31st week of 2019 patent applcation highlights part 54 |
Patent application number | Title | Published |
20190236158 | DATABASES AND FILE MANAGEMENT SYSTEMS AND METHODS FOR PERFORMING A LIVE UPDATE OF A GRAPHICAL USER INTERFACE TO BOOST ONE OR MORE ITEMS - Databases and file management systems and methods including one or more processors and one or more non-transitory computer-readable media computing instructions are configured to run on the one or more processors and perform acts of receiving a search query from a user electronic device, facilitating a search of a database comprising item records for multiple items of an online retailer related to the search query, receiving search results from the search of the database, facilitating inserting, according to a set of rules, the first item into the predetermined range of the ranked order of the set of items of the search results, and coordinating displaying the search results on a graphical user interface of the user electronic device with the first item listed in the predetermined range of the ranked order of the set of items of the search results. Additional embodiments are disclosed herein. | 2019-08-01 |
20190236159 | KNOWLEDGE POWER DETECTOR - Matching knowledge providers with knowledge consumers. Information corresponding to knowledge providers and information corresponding to knowledge consumers is managed in a database. Messages from remote electronic devices corresponding to the knowledge providers and the knowledge consumers are received. Subsequent information corresponding to the knowledge providers and the knowledge consumers is gathered from a plurality of remote platforms. Knowledge power agents configured to operate through the plurality of interfaces match knowledge providers with knowledge consumers based, at least in part, on shared interests, location and availability. In response to a match between at least one knowledge provider and at least one knowledge consumer, communicating via at least one of the plurality of interfaces information about the match to at least one knowledge consumer and at least one knowledge provider for which the match has been made. | 2019-08-01 |
20190236160 | METHODS AND APPARATUS FOR ANALYZING A LIVE STREAM OF LOG ENTRIES TO DETECT PATTERNS - A method is implemented by a computing device to analyze a live stream of log entries to determine new patterns and changes in a number of occurrences of previously identified patterns. The method includes receiving a log entry in a live stream of log entries, determining whether the log entry fits a baseline pattern from one or more previously saved baseline patterns, adding to a count of occurrences for a baseline pattern if the log entry fits that baseline pattern, creating a new baseline pattern for the log entry if the log entry does not fit any of the one or more previously saved baseline patterns, saving the new baseline pattern, generating a snapshot of a pattern hierarchy based on the baseline patterns, comparing the new snapshot to a previously saved snapshot of a pattern hierarchy, and causing a report to be displayed based on a result of the comparing. | 2019-08-01 |
20190236161 | USING RELATIVE GENERATION NUMBERS TO DEDUPLICATE FILE SYSTEM EVENTS - Implementations are provided herein for using relative generation numbers for deduplicating kernel events modification events. The process can identify multiple modification events that take place on the same inode within a configurable relative amount of time and deduplicate the events against one another. A hash table can be used to store a global list of events associated with inodes, and thus only the hash table need be deduplicated. Filter buffer(s) setup when an Server Message Block (“SMB”) client requests a change notifications on a file and/or directory can then use the data from the hash table(s) to notify clients of change notify events. | 2019-08-01 |
20190236162 | MULTIVARIATE MEMORY VECTORIZATION TECHNIQUE TO FACILITATE INTELLIGENT CACHING IN TIME-SERIES DATABASES - The disclosed embodiments relate to a system that caches time-series data in a time-series database system. During operation, the system receives the time-series data, wherein the time-series data comprises a series of observations obtained from sensor readings for each signal in a set of signals. Next, the system performs a multivariate memory vectorization (MMV) operation on the time-series data, which selects a subset of observations in the time-series data that represents an underlying structure of the time-series data for individual and multivariate signals that comprise the time-series data. The system then performs a geometric compression aging (GAC) operation on the selected subset of time-series data. While subsequently processing a query involving the time-series data, the system: caches the selected subset of the time-series data in an in-memory database cache in the time-series database system; and accesses the selected subset of the time-series data from the in-memory database cache. | 2019-08-01 |
20190236163 | TECHNIQUES FOR SELECTIVELY DEACTIVATING STORAGE DEDUPLICATION - Techniques for effectively measuring the amount of space saved due to deduplication and selectively turning deduplication off for a filesystem if the savings are too low are provided. The techniques include maintaining both a lower bound count and an upper bound count for block savings due exclusively to deduplication rather than due to snapshots and using an average of the lower and upper bounds to estimate the actual savings due to deduplication in order decide whether to continue operating deduplication or not. | 2019-08-01 |
20190236164 | Creating and Patching Binary Software Homes Using Content Addressable Storage - Techniques are disclosed herein for creating and patching software homes using content addressable storage. One or more embodiments comprises storing content for a file that is used to run a particular software deployment. The file is associated with a particular directory that includes a link to a first filename. The first filename is generated as a function of the content for the file, such as by applying a hash function. Responsive to receiving updated content a second filename is generated as a function of the updated content. The second filename is different than the first filename. The link included in the particular directory is modified to point to the second filename. After modifying the link included in the particular directory, the updated content for the file is used to run the particular software deployment. | 2019-08-01 |
20190236165 | METHODS AND SYSTEMS FOR TRACKING THE FLOW OF TRUCKING FREIGHT AND/OR OTHER ASSETS USING MOBILE DEVICE GEOLOCATION DATA - Presented herein are systems, methods, and architectures related to the use of mobile device geolocation data to infer and record specific detailed freight movements. In certain embodiments, using mobile device geolocation data, a freight movement database is created which may contain thousands of records each day describing in detail inferred individual freight movements. For example, each record in a freight movement database may contain information about origins, stops, and/or destinations such as dates, times, and locations of freight stops and movements. In certain embodiments, mobile device geolocation is used to create, maintain, and use a freight movement database. Such a freight movement database fills an important need in the industry because of the current lack of comprehensive and reliable information related to freight movements. | 2019-08-01 |
20190236166 | PERFORMING A TEXTURE LEVEL-OF-DETAIL APPROXIMATION - A method, computer readable medium, and system are disclosed for performing a texture level-of-detail approximation. The method includes the steps of identifying a scene to be rendered, projecting a ray passing through a pixel of a screen space, resulting in a first hit point at a geometry element within the scene, determining a footprint angle of the pixel, determining a curvature measure for the geometry element at the first hit point within the scene, computing a texture level of detail (LOD) approximation for a component of the scene, utilizing the footprint angle of the pixel and the curvature measure for the geometry element, and performing, utilizing a hardware processor, one or more rendering operations for the scene, utilizing the texture LOD approximation. | 2019-08-01 |
20190236167 | Multi-Modal Visual Search Pipeline for Web Scale Images - Systems and methods can be implemented to conduct searches based on images used as queries in a variety of applications. In various embodiments, a set of visual words representing a query image are generated from features extracted from the query image and are compared with visual words of index images. A set of candidate images is generated from the index images resulting from matching one or more visual words in the comparison. A multi-level ranking is conducted to sort the candidate images of the set of candidate images, and results of the multi-level ranking are returned to a user device that provided the query image. Additional systems and methods are disclosed. | 2019-08-01 |
20190236168 | DATABASE SYSTEM - In various examples, there is a database system which comprises an operating system, a query engine, a transaction manager and components implementing database administration functionality. The query engine and the transaction manager are configured to be executed within one or more memory enclaves of a host computer system separately from the operating system and the components implementing database administration functionality. | 2019-08-01 |
20190236169 | ADDING A PARTITION TO AN EXISTING TABLE STORED ON A DISTRIBUTED FILE SYSTEM - Systems and methods are described for registering a new column in an existing table on a distributed file system as a partition. In response to receiving a request to add a new column to a selected table, a new table may be created that includes all fields of the selected table, the new column, and a new partition, and the selected table may be renamed within the distributed file system. A view may then be created that points to data in the new table and the renamed selected table, the created view being a virtual table that receives and processes queries. All data from the renamed selected table may be transferred the new table. When the transfer is complete, the new table may be renamed to an original name of the selected table, and any data received after the renaming may be included in the renamed new table. | 2019-08-01 |
20190236170 | EFFICIENT PHYSICAL KEY-VALUE SCHEME FOR PERSISTING VIRTUAL DATABASE DATA - A composite database containing virtualized objects of a transport node in a virtualized network, and methods pertaining thereto is disclosed. The composite database supports each of many clients having their own database values. The composite database is formed by augmenting a key-value database to have an augmented key that comprises an original key, indicating the type of object stored, concatenated with a list of database identifiers. The composite database stores at the augmented key, values of objects in the database that pertain to each database identifier in the augmented key, where each object is in serialized form. Accessing the database includes scanning the database for a list of augmented key-value pairs containing a given key. Getting a database record includes specifying a key and a database identifier. The list of augmented key-value pairs is searched for the record having the specified database identifier. | 2019-08-01 |
20190236171 | RUNTIME DETECTOR FOR DATA CORRUPTIONS - In a multitenant data platform architecture, one or more supporting data tables are used to efficiently retrieve data responsive to data retrieval requests. Programmatic code markers associated with contextual data about a data transaction thread are identified. The contextual data is examined using the one or more programmatic code markers invoked by the database in the data transaction thread at runtime. Based on the contextual data returning an indication of a data corruption in one or more supporting data structures, an action associated with the data transaction thread is performed. A log of data corruptions and corresponding call stack trace data may be generated. The data transaction thread may be allowed to continue to execute statements that modify data tables, or the data transaction thread may be terminated. | 2019-08-01 |
20190236172 | DATABASES TO STORE DEVICE HISTORY DATA - An example of an apparatus including a network interface to receive enrollment data from a device, wherein the device is identified by a device identifier. The apparatus further includes a memory storage unit connected to the network interface. The memory storage unit receives device history data associated with the device identifier while the device is enrolled. The memory storage unit is also to maintain a database to store the device history data associated with the device identifier. The apparatus also includes a processor to receive a de-enrollment command associated with the device via the network interface. The de-enrollment command causes the processor to modify the device identifier stored in the database. | 2019-08-01 |
20190236173 | UTILIZING ARTIFICIAL INTELLIGENCE TO INTEGRATE DATA FROM MULTIPLE DIVERSE SOURCES INTO A DATA STRUCTURE - A device extracts data files from different data sources, and processes the data files to generate data from the data files. The device trains a first artificial intelligence model and a second artificial intelligence model based on historical data parameters, wherein the historical data parameters are associated with historical data previously processed by the device. The device utilizes the trained first artificial intelligence model and the data to generate data parameters for the data, and utilizes the trained second artificial intelligence model, the data, and the data parameters to generate a data structure configuration. The device generates a data structure for the data based on the data parameters and the data structure configuration, stores the data in the data structure, and provides a user interface for accessing the data structure. | 2019-08-01 |
20190236174 | TECHNIQUES AND ARCHITECTURES FOR PARTITION MAPPING IN A MULTI-NODE COMPUTING ENVIRONMENT - Mapping of database partitions to available nodes. Metric information related to the partitions of the database are stored. One or more metrics associated with the partitions are gathered. A plurality of potential mappings of partitions to nodes are evaluated. One of the potential mappings of partitions to nodes to result in improved metric distribution among the nodes and the partition moves are within a pre-selected move constraint is selected. The selected potential mapping is implemented by moving one or more partitions between one or more nodes. | 2019-08-01 |
20190236175 | RELIABLE WORKFLOW SYSTEM PROVENANCE TRACKING AT RUNTIME - A method, computer program product, and system for providing provenance tracking in a workflow system. The computer-implemented process provides for one or more processors to receive a workflow definition input. One or more processors perform workflow job commands, in response to receiving a workflow definition, and a workflow instance request. One or more processors access an input file associated with the workflow instance. One or more processors generate, at run-time, provenance metadata. One or more processors generate, at run-time, a global file identification (ID) associated with an output file. One or more processors link the global file ID and the provenance metadata to the output file of the workflow instance, and one or more processors store the output file, which includes the global file ID and the provenance metadata, both linked to the output file. | 2019-08-01 |
20190236176 | SMART DATA QUERY METHOD AND SYSTEM - A method and system for a smart data query are disclosed. The method comprises automatically monitoring one or more data sources that transmit lower fidelity data, and automatically looking for one or more salient features in the lower fidelity data to determine whether more data is needed. When more data is needed, the method identifies a data source that provides higher fidelity data that corresponds to the needed data. The higher fidelity data is then received from the identified data source. The method then updates information, consumable by a system or an operator, with the received higher fidelity data. | 2019-08-01 |
20190236177 | COMBINATION OF TECHNIQUES TO DETECT ANOMALIES IN MULTI-DIMENSIONAL TIME SERIES - Methods, systems, apparatuses, and computer program products are described herein that enable detecting anomalies in time series. An anomaly detection technique is selected from a plurality of detection techniques, and is applied to a first time-series data set (having a first set of dimensions). In response to detecting an anomaly in the time-series data set, the anomaly detection technique is applied to a second time-series data set that is a subset of the first time-series data set. The first time-series data set includes the first set of dimensions plus one or more additional dimensions. | 2019-08-01 |
20190236178 | TRIE-BASED NORMALIZATION OF FIELD VALUES FOR MATCHING - A system tokenizes values stored in a field by multiple records. The system creates a trie from the tokenized values, each branch in the trie labeled with one of the tokenized values, each node storing a count indicating the number of the multiple records associated with a tokenized value sequence beginning from a root of the trie. The system tokenizes a value stored in the field by a prospective record. Beginning from the root of the trie, the system identifies each node corresponding to a token value sequence for the prospective record's tokenized value. Beginning from the most recently identified node for the prospective record's token value sequence, the system identifies each extending node which stores a count that satisfies a threshold, each identified extending node corresponding to another token value sequence. The system uses the other token value sequence to identify one of the multiple records that matches the prospective record. | 2019-08-01 |
20190236179 | DATABASE TRANSACTION LOG WRITING AND INTEGRITY CHECKING - In various examples, there is provided a computer-implemented method for writing transaction log entries to a transaction log for a database system. At least part of the database system is configured to be executed within a trusted execution environment. The transaction log is stored outside of the trusted execution environment. The method maintains a first secure count representing a number of transaction log entries which have been written to the transaction log for transactions which have been committed to the database and writes a transaction log entry to the transaction log. In other examples, there is also provided is a computer-implemented method for restoring a database system using transaction log entries received from the transaction log and a current value of the first secure count. | 2019-08-01 |
20190236180 | DATABASE PROTOCOLS AND RETRIEVAL TECHNIQUES - A system includes one or more processing modules and one or more non-transitory storage modules storing computing instructions configured to run on the one or more processing modules and perform acts of: receiving, from a user computer, a destructive read request including header information indicating that a record stored in a persistent database is to be deleted after the record is successfully read from the persistent database; in response to receiving the destructive read request, retrieving the record, which was identified by the destructive read request, from the persistent database; after retrieving the record, receiving a success signal that confirms that the record was successfully read from the persistent database; and in response to receiving the success signal, automatically deleting the record, which was identified by the destructive read request, from the persistent database without receiving another instruction to delete the record. Other embodiments are disclosed herein. | 2019-08-01 |
20190236181 | MANAGING DATA RETRIVAL IN A DATA GRID - Data retrieval can be managed in a data grid. For example, a computing device can receive a write command from a second node in the data grid, the write command being for storing a second version of data. In response to the write command, the computing device can use a database to determine that a first version of the data is to be locally served by a first node in the data grid. The computing device can then transmit a communication that causes the first node to switch from (i) locally serving the data, to (ii) obtaining and serving the second version of the data from a remote node, such as the second node. The computing device can then update the database to indicate that the second version of the data is to be locally served by the second node. | 2019-08-01 |
20190236182 | SPLITTING A QUERY INTO NATIVE QUERY OPERATIONS AND POST-PROCESSING OPERATIONS - Techniques for splitting a query into native query operations and post-processing operations are provided. In one embodiment, a user query including a plurality of search parameters is received. Expressions representing the plurality of search parameters in the user query are determined. A first subset and a second subset of the expressions are identified. Each expression of the first subset corresponds to one of a plurality of native query operations executable by a database platform, and each expression of the second subset corresponds to one of a plurality of predefined post-processing operations not executable by the database platform. A database query is generated based on one or more expressions of the first subset, and a post-processing query is generated based on each expression in the second subset. The database query is executed by the database platform, then the post-processing query is executed on the results from database platform. | 2019-08-01 |
20190236183 | SPLITTING A TIME-RANGE QUERY INTO MULTIPLE SUB-QUERIES FOR PARALLEL EXECUTION - Techniques for splitting a time-range query into sub-queries for parallel execution are provided. In one embodiment, a user query requesting items from a database is received. A total number of items in the database that correspond to a time range of the user query is determined. Based on the total number of items, target values are determined. Each target value represents a target number of items in the database to be assigned to a respective sub-query. Based on the target values, a plurality of time periods within the time range are determined. Each time period corresponds to a respective set of items in the database platform, and a total number of items in the respective set of items corresponds to a respective target value. Sub-queries defining respective time periods of the plurality of time periods are then generated from the user query and executed in parallel. | 2019-08-01 |
20190236184 | USING ROW VALUE CONSTRUCTOR (RVC) BASED QUERIES TO GROUP RECORDS OF A DATABASE FOR MULTI-THREAD EXECUTION - Methods for splitting a plurality of records into subsets for parallel processing by separate threads are disclosed. In one embodiment, a plurality of records are added to a database. The adding includes tracking, for each unique value found in the plurality of records within a selected one of the sequence of fields, a statistic based on the values found in the plurality of records within a next one of the sequence of fields. Then a plurality of queries are generated, each includes a row value constructor (RVC) with a logical operation, a specific one of the unique values found within the selected one of the sequence of fields, and, for that specific value, the tracked statistic. Then a plurality of threads are caused to execute that each submit one of the queries and operate on a subset of the plurality of records responsive to execution of that query. | 2019-08-01 |
20190236185 | SPLITTING A TIME-RANGE QUERY INTO MULTIPLE SUB-QUERIES FOR SERIAL EXECUTION - Techniques for splitting a time-range query into sub-queries for serial execution are provided. In one embodiment, a user query is received requesting items within a time range from a database. The time range is divided into a plurality of time periods within the time range. Sub-queries defining respective time periods of the plurality of time periods are generated from the user query, and a first sub-query is executed. The first sub-query defines a first time period of the plurality of time periods, where the first time period is a most-recent time period or a least-recent time period among the plurality of time periods. If it is determined that a number of items obtained from executing the first sub-query is greater than or equal to a predetermined result target, then the items obtained from executing the first sub-query are provided and subsequent sub-queries are not executed. | 2019-08-01 |
20190236186 | SYSTEM AND METHOD FOR DYNAMIC QUERY SUBSTITUTION - A system for dynamic substitution of a user query adapted for use in an online fashion platform is provided. The system includes a query retrieval module configured to retrieve the user query from the online fashion platform. The user query is provided by a user and the user query has one or more query attributes. The system also includes a session data module configured to store session data collected over a plurality of sessions on the online fashion platform. The system further includes an analytics module coupled with the session data module and the query retrieval module and is configured to analyze the user query to identify and extract a query object and one or more query attributes. The analytics module is configured to compute a popularity score for each query attribute. The popularity score is a function of the number of times an article related to the product attribute was searched. The analytics module is further configured to compute an affinity score between each query attribute and related product attributes. The affinity score between two related product attributes is a function of approximate substitution of one product attribute with another. In addition, the analytics module is configured to generate a weighted entity-affinity relationship graph (EARG) based on the popularity scores and the affinity scores. Furthermore, the system includes a query substitution module configured to generate a plurality of substitute queries sorted in order of closeness to the user query using EARG. | 2019-08-01 |
20190236187 | SEARCHING USING QUERY GRAPHS - A device can receive a search query. The search query can relate to a geographic location. The device can process the search query to parse the search query into a plurality of strings. The plurality of strings can include text. The device can determine that one or more strings, of the plurality of strings, satisfy a condition. The device can generate, using the plurality of strings, a query graph that includes a plurality of paths relating to the condition. The query graph can further include a plurality of nodes leading to and/or included in the plurality of paths, and a plurality of transitions between the plurality of nodes. The device can perform one or more actions relating to the query graph to obtain, from a data structure, one or more search results that correspond to the search query. | 2019-08-01 |
20190236188 | QUERY OPTIMIZER CONSTRAINTS - Techniques are disclosed relating to database query optimizers. In some embodiments, a query optimizer of a database system receives a first query including a first constraint that restricts selection of a set of execution plans available to implement the first query. The first constraint identifies, at least, a first option and a second option to implement a clause in the first query. The query optimizer evaluates, based on the first constraint, a first execution plan that includes performance of the first option and a second execution plan that includes performance of the second option. Based on the evaluating, the query optimizer selects one of the first and second execution plans to implement the first query. The query optimizer causes execution of the selected execution plan. | 2019-08-01 |
20190236189 | Selection of Subexpressions to Materialize for Datacenter Scale - Described herein is a system and method for selecting subexpressions to be materialized. For a predefined storage budget, subexpressions of a set of candidate subexpressions to be materialized to minimize query evaluation cost are selected based upon a calculated utility of the set of candidate subexpressions, interactions of the candidate subexpressions, and, a cost of evaluating the candidate subexpressions. Based upon the subexpressions selected to be materialized, subexpression(s) of the set of candidate subexpressions to use when evaluating particular queries of the set of queries to minimize query evaluation cost are determined. | 2019-08-01 |
20190236190 | EXTENDING THE SQL LANGUAGE TO ALLOW THE REFERENCE OF A NAMED DATA MODEL - A method and system for extending a structured query language to allow reference of a named data model are provided. In some embodiments, a substitute SELECT statement having at least one JOIN statement based on an abbreviated SELECT statement having no JOIN statements is created by a translation module. The process of translation includes identifying tables of a data model referenced by an abbreviated SELECT statement having no JOIN statements. The process further includes determining relationships between the tables referenced by the abbreviated SELECT statement. The process also includes generating a substitute SELECT statement having a sequence of JOIN statements based on the determined relationships. | 2019-08-01 |
20190236191 | HIGH-DIMENSIONAL DATA MANAGEMENT AND PRESENTATION - An online system manages data by determining relevance of data dimensions to users. The online system determines which data dimensions a user is likely to be interested in. If a user requests to access a data set that includes data of different dimensions, the online system analyzes the dimensions' relevance to the user before providing the data set to the user. The online system provides the data to the user by prioritizing data dimensions that are more relevant to the user. As such, the online system improves the user experience by allowing users to conveniently and quickly locate relevant data and minimizing the distraction caused by irrelevant data. The online system may create and provide a user interface to present data dimensions that are determined to be relevant. | 2019-08-01 |
20190236192 | NON-HOMOGENOUS SYNOPSIS FOR EFFICIENT PARTITION PRUNING - Disclosed herein are system, method, and computer program product embodiments for partition pruning via non-homogenous synopsis information. An embodiment operates by maintaining synopsis information for a data partition in accordance with a first synopsis strategy, monitoring performance of the synopsis information within a partition pruning system, determining that the performance of the synopsis information is insufficient, and updating the synopsis information in accordance with a second synopsis strategy better suited for the attributes of the data partition. In some embodiments, a first data partition of a partitioned data table may employ a first synopsis strategy and a second data partition of the partitioned data table may employ a second synopsis strategy. | 2019-08-01 |
20190236193 | EFFECTIVE PARTITION PRUNING USING GLOBALLY ENCODED PARTITIONS - Disclosed herein are system, method, and computer program product embodiments for partition pruning using globally encoded range partition information. An embodiment operates by partitioning a data table into a plurality of data partitions, determining a plurality of sub-partitions within the data partitions, and determining a global range table based at least in part on value ranges corresponding to the sub-partitions. Further, the global range table may be used to determine bit vectors for the data partitions and query predicates. In some examples, the bit vectors may be used to determine whether to prune data partitions during execution of a query over a large data volume. | 2019-08-01 |
20190236194 | DYNAMIC QUERY PROCESSOR FOR STREAMING AND BATCH QUERIES - Operational machine components of an information technology (IT) or other microprocessor- or microcontroller-permeated environment generate disparate forms of machine data. Network connections are established between these components and processors of data intake and query system (DIQS). The DIQS conducts network transactions on a periodic and/or continuous basis with the machine components to receive disparate data and ingest certain of the data as entries of a data store that is searchable for DIQS query processing. The DIQS may receive queries to process against the received and ingested data via an exposed network interface. In one example embodiment, the DIQS receives a query identifying data to be processed, dynamically generates a query processing scheme based on the state of the data to be processed, such as streaming or at rest, and dynamically communicates the query processing scheme to a query executor based on the state of the data to be processed. | 2019-08-01 |
20190236195 | ACTIONABLE ANSWER CARD IN NATURAL LANGUAGE QUERY - System, method, and computer product embodiments are described for querying a database using natural language queries (NLQ) to produce actionable results in an answer card. The method allows a user to take further action with the answer card by editing the card contents, manipulating the way data is displayed, or querying the answer results for more details of the data. By the method, the user may continue exploration of the data, use the results to collaborate with others, or build a story from the data in a presentation format, such as a dashboard, while maintaining access to the real-time data of the database through the answer card. System and computer product embodiments implement the method. | 2019-08-01 |
20190236196 | SYSTEM AND METHOD FOR NAVIGATING USING A SEARCH FUNCTIONALITY - A system and method include receiving, by a navigation and search system of a virtual computing system, a user input via a navigation interface of the navigation and search system. The system and method also include retrieving a page corresponding to the user input, parsing the user input and associating one or more keywords with the user input for obtaining a structured query, including associating the page with the structured query, and displaying the page in the navigation interface. The system and method further include populating the structured query into a search interface of the navigation and search system. Either the user input via the navigation interface or the structured query via the search interface are usable to navigate to the page. | 2019-08-01 |
20190236197 | DATA INGESTION BY DISTRIBUTED-COMPUTING SYSTEMS - Techniques for data ingestion by a distributed-computing system are provided. In one embodiment, data received from one or more data sources is processed at a management node of the distributed-computing system. The data is generated by one or more components of an information processing system external to the distributed-computing system. The data is stored at the management plane. The management plane selects, from a plurality of data cores, a data core to ingest the data. The plurality of data cores are stored across one or more data plane containers of a data plane of the distributed-computing system. The management plane processes the data to generate one or more event records corresponding to the data. The one or more event records are sent to the selected data core, which causes the data plane to store the one or more event records in the selected data core. | 2019-08-01 |
20190236198 | EFFICIENTLY DELETING DATA FROM OBJECTS IN A MULTI-TENANT DATABASE SYSTEM - Disclosed are examples of systems, apparatus, methods and computer program products for deleting data of an object within a multi-tenant database. Described is a mechanism for performing operations such as an efficient delete operation by introducing a new delete operation (or method) that is configured to allow a data structure such as an object to identify one or more records to be deleted. In order to ensure that the operation is efficient, the mechanism may perform a validation of the values provided to the delete operation based on the type of data store used for storing the records. For example, the validation may ensure that the values provided to the method correspond to a composite primary key when records are stored in a non-relational data store. Upon a successful validation, an initial delete request may be translated to an appropriate delete operation for the underlying database. | 2019-08-01 |
20190236199 | METHOD AND SYSTEM FOR SYNCHRONIZING DATABASES AUTOMATICALLY AND PERIODICALLY - Through a first processing thread, a first database is accessed via a first API to retrieve a list of event objects of the first database. Through a second processing thread, for each of the event objects, participant identifiers (IDs) are determined from the event object. For each of the participant IDs, a domain ID is extracted from the participant ID. A list of one or more entity objects are identified based on the domain ID, where the entity objects are stored in a second database such as a task database storing and managing many tasks. At least one attribute of at least one of the entity objects is modified based of the participant ID and the domain ID, which generates a modified entity object. Through a third processing thread, any event objects that have been modified are transmitted to the second database via a second API over the network. | 2019-08-01 |
20190236200 | METHOD AND SYSTEM FOR EFFICIENT DATA REPLICATION IN BIG DATA ENVIRONMENT - A system includes a persistent storage and a data transfer manager. The persistent storage stores sending entity storage resources and receiving entity storage resources. The data transfer manager obtains a data transfer request for data in the sending entity storage resources. In response to obtaining the data transfer request, the data transfer manager obtains a sending entity schema associated with the data; determines a current storage location of the data using the obtained sending entity schema; determines a future storage location for a copy of the data in the receiving entity storage resources; stores a copy of the data at the determined future storage location; adapts the sending entity schema based on the determined future storage location; and modifies a receiving entity schema based on the adapted sending entity schema. | 2019-08-01 |
20190236201 | TECHNIQUES FOR PROCESSING DATABASE TABLES USING INDEXES - Techniques are disclosed relating to processing data stored within database tables in a parallelized manner. In various embodiments, a computer system maintains a database having a database table storing data for a plurality of tenants and an index structure storing indexes for accessing data stored in the database table. In some embodiments, the computer system receives, from a particular tenant, a request to perform a task that includes operating on particular data. In some embodiments, the computer system determines a portion of the index structure corresponding to the particular tenant and divides a range of indexes within that portion into a plurality of index sub-ranges. In various embodiments, the computer system processes portions of the task in parallel by determining an index sub-range for each of a plurality of threads and causing each of the threads to operate on a portion of the particular data specified by its index sub-range. | 2019-08-01 |
20190236202 | SYSTEMS TO INTERLEAVE SEARCH RESULTS AND RELATED METHODS THEREFOR - Some embodiments include a system. The system can comprise one or more processors, and one or more non-transitory memory storage devices storing computer instructions configured to run on the one or more processors and perform: receiving a base query string comprising a query parameter; and generating a modified version of the base query string to create a modified query string. The modified query string can comprise the query parameter and an interleaving parameter. Meanwhile, generating the modified version of the base query string to create the modified query string can comprise adding the interleaving parameter to the base query string. Other embodiments of related systems and methods are also provided. | 2019-08-01 |
20190236203 | NON-TABULAR DATASOURCE CONNECTOR - Systems and methods for querying and obtaining results from an external data source that operates with a different querying language is provided. The system activates a datasource connector of the system. The system receives attributes of a query in a native language of the system, and the datasource connector formats the attributes of the query into a query language statement in a native language of the external source. The datasource connector then makes an application programming interface (API) call to the external source. The API call includes a transmission of the query language statement to the external source, which causes the external source to perform a query using the query language statement. The datasource connector receives results of the query performed at the external source, whereby the results are in a non-tabular format. The datasource connector then reformats the results into a tabular format. | 2019-08-01 |
20190236204 | Predicting Intent of a User from Anomalous Profile Data - Mechanisms are provided for conducting a natural language dialogue between the automatic dialogue system and a user of a client computing device. An automatic dialogue system receives natural language text corresponding to a user input from the user via the client computing device, the natural language text having an ambiguous portion of natural language text. The automatic dialogue system analyzes user profile information corresponding to the user to identify an anomaly in the user profile information and predicts a user intent associated with the anomaly. The automatic dialogue system disambiguates the ambiguous portion of the natural language text based on the predicted user intent and generates a response to the user input based on the disambiguated natural language text which is output to the client computing device to thereby conduct the natural language dialogue. | 2019-08-01 |
20190236205 | CONVERSATIONAL KNOWLEDGE GRAPH POWERED VIRTUAL ASSISTANT FOR APPLICATION PERFORMANCE MANAGEMENT - In one embodiment, a method of processing a natural language input using a conversational knowledge graph in a virtual assistant is disclosed. The method includes receiving a natural language query from a user; translating the natural language query received from the user into corresponding intents; retrieving conversational knowledge context information based on the intents; using the retrieved conversational knowledge context information to customize back-end service calls to downstream applications; receiving a result of the customized back-end service calls; sending the result of the customized back-end service calls in a response to the natural language understanding system; translating the response from the fulfillment service system into a natural language response; and providing the natural language translated response to the user. | 2019-08-01 |
20190236206 | Automatic Extraction of Domain Specific Terminology from a Large Corpus - A method of extracting jargon from a document corpus stored in a database using a processor and a user interface is described herein. A sub-domain input is entered through the user interface to initiate a review of the document corpus stored in the database. The processor separates the document corpus into at least one sub-corpus and a remainder corpus. The at least one sub-corpus is defined by the sub-domain input. A first topic model and a second topic model are built to generate respective topic similarity scores for at least one term extracted from the at least one sub-corpus and at least one corresponding term extracted from the remainder corpus. The respective topic similarity scores are compared by the processor to identify jargon terms and thereby provide a list of j argon terms through the user interface. | 2019-08-01 |
20190236207 | MUSIC SHARING METHOD AND SYSTEM - A music sharing method and system is disclosed, for quickly searching for a specific song and related information through the music recognition technology, and applying the cloud push technology to share the uploaded specific song and related information to a specific member of the group member sharing platform. Furthermore, the invention enables a user to share the uploaded specific songs and related information to specific members of the group member sharing platform within the preset range. Moreover, the invention can recommend songs according to the requirements of the user through the cloud push technology. Moreover, the invention can provide product information suitable for the user through the cloud push technology. Moreover, the invention can understand the ranking of all songs through the cloud push technology, and know that the preferences of the user and all members in sharing certain categories of songs. | 2019-08-01 |
20190236208 | SMART SPEAKER WITH MUSIC RECOGNITION - A smart speaker with music recognition is disclosed, including: a housing, an input device and a control device. The input device receives music information from a music source. The control device includes a processing unit, a storage unit, a communication unit, a voice module and a music recognition module. The storage unit contains a music database. The music recognition module recognizes the feature value of the music information, and uses the feature value to perform melody comparison with the plurality of songs stored in the music database, to search for specific songs and related information in the music database matching the feature value, and upload to the cloud server through the communication unit. After browsing the webpage from the cloud server, the user knows whether a specific song and related information matching the feature value of the music information are stored in the music database. | 2019-08-01 |
20190236209 | ARTIFICIAL INTELLIGENCE METHODOLOGY TO AUTOMATICALLY GENERATE INTERACTIVE PLAY ALONG SONGS - A method and system of using Artificial Intelligence to automatically create and generate an interactive play-along song from a selected audio file/song imported from either a music streaming service, a personal music library and the like, that can later be played on an interactive music engine. | 2019-08-01 |
20190236210 | METRIC FORECASTING INTERFACE WITH ALERT PREDICTION - Operational machine components of an information technology (IT) or other microprocessor- or microcontroller-permeated environment generate disparate forms of machine data. Network connections are established between these components and processors of an automatic data intake and query system (DIQS). The DIQS conducts network transactions on a periodic and/or continuous basis with the machine components to receive the disparate data and ingest certain of the data as measurement entries of a DIQS metrics datastore that is searchable for DIQS query processing. The DIQS may receive search queries to process against the received and ingested data via an exposed network interface. In one example embodiment, a query building component conducts a user interface using a network attached client device. The query building component may elicit search criteria via the user interface using a natural language interface, construct a proper query therefrom, and present new information based on results returned from the DIQS. | 2019-08-01 |
20190236211 | METHOD FOR DYNAMIC MONITORING OF ORGANIZATION CONTENT AND PROACTIVE SUGGESTION OF CHANGES FOR EFFECTIVE SEARCH ENGINE OPTIMIZATION - Disclosed is an apparatus and method for dynamic monitoring of organization content and proactive suggestion of changes for effective search engine optimization. In one embodiment of the method, a metadata key phrase of a target electronic document is selected. A search is initiated for electronic documents on the Internet using the selected metadata key phrase. Metadata key phrases are captured from the electronic documents identified by the search. Thereafter the selected metadata key phrase is updated based on the captured metadata key phrases. | 2019-08-01 |
20190236212 | AUTOMATICALLY GENERATING INSTRUCTIONS FROM TUTORIALS FOR SEARCH AND USER NAVIGATION - Various embodiments describe a segmentation application that uses a predictive model to segment content from instruction manuals. In an example, the segmentation application receives training data including training labels and steps available from instruction manuals. The segmentation application trains a predictive model based on the training data and a loss function. The training includes generating, by the predictive model, a prediction of whether the sub-step is the start of the step and minimizing the loss function based on comparison of the prediction to the training label. Upon completion of the training, the segmentation application identifies electronic sources and a start indicator indicating a start of a specific step. The segmentation application provides, in response to a query about an object from a client device, a step generated from the start indicator. | 2019-08-01 |
20190236213 | SYSTEMS, METHODS, AND APPARATUSES FOR COLLABORATIVE FILTERING IN A CLOUD BASED COMPUTING ENVIRONMENT - An application server platform operated by a cloud computing services provider receives input from a customer organization application executing on the application server platform, the input specifying a first action on a first item type, and a second action on a second item type to recommend in response to the specified first action on the first item type. The application server platform searches for a record in a permanent data store that contains the first action, the first item type, the second action, and the second item type, and assigns a value to a token associated with the record based on when the application server platform most recently generated a recommendation that included the first action on the first item type and the second action on the second item type from the record, when the search locates the record in the permanent data store. One embodiment further comprises generating a current recommendation that includes the first action on the first item type and the second action on the second item type from the located record, based on the assigned value of the token associated with the located record. | 2019-08-01 |
20190236214 | SYSTEM AND METHOD FOR FACILITATING CLICKABLE LINKS SERVERS USING A DECENTRALIZED BLOCKCHAIN LEDGER - The present disclosure relates to a system and method to facilitate clickable links embedded in an advertisement using a decentralized blockchain ledger. The method embeds an option of installing one or more Clickable TV servers on a user device in the advertisement, monitors tokens embedded in the advertisement by the one or more Clickable TV servers upon installation, retrieves web links that enables the user to view an advertised product and/or enables activation of the tokens for retailing upon clicking of a clickable link embedded in TV commercials, determine interaction events performed by the user while viewing the advertised product and/or while retailing using the tokens, generate a registration entry associated with the interaction events for addition to the decentralized blockchain ledger, and distribute the registration entry in a blockchain to a plurality of nodes in the decentralized blockchain ledger management system. | 2019-08-01 |
20190236215 | SYSTEM AND METHOD FOR HIERARCHICAL DISTRIBUTED PROCESSING OF LARGE BIPARTITE GRAPHS - Systems, methods, and apparatuses for implementing a distributed, hierarchical, and iterative data graph processing strategy are disclosed. A large data graph is partitioned and the partitions are clustered. Sets of keys and hashes are generated for each cluster and distributed to a plurality of processing machines. The processing machines recreate the partitions, based on received hashes and keys of the clusters of the first partitions, and the graph. Thereafter, the partitioning, clustering and processing is repeatable for the recreated graphs. The disclosed strategy enables processing of large and dynamic data graphs, including bipartite query-Uniform Resource Locator graphs. | 2019-08-01 |
20190236216 | AUTOMATIC GENERATION OF VARIATIONS OF SEARCH CRITERIA FOR USE IN A PREDICTIVE SEARCH ENGINE - A device can obtain location information that includes a set of location name values associated with a set of locations. The device can identify, using a natural language processing model, a set of proper noun values associated with the set of location name values. The device can generate a set of search criteria variant terms for the set of proper noun values. The set of search criteria variant terms can each include one or more characters associated with an alias of a particular proper noun value. The device can receive, from a user device, partial search criteria relating to an alias of a destination location. The device can process the partial search criteria using the set of search criteria variant terms to identify a set of candidate search terms. The device can provide the set of candidate search terms to the user device. | 2019-08-01 |
20190236217 | TYPEAHEAD AND AUTOCOMPLETE FOR NATURAL LANGUAGE QUERIES - Embodiments are described for enabling a user to query a database using natural language and receive results without requiring the user to manipulate or know details of the database contents. The user is guided in the creation of the natural language query by suggested predetermined queries from a template. Natural language is parsed using the template. The approach allows a user's query words to be completed automatically from the template as the user inputs the words. The approach further allows the next suggested parts of the query to be automatically typed from the template ahead of the user's cursor. Other features provide feedback to the user for invalid or irrelevant queries that cannot be parsed, including suggesting complete predetermined queries from the template. The approach helps the user focus the query on exactly what the user seeks to learn from the database without complex, process-intensive parsing. | 2019-08-01 |
20190236218 | QUANTUM COMPUTING DEVICE DESIGN - Techniques and a system for quantum computing device modeling and design are provided. In one example, a system includes a modeling component and a simulation component. The modeling component models a quantum device element of a quantum computing device as an electromagnetic circuit element to generate electromagnetic circuit data for the quantum computing device. The simulation component simulates the quantum computing device using the electromagnetic circuit data to generate response function data indicative of a response function for the quantum computing device. Additionally or alternatively, a Hamiltonian is constructed based on the response function. | 2019-08-01 |
20190236219 | SYSTEMS AND METHODS FOR MODELING, ANALYZING, DETECTING, AND MONITORING FLUID NETWORKS - Systems and methods are provided for optimally determining sensor or infrastructure placement in a fluid network, for determining an anomaly of interest in the fluid network, and for determining sensor coverage in a fluid network, which are based on a model of the fluid network represented by a directed graph. | 2019-08-01 |
20190236220 | METHODS FOR TOPOLOGY OPTIMIZATION USING A MEMBERSHIP VARIABLE - Methods for multi-component topology optimization for composite structures are disclosed. In one embodiment, a method of designing a structure by computer-implemented topology optimization includes establishing a plurality of design points within a design domain and establishing at least a first orientation field and a second orientation field. The method further includes assigning values for the one or more membership fields, the one or more density fields, the first orientation field and the second orientation field, and projecting the values onto a simulation model. The method includes achieving convergence of an objective function for a design variable by iteratively executing a topology optimization of the simulation model using the values. Each design point of the plurality of design points is a member of no component or a member of one of the first component and the second component. | 2019-08-01 |
20190236221 | METHODS FOR COMBINATORIAL CONSTRAINT IN TOPOLOGY OPTIMIZATION USING SHAPE TRANSFORMATION - Methods for combinatorial choice in topology optimization are disclosed. In one embodiment, a method of performing combinatorial choice in a non-linear programming problem for designing a structure includes establishing, by one or more processors, a set of K variables, wherein the set of K variables defines an K-dimensional unit cube in a normal coordinate system. The K-dimensional unit cube includes a plurality of desired vertices representing a plurality of desired combinations that satisfy a constraint and a plurality of undesired vertices representing a plurality of undesired combinations that do not satisfy the constraint. The method further includes transforming the K-dimensional unit cube into a transformed shape in a transformed coordinate system using a shape function. Values of the set of K variables cannot have a combination represented by the plurality of undesired combinations. | 2019-08-01 |
20190236222 | SYSTEM FOR AUGMENTED APPAREL DESIGN - Examples provide a system and method for augmented apparel design. Sensor data generated by a set of sensor devices attached to at least one moveable member of a mannequin in a selected configuration is analyzes to generate motion data. The motion data is analyzed with design data associate with a garment design to generate an augmented reality (AR) overlay including an AR image of an item of clothing conforming to the garment design. The AR overlay is superimposed over a real-world image of a portion of the mannequin to generate an AR display of the item of clothing on the mannequin. As one or more design elements are altered and/or member(s) of the mannequin move, an AR generator updates the design overlay to reflect predicted changes to the garment in response to the changes. The system outputs response data identifying fabric stress points and/or recommended design changes. | 2019-08-01 |
20190236223 | IDENTIFICATION OF CHANGES IN FUNCTIONAL BEHAVIOR AND RUNTIME BEHAVIOR OF A SYSTEM DURING MAINTENANCE CYCLES - Identification of changes in functional and runtime behavior of a system during maintenance cycles. The traditional methods provide for viewing the problem of change identification decoupled from system design, thus making the process further human dependent and increasing the time and probability of errors. Embodiment of the present disclosure provide for identification of changes in the functional behavior and the runtime behavior of the system by acquiring, a design comprising of structures and behaviors of the system, generating a design model and a set of implementation codes based upon the design, updating the set of implementation codes with log statements, constructing a design model based upon log files, constructing an operations model based upon the design model and comparing the operations model and a design table, to identify changes in the functional behavior and the runtime behavior of the system using an operations verification component. | 2019-08-01 |
20190236224 | DEVICE AND METHOD FOR SIMULATING A CONTROLLED MACHINE OR INSTALLATION - A device for simulating a controlled machine or installation includes a process simulation apparatus designed to perform simulation steps that simulate a physical process of the machine or installation, and a controller simulation apparatus designed to perform simulation steps that simulate a controller of the machine or installation. The process simulation apparatus and the controller simulation apparatus exchange particular output values so as to simulate the controlled machine or installation in the respective simulation steps. The controller simulation apparatus transmits an item of information to the process simulation apparatus, which item of information describes a result time for an end of a simulation step performed by the controller simulation apparatus, while the process simulation apparatus is designed to adjust a duration of at least one of the simulation steps depending on the result time. | 2019-08-01 |
20190236225 | METHOD OF DERIVING BUCKLING CONDITION OF FIBER MOVING IN FLUID, METHOD OF CALCULATING BREAKAGE CONDITION, AND METHOD OF FORECASTING FIBER LENGTH DISTRIBUTION - In a method of deriving the buckling condition of a cylindrical fiber moving in a fluid, a method of calculating the breakage condition thereof, and a method of forecasting the fiber length distribution, the flow field around a cylindrical fiber in a contraction flow is determined by a stricter method. | 2019-08-01 |
20190236226 | ESTIMATED DISTANCE CALCULATOR, ESTIMATED DISTANCE CALCULATION METHOD, ESTIMATED DISTANCE CALCULATION PROGRAM, AND AUTOMATED PLANNER - An estimated distance calculator | 2019-08-01 |
20190236227 | EIGEN AUGMENTATION METHODS FOR ELECTROMAGNETIC MODELLING AND SIMULATION - Techniques for electromagnetic modelling of EM structures are described. Krylov subspace of a second EM structure is augmented with Eigen vectors of a first EM structure to form an augmented space. The second EM structure is a design variant of the first EM structure and the first EM structure is already EM modelled and simulated. Thereafter, Maxwell's equations for the second EM structure are solved using the augmented space. | 2019-08-01 |
20190236228 | CO-SIMULATION SYSTEM WITH DELAY COMPENSATION AND METHOD FOR CONTROL OF CO-SIMULATION SYSTEM - A method of providing stable communication between subsystems in a co-simulation system, including providing a signal S | 2019-08-01 |
20190236229 | JUST-IN-TIME HARDWARE FOR FIELD PROGRAMMABLE GATE ARRAYS - A method for implementing a distributed hardware system includes retrieving a hardware design described in a hardware description language, where the hardware design includes a plurality of components. The method further includes, for each component of the hardware design, sending the component to a hardware compiler and to one of a plurality of software engines, where the hardware compiler compiles the component to run in one of a plurality of hardware engines and the one software engine simulates the component while the hardware compiler compiles the component for the one hardware engine, and upon completion of the compilation of the component, sending the compiled component to one of the hardware engines to be executed by the one hardware engine and monitoring communication so that the one hardware engine can interact with other components in other hardware engines or software engines. | 2019-08-01 |
20190236230 | JUST-IN-TIME HARDWARE FOR FIELD PROGRAMMABLE GATE ARRAYS - A method for implementing a distributed hardware system includes retrieving a hardware design described in a hardware description language, where the hardware design includes a plurality of modules. The method includes sending modules of the design to software engines, where the runtime maintains for each module being simulated a queue for update and evaluation events. Update events on the queue are those that update stateful objects in the module and cause evaluation events to be enqueued onto the module's queue while evaluation events are those that update stateless objects in the module and cause update events to be enqueued onto the module's queue. Having a queue for each module permits the runtime to manage module simulations so that the executions of each module run concurrently with each other. This leads to faster executions of the modules and less complex communications between modules during execution. | 2019-08-01 |
20190236231 | JUST-IN-TIME HARDWARE FOR FIELD PROGRAMMABLE GATE ARRAYS - A system and method for executing a hardware component of a design is disclosed. The system and method execute hardware components that are constructed with a ‘display(s)’ function that permits the hardware component to display values internal to the hardware component while the component is executing on a hardware engine. The values are displayed on a user output interface, such as a user terminal, supported by a runtime system controlling the execution of the hardware engine and thus allows the user to have a view into the executing hardware that would be otherwise unavailable. This view permits the user to debug the component executing on the hardware engine. | 2019-08-01 |
20190236232 | ANALOG FAULT SIMULATION CONTROL WITH MULTIPLE CIRCUIT REPRESENTATIONS - This application discloses a computing system to identify multiple views of cells in a circuit design for selective utilization during analog fault simulation of the circuit design. The views of the cells can include two or more of macromodel design views, schematic design views, or extracted design views that includes parasitic elements extracted from a physical layout of the circuit design. The computing system can prompt generation of multiple netlists, each netlist generated based on a different combination of the identified views of the cells in the circuit design, or a list of macromodels with pin accurate subcircuit wrappers, parse and organize the cells in each netlist or the list of macromodels, identify one of the cells to inject with a defect, and selectively simulate portions from a plurality of the netlists based, at least in part, on the identified one of the cells to inject with the defect. | 2019-08-01 |
20190236233 | LADDER PROGRAM EDITING SUPPORT APPARATUS AND LADDER PROGRAM EDITING METHOD - A ladder program editing support apparatus edits a ladder program by causing a display to display a plurality of circuit elements that is each displayed as a symbol in an area between a plus bus line and a minus bus line in the ladder program and makes up the ladder program. The ladder program editing support apparatus includes the display that displays the ladder program, and an edit control unit that selects a selected range to be edited within the ladder program displayed on the display and displays identification information on the circuit elements included in the ladder program within the selected range on the display in the form of a list according to a preset displaying order. | 2019-08-01 |
20190236234 | SEMICONDUCTOR DEVICE INCLUDING STANDARD-CELL-ADAPTED POWER GRID ARRANGEMENT AND METHOD FOR GENERATING LAYOUT DIAGRAM OF SAME - A semiconductor device includes: a power grid (PG) arrangement including: a conductive layer M(i) including segments which are conductive, where i is an integer and i≥0; and a conductive layer M(i+1) over the conductive layer M(i), the conductive layer M(i+1) including segments which are conductive; the M(i) segments including first and second segments designated correspondingly for first and second reference voltages, the first and second segments being interspersed and substantially parallel to a first direction; and the segments in the conductive layer M(i+1) including third and fourth segments designated correspondingly for the first and second reference voltages; the third and fourth segments being interspersed and substantially parallel to a perpendicular second direction; and wherein the segments in the conductive layer M(i+1) are arranged substantially asymmetrically such that each fourth segment is located, relative to the first direction, substantially asymmetrically between corresponding adjacent ones of the third segments. | 2019-08-01 |
20190236235 | METHOD OF DESIGNING AN INTEGRATED CIRCUIT - In accordance with a first aspect of the present disclosure, a method of designing an integrated circuit is conceived, comprising: placing integrated circuit cells that include supply pins in a plurality of predefined rows; determining blocked areas for supply pin extensions; extending the supply pins outside said blocked areas. A corresponding integrated circuit is also provided. | 2019-08-01 |
20190236236 | ORAL CARE APPLIANCE USING PULSED FLUID FLOW - An oral care appliance comprises: a fluid delivery system for producing discrete fluid bursts by means of a pump ( | 2019-08-01 |
20190236237 | CALIBRATION OF DIRECTED SELF-ASSEMBLY MODELS USING PROGRAMMED DEFECTS OF VARYING TOPOLOGY - Techniques are provided for calibrating physical directed self-assembly (DSA) models. For example, an experimental DSA process is performed using a block copolymer (BCP) material and a DSA guiding pattern with a predefined defect formed as part of the guiding pattern. A difference in size (e.g., shrinkage) is determined between a size of the predefined defect of the guiding pattern and a remaining size of a morphological defect in the BCP material as assembled at a completion of the DSA process. The experimental size difference is utilized as calibration data in a DSA simulation system to calibrate a simulated physical DSA model which defines a simulated DSA process that corresponds to the experimental DSA process. The simulated physical DSA model defines a simulated guiding pattern with a programmed defect, which corresponds to the experimental guiding pattern and the predefined defect. | 2019-08-01 |
20190236238 | METHOD FOR LAYOUT DESIGN AND SEMICONDUCTOR DEVICE MANUFACTURED BASED ON THE SAME - Disclosed is a computer-readable medium including a program code. The program code, when executed by a processor, causes the processor to place an electrically active pattern having a first width and a first least margin area, on a layer, to place a first dummy pattern having a second width wider than the first width and having a second least margin area, on the layer, and to place a second dummy pattern having a third width and a third least margin area, on the layer, based on whether a ratio of an area of the layer to areas of the electrically active pattern and the first dummy pattern is within a reference range. | 2019-08-01 |
20190236239 | TIMING DRIVEN CELL SWAPPING - A method for cell swapping is provided. A location for swapping a first cell is determined. One or more legal positions for cell placement are determined at the location. A plurality of cells is determined for of the plurality of legal positions. A second cell from the plurality of cells is determined based on timing information associated with each of the plurality. The first cell is swapped with the second cell. | 2019-08-01 |
20190236240 | DEFECT DETECTION METHOD FOR MULTILAYER DAISY CHAIN STRUCTURE AND SYSTEM USING THE SAME - A defect detection method for a multilayer daisy chain structure, including: generating a plurality of physical models having a defect of at least one defect type based on the at least one defect type of a daisy chain structure; generating a group of training samples for each of the physical models; generating a classifier model by using a machine learning technique algorithm via scattering parameter values of a training set; measuring an error value by comparing scattering parameter values of a testing set with the classifier model, using the classifier model as a defect model of the defect type based on the error value, and determining that the multilayer daisy chain has a defect corresponding to the at least one defect type by comparing actual measurements of scattering parameter values. | 2019-08-01 |
20190236241 | Method for Eliminating False Paths of a Circuit Unit To Be Implemented Using a System - A system includes a net-identifying module and a false path-eliminating module. The net-identifying module is configured to receive first and second electronic lists associated with a circuit unit, to identify a net of the circuit unit based on the first electronic list, and to provide a net information output that includes information associated with the net. The false path-eliminating module is coupled to the net-identifying module and is configured to select, in the second electronic list, a path of the circuit unit that does not traverse through the net and provide a path information output that includes information associated with the path. | 2019-08-01 |
20190236242 | MECHANICAL AND CONTROL INTEGRATION DESIGN METHOD BASED ON PREDICTION MODEL AND QUICK DISTURBANCE ELIMINATION - The present invention provides a mechanical and control integration design method, comprising: first building an initial model of a controlled object, and regarding the estimation of an undetermined part as a disturbance; performing parametric design to the determined part of the controlled object model to obtain a parameterized model; further truncating and simplifying the controlled object model according to dynamic response characteristics of the object model and the control target requirements to obtain an approximate model as a prediction model; measuring a system state, building a control performance judgment criterion, and calculating the difference with the calculation result of the prediction model to obtain the total disturbance of the system; designing a total disturbance eliminating link according to the order of the prediction model, and constructing and completing an auto-disturbance rejection controller. | 2019-08-01 |
20190236243 | MODIFIED FBA IN A PRODUCTION NETWORK - A method for matching production of FBA metabolism to supply and demand within a larger production network is described herein. An objective function of FBA metabolism is modified to include an upstream supply generated in upstream sub-units, as well as a downstream demand generated within downstream sub-units in the production network. FBA metabolism and the upstream and downstream sub-units are iteratively solved with updated initial conditions, producing a time series solution to the production network. | 2019-08-01 |
20190236244 | CONTEXT-AWARE VIRTUAL KEYBOARD FOR CHEMICAL STRUCTURE DRAWING APPLICATIONS - Described herein are systems, methods, and apparatus for electronically drawing and editing representations of chemical structures using an intuitive user interface. This user interface, the context-aware virtual keyboard, makes it faster and easier to draw and edit chemical structure representations by guiding the user through the sequence of steps required to produce the representation in a context-based, non-linear fashion. The context-based virtual keyboard allows a user to quickly create graphical representations of complex chemical structures by using the structure itself as a basis for presenting efficient options for subsequent drawing/editing steps. Different possible and/or likely actions (e.g., edits to a chemical structure being drawn) are presented to the user based on a selected navigation position on the drawing. Thus, a user can efficiently and intuitively modify a chemical structure drawing without the tedious manual selection of portions of the chemical structure and without searching through complicated menus. | 2019-08-01 |
20190236245 | A SYSTEM FOR DECRYPTING AND RENDERING CONTENT - A system for rendering a content, the rendering of which is subject to conditional access security conditions. The system includes a host device and a detachable security device, the security device configured to decrypt the encrypted content, re-encrypt it under a local key and to deliver the re-encrypted content to the host device while ensuring that the host device applies or otherwise enforces any conditions associated with the rendering of the content. | 2019-08-01 |
20190236246 | SYSTEM FOR VERIFYING CONTROL HISTORY OF UNMANNED AERIAL VEHICLE - A system for verifying control history of an unmanned aerial vehicle according to one embodiment of the present disclosure includes an authentication unit for collecting personal information from a pilot who controls an unmanned aerial vehicle to authenticate the pilot, a storage unit storing control information regarding the pilot's control of the unmanned aerial vehicle, and an encryption unit for sealing and encrypting data of the personal information and the control information; and is capable of controlling and managing an indiscriminate use of the unmanned aerial vehicle and providing a control time, flight history, etc., to an organization which needs such information. | 2019-08-01 |
20190236247 | TURING TEST DECODER - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for decoding Turing tests. One of the methods includes managing a database that stores data of each of a plurality of aggregation accounts; sending, for a particular account identified by one of the aggregation accounts and to a server, a request for access to account data for the particular account; receiving, from the server, data that includes a login credentials field and a Turing test challenge; extracting the Turing test challenge; providing, to an external system that is a different system from the server, the Turing test challenge; receiving, from the external system, a response to the Turing test challenge; providing, to the server, the response to the Turing test challenge; providing, to the server, the login credentials for the particular account; and receiving, from the server, account data for the particular account. | 2019-08-01 |
20190236248 | Multicomputer System for User Data Authentication and Processing - Aspects of the disclosure relate to multicomputer processing and authentication of user data associated with telephone calls. A call security assessment computing platform may receive data associated with a telephone call made from a user computing device. Subsequently, the call security assessment computing platform may parse the received data to identify header information in a Session Initial Protocol (SIP) header. The platform then may analyze the header information to generate a call fingerprint for the telephone call. This call fingerprint may then be transmitted to one or more call authentication computing platforms, which return one or more call security responses that may further characterize security features of the telephone call. The call fingerprint and the call security responses may then be used to determine a call security score, which may be transmitted in a notification to a call handling system in order to adjust how the call is handled. | 2019-08-01 |
20190236249 | SYSTEMS AND METHODS FOR AUTHENTICATING DEVICE USERS THROUGH BEHAVIORAL ANALYSIS - Systems and methods for authenticating a user through behavioral analysis. The methods comprise: collecting observation data specifying an observed behavior of the user while interacting with a computing device; obtaining a confidence value reflecting a degree of confidence that the user is an authorized or unauthorized user of the computing device (where the confidence value is determined based on the observation data and a machine learning model trained with a known behavior pattern of the authorized user); using at least the confidence value and the observed behavior's amount of deviation from a normal behavior pattern to derive a risk level score value for a user account to which the computing device is associated; comparing the risk level score value to a threshold value; and performing at least one action to protect user account security when the threshold value is equal to or greater than the threshold value. | 2019-08-01 |
20190236250 | METHOD FOR GENERATING A HUMAN LIKENESS SCORE - One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores. | 2019-08-01 |
20190236251 | PORTABLE ELECTRONIC DEVICE FOR AUTHENTICATING USER AND SYSTEM AND METHOD ASSOCIATED THEREWITH - The present disclosure relates to a portable electronic device for authenticating a user through a management device and a system and method associated therewith. The portable electronic device includes a collector, an authentication information generator and a communication interface. The collector is configured to collect biometric data of a user. The authentication information generator is configured to generate authentication information according to whether the portable electronic device is within an area pre-set by the management device and based on the biometric data collected by the collector in real time. The communication interface is configured to send the generated authentication information to the management device so as to authenticate whether the user is a registered user of the management device. By collecting relevant data in a distributed manner during the user authentication process, user authentication efficiency is improved, and risk of damage to data collection equipment is reduced. | 2019-08-01 |
20190236252 | BIOMETRIC AUTHENTICATION APPARATUS AND BIOMETRIC AUTHENTICATION METHOD - A biometric authentication apparatus includes an imaging device, a display device, a memory, and a processor configured to display, on a screen of the display device, a guidance indicating a target area to be in contact with a part of a human body, detect whether the part of the human body is in contact with the target area, when the part of the human body is in contact with the target area, determine a distance between the imaging device and another part of the human body in accordance with an image captured by the imaging device, the image including the other part of the human body, and perform a change of a display position of the guidance in accordance with the determined distance. | 2019-08-01 |
20190236253 | PPG Authentication Method and Device - A photoplethysmogram (PPG) authentication method and device, where it is detected whether a terminal currently meets a PPG signal pre-collection trigger condition, and collection of a current PPG signal of a user is triggered only when the PPG signal pre-collection trigger condition is met such that the PPG signal of the user is pre-obtained before an application requests PPG authentication. In this way, when it is detected that the application initiates a PPG authentication request, PPG authentication may be directly performed based on a most recently collected PPG signal, thereby ensuring timeliness of PPG authentication, avoiding resource consumption caused by periodic PPG signal collection, and reducing power consumption. | 2019-08-01 |
20190236254 | AUTHENTICATION TECHNIQUES IN RESPONSE TO ATTEMPTS TO ACCESS SENSITIVE INFORMATION - The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device. | 2019-08-01 |
20190236255 | SYSTEMS AND METHODS FOR CONTROLLING UNITS FOR A SCALE - Systems and methods for controlling measurement units for a medical scale. One system includes a removable head unit configured to couple to a medical scale platform. The removable head unit includes a human machine interface (HMI) and an electronic processor coupled to the human machine interface. The electronic processor is configured to receive, via the HMI, a first user input selecting a permanent lock mode. The electronic processor is configured to, in response to receiving the user input, present a first authentication request and receive a second user input including a first authentication token. The electronic processor is configured to, when the first authentication token is valid, present a measurement unit selection prompt. The electronic processor is configured to receive a second user input selecting a measurement unit and, in response to receiving the second user input, activate the permanent lock mode based on the selected measurement unit. | 2019-08-01 |
20190236256 | ELECTRONIC DEVICE AND METHOD OF STARTING ELECTRONIC DEVICE - According to one embodiment, an electronic device is connectable to other devices. Starting of the electronic device is enabled when the electronic device is connected to a specified device among the other devices, and starting of the electronic device is disabled when the electronic device is not connected to the specified device. | 2019-08-01 |
20190236257 | Identity Proxy for Access Control Systems - A hardware security token in contact with a user's body can send a signal via interbody communication to one or more electronic devices associated with a system of electronic devices having unified access controls such that a user can access each of the electronic devices using the same credentials. The signal sent by the hardware security token can be deputized by a user in possession of credentials to the system as a temporary proxy for that user's identity. In other examples, the signal sent by the portable security token can be deputized by a user in possession of credentials to the system as a temporary proxy for another user's identity. In some embodiments, the proxy can expire after a period of time or after a particular event occurs. | 2019-08-01 |