Kumar
Kumar Abhijeet, Chicago, IL US
Patent application number | Description | Published |
---|---|---|
20110125771 | DATA DE-DUPLICATION IN A DISPERSED STORAGE NETWORK UTILIZING DATA CHARACTERIZATION - A method begins with a processing module receiving, from a requesting device, a data storage request that includes data for storage. The method continues with the processing module determining whether substantially identical data is currently stored in a dispersed storage network (DSN) memory. The method continues with the processing module encoding at least a portion of the data using an error coding dispersal storage function to produce a set of encoded data slices, sending the set of encoded data slices to the DSN memory for storage therein, and generating a unique retrieval matrix for the requesting device, wherein the unique retrieval matrix identifies a sub-set of encoded data slices of the set of encoded data slices for subsequent retrieval of the at least a portion of the data, when the substantially identical data is not stored in the DSN memory. | 05-26-2011 |
20110126026 | EFFICIENT STORAGE OF ENCRYPTED DATA IN A DISPERSED STORAGE NETWORK - A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. | 05-26-2011 |
20110161655 | DATA ENCRYPTION PARAMETER DISPERSAL - A method begins with a processing module obtaining encoded key slices from a plurality of user devices and decoding a threshold number of the encoded key slices utilizing a first error coding dispersal storage function to produce a key when the threshold number of the encoded key slices has been obtained. The method continues with the processing module receiving encoded data slices and decoding a threshold number of encoded data slices utilizing a second error coding dispersal storage function to produce encrypted data when the threshold number of the encoded data slices has been received. The method continues with the processing module decrypting the encrypted data utilizing the key and an encryption function to produce data. | 06-30-2011 |
20110161666 | DIGITAL CONTENT RETRIEVAL UTILIZING DISPERSED STORAGE - A method begins by a processing module obtaining a unique retrieval matrix based on an identity of the playback device and sending a request for retrieval of a set of encoded broadcast data slices to a dispersed storage network (DSN) memory, wherein the request includes the unique retrieval matrix and identity of the set of encoded broadcast data slices. The method continues with the processing module receiving a subset of the set of encoded broadcast data slices from the DSN memory, wherein the subset of the set of encoded broadcast data slices is based on the unique retrieval matrix. The method continues with the processing module storing the subset of the sets of encoded broadcast data slices. | 06-30-2011 |
20110161781 | DIGITAL CONTENT DISTRIBUTION UTILIZING DISPERSED STORAGE - A method begins by a processing module determining whether to error encode broadcast data. The method continues with the processing module encoding a portion of the broadcast data using an error coding storage dispersal function to produce a set of encoded broadcast data slices, determining whether to compress the set of encoded broadcast data slices for the set of encoded broadcast data slices, and when the set of encoded broadcast data slices is to be compressed, selecting a subset of encoded broadcast data slices of the set of encoded broadcast data slices, when the broadcast data is to be error encoded. | 06-30-2011 |
20130125190 | DIGITAL CONTENT DISTRIBUTION UTILIZING DISPERSED STORAGE - A computer includes an interface and a processing module. The processing module receives, over time and via the interface, requests to playback recorded broadcast data, wherein a single copy of the recorded broadcast data is dispersed error encoded to produce a plurality of sets of encoded data slices that is stored in a dispersed storage network (DSN). In response to the playback requests, the processing module identifies unique combinations of at least a threshold number of encoded data slices for sets of the plurality of sets of encoded data slices to produce unique copies of the recorded broadcast data. For a particular playback request, the processing module retrieves a unique copy of the unique copies of the recorded broadcast data from the DSN and outputs, via the interface, the retrieved unique copy to a device associated with the particular playback request. | 05-16-2013 |
20130262854 | DATA DE-DUPLICATION IN A DISPERSED STORAGE NETWORK UTILIZING DATA CHARACTERIZATION - A computing device includes a processing module and an interface. The processing module is operable to receive, from a requesting device via the interface, a data storage request that includes data for storage. The processing module then determines whether substantially identical data is currently stored in a dispersed storage network (DSN) memory. When the substantially identical data is stored in the DSN memory, the processing module generates, for the requesting device, a second unique retrieval matrix of a plurality of sets of encoded data slices corresponding to the already stored substantially identical data, wherein the requesting device can recover at least a portion of the data based on the second unique retrieval matrix of the plurality of sets of encoded data slices. | 10-03-2013 |
20130275746 | DATA ENCRYPTION PARAMETER DISPERSAL - A method for securely distributing a profile within a dispersed storage network (DSN) that begins by encrypting a profile using a key. The method continues by encoding the encrypted profile in accordance with a dispersed storage error encoding function. The method continues by outputting the set of encoded profile slices to the DSN for storage therein. The method continues by encoding the key in accordance with an error encoding function and outputting the set of secure key portions to a set of devices of the DSN for storage therein. A device obtains the profile by retrieving secure key portions from the set of devices and recovering the key therefrom. The device then retrieves encoded profile slices from the DSN and decodes them to recover the encrypted profile. The device then decrypts the encrypted profile using the key to recover the profile. | 10-17-2013 |
20140298061 | POWER CONTROL IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module of a dispersed storage network (DSN) receiving a plurality of data access requests regarding a plurality of data objects. As individual data access requests of the plurality of data access requests are received, the method continues with the DS processing module, for each of the individual data access requests identifying a corresponding one of a plurality of logical storage pools of the DSN and determining power based access status of the corresponding one of the plurality of logical storage pools. When the power based access status is power saving mode, the method continues with the DS processing module queuing the individual data access request. When the power based access status is not in the power saving mode, the method continues with the DS processing module executing the individual data access request. | 10-02-2014 |
20140310572 | EFFICIENT STORAGE OF ENCRYPTED DATA IN A DISPERSED STORAGE NETWORK - A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. | 10-16-2014 |
20140328573 | ACCESSING STORED MULTI-MEDIA CONTENT BASED ON A SUBSCRIPTION PRIORITY LEVEL - A method begins with a processing module of a centralized digital video storage (DVS) system storing, for playback, a plurality of sets of encoded data slices in storage units, where multi-media content is encoded to produce the plurality of sets of encoded data slices. The method continues with the processing module monitoring the storage units for a failure mode and monitoring a number of subscriber devices requesting playback of the multi-media content. The method continues with the processing module determining whether a sufficient number of unique combinations of a decode threshold number of encoded data slices per set of slices exists to service playback of the multi-media content. When the sufficient number of the unique combinations do not exist, the method continues with the processing module reassigning unique combinations of the decode threshold number of encoded data slices per set of encoded data slices to some of the subscriber devices. | 11-06-2014 |
20140331103 | ENCODING MULTI-MEDIA CONTENT FOR A CENTRALIZED DIGITAL VIDEO STORAGE SYSTEM - A method begins with a processing module of a centralized digital video storage (DVS) system regarding recording of multi-media content that is to be broadcast at a particular broadcast time, determining a number of subscriber devices that have selected to record the multi-media content. At the particular broadcast time, the method continues with the processing module receiving the multi-media content as it is being broadcast. When the number of subscriber devices is less than a first value, the method continues with the processing module encoding the multi-media content using first level encoding parameters to produce sets of first level encoded data slices for storage. When the number of subscriber devices is equal to or greater than the first value, the method continues with the processing module encoding the multi-media content using second level encoding parameters to produce sets of second level encoded data slices for storage. | 11-06-2014 |
20140331104 | EFFICIENT STORAGE OF ENCRYPTED DATA IN A DISPERSED STORAGE NETWORK - A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored. | 11-06-2014 |
20140331330 | APPLYING DIGITAL RIGHTS MANAGEMENT TO MULTI-MEDIA FILE PLAYBACK - A method begins with a processing module of a centralized digital video storage (DVS) system that supports a plurality of subscriber units, receiving a request for playback of a stored multi-media file from a subscriber unit. The method continues with the processing module determining whether the stored multi-media file is a subscription based file or a publically available file. When the stored multi-media file is the subscription based file, the method continues with the processing module accessing digital rights management data regarding subscription based multi-media files to determine the subscriber unit's digital rights to the stored multi-media file. When the subscriber unit's digital rights include playback of the multi-media file, the method continues with the processing module sending a unique copy of the stored multi-media file to the subscriber unit in accordance with a unique slice retrieval pattern of the subscriber unit. | 11-06-2014 |
Kumar Adarsh, Nashua, NH US
Patent application number | Description | Published |
---|---|---|
20140053146 | NETWORK HARDWARE AND SOFTWARE UPGRADE RECOMMENDER - Methods, systems and computer readable media for generating hardware and software upgrade recommendations for a managed network of devices are described. | 02-20-2014 |
Kumar Anish, Katy, TX US
Patent application number | Description | Published |
---|---|---|
20120131996 | METHOD AND APPARATUS FOR LOGGING A WELLBORE - A method and apparatus for logging a wellbore with a translating arm set is provided. The translating arm set has at least one translating sensor pad for measuring at least one downhole parameter. The translating arm set has at least one translating extendable arm extendable from the downhole tool for locating each of the at least one translating sensor pads proximate the wellbore wall. The translating arm set has an actuator for translating the at least one translating arm set along a longitudinal axis of the downhole tool whereby the translating sensor pad is positionable at a selected longitudinal position relative to the downhole tool. | 05-31-2012 |
Kumar Annamraju, Tampa, FL US
Patent application number | Description | Published |
---|---|---|
20090279453 | SHIRNK WRAP TECHNIQUE FOR ENCLOSING MULITPLE POLYGONS - A computer-implemented method receives a list of polygonal vertices associated with multiple polygons located in proximity to one another in a two-dimensional region and analyzes the polygonal vertices. The method automatically generates, based on the analysis, a polygonal hull that encloses the multiple polygons such that a line segment connecting any two polygonal vertices of the multiple polygons falls completely inside the generated polygonal hull. The multiple polygons may correspond to a two-dimensional geographic region. The computer-implemented method may be used for geographic regional segmentation. | 11-12-2009 |
20090303903 | TECHNIQUE FOR SHIFTING NETWORK POINTS OR LINEAR FACILITIES IN A NETWORK PLAN - A computer-implemented method receives a set of data regarding a layout of a network, where the data specifies the interconnection of linear facilities and specifies at least one network point that is disconnected from the network. The computer-implemented method further determines a closest one of the linear facilities to the at least one network point based on the set of data and shifts the at least one network point to connect the at least one network point to the network based on a distance between a vertex associated with the closest one of the linear facilities and the at least one network point. The computer-implemented method also shifts the closest one of the linear facilities to connect the at least one network point in the network based on a distance associated with a linear projection from the at least one network point to the closest one of the linear facilities. | 12-10-2009 |
20100315977 | SHRINK WRAP TECHNIQUE FOR ENCLOSING MULTIPLE POLYGONS - A computer-implemented method receives a list of polygonal vertices associated with multiple polygons located in proximity to one another in a two-dimensional region and analyzes the polygonal vertices. The method automatically generates, based on the analysis, a polygonal hull that encloses the multiple polygons such that a line segment connecting any two polygonal vertices of the multiple polygons falls completely inside the generated polygonal hull. The multiple polygons may correspond to a two-dimensional geographic region. The computer-implemented method may be used for geographic regional segmentation. | 12-16-2010 |
20120089333 | DIGITAL MAP PROJECTION - A computer receives a set of Cartesian data and a set of geodetic data relating to a geographic area. A set of control points is generated, each control point being associated with a coordinate expressed in terms of latitude and longitude, and with a corresponding point in the Cartesian data. A plurality of sets of Cartesian coordinates is determined for each of the control points, each of the sets of Cartesian coordinates for one of the control points corresponding to a Cartesian system. A deviation is determined for a combination that includes a control point and a Cartesian system, the deviation being a difference between coordinates for the point in the Cartesian data and the set of Cartesian coordinates for the control point. For each set of Cartesian coordinates associated with the Cartesian system that is included in the combination, but further associated with a control point not in the combination, the set of Cartesian coordinates is modified according to the deviation. A cumulative deviation is determined for the combination by determining a sum of distances of each set of modified Cartesian coordinates from the coordinates of the corresponding point in the Cartesian data. Cumulative deviations are thus determined for a plurality of combinations. A combination associated with a minimum cumulative deviation is identified. | 04-12-2012 |
Kumar Anup, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130238256 | METHOD AND SYSTEM TO MODEL RISK OF UNPLANNED OUTAGES OF POWER GENERATION MACHINE - A method to determine a risk of failure for a machine including: generating a first value for a risk of failure of the machine, wherein the first value is determined by a first model receiving as an input a condition of the machine and the first model includes a relationship derived from historical machine failures and correlating the input condition of the machine to a value for the risk of failure; generating a second value of the risk of failure of the machine, wherein the second value is determined by a second model receiving as an input information regarding wear or degradation of the machine and the second model includes a relationship correlating the input information regarding wear or degradation to a value for the risk of failure, and determining a total risk of failure based on the first and second values of the risk of failure. | 09-12-2013 |
Kumar Anurag, Karnataka IN
Patent application number | Description | Published |
---|---|---|
20110249557 | Centralized Wireless Manager (WiM) for Performance Management of IEEE 802.11 and a Method Thereof - The present invention is an implementation of a network device called Wireless Manager (WiM) a centralized controller for QoS management of infrastructure WLANs based on the IEEE 802.11 DCF standards. The WiM queues and schedules packets from all the traffic flowing between the Access Points (APs) and the wireline LAN which requires no changes to the AP or the STAs, and can be viewed as implementing a Split-MAC architecture. The objectives of WiM are to manage various TCP performance related issues such as the throughput anomaly when STAs associate with an AP with mixed PHY rates, and upload download unfairness induced by finite AP buffers, and also to serve as the controller for VoIP admission control and handovers, and for other QoS management measures. | 10-13-2011 |
Kumar Arulandu, Eindhoven NL
Patent application number | Description | Published |
---|---|---|
20100090619 | LIGHT WAND FOR LIGHTING CONTROL - A lighting system ( | 04-15-2010 |
Kumar Ashish, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110138359 | MODIFIED IMPLEMENTATION OF JAVA DEBUG WIRE PROTOCOL - A client debugger application or a virtual machine includes a receiving module configured to receive a command packet of a debugging protocol from a computer. The command packet includes an identifier (ID) field. The client debugger application or the virtual machine also includes a parsing module configured to parse an ID from the ID field. One byte of the ID field doubles as a command set value and another byte of the ID field doubles as a command value. The client debugger application or the virtual machine further includes a debugging module configured to use the parsed ID, command set value and command value to perform at least one debugging operation. | 06-09-2011 |
20120047486 | OPTIMIZED IMPLEMENTATION OF BREAKPOINT IN JAVA DEBUGGER AGENT - Embodiments of the invention provide systems and methods for optimizing handling of breakpoints in a debugger agent. Embodiments generate an additional modified bytecode copy that includes location indexes associated with breakpoint requests at the breakpoint locations. The location indexes may correspond to a location in a data structure in which the breakpoint information (e.g., request identifier and associated location information) is stored. The location index identified by the additional bytecode copy for a breakpoint may then be used to directly access the appropriate location in the data structure for generating a desired reply packet. Thus, the location index may effectively allow the debugger agent to generate the reply packet without searching through a complex data structure for the relevant request information. | 02-23-2012 |
20120047493 | BREAK ON NEXT CALLED FUNCTION OR METHOD IN JAVA DEBUGGER AGENT - Embodiments of the invention provide systems and methods for optimizing handling of breakpoints in a Java debugger agent. Embodiments provide a novel command that allows execution of the application in the debugger to stop or break at the beginning of a next called function or method (e.g., a “break on next called function” or “BNCF” command). When the BNCF command is given to the debugger, a flag may be set in the interpreter of the virtual machine to which the debugger is attached. On encountering a new method or function call, the flag is examined by the interpreter to determine whether it should stop or break in that call. If the flag is set, the interpreter will stop; otherwise the interpreter proceeds. | 02-23-2012 |
20140033182 | BREAK ON NEXT CALLED FUNCTION OR METHOD IN JAVA DEBUGGER AGENT - Embodiments of the invention provide systems and methods for optimizing handling of breakpoints in a Java debugger agent. Embodiments provide a novel command that allows execution of the application in the debugger to stop or break at the beginning of a next called function or method (e.g., a “break on next called function” or “BNCF” command). When the BNCF command is given to the debugger, a flag may be set in the interpreter of the virtual machine to which the debugger is attached. On encountering a new method or function call, the flag is examined by the interpreter to determine whether it should stop or break in that call. If the flag is set, the interpreter will stop; otherwise the interpreter proceeds. | 01-30-2014 |
Kumar Bhogaraju, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090282337 | SYSTEM AND METHOD FOR MANAGEMENT AND PRESENTATION OF AUDIOVISUAL CONTENT - Several embodiments of the present invention take the form of a system and method for management and presentation of audiovisual content via a global computer network. The system and method includes a database disposed on the network and an interface in electrical communication with the database. | 11-12-2009 |
Kumar Bhupendra, San Diego, CA US
Patent application number | Description | Published |
---|---|---|
20110001118 | PATTERNING OF NANOSTRUCTURES - A method of patterning nanostructures comprising printing an ink comprising the nanostructures onto a solvent-extracting first surface such that a pattern of nanostructures is formed on the first surface. | 01-06-2011 |
Kumar Brajbhushan, Malangawa NP
Patent application number | Description | Published |
---|---|---|
20140114654 | METHOD AND SYSTEM FOR PEAK LIMITING OF SPEECH SIGNALS FOR DELAY SENSITIVE VOICE COMMUNICATION - A method and system for peak limiting of speech signals for delay sensitive voice communication is disclosed. In an embodiment, a position of a sample with highest magnitude within a current block of samples is determined. Further, a peak gain to be applied for the current block of samples to bring down the highest magnitude to a predetermined threshold value is determined. Furthermore, a gain delta by which an old gain is updated to the peak gain is computed. Then, a gain factor is computed for the current block of samples based on the position of the sample with highest magnitude and the gain delta. Subsequently, the gain factor is set to a predetermined minimum gain factor when the computed gain factor is less than the predetermined minimum gain factor. In addition, gain is applied to the current block of samples using the gain factor. | 04-24-2014 |
Kumar Carounanidy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20100199195 | Adaptive Rendering Of A Webpage On An Electronic Display Device - Disclosed herein is a method and system for rendering a web page on an electronic display device in a visual presentation format based on preferences of a user. An embedded browser application is provided on the electronic display device. The embedded browser application identifies alterable display attributes of elements on the web page and presents display options corresponding to the identified display attributes to the user. The user selects the presented display options based on preferences of the user. The embedded browser application modifies the identified display attributes of the web page elements by applying adaptive rendering rules on the identified display attributes. The embedded browser application creates the visual presentation format by incorporating the modified display attributes of the web page elements. The embedded browser application renders the web page adaptively on the electronic display device in the created visual presentation format. | 08-05-2010 |
Kumar Dessapan, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120236935 | Methods and Systems for Masking Multimedia Data - Several methods and systems for masking multimedia data are disclosed. In an embodiment, a method for masking includes performing a prediction for at least one multimedia data block based on a prediction mode of a plurality of prediction modes. The at least one multimedia data block is associated with a region of interest (ROI). A residual multimedia data associated with the at least one multimedia data block is generated based on the prediction. A quantization of the residual multimedia data is performed based on a quantization parameter (QP) value. The QP value is variable such that varying the QP value controls a degree of masking of the ROI. | 09-20-2012 |
Kumar Duwari, Sunbury-On-Thames GB
Patent application number | Description | Published |
---|---|---|
20110061095 | Secure Web Based Transactions - Methods of securely performing online transactions are described which involve two independently controlled web servers. In order to complete a transaction, a user interacts concurrently with each of the two web servers and authentication may occur between the user and each web server and between web servers. Each of the two web servers provide data which is used to complete the transaction and the data provided by the first web server is communicated directly to the second web server for use in the transaction. In an embodiment, the first web server provides a web page which enables a user to specify a variable which is used in the transaction. This is communicated to the second web server which processes the transaction along with an identifier for the message. The identifier may be used in validating the variable before it is used in processing the transaction. Following completion of a transaction this may be reported in real time to the first web server. | 03-10-2011 |
Kumar Emayan US
Patent application number | Description | Published |
---|---|---|
20090093520 | PLASMA CARBOXYPEPTIDASE B INHIBITORS - Compounds of the following formula (I), for example: | 04-09-2009 |
20110319366 | Plasma Carboxypeptidase B Inhibitors - Compounds of the following formula (I), for example: | 12-29-2011 |
Kumar Eswaramoothyy, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20090285167 | SCHEDULED COEXISTENCE - The present invention provides a system and a method for improving the wireless local area network (WLAN) throughput performance in a collocated WLAN/Bluetooth system that uses packet traffic arbitration (PTA) to schedule WLAN and Bluetooth transmissions. The method includes detecting a Bluetooth transmission, where the Bluetooth transmission comprises one or more quiet periods; and scheduling a WLAN transmission, where frames of the WLAN transmission are received during the quiet periods of the Bluetooth transmission. The method according to the present invention allows the collocated WLAN to receive a frame send by the access point (AP) and acknowledge its reception without the AP reducing the data transmission rate due to unacknowledged frames. Also, the present invention discloses a mechanism where a collocated Bluetooth device (BTD) and WLAN device can communicate to the AP through a single antenna. | 11-19-2009 |
Kumar Eswaran, Secunberabad IN
Patent application number | Description | Published |
---|---|---|
20080232682 | SYSTEM AND METHOD FOR IDENTIFYING PATTERNS - The present invention provides a system and method for identifying a pattern as belonging to one of a set of predetermined classes of patterns. The system comprises a plurality of classifier blocks wherein each classifier block corresponds to a distinct predetermined class of patterns and produces a mirror image of an input pattern if the input pattern belongs to the predetermined class. The system also comprises a plurality of sub-classifier blocks wherein each sub-classifier block corresponds to a distinct predetermined sub-class of a predetermined class of patterns and is coupled to a classifier block corresponding thereto for producing a mirror image of an input pattern if the pattern belongs to the predetermined sub-class. The system further comprises an input unit for capturing the pattern for identification and an output unit for displaying at least one of a mirror image of an input pattern and an identified class and sub-class of the input pattern. The system and method of the present invention may also be used as sub-modules for building large generalized learning systems. | 09-25-2008 |
Kumar Garapaty, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20140095148 | EMOTION IDENTIFICATION SYSTEM AND METHOD - A system and method for identifying emotion in text that connotes authentic human expression, and training an engine that produces emotional analysis at various levels of granularity and numerical distribution across a set of emotions at each level of granularity. The method may include determining similarity between textual data and an emotion, and classifying emotions as similar emotions. | 04-03-2014 |
20140095149 | EMOTION IDENTIFICATION SYSTEM AND METHOD - A system and method for identifying emotion in text that connotes authentic human expression, and training an engine that produces emotional analysis at various levels of granularity and numerical distribution across a set of emotions at each level of granularity. The method may include classifying textual data as emotional textual data or non-emotional textual data, and determining duration of an emotional state. | 04-03-2014 |
Kumar Garapaty, San Francsico, CA US
Patent application number | Description | Published |
---|---|---|
20140095150 | EMOTION IDENTIFICATION SYSTEM AND METHOD - A system and method for identifying emotion in text that connotes authentic human expression, and training an engine that produces emotional analysis at various levels of granularity and numerical distribution across a set of emotions at each level of granularity. The method may include producing a chart of data transmissions referenced against time, comparing filtered data transmissions to a database, and selecting a database based on a demographic class of an author. | 04-03-2014 |
Kumar Giritharan US
Patent application number | Description | Published |
---|---|---|
20110196773 | SYSTEM AND METHOD FOR EVALUATING SECURITY TRADING TRANSACTION COSTS - A system and method for comparing investment transaction costs of institution peers includes database and a processor coupled to a network. The processor may be configured receive, via the network, security transaction data of investment institutions, which included data for traded securities, transaction order sizes, execution prices, peer identities and timestamps. The processor is further capable of grouping transaction data into groups of orders, calculating order costs and environmental factors for each order, and calculating a peer's average order cost within each group. The data are stored in the database so that it may be retrieved and displayed. | 08-11-2011 |
Kumar Hanumanthaiah, Syracuse, NY US
Patent application number | Description | Published |
---|---|---|
20100285962 | BIODEGRADABLE, PLANT-BASED COVERING AND PREMIXTURE - A biodegradable covering for erosion control, plant protection, and seed coating can comprise a porous matrix of a dried premixture. The premixture can comprise a plant-based protein product and a plant-based fiber product. The plant-based protein product can comprise a plant-based protein, and the plant-based fiber product can comprise a plant-based fiber. In one embodiment, a method of forming a biodegradable covering for erosion control is provided. The method can comprise mixing a biodegradable premixture, placing the biodegradable premixture in an applicator, and applying the biodegradable premixture. The biodegradable premixture can comprise a plant-derived protein product and a plant-derived fiber product. | 11-11-2010 |
Kumar Hemant, Muzaffarpur IN
Patent application number | Description | Published |
---|---|---|
20120078725 | METHOD AND SYSTEM FOR CONTEXTUAL ADVERTISEMENT RECOMMENDATION ACROSS MULTIPLE DEVICES OF CONTENT DELIVERY - The present invention includes a method and a system for recommending at least one advertisement to a user. The recommendation is provided based on the interaction with at least two devices. The user is identified when an interactive session is initiated by the user on a device of the at least two devices. Thereafter, a contextual profile of the identified user is selected from a database. The contextual profile is associated with one or more contextual sub-profiles. Further, each contextual sub-profile is associated with a corresponding device. Furthermore, one or more contextual attributes are dynamically captured from the interactive session. Thereafter, at least one of the contextual profile and the captured contextual attributes is mapped with a plurality of pre-stored advertisements. Subsequently, at least one advertisement is suggested on the device based on the mapping. | 03-29-2012 |
Kumar Jagdish, Dehradun IN
Patent application number | Description | Published |
---|---|---|
20130085305 | PROCESS FOR THE PREPARATION OF CU-CR OXIDES FOR SELECTIVE OXIDATION REACTIONS - The present invention provides a process for the preparation of Cu—Cr oxides by hydrothermal synthesis method using hydrazine as a reducing agent and cetyltrimethylammonium bromide as a surfactant and these oxides are very active for selective oxidation of benzene, toluene and ethylbenzene to produce phenol, benzaldehyde and acetophenone, respectively. | 04-04-2013 |
20140042059 | PROCESS FOR PRODUCTION OF BENZENE LEAN GASOLINE BY RECOVERY OF HIGH PURITY BENZENE FROM UNPROCESSED CRACKED GASOLINE FRACTION CONTAINING ORGANIC PEROXIDES - Disclosed is a process for production of benzene lean gasoline by recovery of high purity benzene from a narrow boiling benzene concentrated unprocessed cracked gasoline fraction. The process involves subjecting the feed material to an extractive distillation (ED) operation using an aromatic selective solvent in combination with a co-solvent. | 02-13-2014 |
Kumar Jeyaprakasam, Perambur IN
Patent application number | Description | Published |
---|---|---|
20120166238 | Requirement Generator - A requirement generation system receives user input selecting, from among key performance indicators stored in key performance indicator data defining key performance indicators available for selection in defining a requirement for a project, one or more key performance indicators to include in a requirement for a project. The requirement generation system defines the requirement for the project based on the received user input selecting the one or more key performance indicators and determines technical requirements for the requirement for the project based on mapping data defining formula and one or more data structures used in determining a measure of the one or more selected key performance indicators. The requirement generation system generates a data model mapping document for the project based on the determined technical requirements and outputs the generated data model mapping document. | 06-28-2012 |
Kumar Kastury, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090260458 | HIGH THROUGHPUT DISPENSER - The invention is directed to systems and methods for transferring nano-quantities of fluid samples using a high throughput or ultra high throughput dispenser. Such samples may be transferred from a first location and reformatted for being transferred to a second location. The invention may transfer a predetermined volume of sample quickly and accurately. | 10-22-2009 |
20100196903 | COMPOSITIONS AND METHODS TO DETECT TMPRSS2/ERG TRANSCRIPT VARIANTS IN PROSTATE CANCER - Compositions and methods for detecting TMPRSS2/ERG transcript variants in prostate cancer are provided. The compositions and methods have utility in prostate cancer diagnosis. | 08-05-2010 |
20110263461 | METHODS AND DEVICES FOR COLLECTING SAMPLES IN A HIGH THROUGHPUT FORMAT - The present invention is directed methods for collecting and storing samples compatible for high throughput automation. The present invention is also directed to a device comprising: (a) a plate containing multiple wells, and (b) multiple rubber covers; wherein each rubber cover is (i) an integral part of the device, (ii) is on top of each well and individually seal each well, and (iii) has a pierceable area in the center of the cover. The device is suitable for collecting, storing, transporting, and tracking samples compatible for high throughput downstream automated processing. | 10-27-2011 |
Kumar Marappan, Round Rock, TX US
Patent application number | Description | Published |
---|---|---|
20080247005 | Multiple document scanning - A system and methodology enables the scanning of multiple documents in a single pass of a flat bed scanner. Multiple documents are placed on the scanner surface with a predetermined amount of vertical and horizontal spacing separating the documents. The scanning device is enabled to detect and open separate windows for each of the multiple documents and selectively present a preview of the image to the user. User selections allow the multiple documents to be created as multiple separate documents or files. | 10-09-2008 |
20140082639 | SYSTEM AND METHOD OF PROVIDING INTER-APPLICATION COMMUNICATIONS - A method of operating an operating system for providing inter-application communications between a publisher application and a subscriber application. The method includes receiving a publication request from the publisher application at an operating system, receiving a subscriber application from the subscriber application at the operating system, performing an operating system based event brokering procedure based on the publication request and the subscription request, and publishing an event based on the procedure. | 03-20-2014 |
Kumar Mayank, Urbana, IL US
Patent application number | Description | Published |
---|---|---|
20130185663 | PREDICTIVE USER INTERFACE METHOD AND APPARATUS - A result is generated, using a data processing or computational system, in response to a user-provided or user-indicated input expression. The result is displayed, or caused to be displayed, on a display device. The result is analyzed, and, based on the analysis of the result, one or more further data processing or computational actions that the user will perform on the result are predicted. A user interface mechanism is generated to facilitate performing the predicted one or more further data processing or computational actions or to facilitate viewing one or more further results generated in response to one or more of the predicted further data processing or computational actions. The user interface mechanism is displayed or caused to be displayed on the display device. | 07-18-2013 |
Kumar Nadimuthu, Singapore SG
Patent application number | Description | Published |
---|---|---|
20110124107 | METHOD OF HIGH FREQUENCY REGENERATION OF SORGHUM - The present invention relates generally to the regeneration of | 05-26-2011 |
Kumar Natesaiyer, Grayslake, IL US
Patent application number | Description | Published |
---|---|---|
20080229981 | PROCESS FOR MANUFACTURING READY-MIXED SETTING ALPHA-CALCIUM SULPHATE HEMI-HYDRATE AND KIT FOR SAME - A process for making calcined gypsum in slurry or powder form. The process includes adding at least two types of crystal modifiers to the slurry. The first crystal modifier is to control crystal morphology of the calcined gypsum (such as succinic and/or malic acid). The second crystal modifier is to prevent or retard setting to control set time (such as tetrasodium pyrophosphate (TSPP)) to form a water stable product. An accelerator is typically added at the site of use for specific applications such as setting type joint compound, media casting, exterior/interior coating, and sprayable fireproofing. A composition made by the process and a kit for using the composition are also disclosed. | 09-25-2008 |
20090239977 | SELF-LEVELING CEMENTITIOUS COMPOSITION WITH CONTROLLED RATE OF STRENGTH DEVELOPMENT AND ULTRA-HIGH COMPRESSIVE STRENGTH UPON HARDENING AND ARTICLES MADE FROM SAME - A self-leveling cementitious mixture with excellent flow properties and which hardens with a controlled rate of strength development to an ultra-high compressive strength composite composition for use in making articles such as cementitious armor panel with ballistic and blast resistant properties including: a continuous phase resulting from the curing of an aqueous mixture, in the absence of silica flour, of inorganic cement binder, inorganic mineral filler having a particle size of about 150-450 microns, pozzolanic mineral filler, polycarboxylate based self-leveling agent and water. The cementitious mixture may include alkanolamine, such as triethanolamine, and acid or acid salt, such as tartaric acid. The cementitious composition may be reinforced with reinforcing fibers, e.g. glass fibers, in an amount of about 0.5-6.0% by volume of the overall cementitious composition. The fibers are uniformly dispersed in the cementitious composition before it is cured to form a final cementitious armor panel. | 09-24-2009 |
20100229715 | CEMENT BASED ARMOR PANEL SYSTEM - A cementitious armor panel assembly including cementitious armor panel with ballistic and blast resistant properties attached to a frame structure to produce a protective structure. The cementitious armor panels have a continuous phase resulting from the curing of an aqueous mixture of an inorganic cement binder, an inorganic mineral filler having a particle size of about 150-450 microns, a pozzolanic mineral filler, a polycarboxylate based superplasticizer self-leveling agent, and water. The mixture may also contain alkanolamine, and acid or acid salt. Prior to curing, the continuous phase is reinforced with fiber uniformly distributed in the continuous phase before it is cured to form the panel. The panel may be reinforced with a skin attached to at least one surface of the panel. | 09-16-2010 |
20140272376 | PARTICLE STABILIZED FOAM, AND SLURRIES, PRODUCT, AND METHODS RELATED THERETO - Disclosed are cementitious product, as well as cementitious slurry, and method of forming the product. To reduce density in the cementitious product, foam is included in the slurry and in the method of forming the product. The slurry includes cementitious particles, water, and air bubbles such as from compressed air. Instead of using detergent chemistry at the gas/water interface of bubbles, the present invention uses a surface modifying agent for the cementitious particles in the slurry. The modified particles act to produce stable foam in the slurry. As an example mode of introduction, the surface modifier can be added (e.g., as solid or solution) directly into a bulk cementitious slurry that forms the product. As another example, the surface modifier can be added in a separate solution with water, air bubbles, and cementitious particles that serve as additive to the main cementitious slurry, where the separate solution is then added to the main cementitious slurry. | 09-18-2014 |
Kumar Navjot, Jamshedpur IN
Patent application number | Description | Published |
---|---|---|
20100303619 | SHAPED AND STIFFENED LOWER EXHAUST HOOD SIDEWALLS - An arrangement and method adapted for providing a stiffened lower exhaust hood for a steam turbine. Sidewalls of the lower exhaust hood may taper inward between a horizontal joint and an inlet to a condenser for the steam turbine, providing an enhanced flow path for the exhaust steam. Stiffening of the sidewalls may be provided by stiffening bends, stiffening curvature, and external stiffening beams on the wall plate of the sidewalls of the lower exhaust hood, permitting reduction or elimination of structural supports within the exhaust hood, which degrade exhaust steam flow. | 12-02-2010 |
20100303620 | CORRUGATED HOOD FOR LOW PRESSURE STEAM TURBINE - An arrangement and method adapted for providing a reinforced lower exhaust hood for a steam turbine. Double-wall sidewalls and endwalls for a lower exhaust hood include an outer corrugated wall joined to an inner plate wall. The enhanced strength provided by the corrugation provides reduced deformation of the lower exhaust hood and allows reduction of structural complexity and improved aero-performance within the lower exhaust hood. | 12-02-2010 |
20120195750 | TURBOMACHINE SUPPORTS HAVING THERMAL CONTROL SYSTEM - Supports for a first casing of a turbomachine are disclosed that each include a thermal control system to control thermal expansion thereof. The thermal control system may include: a sealed duct surrounding a support column of the turbomachine, the duct being coupled to a source of a cooling fluid flow, and/or a hollow leg supporting the inner casing on the support column with a conduit supplying operative fluid, e.g., steam, from a stage of turbomachine to the hollow leg. | 08-02-2012 |
20140119910 | TURBINE EXHAUST HOOD AND RELATED METHOD - A turbine exhaust hood and related method of installation is disclosed. In one embodiment, the turbine exhaust hood includes: a housing having an end wall, the end wall including a first portion of a releasable coupling, and a first radially inner steam guide structure disposed within the housing, the first radially inner steam guide structure including a second portion of the releasable coupling, integral with a first end of the first radially inner steam guide structure. The first portion and the second portion of the releasable coupling releasably couple the first radially inner steam guide structure to the end wall. | 05-01-2014 |
Kumar Nikunj, Maharashtra IN
Patent application number | Description | Published |
---|---|---|
20100190206 | PROCESS FOR THE PREPARATION OF IMMOBILIZED RECOMBINANT PENICILLIN ACYLASE CATALYST FROM ACHROMOBACTER SP. CCM 4824 EXPRESSED IN E. COLI BL 21 CCM 7394 AND ITS USE FOR THE SYNTHESIS OF BETA-LACTAM ANTIBIOTICS - The present invention discloses isolation of Penicillin Acylase (PA) from | 07-29-2010 |
Kumar Nipun, Gyeonggi-Do KR
Patent application number | Description | Published |
---|---|---|
20130176302 | VIRTUAL SPACE MOVING APPARATUS AND METHOD - Provided is a virtual space moving apparatus and method. To this end, a Three-Dimensional (3D) image corresponding to a subject is skeletonized to generate skeletal data. Object data corresponding to the skeletal data is generated and mapped in a virtual space. The mapped object in the virtual space is displayed. Upon selection of an accelerated-movement mode for virtual space movement, motion of the subject is selected. The object data in the virtual space is moved at a movement ratio previously set corresponding to the determined motion of the subject, such that a user can move as desired in the virtual space without being limited by a real space. | 07-11-2013 |
20130318453 | APPARATUS AND METHOD FOR PRODUCING 3D GRAPHICAL USER INTERFACE - A 3D GUI producing method includes generating one or more 3D objects by using a 3D model according to a user's input and generating one or more animations by using the 3D objects; generating one or more main state nodes which indicate one state on the 3D GUI and can be changed to another state and one or more sub state nodes included in the main state node; adding an event, a sequence including a series of scenes corresponding to the event, and a target node to be transitioned to from the sub state node, to each of the sub state nodes; and generating the 3D GUI according to the event, sequence, and target node added to each of the sub state nodes. | 11-28-2013 |
Kumar Padmanabh, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120191798 | METHOD AND SYSTEM FOR QUERYING, MONITORING AND CONTROLLING A WIRELESS SENSOR NETWORK USING INSTANT MESSAGING SYSTEM - A method for communicating with one or more sensor nodes in a Wireless Sensor Network (WSN) over a network is disclosed. The method includes initiating communication with the sensor nodes by sending messages to the server application using the instant messaging system. The server application formats the received messages and communicates to the sensor nodes and in turn also receives responses from the sensor nodes and communicates them back to the IM client. The method also includes steps for enabling a WSN messaging client to converse with an instant messaging client over the network during communication with the one or more sensor nodes in the WSN. The method further includes identifying the IM client the user has employed for communication and the corresponding IM protocol. Also, the method includes the step of configuring the WSN messaging client with the same IM protocol to enable communication. | 07-26-2012 |
20130007199 | SYSTEM AND METHOD FOR FACILITATING COMMUNICATION BETWEEN DIFFERENT PROTOCOL STACKS VIA VIRTUAL COMMUNICATION DEVICES - A computer-implemented method for facilitating interoperation between communication devices of different networks following different protocols is provided. The computer-implemented method enables creating a virtual device. The virtual device is a software representation of a first communication device in a first network. The computer-implemented method further comprises linking a synchronization module within the virtual device to the first communication device. The synchronization module receives data related to one or more attributes of the first communication device. The computer-implemented method comprises linking at least one mapping module within the virtual device to a second communication device. The mapping module facilitates conversion of the received data and transmission of the converted data to the second communication device for facilitating interoperation therebetween. | 01-03-2013 |
20130163410 | METHOD AND SYSTEM TO DYNAMICALLY DETECT AND FORM A MASTER SLAVE NETWORK - This invention describes a system and method for dynamically establish and maintain a MASTER SLAVE Network among the devices with wireless and wired connectivity. It also provides system and method for maintaining a MASTER SLAVE network in the event where the SLAVE or the MASTER or the server is dead. More importantly, it supports automatic network discovery, establishment and maintenance to provide end to end connectivity by using minimum resources of an enterprise network. | 06-27-2013 |
Kumar Padmanabh, Gorakhpur IN
Patent application number | Description | Published |
---|---|---|
20110157366 | METHOD AND SYSTEM FOR REAL TIME DETECTION OF CONFERENCE ROOM OCCUPANCY - A method for detecting occupancy status of a plurality of conference rooms in real time is provided. The method enables, firstly, monitoring a first output signal of a first sensor. Secondly, the method enables monitoring a second output signal of a second sensor. The method further enables comparing the first and second output signals with one or more predetermined thresholds within a predetermined time. Furthermore, the method enables correlating the comparison results to identify any uncertainty in detecting the occupancy. Furthermore, the method enables processing output from one or more image and/or video sensors based on the correlation to obtain occupancy status information when there is uncertainty in detecting occupancy. Finally, the method enables displaying the occupancy status information on one or more user devices. | 06-30-2011 |
20110161439 | METHOD AND SYSTEM FOR QUERYING, MONITORING AND CONTROLLING A WIRELESS SENSOR NETWORK USING AN INSTANT MESSAGING SYSTEM - A method for communicating with one or more sensor nodes in a Wireless Sensor Network (WSN) over a network is disclosed. The method includes initiating communication with the sensor nodes by sending messages to the server application using the instant messaging system. The server application formats the received messages and communicates to the sensor nodes and in turn also receives responses from the sensor nodes and communicates them back to the IM client. The method also includes steps for enabling a WSN messaging client to converse with an instant messaging client over the network during communication with the one or more sensor nodes in the WSN. The method further includes identifying the IM client the user has employed for communication and the corresponding IM protocol. Also, the method includes the step of configuring the WSN messaging client with the same IM protocol to enable communication. | 06-30-2011 |
20110182232 | SYSTEM AND METHOD FOR FORMING APPLICATION DEPENDENT DYNAMIC DATA PACKET IN WIRELESS SENSOR NETWORKS - A system and method for forming application dependent dynamic data packet format in a wireless sensor network is provided. The system comprises one or more sensor nodes, wherein each sensor node comprises one or more sensors for sensing physical events. Each sensor is defined as an active or an inactive sensor based upon the application requirement. The system also comprises one or more processing units for converting the physical events sensed by the active sensors to corresponding sensed data in digital format and forming dynamic length data packets comprising the sensed data and a sensor identifier field for conveying the identities of the active sensors. | 07-28-2011 |
20110266869 | METHOD AND SYSTEM FOR MEASURING, MONITORING AND CONTROLLING ELECTRICAL POWER CONSUMPTION - A system and method for measuring, monitoring and controlling electrical power directed through one or more electricity directing devices is provided. The one or more electricity directing devices includes electrical sockets supplying power to one or more devices. The system includes a potential transformer configured to receive AC voltage directed through a socket and further configured to relay the voltage to a processing device. The system further includes a current sensor configured to sense current drawn from the socket and further configured to relay the current to the processing device. A microcontroller is adapted to receive analog or digital values of voltage and current corresponding to AC voltage and AC current. The microcontroller then measures values of voltage and current, calculate electrical power consumed and generate a control signal. The control signal activates a switching device operationally connected to the socket and switches power flow through the socket. | 11-03-2011 |
20120076058 | METHOD AND SYSTEM FOR ADAPTIVE AGGREGATION OF DATA IN A WIRELESS SENSOR NETWORK - A method and system for adaptive aggregation of data in a Wireless Sensor Network (WSN) is disclosed. The method receiving one or more packets produced from a plurality of sensor nodes at an aggregator sensor node. The method further includes categorizing and storing the received packets in the buffer queue of the aggregator node. Then initiating an aggregation process by selecting an aggregation mechanism. The aggregation mechanism is selected based on the feedback value and a special instruction. The aggregated packets are forwarded to the base station based on an aggregation function. | 03-29-2012 |
20120176938 | METHOD AND SYSTEM FOR CREATING A VIRTUAL WIRELESS SENSOR NETWORK - A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN. | 07-12-2012 |
20120212872 | SYSTEM AND METHOD FOR PROTECTION OF ELECTRICAL APPLIANCES - An electrical circuit for protecting an electrical load from overload current is provided. The system includes a voltage transformer configured to receive AC mains voltage from an electric mains supply and further configured to apply reduced voltage to the electrical load. A control switch comprising metal contacts is connected to the voltage transformer. The control switch is configured to facilitate application of reduced value of AC mains voltage to the electrical load. A reduced value of current flowing through the electrical load is measured by a current transformer connected in series with the electrical load. The reduced value of current is then used for estimating a current consumption value in event of AC mains voltage being directly applied to the electrical load. A control signal is then used for disconnecting the electrical circuit if the estimated current consumption value is greater than threshold overload current value. | 08-23-2012 |
Kumar Parthasarathi, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20120109958 | System and Method for Managing Data Policies on Application Objects - Described herein are systems and methods for providing data policy management over application objects in a storage system environment. An application object may comprise non-virtual or virtual objects (e.g., non-virtual-based applications, virtual-based applications, or virtual storage components). An application object manager may represent application objects by producing mapping graphs and/or application object data that represent application objects in a standardized manner. A mapping graph for an application object may describe a mapping between the application object and its underlying storage objects on a storage system. Application object data may describe a mapping graph in a standardized format. Application object data representing application objects may be received by an application policy manager that manages data policies on the application objects (including virtual applications and virtual storage components) based on the received application object data. Data policies may include policies for backup, service level objectives, recovery, monitoring and/or reporting. | 05-03-2012 |
Kumar Pasumarthy, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20140046911 | DE-DUPLICATING ATTACHMENTS ON MESSAGE DELIVERY AND AUTOMATED REPAIR OF ATTACHMENTS - Systems and techniques of de-duplicating file and/or blobs within a file system are presented. In one embodiment, an email system is disclosed wherein the email system receives email messages comprising a set of associated attachments. The system determines whether the associated attachments have been previously stored in the email system, the state of the stored attachment, and if the state of the attachment is appropriate for sharing copies of the attachment, then providing a reference to the attachment upon a request to share the attachment. In another embodiment, the system may detect whether stored attachments are corrupted and, if so, attempt to repair the attachment, and possibly, prior to sharing references to the attachment. | 02-13-2014 |
Kumar Paulvannan, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130190315 | SUBSTITUTED BENZALDEHYDE COMPOUNDS AND METHODS FOR THEIR USE IN INCREASING TISSUE OXYGENATION - Provided are substituted benzaldehydes and derivatives thereof that act as allosteric modulators of hemoglobin, methods and intermediates for their preparation, pharmaceutical compositions comprising the modulators, and methods for their use in treating disorders mediate by hemoglobin and disorders that would benefit from increased tissue oxygenation. | 07-25-2013 |
20130190316 | SUBSTITUTED HETEROARYL ALDEHYDE COMPOUNDS AND METHODS FOR THEIR USE IN INCREASING TISSUE OXYGENATION - Provided are substituted heteroaryl aldehydes and derivatives thereof that act as allosteric modulators of hemoglobin, methods and intermediates for their preparation, pharmaceutical compositions comprising the modulators, and methods for their use in treating disorders mediate by hemoglobin and disorders that would benefit from increased tissue oxygenation. | 07-25-2013 |
Kumar Rajaratnam, Victoria AU
Patent application number | Description | Published |
---|---|---|
20100264708 | BACK SUPPORT ADJUSTMENT SYSTEM - A back support adjustment system including a flexible suspension system having an adjustable and interchangeable flexing means positioned in between a frame and a support member. The back support adjustment system further includes an adjustable back support system having a housing integral with a back support surface and a tension assembly movable within the housing. Both the tension assembly and the adjustable back support system are adapted to engage the frame so that the movable tension assembly adjusts the tension of the adjustable back support system and the adjustable flexing means controls movement of the flexible suspension system. | 10-21-2010 |
Kumar Ramaiyer, Cupertino, CA US
Patent application number | Description | Published |
---|---|---|
20090259695 | METHODS AND APPARATUS FOR MAINTAINING CONSISTENCY DURING ANALYSIS OF LARGE DATA SETS - Methods and apparatus for updating a database using a multi-dimensional data model in which data corresponding to the database are organized in multi-dimensional data blocks. Each data block has summary information associated therewith corresponding to a current state of evolution of the associated data block. Dependency information is maintained in the data model which identifies data dependencies within and among the data blocks. A list of change entries identifies changes made to the data blocks and times at which the changes were made. A request to apply a change entry to a data block is received. The change entry is applied to the data block, including generating a dependency list of data blocks whose data depends directly or indirectly from the updated data block. The data blocks in the dependency list are processed in accordance with a dependency update algorithm to update the data blocks in the dependency list. | 10-15-2009 |
20100057676 | BLOCK COMPRESSION USING A VALUE-BIT FORMAT FOR STORING BLOCK-CELL VALUES - Particular embodiments store multidimensional block data using a value-bit format. A block of data is determined that includes a first dimension and a second dimension. The occurrences of unique values in the block of data is then determined. If the number of unique values does not violate a threshold, a value-bit format may be used instead of storing the data in a fully-exploded array. In this case, the value for the unique values is stored with an indication of where the unique values occur in the block of data. When a request for a value at an index position in the array is received, the value-bit format is used to retrieve the value requested. A bit that indicates the value that is associated with the index position in the array is determined and that value is returned. | 03-04-2010 |
20110082830 | CHANGE APPLICATION FOR DATASETS USING FROZEN AND DELTA VALUES - A method includes storing a first value for one or more measures in a block of data for the cube of data. The first value is a value where the state of the cube is that no changes are applicable to the block of data. A second value is stored for the one or more measures in the block of data. The second value is a delta value representing changes made to the block of data based on the first value. A change is received to the block. A computer processor then calculates a new second value based on the change to the block. The new second value is stored in place of the second value previously stored while the first value remains the same. The second value represents the cumulative changes to the measure since the frozen value was determined. | 04-07-2011 |
Kumar Rethi, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140040415 | SYSTEMS AND METHODS FOR CACHING HTTP POST REQUESTS AND RESPONSES - With an idempotent POST request, the URL (and headers) cannot be used as an HTTP cache key. To cache idempotent POST requests, the POST body is digested and appended the URL with the digest and used as the cache key. Subsequent requests with the same payload will end up hitting the cache rather than the origin server. A forward cache proxy at the client end and reverse cache proxy at the server end are deployed. The client sends the request to the forward proxy that looks up the cache. If there is a cache miss, the forward cache proxy digests the body and sends only the digest to the reverse proxy. The reverse cache proxy looks up request cache to find if there is a match for the request and send that request to the server. | 02-06-2014 |
Kumar Rethinakaleeswaran, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110158252 | OUTGOING COMMUNICATIONS INVENTORY - Systems and methods for generating and accessing a communications inventory are provided. To generate the inventory in one embodiment, a plurality of outgoing communications is received. The outgoing communications may have been auto-generated or generated as part of a batch process. Next, a determination is made that a first outgoing communication of the plurality of outgoing communications is unique relative to other outgoing communications to avoid storing duplicate messages. Lastly, a user may access a display of the first outgoing communication. | 06-30-2011 |
20110246526 | SERVICE LEVEL AGREEMENT BASED STORAGE ACCESS - A method and a system implementing a service level agreement based storage access system. A service level agreement based storage access system presents a single interface for data storage consumers and translates generic data operation requests to data operation request specific to a storage server. The SLA based storage access system also monitors storage server performance and may throttle processes to ensure service level agreements are not violated. | 10-06-2011 |
20110246553 | VALIDATION OF INTERNAL DATA IN BATCH APPLICATIONS - A method and a system provide validated internal data about a running batch application. The validated internal data may be accessed via administrative interface for batch application for monitoring and management. The system comprises a batch host to host an instance of a running batch application. The running batch application comprises an interface to a batch agent. A controller is in communication with the batch agent and requests validated internal data about the running batch application via the batch agent. The controller further receives the validated internal data about the running batch application from the batch agent. | 10-06-2011 |
20110246640 | METHOD AND SYSTEM FOR SYNCHRONOUS AND ASYNCHRONOUS MONITORING - A system and method for synchronous and asynchronous monitoring of network resources is provided. In an example system, an asynchronous monitoring engine is in communication with the network resources and receives asynchronous data from a portion of the network resources. The asynchronous data is collected at an application layer or at an end-user application layer. A synchronous monitoring engine is also in communication with the network resources and accesses synchronous data in the application layer in response to receiving a request from the asynchronous monitoring engine. The system further identifies an anomaly corresponding to the asynchronous characteristic and the synchronous characteristic. | 10-06-2011 |
20120324417 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received, in response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-20-2012 |
20120324435 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEPLOYMENT - Methods and systems for facilitating incremental software deployment are disclosed. For example, a method can include receiving a command to deploy a second version of software to a computing system for execution on the computing system in response to the command, differences between the second version of the software and a first version of the software being executed on the computing system are determined. Code changes to be made to the first version of the software to produce the second version of the software are determined based on the differences. The code changes to be made to the first version of the software are transmitted to the computing system. | 12-20-2012 |
20140380271 | SYSTEMS AND METHODS FOR INCREMENTAL SOFTWARE DEVELOPMENT - Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries. | 12-25-2014 |
Kumar Sanjeev, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20110007077 | ANIMATED MESSAGING - A method performed by one or more devices includes receiving a user selection of a picture that contains an object of a character to be animated for an animated message and receiving one or more designations of areas within the picture to correspond to one or more human facial features for the character associated with the object. The method further includes receiving a textual message; receiving one or more user selections of one or more animation codes that identify animations to be performed by the one or more human facial features designated within the picture, and receiving an encoding of the textual message and the one or more animation codes. The method further includes generating the animated message based on the picture, the one or more designations of the one or more human facial features, and the one or more animation codes, and sending the animated message to a recipient. | 01-13-2011 |
20110070898 | METHOD AND SYSTEM OF RECOVERING LOST MOBILE DEVICES - An approach is provided for remotely controlling and/or tracking mobile devices. A request is received to track a mobile device. A control signal is generated, in response to the request, to remotely activate an application on the mobile device for controlling an audio interface or an imaging interface of the mobile device to capture a signal from the audio interface or the imaging interface. | 03-24-2011 |
20110143720 | LOCATION-TRIGGERED ALERTS FOR MOBILE COMMUNICATION DEVICES - Requests to issue alerts may be stored in a central database. Each request may identify a mobile communication device and a location at which an alert is to be issued when the mobile communication device is at the location. Mobile communication devices may repeatedly report their current location to the central database. In response to each report, the database may queried to determine whether a current location matches one in the database for the reporting mobile communication device. If so, an alert may be issued. Various types of alerts are described. | 06-16-2011 |
20110159845 | AUTOMATED LOCATING OF A MOBILE STATION WITHOUT AN ALERT AT THE MOBILE STATION - A mobile station is configured to respond to a mobile messaging service message bearing a predetermined code to determine its location and send location information back to the requestor in a response message. Typically, the mobile station received such a message from another mobile station. However, the mobile station does not display the received message or generate any alert regarding the received message, which might otherwise inform someone with or near that mobile station of the location related messaging. For example, if a mobile station is lost or stolen, the user can borrow another person's mobile device and send out a message with the code to the missing mobile station phone, to obtain information as to the location of the user's missing mobile station. | 06-30-2011 |
20110207438 | METHOD AND SYSTEM FOR SCHEDULING PHONE CALL USING SMS - A schedule for a desired call, obtained, for example as an SMS message sent from a user's mobile station, enables a server to automatically initiate set-up of a voice call for the user's mobile station at a scheduled time selected by the user and indicated in the message. The user can specify time and a telephone number for the call, in advance, in the call scheduling request message. However, at the time of the call, the user does not need to read a reminder or dial the call. The call scheduling and automatic set-up services described by way of examples herein may be very useful, for example, for attending important conference calls. This may also be very useful for setting a reminder to call a special person to wish him/her well on his/her birthday/anniversary etc. | 08-25-2011 |
20110252464 | AUTHENTICATING A MOBILE DEVICE BASED ON GEOLOCATION AND USER CREDENTIAL - Mobile devices provide security based on geographic location. With such a technique, a mobile device may automatically check its current location against geographic information as to the location(s) in which it is permitted to operate. When the user attempts access to the device, the mobile device will prompt the user for his/her credential only if the geographic location matches an allowed location. The user gains access then by inputting information corresponding to the credential, e.g. username and password, of a valid user. In the examples, if the geographic location does not match an allowed location, the mobile device provides a warning to the user, and the user is not allowed to enter any credential information. Optionally, the mobile device may send an alert message about the device being taken outside a specified boundary, e.g. to report the situation to other personnel. | 10-13-2011 |
20120095856 | USING A MOBILE DEVICE TO MAKE A TRANSACTION - An exemplary method enables a user of a mobile device to make purchases. From the mobile device, the user sends a messaging service short code identifying a retailer, an item identifier for an item offered for sale by a retailer and information indicating the user's intent to purchase the item to the retailer via a mobile network. The method also includes steps of receiving cost information for the item, from the system of the retailer; determining if the user has authorized transactions with the retailer through the network, and confirming the purchase of the item with the system of the retailer. Upon authorization, the cost information for the item is recorded to the subscriber's account, which enables processing of the cost information for inclusion on a bill to the user together with billing for mobile communication service provided by the network for the mobile device. | 04-19-2012 |
20130173635 | VIDEO SEARCH SYSTEM AND METHOD OF USE - A system and method identifies a video file in response to a video based search query. A video imaging device in a mobile device captures a video file, and sends the video file to a search engine. A database associated with the search engine stores pre-indexed metadata of pre-indexed frames of video. A video analyzer separates the received video file into individual frames, analyzes the individual frames received from the mobile device by converting the individual frames into metadata, and compares the metadata to the pre-indexed metadata of the pre-indexed frames stored in the database. The video analyzer then sends a message containing information about the identified pre-existing video back to the mobile device based on the comparison of metadata. The metadata of the file and/or the metadata in the database may include one or more of pixel information, histogram information, image recognition information and audio information for each individual frame. | 07-04-2013 |
20130304845 | GENERATING CUSTOM ADDRESS LINKS - A system is configured to receive location information associated with a geographic location, determine a web address associated with the location information, and determine a custom address associated with the location information and the web address, where the custom address is descriptive of the location information and is different than the web address. The system is further configured to store information associating the web address, the custom address, and the location information, and send the custom address to a user device, where the user device is able to use the custom address to obtain or share at least a portion of the location information at the web address. | 11-14-2013 |
20140181933 | VERIFYING AN IDENTITY OF A MESSAGE SENDER - A system includes a gateway and a verification server. The gateway is configured to receive a first message from a client over a network; send a request to a verification server to generate a first credential based on the first message; and route the first message toward a remote device. The verification server is configured to receive the request from the gateway; generate the first credential in response to the request; store the first credential; receive a second message from the remote device, the message requesting the verification server to validate a second credential; determine whether the second credential is valid based on the first credential; and send a notification to the remote device indicating whether the second credential is valid. | 06-26-2014 |
20140317198 | PREVENTING SMS MESSAGE FORWARDING LOOPS - A device may be configured to receive a message from a user device; and determine whether the message includes a parameter. When the message does not include the loop indicator parameter, the device may add the loop indicator parameter to the message to generate a first modified message, and output the first modified message toward an intended recipient of the message. When the message includes the loop indicator parameter, the device may determine whether a value of the loop indicator parameter exceeds a threshold value. When the value of the loop indicator parameter does not exceed the threshold value, the device may discard the message. When the value of the loop indicator parameter exceeds the threshold value, the device may modify the value of the loop indicator parameter value to generate a second modified message, and output the second modified message toward the intended recipient of the message. | 10-23-2014 |
20150074802 | SPAM NOTIFICATION DEVICE - A device is configured to receive triggering information including a set of conditions associated with spam. The device is configured to receive a message from a sending device, and to determine that the message is spam based on determining that the message satisfies a threshold quantity of conditions of the set of conditions. The device is configured to provide a notification indicating that the message may be spam, and receive response information, based on the notification, indicating that the sending device is to be blacklisted. The device is configured to cause, based on the response information, a future message from the sending device to be blocked prior to being presented to a user. | 03-12-2015 |
Kumar Sellakumar, Bridgewater, NJ US
Patent application number | Description | Published |
---|---|---|
20110265697 | Circulating Fluidized Bed Combustor and a Method of Operating a Circulating Fluidized Bed Combustor - A circulating fluidized bed combustor arrangement includes (a) a circulating fluidized bed reactor in which (i) a combustion chamber combusts a fuel material in a suspension of solid particles of a circulating fluidized bed, (ii) a first cyclone separator arrangement receives a mixture of gases and solid particles from the combustion chamber for separating a first fraction of the solid particles from the exhaust gases, and (iii) a solid particle return system connected to the first cyclone separator returns separated solid particles to the combustion chamber, (b) a heat transfer section including a water/steam heat exchanger section arranged after the first cyclone separator arrangement in the exhaust gas flow path, (c) a heat recovery device provided in connection with the combustion chamber, the first cyclone separator arrangement and the heat transfer section being arranged for recovering heat resulting from the combustion process in the combustion chamber, (d) a selective catalytic reduction system arranged in the exhaust gas flow path, after the heat transfer section, for removing NOx from the exhaust gas, (e) a device for injecting NOx reducing agent into the exhaust gases upstream of the selective catalytic reduction system, and (f) a second cyclone separator arrangement provided downstream of the first cyclone separator arrangement and upstream of the heat transfer section, in which a second fraction of the solid particles is separated form the exhaust gases. | 11-03-2011 |
Kumar Sharma, Del Mar, CA US
Patent application number | Description | Published |
---|---|---|
20100056445 | ADIPONECTIN FOR THE TREATMENT AND DIAGNOSIS OF ALBUMINURIA - Disclosed are methods relating to the treatment and/or prevention of kidney disorders, especially kidney disorders characterized by or involving albuminuria. Methods described include the administration of an adiponectin polypeptide or a nucleic acid encoding such a polypeptide to treat or prevent the development of albuminuria. Also described are methods in which adiponectin is measured as a predictor of a subject's likelihood of having or developing a kidney disorder characterized by or involving albuminuria. Also described are methods of treating or preventing a kidney disorder involving administering an AMPK agonist and/or an inhibitor of Nox4 activity. | 03-04-2010 |
20130276513 | METHODS FOR DIAGNOSING AND ASSESSING KIDNEY DISEASE - The technology relates in part to methods for identifying the presence of kidney disease, determining the level of kidney disease, or the progression of kidney disease, in a subject that has or has not been diagnosed with diabetes. The technology further relates to methods for determining the targets for therapy for kidney disease, the efficacy of a treatment for kidney disease, and methods for determining the toxicity of a therapeutic in a subject with kidney disease. The technology relates in part to methods for identifying the presence of kidney disease, determining the level of kidney disease, or the progression of kidney disease, in a subject that has or has not been diagnosed with diabetes. The technology further relates to methods for determining the targets for therapy for kidney disease, the efficacy of a treatment for kidney disease, and methods for determining the toxicity of a therapeutic in a subject with kidney disease. | 10-24-2013 |
Kumar Shubham, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130324154 | SYSTEMS AND METHODS FOR LOCATION POSITIONING OF USER DEVICE - Devices, systems, and methods for gathering, calculating and sending positioning information at a user device to one or more networks may be disclosed. In a first implementation the user device transforms pseudorange information relating to terrestrial beacons into GNSS pseudorange information. In a second implementation, the user device sends position information using GNSS information elements. In a third implementation, the user device sends position information using non-GNSS information elements. | 12-05-2013 |
Kumar Sidhartha, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140156983 | Stateless Flexible Boot Control - Techniques are provided herein for optimizing boot order for devices in a data center environment. These techniques may be embodied as a method, apparatus and instructions in a computer-readable storage media to perform the method. A computing apparatus having connectivity to a network receives instructions from a management device in the network. The instructions comprise attributes that are associated with boot devices hosted by the computing apparatus. The attributes are analyzed to determine a priority order for the boot devices. One or more boot devices hosted by the computing apparatus is removed from an initialization process when the one or more boot devices do not match the attributes in the instructions. The remaining boot devices, other than the one or more boot device removed from the initialization process, are initialized in accordance with the priority order. | 06-05-2014 |
20140164752 | SYSTEM AND METHOD FOR SELECTING A LEAST COST PATH FOR PERFORMING A NETWORK BOOT IN A DATA CENTER NETWORK ENVIRONMENT - A method is provided in one example embodiment and includes logging in to a multipath target via first and second boot devices instantiated on a network device, the first and second boot devices respectively connected to the multipath target via first and second paths; determining which of the first and second paths comprises a least cost path; and booting the operating system via the least cost path. The determining may include comparing network statistics of the first path with network statistics of the second path, the network statistics comprising at least one of packet loss on the path, errors encountered via the path, and congestion on the path. | 06-12-2014 |
Kumar Singarajan, Rochester Hills, MI US
Patent application number | Description | Published |
---|---|---|
20090108803 | USER INTERFACE SYSTEM AND METHOD FOR JUMP ASSIST OF HYBRID VEHICLES - The present disclosure is a system and method for charging a high voltage battery of a hybrid automotive vehicle which contemporaneously provides a user with a visual display of diagnostic hybrid system information, including but not limited to, battery data and state of charge data through a user interface located internal a cabin of the vehicle. In other exemplary embodiments, the user interface is operable for providing the visual display while also providing access to other features of the vehicle to the user. | 04-30-2009 |
Kumar Srinivasan, Singapore SG
Kumar Sukeerthi, Navi Mumbai IN
Patent application number | Description | Published |
---|---|---|
20080200501 | NOVEL CANNABINOID RECEPTOR LIGANDS, PHARMACEUTICAL COMPOSITIONS CONTAINING THEM, AND PROCESSES FOR THEIR PREPARATION - The present invention relates to novel cannabinoid receptor modulators, in particular cannabinoid 1 (CB1) or cannabinoid 2 (CB2) receptor modulators, and uses thereof for treating diseases, conditions and/or disorders modulated by a cannabinoid receptor (such as pain, neurodegenative disorders, eating disorders, weight loss or control, and obesity). | 08-21-2008 |
Kumar Sundramurthy, Singapore SG
Patent application number | Description | Published |
---|---|---|
20120135931 | METHOD OF MODIFYING SERINE PROTEASE INHIBITORS - The present invention relates to a method of modifying serine protease inhibitors in order to acquire or enhance any one of a variety of desired properties, including extent of inhibition, maintenance of inhibition following cleavage of the serine protease inhibitor by the target serine protease, speed of binding to the serine protease, neutralisation, and binding affinity. The present invention also relates to the products of such modifications and the uses of such products, in particular, their use in therapy. | 05-31-2012 |
Kumar Surni, Chennai IN
Patent application number | Description | Published |
---|---|---|
20090150983 | SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION - A method and system to authenticate human interactive proof (HIP) are described here. In response to a request from a web server, a motion random HIP in the form of motion-captcha is generated. The web server can then display the generated the motion random HIP in a requested web page. The web page is accompanied with a request from the user to provide the response for the generated motion captcha. After evaluation and verification of response received from the particular user, the authentication system determine whether the response to the HIP challenge is from human or from other source like computer software scripted agent. | 06-11-2009 |
20090281974 | System and method for adaptive data masking - A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value. | 11-12-2009 |
Kumar Swamy Bv, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140032528 | RELATIONAL DATABASE TREE ENGINE IMPLEMENTING MAP-REDUCE QUERY HANDLING - Methods and systems for processing a database query are disclosed. An example method includes receiving a SQL database query at a database query handling server, and parsing the SQL database query to identify a database and one or more tables and columns identified by the SQL database query. The method also includes determining a query plan based on the parsed database query. At a database engine, and based on the query plan and the identified database, tables and columns, the method further includes identifying a set of data nodes implicated by the identified database, tables and columns, determining a set of reduce operations and levels at which each of the set of map-reduce operations are to execute, and passing the query plan, the set of data nodes, and the map-reduce operations to a map-reduce query execution framework. The map-reduce query framework returns records as query results to the client system. | 01-30-2014 |
20140181176 | GRAPHICAL USER INTERFACE FOR HADOOP SYSTEM ADMINISTRATION - Systems and methods are described herein for administration of a Hadoop distributed computing network. The described embodiments include a graphical user interface (GUI) that facilitates administration and setup of a Hadoop system by removing the need for the administrator to enter complicated commands via a command line interface. The GUI also provides a visual indicator of the setup progress of the Hadoop system, among other benefits. | 06-26-2014 |
Kumar Thangamuthu, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20120028650 | SYSTEM AND METHOD FOR PREDICTING FUTURE LOCATIONS OF MOBILE COMMUNICATION DEVICES USING CONNECTION-RELATED DATA OF A MOBILE ACCESS NETWORK - A system and method for predicting future locations of mobile communication devices utilizes connection-related data from a mobile access network supporting the mobile communication devices to determine latest locations of the mobile communication devices, which are used to predict the future locations of the mobile communication devices. In addition to the determined locations of the mobile communication devices, carrier-provided location predictive indicators and/or non-carrier location predictive indicators may be used to improve the accuracy of the predicted future locations. | 02-02-2012 |
20140342696 | SYSTEM AND METHOD FOR PREDICTING FUTURE LOCATIONS OF MOBILE COMMUNICATION DEVICES USING CONNECTION-RELATED DATA OF A MOBILE ACCESS NETWORK - A system and method for predicting future locations of mobile communication devices utilizes connection-related data from a mobile access network supporting the mobile communication devices to determine latest locations of the mobile communication devices, which are used to predict the future locations of the mobile communication devices. In addition to the determined locations of the mobile communication devices, carrier-provided location predictive indicators and/or non-carrier location predictive indicators may be used to improve the accuracy of the predicted future locations. | 11-20-2014 |
Kumar Vadaparty, Bellemead, NJ US
Patent application number | Description | Published |
---|---|---|
20110258635 | Data Services Framework Visibility Component - A data services framework visibility component is disclosed. A method includes receiving a request for data from a client and selecting, based at least in part on the request, a workflow to process the request. The method also includes selecting, based at least in part on the request, a visibility profile. The method also includes based on the request, generating a plurality of backend calls and based on the selected visibility profile, filtering the plurality of backend calls. Additionally, the method includes transmitting one or more of the plurality of filtered backend calls to one or more data sources and receiving, from each of the selected data sources, a response to the plurality of filtered backend calls. The method also includes transmitting the response to the client. | 10-20-2011 |
Kumar Vadaparty, Bellernead, NJ US
Patent application number | Description | Published |
---|---|---|
20110258158 | Data Services Framework Workflow Processing - A data services framework workflow processing system and method is disclosed. The method includes receiving a request for data from a client and based on the request, determining a workflow to process the request. The method also includes based on the workflow, generating a plurality of backend calls. Additionally, the method includes based on the plurality of backend calls, selecting one or more data sources from a plurality of data sources. The method also includes transmitting one or more of the plurality of backend calls to the selected data sources and receiving, from each the selected data sources, a response to the plurality of backend calls. | 10-20-2011 |
Kumar Varoon, Minneapolis, MN US
Patent application number | Description | Published |
---|---|---|
20090195253 | Method for Assessment of Electrostatic Properties of Fibers or Substrates - Method for assessment of electrostatic properties of fibers or substrates, this method being particularly useful for demonstrating the efficacy of a composition for minimizing the accumulation of particles onto fiber or substrate, and for supporting advertising claims about this efficacy. | 08-06-2009 |
20090195254 | Method for Assessment of Electrostatic Properties of Fibers or Substrates - Method for assessment of electrostatic properties of fibers or substrates, this method being particularly useful for demonstrating the efficacy of a composition for minimizing the accumulation of particles onto fiber or substrate. | 08-06-2009 |
20100049671 | Method for Assessment of Friction Properties of Fibers or Substrates Upon Mechanical Treatment - Method for assessment of friction properties of fibers or substrate. The method is useful for assessing the degree of damage of hair fibers, for demonstrating the efficacy of a composition for minimizing the friction properties of fibers or substrate and/or for supporting advertising claims. | 02-25-2010 |
Kumar Vasudevan Pillai, Singapore SG
Patent application number | Description | Published |
---|---|---|
20090080493 | Apparatus and method for generating a monocycle - An apparatus for generating a monocycle comprises an input signal source ( | 03-26-2009 |
Kumar Vidhani, Pune IN
Patent application number | Description | Published |
---|---|---|
20140101784 | ANALYSIS AND SPECIFICATION CREATION FOR WEB DOCUMENTS - Described herein is a method for rendering specification creation, including identifying, within one or more contents, labels as sensitive labels when data associated with the label are determined sensitive based on one or more user-defined policy rules, wherein the identifying considers structural locations of labels determined as sensitive and the data associated with the sensitive label; configuring rendering specifications for data associated with the identified sensitive labels; and associating the configured rendering specifications with the sensitive labels of the data determined as sensitive, for execution in real time. | 04-10-2014 |
Kumar Vidhani, Hadapsar IN
Patent application number | Description | Published |
---|---|---|
20140123303 | DYNAMIC DATA MASKING - Described is a method for dynamic data masking (DDM) of sensitive data. The method for DDM comprises receiving a response output comprising sensitive data, based on a client request, from an application, and identifying a main masking specification, based on the response output, for masking of the sensitive data in the response output. Further, the response output is parsed for creating a Document Object Model (DOM) tree for the response output. Status of a masking approach indication field of the main masking specification is checked, and masking is performed on nodes in the DOM tree comprising the sensitive data, based on the status of the masking approach indication field of the main masking specification. | 05-01-2014 |
Kumar Virwani, Santa Barbara, CA US
Patent application number | Description | Published |
---|---|---|
20100017923 | PREAMPLIFYING CANTILEVER AND APPLICATIONS THEREOF - Aspects of the invention are directed to piezoresponse force analysis of a material. A stimulus signal including a first frequency component is applied to a contact point on the material such that the stimulus signal actuates a portion of the material to experience a motion as a result of a piezoelectric effect. A resonant device is coupled to the contact point such that the resonant device experiences a resonant motion at the first frequency component in response to the motion of the material, the resonant motion having a greater displacement than a displacement of the motion of the material, and is substantially unaffected by mechanical properties of the material at the contact point. The resonant motion of the resonant device is detected and processed to produce a measurement representing the piezoresponse of the material at the contact point. | 01-21-2010 |
Kumar Visvanatha, Kanata CA
Patent application number | Description | Published |
---|---|---|
20080295883 | ADAPTIVE SOLAR CONCENTRATOR SYSTEM - An adaptive solar concentrator system comprising a controller, a solar energy collector and a solar concentrator with variable concentration ratio is disclosed. The concentration ratio of the variable solar concentrator is varied to maximize the energy collection potential of the solar energy collector in response to fluctuations in incoming solar irradiation to best match the optimum operating conditions of the solar collector and to not exceed the maximum operating conditions of the solar collector for long term reliability. | 12-04-2008 |
Kumar Visvanathan, Fitzroy Vic AU
Patent application number | Description | Published |
---|---|---|
20100003262 | THERAPEUTIC, PROPHYLACTIC AND DIAGNOSTIC AGENTS FOR HEPATITIS B - The present invention provides regulation of expression of toll-like receptors by the hepatitis B (HBV) pre-core protein, or its extracellular expression product the hepatitis B E antigen (HbeAg). Compounds regulating such expression have use in the treatment and prophylaxis of HBV infection in animal. The invention also provides methods for diagnosing HBV and agents useful in diagnostic protocols. The present invention further contemplates methods for monitoring disease states in humans and other animal species, including animal models, and providing an indication of the subject for infection by HBV, or development of other diseased states. | 01-07-2010 |
Kumar Visvanathan, New York, NY US
Patent application number | Description | Published |
---|---|---|
20080305109 | Method of passive immunization - This invention relates to compositions and methods which provide protection against, or reduce the severity of toxic shock and septic shock from bacterial infections. More particularly it relates to peptides derived from homologous sequences of the family of staphylococcal and streptococcal toxins, which may be polymeric, and carrier-conjugates thereof. The invention also relates to serum antibodies induced by the peptides and carrier-conjugates and their use to prevent, treat, or protect against the toxic effects of most, if not all, of the staphylococcal and streptococcal toxins. | 12-11-2008 |