in a database.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computerOutput arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
100.
SECTOR LOAD IMBALANCE IDENTIFICATION SYSTEM, METHOD, DEVICE, AND PROGRAM
A method of identifying sector load imbalance. The method includes identifying a first set of imbalanced cells in a sector based on a first condition, wherein the first condition is based on network usage of the cells in the sector. The method further includes identifying a second set of imbalanced cells from the first set of imbalanced cells based on a second condition, wherein the second condition is based on one or more physical parameters associated with each of the first set of imbalanced cells. The method further includes displaying visualizations associated with the second set of imbalanced cells, the visualizations indicating miscalculations of the one or more physical parameters.