Patents by Inventor Jiazhen Chen
Jiazhen Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240138956Abstract: An endo motor (200) and an endo motor (200) control method. The endo motor (200) comprises a root canal handle (220), a root canal file (230), an electric motor and a first near field communication device (240), wherein the electric motor and the root canal file (230) are both connected to the root canal handle (220); the electric motor is configured to drive the root canal file (230) to rotate; the first near field communication device (240) is electrically connected to the electric motor; and the first near field communication device (240) is configured to control the electric motor on the basis of external information (250).Type: ApplicationFiled: April 7, 2021Publication date: May 2, 2024Inventors: Benqin ZHANG, Zerong CHEN, Zhongshi LONG, Jiazhen XU
-
Publication number: 20240088631Abstract: Provided are an overhead line detection method and system based on a cable inspection robot. The cable inspection robot is suspended on the overhead line. An imaging unit and a laser emission unit are disposed at the front end of the cable inspection robot. The imaging unit is at a first angle to the overhead line. The laser emission unit is at a second angle to the overhead line.Type: ApplicationFiled: November 28, 2022Publication date: March 14, 2024Inventors: Jiazhen DUAN, Zheng LU, Hongtao LIU, Ruxin SHI, Wei ZHANG, Yuqin SHU, Zhiwei KAN, Yannan CHEN, Xiaoqiang CHEN, Xianming REN
-
Publication number: 20230010973Abstract: A virtual resource processing method and apparatus in a game scene, a terminal, and a storage medium are disclosed. The method includes: in response to a disassembly instruction, detecting whether the virtual resource is attacked by a virtual character; when detecting that the virtual resource is attacked by the virtual character, determining the virtual resource attacked by the virtual character as a first virtual resource to be disassembled; and when the first virtual resource to be disassembled satisfies a preset condition removing, the first virtual resource to be disassembled from the game scene. A processing apparatus, a mobile terminal and a computer storage medium are also disclosed. The present disclosure provides a novel user interaction mode. A user may conveniently achieve attacking and removing of a virtual resource in a game scene. The number of interactions between the user and an interaction interface is reduced. The user experience is improved.Type: ApplicationFiled: June 29, 2022Publication date: January 12, 2023Inventors: Changkun WAN, Chuanbei WU, Jiazhen CHEN, Qingxin ZHENG, Haohua HE
-
Patent number: 11426661Abstract: A virtual resource processing method and apparatus in a game scene, a terminal, and a storage medium are disclosed. The method includes: in response to a disassembly instruction, detecting whether the virtual resource is attacked by a virtual character; when detecting that the virtual resource is attacked by the virtual character, determining the virtual resource attacked by the virtual character as a first virtual resource to be disassembled; and when the first virtual resource to be disassembled satisfies a preset condition removing, the first virtual resource to be disassembled from the game scene. A processing apparatus, a mobile terminal and a computer storage medium are also disclosed. The present disclosure provides a novel user interaction mode. A user may conveniently achieve attacking and removing of a virtual resource in a game scene. The number of interactions between the user and an interaction interface is reduced. The user experience is improved.Type: GrantFiled: November 21, 2018Date of Patent: August 30, 2022Assignee: NETEASE (HANGZHOU) NETWORK CO., LTD.Inventors: Changkun Wan, Chuanbei Wu, Jiazhen Chen, Qingxin Zheng, Haohua He
-
Patent number: 11359039Abstract: A method for forming polar-functionalized polyolefins may comprise contacting an unsubstituted ?-olefin monomer and an amino-olefin monomer of formula H2C?CH(CH2)n(CHR)mNR?2, wherein R is H or an unsubstituted linear or branched alkyl group having from 1 to 10 carbons, each R? is an independently selected unsubstituted linear or branched alkyl group having from 1 to 10 carbons, m is an integer from 1 to 11, and n is an integer from 1 to 11, in the presence of a rare earth catalyst and a cocatalyst under conditions to induce a heteropolymerization reaction between the unsubstituted oc-olefin and amino-olefin monomers to provide a polar-functionalized poly olefin.Type: GrantFiled: October 5, 2018Date of Patent: June 14, 2022Assignee: Northwestern UniversityInventors: Tobin J. Marks, Jiazhen Chen, Tracy L. Lohr
-
Patent number: 11348029Abstract: Technology is described for providing machine learning (ML) models. A plurality of candidate ML models that are derived from a primary ML model may be generated in a service provider environment. The primary ML model may be associated with a set of parameters and a candidate ML model in the plurality of candidate ML models may be associated with a subset of the parameters associated with the primary ML model. The plurality of candidate ML models may be run against validation data to evaluate performance criteria for the candidate ML models. A performance representation of the candidate ML models with respect to performance results for the candidate ML models may be provided. An ML model may be selected from the performance representation based on the performance results for the candidate ML models.Type: GrantFiled: November 22, 2017Date of Patent: May 31, 2022Assignee: Amazon Technologies, Inc.Inventors: Jonathan I. Turow, Calvin Yue-Ren Kuo, Jiazhen Chen
-
Patent number: 11224814Abstract: A processing method and apparatus for a virtual resource in a game scene are provided. The method includes: according to a current position of a virtual character in a game scene, determining a region where the virtual character is located, loading a corresponding virtual resource in the game scene according to the range of the region, and updating the state of the virtual resource in the game scene in a unit of the region, thereby effectively reducing the resource consumption and greatly reducing the pressure of data processing.Type: GrantFiled: December 20, 2018Date of Patent: January 18, 2022Assignee: NETEASE (HANGZHOU) NETWORK CO., LTD.Inventors: Chuanbei Wu, Zhirong Du, Qingxin Zheng, Jiazhen Chen
-
Publication number: 20200368623Abstract: A processing method and apparatus for a virtual resource in a game scene are provided. The method includes: according to a current position of a virtual character in a game scene, determining a region where the virtual character is located, loading a corresponding virtual resource in the game scene according to the range of the region, and updating the state of the virtual resource in the game scene in a unit of the region, thereby effectively reducing the resource consumption and greatly reducing the pressure of data processing.Type: ApplicationFiled: December 20, 2018Publication date: November 26, 2020Inventors: Chuanbei WU, Zhirong DU, Qingxin ZHENG, Jiazhen CHEN
-
Publication number: 20200353357Abstract: A virtual resource processing method and apparatus in a game scene, a terminal, and a storage medium are disclosed. The method includes: in response to a disassembly instruction, detecting whether the virtual resource is attacked by a virtual character; when detecting that the virtual resource is attacked by the virtual character, determining the virtual resource attacked by the virtual character as a first virtual resource to be disassembled; and when the first virtual resource to be disassembled satisfies a preset condition removing, the first virtual resource to be disassembled from the game scene. A processing apparatus, a mobile terminal and a computer storage medium are also disclosed. The present disclosure provides a novel user interaction mode. A user may conveniently achieve attacking and removing of a virtual resource in a game scene. The number of interactions between the user and an interaction interface is reduced. The user experience is improved.Type: ApplicationFiled: November 21, 2018Publication date: November 12, 2020Inventors: Changkun WAN, Chuanbei WU, Jiazhen CHEN, Qingxin ZHENG, Haohua HE
-
Publication number: 20200223963Abstract: A method for forming polar-functionalized polyolefins may comprise contacting an unsubstituted ?-olefin monomer and an amino-olefin monomer of formula H2C?CH(CH2)n(CHR)mNR?2, wherein R is H or an unsubstituted linear or branched alkyl group having from 1 to 10 carbons, each R? is an independently selected unsubstituted linear or branched alkyl group having from 1 to 10 carbons, m is an integer from 1 to 11, and n is an integer from 1 to 11, in the presence of a rare earth catalyst and a cocatalyst under conditions to induce a heteropolymerization reaction between the unsubstituted oc-olefin and amino-olefin monomers to provide a polar-functionalized poly olefin.Type: ApplicationFiled: October 5, 2018Publication date: July 16, 2020Inventors: Tobin J. Marks, Jiazhen Chen, Tracy L. Lohr
-
Publication number: 20190156246Abstract: A provider network implements a machine learning deployment service for generating and deploying packages to implement machine learning at connected devices. The service may receive from a client an indication of an inference application, a machine learning framework to be used by the inference application, a machine learning model to be used by the inference application, and an edge device to run the inference application. The service may then generate a package based on the inference application, the machine learning framework, the machine learning model, and a hardware platform of the edge device. To generate the package, the service may optimize the model based on the hardware platform of the edge device and/or the machine learning framework. The service may then deploy the package to the edge device. The edge device then installs the inference application and performs actions based on inference data generated by the machine learning model.Type: ApplicationFiled: January 30, 2018Publication date: May 23, 2019Applicant: Amazon Technologies, Inc.Inventors: Calvin Yue-Ren Kuo, Jiazhen Chen, Jingwei Sun, Haiyang Liu
-
Patent number: 9379946Abstract: Architecture that facilitates the virtual specification of a connection between physical endpoints. A network can be defined as an abstract connectivity model expressed in terms of the connectivity intent, rather than any specific technology. The connectivity model is translated into configuration settings, policies, firewall rules, etc., to implement the connectivity intent based on available physical networks and devices capabilities. The connectivity model defines the connectivity semantics of the network and controls the communication between the physical nodes in the physical network. The resultant virtual network may be a virtual overlay that is independent of the physical layer. Alternatively, the virtual overlay can also include elements and abstracts of the physical network(s). Moreover, automatic network security rules (e.g., Internet Protocol security-IPSec) can be derived from the connectivity model of the network.Type: GrantFiled: November 12, 2009Date of Patent: June 28, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Anatoliy Panasyuk, Dharshan Rangegowda, Ram Viswanathan, Anthony S. Chavez, Jiazhen Chen, Morgan Brown, Hasan S. Alkhatib, Geoffrey H. Outhred
-
Patent number: 8819801Abstract: In a multi-tenant environment, machines across the Internet, belonging to a particular subscription are securely enrolled with the tenant's subscription. Authentication of the machines is delegated to each of the tenant's own on-premise authentication mechanism The trust relationship with the tenant's authentication service is used to validate the security token presented by the machine being authenticated. Once authenticated, the machine has authorization (e.g. SSL machine cert for identity, security token, etc.,) to access the subscription. Each tenant within the multi-tenant environment can provide its own level of authentication. The machine presents the security token to the multi-tenant environment for requests for resources (e.g. services/content) from a user. When a request is received from a machine to access a resource, the multi-tenant environment determines from the issued token whether or not the machine is authorized to access the requested resources.Type: GrantFiled: October 31, 2011Date of Patent: August 26, 2014Assignee: Microsoft CorporationInventors: Murali Krishna Sangubhatla, Dharshan Rangegowda, Morgan Asher Brown, Jiazhen Chen, Anthony S. Chavez
-
Publication number: 20130111558Abstract: In a multi-tenant environment, machines across the Internet, belonging to a particular subscription are securely enrolled with the tenant's subscription. Authentication of the machines is delegated to each of the tenant's own on-premise authentication mechanism The trust relationship with the tenant's authentication service is used to validate the security token presented by the machine being authenticated. Once authenticated, the machine has authorization (e.g. SSL machine cert for identity, security token, etc.,) to access the subscription. Each tenant within the multi-tenant environment can provide its own level of authentication. The machine presents the security token to the multi-tenant environment for requests for resources (e.g. services/content) from a user. When a request is received from a machine to access a resource, the multi-tenant environment determines from the issued token whether or not the machine is authorized to access the requested resources.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Applicant: MICROSOFT CORPORATIONInventors: Murali Krishna Sangubhatla, Dharshan Rangegowda, Morgan Asher Brown, Jiazhen Chen, Anthony S. Chavez
-
Publication number: 20110110268Abstract: Architecture that facilitates the virtual specification of a connection between physical endpoints. A network can be defined as an abstract connectivity model expressed in terms of the connectivity intent, rather than any specific technology. The connectivity model is translated into configuration settings, policies, firewall rules, etc., to implement the connectivity intent based on available physical networks and devices capabilities. The connectivity model defines the connectivity semantics of the network and controls the communication between the physical nodes in the physical network. The resultant virtual network may be a virtual overlay that is independent of the physical layer. Alternatively, the virtual overlay can also include elements and abstracts of the physical network(s). Moreover, automatic network security rules (e.g., Internet Protocol security-IPSec) can be derived from the connectivity model of the network.Type: ApplicationFiled: November 12, 2009Publication date: May 12, 2011Applicant: Microsoft CorporationInventors: Anatoliy Panasyuk, Dharshan Rangegowda, Ram Viswanathan, Anthony S. Chavez, Jiazhen Chen, Morgan Brown, Hasan S. Alkhatib, Geoffrey H. Outhred