Mahadik
Amit Mahadik, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20110193949 | WIRELESS OPERATING ROOM COMMUNICATION SYSTEM INCLUDING VIDEO OUTPUT DEVICE AND VIDEO DISPLAY - A wireless operating room communication system provides wireless transmission of video signals from a wireless camera or a wireless transmitter unit to a portable wireless display unit. A wireless multiple device control unit is in wireless communication with the transmitter unit, the display unit, and a plurality of surgical devices disposed within the operating room. Each of the surgical devices has a video receiver to obtain a video signal to synchronize the devices and units. The video transmitter unit has a video transmitter and the other units or devices have a non-video transmitter. The arrangement enables transmission of device control signals on the same channel as the video signal. In response to changes in bandwidth, the video transmitter unit reduces the video signal to enable transmission thereof to the video display unit, while maintaining robustness of the control signals. | 08-11-2011 |
Amit A. Mahadik, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140275764 | SYSTEM FOR OBTAINING CLEAR ENDOSCOPE IMAGES - An endoscopic system including an endoscope, a light source for the endoscope and at least one image sensor for capturing a plurality of images of a body cavity. The light source is configured to emit light from the endoscope and into the body cavity such that the light is reflected off of a plurality of locations in the body cavity. The system also includes a control system for controlling both the light source and the at least one image sensor to vary parameters of the light source and the at least one image sensor such that the plurality of images have underexposed and overexposed regions. The endoscopic system could alternatively include a variable-attenuator element device adjacent the image sensor and configured to be located between the body cavity and the image sensor for capturing a single clear image with the image sensor. | 09-18-2014 |
Nadeemmullah A. Mahadik, Springfield, VA US
Patent application number | Description | Published |
---|---|---|
20130334666 | Plasma-Assisted Atomic Layer Epitaxy of Cubic and Hexagonal InN and its alloys with AlN at Low Temperatures - Described herein is a method for growing indium nitride (InN) materials by growing hexagonal and/or cubic InN using a pulsed growth method at a temperature lower than 300° C. Also described is a material comprising InN in a face-centered cubic lattice crystalline structure having an NaCl type phase. | 12-19-2013 |
20140190399 | REDUCTION OF BASAL PLANE DISLOCATIONS IN EPITAXIAL SiC USING AN IN-SITU ETCH PROCESS - A method of: providing an off-axis silicon carbide substrate, and etching the surface of the substrate with a dry gas, hydrogen, or an inert gas. | 07-10-2014 |
20140193965 | REDUCTION OF BASAL PLANE DISLOCATIONS IN EPITAXIAL SiC USING AN IN-SITU ETCH PROCESS - A method of: providing an off-axis 4H—SiC substrate, and etching the surface of the substrate with hydrogen or an inert gas. | 07-10-2014 |
20150140789 | Epitaxial Growth of Cubic and Hexagonal InN Films and Their Alloys with AlN and GaN - Described herein is a method for growing InN, GaN, and AlN materials, the method comprising alternate growth of GaN and either InN or AlN to obtain a film of In | 05-21-2015 |
Nadeemullah A. Mahadik, Springfield, VA US
Patent application number | Description | Published |
---|---|---|
20150155166 | ELIMINATION OF BASAL PLANE DISLOCATIONS IN POST GROWTH SILICON CARBIDE EPITAXIAL LAYERS BY HIGH TEMPERATURE ANNEALING WHILE PRESERVING SURFACE MORPHOLOGY - A method to remove basal plane dislocations in post growth silicon carbide epitaxial layers by capping post growth silicon carbide epilayers with a graphite cap and annealing the capped silicon carbon epilayers at a temperature of 1750° C. or greater with a nitrogen overpressure of 60-110 psi, wherein basal plane dislocations in the epilayers are removed while surface morphology is preserved. Also disclosed is the related silicon carbide substrate material made by this method. | 06-04-2015 |
Vinay Mahadik, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20130097661 | SYSTEM AND METHOD FOR DETECTING A FILE EMBEDDED IN AN ARBITRARY LOCATION AND DETERMINING THE REPUTATION OF THE FILE - A method is provided in one example embodiment that includes identifying a file format identifier associated with a beginning of a file, parsing the file based on the file format identifier until an end of the file is identified, and calculating a hash from the beginning of the file to the end of the file. The method may also include sending the hash to a reputation system and taking a policy action based on the hash's reputation received from the reputation system. | 04-18-2013 |
20130097699 | SYSTEM AND METHOD FOR DETECTING A MALICIOUS COMMAND AND CONTROL CHANNEL - A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware. | 04-18-2013 |
20130246605 | LOCAL REPUTATION TO ADJUST SENSITIVITY OF BEHAVIORAL DETECTION SYSTEM - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for adjusting the sensitivity of a behavior detection process on a per-device basis based on a local reputation for each device. | 09-19-2013 |
20130247184 | Stealth Network Attack Monitoring - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for stealth attack monitoring. In one aspect, a method includes monitoring a network for failed connection attempts in the network, wherein each failed internal connection attempt is initiated by a source asset and is an attempt to connect to a destination asset; and only in response to detecting a failed connection attempt initiated by a source asset, instantiating a source asset tracking instance in a computer memory, and for each source asset tracking instance in the computer memory: monitoring the corresponding source asset for a threshold number of failed connection attempts to destination assets during a time period; and in response to detecting the threshold number of failed connection attempts from the source asset during the time period for the source asset tracking instance, designating the source asset as a security risk. | 09-19-2013 |
20140047547 | STEALTH NETWORK ATTACK MONITORING - A particular failed connection attempt initiated by a particular source asset in a network is identified and subsequent failed connection attempts initiated by the particular source asset in the network during a time period are tracked. A low frequency sequence of failed connection attempts involving the particular source asset is detected during the time period and the source asset is designated as a potential security risk based on the detected low frequency sequence of failed connection attempts. | 02-13-2014 |
20140089661 | SYSTEM AND METHOD FOR SECURING NETWORK TRAFFIC - One variation of a method for selectively filtering internet traffic includes: receiving DNS queries; determining resource access levels for the DNS queries based on an internet resource database, wherein the resource access levels comprise a first level, a second level, and a third level returning an unmodified IP address for the first level DNS queries; returning a replacement resource IP address for the second level DNS queries; returning a web proxy server IP address for the third level DNS queries; and regulating HTTP traffic directed to the web proxy server IP address. | 03-27-2014 |
Vinay A. Mahadik, Milpitas, CA US
Patent application number | Description | Published |
---|---|---|
20120216271 | SYSTEM AND METHOD FOR INTERLOCKING A HOST AND A GATEWAY - A method is provided in one example embodiment and includes exchanging a session descriptor associated with a network connection and an application on a host, correlating the session descriptor with a network policy, and applying the network policy to the network connection. In alternative embodiments, the session descriptor may be exchanged through an out-of-band communication channel or an in-band communication channel. | 08-23-2012 |