Patents by Inventor Ben SHI
Ben SHI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240103097Abstract: The present disclosure provides a direct current (DC) transformer error detection apparatus for a pulsating harmonic signal, including a DC and pulsating harmonic current output module and an external detected input module, where the DC and pulsating harmonic current output module outputs a DC and a DC superimposed pulsating harmonic current to an internal sampling circuit and a self-calibrated standard resistor array; and the internal sampling circuit converts the input DC and the input DC superimposed pulsating harmonic current into a voltage signal, and sends the voltage signal to an analog-to-digital (AD) sampling and measurement component through a front-end conditioning circuit and a detected input channel. The DC transformer error detection apparatus can complete self-calibration for measurement of the DC and the pulsating harmonic signal on a test site.Type: ApplicationFiled: August 17, 2022Publication date: March 28, 2024Inventors: Xin Zheng, Wenjing Yu, Tao Peng, Yi Fang, Ming Lei, Hong Shi, Ben Ma, Li Ding, Wei Wei, Linghua Li, He Yu, Tian Xia, Yingchun Wang, Sike Wang, Dongri Xie, Xin Wang, Bo Pang, Xianjin Rong
-
Patent number: 11324665Abstract: A medical intelligent device is for use with a medical jar. The medical jar defines an accommodating space for containing at least one medicine. The medication intelligent device includes a cover and an auxiliary medicine deliver. The cover is detachably mounted on the medical jar. The auxiliary medicine deliver is disposed on the cover and includes a main control chip and a medicine delivery gate electrically connected to the main control chip. The main control chip is used to move the gate between a closed position and an opened position relative to the cover. In the closed position, the medicine delivery gate closes the accommodating space. In the opened position, the medicine delivery gate opens the accommodating space.Type: GrantFiled: September 28, 2020Date of Patent: May 10, 2022Assignee: National Applied Research LaboratoriesInventors: Shaw-Ben Shi, Shu-Hui Hung, Wei-Hua Teng
-
Patent number: 11080281Abstract: A method, system, and computer program product for graph-based searching for one or more data streams is disclosed. A computer-implemented method comprises extracting a plurality of tuples from one or more data streams. The method further comprises generating a graph for the plurality of tuples in which a node represents a tuple of the plurality of tuples and an edge represents a correlation between the node and another node, and the edge is generated based at least partly on one or more predetermined queries for the one or more data streams. The method further comprises traversing the graph based on the one or more predetermined queries. Accordingly, embodiments of the present disclosure can improve the search speed by use of the graph-based searching for one or more data streams.Type: GrantFiled: May 17, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Shaw-Ben Shi, Meng Hong Tsai, Qingyan Wang, Yu Ling Zheng, Yu Chen Zhou
-
Publication number: 20210177702Abstract: A medical intelligent device is for use with a medical jar. The medical jar defines an accommodating space for containing at least one medicine. The medication intelligent device includes a cover and an auxiliary medicine deliver. The cover is detachably mounted on the medical jar. The auxiliary medicine deliver is disposed on the cover and includes a main control chip and a medicine delivery gate electrically connected to the main control chip. The main control chip is used to move the gate between a closed position and an opened position relative to the cover. In the closed position, the medicine delivery gate closes the accommodating space. In the opened position, the medicine delivery gate opens the accommodating space.Type: ApplicationFiled: September 28, 2020Publication date: June 17, 2021Inventors: Shaw-Ben Shi, Shu-Hui Hung, Wei-Hua Teng
-
Patent number: 10901999Abstract: A method, system, and computer program product for graph-based searching for one or more data streams is disclosed. A computer-implemented method comprises extracting a plurality of tuples from one or more data streams. The method further comprises generating a graph for the plurality of tuples in which a node represents a tuple of the plurality of tuples and an edge represents a correlation between the node and another node, and the edge is generated based at least partly on one or more predetermined queries for the one or more data streams. The method further comprises traversing the graph based on the one or more predetermined queries. Accordingly, embodiments of the present disclosure can improve the search speed by use of the graph-based searching for one or more data streams.Type: GrantFiled: October 23, 2017Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Shaw-Ben Shi, Meng Hong Tsai, Qingyan Wang, Yu Ling Zheng, Yu Chen Zhou
-
Publication number: 20200142770Abstract: A computer-implemented method for diagnosing one or more malfunctions of one or more machines within a network. The method monitors the one or more machines within the network and identifies one or more machines that is broadcasting a malfunction message. The method further accesses a product manual for the identified one or more machines and diagnoses the one or more malfunctions of the identified one or more machines, based on a matching description of the malfunction message within the product manual. The method may further perform a diagnostic data collection on the identified one or more machines that is broadcasting a malfunction message and identify a fixing procedure based on the diagnosed one or more malfunctions. The method further communicates the fixing procedure, for the identified one or more machines that is broadcasting the malfunction message, to a user.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Inventors: Chih-Hsiung Liu, Shaw-Ben Shi, Xinlin Wang, Norman Kung, Ci-Wei Lan
-
Publication number: 20190297473Abstract: The method includes receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: ApplicationFiled: June 12, 2019Publication date: September 26, 2019Inventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Publication number: 20190286633Abstract: A computer-implemented method includes receiving a data stream and dividing the data stream into one or more data artefacts for one or more time intervals. The computer-implemented method further includes generating one or more contexts. Each of the one or more contexts are for at least one of the one or more time intervals. The computer-implemented method further includes storing each of the one or more data artefacts in shared storage. The shared storage is accessible for each of the one or more contexts. The computer-implemented method further includes, for each context of the one or more contexts: determining a dependency for the context; monitoring the context for a completion of said dependency; and responsive to the completion, releasing the dependency. The computer-implemented further includes removing those of the one or more data artefacts that do not belong to the dependency for any of the one or more contexts.Type: ApplicationFiled: June 6, 2019Publication date: September 19, 2019Inventors: Lei He, Yang Liu, Cheng Luo, Shaw-Ben Shi, Meng Hong Tsai, Xi Ning Wang, Shun Xiang Yang
-
Publication number: 20190272273Abstract: A method, system, and computer program product for graph-based searching for one or more data streams is disclosed. A computer-implemented method comprises extracting a plurality of tuples from one or more data streams. The method further comprises generating a graph for the plurality of tuples in which a node represents a tuple of the plurality of tuples and an edge represents a correlation between the node and another node, and the edge is generated based at least partly on one or more predetermined queries for the one or more data streams. The method further comprises traversing the graph based on the one or more predetermined queries. Accordingly, embodiments of the present disclosure can improve the search speed by use of the graph-based searching for one or more data streams.Type: ApplicationFiled: May 17, 2019Publication date: September 5, 2019Inventors: Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Shaw-Ben Shi, Meng Hong Tsai, Qingyan Wang, Yu Ling Zheng, Yu Chen Zhou
-
Patent number: 10387424Abstract: A computer-implemented method includes receiving a data stream and dividing the data stream into one or more data artefacts for one or more time intervals. The computer-implemented method further includes generating one or more contexts. Each of the one or more contexts are for at least one of the one or more time intervals. The computer-implemented method further includes storing each of the one or more data artefacts in shared storage. The shared storage is accessible for each of the one or more contexts. The computer-implemented method further includes, for each context of the one or more contexts: determining a dependency for the context; monitoring the context for a completion of said dependency; and responsive to the completion, releasing the dependency. The computer-implemented further includes removing those of the one or more data artefacts that do not belong to the dependency for any of the one or more contexts.Type: GrantFiled: November 13, 2015Date of Patent: August 20, 2019Assignee: International Business Machines CorporationInventors: Lei He, Yang Liu, Cheng Luo, Shaw-Ben Shi, Meng Hong Tsai, Xi Ning Wang, Shun Xiang Yang
-
Patent number: 10375542Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: GrantFiled: July 25, 2018Date of Patent: August 6, 2019Assignee: International Business Machines CorporationInventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Publication number: 20190121895Abstract: A method, system, and computer program product for graph-based searching for one or more data streams is disclosed. A computer-implemented method comprises extracting a plurality of tuples from one or more data streams. The method further comprises generating a graph for the plurality of tuples in which a node represents a tuple of the plurality of tuples and an edge represents a correlation between the node and another node, and the edge is generated based at least partly on one or more predetermined queries for the one or more data streams. The method further comprises traversing the graph based on the one or more predetermined queries. Accordingly, embodiments of the present disclosure can improve the search speed by use of the graph-based searching for one or more data streams.Type: ApplicationFiled: October 23, 2017Publication date: April 25, 2019Inventors: Xiao Xing Liang, Cheng Luo, Wayne B. Riley, Shaw-Ben Shi, Meng Hong Tsai, Qingyan Wang, Yu Ling Zheng, Yu Chen Zhou
-
Publication number: 20180332449Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: ApplicationFiled: July 25, 2018Publication date: November 15, 2018Inventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Patent number: 10070285Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: GrantFiled: July 6, 2017Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Patent number: 10026283Abstract: An embodiment of the present invention may include a system and method for intrusion detection of an unauthorized human. The embodiment may include a security device with a human presence detector, recognition mechanisms, and a computer coupled to the device over a network. The device may detect a human and notify the computer. In response, the computer may cause the device to collect and transmit recognition mechanism information. This may include causing the device to collect and transmit first information, determining a degree of match to each corresponding stored information associated with a human, and determining that a sufficient match does not exist. For each subsequent mechanism, the embodiment may include causing the device to collect and transmit the subsequent information, determining a degree of match, and in response to determining that the confidence level of the match is above the threshold, classifying the human as authorized.Type: GrantFiled: June 20, 2017Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: Chih-Hsiung Liu, Shaw-Ben Shi, Yu Chen Zhou
-
Patent number: 9946578Abstract: A method and apparatus for managing the persistent data of a pre-installed application in an elastic virtual machine instance is disclosed, the method comprising: in response to installing an application into a master virtual machine image, obtaining a persistent data point of a function component of the application, the persistent data point comprising a file directory for storing the persistent data of the function component; in response to launching an elastic virtual machine instance from the master virtual machine, creating a storage volume, attaching the storage volume to the elastic virtual machine instance, and mounting the storage volume to the file directory based on the persistent data point. Other features and aspects may be realized, depending upon the particular application.Type: GrantFiled: September 28, 2012Date of Patent: April 17, 2018Assignee: International Business Machines CorporationInventors: Yun Song Huang, Xin Peng Liu, Shaw-Ben Shi, Xia Zhang
-
Publication number: 20170311141Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: ApplicationFiled: July 6, 2017Publication date: October 26, 2017Inventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Publication number: 20170270167Abstract: A computer-implemented method includes receiving a data stream and dividing the data stream into one or more data artefacts for one or more time intervals. The computer-implemented method further includes generating one or more contexts. Each of the one or more contexts are for at least one of the one or more time intervals. The computer-implemented method further includes storing each of the one or more data artefacts in shared storage. The shared storage is accessible for each of the one or more contexts. The computer-implemented method further includes, for each context of the one or more contexts: determining a dependency for the context; monitoring the context for a completion of said dependency; and responsive to the completion, releasing the dependency. The computer-implemented further includes removing those of the one or more data artefacts that do not belong to the dependency for any of the one or more contexts.Type: ApplicationFiled: June 7, 2017Publication date: September 21, 2017Inventors: Lei He, Yang Liu, Cheng Luo, Shaw-Ben Shi, Meng Hong Tsai, Xi Ning Wang, Shun Xiang Yang
-
Patent number: 9736671Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: GrantFiled: January 18, 2016Date of Patent: August 15, 2017Assignee: International Business Machines CorporationInventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai
-
Publication number: 20170208446Abstract: The method include receiving, by one or more computer processors, a request for data usage, the request for data usage being associated with a mobile device. The method further includes identifying, by one or more computer processors, a current data usage quantity, the current data usage quantity being associated with the mobile device. The method further includes determining, by one or more computer processors, whether the current data usage quantity is beyond a threshold data usage. The method further includes responsive to the data usage quantity being beyond the threshold data usage, receiving, by one or more computer processors, mobile device information associated with the mobile device. The method further includes analyzing, by one or more computer processors, the mobile device information. The method further includes determining, by one or more computer processors, access for the request based on the mobile device information and the current data usage quantity.Type: ApplicationFiled: January 18, 2016Publication date: July 20, 2017Inventors: Geetha Adinarayan, Shaw-Ben Shi, Gandhi Sivakumar, Meng Hong Tsai