Patents by Inventor Aditya Kumar

Aditya Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8881125
    Abstract: Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation.
    Type: Grant
    Filed: June 11, 2012
    Date of Patent: November 4, 2014
    Assignee: International Business Machines Corporation
    Inventors: Marc Alan Dickenson, Andrew Geissler, Adriana Kobylak, Aditya Kumar
  • Publication number: 20140260450
    Abstract: An electronic locking mechanism has a body portion with movable retaining members that are controlled utilizing an electrically controlled actuator. The actuator operates the retaining member to move radially outwardly of the body portion circumference in a locked position and allows the retaining member to move radially inwardly of the circumference in an unlocked position. An electronic key can be utilized to operate the electronic locking mechanism.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Norman Binz Dewalch, Aditya Kumar Palthi, Tyler Dean Todd
  • Publication number: 20140260288
    Abstract: In accordance with one aspect of the present technique, a method is disclosed. The method includes modifying one or more operational parameters of a gas turbine (GT) to increase an exhaust gas temperature above a standard start-up temperature. The method also includes receiving at least one of GT operational data, heat recovery steam generator (HRSG) operational data, and steam turbine (ST) operational data from a plurality of sensors. The method further includes predicting a ST roll-off time based on at least one of the GT operational data, the HRSG operational data, and the ST operational data. The method further includes modifying the one or more operational parameters of the GT to satisfy one or more ST roll-off permissives at the predicted ST roll-off time.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: General Electric Company
    Inventors: Fernando Javier D'Amato, Rodrigo Lopez-Negrete de la Fuente, Aditya Kumar, Emrah Biyik
  • Publication number: 20140260455
    Abstract: An electronic locking mechanism has a body portion with movable retaining members that are controlled utilizing an electrically controlled actuator. The actuator operates the retaining member to move radially outwardly of the body portion circumference in a locked position and allows the retaining member to move radially inwardly of the circumference in an unlocked position. An electronic key can be utilized to operate the electronic locking mechanism.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Norman Binz Dewalch, Aditya Kumar Palthi, Tyler Dean Todd, II
  • Publication number: 20140260456
    Abstract: An electronic locking mechanism has a body portion with movable retaining members that are controlled utilizing an electrically controlled actuator. The actuator operates the retaining member to move radially outwardly of the body portion circumference in a locked position and allows the retaining member to move radially inwardly of the circumference in an unlocked position. An electronic key can be utilized to operate the electronic locking mechanism.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Dewalch Technologies, Inc.
    Inventors: Norman Binz Dewalch, Aditya Kumar Palthi, Tyler Dean Todd, II
  • Patent number: 8811158
    Abstract: In one example, a method includes identifying a plurality of common direct routes to computing devices that are associated with a common indirect route to the computing devices. The method also includes generating a direct route structure that is associated with an entry of a forwarding structure using a next hop list, wherein the next hop list comprises: (1) a reference that identifies the direct route structure, the direct route structure comprising a plurality of direct next hops associated with the common direct routes to computing devices, (2) and an indirect next hop associated with an indirect next hop to the computing devices. The method also includes configuring the next hop list to use the direct route structure to route network data. The method also includes forwarding, by the computing device, network data according to the forwarding structure and the direct route structure.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: August 19, 2014
    Assignee: Juniper Networks, Inc.
    Inventor: Meher Aditya Kumar Addepalli
  • Publication number: 20140163945
    Abstract: A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. If a check frame is not inserted in the list, the memory frame handles the request directly, but if a check frame is inserted, then the check operation is performed. The check frame can be a synchronization frame that blocks access to a memory frame while the check frame is present, or the check frame may be a breakpoint, watch or exception frame that calls a suitable handling routine. Additional check frames may be chained between the interface and the memory subsystem to handle synchronization, breakpoints, memory watches or other accesses to or information gathering associated with the memory frame.
    Type: Application
    Filed: December 7, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Andrew R. Malota, Ronald L. Rockhold
  • Publication number: 20140163946
    Abstract: A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame.
    Type: Application
    Filed: December 7, 2012
    Publication date: June 12, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Ronald L. Rockhold
  • Publication number: 20140163947
    Abstract: A simulation technique that handles accesses to a frame of instruction memory by inserting a command object between a frame proxy and a memory frame provides improved throughput in simulation environments. The instruction frame, if present, processes the access to the frame. If an instruction frame is not present for the accessed frame, the memory frame handles the request directly. The instruction frame caches fetched and decoded instructions and may be inserted at the first access to a corresponding instruction memory frame. The instruction frame can track write accesses to instruction memory so that changes to the instruction memory can be reflected in the state of the instruction frame. Additional check frames may be chained between the interface and the memory frame to handle breakpoints, instruction memory watches or other access checks on the instruction memory frame.
    Type: Application
    Filed: November 26, 2013
    Publication date: June 12, 2014
    Applicant: International Business Machines Corporation
    Inventors: Tracy Bashore, Ahmed Gheith, Aditya Kumar, Ronald L. Rockhold
  • Publication number: 20130332913
    Abstract: Performance impact of a computing system component on a transient end-to-end system operation is estimated by profiling an overall characteristic for a transient end-to-end system operation, and simultaneously profiling a program code component for a second characteristic, thereby collecting a first pair of data points, repeating the operational period while introducing a known artificial delay into the program code component, and while profiling the overall performance characteristic for the system and for the program code component, thereby collecting pairs of data points for each repetition of the operational period for each of the artificial delays; curve fitting and analyzing intercepts of the collected data points to estimate the effect of the artificial delays in the program code component on the transient end-to-end system operation; and reporting the estimate correlated to potential optimal transient end-to-end system operation.
    Type: Application
    Filed: June 11, 2012
    Publication date: December 12, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORP.
    Inventors: Marc A. Dickenson, Andrew Geissler, Adriana Kobylak, Aditya Kumar
  • Patent number: 8578200
    Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
  • Patent number: 8578201
    Abstract: Method is described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Grant
    Filed: November 25, 2012
    Date of Patent: November 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel, Alwood P. Williams, III
  • Patent number: 8572611
    Abstract: A management system for managing computer resources assigned by a hypervisor to one or more logical partitions and/or one or more appliance partitions in a multi-user computer system receives login information from a new user logging into the computer system through a service interface (e.g. a hardware management console) or a non-service interface, builds a conflict list, and sends the conflict list for presentation to the new user. The new user is notified of any users that are logged into any part of the computer system that could conflict with the new user's actions. Such users may be logged into the computer system through service and/or non-service interfaces. In one embodiment, the new user can choose to continue logging in irrespective of any conflicts shown. After choosing to continue, the new user is preferably requested to input an end-time. This end-time may be displayed, in turn, to all subsequent users that log into any part of the computer system that could cause conflict.
    Type: Grant
    Filed: March 3, 2010
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Curtis S. Eide, Aditya Kumar, Steven E. Vaughan, Bradley J. Vette, Kevin Wendzel
  • Publication number: 20130242469
    Abstract: The present invention relates to an apparatus and method for securing a box cover to a watthour meter socket box. In certain embodiments, the apparatus has a clamping member that fits over a wall of a meter box and a lock housing that locks to the clamping member after a box cover has been installed thereby securing the cover to the box. Further embodiments relate to a clamping member and a lock housing wherein the clamping member generally comprises a clamp, clamp actuating member, and fastening shelf, and wherein the clamp actuating member may comprise a lever or threaded member to attach the clamping member to a wall of a meter box base. The box cover is secured to the meter box base when the clamping member is secured to the wall and used in combination with the lock housing and a locking shaft.
    Type: Application
    Filed: November 27, 2012
    Publication date: September 19, 2013
    Applicant: DeWalch Technologies, Inc.
    Inventors: Tyler Dean Todd, II, Aditya Kumar Palthi
  • Patent number: 8538561
    Abstract: System and method to estimate variables in an integrated gasification combined cycle (IGCC) plant are provided. The system includes a sensor suite to measure respective plant input and output variables. An extended Kalman filter (EKF) receives sensed plant input variables and includes a dynamic model to generate a plurality of plant state estimates and a covariance matrix for the state estimates. A preemptive-constraining processor is configured to preemptively constrain the state estimates and covariance matrix to be free of constraint violations. A measurement-correction processor may be configured to correct constrained state estimates and a constrained covariance matrix based on processing of sensed plant output variables. The measurement-correction processor is coupled to update the dynamic model with corrected state estimates and a corrected covariance matrix. The updated dynamic model may be configured to estimate values for at least one plant variable not originally sensed by the sensor suite.
    Type: Grant
    Filed: March 22, 2011
    Date of Patent: September 17, 2013
    Assignee: General Electric Company
    Inventors: Aditya Kumar, Ruijie Shi, Mustafa Dokucu
  • Publication number: 20130184961
    Abstract: A method and system for online power management of a turbine engine is provided. The method includes operating an engine control system on a first bandwidth, filtering at least one data input from the engine control system to a second bandwidth, and receiving, by a power management system operating on the second bandwidth, the at least one filtered data input. The method also includes predicting an engine operating condition using the at least one filtered data input using a closed-loop engine model, determining an optimal engine power management based on the prediction, solving a constrained optimization for a desired optimization objective, and outputting the optimal engine power management to the engine control system.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 18, 2013
    Inventors: Aditya Kumar, Santanu Chatterjee, Pierino Gianni Bonanni, Avinash Vinayak Taware
  • Patent number: 8473571
    Abstract: A presentation state is received from the presenting application. The presentation state may represent a current state of the local presentation. A request for the presentation state is received from the viewing application. In response to receiving the request for the presentation state, the presentation state is provided to the viewing application. A request for presentation data synchronized to the presentation state is received from the viewing application. In response to receiving the request for presentation data synchronized to the presentation state, the presentation file is transformed into the presentation data synchronized to the presentation state. The presentation data synchronized to the presentation state is provided to the viewing application. The viewing application may be operative to read the presentation data and to display a remote presentation in response to reading the presentation data.
    Type: Grant
    Filed: January 8, 2009
    Date of Patent: June 25, 2013
    Assignee: Microsoft Corporation
    Inventors: Nathan Robert Penner, Sharad Kumar Garg, Aditya Kumar, Gideon Goodwin
  • Patent number: 8464269
    Abstract: Techniques are described for managing states of an object using a finite-state machine. The states may be used to indicate whether an object has been added, removed, requested or updated. Embodiments of the invention generally include dividing a process into at least two threads where a first thread changes the state of the object while the second thread performs the processing of the data found in the object. While the second thread is processing the data, the first thread may receive additional updates and change the states of the objects to inform the second thread that it should process the additional updates when the second thread becomes idle.
    Type: Grant
    Filed: December 16, 2010
    Date of Patent: June 11, 2013
    Assignee: International Business Machines Corporation
    Inventors: Aditya Kumar, Kevin Wendzel
  • Patent number: 8417361
    Abstract: Control system and method for controlling an integrated gasification combined cycle (IGCC) plant are provided. The system may include a controller coupled to a dynamic model of the plant to process a prediction of plant performance and determine a control strategy for the IGCC plant over a time horizon subject to plant constraints. The control strategy may include control functionality to meet a tracking objective and control functionality to meet an optimization objective. The control strategy may be configured to prioritize the tracking objective over the optimization objective based on a coordinate transformation, such as an orthogonal or quasi-orthogonal projection. A plurality of plant control knobs may be set in accordance with the control strategy to generate a sequence of coordinated multivariable control inputs to meet the tracking objective and the optimization objective subject to the prioritization resulting from the coordinate transformation.
    Type: Grant
    Filed: March 22, 2011
    Date of Patent: April 9, 2013
    Assignee: General Electric Company
    Inventors: Aditya Kumar, Ruijie Shi, Rajeeva Kumar, Mustafa Dokucu
  • Publication number: 20120266010
    Abstract: Method, apparatus and system are described for converting received timestamps to a time-recording standard recognized by the receiving computing system. Embodiments of the invention generally include receiving data from an external device that includes a timestamp. If the received data is the first communication from the external device, creating a time base used for converting subsequently received timestamps to a recognized standard. Moreover, the system updates the time base if a counter failure at the external device is detected. When the external device transmits subsequent data, the time base is added to the subsequently received timestamps to convert the subsequent timestamps to a time-recording standard recognized by the computing system.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ADITYA KUMAR, KEVIN WENDZEL, ALWOOD P. WILLIAMS, III