The present teaching relates to impression count determination. A forecasting time series (TS) model is established based on measured impression counts (MI-counts). Metrics are calculated from MI-counts from a sub-range of a profile. Different types of data characteristics are detected based on the metrics. Hybrid correction applied to the profile is determined based on the detected data characteristics. Corrected impression counts (I-counts) for the profile are generated via the hybrid correction operation based on the MI-counts and I-counts estimated from the forecasting TS models and provided for determining a level of viewership of the content at the site.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
An exemplary method includes a digital asset management system generating a set of collectible non-fungible digital assets, generating metadata specifying that non-fungible digital assets included the set of collectible non-fungible digital assets are configured to combine together to form a layered scene configured to be presented by a computer system, and recording, in a distributed record configured to track ownership of non-fungible digital assets, ownership information associated with the set of collectible non-fungible digital assets.
A device may receive small cell data associated with a small cell, wherein the small cell data includes small cell location data and a small cell barometric pressure reading. The device may identify a calibration user device connected to the small cell and may receive, from the calibration user device, a user device barometric pressure reading. The device may calibrate, based on the user device barometric pressure reading, the small cell barometric pressure reading to obtain a calibrated small cell barometric pressure reading. The device may identify a reference weather station and may receive, from the reference weather station, weather station data, wherein the weather station data includes a weather station barometric pressure reading, and a weather station altitude that indicates an altitude of the reference weather station. The device may determine a small cell altitude based on the calibrated small cell barometric pressure reading and the weather station data.
G01C 5/06 - Mesure des hauteurs; Mesure des distances transversales par rapport à la ligne de visée; Nivellement entre des points séparés; Niveaux à lunette en utilisant des moyens barométriques
G01C 25/00 - Fabrication, étalonnage, nettoyage ou réparation des instruments ou des dispositifs mentionnés dans les autres groupes de la présente sous-classe
4.
SYSTEMS AND METHODS FOR MANAGING A MULTI-OPERATOR RADIO ACCESS NETWORK WITH A SINGLE RADIO UNIT
A network device may receive a first frequency, time, and phase synchronization from a first occupied bandwidth (OBW) portion provided by the network device, and may utilize the first frequency, time, and phase synchronization when providing first services to the first OBW portion. The network device may receive a second frequency, time, and phase synchronization from a second OBW portion provided by the network device, and may utilize the second frequency, time, and phase synchronization when providing second services to the first OBW portion.
A device may receive a list of 4G base stations and 5G base stations associated with outages and identifiers of FWA CPEs associated with the 4G base stations and the 5G base stations, and may filter identifiers of the FWA CPEs from the list, that fail to satisfy an age out time period, to generate a filtered list. The device may determine whether all 4G base stations are out of service for a particular identifier of remaining identifiers included in the filtered list, and may identify a particular FWA CPE associated with the particular identifier as out of service. The device may determine whether all 5G base stations, associated with operational 4G base stations, are out of service for the particular identifier, and may identify the particular FWA CPE associated with the particular identifier as having only 4G service.
H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
H04L 41/0663 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en réalisant des actions prédéfinies par la planification du basculement, p.ex. en passant à des éléments de réseau de secours
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
6.
SYSTEMS AND METHODS FOR MONITORING INTEGRITY AND RELIABILITY OF A NETWORK OF FIBER CABLES IN REAL-TIME
A device may provide a signal with a first wavelength and a second wavelength to a fiber cable, and may receive an intensity change measurement of backscattered light based on the first wavelength of the signal. The device may receive a differential phase change measurement of the backscattered light based on the second wavelength of the signal, and may determine whether there is a fiber loss change, a fiber length change, and/or a fiber cut associated with the fiber cable based on the intensity change measurement. The device may determine whether there is an abnormal event associated with the fiber cable based on the differential phase change measurement, and may report one or more of the fiber loss change, the fiber length change, the fiber cut, or the abnormal event.
H04B 10/079 - Dispositions pour la surveillance ou le test de systèmes de transmission; Dispositions pour la mesure des défauts de systèmes de transmission utilisant un signal en service utilisant des mesures du signal de données
7.
SYSTEMS AND METHODS FOR PROVIDING DYNAMIC EDGE-BASED MULTICAST AND BROADCAST SERVICE FOR CONTENT PROVIDERS
A device may receive content from an application server based on a user equipment (UE) generating a request to view the content over a unicast bearer, and may store the content in a temporary data structure. The device may receive a redirected request to view the content from the UE, and may provide the content over the unicast bearer to the UE based on the redirected request. The device may receive, from the UE, a unicast consumption of the content by the UE and a location of the UE, and may determine whether interest in the content for the location satisfies a threshold based on the unicast consumption. The device may initiate multicast and broadcast service (MBS) core functions with computing resources to utilize for an MBS for the content at the location based on the interest in the content for the location satisfying the threshold.
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
H04W 4/02 - Services utilisant des informations de localisation
8.
SYSTEMS AND METHODS FOR PROVIDING PRIORITIZATION FOR DATA TRANSPORT SERVICES
A network device may receive a subscription request to subscribe to a multimedia priority service (MPS) for a user device, and may generate an MPS profile for the user device based on the subscription request. The network device may store the MPS profile in a data structure, and may receive, from the user device, a request to generate an MPS token for the user device. The network device may retrieve the MPS profile from the data structure based on the request to generate the MPS token, and may generate the MPS token based on the MPS profile. The network device may provide the MPS token to the user device.
A device may include a processor configured to obtain a time series of documents; determine query scores for particular documents of the time series of documents based on a set of query terms; and determine time scores for the particular documents based on timestamps associated with the particular documents. The processor may be further configured to compute document relevancy scores for the particular documents based on a combination of the query scores and the time scores for the particular documents; order the particular documents based on the computed relevancy scores; and generate a document summary by applying a document summarizer applied to the ordered particular documents.
G06F 16/34 - Navigation; Visualisation à cet effet
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
A device may receive, from a fiber sensor device, sensing data associated with a fiber optic cable, the sensing data being produced by an activity that poses a threat of damage to the fiber optic cable, and the sensing data identifying: amplitudes of vibration signals, frequencies of the vibration signals, patterns of the vibration signals, times associated with the vibration signals, and locations along the fiber optic cable associated with the vibration signals. The device may process, with a machine learning model, the sensing data to determine a threat level of the activity to the fiber optic cable, the machine learning model having been trained based on historical information regarding detected vibrations, historical information regarding sources of the detected vibrations, and historical information regarding threat levels to the fiber optic cable. The device may perform one or more actions based on the threat level to the fiber optic cable.
G01H 9/00 - Mesure des vibrations mécaniques ou des ondes ultrasonores, sonores ou infrasonores en utilisant des moyens sensibles aux radiations, p.ex. des moyens optiques
G01V 1/00 - Séismologie; Prospection ou détection sismique ou acoustique
G05D 1/228 - Dispositions d’entrée de commande situées à bord de véhicules sans pilote
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
In some aspects, the techniques described herein relate to a method including: generating, by a processor, verification data; encoding, by the processor, the verification data within a base avatar using a steganography algorithm to generate an augmented avatar; and transmitting, by the processor, the augmented avatar to a recipient.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to a hybrid network slicing service. The hybrid network slicing service may enable the initial configuration of a network slice according to network slice requests that may include customized and user-specified network performance criteria. The hybrid network slicing service may enable network slice requests to specify selection of network resources and use/availability based on entity-based criteria including end device and/or application specific associations. The hybrid network slicing service may optimize network slice configurations and generate network slice templates.
H04L 41/122 - Découverte ou gestion des topologies de réseau des topologies virtualisées, p.ex. les réseaux définis par logiciel [SDN] ou la virtualisation de la fonction réseau [NFV]
H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p.ex. prêt à l’emploi [plug-and-play]
H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p.ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p.ex. entités SDN ou NFV
H04L 43/55 - Test de la qualité du niveau de service, p.ex. simulation de l’utilisation du service
A first User Equipment (“UE”) may communicate with a second UE via a communication link to determine an operational status of the second UE. The second UE may be connected to a network via one or more communication sessions. The first UE may determine, based on the communication link, that the second UE is non-operational, and may output, based on determining that the second UE is non-operational, a request to communicate with the network via the one or more communication sessions associated with the second UE. The network may modify the one or more communication sessions to be associated with the first UE based on the request, and the first UE may communicate with the network via the one or more modified communication sessions.
A device may receive user device application performance logs, radio access network (RAN) performance logs, and multi-access edge computing (MEC) compute logs, and may train a machine learning model with the user device application performance logs, the RAN performance logs, and the MEC compute logs. The device may identify application capacity requirements and MEC compute requirements associated with images of RAN coverage areas of RANs, and may generate labeled and normalized images of RAN coverage areas. The device may receive real time MEC compute data, RAN performance data, and user device application data, and may identify one of the labeled and normalized images of the RAN coverage areas that matches a RAN coverage area of a particular RAN. The device may predict an application capacity and MEC compute requirements for the particular RAN, and may perform one or more actions based on the application capacity and the MEC compute requirements.
A vehicle routing platform may store, in a first data structure, a value at a logical index for each pair of locations of a plurality of pairs of locations. The logical index, for a pair of locations, indicates whether a travel time has been determined. The vehicle routing platform may store, in a second data structure, an offset index for each predetermined logical index of one or more predetermined logical indexes of the first data structure. The offset index, for a predetermined logical index, may be based on a quantity of logical indexes preceding the predetermined logical index in the first data structure. The vehicle routing platform may store, in a third data structure, travel times between pairs of locations of a portion of the plurality of pairs of locations. The vehicle routing platform may determine a travel time, between a pair of locations, using the data structures.
A system described herein may register a particular Service-Based Interface (“SBI”) with a core network (e.g., a Fifth Generation core (“5GC”)). The core network may maintain information associating the system with the particular SBI. The system may request core network information, associated with the core network, from the core network. The core network may provide the requested core network information to the device via the registered particular SBI. The system may provide the core network information, received via the particular SBI, to a radio access network (“RAN”), such as an Open-RAN (“O-RAN”), which may modify RAN configuration parameters based on the provided core network information. The system may also receive requests for RAN information from the core network via the SBI, may obtain the information from one or more elements of the RAN, and may provide the requested RAN information to the core network via the SBI.
H04W 60/04 - Rattachement à un réseau, p.ex. enregistrement; Suppression du rattachement à un réseau, p.ex. annulation de l'enregistrement utilisant des événements déclenchés
H04W 60/06 - Annulation de l'enregistrement ou détachement
17.
SYSTEMS AND METHODS FOR ANALYTICS AND INFORMATION SHARING BETWEEN A RADIO ACCESS NETWORK AND A CORE NETWORK
A system described herein may register a particular radio access network (“RAN”)-based interface, such as a R1 interface, with a RAN, such as an Open-RAN (“O-RAN”). The system may further be associated with a particular Service-Based Interface (“SBI”) of a core network that includes a plurality of network functions (“NFs”), where each NF is associated with a respective SBI. The system may receive, via the particular SBI, a request for RAN information from one or more NFs of the core network, obtain the RAN information from the RAN via the particular interface, output the requested RAN information to the one or more NFs of the core network via the particular SBI. Associating the system with the SBI may be performed without modifying a Network Repository Function (“NRF”) of the core network.
A device may receive and convert audio data to text data in real-time, and may detect a network fluctuation that causes missing voice packets. The device may process partial text and context of the text data, with a model, to generate a new phrase, and may generate a response phoneme for the new phrase. The device may utilize a text embedding model to generate a text embedding for the response phoneme, and may process the audio data, with the model, to generate a target voice sequence. The device may utilize an audio embedding model to generate an audio embedding for the target voice sequence, and may combine the text embedding and the audio embedding to generate an embedding input vector. The device may process the embedding input vector, with an audio synthesis model, to generate a final voice response, and may provide the audio data and the final voice response.
G10L 13/08 - Analyse de texte ou génération de paramètres pour la synthèse de la parole à partir de texte, p.ex. conversion graphème-phonème, génération de prosodie ou détermination de l'intonation ou de l'accent tonique
G10L 15/16 - Classement ou recherche de la parole utilisant des réseaux neuronaux artificiels
G10L 15/187 - Contexte phonémique, p.ex. règles de prononciation, contraintes phonotactiques ou n-grammes de phonèmes
G10L 15/22 - Procédures utilisées pendant le processus de reconnaissance de la parole, p.ex. dialogue homme-machine
G10L 19/005 - Correction d’erreurs induites par le canal de transmission, lorsqu’elles sont liées à l’algorithme de codage
G10L 25/18 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant l’information spectrale de chaque sous-bande
19.
SYSTEM AND METHOD FOR AUDIOVISUAL CONTENT ANALYSIS ON EDGE DEVICES
Techniques for analyzing audiovisual content, such as streaming content are disclosed. In one embodiment, a method is disclosed comprising obtaining a frame of audiovisual content, using a video decoder to decode compressed model weights of at least one trained model, using the at least one trained model with the decoded weights to analyze the frame and extract content based on the analysis, using the extracted content to make a determination that the audiovisual content comprises a category of content, and causing actionable information to be transmitted to a client device of a user in response to the determination that the audiovisual content comprises the category of content.
H04N 21/434 - Désassemblage d'un flux multiplexé, p.ex. démultiplexage de flux audio et vidéo, extraction de données additionnelles d'un flux vidéo; Remultiplexage de flux multiplexés; Extraction ou traitement de SI; Désassemblage d'un flux élémentaire mis en paquets
G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
A user device may receive an image of a user, and may process the image, with a model, to identify a face of the user and key markers of the face. The user device my process the face and the key markers, with the model, to identify features of the face, and may calculate a z-index representing a distance between the face and a display. The user device may calculate left and right face rotation along an x-axis of the display, and may calculate up and down face rotation along a y-axis of the display, based on the features. The user device may calculate an x-position and a y-position of a cursor on the display based on the left and right face rotation, the up and down face rotation, and the z-index, and may provide the x-position and the y-position of the cursor to the display.
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateur; Dispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p.ex. dispositions d'interface
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions
G06V 40/20 - Mouvements ou comportement, p.ex. reconnaissance des gestes
21.
SYSTEMS AND METHODS FOR USING BLOCKCHAIN TO MANAGE SERVICE-LEVEL AGREEMENTS BETWEEN MULTIPLE SERVICE PROVIDERS
In some implementations, a management system may receive service information from a plurality of service providers. A plurality of network devices, of the plurality of service providers, may be blockchain nodes of a blockchain. The service information, of a service provider, may identify network services provided by a network device of the service provider and identifies a location of the network device. The management system may receive, via the blockchain, information regarding a service-level agreement associated with a subset of service providers, of the plurality of service providers, providing network services for an application. The management system may receive, via the blockchain, an approval of the service-level agreement from each service provider of the subset of service providers. The management system may perform an action based on the service-level agreement and based on the network services provided by the subset of service providers for the application.
H04L 41/5019 - Pratiques de respect de l’accord du niveau de service
H04L 41/0686 - Présence d’informations supplémentaires dans la notification, p.ex. pour l’amélioration de métadonnées spécifiques
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p.ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
22.
MANAGEMENT OF AUTONOMOUS MOBILE DEVICE DISCONNECTIONS
An autonomous mobile device includes a processor to establish a Transmission Control Protocol Robot Operating System (TCPROS) connection over a Protocol Data Unit (PDU) session between the AMD and a Multi-Access Edge Computing (MEC) device that hosts an AMD controller in a cellular network, from the AMD the AMD controller. The processor may perform a mission in accordance with the mission plan while the AMD is connected to the AMD controller via the TCPROS connection.
A system described herein may monitor, on an ongoing basis, a Key Performance Indicators (“KPIs”) associated with a wireless network. The system may receive, from a particular device, a monitoring policy specifying one or more criteria, and may compare the criteria associated with the monitoring policy to the monitored KPIs. The system may determine, based on the comparing, that the criteria associated with the monitoring policy is satisfied; may determine a particular subset of the monitored KPIs based on the monitoring policy and further based on determining that the criteria associated with the monitoring policy is satisfied; and may output the particular subset of the monitored KPIs to the second device. The system may monitor the wireless network via private interfaces that are not exposed to devices external to the wireless network.
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p.ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04L 41/0894 - Gestion de la configuration du réseau basée sur des règles
H04L 43/08 - Surveillance ou test en fonction de métriques spécifiques, p.ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux
24.
SYSTEMS AND METHODS FOR GENERATING A VIDEO SUMMARY OF A VIRTUAL EVENT
A video summary device may generate a textual summary of a transcription of a virtual event. The video summary device may generate a phonemic transcription of the textual summary and generate a text embedding based on the phonemic transcription. The video summary device may generate an audio embedding based on a target voice. The video summary device may generate an audio output of the phonemic transcription uttered by the target voice. The audio output may be generated based on the text embedding and the audio embedding. The video summary device may generate an image embedding based on video data of a target user. The image embedding may include information regarding images of facial movements of the target user. The video summary device may generate a video output of different facial movements of the target user uttering the phonemic transcription, based on the text embedding and the image embedding.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an edge cloud management service. The edge cloud management service may automate the provisioning, maintenance, supervision across multi-vendor network devices in a private/enterprise environment. Further, the edge cloud management service may provide abstraction and normalization services across multi-vendor components and enable KPI monitoring, location data, edge discovery metrics, end-to-end latency computation across various cloud service provider technologies.
A network device may receive, for an emergency call, a session initiation protocol (SIP) invite that includes a registered address of a user device that initiated the emergency call, and may determine whether the user device is associated with a private network based on the SIP invite. The network device may extract the registered address of the user device from the SIP invite and based on the user device being associated with the private network, and may provide the registered address to another network device. The other network device may determine a registered geographic location of the user device, based on the registered address, and may provide the registered geographic location to a public safety answering point associated with the emergency call.
A method and system is described that performs dynamic slice management for unmanned aerial vehicles (UAVs). Flight path information associated with a flight path of a UAV is used to determine a predicted optimal application and a predicted optimal network slice for use by the UAV at a location along the flight path. Information associated with the predicted optimal application and the predicted optimal network slice is transmitted to the UAV for use by the UAV at the location. The available network slices to the UAV may be updated based on the determined predicted optimal slice. The UAV may adjust its usage of applications and/or slices based on the information it receives associated with the predicted optimal application and the predicted optimal network slice.
A device may receive network resource model (NRM) data identifying application layer data, user related data, network layer data, and physical layer data associated with a network, and may generate a graphical NRM that is a causal graph representation of the NRM data. The device may merge key performance indicators (KPIs) and network interventions with the graphical NRM, and may generate a hypergraph NRM. The device may determine first embeddings that preserve a structure of the graphical NRM and second embeddings that preserve a structure of the hypergraph NRM, and may train a causal impact model, based on the first embeddings, the second embeddings, a pre-intervention period, and a post-intervention period, to generate learned relationships. The device may retrain the causal impact model based on the learned relationships to generate a trained causal impact model, and may perform one or more actions with the trained causal impact model.
In some aspects, the techniques described herein relate to a method including: receiving, via a network, a message addressed to a mobile device number (MDN); identifying, by the network, a set of hunt group devices associated with the MDN, the set of hunt group devices including at least a first hunt group device and a second hunt group device; transmitting, by the network, the message to each hunt group device in the set of hunt group devices; receiving, by the network, a reply to the message from the first hunt group device; transmitting, by the network, the reply to a sender of the message; and transmitting, by the network, the reply to at least the second hunt group device.
A network device may receive a request for functionality to switch to wideband audio at a user device receiving over-the-top (OTT) video and OTT audio associated with a video conferencing application provided by an application server. The network device may switch from the OTT audio to the wideband audio, for the video conferencing application, based on receiving the request for the functionality. The network device may provide the wideband audio associated with the video conferencing application to the user device to cause the user device to provide the OTT video and the wideband audio independently.
A User Equipment (“UE”) described herein may connect or request connection to a base station of a wireless network. The base station may implement multiple frequency bands, and connecting or requesting connection to the base station may include connecting or requesting connection via a particular frequency band of the multiple frequency bands. The UE may provide an indication of the particular frequency band to a core of the wireless network. The core may select a set of parameters for communications between the UE and the wireless network based on the indication of the particular frequency band. Additionally, or alternatively, the core may provide an indication of the particular frequency band to a device that provides a service to the UE via the wireless network, and the device may select parameters for the service based on the indication of the particular frequency band.
H04W 76/10 - Gestion de la connexion Établissement de la connexion
H04W 40/04 - Sélection d'itinéraire ou de voie de communication, p.ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base des ressources nodales sans fil
32.
SYSTEMS AND METHODS FOR NETWORK CREDENTIAL POLICY ENFORCEMENT IN A WIRELESS NETWORK
A system described herein may maintain policy information associating a plurality of network credentials with respective device identifiers of User Equipment (“UEs”) that are authorized to use respective network credentials to access a network. The system may receive network monitoring information indicating that a particular UE, associated with a particular device identifier, is accessing the network using a particular network credential; compare the particular device identifier and the particular network credential to the policy information; determine, based on comparing the particular device identifier and the particular network credential to the policy information, that the particular UE is not authorized to use the particular network credential; and output a notification to the network that the particular UE is not authorized to use the particular network credential to access the network, wherein the network suspends the particular network credential based on the notification.
Systems and methods described herein provide profile-based routing and access control for a management interface of virtual network services with multiple tenants. A network device receives a request from a user device to access a webpage for an assisted network management service, and obtains, in response to the request, a user profile associated with a user of the user device. The network device retrieves an Internet Protocol (IP) address for a customer web server, of multiple customer web servers for the assisted network management service, that corresponds to the user profile. The network device generates, based on the IP address, a routing rule to route the request to the customer web server.
A device may receive dynamic customer data and static customer data, and may calculate additional customer data based on the dynamic customer data and the static customer data. The device may process the static customer data, the dynamic customer data, and the additional customer data, with a first machine learning model, to determine a next action prediction, and may process the static customer data, the dynamic customer data, and the additional customer data, with a second machine learning model, to determine a next sequence prediction. The device may concatenate the static customer data, the dynamic customer data, the additional customer data, the next action prediction, and the next sequence prediction to generate concatenated data, and may process the concatenated data, with a plurality of machine learning models, to calculate various outputs, and may generate a recommendation for the customer based on the various outputs.
A system described herein may identify traffic associated with a User Equipment (“UE”) that is connected to a first network. The UE may maintain a plurality of UE identities via one or more SIM (“Subscriber Identification Module”) cards, Universal Integrated Circuit Cards (“UICCs”), etc. The system may determine, based on one or more policies, that the traffic is not authorized via the first network. In some situations, the traffic may not be authorized if the first network does not support a type, service, etc. of the traffic. The system may identify a second network, based on the one or more policies, via which the traffic is authorized, and may indicate the second network to the UE. The UE may automatically (e.g., without user intervention) switch to a particular UE identity that is associated with the second network, and may output the traffic via the second network using such UE identity.
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
36.
SYSTEMS AND METHODS FOR DYNAMIC EDGE DISCOVERY IN A WIRELESS NETWORK
A system described herein may provide a technique for receiving a communication session request associated with a particular User Equipment (“UE”). The system may identify locator information associated with an edge discovery system associated with a network that includes a plurality of edge devices, wherein the edge discovery system receives service requests associated with one or more UEs and provides an indication of a respective edge device of the plurality of edge device in response to respective service requests. The system may output, in response to the communication session request, the locator information associated with the edge discovery system, wherein the particular UE communicates with the edge discovery system using the locator information to output a particular service request and receive, from the edge discovery system, an indication of a particular edge device of the plurality of edge devices in response to the particular service request.
A device may receive video data identifying videos associated with one or more unsafe driving events by a driver of a vehicle, and may process the video data, with a machine learning model, to determine classifications for the videos. The device may assign tags to the videos based on the classifications, and may calculate event severity scores based on the classifications. The device may calculate tag scores based on the tags assigned to the videos, and may calculate time-to-contact scores, box cross scores, day/night scores, weather scores, and road condition scores based on the video data. The device may calculate video risk scores for the videos based on the event severity scores, the tag scores, the time-to-contact scores, the box cross scores, the day/night scores, the weather scores, and the road condition scores, and may provide one or more of the video risk scores for display.
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p.ex. des objets vidéo
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
G06V 20/56 - Contexte ou environnement de l’image à l’extérieur d’un véhicule à partir de capteurs embarqués
38.
SYSTEMS AND METHODS FOR ADJUSTING A TRANSCRIPT BASED ON OUTPUT FROM A MACHINE LEARNING MODEL
In some implementations, a transcription system may generate a first transcript based on audio data of a conversation between a first user and a second user. The transcription system may determine, using a first machine learning model of the transcript system, that a portion of the first transcript is incorrect. The transcription system may generate, using a second machine learning model, additional data for transcribing the audio data based on determining that the portion of the first transcript is incorrect. The additional data is generated using a portion of the audio data corresponding to the portion of the first transcript. The transcription system may generate a second transcript based on the audio data and the additional data. The transcription system may provide the second transcript to one or more devices.
A method, a device, and a non-transitory storage medium are described in which an integrated access and backhaul service is provided. The integrated access and backhaul service may include an admission control service that manages admission control based on access and backhaul capacities of an integrated access and backhaul network such that access and backhaul capacities at any integrated access and backhaul device are not exceeded. The integrated access and backhaul service may include a capacity allocation service. The capacity allocation service may provision scheduling and resource allocation to support a performance metric and/or other criteria at an integrated access and backhaul device based on access and backhaul demands and capacities.
Systems and methods described herein provide binding support function (BSF) service registration and discovery for environments using oversubscribed network addresses. A network device in a core network receives a registration request from a binding support device. The registration request includes a binding group identifier associated with the binding support device. The network device stores, based on the registration request, a profile for the binding support device that includes the binding group identifier and receives, from a policy control device, a discovery request for a that includes a unique identifier of user equipment (UE) device. The network device provides, to the policy control device, a response to the discovery request that identifies the binding support device.
A user equipment (UE) device may include a processor configured to obtain a configuration specification for at least one discontinuous transmission parameter, wherein the configuration specification includes different values for at least two different Quality of Service (QoS) classes. The processor may be further configured to detect uplink data that is to be sent by the UE device to a device via a base station; determine a QoS class associated with the uplink data; select a value for the at least one discontinuous transmission parameter based on the configuration specification and the determined QoS class associated with the uplink data; and send the uplink data to the base station based on the selected value for the at least one discontinuous transmission parameter.
A method may include receiving a number of images to train a first neural network, masking a portion of each of the images and inputting the masked images to the first neural network. The method may also include generating, by the first neural network, probable pixel values for pixels located in the masked portion of each of the plurality of images, forwarding the images including the probable pixel values to a second neural network and determining, by the second neural network, whether each of the probable pixel values is contextually suitable. The method may further include identifying pixels in each of the plurality of images that are not contextually suitable.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G06V 10/776 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source Évaluation des performances
G06V 10/778 - Apprentissage de profils actif, p.ex. apprentissage en ligne des caractéristiques d’images ou de vidéos
43.
SYSTEMS AND METHODS FOR CONTROL OF APPLICATIONS BASED ON QUALITY OF SERVICE MONITORING
A device may receive network data identifying a topology of network devices of a network, quality of service (QoS) rules for user equipment (UEs) and application flows associated with the network, QoS profiles for a radio access network (RAN) of the network, and service data flow (SDF) templates. The device may process the network data, with a model, to calculate a network device service level agreement (SLA) score, for each of the network devices on a sliding window, to generate network device SLA scores, and may aggregate the network device SLA scores to generate an end-to-end SLA score on the sliding window. The device may generate QoS configuration data based on the end-to-end SLA score, and may implement the QoS configuration data.
H04L 41/5003 - Gestion des accords de niveau de service [SLA]; Interaction entre l'accord de niveau de service et la qualité de service [QoS]
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
44.
SYSTEMS AND METHODS FOR TIERED NETWORK SLICE DESIGN AND MANAGEMENT IN A WIRELESS NETWORK
A system may provide for the design and/or modification of network slices associated with a wireless network. The wireless network may include different slices that are associated different sets of service parameters. Slices may include radio access networks (“RANs”), core networks, or other types of networks, which may include respective sets of network functions (“NFs”), which may perform specific functions with respect to a given RAN and/or core network. Different slices, RANs, core networks, and/or NFs may be associated with particular policies and/or tags which may be specified by one or more users associated with a first access level. One or more users associated with a second access level may configure portions of the wireless network, and the policies and/or tags associated with particular slices, RANs, core networks, or NFs may be automatically implemented by an orchestration system that configures the wireless network based on the provided configuration information.
Disclosed are systems and methods for an anomaly detection framework that operates as an executable analysis tool for devices to operate in order to determine whether the device contains an unresponsive touch screen (e.g., defective or malfunctioning touch screen). The disclosed framework can analyze the capacitance capabilities of the touch screen, inclusive of the touch layers associated with the touch screen panel, and determine when a device's touch screen is unresponsive to user provided input, which can be any type of touch or gesture provided on a touch screen.
A method may include establishing, by a first service provider and via an application programming interface (API), an agreement with a second entity. The agreement may identify services that can be modified without submission of a new order. The method may also include receiving a first message requesting a change associated with a service and determining, by the first service provider, whether the requested change corresponds to a change that is permitted based on the agreement and whether resources are available in the first network to implement the requested change. The method may further include determining whether the requested change is accepted, sending a second message to the second entity that indicates whether the change is accepted and in response to determining that the change is accepted, automatically implementing the change to the service in the first network.
H04L 67/51 - Découverte ou gestion de ceux-ci, p.ex. protocole de localisation de service [SLP] ou services du Web
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
47.
IDENTIFYING SEARCH RESULTS USING DEEP QUERY UNDERSTANDING
An improved search engine is disclosed. The search engine receives search queries from client devices and inputs these queries into a first neural network (an action understanding model) that includes an action embedding layer. The action embedding layer can be a word embedding layer constructed using action terms. The action understanding model outputs a filter match associated with a type of filter and, in some scenarios, an action-condition pair. The action-condition pair includes an action associated with the type of filter and a condition comprising an adaptive value associated with the action. Based on the filter and, if present, action-condition pair(s), the embodiments generate a structured query and issue the structured query to a data repository (e.g., database). The search engine then returns a search results page responsive to the search query that includes the results returned by the data repository in response to the structured query.
A system described herein may provide for an interface, such as a midhaul interface, between one or more radio elements of a radio access network (“RAN”), such as a Distributed Unit (“DU”) and/or a radio unit (“RU”), and higher layer functions of the RAN, such a Central Unit (“CU”). The interface may provide for the DU to be communicatively coupled to multiple CUs, which may be associated with multiple distinct core networks. The system may route uplink traffic, received from User Equipment (“UEs”) via the RU and the DU, to an appropriate CU. The system may resolve conflicting instructions, for the DU, received from different CUs. The resolution may be performed based on relative priority levels of the CUs or other factors. The system may provide for granular monitoring of traffic parameters on a per-CU basis, thus preserving the privacy of different core networks.
A primary application cloud instance may receive historical usage of an application, may allocate, based on the historical usage, a quantity of cloud resources for enabling the application to be accessed, and may enable the application to be accessed. The primary application cloud instance may provide, to a backup application cloud instance that allocates a minimum quantity of cloud resources for providing a skeletal version of the application, heartbeat and session state information associated with the primary application cloud instance, and the quantity of cloud resources for enabling the application to be accessed. The primary application cloud instance may provide, to the backup application cloud instance, an indication of a failure of the primary application cloud instance, via the heartbeat and session state information, to cause the backup application cloud instance to allocate the quantity of cloud resources and to enable access to the application.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
50.
SYSTEMS AND METHODS FOR MONITORING NETWORK DEVICES BASED ON PREDICTIVE ANALYSIS
A device may receive network data for network devices of an IMS network, and may determine that the network devices are active. The device may identify a set of network devices associated with the network data satisfying an upper threshold, and may determine that the network data of the set of network devices indicates healthy redundant network devices and satisfies a lower redundancy threshold. The device may determine that network data of the healthy redundant network devices satisfies an upper redundancy threshold, and may calculate a variance for the network data of the set of network devices. The device may analyze the network data of the set of network devices based on the variance satisfying a variance threshold, and may identify a first increase or a second increase in traffic for a particular network device. The device may perform actions based on identifying the first increase or the second increase.
A device may receive real time audio data associated with a call between an agent and a customer, and may receive customer data identifying historical interactions with the customer. The device may receive chat data associated with the customer or interactive voice response (IVR) data associated with the customer, and may generate, based on the real time audio data, transcript data identifying a real time transcript of the call with the customer. The device may process the real time audio data, the customer data, the chat data or the IVR data, and the transcript data, with a machine learning model, to determine a customer intent and one or more actions to perform based on the customer intent; and may perform the one or more actions.
A first network device may receive, from an application server, a first request for a dedicated bearer session for an application with a quality of service (QoS) and for a notification of an idle session for the application. The first network device may generate, based on the first request, a second request to be notified regarding expiration of an idle session timer for the application, and may provide the second request to a second network device. The first network device may receive, from the second network device and based on the second request, a notification of expiration of the idle session timer for the application, and may provide, to the application server, the notification of expiration of the idle session timer for the application.
H04W 28/16 - Gestion centrale des ressources; Négociation de ressources ou de paramètres de communication, p.ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
H04W 28/02 - Gestion du trafic, p.ex. régulation de flux ou d'encombrement
H04W 76/36 - Libération sélective de connexions en cours pour la réassignation des ressources associées aux connexions libérées
53.
SYSTEMS AND METHODS FOR PRIVATE NETWORK MANAGEMENT
One or more computing devices, systems, and/or methods for managing security associated with applications are provided. In an example, service allocation information associated with a plurality of private network sites of a private network associated with an entity may be received. Based upon the service allocation information, service profiles associated with a first user equipment (UE) may be determined. The service profiles include a first service profile of wireless communication services accessible to the first UE via a first private network site of the plurality of private network sites and a second service profile of wireless communication services accessible to the first UE via a second private network site of the plurality of private network sites. The first service profile, associated with the first UE, is transmitted to the first private network site. The second service profile, associated with the first UE, is transmitted to the second private network site.
A system may select a set of containers to implement a requested service; identify parameters of the set of containers, and maintain information including parameters associated with a plurality of nodes of the virtualized environment. The parameters for one or more of the plurality of nodes may include information associating the one or more nodes with respective elements of the network. The system may compare the parameters of the one or more containers to the parameters of the one or more nodes, and select a set of nodes of the plurality of nodes on which to deploy the selected set of containers. The selecting may include selecting, for each container of the set of containers, a respective node of the set of nodes on which to deploy the each container. The system may deploy the selected set of containers to the set of nodes to implement the requested service.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A network device may receive, from a first radio access network (RAN), a first registration request associated with a first user device, and may determine, for the first registration request, first multimedia priority service (MPS) access indication parameters that are set to true for provision of MPSs to the first user device. The network device may generate a first registration accept message that includes the first MPS access indication parameters, and may provide the first registration accept message, with the first MPS access indication parameters, to the first user device to enable the first user device to utilize one of the MPSs on the first RAN.
A video summary device may determine, based on video data, a plurality of events that occurred during a period of time. The video summary device may determine first measures of relevance of a plurality of portions of the period of time. A first measure of relevance of a portion of time may be determined based on one or more events of the plurality of events. The video summary device may determine second measures of relevance of a plurality of ranges of time between different portions of time of the plurality of portions of the period of time. The second measures of relevance is determined based on the first measures of relevance determined for the different portions of time. The video summary device may determine particular frames of the video data, as a video summary of the video data, based on the second measures of relevance.
A device may receive an identification request or a radio resource control request, and may process the identification request or the radio resource control request, with a machine learning model, to determine whether the identification request or the radio resource control request is secure. The device may permit the identification request or the radio resource control request based on the machine learning model determining that the identification request or the radio resource control request is secure, or may deny the identification request or the radio resource control request based on the machine learning model determining that the identification request or the radio resource control request is unsecure.
H04W 24/10 - Planification des comptes-rendus de mesures
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04W 76/10 - Gestion de la connexion Établissement de la connexion
58.
SYSTEMS AND METHODS FOR UTILIZING MACHINE LEARNING MODELS TO CONSERVE ENERGY IN NETWORK DEVICES
A device may receive network data identifying reference signal data for a radio access network (RAN), control signal data for the RAN, and network key performance indicators (KPIs) associated with the RAN, and may receive energy consumption data identifying energy consumption by the RAN. The device may process the network data and the energy consumption data, with one or more machine learning models, to identify actions that reduce energy consumption at a radio unit (RU), a distributed unit (DU), or a control unit (CU) of the RAN and that control and minimize a control signal and a reference signal at the RAN. The device may cause the actions to be implemented by the RU, the DU, the CU, or the RAN to save energy at the RAN.
A device may receive network data identifying key performance indicators associated with a base station and user equipment (UEs), UE data identifying UE data records and UE locations, and geographic data identifying a geographic area and features of the geographic area. The device may correlate the network data, the UE data, and the geographic data to generate correlated data. The device may process, the correlated data, with a plurality of machine learning models, to generate a corresponding plurality of results, and may evaluate the plurality of results, with prediction models, to generate a set of results. The device may compare classification cost function weighted predictions and the set of results to generate comparisons, and may select a machine learning model, for the geographic area and from the plurality of machine learning models, based on the comparisons. The device may implement the machine learning model for the geographic area.
Systems and methods described herein provide extended reality (XR)-aware scheduling in a radio access network (RAN). A RAN device receives downlink (DL) metadata for downlink packets in an extended reality (XR) session and uplink (UL) metadata for uplink packets in the XR session. The RAN device selects a scheduling discipline for the XR session, based on the DL metadata and the UL metadata, and implements the selected scheduling discipline for the XR session.
A system described herein may serve as an interface between one or more radio units (“RUs”) of a wireless network and one or more Distributed Units (“DUs”) of the RAN. The system may maintain information associating a set of RUs with a particular DU. The system may determine that a particular RU of the set of RUs should be disassociated from the particular DU, such as based on load metrics associated with the particular DU exceeding one or more thresholds. The system may disassociate the particular RU from the particular DU by modifying the information associating the set of RUs with the particular DU. The modified may indicate that the particular RU is no longer associated with the particular DU. The system may accordingly facilitate communications between the modified set of RUs, not including the particular RU, and the particular DU.
A source network device may receive a multicast data stream to be provided to a plurality of network devices of a network, and may generate, for the multicast data stream, a segment routing header that identifies the plurality of network devices to be provided the multicast data stream. The source network device may cause the multicast data stream to be serially provided to the plurality of network devices identified in the segment routing header without requiring the plurality of network devices to store and reconstruct the segment routing header and without requiring the plurality of network devices to maintain state.
An illustrative latency management system receives a sequence of captured frames in a video stream of an operating environment associated with a robotic device. The latency management system monitors a communication latency of a communication channel between the robotic device and a robotic device operator. The latency management system predicts one or more estimated future frames associated with the video stream based on the sequence of captured frames and the communication latency. The latency management system provides the one or more estimated future frames to the robotic device operator. Corresponding methods and systems are also disclosed.
G05D 1/00 - Commande de la position, du cap, de l'altitude ou de l'attitude des véhicules terrestres, aquatiques, aériens ou spatiaux, p.ex. pilote automatique
G06V 10/70 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique
G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo
64.
SYSTEMS AND METHODS FOR RADIO SCHEDULING WITH BLIND TRAFFIC CHARACTERIZATION
Systems and methods described herein provide intelligent scheduling in a radio access network (RAN). A RAN device receives traffic characterization model parameters and also receives data for a communication session with a User Equipment (UE) device. The RAN device identifies traffic characteristics for the communication session based on the traffic characterization model parameters. The traffic characteristics include a predicted level of periodicity for a future time interval. The RAN device selects a scheduling discipline for the communication session based on the projected level of periodicity for the future time interval, and implements the selected scheduling discipline for the communication session.
A user device may receive a traffic category and/or slice usage policy, and may provide a request for an application. The user device may receive the application with a traffic category and/or slice usage requirement, and may install the application on the user device. The user device may subscribe to traffic categories and/or slices, and may receive approval to utilize the traffic categories and/or slices. The user device may provide, by the application and to an operating system, a connection request for a particular traffic category and/or slice, and may determine whether the application is approved for the particular traffic category and/or slice. The device may provide, to a modem, the connection request and traffic descriptors for the particular traffic category and/or slice based on the application being approved, and may establish a protocol data unit session, for the application, utilizing the particular traffic category and/or slice.
H04L 67/141 - Configuration des sessions d'application
H04L 47/2475 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge des trafics caractérisés par le type d'applications
66.
Systems and methods for edge-aware domain name resolution
A system described herein may maintain first information associating Uniform Resource Locator (“URLs”) with respective Internet Protocol (“IP”) addresses of one or more edge computing devices. The system may maintain second information associating User Equipment (“UE”) identifiers with one or more locations. The system may receive a request, from a UE, including an identifier of the UE and a URL, may identify a location of the particular UE based on the identifier of the particular UE, and may compare the URL to the URLs included in the first information. The system may select a particular edge computing device based on the location of the particular UE, and may output, in response to the request, a particular IP address of the selected edge computing device.
H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
67.
SYSTEM AND METHODS FOR MANAGING PHYSICAL NETWORK FUNCTIONS VIA ORCHESTRATION
Systems and methods described herein provide life cycle management for physical network function (PNFs) via an orchestrator using PNF proxies. A network device in a service provider network receives a software package for a virtual network function (VNF) serving as PNF proxy for a type of PNF. The software package includes a proxy descriptor and external virtual links (VLs) for the type of PNF. The network device associates, an instance of the PNF proxy with an installed PNF, creates the instance of the PNF proxy as a VNF in a cloud platform, and provides a record of the created instance of the PNF proxy to an active inventory system.
Systems and methods described herein provide location-based routing for edge networks. A network device receives routing rules associating geohash tiles, for a region of interest, with one or more virtual Road Side Units (vRSUs). The network device receives a message from a vehicle client in the region of interest. The message includes a message header that identifies geospatial coordinates of a vehicle. The network device calculates a geohash based on the geospatial coordinates in the message header and associates, based on the routing rules, the geohash with one of the vRSU. The network device routes the message to the one of the vRSUs based on the associating.
H04W 40/20 - Sélection d'itinéraire ou de voie de communication, p.ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base de la position ou de la localisation géographique
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/44 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les véhicules, p.ex. communication véhicule-piétons pour la communication entre véhicules et infrastructures, p.ex. véhicule à nuage ou véhicule à domicile
69.
SYSTEMS AND METHODS FOR CONFIGURING A VIRTUAL COMPUTE INSTANCE IN DIFFERENT CLOUD COMPUTING ENVIRONMENTS
A device associated with a cloud computing environment may receive a selection of a modified template with a cloning agent, and may generate a modified template clone, with the cloning agent, based on the selection of the modified template. The device may analyze, via the cloning agent, virtual hardware of the cloud computing environment to generate fingerprints, and may identify, via the cloning agent, the cloud computing environment based on the fingerprints. The device may determine, via the cloning agent, one or more application programming interfaces based on identification of the cloud computing environment, and may utilize, via the cloning agent, the one or more application programming interfaces to obtain configuration data. The device may configure, via the cloning agent, a virtual machine of the modified template clone, based on the configuration data and to generate a configured virtual machine, and may enable the configured virtual machine to be utilized.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
70.
IDENTIFICATION OF ANOMALOUS TELECOMMUNICATION SERVICE USAGE
One or more computing devices, systems, and/or methods for identifying anomalous behavior of users are provided. In an example, users of a telecommunication service provider may be segmented into a plurality of user segments based upon telecommunication service metrics associated with the users. A machine learning model may be trained using telecommunication service information associated with users of the first user segment to generate a trained machine learning model. Using the trained machine learning model, a forecast of telecommunication service usage associated with a first user segment of the plurality of user segments. A telecommunication service usage metric, associated with a user belonging to the first user segment, may be compared with a range indicated by the forecast. The user may be flagged as having anomalous behavior based upon a determination that one or more telecommunication usage metrics, associated with the user, are outside one or more ranges indicated by the forecast.
One or more computing devices, systems, and/or methods for constructing and utilizing a search structure for identifying tasks to assign to entities are provided. The search structure is constructed to partition tasks and represent time constraints for performing the tasks and distance constraints corresponding to locations of the tasks. A search of the search structure is performed to identify a set of nearest tasks with respect to a target task. Tasks within the set of nearest tasks may be assigned to an entity to perform.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A system comprises one or more devices that implement network functions (NFs). The NFs comprise a network data analytics function (NWDAF) configured to provide first analytics to a policy control function (PCF). In addition, the NFs also comprise the PCF configured to: receive the first analytics from the NWDAF; generate a first policy rule based on the first analytics; and forward the generated first policy rule to a network component to process the first policy rule at the network component.
H04W 28/02 - Gestion du trafic, p.ex. régulation de flux ou d'encombrement
H04L 47/2425 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge de spécifications de services, p.ex. SLA
73.
PROTECTIVE STRUCTURE FOR PROTECTING ANTENNA FROM DAMAGE
A protective structure, to protect an antenna from damage, is provided. The protective structure includes a body. The body defines one or more prong-receiving apertures in a first surface of the body, wherein through each aperture of the one or more prong-receiving apertures, the body is configured to receive a prong of one or more prongs of the antenna. The body defines a radio frequency (RF) connection aperture extending from the first surface of the body to a second surface of the body, wherein the body is configured to receive a cable through the RF connection aperture to couple a cable connector of the cable to an RF connector of the antenna.
A method may include receiving, by at least one network device and from a user device, a registration message including a service identifier and at least one of a network slice identifier or a network slice token. The method may also include determining, based on information included in the registration message, whether the user device is authorized to use a network slice associated with the service identifier. The method may further include setting up a data session to be serviced by the network slice, in response to determining that the user device is authorized to use the network slice.
A method, a device, and a non-transitory storage medium are described in which a security service of end device profiles is provided. The service may include obtaining a profile for a card of an end device from a third party device in which the profile includes first and second executables. For example, the first and second executables may each include a subscriber identification module. The first executable may initialize and subsequently perform a switching procedure that enables the second executable to replace the use of the first executable. The first executable may also generate a key that can be used to provision the second executable on the end device.
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
The present teaching relates to method, system, medium, and implementations for job pricing. When receiving information about a new task of a job type, a mixture model representing historic job completion data and including multiple cluster-based models is used to predict job pricing. The multiple cluster-based models characterize corresponding multiple clusters identified from historic job completion data and are used to generate multiple predictions of duration to complete the new task. The predictions generated based on the cluster-based models are integrated based on the mixture model to generate an overall job pricing estimate for the new task.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
A routing optimization system may determine a plurality of routes based on one or more changes to an initial route. Each change generates a respective route of the plurality of routes. The routing optimization system may store route information for each route. The route information, for each route, includes cost information identifying a cost associated with the route. The route information is stored in a respective entry of a data structure. The routing optimization system may determine that a particular route, associated with a lowest cost out of costs associated with the plurality of routes, is to be selected from the plurality of routes. The routing optimization system may determine whether an entry, of a plurality of entries associated with the plurality of routes, is empty. The routing optimization system may select the particular route based on the plurality of entries after determining that the entry is not empty.
A method may include providing a network data analytics function (NWDAF) in a network and providing, a non-third generation partnership project (3GPP) interworking function (N3IWF) in the network. The method may also include subscribing, by the N3IWF, to the NWDAF, and obtaining, by the NWDAF and from the N3IWF, data associated with processing performed by the N3IWF.
In some implementations, a first device may obtain first channel state information (CSI) of a second device. The first device may determine that a variance of the first CSI exceeds a variance threshold. The first device may determine that a motion event has occurred based on determining that the variance, of the first CSI, exceeds the variance threshold. The first device may determine a location of the motion event based on the first CSI and second CSI of a third device. The first device may adjust an operation of one or more devices associated with the location based on determining the motion event.
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
H04B 7/06 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
A cable identification system is provided. The cable identification system may include a laser pulse generator configured to emit laser pulses into the first optical-fiber cable segment. The cable identification system may include a polarization disturbance device configured to induce a change in polarization of a second optical-fiber cable segment via changing a position of the second optical-fiber cable segment. The cable identification system may include a polarization detection device configured to determine measures of polarization based upon backscattered light received from the first optical-fiber cable segment when the second optical-fiber cable segment has different positions. The polarization detection device may be configured to determine whether the first optical-fiber cable segment is connected to the second optical-fiber cable segment based upon the measures of polarization.
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an integrated network slice encryption service. The integrated network slice encryption service may manage and provision encryption and/or decryption services associated with a third party and relative to a network slice and end device application associated with a service provider and application provider. The integrated network slice encryption service may provision end devices, core network devices, and application layer devices of an external network.
Systems and methods described herein provide dynamic orchestration of deep packet inspection (DPI) probes in a transport network. A network device receives an event report for a critical severity event in a network and stores the event report with other event reports to form an event data set. The network device correlates the event data set with a monitoring condition and selects a workflow for a DPI probe deployment that corresponds to the monitoring condition. The network device sends, to a service orchestrator device, a call to deploy a DPI probe in the network based on the workflow.
H04L 43/028 - Capture des données de surveillance en filtrant
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p.ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
83.
SYSTEMS AND METHODS FOR NETWORK DESIGN AND CONFIGURATION BASED ON USER-LEVEL USAGE MODELING
A system described herein may identify sets of seed parameters that are each associated with a respective User Equipment (“UE”) of a group of UEs. The system may generate, based on the seed parameters for each UE, a respective set of UE usage metrics for each UE, and may generate a set of aggregate UE usage metrics based on the generated sets of UE usage metrics. The system may compare the aggregate UE usage metrics to a measure of network capacity; determine an amount of time that a measure of UE usage exceeds the measure of network capacity; determine that the amount of time, that the measure of UE usage exceeds the measure of network capacity, exceeds a threshold amount of time; and modify network configuration parameters based on determining that the amount of time, that UE usage exceeds the network capacity, exceeds the threshold amount of time.
The present teaching relates to method, system, medium, and implementations for increasing content insertion opportunities. A prediction input is received that characterizes utilization of content stream utilization channels (CSUCs). Schedule parameters are automatically predicted for the prediction input using prediction models obtained via machine learning based on grouped historic data related to CSUCs, where grouping is based on an operational mode in which the prediction models operate. Using the predicted schedule parameters, insertion opportunity may be identified with respect to CSUCs and insertion schedules are generated specifying insertions of content streams into identified CSUCs at respective insertion times.
A device establishes a first encrypted tunnel with a first active security gateway at a first data center to enable the device to communicate, via the first encrypted tunnel, with a first access and mobility management function (AMF) at the first data center. The device forwards, via the first encrypted tunnel and the first active security gateway, a first User Equipment device (UE) message to the first AMF. The device determines an occurrence of a failure or overload condition at the first active security gateway, and establishes, based on the determined occurrence of the failure or overload condition, a second encrypted tunnel with a standby security gateway at a second data center to enable the device to communicate, via the second encrypted tunnel, with the first AMF. The device forwards, via the second encrypted tunnel and the standby security gateway, at least one second UE message to the first AMF.
Techniques for identifying and tracking objects in digital content are disclosed. In one embodiment, a method is disclosed comprising obtaining a frame of digital content, the frame comprising pixel data, detecting an object using the pixel data, determining a set of attributes for the detected object, the set of attributes comprising position, object segment and affine attributes, determining a similarity measurement for the detected object and a second object using the set of attributes corresponding to the detected object and the second object's set of attributes, and using the similarity measurement to make a similarity determination whether or not the detected object and the second object are a same object.
G06V 10/74 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques
G06V 10/75 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques utilisant l’analyse de contexte; Sélection des dictionnaires
G06T 7/246 - Analyse du mouvement utilisant des procédés basés sur les caractéristiques, p.ex. le suivi des coins ou des segments
G06T 7/277 - Analyse du mouvement impliquant des approches stochastiques, p.ex. utilisant des filtres de Kalman
G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques
88.
SYSTEMS AND METHODS FOR NETWORK ACCESS CONTROL USING DISTRIBUTED LEDGERS
A system described herein may maintain one or more smart contracts on a distributed ledger. The system may receive a request, associated with a User Equipment (“UE”), for access to a particular network (e.g., a private network), identify one or more attributes of the UE, and select a particular smart contract based on the attributes of the UE. The system may execute the selected particular smart contract, which may include performing operations, indicated by the particular smart contract, using the one or more attributes of the UE as inputs. Executing the particular smart contract may further include identifying outputs that result from performing the particular set of operations using the attributes of the UE as inputs, such as a network access policy for the UE. The system may output a response to the request, indicating the network access policy determined based on executing the particular smart contract.
A system described herein may provide a technique for the augmentation of one or more models based on target distributions of values associated with the models. Such models may be associated with a wireless network, and may associate a set of states to a set of values and/or to a set of actions. Such states may include particular sets of configuration parameters associated with the wireless network, the values may include Key Performance Indicators (“KPIs”) associated with a randomness state model or other metrics associated with the wireless network, and the actions may include one or more actions to perform with respect to the wireless network when given a particular state and/or set of KPIs.
H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p.ex. l’optimisation de la configuration pour améliorer la fiabilité
90.
PACKET FLOW DESCRIPTION (PFD) MANAGEMENT METHOD AND APPARATUS
Techniques for packet flow description (PDF) management are disclosed. In one embodiment, a method is disclosed comprising receiving, by a network exposure function (NEF), a packet flow description (PFD) management request via an application function (AF), the PFD management request, the PFD management request comprising application identification information identifying an application, using, by the NEF, the application identification information to identify a set of unified data repositories (UDRs) affected by the PFD management request, and instructing, by the NEF, at least one UDR of the set of UDRs to make a PFD change to the identified application's application data in accordance with the PFD management request.
H04L 47/2475 - Trafic caractérisé par des attributs spécifiques, p.ex. la priorité ou QoS pour la prise en charge des trafics caractérisés par le type d'applications
A method, a network device, and a non-transitory computer-readable storage medium are described in relation to an handover management service. The handover management service may include receiving a measurement report from an end device. The measurement report may include an SINR value in combination with RSRP and/or RSRQ values. The measurement report may include values from a source cell, a candidate target cell, or both source and candidate target cells. The handover management service may determine whether to perform a handover, based on the measurement report in which a handover criteria does not include an RSRQ value. The handover management service may also determine whether to perform a handover based on handover criteria that includes a variable value for a threshold value. The variable value, among values, may be selected and correlated to a value included in the measurement report.
One or more computing devices, systems, and/or methods for dynamic remote configuration of a reconfigurable intelligent surfaces component are provided. A controller is hosted remote to a reconfigurable intelligent surfaces network, such as within a cloud computing environment. The controller receives characteristics (e.g., signal degradation information from a base station and/or user equipment) of signals transmitted through the reconfigurable intelligent surfaces network between devices. The controller evaluates the characteristics to generate tuning parameter values to apply to cells of the reconfigurable intelligent surfaces component of the reconfigurable intelligent surfaces network. The controller transmits a control signal over a communication channel to the reconfigurable intelligent surfaces component for modifying operation of the cells using the tuning parameter values.
H04B 17/336 - Rapport signal/interférence ou rapport porteuse/interférence
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
93.
SYSTEMS AND METHODS FOR DYNAMICALLY DETERMINING ABNORMAL PERIODIC SIGNALS IN A NETWORK
A device may calculate a PRB seasonal strength based on PRB data from base stations, and may scale and normalize the PRB data based on the PRB seasonal strength. The device may calculate and combine FFTs for the normalized and scaled PRB data, may calculate a z-score for the combined FFT, and may calculate FFT IQRs for frequencies of the combined FFT. The device may filter the FFT IQRs based on the z-score, may process the FFT IQRs, with a clustering model, to identify clusters of periodic interference patterns, and may aggregate the clusters. The device may identify peak data in the PRB data, and may process the peak data, with a model, to determine a parameter for clustering. The device may process the PRB data, with the clustering model, to identify final clusters of periodic interference patterns, and may perform actions based on the final clusters.
An illustrative virtual meeting management system associates a user device of a participant of a virtual meeting with a physical location from which the participant and one or more additional participants participate in the virtual meeting. The virtual meeting management system determines that the participant provides a user input via the user device during the virtual meeting. The user input indicates that the participant will speak. Based on the user input and the associating, the virtual meeting management system provides an active speaker indicator for presentation in a virtual meeting interface provided to one or more participants of the virtual meeting. The active speaker indicator specifies a participant identifier representative of the participant and a place identifier representative of the physical location from which the participant participates in the virtual meeting. Corresponding methods and systems are also disclosed.
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G10L 25/78 - Détection de la présence ou de l’absence de signaux de voix
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G10L 25/57 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation pour le traitement des signaux vidéo
95.
SYSTEMS AND METHODS FOR NEW-RADIO-AWARE LTE SCHEDULING
New Radio (NR)-aware LTE scheduling is provided. An access station for a radio access network includes a first scheduling function. The first scheduling function identifies a User Equipment (UE) device that has a first active wireless connection and a second active wireless connection to the radio access network. The first scheduling function determines that expanded coverage is needed for an uplink transmission for the second active wireless connection and obtains uplink scheduling information for the second active wireless connection. The first scheduling function adjusts uplink scheduling for the first active wireless connection such that power sharing is prioritized for uplink time intervals of the second active wireless connection over overlapping uplink time intervals of the first active wireless connection.
A first device may include a pod and a processor. The processor may be configured to: receive a request, from a second device, to transfer a content item to the second device; and determine whether the content item can be transferred from the pod to the second device using a content caching container (CCC). When the processor determines that the content item cannot be transferred from the pod, the processor may be further configured to: send a reply, to the second device, indicating that the content item cannot be transferred from the pod to the second device; and enable caching the content item at the pod. When the processor determines that the content item can be transferred from the pod, the processor may be further configured to transfer the content item via a first CCC pm the pod to the second device.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
97.
SYSTEMS AND METHODS FOR QUALITY OF SERVICE TREATMENT OF NETWORK TRAFFIC BASED ON TRAFFIC ATTRIBUTES
A device described herein may maintain information associating sets of traffic attributes with respective sets of Quality of Service (“QoS”) parameters, and may receive a request to establish a traffic flow. The request may indicate one or more traffic attributes associated with the requested traffic flow. The device may compare the one or more traffic attributes, included in the request, to the information associating the sets of traffic attributes with the respective sets of QoS parameters, identify a particular set of QoS parameters with which the traffic flow is associated, establish a communication session with a network based on the particular set of QoS parameters, communicate traffic, associated with the traffic flow, with the network via the established communication session. The device may include an application programming interface (“API”) via which an application associated with the traffic flow may specify the traffic attributes in the request.
A system described herein may provide a technique for a policy and/or rules element of a core network, such as a Policy Control Function (“PCF”), to identify a first network slice with which a communication session between a User Equipment (“UE”) and a core network, such as a protocol data unit (“PDU”) session, is associated. The policy and/or rules element may identify a second network slice with which the communication session should be associated, such as based on traffic monitoring, network congestion monitoring, or other criteria, and may output an indication, indicating a second network slice, to a session control element, such as an Session Management Function (“SMF”). The session control element may cause the communication session to be moved from the first network slice to the second network slice based on receiving the indication.
Techniques for generating emotionally-aware digital content are disclosed. In one embodiment, a method is disclosed comprising obtaining audio input, obtaining a textual representation of the audio input; using the textual representation of the audio input to identify an emotion corresponding to the audio input; generating an emotionally-aware facial representation in accordance with the textual representation and the identified emotion; using the emotionally-aware facial representation to generate one or more images comprising at least one facial expression corresponding to the identified emotion; and providing digital content comprising the one or more images.
G10L 25/63 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation pour estimer un état émotionnel
100.
SYSTEMS AND METHODS FOR SERVICE BASED NETWORK RESOURCE ALLOCATION
A novel method for service based network resource allocation is disclosed. In one embodiment, a method is disclosed comprising receiving from a UE at a base station over a Primary Cell (PCell), a request message to perform an action with respect to a Secondary Cell (SCell), the request message including service information. The method then determines a specific action to be performed with respect to the SCell based on the service information. Finally, the method performs the specific action with respect to the SCell at the base station and transmits a connection reconfiguration message to the UE to direct the UE to perform the specific action based on a service to be supported.