Karim M.
Karim M. Adballa, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20110279473 | TRANSLATION OF REGISTER-COMBINER STATE INTO SHADER MICROCODE - An apparatus and method for translating fixed function state into a shader program. Fixed function state is received and stored and when a new shader program is detected the fixed function state is translated into shader program instructions. Registers specified by the program instructions are allocated for processing in the shader program. The registers may be remapped for more efficient use of the register storage space. | 11-17-2011 |
Karim M. Ayman, Richland, WA US
Patent application number | Description | Published |
---|---|---|
20130197109 | SUSPENDED-SLURRY REACTOR - An apparatus for generating a large volume of gas from a liquid stream is disclosed. The apparatus includes a first channel through which the liquid stream passes. The apparatus also includes a layer of catalyst particles suspended in a solid slurry for generating gas from the liquid stream. The apparatus further includes a second channel through which a mixture of converted liquid and generated gas passes. A heat exchange channel heats the liquid stream. A wicking structure located in the second channel separates the gas generated from the converted liquid. | 08-01-2013 |
Karim M. Chehayeb, Beirut LB
Patent application number | Description | Published |
---|---|---|
20140014212 | Thermodynamic Balancing of Combined Heat and Mass Exchange Devices - A carrier-gas mixture is directed through a fluid flow path in a combined heat and mass transfer device, which can be operated at sub-atmospheric pressure. Heat and mass are transferred from or to the carrier-gas mixture via interaction with a liquid composition that includes a vaporizable component in a liquid state to substantially change the content of the vaporizable component in the carrier-gas mixture via evaporation or condensation. The mass flow rate of the carrier-gas mixture is varied by extracting or injecting the carrier-gas mixture from at least one intermediate location in the fluid flow path, and/or the mass flow rate of the liquid composition is varied by extracting or injecting the liquid composition from at least one intermediate location in the fluid flow path; and the flow of the carrier-gas mixture or the liquid composition is regulated to reduce the average local enthalpy pinch in the device. | 01-16-2014 |
Karim M. El Defrawy, Irvine, CA US
Patent application number | Description | Published |
---|---|---|
20100122335 | System and Method for Filtering Unwanted Internet Protocol Traffic Based on Blacklists - A system and method for filtering unwanted Internet Protocol traffic based on blacklists receives a first blacklist containing a first plurality of Internet protocol addresses associated with unwanted Internet traffic. The system also operates a first plurality of access control lists adapted to block the unwanted Internet traffic from one of the first Internet protocol addresses listed in the first blacklist. The system also assigns a first weight to each of the first Internet protocol addresses based on a reliability of Internet traffic from each of the first Internet protocol addresses. Additionally, the system reduces a first number of the first access control lists to optimally trade off a number of desirable Internet protocol addresses blocked with a number of bad Internet protocol addresses blocked based on the first weight of each of the first Internet protocol addresses. | 05-13-2010 |
Karim M. El Defrawy, Santa Monica, CA US
Patent application number | Description | Published |
---|---|---|
20130031358 | WIRELESS NETWORK SECURITY - A method includes identifying a suspect node of a network that includes multiple nodes in wireless communication. The method also includes initiating formation of a sub-network of the network in response to identifying the suspect node. The suspect node is not a member of the sub-network. After formation of the sub-network, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-network is configured to enable second communications between members of the sub-network, where the second communications are communicated in a manner that is secured against access by the suspect node. | 01-31-2013 |
20140143536 | WIRELESS NETWORK SECURITY - A method includes identifying a suspect node of a network. The method also includes initiating formation of a sub-network of the network by identifying neighbor nodes of the suspect node and sending an invitation message to a first neighbor node to invite the first neighbor node to the sub-network. The invitation message is encrypted using a first encryption key associated with the first neighbor node. The invitation message is not sent to a second node that is identified as a neighbor node only by the suspect node. The sub-network is configured to enable first communications between members of the sub-network. The first communications are communicated in a manner that is secured against access by the suspect node. Subsequent to formation of the sub-network, second communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. | 05-22-2014 |