Drone management data structure
    3.
    发明授权

    公开(公告)号:US11151885B2

    公开(公告)日:2021-10-19

    申请号:US16427180

    申请日:2019-05-30

    IPC分类号: G08G5/00

    摘要: One embodiment provides a method comprising maintaining a multi-dimensional data structure partitioned into cells utilizing a tree data structure (“tree”) comprising intervals for each dimension of a multi-dimensional space. To partition an interval for a node of the tree into multiple subintervals, multiple leaf nodes (“leaves”) are generated, each leaf descending from the node. To merge multiple intervals for multiple nodes of the tree, a parent node (“parent”) and multiple leaves descending from the parent are generated, the parent and the leaves are time constrained, and the leaves are scheduled for a merger. When transient data in cells included in a list that corresponds to a leaf scheduled for merger expires, each cell in the list is converted into a cell for inclusion in a different list corresponding to a parent of the leaf, each leaf of the parent removed, and the parent turned into a leaf.

    Mobile multi-party digitally signed documents and techniques for using these allowing detection of tamper

    公开(公告)号:US11025643B2

    公开(公告)日:2021-06-01

    申请号:US16372593

    申请日:2019-04-02

    IPC分类号: G06F21/64 H04L29/06 H04L9/32

    摘要: Authenticated base digital document(s) are issued to client(s) by an issuing party, and aggregate digital document(s) are received. An aggregate digital document includes base digital document(s) and attachment(s). Authenticity of the aggregate digital document(s) is verified, resulting in authenticated aggregate digital document(s), which are stored and/or redistributed. Authentication challenge(s) are sent by a verifying party to a client requesting part or all of an aggregate digital document from the client be verified. The part or all of the aggregate digital document is received and authenticity and integrity are verified, resulting in an authenticated aggregate digital document. The client verifies authenticity of a base digital document and receives the authentication challenge(s) for an authenticated aggregate digital document and sends part or all of the authenticated aggregate digital document to the verifying party for verification by the verifying party.

    Cognitive progressive method and system for deploying indoor location sensor networks

    公开(公告)号:US10798527B2

    公开(公告)日:2020-10-06

    申请号:US16137316

    申请日:2018-09-20

    摘要: Cognitive, progressive methods, systems, and computer program products for guiding users throughout a deployment process involving deploying location sensors throughout an indoor environment based on real-time detection of signals from deployed location sensors and/or distances between location sensors are disclosed, according to various embodiments. The inventive concepts allow real-time sensing and adjustment to the nature of the environment, such as geometry, signal interference, etc. based on sensor readings detected by a user using a sensing device. Additional embodiments include generating a map of the environment based on training data including location sensor signal measurements, identifying information, and location information and static data regarding location sensors deployed throughout the environment. Connections are established between the static and training data, and region types within the environment determined and labeled based on the density of different types of connections and/or connection crossings. The labeled regions are output as a map.

    PROACTIVE RISK ANALYSIS AND GOVERNANCE OF UPGRADE PROCESS
    9.
    发明申请
    PROACTIVE RISK ANALYSIS AND GOVERNANCE OF UPGRADE PROCESS 有权
    主动风险分析和升级过程的治理

    公开(公告)号:US20150242302A1

    公开(公告)日:2015-08-27

    申请号:US14708753

    申请日:2015-05-11

    IPC分类号: G06F11/36 G06F11/30 G06F11/34

    摘要: An incompatible software level of an information technology infrastructure component is determined by comparing collected inventory information to a minimum recommended software level. If a knowledge base search finds that the incompatible software level is associated with a prior infrastructure outage event, an outage count score is determined for the incompatible software level by applying an outage rule to a historic count of outages caused by a similar incompatible software level, and combined with an average outage severity score assigned to the incompatible software level based on a level of severity of an actual historic failure of the component within a context of the infrastructure to generate a normalized historical affinity risk score. The normalized historical affinity risk score is provided for prioritizing the correction of the incompatible software level in the context of other normalized historical risk level scores of other determined incompatible software levels.

    摘要翻译: 通过将收集的库存信息与最低推荐的软件级别进行比较来确定信息技术基础架构组件的不兼容的软件级别。 如果知识库搜索发现不兼容的软件级别与先前的基础设施中断事件相关联,则通过将中断规则应用于由类似的不兼容软件级引起的历史计数的中断来确定不兼容软件级别的中断计数分数, 并且基于分配给不兼容软件级别的平均中断严重性得分,基于在基础设施的上下文内的组件的实际历史性故障的严重性级别,以产生归一化的历史亲和度风险评分。 提供归一化的历史亲和度风险分数,用于在其他确定的不兼容软件级别的其他归一化历史风险级别分数的上下文中对不兼容软件级别的校正进行优先级排序。

    Empathetic query response using mixture of experts

    公开(公告)号:US12105745B2

    公开(公告)日:2024-10-01

    申请号:US18156465

    申请日:2023-01-19

    摘要: Systems and techniques that facilitate empathetic or emotional query response are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory that can execute the computer executable components stored in memory. The computer executable components can comprise a first machine learning model that generates a first response portion, wherein the first response portion comprises a technical response to the input query, and a second machine learning model that generates a second response portion, wherein the second response portion comprises an empathetic or emotional response to the emotion portion of the input query.