-
公开(公告)号:US12113754B1
公开(公告)日:2024-10-08
申请号:US18381077
申请日:2023-10-17
发明人: Jun Su , Yang Liang , Su Liu , Karen Beale
摘要: A computer-implemented method, according to various approaches, includes parsing a first collection of data into a plurality of elements. A first sub-set of the elements includes text entry data and a second sub-set of the elements includes IoT data. In response to a determination that the text entry data does not satisfy a predetermined threshold of specificity, the first collection of data is rephrased into a second collection of data. The method further includes causing the second collection of data to be sent to a determined chatbot server and causing a first output of the determined chatbot server to be returned to a first user device. The first output is an answer to the second collection of data.
-
公开(公告)号:US11947561B2
公开(公告)日:2024-04-02
申请号:US17807884
申请日:2022-06-21
发明人: Peng Hui Jiang , Jun Su , Sheng Yan Sun , Hong Mei Zhang , Meng Wan
IPC分类号: G06F16/25 , G06F16/21 , G06F16/242 , G06F16/28
CPC分类号: G06F16/258 , G06F16/211 , G06F16/2433 , G06F16/254 , G06F16/284
摘要: An embodiment for analyzing and tracking data flow to determine proper schemas for unstructured data. The embodiment may automatically use a sidecar to collect schema discovery rules during conversion of raw data to unstructured data. The embodiment may automatically generate multiple schemas for different tenants using the collected schema discovery rules. The embodiment may automatically use ETL to export unstructured data to SQL databases with the generated multiple schemas for the different tenants. The embodiment may automatically monitor usage data of the SQL databases and collect the usage data. The embodiment may automatically optimize schema discovery using the collected usage data. The embodiment may automatically discover schemas with hot usage and apply the discovered schemas with hot usage to other tenants for consumption and further monitoring.
-
公开(公告)号:US20240062069A1
公开(公告)日:2024-02-22
申请号:US17891430
申请日:2022-08-19
发明人: Peng Hui Jiang , Sheng Yan Sun , Jun Su , Su Liu , Jeremy R. Fox , Hamid Majdabadi
IPC分类号: G06N3/092
CPC分类号: G06N3/092
摘要: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include training a model. The operations may include enhancing the model with reinforcement learning and improving stability of the model with a graph neural network model. The operations may include predicting, with the model, a resource cost of a node and deploying the node.
-
公开(公告)号:US11893257B2
公开(公告)日:2024-02-06
申请号:US17840762
申请日:2022-06-15
发明人: Peng Hui Jiang , FengLi Wang , Qi Feng Huo , Jun Su , Hong Qing Zhou , Yan Lin Ren , Li Zhang , Ling Ling Sh Hu
IPC分类号: G06F3/06
CPC分类号: G06F3/0646 , G06F3/0604 , G06F3/064 , G06F3/0673
摘要: A system may include a memory and a processor in communication with the memory configured to perform operations. The may operations include obtaining transaction logs in blocks from nodes of a data storage system. The operations may include, for each transaction log, splitting the transaction log into log entries, grouping log entries into groups associated with a same data source, and writing the log entries of the groups to empty blocks such that log entries from different groups do not share a same block. The operations may include identifying a same sequence of log entries from the written transaction logs and uploading first blocks of a first transaction log, including the same sequence of log entries, to an object-based storage without uploading second blocks of a second transaction log including the same sequence of log entries to the object-based storage.
-
公开(公告)号:US20240004723A1
公开(公告)日:2024-01-04
申请号:US17809570
申请日:2022-06-29
发明人: Peng Hui Jiang , ZHI LI GUAN , Jun Su , Kun Yang , Yun Diao , Shi Su
CPC分类号: G06F9/5088 , G06F9/5066 , G06N5/02
摘要: Workflow optimization and re-distribution involves a target task set that is determined from a plurality of tasks in a workflow and based on a data flow of the workflow. The target task set is re-distributed to obtain at least one re-distributed task set. Each re-distributed task set indicates a respective data path different from a data path of the target task set and has a same function as the target task set. A simulated data flow for the at least one re-distributed task set is obtained by simulating data flowing in at least one data path indicated by the at least one re-distributed task set. An optimized task set for the target task set is determined based on the simulated data flow for the at least one re-distributed task set.
-
公开(公告)号:US11829394B2
公开(公告)日:2023-11-28
申请号:US17198802
申请日:2021-03-11
发明人: Peng Hui Jiang , Jun Su , Dong Chen , Huai Ying Hy Xia , Su Liu
CPC分类号: G06F16/328 , G06F16/162 , G06F16/27 , G06F16/3331
摘要: An embodiment includes receiving a request to delete a specified document from a primary shard of a sharded database. The embodiment also includes inserting a soft-deletion document to a soft-deletion shard, wherein the soft-deletion document identifies the specified document, which remains in the primary shard. The embodiment also includes receiving a query from a client application, wherein the specified document satisfies the query. The embodiment also includes blocking the specified document from being returned in response to the query while the soft-deletion document associated with the specified document remains in the soft-deletion shard.
-
公开(公告)号:US11675575B2
公开(公告)日:2023-06-13
申请号:US17931678
申请日:2022-09-13
发明人: Wen Ji Huang , Xiao Ling Chen , Sheng Shuang Li , Wen Bin Han , Jun Su
摘要: A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.
-
公开(公告)号:US20220417250A1
公开(公告)日:2022-12-29
申请号:US17361540
申请日:2021-06-29
发明人: Feng Zhang , Peng Hui Jiang , TING YIN , Jun Su , Zhe Hua Peng
IPC分类号: H04L29/06
摘要: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
-
公开(公告)号:US20210248022A1
公开(公告)日:2021-08-12
申请号:US16783652
申请日:2020-02-06
发明人: Yu Zhuang , Bo Chen Zhu , Xu Liu , Jun Su , Xu Bin Liu
摘要: An approach is provided in which a set of provision information is generated from a set of provisioners that are in process of fulfilling a client's provision request. The approach creates a set of provision events based on the set of provision information and, in response to detecting a failure of the provision request, the approach generates a provision chain from the set of provision events. The provision chain links the set of provision events based on correlation rules and identifies at least one isolation point of the failure. The approach informs the client of the at least one isolation point of the failure identified in the provision chain.
-
公开(公告)号:US10298690B2
公开(公告)日:2019-05-21
申请号:US15403062
申请日:2017-01-10
发明人: Su Liu , Jun Su , John D. Wilson , Yin Xia
摘要: Techniques are disclosed for initiating an electronic file transfer between users based on conversational context. A mobile device associated with a user detects a communication between that user and another user. A relationship between the users is determined from a profile. The relationship indicates that the users are authorized to transfer a file between mobile devices. Upon determining that a relationship exists between the users, the communication is sent to a network service. The network service evaluates the communication for an intention to transfer a file between the users.
-
-
-
-
-
-
-
-
-