ASSEMBLING PRODUCTS IN AN ASSEMBLY PLANT USING MOBILE ASSEMBLING UNITS

    公开(公告)号:US20250050500A1

    公开(公告)日:2025-02-13

    申请号:US18231189

    申请日:2023-08-07

    Abstract: Described are techniques for assembling products using mobile assembling units. An assembling sequence to assemble products using the mobile assembling units is generated, where an assembling sequence refers to the order of operations performed by the mobile assembling units, including the paths traveled in the assembly plant to selectively pick designated parts from designated part chambers of an array of part chambers, which forms the assembling floor of the assembly plant. Furthermore, such an assembling sequence specifies not only the path to obtain such parts, but also specifies the specific parts to be picked from the specified part chamber, the assembling of such parts, including which mobile assembling units are to perform such assembling, etc. Additionally, the mobile assembling units are programmed to move over the array of part chambers in a particular path to selectively pick designated parts from designated part chambers based on the assembling sequence.

    NETWORK INTRUSION PREVENTION IN EDGE COMPUTING ENVIRONMENTS

    公开(公告)号:US20240305662A1

    公开(公告)日:2024-09-12

    申请号:US18178579

    申请日:2023-03-06

    CPC classification number: H04L63/1441 H04L63/0236 H04L63/1416

    Abstract: Computer-implemented methods, systems and program products extending traditional cloud-centric intrusion detection to edge networks. NIDPS is decentralized between the edge and cloud. Edge gateways equipped with NIDPS agents capture packets of network traffic and pre-process the data. Pre-processing output is compressed and sent to cloud intrusion detection services equipped with latest available rules and signatures. As cloud IDS detects security threats using rules and signatures, NIDPS agents are alerted and switched from “lazy mode” to “preventative mode.” While in preventative mode, NIDPS agents inspect packets of network traffic in accordance with the rules and signatures associated with the detected security threat, dropping packets that trigger the rules and signatures, while still compressing and transmitting other packets to cloud IDS for analysis. Once no active rules or signatures are enforced for pre-set or configured periods of time, NIDPS agents revert back to “lazy mode” to conserve network resources.

    INTELLIGENT COLLABORATION BETWEEN AUTONOMOUS AND NON-AUTONOMOUS VEHICLES

    公开(公告)号:US20240242599A1

    公开(公告)日:2024-07-18

    申请号:US18154074

    申请日:2023-01-13

    Abstract: A computer-implemented method, system and program product enabling communication and collaboration between autonomous vehicles and non-autonomous driving along a shared roadway. Autonomous vehicles having difficulty traveling along the roadway or making driving decisions due to the presence of non-autonomous vehicles request deployment of unmanned aerial vehicles (UAV). Based on the current driving conditions, the number of non-autonomous vehicles and other factors, a number of UAVs are deployed and attached to the non-autonomous vehicles. The UAVs scan the surrounding environment and nearby vehicles within the environment. UAVs transmit scanned images, sensor data and other information to the nearby autonomous vehicles which generate driving decisions based on the data collection of the autonomous vehicle in conjunction with data provided by UAVs. Driving decisions of autonomous vehicles are transmitted to the UAVs. UAVs project the driving decisions of autonomous vehicles onto windshields, HUDs or display systems of the attached non-autonomous vehicle.

    CONFIDENTIALITY BASED INTELLIGENT TASK ROUTING

    公开(公告)号:US20230297427A1

    公开(公告)日:2023-09-21

    申请号:US17697997

    申请日:2022-03-18

    CPC classification number: G06F9/5027

    Abstract: Described are techniques for confidentiality-based intelligent task routing, including an intelligent routing method. The method may comprise processing, by a first instance of an application, a plurality of tasks at a high security level, receiving a new task from a user, and determining that the first instance cannot process the new task. The method may further comprise, in response to determining that the first instance cannot process the new task, analyzing the new task to determine an associated confidentiality level, creating a second instance of the application to process the new task at the associated confidentiality level, and processing the new task using the second instance at the associated confidentiality level.

    ENHANCING SOFTWARE APPLICATION HOSTING IN A CLOUD ENVIRONMENT

    公开(公告)号:US20230231786A1

    公开(公告)日:2023-07-20

    申请号:US17648530

    申请日:2022-01-20

    CPC classification number: H04L43/0852

    Abstract: In an approach to optimize server connection timeout errors in a cloud environment, embodiments create a knowledge corpus associated with connection timeout patterns based on historical learning of transaction parameters and predicts a criticality of a transaction based on one or more identified contextual situations. Further, embodiments dynamically adjust a connection timeout range of the transaction based on the predicted criticality and one or more identified contextual situations of the transaction, and selectively identify a connection timeout range for the transaction based on an evaluation of the one or more contextual situations. Additionally, embodiments analyze generated timeout errors on a remote server from within a service mesh, and adjust timeout values of the transaction based on the analyzed generated timeouts errors. Responsive to the transaction receiving a timeout error, embodiments output a recommended timeline detailing when the transaction can be reinitiated.

Patent Agency Ranking