Vishnu
Vishnu Basetti, Hyderabad IN
Patent application number | Description | Published |
---|---|---|
20130053346 | PYRIMIDO-PYRIDAZINONE COMPOUNDS AND METHODS OF USE THEREOF - The present application provides novel pyrimido-pyridazinone compounds and methods for preparing and using these compounds. These compounds are useful in treating inflammation in patients by administering one or more of the compounds to a patient. In one embodiment, the novel pyrimido-pyridazinone compound is of Formula (I) and R | 02-28-2013 |
20140221315 | PYRIMIDO-PYRIDAZINONE COMPOUNDS AND METHODS OF USE THEREOF - The present application provides novel pyrimido-pyridazinone compounds and methods for preparing and using these compounds. These compounds are useful in treating inflammation in patients by administering one or more of the compounds to a patient. In one embodiment, the novel pyrimido-pyridazinone compound is of Formula (I) and R | 08-07-2014 |
Vishnu Beeram, Martinsreid/munich DE
Patent application number | Description | Published |
---|---|---|
20140064057 | METHOD FOR MANAGING SERVICES IN A GENERALIZED-MULTI-PROTOCOL LABEL SWITCHING, GMPLS, CONTROLLED NETWORK - A Generalized-Multi-Protocol Label Switching controlled network is described, as is a method for managing services in the network under conditions of disrupted control plane connectivity. Nodes of the network use a Resource Reservation Protocol with Traffic Engineering extension, RSVP-TE, to allocate and provision resources of the network. Each of the nodes is adapted to evaluate local RSVP Path or Resv state data after having sent at least one signaling message to a receiving neighboring node without receipt of an acknowledgement message from said receiving node within a configurable time to determine an IP address of a node being located after the non-responsive receiving node along a service path of a service in a downstream or upstream direction. Each node is adapted to send the signaling message to the determined IP address of the next node located behind the non-responsive receiving node along the service path. | 03-06-2014 |
Vishnu Beeram, Fairfax, VA US
Patent application number | Description | Published |
---|---|---|
20130246593 | NETWORK WITH A NETWORK WIDE EXTENDED POLICY FRAMEWORK - A network with a network wide extended policy framework comprising: path computation clients (PCCs), associated with at least one local policy enforcement point (PEP); path computation servers (PCSs), associated with at least one policy decision point (PDP). The PEPs and PDPs adapted to exchange attributes determined by at least one PDP. PDPs are adapted to identify network elements network services requiring identical configuration parameters by evaluating parameters advertised in the network and update policy related to identified groups in case of configuration error. Updated policy is distributed by PDP in policy notification to PEPs associated with network elements network services of identified group. The PEPs receiving policy notification comprising updated policy from PDP adapted to translate the updated policy into configuration settings of network elements network services the identified group. | 09-19-2013 |
Vishnu Challam, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120047121 | CONTENT SIGNATURE NOTIFICATION - A client application installed on end user computers generates metadata from the content of web pages visited by end users and provides the metadata to a search engine. When an end user visits a web page, the end user's computer downloads and displays the web page to the end user. The client application may simultaneously access the web page content and generate this metadata in the form of a content signature of the web page from the web page content. The client application then provides the content signature to a search engine. The search engine may employ content signatures to identify new web pages to crawl and index. Additionally, the search engine may employ content signatures to identify changes to web pages and determine the crawl frequency of web pages. | 02-23-2012 |
Vishnu Chikondla, Troy, MI US
Patent application number | Description | Published |
---|---|---|
20160105365 | NETWORK-COORDINATED DRX TRANSMISSION REDUCTION FOR A NETWORK ACCESS DEVICE OF A TELEMATICS-EQUIPPED VEHICLE - A system for reduction of discontinuous-receive (DRx) transmissions for a network access device (NAD) of a telematics unit of a telematics-equipped vehicle includes: the telematics unit, configured to determine whether vehicle ignition of the telematics-equipped vehicle is on or off, the telematics unit further comprising the NAD, the NAD being configured to communicate with a network entity to perform a periodic updating procedure; the network entity, configured to communicate with the NAD for performance of the periodic updating procedure. The NAD and the network entity are further configured to reduce a frequency at which the periodic updating procedure is performed for the NAD in a DRx state relative to the frequency at which the periodic updating procedure is performed for the NAD in a vehicle ignition-on state. | 04-14-2016 |
Vishnu Emmadi, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130315252 | IMPLEMENTING PVLANs IN A LARGE-SCALE DISTRIBUTED VIRTUAL SWITCH - In one embodiment, a list of source identifiers is maintained at a virtual switch. These source identifiers are allowed to send packets through the virtual switch to ports in a private virtual local area network (PVLAN). When a packet is received at the virtual switch from a particular source destined for a particular port in the PVLAN, the virtual switch determines whether a particular identifier associated with the particular source matches one of the source identifiers in the list. If that particular source identifier is not on the list, the packet is prevented from being forwarded to the particular port in the PVLAN. | 11-28-2013 |
Vishnu Gurusamy Sundaram, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20110106375 | METHOD AND SYSTEM FOR PROVIDING AN INTEGRATED PLATFORM FOR ENTERTAINMENT, INFORMATION, COMMUNICATION, CONTROL AND COMPUTING APPLICATIONS IN VEHICLES - Various embodiments include a method and system for providing an integrated platform for entertainment, information, communication, control and computing applications in a vehicle. The system includes an in-vehicle computer residing in user's vehicle. The in-vehicle computer is used for user's entertainment and transfer of information between user's vehicle and other application servers such as original equipment manufacturers of the vehicle, online stores, toll booths, gas stations, etc. Information transfer and communication can also take place between the user's vehicles and other peer vehicles in its vicinity. The in-vehicle computer can further control vehicles' behavior by utilizing its computing applications and interacting with vehicle's engine, engine controlling unit, air conditioning regulator, speedometer, fuel meter, gyrometer etc. so as to personalize the vehicle according to its user's needs and requirements. The in-vehicle computer also provides a platform to application developers for developing various applications such as games, user identification, GPS, traffic alerts, finger print scanning, voice conferencing social networking, blogging and the likes for the vehicles. | 05-05-2011 |
Vishnu Irigireddy, Bloomington, IL US
Patent application number | Description | Published |
---|---|---|
20130025271 | Method and arrangement for active make-up in an overrunning actuator - A hydraulic system having an actuator having a piston and associated rod forming head and rod chambers and being adapted to move between retracted and extended positions within a cylinder, and first and second sources of fluid. A first pump provides fluid from the first source to the head chamber at a first pressure. At least one valve provides fluid from the second source at a second pressure to supplement fluid provided to the head chamber from the first pump when the second pressure is greater than the first pressure. | 01-31-2013 |
Vishnu Irigireddy, Chillicothe, IL US
Patent application number | Description | Published |
---|---|---|
20130160747 | SYSTEM AND METHOD FOR STARTING AN ENGINE IN MOBILE LIQUID NATURAL GAS APPLICATIONS - The present disclosure is directed to a system for running an engine. The system includes a first tank, a second tank, a pump, a vaporizer, and a heat source. The first tank stores liquid natural gas (LNG). The pump is in communication with the first tank and is configured to pump the LNG from the first tank. The vaporizer is in communication with the pump. The vaporizer is configured to receive the LNG from the first tank via the pump and convert the LNG into compressed natural gas (CNG). The second tank is in communication with the vaporizer. The second tank is configured to store CNG. A heat source is in communication with the second tank. The heat source uses the stored CNG to apply heat to the vaporizer. | 06-27-2013 |
Vishnu Itta, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140344326 | SYSTEMS AND METHODS FOR DEPLOYING A SPOTTED VIRTUAL SERVER IN A CLUSTER SYSTEM - The present invention is directed towards systems and methods deploying a virtual server on a subset of devices in a cluster of devices. A first device of a cluster of devices intermediary between at least one client and at least one server, may identify a first virtual server to establish on one or more devices of the cluster. The first device may associate, to the identified virtual server, a group comprising a subset of devices in the cluster of devices. The cluster may establish the first virtual server on each device in the group responsive to associating the group to the first virtual server. Each virtual server on each device of the group may be assigned a same internet protocol address. | 11-20-2014 |
20150039763 | SYSTEMS AND METHODS FOR LEAST CONNECTION LOAD BALANCING BY MULTI-CORE DEVICE - The present invention is directed towards systems and methods for load balancing by a multi-core device intermediary between clients and services. The device may establish sub-slots in each slot of the device's packet engines. The number of sub-slots may correspond to the packet engine count. Each slot may track a different number of active connections allocated to a service. The device may assign a first and second service to each packet engine in a first slot corresponding to no active connections. These services may be assigned to different sub-slots in adjacent packet engines. The device may update, responsive to allocation of a first active connection to the first service, the first service from a sub-slot in the first slot of a first packet engine, to a corresponding sub-slot in a second slot. The second slot may correspond to one active connection allocated to the first service. | 02-05-2015 |
Vishnu Jayamohan, Nashville, TN US
Patent application number | Description | Published |
---|---|---|
20140077942 | STEALTH MODE VEHICLE OPERATION - Embodiments of a system and method for controlling illumination in a vehicle passenger compartment are disclosed. In one aspect, a display system for a motor vehicle passenger compartment, comprises: at least one indicia visible to an operator of the vehicle and configured to indicate a vehicle operating condition; an indicia light configured to illuminate the indicia; a display device visible to an operator of the vehicle; and a controller, in communication with the indicia light and the display device, programmed to: operate the display system in a first mode wherein the indicia light is activated to illuminate the indicia, and in response to a first control signal indicative of a change from the first mode to a second mode, reduce illumination of the indicia by the indicia light and control the display device to output information indicative of the vehicle operating condition. | 03-20-2014 |
Vishnu Jayaprakash, Chennai IN
Patent application number | Description | Published |
---|---|---|
20110135966 | NOVEL COW-DUNG BASED MICROBIAL FUEL CELL - A novel cow dung based Microbial Fuel Cell (MFC) comprising of graphite electrodes and a proton exchange membrane and that converts chemical energy available in a bio-convertible substrate directly into electricity and achieves this by using the microorganisms in cow dung as a catalyst to convert substrate into electrons. | 06-09-2011 |
Vishnu Karnati, Sudbury, MA US
Patent application number | Description | Published |
---|---|---|
20140187795 | CRTH2 MODULATORS AND PREPARATION THEREOF - The present invention relates to processes and intermediates for the preparation of compounds useful as CRTH2 antagonists. Compounds prepared by the processes of the invention are of Formula (AI), (All) and Compound (I). | 07-03-2014 |
Vishnu Kesaraju, Beavercreek, OH US
Patent application number | Description | Published |
---|---|---|
20110040549 | DISCRETE EVENT SIMULATION TOOL COMBINING PROCESS-DRIVEN AND EVENT-DRIVEN MODELS - The embodiments described herein generally relate to a discrete event simulation (DES) tool which combines the process-driven model and the event-driven model. This integrated process (which uses entities) and event simulation framework according to the various embodiments provides a platform that is appropriate for all combinations of simulation model requirements and at the same time provides higher level of model abstraction. The DES tool instantiates a new paradigm that permits flow of entities at the event-driven model layer that is analogous to their treatment at the process-driven model layer. | 02-17-2011 |
Vishnu Madanarajagopal, Canton, MI US
Patent application number | Description | Published |
---|---|---|
20110282527 | Multifactor Charging for Electric Vehicles - The described method and system improve electric-power driving range for electric vehicles, i.e., electric-only, hybrid electric, and other vehicles that draw electrical power from an on-board storage system for propulsion. The described system uses synergy among selected data sources to provide charging prompts and route assistance to allow the vehicle user to operate his or her vehicle in a more economical fashion by ensuring timely and cost effective charging. | 11-17-2011 |
20130281023 | ENABLING FEATURES AND DISPLAY REMINDERS ON A MOBILE PHONE - A method and system of providing a reminder message to a vehicle user, comprising the steps of establishing a short-range wireless communication between a vehicle and a mobile phone or other handheld communications device carried by the user; determining a vehicle trip initiation or termination involving the vehicle user; and providing a reminder message to the vehicle user via the handheld communications device in response to that determination. In addition, the method may comprise the step of transmitting an instruction from the handheld communications device comprising the execution of an auxiliary vehicle function. | 10-24-2013 |
Vishnu Mallapragada, Nashville, TN US
Patent application number | Description | Published |
---|---|---|
20080287827 | SYSTEM, METHOD AND DEVICE FOR POSITIONING A TARGET LOCATED WITHIN SOFT TISSUE IN A PATH OF AN INSTRUMENT - A system, method and device for positioning a target located within soft tissue in a path of an instrument inserted into the soft tissue includes: a manipulation system including a plurality of force applicators positioned around the soft tissue containing the target; an image acquisition system including an imaging probe for obtaining data for generating an image of the soft tissue containing the target; a detection means for detecting deflection of the target using the data from the imaging probe; and a control means for actuating the plurality of force applicators to apply forces on the soft tissue in response to a detected deflection of the target to move the target back in line with the path of the instrument. In an exemplary embodiment, the soft tissue is a breast, the imaging probe is an ultrasound imaging probe, and the instrument is a biopsy needle. | 11-20-2008 |
Vishnu Mallapragada, Kalamazoo, MI US
Patent application number | Description | Published |
---|---|---|
20130149064 | ENERGY ABSORBING FASTENING SYSTEM - A fastening system includes an energy absorbing or impact indicator and at least one or more of the following: (1) a fastening base for mounting in an emergency vehicle, (2) a patient support engageable with a base, (3) a patient securement mechanism for securing a patient on a patient support, (4) a patient securement mechanism for securing a patient to a vehicle, (5) a patient support securement mechanism operable to secure a patient support in an emergency vehicle, or (6) a patient support securement mechanism operable to secure a patient support to a base, wherein the energy absorbing or impact indicator is located (1) at the patient securement mechanism, or (2) at the patient support securement mechanism, or wherein the energy absorbing or impact indicator is between (1) the base and the vehicle, (2) the patient support and the base, (3) the patient securement mechanism and the patient support, (4) the patient support and the emergency vehicle, (5) the patient and the emergency vehicle, or (6) the patient securement mechanism and the emergency vehicle, wherein the energy absorbing device or impact indicator has at least an energy absorbing state and a rigid state or indicates a level of impact at or between any of the respective component or components. | 06-13-2013 |
20150233780 | ENERGY ABSORBING FASTENING SYSTEM - A fastening system includes an energy absorbing or impact indicator and at least one or more of the following: (1) a fastening base for mounting in an emergency vehicle, (2) a patient support engageable with a base, (3) a patient securement mechanism for securing a patient on a patient support, (4) a patient securement mechanism for securing a patient to a vehicle, (5) a patient support securement mechanism operable to secure a patient support in an emergency vehicle, or (6) a patient support securement mechanism operable to secure a patient support to a base, wherein the energy absorbing or impact indicator is located (1) at the patient securement mechanism, or (2) at the patient support securement mechanism, or wherein the energy absorbing or impact indicator is between (1) the base and the vehicle, (2) the patient support and the base, (3) the patient securement mechanism and the patient support, (4) the patient support and the emergency vehicle, (5) the patient and the emergency vehicle, or (6) the patient securement mechanism and the emergency vehicle, wherein the energy absorbing device or impact indicator has at least an energy absorbing state and a rigid state or indicates a level of impact at or between any of the respective component or components. | 08-20-2015 |
Vishnu Mavuram, Plainsboro, NY US
Patent application number | Description | Published |
---|---|---|
20130275612 | SYSTEMS AND METHODS FOR SCALABLE STRUCTURED DATA DISTRIBUTION - Systems and methods for efficiently absorbing, archiving, and distributing any size data sets are provided. Some embodiments provide flexible, policy-based distribution of high volume data through real time streaming as well as past data replay. In addition, some embodiments provide for a foundation of solid and unambiguous consistency across any vendor system through advanced version features. This consistency is particularly valuable to the financial industry, but also extremely useful to any company that manages multiple data distribution points for improved and reliable data availability. | 10-17-2013 |
20160072866 | Systems And Methods For Scalable Structured Data Distribution - Systems and methods for efficiently absorbing, archiving, and distributing any size data sets are provided. Some embodiments provide flexible, policy-based distribution of high volume data through real time streaming as well as past data replay. In addition, some embodiments provide for a foundation of solid and unambiguous consistency across any vendor system through advanced version features. This consistency is particularly valuable to the financial industry, but also extremely useful to any company that manages multiple data distribution points for improved and reliable data availability. | 03-10-2016 |
Vishnu Mmmadi, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20110274110 | METHOD FOR PREVENTING MAC SPOOFS IN A DISTRIBUTED VIRTUAL SWITCH - Described herein are techniques for preventing MAC address spoofs in a virtualization cluster. When a virtual switch first sees a new MAC address on a port designated as being a secure port, the packet is redirected to a virtual supervisor agent used to manage the distributed virtual switch. Assuming the MAC may be bound to the secure port, the supervisor agent broadcasts a message to both the virtual switch that redirected the packet and to virtual switches on other virtualization servers within the cluster. | 11-10-2011 |
Vishnu Navda US
Patent application number | Description | Published |
---|---|---|
20080297413 | Slotted Sectored Scheduling with Steerable Directional Antennas in Wireless LANS - A method includes determining for each access point and each associated client that has traffic to exchange with the access point in either directions of a link a pattern of slots of times that causes minimum interference to clients of other access points in a wireless local area network; deriving a conflict graph of pair wise patterns of different access points representing which patterns conflict on a particular client, the conflict graph representing which patterns of the slots cannot be scheduled simultaneously in a slot so as to avoid interference; and generating a schedule for each access points in the slots such that no two conflicting patterns for two different access points are scheduled in the same slot. | 12-04-2008 |
Vishnu Navda, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090080377 | Distributed Channel Management Based on Channel Hopping in Uncoordinated 802.11 Based WLAN - In accordance with the invention, a method includes i) obtaining first for each AP hopping sequences of other interfering APs; and ii) determining for the AP a respective hopping sequence that maximizes each APs throughput. Preferably, the step of determining comprises for each slot AP choosing a channel that minimizes the number of edges which violate a k-coloring property. In an exemplary embodiment, the method further includes the step of the AP selecting one of (a) a channel uniformly at random from all such channels and (b) selecting a channel that distributes interference evenly as possible among neighboring APs. | 03-26-2009 |
20100195548 | NETWORK ASSISTED POWER MANAGEMENT - Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range. | 08-05-2010 |
20110211517 | EFFICIENT AND RELIABLE MULTICAST OVER A Wi-Fi NETWORK - A “Wi-Fi Multicaster” provides a practical and efficient Wi-Fi multicast system for environments having potentially large numbers of Wi-Fi clients. Significantly, the Wi-Fi Multicaster does not require any changes to the 802.11 protocol, or to the underlying Wi-Fi infrastructure. In various embodiments, the Wi-Fi Multicaster uses pseudo-broadcast, and augments it with destination control, association control and optional proactive FEC (forward error correction) to improve multicast performance. More specifically, the Wi-Fi Multicaster system converts multicast packets to targeted unicast transmissions. To minimize the amount of airtime consumed, the Wi-Fi Multicaster uses destination control in combination with various algorithms for association control. Further, in various embodiments, the Wi-Fi Multicaster includes an adaptive, proactive FEC scheme to reduce overall packet losses. Finally, to overcome the challenges posed by encryption protocols such as 802.1x, the Wi-Fi Multicaster uses a “virtual multicast interface” that allows clients to “share” a common key for each multicast. | 09-01-2011 |
20110314121 | CELLULAR DATA COMMUNICATION FOR MOBILE DEVICES - A method for managing data communication of a mobile device in a mobile network is provided. The method may include receiving a request, at a cloud proxy, to retrieve Internet data from the Internet. The request may originate from an application, and the Internet data may have a plurality unique objects. The method may also include aggregating the Internet data and two or more of the unique objects from the Internet. Furthermore, the method may include forwarding the Internet data and the two or more unique objects to the mobile device in one transmission. | 12-22-2011 |
20110317631 | SCHEDULING COMMUNICATIONS IN A MOBILE DEVICE - A method scheduling outgoing communication in a mobile device is provided. The method includes receiving a signal quality profile for an area in which the device is located. The method further includes receiving a signal from a user application stored on the device that requests the mobile device to make the outgoing communication. Additionally, the method includes determining a current location, a speed, a direction, and a signal quality associated with the device and determining whether the signal quality is above a certain threshold. If not, the method includes predicting a future time at which the signal quality will be above the threshold based at least on the current location, the speed, the direction, the signal quality, and the signal quality profile. Finally, the method includes scheduling the outgoing communication from the mobile device at the future time. | 12-29-2011 |
20120026992 | Energy-Efficient On-The-Fly Wi-Fi Hotspot Using Mobile Devices - One or more mobile devices and a cloud server computing device are utilized to provide Internet access to one or more client computing devices. One of the clients is designated as a Wi-Fi access point. The Wi-Fi access point implements a reverse-infrastructure Wi-Fi mode which tethers available mobile devices and other clients to the access point. The cloud server periodically computes an optimal number of the mobile devices to be used for data striping, and transmits a webpage to a requesting client by striping data associated with the webpage across the optimal number of the mobile devices. | 02-02-2012 |
20120321009 | MULTIPLE INDEPENDENT NARROW CHANNELS IN WIRELESS NETWORKS - A multiple independent narrow-channel wireless network and method for transmitting and received data over a wireless network using a fragmented frequency spectrum. The system and method uses a plurality of narrow wireless channels obtained from splitting a wide wireless channel. Each narrow channel performs sending, receiving, and carrier sensing. Moreover, each narrow channel is independent such that data can be sent or received without any interference from other narrow channels and without synchronization. Embodiments of the system and method include a compound radio having a compound receiver and a compound transmitter. The compound transmitter includes an inter-radiolet symbol synchronization module, to permit use of a single inverse fast Fourier transform block, and a dynamically configurable filter array, to mitigate leakage between channels. The compound receiver uses fraction data rate processing to optimize efficiency. A throughput maximal metric technique is used to determine its frequency of operation in white spaces. | 12-20-2012 |
20120322497 | CLIENT SIDE CELLULAR HANDOFF PREDICTION - One or more techniques and/or systems are disclosed for predicting when a signal handoff may occur from a current base station to a neighboring base station for a mobile device. An indication of signal strength between the mobile device and the current base station and an indication of signal strength between the mobile device and a (e.g., closest) neighboring base station can be monitored by the mobile device. A difference between these signal strength indications can be determined and compared against a threshold (e.g., based upon historical signal handoffs) to predict when and/or where a signal handoff may occur. The predicted signal handoff may be determined by the mobile device and a corresponding notification can be provided so that appropriate action may be taken (e.g., a user may not initiate a call and/or an application may not attempt to communicate data). | 12-20-2012 |
20130290526 | NETWORK ASSISTED POWER MANAGEMENT - Embodiments of the claimed subject matter provide an approach to managing the power state of wireless network devices in a wireless network. Embodiments include a process for modifying the scheduling of data distribution device by referencing the data buffer in an access point for data intended for a wireless network client operating under a power-saving mode, and re-arranging the distribution queue of the access point to be granted priority for a time which coincides with the delivery of a polling beacon to the power-saving wireless client. Other embodiments include a method to create virtual access points for a particular usage, and to leverage access points in a wireless network for particular usages of devices in range. | 10-31-2013 |
20140038656 | SIGNAL-AWARE DATA TRANSFER IN CELLULAR NETWORKS - Described herein are various technologies pertaining to scheduling data transfer between a mobile computing device and a base station in a cellular network. A signal quality value for a signal over which data is to be transferred is computed, and transfer of data is scheduled based upon the signal quality value. If the signal quality value is above a threshold, a wireless radio of the mobile computing device is caused to commence data transfer or continue data transfer. If the signal quality value is below the threshold, and the data need not be immediately transferred, then the wireless radio is caused to transition to an idle state or remain in an idle state. | 02-06-2014 |
20140348155 | MULTIPLE INDEPENDENT NARROW CHANNELS IN WIRELESS NETWORKS - A multiple independent narrow-channel wireless network and method for transmitting and received data over a wireless network using a fragmented frequency spectrum. The system and method uses a plurality of narrow wireless channels obtained from splitting a wide wireless channel. Each narrow channel performs sending, receiving, and carrier sensing. Moreover, each narrow channel is independent such that data can be sent or received without any interference from other narrow channels and without synchronization. Embodiments of the system and method include a compound radio having a compound receiver and a compound transmitter. The compound transmitter includes an inter-radiolet symbol synchronization module, to permit use of a single inverse fast Fourier transform block, and a dynamically configurable filter array, to mitigate leakage between channels. The compound receiver uses fraction data rate processing to optimize efficiency. A throughput maximal metric technique is used to determine its frequency of operation in white spaces. | 11-27-2014 |
Vishnu Ram Omanakutty Amma Vijayaraghavan Nair, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20140094181 | Enhanced Metrics Exchange for a Wireless Network - Apparatus, methods, computer program products, and software for reducing interference occurring when a capacity booster cell has a coverage area within the overlapping coverage areas of more than one coverage cell are disclosed. Essentially, weights are assigned, either by individual capacity booster cells or by zone controllers with which a plurality of capacity booster cells communicate, to coverage cells. The interfering coverage cells are ranked in accordance with the assigned weights, and the metrics to be reported to each of the interfering coverage cells are adjusted in view of the assigned weights. The adjusted metrics are then reported to each of the interfering coverage cells to influence the ABS muting pattern subsequently used by each of said interfering coverage cells. The technique of taking measurements to provide a rank-ordered list may be applied to other situations, such as loading, the utilization of various data and control channels, the mobility of the users, the throughput or spectral efficiency, the amount of spectrum available at the different cells, or even the relative number of antennas available at the different cells. | 04-03-2014 |
20140126481 | Block Scheduling Method For Scalable And Flexible Scheduling In A HSUPA System - A method for block scheduling of users is described. The method includes, in response to determining that a number of users in a wireless network exceed a threshold number, allotting the users into k block. The value of k is at least two. For each block, the method performs determining residual information for the block. The method also includes, for each block of the k blocks, loading into a fast-access memory user data for users in the block and scheduling the block in a scheduling period based at least in part on the user data and the residual information for k−1 other blocks. Apparatus and computer readable media are also described. | 05-08-2014 |
Vishnu Ram Ov, Trivandrum IN
Patent application number | Description | Published |
---|---|---|
20080205362 | Address Resolution Protocol-Based Wireless Access Point Method and Apparatus - A wireless access point ( | 08-28-2008 |
20080212562 | Method and Apparatus For Facilitate Communications Using Surrogate and Care-of-Internet Protocol Addresses - A wireless access point ( | 09-04-2008 |
20080240037 | Method and Apparatus to Facilitate Mobile Station Communications Using Internet Protocol-Based Communications - In a communication network ( | 10-02-2008 |
Vishnu Ram Ov, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20080294891 | Method for Authenticating a Mobile Node in a Communication Network - A method for authenticating a mobile node ( | 11-27-2008 |
Vishnu Ravinuthula, Allen, TX US
Patent application number | Description | Published |
---|---|---|
20130093526 | "REPLICA BASED" VCO GAIN AND LOOP FILTER'S JITTER REDUCTION TECHNIQUE FOR RING OSCILLATOR PLLS - Reducing a gain of a VCO, which may be used in a serdes system, includes using an oscillator replicating the VCO. The oscillator frequency varies according to PVT conditions of circuit elements of the oscillator, which affect a speed of the circuit elements. A first circuit receives an output of the oscillator to produce a current that varies inversely proportionally to the oscillator frequency. A second circuit injects the current into a power supply line of the VCO. Thus, high VCO frequencies can be attained. By reducing the gain of the VCO, thermal noise contribution of the loop resistor and the loop capacitor required for desired loop bandwidth are reduced. During fast corner conditions, minimal current is injected into the VCO. During slow corner conditions, high current is injected into the VCO. These help keep VCTRL of the PLL loop close to a mid-rail operating region. | 04-18-2013 |
20140016718 | REDUCTION IN POWER SUPPLY INDUCED JITTER ON A SERDES TRANSMITTER - In an embodiment of the invention, a frequency divider in a PLL (phase-locked loop) circuit is provided power from the power supply that provides power to a transmission circuit. The PLL is configured to receive a first DC (direct current) reference voltage, a second DC voltage and a reference clock signal. The PLL is configured to generate a transmission clock signal. A transmission circuit is configured to receive the transmission clock signal, the second DC voltage and a data bus where the data bus includes a plurality of data bits in parallel. The transmission circuit transmits data serially. | 01-16-2014 |
Vishnu Rumalla, Southlake, TX US
Patent application number | Description | Published |
---|---|---|
20150066143 | Silicone Filamentous Configurations - This novel solid silicone device is designed to let women have more and better choices in breast implant technology for both cosmetic and reconstructive purposes, include shape filling and solid devices overcoming longstanding needs. | 03-05-2015 |
Vishnu Saralertsophon, New South Wales AU
Patent application number | Description | Published |
---|---|---|
20110162654 | FLEXIBLE STRUCTURE FOR MASK, AND METHOD AND APPARATUS FOR EVALUATING PERFORMANCE OF A MASK IN USES - A respiratory mask includes a frame and a flexible structure provided to the frame and adapted to engage a patient's face. The flexible structure includes a chamber filled with a first gel and a second gel that is relatively harder than the first gel. A ratio of height of the first gel to the second gel in a lip region is in the range of about 0.25 to about 0.6. | 07-07-2011 |
Vishnu Saralertsophon, Sydney AU
Patent application number | Description | Published |
---|---|---|
20150314099 | FLEXIBLE STRUCTURE FOR MASK, AND METHOD AND APPARATUS FOR EVALUATING PERFORMANCE OF A MASK IN USE - Headgear for a respiratory mask assembly includes at least one strap. The at least one strap includes one or more bladders filled with a gel. | 11-05-2015 |
Vishnu Sharma, Bhubaneswar IN
Patent application number | Description | Published |
---|---|---|
20150178236 | COMMUNICATION WITH ACCESSORIES - A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also be established. A first set of messages may be communicated via the accessory interface between an application of the portable electronic device and a first accessory of the plurality of accessories. A second set of messages may be communicated via the accessory interface between the application and a second accessory of the plurality of accessories. The first and second sets of messages communicated between the portable electronic device and the accessory interface may be formatted in accordance with the same data exchange pattern. | 06-25-2015 |
20150281195 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150281196 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150281199 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving, from a first computer system at a second computer system, a message including a data portion, wherein the data portion is associated with a security token, and wherein the data portion includes a session key. The method may also include performing, at the second computer system, processing associated with the message. The method may further include accessing, responsive to the processing, the session key from the data portion. | 10-01-2015 |
20150281213 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving, at a first computer system, a first message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may also include generating a second message including the first data portion. The method may further include communicating the second message from the first computer system to a second computer system. | 10-01-2015 |
20150281241 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include receiving a first message associated with communication between a first computer system and a second computer system, wherein the receiving further includes receiving the first message at a third computer system. The method may also include performing, at the third computer system, processing associated with the first message. The method may also include generating, responsive to the processing, a second message including a first data portion and a second data portion, wherein the first data portion is associated with a security token, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The method may further include communicating the second message from the third computer system to the first computer system. | 10-01-2015 |
20150281254 | INCREASED COMMUNICATION SECURITY - Authentication data may be generated and included in a Constrained Application Protocol (CoAP) message communicated from a first computer system to a second computer system. The authentication data may allow the second computer system to perform message validation for verifying the authenticity of the first computer system and/or the integrity of the CoAP message. And in one embodiment, where the CoAP message includes a nonce, security can be improved by allowing the second computer system to advantageously detect and/or act on a replay attack. | 10-01-2015 |
20150326539 | INCREASED COMMUNICATION SECURITY - A method of increasing communication security may include determining whether a first computer system is authorized to communicate with a second computer system, wherein the determining is performed at a third computer system. A message may be communicated from the third computer system to the first computer system, wherein the message includes a first data portion and a second data portion, wherein the first data portion includes a first instance of a session key, and wherein the second data portion includes a second instance of the session key. The second data portion may be decrypted at the first computer system to access the second instance of the session key. Another message, including the first data portion, may be communicated from the first computer system to the second computer system. The first data portion may be decrypted at the second computer system to access the first instance of the session key. | 11-12-2015 |
20160105465 | COMMUNICATION WITH ACCESSORIES - A plurality of connections may be established between an accessory interface and a plurality of accessories. A connection between the accessory interface and a portable electronic device may also be established. A first set of messages may be communicated via the accessory interface between the portable electronic device and a first accessory of the plurality of accessories. A second set of messages may be communicated via the accessory interface between the portable electronic device and a second accessory of the plurality of accessories. The first and second sets of messages communicated between the portable electronic device and the accessory interface may be formatted in accordance with a data exchange pattern. | 04-14-2016 |
Vishnu Sishtla, Manlius, NY US
Patent application number | Description | Published |
---|---|---|
20110132029 | Isolation of Unit Mounted Drive From Chiller Vibrations - A mounting bracket is configured to isolate a drive module of a compression type chiller assembly from vibrations. The mounting bracket includes a bracket plate configured to be attached to a chiller assembly component adjacent to the drive module, a mounting plate transversely attached to the bracket plate and configured to be connected to a rail extending along a bottom side of the drive module, and an isolator pad arranged generally over the mounting plate such that the pad is configured to be interposed between the mounting plate and the rail of the drive module. | 06-09-2011 |
Vishnu Sivaji, Cubana, IL US
Patent application number | Description | Published |
---|---|---|
20100141590 | Soft Keyboard Control - This document describes tools associated with soft keyboard control functions. In some implementations, the tools recognize a keyboard launch gesture on a touch sensitive screen and present a preview of a keyboard on the touch sensitive screen responsive to the launch gesture. The tools can also display the keyboard on the touch sensitive screen responsive to cessation of the launch gesture. | 06-10-2010 |
Vishnu Sivaji, Seattle, WA US
Patent application number | Description | Published |
---|---|---|
20120092381 | Snapping User Interface Elements Based On Touch Input - An invention is disclosed for using touch gestures to zoom a video to full-screen. As the user reverse-pinches on a touch-sensitive surface to zoom in on a video, the invention tracks the amount of a zoom. When the user has zoomed to the point where one of the dimensions (height or width) of the video reaches a threshold (such as some percentage of a dimension of the display device—e.g. the width of the video reaches 80% of the width of the display device), the invention determines to display the video in full-screen, and “snaps” the video to full-screen. The invention may do this by way of an animation, such as expanding the video to fill the screen. | 04-19-2012 |
Vishnu Varadaraj, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20130067578 | Malware Risk Scanner - A technique for improving the installation of anti-malware software performs an analysis of a computer on which anti-malware software is to be installed prior to complete installation of the anti-malware software. If the analysis determines that the computer may already contain malware, then an attempt may be made to scan and clean the computer prior to the installation of a portion of the anti-malware software. Otherwise, the pre-installation scan and clean may be bypassed, allowing the installation of that portion of the anti-malware software. | 03-14-2013 |
20140325659 | MALWARE RISK SCANNER - A technique for improving the installation of anti-malware software performs an analysis of a computer on which anti-malware software is to be installed prior to complete installation of the anti-malware software. If the analysis determines that the computer may already contain malware, then an attempt may be made to scan and clean the computer prior to the installation of a portion of the anti-malware software. Otherwise, the pre-installation scan and clean may be bypassed, allowing the installation of that portion of the anti-malware software. | 10-30-2014 |
Vishnu Vettrival, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20160063187 | AUTOMATED SYSTEM FOR HANDLING FILES CONTAINING PROTECTED HEALTH INFORMATION - The current document is directed to methods and automated systems for handling files and other data during a data ingestion process that may contain PHI within the file content, filenames, file-associated metadata, and other such data-associated information. The methods and automated systems protect sensitive health information using encryption methods to prevent the protected health information from being exposed. In certain implementations, the currently disclosed automated system includes a client-network system, one or more client servers, an encrypted data-storage device including a source folder for temporarily storing original files downloaded from the client network system and a second folder for storing PHI-free files created from the original files, and processes that create the PHI-free files from the original files, remove the original files from the source folder, and securely copy the PHI-free files to a secure file-transfer protocol server to be processed for later use. | 03-03-2016 |
Vishnu Vettrivel, Bothell, WA US
Patent application number | Description | Published |
---|---|---|
20150370228 | DETERMINING CONTROL ACTIONS OF DECISION MODULES - Techniques are described for implementing automated control systems that manipulate operations of specified target systems, such as by modifying or otherwise manipulating inputs or other control elements of the target system that affect its operation (e.g., affect output of the target system). An automated control system may have one or more decision modules that each controls at least some of a target system, with each decision module's control actions being automatically determined to reflect near-optimal solutions with respect to or one more goals and in light of a target system model having multiple inter-related constraints, such as based on a partially optimized solution that is within a threshold amount of a fully optimized solution. Such determination of one or more control actions to perform may occur for a particular time and particular decision module, as well as be repeated over multiple times for ongoing control. | 12-24-2015 |
20150370232 | MANAGING COORDINATED CONTROL BY MULTIPLE DECISION MODULES - Techniques are described for implementing automated control systems that manipulate operations of specified target systems, such as by modifying or otherwise manipulating inputs or other control elements of the target system that affect its operation (e.g., affect output of the target system). An automated control system may in some situations have a distributed architecture with multiple decision modules that each controls a portion of a target system and operate in a partially decoupled manner with respect to each other, such as by each decision module operating to synchronize its local solutions and proposed control actions with those of one or more other decision modules, in order to determine a consensus with those other decision modules. Such inter-module synchronizations may occur repeatedly to determine one or more control actions for each decision module at a particular time, as well as to be repeated over multiple times for ongoing control. | 12-24-2015 |
20160004228 | COOPERATIVE DISTRIBUTED CONTROL OF TARGET SYSTEMS - Techniques are described for implementing automated control systems that manipulate operations of specified target systems, such as by modifying or otherwise manipulating inputs or other control elements of the target system that affect its operation (e.g., affect one or more outputs of the target system). An automated control system for such a target system may in some situations have a distributed architecture that provides cooperative distributed control of the target system, such as with multiple decision modules that each control a portion of the target system and operate in a partially decoupled manner with respect to each other, with the various decision modules' operations being at least partially synchronized and each having a consensus with one or more other decision modules, even if a fully synchronized convergence of all decision modules at all times is not guaranteed. | 01-07-2016 |
Vishnu Vettrivel, Bellevue, WA US
Patent application number | Description | Published |
---|---|---|
20150178052 | AUTOMATED EXPERIMENTATION PLATFORM - The present document is directed to an automated experimentation platform that provides a visual integrated development environment (“IDE”) that allows a user to construct and execute various types of data-driven workflows. The automated experimentation platform includes back-end components that include API servers, a catalog, a cluster-management component, and execution-cluster nodes. Workflows are visually represents as directed acyclic graphs and texturally encoded. The workflows are transformed into jobs that are distributed for execution to the execution-cluster nodes. | 06-25-2015 |