Patents by Inventor Ebrahim Bagheri

Ebrahim Bagheri has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240005230
    Abstract: Various embodiments are described herein for a system and method for automatically creating electronic expert reviewer profiles from individuals' electronic portfolio documents that represents their professional contribution history (e.g., publications, grant applications, presentations, patents, and/or resumes). The electronic expert reviewer profiles may be used to recommend the suitable experts to evaluate the quality of a particular work, in a manner that fully meets one or more requirements for such pairings such as subject matter competence, for example. Such recommendations have a multitude of impactful applications such as, but not limited to, finding reviewers for a research paper, forming an experts team to collaborate on a project, and/or finding evaluators for the assessment of grant applications.
    Type: Application
    Filed: December 3, 2021
    Publication date: January 4, 2024
    Inventors: John Cuzzola, Jelena Jovanovic, Ebrahim Bagheri
  • Patent number: 11768522
    Abstract: Various embodiments for the automatic detection of the presence of a protective case on an electronic device are provided herein. Generally, the electronic device includes one or more sensors; a device memory storing an application; a device processor, which upon execution of the application, is configured to: monitor, via at least one first sensor, a trigger condition for detecting the presence of the protective case; detect the trigger condition; in response to detecting the trigger condition, cause the electronic device to vibrate for a pre-determined period of time; collect, via at least one second sensor, sensor data during the pre-determined time; extract at least one feature from the sensor data; based on the extracted at least one feature, determine whether the protective case is applied to the electronic device; and generate an output indicating whether the protective case is applied to the electronic device.
    Type: Grant
    Filed: October 19, 2020
    Date of Patent: September 26, 2023
    Assignee: World Wide Warranty Life Services Inc.
    Inventors: Richard Hui, Anthony Daws, Ebrahim Bagheri, Fattane Zarrinkalam, Hossein Fani, Samad Paydar
  • Patent number: 11687608
    Abstract: An approach is provided in which the approach maps a set of question nodes and a set of expert nodes to an embedding space. The set of question nodes corresponds to a set of questions and the set of expert nodes corresponds to a set of experts in a CQA network. The approach maps a new question to the embedding space based on analyzing the new question against the set of questions, and selects a subset of the set of expert nodes based on their location in the embedding space relative to the mapping of the new question. The approach transmits the question to a subset of the set of experts that correspond to the subset of expert nodes.
    Type: Grant
    Filed: July 31, 2021
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Morteza Zihayat Kermani, Roohollah Etemadi, Ebrahim Bagheri, Kuan Feng, Jason Walter Adelman
  • Publication number: 20230044619
    Abstract: A system and method for mining social media signals and cues i) created by a user (for example, a customer) and/or ii) to which the user is exposed (the “data”), and for processing that data as it relates to a service (including a fee or subscription-based service), in order to predict the user's predisposition or likelihood to either leave the subscription or the service or reduce his/her engagement with the subscription or the service.
    Type: Application
    Filed: May 13, 2022
    Publication date: February 9, 2023
    Applicant: THINKCX TECHNOLOGIES, INC.
    Inventors: Aaron David Nielsen, Qiao Pang, Ebrahim Bagheri, Mohammad-Amin Jashki, Fattane Zarrinkalam, Alireza Vazifedoost
  • Publication number: 20230030624
    Abstract: An approach is provided in which the approach maps a set of question nodes and a set of expert nodes to an embedding space. The set of question nodes corresponds to a set of questions and the set of expert nodes corresponds to a set of experts in a CQA network. The approach maps a new question to the embedding space based on analyzing the new question against the set of questions, and selects a subset of the set of expert nodes based on their location in the embedding space relative to the mapping of the new question. The approach transmits the question to a subset of the set of experts that correspond to the subset of expert nodes.
    Type: Application
    Filed: July 31, 2021
    Publication date: February 2, 2023
    Inventors: Morteza Zihayat Kermani, Roohollah Etemadi, Ebrahim Bagheri, Kuan Feng, JASON WALTER ADELMAN
  • Publication number: 20220383625
    Abstract: Embodiments are described herein for an electronic device, system and method for remotely detecting whether or not the electronic device has a screen protector placed over its display screen. The electronic device is placed face-down on a flat, opaque surface, such that the display screen and front camera of the electronic device are also face-down and the electronic device takes a series of photos with the camera. The series of photos is analyzed to determine whether or not the screen protector is attached to the display screen of the electronic device, which can be communicated electronically.
    Type: Application
    Filed: October 21, 2020
    Publication date: December 1, 2022
    Inventors: Richard Hui, Anthony Daws, Ebrahim Bagheri, Fattane Zarrinkalam, Hossein Fani, Samad Paydar
  • Publication number: 20220365564
    Abstract: Various embodiments for the automatic detection of the presence of a protective case on an electronic device are provided herein. Generally, the electronic device includes one or more sensors; a device memory storing an application; a device processor, which upon execution of the application, is configured to: monitor, via at least one first sensor, a trigger condition for detecting the presence of the protective case; detect the trigger condition; in response to detecting the trigger condition, cause the electronic device to vibrate for a pre-determined period of time; collect, via at least one second sensor, sensor data during the pre-determined time; extract at least one feature from the sensor data; based on the extracted at least one feature, determine whether the protective case is applied to the electronic device; and generate an output indicating whether the protective case is applied to the electronic device.
    Type: Application
    Filed: October 19, 2020
    Publication date: November 17, 2022
    Inventors: Richard Hui, Anthony Daws, Ebrahim Bagheri, Fattane Zarrinkalam, Hossein Fani, Samad Paydar
  • Patent number: 11392968
    Abstract: A system and method for mining social media signals and cues i) created by a user (for example, a customer) and/or ii) to which the user is exposed (the “data”), and for processing that data as it relates to a service (including a fee or subscription-based service), in order to predict the user's predisposition or likelihood to either leave the subscription or the service or reduce his/her engagement with the subscription or the service.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: July 19, 2022
    Assignee: THINKCX TECHNOLOGIES, INC.
    Inventors: Aaron David Nielsen, Qiao Pang, Ebrahim Bagheri, Mohammad-Amin Jashki, Fattane Zarrinkalam, Alireza Vazifedoost
  • Publication number: 20220005341
    Abstract: Various embodiments for detecting presence of a protective case on a portable electronic device during a drop impact of the device are described herein. Generally, the method for detecting presence of a protective case on a portable electronic device during a drop impact of the device involves receiving a first indication that the portable electronic device is dropping; collecting sensor data generated from at least one sensor; receiving a second indication that the portable electronic device has experienced the drop impact; analyzing sensor data generated by the at least one sensor during a time frame between receiving the first indication and the second indication; and determining an output result based on the analyzing, wherein the output result indicates either: (i) the portable electronic device was protected by a protective case during drop impact; or (ii) the portable electronic device was not protected by a protective case during drop impact.
    Type: Application
    Filed: November 7, 2019
    Publication date: January 6, 2022
    Inventors: Richard Hui, Anthony Daws, Ebrahim Bagheri, Fattane Zarrinkalam, Hossein Fani, Samad Paydar
  • Publication number: 20210217093
    Abstract: Different examples for a server and methods for providing actionable insights based on warranty analytics related to usage of a protective apparatus with an electronic device by a customer are described herein. In some cases, the method comprises: receiving an electronic query, at a server, from a user device; accessing, at the server, at least one of risk profile data and test data from a multidimensional data structure, where the at least one risk profile data and test data include data needed to respond to the electronic query; determining, at the server, a response to the electronic query using the accessed data; an sending an electronic message from the server to the user device, the electronic message including data for answering the electronic query.
    Type: Application
    Filed: June 3, 2019
    Publication date: July 15, 2021
    Inventors: Hossein Fani, Fattane Zarrinkalam, Ebrahim Bagheri, Richard Hui
  • Patent number: 11030322
    Abstract: Mechanisms are provided for accessing security vulnerability issue information. The mechanisms monitor security analyst interactions with security vulnerability issues via the security management system to generate analyst interaction log data, and generate one or more security analyst models corresponding to one or more security analysts by performing a machine learning operation on the analyst interaction log data. The mechanisms generate an analyst-issue model based on the one or more security vulnerability issue models and the one or more security analyst models, and generate an issue recommendation for a security analyst based on the analyst-issue model.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: June 8, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Patent number: 10885131
    Abstract: Various embodiments are described herein for a system and method for determining a community of users with similar temporal behaviour from a plurality of users that generate electronic content during a time period by, for example, accessing the electronic content from a data store using a processing unit; determining at least one transient topic from the accessed electronic content for the time period using a topic extractor; determining contributions of the users to the identified at least one transient topic using a user community detector; determining the community of users as the users that have similar temporal contributions to the at least one identified transient topic using the user community detector; and providing a recommendation based on a determined user community.
    Type: Grant
    Filed: September 12, 2016
    Date of Patent: January 5, 2021
    Inventors: Ebrahim Bagheri, Hossein Fani, Fattane Zarrinkalam
  • Patent number: 10834118
    Abstract: A method for ambiguity resolution in retrieving security information. A unified representation model utilizing the security information mined from a group of sources is generated by a computer system, wherein the unified representation model represents terms in the security information using vectors that describe locations in space for the terms. Distances between the terms indicate correlations between the terms, and the terms are for security concepts in the security information. The computer system represents the security concepts utilizing a group of weighted graphs that identifies semantic-relatedness between the terms utilizing the vectors in the unified representation model, wherein the group of weighted graphs enables interpreting queries with reduced ambiguity. The computer system interprets a seed query utilizing the group of weighted graphs. The computer system retrieves a portion of the security information utilizing the seed query interpreted utilizing the group of weighted graphs.
    Type: Grant
    Filed: December 11, 2017
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20200242640
    Abstract: A system and method for mining social media signals and cues i) created by a user (for example, a customer) and/or ii) to which the user is exposed (the “data”), and for processing that data as it relates to a service (including a fee or subscription-based service), in order to predict the user's predisposition or likelihood to either leave the subscription or the service or reduce his/her engagement with the subscription or the service.
    Type: Application
    Filed: September 9, 2019
    Publication date: July 30, 2020
    Inventors: Aaron David Nielsen, Qiao Pang, Ebrahim Bagheri, Mohammad-Amin Jashki, Fattane Zarrinkalam, Alireza Vazifedoost
  • Publication number: 20200134188
    Abstract: Mechanisms are provided for accessing security vulnerability issue information. The mechanisms monitor security analyst interactions with security vulnerability issues via the security management system to generate analyst interaction log data, and generate one or more security analyst models corresponding to one or more security analysts by performing a machine learning operation on the analyst interaction log data. The mechanisms generate an analyst-issue model based on the one or more security vulnerability issue models and the one or more security analyst models, and generate an issue recommendation for a security analyst based on the analyst-issue model.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20190182285
    Abstract: A method for ambiguity resolution in retrieving security information. A unified representation model utilizing the security information mined from a group of sources is generated by a computer system, wherein the unified representation model represents terms in the security information using vectors that describe locations in space for the terms. Distances between the terms indicate correlations between the terms, and the terms are for security concepts in the security information. The computer system represents the security concepts utilizing a group of weighted graphs that identifies semantic-relatedness between the terms utilizing the vectors in the unified representation model, wherein the group of weighted graphs enables interpreting queries with reduced ambiguity. The computer system interprets a seed query utilizing the group of weighted graphs. The computer system retrieves a portion of the security information utilizing the seed query interpreted utilizing the group of weighted graphs.
    Type: Application
    Filed: December 11, 2017
    Publication date: June 13, 2019
    Inventors: Ebrahim Bagheri, Mohammadreza Barouni Ebrahimi, Samaneh Bayat, Zeinab Noorian
  • Publication number: 20180075147
    Abstract: Various embodiments are described herein for a system and method for determining a community of users with similar temporal behaviour from a plurality of users that generate electronic content during a time period by, for example, accessing the electronic content from a data store using a processing unit; determining at least one transient topic from the accessed electronic content for the time period using a topic extractor; determining contributions of the users to the identified at least one transient topic using a user community detector; determining the community of users as the users that have similar temporal contributions to the at least one identified transient topic using the user community detector; and providing a recommendation based on a determined user community.
    Type: Application
    Filed: September 12, 2016
    Publication date: March 15, 2018
    Inventors: Ebrahim Bagheri, Hossein Fani, Fattane Zarrinkalam
  • Publication number: 20160253688
    Abstract: A system and method for mining social media signals and cues i) created by a user (for example, a customer) and/or ii) to which the user is exposed (the “data”), and for processing that data as it relates to a service (including a fee or subscription-based service), in order to predict the user's predisposition or likelihood to either leave the subscription or the service or reduce his/her engagement with the subscription or the service.
    Type: Application
    Filed: February 24, 2016
    Publication date: September 1, 2016
    Inventors: Aaron David Nielsen, Qiao Pang, Ebrahim Bagheri, Mohammad-Amin Jashki, Fattane Zarrinkalam
  • Publication number: 20160110471
    Abstract: A computer implemented method and system enables use of a database of machine readable properties, features and traceable locations of real objects to search and locate and/or identify objects on the web by human input to a machine of image and/or oral cues relating to the object.
    Type: Application
    Filed: May 21, 2014
    Publication date: April 21, 2016
    Inventors: Ebrahim Bagheri, John CUZZOLA, Zoran JEREMIC, Mohammadreza BASHASH