474 patents
Page 5 of 24
Utility
Intelligent network operation platform for network fault mitigation
1 Aug 23
Embodiments of the present disclosure provide systems, methods, and computer-readable storage media that leverage artificial intelligence and machine learning to identify, diagnose, and mitigate occurrences of network faults or incidents within a network.
Sanjay Tiwari, Shantha Maheswari, Surya Kumar Ivg, Mathangi Sandilya, Gaurav Khanduri, Shubhashis Sengupta, Marcio Miranda Theme, Badarayan Panigrahi, Tarang Kumar
Filed: 20 Dec 21
Utility
Utilizing computer vision and machine learning models for determining utilization metrics for a space
1 Aug 23
In some implementations, a device may receive image data identifying images of a space with racks and objects stored on the racks.
Samantha Kingman Lee, Marc Bosch Ruiz, Paul Michael Ott, Vijay Raman
Filed: 3 Dec 20
Utility
Utilizing machine learning models to provide cognitive speaker fractionalization with empathy recognition
1 Aug 23
A device may receive audio data identifying a plurality of speakers and may process the audio data, with a plurality of clustering models, to identify a plurality of speaker segments.
Mohit Chawla, Balaji Janarthanam, Dinesh Vijayakumar, Sanjay Tiwari, Ashwini Purushothaman, Bhavika Sehgal, Rajesh Gala, Saran Prasad, Vinu Varghese, Mohit Mahajan, Badarayan Panigrahi
Filed: 31 Mar 21
Utility
Enhanced application performance framework
25 Jul 23
This document describes a framework for measuring and improving the performance of applications, such as distributed applications and web applications.
Tri Phi Minh Nguyen, Jagaran Das, Sekhar A. Badugu, Prudhvi Laxmi Narayana Chelluri, Prasun Chandra, Anuruddha S. Khastgir
Filed: 28 Jun 21
Utility
Secure data broker
25 Jul 23
The present disclosure is directed to for secure data access between multiple entities, and includes actions of receiving, by a secure file storage system, a set of metafiles including one or more metafiles that define actions to be performed and conditions to be satisfied before granting a first system use of data that is resident at a second system, the set of metafiles being provided by the second system, receiving, by the secure file storage system and from a central exchange, an indication that the actions are performed and the conditions are satisfied for use of the data by the first system, wherein the central exchange accesses the set of metafiles from the secure file storage without accessing the data, and in response to the indication, permitting use of the data by the first system.
Eric J Kraemer
Filed: 2 Apr 20
Utility
Dynamic and unscripted virtual agent systems and methods
25 Jul 23
Systems and methods that offer significant improvements to current chatbot conversational experiences are disclosed.
Shubhashis Sengupta, Ankur Gakhar, Sarvesh Maheshwari, Roshni Ramesh Ramnani
Filed: 24 Aug 20
Utility
Complex system for meta-graph facilitated event-action pairing
25 Jul 23
A system maintains a knowledge layout to support the building of event response recommendations.
Neda Abolhassani, Teresa Sheausan Tung, Mohamad Mehdi Nasr-Azadani, Sonali Parthasarathy, Reymonrod Geli Vasquez, Colin Anil Puri, Mark Joseph Portelli, Jonathan Tipper
Filed: 13 Nov 20
Utility
Predictive maintenance of equipment
18 Jul 23
A system and method for facilitating predictive maintenance of an equipment is disclosed.
Anirudh Shrivastav, Vinay Avinash Dorle, Manu Khanna, Santosh Kumar Soni, Theerthala Sarma Siva Rama Sarma, Vikash Choudhary, Lokesh Dharmane
Filed: 31 Aug 21
Utility
Benchmarking for automated task management
18 Jul 23
A device may detect a trigger to perform a benchmarking task.
Bhaskar Ghosh, Mohan Sekhar, Vijayaraghavan Koushik, John Hopkins, Rajendra T. Prasad, Mark Lazarus, Krupa Srivastava
Filed: 15 Dec 17
Utility
Multi-dimensional model merge for style transfer
18 Jul 23
Implementations are directed to receiving a target object model representative of a target object, receiving a source object model representative of a source object, defining a set of target segments and a set of source segments using a segmentation machine learning (ML) model, for each target segment and source segment pair in a set of target segment and source segment pairs, generating a compatibility score representing a degree of similarity between a target segment and a source segment, the compatibility score calculated based on global feature representations of each of the target segment and the source segment, each global feature representation determined from a ML model, selecting a source segment for style transfer based on compatibility scores, and merging the source segment into the target object model to replace a respective target segment within the target object model and providing a stylized target object model.
Kumar Abhinav, Suma Mani Kuriakose, Alpana A. Dubey
Filed: 6 Nov 20
Utility
Visual content optimization system using artificial intelligence (AI) based design generation and validation
11 Jul 23
A system for providing visual content optimization is disclosed.
Christian Souche, Edouard Mathon, Richard Vidal
Filed: 7 Oct 20
Utility
Quantum recommendation system
11 Jul 23
Methods, systems, and apparatus for improving recommendation systems.
Valter Eduardo da Silva JĂșnior, Renato Moura Dantas, Paulo Victor de Sousa Moura
Filed: 30 Aug 19
Utility
Enhanced selection of cloud architecture profiles
11 Jul 23
This document describes modeling and simulation techniques to select a cloud architecture profile based on correlations between application workloads and resource utilization.
Bhaskar Ghosh, Kishore P. Durg, Jothi Gouthaman, Radhika Golden, Mohan Sekhar, Mahesh Venkataraman
Filed: 23 Apr 21
Utility
Quantum computing in root cause analysis of 5G and subsequent generations of communication networks
4 Jul 23
Methods, systems, and apparatus for root cause analysis in a communication network.
Sanjay Tiwari, Gaurav Khanduri, Mayur Kolhe, Carl Matthew Dukatz, Kung-Chuan Hsu, Shantha Maheswari, Mathangi Sandilya, Anshul Kapoor
Filed: 7 Jan 21
Utility
Evaluating effectiveness of security controls in enterprise networks using graph values
4 Jul 23
Implementations are directed to an agile security platform for enterprise-wide cyber-security and performing actions of receiving, from an agile security platform, analytical attack graph (AAG) data representative of one or more AAGs, each AAG representing one or more lateral paths within an enterprise network for reaching a target asset from one or more assets within the enterprise network, determining, for each instance of a plurality of instances of the AAG, a graph value representing a measure of hackability of the enterprise network at respective times, providing a profile of the enterprise network based on a set of graph values determined for instances of the AAG, the profile representing changes in graph values over time, determining an effectiveness of one or more security controls based on the profile, and selectively executing one or more remedial actions in response to the effectiveness.
Eitan Hadar, Dani Grabois
Filed: 10 Jul 20
Utility
Quality of service manager for network slices of a network
4 Jul 23
A device determines, from a network slice template associated with a network slice, a quality of service (QoS) profile for the network slice that includes performance metrics for corresponding QoS parameters associated with providing a service.
Sanjay Tiwari, Shantha Maheswari, Badarayan Panigrahi, Mathangi Sandilya, Gaurav Khanduri, Shihab Ponnampadikkal Abdul Rahiman
Filed: 22 Jun 20
Utility
Machine learning (ML) powered programming code transformations
4 Jul 23
A machine learning (ML) based code transformation system that transforms a source programming code developed using a source library for execution on a source platform into remediated code for execution on a target platform is disclosed.
Srikanth G Rao, Arunabh Sinha, Mathangi Sandilya, Nitima Singhal, Anup Kumar Tiwary, Anand Vijendra
Filed: 22 Mar 22
Utility
Network-based solution module deployment platform
4 Jul 23
The present invention provides a deployment platform that enables solution modules to be created and deployed without writing new code.
Lisa Suzanne Wilson, Hossam Elhoseiny Elsherif, Tegbir Singh Harika, Anurag Goel, Arjyo Ajoy Banerjee, Radhai Sivaraman, Rahul Jaiswal, Dhiren Desai
Filed: 5 Aug 21
Utility
Green cloud computing recommendation system
4 Jul 23
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating customized recommendations for environmentally-conscious cloud computing frameworks for replacing computing resources of existing datacenters.
Vibhu Sharma, Vikrant Kaulgud, Mainak Basu, Sanjay Podder, Kishore P. Durg, Sundeep Singh, Rajan Dilavar Mithani, Akshay Kasera, Swati Sharma, Priyavanshi Pathania, Adam Patten Burden, Pavel Valerievich Ponomarev, Peter Michael Lacy, Joshy Ravindran
Filed: 4 Feb 22
Utility
Approaches for knowledge graph pruning based on sampling and information gain theory
4 Jul 23
Knowledge graph systems are disclosed for implementing multiple approaches, including stand alone or combined approaches, for knowledge graph pruning.
Teresa Sheausan Tung, Colin Anil Puri, Zhijie Wang
Filed: 24 Jul 19