Patents by Inventor Peng Hui Jiang

Peng Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240331311
    Abstract: Techniques are described with respect to a system, method, and computer program product for AR visual impairment assistance. An associated method includes analyzing an AR experience of a user; detecting at least one virtual object based on the analysis; generating a model of the at least one virtual object; receiving an AR command of the user; and modifying the model based on the AR command.
    Type: Application
    Filed: March 28, 2023
    Publication date: October 3, 2024
    Inventors: Guang Han SUI, Peng Hui JIANG, Jun SU, Su LIU, Yu ZHU
  • Patent number: 12105722
    Abstract: Provided are techniques for building and using a sparse Time Series Database (TSDB). Time series records are received from a native TSDB, where each of the time series records includes a timestamp and one or more tags. Timeslots are determined for shards for the sparse TSDB based on the timestamp included in each of the time series records. The sparse TSDB is built by creating the shards for the determined timeslots and storing the time series records in the shards, while filling in empty ranges in the shards. A query that specifies at least one of the one or more tags is received. It is determined whether to execute the query against the sparse TSDB, and, in response to a determination to execute the query against the sparse TSDB, the query is executed against the sparse TSDB to generate results that are returned.
    Type: Grant
    Filed: August 5, 2022
    Date of Patent: October 1, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Hui Jiang, Jun Su, Sheng Yan Sun, Hong Mei Zhang, Meng Wan
  • Patent number: 12105700
    Abstract: A snapshot request for a selected database is obtained by a computing device of a computing environment. Based on obtaining the snapshot request, a snapshot of the selected database is taken. Based on taking the snapshot, a snapshot identifier is recorded in metadata of the selected database. The snapshot identifier identifies the snapshot request.
    Type: Grant
    Filed: February 7, 2023
    Date of Patent: October 1, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guang Han Sui, Jia Tian Zhong, Peng Hui Jiang
  • Publication number: 20240323168
    Abstract: A method includes: obtaining at least one real-time console log from a compute instance; tagging the at least one real-time console log with at least one log category based on at least one entry within the at least one real-time console log; generating at least one categorized console log; generating at least one encrypted categorized console log based on a public encryption key; publishing the at least one encrypted categorized console log to a log bus; communicating the at least one encrypted categorized console log over at least one multi-port secure tunnel to a user terminal device of a subscribed user; and publishing a private encryption key to the user terminal device of the subscribed user wherein the private encryption key facilitates decrypting the at least one encrypted categorized console log.
    Type: Application
    Filed: March 21, 2023
    Publication date: September 26, 2024
    Inventors: Na Fei YANG, Dan Qing HUANG, Ming Xia GUO, Ning LL LIU, Peng Hui JIANG, Yi FENG
  • Publication number: 20240303851
    Abstract: A method includes: receiving, by a processor set, context data from one or more Internet of Things (IoT) sensors; identifying, by the processor set, one or more objects in a frame of a video stream, thereby determining identified objects; classifying, by the processor set, the identified objects, thereby determining classified objects; prioritizing, by the processor set, the classified objects using the context data, thereby determining prioritized objects; selecting, by the processor set, an object from the prioritized objects; enhancing, by the processor set, the frame of the video stream based on the selected object; and rendering, by the processor set, the enhanced frame on a display of a visual enhancement device.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Inventors: Peng Hui JIANG, Yang LIANG, Terry James HOFFMAN, Su LIU
  • Publication number: 20240303765
    Abstract: A system may receive a frame, divide the frame into objects, select an object from the objects, divide the object into regions, determine a set of attributes for a target region of the regions, assign a priority to the target region, and queue, based on an assignment of a low priority, the target region to a discount rendering instance.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Inventors: Guang Han Sui, Peng Hui Jiang, Su Liu, Jun Su, Yu Zhu
  • Publication number: 20240296034
    Abstract: A computer-implemented method, computer program product, and/or computing system is disclosed for preforming at least one of a performance group consisting of undoing an action in and uninstalling a software application from a computing environment is disclosed. The computer-implemented method, computer program product, and/or computing system includes: building an initial resource dependency graph; building a second resource dependency graph; determining a resulting resource dependency graph to identify dangling resources; and removing the dangling resources. In an embodiment, building at least one of the initial resource dependency graph or the second resource dependency graph includes building a resource ownership graph and extending the resource ownership graph to include associations to form a resource dependency graph.
    Type: Application
    Filed: March 3, 2023
    Publication date: September 5, 2024
    Inventors: Ying Mo, Yue Chen, Rui Liu, Ya Xiao, Peng Hui Jiang, Hu Wang
  • Publication number: 20240296232
    Abstract: A method, computer system, and a computer program product for risk analysis is provided. The present invention may include receiving an access request. The present invention may include analyzing a matrix barcode associated with the access request. The present invention may include validating the matrix barcode. The present invention may include providing a validation status to a user.
    Type: Application
    Filed: March 3, 2023
    Publication date: September 5, 2024
    Inventors: Peng Hui Jiang, ZHI LI GUAN, Sheng Yan Sun, Jun Su, Kun Yang, Yi Wen Huang
  • Publication number: 20240281435
    Abstract: A method, system, and computer program product that are configured to: receive a Structured Query Language (SQL) statement including placeholders; generate sets of predicted values for the placeholders; generate candidate access paths in a database using the sets of predicted values; receive a query including the SQL statement with actual values instead of the placeholders; select one of the candidate access paths based on determining similarities of the actual values to ones of the sets of predicted values; in response to the selected one of the candidate access paths being acceptable, execute the query using the selected one of the candidate access paths; and in response to the selected one of the candidate access paths not being acceptable, generate a new access path in the database using the actual values, and execute the query using the new access path.
    Type: Application
    Filed: February 17, 2023
    Publication date: August 22, 2024
    Inventors: Xiao Xiao CHEN, Peng Hui JIANG, Sheng Yan SUN, Ying ZHANG
  • Publication number: 20240273434
    Abstract: A set of tasks is extracted from workflow data of a system. A set of keywords is extracted from a task in the set of tasks. The set of keywords is expanded into an expanded set of keywords, the expanded set of keywords comprising a new keyword with a semantic relationship to a keyword in the set of keywords. A new task is generated using the expanded set of keywords. Based on a result of execution of the new task, a model of the system is adjusted, the model comprising the workflow data, the set of tasks, and the expanded set of keywords.
    Type: Application
    Filed: February 9, 2023
    Publication date: August 15, 2024
    Applicant: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Dong Hui Liu, Jia Tian Zhong, Xing Xing Shen, Jing Lu, Jia Yu, Yong Yin, Xiao Yan Tang
  • Publication number: 20240264999
    Abstract: A snapshot request for a selected database is obtained by a computing device of a computing environment. Based on obtaining the snapshot request, a snapshot of the selected database is taken. Based on taking the snapshot, a snapshot identifier is recorded in metadata of the selected database. The snapshot identifier identifies the snapshot request.
    Type: Application
    Filed: February 7, 2023
    Publication date: August 8, 2024
    Inventors: Guang Han SUI, Jia Tian ZHONG, Peng Hui JIANG
  • Publication number: 20240264991
    Abstract: A dataset is determined to include skewed data and based on determining that the dataset includes skewed data, one or more sparse indexes for the skewed data of the dataset are built. A sparse index of the one or more sparse indexes is for a range of data of the skewed data, and the building the sparse index includes indicating one pointer for a selected record of the range of data and indicating another pointer for another selected record of the range of data. The sparse index is provided to be used in a query of the dataset.
    Type: Application
    Filed: February 8, 2023
    Publication date: August 8, 2024
    Inventors: Peng Hui JIANG, Sheng Yan SUN, Xiao Xiao CHEN, Ying ZHANG, Jun SU, Li Xue AN
  • Publication number: 20240250838
    Abstract: Aspects of the present disclosure relate to data visualization in web conferences. Type-related information of a web conference can be acquired. A conference type of the web conference can be identified based on the acquired type-related information of the web conference and type templates stored in a type repository. A visualization format from a plurality of visualization formats stored in a format repository can be determined based on the identified conference type. Key information required by the determined visualization format can be extracted from raw data of the web conference. Visual data within the determined visual format can be created by populating the extracted key information into the determined visualization format.
    Type: Application
    Filed: January 25, 2023
    Publication date: July 25, 2024
    Inventors: Su Liu, Adinarayana Haridas, Hamid Majdabadi, Jun Su, Peng Hui Jiang
  • Patent number: 12045663
    Abstract: A serverless computing-based, continuous gateway watch of a data store for data change process is provided. The process includes the gateway interface of the computing environment receiving a watch request from a user system to monitor the data store for data change. Based on receiving the watch request, the gateway interface invokes a serverless setup service to establish a connection between the gateway interface and the data store of the computing environment to be monitored for data change. Based on receiving, at the gateway interface, a data change indication from the data store, the gateway interface invokes a serverless message process service to mutate the data change indication from the data store into a mutated data change message indicative of a data change at the data store for return to the user system pursuant to the watch request, with the serverless message process service terminating thereafter.
    Type: Grant
    Filed: August 24, 2022
    Date of Patent: July 23, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gang Tang, Peng Hui Jiang, Ming Shuang Xian, Qin Yue Chen
  • Publication number: 20240241885
    Abstract: Disclosed embodiments provide techniques for dynamic data collection. The dynamic data collection includes determining a data generation temporal pattern. Based on the data generation temporal pattern, a data collection strategy is created. The data collection strategy can be based on one or more data collection goals. The data collection strategy can contain specific details on how data is to be collected. A data infrastructure evaluation is performed, which provides pricing models for resources such as electricity and/or network bandwidth. A data collection policy is created based on the data collection strategy and the data infrastructure evaluation. The data collection policy can contain specific details on when data is to be collected and what strategy to use for the collection. A data transfer schedule is created based on the data collection policy. The data transfer schedule determines when to collect data from one or more data source devices.
    Type: Application
    Filed: January 17, 2023
    Publication date: July 18, 2024
    Inventors: Fan Jing Meng, Guang Han Sui, Peng Hui Jiang, Xing Tian, Li Jian Wang, Cheng Fang Wang, Hua Ye, Ming Liang Zu, Jun Su
  • Patent number: 12039321
    Abstract: A computer implemented method, apparatus, system, and computer program product manages updates to images. A computer system determines shared layers present between the images selected for update management. The images comprise executable code that are run to create containers. The computer system detects a change in a shared layer in the shared layers for an image in the images. The computer system updates the shared layer in the shared layers in a set of the images having the shared layer in response to detecting the change to the shared layer for the image. According to other illustrative embodiments, a computer system and a computer program product for managing updates to images are provided.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: July 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Jin Chi He, Peng Hui Jiang, Jun Su, Gang Tang
  • Publication number: 20240232191
    Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
  • Publication number: 20240231920
    Abstract: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include receiving a task request from a user and determining a preferred executor type for the task request. The operations may include selecting an executor of the preferred executor type for the task request. The operations may include performing the task request with the executor and returning a response to the task request to the user.
    Type: Application
    Filed: January 5, 2023
    Publication date: July 11, 2024
    Inventors: Peng Hui Jiang, Fan Jing Meng, Guang Han Sui, Jun Su, Li Jian Wang, Chen Ji
  • Publication number: 20240232192
    Abstract: A computer-implemented method dynamically switches access plans for a query during concurrent query execution. The method includes receiving a first query configured to be processed by a database system. The method also includes generating, for the first query, an access plan for each of identified resource sets. The method includes determining a first set of available resources that represent an available capacity for the database system. The method further includes selecting a first resource set of the one or more resource sets, where the selecting is based on the first set of available resources being closest to the first resource set. The method also includes selecting, based on the first set of available resources, a first access plan of the one or more access plans. The method includes executing the first query and returning results of the first query to a source of the first query.
    Type: Application
    Filed: October 19, 2022
    Publication date: July 11, 2024
    Inventors: Xiao Xiao Chen, Sheng Yan Sun, Peng Hui Jiang, YING ZHANG
  • Publication number: 20240231906
    Abstract: A computer implemented method manages a topology for a network computing system. A number of processor units determines tasks for a workload to be performed by computing devices in the network computing system. The number of processor units creates the topology for performing the tasks in the workload. The topology comprises nodes representing the tasks assigned to the computing devices. The nodes are connected to each other based on an execution order for the tasks, and the topology has alternative paths for performing the tasks for the workload. The number of processor units determines energy consumption for the alternative paths in the topology. The number of processor units selects a particular path from the alternative paths for performing the tasks for the workload based on the energy consumption for the alternative paths.
    Type: Application
    Filed: January 5, 2023
    Publication date: July 11, 2024
    Inventors: Peng Hui Jiang, Fan Jing Meng, Jun Su, Cheng Fang Wang