Aspects of the subject disclosure may include, for example, participating in a communication session, over a communication network, on the first communication device, and receiving user-generated input. The user-generated input includes transferring the communication session from the first communication device to a second communication device. Further embodiments can include generating a peer-to-peer communication link between the first communication device and the second communication device, transmitting data associated with the communication session to the second communication device over the peer-to-peer communication link, and providing first instructions to a first network node to transfer the communication session from the first communication device to the second communication device. The first network node transfers the communication session from the first communication device to the second communication device in response to receiving the first instructions from the first communication device. Other embodiments are disclosed.
Facilitating unified mobility management for metaverse and physical worlds in advanced networks is provided herein. Operations of a system include determining a change has occurred to a service parameter of a user equipment executing a metaverse experience. The metaverse experience can include a combination of first usage of a first resource selected from a first group of resources associated with a physical world and second usage of a second resource selected from a second group of resources associated with a virtual world. The operations can also include executing a mobility management microservice for the user equipment, wherein the mobility management microservice is selected based on a type of the change to the service parameter.
Aspects of the subject disclosure may include, for example, a device having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including facilitating activation of a first module for a wireless system; integrating the first module into the wireless system; checking for errors during the integration of the first module in the wireless system; responsive to a determination that the integrating of the first module is error free, placing the wireless system in an operational state; and receiving an operational error code from an originating module. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, receiving information defining a plurality of participants in a secure data lake, receiving access information for the plurality of participants, the access information operative to define respective access to the secure data lake for respective participants, establishing the secure data lake according to the information, wherein the establishing comprises enabling secure communication and data sharing among the participants and limiting access to only the participants, according to the access information, and terminating the secure data lake upon occurrence of a terminating condition. Other embodiments are disclosed.
Aspects of the subject disclosure may be directed to, for example, a method including determining one or more hierarchical levels associated with one or more machine learning (ML) models deployed in wireless communication networks, and generating one or more identifications (IDs) of the one or more ML models based on the one or more hierarchical levels. The one or more IDs of the one or more ML models indicate a network function associated with the one or more IDs, a ML model structure, a ML model delivery format, or a combination thereof. Other embodiments are disclosed.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 24/02 - Arrangements for optimising operational condition
Aspects of the subject disclosure may include, for example, detecting an interruption of a supply of operating power to a cell site of a cellular communication network, estimating an estimated time to restoration (ETR) of the supply of operating power to the cell site, wherein the estimating is based on information of an operator of the cellular communication network, determining, based in part on the ETR, to dispatch a portable generator to the cell site to provide a new supply of operating power to the cell site, and initiating a communication to dispatch the portable generator. Other embodiments are disclosed.
The technologies described herein are generally directed toward establishing a domain of authority for routing table updates from a routing device. According to an embodiment, a system can comprise a processor and a memory that can enable operations facilitating performance of operations including identifying a route update that comprises information about a network. According to the embodiment, the operations can further include communicating, via the network, the route update to a second routing device for propagation of the route update to routing devices in a first authority domain with the first routing device.
Aspects of the subject disclosure may include, for example, obtaining first parametric information, analyzing, based on the obtaining of the first parametric information, the first parametric information to identify a first plurality of resources associated with a terrestrial network (TN) and at least a second resource associated with a non-terrestrial network (NTN) for supporting a communication service, arranging, based on the analyzing of the first parametric information, at least a first portion of the first plurality of resources as a first combined cell, and scheduling first communications between the first combined cell and the at least a second resource to facilitate the communication service. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a housing that includes a first waveguide port and a second waveguide port, wherein the first waveguide port is configured for receiving an optical signal via a first optical waveguide optically coupled to the first waveguide port. The housing may include a passive optical processing module that is removably coupled to the housing and optically coupled to the first waveguide port. The passive optical processing module is configured to perform a prescribed function, e.g., filtering, upon the optical signal to obtain a processed optical signal without utilizing an electronic circuit. The second waveguide port is configured to transfer the processed optical signal to an optical waveguide external to the housing. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a service associated with a communication device, determining a first functionality from a group of functionalities associated with the service resulting in a first determination and based on the first determination, generating first instructions for the communication device. The first instructions indicate to the communication device to use a first group of artificial intelligence (AI) models from a plurality of groups of AI models to implement the first functionality of the service. Further embodiments include transmitting the first instructions to the communication device. The communication device, in response to receiving the first instructions, selects the first group of AI models from the plurality of groups of AI models and implements the first functionality of the service utilizing the first group of AI models. Other embodiments are disclosed.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
11.
PROTOCOL AND SIGNALING FRAMEWORK ENABLING MACHINE LEARNING MODELS IN WIRELESS COMMUNICATION NETWORKS
Aspects of the subject disclosure may be directed to, for example, a method including determining a set of data collection parameters that are configurable to collect data indicative of network events occurring in real time or near real time in the wireless communication networks, receiving the collected data based on the set of data collection parameters from a group of network entities operating in the wireless communication networks, based on the received collected data, and generating training data for a machine learning model deployed in the wireless communication networks. Other embodiments are disclosed.
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 28/02 - Traffic management, e.g. flow control or congestion control
H04W 72/30 - Resource management for broadcast services
12.
METHOD AND SYSTEM FOR ADAPTIVE TRUST RECOVERY IN MIXED ENVIRONMENT COMMUNICATIONS
AT&T Global Network Services Belgium Luxembourg SPRL (Belgium)
AT&T Intellectual Property I, L.P. (USA)
Inventor
Lefèvre, Catherine
Pratt, James H.
Zavesky, Eric
Closset, Christophe
Ngueko, Gervais-Martial
Abstract
Aspects of the subject disclosure may include, for example, detecting communications between a source device and a destination device, wherein the communications relate to a particular context and are facilitated over a first network associated with the destination device, determining a state or trust level for the particular context based on reference data, detecting a change in behavior of the source device, updating the state or trust level based on the detecting the change in behavior of the source device, resulting in an updated state or trust level, identifying a loss of trust condition based on the updated state or trust level, restricting communications between the source device and the destination device, and performing a trust rebuild process in an attempt to address the loss of trust condition and to enable the source device to resume communications with the destination device. Other embodiments are disclosed.
A resource upgrade predictor can be operable to receive, from a first network node device, traffic information. Based on the traffic information, the resource upgrade predictor can obtain network utilization data related to other network node devices having a similar interference characteristic (e.g., signal-to-noise ratio) to the first network node device. The resource upgrade predictor can use this network utilization data to determine a demand (e.g., demand level, demand point) at which at least a defined value related to a transmission link capacity associated with transmissions between the first network node device and the user equipment, is attained (e.g., a percentage of physical resource block loading). The resource upgrade predictor can also obtain projected demand data associated with a geographic area serviced by the first network node device, and determine, based upon the demand and the projected demand data, a time at which a network resource upgrade related to the first network node device, is to be performed.
Synchronized satellite communications can include receiving, at a computer having a processor, a data request that identifies a requesting device, data to be received by the requesting device, and a time at which the data is to be received by the requesting device. The processor can determine a geographic location of the requesting device and locations of a plurality of satellites; identify, based on the geographic location of the requesting device and the locations of the plurality of satellites, satellites that are to provide the data to the requesting device; generate instructions for loading network requirements to the satellites; and provide, to at least one of the satellites, the instructions. Additionally, embodiments of the concepts and technologies disclosed herein can be used to provide the same data and/or different data to multiple devices at the same time.
In one example, a method performed by a processing system including at least one processor includes establishing a communication group including at least three users of an extended reality environment as members, tracking locations and directional positions of the members of the communication group within the extended reality environment and within physical environments of the members, determining that a second user of the at least three users is an intended recipient of a first utterance made by a first user of the at least three users, and presenting the first utterance to the second user, where a directionality associated with a presentation of the first utterance is based on a location and a directional position of the first user relative to the second user.
The described technology is generally directed towards reducing unwanted cellular network activities, such as phantom 911 calls or other unwanted cellular network activities. Machine learning models described herein can be trained, using device level data and network level data, to identify devices that are likely to engage in an unwanted cellular network activity. A trained machine learning model can be deployed to identify devices, and devices identified by the trained machine learning model can be re-configured to prevent them from engaging in the unwanted cellular network activity. Devices likely to engage in the unwanted cellular network activity are thus identified and reconfigured to prevent future unwanted cellular network activity before it occurs.
Facilitation of hybrid automatic repeat requests (HARQ) can comprise a system that acquires information about the capability of a mobile device. Next, the system can configure the mobile device with multiple physical uplink control channel (PUCCH) resources and a number of repetitions within a slot for each antenna port of the mobile device. A network node can then transmit a downlink control channel to the mobile device and indicate the PUCCH resources for each antenna port. Consequently, the system can then detect a HARQ acknowledgment (ACK) from the mobile device from all of the PUCCH resources.
Aspects of the subject disclosure may include, for example, determining regression models that predict resource utilization at security gateways as a function of performance indicator values measured at radio access network (RAN) nodes. Optimization models are built using the regression models and constraints related to the security gateway resources. Solutions to the optimization models include assignments of RAN nodes to communicate with security gateways, where the assignments satisfy the constraints in the optimization models. Other embodiments are disclosed.
Providing mobility network support for scrubbed IP domains can include obtaining packet forwarding control protocol messages associated with a mobility network, the packet forwarding control protocol messages relating to data communications of user equipment attached to the mobility network via a radio resource, correlating the packet forwarding control protocol messages to subscriber identities or device identities to obtain correlated packet forwarding control protocol messages, determining, based on the correlated packet forwarding control protocol messages, if the user equipment is associated with a malicious subscriber or comprises a malicious device, in response to determining that the user equipment is associated with a malicious subscriber or comprises a malicious device, selecting an interface via which the radio resource connects to a user plane of the mobility network, and triggering activation of an interface-located firewall on the interface to monitor data exchanged via the interface.
Aspects of the subject disclosure may include, for example, obtaining data regarding an environment associated with a cell site, identifying one or more coverage pivots from a plurality of coverage locations in the environment, utilizing one or more machine learning (ML) models to determine emission directions for the one or more coverage pivots based at least in part on locations of the one or more coverage pivots and the cell site in the environment, resulting in determined emission directions, and causing ray tracing simulation to be performed using the determined emission directions, wherein the ray tracing simulation enables first signal coverage estimates to be derived for the one or more coverage pivots and used to extrapolate second signal coverage estimates for a remainder of the plurality of coverage locations. Other embodiments are disclosed.
A method includes acquiring a playlist identifying a plurality of video files to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum throughput for the video streaming session, selecting a subsequent video file that is scheduled in the playlist for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, based on the maximum throughput and for each of the chunks, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the variants are selected to maximize a utility function that is constrained by the maximum throughput, and downloading the plurality of variants to a local buffer of the endpoint device.
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/647 - Control signaling between network components and server or clientsNetwork processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load or bridging between two different networks, e.g. between IP and wireless
22.
ADAPTIVE THROUGHPUT FOR USER EQUIPMENT COMMUNICATING VIA A MANAGED WI-FI SERVICE NETWORK
A managed Wi-Fi service network device can receive, from a cellular network device, an allowable throughput rate at which a user equipment is authorized to communicate via a managed Wi-Fi service network. Based on the allowable throughput rate, the managed Wi-Fi service network device can monitor a communication rate of the user equipment via the managed Wi-Fi service network. In response to the user equipment communicating via the managed Wi-Fi service network at a rate that exceeds the allowable throughput rate, the managed Wi-Fi service network device can facilitate reducing the communication rate of the user equipment. Also, a user equipment can receive from a cellular network device an allowable throughput rate at which the user equipment is authorized to communicate via the managed Wi-Fi service network. The UE can communicate via the managed Wi-Fi service network at a communication rate that does not exceed the allowable throughput rate.
Aspects of the subject disclosure may include, for example, obtaining first information identifying each version of a policy rule base to which a control plane architecture of a wireless network has access; obtaining second information identifying each version of a policy rule base to which a user plane architecture of the wireless network has access; selecting as a selected version a common version of a policy rule base to which each of the control plane architecture and the user plane architecture has access; and communicating an identification of the selected version to each of the control plane architecture and the user plane architecture. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, retrieving call detail record (CDR) data for a plurality of devices, each device of the plurality of devices using a subscriber identity module (SIM) to access a mobility network, identifying data anomalies for the plurality of devices, wherein the identifying the data anomalies is based on the CDR data, wherein the data anomalies may be indicative of inappropriate usage of the mobility network, identifying a device associated with a data anomaly, and initiating a modification of the device to prevent subsequent anomalies. Other embodiments are disclosed.
Server selection for improving latency with an instance of a service is disclosed. Generally, lower core latency is preferable. Core latencies can be related to a physical distance between endpoints connected via a communication pathway, such as a first server and second server connected via network equipment. A geographic distance between endpoints can be different from a topological distance of a communication pathway between endpoints. Endpoints, e.g., servers, can be ranked based on topological distance. The ranking can be communicated to service provider equipment to enable selection of a server based on a corresponding ranking of the server. Selection of an endpoint based on topological distance can enable improved latency in comparison to selecting an endpoint based on geographical distance. Improved latency can result in an improved quality of experience for a user of a service supported by an endpoint selected based on topological distance.
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
H04L 67/54 - Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
H04L 67/564 - Enhancement of application control based on intercepted application data
H04L 67/565 - Conversion or adaptation of application format or content
H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
H04L 67/62 - Establishing a time schedule for servicing the requests
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/4788 - Supplemental services, e.g. displaying phone caller identification or shopping application communicating with other users, e.g. chatting
27.
SYSTEM AND METHOD FOR DEPLOYMENT OF 5G AND NEXT-GENERATION CORE WITH IMS CORE FOR REAL-TIME APPLICATIONS
Aspects of the subject disclosure may include, for example, a method in which a processing system creates a network element by consolidating a control plane including a combination of a plurality of 5G control plane functions and a plurality of IMS control plane functions with an associated user plane including a combination of a 5G user plane function (UPF) and one or more IMS user plane functions. The method also includes deploying the network element at a network edge of the service provider network, receiving a request from a user endpoint (UE) device for a network service, and attaching the UE to the network element. The network element is configured to facilitate providing the requested network service. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, monitoring status of a network configured to provide end-to-end delivery of services to priority user equipment authorized according to a prioritized class of service and other user equipment not authorized for the prioritized class of service. The prioritized class of service extends a reserved network capacity for end-to-end delivery of a service via first domain including first network slices and a second domain including second network slices. A network interruption compromising the reserved capacity is determined based on the monitored status and integration of an alternate group of slices into one of the first network domain, the second network domain, or both to replace the compromised group of slices, is orchestrated. Integration of the alternate group of slices restores reserved network capacity according to the prioritized class of service. Other embodiments are disclosed.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
Aspects of the subject disclosure may include, for example generating, by a first Core Intelligent Controller (CIC) comprising a first processing system including a first processor, first data indicative of one or more first control functions that have been carried out by the first CIC, the first CIC being part of a wireless communication system; communicating, by the first CIC to a Service Intelligent Controller (SIC) comprising a second processing system including a second processor, the first data, the SIC being part of the wireless communication system; generating, by a first RAN Intelligent Controller (RIC) comprising a third processing system including a third processor, second data indicative of one or more first radio access functions that have been carried out by the first RIC, the first RIC being part of the wireless communication system; communicating, by the first RIC to the SIC, the second data; generating, by the SIC, third data, the generating of the third data being based at least in part upon the first data, the second, data, or a first combination thereof; communicating, by the SIC to the first CIC, the third data; performing, by the first CIC, one or more second control functions, the one or more second control functions being performed based at least in part upon the third data; generating, by the SIC, fourth data, the generating of the fourth data being based at least in part upon the first data, the second, data, or a second combination thereof; communicating, by the SIC to the first RIC, the fourth data; and performing, by the first RIC, one or more second radio access functions, the one or more second radio access functions being performed based at least in part upon the fourth data. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, determining, by a robot of a group of robots, a condition of the robot to obtain a determined result. A corrective plan is identified responsive to the determined result indicating a deficiency and a determination is made as to whether the robot is configured to perform the corrective plan. The corrective plan is executed responsive to a determination that the robot is configured to perform the corrective plan. Alternatively, assistance of a robot controller is requested responsive to the determining indicating the robot is not configured to perform the corrective plan. The robot controller is requested to initiate performance of the corrective plan. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, including, in user equipment (UE) capability information, at least a portion of a device identifier of a UE, and causing the UE capability information to be transmitted in resource control messaging. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a service set identifier (SSID), determining, based on the obtaining of the SSID, that the SSID is linked to an access point name (APN) of a carrier, resulting in a first determination, and obtaining, based on the first determination, access to a communication service of a network via the APN. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, designing of a numerical experiment for tuned parameters and external parameters for a parametrized algorithm; calculating Key Performance Indicators (KPIs) for the parametrized algorithm for each combination of the tuned parameters and the external parameters; generating regression models based on the tuned parameters and the external parameters for each of the KPIs; optimizing the regression models with constant external parameters values and determining optimal values of the tuned parameters; and executing the parametrized algorithm with the optimal values of the tuned parameters. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, initiating a presence within first metaverse environment, wherein the presence includes a correlation between a physical stimulation of a human interface and first virtual stimuli occurring within the first metaverse environment. A virtual interconnection is initiated between the first metaverse environment and a second metaverse environment including second virtual stimuli occurring within the second metaverse environment. A virtual interaction is determined between the first metaverse environment and the second metaverse environment according to the virtual interconnection and an adjusted virtual stimulus occurring within the first metaverse environment is determined responsive to the virtual interaction between the first metaverse environment and the second metaverse environment. The presence is adjusted according to a correlation between the physical stimulation of the human interface and the adjusted virtual stimuli occurring within the first metaverse environment. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, fiber optic cable(s) including a sheath having first and second ends and a body therebetween; and one or more first optical fibers passing through the body of the sheath, where the sheath includes one or more first openings along the body, and where a loop portion of the one or more first optical fibers extends through the one or more first openings to be accessible outside of the body of the sheath. Other embodiments are disclosed.
An event-based analytics tool can obtain, from a data lake, an instance of correlated event data including a first event from a first network device, a second event from a second network device, and data correlating the first event to the second event. The event-based analytics tool can obtain PCAP data from a troubleshooting server via a first application programming interface. The event-based analytics tool can also obtain a log from a searchable log database via a second application programming interface. Based on the correlated event data, the packet capture data, and the log, the event-based analytics tool can generate a prediction model that can be used to predict a cause of a future event.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/069 - Management of faults, events, alarms or notifications using logs of notificationsPost-processing of notifications
PAGING AN IDLE SUBSCRIBER IDENTITY MODULE USING A CONNECTED SUBSCRIBER IDENTITY MODULE OPERATING IN A SINGLE RADIO CONFIGURATION FOR 5G OR OTHER NEXT GENERATION WIRELESS NETWORK
Various embodiments disclosed that describe systems to facilitate paging an idle subscriber identity module using a connected subscriber identity module operating in a single radio configuration. According to some embodiments, a system can comprise receiving a paging request that is designated for a first device of a communication device, wherein the communication device comprises the first device and a second device; determining whether the second device is in an active state; and in response to the determining that the second device is in the active state, transmitting a message to second device indicating that the paging message was received for the first device.
Aspects of the subject disclosure may include, for example, receiving environmental data from a plurality of environmental data sources, identifying environmental risks based on the environmental data, obtaining profile information relating to a user or entity, based on the obtaining the profile information and the identifying the environmental risks, generating a recommendation for one or more locations of possible interest, and causing the recommendation to be presented to the user or entity, thereby providing location-based environmental risk information that is customized on a per user or per entity basis. Other embodiments are disclosed.
G06Q 30/0242 - Determining effectiveness of advertisements
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
39.
SYSTEM AND METHOD FOR MODULE AND ANTENNA REPLACEMENT IN CONNECTED VEHICLES AND EQUIPMENT
Aspects of the subject disclosure may include, for example, modifying one or more components of a connected vehicle communication system of a vehicle, the connected vehicle communication system operative to communicate vehicle data with network equipment of a service provider over a mobile network of a mobile network operator, confirming operational connectivity among the one or more components of the connected vehicle communication system, communicating to the network equipment of the service provider, information confirming a successful modification of the one or more components of the connected vehicle communication system. Other embodiments are disclosed.
In one example, a method includes detecting that a user equipment device has moved to a location in a telecommunications network in which a first network route is available, where the first network route has a higher priority than a second network route with which an application executing on the user equipment device has established a current protocol data unit session, determining that the application should switch the current protocol data unit session to the first network route, and supporting the application in switching the current protocol data unit session from the second network route to the first network route.
An example apparatus may include an optical splitter apparatus that includes a dual mode fiber having a single mode fiber core embedded in a multi-mode fiber core, a plurality of single mode fibers, and a funnel waveguide coupling the dual mode fiber to the single mode fibers. The optical splitter apparatus may be for use in a passive optical network. The single mode fiber core may be for transmitting downstream optical signals, where the funnel waveguide distributes the downstream optical signals to the single mode fibers. In addition, the single mode fibers may transmit upstream optical signals, and the funnel waveguide may direct the upstream optical signals into the multi-mode fiber core. The optical splitter apparatus may have an asymmetric insertion loss ratio between the downstream optical signals received via the single mode fiber core and the upstream optical signals received via the single mode fibers.
G02B 6/028 - Optical fibres with cladding with core or cladding having graded refractive index
G02B 6/12 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type of the integrated circuit kind
The technologies described herein are generally directed to detecting reflective surfaces for use reflecting a signal from access point equipment to destination equipment in advanced networks, e.g., at least a fifth generation (5G) network. For example, a method described herein can include receiving a request, from access point equipment, to establish a communications session between the access point equipment and destination equipment. The method can further include based on a source of surface information, predicting that a transient reflective surface is going to be located at a first geographic location and is going to be usable by the access point equipment to reflect a signal to the destination equipment, resulting in reflected path information corresponding to a reflected path for the communications session. Further, the method can include, in response to the request, communicating to the access point equipment, the reflected path information.
H04W 4/02 - Services making use of location information
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
43.
Artificial Intelligence (AI) and Software Defined Network (SDN)-Enabled Quantum Signaling Entanglement Distribution
Aspects of the subject disclosure may include, for example, receiving artificial intelligence (AI) analytics from a generative AI system, and based on the AI analytics, causing a software defined network (SDN) controller to identify a signaling path over a quantum signaling network, thereby enabling selection of a determined suitable path for quantum entanglement distribution. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example: receiving traffic pattern data/parameters associated with a reconfigurable optical add-drop multiplexer (ROADM) dense wavelength-division multiplexing (DWDM) network; defining a configuration of the network based upon the traffic pattern data/parameters; outputting the configuration to facilitate physical provisioning and operation of ROADM nodes (and one or more ILA(s), if any) according to the configuration; receiving performance monitoring (PM) data indicative of operation of the network as configured according to the configuration; defining an updated configuration of the network that is based upon the PM data, wherein the updated configuration adds to the network at least one pair of transponders, at least one regenerator, or a combination thereof; and outputting the updated configuration to facilitate physical updating of the network in a manner such that the transponders, the regenerator(s), or the combination thereof is placed into operation. Other embodiments are disclosed.
A processing system including at least one processor may obtain data associated with a user, the data associated with the user including at least one of: visual data captured via at least one camera associated with the user or audio data captured via at least one microphone associated with the user, detect at least one trauma event of at least one defined trauma event type in at least one of the visual data or the audio data via at least one classification model, determine, responsive to detecting the at least one trauma event, a stress score based upon at least a portion of the data associated with the user in accordance with a stress prediction model, and generate an alert in response to the stress score exceeding a threshold.
An audio generation system is provided to enable coordinated control of multiple IoT devices for audio collection and distribution of one or more audio sources according to location and user preference. The audio generation system enables a location sensitive acoustic control of sound, both as a shaped envelope for a particular source, and as an individualized experience. The audio generation system also facilitates an interactive visual system for visualization and manipulation of the audio environment including via the use of augmented reality and/or virtual reality to depict soundscapes. The audio generation system can also facilitate a system for improving and achieving an audio environment (sound influence zone) and an intuitive way to understand where sounds will be heard.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06T 19/00 - Manipulating 3D models or images for computer graphics
47.
SYSTEM FOR INTELLIGENT TRANSPORT BETWEEN SMART HOMES AND SMART COMMUNITIES
Aspects of the subject disclosure may include, for example, a method in which a processing system determines that performance of a service is required at a first location in a smart community; identifies a robot to be transported, and determines whether physical transport or virtual transport is to be performed for the robot. If physical transport is to be performed, the system initiates communication with a robot transport controller to schedule the physical transport to the first location from a different second location. If virtual transport is to be performed, the processing system initiates communication with a radio access network (RAN) to schedule the virtual transport; the virtual transport includes configuring the robot at the first location. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, a device, including a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of receiving an original audio signal for an interval; creating a time-series graphical image of the original audio signal for the interval; compressing the time-series graphical image, thereby creating a reduced resolution image; recreating a retrieved audio signal from the reduced resolution image; determining whether a comparison of the retrieved audio signal to the original audio signal meets a quality threshold; responsive to meeting the quality threshold, compressing the reduced resolution image further and repeating the recreating and determining steps; and transmitting a last reduced resolution image that meets the quality threshold. Other embodiments are disclosed.
G10L 25/60 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for measuring the quality of voice signals
A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified. The master service orchestrator also causes a software defined network controller to retrieve the cloud services archive file, to extract a cloud network configuration template and to configure layer 1 through layer 3 virtual network functions and to set up routes between them. Additionally, the master service orchestrator causes an application controller to retrieve the cloud services archive file, to extract a deployment orchestration plan and to configure and start layer 4 through layer 7 application components and bring them to a state of operational readiness.
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04L 41/5054 - Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
50.
METHODS, SYSTEMS, AND DEVICES TO UTILIZE A MACHINE LEARNING APPLICATION TO IDENTIFY MEETING LOCATIONS BASED ON LOCATIONS OF COMMUNICATION DEVICES PARTICIPATING IN A COMMUNICATION SESSION
Aspects of the subject disclosure may include, for example, determining a group of users are participating in a communication session. Each user of the group of users are participating in the communication session with a communication device resulting in a group of communication devices. Further embodiments include receiving a request for a first meeting location for the group of users to meet, and identifying a device location for each of the group of communication devices resulting in a group of device locations. Additional embodiments can include identifying the first meeting location based on the group of meeting locations, and providing the first meeting location to each communication device of the group of communication devices, each communication device presents the first meeting location during the communication session. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, accessing registration information that includes a criterion for allowing receiving notifications based on location information of a communication device, accessing a location request of equipment of a location requestor that includes a notification location, accessing encrypted information representative of identification information, the location information, and time information of the communication device that has been stored in a database where the time information corresponds to the location information, identifying a positive result for the location request, and causing a notification to be provided to the communication device responsive to the positive result, where the notification is associated with the location requestor, and wherein the notification is provided to the communication device without providing the identification information of the communication device to the equipment of the location requestor. Other embodiments are disclosed.
For example, a method includes obtaining sensor data depicting movements of facial features of a user who is present in a location in which a media item is being presented, calculating, using the sensor data, an alertness score for the user, determining the alertness score falls below a predefined threshold alertness score, starting, in response to determining that the alertness score falls below the predefined threshold alertness score, a timer while continuing to calculate the alertness score for the user using newly obtained sensor data, determining that the alertness score for the user using the newly obtained sensor data has failed to meet the predefined threshold alertness score before an expiration of the timer, and taking, in response to the alertness score for the user using the newly obtained sensor data failing to meet the predefined threshold score before expiration of the timer, an action associated with the media item.
A processing system may obtain a feature vector for a relationship between first and second user identities within a telecommunication network, the feature vector including: a first number of communications from the first user identity to the second user identity for a first communication channel, a first volume associated with the first number of communications, a second number of communications from the second user identity to the first user identity for the first communication channel, and a second volume associated with the second number of communications. The processing system may then calculate a scaled distance between the feature vector and a centroid comprising a mean vector of a set of relationships between user identities within the telecommunication network, where the scaled distance is associated to a trust value, and perform at least one remedial action in the telecommunication network based on the trust value.
H04L 41/12 - Discovery or management of network topologies
G06F 18/22 - Matching criteria, e.g. proximity measures
G06F 18/2411 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
A processing system may apply a data set comprising utilization metrics of a cells of a cell sector to a throughput prediction model to obtain a first predicted throughput for the cell sector for a designated future time period and for all cells being in an active state. The processing system may generate a first modified data set simulating a first cell being placed in an inactive state, by distributing utilization metrics of the first cell over at least one additional cell, and may apply the first modified data set to the throughput prediction model to obtain a second predicted throughput. The processing system may then determine that the second predicted throughput meets a threshold throughput that is based on the first predicted throughput, and transmit at least one instruction to place the first cell in the inactive state for the designated future time period in response to the determining.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
The described technology is generally directed towards a short message service (SMS) congestion manager that can evaluate, predict, and mitigate SMS congestion. The SMS congestion manager can be implemented within a short message services function (SMSF) of a fifth generation (5G) or subsequent generation cellular network. The SMS congestion manager can monitor a volume of non-access stratum (NAS) SMS messages in order to detect potential overload conditions wherein the volume of messages exceeds a capability of a network function. In response to detecting potential overload conditions, the SMS congestion manager can inhibit messages directed to the network function in order to prevent overloads from developing. The SMS congestion manager can use machine learning to learn to detect the potential overload conditions as well as to learn actions to take to address the potential overload conditions.
A method includes acquiring a playlist identifying video files and an order in which the video files are to be played back during a video streaming session on an endpoint device, obtaining, from an operator of a communications network over which the video files are to be downloaded, a maximum value of a streaming parameter for the video streaming session, selecting a subsequent video file that is scheduled for playback after a playback of a currently playing video file, wherein the subsequent video file includes a plurality of chunks, selecting, for each chunk, a variant, such that a plurality of variants is selected in which each variant corresponds to one chunk of the plurality of chunks, wherein the selecting the variant is based on both the maximum value and a measured value for the streaming parameter, and downloading the plurality of variants to a local buffer of the endpoint device.
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/2387 - Stream processing in response to a playback request from an end-user, e.g. for trick-play
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
57.
DETECTING AND SHARING EVENTS OF INTEREST USING PANOPTIC COMPUTER VISION SYSTEMS
In one example, a method performed by a processing system including at least one processor includes acquiring a plurality of video volumes of an environment from a plurality of cameras, wherein at least two individual video volumes of the plurality of video volumes depict the environment from different viewpoints, generating a panoptic video feed of the environment from the plurality of video volumes, detecting an event of interest occurring in the panoptic video feed, and isolating a video volume of the event of interest to produce a video excerpt.
G06V 20/40 - ScenesScene-specific elements in video content
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
58.
SYSTEM AND METHODS FOR ENSURING SECURITY, TRUST, AND PRIVACY IN GENERATIVE ARTIFICIAL INTELLIGENCE (AI) CONTENT WITH QUANTUM BLOCKCHAINS AND QUANTUM DIGITAL SIGNATURES
A method for providing quantum computation-based security solutions for generative artificial intelligence content includes generating an item of new content based on an input, and using a generative artificial intelligence foundation model that has been trained to generate items of new content having characteristics that mimic characteristics of content included in a set of training data, storing the item of new content in a quantum temporal blockchain, detecting an action performed by the generative artificial intelligence foundation model against the item of new content, and logging the action in the quantum temporal blockchain.
Aspects of the subject disclosure may include, for example, a device comprising: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations comprising: receiving from user equipment an indication that a user has been authenticated by the user equipment via a biometric process; responsive to the receiving of the indication, obtaining user profile data associated with the user; responsive to the receiving the user profile data, selecting a first service provider from among a plurality of service providers; and routing communications between the first service provider and the user equipment. Other embodiments are disclosed.
Method, computer-readable media, and apparatuses for applying at least one remedial action within a communication session via at least one network in response to detecting via at least one detection model that the audio content of a first user is off-topic are described. For example, a processing system including at least one processor may establish a communication session between at least a first communication system of a first user and a plurality of communication systems of a plurality of additional users via at least one network. The processing system may then determine at least one topic for the communication session, detect, via at least one topic detection model, an audio content of the first user that is off-topic, and apply at least one remedial action within the communication session in response to the detecting that the audio content of the first user is off-topic.
H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
G10L 15/183 - Speech classification or search using natural language modelling using context dependencies, e.g. language models
G10L 25/63 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for estimating an emotional state
61.
COMMUNICATION NETWORK FIBER OPTIC DATA SERVICE EXPANSION
A processing system may obtain network inventory data, development infrastructure information, and user information to train a prediction model to predict precedence metrics for a new fiber optic data service in geographic areas that do not include a current fiber optic data service of the communication network, the prediction model comprising at least one machine learning model. The processing system may then generate a precedence metric of a geographic area that does not include the current fiber optic data service by applying to the prediction model: current network inventory data, current development infrastructure information, and current user information, where an output of the prediction model comprises the at least one precedence metric. In addition, the processing system may perform a network reconfiguration action in the communication network in response to the at least one precedence metric of the geographic area.
A method for intelligently allocating resource blocks of a radio frequency spectrum band includes detecting a presence of a plurality of user endpoint devices within a cell of a radio access network, wherein the plurality of user endpoint devices includes a first user endpoint device and a second user endpoint device, identifying a plurality of resource blocks of the cell that are available for allocation to the plurality of user endpoint devices, wherein the plurality of resource blocks includes a first resource block and a second resource block that is located closer to an end of a radio frequency spectrum band of the cell than the first resource block, determining that the first user endpoint device is more likely than the second user endpoint device to be negatively impacted by maximum power reduction, and allocating, in response to the determining, the first resource block to the first user endpoint device.
H04W 72/0453 - Resources in frequency domain, e.g. a carrier in FDMA
H04L 5/14 - Two-way operation using the same type of signal, i.e. duplex
H04W 52/36 - Transmission power control [TPC] using constraints in the total amount of available transmission power with a discrete range or set of values, e.g. step size, ramping or offsets
H04W 72/512 - Allocation or scheduling criteria for wireless resources based on terminal or device properties for low-latency requirements, e.g. URLLC
63.
TRANSFORMING STRUCTURED QUERY LANGUAGE QUERIES TO EXPEDITE QUERY EXECUTION
A method for transforming structured query language queries to expedite query execution includes detecting an explode operator in a structured query language query plan that is designed to execute a structured query language query against a database, identifying a query fragment within the structured query language query plan that starts with the explode operator and ends with a second operator, and replacing the query fragment in the structured query language query plan with an optimized query fragment in which the second operator operates directly on vectors that are a target of the second operator.
Respective implementations facilitating a mobile core connection router are provided. A method can include establishing, by a system comprising a processor, a connection to a virtualized core network instance, associated with a first computing device, via a mobility tunneling protocol; in response to the establishing of the connection, initializing, by the system, a virtualized router function based on a routing table; and routing, by the system and via the virtualized router function, data traffic between the virtualized core network instance and a second computing device, communicatively coupled to the system and distinct from the first computing device.
Aspects of the subject disclosure may include, for example, identifying a threshold value of a streaming-media key performance indicator (KPI) based on a predetermined target portion of end-user devices that provide an acceptable performance. Performance records are obtained for a content delivery network (CDN) adapted to cache and serve media content requested by the end-user devices. Predicted values of the streaming-media KPI are generated according to the performance records of the CDN and compared to the threshold value of the streaming-media KPI to obtain a comparison. An anomaly is detected according to the comparison, to indicate that a predetermined number of the predicted values of the streaming-media KPI fail to satisfy the threshold value. Other embodiments are disclosed.
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/466 - Learning process for intelligent management, e.g. learning user preferences for recommending movies
Locations and azimuths of cells of a communication network can be estimated, determined, and validated. Cell attribute management component (CAMC) can estimate, determine, and/or validate cell locations based on analysis of timing advance (TA) measurement data and/or location data associated with devices associated with base stations associated with cells. CAMC can estimate azimuth of a cell associated with a base station based on analysis of a validated cell location of the cell and location data associated with devices associated with the cell. CAMC can determine whether a recorded azimuth of the cell is validated based on analysis of the estimated azimuth of the cell and the recorded azimuth of the cell. CAMC can tag the recorded azimuth of the cell as validated if applicable azimuth accuracy criteria is met, inaccurate if applicable azimuth criteria is not met, or omni if the cell is an omni cell.
A processing system may track accessing of a plurality of uniform resource locators among users of a communication network, determine an occurrence of an event of an event type based upon an increased accessing of the plurality of uniform resource locators for at least one time period, identify a first sub-group of the users associated with the event, apply a first action in the communication network to a test group including at least a first portion of the first sub-group, the first action addressing a demand associated with the event of the event type, track at least a first success rate of the first action for the first portion of the first sub-group, and apply the first action to at least a second portion of the first sub-group in response to determining that the first success rate for the first portion of the first sub-group exceeds a threshold success rate.
Aspects of the subject disclosure may include, for example, a process that determines a current location of a mobile device according to a horizontal reference, obtains a corresponding barometric pressure reading at the current location of the mobile device, and determines a current position of the mobile device according to the current location of the mobile device and the corresponding barometric pressure reading. A historical record of positions of the mobile device is updated according to the current position of the mobile device and other positions of the mobile device determined at other times, and a historical record of positions of the mobile device to a map of a facility is updated to obtain a referenced pattern of movement of the mobile device within the facility. Other embodiments are disclosed.
G01C 21/20 - Instruments for performing navigational calculations
G01C 5/06 - Measuring heightMeasuring distances transverse to line of sightLevelling between separated pointsSurveyors' levels by using barometric means
G01S 19/45 - Determining position by combining measurements of signals from the satellite radio beacon positioning system with a supplementary measurement
69.
ENHANCED FIBER BROADBAND CONNECTION DEPLOYMENT METHOD AND SYSTEM
Aspects of the subject disclosure may include, for example, a base transceiver station having a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of registering a wireless optical networking device with a fiber optic central office, wherein the registering uses a public land mobile network identifier that uniquely identifies a fiber optic network; encapsulating fiber signaling data for the wireless optical networking device received from the fiber optic central office; and transmitting the fiber signaling data via a radio bearer over an unlicensed radio spectrum to the wireless optical networking device. Other embodiments are disclosed.
A method includes detecting data relating to an event for which emergency services have been requested, wherein the data includes at least one of: voice data, audio data, text data, image data, or video data, identifying a geographic location of the event, wherein the geographic location is within a coverage area of a wireless network, predicting, based on the data, an urgency level associated with the event, identifying a set of minimum conditions of the wireless network that is associated with the urgency level of the event, determining that current conditions of the wireless network at the location do not satisfy the minimum conditions, determining an adjustment to the wireless network that, when deployed, will cause the current conditions of the wireless network at the location to satisfy the minimum conditions, and sending at least one instruction to an element of the wireless network to deploy the adjustment.
Facilitating auto-pilot aerial to surface heterogenous communications in advanced networks is provided herein. Operations of a system include receiving, via a receiver, a wireless signal that originated from a device located above a ground surface, the network equipment is located below the ground surface. The operations can also include transforming, via a converter, the wireless signal into an optical signal that is transmitted via a fiber optic cable below the ground surface, the receiver and the converter are located on a first side of the fiber optic cable. Further, the operations can include using a reflector to transmit light along the fiber optic cable at a defined angle. The reflector can be located at a second side of the fiber optic cable. The first side is closer to the ground surface as compared to the second side. The defined angle can be an angle approaching zero degrees.
Aspects of the subject disclosure may include, for example, obtaining, from a user device, a master-slave agreement and a first network configuration for a federated blockchain network, transmitting to a cloud service provider (CSP) node the first network configuration, generating first credentials, and transmitting the first credentials to the CSP node. The CSP node configures a first group of blockchain nodes according to the first network configuration and the first credentials. Further embodiments include transmitting the first credentials to a public server that sends it to a public blockchain node and an indication to generate a portion of the federated blockchain network. The public blockchain node configures a second group of blockchain nodes according to a second network configuration based on a public blockchain smart contract. The federated blockchain network comprises the first group of blockchain nodes and the second group of blockchain nodes. Other embodiments are disclosed.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
73.
SELECTIVELY BOOSTING RADIO FREQUENCY SIGNALS OF WIRELESS BASE STATIONS
A method performed by a processing system including at least one processor includes monitoring uplink traffic conditions and downlink traffic conditions in a plurality of nodes emitting radio frequency signals in a wireless communications network, determining, based on the monitoring and for each node of the plurality of nodes, an unused uplink capacity and an unused downlink capacity, sorting the plurality of nodes into a plurality of subsets, based on the unused uplink capacity and the unused downlink capacity, and boosting a first subset of the radio frequency signals emitted by a first subset of the plurality of subsets, without boosting a second subset of the radio frequency signals emitted by a second subset of the plurality of subsets.
A method performed by a processing system in a cellular core network includes receiving, from a session management function of the cellular core network, a query for a policy rule associated with a subscriber who has requested a packet data unit session, querying a charging function of the cellular core network for a charging counter associated with the subscriber, receiving, from the charging function, the charging counter, wherein the charging counter contains a value identifying a service package to which the subscriber is subscribed, determining a rating group associated with the service package, and sending, to the session management function, a set of application identifiers associated with the rating group, wherein each application identifier of the set of application identifiers identifies one software application that is included in the service package.
A processing system may obtain, from a requesting system, a request for a network management task associated with at least one managed object in the communication network. The at least one managed object may be of a first vendor of a plurality of vendors. In addition, the processing system may comprise an application programming interface to process network management task requests associated with managed objects of a plurality of different vendors. The processing system may next select a pipeline of functions associated with the network management task, where the pipeline of functions is specific to the first vendor and to the network management task, gather network state information relating to the pipeline of functions, and execute the pipeline of functions based upon the network state information to perform the network management task. The processing system may then report to the requesting system a result of the network management task.
In 6G, there are multiple radios that can cover the same location at any time, and yet radio failure can occur. However, a mobile edge computing (MEC) platform can increase the footprint of adjacent radios to compensate for a failed radio. To reduce the failure interruption and maintain a quality of experience for a subscriber, the MEC can utilize a virtual session capability to communicate radio change of service characteristics to a service provider. Consequently, the change in service characteristics can comprise an expanded coverage area for adjacent radios such that a mobile device of the subscriber can take advantage of the expanded coverage area without experiencing an interruption in service.
A processing system including at least one processor may obtain network operational data of a communication network, transform the network operational data into a text-based format, and train a generative machine learning model implemented by the processing system using the network operational data in the text-based format. The processing system may then receive a query pertaining to the network operational data, apply the query to the generative machine learning model implemented by the processing system to generate a textual output in response to the query, and present the textual output that is generated in response to the query.
A first integrated circuit of a mobile computing device may detect at least a first condition for enabling a utilization of at least one subscriber identity module credential stored on the first integrated circuit by a second computing device and may select the at least one subscriber identity module credential for transmission based upon the at least the first condition. The first integrated circuit may then establish a communication channel with a second integrated circuit of the second computing device and transmit the at least one subscriber identity module credential to the second integrated circuit via the communication channel to enable the utilization of the at least one subscriber identity module credential by the second computing device.
Concepts and technologies disclosed herein are directed to a notification traffic anomaly detector. The notification traffic anomaly detector can receive, from a notification system, notification traffic data associated with at least one of notification requests or notifications processed by the notification system. The notification traffic anomaly detector can determine, using at least one machine learning model, whether the notification traffic data indicates an anomaly associated with the notification requests and/or the notifications processed by the notification system. In response to determining that the notification traffic data indicates an anomaly associated with the notification requests and/or the notifications processed by the notification system, the notification traffic anomaly detector can generate an anomaly notification and provide the anomaly notification to the notification system while at least one of notification requests or the notifications is being processed by the notification system.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
The disclosed technology is directed towards presenting an avatar in a virtual reality environment in different ways to different users, based on relationship data including a familiarity level and trust level with each other user. The familiarity level data and/or trust level data can be updated with each encounter with another user. The presentations of the same avatar can be different to the other users encountered at the same time, e.g., a lower resolution avatar presented to a less familiar and/or less trusted other user, a higher resolution avatar presented to a more familiar and/or more trusted other user. Audio volume and/or clarity may be similarly modified based on relationship data. A user having an encounter with another user may have a mirror view of the user's own avatar, and can improve or degrade the avatar's appearance (and/or aural output) during the encounter.
The disclosed subject matter relates to techniques for determining an appropriate aggregation level for a control channel resource set (CORESET). In one embodiment, a method is provided that comprises determining, by a first device operatively coupled to a processor, an aggregation level for application by a second device to decode candidate downlink control channels associated with a CORESET. The method further comprises transmitting, by the first device, aggregation level information to the second device indicating the aggregation level. As a result of the transmitting, the second device becomes configured to apply the aggregation level in association with attempting to decode the candidate control downlink control channels. In various embodiments, the aggregation level is determined based one or more criteria, including an aggregation level capability of the second device, a location of the second device relative to the first device, and a geometry associated with the second device.
Aspects of the subject disclosure may include, for example, analyzing data in accordance with at least one algorithm to select one of carrier aggregation or dual connectivity for providing a communication service in respect of a communication device, resulting in a selection, and providing the communication service to the communication device in accordance with the selection. Other embodiments are disclosed.
Unlike smart devices, Internet of things (IoTs), such as meter readers, generate very low revenue per user. Traditional tunnel/bearer based connection-oriented architectures do not scale economically for billions of IoT devices due to the amount of signaling overhead associated with GTP tunnel setup/tear down and the states related to GTP tunnels maintained at various parts of the mobile network. However, the mobility network can efficiently support massive stationary and/or mobile IoTs by reducing the amount of signaling overhead, the state of the IoTs kept in network, and simplifying the data plane when possible.
A processing system including at least one processor may identify a user viewpoint of a user at a first venue, match a viewpoint at a second venue to the user viewpoint of the user at the first venue, detect a trigger condition to provide visual content of the second venue to the user at the first venue, obtain the visual content of the second venue, wherein the visual content of the second venue is obtained from the viewpoint at the second venue, and provide the visual content of the second venue to an augmented reality device of the user at the first venue, where the augmented reality device presents the visual content of the second venue as a visual overlay within a field of view of the user.
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
G06T 19/00 - Manipulating 3D models or images for computer graphics
G06V 20/40 - ScenesScene-specific elements in video content
Aspects of the subject disclosure may include, for example, a media consumption database that stores data elements describing conditions under which electronic media content is consumed by a user on an electronic device. A search of the media consumption database based on at least a portion of the conditions may result in at least a portion of the electronic media content to be re-presented to an electronic device of the user Other embodiments are disclosed.
Disclosed is managing (creating and maintaining) attendance/participation data describing remote attendance of attendees of an event, or a replay of the event. The event can be a virtual reality event. When a remote user attends an event, subsequent viewers of the event replay can see a digital representation (e.g., an avatar) of the remote user within the replay as having attended the event in-person. Subsequent replays include digital representations of the remote user and the user(s) that viewed previously replay(s) to emulate their attendance. User can manage their own attendance data, including to obtain proof of attendance. A user can delete his or her presence at an event, such that replays after the deletion do not include that user's representation. A user can go anonymous with respect to an event, such that any replays after the anonymity choice include only a generic representation of the attendee.
Aspects of the subject disclosure may include, for example, obtaining first information indicative of one or more historical operating characteristics of a network; obtaining second information indicative of one or more current operating characteristics of the network; comparing, via a first computer-implemented process that requires no manual intervention, the first information to the second information to make a prediction of a potential future network event, resulting in a predicted future network event; classifying, via a second computer-implemented process that requires no manual intervention, the predicted future network event into one of a plurality of classes of network events; and responsive to the classifying, facilitating, via a third computer-implemented process that requires no manual intervention, an action to at least partially avoid an occurrence of the predicted future network event. Other embodiments are disclosed.
Facilitating facilitate enablement of a smart HARQ feedback to support outer loop link adaptation in advanced networks (e.g., 4G, 5G, 6G, and beyond) is provided herein. Operations of a method can comprise sending, by a first device comprising a processor, a data packet to a second device. The method also can comprise receiving, by the first device, negative acknowledgement data from the second device. The negative acknowledgement data can indicate that the second device fails to support a modulation and coding protocol of the data packet.
The disclosed technology is directed towards switching the primary cell in a carrier aggregation scenario to improve performance. Measurement data of a mobile device (user equipment) is evaluated with respect to one or more various criteria such as cell carrier bandwidth, cell carrier load, cell-related capability and other carrier data (e.g., dynamic spectrum sharing versus clean, time division duplex or frequency division duplex), and others. Device conditions such as overheating can be considered as well. The evaluation results in a ranking of primary cell candidates. If a more optimal primary cell (candidate) is available, the primary cell in the carrier aggregation combination is switched to the candidate that is ranked the highest. Switching can be relatively very fast, such as based on already existing layer-1 (L1) and/or layer-2 (L2) measurement data. Layer-3 (L3) measurement data also can be obtained on demand, for example, to use in the evaluation.
The disclosed technology is directed towards detecting improbable speeds of a mobile device, which can indicate fraudulent activity with respect to the mobile device. Radio access network events and call detail records are processed to determine when a mobile device “travel jumps” between locations at improbable speeds. Events corresponding to handovers between adjacent cells are filtered out. For events corresponding to changed cell towers that are non-adjacent, further processing is performed to determine the speed of the mobile device travel between the cells. A first speed threshold is selected based on possible air travel (a cell near an airport) or a second non-air travel speed threshold is selected. If the speed of the mobile device exceeds the selected speed threshold, a travel jump is determined. Exceptions can be made for gaps in connectivity due to topography (known inconsistent reception areas) and for a mobile device shutting down and restarting.
Aspects of the subject disclosure may include, for example, a device having: a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations of: determining whether a calling number of a call is unallocated; determining whether the calling number is unassigned to a subscriber; validating the calling number as an authentic telephone number; categorizing the calling number as fraud or spam responsive to the calling number being unallocated, allocated and unassigned, or allocated, assigned and invalid; and categorizing the calling number as neutral responsive to the calling number being allocated, assigned and validated. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, obtaining a selection of at least one network attachment model for instantiating a network service of a network, obtaining a specification of at least one parameter for the network service, generating a design based on the at least one network attachment model and the specification, and instantiating the design in conjunction with at least one resource of the network to facilitate the network service. Other embodiments are disclosed.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
A processing system including at least one processor may obtain utilization data of an air filter in an air filtration system and environmental data for at least one location associated with the air filtration system. The processing system may then determine at least one filter changing action based upon at least the utilization data and the environmental data and transmit at least one instruction to implement the at least one filter changing action.
A processing system may obtain a downscaled version of a reference copy of a video, comprising a plurality of downscaled versions of a plurality of frames of the reference copy of the video, obtain a first recorded frame of a first variant of a plurality of variants associated with the reference copy of the video, where the plurality of variants comprises a plurality of copies of the video encoded at different bitrates, generate a first downscaled version of the first recorded frame, calculate a first plurality of image distances between the first downscaled version of the first recorded frame and the plurality of downscaled versions of the plurality of frames of the reference copy of the video, and determine a first frame index of the first recorded frame in accordance with a first least image distance from among the first plurality of image distances that is calculated.
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
H04N 19/10 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
H04N 19/154 - Measured or subjectively estimated visual quality after decoding, e.g. measurement of distortion
H04N 21/232 - Content retrieval operation within server, e.g. reading video streams from disk arrays
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/236 - Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator ] into a video stream, multiplexing software data into a video streamRemultiplexing of multiplex streamsInsertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rateAssembling of a packetised elementary stream
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
95.
SERVICE AND SECURITY ENHANCEMENT OF COMMUNICATION SERVICES
Authorization for access to an application server and associated communication service can be desirably managed. When a device attempts to access an application server and service, an authorization server generates an encrypted token, comprising device identifier information, and communicates the token to the device. The device communicates the token to the application server. The application server communicates the token to the authorization server. The authorization server determines whether the device is validated to access the application server and service based on the encrypted token, private decryption key, and initialization vector, and based on subscriber-related information. The authorization server does not share the private decryption key or initialization vector with the application server. If validated, the authorization server communicates validation-related information, including a permitted portion of subscriber-related information, to the application server. If not validated, the authorization server communicates not-validated information to the application server.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04W 12/40 - Security arrangements using identity modules
96.
APPARATUSES AND METHODS FOR IDENTIFYING SUSPICIOUS ACTIVITIES IN ONE OR MORE PORTIONS OF A NETWORK OR SYSTEM AND TECHNIQUES FOR ALERTING AND INITIATING ACTIONS FROM SUBSCRIBERS AND OPERATORS
Aspects of the subject disclosure may include, for example, obtaining a request for a communication service from a user equipment, based on the obtaining of the request, assigning a first identifier to the user equipment as part of the communication service, obtaining first data from the user equipment as part of the communication service, analyzing at least the first data in accordance with at least one algorithm to determine that the user equipment is likely misconfigured in an amount that is greater than a threshold, resulting in a determination, based on the determination, mapping the first identifier to a second identifier associated with the user equipment, generating a message based on the mapping, and transmitting the message. Other embodiments are disclosed.
Various methods for a 3GPP defined Charging and Collection Function are employed that may use a microservices approach. The microservice approach may decompose the function of the network elements into component level functions that may be deployed as separate functional elements.
Aspects of the subject disclosure may include, for example, obtaining first user-generated input, the first user-generated input indicates a request for generating an (API, identifying a first group of entities from the request, and determining whether there is a match between the first group of entities and a second group of entities stored in an API database according to API metadata. Further embodiments include identifying an API from the API database resulting in an identified API, presenting the identified API to the user, obtaining second user-generated input, and adjusting the request according to the second user-generated. Additional embodiments can include identifying a third group of entities from the adjusted request, and determining whether there is a match between the third group of entities and a fourth group of entities stored in the API database according to the API metadata. Other embodiments are disclosed.
A processing system including at least one processor of a network access device may detect an installation of the network access device in a wireless communication system of a vehicle. The processing system may next interrogate at least one antenna unit of the wireless communication system of the vehicle and obtain, from the at least one antenna unit in response to the interrogating, a set of antenna capability information. The processing system may then configure the wireless communication system of the vehicle in accordance with at least a portion of the set of the antenna capability information.
A processing system may segregate customers of a communication network into communication network customer segments in accordance with at least one factor, generate predicted customer order weights by customer segment for a first network resource type in accordance with at least a first forecasting model, and calculate inventory demand weights for network resources of the first network resource type in accordance with at least a second forecasting model. The processing system may then obtain a new customer order for the first network resource type from a first customer and configure the communication network to process data traffic of the first customer via one of the network resources of the first network resource type that is selected based upon a customer segment of the first customer and an allocation matching scheme in accordance with the predicted customer order weights by communication network customer segment and the plurality of inventory demand weights.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"