Patents by Inventor Mu Qiao

Mu Qiao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200237868
    Abstract: Disclosed herein are methods for promoting neuronal outgrowth in a subject with a neuronal lesion in their CNS by administering effective amounts of a pro-regenerative OPN fragment, optionally with IGF1 and/or BDNF. A voltage gated potassium channel blocker can also be administered. Pharmaceutical compositions, devices for administration, and kits are also disclosed.
    Type: Application
    Filed: August 13, 2018
    Publication date: July 30, 2020
    Applicants: THE CHILDREN'S MEDICAL CENTER CORPORATION, PRESIDENT AND FELLOWS OF HARVARD COLLEGE
    Inventors: Joshua R. SANES, Xin DUAN, Mu QIAO, Zhigang HE, Fengfeng BEI, Yuanyuan LIU
  • Publication number: 20200210619
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Application
    Filed: March 6, 2020
    Publication date: July 2, 2020
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
  • Patent number: 10698675
    Abstract: A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification. One example operation may comprise one or more of identifying an updated software build, creating a hash based on the updated software build, storing the hash of the updated software build in a blockchain, and storing a binary representation of the updated software build in a distributed hash table (DHT).
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: June 30, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis Angel D. Bathen, Gabor Madl, Mu Qiao, Ramani R. Routray
  • Publication number: 20200174784
    Abstract: A data center may include a software defined infrastructure in a computing environment. The data center may also include a computer readable medium having instructions which when executed by a processor cause the processor to implement cognitive agents to perform adaptive deep reinforcement learning to reconfigure the software defined infrastructure based upon changes in the computing environment.
    Type: Application
    Filed: December 3, 2018
    Publication date: June 4, 2020
    Inventors: Luis A. BATHEN, Simon-Pierre GENOT, Mu QIAO, Ramani ROUTRAY
  • Patent number: 10671756
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Grant
    Filed: April 23, 2019
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
  • Patent number: 10671754
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: June 2, 2020
    Assignee: International Business Machines Corporation
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray
  • Publication number: 20200145487
    Abstract: A virtual blockchain configuration may provide a distributed structure that uses a distributed hash configuration to reduce the complexity of blockchain transactions. One example method of operation may comprise one or more of storing a subset of blockchain data in a network device, accessing via the network device a virtual copy of a blockchain, accessing a blockchain block via the virtual copy of the blockchain, and writing blockchain transactions to the blockchain block via the network device.
    Type: Application
    Filed: January 2, 2020
    Publication date: May 7, 2020
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani R. Routray, Mu Qiao
  • Publication number: 20200125748
    Abstract: A computer-implemented method according to one embodiment includes receiving a data object from a first application running on a computing device, a unique identifier (ID) of the data object assigned by the first application, and an access permission for the data object from the first application. The computer-implemented method also includes storing the data object, the unique ID, and the access permission in a data repository in a data distributor layer on the computing device. The computer-implemented method also includes receiving, at an access controller layer of the computing device, a request for the data object from a second application, the request including the unique ID, and retrieving, by the access controller layer, the data object from the data distributor layer using the unique ID in response to the request. The computer-implemented method includes providing, by the access controller layer, the data object to the second application.
    Type: Application
    Filed: October 17, 2018
    Publication date: April 23, 2020
    Inventors: Sunhwan Lee, Rakesh Jain, Mu Qiao, Divyesh Jadav, Luis Angel Bathen, Ramani R. Routray
  • Publication number: 20200120001
    Abstract: A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information retrieval. One example method of operation may include one or more of monitoring a computing service via various nodes operating on a blockchain, identifying a proposed change to the computing service, storing details of the proposed change in a smart contract, storing the smart contract as a transaction in the blockchain, and validating the proposed change of the smart contract.
    Type: Application
    Filed: December 1, 2019
    Publication date: April 16, 2020
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani R. Routray, Mu Qiao
  • Publication number: 20200117529
    Abstract: One embodiment provides a method for diagnosing data center incidents including receiving a data center incident report including information technology (IT) device incident information. Augmented reality (AR) is applied for an AR interface for receiving incident evidence information based on the IT device incident information. The incident evidence information is sent to a cognitive analytical process. Using the cognitive analytical process, statistical inference is determined and an incident diagnosis recommendation including analytical results is generated. The analytical results are received by the AR interface for determining a root cause of the incident report.
    Type: Application
    Filed: October 16, 2018
    Publication date: April 16, 2020
    Inventors: Mu Qiao, Rakesh Jain, Ramani Routray
  • Publication number: 20200082940
    Abstract: Intelligent cognitive assistants for decision-making are provided. A first plurality of decisions made by a first healthcare provider during treatment of a first patient is monitored. For each respective decision of the first plurality of decisions, one or more corresponding medical attributes of the first patient that were present at a time when the respective decision was made are determined. A cognitive assistant is trained, using an imitation learning model, based on each of the first plurality of decisions and the corresponding one or more medical attributes of the first patient. Subsequently, one or more medical attributes of a second patient are received, and a first medical decision is generated by processing the one or more medical attributes of the second patient using the cognitive assistant.
    Type: Application
    Filed: September 10, 2018
    Publication date: March 12, 2020
    Inventors: Mu Qiao, Dylan Fitzpatrick, Ramani Routray, Divyesh Jadav
  • Publication number: 20200080861
    Abstract: Systems, methods, and computer program products for adaptive, imitation learning and applications to navigational assistance are disclosed. The inventive concepts include receiving a plurality of trajectories, each trajectory describing a path through a dynamic, complex physical environment; receiving a request for navigational assistance through the dynamic, complex physical environment; and in response to receiving the request for navigational assistance: generating a navigational assistance trajectory through the dynamic, complex physical environment, the navigational assistance trajectory being based at least in part on at least one of the plurality of trajectories; generating auditory instructions in accordance with the navigational assistance trajectory; and transmitting the navigational assistance trajectory and the auditory instructions to a mobile device from which the request for navigational assistance was received.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Inventors: Mu Qiao, Dylan J. Fitzpatrick, Divyesh Jadav
  • Publication number: 20200082257
    Abstract: According to one embodiment, a computer-implemented method for active, imitation learning, includes: providing training data comprising an expert trajectory to a processor; querying the expert trajectory during an iterative, active learning process; generating a decision policy based at least in part on the expert trajectory and a result of querying the expert trajectory; attempting to distinguish the decision policy from the expert trajectory; in response to distinguishing the decision policy from the expert trajectory, outputting a policy update and generating a new decision policy based at least in part on the policy update; and in response to not distinguishing the decision policy from the expert trajectory, outputting the decision policy. Importantly, the expert trajectory is queried for only a subset of iterations of the iterative, active learning process, wherein the most uncertain state/action pair(s) from the expert trajectory are determined using one or more disagreement functions.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Inventors: Mu Qiao, Dylan J. Fitzpatrick, Divyesh Jadav
  • Patent number: 10554746
    Abstract: A virtual blockchain configuration may provide a distributed structure that uses a distributed hash configuration to reduce the complexity of blockchain transactions. One example method of operation may comprise one or more of storing a subset of blockchain data in a network device, accessing via the network device a virtual copy of a blockchain, accessing a blockchain block via the virtual copy of the blockchain, and writing blockchain transactions to the blockchain block via the network device.
    Type: Grant
    Filed: November 14, 2016
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani R. Routray, Mu Qiao
  • Patent number: 10545846
    Abstract: A method and associated systems for identifying and correcting suboptimal storage-reclamation processes. A storage-management system uses information received in system-generated storage-reclamation reports to assign each user a set of reclamation scores. Each score identifies how effectively the user has been able to reclaim lost storage at particular times. These scores are organized into user-specific profiles that each consists of a chronological sequence of one user's scores. If a user's profile is “good” (that is, if the user's scores are consistently high) or “improving” (if scores are increasing over time), the system then determines whether that user's reclamation efforts have successfully reduced the amount of reclaimable storage controlled by the user. If not, the system infers that a suboptimal storage-reclamation process interfered with the user's reclamation efforts. The system then undertakes corrective action to identify and resolve the cause of the suboptimal process.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: James E. Olson, Mu Qiao, Ramani R. Routray, Alan C. Skinner, Stanley C. Wood
  • Patent number: 10541886
    Abstract: A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification and information retrieval. One example method of operation may include one or more of monitoring a computing service via various nodes operating on a blockchain, identifying a proposed change to the computing service, storing details of the proposed change in a smart contract, storing the smart contract as a transaction in the blockchain, and validating the proposed change of the smart contract.
    Type: Grant
    Filed: May 24, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Luis Angel D. Bathen, Gabor Madl, Ramani R. Routray, Mu Qiao
  • Publication number: 20190332933
    Abstract: In training a new neural network, batches of the new training dataset are generated. An epoch of batches is passed through the new neural network using an initial weight (?). An area minimized (Ai) under an error function curve and an accuracy for the epoch are calculated. It is then determined whether a set of conditions are met, where the set of conditions includes whether Ai is less than an average area (A_avg) from a training of an existing neural network and whether the accuracy is within a predetermined threshold. When the set of conditions are not met, a new ? is calculated by modifying a dynamic learning rate (?) by an amount proportional to a ratio of Ai/A_avg and by calculating the new ? using the modified ? according to ( ? * ? ( J ? ( ? ) ? ? + ? * ? a b ? J ? ( ? ) ? ? ? ) . The process is repeated a next epoch until the set of conditions are met.
    Type: Application
    Filed: April 30, 2018
    Publication date: October 31, 2019
    Inventors: Mu QIAO, Ramani ROUTRAY, Abhinandan KELGERE RAMESH, Claire ABU-ASSAL
  • Publication number: 20190303357
    Abstract: A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and the root node represents a hierarchical directory pathname of sensitive data represented by the leaf node. Each tree is assigned a sensitivity signature that is proportional to the relative sensitivity and access frequency of the dataset represented by that tree. The signatures are organized into clusters as a function of the distances between each signature, and each signature is associated with a soft migration cost specific to that signature's cluster. A soft cost for migrating an application that requires multiple datasets may be determined by adding the migration costs associated with each of the multiple datasets.
    Type: Application
    Filed: June 18, 2019
    Publication date: October 3, 2019
    Inventors: John J. Auvenshine, Bernhard J. Klingenberg, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray
  • Patent number: 10423598
    Abstract: A method and associated systems for optimized orchestration of a data-migration project. A data-migration orchestration system represents a hierarchical organization of each dataset to be migrated as a tree, where each leaf node of the tree represents data to be migrated and where a path between the leaf node and the root node represents a hierarchical directory pathname of sensitive data represented by the leaf node. Each tree is assigned a sensitivity signature that is proportional to the relative sensitivity and access frequency of the dataset represented by that tree. The signatures are organized into clusters as a function of the distances between each signature, and each signature is associated with a soft migration cost specific to that signature's cluster. A soft cost for migrating an application that requires multiple datasets may be determined by adding the migration costs associated with each of the multiple datasets.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: September 24, 2019
    Assignee: International Business Machines Corporation
    Inventors: John J. Auvenshine, Bernhard J. Klingenberg, Sunhwan Lee, James E. Olson, Mu Qiao, Ramani R. Routray
  • Publication number: 20190251286
    Abstract: A method, system and computer program product for detecting sensitive personal information in a storage device. A block delta list containing a list of changed blocks in the storage device is processed. After identifying the changed blocks from the block delta list, a search is performed on those identified changed blocks for sensitive personal information using a character scanning technique. After identifying a changed block deemed to contain sensitive personal information, the changed block is translated from the block level to the file level using a hierarchical reverse mapping technique. By only analyzing the changed blocks to determine if they contain sensitive personal information, a lesser quantity of blocks needs to be processed in order to detect sensitive personal information in the storage device in near real-time. In this manner, sensitive personal information is detected in the storage device using fewer computing resources in a shorter amount of time.
    Type: Application
    Filed: April 23, 2019
    Publication date: August 15, 2019
    Inventors: Rajesh M. Desai, Mu Qiao, Roger C. Raphael, Ramani Routray