Patents by Inventor Lele Zhang

Lele Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11951445
    Abstract: The present disclosure relates to the field of materials for uranium extraction from seawater (UES), and in particular, to a photothermal photocatalytic membrane for seawater desalination and uranium extraction and a preparation method therefor. The present disclosure provides a photothermal photocatalytic membrane for seawater desalination and uranium extraction and a preparation method therefor. The preparation method includes: fixing a treated carbon cloth to a glass plate, pouring a casting solution 1 onto the carbon cloth to form a first layer of film, forming a second layer of film using a casting solution 2, and putting the second layer of film into a first coagulation bath and a second coagulation bath in sequence to form the photothermal photocatalytic membrane. The photothermal photocatalytic membrane is supported by the carbon cloth, and a surface of the photothermal photocatalytic membrane is of a micro-nano structure.
    Type: Grant
    Filed: May 10, 2023
    Date of Patent: April 9, 2024
    Assignee: Harbin Engineering University
    Inventors: Jun Wang, Bingtao Zhang, Hongsen Zhang, Qi Liu, Jiahui Zhu, Jingyuan Liu, Jing Yu, Rongrong Chen, Lele Wang
  • Publication number: 20240106718
    Abstract: The disclosure provides an approach for virtual computing instance (VCI) migration. Embodiments include scanning logical segments associated with a customer gateway to identify network addresses associated with the logical segments. Embodiments include determining one or more recommended supernets based on the network addresses associated with the logical segments. Embodiments include providing output to a user based on the one or more recommended supernets. Embodiments include based on the output, receiving input from the user configuring an aggregation supernet for the customer gateway. Embodiments include advertising the aggregation supernet to one or more endpoints separate from the customer gateway.
    Type: Application
    Filed: September 26, 2022
    Publication date: March 28, 2024
    Inventors: Rushikesh Shashank GHATPANDE, Nilesh Ramchandra NIPANE, Nikhil Ravindra RAJGURU, Lele ZHANG ZLELE
  • Publication number: 20240106610
    Abstract: The techniques provide solutions for a user equipment (UE) and base station to switch between T1R4 and 2T4R for sounding reference signals (SRS). The UE and base station may communicate SRS using 2T4R. The UE and/or base station may detect and evaluate a signal quality trigger and/or condition relating to switching from T2R4 to T1R4. The trigger and/or condition may correspond to a channel or radio frequency (RF) quality, conflicting or problematic band combinations used in a non-standalone (NSA) scenario, whether dedicated data subscription (DDS) subscriber identity module (SIM) or non-DDS SIM is being used in a dual SIM dual active (DSDA) scenario, etc. The UE and base station may either continue using T2R4 communications or switch to T1R4 communications based on the trigger and/or evaluation.
    Type: Application
    Filed: September 19, 2023
    Publication date: March 28, 2024
    Inventors: Han Pu, Lijie Zhang, Lele Cui, Kai Zhang
  • Publication number: 20240097807
    Abstract: Some aspects relate to apparatuses and methods for calculating an uplink pathloss in a wireless communication system. A user equipment (UE) can be configured to perform operations for calculating the uplink pathloss. The operations can include determining a transmission power of a physical uplink shared channel (PUSCH) transmission for a UE, TxpPUSCH, where the PUSCH transmission is from the UE to a base station. The operations can further include determining a receiving power of a sounding reference signal (SRS) by the base station, Rxpsrs; and further calculating the uplink pathloss based on the transmission power of the PUSCH transmission TxpPUSCH and the receiving power of the SRS Rxpsrs.
    Type: Application
    Filed: September 20, 2023
    Publication date: March 21, 2024
    Applicant: Apple Inc.
    Inventors: Dongzhou YANG, Lijie ZHANG, Kai ZHANG, Zhiwei WANG, Qiang MIAO, Lele CUI
  • Publication number: 20240098639
    Abstract: Systems and methods related to “on/off” determinations regarding the performance of physical downlink control channel (PDCCH) monitoring during connected mode discontinuous reception (CDRX) on duration windows are disclosed herein. In some cases, a radio access network (RAN) predicts whether a downlink (DL) packet for a UE will arrive at a buffer of the RAN prior to an end of a CDRX on duration window of the UE, and sends a downlink control information (DCI) with a cyclic redundancy check (CRC) scrambled by a power-saving radio network temporary identifier (PS-RNTI) (DCP) for the CDRX on duration window indicating whether or not the UE should perform PDCCH monitoring during the CDRX on duration window based on the prediction. In some cases, a UE determines a current state of DL traffic and adaptively uses DCP monitoring based on the current state of the traffic. Aggregation level adaptation by the RAN is also discussed.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Lijie Zhang, Lele Cui, Xiaolong Tu, Dongzhou Yang, Tao Tao, Lei Zhou, Zihuan Xu
  • Publication number: 20240098571
    Abstract: Systems, methods, and apparatuses disclosed herein can mitigate transmitting latency to improve the quality of a voice or the video call. These systems, methods, and apparatuses reset a transmitting latency timer upon retrieving a packet from a transmitting buffer. Thereafter, these systems, methods, and apparatuses start the count of the transmitting latency timer as the packet is being processed. And these systems, methods, and apparatuses compare the transmitting latency timer e with a transmitting latency threshold as these systems, methods, and apparatuses are processing a packet for transmission. These systems, methods, and apparatuses can drop the packet and/or can select another packet for processing in response to the transmitting latency timer exceeding the transmitting latency threshold to mitigate the transmitting latency.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 21, 2024
    Applicant: Apple Inc.
    Inventors: Kai ZHANG, Lele CUI, Deepankar BHATTACHARJEE
  • Publication number: 20240098720
    Abstract: A terminal may include configured to receive, from a network, multiple downlink signals. The terminal may include a processor configured to identify, from the downlink signals, at least one configuration parameter including a bandwidth part switching indicator. The processor may then identify at least one resource from a target bandwidth part indicated by the bandwidth part switching indicator. The processor may then determine a bandwidth part mismatch based on whether a signal is received using the at least one resource from the target bandwidth part.
    Type: Application
    Filed: September 15, 2023
    Publication date: March 21, 2024
    Inventors: Han Pu, Lijie Zhang, Alosious Pradeep Prabhakar, Lele Cui, Kai Zhang
  • Publication number: 20240098838
    Abstract: Systems and methods related to “on/off” determinations regarding the performance of physical downlink control channel (PDCCH) monitoring during connected mode discontinuous reception (CDRX) on duration windows are disclosed herein. In some cases, a radio access network (RAN) predicts whether a downlink (DL) packet for a UE will arrive at a buffer of the RAN prior to an end of a CDRX on duration window of the UE, and sends a downlink control information (DCI) with a cyclic redundancy check (CRC) scrambled by a power-saving radio network temporary identifier (PS-RNTI) (DCP) for the CDRX on duration window indicating whether or not the UE should perform PDCCH monitoring during the CDRX on duration window based on the prediction. In some cases, a UE determines a current state of DL traffic and adaptively uses DCP monitoring based on the current state of the traffic. Aggregation level adaptation by the RAN is also discussed.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Lijie Zhang, Lele Cui, Xiaolong Tu, Dongzhou Yang, Tao Tao, Lei Zhou, Zihuan Xu
  • Patent number: 11929883
    Abstract: The disclosure provides an approach for virtual computing instance (VCI) migration. Embodiments include scanning logical segments associated with a customer gateway to identify network addresses associated with the logical segments. Embodiments include determining one or more recommended supernets based on the network addresses associated with the logical segments. Embodiments include providing output to a user based on the one or more recommended supernets. Embodiments include based on the output, receiving input from the user configuring an aggregation supernet for the customer gateway. Embodiments include advertising the aggregation supernet to one or more endpoints separate from the customer gateway.
    Type: Grant
    Filed: September 26, 2022
    Date of Patent: March 12, 2024
    Assignee: VMware, Inc.
    Inventors: Rushikesh Shashank Ghatpande, Nilesh Ramchandra Nipane, Nikhil Ravindra Rajguru, Lele Zhang Zlele
  • Publication number: 20240066556
    Abstract: A device for separating and recovering flat-plate catalyst powder and a method for determining a wear ratio are provided. The device includes a powder separation unit and a powder recovery unit, a powder accumulation bin is respectively connected with a shell and a catalyst powder outlet, a cyclone outlet is configured on an inner side of a recovery shell, and a primary filter and a secondary filter are configured on an inner side wall of the recovery shell.
    Type: Application
    Filed: June 29, 2023
    Publication date: February 29, 2024
    Inventors: Yingjie Bao, Jieyong Hao, Changkai Yu, Xun Wu, Xianchun Zhou, Yanxuan Liang, Rongfu Tang, Feiyun Chen, Bin Luo, Kaiyou Liao, Danping Zhang, Chao Li, Fanhai Kong, Lele Wang, Qiang Bao, Chuan He
  • Publication number: 20240070263
    Abstract: A security defending method and an electronic apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.
    Type: Application
    Filed: December 29, 2022
    Publication date: February 29, 2024
    Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
  • Publication number: 20240073197
    Abstract: A security defending method, a coprocessor, and a processing apparatus are disclosed. The security defending method is applicable in a coprocessor, including: receiving a jump destination encryption request for the operation task; using mask configuration to perform first mask processing on the first jump destination address value to obtain a first intermediate jump destination address value; performing an authentication operation based on the first jump destination storage address, a key reference value corresponding to the operation task and the first intermediate jump destination address value, to obtain a first encryption result value; using the mask configuration to perform second mask processing on the first encryption result value to obtain a first intermediate encryption result value; performing an authentication operation on the first intermediate encryption result value and the first jump destination address value to obtain a first encryption jump destination address value.
    Type: Application
    Filed: December 29, 2022
    Publication date: February 29, 2024
    Inventors: Baoguang LIU, Dan LIU, Liu CAO, Lele MA, Wenjuan ZHANG, Xun ZHANG, Xianshuai YANG, Bin LIU, Xinyu QIN, Yifan LIU, Kaixuan WANG, Jun HAN
  • Patent number: 11917532
    Abstract: This disclosure relates to techniques for multi-RAT and DSDA capable wireless devices to handle frame blanking in a wireless communication system. A wireless device may establish wireless links according to a first radio access technology and a second radio access technology. The wireless device may determine to perform transmit and receive blanking for one or more antennas of the wireless device for the first radio access technology to perform sounding reference signal transmissions for the second radio access technology based at least in part on a band combination for the wireless links. The wireless device may determine a modification to channel state feedback reporting for the first radio access technology based at least in part on the transmit and receive blanking. The wireless device may perform channel state feedback reporting using the determined modification.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: February 27, 2024
    Assignee: Apple Inc.
    Inventors: Junzhen Qin, Wen Zhao, Lijie Zhang, Lele Cui, Wenping Lou, Qiang Miao, Zhiwei Wang, Ying Zhang, Deepankar Bhattacharjee, Kexin Ma, Alex Yee Kit Ho
  • Patent number: 11909545
    Abstract: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.
    Type: Grant
    Filed: July 18, 2022
    Date of Patent: February 20, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Pascal Thubert, Huimin She, Chuanwei Li, Lele Zhang
  • Publication number: 20240038238
    Abstract: Embodiments of this application provide a speech recognition method. The speech recognition method includes: obtaining a facial depth image and a to-be-recognized voice of a user, where the facial depth image is an image collected by using a depth camera; recognizing a mouth shape feature from the facial depth image, and recognizing a voice feature from a to-be-recognized audio; and fusing the voice feature and the mouth shape feature into an audio-video feature, and recognizing, based on the audio-video feature, a voice uttered by the user.
    Type: Application
    Filed: August 12, 2021
    Publication date: February 1, 2024
    Inventors: Lei QIN, Lele ZHANG, Hao LIU, Yuewan LU
  • Patent number: 11877708
    Abstract: A cleaning robot, includes a body provided with a dust box and a water tank, a water outlet for discharging liquid in the water tank and a dust suction port connected with the dust box are provided with on a bottom of the body, and the water outlet is disposed rearward of the dust suction port and adjacent thereto.
    Type: Grant
    Filed: April 4, 2022
    Date of Patent: January 23, 2024
    Assignee: ECOVACS ROBOTICS CO., LTD.
    Inventor: Lele Zhang
  • Publication number: 20230362654
    Abstract: A method includes determining a number of drops of a plurality of messages sent to a first node of a plurality of nodes within a mesh network. Based at least in part on the number of drops of the plurality of messages exceeding a threshold number of drops for a time period, decrementing a first rating assigned to the first node to a second rating assigned to the first node. Based at least in part on the second rating being below a rating threshold, determining that the first node is a potentially malicious node. Based at least in part on a first distance to the first node being larger than a distance threshold, identifying that the first node is a malicious node. The method may further include ending communications with the first node.
    Type: Application
    Filed: July 17, 2023
    Publication date: November 9, 2023
    Applicant: Cisco Technology, Inc.
    Inventors: Lele Zhang, Yajun Xia, Chuanwei Li, Li Zhao
  • Patent number: 11811648
    Abstract: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
    Type: Grant
    Filed: September 6, 2022
    Date of Patent: November 7, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Li Zhao, Chuanwei Li, Lele Zhang, Haibo Dong, Akram Ismail Sheriff
  • Publication number: 20230319683
    Abstract: In one embodiment, a method comprises: creating, by a root network device in a wireless data network, a perimeter topology comprising a first distance vector-protocol path of a first group of perimeter devices and a second distance vector-protocol path of a second group of the perimeter devices, the creating comprising outputting first and second advertisement messages causing the perimeter devices to attach to only one parent of only one of the first or second distance vector-protocol paths and a junction device to attach at respective ends of the first and second distance vector-protocol paths; and causing the junction device to forward, from the first distance vector-protocol path, a data packet toward the root network device via the second distance vector-protocol path.
    Type: Application
    Filed: April 4, 2022
    Publication date: October 5, 2023
    Inventors: PASCAL THUBERT, LELE ZHANG, HUIMIN SHE, LI ZHAO
  • Patent number: D1021093
    Type: Grant
    Filed: March 4, 2022
    Date of Patent: April 2, 2024
    Assignee: SHENZHEN XPECTVISION TECHNOLOGY CO., LTD.
    Inventors: Lele Wang, Shuai Zhang