In an approach for creating synthetic visual inspection data sets for training an artificial intelligence computer vision deep learning model utilizing augmented reality, a processor enables a user to capture a plurality of images of an anchor object using a camera on a user computing device. A processor receives the plurality of images of the anchor object from the user. A processor generates a baseline model of an anchor object. A processor generates a training data set. A processor trains the baseline model of the anchor object. A processor creates a trained Artificial Intelligence (AI) computer vision deep learning model. A processor enables the user to interact with the trained AI computer vision deep learning model in an access mode.
An application configuration tool and associated method for supporting deployment of an application on a server that has a set of configurations available for applications deployed on the server. The method attempts to match every configuration required by the application to a configuration available on the server. In case of multiple candidates that match, one is selected. When there is no match an error message is generated. The method is iterated to inspect each selected configuration to identify any references contained in the selected configuration that themselves need further configurations. The iteration of inspecting and the matching to follow the references is continued until all such references are exhausted either by matching or failure to match and consequent error message generation. Finally, a configuration report is output specifying the selected configurations and, to the extent that not all required configurations have been matched to available configurations, the error messages.
A method(1100)comprising:measuring a baseline servo band difference(SBD)from a beginning of a tape(BOT)to an end of the tape(EOT)(1104);storing values of the baseline SBD measurements in a memory(1106);cycling a shorter length of the tape that is less than an entire length of the tape a plurality of times to acclimate the shorter length of the tape(1108);determining a post cycling SBD of the shorter Iength of the tape(1110);determining an acclimation change amount of the shorter length of the tape that is a difference between the baseline SBD of the shorter length and the post cycling SBD of the shorter length(1114);and adjusting the baseline SBD values based on the determined acclimation change amount(1116).
G11B 15/32 - Entraînement des supports d'enregistrement par des organes agissant directement ou indirectement sur ceux-ci au moyen de bobines ou noyaux, sur lesquels le support d'enregistrement est enroulé
G11B 15/18 - Entraînement; Démarrage; Arrêt; Dispositions pour la commande ou la régulation correspondantes
A device, a method, and an article of manufacture are disclosed. The device includes a first optical fiber, a second optical fiber, an electrochromic component positioned between tips of the optical fibers, and a voltage source connected to the electrochromic component. The method includes providing an electrochromic component, providing optical fibers and a voltage source, and assembling an optical switch that includes the electrochromic component, the optical fibers, and the voltage source. The voltage source is connected to the electrochromic component. The article of manufacture includes an optical switch with a voltage source connected to an electrochromic component positioned between optical fiber tips.
G02F 1/15 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur un effet électrochromique
5.
SECURELY EXECUTING SOFTWARE BASED ON CRYPTOGRAPHICALLY VERIFIED INSTRUCTIONS
Securely executing instructions of software on a computerized device by accessing a software of a computerized device, wherein the software includes a plurality of instructions and respective reference message authentication codes (MACs), generating a cryptographic key based at least in part on a key derivation function, wherein arguments of the key derivation function are based at least in part on a unique identifier of the computerized device and a value extended from a measurement of a content of the software of an extension mechanism of a platform configuration register of the computerized device, verifying an instruction of the plurality of instructions of the software based at least in part on the cryptographic key and a reference MAC of the respective reference MACs, and in response to verifying the instruction of the plurality of instructions of the software, executing the instruction.
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
A method, a system and a computer program product for hybrid computing system management are proposed. In the method, workload information associated with a set of application server instances running in a first computing system is obtained by a server controller in response to a scaling request for changing the number of instances in the set of application server instances from a request controller. The set of application server instances serves at least one application running in a second computing system. A scaling decision indicating whether to change the number of instances in the set of application server instances is determined by a predictor based on the workload information from the server controller. The second computing system is enabled by the request controller to handle requests associated with the at least one application for the set of application server instances based on the scaling decision.
A method for selectively depositing graphene on cobalt caps on copper interconnects for dual damascene structures in a back-end-of-line substrate is provided. The method comprises providing a semiconductor substrate comprising a first dielectric layer, the copper interconnect in the first dielectric layer, and the cobalt cap on the copper interconnect, the cobalt cap having an exposed metal surface, wherein the exposed metal surface comprises cobalt, and selectively depositing carbon layer on the exposed metal surface.
C23C 16/452 - Revêtement chimique par décomposition de composés gazeux, ne laissant pas de produits de réaction du matériau de la surface dans le revêtement, c. à d. procédés de dépôt chimique en phase vapeur (CVD) caractérisé par le procédé de revêtement caractérisé par le procédé utilisé pour produire des courants de gaz réactifs, p.ex. par évaporation ou par sublimation de matériaux précurseurs par activation de courants de gaz réactifs avant l'introduction dans la chambre de réaction, p.ex. par ionisation ou par addition d'espèces réactives
H01L 21/02 - Fabrication ou traitement des dispositifs à semi-conducteurs ou de leurs parties constitutives
H01L 21/32 - Traitement des corps semi-conducteurs en utilisant des procédés ou des appareils non couverts par les groupes pour former des couches isolantes en surface, p.ex. pour masquer ou en utilisant des techniques photolithographiques; Post-traitement de ces couches; Emploi de matériaux spécifiés pour ces couches en utilisant des masques
A single user truck loader (100) is disclosed. A platform (102) is configured to receive placement of a load. Wheels (114) are disposed at locations of the platform (102). A dolly mechanism (110) is disposed in a cavity formed in the platform (102). Side walls (104, 108, 106, and 502) of the platform (102) house the cavity. The cavity of the platform (102) is configured to receive a lift deck (210) of a lifting mechanism (902).
B66F 7/16 - Châssis de levage, p.ex. pour lever des véhicules; Ascenseurs à tablier à tabliers supportés directement par des crics par un ou plusieurs crics hydrauliques ou pneumatiques
B66F 7/10 - Châssis de levage, p.ex. pour lever des véhicules; Ascenseurs à tablier à tabliers supportés directement par des crics
B66F 9/065 - Dispositifs pour lever ou descendre des marchandises volumineuses ou lourdes aux fins de chargement ou de déchargement se déplaçant, avec leurs charges, sur des roues ou sur un dispositif analogue, p.ex. chariots élévateurs à fourche sans mâts
An embodiment includes identifying, from among the plurality of digital content datasets, a set of candidate textual items based on relevance to a specified subtopic using one or more natural language processing techniques. The embodiment groups candidate textual items into a predetermined number of groups using relevance scores and feature vectors. The embodiment trains a pre-trained encoder-decoder model using a designated group of selected textual items, where the pre-trained encoder-decoder model is pretrained to generate textual content according to a particular style of writing. The embodiment generates, using the pre-trained encoder-decoder model, machine-authored textual content in the particular style of writing resulting in an article about the specified subtopic based on the designated group of selected textual items. The embodiment also includes transmitting the article to a remote web server as an update for a website.
Vertical transport field-effect transistors are formed on active regions wherein the active regions each include a wrap-around metal silicide contact on vertically extending side walls of the active region. Such wrap-around contacts form self-aligned and reliable strapping for SRAM bottom nFET and pFET source/drain regions. Buried contacts of SRAM cells may be used to strap the wrap-around metal silicide contacts with the gates of inverters thereof. Wrap-around metal silicide contacts provide additional contacts for logic FETs and reduce parasitic bottom source/drain resistance.
H01L 29/78 - Transistors à effet de champ l'effet de champ étant produit par une porte isolée
H01L 27/088 - Dispositifs consistant en une pluralité de composants semi-conducteurs ou d'autres composants à l'état solide formés dans ou sur un substrat commun comprenant des éléments de circuit passif intégrés avec au moins une barrière de potentiel ou une barrière de surface le substrat étant un corps semi-conducteur comprenant uniquement des composants semi-conducteurs d'un seul type comprenant uniquement des composants à effet de champ les composants étant des transistors à effet de champ à porte isolée
H01L 21/336 - Transistors à effet de champ à grille isolée
Cryptographic-related processing is facilitated by obtaining multiple input operands, and packing the multiple input operands together to form a packed integer. The packed integer is an n-bit integer including multiple slots, where input operands of the multiple input operands are packed into every other slot of the multiple slots, and each slot of the multiple slots has a bitwidth k. Further, the process includes providing the packed integer as input to an n-bit accelerator to facilitate performing one or more predefined operations using the packed integer, to transform the packed integer into result data which facilitates cryptographic-related processing.
Managing application migration is provided. An API server on a controller node is invoked to update a configuration map of a reverse proxy on a worker node for the reverse proxy to route user service requests corresponding to unmigrated applications of a set of applications from a first computing platform to a second computing platform to maintain liveness of the unmigrated applications during migration. The API server is invoked to build an image for an application of the set of applications based on source code of the application obtained from the second computing platform. The API server is invoked to generate a pod on the worker node to perform a workload of the application using the image. The API server is invoked to update a service on the worker node to select the pod on the worker node performing the workload of the application.
Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A computer system, processor, programming instructions and/or method for balancing the workload of processing pipelines that includes an execution slice, the execution slice comprising at least two processing pipelines having one or more execution units for processing instructions, wherein at least a first processing pipeline and a second processing pipeline are capable of executing a first instruction type; and an instruction decode unit for decoding instructions to determine which of the first processing pipeline or the second processing pipeline to execute the first instruction type. The processor configured to calculate at least one of a workload group consisting of: the first processing pipeline workload, the second processing pipeline workload, and combinations thereof; and select the first processing pipeline or the second processing pipeline to execute the first instruction type based upon at least one of the workload group.
A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include accepting fluid parameter data about a fluid and identifying at least one safety threshold for the fluid. The operations may further include calculating a fluid quality index for the fluid based on the fluid parameter data and analyzing the fluid quality index against the at least one safety threshold to achieve fluid quality testing data. The operations may also include leveraging the fluid quality testing data to control a fluid flow.
A method, computer system, and a computer program product for deploying at a client system a machine learning model is provided. The present invention may include requesting, from a training system, information on a training environment in which a machine learning model was trained. The present invention may include determining a compatibility of a local environment of a client system with the training environment of the training system based on the information on the training environment. The present invention may include determining the local environment of the client system is compatible with the training environment of the training system. The present invention may include downloading the machine learning model.
A data storage system provides persistent storage in bulk non-volatile memory. A controller of the data storage system receives a host write command and buffers associated host write data in both a first write cache in non-volatile memory and a mirrored second write cache in volatile memory. The controller destages the host write data to the bulk non-volatile memory from the second write cache but not the first write cache. The controller services relocation write commands requesting data relocation within the bulk non-volatile memory by reference to the second write cache. Servicing the relocation write commands includes buffering relocation write data in the second write cache but not the first write cache and destaging the relocation write data to the bulk non-volatile memory from the second write cache.
Edge device task management by receiving an indicator corresponding to a first container running a task on a first edge device of a cluster of edge devices, wherein the indicator indicates an error status of the first container, and wherein task data of the task is stored in a first local storage of the first edge device, selecting a second edge device from the cluster of edge devices, wherein a second container on the second edge device is to run the task, instructing the first and second edge devices to transfer the task data from the first local storage of the first edge device to a second local storage of the second edge device, and in response to receiving a notification that indicates the task data has been transferred from the first local storage to the second local storage, sending the task to the second container.
Generating a controllable panoramic image while eliminating unsuitable dynamic elements by receiving a plurality of images of a location from a user device, wherein the plurality of images includes images of a location at various times, identifying an object of one or more images of the plurality of images, wherein the object corresponds to an unsuitable condition for a database, determining a score of the one or more images of the plurality of images based at least in part on the identified object, determining a base image from the one or more images of the plurality of images, and generating a set of replacement images of the location based at least in part on respective determined scores of the one or more images of the plurality of images.
A method of manufacturing and resultant device are directed to an inverted wide-base double magnetic tunnel junction device having both high-efficiency (100') and high-retention (100) arrays. The method includes a method of manufacturing, on a common stack, a high-efficiency array and a high-retention array for an inverted wide-base double magnetic tunnel junction device. The method comprises, for the high-efficiency array and the high-retention array, forming a first magnetic tunnel junction stack (MTJ2,120, 120'), forming a spin conducting layer (122, 122') on the MTJ2, and forming a second magnetic tunnel junction stack (MTJ1. 124, 124') on the spin conducting layer. The first magnetic tunnel junction stack for the high-retention array has a high-retention critical dimension (CD) (HRCD) that is larger than a high-efficiency CD (HECD) of the first magnetic tunnel junction stack for the high-efficiency array. The second magnetic tunnel junction stack (MTJ1) is shorted for the high-retention array and is not shorted for the high-efficiency array.
H01L 27/22 - Dispositifs consistant en une pluralité de composants semi-conducteurs ou d'autres composants à l'état solide formés dans ou sur un substrat commun utilisant des effets de champ magnétique analogues
H01L 43/08 - Résistances commandées par un champ magnétique
H01L 43/12 - Procédés ou appareils spécialement adaptés à la fabrication ou le traitement de ces dispositifs ou de leurs parties constitutives
Approaches presented herein enable a security risk manager(34) embedded in an application(30) to manage security vulnerabilities of the application(30). More specifically, the application(30) comprises code entities(32) such as components, packages, libraries, or microservices. The entities are modified as part of the application development process to have an enabled state, in which these entities are permitted to run normally when called, and a disabled state, in which these entities do not run when called but instead perform a back-out behavior such as generating an error message. At runtime, the application periodically accesses a security vulnerabilities database(36) to check for security alerts. When a relevant security alert is found, the application changes any code entities(32) that are affected by the security alert to the disabled state pending investigation by an operations team. The application notifies the operations team by sending a notification of the security alert to an external security monitoring tool(38).
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
22.
SERVICE-TO-SERVICE SCHEDULING IN CONTAINER ORCHESTRATORS
Methods, systems, and computer program products for service-to-service scheduling in container orchestrators are provided herein. A computer-implemented method includes reserving, by a network orchestrator, network resources requested between a plurality of services, wherein each of the services is implemented as one or more replicas running on a set of nodes of a cluster, managed by the network orchestrator, that use the network resources to serve incoming requests to the plurality services; monitoring utilization of the network resources; and scheduling, by the network orchestrator based on the monitoring, one or more new replicas of the plurality of services and the incoming requests to the plurality of services in a collaborative manner to increase at least one network performance characteristic.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
Aspects of the present disclosure relate to encrypted data processing (EDAP). A processor includes a register file configured to store ciphertext data, an instruction fetch and decode unit configured to fetch and decode instructions, and a functional unit configured to process the stored ciphertext data. The functional unit further includes a decryption module configured to decrypt ciphertext data from the register file to receive cleartext data using an encryption key stored within the functional unit. The functional unit further includes a local buffer configured to store the cleartext data. The functional unit further includes an arithmetic logical unit configured to generate cleartext computation results using the cleartext data The functional unit further includes an encryption module configured to encrypt the cleartext computation results to generate ciphertext computation results for storage back into the register file.
H04L 9/10 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité avec un boîtier, des caractéristiques physiques ou des commandes manuelles particuliers
H04L 9/06 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p.ex. système DES
According to one embodiment, a method, computer system, and computer program product for increasing linearity of a weight update of a phase change memory (PCM) cell is provided. The present invention may include applying a RESET pulse to amorphize the phase change material of the PCM cell; responsive to applying the RESET pulse, applying an incubation pulse to the PCM cell; and applying a plurality of partial SET pulses to incrementally increase the conductance of the PCM cell.
A top cap layer covering a first metal line and a second metal line, horizontally between the first metal line and the second metal line is, in sequential order, a post cap liner, an air gap and the post cap liner. A first set of metal lines embedded in an upper surface of a dielectric, a second set of metal lines embedded below the dielectric and above the electronic components, a post cap liner covering the first set of metal lines, a cavity which dissects a first metal line of the first set of metal lines and extends to a second metal line of the second set of metal lines and dissects the second set of metal lines. Forming a cavity in a first metal line embedded in an upper surface of a dielectric, where the first metal line and the dielectric are covered by a top cap layer.
A migration replication relationship for data migration between a migration-source volume on a first storage controller and a migration-target volume on a second storage controller, a volume represents a virtualized device. The method presents the migration-source volume and the migration-target volume as a same volume to a host whilst using differentiated target port descriptors to define different discoverable paths to the each. During data migration, the method allows input/output operations to the migration-source volume by presenting target ports of the first storage controller in an available state and deters input/output operations to the migration-target volume by presenting target ports on the second storage controller in a standby state whilst allowing host discovery of paths to the migration-target volume. Once the data migration is complete, the method switches target port states to allow input/output operations to the migration-target volume and to deter input/output operations to the migration-source volume.
An embodiment includes training a first convolutional neural network (CNN) using a plurality of training images to generate first and second trained CNNs, and then adding an interface layer to the second trained CNN. The embodiment processes a first and second images in a sequence of images using the first trained CNN to generate a first and second result vectors. The embodiment also processes the second image using the second trained CNN and sensor data input to the interface layer to generate a third result vector. The embodiment modifies the sensor data using a compensation value. The embodiment compares the third result vector to the second result vector to generate an error value, and then calculates a modified compensation value using the error value. The embodiment then generates a sensor-compensated trained CNN based on the second trained CNN with the modified compensation value.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
28.
TUNING EMISSION WAVELENGTHS OF QUANTUM EMITTERS VIA A PHASE CHANGE MATERIAL
A device having a layered structure that includes a layer of phase change material and a matrix material layer having embedding quantum emitters is tuned. An electric field is applied through the matrix material layer and the layer of phase change material to change the emission wavelengths of the quantum emitters. A phase of the phase change material is changed, in a non-volatile manner, in each of one or more of local areas of the phase change material, to form local alterations that are opposite to respective ones of the quantum emitters in the matrix material layer, to locally modify the electric field at the respective quantum emitters.
G02F 1/017 - Structures avec une variation de potentiel périodique ou quasi périodique, p.ex. superréseaux, puits quantiques
H01S 3/10 - Commande de l'intensité, de la fréquence, de la phase, de la polarisation ou de la direction du rayonnement, p.ex. commutation, ouverture de porte, modulation ou démodulation
A system includes a processor (702) to receive a graph-based masking policy and a composite payload containing a data object to be masked. The processor (702) is to instantiate a masking engine based on the graph-based masking policy. The processor (702) is to execute the masking engine on the composite payload to generate a masked payload comprising a masked data object. The data object to be masked is masked in place such that the resulting composite payload type is maintained. The processor (702) is to output the masked payload.
One or more computer processors create a binary cluster of events by bootstrapping a set of ground truths contained with a rule engine applied to a set of high-dimensional datapoints, wherein the binary cluster contains two clusters each containing a plurality of high-dimensional datapoints; determine one or more peer groups for a set of unknown high-dimensional datapoints utilizing a trained multiclass classifier, wherein the high-dimensional datapoints are assigned to one or more peer groups by the trained multiclass classifier using an incremental learning algorithm in order to reduce system resources; create an activity distribution for each unknown high-dimensional datapoint associated with a user in the set of unknown high-dimensional datapoints and each peer group; calculate a deviation percentage between the activity distribution of the user and each peer group associated with the user; and responsive to exceeding a deviation threshold, classify the user or associated high-dimensional datapoints as risky.
A technique for increasing index search efficiency and availability in a database comprises building an index space matrix corresponding to a plurality of mini-indices of the database using ordered boundary values that correspond to key value ranges of each respective mini-index to increase index search efficiency by removing redundant mini-index accesses. Mini-indices of the plurality of mini-indices are consolidated asynchronously without suspending access to the mini-indices using a particular consolidation policy of a plurality of consolidation policies that corresponds to an amount of key value overlap identified between the mini-indices. Data operations corresponding to transactions are performed using the index space matrix during consolidation of the mini-indices without suspending access to the mini-indices.
A semiconductor device comprising at least one first gate all around channel having a horizontal physical orientation, wherein the at least one first gate all around channel is comprised of a first material, wherein the at least one first gate all around channel has a sidewall surface with (100) crystal orientation. At least one second gate all around channel having a vertical physical orientation, wherein the second channel is located above the at least one first gate all around channel, wherein the at least one second gate all around channel is comprised of a second material, wherein the at least one second gate all around channel has a sidewall surface with (110) crystal orientation. A gate metal enclosing the at least one first gate all around channel and the at least one second gate all around channel.
H01L 27/088 - Dispositifs consistant en une pluralité de composants semi-conducteurs ou d'autres composants à l'état solide formés dans ou sur un substrat commun comprenant des éléments de circuit passif intégrés avec au moins une barrière de potentiel ou une barrière de surface le substrat étant un corps semi-conducteur comprenant uniquement des composants semi-conducteurs d'un seul type comprenant uniquement des composants à effet de champ les composants étant des transistors à effet de champ à porte isolée
H01L 21/336 - Transistors à effet de champ à grille isolée
A system may be configured to perform operations to select a machine learning model. The operations may include training machine learning models with training data of a training data set and obtaining a first value representing a first required runtime for training each machine learning model. The operations may include evaluating, based on the first value, a second value representing a second required runtime for training the machine learning model with a complete training data set. The operations may include calculating a final score for each machine learning model in a group of machine learning models, wherein the calculating is performed on a basis of the second values for the machine learning models, ranking the machine learning models based on the final score to obtain ranks, and selecting the machine learning model that has obtained a highest rank in the ranking.
Methods, apparatus, computer program products for resource scheduling are provided. The method comprises: receiving a workload request; publishing the information of the workload to a workload billboard accessible to a plurality of computer hosts, each of the plurality of computer hosts being associated with a corresponding proxy configured to manage the resource scheduling of the computer host; receiving a request to schedule at least a portion of the workload from a proxy; and sending the portion of the workload to the computer host associated with the proxy.
A method directed to deploying a workload on the best/highest performance node is provided. Nodes configured to accommodate a request for a workload are selected. Information is collected on each of the selected nodes and the workload. Predicted response times expected for the workload running on each of the selected nodes are determined. The workload is deployed on a node of the selected nodes, the node having a corresponding predicted response time for the workload, the workload being deployed on the node based at least in part on the corresponding predicted response time.
A system, method, and computer program product for implementing video action recognition is provided. The method includes receiving a video stream comprising user movement actions. Skeleton points associated with a video representation of a user executing the user movement actions are extracted and categorized with respect to multiple digital levels. Initial visual windows points are generated within video frames and an average movement distance for the group of skeleton points are determined with respect to the video frames. In response, sizes for the visual windows are adjusted and feature vectors are extracted from the group of skeleton points. Point coordinates of the skeleton points are extracted and linked with the feature vectors. A convolutional neural network associated with linking the feature vectors with the point coordinates is generated and the video stream is enabled with respect to video action recognition associated with accurate presentation of the video stream.
A method and a corresponding system for encrypting customer workload data through a trusted entity such as a self-boot engine (SBE) are provided. More specifically, there is a method and a corresponding system for securely extracting out customer centric data in a manner that requires the customer payloads and/or workloads to register with the SBE and share the encryption key.
A plurality of containers can be configured for running applications associated to at least one node of a distributed computing environments. The containers of the plurality of containers includes integrated intelligence that provides an in memory state component that detects how container instances are running. A quorum synchronization component of the integrated intelligence can coordinate the activities of the containers. A first container can be initiated for running a first node application. The memory state component can determine if a topology exists in the plurality of containers that is running an existing application matching the first node application. The quorum synchronization component of the integrated intelligence can coordinate running of the first node application with the first container with the existing application.
An approach for providing prediction and optimization of an adversarial machine-learning model is disclosed. The approach can comprise of a training method for a defender that determines the optimal amount of adversarial training that would prevent the task optimization model from taking wrong decisions caused by an adversarial attack from the input into the model within the simultaneous predict and optimization framework. Essentially, the approach would train a robust model via adversarial training. Based on the robust training model, the user can mitigate against potential threats by (adversarial noise in the task-based optimization model) based on the given inputs from the machine learning prediction that was produced by an input.
Aspects include providing isolation between a plurality of containers in a pod that are each executing on a different virtual machine (VM) on a host computer. Providing the isolation includes converting a data packet into a serial format for communicating with the host computer. The converted data packet is sent to a router executing on the host computer. The router determines a destination container in the plurality of containers based at least in part on content of the converted data packet and routes the converted data packet to the destination container.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A method, system, and computer program product for classifying input data of a machine learning model. The method includes obtaining a dataset. The method also includes determining pairwise correlations of the set of features using their values in the dataset. The method also includes selecting one or more pairs of features that are highly correlated. The method also includes creating a density map that contains a set of points. The method also includes determining a low-density area on the density map having a low-density of points from the density analysis. The method also includes identifying records of the dataset that belong to the determined low-density areas. The method also includes labeling the identified records as low-density and labeling the remaining records of the dataset as high-density. The method also includes training a classifier to classify an input record having the set of features as a low-density or high-density record.
A semiconductor structure with one or more backside metal layers that include a plurality of portions of a floating metal layer separated by dielectric material from one or more power and ground lines in the backside metal layer. The height of each of the plurality of portions of the floating metal layer in each of the one or more backside metal layers and the distance between adjacent portions of the plurality of portions of the floating metal layer in each of the one or more backside metal layer correlates to the capacitance of each of the one or more backside metal layers.
H01L 23/528 - Configuration de la structure d'interconnexion
H01L 21/768 - Fixation d'interconnexions servant à conduire le courant entre des composants distincts à l'intérieur du dispositif
H01L 23/532 - Dispositions pour conduire le courant électrique à l'intérieur du dispositif pendant son fonctionnement, d'un composant à un autre comprenant des interconnexions externes formées d'une structure multicouche de couches conductrices et isolantes inséparables du corps semi-conducteur sur lequel elles ont été déposées caractérisées par les matériaux
H01L 23/535 - Dispositions pour conduire le courant électrique à l'intérieur du dispositif pendant son fonctionnement, d'un composant à un autre comprenant des interconnexions internes, p.ex. structures d'interconnexions enterrées
H01L 23/522 - Dispositions pour conduire le courant électrique à l'intérieur du dispositif pendant son fonctionnement, d'un composant à un autre comprenant des interconnexions externes formées d'une structure multicouche de couches conductrices et isolantes inséparables du corps semi-conducteur sur lequel elles ont été déposées
H01L 23/48 - Dispositions pour conduire le courant électrique vers le ou hors du corps à l'état solide pendant son fonctionnement, p.ex. fils de connexion ou bornes
Embodiments disclosed herein include a nanosheet transistor for reducing parasitic capacitance. The nanosheet transistor may include a spacer region between a high-k metal gate stack (142) and an epitaxial layer (136). The spacer region may include a first nanosheet stack with a first nanosheet and a second nanosheet (102). The spacer region may include an inner spacer region between the first nanosheet and the second nanosheet, and a side subway region (160) located along an edge of the first nanosheet, the inner spacer region, and the second nanosheet.
H01L 29/775 - Transistors à effet de champ avec un canal à gaz de porteurs de charge à une dimension, p.ex. FET à fil quantique
H01L 29/06 - Corps semi-conducteurs caractérisés par les formes, les dimensions relatives, ou les dispositions des régions semi-conductrices
H01L 29/423 - Electrodes caractérisées par leur forme, leurs dimensions relatives ou leur disposition relative ne transportant pas le courant à redresser, à amplifier ou à commuter
H01L 21/336 - Transistors à effet de champ à grille isolée
B82Y 10/00 - Nanotechnologie pour le traitement, le stockage ou la transmission d’informations, p.ex. calcul quantique ou logique à un électron
44.
CURRENT MODE SIGNAL PATH OF AN INTEGRATED RADIO FREQUENCY PULSE GENERATOR
A current mode end-to-end signal path includes, a digital to analog converter (DAC), operating in current mode and an upconverting mixer, operating in current mode and operatively coupled to the DAC, wherein analog inputs and analog outputs of the DAC and the upconverting mixer are represented as currents, and the DAC generates a baseband signal.
Computer implemented methods for selective data deduplication in a multitenant environment are disclosed. Data deduplication of blocks written to a storage area associated with a tenant and redundant copies of the blocks written to other storage areas of other tenants is permitted or prevented based on tagging the first storage area associated with the tenant with a particular type of parameter. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is not permitted, a block to be written to the storage area is modified prior to hashing the block. Responsive to detecting a write operation directed to the storage area tagged with a parameter indicating that deduplication is permitted, a block to be written to the storage area is prevented from being modified prior to hashing the block.
G06F 16/174 - Systèmes de fichiers; Serveurs de fichiers - Détails d’autres fonctions de systèmes de fichiers Élimination de redondances par le système de fichiers
Detecting a data leak by detecting user input in a first form, the user input satisfying a set of requirements, storing the user input in a memory, generating a synthetic input satisfying the set of requirements, transmitting a second form including the synthetic input, searching resources for the synthetic input, determining if the synthetic input is present among the resources according to the search, and acting upon the determination.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
47.
GENERATION AND SELECTION OF UNIVERSALLY ROUTABLE VIA MESH SPECIFICATIONS IN AN INTEGRATED CIRCUIT
Aspects of the invention include generating a set of via mesh specifications for a cell within an integrated circuit. Each via mesh specification defines one or more straps on each layer above a first layer, which includes one or more pins that form a pin terminal, to a top layer that connects the cell to a net for interconnection of the cell with one or more other cells, and also one or more vias that interconnect adjacent ones of the layers. Aspects also include verifying whether each via mesh specification is a universally routable via mesh specification guaranteeing that the cell interconnects with other cells through the net while meeting all design rules, and including only the via mesh specifications of the set of via mesh specifications that are universally routable in a library of via mesh specifications. The library is used to finalize and fabricate the integrated circuit.
G06F 30/398 - Vérification ou optimisation de la conception, p.ex. par vérification des règles de conception [DRC], vérification de correspondance entre géométrie et schéma [LVS] ou par les méthodes à éléments finis [MEF]
A successive-approximation analog-to-digital converter includes a sampling circuit for sampling an analog input signal to acquire a sampled voltage, and a regenerative comparator for comparing the sampled voltage with a succession of reference voltages to generate, for each reference voltage, a decision bit indicating the comparison result. The converter also includes a digital-to-analog converter which is adapted to generate the succession of reference voltages, in dependence on successive comparison results in the comparator, to progressively approximate the sampled voltage. The regenerative comparator comprises an integration circuit for generating output signals defining the decision bits, and a plurality of regeneration circuits for receiving these output signals. The regeneration circuits are operable, in response to respective control signals, to store respective decision bits defined by successive output signals from the integration circuit.
A computer-implemented method for facilitating large data transfers from a first data management system (212) to a second data management system (202) is disclosed. The method comprises receiving data from the first data management system (212) by a first buffer component (708), rerouting, upon the first buffer component (708) reaching a predefined fill-level, dynamically the received data to a second buffer components (710), wherein the second buffer components (710) is adapted to process the rerouted received data, forwarding, by the second buffer components (710), the rerouted data once the first buffer component (708) is again ready for receiving the rerouted data from the second buffer components (710), and sending, by a sending components (712), the data buffered in the first buffer component (708) to the second data management system (202).
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
50.
THICK GATE OXIDE DEVICE OPTION FOR NANOSHEET DEVICE
An apparatus comprising a substrate and a thin gate oxide nanosheet device located on the substrate, having a first plurality ofnanosheet layers, wherein each of the first plurality of nanosheet layers has a first thickness located at the center of the nanosheet. A thick gate oxide nanosheet device located on the substrate, having a second plurality ofnanosheet layers, wherein each of the second plurality of nanosheet layers has a second thickness and wherein the first thickness is less than the second thickness.
A data storage change is received for a piece of data, wherein the data storage change is from a fist location to a second location. Two or more possible paths to perform the data storage change are determined. A plurality of weights for each path of the two or more paths is determined. A weighted transfer time for each path of the two or more paths is determined.
In an approach for prohibiting voice attacks, a processor, in response to receiving a voice input from a source, determines, using a predetermined filter including an allowlist, that the voice input does not match any corresponding entry of the predetermined filter. A processor routes the voice input to an adversarial pipeline for processing. A processor identifies an adversarial example of the voice input using a predetermined connectionist temporal classification method. A processor generates a configurable distorted adversarial example using the adversarial example identified. In response to a user reply, a processor injects the configurable distorted adversarial example as noise into a voice stream of the user reply in real-time to alter the voice stream. A processor routes the altered voice stream to the source.
G10K 11/175 - Procédés ou dispositifs de protection contre le bruit ou les autres ondes acoustiques ou pour amortir ceux-ci, en général utilisant des effets d'interférence; Masquage du son
53.
LIVE MIGRATION AND REDUNDANCY FOR VIRTUALIZED STORAGE
For a first server virtual machine (VM) virtualizing a logical volume in a read/write mode for a client VM, a second server VM virtualizing the logical volume in an off mode is instantiated. The logical volume comprises a virtualization of a portion of physical storage. At the first server VM, the logical volume is deactivated, the deactivating disallowing the first server VM from performing a storage request from the client VM. At the second server VM, the logical volume is activated, the activating performed by causing the second VM to virtualize the logical volume in the read/write mode, the activating allowing the second server VM to perform the storage request.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A clock driver circuit for low powered clock driving may include: a multiple phase divider; a buffer supplying at least one of multiple phases to the multiple phase divider at a center frequency that is an integer multiple of an input frequency; and wherein the multiple phase divider and the buffer share a same current from a supply rail.
H03L 7/087 - Commande automatique de fréquence ou de phase; Synchronisation utilisant un signal de référence qui est appliqué à une boucle verrouillée en fréquence ou en phase - Détails de la boucle verrouillée en phase concernant principalement l'agencement de détection de phase ou de fréquence y compris le filtrage ou l'amplification de son signal de sortie utilisant au moins deux détecteurs de phase ou un détecteur de fréquence et de phase dans la boucle
G11C 11/4063 - Circuits auxiliaires, p.ex. pour l'adressage, le décodage, la commande, l'écriture, la lecture ou la synchronisation
A method for adjusting the resource allocation ratio between microservices used to run an application. A microservice test sequence is defined which has an order that follows the traffic flow through the microservices. Each microservice is analyzed in order of the test sequence to classify whether or not it is acting as a bottleneck for the application. This is done by measuring whether or not decrementing the microservice's resource causes the application throughput to decrease. For each microservice classified as a bottleneck and in reverse order of the test sequence, its resource is successively incremented until the application throughput starts to increase, indicating it is no longer acting as a bottleneck. The resource allocation ratio can then be adjusted to reflect this procedure.
An approach is described for autonomous and optimal cloning, reinstating, and archiving of a containerized application. Application metadata is obtained from a catalog. Cloning rules specifying cloning an application are obtained. Application components are selected for cloning and the cloning is determined to be compliant with the cloning rules. The application components are cloned and data for the clone is saved to a clone repository. The catalog is updated with specifications of the cloned application components. Reinstating rules specifying reinstating a clone of the application are obtained. Reinstating the clone is determined to be compliant with the reinstating rules. The catalog is updated with specifications of the reinstated clone. In one embodiment, the catalog is updated with inferred associations among applications and identified rules associated with the application, where the inferred associations and identified rules are generated by a trained machine learning-based classifier.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
Embodiments are provided for centralized control of execution of a quantum program. In some embodiments, a system can include a processor that executes computer-executable components stored in memory. The computer-executable components include a synchronization component that causes multiple controller devices remotely located relative to the system to be synchronized with one another and the system. The computer-executable components also include an ingestion component that accesses measurement data resulting from one or more measurements at respective qubit devices. The computer-executable components further include a composition component that generates, using the measurement data, one or more control messages for respective second controller devices of the multiple controller devices.
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p.ex. couplage ou commande de qubit
A method, a computer system and a computer program product train machine learning models. The method includes coupling the machine learning system to a network and receiving, by the machine learning system via the network, a new estimator not included in the list of estimators and a respective documentation. The method also includes adding the new estimator to the list stored in memory. The method further includes reading the documentation and providing the machine learning process tool with respective extracted data and adapting, by the machine learning process tool, at least one training data set out of the group of training data sets to the new estimator on the basis of the extracted data. Lastly, the method includes training at least a subset of the machine learning models by using the new estimator, with the at least one training data set as an input, the training resulting in an output.
A method of manufacturing a vertical metal-semiconductor field-effect transistor (MESFET) device is provided. The method includes forming a first oxide layer, forming a first electrode in the oxide layer, forming a crystallized silicon layer on the first electrode, forming a second electrode on the first oxide layer and on sidewalls of the crystalized silicon layer, forming a second oxide layer on upper surfaces of the second electrode. The method also includes forming a third electrode on an upper surface of the crystallized silicon layer.
H01L 29/812 - Transistors à effet de champ l'effet de champ étant produit par une jonction PN ou une autre jonction redresseuse à grille Schottky
H01L 27/24 - Dispositifs consistant en une pluralité de composants semi-conducteurs ou d'autres composants à l'état solide formés dans ou sur un substrat commun comprenant des composants à l'état solide pour le redressement, l'amplification ou la commutation, sans barrière de potentiel ni barrière de surface
60.
FLEXIBLE COLD PLATE FOR CONTACTING VARIED AND VARIABLE CHIP HEIGHTS
An apparatus comprising chips mounted to a substrate, wherein one or more of the chips comprises a first height and one or more of the chips comprises a second height, wherein the first height is taller than the second height. A cold plate located above the plurality of chips, wherein the cold plate includes a bottom wall and a top wall, wherein the cold plate includes a plurality of cooling fins that are attached to the bottom wall of the cold plate, wherein the cold plate accommodates the plurality of chips, wherein the chips includes chips having the first height and the second height.
H01L 23/367 - Refroidissement facilité par la forme du dispositif
H01L 23/473 - Dispositions pour le refroidissement, le chauffage, la ventilation ou la compensation de la température impliquant le transfert de chaleur par des fluides en circulation par une circulation de liquides
H05K 7/20 - Modifications en vue de faciliter la réfrigération, l'aération ou le chauffage
61.
SINGLE FUNCTION TO PERFORM COMBINED CONVOLUTION AND SELECT OPERATIONS
A combined function specified by an instruction is performed. The combined function includes a plurality of operations performed as part of one invocation of the combined function. The performing the combined function includes performing a convolution using a first tensor and a second tensor to obtain one or more intermediate results, in which the second tensor includes an adjusted weight tensor created using a plurality of multipliers. Values of a bias tensor are added to the one or more intermediate results to obtain one or more combined function results for the combined function.
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
A first processor processes an instruction configured to perform a plurality of functions. The plurality of functions includes one or more functions to operate on one or more tensors. A determination is made of a function of the plurality of functions to be performed. The first processor provides to a second processor information related to the function. The second processor is to perform the function. The first processor and the second processor share memory providing memory coherence.
An instruction to perform a recurrent neural network cell activation is executed. The executing includes performing a plurality of operations of the recurrent neural network cell activation to provide a result of the recurrent neural network cell activation. The plurality of operations is performed in a single invocation of the instruction. The recurrent neural network cell activation is, for instance, a long short-term memory cell activation or a gated recurrent unit cell activation.
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
Methods, computer program products, and/or systems are provided that perform the following operations: setting a memory buffer having contiguous memory blocks; obtaining a decision tree comprising nodes including split nodes and leaf nodes, wherein each of the split nodes includes at least two child nodes that are ordered according to a likelihood of accessing a child node after each of the split nodes; mapping the nodes onto respective blocks of the memory blocks, each of the memory blocks storing attributes of a corresponding one of the nodes, wherein each of the split nodes and any child nodes of each split node are mapped onto successive blocks, wherein ordered child nodes of a same one of the split nodes are mapped onto successive blocks; executing the nodes by processing the attributes of the nodes as accessed from the memory according to an order of the memory blocks in the memory buffer.
User verification using a mobile interaction can include receiving interaction data associated with a user of an application operating on a mobile device, the interaction data is generated during an interactive session of the user with the application on the mobile device. A plurality of features are extracted from the interaction data and one or more feature vectors are generated from the plurality of features. The plurality of features are aggregated to the one or more feature vectors and embedded within each feature vector. The embedded plurality of features are then projected to a global feature space by comparing a history of interactive sessions associated with the user and a history of interactive sessions associated with a plurality of different users for generating a global training dataset. Finally, a verification model is generated as a global binary classification model using the global training dataset.
Instruction processing is performed for an instruction (700). The instruction is configured to perform a plurality of functions (702), in which a function of the plurality of functions is to be performed in a plurality of processing phases (704). A processing phase is defined to store up to a select amount of data (706). The select amount of data is based on the function to be performed (708). At least one function of the plurality of functions has a different value for the select amount of data than at least one other function (710). A determination is made as to whether a store into a designated area occurred based on processing a select processing phase of a select function (712). Based on determining that the store into the designated area occurred, an interrupt is presented (714), and based on determining that the store into the designated area did not occur, instruction processing is continued (716).
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
67.
INSTRUCTION TO QUERY FOR MODEL-DEPENDENT INFORMATION
An instruction is executed to perform a query function. The executing includes obtaining information relating to a selected model of a processor. The information includes at least one model-dependent data attribute of the selected model of the processor. The information is placed in a selected location for use by at least one application in performing one or more functions.
A system and method is provided for dynamic renewable runtime resource management in response to flexible resource allocations by a processor. In embodiments, a method includes: calculating, by a processor of a system, a resource consumption value of a first workload by aggregating allocation values of persistent resources currently allocated to the first workload by the processor; determining, by the processor, that the resource consumption value of the first workload is greater than a predefined resource allocation target for the first workload; and temporarily adjusting, by the processor, a renewable runtime resource target of the first workload from an initial target value to a temporary target value based on the resource consumption value.
A semiconductor device including a second magnetic tunnel junction stack aligned above a spin conductor layer above a first magnetic junction stack, a sidewall dielectric surrounding the second magnetic tunnel junction stack, a vertical side surface of the sidewall dielectric is aligned with vertical side surfaces of the spin conductor layer and the first magnetic junction stack. A method including forming a first magnetic tunnel junction stack, a spin conductor layer and a second magnetic tunnel junction stack, patterning the second magnetic tunnel junction stack, while not patterning the spin conductor layer and the first magnetic tunnel junction stack, forming a sidewall dielectric and a polymer layer on the sidewall dielectric. A method including patterning a second magnetic tunnel junction stack, while not patterning a spin conductor layer below the second magnetic tunnel junction stack nor a first magnetic tunnel junction stack below the spin conductor layer.
H01L 43/02 - Dispositifs utilisant les effets galvanomagnétiques ou des effets magnétiques analogues; Procédés ou appareils spécialement adaptés à la fabrication ou au traitement de ces dispositifs ou de leurs parties constitutives - Détails
Methods and systems for performing transfer learning with basis scaling and pruning. One method includes obtaining a pre-trained deep convolutional neural network (DCNN), decomposing each weight matrix of the DCNN, and decomposing each convolutional layer by applying the respective decomposed weight matrix to the convolution layer to form a first layer which comprises the left matrix for convolution, and a second layer which comprises the right matrix for convolution. The method also includes providing a basis-scaling convolutional layer having a weight matrix that is derived by a function of singular values and the right singular vectors and training the basis scaling factors of the basis-scaling convolutional layers.
An approach for utilizing an IC (integrated circuit) that is capable of storing multi-bit in storage is disclosed. The approach leverages the use of multiple nanowires structures as channels (102), (105), (107) in a gate of a transistor. The use of multiple nanowires as channels (102), (105), (107) allows for different V t (i.e., voltage of device) to be dependent on the thickness of the fe (ferroelectric) layer (103), (104), (106) that surrounds each of the nanowire channels (102), (105), (107). Memory window is about 2d (thickness of a fe layer (103), (104), (106)). Setting voltage is also proportional to the fe layer (103), (104), (106) thickness. The V t of the device is the superposition of the various fe layers (103), (104), (106). For example, if there are three channels (102), (105), (107) with three different fe layer (103), (104), (106) (of varying thickness), then four memory states can be achieved. More states can be achieved based on the number of channels (102), (105), (107) in the device.
H01L 29/78 - Transistors à effet de champ l'effet de champ étant produit par une porte isolée
H01L 29/423 - Electrodes caractérisées par leur forme, leurs dimensions relatives ou leur disposition relative ne transportant pas le courant à redresser, à amplifier ou à commuter
A resistive RAM module comprises a source electrode and an intermediate electrode that is formed on the source electrode. The intermediate electrode has a closed-curve profile. The resistive RAM module also comprises a memristor element that is deposited on the intermediate electrode. The resistive RAM module also comprises a sink electrode that is in contact with the memristor element. The intermediate electrode is electrically between the source electrode and the memristor element and the memristor element is electrically between the intermediate electrode and the sink electrode.
H01L 45/00 - Dispositifs à l'état solide spécialement adaptés pour le redressement, l'amplification, la production d'oscillations ou la commutation, sans barrière de potentiel ni barrière de surface, p.ex. triodes diélectriques; Dispositifs à effet Ovshinsky; Procédés ou appareils spécialement adaptés à la fabrication ou au traitement de ces dispositifs ou de leurs parties constitutives
H01L 27/24 - Dispositifs consistant en une pluralité de composants semi-conducteurs ou d'autres composants à l'état solide formés dans ou sur un substrat commun comprenant des composants à l'état solide pour le redressement, l'amplification ou la commutation, sans barrière de potentiel ni barrière de surface
73.
SINGLE FUNCTION TO PERFORM MULTIPLE OPERATIONS WITH DISTINCT OPERATION PARAMETER VALIDATION
An indication of a function to be executed is obtained, in which the function is one function of an instruction and configured to perform multiple operations. A determination is made of an operation of the multiple operations to be performed, and a set of function-specific parameters is validated using a set of values and a corresponding set of relationships. The set of values and corresponding set of relationships are based on the operation to be performed. One set of values and corresponding set of relationships are to be used for the operation to be performed, and another set of values and corresponding set of relationships are to be used for another operation of the multiple operations.
G06F 9/30 - Dispositions pour exécuter des instructions machines, p.ex. décodage d'instructions
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
74.
SINGLE FUNCTION TO PERFORM COMBINED MATRIX MULTIPLICATION AND BIAS ADD OPERATIONS
A combined function specified by an instruction is performed. The combined function includes a plurality of operations performed as part of one invocation of the combined function. The performing the combined function includes performing a matrix multiplication of a first tensor and a second tensor to obtain one or more intermediate results. The second tensor includes an adjusted weight tensor created using a multiplier. Values of a bias tensor are added to the one or more intermediate results to obtain one or more results for the combined function. The one or more results are at least a part of an output tensor.
G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
A tensor of a first select dimension is reformatted to provide one or more sub-tensors of a second select dimension. The reformatting includes determining a number of sub-tensors to be used to represent the tensor. The reformatting further includes creating the number of sub-tensors, in which a sub-tensor is to start on a boundary of a memory unit. Data of the tensor is rearranged to fit within the number of sub-tensors.
G06F 7/76 - Dispositions pour le réagencement, la permutation ou la sélection de données selon des règles prédéterminées, indépendamment du contenu des données
76.
DATA CONVERSION TO/FROM SELECTED DATA TYPE WITH IMPLIED ROUNDING MODE
An instruction to convert data from a source data type to a target data type is obtained. The source data type is selected from one or more source data types supported by the instruction, and the target data type is selected from one or more target data types supported by the instruction. Based on a selected data type of the source data type or the target data type, a determination is made of a rounding mode for use by the instruction. The rounding mode is implicitly set based on the selected data type; it is assigned to the selected data type. A conversion of the data from the source data type to the target data type is performed. The conversion includes performing a rounding operation using the rounding mode implicitly set. The performing the conversion provides a result in the target data type, which is written to a select location.
Pointer alignment in a computer programming to obtain information enabling a compiler to optimize program code. Equivalence classes of pointers are collected in a program using a flow-insensitive yet field-sensitive pointer analysis operation iterating through an entire program code of the program. The equivalence classes of pointers, once collected, are mapped to and recorded in an equivalence class mapping table (ECTable). A portion of the collected equivalence classes of pointers are identified, from the ECTable, as pointer candidates for a pointer alignment computation according to a code pattern analysis of each pointer candidate. The code pattern analysis is based on available alignment information, and whether the alignment information would enable a compiler to optimize pointer references of the candidate pointer. The pointer alignment computation is then performed for each identified pointer candidate to obtain the alignment information used to optimize execution of the program.
A floor system in a server room includes a main panel (100) and a sub-panel (200). The main panel (100) includes main panel inlaid cables (120A, 120B) and main panel connectors (130C) where the main panel inlaid cables (120A, 120B) connect a first set of the main panel connectors (130C) to a second set of the main panel connectors (130C). The sub-panel (200) includes sub-panel inlaid cables (230) and sub-panel connectors (225A-D) where the sub-panel inlaid cables (230) connect the sub-panel connectors (225A-D) to one another. The floor system provides an operating floor via the main panel (100) and the sub-panel (200) where the operating floor is raised relative to a sub-floor and the main panel (100) is a removable floor panel to access a space between the operating floor and the sub-floor. The main panel inlaid cables (120A, 120B) and the sub-panel inlaid cables (230) establish a current pathway from a power source.
An exception summary is provided for an invalid value detected during instruction execution. An indication that a value determined to be invalid was included in input data to a computation of one or more computations or in output data resulting from the one or more computations is obtained. The value is determined to be invalid due to one exception of a plurality of exceptions. Based on obtaining the indication that the value is determined to be invalid, a summary indicator is set. The summary indicator represents the plurality of exceptions collectively.
A computer-implemented method shares data feeds among devices. The method includes identifying a plurality of devices including a first device, where each device of the plurality of devices is within a vicinity of the first device. The method also includes forming an ad hoc network that includes each device of the plurality of devices. The method further includes determining a plurality of available data feeds, where each data feed is associated with one device of the plurality of devices. The method includes building a switch icon, where the switch icon includes a view of each available data feed, and the switch icon is configured to allow access to any feed of the plurality of feed and display a selected feed from the switch icon. The method includes sending the switch icon to each device in the ad hoc network.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
81.
DATABASE OPTIMIZATION USING RECORD CORRELATION AND INTERMEDIATE STORAGE MEDIA
A method includes deriving usage data associated with records of a database by monitoring requests to perform read operations on the records of the database. The method generates record correlation data representative of correlations between respective groups of records of the database by parsing the usage data associated with the records of the database. The method stores a plurality of records received as respective write requests during a first time interval in an intermediate storage medium. The method identifies a correlation in the record correlation data between a first record of the plurality of records and a second record of the plurality of records. The method selects, responsive to identifying the correlation, a first location in the database for writing the first record and a second location in the database for writing the second record based on a proximity of the first location to the second location.
A processor may receive a building design of the building having one or more design components. A processor may receive, from at least one data collection device, a geographical location with one or more environmental parameters. A processor may simulate a virtual reality environment of the building design in the geographical location interacting with the one or more environmental parameters. A processor may augment the building design to an updated building design. The updated building design may be augmented based on the one or more environmental parameters.
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateur; Dispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p.ex. dispositions d'interface
83.
PHASE CHANGE MEMORY CELL WITH AN AIRGAP TO ALLOW FOR THE EXPANSION AND RESTRICTION OF THE PCM MATERIAL
A phase change memory (PCM) cell comprises: a first electrode located on a substrate; a phase change material layer located adjacent to the first electrode, wherein a first side of the phase change material layer is in direct contact with the first electrode; second electrode located adjacent to phase change material layer, wherein the second electrode is in direct contact with a second side of the phase change material layer, wherein the first side and the second side are different sides of the phase change material layer; and an airgap is located directly above the phase change material layer, wherein the airgap provides space for the phase change material to expand or restrict.
H01L 45/00 - Dispositifs à l'état solide spécialement adaptés pour le redressement, l'amplification, la production d'oscillations ou la commutation, sans barrière de potentiel ni barrière de surface, p.ex. triodes diélectriques; Dispositifs à effet Ovshinsky; Procédés ou appareils spécialement adaptés à la fabrication ou au traitement de ces dispositifs ou de leurs parties constitutives
G11C 11/56 - Mémoires numériques caractérisées par l'utilisation d'éléments d'emmagasinage électriques ou magnétiques particuliers; Eléments d'emmagasinage correspondants utilisant des éléments d'emmagasinage comportant plus de deux états stables représentés par des échelons, p.ex. de tension, de courant, de phase, de fréquence
84.
PERFORMANCE DATA ANALYSIS TO REDUCE FALSE ALERTS IN HYBRID CLOUD ENVIRONMENT
A computer-implemented method is provided. The method includes converting runtime data points that are indicative of an influence of the runtime data points on a robustness and performance of a computing system. The runtime data points are clustered, wherein each cluster respectively represents a temporal state of the computing system. Each cluster is translated into a three-dimensional representation based on a probability density of the runtime data points of each cluster. A time-based vector is generated, where the vector describes a transition from a first three-dimensional representation to a second three-dimensional representation. Each three-dimensional representation traversed by the time-based vector represents a respective state of the computing system. The time-based vector is compared with a baseline vector. An anomaly alert is issued based at least in part on the comparison.
MOBILE DEVICE ROAMING OPTIMIZATION AND OPERATION A method, system, and computer program product for implementing mobile device roaming optimization is provided. The method includes receiving a selection for services associated with a first mobile device provider for activation during travel to a location associated with mobile device roaming attributes with respect to a mobile device of a user. A blockchain structure and a hash masking sensitive data of the user are generated. It is detected that the user and mobile device have traveled to the location and access to the blockchain structure is enabled. Roaming usage attributes of the mobile device are determined. Subsequently, operational functionality of the mobile device at the geographical location is enabled via roaming usage of a network of the second mobile device provider and second hash of consumption related information compliant with data residency is transmitted to the first mobile device provider to facilitate resolution of disputes across entities.
Methods and systems are provided for processing different-modality digital images of tissue. The method includes, for each image, detecting biological entities in the image and generating an entity graph comprising entity nodes, representing respective biological entities, interconnected by edges representing interactions between entities represented by the entity nodes. The method also includes selecting, from each image, anchor elements comprising elements corresponding to anchor elements of at least one other image, and generating an anchor graph in which anchor nodes, representing respective anchor elements, are interconnected with entity nodes of the entity graph for the image by edges indicating relations between entity nodes and anchor nodes. The method further includes generating a multimodal graph by interconnecting anchor nodes of the anchor graphs for different images via correspondence edges indicating correspondence between anchor nodes, and processing the multimodal graph to output multimodal data, derived from the plurality of images, for medical evaluation.
G06T 7/33 - Détermination des paramètres de transformation pour l'alignement des images, c. à d. recalage des images utilisant des procédés basés sur les caractéristiques
Alternating copolymers having hydrocarbon-substituted terminal units and repeat units each containing two different monomer units with extreme ultraviolet (EUV)-absorbing elements are disclosed. Alternating copolymers having organic terminal units and repeat units each containing a monomer unit with an EUV-absorbing element and an organic monomer unit are also disclosed. A process of forming a polymer resist, which includes providing an alternating copolymer having repeat units with at least one EUV-absorbing monomer unit and replacing end groups of the alternating copolymer with unreactive terminal units, is disclosed as well.
G03F 7/00 - Production par voie photomécanique, p.ex. photolithographique, de surfaces texturées, p.ex. surfaces imprimées; Matériaux à cet effet, p.ex. comportant des photoréserves; Appareillages spécialement adaptés à cet effet
Disclosed herein is a method of training an artificial intelligence model with adjustable parameters that is trained to provide an analysis result in response to receiving an input data set comprising one or more chosen variables. The method comprises: receiving a training data set comprising multiple groups of training input data paired with a training analysis result(400), receiving a trial analysis result from the artificial intelligence model in response to inputting the multiple groups of training input data into artificial intelligence model(402), calculating an accuracy metric descriptive of a comparison between the trail analysis result and the training analysis result(404), calculating a fairness score metric by comparing the one or more chosen variables to the trial analysis result (406), calculating a combined metric from the fairness score metric and the accuracy metric(408), and modifying the adjustable parameters using a training algorithm that receives at least the combined metric(410).
Aspects are provided for sharing instruction cache footprint between multiple threads. A set/way pointer to an instruction cache line is derived from a system memory address associated with an instruction fetch from a memory page. It is determined that the instruction cache line is shareable between the first thread and the second thread. An alias table entry is created indicating that other instruction cache lines associated with the memory page are also shareable between threads. Another instruction fetch is received from another thread requesting an instruction from another system memory address associated with the memory page. A further set/way pointer to another instruction cache line is derived from the other system memory address. It is determined that the other instruction cache line is sharable based on the alias table entry.
A method for identifying within a hierarchical database, data elements associated with a selected function associated with the database is provided. The computer identifies at least one function associated with a hierarchical database containing data elements. The computer, in response to identifying the function, identifies within a list of indica, at least one reference indicia corresponding to the at least one function. The computer identifies within a monolithic application relevant code elements associated with the reference indicia. The computer generates an activity log associated with execution of the relevant code elements. The computer identifies, within the activity log, a group of data elements associated with the execution of the relevant code elements. The computer generates a group data element clusters using a Machine Learning algorithm. The computer identifies at least one of the group of data element clusters as relevant to the at least one function.
A. phase locked loop having a charge pump is described. The charge pump has circuitry to select a mode for each semiconductor chip from a plurality of modes to enhance yield. Nine unique modes are defined from which a selection is made for each chip. The selected mode mitigates effects of device mistracking anomalies for each chip. A method is provided to show how the modes are determined and prioritized.
H03L 7/089 - Commande automatique de fréquence ou de phase; Synchronisation utilisant un signal de référence qui est appliqué à une boucle verrouillée en fréquence ou en phase - Détails de la boucle verrouillée en phase concernant principalement l'agencement de détection de phase ou de fréquence y compris le filtrage ou l'amplification de son signal de sortie le détecteur de phase ou de fréquence engendrant des impulsions d'augmentation ou de diminution
92.
PROTECTING SENSITIVE INFORMATION IN CONVERSATIONAL EXCHANGES
A computer-implemented method, computer system and computer program product for analyzing conversations is provided. The method includes capturing a conversation with a microphone (302). The conversation comprises a plurality of utterances. The method also includes converting the plurality of utterances into text data using speech recognition algorithms (304). A speaker is identified and associated for each of the plurality of utterances. The method further includes determining an intent of the conversation (310). In addition, the method includes, for each determined intent, classifying each of the plurality of utterances based on the associated speaker and a set of categories associated with each of the plurality of utterances (312). The method also includes determining whether each of the plurality of utterances includes information sensitive to the associated speaker (306). Finally, the method includes storing the utterance in response to an utterance within the plurality of utterances not including information sensitive to the associated speaker (314, 316).
Provided is a system, method, and computer program product for generating a three-dimensional (3D) printable file of a complete object by re-assembling pieces of a broken object using generative adversarial network techniques. A processor may generate a 3D scan of each piece of a plurality of pieces of a broken object. The processor may assemble the 3D scan of each piece of the plurality of pieces to generate a re-assembled object, where the re-assembled object includes one or more gaps. The processor may fill the one or more gaps in the re-assembled object to create a complete object. The processor may generate a 3D printable file of the complete object.
G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
94.
DIGITAL MICROFLUDICS-BASED BRAILLE ACTUATION IN A STRETCHABLE DISPLAY
A method, computer system, and computer program product for dynamic braille actuation. The method may include receiving a plurality of media. The method may also include translating one or more visual elements of the received plurality of media to braille. The method may further include generating a plurality of protrusions corresponding to the one or more translated visual elements on a surface of a stretchable display screen using microfluidic actuation.
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
95.
USING AN AUGMENTED REALITY DEVICE TO IMPLEMENT A COMPUTER DRIVEN ACTION BETWEEN MULTIPLE DEVICES
A computer command can be initiated, using an augmented reality (AR) device, for implementing an action between multiple devices. A first computer command can be executed, using an augmented reality device, with respect to a source device, and the first computer command can include copying a first workflow of the source device. A second computer command can be initiated, using the augmented reality device, to a target device. The second computer command can include sending the first workflow of the source device to the target device. A comparative analysis of specifications for the source device and the target device can be performed, respectively. An alteration of the first workflow can be detected and implemented, in response to the comparative analysis to generate an updated first workflow. Using the AR device, the updated first workflow can be sent to the target device.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A method(100) for facilitating root cause analysis (208) of a software crash by core dump analysis is disclosed. The method (100) comprises receiving a core dump file relating to a software program (102), identifying unique source code lines (304) in the core dump file (202) for each running thread (203) at the crash time (104), and determining each of the unique source code lines as a conspicuous source code line (218,308) depending on a predefined abstraction level value (204) (106), the abstraction level value (204) being indicating of a number of occurrences of the conspicuous source code lines (218,308) in different threads (203). Furthermore, the method comprises determining an abstraction ratio (220) as a function of a number of conspicuous source code lines (218,308) and a number of the unique source code lines (304) (108), evaluating whether the predefined abstraction level value (204) has to be adjusted determining the unique source code lines (304) as the conspicuous source code lines (218,308) and the value of the abstraction ratio (220) (110), and outputting the conspicuous source code lines (218,308) and an assessment value for the value of the abstraction ratio (220) (112).
A computer-implemented method includes: receiving, at a clustered filesystem from a formatted filesystem, a request to perform a data integrity check for a portion of data. A determination is made as to whether the request includes a filesystem type of the portion of data, and in response to determining that the request includes a filesystem type of the portion of data, another determination is made as to whether the clustered filesystem supports the data integrity check for the filesystem type. In response to determining the clustered filesystem supports the data integrity check, another determination is made as to whether the portion of data is currently available. Furthermore, the computer-implemented method includes causing the data integrity check to be performed in response to determining that the portion of data is currently available. Results of performing the data integrity check are also sent to the formatted filesystem.
A tamper detection system may include organic material and a tamper detection circuit embedded in the organic material. A portion of the organic material is ablated away to form an incision in the organic material. A portion of the tamper detection circuit obstructs a fragment of the ablation path. The tamper detection circuit remains intact. The incision enables a gas flow between a first side of the organic material and a second side of the organic material.
A method, computer system, and a computer program product for digital content development is provided. The method may include identifying one or more keywords associated with a digital course received from a digital content developer. The method may include identifying one or more relevant digital courses of one or more digital learning platforms. The method may include analyzing one or more relevant digital courses using one or more analytical techniques. The method may include evaluating the course received from the digital content developer. The method may include generating one or more new digital courses for each of the one or more digital learning platforms.
An instruction is provided to perform a reset address translation protection operation when executed. Executing the instruction includes determining, by a processor, that an address translation protection bit in a specified translation table entry associated with a storage block is to be reset. Based on determining that the address translation protection bit is to be reset, executing the instruction includes resetting the address translation protection bit to deactivate write protection for the storage block. The resetting is absent waiting for an action by one or more other processors of the computing environment.
G06F 12/1009 - Traduction d'adresses avec tables de pages, p.ex. structures de table de page
G06F 12/1027 - Traduction d'adresses utilisant des moyens de traduction d’adresse associatifs ou pseudo-associatifs, p.ex. un répertoire de pages actives [TLB]
G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire