Patents by Inventor Anuradha Bhamidipaty

Anuradha Bhamidipaty has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220011760
    Abstract: Techniques for model fidelity monitoring and regeneration for manufacturing process decision support are described herein. Aspects of the invention include determining that an output of a regression model corresponding to a current time period of decision support for a manufacturing process is not within a predefined range of a historical process dataset, wherein the regression model was constructed based on the historical process dataset, and performing an accuracy and fidelity analysis on the regression model based on process data from the manufacturing process corresponding to a previous time period. Based on a result of the accuracy and fidelity analysis being below a threshold, a mismatch of the regression model as compared to the manufacturing process is determined. Based on determining the mismatch, a temporary regression model corresponding to the manufacturing process is generated, and decision support for the manufacturing process is performed based on the temporary regression model.
    Type: Application
    Filed: July 8, 2020
    Publication date: January 13, 2022
    Inventors: Nianjun Zhou, Dharmashankar Subramanian, Dhavalkumar C. Patel, Anuradha Bhamidipaty
  • Publication number: 20220004429
    Abstract: Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises ingesting tabular data from at least one modality of a plurality of modalities; simultaneously extracting data and generating a prediction model for a task of a computing device from the extracted data from at least two modalities in the plurality of modalities; generating a data signature based on the generated prediction model from the at least two modalities by leveraging the generated prediction model for ingested tabular data and extracted data; comparing the generated data signature to identified data signatures stored in at least one modality in the plurality of modalities; and performing a task based on the generated data signature and a validation of the comparison of identified data signatures.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 6, 2022
    Inventors: Anuradha Bhamidipaty, Bhanukiran Vinzamuri, Elham Khabiri
  • Patent number: 11204851
    Abstract: Embodiments of the invention are directed a computer-implemented method for assessing data quality. A non-limiting example of the computer-implemented method includes using a processor to receive a plurality of updates to data points in a data stream. The processor is further used to compute instances of a data quality metric (DQM) from the data points in the data stream. The instances of the DQM are configured to differentiate the data points in the data stream by time and assign a higher weight to the instances of the DQM computed from more recent data points in the data stream. The instances of the DQM are continuously updated as more of the data points are received by the processor while limiting cycles of the processor consumed by updating the instances of the DQM to a threshold.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: December 21, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arun Kwangil Iyengar, Anuradha Bhamidipaty, Dhavalkumar C. Patel, Shrey Shrivastava, Nianjun Zhou
  • Publication number: 20210350275
    Abstract: An explainable artificially intelligent (XAI) application contains an ordered sequence of artificially intelligent software modules. When an input dataset is submitted to the application, each module generates an output dataset and an explanation that represents, as a set of Boolean expressions, reasoning by which each output element was chosen. If any pair of explanations are determined to be semantically inconsistent, and if this determination is confirmed by further determining that an apparent inconsistency was not a correct response to an unexpected characteristic of the input dataset, nonzero inconsistency scores are assigned to inconsistent elements of the pair of explanations.
    Type: Application
    Filed: May 8, 2020
    Publication date: November 11, 2021
    Inventors: Sreekrishnan Venkateswaran, Debasisha Padhi, Shubhi Asthana, Anuradha Bhamidipaty, Ashish Kundu
  • Publication number: 20210326334
    Abstract: A computing device, method, and system are provided of improving data quality to conserve computational resources. The computing device receives a raw dataset. One or more data quality metric goals corresponding to the received raw dataset are received. A schema of the dataset is determined. An initial set of validation nodes is identified based on the schema of the dataset. The initial set of validation nodes are executed. A next set of validation nodes are iteratively expanded and executed based on the schema of the dataset until a termination criterion is reached. A corrected dataset of the raw dataset is provided based on the iterative execution of the initial and next set of validation nodes.
    Type: Application
    Filed: October 20, 2020
    Publication date: October 21, 2021
    Inventors: Shrey Shrivastava, Anuradha Bhamidipaty, Dhavalkumar C. Patel
  • Publication number: 20210297412
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for multi-factor authentication. In response to a request for an action, the method includes one or more processors whether a first authentication credential passes validation. In response to determining that the first authentication credential does pass validation, the method further includes one or more processors determining a second authentication credential, wherein the second authentication credential includes an indication of a wireless connection between a first computing device and a second computing device. The method further includes one or more processors determining whether the second authentication credential passes validation. In response to determining that the second authentication credential passes validation, the method further includes one or more processors allowing execution of the requested response.
    Type: Application
    Filed: March 21, 2020
    Publication date: September 23, 2021
    Inventors: Sarin Kumar Thayyilsubramanian, Debasisha Padhi, Anuradha Bhamidipaty, Firas Bouz
  • Patent number: 11074134
    Abstract: An approach is provided for storing a snapshot of an execution image of a virtual machine (VM) instance. Based on VM, application, criticality, and change parameters, and based on a recommendation model trained on historical data about effects that changes caused by VM execution had on a capacity of a storage system that stores execution images of VM instances in first datastores, a tier is selected from multiple tiers of the storage system as the tier recommended for storing the snapshot. A datastore is selected for storing the snapshot so that the selected datastore is associated with the selected tier and selected from second datastores dedicated to storing only snapshots. The snapshot is created in the selected datastore and in the selected tier and unused space in a portion of the storage system for storing the first datastores is reduced.
    Type: Grant
    Filed: August 23, 2018
    Date of Patent: July 27, 2021
    Assignee: International Business Machines Corporation
    Inventors: Moncef Benboubakeur, Erik Rueger, Anuradha Bhamidipaty, Michael Starkey, Jiri Nehybka
  • Patent number: 10904616
    Abstract: Aspects of the present invention provide an approach for customizing media content being consumed at a location. For each of the viewers in a group consuming the media content at the location, a media profile having a set of media content preferences is created. These media profiles are aggregated to generate a composite profile that has a set of content restriction preferences for the group. As the media content is provided to and being consumed by the group, the media content is analyzed to identify any elements that have attributes that may be unsuitable to some viewers. If an element has a suitability attribute that violates the content restriction preferences for the group, the media content is modified to filter out the element.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Garfield Vaughn, Julija Narodicka, Moncef Benboubakeur, Anuradha Bhamidipaty
  • Publication number: 20210011947
    Abstract: A method for generating a graphical view of automata execution by an automatonic information technology (IT) management tool configured to monitor an IT infrastructure, where the tool includes a configuration items (CI) database containing configuration items that represent elements of the IT infrastructure, the tool including an execution log database configured to store automata execution status resulting from automatonic monitoring of the configuration items by the tool. The method includes collecting CI information values from the CI database, projecting the collected CI values into a template of a graphical view of the IT infrastructure generated by the tool, collecting state information values of the automata execution status from the execution log database, converting the state information values of the automata execution status into a graphic information and displaying the graphic information of the automata execution status on the graphical view of the IT infrastructure.
    Type: Application
    Filed: July 12, 2019
    Publication date: January 14, 2021
    Inventors: Anuradha Bhamidipaty, Debasisha Padhi, Sarin K. Thayyilsubramanian
  • Publication number: 20200389551
    Abstract: Embodiments of the present invention provide notification management across a plurality of electronic communication devices based on the present situational context of the intended communication recipient. Some types of relevant situational context information include the geographic location of the intended recipient, what electronic communication devices they may have in their possession, calendar or schedule information, the presence of other people, the identity of other people present in their vicinity, their relationship to the communication sender, and context information concerning the sender, such as how frequently the sender has attempted to communicate with the intended recipient and news information relevant to the known or assumed location of the sender. Notifications are managed by adjusting which electronic communication devices emit notifications and what type of notifications are emitted.
    Type: Application
    Filed: June 5, 2019
    Publication date: December 10, 2020
    Inventors: Garfield W. Vaughn, Moncef Benboubakeur, Julija Narodicka, Anuradha Bhamidipaty
  • Patent number: 10740445
    Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
    Type: Grant
    Filed: July 18, 2017
    Date of Patent: August 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkateswaran
  • Publication number: 20200233872
    Abstract: A similarity determination method, system, and computer program product, including using a description of companies for making a list of query entities, calculating a set of similar companies for each company on the list of query entities, employing a voting scheme to rank the results of the calculating, ordering a final set of the results based on the voting scheme and presenting them back to the user as a first ranked list, iteratively repeating the calculating by adding a second set of new companies and recalculating a second ranked list of recommended companies based on the updated query list, combining the first ranked list and the second ranked into a single set of companies of a combined list while remembering which of the first ranked list and the second ranked list from which each company originated, and visualizing the combined list based on which original list the companies came from. The technique can be extended to an arbitrary number of lists.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Inventors: John G. Vergo, Anuradha Bhamidipaty, Justin Platz, Alan M. Webb, Jeffrey Owen Kephart, Danny Soroker, Daniel M. Gruen, Julie Macnaught, Michael Abraham Tanenblatt, Siva Sankalp Patel
  • Patent number: 10708120
    Abstract: One or more embodiments identify server management actions for resolving problems associated with one or more nodes in information technology infrastructure. In one embodiment, a node-ticket record for an information processing node associated with at least one problem ticket is generated. A set of node-ticket clusters is queried based on the node-ticket record. Each of the set of node-ticket clusters maps a set of server management actions to set of historical node-ticket records associated with the node-ticket cluster. The set of server management actions was previously performed to resolve at least one operational problem associated with at least one information processing node. At least one set of server management actions associated with at least one of the set of node-ticket clusters corresponding to the node-ticket record within a given threshold is identified based on the querying.
    Type: Grant
    Filed: March 13, 2017
    Date of Patent: July 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Nikolaos Anerousis, Anuradha Bhamidipaty, Shang Q. Guo, Suman K. Pathapati, Daniela Rosu, Mitesh H. Vasa, Anubha Verma, Frederick Wu, Sai Zeng
  • Publication number: 20200145723
    Abstract: Aspects of the present invention provide an approach for customizing media content being consumed at a location. For each of the viewers in a group consuming the media content at the location, a media profile having a set of media content preferences is created. These media profiles are aggregated to generate a composite profile that has a set of content restriction preferences for the group. As the media content is provided to and being consumed by the group, the media content is analyzed to identify any elements that have attributes that may be unsuitable to some viewers. If an element has a suitability attribute that violates the content restriction preferences for the group, the media content is modified to filter out the element.
    Type: Application
    Filed: November 6, 2018
    Publication date: May 7, 2020
    Inventors: Garfield Vaughn, Julija Narodicka, Moncef Benboubakeur, Anuradha Bhamidipaty
  • Publication number: 20200065171
    Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
    Type: Application
    Filed: November 4, 2019
    Publication date: February 27, 2020
    Inventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
  • Publication number: 20200065195
    Abstract: An approach is provided for storing a snapshot of an execution image of a virtual machine (VM) instance. Based on VM, application, criticality, and change parameters, and based on a recommendation model trained on historical data about effects that changes caused by VM execution had on a capacity of a storage system that stores execution images of VM instances in first datastores, a tier is selected from multiple tiers of the storage system as the tier recommended for storing the snapshot. A datastore is selected for storing the snapshot so that the selected datastore is associated with the selected tier and selected from second datastores dedicated to storing only snapshots. The snapshot is created in the selected datastore and in the selected tier and unused space in a portion of the storage system for storing the first datastores is reduced.
    Type: Application
    Filed: August 23, 2018
    Publication date: February 27, 2020
    Inventors: Moncef Benboubakeur, Erik Rueger, Anuradha Bhamidipaty, Michael Starkey, Jiri Nehybka
  • Patent number: 10552241
    Abstract: An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. A subset of actuators may be selected based on a risk threshold from an actuator catalog database storing actuator information and actuator risk metadata associated with a plurality of actuators. The actuator risk metadata may be augmented with risk information. A ranked list of the subset of actuators may be generated based on the actuator risk metadata associated with each actuator in the subset. An actuator in the ranked list may be executed on the server.
    Type: Grant
    Filed: June 22, 2016
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Constantin M. Adam, Anuradha Bhamidipaty, Jayan Nallacherry, Debasisha K. Padhi, Yaoping Ruan, Frederick Y.-F. Wu
  • Patent number: 10298676
    Abstract: A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. When a first user initially accesses an asset, the asset is copied to the first user's collection, thus indicating the first user's favorable view of the asset. When a second user accesses the first user's copy, the asset is copied to the second user's collection, and the eminence of the first user and of the asset are increased. If a third user accesses the second user's copy, the asset is copied to the third user's collection and eminence values of the first and second users and of the asset increase. The second user may locate an asset in the first user's collection through means that include the second user's decision to “follow” the first user.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: May 21, 2019
    Assignee: International Business Machines Corporation
    Inventors: Anuradha Bhamidipaty, Saiprasad Kolluri Venkata Sesha, Gopal S. Pingali, Mark E. Podlaseck, Karthik Sivakumar
  • Patent number: 10241786
    Abstract: Techniques are provided for performing automated operations to determine maturity of a specified project. Information is received regarding each of a plurality of artifacts associated with the project, such as project documentation, source code repositories, and a tracked issue database for the project. A data sufficiency level associated with each provided artifact is determined, and each artifact is provided to one or more of multiple analysis engines. The analysis engines are executed to produce one or more weighted feature vectors for each of the artifacts associated with the specified project, and input to a prediction engine in order to provide a maturity rating for the project based on the weighted feature vectors.
    Type: Grant
    Filed: January 26, 2017
    Date of Patent: March 26, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anuradha Bhamidipaty, Evelyn Duesterwald, Andrew L. Frenkiel, Peter H. Westerink
  • Publication number: 20190026448
    Abstract: A system, method and program product for providing cognitive behavior security control (CBSC). A system is disclosed that includes: a repository having a plurality of challenges each including an interactive graphical task; a user interface for graphically presenting challenges to users; an enrollment system for assigning challenges to users and determining an authentic response for each user; an authentication system that collects an observed response from a user presented with an assigned challenge and determines a security control result based on a closeness of the observed response with the authentic response of the user.
    Type: Application
    Filed: July 18, 2017
    Publication date: January 24, 2019
    Inventors: Anuradha Bhamidipaty, Ashish Kundu, Debasisha Padhi, Sreekrishnan Venkiteswaran