Adi
Adil Adi, Frisco, CA US
Patent application number | Description | Published |
---|---|---|
20130046704 | Recruitment Interaction Management System - A computer implemented method and system for managing recruitment interactions provides a recruitment interaction management platform (RIMP) that acquires profile information associated with multiple roles from multiple users and recruitment advisory information from one or more of the users and/or first external sources via a network, for creating one or more candidate profiles for candidates. The RIMP matches the candidate profiles with a recruiting requirement acquired from one or more of the users or second external sources via the network, based on matching criteria to generate a candidate list that matches the recruiting requirement; dynamically assigns a rating to each of the users based on their roles, the profile information, an outcome of a transaction performed between recruiters and the candidates, and predetermined rating criteria associated with the roles; and allocates incentives to each of the users based on the roles, the assigned rating, and predetermined incentive allocation criteria. | 02-21-2013 |
Christopher Nnanna Adi, Everett, WA US
Patent application number | Description | Published |
---|---|---|
20150075633 | VALVE AND METHOD OF RELIEVING OVERPRESSURE IN A FLUID SUPPLY SYSTEM - A valve is provided. The valve includes a housing including an interior and a side wall at least partially delimiting the interior, a valve element within the interior of the housing and configured to be selectively operable between an open position and a closed position. The valve element includes an interior and a side wall at least partially delimiting the interior of the valve element. The valve also includes a series of pressure relief devices within the side walls of the housing and the valve element. The series of pressure relief devices include at least one check valve and are configured to provide flow communication from the interior of the housing to exterior of the housing upon actuation of the at least one check valve. | 03-19-2015 |
Frederick H. Adi, Costa Mesa, CA US
Patent application number | Description | Published |
---|---|---|
20120254503 | POWER-SAFE DATA MANAGEMENT SYSTEM - Embodiments of the invention include systems and methods for recovering the system status and maintaining drive coherency after an unexpected power loss. In particular, these systems and methods reduce overhead for maintaining drive coherency by providing for pre-allocation of groups of write addresses and recording the pre-allocated groups of addresses to the non-volatile memory. Write processes can write to the pre-allocated group of addresses while the next group of addresses are pre-allocated and recorded to non-volatile memory. | 10-04-2012 |
Gayatri Adi, West Lafayette, IN US
Patent application number | Description | Published |
---|---|---|
20130024094 | METHODS FOR CONTROLLING COMBUSTION OF BLENDED BIOFUELS - A closed-loop control algorithm that reduces the increases in nitrogen oxides (NO | 01-24-2013 |
Kamel Adi, Gatineau CA
Patent application number | Description | Published |
---|---|---|
20120124639 | VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS - Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies. | 05-17-2012 |
Khaled Adi, Cambridge CA
Patent application number | Description | Published |
---|---|---|
20120000883 | CONTAINER WITH INTERNAL LIFT - A container having an internal lift has a base at its lower end and an open top at its upper end. A continuous wall extends upward from the base. A retainer is disposed on the inner surface of the container. A lift inserted in the container has a tray at its lower end and an elongated member extends upward from the tray. A plurality of spaced apart retainer contacting segments are disposed along the length of the elongated member. Each retainer contacting segment is capable of cooperating with the retainer in order to suspend the tray above the base of the container at a number of different pre-set vertical positions. Each vertical position corresponds to the location of a different retainer contacting segment. | 01-05-2012 |
20120000884 | Container With Adjustable Lift - A container having an internal lift has a base at its lower end and an open top at its upper end. A continuous wall extends upward from the base. A retainer is disposed on the inner surface of the container. A lift inserted in the container has a tray at its lower end and an elongated member extends upward from the tray. A plurality of spaced apart retainer contacting segments are disposed along the length of the elongated member. Each retainer contacting segment is capable of cooperating with the retainer in order to suspend the tray above the base of the container at a number of different pre-set vertical positions. Each vertical position corresponds to the location of a different retainer contacting segment. Alternatively, the elongated member can be flexible to enable it to be bent over a top of the container or around the retainer and rigid enough to maintain the position when it is bent or straightened. | 01-05-2012 |
Nikhil Adi, Omaha, NE US
Patent application number | Description | Published |
---|---|---|
20140255353 | COMPOSITIONS, KITS AND METHODS FOR TREATING OBESITY, DIABETES AND HYPERGLYCEMIA - Described herein are compositions, kits and methods for treating and preventing obesity and overweight, as well as treating and preventing hyperglycemia, in a subject (e.g., a human), based on the discoveries that reduced expression of miR-205 may be a cause of obesity, and that miR-411 regulates gluconeogenic genes by targeting transcription factors, respectively. The compositions, kits and methods for treating and preventing obesity and overweight involve increasing expression of one or more microRNAs (e.g., miR-205) involved in adipogenesis, and provide a new therapy for treating patients that have eating disorders and/or are predisposed to obesity, and that are obese or overweight. The compositions, kits and methods described herein for treating and preventing hyperglycemia involve increasing expression of miR-411 and provide a new therapy for treating hyperglycemia associated with, for example, type 2 diabetes. | 09-11-2014 |
Vinitkumar S. Adi, Duluth, GA US
Patent application number | Description | Published |
---|---|---|
20090027818 | Discrete Hot Swap and Overcurrent-Limiting Circuit - The present invention is directed towards a discrete protection circuit located on a circuit card, and systems and methods related thereto. The protection circuit protects circuit card components from an inrush current and overcurrent conditions. The discrete protection circuit includes a switch to control a delivered load current to an output port, an SCR which latches when an overcurrent condition is detected across a sense resistor, and a series of resistors and a capacitor that determines the retry delay subsequent to an overcurrent detection. Advantages of the discrete protection circuit of the invention over prior art integrated circuits include: lower parts counts, lower production costs, greater flexibility, and increased reliability. | 01-29-2009 |
Wael Adi, Braunschweig DE
Patent application number | Description | Published |
---|---|---|
20120002803 | SELF RECONFIGURING VLSI ARCHITECTURES FOR UNKNOWN SECRET PHYSICAL FUNCTIONS BASED CRYPTO SECURITY SYSTEMS - This invention describes the use of the features of modern reconfigurable and self-reconfigurable VLSI technology to design highly secure unknown and secret physical functions for security applications. Several examples of sample implementation scenarios for self-generated secret hard-wired cipher- and/or hash functions architectures are shown. A designed, true-random, electronic mutation process autonomously activates the creation of such secret unknown functions in a self-reconfiguring VLSI architecture. It is also shown that such mutation processes can be designed to evolve dynamically in a non-predictive manner to come up with highly secure physical security mechanisms and protocols. This self-evolving property of such functions offers a great security quality which can enhance the security and identification resilience of electronic units to levels similar to those only available in biological systems with highly accurate DNA identification and secured history tracing of living entities. The invention shows also that such unknown physical functions can be used to implement highly secure cryptographic protocols which were not possible before the availability of self-reconfiguring VLSI technology. The invention description shows also how to make use of unknown tamper-proof and secret physical mapping as hash functions and ciphers even if the exact architecture is not known to anybody. A primitive identification scenario with its core protocol using an unknown secret cipher is also described, offering high security stability and resilience. | 01-05-2012 |
20130072159 | METHOD FOR CRYPTOGRAPHICALLY VERIFIABLE IDENTIFICATION OF A PHYSICAL UNIT IN A PUBLIC, WIRELESS TELECOMMUNICATIONS NETWORK - A method for confirming identity of a physical unit (M) in an open, wireless telecommunications network, having the following steps: storing a secret identity (SIMEI) and an open identity (IMEI) in memory in the physical unit (M); receiving an identity request (IR) with a first parameter (CHv) from the testing device (P) at the physical unit (M); generating an electronic signature (SIGt) by means of a first cryptographic function (F | 03-21-2013 |
20140235207 | METHOD FOR CRYPTOGRAPHICALLY VERIFIABLE IDENTIFICATION OF A PHYSICAL UNIT IN A PUBLIC, WIRELESS TELECOMMUNICATIONS NETWORK - A method for identification of a physical unit (M) storing a secret identity (SIMEI) and an open identity (IMEI) in memory in a physical unit (M); generating a first parameter (CHv) in the testing device (P); sending an identity request (IR) with the first parameter (CHv) from the testing device (P) to the physical unit (M); generating an electronic signature (SIGt) by means of a first cryptographic function (F3) from the secret identity (SIMEI) and at least the first parameter (CHv) in the physical unit (M), and sending SIGt and the open identity (IMEI) to the testing device (P); and identifying the physical unit (M) by a comparison of the electronic signature (SIGt) sent and a corresponding electronic signature (SIGv) in the generated testing device (P). | 08-21-2014 |