Kandasamy, IN
Aruljothi Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140065881 | MULTI-SOCKET MEMORY MODULE T-CONNECTOR - Embodiments of apparatus, methods, systems, devices, and connectors are described herein for a connector having a longitudinal body configured to mount the connector to a PCB. In various embodiments, a first and a second socket may be respectively disposed at a first side and a second side of the longitudinal body. In various embodiments, the first and second sockets may removably receive a first memory module from a first direction and a second memory module from a second direction opposite to the first direction. In various embodiments, the second side may be opposite to the first side. In various embodiments, on insertion into the first and second sockets, the first and second memory modules may be coplanar and/or equidistant from the PCB along a third direction orthogonal to the first and second directions. | 03-06-2014 |
Jeyakumar Kandasamy, Trichy IN
Patent application number | Description | Published |
---|---|---|
20140357590 | AMINOGLYCOSIDES AND USES THEREOF IN TREATING GENETIC DISORDERS - A new class of pseudo-trisaccharide aminoglycosides having an alkyl group at the 5″ position, exhibiting efficient stop codon mutation readthrough activity, low cytotoxicity and high selectivity towards eukaryotic translation systems are provided. Also provided are pharmaceutical compositions containing the same, and uses thereof in the treatment of genetic disorders, as well as processes of preparing these aminoglycosides. The disclosed aminoglycosides can be represented by the general formula I: | 12-04-2014 |
20160074425 | AMINOGLYCOSIDES AND USES THEREOF IN TREATING GENETIC DISORDERS - A new class of pseudo-trisaccharide aminoglycosides having an alkyl group at the 5″ position, exhibiting efficient stop codon mutation readthrough activity, low cytotoxicity and high selectivity towards eukaryotic translation systems are provided. Also provided are pharmaceutical compositions containing the same, and uses thereof in the treatment of genetic disorders, as well as processes of preparing these aminoglycosides. The disclosed aminoglycosides can be represented by the general formula I: | 03-17-2016 |
Jeyaprakash Kandasamy, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20140211527 | SYSTEMS AND METHODS FOR OPERATING A MICRO INVERTER IN A DISCONTINUOUS POWER MODE - A micro inverter is provided. The micro inverter includes an inverter efficiency threshold detector configured to determine whether an efficiency of the micro inverter is below a threshold efficiency, wherein the micro inverter is configured to convert direct current power into alternating current power, and a microcontroller coupled to the inverter efficiency threshold detector and configured to operate the micro inverter in a continuous power mode, operate the micro inverter in a discontinuous power mode, and switch the micro inverter between the continuous power mode and the discontinuous power mode based on whether the efficiency of the micro inverter is below the threshold efficiency. | 07-31-2014 |
20140211529 | METHODS AND SYSTEMS FOR OPERATING A BI-DIRECTIONAL MICRO INVERTER - A micro inverter includes a synchronous bi-directional power converter and a controller communicatively coupled to the synchronous bi-directional power converter. The controller is configured to operate the micro inverter in a forward conduction mode when photovoltaic (PV) power is available and operate the micro inverter in at least one of a reverse conduction mode and a reactive power compensation mode when PV power is unavailable. | 07-31-2014 |
20140214230 | SYSTEMS AND METHODS FOR MAXIMUM POWER POINT TRACKING IN A MICRO INVERTER - In one aspect, a method for operating a micro inverter using power point tracking is provided. The method includes calculating a change in input power over at least one previous grid cycle, calculating a change in an output current reference over the at least one previous grid cycle, and controlling the output current reference based on the change in input power over the at least one previous grid cycle and the change in the output current reference over the at least one previous grid cycle. | 07-31-2014 |
Kavitha Kandasamy, Chennai IN
Madhusudanan Kandasamy, Tamilnaud IN
Patent application number | Description | Published |
---|---|---|
20090210647 | METHOD FOR DYNAMICALLY RESIZING FILE SYSTEMS | 08-20-2009 |
Madhusudanan Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110125799 | Extensible Access Control List Framework - Methods, systems, and products for governing access to objects on a filesystem. In one general embodiment, the method includes providing a framework in an operating system environment for support of a plurality of access control list (ACL) types, thereby enabling governing of access to objects on a filesystem according to an associated definition of an ACL type; and accepting definitions of ACL types. The associated definition may comprise a kernel extension. | 05-26-2011 |
20110125812 | Managing Memory - Methods, systems, and products for managing memory. In one general embodiment, the method includes assigning an isolated virtual heap in a global kernel heap of a global operating system environment to each of a plurality of isolated virtual operating system environments operating in a global operating system environment; and in response to an invocation of kernel heap memory allocation from one of the isolated virtual operating system environments, dynamically allocating memory to the invoking isolated virtual operating system environment from the virtual kernel heap assigned to the invoking isolated virtual operating system environment. The method may also include running the plurality of isolated virtual operating system environments in the global operating system environment. The plurality of isolated virtual operating system environments may share a single common kernel. The isolated virtual operating system environments may run under the same operating system image. | 05-26-2011 |
20110126176 | Providing Programming Support to Debuggers - Method, system, and computer program product for providing programming support to a debugger are disclosed. The method includes defining at least one debugger programming statement, and instructing the debugger to execute the at least one debugger programming statement which modifies a least a portion of the computer program during execution of the computer program without recompiling the computer program. The debugger may be instructed to execute the at least one debugger programming statement at a specified position of the computer program. The at least one debugger programming statement may include a delete instruction that instructs the debugger to prevent one or more programming statements at a specified position in the computer program from being executed. The debugger may be instructed to execute the at least one debugger programming statement instead of one or more programming statements at a specified position in the computer program without recompiling the computer program. | 05-26-2011 |
20120198424 | Providing Programming Support to Debuggers - Method for providing programming support to a debugger are disclosed. The method includes defining at least one debugger programming statement, and instructing the debugger to execute the at least one debugger programming statement which modifies a least a portion of the computer program during execution of the computer program without recompiling the computer program. The debugger may be instructed to execute the at least one debugger programming statement at a specified position of the computer program. The at least one debugger programming statement may include a delete instruction that instructs the debugger to prevent one or more programming statements at a specified position in the computer program from being executed. The debugger may be instructed to execute the at least one debugger programming statement instead of one or more programming statements at a specified position in the computer program without recompiling the computer program. | 08-02-2012 |
Madhusudanan Kandasamy, Erode District IN
Patent application number | Description | Published |
---|---|---|
20090210648 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY RESIZING FILE SYSTEMS | 08-20-2009 |
20090313677 | Mathematical definition of roles and authorizations in RBAC system - A process, apparatus and program product create a new role in a Role Based Access Control (RBAC) system by using mathematical operators with either one or more authorizations, or one or more existing roles, or a combination thereof. | 12-17-2009 |
Madhusudanan Kandasamy, Taminadu IN
Patent application number | Description | Published |
---|---|---|
20140129696 | RECONSILIATION OF ASYMETRIC TOPOLOGY IN A CLUSTERED ENVIRONMENT - Provided are techniques for the orderly shutdown of a node within a cluster in the event of asymmetric topology maps, comprising receiving, at a first node, a plurality of heartbeats, each heartbeat corresponding to a particular, corresponding other node in the cluster and comprising information on a topological map corresponding to each particular other node's view of the cluster generating, by the first node, a topological map of the cluster based upon the information comprising the heartbeats; comparing the topological map of the cluster and the topological maps corresponding to each node; in response to a determination that the topological maps of the duster and each node are not in agreement, determining the connectivity of the first node with respect to the cluster and in respond to a determination that the first node has the lowest connectivity within the cluster, shutting down the first node. | 05-08-2014 |
Madhusudanan Kandasamy, Gobichettipalayam IN
Patent application number | Description | Published |
---|---|---|
20120124108 | SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DYNAMICALLY RESIZING FILE SYSTEMS | 05-17-2012 |
20120144138 | Locking Access To Data Storage Shared By A Plurality Of Compute Nodes - Methods, apparatuses, and computer program products are provided for locking access to data storage shared by a plurality of compute nodes. Embodiments include maintaining, by a compute node, a queue of requests from requesting compute nodes of the plurality of compute nodes for access to the data storage, wherein possession of the queue represents possession of a mutual-exclusion lock on the data storage, the mutual-exclusion lock indicating exclusive permission for access to the data storage; and conveying, based on the order of requests in the queue, possession of the queue from the compute node to a next requesting compute node when the compute node no longer requires exclusive access to the data storage. | 06-07-2012 |
20130046720 | DOMAIN BASED USER MAPPING OF OBJECTS - According to one aspect of the present disclosure, a method and technique for domain based user mapping of objects is disclosed. The method includes: responsive to determining that an operation is being attempted on an object identified with an object identifier, determining a domain identifier associated with a user attempting the operation; determining whether the operation can proceed on the object based on domain isolation rules, the domain isolation rules indicating rules for allowing or disallowing operations to proceed on objects based on object identifiers and domain identifiers; responsive to determining that the operation on the object can proceed based on the domain isolation rules, accessing user mapping rules that map specified users allowed to perform a specified operation to a specified object; and determining whether the operation can proceed on the object by the user based on the user mapping rules. | 02-21-2013 |
20140156861 | Clustering Support Across Geographical Boundaries - An approach is presented that provides computer clustering support across geographical boundaries. Inter-node communications are managed in a cluster by having each node operate at the network device driver (NDD) level within the kernel. Multiple types of NDD are utilized (Ethernet, SAN, DISK etc.) to provide redundancy so that nodes can reliably exchange heartbeat. To align with this architecture, for remote nodes, a pseudo NDD is used over Transmission Control Protocol (TCP) based communication interface to work along side other NDDs. Thus, the same packet which is sprayed over the NDDs pertaining to local nodes can be sprayed over the TCPSOCK NDD interface for remote nodes. Nodes (local or remote) receive the same packet and reassemble and process it in the same manner. | 06-05-2014 |
20140156862 | Clustering Support Across Geographical Boundaries - An approach is presented that provides computer clustering support across geographical boundaries. Inter-node communications are managed in a cluster by having each node operate at the network device driver (NDD) level within the kernel. Multiple types of NDD are utilized (Ethernet, SAN, DISK etc.) to provide redundancy so that nodes can reliably exchange heartbeat. To align with this architecture, for remote nodes, a pseudo NDD is used over Transmission Control Protocol (TCP) based communication interface to work along side other NDDs. Thus, the same packet which is sprayed over the NDDs pertaining to local nodes can be sprayed over the TCPSOCK NDD interface for remote nodes. Nodes (local or remote) receive the same packet and reassemble and process it in the same manner. | 06-05-2014 |
20150089059 | Enhanced Mechanisms for Granting Access to Shared Resources - Mechanisms are provided, in a data processing system comprising a plurality of nodes, each node being a computing device, for controlling access to a critical section of code. These mechanisms send, by a sender node of the data processing system, an access request for requesting access to the critical section of code. The critical section of code is a portion of code that accesses a shared resource. The mechanisms receive, in the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request. Each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response. The mechanisms control, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes. | 03-26-2015 |
20150089060 | Enhanced Mechanisms for Granting Access to Shared Resources - Mechanisms are provided, in a data processing system comprising a plurality of nodes, each node being a computing device, for controlling access to a critical section of code. These mechanisms send, by a sender node of the data processing system, an access request for requesting access to the critical section of code. The critical section of code is a portion of code that accesses a shared resource. The mechanisms receive, in the sender node, from a plurality of receiver nodes in the data processing system, responses to the access request. Each response in the responses includes a number of active nodes perceived by a corresponding receiver node that transmitted the response. The mechanisms control, by the sender node, access to the critical section of code based on the number of active nodes identified in each of the responses received from the receiver nodes. | 03-26-2015 |
Madhusudanan Kandasamy, Tamilnadu IN
Patent application number | Description | Published |
---|---|---|
20100125835 | HIGH EFFICIENCY COMPILATION FRAMEWORK - A method and system for reducing processing overhead during execution of a code block in a high efficiency compilation framework. The method identifies second code blocks within the code block and separates them out from the first code block during compilation. Further, during compilation, the system converts the second code blocks to kernel program modules, in a form recognizable by the system kernel. The compilation is followed by execution of the first code block, with the compiled object code of the first code block being executed in user mode and the kernel program modules being executed in kernel mode. | 05-20-2010 |
20120151552 | DOMAIN-BASED ISOLATION AND ACCESS CONTROL ON DYNAMIC OBJECTS - A technique for performing domain-based access control for granular isolation on a data processing system includes assigning, using the data processing system, one or more first domain tags to a dynamic object that is created by a first process that is executing on the data processing system. The technique also includes assigning, using the data processing system, one or more second domain tags to a second process that is executing on the data processing system. The first and second domain tags are evaluated, using the data processing system, according to one or more enforced rules to determine whether to grant or deny the second process access to data associated with the dynamic object. | 06-14-2012 |
20120158803 | PARTITION FILE SYSTEM FOR VIRTUAL MACHINE MEMORY MANAGEMENT - A virtual machine of an information handling system (IHS) initializes an operating system to provide partition file system memory management during application execution. The operating system employs multiple partitions that include one or more applications for execution within the virtual machine. A file system tool identifies write operations to a global file system and generates local and common file system information. The file system tool populates the local file systems that include delta local file systems and differential file systems with write operation data. The file system tool may generate stackable common delta file system information to store write operation data common to two or more partitions that employ executing applications. The file system tool may combine or separate stackable common delta file system information to provide improvements in virtual machine memory utilization. | 06-21-2012 |
20120209894 | PARTITION FILE SYSTEM FOR VIRTUAL MACHINE MEMORY MANAGEMENT - A virtual machine of an information handling system (IHS) initializes an operating system to provide partition file system memory management during application execution. The operating system employs multiple partitions that include one or more applications for execution within the virtual machine. A file system tool identifies write operations to a global file system and generates local and common file system information. The file system tool populates the local file systems that include delta local file systems and differential file systems with write operation data. The file system tool may generate stackable common delta file system information to store write operation data common to two or more partitions that employ executing applications. The file system tool may combine or separate stackable common delta file system information to provide improvements in virtual machine memory utilization. | 08-16-2012 |
20150160973 | DOMAIN BASED RESOURCE ISOLATION IN MULTI-CORE SYSTEMS - Embodiments of the present invention provide a system, method, and program product for domain based resource isolation in multi-core systems. A computing device determines an operation being attempted on a workload request identified with a first domain identifier. The computing device determines a processor core identified with a second domain identifier. In response to determining that processor cores identified with the second domain identifier can service workload requests identified with the first domain identifier, the computing device deploys the workload request to the processor core for servicing. | 06-11-2015 |
Madhusudanan Kandasamy, Tamil Nadu IN
Patent application number | Description | Published |
---|---|---|
20080289036 | TIME-BASED CONTROL OF USER ACCESS IN A DATA PROCESSING SYSTEM INCORPORATING A ROLE-BASED ACCESS CONTROL MODEL - Computer implemented method, system and computer usable program code for providing time-based control of user access in a data processing system utilizing a Role-Based Access Control model. A computer implemented method for providing time-based control of user access in a data processing system utilizing a Role-Based Access Control model includes providing at least one timing attribute for a role, wherein each at least one timing attribute specifies a timing condition by which a user is enabled to use the role. The user is enabled to use the role pursuant to satisfying the at least one timing attribute. | 11-20-2008 |
20090249344 | METHOD AND APPARATUS FOR THREADED BACKGROUND FUNCTION SUPPORT - The present invention provides a computer implemented method and apparatus for a built-in function of a shell to execute in a thread of an interactive shell process. The data processing system receives a request to execute the built-in function. The data processing system determines that the request includes a thread creating indicator. The data processing system schedules a thread to execute the built-in function, in response to a determination that the request includes the thread creating indicator, wherein the thread is controlled by the interactive shell process and shares an environment of the interactive shell process. The data processing system declares a variable based on at least one instruction of the built-in function. Finally, the data processing system may access the variable. | 10-01-2009 |
Madhusudanan Kandasamy, Bungalowpudur IN
Patent application number | Description | Published |
---|---|---|
20100106926 | SECOND FAILURE DATA CAPTURE PROBLEM DETERMINATION USING USER SELECTIVE MEMORY PROTECTION TO TRACE APPLICATION FAILURES - The present invention discloses a solution for second failure data capture problem determination using user selective memory protection to trace application failures. In the solution, one or more data structures can be selected by a user to be allocated a unique address space from a debug heap. The address space called a region can be assigned permissions for which executable code can access the contents. Permissions can include full access (e.g., read/write), read, and no access which can “lock” the region against specific types of access. The user can permit known trusted executable code to access allocated regions. Untrusted executable code attempting to access “locked” regions will result in an application failure event (e.g., segmentation fault). The failure can be used to determine the point of memory corruption through inspection of the stack trace. | 04-29-2010 |
Muthukumar Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20130024800 | System and Method for Playing Back Wireless Fire System History Events - A method and apparatus are provided for displaying alarm and communication system events. The method includes the steps of providing a control panel coupled to a plurality of environmental sensors within a protected area, storing a sequence of events detected within the protected area by a communication system and at least some of the plurality of environmental sensors along with a time of the respective event in a history buffer of a memory of the control panel, depicting the plurality of environmental sensors and communication system on a display of the control panel and playing back the sequence of detected sensor and communication system events for a selected time period from the history buffer on the display where each of the plurality of depicted environmental sensors on the display is shown in an activated state for each instant of time of the selected time period that the history buffer indicates that the sensor was in the activated state and a deactivated state otherwise. | 01-24-2013 |
Nagan Nirmalan Kandasamy, Khidakali IN
Patent application number | Description | Published |
---|---|---|
20120045648 | PROCESS FOR THE PREPARATION OF LASOFOXIFENE TARTRATE - A solid crystalline form of 1-(2-[4-(6-methoxy-3,4-dihydronaphthalene-1-y) phenoxy]ethyl)pyrrolidine, and a preparing process thereof are provided. The aforesaid compound is a key intermediate in the synthesis of lasofoxifene. A process for preparing lasofoxifene, a process for purifying lasofoxifene tartrate, and a crystalline form of lasofoxifene tartrate are also provided. | 02-23-2012 |
Partheeban Kandasamy, Bhubaneswar IN
Patent application number | Description | Published |
---|---|---|
20130031067 | DATA AUDIT MODULE FOR APPLICATION SOFTWARE - System and methods of data auditing of transaction data of an application software are described. In one implementation, the method includes data auditing of transaction data by an independent audit module where metadata of the application software is received, and an audit table based on at least one of the audit parameters, indicating the extent of audit data of one or more processes is created in an audit database of the audit module. Further, triggers for capturing data changes from the application software are generated based on at least one audit parameters. Captured changes data is optimized to reduce the storage requirements of audit data. In another implementation, the result of the analysis is displayed in form of a report in user desired format. | 01-31-2013 |
Parthipan Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20160088021 | POLICY-BASED COMPLIANCE MANAGEMENT AND REMEDIATION OF DEVICES IN AN ENTERPRISE SYSTEM - The present disclosure relates generally to managing compliance of remote devices that access an enterprise system. More particularly, techniques are disclosed for using a compliance policy to manage remediation of non-compliances of remote devices that access an enterprise system. A device access management system may be implemented to automate remediation of non-compliances of remote devices accessing an enterprise system. Remediation may be controlled based on different levels of non-compliance, each defined by one or more different non-compliances. In some embodiments, a level of non-compliance may be conditionally defined by one or more user roles for which non-compliance is assessed. Access to computing resources of an enterprise system may be controlled for a remote device based on compliance of the remote device. Access may be inhibited for those resources not permitted during a time period of a non-compliance. | 03-24-2016 |
Ruckmani Kandasamy, Tiruchirapalli IN
Patent application number | Description | Published |
---|---|---|
20110171295 | IMMEDIATE RELEASE COMPOSITIONS OF ACID LABILE DRUGS - The present invention provides a method of creating a macro environment in the stomach for immediate release of acid labile compounds stable at alkaline or near alkaline pH comprising the step of administering a composition comprising acid labile compound stable at alkaline or near alkaline pH together with a water soluble buffer, a water insoluble buffer, a disintegrant and pharmaceutically acceptable excipients. The present invention also provides a pharmaceutical composition of a multi component system in which one component essentially contains an acid labile drug and the other component comprises a fast releasing buffer composition along with pharmaceutically acceptable excipients for oral administration and ingestion by a subject, and process for preparing the same. | 07-14-2011 |
Senthil Kumar Kangayampalayam Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150309732 | Selectively Configuring Hard-Disk Drive System - In one embodiment of the disclosure, a hard-disk drive (HDD) controller for an HDD system is selectively configurable to operate with a first type of host system having a first logical block size and a second type of host system having a second logical block size, different from the first logical block size. Another embodiment of the disclosure is a method implemented by the HDD system. | 10-29-2015 |
Thamilarasu Kandasamy, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20150058913 | Context Awareness during First Negotiation of Secure Key Exchange - Techniques are presented for establishing context awareness during first negotiation of secure key exchange. These techniques may be embodied as a method, apparatus or instructions in a computer-readable storage media. At a first network device, a message is received from a second network device as part of an initial exchange of information of a secure key exchange, the message containing information indicating one or more secure key exchange policies acceptable to the second network device and defining one or more associated security parameters. The message further contains context-specific information identifying a context of the second network device. The first network device selects a secure key exchange policy for communicating with the second network device based upon the context-specific information and sends a response message to the second network device containing the selected secure key exchange policy. If the context was understood, the response message also includes context-specific information. | 02-26-2015 |
20150288603 | Path Maximum Transmission Unit Handling For Virtual Private Networks - Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router. | 10-08-2015 |
20160098327 | BYPASSING FAILED HUB DEVICES IN HUB-AND-SPOKE TELECOMMUNICATION NETWORKS - In an embodiment, a method comprises using a first hub device: establishing one or more secure connections with one or more spoke devices logically arranged as spokes with respect to a data processing system; generating and sending via a high-speed link a hub probe to a second hub device; in response to determining that the second hub device is nonresponsive, transmitting, to the one or more spoke devices a first communication indicating that the second hub device is nonresponsive; using a spoke device, receiving the first communication indicating that the second hub device is nonresponsive; determining whether the spoke device has established a secure connection with the second hub device; in response to determining that the spoke device has established the secure connection with the second hub device, selecting a third hub device, establishing a secure connection with the third hub device, and communicating with the third hub device. | 04-07-2016 |
Vijay Kandasamy, Tamil Nadu IN
Patent application number | Description | Published |
---|---|---|
20140286746 | COMPRESSOR SHROUD REVERSE BLEED HOLES - A gas turbine engine compressor includes a rotor defining a central axis of rotation and a plurality of blades which project into an annular compressor gas flow passage, and a shroud circumferentially surrounding the rotor and having a radially inner surface adjacent to the blade tips. Bleed holes extend through the shroud adjacent the blade tips, each of the bleed holes having an inlet end disposed in the shroud radially inner surface and an outlet end disposed in a shroud radially outer surface. Bleed air removed from the annular gas flow passage flows through the bleed holes from the inlet to the outlet ends. The outlet end of each bleed hole is located circumferentially upstream of the inlet end relative to a direction of rotational flow in the annular gas flow passage driven by a direction of rotation of the rotor. | 09-25-2014 |
20150211545 | SHROUD TREATMENT FOR A CENTRIFUGAL COMPRESSOR - The centrifugal compressor described includes an impeller shroud which encloses the impeller and has a curved shroud surface that extends between an inducer portion and an exducer portion. The compressor includes one or more circumferential grooves in the shroud body within the exducer portion. Each groove has opposed wall segments spaced apart therefrom. The wall segments are inclined at a nonzero groove angle relative to a normal of the shroud surface in a direction opposite the fluid flow path along the shroud surface. | 07-30-2015 |
20150226232 | CENTRIFUGAL COMPRESSOR DIFFUSER AND METHOD FOR CONTROLLING SAME - A centrifugal compressor having at least a diffuser is disclosed. The diffuser has an annular diffuser body having circumferentially spaced apart diffuser passages defining fluid paths through the diffuser body. The diffuser also has a plurality of diffusion members mounted to the annular diffuser body. Each diffusion member has a member inlet in fluid communication with a diffuser passage and a member outlet. Each diffusion member defines an aerodynamic throat disposed between the member inlet and the member outlet. The diffuser also has a fluid injection assembly with multiple injection conduits. Each injection conduit extends between a conduit inlet configured to receive a flow of compressible fluid from a supply and a conduit outlet communicating with a corresponding diffusion member downstream of the aerodynamic throat. The compressible fluid is injected through the conduit outlet into the diffusion members. | 08-13-2015 |
Vijay Kandasamy, Palur IN
Patent application number | Description | Published |
---|---|---|
20140260324 | TURBO-MACHINERY ROTORS WITH ROUNDED TIP EDGE - A rotor for a gas turbine engine includes a plurality of radially extending blades, each having a remote blade tip defining an outer tip surface, and a leading edge defined between opposed pressure and suction side airfoil surfaces. A shroud circumferentially surrounds the rotor, and a radial distance between an inner surface of the shroud and the outer tip surface of the blades defines a radial tip clearance gap therebetween. The tip of each of the blades has a pressure side edge formed at the intersection between the outer tip surface and the pressure side airfoil surface, and a suction side edge formed at the intersection between the outer tip surface and the pressure side airfoil surface. The suction side edge has a larger radius of curvature than the pressure side edge, thereby reducing the amount of tip leakage flow through the radial tip clearance gap. | 09-18-2014 |
20140271108 | COMPRESSOR BLEED SELF-RECIRCULATING SYSTEM - A compressor for a gas turbine engine having a bleed air recirculation system includes a plurality of bleed holes extending through the shroud at a first axial location thereon substantially adjacent the blade tips. The bleed holes have a closed outer perimeter along their complete length. An annular bleed cavity surrounds the shroud and is in communication with outlet openings of the bleed holes. The bleed holes provide communication between said main gas flow passage and the bleed cavity. The bleed cavity includes exit passages having outlets disposed in said shroud at a second axial location which is upstream of both the first axial location and the leading edge of the blades of the rotor. Bleed air is passively bled from the main gas flow passage via the bleed holes, recirculated through the bleed cavity and re-injected back into the main gas flow passage at the second axial location. | 09-18-2014 |