Patents by Inventor Peng Hui Jiang

Peng Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220327144
    Abstract: In an embodiment of the present invention, a checkpoint is received, the checkpoint indicating at least one source position of unprocessed object(s) of a plurality of objects on at least one source shard in a database system. In response to detecting a shard change related to the checkpoint to the at least one source shard, the shard change resulting in that the at least one source shard is updated to at least one destination shard, a mapping view is generated for representing position change of the unprocessed object(s) related to the shard change. An updated checkpoint is determined for indicating the at least one destination position of the unprocessed object(s) of the plurality of objects on at least one destination shard in the database system based on the mapping view. With these embodiments, the checkpoint may be managed in a more effective way.
    Type: Application
    Filed: April 9, 2021
    Publication date: October 13, 2022
    Inventors: Peng Hui Jiang, Meng Wang, Jun Su, DOUGLAS J. COWIE, Li Jia Meng
  • Publication number: 20220300485
    Abstract: An indication to remove one or more data in a time series database is received. A metadata index associated with the time series database is updated to indicate a soft removal of each data of the one or more data. A data hole index associated with the time series database is updated to indicate a data hole at a location of each data of the one or more data in the time series database. Responsive to an input/output rate for the time series database being below a threshold, the data hole of each data of the one or more data is optimized.
    Type: Application
    Filed: March 22, 2021
    Publication date: September 22, 2022
    Inventors: Huai Long Zhang, Peng Hui Jiang, Jin Shan Li, Rui Liu, Ming Lei Zhang
  • Publication number: 20220292120
    Abstract: An embodiment includes receiving a request to delete a specified document from a primary shard of a sharded database. The embodiment also includes inserting a soft-deletion document to a soft-deletion shard, wherein the soft-deletion document identifies the specified document, which remains in the primary shard. The embodiment also includes receiving a query from a client application, wherein the specified document satisfies the query. The embodiment also includes blocking the specified document from being returned in response to the query while the soft-deletion document associated with the specified document remains in the soft-deletion shard.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Applicant: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Jun Su, Dong Chen, Huai Ying HY Xia, Su Liu
  • Publication number: 20220292112
    Abstract: In an approach to improve asynchronous replication in database clusters embodiments retain committed transactions during database cluster replication. Embodiments build and run asynchronous replication logic using database nodes running as one or more standalone nodes, wherein the asynchronous replication logic is responsible for data replication from a primary database node to one or more secondary database nodes. Embodiments register a replication reader to a sender node to replicate journal logs and replay the journal logs on the one or more secondary database nodes. Further, embodiments monitor replication lag metrics from the sender node and notify a replication source and a replication target of a generated replication plan, wherein the cluster controller instructs the replication source and the replication target to be ready to initiate the replication plan. Additionally, embodiments adjust a replication plan to allow the asynchronous replication logic to catch up and complete uncommitted transactions.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Xiao Yi Tian, Guoxiang Zhang, XIAN WEI ZHANG, XiangXing Shi, Peng Hui Jiang, Zhang Li
  • Patent number: 11445009
    Abstract: Aspects of the invention include receiving, from a first client, a first object, determining a first file format for the first object, wherein the first file format is operable to run on a first platform, generating a catalog for the first object, wherein the catalog comprises data associated with the first object, and wherein the catalog for the first object is stored on a first server, receiving, from a second client, a request to access the data associated with the first object, determining a second platform operated by the second client, converting, on a second server, the first file format for the first object to a second file format, the second file format operable to run on the second platform, and transmitting the first object in the second file format to the second client.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: September 13, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mo Ji, Peng Hui Jiang, Da L. Huang, Li Na Nn Wang, Kun Song, Ya Nan Mo, Feng Zhang, Li Jun Bj Zhu
  • Patent number: 11429574
    Abstract: Disclosed embodiments provide a computer-implemented technique for creating a log chain from multiple software component logs. The log chain can include log information from multiple software components that interact with each other. In embodiments, a locality-sensitive hashing technique is used to create a signature of a log chain. Machine-learning systems are trained with log chains generated from test execution, and/or log chains from incidents with deployed software. In embodiments, logs are pre-processed by tokenizing and trimming. Logs from various components that interact with each other may be combined into a temporally sequential log chain. The signature of the log chain may be used to identify additional information about the error from a machine-learning process that was trained on previously generated log chains. In this way, the time required to identify a problem can be significantly reduced, resulting in increased reliability and availability of complex computer systems.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: August 30, 2022
    Assignee: International Business Machines Corporation
    Inventors: Quan Q C Cheng, Xiang Qiu, Zhi Wei Du, Peng Hui Jiang
  • Publication number: 20220261470
    Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.
    Type: Application
    Filed: February 18, 2021
    Publication date: August 18, 2022
    Inventors: Jia Tian Zhong, XING XING SHEN, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
  • Patent number: 11409568
    Abstract: In an approach for pod scheduling and recursion, a processor schedules a master pod and one or more worker pods for applications to be deployed on a cluster. A processor builds a topology between the master pod and the one or more worker pods. A processor monitors a workload in the one or more worker pods. A processor determines whether any of the one or more worker pods needs to scale out. In response to determining that one of the one or more worker pods needs to scale out, a processor schedules a next layer of the one or more worker pods according to the workload.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: August 9, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Hui Zhao, Wen Li, Kyle Joseph Snavely
  • Publication number: 20220229804
    Abstract: A method, system and computer program product for container image migration service is provided. The method comprises identifying a latest version of a first customer container image stored in a container image repository. The method further comprises determining the latest version of the first customer container image is a migration image from a last version of the first customer container image; determining a set of commands in the Docker file of the last version of the first customer container image that have migrated to a corresponding set of commands in the Docker file of the migration image; identifying a latest version of a second customer container image having at least one Docker file command in common with at least one command in the set of commands; and recommending imminent migration of the second customer container image to include migration of the at least one Docker file command.
    Type: Application
    Filed: January 21, 2021
    Publication date: July 21, 2022
    Inventors: Wei Wu, Peng Hui Jiang, Jin Shi, Jun Su, XIONG WEI ZHAO, Jing Yan Ma
  • Patent number: 11379478
    Abstract: An approach is provided for optimizing a join operation that includes receiving, by one or more processors of a computer system, a join request associated with a fact table and a plurality of related dimension tables; identifying, by the one or more processors of the computer system, a join relationship from the fact table and the plurality of related dimension tables; matching, by the one or more processors of the computer system, different tables of the fact table and the plurality of related dimension tables; filtering, by the one or more processors of the computer system using data parallelism, the fact table and the plurality of related dimension tables, wherein the filtering occurs prior to performing the join request; and performing, by the one or more processors of the computer system, the join operation pursuant to the join request.
    Type: Grant
    Filed: April 2, 2020
    Date of Patent: July 5, 2022
    Assignee: International Business Machines Corporation
    Inventors: ShengYan Sun, Peng Hui Jiang, Shuo Li, Xiaobo Wang
  • Publication number: 20220188379
    Abstract: Synching multiple streams in a complex enterprise product by collecting and analyzing stream dependency data. Collection and analysis of data for large scale and complex enterprise results in a multi-dimensional relationship diagram that highlights the interconnected dependencies of the streams. This allows enterprise software users to more easily determine and select which stream (or streams) will help the user to perform a given task.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 16, 2022
    Inventors: Jing Yan Ma, Chu Yun Tong, Li Cao, Peng Hui Jiang
  • Patent number: 11354540
    Abstract: In an approach, a processor detects at least one training message delivered by a user on a social media application, the training message being accessible by an operator. A processor records training feedback performed by the operator on the social media application regarding to the at least one training message. A processor trains an analysis engine module using (i) the at least one training message as input and (ii) the training feedback as output. A processor generates a predicted feedback for a subsequent message based on the trained analysis engine module.
    Type: Grant
    Filed: September 25, 2019
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Qin Li, Jonathan D. Dunne, Guang Han Sui, Ping Xiao, Peng Hui Jiang, Niao Qing Liu, Xiang Zhou
  • Patent number: 11354320
    Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
  • Patent number: 11347755
    Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: May 31, 2022
    Assignee: International Business Machines Corporation
    Inventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
  • Patent number: 11321318
    Abstract: Embodiments are disclosed for a method for dynamic access paths. The method includes generating real-time statistics (RTS) estimates based on a log of a database. Further, the method includes generating access paths based on a structured query language command and the RTS estimates. The method also includes training a machine learning model to map the RTS estimates to the access paths.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: May 3, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xiao Xiao Chen, Shuo Li, ShengYan Sun, Xiaobo Wang
  • Patent number: 11308058
    Abstract: Building and using multiple different types of sub-indices to search a database is provided. A plurality of different physical data ranges is generated within the database based on a set of logical hot data ranges and a set of logical non-hot data ranges to form a set of physical hot data ranges and a set of physical non-hot data ranges. A set of sub-index types is built for each respective data range of the plurality of different physical data ranges within the database using a set of selected high-speed sub-index types for the set of physical hot data ranges and another set of selected sub-index types for the set of physical non-hot data ranges to accelerate data availability for query. An index is built for the database using the set of sub-index types built for each respective data range of the plurality of different physical data ranges within the database.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: April 19, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xin Peng Liu, Shuo Li, Sheng Yan Sun, Xiaobo Wang, Yue Wang
  • Publication number: 20220116739
    Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
  • Publication number: 20220107842
    Abstract: In an approach for pod scheduling and recursion, a processor schedules a master pod and one or more worker pods for applications to be deployed on a cluster. A processor builds a topology between the master pod and the one or more worker pods. A processor monitors a workload in the one or more worker pods. A processor determines whether any of the one or more worker pods needs to scale out. In response to determining that one of the one or more worker pods needs to scale out, a processor schedules a next layer of the one or more worker pods according to the workload.
    Type: Application
    Filed: October 5, 2020
    Publication date: April 7, 2022
    Inventors: Peng Hui Jiang, Hui Zhao, Wen Li, Kyle Joseph Snavely
  • Publication number: 20220100727
    Abstract: A computer-implemented method that includes receiving an ingestion request to ingest data to a database comprising physical shards and detecting that the ingestion request is directed to a first hotspot shard. The first hotspot shard has a contention level over a threshold value. The method also detects context characteristics within the data and generates a first virtual shard based on a first virtual shard key selected from the detected context characteristics. The first virtual shard virtually duplicates at least a portion of the first hotspot shard. The method also includes ingesting the data to the first virtual shard.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Shuo Li, Peng Hui Jiang, Xiaobo Wang, Sheng Yan Sun
  • Publication number: 20220100765
    Abstract: Embodiments of the present disclosure relate to an approach for database query. According to the approach, a query for a group of data records is received. At least one index is created on at least one field of the data records and comprises index entries for storing and sorting respective values of the at least one field of the data records. It is determined if the query satisfies a predetermined condition. In response to the query satisfying the predetermined condition, a result of the query is determined by skipping at least a part of operations required by the query based on the at least one index.
    Type: Application
    Filed: September 28, 2020
    Publication date: March 31, 2022
    Inventors: Sheng Yan Sun, Shuo Li, Xiaobo Wang, Peng Hui Jiang