The arithmetic of discrete Z-numbers
RA Aliev, AV Alizadeh, OH Huseynov - Information Sciences, 2015 - Elsevier
Real-world information is imperfect and is usually described in natural language (NL).
Moreover, this information is often partially reliable and a degree of reliability is also …
Moreover, this information is often partially reliable and a degree of reliability is also …
Cluster discovery via multi-domain fusion for application dependency mapping
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
Application dependency mapping (ADM) can be automated in a network. The network can
determine whether certain nodes form a cluster of a tier of an application. The network can …
determine whether certain nodes form a cluster of a tier of an application. The network can …
The arithmetic of continuous Z-numbers
RA Aliev, OH Huseynov, LM Zeinalova - Information Sciences, 2016 - Elsevier
In order to deal with imprecision and partial reliability of real-world information, Prof. Zadeh
suggested the concept of a Z-number Z=(A, B), as an ordered pair of continuous fuzzy …
suggested the concept of a Z-number Z=(A, B), as an ordered pair of continuous fuzzy …
Methods and systems for transportation to destinations by a self-driving vehicle
B Templeton - US Patent 9,665,101, 2017 - Google Patents
US9665101B1 - Methods and systems for transportation to destinations by a self-driving
vehicle - Google Patents US9665101B1 - Methods and systems for transportation to …
vehicle - Google Patents US9665101B1 - Methods and systems for transportation to …
Generate a communication graph using an application dependency mapping (ADM) pipeline
A Parandehgheibi, MA Attar, V Jeyakumar… - US Patent …, 2022 - Google Patents
This disclosure generally relates to a method and system for generating a communication
graph of a network using an application dependency mapping (ADM) pipeline. In one aspect …
graph of a network using an application dependency mapping (ADM) pipeline. In one aspect …
Synthetic data for determining health of a network security system
An example method can include choosing a pattern or patterns of network traffic. This
pattern can be representative of a certain type of traffic such as an attack. The pattern can be …
pattern can be representative of a certain type of traffic such as an attack. The pattern can be …
Late data detection in data center
K Deen, N Yadav, A Gupta, S Gandham… - US Patent …, 2020 - Google Patents
Systems, methods, and non-transitory computer-readable storage media for synchronizing
timestamps of a sensor report to the clock of a device. In one embodiment, the device …
timestamps of a sensor report to the clock of a device. In one embodiment, the device …
System and method for network information mapping and displaying
A Parandehgheibi, O Madani, V Jeyakumar… - US Patent …, 2019 - Google Patents
This disclosure generally relate to a method and system for mapping network information.
The present technology relates techniques that enable full-scale, dynamic network mapping …
The present technology relates techniques that enable full-scale, dynamic network mapping …
Flowlet resolution for application performance monitoring and management
A Kulshreshtha, O Madani, V Jeyakumar… - US Patent …, 2020 - Google Patents
An application and network analytics platform can capture telemetry from servers and
network devices operating within a network. The application and network analytics platform …
network devices operating within a network. The application and network analytics platform …
Technologies for managing compromised sensors in virtualized environments
N Yadav, AR Singh, A Gupta, S Gandham… - US Patent …, 2019 - Google Patents
Abstract Systems, methods, and computer-readable media for managing compromised
sensors in multi-tiered virtualized environments. In some embodiments, a system can …
sensors in multi-tiered virtualized environments. In some embodiments, a system can …