Patents by Inventor Ashish Awasthi
Ashish Awasthi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240126796Abstract: Systems and methods for automatically answering questions based on a biomedical document are presented herein. The system may include a question-answering machine learning model. The question-answering machine learning model may be enhanced by segmenting the document. The system may include a topic clustering machine learning model for segmenting the document. Through segmentation, the resulting system may provide a lower error rate at a lower computational cost when compared to traditional question-answering machine learning models.Type: ApplicationFiled: October 13, 2023Publication date: April 18, 2024Inventors: Piyush MATHUR, Francis A. PAPAY, Kamal MAHESHWARI, Ashish K. KHANNA, Jacek B. CYWINSKI, Raghav AWASTHI, Shreya MISHRA
-
Publication number: 20230080686Abstract: Described herein are methods and systems to identify and redact personally identifiable information (PII). A PII sensitivity detection framework includes multiple layers where each layer corresponds to a computer model. The disclosed framework analyzes data stored within different data tables and predicts whether a data column includes PII. The first layer corresponds to an artificial intelligence model that analyzes each column metadata and predicts a first score indicative of a first likelihood of PII existence. The second layer corresponds to a rule-based computer model that uses various rules to determine a second score indicative of a second likelihood of PII existence for each column. The third layer corresponds to a column content model that analyzes content of each column using various natural language processing techniques to generate a third score indicative of a third likelihood of PII existence.Type: ApplicationFiled: September 15, 2021Publication date: March 16, 2023Applicant: CITICORP CREDIT SERVICES, INC. (USA)Inventors: Shubhanshu Gupta, Ashish Awasthi, Amaruvi Devanathan, Mallapu Raghavulu Surya Prakash
-
Patent number: 11061871Abstract: According to an aspect, a method for data placement in a distributed database includes obtaining access pattern information relating to end clients that requested access to data stored in a first regional quorum of replicas located within a first region, where the first regional quorum includes a first lead replica. The method includes identifying a placement algorithm from a configuration file associated with the distributed database, and executing the placement algorithm to generate a suggested placement for the data based on the obtained access pattern information, where the suggested placement includes a second regional quorum of replicas located in a second region different than the first region, and the second regional quorum includes a second lead replica. The method includes transmitting a migration request to the distributed database to transfer the data from the first regional quorum to the second regional quorum.Type: GrantFiled: March 15, 2019Date of Patent: July 13, 2021Assignee: GOOGLE LLCInventors: Ashish Awasthi, Julien Crozon, Xinfeng Li, Ziv Ayalon, Ye Zhou, Vladislav Adzic
-
Publication number: 20200293501Abstract: According to an aspect, a method for data placement in a distributed database includes obtaining access pattern information relating to end clients that requested access to data stored in a first regional quorum of replicas located within a first region, where the first regional quorum includes a first lead replica. The method includes identifying a placement algorithm from a configuration file associated with the distributed database, and executing the placement algorithm to generate a suggested placement for the data based on the obtained access pattern information, where the suggested placement includes a second regional quorum of replicas located in a second region different than the first region, and the second regional quorum includes a second lead replica. The method includes transmitting a migration request to the distributed database to transfer the data from the first regional quorum to the second regional quorum.Type: ApplicationFiled: March 15, 2019Publication date: September 17, 2020Inventors: Ashish Awasthi, Julien Crozon, Xinfeng Li, Ziv Ayalon, Ye Zhou, Vladislav Adzic
-
Publication number: 20130067447Abstract: A single instance store including files for multiple packages is maintained in a computing device, each of the multiple packages including one or more components or modules for one or more applications. For each of the multiple packages, a record of a state for the package is maintained, and one or more of the multiple packages can have different ones of multiple states for different users. Based at least in part on a state machine and the state for one of the multiple packages, the one of the multiple packages is transitioned to a different state.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Hemchander Venkateshwara Sannidhanam, John M. Sheehan, Zainab Hakim, Edmund A. Brackett, Andres Carlo Petralli, Ashish Awasthi
-
Publication number: 20130067451Abstract: Embodiments are directed to efficiently provisioning applications in a multi-user environment. In one scenario, an administrator computer system pre-installs at least a portion of a software application on a data image, where the software application is to be installed on a client computer system upon receiving a notification from a computer administrator. The administrator computer system receives an input from the computer administrator indicating that a specified software application pre-installed on the client computer system's data image is to be installed on the client computer system. The administrator computer system then publishes a notification to the client computer system indicating that a specified software application pre-installed on the client computer system's data image is to be installed. Upon receiving the notification, the software application is installed on the client computer system from the data image.Type: ApplicationFiled: December 15, 2011Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Amjad Hussain, Huei Chung Wang, Ashish Awasthi, Hemchander V. Sannidhanam, Andrey Vladimirowich Eremenko
-
Publication number: 20110252327Abstract: In various embodiments, techniques are provided for creating visualizations of network traffic. Such disclosed techniques may be incorporated by or implemented by one or more computing devices, computer systems, embedded systems, application-specific circuitry, or the like, that generate visualizations of network traffic. Network traffic information may be obtained in response to monitoring network traffic associated with a communications network. The network traffic information may include a variety of detailed or summary analysis of network traffic. In general, network traffic may summarized according to applications associated with network traffic. Hierarchies developed based on relationships between application categories, the applications themselves, and users or groups associated with the applications may be used to develop one or more of a variety of visual representations of the network traffic information.Type: ApplicationFiled: November 9, 2010Publication date: October 13, 2011Applicant: Actiance, Inc.Inventors: Ashish Awasthi, Kailash Ambwani, Tina Joiner, Pramod D'Souza
-
Publication number: 20110082496Abstract: A device for sealing damaged and defective vessels utilizes a surgical wire or similar appliance positioned and housed within a protective sheath, such as a catheter or needle. Stable thrombin and non-thrombin based solutions, gels, or biological glues are then used to coat the tip of a surgical appliance, such as surgical wires and trocars, with concentrations sufficient to cause clotting. The protective sheath around the wire and a one way valve provides a barrier which prevents clotting material to insinuate itself into healthy tissue. The protective catheter containing the wire is then inserted into the body of the patient and directed to the damaged site. The wire is then partially extended out of the sheath to allow the clotting material to be applied and deposited onto the damaged vessel, thereafter the wire and sheath are safely withdrawn from the body of the patient.Type: ApplicationFiled: October 2, 2009Publication date: April 7, 2011Inventor: Ashish Awasthi
-
Publication number: 20110029011Abstract: A method of sealing damaged and defective vessels utilizes stable thrombin and non-thrombin based solutions, gels, and biological glues to coat the tips of surgical appliances, such as surgical wires and trocars, with concentrations sufficient to cause clotting. The surgical wire or other appliance, with clotting material at its tip, is positioned within a protective sheath, such as a catheter or needle. The sheath provides a barrier which prevents clotting material to insinuate itself into healthy tissue. In the preferred embodiment, the protective catheter containing the wire is then inserted into the body of the patient and directed to the damaged site. The wire is then partially extended out of the sheath to allow the clotting material to be applied and deposited onto the damaged vessel, thereafter the wire and sheath are safely withdrawn from the body of the patient.Type: ApplicationFiled: August 3, 2009Publication date: February 3, 2011Inventor: Ashish Awasthi
-
Publication number: 20090024755Abstract: A method and system for transferring data in a computing environment. In one embodiment the method comprises sending a request for the data to a web service, the request comprising web service information; the web service responding by fetching the data from a data storage; storing the data in at least one file; generating a Uniform Resource Identifier for the file; receiving the Uniform Resource Identifier; and receiving the data as a data stream from the file.Type: ApplicationFiled: November 22, 2007Publication date: January 22, 2009Inventors: Amit Singh Rathore, Ashish Awasthi, Sathyamurthy Dattathreya