IBM Patent Applications

CROSSOVER SIMULATION AND CAUSATION DETECTION USING SIMULATION ENVIRONMENTS

Granted: September 26, 2024
Application Number: 20240320400
An embodiment includes identifying a first simulation and a second simulation such that the first simulation is within a threshold similarity of the second simulation. The embodiment generates a set of emergent simulations based at least in part on emergent hyperparameters, where the emergent hyperparameters are generated using the hyperparameters of the first and second simulations. The embodiment selects a subset of the set of emergent simulations according to a diversity metric and…

REDUCING INFERENCE TIME PROCESSING DEEP LEARNING MODELS

Granted: September 26, 2024
Application Number: 20240320222
Various embodiments are provided herein for decreasing a central processing unit (CPU) inference time, thereby shortening processing time of a deep learning model for which run-time complexity is proportional to an output sequence length. A compacted sequence is developed that is used to train the deep learning model. An output of the trained model becomes the compacted sequence on which a post-processing method operates to create an uncompacted version of a predicted sequence.

Dynamic Container Resizing

Granted: September 26, 2024
Application Number: 20240320057
Using a regression analysis on first telemetry data of a container, an embodiment identifies a set of features predicting a resource usage of the container. The container comprises an executing application. Using a time series analysis of data of the set of features, an embodiment predicts a future resource usage of the container at a future time. The data of the set of features is extracted from second telemetry data of the container. At the future time according to the future resource…

COMBINED CLASSICAL/QUANTUM PREDICTOR EVALUATION WITH MODEL ACCURACY ADJUSTMENT

Granted: September 12, 2024
Application Number: 20240303518
Using a model executing on a classical processor, a set of classical features is scored. The scored set of classical features is divided into a set of feature groups, a number of classical features in a group determined according to a qubit capability of a quantum processor. Using a model executing on the quantum processor and a group of the scored set of classical features, a set of quantum features is scored. The score of a quantum feature is adjusted according to an accuracy of the…

GENERATING AN AI CONVERSATION MODEL USING API TEST DATA

Granted: September 5, 2024
Application Number: 20240296292
An embodiment includes generating an intent representative of a verb identified in application programming interface (API) test data associated with an API test case. The embodiment also generates a first entity representative of a first noun identified in the API test data and a second entity representative of a second noun identified in the API test data. The embodiment identifies the intent as being associated with a relationship between the first and second entities in the API test…

CLIPBOARD BASED SEARCH TERM PREDICTION

Granted: September 5, 2024
Application Number: 20240296176
Using a probability distribution and a search result history, a probability of selecting a specified number of relevant samples and a specified number of irrelevant samples from a set of contents is computed, each content in the set of contents comprising a content copied to a first system clipboard of a first device. Using the probability distribution, each content in the set of contents is weighted. Using the weighted set of contents, a set of predicted searches is generated. The set…

MIGRATION PLANNING WITH AUTOMATED DISCOVERY OF SOURCE ASSETS

Granted: August 29, 2024
Application Number: 20240289308
An embodiment includes generating source inventory data representative of information technology assets associated with a source site, the source site comprising information technology infrastructure of an enterprise, the information technology assets comprising a source application database and a source peripheral entity associated with the source application database. The embodiment determines a target platform for migrating the source application database and determining a degree of…

OPTIMIZING MEMORY MANAGEMENT USING MEMORY ACCESS HEATMAPS

Granted: August 29, 2024
Application Number: 20240289021
Embodiments of the present disclosure provide an enhanced system and methods for optimizing data placement in a memory hierarchy. A disclosed non-limiting computer-implemented method configures a counter block comprising access frequency counters mapped into an application memory space, and configures a counter map, where each entry in the counter map associates an application-defined memory region with the access frequency counters of the counter block. A memory controller identifies a…

PLASMA GENERATION MODULE FOR UTERINE CERVIX

Granted: August 29, 2024
Application Number: 20240285329
Disclosed is a plasma generation module for a uterine cervix, comprising: a module body coupled to the front end of a probe part capable of entering the vagina of the human body; a dielectric coupled to the outer front of the module body and facing the uterine cervix, while maintaining a gap for a plasma generation space between the module body and the uterine cervix; and an electrode between the module body and the dielectric and having a shape corresponding to a shape of the…

CONTEXT-BASED CONTENT AUTHORIZATION

Granted: August 22, 2024
Application Number: 20240283783
An embodiment includes extracting network layer information and application layer information from within a network packet. The embodiment determines a context of a network connection with a client device from which the network packet originated based at least in part on the network layer information and determines an identity of an end user with whom the network packet is associated based at least in part on the application layer information. The embodiment performs a sign-on process…

AUGMENTED CONFIGURATION INTERFACE FOR VISUALIZING AND OPTIMIZING BEAMFORMING

Granted: August 22, 2024
Application Number: 20240283495
A method for configuring beamforming for a network device is disclosed. In one embodiment, such a method includes creating a map of an area in which a network device that supports beamforming is placed. The method shows, on an interactive display device, the network device on the map. The method shows, on the interactive display device, one or more beams emanating from the network device on the map. The method enables a user to manipulate the beams on the interactive display device to…

OPTIMIZING ALLOCATION OF TRANSACTION ALERTS

Granted: August 22, 2024
Application Number: 20240281815
An embodiment includes assigning an entity to a risk category group based on transaction data of a transaction alert associated with the entity, where the transaction alert is concerning potentially suspicious financial activities. The embodiment also identifies a relationship between the entity and another entity based on the transaction data. The embodiment determines a capability of an anti-money laundering (“AML”) analyst, where the capability includes a skill level of the AML…

ADAPTED MODEL FEATURE REGISTRY FOR FOUNDATION MODELS

Granted: August 22, 2024
Application Number: 20240281697
By analyzing a dataset usable to train a model to perform a task, metadata of the dataset is generated, the generating performed responsive to receiving the dataset. The dataset is classified into a domain using the metadata and a set of context definitions. Responsive to receiving a request from the model for use of the dataset, the model is caused to be trained using the dataset, the training enabling the model to perform the task.

SECURE SYSTEM FOR HIDING REGISTRATION RULES FOR DYNAMIC CLIENT REGISTRATION

Granted: August 15, 2024
Application Number: 20240275819
A method to facilitate a permitted access to a protected resource associated with a service provider (SP). The method begins by the SP establishing a root of trust to a third party via an attribute-based encryption (ABE) master secret key, and a set of one or more public parameters. Once vetted by the entity, the SP receives a binary object from the third party that encodes the policy as a cryptographic payload. When a client application desires to enroll with and interoperate with the…

USING CATEGORIZATION TAGS FOR RULE GENERATION AND UPDATE IN A RULES-BASED SECURITY SYSTEM

Granted: August 15, 2024
Application Number: 20240275817
A technique for classifying and handling threat data in a rules-based security system. For each rule in the set, a set of one or more first tags are generated. The tags categorize the rule according to a hierarchical scheme. In response to receipt of a new threat, the system automatically determines whether the existing set of rules provide an acceptable coverage for the new threat. This determination is made by generating a set of one or more second tags that categorize the new threat,…

DIGITAL TWIN MODELLING USING TASK KEYWORD ANALYSIS

Granted: August 15, 2024
Application Number: 20240273434
A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data,…

ACTIVITY-BASED SELECTION OF SHARABLE CONTENT IN A SCREEN-SHARING SESSION

Granted: August 8, 2024
Application Number: 20240264793
An embodiment includes determining a first activity value by comparing frames of a first sharable video stream received from a first device associated with a first participant of a screen sharing session. The embodiment also includes generating a first ranked list of activity values, the first ranked list including the first activity value. The embodiment also includes identifying the first activity value as a highest ranking activity value in the first ranked list of activity values.…

NAMESPACE SCOPED DEFAULT STORAGE CLASSES

Granted: August 1, 2024
Application Number: 20240256245
An example operation may include one or more of receiving, via an application programming interface (API) of a cluster, a persistent volume claim (PVC) with a specification of a software application, identifying a namespace based on a namespace attribute of the PVC, identifying a storage class which is declared as a default storage class for the identified namespace based on the one or more attributes within the PVC and injecting storage criteria of the default storage class into the…

DATABASE VALUE PREDICTION

Granted: August 1, 2024
Application Number: 20240257164
Tokenized rows of a training portion of a database are selected, each of the selected tokenized rows having a first token value stored in a first column of the database. Training row vectors are grouped into clusters. From the clusters, prototypes are generated, each prototype comprising a numerical representation of a cluster. From input tokens, an input row vector is generated, the input row vector comprising a numerical representation of input tokens representing data in an input row…

NEURAL NETWORK INFERENCE UNDER HOMOMORPHIC ENCRYPTION

Granted: August 1, 2024
Application Number: 20240256850
A trained neural network is partitioned into a client-side portion and a server-side portion, the client-side portion comprising a first set of layers of the trained neural network, the server-side portion comprising a second set of layers of the trained neural network, the trained neural network trained using a first set of training data. From a homomorphically encrypted intermediate result input to the server-side portion, a homomorphically encrypted output of the trained neural…