Saha, Kolkata
Abhijit Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20100011026 | METHOD AND SYSTEM FOR DYNAMICALLY COLLECTING DATA FOR CHECKPOINT TUNING AND REDUCE RECOVERY TIME - A system and method for checkpoint tuning in a computer environment comprising a processor coupled to a statistical database and at least one database or table manager and data log files. The data log files store data relating to the operations of the database or table manager. The processor executes a module that captures data comprising the number of operations, the time taken by the checkpoint process, folded journal entries, long running transactions, and the ratio of WRITE:READ operations. The processor then stores the captured data and processes the collected data, generating statistics therefrom. The statistical data is stored in the statistical database. The system selects checkpoint intervals based on the data statistics; and implements the checkpoint intervals. | 01-14-2010 |
Ajoy K. Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20160039673 | PROCESS FOR MAKING PRECISION NANOPARTICLES BY HYDROTHERMAL FLOW MANUFACTURING - A continuous reaction system (CRS) allows a method to prepare quantum dots (QDs) in a continuous manner with high precision. The CRS pumps a plurality of reagent fluids into one or more mixing sites to form a reaction fluid that is carried through a heating chamber at elevated pressures to carry out hydrothermal growth of the QDs. The pumps and heating chamber are controlled with a high precision by employing a detector downstream of the heating chamber to provide a signal that is dependent on the composition and size of the QDs. The signal is provided to a signal processor that provides a signal that control the flow rates and temperature parameters in the system. The QDs produced in this manner are consistent in size and composition and can be of a single semiconductor composition or can be core-shell QDs with a shell semiconductor formed on a core semiconductor. | 02-11-2016 |
Arindam Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20140139746 | SYSTEM AND METHOD FOR MULTIPLEXING VIDEO CONTENTS FROM MULTIPLE BROADCASTING CHANNELS INTO SINGLE BROADCASTING CHANNEL - A method and system for multiplexing of multiple channels of video data through a single analog broadcasting channel is disclosed. The method enables a spatial and temporal multiplexing of videos of each of the multiple channels. The multiplexed content is created as a result of multiplexing that is encoded to generate digital transport stream that is transmitted through analog medium. The system enables a STB receiver to decode each of the videos from the stream. At least one video from the multiple videos is played on the television based on user selection. | 05-22-2014 |
20140208379 | METHOD AND SYSTEM FOR EMBEDDING METADATA IN MULTIPLEXED ANALOG VIDEOS BROADCASTED THROUGH DIGITAL BROADCASTING MEDIUM - A method and system for broadcast of additional content such as metadata required for client specific interactive application in an analog domain along with conventional audio, video and PSI or SI data is disclosed. The present invention enables transmission of encoded audio data or EPG data, timestamp information required for audio video synchronization referred to as metadata by embedding such metadata in the pixels of video pixels and then encoding by the standard video encoder to generate an encoded stream. The encoded stream is decoded using the standard video decoder at the receiving station to generate a Composite Video Blanking and Sync (CVBS) analog video signal. From the CVBS signal, the RGB or YUV pixels of the videos are extracted. Finally a data extractor module retrieves the embedded metadata from the RGB or YUV pixels. | 07-24-2014 |
20140359657 | METHOD FOR EMBEDDING AND MULTIPLEXING AUDIO METADATA IN A BROADCASTED ANALOG VIDEO STREAM - A method for embedding, multiplexing and broadcasting of multiple audio metadata in an analog video stream and thereby generating output analog video containing multiple separable audio-video tuples of optimum quality. Further, a user study is performed on a sample tutorial video for various frame rates and resolution to calculate the mean opinion score for deriving the degree of multiplexing that may be provided without deteriorating the quality of video. | 12-04-2014 |
20150371396 | CONSTRUCTING A 3D STRUCTURE - Disclosed is a method and system for constructing a 3D structure. The system of the present disclosure comprises an image capturing unit for capturing images of an object. The system comprises of a gyroscope, a magnetometer, and an accelerometer for determining extrinsic camera parameters, wherein the extrinsic camera parameters comprise a rotation and a translation of the images. Further the system determines an internal calibration matrix once. The system uses the extrinsic camera parameters and the internal calibration matrix for determining a fundamental matrix. The system extracts features of the images for establishing point correspondences between the images. Further, the point correspondences are filtered using the fundamental matrix for generating filtered point correspondences. The filtered point correspondences are triangulated for determining 3D points representing the 3D structure. Further, the 3D structure may be optimized for eliminating reprojection errors associated with the 3D structure. | 12-24-2015 |
Avashek Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20140149336 | PROCESSING DATA USING SEQUENTIAL DEPENDENCIES - Methods and apparatus for processing data using sequential dependencies are disclosed herein. An example method includes modifying a first number of values in a sequence of a data set to generate a modified sequence such that each difference between each successive pair of values is within a threshold. A satisfiability metric is determined for the modified sequence based on a relationship between a number of modifications to the values in the sequence and a size of the sequence. | 05-29-2014 |
Avijit Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20100224467 | FIELD INTERCHANGEABLE AUXILLIARY SWITCH - Disclosed is an electrical circuit making and breaking switch including a housing and a first electrical contact located in the housing. A block mechanism is located in the housing and includes a second electrical contact and a stopper disposed in mechanical communication with the second electrical contact. The stopper is positionable in the block mechanism, wherein a change in the position in the stopper results in a change in a contact position of the second electrical contact relative to the block mechanism. Further disclosed is a lateral block mechanism for an electrical circuit making and breaking switch. The lateral block mechanism includes two carrier assemblies and a connecting piece located between the two carrier assembles and secured thereto. An electrical contact is located at at least one of the two carrier assemblies. | 09-09-2010 |
Avishek Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20110131170 | Processing data using sequential dependencies - The specification describes data processes for analyzing large data steams for target anomalies. “Sequential dependencies” (SDs) are chosen for ordered data and present a framework for discovering which subsets of the data obey a given sequential dependency. Given an interval G, an SD on attributes X and Y, written as X→G Y, denotes that the distance between the Y-values of any two consecutive records, when sorted on X, are within G. SDs may be extended to Conditional Sequential Dependencies (CSDs), consisting of an underlying SD plus a representation of the subsets of the data that satisfy the SD. The conditional approximate sequential dependencies may be expressed as pattern tableaux, i.e., compact representations of the subsets of the data that satisfy the underlying dependency. | 06-02-2011 |
Dipankar Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20090319981 | SYSTEM AND METHOD FOR GENERATING IMPLEMENTATION ARTIFACTS FOR CONTEXTUALLY-AWARE BUSINESS APPLICATIONS - A method for generating implementation artifacts for contextually-aware business applications includes utilizing a platform independent model (PIM) of a business application; generating a platform specific model (PSM) from the PIM, wherein the generating of a PSM includes one or more transformations between one or more meta-models of the PIM and one or more meta-models of the generated PSM; generating implementation artifacts; and binding the generated implementation artifacts with any existing services of the business application. | 12-24-2009 |
20100077386 | SYSTEM AND A METHOD FOR CROSS-PLATFORM PORTING OF BUSINESS APPLICATIONS AND MAKING THEM CONTEXUALLY-AWARE ON TARGET PLATFORMS - A method for cross-platform porting of applications includes extracting one or more platform independent models from an existing one or more composite applications running on a given source platform. These platform independent models are then transformed into implementation artifacts on another, target platform, thereby effectively porting the composite application from one platform to another. The generated implementation artifacts on the target platform leverage existing assets in the target environment, which makes these generated artifacts “contextually-aware”. | 03-25-2010 |
Diptikalyan Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20130006609 | METHOD, SYSTEM AND PROGRAM STORAGE DEVICE FOR AUTOMATIC INCREMENTAL LEARNING OF PROGRAMMING LANGUAGE GRAMMAR - The embodiments provide for automatic incremental learning of programming language grammar. A corpus (i.e., a text file of software code written in a particular programming language) is parsed based on a set of grammar rules. An unparsed statement from the corpus is identified along with a section thereof, which did not match any of the grammar rules in the set. A subset of the set of grammar rules at fault for the parsing failure is identified. Groups of new grammar rules are developed such that each group comprises at least one new grammar rule, such that each group can parse the unparsed statement, and such that each new grammar rule is a modification of grammar rule(s) in the subset. One specific group can then be selected for possible incorporation into the set of grammar rules. Optionally, before a specific group is selected, the groups can be heuristically pruned and/or ranked. | 01-03-2013 |
20130007722 | METHOD, SYSTEM AND PROGRAM STORAGE DEVICE THAT PROVIDE FOR AUTOMATIC PROGRAMMING LANGUAGE GRAMMAR PARTITIONING - Disclosed are embodiments a computer-implemented method, a system and an associated program storage device that provide for automatic programming language grammar partitioning to solve the “code too large” problem. The embodiments partition a particular programming language grammar into logical subsets based on a set of partitioning heuristics and using a dependency graph that is preprocessed so as to be devoid of any cyclically connected grammar rule nodes. For each logical subset, textual code for a corresponding portion of a parsing program can be generated and then converted into machine-readable code for that corresponding portion of the parsing program. Thus, small amounts of textual code for portions of a parsing program are discretely converted into machine-readable code, thereby avoiding the “code too large” problem. The machine-readable code for all portions of the parsing program can then be merged and the parsing program can be executed in order to parse a corpus. | 01-03-2013 |
Goutam Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20080287681 | Substituted Benzimidazoles and their Use for Inducing Apoptosis - The invention relates to compounds of formula (I) | 11-20-2008 |
Indranil Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20090249433 | SYSTEM AND METHOD FOR COLLABORATIVE MONITORING OF POLICY VIOLATIONS - A computer implemented system and method is used to receive user reports regarding potential security policy violations that describe observations by the user, the type of policy violation, and an identification of another user with potential knowledge of a security policy violation. A payoff matrix may be formed for each user submitting a user report regarding potential as well as actual security violations and for users identified in such reports, wherein the payoff matrix reflects payout data for reported and unreported security policy violations. The payoff matrix may be used to both reward and punish reporting behaviors. | 10-01-2009 |
20100007489 | ADAPTIVE LEARNING FOR ENTERPRISE THREAT MANAGMENT - A reactive approach to enterprise threat management provides a solution to the problem of prioritizing security violations. In an embodiment, a linear adaptive learning approach is aimed towards a system which could effectively assist security administrators to prioritize reported violations. The approach is adaptive in the sense that the system can change its logic over a course of time controlled only by some specified structural constraints. A learning aspect specifies that any mismatch between a system's response and the response of a security expert is propagated back to the system for adapting the difference such that the responses of the system should increasingly match against the security expert's responses over time. The presented algorithm learns and predicts simultaneously, continually improving its performance as it makes each new prediction and finds out how accurate it is. | 01-14-2010 |
20100010776 | PROBABILISTIC MODELING OF COLLABORATIVE MONITORING OF POLICY VIOLATIONS - A payoff matrix based collaborative monitoring model presents a formal framework for defining policies to assign different payoffs for different subjects corresponding to their reporting behavior against different policy violations. An embodiment such as a formal model can be used by security administrators to get better estimates on various factors affecting the required parameters controlling the payoff values, e.g., reporting behavior of users, group dynamics, characteristics of the violations, and likelihood of detection. The proposed model effectively complements the payoff matrix-based approach for enabling the collaborative monitoring of policy violations. | 01-14-2010 |
Maitreyee Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20160083284 | PROCESS FOR FABRICATION OF YTTERBIUM DOPED OPTICAL FIBER - The present invention provides a process for fabrication of ytterbium (Yb) doped optical fiber through vapor phase doping technique. The method comprises deposition of Al2O3 and Yb2O3 in vapor phase simultaneously in combination with silica during formation of sintered core layer. This is followed by collapsing at a high temperature in stepwise manner to produce the preform and drawing of fibers of appropriate dimension. The process parameters have been optimized in such a way that Al and Yb-chelate compounds can be transported to the reaction zone without decomposition and condensation of precursor materials. Thus variations of dopants concentration along the length of the preform have been minimized to <1% and good repeatability of the process has also been achieved. The resulting fibers also have smooth core-clad boundary devoid of any star-like defect. The process can be reliably adopted for fabrication of large core Yb doped optical fibers. The fibers also show low loss, negligible center dip and good optical properties suitable for their application as fiber lasers. | 03-24-2016 |
Rashmi Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20140143845 | System and Method for Password Recovery - A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password recovery vary according to the sensitivity of the password-protected material. Criteria for recovery of a password protecting sensitive information have more stringent criteria than criteria for recovery of passwords protecting less sensitive information. In certain embodiments, passwords may be recovered through the use of third party agents. Recovered passwords are associated with unique identifiers, such as email addresses and phone numbers that facilitate communication with a user. Recovered passwords may be transmitted to users via email, phone, and text message or by any other means associated with the unique identifier. | 05-22-2014 |
20160117499 | System and Method for Password Recovery - A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password recovery vary according to the sensitivity of the password-protected material. Criteria for recovery of a password protecting sensitive information have more stringent criteria than criteria for recovery of passwords protecting less sensitive information. In certain embodiments, passwords may be recovered through the use of third party agents. Recovered passwords are associated with unique identifiers, such as email addresses and phone numbers that facilitate communication with a user. Recovered passwords may be transmitted to users via email, phone, and text message or by any other means associated with the unique identifier. Biometric data may also be used to recover a password. | 04-28-2016 |
Samrat Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20090144820 | System, Method and Apparatus for Protecting a Network or Device Against High Volume Attacks - The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium. | 06-04-2009 |
Santanu Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20150261826 | METHODS FOR RECONCILING TRANSACTIONS AND DEVICES THEREOF - A method for reconciling transactions iteratively by segregating data into homogeneous data sets. The method includes acquiring transactions from two or more systems and comparing with a set of configurable predefined matching rules. Applying, based on the result of the comparison, one or more rules on the acquired transactions. The transactions of the two or more systems are scanned and a user defined function is applied on the transactions of the two systems. A value of the user defined function is calculated. If the value of the user defined function is residual value, a configurable criteria is applied on the value of the user defined function. A residual transaction is created in one of the systems and the value of the user defined function is recalculated. If the value of the user defined function is null value, indicates the transactions are reconciled. | 09-17-2015 |
Satadal Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20130188865 | IMAGE BINARIZATION BASED ON GREY MEMBERSHIP PARAMETER OF PIXELS - Briefly, in accordance with one aspect, a method of binarizing an image is provided. The method includes partitioning the image into a plurality of image segments, each image segment having a plurality of image pixels and partitioning each of the image segments into subsegments, each image subsegment having a plurality of image pixels. The method also includes estimating a grey membership parameter for each image pixel for each of the plurality of image segments and subsegments, combining the grey membership parameter for each of the plurality of image pixels from each of the plurality of image segments and subsegments to estimate a net grey membership parameter for each image pixel and assigning black or white color to each of the plurality of image pixels based on the estimated net grey membership parameter of the respective pixel. | 07-25-2013 |
Soumen Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20110313903 | METHOD AND SYSTEM FACILITATING AN END-TO-END SOLUTION FOR ONE OR MORE SERVICE OFFERINGS - A system and method facilitating an end-to-end solution for one or more service offerings. The end-to-end solution includes the modeling, provisioning, and rating of a single subscription as at least one of prepaid and postpaid. The system includes a CRM layer, an integration layer, a rating and billing management layer, and a service activation platform layer. | 12-22-2011 |
Sourav Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20150113496 | THERMALLY AWARE PIN ASSIGNMENT AND DEVICE PLACEMENT - Embodiments of the disclosure relate to methods for facilitating the design of an integrated circuit (IC) using thermally aware pin assignment and device placement. The method includes creating a layout for the IC, the layout including a plurality of macros each having devices and pin assignments and revising the layout for the IC by repositioning a macro or a device to meet a timing requirement of the IC. The method also includes creating a thermal map of the IC based on the layout for the IC and a workload model for the IC and identifying at least one thermally critical pin assignment based on the thermal map of the IC. The method includes revising the layout by repositioning a thermally critical pin assignment and a device. | 04-23-2015 |
20150331987 | VIRTUAL SUB-NET BASED ROUTING - A method and system to route connections of sub-networks in a design of an integrated circuit and a computer program product are described. The method includes determining a baseline route for each of the connections of each of the sub-networks, identifying noise critical sub-networks in the design of the integrated circuit based on congestion, and setting a mean threshold length (MTL), the MTL indicating a maximum length of each segment of each connection. Each segment includes a wirecode which is different from a wirecode of an adjacent segment, each wirecode defining a width, a metal layer, and a spacing for each segment. The method also includes segmenting the connections of the noise critical sub-networks based on the MTL, and re-routing the baseline route based on the segmenting. | 11-19-2015 |
20160070840 | INTEGRATED CIRCUIT DESIGN CHANGES USING THROUGH-SILICON VIAS - A method for adding an electrical interconnection within a three-dimensional integrated circuit (3-D IC) is disclosed. The method may include creating, within a design file of a 3-D IC that specifies a layout for a first chip of the 3-D IC, design data corresponding to a set of through-silicon via (TSV) reservation areas. The method may also include receiving an engineering change order (ECO) and releasing, in response to the ECO, at least one TSV reservation area for reuse. The method may also include adding, by re-using at least one TSV reservation area, an electrical interconnection within the design file of the first chip of the 3-D IC. | 03-10-2016 |
20160070842 | INTEGRATED CIRCUIT DESIGN CHANGES USING THROUGH-SILICON VIAS - A method for adding an electrical interconnection within a three-dimensional integrated circuit (3-D IC) is disclosed. The method may include creating, within a design file of a 3-D IC that specifies a layout for a first chip of the 3-D IC, design data corresponding to a set of through-silicon via (TSV) reservation areas. The method may also include receiving an engineering change order (ECO) and releasing, in response to the ECO, at least one TSV reservation area for reuse. The method may also include adding, by re-using at least one TSV reservation area, an electrical interconnection within the design file of the first chip of the 3-D IC. | 03-10-2016 |
20160071783 | THROUGH-SILICON VIA ACCESS DEVICE FOR INTEGRATED CIRCUITS - A through-silicon via access device (TSVAD) for establishing an electrical connection to a through-silicon via (TSV) located in a planar stack of semiconductor chips is disclosed. The TSVAD may include a switching circuit, having a conductive pad terminal, a TSV terminal, an input terminal coupled to a sending logic circuit, an output terminal coupled to a receiving logic circuit, and logic devices to, in response to control signals, couple the TSV terminal to the conductive pad terminal, in one configuration, and couple the TSV terminal to another terminal in another configuration. The TSVAD may also include a control circuit to generate control signals to cause an input selection circuit to drive a signal from the sending logic circuit onto the input terminal, and to cause an output selection circuit to drive a logic signal from the output terminal to the receiving logic circuit. | 03-10-2016 |
20160071786 | THROUGH-SILICON VIA ACCESS DEVICE FOR INTEGRATED CIRCUITS - A through-silicon via access device (TSVAD) for establishing an electrical connection to a through-silicon via (TSV) located in a planar stack of semiconductor chips is disclosed. The TSVAD may include a switching circuit, having a conductive pad terminal, a TSV terminal, an input terminal coupled to a sending logic circuit, an output terminal coupled to a receiving logic circuit, and logic devices to, in response to control signals, couple the TSV terminal to the conductive pad terminal, in one configuration, and couple the TSV terminal to another terminal in another configuration. The TSVAD may also include a control circuit to generate control signals to cause an input selection circuit to drive a signal from the sending logic circuit onto the input terminal, and to cause an output selection circuit to drive a logic signal from the output terminal to the receiving logic circuit. | 03-10-2016 |
Subhankar Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20090061822 | Method and apparatus for multiterminal support using bluetooth based audio gateway - Disclosed herein is a system for configuring and setting up a one to one communication correspondence between a headset and a mobile device. The authentication PIN allows communication of the headset with only those devices that are authenticated using the PIN. A first software application and a second software application are provided on the mobile device and a headset respectively. The process of configuring the PIN access information on the headset using the first and second application comprises the step of establishing a secure communication link by completing challenge response sequence between the headset and the device using the currently prevailing PIN, transmitting a configuration set PIN from the device to the headset, enforcing reauthentication using the newly configured PIN, and establishing and locking a communication between the device and the headset based on the new personal identification number. | 03-05-2009 |
Tarak Saha, Kolkata IN
Patent application number | Description | Published |
---|---|---|
20160118784 | NON-ISOLATED POWER SUPPLY OUTPUT CHASSIS GROUND FAULT DETECTION AND PROTECTION SYSTEM - A non-isolated power supply is configured to receive an input voltage and supply an output voltage, and includes a supply line, a return line, a first semiconductor switch coupled in series in the supply line, and a second semiconductor switch coupled in series in the return line. The first and second semiconductor switches are each configured to operate in an ON state and an OFF state. The differential current sensor is configured to sense differential current between the supply line and the return line. The fault detection logic is coupled to the differential current sensor, the first semiconductor switch, and the second semiconductor switch, and is configured to detect when the differential current exceeds a predetermined current magnitude, and command the first and second semiconductor switches to operate in the OFF state upon detecting that the differential current exceeds the predetermined current magnitude. | 04-28-2016 |