Patents by Inventor Bhavna Agrawal
Bhavna Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12254265Abstract: Tabular data is accessed that contains multiple entries of alphanumeric data. Multiple tokens are generated of the multiple entries of alphanumeric data using a tokenization process. The tokenization process maintains jargon-specific features of the alphanumeric data. Multiple embeddings of the multiple entries of alphanumeric data are generated using the tokens. The embeddings capture similarity of the multiple entries considering all of global features, column features, and row features in the tokens of the tabular data. A neural network is used to predict probabilities for pre-defined classes for the tabular data using the generated embeddings.Type: GrantFiled: September 24, 2021Date of Patent: March 18, 2025Assignee: International Business Machines CorporationInventors: Bhavna Agrawal, Elham Khabiri, Yingjie Li, Pranav Girish Sankhe
-
Publication number: 20250036882Abstract: Systems, computer program products, and methods are described herein for implementing natural language processing to determine natural language from computer programming language in an electronic environment.Type: ApplicationFiled: July 24, 2023Publication date: January 30, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Bryan King, Andrea M. Weisberger, Kristi A. Perry-Weaver, Bhavna Agrawal, Jitesh K. Vijay, Divya Ilango Arun, Arjun Thimmareddy, Virinchi Ande
-
Publication number: 20240333739Abstract: Detecting and mitigating anomalous system behavior by providing a machine learning model comprising a knowledge graph depicting system entity relationships, and modeling behavioral correlations among system entities according to historical time-series data, receiving real-time time-series data for the system, detecting an anomalous system behavior in a system locale, according to the real-time time-series data, according to the machine learning model and multivariate sensor metrics, diagnosing the anomalous system behavior according to an upstream portion of the knowledge graph and a statistical behavior model for the system locale, and mitigating the anomalous behavior by deriving a recommended action according to the anomalous behavior and generating a work order to implement the recommended action.Type: ApplicationFiled: March 30, 2023Publication date: October 3, 2024Inventors: Bhavna Agrawal, Robert Jeffrey Baseman, Jeffrey Owen Kephart, Anuradha Bhamidipaty, Elham Khabiri, Yingjie Li, Srideepika Jayaraman
-
Publication number: 20240202226Abstract: Various systems and methods are presented regarding code-based pattern extraction (Code-PE) and the application of Code-PE to a named entity recognition pipeline. Patterns can be generated from named entities, wherein the entities have an assigned type. Codes are identified within the entities, subsequently vectorized and clustered based upon the presence of the identified codes. Patterns are identified for the respective clusters. The patterns can be applied to an untyped entity, in the event of the pattern matching, the entity can be typed with the type assigned to the pattern. The typed entity can be used to recursively update knowledge regarding typed- and untyped-entities. In the event a pattern incorrectly types an entity, the pattern can be retrained with the updated knowledge.Type: ApplicationFiled: December 15, 2022Publication date: June 20, 2024Inventors: Elham Khabiri, Yingjie Li, Bhavna Agrawal, Anuradha Bhamidipaty, Joseph M. Lindquist
-
Patent number: 12014174Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: GrantFiled: November 18, 2022Date of Patent: June 18, 2024Assignee: Kyndral, Inc.Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Publication number: 20240047279Abstract: Embodiments of the invention are directed to a computer-implemented method. A non-limiting example of the computer-implemented method includes accessing, using a processor system, a process-step sequence that includes a plurality process-steps and a plurality of queue-times. A process-step sequence mining operation is applied to the process-step sequence, wherein the process-step sequence mining operation is operable to make a prediction of an impact of a portion of the process-step sequence on a characteristic of a product generated by the process-step sequence.Type: ApplicationFiled: August 5, 2022Publication date: February 8, 2024Inventors: Robert Jeffrey Baseman, Elham Khabiri, Anuradha Bhamidipaty, Yingjie Li, Srideepika Jayaraman, Bhavna Agrawal, Jeffrey Owen Kephart
-
Publication number: 20230097150Abstract: Tabular data is accessed that contains multiple entries of alphanumeric data. Multiple tokens are generated of the multiple entries of alphanumeric data using a tokenization process. The tokenization process maintains jargon-specific features of the alphanumeric data. Multiple embeddings of the multiple entries of alphanumeric data are generated using the tokens. The embeddings capture similarity of the multiple entries considering all of global features, column features, and row features in the tokens of the tabular data. A neural network is used to predict probabilities for pre-defined classes for the tabular data using the generated embeddings.Type: ApplicationFiled: September 24, 2021Publication date: March 30, 2023Inventors: Bhavna Agrawal, Elham Khabiri, Yingjie Li, Pranav Girish Sankhe
-
Publication number: 20230085001Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: ApplicationFiled: November 18, 2022Publication date: March 16, 2023Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai ZENG, Guan Qun Zhang, Bhavna Agrawal
-
Publication number: 20230073564Abstract: Temporal and spatially integrated forecast modeling includes generating a plurality of forecast models for a plurality of short-term to long-term time periods for a plurality of locations. Temporally integrating the plurality of forecast models sequentially over the plurality of time periods for the plurality of locations and spatially integrating the temporally integrated plurality of forecast models for each location hierarchically over the geographic areas. The forecast models are autoregressive distributed lag models with different explanatory variables for the short-term and long-term forecast models. The temporally integrating includes recursively integrating the plurality of forecast models over the time periods from the short-term to the long-term time periods and the spatially integrating includes recursively integrating the temporally integrated plurality of forecast models hierarchically from larger size geographic areas to smaller size geographic areas.Type: ApplicationFiled: August 27, 2021Publication date: March 9, 2023Inventors: Zhengliang Xue, Bhavna Agrawal, Anuradha Bhamidipaty, Yingjie Li, Shuxin Lin
-
Publication number: 20230029218Abstract: A concept associated with a feature used in machine learning model can be determined, the feature extracted from a first data source. A second data source containing the concept can be identified. An additional feature can be generated by performing a natural language processing on the second data source. The feature and the additional feature can be merged. A second machine learning model can be generated, which use the merged feature. A prediction result of the first machine learning model can be compared with a prediction result of the second machine learning model relative to ground truth data, to evaluate effective of the merged feature. Based on the evaluated effectiveness, the feature can be augmented with the merged feature in machine learning.Type: ApplicationFiled: July 20, 2021Publication date: January 26, 2023Inventors: Anuradha Bhamidipaty, Yingjie Li, Shuxin Lin, Zhengliang Xue, Bhavna Agrawal
-
Patent number: 11533296Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: GrantFiled: September 1, 2017Date of Patent: December 20, 2022Assignee: KYNDRYL, INC.Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Patent number: 11502995Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: GrantFiled: December 14, 2017Date of Patent: November 15, 2022Assignee: KYNDRYL, INC.Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Publication number: 20220019742Abstract: A method is provided for creating a semantic model for submitting search queries thereto. The method includes an act of receiving data from one or more input sources in an entity and relationship capture service of a situational awareness engine. The method further includes an act of extracting entities and relationships between the entities in two or more extraction services, where the two or more extraction services include at least two of a table-to-graph service, an event-to-graph service, a sensor-to-graph service, a text-to-graph service, and an image-to-graph service. The method includes an act of generating a semantic model based on fusion and labeling the extracted data provided by the at least two extraction services, where the semantic model can receive a search query and respond to the search query based on the generated semantic model.Type: ApplicationFiled: July 20, 2020Publication date: January 20, 2022Inventors: Anuradha Bhamidipaty, Elham Khabiri, Shuxin Lin, Jeffrey Owen Kephart, Yingjie Li, Bhavna Agrawal
-
Patent number: 10984452Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: GrantFiled: July 13, 2017Date of Patent: April 20, 2021Assignee: International Business Machines CorporationInventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Patent number: 10778353Abstract: Providing real-time awareness of an audience to a presenter during the presentation. In response to presenting a presentation to an audience, information is automatically collected about the audience from sensors positioned amongst the audience. The collected information about the audience is analyzed and, during the presentation, recommendations are made to the presenter for improving the presentation based on the collected information.Type: GrantFiled: January 24, 2019Date of Patent: September 15, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bhavna Agrawal, Ruchi Mahindru, Karin Murthy, Sharon M. Trewin
-
Publication number: 20200244380Abstract: Providing real-time awareness of an audience to a presenter during the presentation. In response to presenting a presentation to an audience, information is automatically collected about the audience from sensors positioned amongst the audience. The collected information about the audience is analyzed and, during the presentation, recommendations are made to the presenter for improving the presentation based on the collected information.Type: ApplicationFiled: January 24, 2019Publication date: July 30, 2020Inventors: Bhavna Agrawal, Ruchi Mahindru, Karin Murthy, Sharon M. Trewin
-
Publication number: 20190075081Abstract: Users of an endpoint remediation system can be assigned to different roles, from which they can request exceptions, approve exceptions, and/or enable remediation on endpoint devices. The compliance scanning and enforcing process can be automated, while allowing entities to request and/or approve certain exceptions. Therefore, security compliance for customers can be actively managed to provide visibility to the endpoint device compliance state at any time.Type: ApplicationFiled: September 1, 2017Publication date: March 7, 2019Inventors: Constantin Mircea Adam, Richard Jay Cohen, Robert Filepp, Milton H. Hernandez, Brian Peterson, Maja Vukovic, Sai Zeng, Guan Qun Zhang, Bhavna Agrawal
-
Publication number: 20190019221Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Publication number: 20190019222Abstract: Content is selectively provided to users of mobile devices within a venue including an on-site wireless network. User authorization requests and/or user account registration data are transmitted to the on-site wireless network from mobile devices within the venue. Attributes such as user interests and professions, which comprise inferred user profiles, are obtained using the network traffic data. Identities of mobile devices are established based on a combination including two or more of network identifiers, mobile device signatures, and browser signatures. The inferred user profiles are correlated with the mobile device identities. The inferred user profiles are aggregated into user profile groups and then matched with a content provider's intended target profiles. Content is transmitted to the mobile devices corresponding to the intended target profiles and based on correlation of the inferred user profiles with identities of the devices.Type: ApplicationFiled: December 31, 2017Publication date: January 17, 2019Inventors: Bhavna Agrawal, Nikolaos Anerousis, Frank A. Schaffa, Jin Xiao
-
Publication number: 20180357608Abstract: A method and system of characterizing a job market is provided. The available job postings of a job market are determined. For each job posting, one or more technical skills, a job role level, and one or more professional capabilities related to the job posting are determined. The professional capabilities are aggregated by job dimensions. The determined technical skills and the professional capabilities of each job posting and the aggregated professional capabilities are stored in a database as reference data. A job capability profile for one or more job dimensions is provided based on the stored reference data in the database.Type: ApplicationFiled: June 7, 2017Publication date: December 13, 2018Inventors: Bhavna Agrawal, Yi-Min Chee, Rong Liu, Wanita Sherchan, Cheuk Hay Sin, Michael Eng Yeow Tan