Khare
Jeetendra Khare, Akurdi Pune IN
Patent application number | Description | Published |
---|---|---|
20150092278 | DISPLAY DEVICE - A display device, particularly for a vehicle, includes a base element and a combiner. The combiner moves by a drive mechanism between a position for use, in which a virtual image can be projected onto the combiner, and a stowed position. The drive mechanism includes a translation mechanism. | 04-02-2015 |
Kedar Bhalchandra Khare, Hauz Khas IN
Patent application number | Description | Published |
---|---|---|
20140153690 | SYSTEMS AND METHODS FOR IMAGING DYNAMIC PROCESSES - Systems, methods and non-transitory computer readable media for imaging. The system includes one or more radiation sources and detectors configured to transmit x-ray radiation towards a subject for imaging a dynamic process in a ROI of the subject and to acquire projection data corresponding to the ROI, respectively. The system also includes a computing device operatively coupled to one or more of the radiation sources and the detectors. The computing device is configured to provide control signals for performing one or more reference scans for acquiring reference data from a plurality of angular positions around the subject and for performing one or more tomosynthesis scans using one or more tomosynthesis trajectories for acquiring tomosynthesis data following the onset of the dynamic process. Additionally, the computing device is configured to reconstruct one or more images representative of the dynamic process using the reference data and/or the tomosynthesis data. | 06-05-2014 |
Kedar Bhalchandra Khare, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20140270456 | Image Recovery from Single Shot Digital Hologram - Techniques described herein are generally related to high resolution image recovery of objects from digital holograms. The various described techniques may be applied to methods, systems, devices or combinations thereof. Some described methods for recovering an image may include receiving reference beam data that corresponds to a reference interference pattern and receiving hologram data corresponding to an object. The method may also include applying a cost function to the hologram data and the reference beam data to determine the object image data associated with the object. The cost function may include a smoothness constraint applied to the object image data. The cost function can be iteratively reduced to obtain object image data corresponding to the object and the obtained object image data can be processed to recover the image of the object from single shot holograms with image resolution greater than conventional holographic imaging system | 09-18-2014 |
20150346027 | Non-Interferometric Phase Measurement - Techniques described herein are generally related to non-interferometric phase measurements of an optical signal. The various described techniques may be applied to methods, systems, devices or combinations thereof. Some methods for determining phase data of the optical signal may include transmitting the optical signal through a first optical element and obtaining first intensity data at a first focal plane of the first optical element by an optical sensor. Example methods may also include transmitting the optical signal through a second optical element. The second optical element may include a phase transformation mask. Example methods may further include obtaining a second intensity data at a second focal plane of the second optical element by the optical sensor and determining the phase data for the optical signal based on the first intensity data and the second intensity data. | 12-03-2015 |
Praneet Khare, Gurgaon IN
Patent application number | Description | Published |
---|---|---|
20130097659 | SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENT - One or more attributes of an application in a plurality of applications is identified. A reputation score of the application is determined based at least in part on the identified attributes to determining whether the application should be included in a whitelist. The whitelist can be applied against a request to download the application on a mobile device. In some aspects, the whitelist can be generated through automated collection and analysis of applications available for download by one or more different types of mobile devices in one or more networks. In some aspects, the whitelist can be applied by blocking attempts to download applications determined not to be included in the whitelist. | 04-18-2013 |
20130097660 | SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENT - An application is identified as installed on a particular mobile device. An action involving the application is identified, the action to be performed using the particular mobile device. It is determined whether the action is an approved action based on at least one policy associated with the particular mobile device. A determination that the action is unapproved can results in an attempt to prevent the action. Further, in certain instances, a whitelist or blacklist can be generated based on determinations of whether identified application actions conform to one or more policies associated with the particular mobile device. | 04-18-2013 |
20130097708 | SYSTEM AND METHOD FOR TRANSITIONING TO A WHITELIST MODE DURING A MALWARE ATTACK IN A NETWORK ENVIRONMENT - A method is provided in one example embodiment that includes receiving a signal to enable a whitelist mode on a host in a network, terminating a process executing on the host if the process is not verified, and blocking execution of software objects on the host if the software objects are not represented on the whitelist. In more particular embodiments, the method also includes identifying the process on a process list that enumerates one or more processes executing on the host. Yet further embodiments include quarantining the host if a second process on the process list is a critical process and if the second process is not verified. More specific embodiments include identifying and restarting another process on the process list if process memory was modified. | 04-18-2013 |
20150180908 | SYSTEM AND METHOD FOR WHITELISTING APPLICATIONS IN A MOBILE NETWORK ENVIRONMENT - A query from a particular mobile device is identified that indicates an attempt, by the particular mobile device, to access a particular application. It is determined whether the particular application has been assessed for inclusion in one or more of the plurality of whitelists and, based on the determination, an assessment of the particular application can be performed, which can include accessing a copy of the particular application and assessing the copy of the particular application to identify one or more attributes of the particular application. For each of a plurality of whitelists, a determination is made whether the particular application should be included in the whitelist based on the attributes. Each whitelist can be associated with a respective one of a plurality of entities and based on a policy corresponding to the respective entity, each entity is associated with a respective plurality of mobile devices. | 06-25-2015 |
Prateek Khare, Kanpur IN
Patent application number | Description | Published |
---|---|---|
20150056260 | METAL NANOPARTICLES-DOPED ANTIBACTERIAL AGENTS AND METHODS OF PREPARATION AND USE - A metal nanoparticles-doped porous carbon bead having an average size of about 0.4 millimeter (mm) to about 0.6 mm is provided. The metal nanoparticles-doped porous carbon bead is doped with silver, copper, or combinations thereof. | 02-26-2015 |
Rupesh Khare, Berkshire GB
Patent application number | Description | Published |
---|---|---|
20130002213 | VOLTAGE REGULATOR STRUCTURE - A regulator structure includes a first differential amplifier having a first input coupled to a reference voltage node. A second differential amplifier has a first input coupled to the output of the first differential amplifier. A third differential amplifier has a first input coupled to the output of the first differential amplifier. A first pmos transistor has its gate coupled to the second differential amplifier output, and its drain coupled to a second input of each of the first and second differential amplifiers. A second pmos transistor has its gate coupled to the third differential amplifier output, and its drain configured to output a regulated voltage which is also a second input of the third differential amplifier. A circuit is configured to replicate the regulated voltage and couple the replicated regulated voltage to the drain of the first pmos transistor. | 01-03-2013 |
Sunil Kumar Khare, Allahabad IN
Patent application number | Description | Published |
---|---|---|
20150371344 | Automated Rig Activity Report Generation - A method for automatically generating a drilling rig activity report while operating the rig includes receiving sensor measurements from a plurality of surface sensors deployed on the drilling rig. The sensor measurements may be made in real time while operating the rig and may be processed to compute rig state/activity information. The rig state(s) and a user defined report configuration may then be further processed to automatically generate the rig activity report. | 12-24-2015 |
Tarang Khare, Etobicoke CA
Patent application number | Description | Published |
---|---|---|
20130130922 | ANALYSIS OF METHYLATION SITES - A method for labeling unmethylated CpG dinucleotides within a DNA fragment, and use of the method in profiling of genomic DNA methylation. The present invention further provides modified DNA methyltransferase enzymes and compounds which are capable of being used by the enzymes as cofactors for use in the labeling method. | 05-23-2013 |
Vijay P. Khare, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20110112876 | Method and Tools for Progressively Scaling Maturity of Information Technology Organizations - A method of assessing and improving capability of information systems (IS) management in an organization using a computer system is provided. The method gathers responses related to strategic aspects of the IS management from a plurality of stakeholders in the organization, determines incongruence between the responses using the computer system, determines a change management efficiency for each of the strategic aspects based on the responses using the computer system, and provides an assessment of the capability based on the responses, the incongruence, and the change management efficiency. | 05-12-2011 |