-
公开(公告)号:US20250050500A1
公开(公告)日:2025-02-13
申请号:US18231189
申请日:2023-08-07
Applicant: International Business Machines Corporation
Inventor: Sarbajit K. Rakshit , Sudheesh S. Kairali , Binoy Thomas
IPC: B25J9/16
Abstract: Described are techniques for assembling products using mobile assembling units. An assembling sequence to assemble products using the mobile assembling units is generated, where an assembling sequence refers to the order of operations performed by the mobile assembling units, including the paths traveled in the assembly plant to selectively pick designated parts from designated part chambers of an array of part chambers, which forms the assembling floor of the assembly plant. Furthermore, such an assembling sequence specifies not only the path to obtain such parts, but also specifies the specific parts to be picked from the specified part chamber, the assembling of such parts, including which mobile assembling units are to perform such assembling, etc. Additionally, the mobile assembling units are programmed to move over the array of part chambers in a particular path to selectively pick designated parts from designated part chambers based on the assembling sequence.
-
公开(公告)号:US20240305662A1
公开(公告)日:2024-09-12
申请号:US18178579
申请日:2023-03-06
Applicant: International Business Machines Corporation
Inventor: Sudheesh S. Kairali , James David Cleaver , Binoy Thomas , Sarbajit K. Rakshit
IPC: H04L9/40
CPC classification number: H04L63/1441 , H04L63/0236 , H04L63/1416
Abstract: Computer-implemented methods, systems and program products extending traditional cloud-centric intrusion detection to edge networks. NIDPS is decentralized between the edge and cloud. Edge gateways equipped with NIDPS agents capture packets of network traffic and pre-process the data. Pre-processing output is compressed and sent to cloud intrusion detection services equipped with latest available rules and signatures. As cloud IDS detects security threats using rules and signatures, NIDPS agents are alerted and switched from “lazy mode” to “preventative mode.” While in preventative mode, NIDPS agents inspect packets of network traffic in accordance with the rules and signatures associated with the detected security threat, dropping packets that trigger the rules and signatures, while still compressing and transmitting other packets to cloud IDS for analysis. Once no active rules or signatures are enforced for pre-set or configured periods of time, NIDPS agents revert back to “lazy mode” to conserve network resources.
-
公开(公告)号:US20240242599A1
公开(公告)日:2024-07-18
申请号:US18154074
申请日:2023-01-13
Applicant: International Business Machines Corporation
Inventor: Sarbajit K. Rakshit , Satyam Jakkula , Sudhanshu Sekher Sar , Sudheesh S. Kairali
CPC classification number: G08G1/0141 , B60K35/00 , B64C39/024 , B64U20/87 , G05D1/104 , B64U2101/20
Abstract: A computer-implemented method, system and program product enabling communication and collaboration between autonomous vehicles and non-autonomous driving along a shared roadway. Autonomous vehicles having difficulty traveling along the roadway or making driving decisions due to the presence of non-autonomous vehicles request deployment of unmanned aerial vehicles (UAV). Based on the current driving conditions, the number of non-autonomous vehicles and other factors, a number of UAVs are deployed and attached to the non-autonomous vehicles. The UAVs scan the surrounding environment and nearby vehicles within the environment. UAVs transmit scanned images, sensor data and other information to the nearby autonomous vehicles which generate driving decisions based on the data collection of the autonomous vehicle in conjunction with data provided by UAVs. Driving decisions of autonomous vehicles are transmitted to the UAVs. UAVs project the driving decisions of autonomous vehicles onto windshields, HUDs or display systems of the attached non-autonomous vehicle.
-
4.
公开(公告)号:US20240201674A1
公开(公告)日:2024-06-20
申请号:US18082483
申请日:2022-12-15
Applicant: International Business Machines Corporation
IPC: G05B19/418 , G06T19/00
CPC classification number: G05B19/41885 , G06T19/00
Abstract: A computer-implemented method, according to one approach, includes identifying machines involved in performance of a manufacturing process at a manufacturing location, and identifying a workflow sequence of execution of the machines. Conditions associated with remote operators using virtual reality (VR) devices to remotely control the machines to perform the workflow sequence of execution at the manufacturing location are received. The method further includes determining, for each of the VR devices, an extent of a VR collaborative environment to display. The extents are determined based on the conditions, thereby reducing latency in performance of the workflow sequence of execution at the manufacturing location. The method further includes outputting the extents to the VR devices.
-
公开(公告)号:US20240171466A1
公开(公告)日:2024-05-23
申请号:US18056364
申请日:2022-11-17
Applicant: International Business Machines Corporation
Inventor: Malarvizhi Kandasamy , Sudheesh S. Kairali , Sarbajit K. Rakshit
IPC: H04L41/0895 , H04L43/04
CPC classification number: H04L41/0895 , H04L43/04
Abstract: Embodiments of the present invention provide an approach for dynamically harmonizing a management configuration of a cloud environment in a cloud environment based on policy or best practices updates. Specially, the system and method provide for an automatically evolving Infrastructure as Code (IaC) based on policy, best practices changes, and a recommendation service to assist in updating IaC configuration code in order to prevent a potential service request failure.
-
公开(公告)号:US20240123843A1
公开(公告)日:2024-04-18
申请号:US18047303
申请日:2022-10-18
Applicant: International Business Machines Corporation
Inventor: Sarbajit K. Rakshit , Satyam Jakkula , Sudheesh S. Kairali , Sudhanshu Sekher Sar
IPC: B60L53/126 , B60L53/36 , B60L53/66 , B64C39/02
CPC classification number: B60L53/126 , B60L53/36 , B60L53/66 , B64C39/024 , B60L2200/10 , B64C2201/066 , B64C2201/128
Abstract: Computer-implemented methods for wireless power transfer among multiple vehicles are provided. Aspects include identifying a group of vehicles, from a plurality of vehicles, that require charging and identifying a wireless charging capability of each vehicle of the group of vehicles. Aspects also include deploying wireless power chargers to the vehicles of the group of vehicles that do not have wireless charging capability and charging each vehicle of the group of vehicles using a wireless power transfer module. The charging of the group of vehicles is performed while the vehicles are in motion.
-
公开(公告)号:US11822551B2
公开(公告)日:2023-11-21
申请号:US17462288
申请日:2021-08-31
Applicant: International Business Machines Corporation
Inventor: Hariharan Krishna , Shajeer K Mohammed , Sudheesh S. Kairali
IPC: G06F16/2455 , G06F16/27 , G06F16/23 , G06F16/215
CPC classification number: G06F16/24552 , G06F16/215 , G06F16/2379 , G06F16/27
Abstract: An approach is provided that receives a request to write an entry to a database. Database caches are then checked for a portion of the entry, such as a portion that includes a primary key. Based on the checking, the approach determines whether to write the entry to the database. In response to the determination being that the entry cannot be written to the database, an error is returned with the error being returned without accessing the database, only the caches. On the other hand, the entry is written to the database in response to the determination being that the entry can be written to the database.
-
公开(公告)号:US20230297427A1
公开(公告)日:2023-09-21
申请号:US17697997
申请日:2022-03-18
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Sudheesh S. Kairali , Sarbajit K. Rakshit
IPC: G06F9/50
CPC classification number: G06F9/5027
Abstract: Described are techniques for confidentiality-based intelligent task routing, including an intelligent routing method. The method may comprise processing, by a first instance of an application, a plurality of tasks at a high security level, receiving a new task from a user, and determining that the first instance cannot process the new task. The method may further comprise, in response to determining that the first instance cannot process the new task, analyzing the new task to determine an associated confidentiality level, creating a second instance of the application to process the new task at the associated confidentiality level, and processing the new task using the second instance at the associated confidentiality level.
-
公开(公告)号:US20230231786A1
公开(公告)日:2023-07-20
申请号:US17648530
申请日:2022-01-20
Applicant: International Business Machines Corporation
Inventor: Sudheesh S. Kairali , Sarbajit K. Rakshit
IPC: H04L43/0852
CPC classification number: H04L43/0852
Abstract: In an approach to optimize server connection timeout errors in a cloud environment, embodiments create a knowledge corpus associated with connection timeout patterns based on historical learning of transaction parameters and predicts a criticality of a transaction based on one or more identified contextual situations. Further, embodiments dynamically adjust a connection timeout range of the transaction based on the predicted criticality and one or more identified contextual situations of the transaction, and selectively identify a connection timeout range for the transaction based on an evaluation of the one or more contextual situations. Additionally, embodiments analyze generated timeout errors on a remote server from within a service mesh, and adjust timeout values of the transaction based on the analyzed generated timeouts errors. Responsive to the transaction receiving a timeout error, embodiments output a recommended timeline detailing when the transaction can be reinitiated.
-
公开(公告)号:US20230216890A1
公开(公告)日:2023-07-06
申请号:US17568805
申请日:2022-01-05
Applicant: International Business Machines Corporation
IPC: H04L9/40
Abstract: An approach for dynamically transitioning mobile client devices from one location to another within edge computing is disclosed. The approach includes retrieving locations for near edges and far edges and collecting one or more SCC(security compliance center) rules. The approach includes identifying edge access from one or more client devices and determining mobility pattern associated with the edge access. The approach includes determining edge recommendation based on the mobility patterns and applying the edge recommendation.
-
-
-
-
-
-
-
-
-