Patents by Inventor Akshay Vashist

Akshay Vashist has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11657061
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media for using multiple data structures to correlate information from multiple distributed data sources. The method can include receiving a request to create a report data structure, generating first data representing a digital report template the generated first data including (i) a first digital template defining multiple keyed data fields that are configured to be dynamically populated and (ii) a second digital template defining one or more instances of static data that can each be selectively activated or deactivated based on the request, extracting keyed data and natural language data from files in one or more of the data sources, mapping the extracted data to the multiple keyed data fields of the report template, and generating a report data structure based on (i) the mapped data and (ii) static data that has been selectively activated based on the request.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: May 23, 2023
    Assignee: OTSUKA AMERICA PHARMACEUTICAL, INC.
    Inventors: Akshay Vashist, Nipa Parikh, Jennifer Cichone, Krystle Pianka
  • Publication number: 20220253729
    Abstract: Systems and methods are described for a scalable approach to build a knowledge database of clinical trial data by extracting, aligning, and synthesizing information from a variety of sources including clinical trial registries, abstracts of papers, and full-text medical journal articles, as well as external gazetteers, dictionaries, and lexicons. For examples, a system may implement a flexible and repeatable workflow that extracts both structured and semi-structured elements from unstructured data such as journal articles using a ‘back off strategy’ in which specialized rules are used to extract structured, clinical trial design parameters as well as information retrieval techniques that exploit regularities in language used in the medical literature to discover semi-structured trial outcomes.
    Type: Application
    Filed: February 1, 2022
    Publication date: August 11, 2022
    Applicant: Otsuka Pharmaceutical Development & Commercialization, Inc.
    Inventors: Akshay Vashist, Chumki Basu, Todd Huster, Pingji Lin, Dennis Mok, John R. Wullert, II
  • Publication number: 20190391985
    Abstract: Methods, systems, apparatus, including computer programs encoded on computer storage media for using multiple data structures to correlate information from multiple distributed data sources. The method can include receiving a request to create a report data structure, generating first data representing a digital report template the generated first data including (i) a first digital template defining multiple keyed data fields that are configured to be dynamically populated and (ii) a second digital template defining one or more instances of static data that can each be selectively activated or deactivated based on the request, extracting keyed data and natural language data from files in one or more of the data sources, mapping the extracted data to the multiple keyed data fields of the report template, and generating a report data structure based on (i) the mapped data and (ii) static data that has been selectively activated based on the request.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 26, 2019
    Inventors: Akshay Vashist, Nipa Parikh, Jennifer Cichone, Krystle Pianka
  • Patent number: 9386030
    Abstract: An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions.
    Type: Grant
    Filed: September 17, 2013
    Date of Patent: July 5, 2016
    Assignee: VENCORE LABS, INC.
    Inventors: Akshay Vashist, Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Yukiko Sawaya, Akira Yamada, Ayumu Kubota
  • Patent number: 9167463
    Abstract: A communication node operable to estimate faults in a mobile ad hoc network and method of performing the same. In one embodiment, the communication node includes a processor and memory including computer program code configured to, with the processor, cause the communication node to monitor a set of observable parameters at the communication node, produce a fault estimate at the communication node from the set of observable parameters, and provide the fault estimate to a global fault detector at another communication node.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: October 20, 2015
    Assignee: Telcordia Technologies, Inc.
    Inventors: Constantin Serban, Akshay Vashist, Rauf Izmailov, Ritu Chadha, Kyriakos Manousakis, Cho-Yu Jason Chiang
  • Patent number: 9135570
    Abstract: A method for active learning using privileged information is disclosed. A processing device receives a set of labeled examples and a set of unlabeled examples. For each unlabeled example in the set of unlabeled examples, the processing device determines whether to query at least one of an oracle to obtain a label for the unlabeled example or a teacher to obtain privileged information about the unlabeled example. The processing device outputs a decision rule based on minimizing a number of queries to the oracle for a label and the teacher for privileged information. Minimizing the number of queries to the teacher and the oracle is based on a cost of querying the teacher or the oracle.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: September 15, 2015
    Assignee: Vencore Labs, Inc.
    Inventors: Akshay Vashist, Ritu Chadha
  • Publication number: 20140355454
    Abstract: A communication node operable to estimate faults in a mobile ad hoc network and method of performing the same. In one embodiment, the communication node includes a processor and memory including computer program code configured to, with the processor, cause the communication node to monitor a set of observable parameters at the communication node, produce a fault estimate at the communication node from the set of observable parameters, and provide the fault estimate to a global fault detector at another communication node.
    Type: Application
    Filed: September 4, 2012
    Publication date: December 4, 2014
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Constantin Serban, Akshay Vashist, Rauf Izmailov, Ritu Chadha, Kyriakos Manousakis, Cho-Yu Jason Chiang
  • Patent number: 8775364
    Abstract: A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating certain formulas representing the answers; and determining whether there is a minimum number of distinct models of these formulas conjoined with the relevant anonymity predicates along with previous answers and general background knowledge, and when that number of models does not exist, suppressing the answers. In one aspect, the method further comprises creating formulas encoding the information conveyed by the answer; and combining the formulas encoding the information with prior information.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: July 8, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Konstantine Arkoudas, Shoshana Loeb, Akshay Vashist
  • Patent number: 8769677
    Abstract: A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.
    Type: Grant
    Filed: July 12, 2012
    Date of Patent: July 1, 2014
    Assignees: Telcordia Technologies, Inc., KDDI Corporation
    Inventors: Akshay Vashist, Yitzchak M. Gottlieb, Abhrajit Ghosh, Yukiko Sawaya, Ayumu Kubota
  • Publication number: 20140082730
    Abstract: An apparatus and method predict and detect network attacks by using a diverse set of indicators to measure aspects of the traffic and by encoding traffic characteristics using these indicators of potential attacks or anomalous behavior. The set of indicators is analyzed by supervised learning to automatically learn a decision rule which examines the temporal patterns in the coded values of the set of indicators to accurately detect and predict network attacks. The rules automatically evolve in response to new attacks as the system updates its rules periodically by analyzing new data and feedback signals about attacks associated with that data. To assist human operators, the system also provides human interpretable explanations of detection and prediction rules by pointing to indicators whose values contribute to a decision that there is an existing network attack or an imminent network attack. When such indictors are detected, an operator can take remediation actions.
    Type: Application
    Filed: September 17, 2013
    Publication date: March 20, 2014
    Inventors: Akshay VASHIST, Ritu CHADHA, Abhrajit GHOSH, Alexander POYLISHER, Yukiko SAWAYA, Akira YAMADA, Ayumu KUBOTA
  • Publication number: 20140020066
    Abstract: A system and method for spammer host detection from network flow data profiles comprises constructing one or more cluster profiles and detecting spammer hosts. Construction cluster profiles comprises observing network flow data from one or more hosts; for each host, representing the network flow data associated with the host as a multidimensional vector; clustering the vectors of the hosts into the plurality of cluster profiles; annotating each cluster profile using at least one of black lists and white lists; and calculating a confidence in each cluster profile annotation. Detecting spammer hosts comprises observing the network flow data from a new host; representing the network flow data associated with the new host as a multidimensional vector, and placing the new multidimensional vector of the new host into one cluster profile of the one or more cluster profiles.
    Type: Application
    Filed: July 12, 2012
    Publication date: January 16, 2014
    Applicants: KDDI Corporation, Telcordia Technologies, Inc.
    Inventors: Akshay Vashist, Yitzchak M. Gottlieb, Abhrajit Ghosh, Yukiko Sawaya, Ayumu Kubota
  • Patent number: 8589334
    Abstract: Methods and systems are provided for developing decision information relating to a single system based on data received from a plurality of sensors. The method includes receiving first data from a first sensor that defines first information of a first type that is related to a system, receiving second data from a second sensor that defines second information of a second type that is related to said system, wherein the first type is different from the second type, generating a first decision model, a second decision model, and a third decision model, determining whether data is available from only the first sensor, only the second sensor, or both the first and second sensors, and selecting based on the determination of availability an additional model to apply the available data, wherein the additional model is selected from a plurality of additional decision models including the third decision model.
    Type: Grant
    Filed: January 18, 2011
    Date of Patent: November 19, 2013
    Assignee: Telcordia Technologies, Inc.
    Inventor: Akshay Vashist
  • Publication number: 20130124452
    Abstract: A system and method for secure data management is presented. The method comprises receiving a query, performing the query and obtaining answers to it, creating certain formulas representing the answers; and determining whether there is a minimum number of distinct models of these formulas conjoined with the relevant anonymity predicates along with previous answers and general background knowledge, and when that number of models does not exist, suppressing the answers. In one aspect, the method further comprises creating formulas encoding the information conveyed by the answer; and combining the formulas encoding the information with prior information.
    Type: Application
    Filed: May 7, 2012
    Publication date: May 16, 2013
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Konstantine Arkoudas, Shoshana Loeb, Akshay Vashist
  • Patent number: 8315956
    Abstract: A method and system for use in describing a phenomenon of interest. The method and system computes a decision rule for use in describing the phenomenon of interest using training data relating to the phenomenon of interest, labels for labeling the training data, and hidden information about the training data or directed distances obtained from the hidden information, as inputs.
    Type: Grant
    Filed: November 24, 2008
    Date of Patent: November 20, 2012
    Assignee: NEC Laboratories America, Inc.
    Inventors: Akshay Vashist, Vladimir Vapnik
  • Publication number: 20120209796
    Abstract: A system and method for nexting is presented. The method comprises computing an expected event, observing a new event, when the expected event matches the new event, processing the new event and performing action in accordance with given concepts, when the expected event does not match the new event and the new event can be explained based on the given concepts, processing the new event and performing action in accordance with the given concepts, and when the expected event does not match the new event and the new event cannot be explained based on the given concepts, employing learning mechanism and performing action decided on by the learning mechanism. In one aspect, the method comprises generating new concepts using reasoning or learning. In one aspect, the method comprises converting sensed numerical data into events of interest via the application of learned functions operating on the numerical data.
    Type: Application
    Filed: August 11, 2011
    Publication date: August 16, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Akshay Vashist, Shoshana Loeb
  • Publication number: 20120023062
    Abstract: Methods and systems are provided for developing decision information relating to a single system based on data received from a plurality of sensors. The method includes receiving first data from a first sensor that defines first information of a first type that is related to a system, receiving second data from a second sensor that defines second information of a second type that is related to said system, wherein the first type is different from the second type, generating a first decision model, a second decision model, and a third decision model, determining whether data is available from only the first sensor, only the second sensor, or both the first and second sensors, and selecting based on the determination of availability an additional model to apply the available data, wherein the additional model is selected from a plurality of additional decision models including the third decision model.
    Type: Application
    Filed: January 18, 2011
    Publication date: January 26, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventor: Akshay Vashist
  • Publication number: 20120020216
    Abstract: Loads for a wireless network having a plurality of end nodes are predicted by constructing a computer data set of end-to-end pairs of the end nodes included in the network using a computer model of the network; constructing a computerized set of observables from social information about users of the network; developing a computerized learned model of predicted traffic using at least the data set and the observables; and using the computerized learned model to predict future end-to-end network traffic.
    Type: Application
    Filed: January 11, 2011
    Publication date: January 26, 2012
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Akshay Vashist, Alexander Poylisher, Siun-Chuon Mau, Abhrajit Ghosh, Ritu Chadha
  • Patent number: 7979367
    Abstract: A system and method for support vector machine plus (SVM+) computations include selecting a set of indexes for a target function to create a quadratic function depending on a number of variables, and reducing the number of variables to two in the quadratic function using linear constraints. An extreme point is computed for the quadratic function in closed form. A two-dimensional set is defined where the indexes determine whether a data point is in the two-dimensional set or not. A determination is made of whether the extreme point belongs to the two-dimensional set. If the extreme point belongs to the two-dimensional set, the extreme point defines a maximum and defines a new set of parameters for a next iteration. Otherwise, the quadratic function is restricted on at least one boundary of the two-dimensional set to create a one-dimensional quadratic function. The steps are repeated until the maximum is determined.
    Type: Grant
    Filed: March 11, 2008
    Date of Patent: July 12, 2011
    Assignee: NEC Laboratories America, Inc.
    Inventors: Rauf Izmailov, Akshay Vashist, Vladimir Vapnik
  • Publication number: 20090204555
    Abstract: A method and system for use in describing a phenomenon of interest. The method and system computes a decision rule for use in describing the phenomenon of interest using training data relating to the phenomenon of interest, labels for labeling the training data, and hidden information about the training data or directed distances obtained from the hidden information, as inputs.
    Type: Application
    Filed: November 24, 2008
    Publication date: August 13, 2009
    Applicant: NEC LABORATORIES AMERICA, INC.
    Inventors: Akshay Vashist, Vladimir Vapnik
  • Publication number: 20080243731
    Abstract: A system and method for support vector machine plus (SVM+) computations include selecting a set of indexes for a target function to create a quadratic function depending on a number of variables, and reducing the number of variables to two in the quadratic function using linear constraints. An extreme point is computed for the quadratic function in closed form. A two-dimensional set is defined where the indexes determine whether a data point is in the two-dimensional set or not. A determination is made of whether the extreme point belongs to the two-dimensional set. If the extreme point belongs to the two-dimensional set, the extreme point defines a maximum and defines a new set of parameters for a next iteration. Otherwise, the quadratic function is restricted on at least one boundary of the two-dimensional set to create a one-dimensional quadratic function. The steps are repeated until the maximum is determined.
    Type: Application
    Filed: March 11, 2008
    Publication date: October 2, 2008
    Applicant: NEC LABORATORIES AMERICA, INC.
    Inventors: RAUF IZMAILOV, AKSHAY VASHIST, VLADIMIR VAPNIK