-
公开(公告)号:US12237079B2
公开(公告)日:2025-02-25
申请号:US17474681
申请日:2021-09-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Steven Lee Fisher-Stawinski , Moitreyee Mukherjee-Roy , Scott E. Schneider , Shikhar Kwatra
Abstract: According to one embodiment, a method, computer system, and computer program product for tracking positions and characteristics of one or more individuals in proximity to a user to dynamically assess a threat of physiological harm to the user is provided. The present invention may include identifying, by one or more sensors integrated into one or more wearable devices on the person of a user, one or more individuals in proximity to the user; generating a dynamic threshold corresponding to each of the one or more individuals; responsive to identifying one or more characteristics of the individual, updating the dynamic threshold; and responsive to a distance between an individual of the one or more individuals and the user falling below the dynamic threshold associated with the individual, transmitting an alert to the user.
-
公开(公告)号:US20250061155A1
公开(公告)日:2025-02-20
申请号:US18235173
申请日:2023-08-17
Applicant: International Business Machines Corporation
Inventor: Shikhar Kwatra , Jeremy R. Fox , Raghuveer Prasad Nagar , Parvathy Rajeev
IPC: G06F16/907 , G06F16/906
Abstract: An embodiment includes loading a plurality of data sources where each data source is comprised of content of interest. The embodiment also includes scanning the plurality of data sources for the content of interest. The embodiment also includes detecting the content of interest from scanning the plurality of data sources where detecting is based on a key word search. The embodiment also includes organizing the content of interest as data elements, based on a topic modeling technique. The embodiment also includes distributing the data elements into a plurality of topics based on a Latent Dirichlet Allocation technique. The embodiment also includes merging the data elements within each of the topics. The embodiment also includes generating a document with the topics into one or more filtered lists, based on the key word search.
-
公开(公告)号:US12229304B2
公开(公告)日:2025-02-18
申请号:US17307553
申请日:2021-05-04
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Indervir Singh Banipal , Shikhar Kwatra , Park Foreman , Caleb Miles
Abstract: Secure data analytics is provided via a process that identifies sensitive data fields of an initial dataset and mappings between the sensitive data fields and other data fields of the dataset, where analytics processing is to be performed on the initial dataset, then, based on an expectation of data fields, of the initial data set, to be used in performance of the analytics processing and on the identified sensitive data fields, selects and applies a masking method to the initial dataset to mask the sensitive data fields and produce a masked dataset, provides the masked dataset to an analytics provider with a request for the analytics processing, and receives, in response, a generated analytics function, generated based on the masked dataset, that is configured to perform the analytics processing, and invokes the generated analytics function against the initial dataset to perform the analytics processing on the initial dataset.
-
4.
公开(公告)号:US12147803B2
公开(公告)日:2024-11-19
申请号:US17944377
申请日:2022-09-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Shikhar Kwatra , Richard Daniel Gunjal , Tiberiu Suto , Pedro Andres Guzman Benavides , Nadiya Kochura
Abstract: Aspects of the present disclosure relate generally to software development environments and, more particularly, to systems, computer program products, and methods of automating software development, security, and operations (DevSecOps). For example, a computer-implemented method includes receiving, by a processor, a plurality of infrastructure as code files specifying a configuration of a runtime environment for a deployable image of source code in a continuous integration and continuous delivery pipeline for a cloud platform; generating, by the processor, compliance code for at least one file of the plurality of infrastructure as code files; building, by the processor, the deployable image of the source code in the continuous integration and continuous delivery pipeline according to the configuration specified by the plurality of infrastructure as code files and the compliance code; and deploying, by the processor, an instance of the image in the runtime environment.
-
公开(公告)号:US12141212B2
公开(公告)日:2024-11-12
申请号:US16802314
申请日:2020-02-26
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Indervir Singh Banipal , Shikhar Kwatra , Raghuveer Prasad Nagar , Jeremy R. Fox
IPC: G06F16/95 , G06F16/951 , G06N20/00
Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: obtaining user browsing data from a browser plugin of a client computer device, the client computing device being associated to the user; examining the user browsing data; classifying a current activity of the user in dependence on the examining the user browsing data, wherein the classifying includes classifying the current activity of the user as searching for a service provider; in response to classifying the current activity of the user as searching for a service provider, performing web crawling on multiple websites to obtain research data, wherein the multiple websites are crawled by the performing web crawling in dependence on extracted data extracted by the examining the user browsing data; and providing an action decision in dependence on the research data, wherein the action decision includes a decision to transmit a communication to the user on behalf of a certain service provider.
-
公开(公告)号:US12093975B2
公开(公告)日:2024-09-17
申请号:US17029777
申请日:2020-09-23
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Craig M. Trim , John D. Wilson , Shikhar Kwatra , Jeremy R. Fox
IPC: G06Q30/0242
CPC classification number: G06Q30/0244
Abstract: A method, computer system, and computer program product for asynchronous content embedding is provided. The embodiment may include receiving a plurality of text and data associated with an element of media content. The embodiment may also include displaying the plurality of received text on a display screen. The embodiment may further include caching the received data until all data to fully display the element is received. The embodiment may also include identifying an insertion point for the element within the plurality of displayed text. The embodiment may further include displaying the element at the insertion point.
-
公开(公告)号:US20240296176A1
公开(公告)日:2024-09-05
申请号:US18117281
申请日:2023-03-03
Applicant: International Business Machines Corporation
Inventor: Aaron K. Baughman , Shikhar Kwatra , Iranna Dharmaraya Ankad , Utpal Mangla
IPC: G06F16/332 , G06F9/54 , G06F40/274
CPC classification number: G06F16/3322 , G06F9/543 , G06F40/274
Abstract: Using a probability distribution and a search result history, a probability of selecting a specified number of relevant samples and a specified number of irrelevant samples from a set of contents is computed, each content in the set of contents comprising a content copied to a first system clipboard of a first device. Using the probability distribution, each content in the set of contents is weighted. Using the weighted set of contents, a set of predicted searches is generated. The set of predicted searches is presented for selection responsive to an indication of intent to perform a search. A selected search within the set of predicted searches is caused to be performed.
-
公开(公告)号:US12008120B2
公开(公告)日:2024-06-11
申请号:US17339826
申请日:2021-06-04
Applicant: International Business Machines Corporation
Inventor: Craig M. Trim , Shikhar Kwatra , Bennet Prabhu , Jayabalan Arumugam
CPC classification number: G06F21/6209 , G06F11/1004 , G06F18/23 , G06F21/602 , G06F40/205 , G06N20/20
Abstract: Techniques are described relating to data distribution and security in a multilayer storage infrastructure. An associated computer-implemented method includes receiving file data associated with a user for storage in a managed services domain, applying an ensemble learning model to devise a data distribution technique for the file data based upon contextual information associated with the user, and encrypting the file data. The method further includes, based upon the data distribution technique, dividing the file data to store among a cloud computing layer, a fog computing layer, and a local computing layer by performing a hash transformation and applying at least one cyclic error correcting code. In an embodiment, the method further includes receiving a data access request associated with the file data, authenticating the data access request, and restoring the file data via decryption.
-
公开(公告)号:US11977813B2
公开(公告)日:2024-05-07
申请号:US17248153
申请日:2021-01-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Shikhar Kwatra , Jeremy R. Fox , Paul N. Krystek
Abstract: A method, computer system, and a computer program product for sound management is provided. The present invention may include generating a multidimensional risk vector relating to a current contextual activity of a user. The present invention may include dynamically monitoring at least one sound generating device within a predefined threshold distance of a chatbot of the user. The present invention may include determining that an audio adjustment of the at least one sound generating device is warranted. The present invention may include performing the audio adjustment.
-
公开(公告)号:US11972759B2
公开(公告)日:2024-04-30
申请号:US17109994
申请日:2020-12-02
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Shikhar Kwatra , Vijay Ekambaram , Hemant Kumar Sivaswamy , Rodrigo Goulart Silva
IPC: G10L15/19 , G06V10/40 , G06V20/40 , G06V30/10 , G10L15/10 , G10L15/18 , G10L15/22 , H04N21/439 , H04N21/44
CPC classification number: G10L15/19 , G06V10/40 , G06V20/41 , G06V30/10 , G10L15/10 , G10L15/1815 , G10L15/22 , H04N21/4394 , H04N21/44008
Abstract: Mitigating mistranscriptions resolves errors in a transcription of the audio portion of a video based on a semantic matching with contextualized data electronically garnered from one or more sources other than the audio portion of the video. A mistranscription is identified using a pretrained word embedding model that maps words to an embedding space derived from the contextualizing data. A similarity value for each vocabulary word of a multi-word vocabulary of the pretrained word embedding model is determined in relation to the mistranscription. Candidate words are selected based on the similarity values, each indicating a closeness of a corresponding vocabulary word to the mistranscription. The textual rendering is modified by replacing the mistranscription with a candidate word that, based on average semantic similarity values, is more similar to the mistranscription than is each other candidate word.
-
-
-
-
-
-
-
-
-