Doraiswamy
Anand Doraiswamy, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20150238754 | POLYMER FORMULATIONS FOR NASOLACRIMAL STIMULATION - Described herein are polymer formulations for facilitating electrical stimulation of nasal or sinus tissue. The polymer formulations may be hydrogels that are prepared by a UV cross-linking process. The hydrogels may be included as a component of nasal stimulator devices that electrically stimulate the lacrimal gland to improve tear production and treat dry eye. Additionally, devices and methods for manufacturing the nasal stimulators, including shaping of the hydrogel, are described herein. | 08-27-2015 |
Anand Doraiswamy, Goleta, CA US
Patent application number | Description | Published |
---|---|---|
20120130487 | INTRAOCULAR LENS - An intraocular lens comprises an optic and at least two haptics, each of which comprises a step feature that protrudes from a posterior surface of the haptic to prevent posterior capsular opacification. | 05-24-2012 |
20120130488 | INTRAOCULAR LENS - An intraocular lens comprises an optic and at least two haptics. Each haptic is offset in an anterior direction from a central optic plane of the optic. The offset allows for predictable posterior vaulting upon implantation. | 05-24-2012 |
20120327362 | COMPOSITE OPHTHALMIC DEVICES AND METHODS WITH INCIDENT LIGHT MODIFYING PROPERTIES - A composite ophthalmic device comprising an ophthalmic structure, means or lens having a photo-shifting material deployed thereon or therewithin so as to up-shift or down-shift the amplitude, wavelength (or both) of incident radiation into the visible wavelength range. | 12-27-2012 |
20130178935 | POLARIZED COMPONENT OCULAR DEVICES - Described are ocular devices such as intraocular lens preferably made of an organic polymeric material and an ultraviolet light absorber coated with a polarizing polymer component adjacent the edge thereof. A typical polarizing component is polyvinyl alcohol doped with iodine (PVA/I | 07-11-2013 |
20130255453 | VACUUM BLOCKING FOR MANUFACTURING OPTICAL DEVICES - A method of optical lens blank holding on a chuck using vacuum pressure to easily load and unload, and accurately and repeatedly position blanks concentrically with the axis of rotation of the chuck. | 10-03-2013 |
Gopalakrishnan Doraiswamy, Sterling Heights, MI US
Patent application number | Description | Published |
---|---|---|
20080290203 | ELECTROMECHANICAL SEAT BELT RETRACTOR - An electromechanical seat belt retractor has a seat belt retractor assembly having a spool rotationally moveable about an axis of rotation for winding and unwinding a seat belt; a motor for selectively rotating the spool; a clutch including an over-clutch driven by the motor through one or more gears; the clutch being coaxially aligned with the axis of rotation of the spool and linearly spaced from the spool; and wherein upon a forward actuation of the motor a clutch plate of the clutch linearly moves to engage the spool coupling to the spool and thereafter rotating the spool about the axis to initiate a winding of the seat belt. After the clutch plate engages the spool a reversal of the motor linearly moves the clutch plate away from the spool disengaging the spool. Preferably the clutch means is a Bendix type clutch assembly. In a preferred embodiment, the clutch plate first engages an over-clutch is fixed in a locking engagement to the spool. | 11-27-2008 |
Naveen Doraiswamy, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20150310245 | Embedding Information in an Image for Fast Retrieval - A binary bit-string is encoded in a circular image. The circular image encodes substrings of the bit-string in sectors of the circular image and includes redundant bits, error correcting codes, and metadata pertaining to the encoding scheme. To encode the bit-strings, a circular image is generated that includes a center ring and a first ring. Outward from the first ring, additional rings represent bits in the bit-string according to the width of each ring. The exterior of the image includes an outer boundary ring. The width of the boundary rings is used to define the widths representing the value of each ring. To extract a bit-string from an image, the center of the circular image is identified and a direction is selected to evaluate the image outward, determining the boundaries of each ring. The boundaries are analyzed to determine the width of each ring and the encoded bit values. | 10-29-2015 |
20150310431 | Secure Payments Using a Mobile Wallet Application - A payment system implemented on a mobile device authenticates transactions made via the mobile device. The mobile device generates a public-private key pair and receives an authenticating input from a user of the device. The public key is sent to a secure payment system, and the authenticating input is used to generate a symmetric key that encrypts the private key. After a transaction is initiated, the mobile device receives an authenticating input from the user. The symmetric key is generated from the authenticating input and the mobile device attempts to decrypt the private key from the encrypted private key using the symmetric key generated by the user's input. The decrypted key is used to sign a transaction authorization message which is sent to the secure payment system, along with payment information, which can verify the signed message via the public key. Additional techniques related to secure payments are also disclosed. | 10-29-2015 |
20150310436 | Securely Storing and Using Sensitive Information for Making Payments Using a Wallet Application - A payment system implemented on a mobile device authorizes and processes transactions. The mobile device generates a public-private key pair and receives payment information. The private key and the payment information are split into a local and a remote fragment. The public key, a private key fragment, and a payment information fragment are sent to a secure payment system, and the other fragments are stored on the mobile device. When a transaction is received by the mobile device to authorize, the mobile device sends a payment fragment to the secure payment system and receives a private key fragment from the secure payment system. The mobile device authorizes the transaction using the private key, recovered from the private key fragments. The secure payment system verifies the transaction using the public key and processes the transaction using the recovered payment information. Additional techniques to process transactions using data splitting are disclosed. | 10-29-2015 |
Pudugramam M. Doraiswamy, Durham, NC US
Patent application number | Description | Published |
---|---|---|
20140357525 | MARKERS FOR ALZHEIMER'S DISEASE AND MILD COGNITIVE IMPAIRMENT AND METHODS OF USING THE SAME - Disclosed herein are markers for diagnosing Alzheimer's Disease and/or mild cognitive impairment, for predicting risk of developing Alzheimer's Disease and/or mild cognitive impairment, and for monitoring the efficacy of treatment for Alzheimer's Disease and/or mild cognitive impairment. Also disclosed herein are methods of diagnosing Alzheimer's Disease and/or mild cognitive impairment in a subject in need thereof, for predicting risk of developing Alzheimer's Disease and/or mild cognitive impairment in a subject in need thereof, and for monitoring the efficacy of a treatment for Alzheimer's Disease and/or mild cognitive impairment in the subject. | 12-04-2014 |
Ravi C. Doraiswamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090106293 | MULTIDIMENSIONAL FORECASTING - An apparatus and method for multidimensional forecasting. In one embodiment of the method a database is accessed to select a set of data objects each of which has a date field that contains a date that falls within a predefined time period. The data contained in a first field of each of the set of data objects is summed thereby generating a first total. The data contained in the first field of each of a first subset of the set of data objects is summed thereby generating a first subset total. A user interface is then displayed on a monitor of a computer system, wherein the user interface, when displayed, comprises graphical representations of the first total and the first subset total. | 04-23-2009 |
Sangeeta Doraiswamy, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130151476 | PROCESSING ARCHIVE CONTENT BASED ON HIERARCHICAL CLASSIFICATION LEVELS - Processing archive content based on hierarchical classification levels is performed by indexing a first newly archived file of a current set of archive content at a first classification level defining a plurality of types of metadata to be derived, wherein the first classification level is selected from a hierarchy of classification levels having at least two classification levels, indexing a second newly archived file of the current set of archive content at a second classification level, wherein the second classification level includes fewer types of metadata than the first class of metadata, and flagging the second newly archived file of the current set of archive content. By classifying and flagging the second newly archived file differently than the first newly archived file, the system can easily retrieve such data at a later instance to update and/or change the data, re-index the data, and the like. | 06-13-2013 |
Sangeeta T. Doraiswamy, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20080222123 | METHOD AND SYSTEM FOR CLEANSING SEQUENCE-BASED DATA AT QUERY TIME - A method and system for cleansing anomalies from sequence-based data at query time. Sequence-based data such as RFID data is loaded into a database. One or more cleansing rules are received at a cleansing rules engine. The cleansing rule engine converts the cleansing rule(s) to a template that includes logic to compensate for anomalies in the sequence-based data. A query to retrieve the sequence-based data is received by a query rewrite engine. The query rewrite engine rewrites the query by applying the template logic. The rewritten query is executed at query time. The result of the rewritten query execution is identical to the result of executing the original query on a data set generated by applying the cleansing rule to all of the sequence-based data. | 09-11-2008 |
20120020563 | Systems and Methods for Automated Extraction of Measurement Information in Medical Videos - Systems and methods providing automated extraction of information contained in video data and uses thereof are described. In particular, systems and associated methods are described that provide techniques for extracting data embedded in video, for example measurement-value pairs of medical videos, for use in a variety of applications, for example video indexing, searching and decision support applications. | 01-26-2012 |
20120023145 | POLICY-BASED COMPUTER FILE MANAGEMENT BASED ON CONTENT-BASED ANALYTICS - Embodiments of this disclosure managing storage of files, stored in a computer storage system having policy-based file storage management, using information derived from content of the files. Embodiments execute content analytics logic module(s) on a primary file stored in a base storage system, creating one or more Features derived from the primary file content. Based on the Feature(s), embodiments automatically determine an electronic storage policy for the primary file and, in certain embodiments, also for the Feature(s). The Features, and accordingly the storage policy, can be updated particularly readily in exemplary embodiments having pluggable content analytics logic modules. This may be occur in light of, for example, new content analytics algorithms (e.g., new image analysis algorithms), new external factors (e.g., new rules governing certain content), and/or new storage equipment (e.g., new storage farms for which it may be more useful or cost effective to store certain types of data). | 01-26-2012 |
20120321189 | SYSTEMS AND METHODS FOR AUTOMATED EXTRACTION OF MEASUREMENT INFORMATION IN MEDICAL VIDEOS - Systems and methods providing automated extraction of information contained in video data and uses thereof are described. In particular, systems and associated methods are described that provide techniques for extracting data embedded in video, for example measurement-value pairs of medical videos, for use in a variety of applications, for example video indexing, searching and decision support applications. | 12-20-2012 |
Sivakumar Doraiswamy, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20090240968 | METHOD FOR CALIBRATING READ OPERATIONS IN A MEMORY SYSTEM - A method of calibrating read operations in a memory system is disclosed. The method involves placing a memory controller in a calibration mode, and performing a series of dummy read operations. Each of the read operations performs a read of pre-specified data stored in at least one memory component while using different ones of delayed enable signals. Data read from respective dummy read operations is compared to identify successful read operations while the timing information from successful read operations is compared to identify a suitable delayed enable signal. | 09-24-2009 |
20120170389 | MEMORY CONTROLLER FOR STROBE-BASED MEMORY SYSTEMS - A memory controller for strobe-based memory systems is disclosed. The memory controller comprises a circuit to generate a control signal having a predetermined timing relationship with respect to a first clock signal, a circuit to receive the control signal, and a receiver to sample the read data in response to the qualified read strobe signal. The receiving circuit comprises an input to receive an external read strobe signal transmitted by a semiconductor memory device, circuitry to synchronize the control signal and the received read strobe signal to have a common timing relationship with respect to each other, and circuitry to gate the read strobe signal based on the synchronized control signal. | 07-05-2012 |
20140254294 | MEMORY CONTROLLER FOR STROBE-BASED MEMORY SYSTEMS - An integrated circuit (IC) memory controller is disclosed. The memory controller includes a receiver to receive a strobe signal and provide an internal strobe signal. An adjustable delay circuit delays an enable signal to generate a delayed enable signal. A gate circuit generates a gated strobe signal using the delayed enable signal that masks transitions of the internal strobe signal that occur prior to a valid region of the internal strobe signal. A sample circuit samples data using the gated strobe signal. | 09-11-2014 |
Suresh Doraiswamy, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130080795 | Dynamically Adjusting Power Of Non-Core Processor Circuitry - In one embodiment, the present invention includes a multicore processor having a variable frequency domain including a plurality of cores and at least a portion of non-core circuitry of the processor. This non-core portion can include a cache memory, a cache controller, and an interconnect structure. In addition to this variable frequency domain, the processor can further have a fixed frequency domain including a power control unit (PCU). This unit may be configured to cause a frequency change to the variable frequency domain without draining the non-core portion of pending transactions. Other embodiments are described and claimed. | 03-28-2013 |
20130179716 | Dynamically Adjusting Power Of Non-Core Processor Circuitry - In one embodiment, the present invention includes a multicore processor having a variable frequency domain including a plurality of cores and at least a portion of non-core circuitry of the processor. This non-core portion can include a cache memory, a cache controller, and an interconnect structure. In addition to this variable frequency domain, the processor can further have a fixed frequency domain including a power control unit (PCU). This unit may be configured to cause a frequency change to the variable frequency domain without draining the non-core portion of pending transactions. Other embodiments are described and claimed. | 07-11-2013 |
Vijaay Doraiswamy, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20110145292 | DELEGATED AND RESTRICTED ASSET-BASED PERMISSIONS MANAGEMENT FOR CO-LOCATION FACILITIES - At least one user is designated to manage assets including management delegations, access restrictions, and access permissions. Management responsibilities are applied based on business rules and based on a hierarchical model. The hierarchical model enables a well-defined logical flow of delegations and restrictions with pruning capability. User groups, asset groups, asset trees and asset permissions may be defined. The designated user can manage a single asset or all assets or a subset of assets. An asset may belong to one or more asset groups. | 06-16-2011 |
20110145903 | UNIFIED USER LOGIN FOR CO-LOCATION FACILITIES - A logical customer organization model is applied to group the individual agreements into separate logical customer organizations, wherein the groupings can be region based groupings, organization groupings and departmental groupings. Unified login identification (ID) model is applied to enable a first user to login to a portal using a first login ID to access a first asset in a first asset group according to a first logical customer organization. The unified login ID model enables the first user to use the same first login ID to access a second asset in the first asset group according to the first logical customer organization. The unified login ID model also enables the first user to login to the portal using a second login ID to access one or more assets in a second asset group according to a second logical customer organization. Each of the first and second logical customer organization may be associated with one or more asset groups and one or more user groups. | 06-16-2011 |
Yoganand Tumkur Doraiswamy, Mysore IN
Patent application number | Description | Published |
---|---|---|
20120254857 | SYSTEM AND METHOD FOR INSTALLING AN APPLICATION ON CLIENT MACHINE - The present disclosure relates to a system and a method for installing an application on a client machine. The installation program of the application is stored in a repository and the user requires appropriate permissions to access the repository. The user provides authentication details to the server which in turn provides the user with credentials for installation. Then, the user runs a client application and inputs the credentials thereon to install the application on the client machine. The client application then installs the application available on the repository on the client machine after authenticating the client machine with the server using the credentials. | 10-04-2012 |