Patents Issued in October 31, 2024
-
Publication number: 20240362349Abstract: Systems and methods are described for generating, at an intermediary entity, a first data recipient token for a data recipient for accessing data from a first data provider, and associating a first network resource with the first data provider, wherein the first network resource is used by the data recipient to request data from the first data provider. The systems and methods may generate, at the intermediary entity, a second data recipient token for the data recipient for accessing data from a second data provider, and associate a second network resource with the second data provider, wherein the second network resource is used by the data recipient to request data from the second data provider.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventor: Denis Babani
-
Publication number: 20240362350Abstract: A device, method, and non-transitory computer readable medium for obfuscating text data by selectively masking incoming tokens within the text data based on allowed tokens within an allow list, and storing a result thereof within a memory.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Applicant: Charles Schwab & Co., Inc.Inventors: Valerie Roth, Brandon Lind, Stephanie Lucas, Maribel Mendoza
-
Publication number: 20240362351Abstract: Provided herein are systems and methods for network intrusion event response and remediation. A file encryption key is generated based on a first private key of a user and a root key associated with a primary deployment of a database system. File data is encoded at a source account of the user using the file encryption key. The file data is replicated from the source account into a target account of the user to generate replicated file data. Notification of a detected network intrusion event is encoded for transmission to the user. A failover of the source account to the target account is performed based on the notification. The failover grants the user access to the replicated file data based at least on a second private key of the user.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventors: Marion A. Brown, Keith M. Hoyle
-
Publication number: 20240362352Abstract: A method may include accessing digital characteristics associated with a user identifier, the digital characteristics including a task identifier assigned to the user identifier; encoding the digital characteristics into components of an input vector, the components of the input vector corresponding to inputs of a machine learning model; inputting the input vector into the machine learning model; executing the machine learning model; subsequent to the executing, accessing an output of the machine learning model, the output corresponding to a cluster identifier associated with a plurality of user identifiers with similar digital characteristics; and automatically transmitting a request to change a resource access right for the user identifier based on access rights associated with the cluster identifier.Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Inventors: Alejandro J. Carao, Robert William Childress, Donnell Douglas, Jaisimha L. Gyanmote, Jonathan Wayne Ingram, Gokarna Kc, Naresh Kumar Koppuravuri, Suki Ramasamy, Tara R. Ross, Vijay Talupula
-
Publication number: 20240362353Abstract: Computing platforms, methods, and storage media for processing a data access request are disclosed. Exemplary implementations may: generate, at the computing platform and based on a received data access request, a revocable 1:1:1 token that authorizes data sharing for a specific combination of third party application-aggregator-institution for a user associated with a communication device; and cause display of a user interface including a list of a plurality of third party applications for which data access is currently granted and for which a revocable 1:1:1 token is stored, the user interface enabling selective revocation of data access from among the listed plurality of third party applications. Exemplary implementations may generate an instruction to delete the stored revocable 1:1:1 token associated with the selected third party application, and may cause display of an access revocation selector, and may generate a selective revocation request associated with the selective revocation of data access.Type: ApplicationFiled: July 5, 2024Publication date: October 31, 2024Inventors: Shishir Dattatraya BHAT, Marcus Edward FURLONG, Katherine KANCZUGA, Sumathi SEETHARAMAN
-
Publication number: 20240362354Abstract: Systems and methods include reception of a call to an application programming interface, the call comprising a request to create a database tenant in a database instance executing on a database platform, determination, at an operator executing on the database platform, to create the tenant based on the received call, retrieval, in response to the determination, by the operator of credentials of a tenant manager user from a storage external to the database platform, connection of the operator to the database instance using the credentials, transmission, from the operator to the database instance, of a Structured Query Language command to create the tenant and, in response to the command, creation of the tenant in the database instance.Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Inventors: Hyunjun KIM, Patrick VOELKER, Urs KLINGSPORN, Yong Sik KWON, Jaeyoung CHOI, Myunggon PARK, Yeonghun JEONG, Yong Wook JEONG, Chawon KO, Yin LONG, Mihnea ANDREI
-
Publication number: 20240362355Abstract: A noisy aggregation constraint system receives a query for a shared dataset, where the query identifies an operation. The noisy aggregation constraint system accesses a set of data from the shared dataset to perform the operation, the set of data comprises data accessed from a table of the shared dataset. The system determines that an aggregation constraint policy is attached to the table, the policy restricts output of data values stored in the table. Based on the context of the query, the system determines that the aggregation constraint policy should be enforced in relation to the query. The system assigns a specified noise level to the shared dataset and generates an output based on the set of data and the operation; the output comprises data values added to the table based on the specified noise level.Type: ApplicationFiled: April 26, 2024Publication date: October 31, 2024Inventors: Khalid Zaman Bijon, Monica J. Holboke, Stephen Joe Jonany, David Schultz
-
Publication number: 20240362356Abstract: Data in a database can be protected, for instance by tokenizing the entries of the database using one or more token tables. To enable searching data within the database without first detokenizing the tokenized database entries, bigrams of each data entry can also be tokenized and stored in association with the tokenized data entry. When a query term is received, the query term can be parsed into bigrams, and each bigram can be tokenized. The tokenized query bigrams can be used to query the database, and tokenized database entries corresponding to tokenized bigrams that match the tokenized query bigrams can be identified and returned as search results.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Ulf Mattsson, David Clyde Williamson
-
Publication number: 20240362357Abstract: Methods and systems for managing access and control of data are disclosed. To manage access and control, data management system may require registration and verification of devices associated with an individual or other individuals to which control over access may be granted. Data management system may vest control over access to data to the device associated with the individual for which data is stored, and progressively vest control over access to data to other devices associated with other individuals as an increasing amount of information indicating the lack of capacity of the individual to authorize access to data. When access to data is granted by the individuals, the data may be scrutinized with respect to other types of restrictions on distribution of the data.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: DHARMESH M. PATEL, PREM PRADEEP MOTGI, MANPREET SINGH SOKHI
-
Publication number: 20240362358Abstract: Methods and systems for managing access and control of data are disclosed. To manage access and control, data management system may require registration and verification of devices associated with an individual or other individuals to which control over access may be granted. Data management system may vest control over access to data to the device associated with the individual for which data is stored and progressively vest control over access to data to other devices associated with other individuals as an increasing amount of information indicating the lack of capacity of the individual to authorize access to data.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: DHARMESH M. PATEL, PREM PRADEEP MOTGI, MANPREET SINGH SOKHI
-
Publication number: 20240362359Abstract: A device may include a processor. A device may include a memory configured with instructions to: receive an information disclosure level selected by a user, the information disclosure level relating to at least one sensor recording a real-world environment around the user, receive sensor information from the at least one sensor, filter the sensor information based on the information disclosure level to generate a subset of sensor information; and send the subset of sensor information to a second device.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: Kathleen Alexandra Bryan, Shiblee Hasan
-
Publication number: 20240362360Abstract: A system and method implementing K-anonymity processing of a data record to protect sensitive information, while still revealing useful information. The system and method performing K-anonymity processing of categories in the data record, and choosing to mask the data of the category that produces the highest anonymity score. The system and method repeats the process until a K-value of the data record is achieved.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Applicant: INTUIT INC.Inventors: Natalie BARELIYAHU, Hadar LACKRITZ, Omer WOSNER, Yair HORESH, Sigalit BECHLER
-
Publication number: 20240362361Abstract: This disclosure provides a user data processing system. A first data processing device in the system generates a first intermediate result, and sends a third intermediate result to a second data processing device. The third intermediate result is obtained from the first intermediate result based on a parameter of a first machine learning model and target historical user data obtained by the first data processing device, and an identifier of the target historical user data is the same as an identifier of historical user data of the second data processing device. The first data processing device further receives a second intermediate result, and updates the parameter of the first machine learning model based on the first intermediate result and the second intermediate result. The second data processing device further updates a parameter of a second machine learning model based on the received third intermediate result and the second intermediate result.Type: ApplicationFiled: July 4, 2024Publication date: October 31, 2024Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Yunfeng Shao, Bingshuai Li
-
Publication number: 20240362362Abstract: A training data management device includes a processor, in which the processor stores, in a data storage unit, training data in which examination data and diagnostic data generated based on the examination data are included in association with each other, deletes specific examination data from the data storage unit, specifies the diagnostic data associated with the deleted examination data, generates pseudo examination data, which is pseudo for the deleted examination data, based on the specified diagnostic data, and stores the pseudo examination data in the data storage unit in association with the specified diagnostic data.Type: ApplicationFiled: April 24, 2024Publication date: October 31, 2024Applicant: FUJIFILM CorporationInventor: Takahiro KANEDA
-
Publication number: 20240362363Abstract: Described herein are techniques for performing a task using a trained external machine learning model. In some embodiments, a user request comprising a task and one or more protected health information (PHI) parameters associated with a patient may be received. Using one or more trained machine learning models, the PHI parameters may be extracted and a revised user request may be generated by replacing the PHI parameters with one or more synthetic PHI parameters. The revised user request may be provided to the trained external machine learning model and a response to the task comprising the synthetic PHI parameters may be received. The trained machine learning models may generate a revised response to the task by replacing the synthetic PHI parameters with the PHI parameters of the user request.Type: ApplicationFiled: April 25, 2024Publication date: October 31, 2024Applicant: Synthpop Inc.Inventors: Jan JANNINK, Elad FERBER
-
Publication number: 20240362364Abstract: A method may include: an originating system receiving decisioning data from an applicant as part of an application for a product, the originating system redirecting the applicant to a sensitive data capture computer program; the sensitive data capture computer program receiving a unique identifier from the originating system; the sensitive data capture computer program receiving the sensitive data from the applicant, wherein the originating system does not have access to the sensitive data; the sensitive data capture computer program associating the sensitive data with the unique identifier; a matching computer program receiving a decision from the originating system on the application and the unique identifier; the matching computer program receiving the sensitive data and the unique identifier from the sensitive data capture computer program and matching the sensitive data and the decision using the unique identifier; and a compliance reporting program generating a report using the match.Type: ApplicationFiled: April 26, 2024Publication date: October 31, 2024Inventors: Kelly Patrick ERNST, Howard SPECTOR, Matthew BAKER, Xinyi XU, Steve M PIATT, Deepak KHETERPAL, Rajesh GANAPATHY, Arunava MITRA, Michael R HACK
-
Publication number: 20240362365Abstract: A computer sets an access time for a set of files to an initial value. Upon accessing a file by a set of executables, the computer sets the access time of the file to a new value. The computer identifies, from the set of files, a subset of files accessed by the set of executables based on the access time of files in the subset being different from the initial value. The computer provides an output representing the subset of files.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Applicant: RapidFort, Inc.Inventors: Mehran Farimani, Rajeev Thakur, Chien-Hung Chen
-
Publication number: 20240362366Abstract: The present disclosure involves systems, software, and computer implemented methods for automatic application feature activation and deactivation across time zones. One example method includes executing a computer application in response to a request. The computer application includes first code for a feature that must be activated before the first code is executed. An activation status query for the feature that includes a local time of the request is transmitted to a second computing device. The second computing device determines an activation status for the feature based on whether the local time of the request is equal to or after a feature activation time for the feature. The activation status for the feature is received from the second computing device. The first code for the feature is executed in response to determining that the activation status for the feature indicates that the feature is active for the context of the request.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventors: Rene Gross-Rehder, Sameer Khatri, Jason Ou, Milos Milic
-
Publication number: 20240362367Abstract: An improved method for verifying the authenticity and ownership of valuable items. A valuable item is identified. The valuable item includes valuable item information data, which is information relating to the authenticity of the valuable item and information relating to the ownership of the valuable item. A server computer is acquired. The server computer is programmed to receive communication from a website administrator and website members. A website administrator computer is acquired. The website administrator computer is connected via the Internet to the server computer. The website administrator computer is programmed to communicate with a blockchain website for the purpose of purchasing blockchain tokens from the blockchain website. An administrative digital wallet is created and the administrative digital wallet receives, holds and transfers the tokens. A member computer is acquired. The member computer is connected via the Internet to the server computer.Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Inventor: Stephen Allen
-
Publication number: 20240362368Abstract: A computing platform may train, using historical information classification information, an information classification model, which may configure the information classification model to classify information and identify, based on the classification, a storage location. The computing platform may receive, from a user device, a request to store information. The computing platform may identify, using the information classification model, a cloud based storage location for the information. The computing platform may generate an NFT representative of the first cloud based storage location. The computing platform may direct a cloud based storage system to store the information at the cloud based storage location. The computing platform may send, to the user device, the NFT. The computing platform may receive, from the user device, the NFT and a request to access the information. Based on validating the NFT, the computing platform may grant the user device access to the information.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventors: Durga Prasad Kutthumolu, Shailendra Singh
-
Publication number: 20240362369Abstract: A non-transitory computer-readable storage medium stores computer-readable instructions executable by a controller of a relay device.Type: ApplicationFiled: March 19, 2024Publication date: October 31, 2024Inventor: Akiko MIZUNO
-
Publication number: 20240362370Abstract: An access control system, data storage device, and method to enable an authorized host computing system to access replay protected memory blocks (RPMB) in a data storage device (DSD). This includes an access control system determining the host computing system to be authorized to access the DSD, and securely programming the host computing system and DSD with at least one RPMB key. The DSD is configured to authenticate, using the RPMB key, requests from the host computing device to access the protected memory blocks.Type: ApplicationFiled: August 10, 2023Publication date: October 31, 2024Inventors: Mayur Dipchand Jain, Rotem Sela, Meenakshi C, Danny Berler, Kakumanu Ambika K
-
Publication number: 20240362371Abstract: The present disclosure provides a test scenario generation method, system and device for risky lane-changing test of autonomous driving. The method includes: obtaining a real risky lane change trajectory set; generating an adversarial network TimeGAN, and obtaining a constructed risky lane change trajectory generation model Traj-TimeGAN; inputting the data in the real risky lane change trajectory set into Traj-TimeGAN, and outputting a lane change trajectory of a lane change background vehicle with human driving characteristics; analyzing safety constraint conditions of an autonomous driving vehicle and constructing a critical safety distance model for the vehicle; constructing a critical lane change scenario test case, and generating critical lane change test scenarios corresponding to all risky lane change trajectories through scenario generalization. The present disclosure can generate multi-directional lane change entry angles to meet the needs for high-risk testing of autonomous driving.Type: ApplicationFiled: July 4, 2024Publication date: October 31, 2024Applicant: CHANG'AN UNIVERSITYInventors: Xiangmo Zhao, Shoucai Jing, Fei Hui, Yuyu Zhao, Lan Yang
-
Publication number: 20240362372Abstract: A steel pipe out-of-roundness prediction model generation method includes: executing a numerical computation in which an input data is an operational condition dataset including one or more operational parameters of an end bending step and one or more operational parameters of a press bending step, and an output data is a steel pipe out-of-roundness after a pipe expanding step, the numerical computation conducted a plurality of times while changing the operational condition dataset, and generating a plurality of pairs of data of the operational condition data set and the steel pipe out-of-roundness data after the pipe expanding step, offline as training data; and generating a model for which an input data is the operational condition dataset, and an output data is the out-of-roundness of the steel pipe after the pipe expanding step, the generation of the model performed offline by machine learning using the plurality of pairs of training data.Type: ApplicationFiled: May 24, 2022Publication date: October 31, 2024Applicant: JFE STEEL CORPORATIONInventors: Kosuke HINATA, Masayuki HORIE, Motoki ISHIGURO
-
Publication number: 20240362373Abstract: An inspection apparatus to automatically determine the state of a serviced machine component through a plurality of inspection phases; the apparatus includes: a computer unit, a 3D scanner, a plurality of inspection sensors for performing a plurality of inspection phases on the component; the computer unit interacts with the scanner and the sensors in order to generate an annotated 3D model of the component; the computer unit is configured to perform simulation on the machine component so to determine a status of one or more regions of the machine component; furthermore, the computer unit may be provided with a checking engine for applying one or more criteria to the results of the simulation and automatically determine whether the component is serviceable and/or repairable and generate a status report accordingly.Type: ApplicationFiled: May 11, 2022Publication date: October 31, 2024Inventors: Mirco INNOCENTI, Andrea RUSSO, Andrea GIORGETTI, Remo RIBICHINI
-
Publication number: 20240362374Abstract: A method for generating a dynamic control point for generating an optimized curve includes determining, at a processor(s), an initial curve. A control point sampling interval and a condition are set by the processor(s). Multiple static control points are determined. The static control points are sampled based on the control point sampling interval. A sampled static control point is selected from the plurality of static control points based on the sampled static control point satisfying the condition. The sampled static control point is stored in a set of filtered control points. The set of filtered control points is sampled. A sampled filtered control point is selected based on the control point sampling interval. A dynamic control point is generated based on the sampled filtered control point.Type: ApplicationFiled: April 24, 2024Publication date: October 31, 2024Inventors: Mohammed Ismaeel BABUR, Yury SOKOLOV, Dihan YANG
-
Publication number: 20240362375Abstract: A computer-implemented method for optimizing an alignment between two points includes receiving a map of an area. The method also includes selecting a first solver from a group of solvers for optimizing an alignment between the two points in the map, each of the group of solvers is a machine learning solver. The method further includes generating a first optimal alignment between the two points based on the first solver minimizing a cost function associated with the two points.Type: ApplicationFiled: April 24, 2024Publication date: October 31, 2024Inventors: Mohammed Ismaeel BABUR, Yury SOKOLOV, Dihan YANG
-
Publication number: 20240362376Abstract: Improved energy conservation, including realization of a ZNET (Zero Net Energy including Transportation) paradigm, can be encouraged by providing energy consumers with a holistic view of their overall energy consumption. Current energy consumption in terms of space heating, water heating, other electricity, and personal transportation can be modeled by normalizing the respective energy consumption into the same units of energy. Options for reducing energy that can include traditional energy efficiencies, such as cutting down on and avoiding wasteful energy use and switching to energy efficient fixtures, and improving the thermal efficiency and performance of a building, can be modeled. Additional options can also include non-traditional energy efficiencies, such as replacing a gasoline-powered vehicle with an electric vehicle, fuel switching from a water heater fueled by natural gas to a heat pump water heater, and fuel switching from space heating fueled by natural gas to a heat pump space heater.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Inventor: Thomas E. Hoff
-
Publication number: 20240362377Abstract: A device maintenance method includes acquiring an engineering model of an installation location of a device. The device maintenance method further includes creating and displaying a simulation scene based on the engineering model, and assisting a maintenance operator to identify a target device in the simulation scene. The device maintenance method further includes, in a site where the target device is located, the displaying related information of the target device, based on the simulation scene, and assisting the maintenance operator to perform maintenance on the target device.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Inventor: Qi WANG
-
Publication number: 20240362378Abstract: An artificial intelligence system can be implemented to identify relationships through the propagation of ripple patterns through a grid. In such a system, the grid may comprise cells which operate as cellular automata. Relationships may be identified based on collisions of signals detected by the cells in the grid, and, when a relationship is identified, it may be used to create high speed connections between cells.Type: ApplicationFiled: July 12, 2024Publication date: October 31, 2024Inventor: Gerard E. FELIX
-
Publication number: 20240362379Abstract: A method for predicting fatigue life of a structure includes providing a finite element (FE) model of the structure; calculating a modal stress and a frequency response function (FRF) of the FE model; calculating a stress power spectral density (PSD) matrix; calculating a damage transformation matrix [A]; calculating a covariance matrix from the stress PSD matrix; determining angles ?, ?, and ? in a plane with maximum equivalent variance based on the calculated covariance matrix; and calculating a variance—damage parameter with the angles ?, ?, and ? incremented in a predetermined amount of degrees to thereby identify critical planes where a fatigue crack will occur in the structure.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventors: Eniyavan Subramanian, Robert Keinti, Yung-Li Lee, Sandip Datta
-
Publication number: 20240362380Abstract: A computer-implemented method, a computer system and a computer program product build a product model that indicates an electrostatic discharge (ESD) sensitivity level. The method includes identifying a sensitive component in a model of an electronics device and mapping the sensitive component to a location in the electronics device. The method also includes obtaining ESD metadata for the sensitive component. In addition, the method includes determining an ESD voltage threshold for the sensitive component based on the ESD metadata for the sensitive component. Lastly, the method includes generating the product model of the electronics device, wherein the product model includes a plurality of sensitive components mapped to a plurality of locations in the electronics device and an indication of the ESD voltage threshold for each sensitive component at a respective mapped location in the electronic device.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventors: Jacob Dixon, Steven Chandler Borrillo, Andrea Giovannini, Gandhi Sivakumar
-
Publication number: 20240362381Abstract: A computer-implemented method for predicting agricultural management practices, includes: generating a training dataset that comprises a plurality of years of known management practices associated with a plurality of fields dispersed within geographic region along with a corresponding plurality of years of first remote sense images; training a Bayesian crop model to predict the plurality of years of known management practices associated with the plurality of fields using the corresponding plurality of years of first remote sense images as inputs; providing a time series of second remote sense images associated with a corresponding field having unknown management practices as exclusive inputs to the Bayesian crop model; and executing the Bayesian crop model to predict a key management practices for the corresponding field.Type: ApplicationFiled: April 29, 2024Publication date: October 31, 2024Applicant: CIBO Technologies, Inc.Inventors: Pankaj C. Bhambhani, Ernesto Brau
-
Publication number: 20240362382Abstract: In order to suitably assist breeding, a selective breeding assistance apparatus (1) includes: a reception section (11) for receiving a request pertaining to breeding; a generation section (12) for generating response information based on the request using a learned model which has learned a relation between a property of an existing variety and a breeding process of the existing variety, the response information including information pertaining to an existing variety that serves as a crossbreeding candidate for developing a new variety; and an output section (13) for outputting the response information.Type: ApplicationFiled: September 15, 2021Publication date: October 31, 2024Applicant: NEC CorporationInventors: Yoji MORI, Ayako HOSHINO, Yuya ENDO, Yuuki WATANABE, Naruto YAJIMA
-
Publication number: 20240362383Abstract: A method for seismic surveying includes receiving a baseline dataset and a plurality of sparse monitoring datasets, generating a decimated baseline dataset by removing one or more sources, receivers, or both from the baseline dataset, generating a reconstructed baseline dataset by inputting the decimated baseline dataset into a machine learning model, generating reconstructed monitoring datasets by inputting the plurality of sparse monitoring datasets to the machine learning model, the machine learning model having been trained based on a comparison of the reconstructed baseline dataset to the baseline seismic dataset, determining accuracies for the plurality of sparse monitoring datasets by comparing the reconstructed monitoring datasets to the baseline dataset, and selecting one or more survey geometries for arranging physical sources and physical receivers in a seismic survey based at least in part on the accuracies of the plurality of sparse monitoring datasets.Type: ApplicationFiled: August 29, 2022Publication date: October 31, 2024Inventors: Wenyi Hu, Aria Abubakar, Haibin Di, Zhun Li, Cen Li
-
Publication number: 20240362384Abstract: Embodiments herein describe techniques for designing a magnetic coil. The coil can include a coil mount where current-carrying wires are wrapped around the mount, or a current-carrying bar where the electric current flows through the part itself. Embodiments herein also describe non-planar magnetic coils for magneto-optical trap (MOTs).Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Inventors: William David LUNDEN, Daniel SHEREDY
-
Publication number: 20240362385Abstract: The present disclosure describes a system and method for generating and/or adjusting a superconducting electronic circuit design. According to an embodiment, the system includes a memory and a processor communicatively coupled to the memory. The processor determines a slope in a voltage pulse at a transmitter for a passive transmission line of a superconducting electronic circuit design and determines a model for the passive transmission line based on the slope. The processor also simulates the superconducting electronic circuit design using the model and makes an adjustment to the transmitter based on simulating the superconducting electronic circuit design.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventor: Aaron John BARKER
-
Publication number: 20240362386Abstract: A chip package used as a logic drive, includes: multiple semiconductor chips, a polymer layer horizontally between the semiconductor chips; multiple metal layers over the semiconductor chips and polymer layer, wherein the metal layers are connected to the semiconductor chips and extend across edges of the semiconductor chips, wherein one of the metal layers has a thickness between 0.5 and 5 micrometers and a trace width between 0.5 and 5 micrometers; multiple dielectric layers each between neighboring two of the metal layers and over the semiconductor chips and polymer layer, wherein the dielectric layers extend across the edges of the semiconductor chips, wherein one of the dielectric layers has a thickness between 0.5 and 5 micrometers; and multiple metal bumps on a top one of the metal layers, wherein one of the semiconductor chips is a FPGA IC chip, and another one of the semiconductor chips is a NVMIC chip.Type: ApplicationFiled: July 1, 2024Publication date: October 31, 2024Inventors: Mou-Shiung Lin, Jin-Yuan Lee
-
Publication number: 20240362387Abstract: A device includes a first conductive line as an input line. The device further includes a second conductive line as an output line, wherein the first conductive line and the second conductive line are in a same level of the integrated circuit. The device further includes a first passive isolation structure between the first conductive line and the second conductive line, wherein the first passive isolation structure and the second conductive line are each positioned at an integer multiple of an interval between the first conductive line and the first passive isolation structure.Type: ApplicationFiled: July 12, 2024Publication date: October 31, 2024Inventors: Cheok-Kei LEI, Jerry Chang Jui KAO, Chi-Lin LIU, Hui-Zhong ZHUANG, Zhe-Wei JIANG, Chien-Hsing LI
-
Publication number: 20240362388Abstract: A method and a system for determining a direct current (DC) loop impedance are provided. The method includes: establishing an impedance model for a DC loop of a high-voltage direct current (HVDC) system; scanning parameters in the HVDC system based on the impedance model, to obtain a feasible region of each of the parameters; substituting, for each of the parameters, the parameter in the feasible region into a DC loop impedance equation, to obtain an impedance corresponding to the parameter, the DC loop impedance equation being obtained by transforming the impedance model; and comparing, for each of the parameters, the impedance corresponding to the parameter with a target impedance value, and determining the impedance that meets the target impedance value and the parameter corresponding to the impedance as an optimal impedance and an optimal parameter of the DC loop.Type: ApplicationFiled: September 13, 2021Publication date: October 31, 2024Applicants: ELECTRIC POWER RESEARCH INSTITUTE. CHINA SOUTHERN POWER GRID, CHINA SOUTHERN POWER GRIDInventors: Huan LI, Chuang FU, Shukai XU, Xiaobin ZHAO, Qingming XIN
-
Publication number: 20240362389Abstract: A circuit for mapping N coordinates to a 1D space receives N input bit-strings representing respective coordinates, which can be of different sizes; produces a grouped bit-string therefrom, in which the bits, including non-data bits, are grouped into groups of bits originating from the same bit position per group; and demultiplexes this into n=1 . . . N demultiplexed bit-strings, and sends each to a respective n-coordinate channel. The nth demultiplexed bit-string includes a respective part of the grouped bit-string that has n coordinate data bits and N-n non-data bits per group, and all other groups filled with null bits. Each but the N-coordinate channel includes bit-packing circuitry which packs down the respective demultiplexed bit-string by removing the non-data bits, and removing the same number of bits per group from the null bit.Type: ApplicationFiled: April 30, 2024Publication date: October 31, 2024Inventor: Tijmen Spreij
-
Publication number: 20240362390Abstract: A semiconductor device includes cell regions in rows, each row including at least one instance of a first or second cell region, each of the first and second cell regions including: structures in a transistor layer; conductive segments in an M_1st layer and extending substantially in a first direction (row direction), the M_1st layer having a first pitch as a sole pitch for the conductive segments of the M_1st layer; conductive segments in an M_2nd layer; and conductive segments in an M_3rd layer, including conductive segments for a power grid (PG segments) and conductive segments for control or data signals (logic segments), the M_3rd layer having a second pitch for the logic segments and a third pitch for the PG segments, the third pitch being greater than the second pitch, and the second pitch being different from the first pitch.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Shih-Wei PENG, Jiann-Tyng TZENG
-
Publication number: 20240362391Abstract: Multi version library cell handling and integrated circuit structures fabricated therefrom are described. In an example, an integrated circuit structure includes a plurality of gate lines parallel along a first direction of a substrate and having a pitch along a second direction orthogonal to the first direction. A first version of a cell type is over a first portion of the plurality of gate lines, the first version of the cell type including a first plurality of interconnect lines having a second pitch along the second direction, the second pitch less than the first pitch.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Ranjith KUMAR, Quan SHI, Mark T. BOHR, Andrew W. YEOH, Sourav CHAKRAVARTY, Barbara A. CHAPPELL, M. Clair WEBB
-
Publication number: 20240362392Abstract: An analog standard cell is provided. An analog standard cell according to the present disclosure includes a first active region and a second active region extending along a first direction, and a plurality of conductive lines in a first metal layer over the first active region and the second active region. The plurality of conductive lines includes a first conductive line and a second conductive line disposed directly over the first active region, a third conductive line and a fourth conductive line disposed directly over the second active region, a middle conductive line disposed between the second conductive line and the third conductive line, a first power line spaced apart from the middle conductive line by the first conductive line and the second conductive line, and a second power line spaced apart from the middle conductive line by the third conductive line and the fourth conductive line.Type: ApplicationFiled: July 11, 2024Publication date: October 31, 2024Inventors: Shu-Wei Chung, Tung-Heng Hsieh, Chung-Hui Chen, Chung-Yi Lin
-
Publication number: 20240362393Abstract: A congestion prediction machine learning model is trained to generate, prior to placement, a prediction value indicative of a congestion level likely to result from placement and routing of a netlist based on features of the netlist. In response to the prediction value indicating the congestion level is greater than a threshold, a design tool determines an implementation-flow action and performs the implementation-flow action to generate implementation data that is suitable for making an integrated circuit.Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Applicant: Xilinx, Inc.Inventors: Apurva Abhijit Mirashi, Veeresh Pratap Singh, Meghraj Kalase, Srinivasan Dasasathyan
-
Publication number: 20240362394Abstract: An integrated circuit structure includes a first and second power rail on a first level, a first and second set of conductive structures on a second level and a first, second and third conductive structure on a third level. The first set of conductive structures is over the first power rail. The second set of conductive structures is over the second power rail. The first conductive structure overlaps a first conductive structure of the first set of conductive structures and a first conductive structure of the second set of conductive structures. The second conductive structure overlaps a second conductive structure of the first set of conductive structures and a second conductive structure of the second set of conductive structures. The third conductive structure overlaps a third conductive structure of the first set of conductive structures and a third conductive structure of the second set of conductive structures.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Jung-Chan YANG, Ting-Wei CHIANG, Cheng-I HUANG, Hui-Zhong ZHUANG, Chi-Yu LU, Stefan RUSU
-
Publication number: 20240362395Abstract: A layout correction method for a semiconductor device includes receiving a design layout including at least a target layer and a reference layer, detecting target edges including target patterns in the target layer, and detecting reference edges including reference patterns in the reference layer, determining a dissection point in a section intersecting a space between reference patterns on a target edge having three or more intersecting reference edges, generating segments by dissecting the target edges based on dissection points set for the target edges, setting an evaluation point at an intermediate point of a section intersecting a reference pattern in a segment intersecting the reference pattern, among the segments, determining a movement amount of segments having evaluation points set on the segments by inputting a feature measured at the evaluation points to a layout correction model, and generating a corrected layout by moving the segments based on the movement amount.Type: ApplicationFiled: December 22, 2023Publication date: October 31, 2024Inventors: Yangwoo Heo, Bayram Yenikaya, Xin Li, Sangwook Kim
-
Publication number: 20240362396Abstract: In a method of manufacturing a lithographic mask of an integrated circuit for semiconductor device manufacturing an optical proximity correction (OPC) process to a layout pattern of the integrated circuit is performed to produce a corrected layout pattern. An inverse lithographic technology (ILT) process to the corrected layout pattern is also performed to enhance the corrected layout pattern to produce an OPC-ILT-enhanced layout pattern of the lithographic mask. A first contour image associated with the OPC-ILT-enhanced layout pattern is generated when the OPC-ILT-enhanced layout pattern of the lithographic mask is projected on a wafer. The features of the generated first contour image are extracted. And a second contour image of a developed photo resist pattern on the wafer associated with the OPC-ILT-enhanced layout pattern as an output of a deep neural network is generated.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Applicant: Taiwan Semiconductor Manufacturing Company, Ltd.Inventors: Zhiru YU, Yan FENG, Lin ZHANG, Danping PENG
-
Publication number: 20240362397Abstract: In some embodiments, a method can include generating a resume document image having a standardized format, based on a resume document having a set of paragraphs. The method can further include executing a statistical model to generate an annotated resume document image from the resume document image. The annotated resume document image can indicate a bounding box and a paragraph type, for a paragraph from a set of paragraphs of the annotated resume document image. The method can further include identifying a block of text in the resume document corresponding to the paragraph of the annotated resume document image. The method can further include extracting the block of text from the resume document and associating the paragraph type to the block of text.Type: ApplicationFiled: May 6, 2024Publication date: October 31, 2024Applicant: iCIMS, Inc.Inventors: Eoin O'GORMAN, Adrian MIHAI
-
Publication number: 20240362398Abstract: Systems and methods of the inventive subject matter are directed to the use of large language models to improve data extraction, storage, and searching. Specifically, platforms implementing embodiments of the inventive subject matter are configured to receive uploaded documents. Once received, the contents of the document can be extracted, and key-value pairs can be generated using that content by applying a taxonomy. For any text content that cannot be index using the applied taxonomy, the platform can apply OCR and then use an LLM to generate additional key-value pairs. Once key-value pairs are created and saved to a database, plan language user-generated search queries can be received. An LLM can once again be used to create database search queries, resulting in the ability to search though uploaded documents for specific content along with types of content.Type: ApplicationFiled: February 5, 2024Publication date: October 31, 2024Inventors: Ozan Eren Bilgen, Alperen Sahin, Ihsan Soydemir, Mustafa Batuhan Ceylan, Gulsah Dengiz, Mizane Johnson-Bowman