Patents by Inventor Amitava Mukherjee

Amitava Mukherjee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240296961
    Abstract: A system and method for modeling neuronal synaptic functionality at least partially instantiated on an optimized computation core of one or more high-speed processors. The synaptic model is preferably created as a neural net and includes, at least, a presynaptic component with a presynaptic target having, at least, a plasticity parameter and activity spike strength. The model also includes a retrograde signaling component with a retrograde messenger that selectively generates a molecular uptake signal, and a postsynaptic receptor component. The retrograde messenger acts on a presynaptic target to modulate the plasticity parameter and activity spike strength of the presynaptic component based upon a calculated molecular uptake at the postsynaptic receptor component to generate the molecular uptake signal which is then transmitted to the presynaptic component.
    Type: Application
    Filed: June 13, 2022
    Publication date: September 5, 2024
    Inventors: Janet L Paluh, Rounak Chatterjee, Soham Mondal, Souradeep Chowdhury, Arnab Raha, Amitava Mukherjee
  • Publication number: 20240182893
    Abstract: Disclosed herein are compositions and methods for treating and preventing a disease or condition characterized by aberrant fibroblast proliferation and extracellular matrix deposition in a tissue of a subject in need thereof. The particular disease or condition can be fibrosis, specifically, radiation-induced fibrosis. The method for treating or preventing the disease or condition can include administering to the subject an effective amount of a composition that inhibits Fgr, a non-receptor tyrosine kinase.
    Type: Application
    Filed: April 1, 2022
    Publication date: June 6, 2024
    Inventors: Amitava MUKHERJEE, Michael EPPERLY, Joel GREENBERGER
  • Patent number: 10084551
    Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.
    Type: Grant
    Filed: February 23, 2017
    Date of Patent: September 25, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
  • Publication number: 20180241481
    Abstract: A method for molecular communication within a nanonetwork. The method includes the steps of: (i) providing a nanonetwork communication system including a transmitter, a receiver, and a physical channel layer, the physical channel layer including a medium configured to allow a communication molecule to be transmitted from the transmitter to the receiver; (ii) transmitting, via the physical channel layer, the communication molecule from the transmitter in a plurality of bursts, wherein information is encoded in the concentration of the communication molecule; (iii) receiving the communication molecule by the receiver; and (iv) varying at least one of the plurality of bursts, wherein varying the plurality of bursts modulates the information transmitted by the communication molecule.
    Type: Application
    Filed: February 23, 2017
    Publication date: August 23, 2018
    Inventors: Sushovan Das, Soumallya Chatterjee, Amitava Mukherjee, Mrinal K. Naskar
  • Patent number: 9477701
    Abstract: A method and associated systems for generic data compression. A mobile device receives realtime data from a medical-monitoring device, such as a heart monitor, worn by a patient. The invention compresses and encodes this data into ASCII text characters, which are transmitted via a commonly available low-bandwidth text-messaging service, such as the SMS service supported by most cell phones. The text messages are received by a second mobile device, which decodes the text characters into their original form and displays them to a healthcare practitioner. More critical portions of the data are encoded by a high-precision lossless compression mechanism. In some embodiments, the two mobile devices may be cell phones and the second device may have the ability to interpret the decoded information in order to determine whether to directly or indirectly alert the practitioner or other parties of an exceptional condition detected by the medical monitor.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: October 25, 2016
    Assignee: International Business Machines Corporation
    Inventors: Tanmoy Kundu, Kaushik Lahiri, Avirup Mandal, Amitava Mukherjee, Mrinal K. Naskar, Sandipan Sinha
  • Patent number: 9357472
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Grant
    Filed: June 26, 2013
    Date of Patent: May 31, 2016
    Assignee: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20150040220
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: October 16, 2014
    Publication date: February 5, 2015
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20150003309
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Application
    Filed: June 26, 2013
    Publication date: January 1, 2015
    Inventor: Amitava Mukherjee
  • Publication number: 20140173731
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: February 3, 2014
    Publication date: June 19, 2014
    Applicant: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Patent number: 8730946
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 20, 2014
    Assignee: Redshift Internetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee
  • Patent number: 8644703
    Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.
    Type: Grant
    Filed: February 22, 2011
    Date of Patent: February 4, 2014
    Assignee: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Patent number: 8514760
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: August 20, 2013
    Assignee: International Business Machiness Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20120246103
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: April 17, 2012
    Publication date: September 27, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Publication number: 20120213516
    Abstract: An optimal resource utilization method and system is disclosed. The method includes monitoring an optical network comprising optical cross connect (OXC) nodes comprising regenerators and connected by links. Communication paths each comprising a group of OXC nodes connected by links of said links are selected. Routing demands, working communication paths, and protection communication paths are selected. A computer processor assigns successive links a wave length and allocates regenerators to multiple successive links. The computer processor positions a first group of the regenerators along the working communication paths and positioning a second group of regenerators along the protection communication paths.
    Type: Application
    Filed: February 22, 2011
    Publication date: August 23, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Amitava Mukherjee
  • Publication number: 20120204261
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Application
    Filed: April 16, 2012
    Publication date: August 9, 2012
    Inventors: SRINIVAS MANTRIPRAGADA, Amitava MUKHERJEE, Barry BOMZER
  • Patent number: 8176001
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: May 8, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjöberg
  • Patent number: 8161540
    Abstract: A method and system for unified communications threat management (UCTM) for converged voice and video over IP is disclosed. A computer-implemented method for threat management receives an incoming packet. The incoming packet is broken into sub-packets and fed to a plurality of packet processing engines. Each packet processing engine inspects the sub-packets and annotate the sub-packets with meta-data. The annotated sub-packets are combined and processed by a plurality of application engine to generate a processed packet. The processed packet is classified and stored in a database.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: April 17, 2012
    Assignee: RedShift InterNetworking, Inc.
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Barry Bomzer
  • Publication number: 20110261738
    Abstract: A method of routing data in a wireless sensor network, a program product and a wireless sensor network. The method, includes: (a) detecting a temporal event by a source sensor node of a wireless sensor network comprising a multiplicity of sensor nodes; (b) identifying multiple paths from the source sensor node to a sink of the wireless sensor network, the multiple paths consisting of sensor node to sensor node hops; and after (b), (c) using a processor of the source sensor node, optimizing a distribution of data packets to each path of the multiple paths by simultaneously reducing (i) power consumed by sensor nodes in each path of the multiple paths and (ii) a time to transmit the data packets from the source sensor node to the sink.
    Type: Application
    Filed: April 27, 2010
    Publication date: October 27, 2011
    Applicant: International Business Machines Corporation
    Inventor: Amitava Mukherjee
  • Publication number: 20090106318
    Abstract: A method and system for detecting a spam over internet telephony (SPIT) is disclosed. Incoming call requests are received and analyzed using heuristic algorithms. A runtime action is provided based on the analysis using the heuristic algorithms. The heuristic algorithms include zero-touch heuristic algorithms that require no human intervention, one-touch heuristic algorithms that require human intervention one time, and multi-touch heuristic algorithms that require human intervention more than one time. Cumulative probability is calculated for each incoming call request, and the incoming call request is classified as a spam if the cumulative probability exceeds a threshold.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee, Rickard Per-Olof Sjoberg
  • Publication number: 20090103524
    Abstract: A system and method to precisely learn and enforce security rules for Unified Communication (UC) applications and endpoints is disclosed. According to one embodiment, a behavioral learning system learns and abstracts positive flow behaviors of UC applications and endpoints. The properties of previously received messages from the endpoints and learned behaviors of the plurality of endpoints are stored in a database. A message from a endpoint is received by a message scanner and correlated with the AOR records in the database. The message is classified into one of a whitelist, a blacklist, and a graylist based on the results of analysis by the analysis engine. The whitelist contains the AOR records that are legitimate, the blacklist contains the AOR records that are a potential attack, and the graylist contains the AOR records that belong to neither the whitelist nor the blacklist.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventors: Srinivas Mantripragada, Amitava Mukherjee