Kaushik, IN
Aashish Kaushik, Noida IN
Patent application number | Description | Published |
---|---|---|
20150358655 | ANALYZING INCOMING DIGITAL SIGNAL AT SET-TOP-BOX (STB) TO PROVIDE VALUE ADDED FEATURES FOR VIEWERS - Disclosed herein are a system and a method for performing real time content analysis at a Set-Top-Box (STB) so as to identify contents/programs that match preferences set by the user. The system provides option for the user to provide inputs required for content analyzes in any suitable form such as audio/video/image/text, through any suitable internal/external input means. The user can also configure at least one user preference as active configuration based on which the system can perform the content analysis. The system analyzes contents as and when they are received at the STB to identify a match. If a match is detected, the system triggers any alert of a pre-configured type to notify the user of the content alert. | 12-10-2015 |
Alok Kaushik, Delhi IN
Patent application number | Description | Published |
---|---|---|
20150280898 | OVERSAMPLING CDR WHICH COMPENSATES FREQUENCY DIFFERENCE WITHOUT ELASTICITY BUFFER - A method, algorithm, architecture, circuit and/or system that compensates for frequency difference in oversampled CDRs. The oversampled CDR uses a programmable divider whose division ratio is changed, for one or more cycles, from its usual division ratio, when accumulated phase movement in either direction exceeds a threshold. Accordingly, the elasticity buffer in oversampled CDRs can be made much smaller or entirely eliminated, resulting in less area, and reduced or eliminated dependence of max allowed burst size on ppm difference. The threshold can be kept programmable, and more than half unit interval, to provide robustness towards high frequency jitter. | 10-01-2015 |
Amrita Kaushik, Pin IN
Patent application number | Description | Published |
---|---|---|
20140172611 | BUYER-SOLICITED OFFERINGS - Members of a buyers' group hosted at an online marketplace submit desired-item descriptions for items the desired purchase. The desired-item descriptions are developed into desired-item listings presented at the buyers' group. Multiple buyers may be interested in the same desired-item listing and having expressed a purchase commitment for the item listing, their cumulative numbers as potential buyers may be displayed to sellers navigating the marketplace. A seller having a corresponding sale item to the desired-item may submit an item description that is developed into an item listing and containing an offer to sell the item. In this way buyers are able to attract offers to sell items that the buyers desire and by attracting multiple sellers, bidding wars between sellers develop higher value deals for the buyers. | 06-19-2014 |
Anil Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20120163281 | METHOD FOR IMPROVING QUALITY OF COMMUNICATION IN A COMMUNICATION NETWORK - A communication network comprises a plurality of access points, a plurality of stations wirelessly communicating with the plurality of access points and at least one sensor located at a different location from each of the plurality of access points for improving communication quality in the communication network. The sensor in the communication network senses a communication message transmitted from a source station and destined for a destination access point on a wireless communication channel in the communication network. The sensor further determines a number of retransmissions of the communication message from the source station. The sensor, upon determining that the determined number of retransmissions of the communication message is at least equal to a predetermined threshold, forwards the communication message to the destination access point through the wired medium. | 06-28-2012 |
20120236836 | MODE STEERING IN A WIRELESS COMMUNICATION NETWORK - Mode steering in a wireless communication network includes configuring a list of neighboring access points and their operational modes. If an operational mode of a requesting mobile device can not be supported by the access point, denying the association. If an operational mode of a requesting mobile device matches a highest operational mode of the access point, allowing the association. If the operational mode of the mobile device is not the same as the highest operational mode of the access point, and if any neighboring access point has an available operational mode matching that of the mobile device, denying the association, so as to steer the requesting mobile device to the matching neighboring access point. | 09-20-2012 |
20130016618 | SELF-TESTING OF SERVICES IN AN ACCESS POINT OF A COMMUNICATION NETWORKAANM Shanmugavadivel; SenthilrajAACI CoimbatoreAACO INAAGP Shanmugavadivel; Senthilraj Coimbatore INAANM Kaushik; AnilAACI BangaloreAACO INAAGP Kaushik; Anil Bangalore INAANM Kiran; RajAACI BangaloreAACO INAAGP Kiran; Raj Bangalore IN - A technique for self-testing of services in an access point of a communication network includes providing a table that has a mapping between a service test, packets to be sent for testing, and packets that should be received in response to the testing, emulating and marking the test packets to be sent, placing the marked test packets in an Rx queue, processing the test packets normally by the access point to provide response packets and marking these response packets, delivering the marked response packets to a Rx queue, retrieving the marked response packets from the Rx queue, and comparing the service test response packets to the list of packets that should have been received in the response to the testing in order to validate that service on the access point. | 01-17-2013 |
20140003230 | ADAPTIVE STANDBY ACCESS IN A LOCAL AREA COMMUNICATION NETWORK | 01-02-2014 |
20140018037 | ON-DEMAND ACCESS TUNNEL BETWEEN SERVICE PROVIDER NETWORK AND WIRELESS COMMUINICATION NETWORK - An on-demand access tunnel to a service provider is provided for a mobile device that first receives information about supported service providers from a wireless communication network entity. The mobile device can select a supported service provider and start an association process to communicate with the selected service provider. The network entity determines the selected service provider and sets up a tunnel connection from an access point of the wireless communication network to the selected service provider. The tunnel connection is torn down when the mobile device dissociates from the access point and no other device is connected to the service provider network using the tunnel connection. | 01-16-2014 |
20150124774 | AGGREGATED BEACONS FOR PER STATION CONTROL OF MULTIPLE STATIONS ACROSS MULTIPLE ACCESS POINTS IN A WIRELESS COMMUNICATION NETWORK - A technique for providing per station control of multiple stations in a wireless network across multiple access points. A look-up table that assigns a station connected to the access point and at least one communication parameter to each of a plurality of persistent, uniquely-assigned BSSIDs (Basic Service Set Identifiers) is stored. An access point responds to messages addressed one of the plurality of persistent, uniquely-assigned BSSIDs and ignores messages addressed to other BSSIDs. Persistence of the BSSID allows the controller to maintain individual control over each station after moving to a second access point of the plurality of access points. A frame comprising the plurality of BSSIDs corresponding to each connected station aggregated into the frame is generated. The frame is transmitted to the plurality of stations. Responsive to a station of the plurality of stations being handed-off to a different access point, a uniquely-assigned BSSID corresponding to the station is deleted from the look-up table. | 05-07-2015 |
20160100399 | EMULATING VIRTUAL PORT CONTROL OF AIRTIME FAIRNESS USING PER STATION ENHANCED DISTRIBUTED CHANNEL ACCESS (EDCA) PARAMETERS - A technique for emulating virtual port control of airtime fairness for wireless stations using per station Enhanced Distributed Channel Access (EDCA) parameters. Specific parameters are received for each of a plurality of stations connected to the access point. An EDCA field of a beacon that stores a general EDCA parameter is set to an empty state. The beacon is broadcast to a plurality stations on the wireless communication network and within range of an access point. The beacon comprises a BSSID (Basic Service Set Identifier) for use by the plurality of stations to connect with the access point for access to the wireless communication network. The beacon also comprises an empty EDCA field. In response to broadcasting the empty EDCA parameter, receiving a direct inquiry from each of the plurality of stations for the general EDCA parameter. Each of the plurality of stations is responded to with a direct communication of a specific parameter corresponding to each station. A transmission is received from at least one of the stations complying with the specific parameter. | 04-07-2016 |
20160105824 | DYNAMIC GENERATION OF PER-STATION REALM LISTS FOR HOT SPOT CONNECTIONS - Per-station realm lists are dynamically generating per-station for hot spot connections to access points by roaming stations. A query for a list of realms is received from a roaming station when connecting to a hot spot. Using an MAC address or other station identity, a list of available realms narrowed to a subset of per-station realms sent to the station. Narrowing is performed on-the-fly with respect to at least one aspects. A last N realms are retrieved from a database record searched by MAC address. The list is further narrowed by removing realms that are inaccessible or otherwise recently shown to have bad link quality. Additional ranking factors can narrow or rearrange the realm list based on financial agreements, popularity, trends, and the like. A selection from the list of realms is received from the station. The access point then authenticates the station with the selected realm. If successful, data traffic concerning the station can be forwarded through the hot spot on behalf of the selected realm. | 04-14-2016 |
Anil Kaushik Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140118113 | DETECTING ROGUE RADIO FREQUENCY BASED TAGS BASED ON LOCATIONING - A method and system for detecting rogue radio frequency based devices includes a plurality of radio frequency based tags disposed at different locations within an area and operable to periodically broadcast information in a beacon, the information including each tag's unique identity information. A map of the area specifies identified radio frequency based tags and their respective locations within the area. A mobile device reads beacons in proximity to the radio frequency based tags and sends location update messages to a server that detects rogue radio frequency based devices within the area based on the location update messages and the map. | 05-01-2014 |
Anubhuti Kaushik, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20150088810 | EFFICIENT COORDINATION ACROSS DISTRIBUTED COMPUTING SYSTEMS - A first computer of a distributed computing system receives a request for a transaction. The transaction is an eXtended Architecture (XA) protocol based global transaction. The first computer generates a unique identifier for the request. The first computer sends the unique identifier to a second computer of the distributed computing system. The unique identifier enables the second computer to participate with the first computer as an XA protocol based resource participant. | 03-26-2015 |
20150088956 | EFFICIENT COORDINATION ACROSS DISTRIBUTED COMPUTING SYSTEMS - A first computer of a distributed computing system receives a request for a transaction. The transaction is an eXtended Architecture (XA) protocol based global transaction. The first computer generates a unique identifier for the request. The first computer sends the unique identifier to a second computer of the distributed computing system. The unique identifier enables the second computer to participate with the first computer as an XA protocol based resource participant. | 03-26-2015 |
20150256599 | DYNAMIC TRANSACTION COORDINATION - A first computer of a distributed computing system, which is an object-oriented enterprise based application server, receives a request for a transaction. The first computer generates a unique identifier for the transaction and associates an indicator with the transaction. The indicator indicates whether coordination of transaction processing can be performed by a second computer, of the distributed computing system, that is any application server apart from an object-oriented enterprise based application server. The first computer sends the unique identifier and the indicator to the second computer which enables the second computer to participate as the coordinator for the processing of that transaction if coordination of transaction processing is permitted to be performed by the second computer. | 09-10-2015 |
Arvind Kaushik, Ghazlabad IN
Patent application number | Description | Published |
---|---|---|
20150146626 | METHOD FOR ADDING LEAF NODE TO MULTI-NODE BASE STATION - Adding a new subsystem node to a multi-node base station topology (e.g., a chain or tree topology) in a telecommunications network can disrupt the effective operation of the existing multi-node base station. By accurately measuring the timing difference between uplink and downlink signaling across a current terminating node during the configuration of the new terminating node, the new node can be added with reduced impact upon the operation of the existing base station nodes. | 05-28-2015 |
Arvind Kaushik, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20140094157 | Method and System for Automatically Controlling the Insertion of Control Word in CPRI Daisy Chain Configuration - A method and apparatus automatically controls the insertion of information flow data over a shared CPRI link ( | 04-03-2014 |
20150016444 | WIRELESS COMMUNICATION APPARATUS AND METHOD - A transmission node for use in a wireless communication network includes a first register for storing a set of first mask bits, a second register for storing a set of second mask bits, and a mask switching block for multiplexing the set of first mask bits and the set of second mask bits and outputting the set of third mask bits. The transmission node further includes a CPRI unit with an auxiliary interface for receiving the set of third mask bits. An activation block is connected between the CPRI unit and the mask switching block for causing the mask switching block to output the set of second mask bits based on data in a current frame in the CPRI unit. | 01-15-2015 |
20150016445 | WIRELESS COMMUNICATION APPARATUS AND METHOD - A transmission node for use in a wireless communication network includes a first CPRI unit for transmitting auxiliary data to a second CPRI unit in the transmission node. A memory unit stores control word data of the auxiliary data. A memory write block is connected between the first CPRI unit and the memory unit for writing the control word data to the memory unit based on a first set of frame timing signals received from the first CPRI unit. A memory read and merge block is connected to the memory unit for reading the control word data stored in the memory unit based on a second set of frame timing signals, merging the control word data with IQ data, and transmitting the merged auxiliary data to the second CPRI unit. | 01-15-2015 |
20160041579 | TIMING SYNCHRONIZATION CIRCUIT FOR WIRELESS COMMUNICATION APPARATUS - A transmission node includes a digital front-end device that provides functional clocks for JESD204B based data transmission. The front-end device includes a PLL for generating a phase locked clock based on a device clock of the front-end device, a clock dividing unit for generating the functional clocks by dividing the phase locked clock, a clock gating unit connected between the PLL and the clock dividing unit, and a system reference signal sampling unit for timing radio frame boundaries. The clock gating unit gates the phase locked clock to align the functional clocks with the device clock within a predetermined number of cycles of the phase locked clock, upon locking of the PLL or receipt of a system resynchronization request. The system reference signal sampling unit samples the system reference signal with zero-cycle latency between device clock and phase locked clock. | 02-11-2016 |
Atul Kaushik, Navi Mumbai IN
Patent application number | Description | Published |
---|---|---|
20140072628 | STABLE PHARMACEUTICAL COMPOSITION OF SAXAGLIPTIN - Disclosed herein is a stable pharmaceutical composition comprising a substrate having deposited on its surface a layer comprising saxagliptin or pharmaceutically acceptable salts thereof, wherein a seal coat is not present between the substrate and the saxagliptin layer. | 03-13-2014 |
Atul Kaushik, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20090068266 | SIROLIMUS HAVING SPECIFIC PARTICLE SIZE AND PHARMACEUTICAL COMPOSITIONS THEREOF - Sirolimus particles having d | 03-12-2009 |
20090130210 | PHARMACEUTICAL COMPOSITIONS OF SIROLIMUS - A pharmaceutical composition of sirolimus comprising an inert core and a sugar overcoat, wherein said sugar overcoat comprises sirolimus, a poloxamer other than poloxamer 188, microcrystalline cellulose and binder has been developed. | 05-21-2009 |
Balakumar Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090037679 | DATA MIGRATION WITHOUT INTERRUPTING HOST ACCESS - A system includes a source storage device, a target storage device, a host coupled to the source storage device and the target storage device, and a first migration device coupled to the source storage device and the target storage device. The first migration device includes a first virtual storage device. The first migration device is configured to migrate data from the source storage device to the target storage device, and the first virtual storage device is configured to receive write access requests for the data from the host during the data migration and send the access request to the source storage device and target storage device. | 02-05-2009 |
20130080827 | DATA MIGRATION WITHOUT INTERRUPTING HOST ACCESS - A system includes a source storage device, a target storage device, a host coupled to the source storage device and the target storage device, and a first migration device coupled to the source storage device and the target storage device. The first migration device includes a first virtual storage device. The first migration device is configured to migrate data from the source storage device to the target storage device, and the first virtual storage device is configured to receive write access requests for the data from the host during the data migration and send the access request to the source storage device and target storage device. | 03-28-2013 |
Ganesan Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130047135 | ENTERPRISE COMPUTING PLATFORM - Various technologies related to an enterprise computing platform are presented. A new level of software development can be achieved by avoiding the coding process. An enterprise computing platform having a variety of frameworks can be configured to operate in a variety of business domains. Features such as parallel computing, distributed computing, logical documents, document transformation, space visualization, data security, and others can be accomplished via configuration rather than coding. Considerable efficiency improvements in the software development process can be realized. | 02-21-2013 |
Geetesh Kaushik, Uttar Pradesh IN
Patent application number | Description | Published |
---|---|---|
20100317849 | Process For Producing Pure And Stable Form Of 2-Methyl-4-(4-Methyl-1-Piperazinyl) -10H-Thieno[2,3-B] [1,5] Benzodiazepine - Disclosed is an improved process for producing pure and thermally color stable crystalline Form I of 2-methyl-4-(4-methyl-1-piperazinyl)-10H-thieno[2,3-b][1,5]benzodiazepine and product thereof. The process comprises of reacting 2-(2-aminoanilino)-5-methylthiophene-3-carbonitrile with N-methyl piperazine in conjunction with N-methylpiperazine acid salt, to produce 2-methyl-4-(4-methyl-1-piperazinyl)-10H-thieno[2,3-b][1,5]benzodiazepine. Also disclosed is a process for obtaining the Polymorphic Form I of 2-methyl-4-(4-methyl-1-piperazinyl)-10H-thieno[2,3-b][l,5J benzodiazepine by crystallizing the crude 2-methyl-4-(4-methyl-1-piperazinyl)-10H-thieno[2,3-b][1,5]benzodiazepine in a mixture of solvents. Further the invention also provides a new polymorph of Olanzapine, dihydrate Form Ji and process for its preparation and a new hydrate Form J | 12-16-2010 |
Kulvaibhav Kaushik, Jaipur IN
Patent application number | Description | Published |
---|---|---|
20140122900 | PROVIDING SEARCHING OVER ENCRYPTED KEYWORDS IN A DATABASE - The present invention relates to a computer-implemented method, system and computer readable medium for providing a searching over encrypted keywords in a database. The method comprises the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found. | 05-01-2014 |
20150229611 | KEYWORD ORDERED STORAGE, SEARCH AND RETRIEVAL ON ENCRYPTED DATA FOR MULTIUSER SCENARIO - A method and system for a multi-user searchable encryption system over ordered keywords is disclosed. The system includes a key generation server which issues a primary key to a user terminal device and a secondary key to a proxy server. A trapdoor is sent by the user terminal and received by the proxy server. The trapdoor is encrypted at the proxy server. The proxy server receives cypher text from the user terminal and sends the cypher text to the database server. A search keyword inputted by the user at the user terminal is used to perform a lookup in encrypted data. | 08-13-2015 |
Mahabir Prashad Kaushik, Pradesh IN
Patent application number | Description | Published |
---|---|---|
20100197781 | Anti-Malarial Compound Isolated from Gomphostema Niveum - The present invention provides an antimalarial compound 3-[2-(2-Hydroxymethyl-1, 4a, 5-trimethyl-7-oxo-1,2,3,4,4a, 7 8, 8a-octahydronaphthalen-1-yl)-ethyl]-5H-furan-2-one of the formula 1 given below | 08-05-2010 |
20100203179 | Bioactive Water Fraction from Gomphostema Niveum - The present invention relates to a novel bioactive water fraction obtained from the leaves of an herb named | 08-12-2010 |
20130052287 | BIOACTIVE WATER FRACTION FROM GOMPHOSTEMA NIVEUM - The present invention relates to a novel bioactive water fraction obtained from the leaves of an herb named | 02-28-2013 |
Mohit Kaushik, Muzaffarnagar IN
Patent application number | Description | Published |
---|---|---|
20130169454 | System and Method for a Successive Approximation Analog to Digital Converter - In accordance with an embodiment, a method of performing a successive approximation analog-to-digital (A/D) conversion includes determining a voltage range of an analog input voltage in a single cycle using a multi-bit flash A/D converter, determining an initial D/A value for a successive approximation based on determining the voltage range, and successively approximating the analog input voltage. Successively approximating includes providing the initial D/A value to a D/A converter, comparing an output of the D/A converter with the analog input voltage, and determining a further D/A value based on the comparing. | 07-04-2013 |
Mudit Kaushik, Meerut IN
Patent application number | Description | Published |
---|---|---|
20130339321 | METHOD, SYSTEM, AND COMPUTER-READABLE MEDIUM FOR PROVIDING A SCALABLE BIO-INFORMATICS SEQUENCE SEARCH ON CLOUD - The present invention relates to a computer-implemented method, system and computer readable medium for providing a scalable bio-informatics sequence search on cloud. The method comprises the steps of partitioning a genome data into a plurality of datasets and storing the plurality of data sets in a database. Receiving at least one sequence search request input and searching for a genome sequence in the database corresponding to the search request input and scaling of the sequence search based on the sequence search request input. | 12-19-2013 |
20140289412 | SYSTEMS AND METHODS FOR ALLOCATING ONE OR MORE RESOURCES IN A COMPOSITE CLOUD ENVIRONMENT - This technology relates to a device, method, and non-transitory computer readable medium for allocating one or more resources optimally in a composite cloud environment. This technology involves configuring organization and service level quota values, describing service composition, service unit, service level agreement, defining allocation model and resource allocation optimization algorithm. Based on these predefined rules the infrastructure, software and manual resources are assigned, future allocation is forecasted and resources are allocated to complete the service requests received from the users. | 09-25-2014 |
20140379539 | SYSTEMS AND METHODS FOR GENERATING BILLING DATA OF A COMPOSITE CLOUD SERVICE - The technique relates to a system and method for generating billing data of a composite cloud service. The technique tracks and meters manual service usage along with the infrastructure and software usage to generate billing data for the composite cloud service. The technique involves receiving a user request for the composite cloud service. After receiving the user request, one or more infrastructure, software and manual resources required to fulfill the user request are provisioned. Thereafter, the consumption of the one or more infrastructure, software and manual resources in real time to fulfill the user request is measured based on a predefined monitoring metrics. Finally, billing data for the composite cloud service is generated based on the measured consumption data of the one or more infrastructure, software and manual resources, a predefined chargeback model and a predefined billing policy. | 12-25-2014 |
Mudit Kaushik, Mawana (meerut) IN
Patent application number | Description | Published |
---|---|---|
20120260134 | METHOD FOR DETERMINING AVAILABILITY OF A SOFTWARE APPLICATION USING COMPOSITE HIDDEN MARKOV MODEL - The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components are identified and also the state of the sub-components is determined. The state of the sub-components is represented in CHMM using state space diagram. The failure rate and recovery time of the sub-components is computed using the state space diagram and the respective transition tables are derived from the CHMM to determine the availability of the layers. The availability of the layers is combined to determine the availability of the software application. | 10-11-2012 |
Mudit Kaushik, Subhash Bazaar Mawana (meerut) IN
Patent application number | Description | Published |
---|---|---|
20120259963 | SYSTEM AND METHOD FOR FAST SERVER CONSOLIDATION - System and computer-implemented method for determining optimal combinations of elements having multiple dimensions, including determining the optimal number of destination servers for server consolidation, wherein existing servers are evaluated across multiple dimensions. | 10-11-2012 |
20130305245 | METHODS FOR MANAGING WORK LOAD BURSTS AND DEVICES THEREOF - A method, non-transitory computer readable medium, and resource management computing device comprises identifying one or more workload bursts in a production environment. One or more additional resources in a non-production environment required to manage the one or more workload burst in a production environment is determined by comparing an environment resource consumption value against a permissible maximum value, wherein the environment resource consumption value is a value indicating usage of each of the one or more resources. One or more additional resources are identified in the non-production environment. The identified one or more additional resources are provided to handle the one or more workload bursts. | 11-14-2013 |
20140149566 | SYSTEM AND METHOD FOR DETERMINING OPTIMAL COMBINATIONS - A computer-implemented method, apparatus, and non-transitory computer-readable medium for determining optimal combinations of elements having multiple dimensions, including removing all multi-dimensional elements from a combination matrix which have a dimension corresponding to a highest classification in a plurality of classifications, iteratively combining one or more multi-dimensional elements from a first end of the combination matrix and one or more multi-dimensional elements from a second end of the combination matrix to generate one or more combined multi-dimensional elements, incrementing a count of packed combinations when a combined multi-dimensional element in the one or more combined multi-dimensional elements has a dimension corresponding to the highest classification in the plurality of classifications, and removing a combined multi-dimensional element in the one or more combined multi-dimensional elements from the combination matrix when the combined multi-dimensional element has a dimension corresponding to the highest classification in the plurality of classifications. | 05-29-2014 |
Navin Kaushik, Haryana Gurgaon IN
Patent application number | Description | Published |
---|---|---|
20130179984 | method for controlling the execution of an application on a computer system - A method for controlling the execution of a software application on a computer system. The method includes the steps of generating a license map based on a given license for the application, the license map including the information on which user is allowed to execute the application, providing a license client on the computer system and providing a license server delivering the license map to the license client. When a user requests execution of the application, the license client decides whether the user is allowed to execute the application based on the license map. | 07-11-2013 |
Navneet Kaushik, Padam Nagar IN
Patent application number | Description | Published |
---|---|---|
20140089874 | Method and Apparatus for Optimizing Memory-Built-In-Self Test - Testing of memories is done using an optimized memory built-in-self-test (MBIST) approach, including the generation of compact models for memory. Cost functions are constructed from estimated parameters affecting MBIST, and a user is able to assign relative weights to the parameters. Estimated parameters include MBIST area, wiring congestion, and timing overhead, as well as power consumption and timing. The cost functions are minimized using optimization techniques, resulting in an optimized grouping of memory devices and an optimized schedule for MBIST testing. The estimated parameters may be derived from a compact model constructed from data experimentally-derived from various memory devices. This approach allows a circuit designer to generate and revise groupings and schedules prior to running a full design flow, saving time and cost, while still achieving high-quality results. | 03-27-2014 |
20140089875 | Method and Apparatus for Optimizing Memory-Built-In-Self Test - Testing of memories is done using an optimized memory built-in-self-test (MBIST) approach, including the generation of compact models for memory. Cost functions are constructed from estimated parameters affecting MBIST, and a user is able to assign relative weights to the parameters. Estimated parameters include MBIST area, wiring congestion, and timing overhead, as well as power consumption and timing. The cost functions are minimized using optimization techniques, resulting in an optimized grouping of memory devices and an optimized schedule for MBIST testing. The estimated parameters may be derived from a compact model constructed from data experimentally-derived from various memory devices. This approach allows a circuit designer to generate and revise groupings and schedules prior to running a full design flow, saving time and cost, while still achieving high-quality results. | 03-27-2014 |
Nishant Kaushik, Bahadurgarh IN
Patent application number | Description | Published |
---|---|---|
20150095430 | METHOD AND APPARATUS FOR AUTOMATICALLY AGGREGATING METADATA AND E-MAIL ATTACHMENTS FROM VARIOUS E-MAIL PROVIDERS IN A CLOUD REPOSITORY - A computer implemented method and apparatus for automatically aggregating metadata and e-mail attachments from various e-mail providers in a cloud repository. The method comprises accessing account information for one or more related e-mail accounts; accessing one or more e-mails from the one or more e-mail accounts using the received account information, wherein the one or more e-mails comprise one or more documents as one or more attachments; extracting metadata from each e-mail in the one or more e-mails that comprises at least one attachment, wherein the metadata comprises information that identifies the attachment and an associated e-mail; and storing the metadata in a cloud repository. | 04-02-2015 |
20150319198 | CROWDSOURCING FOR DOCUMENTS AND FORMS - Techniques are disclosed for making an electronic document easier to use based on prior interactions with the same or a similar document by other users. An electronic document is presented to one or more users in an interactive environment. Interactions between the users and the document can be recorded as usage data. The usage data may represent one or more operations performed on the electronic document by the users. Based on the usage data, an enhanced user interaction feature associated with the document is configured. The electronic document and the enhanced user interaction feature are then presented to another user in another interactive environment. The enhanced user interaction feature makes using the document easier than it would be if the feature was not present, particularly for users who are unfamiliar with the document. | 11-05-2015 |
Nutan Kaushik, New Delhi IN
Patent application number | Description | Published |
---|---|---|
20120128648 | Novel Biopesticide Compositions And Method For Isolation And Characterization Of Same - The present invention describes the isolation and characterization of the novel biopesticide compositions and/or biopesticide formulations obtained from | 05-24-2012 |
Poonam Kaushik, Gurgaon IN
Patent application number | Description | Published |
---|---|---|
20140378472 | AMORPHOUS VILAZODONE HYDROCHLORIDE, A PROCESS FOR ITS PREPARATION AND PHARMACEUTICAL COMPOSITIONS THEREOF - The present invention relates to amorphous vilazodone hydrochloride, its process of preparation and pharmaceutical composition thereof. | 12-25-2014 |
Poonam Kaushik, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20150025080 | SOLID DISPERSIONS OF SITAGLIPTIN AND PROCESSES FOR THEIR PREPARATION - The present invention provides processes for the preparation of amorphous form of sitagliptin dihydrogen phosphate. It also provides a solid dispersion of sitagliptin dihydrogen phosphate, including in the amorphous form, and processes for its preparation. | 01-22-2015 |
20150031732 | FEBUXOSTAT SOLID DISPERSION - The present invention provides a solid dispersion of febuxostat, processes for its preparation, pharmaceutical compositions comprising it and its use for the chronic management of hyperuricemia in patients with gout. | 01-29-2015 |
Puneet Kaushik, Ghaziabad IN
Patent application number | Description | Published |
---|---|---|
20120221622 | SYSTEM AND METHOD FOR UNLOCKING A DEVICE REMOTELY FROM A SERVER - Systems and methods for unlocking a device remotely from a server, where the device is connected locally to a client, and the server is remote to the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a remote unlocking module configured to monitor, at the server, traffic between a secure application and a virtual bus driver for at least one string descriptor request associated with switching an interface of the device from a first interface type to a second interface type, and to intercept the at least one string descriptor request. The system further includes an agent configured to receive the intercepted at least one string descriptor request, and to send the intercepted at least one string descriptor request from the server to the client over a network. | 08-30-2012 |
20120222124 | SYSTEM AND METHOD FOR FACILITATING UNLOCKING A DEVICE CONNECTED LOCALLY TO A CLIENT - Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a proxy configured to receive, at the client, at least one string descriptor request from the server over a network, where the at least one string descriptor request is associated with switching an interface of the device from a first interface type to a second interface type. The system further includes a stub driver configured to receive the at least one string descriptor request from the proxy, and to direct the at least one string descriptor request to the device. | 08-30-2012 |
20130111561 | SYSTEM AND METHOD FOR PROVIDING PRIVATE SESSION-BASED ACCESS TO A REDIRECTED USB DEVICE OR LOCAL DEVICE | 05-02-2013 |
20130297792 | SYSTEM AND METHOD FOR PROVIDING SESSION-LEVEL ACCESS MANAGEMENT OF ACCESS REQUESTS TO A REDIRECTED DEVICE FROM A PREDETERMINED SESSION - Managing access requests to a device is provided. The operations may include determining that a device stack corresponds to the device that is remote to the server and is connected locally to a client that is remote to the server, the device stack comprising one or more device objects; attaching a device access restriction object on top of the device stack; facilitating restriction of access to the one or more device objects from sessions different from a session associated with the device; receiving, at the device access restriction object, an access request to the device; and determining, at the device access restriction object, whether the access request is allowed access to the device. The access request may be allowed if a session from which the access request is received is a predetermined session. | 11-07-2013 |
20130297813 | SYSTEM AND METHOD FOR PROVIDING SESSION-LEVEL ACCESS MANAGEMENT OF A REDIRECTED DEVICE - Managing access restriction to a device is provided. The operations may include determining that a device stack corresponds to a device that is remote to the server and is connected locally to a client that is remote to the server; attaching a device access restriction object on top of the device stack; receiving, at the device access restriction object, an access request to the device; and determining, at the device access restriction object, whether the access request is allowed access to the device. | 11-07-2013 |
20140040470 | SYSTEM AND METHOD FOR PROVIDING PRIVATE SESSION-BASED ACCESS TO A REDIRECTED USB DEVICE OR LOCAL DEVICE - Restricting access to a device from a server, where the device is remote to the server and is connected locally to a client that is remote to the server, is described. The operations may include facilitating interception, at the server, of a function call to create a symbolic link; facilitating determination that the intercepted function call to create the symbolic link corresponds to a device object associated with the device that is remote to the server and is connected locally to a client that is remote to the server; facilitating obtaining configuration data indicating whether access to the device is to be restricted; and facilitating creation of the symbolic link in a local namespace of an object manager namespace of the server, upon obtaining configuration data indicating that access to the device is to be restricted. | 02-06-2014 |
20150244766 | SYSTEM AND METHOD FOR PROVIDING PRIVATE SESSION-BASED ACCESS TO A REDIRECTED USB DEVICE OR LOCAL DEVICE - Restricting access to a device from a server, where the device is remote to the server and is connected locally to a client that is remote to the server, is described. The operations may include facilitating interception, at the server, of a function call to create a symbolic link; facilitating determination that the intercepted function call to create the symbolic link corresponds to a device object associated with the device that is remote to the server and is connected locally to a client that is remote to the server; facilitating obtaining configuration data indicating whether access to the device is to be restricted; and facilitating creation of the symbolic link in a local namespace of an object manager namespace of the server, upon obtaining configuration data indicating that access to the device is to be restricted. | 08-27-2015 |
Ritu Kaushik, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20110177180 | HERBAL COMPOSITION AND METHOD FOR THE TREATMENT OF VIRAL INFECTION - The present invention relates to a herbal composition comprising extract of the plant | 07-21-2011 |
20130323341 | ANTIVIRAL COMPOSITIION - The present invention relates to a composition comprising extract of the plant | 12-05-2013 |
Saha Kaushik, Shamnath Marg IN
Patent application number | Description | Published |
---|---|---|
20090154558 | METHOD FOR ADAPTIVE BIASING OF FULLY DIFFERENTIAL GAIN BOOSTED OPERATIONAL AMPLIFIERS - Rate control algorithms are adapted to cover multiple encoding standards are described. A rate controller includes an input adaptation interface, a core rate controller, and an output adaptation interface. The input adaptation interface converts rate control input parameters of a target encoding standard to corresponding native control input parameters of the rate controller. The core rate controller is coupled to the output of the input adaptation interface generating output parameters conforming to its native encoding standard. The output adaptation interface is coupled to the output of the core rate controller converting the generated output parameters to equivalent rate control output parameters conforming to the target encoding standard. | 06-18-2009 |
Sandeep Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160071263 | SYSTEM AND METHOD FOR IMAGE INTENSITY BIAS ESTIMATION AND TISSUE SEGMENTATION - A system and method for estimating image intensity bias and segmentation tissues is presented. The system and method includes obtaining a first image data set and at least a second image data set, wherein the first and second image data sets are representative of an anatomical region in a subject of interest. Furthermore, the system and method includes generating a baseline bias map by processing the first image data set. The system and method also includes determining a baseline body mask by processing the second image data set. In addition, the system and method includes estimating a bias map corresponding to a sub-region in the anatomical region based on the baseline body mask. Moreover, the system and method includes segmenting one or more tissues in the anatomical region based on the bias map. | 03-10-2016 |
Sandeep Suryanarayana Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130281825 | ATTENUATION CORRECTION IN POSITRON EMISSION TOMOGRAPHY USING MAGNETIC RESONANCE IMAGING - In one embodiment, a method includes performing a magnetic resonance (MR) imaging sequence to acquire MR image slices or volumes of a first station representative of a portion of a patient; applying a first phase field algorithm to the first station to determine a body contour of the patient in the first station; identifying a contour of a first anatomy of interest within the body contour of the first station using the first phase field algorithm or a second phase field algorithm; segmenting the first anatomy of interest based on the identified contour of the first anatomy of interest; correlating first attenuation information to the segmented first anatomy of interest; and modifying a positron emission tomography (PET) image based at least on the first correlated attenuation information. | 10-24-2013 |
20150276906 | SYSTEMS AND METHODS FOR MAGNETIC RESONANCE BONE DEPICTION - Systems and methods of classifying component tissues of magnetic resonance images, where the method includes performing a proton density weighted, short echo-time magnetic resonance imaging measurement over a first volume field-of-view region of interest (ROI), repeating a series refining the first volume field-of-view ROI into a plurality of subsequent smaller ROI volumes having respective smaller resolutions, reconstructing a complex image from the plurality of magnetic resonance imaging measurements, performing a bias correction on at least one of the plurality of subsequent smaller ROI volumes, and classifying the ROI volumes by tissue type based on the bias-corrected image signal, wherein at least one tissue type is bone. A non-transitory medium containing processor instructions and a system are disclosed. | 10-01-2015 |
Shreyas Satyanand Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150271099 | STATELESS SERVICES IN CONTENT MANAGEMENT CLIENTS - Techniques to provide stateless services in a content management client are disclosed. A session manager is instantiated to service a request to access a content item. The session manager is used to obtain from a global session pool that is not specific to the session manager a session to service the request. The session is used to service the request. Once the request has been completed the session manager may be terminated, but the global session pool and associated object cache remain. | 09-24-2015 |
Shyam Kaushik, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090327626 | METHODS AND SYSTEMS FOR MANAGEMENT OF COPIES OF A MAPPED STORAGE VOLUME - Methods and systems for rapid creation of copies of a mapped storage volume. A new copy of a mapped storage volume is created by copying the mapping table and updating meta-data associated with the new copy and any ancestral parents thereof. The physical blocks remain untouched when creating a new copy as does any meta-data associated with the physical blocks. Rather, reference meta-data associated with each physical block is updated only in response to processing of a write request to an identified block of an identified copy of the mapped storage volume. Thus copy creation is rapid as compared to prior techniques reliant on reference counters. | 12-31-2009 |
20100005255 | Method for providing atomicity for host write input/outputs (I/Os) in a continuous data protection (CDP)-enabled volume using intent log - The present invention is a method for providing atomicity for host write Input/Outputs (I/Os) in a Continuous Data Protection (CDP)-enabled volume. When a host overwrite Input/Output (I/O) is initiated by a host against a data block of the CDP-enabled volume, the method may include creating an in-flight write log entry and providing the in-flight write log entry to an in-flight write log of the CDP-enabled volume. The in-flight write log entry may correspond to the host overwrite I/O. The method may further include locating mapping table information in a mapping table of the CDP-enabled volume. The mapping table information may correspond to the data block. The method may further include recording a journal entry in a journal of the CDP-enabled volume. The journal entry may include a journal entry timestamp which corresponds to the host overwrite I/O. The method may further include allocating a storage location for the host overwrite I/O. | 01-07-2010 |
Shyam Kaushik, Koramangala IN
Patent application number | Description | Published |
---|---|---|
20100274886 | VIRTUALIZED DATA STORAGE IN A VIRTUALIZED SERVER ENVIRONMENT - Methods and systems for virtualizing a storage system within a virtualized server environment are presented herein. A computer network includes a first physical server configured as a first plurality of virtual servers. The computer network also includes a plurality of storage devices. The computer network also includes a first storage module operating on the first physical server. The first storage module is operable to configure the storage devices into a virtual storage device and monitor the storage devices to control storage operations between the virtual servers and the virtual storage device. The computer network also includes a second physical server configured as a second plurality of virtual servers. The second server includes a second storage module that is operable to maintain integrity of the virtual storage device in conjunction with the first storage module of the first physical server. | 10-28-2010 |
Sundarraj Kaushik, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20120166488 | MULTI-TENANT SYSTEM - Method(s) and system(s) for identifying an application behavior of a multi-tenant application for a tenant are described herein. The method includes determining whether a reference attribute of the multi-tenant application is encountered by the tenant. The reference attribute is an application attribute for which variations from a default behavior of the multi-tenant application are available. Based on the determining, it is ascertained whether a configuration template is defined for the tenant. Further, based on the ascertainment of the configuration template, the application behavior corresponding to the tenant is identified. The identified application behavior is provided to the multi-tenant application such that multi-tenant application exhibits the identified application behavior. | 06-28-2012 |
Vijay Kumar Kaushik, Vadodara IN
Patent application number | Description | Published |
---|---|---|
20130341563 | COMPOSITE ABSORBENT FOR CATALYST RESIDUES REMOVAL FROM POLYOLEFIN SOLUTION POLYMERIZATION MIXTURE - A solid shaped composite adsorbent for reducing deactivated catalyst residues and contaminants from a post polyolefin solution polymerization mixture is disclosed. The composite adsorbent comprises 70-90 wt % of an alumina component; 30-10 wt % of a clay component; and 0.5-3.5 wt % of at least one alkali metal component selected from the group consisting of elements in Group 1A of the modern periodic table. | 12-26-2013 |
Vipin Kumar Kaushik, Andhra Pradesh IN
Patent application number | Description | Published |
---|---|---|
20090099375 | process for the preparation of escitalopram - The present invention relates to an improved process for the preparation of Escitalopram of the Formula (I), which comprises, isolation of Diol compound as an oxalate salt, resolution of Diol compound and cyclization of resolved compound of Formula (VII). The present invention provides a process to obtain pure Diol compound by preparing its Oxalate salt, which is useful for resolution of enantiomers. | 04-16-2009 |
20100130744 | PROCESS FOR THE PREPARATION OF ARIPIPRAZOLE - The present invention relates to an improved process for the preparation of 7-[4-[4-(2,3-dichlorophenyl)-1-piper-azinyl]butoxy]-3,4-dihydro-2(1H)-quinolinone of Formula (I). | 05-27-2010 |